OS6860 (E) AOS 8.2.1.R01 Network Configuration Guide
OS6860 (E) AOS 8.2.1.R01 Network Configuration Guide
B
November 2015
[Link]
This user guide documents AOS Release 8 for the OmniSwitch 6860 and OmniSwitch 6860E.
The functionality described in this guide is subject to change without notice.
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 iii
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 vii
Contents
viii Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
xii Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xiii
Contents
xiv Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
xvi Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xvii
Contents
xviii Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xix
Contents
DHCP .....................................................................................................................22-5
DHCP and the OmniSwitch ...................................................................................22-6
External DHCP Relay Application ........................................................................22-7
Internal DHCP Relay .............................................................................................22-8
DHCP Relay Implementation .......................................................................................22-9
Global DHCP .........................................................................................................22-9
Setting the IP Address .....................................................................................22-9
Per-VLAN DHCP ..................................................................................................22-9
Identifying the VLAN .....................................................................................22-9
Configuring BOOTP/DHCP Relay Parameters ...................................................22-10
Setting the Forward Delay ....................................................................................22-10
Setting Maximum Hops .......................................................................................22-11
Setting the Relay Forwarding Option ...................................................................22-11
Using Automatic IP Configuration .............................................................................22-12
Enabling Automatic IP Configuration ..................................................................22-12
Configuring UDP Port Relay ......................................................................................22-13
Enabling/Disabling UDP Port Relay ....................................................................22-13
Specifying a Forwarding VLAN ..........................................................................22-14
How the Relay Agent Processes DHCP Packets from the Client ........................22-15
How the Relay Agent Processes DHCP Packets from the Server .................22-15
Configuring DHCP Security Features .........................................................................22-16
Using the Relay Agent Information Option (Option-82) .....................................22-16
How the Relay Agent Processes DHCP Packets from the Client .................22-17
How the Relay Agent Processes DHCP Packets from the Server .................22-17
Enabling the Relay Agent Information Option-82 ........................................22-18
Configuring a Relay Agent Information Option-82 Policy ...........................22-18
Using DHCP Snooping ........................................................................................22-19
DHCP Snooping Configuration Guidelines ..................................................22-20
Enabling DHCP Snooping .............................................................................22-20
Configuring the Port Trust Mode ..................................................................22-22
Bypassing the Option-82 Check on Untrusted Ports .....................................22-22
Configuring IP Source Filtering ....................................................................22-23
Configuring the DHCP Snooping Binding Table ..........................................22-23
Layer 2 DHCP Snooping ...............................................................................22-25
Verifying the DHCP Relay Configuration ..................................................................22-26
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xxi
Contents
xxii Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xxiii
Contents
xxiv Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xxv
Contents
xxvi Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xxvii
Contents
xxviii Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xxix
Contents
xxx Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xxxi
Contents
xxxii Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xxxiii
Contents
xxxiv Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xxxv
Contents
xxxvi Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xxxvii
Contents
xxxviii Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Contents
Times OmniSwitch AOS Release 8 Network Configuration Guide November 2015 xxxix
Contents
This OmniSwitch AOS Release 8 Network Configuration Guide describes basic attributes of your switch
and basic switch administration tasks. The software features described in this manual are shipped standard
with your switches. These features are used when readying a switch for integration into a live network
environment.
Supported Platforms
The information in this guide applies only to OmniSwitch 6860 and OmniSwitch 6860E switches.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page xli
What is in this Manual? About This Guide
• The CLI, including on-line configuration, command-building help, syntax error checking, and line
editing.
• Basic security features, such as switch access control and customized user accounts.
• SNMP
page xlii OmniSwitch AOS Release 8 Network Configuration Guide November 2015
About This Guide Documentation Roadmap
Documentation Roadmap
The OmniSwitch user documentation suite was designed to supply you with information at several critical
junctures of the configuration [Link] following section outlines a roadmap of the manuals that will
help you at each stage of the configuration process. Under each stage, we point you to the manual or
manuals that will be most helpful to you.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page xliii
Documentation Roadmap About This Guide
Anytime
The OmniSwitch AOS Release 8 CLI Reference Guide contains comprehensive information on all CLI
commands supported by the switch. This guide includes syntax, default, usage, example, related CLI
command, and CLI-to-MIB variable mapping information for all CLI commands supported by the switch.
This guide can be consulted anytime during the configuration process to find detailed and specific
information on each CLI command.
page xliv OmniSwitch AOS Release 8 Network Configuration Guide November 2015
About This Guide Related Documentation
Related Documentation
The following are the titles and descriptions of all the related OmniSwitch user manuals:
• OmniSwitch 6860/6860E Hardware Users Guides
Complete technical specifications and procedures for all OmniSwitch chassis, power supplies, fans,
and Network Interface (NI) modules.
• OmniSwitch AOS Release 8 Switch Management Guide
Includes procedures for readying an individual switch for integration into a network. Topics include
the software directory architecture, image rollback protections, authenticated switch access, managing
switch files, system configuration, using SNMP, and using web management software (WebView).
• OmniSwitch AOS Release 8 Network Configuration Guide
Includes network configuration procedures and descriptive information on all the major software
features and protocols included in the base software package. Chapters cover Layer 2 information
(Ethernet and VLAN configuration), Layer 3 information (routing protocols, such as RIP and IPX),
security options (authenticated VLANs), Quality of Service (QoS), link aggregation, and server load
balancing.
• OmniSwitch AOS Release 8 Advanced Routing Configuration Guide
Includes network configuration procedures and descriptive information on all the software features and
protocols included in the advanced routing software package. Chapters cover multicast routing
(DVMRP and PIM-SM), Open Shortest Path First (OSPF), and Border Gateway Protocol (BGP).
• OmniSwitch AOS Release 8 CLI Reference Guide
Complete reference to all CLI commands supported on the OmniSwitch. Includes syntax definitions,
default values, examples, usage guidelines and CLI-to-MIB variable mappings.
• OmniSwitch AOS Release 8 Transceivers Guide
Includes SFP and XFP transceiver specifications and product compatibility information.
• Technical Tips, Field Notices
Includes critical Open Problem Reports, feature exceptions, and other important information on the
features supported in the current release and any limitations to their support.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page xlv
Technical Support About This Guide
Technical Support
An Alcatel-Lucent service agreement brings your company the assurance of 7x24 no-excuses technical
support. You will also receive regular software updates to maintain and maximize your Alcatel-Lucent
product features and functionality and on-site hardware replacement through our global network of highly
qualified service delivery partners.
With 24-hour access to Alcatel-Lucent Service and Support web page, you will be able to view and update
any case (open or closed) that you have reported to Alcatel-Lucent technical support, open a new case or
access helpful release notes, technical bulletins, and manuals.
Access additional information on Alcatel-Lucent Service Programs:
Web: [Link]
Phone: 1-800-995-2696
Email: [Link]@[Link]
page xlvi OmniSwitch AOS Release 8 Network Configuration Guide November 2015
1 Configuring Ethernet Ports
The Ethernet software is responsible for a variety of functions that support Ethernet, Gigabit Ethernet, and
10 Gigabit Ethernet ports on OmniSwitch Series switches. These functions include diagnostics, software
loading, initialization, configuration of line parameters, gathering statistics, and responding to
administrative requests from SNMP or CLI.
In This Chapter
This chapter describes the Ethernet port parameters of the switch and how to configure them through the
Command Line Interface (CLI). CLI Commands are used in the configuration examples.
Configuration procedures described in this chapter include:
• “Ethernet Ports Overview” on page 1-4
For information about CLI commands that can be used to view Ethernet port parameters, see the
OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 1-1
Ethernet Specifications Configuring Ethernet Ports
Ethernet Specifications
IEEE Standards Supported 802.3 Carrier Sense Multiple Access with Collision Detection
(CSMA/CD)
802.3u (100BaseTX)
802.3ab (1000BaseT)
802.3z (1000Base-X)
802.3ae (10GBase-X)
802.3az (Energy Efficient Ethernet)
Platforms Supported OmniSwitch 6860, 6860E
Ports Supported Ethernet (10 Mbps)
Fast Ethernet (100 Mbps)
Gigabit Ethernet (1 Gbps)
10 Gigabit Ethernet (10 Gbps)
Auto Negotiation Supported
Port Mirroring / Monitoring Supported
802.1Q Hardware Tagging Supported
Jumbo Frame Configuration Supported on 1/10 Gigabit Ethernet ports
Enhanced Port Performance Supported on 10-Gigabit transceivers
(EPP)
Maximum Frame Size 1553 bytes (10/100 Mbps)
9216 bytes (1/10 Gbps)
page 1-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet Ports Ethernet Port Defaults
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 1-3
Ethernet Ports Overview Configuring Ethernet Ports
See the Hardware Users Guide for more information about the hardware and port numbering for specific
models.
page 1-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet Ports Configuring Ethernet Port Parameters
transmits and receives data simultaneously. In half duplex mode, the interface can only transmit or receive
data at a given time.
For example:
-> interfaces 2/1/1 duplex half
-> interfaces 2/1/2-5 duplex auto
-> interfaces slot 3/1 duplex full
This command also includes an optional cli parameter. When this parameter is specified, only those
statistics that are maintained by the switch CLI are cleared; SNMP values are not cleared and continue to
maintain cumulative totals. For example:
-> clear interfaces 2/1/1-3 l2-statistics cli
Note that when the cli parameter is not specified both CLI and SNMP statistics are cleared.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 1-5
Configuring Ethernet Port Parameters Configuring Ethernet Ports
• Supply Voltage
• Current
• Output Power
• Input Power
To enable the DDM capability on the switch use the interfaces ddm command. For example, enter:
-> interfaces ddm enable
Traps can be enabled using the interfaces ddm-trap if any of the above values crosses the pre-defined
low or high thresholds of the transceiver. For example:
-> interfaces ddm-trap enable
Note. In order to take advantage of the DDM capability, the transceiver must support the DDM
functionality. Not all transceivers support DDM; refer to the Tranceivers Guide for additional DDM
information.
page 1-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet Ports Configuring Ethernet Port Parameters
The auto recovery has to enabled by configuring the low threshold. The high and low threshold when
configured, will have same type [mbps, pps, and percentage].
For example:
-> interfaces 1/1/1 flood-limit bcast rate mbps 60 low-threshold 40
-> interfaces 1/1/4 flood-limit uucast rate mbps 100 low-threshold 40
-> interfaces 1/1/5 flood-limit mcast rate pps 2000 low-threshold 1000
When the action is set as “shutdown”, it specifies that when high threshold is violated, the port needs to be
put in blocked state. When the action is set as “trap”, it specifies that when high threshold is crossed, the
trap will be sent with the violation reason. Similarly, when the action is set as “default”, it specifies that
when traffic reaches high threshold, packets above that rate will be dropped.
Note. The OmniSwitch currently does not support the transmitting of PAUSE frames.
Note that if autonegotiation and flow control are both enabled for an interface, then autonegotiation
determines how the interface processes PAUSE frames. If autonegotiation is disabled but flow control is
enabled, then the configured flow control settings apply.
By default, flow control is disabled. To configure flow control for one or more ports, use the interfaces
pause command with one of the following parameters to specify how PAUSE frames are processed:
• tx—Transmit PAUSE frames to peer switches when traffic congestion occurs on the local interface. Do
not honor PAUSE frames from peer switches.
• rx—Allow the interface to honor PAUSE frames from peer switches and temporarily stop sending
traffic to the peer. Do not transmit PAUSE frames to peer switches.
• tx-and-rx—Transmit and honor PAUSE frames when traffic congestion occurs between peer switches.
For example, the following command configures ports 1/1 through 1/10 to transmit and honor PAUSE
frames:
-> interfaces 1/1/1-10 pause tx-and-rx
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 1-7
Configuring Ethernet Port Parameters Configuring Ethernet Ports
To disable flow control for one or more ports, specify the disable parameter with the interfaces pause
command. For example:
-> interfaces 1/1/10 pause disable
2 Diagnose any link quality issues - If the Link Quality is not ‘Good’. Perform a few basic trouble-
shooting steps to determine if the issue is with the link partner and whether enabling EPP can help
improve the quality.
3 Enable EPP - If it’s determined that the issue is with the link parter, enable EPP.
Link-Quality Description
Good Link is good
Fair Link may exhibit errors
Poor Link will exhibit errors and may lose connectivity
N/A Link does not support EPP
EPP - Diagnose
For ports diagnosed as Fair or Poor, simple steps can be performed to identify the faulty component.
Since the issue could be with the transceiver, cable, fiber, or the link partner, see the table below to help
determine if the issue is with the link partner and if enabling EPP may help.
page 1-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet Ports Configuring Ethernet Port Parameters
EPP - Enabling
If after diagnosing the problem it is determined that the issue is with the link partner and the Link-Quality
has been diagnosed to be Fair or Poor, EPP can be enabled allowing the system to operate with the
deficient receive channels. For example:
-> interfaces 1/1/1 epp enable
To enable the EEE capability on the switch use the interfaces eee command. For example:
-> interfaces 1/1/1 eee enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 1-9
Using TDR Cable Diagnostics Configuring Ethernet Ports
• The TDR test runs an “out-of-service” test; other data and protocol traffic on the port is interrupted
when the test is active.
• TDR is supported only on copper ports.
• Each time a TDR test is run, statistics from a test previously run on the same port are cleared.
A TDR test is initiated using the interfaces tdr CLI command. For example, the following command
starts the test on port 2/1:
-> interfaces 1/1/1 tdr enable
Ch/Slot/ No of Cable Fuzzy Pair1 Pair1 Pair2 Pair2 Pair3 Pair3 Pair4 Pair4 Test
port pairs State Length State Length State Length State Length State Length Result
-----+-----+------+-----+-----+-----+------+------+-----+------+-----+------+------
1/1/1 4 ok 0 ok 3 ok 3 ok 3 ok 3 success
The following cable states are indicated in the show interfaces tdr-statistics command output:
• OK—Wire is working properly
• Open:—Wire is broken
• Crosstalk—Signal transmitted on one pair of wire creates an undesired effect in another wire.
page 1-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet Ports Using TDR Cable Diagnostics
TDR statistics from a previous test are also cleared when a new test starts on the same port.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 1-11
Clearing Ethernet Port Violations Configuring Ethernet Ports
• Network Security
Depending on the application and type of violation, specific actions are taken when a violation is detected
on the port. For example, an application may take one of the following actions when the violation triggers
a port shut down:
• Admin Down—deactivates the physical port.
• Simulated Down—the physical port shows as active but the applications are not allowed to access the
port link. The port is put in a blocking state.
A security violation may occur under the following conditions:
• A port is configured as a secure port and the number of secure MAC addresses learned on the port has
exceeded the maximum value.
• A device with a secure MAC address that is configured or learned on one of the secure ports attempts
to access another secure port.
Consider the following regarding link aggregate security violations:
• When a violation occurs on a physical port that is a member of a link aggregate, the violation affects
the entire link aggregate group. All ports on that link aggregate are either restricted or shut down.
• When the violations are cleared for the entire link aggregate group, the whole link aggregate group is
reactivated.
• When a simulated down violation occurs, toggling the link clears the violation for both the link
aggregates and physical ports.
To view the violation conditions that exist on individual ports or link aggregates, use the show violation
command. For example:
To clear all the MAC address violation logs and activate the port or link aggregate, use the clear violation
command. For example:
-> clear violation port 1/1/10
-> clear violation linkagg 10-20
page 1-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet Ports Link Monitoring
Link Monitoring
The Link Monitoring feature is used to monitor interface status to minimize the network protocol re-
convergence that can occur when an interface becomes unstable. To track the stability of an interface, this
feature monitors link errors and link flaps during a configured timeframe. If the number of errors or link
flaps exceeds configured thresholds during this time frame, the interface is shut down.
Note. Link Monitoring can be enabled on individual ports that make up a virtual port such as a link
aggregate or VFL, but not on the entire link aggregate or VFL virtual port.
There are no explicit Link Monitoring commands to recover a port from a Link Monitoring shutdown. See
“Clearing Ethernet Port Violations” on page 1-12 for information of learning port violations.
In this example, the port is shutdown if the number of link errors exceeds the threshold value of 50 during
the link monitoring window time frame.
• Whenever an interface comes up and it is not an administrative action (admin-up), the link flap counter
is incremented.
The interfaces link-monitoring link-flap-threshold command is used to configure the number of flaps
allowed before the interface is shutdown. For example:
-> interfaces 1/1/1 link-monitoring link-flap-threshold 5
In this example, the port is shutdown if the number of link flaps exceeds the threshold value of five during
the link monitoring window timeframe.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 1-13
Link Monitoring Configuring Ethernet Ports
Monitoring Window
The Link Monitoring window is a per-port configurable timer that is started whenever link-monitoring is
enabled on a port. During this time frame interface receive errors and interface flaps are counted. If either
of the values exceeds the configured thresholds the interface is shut down.
• The timer value can be modified even when the Link Monitoring timer is running and the new value of
timer takes effect after the current running timer expires.
• The threshold values for link errors and link flaps can also be modified when link-monitoring timer is
running; if the new threshold value is less than the current link-flap or link-error counter value, then the
interface is shutdown immediately.
The interfaces link-monitoring time-window command is used to configure the monitoring window
timer. For example:
-> interfaces 1/1/1 link-monitoring time-window 500
In this example, link monitoring will monitor port 1/1/1 for 500 seconds.
All the statistics (link errors and link flaps) for a port are reset to zero when Link Monitoring is enabled on
that port.
• The port is shutdown by any feature, such as Link Monitoring, UDLD, or Link Fault Propagation.
page 1-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet Ports Interfaces Violation Recovery
• An automatic recovery timer that indicates how much time a port remains shut down before the switch
automatically brings the port back up (see “Configuring the Violation Recovery Time” on page 1-17).
• A maximum number of recovery attempts setting that specifies how many recoveries can occur before
a port is permanently shutdown (see “Configuring the Violation Recovery Time” on page 1-17).
• A wait-to-restore timer that indicates the amount of time the switch waits to notify features that the
port is back up (see “Configuring the Wait-to-Restore Timer” on page 1-18).
• An SNMP trap that is generated each time an interface is shutdown by a feature. This can occur even
when the interface is already shutdown by another feature. The trap also indicates the reason for the
violation.
• An SNMP trap that is generated when a port is recovered. The trap also includes information about
how the port was recovered. Enabling or disabling this type of trap is allowed using the violation
recovery-trap command.
• Using the interfaces alias command to administratively disable and enable the interface.
Administratively – A port is administratively disabled. With this method the LED does not remain ON. A
port in this state can be recovered using only the following methods:
• Using the clear violation command to manually clear the violation.
• Using the interfaces alias command to administratively disable and enable the interface.
Disconnecting/reconnecting the interface link or a link down/up event will not recover a port that was
administratively disabled.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 1-15
Interfaces Violation Recovery Configuring Ethernet Ports
page 1-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet Ports Interfaces Violation Recovery
The violation recovery time value configured for a specific interface overrides the global value configured
for all switch interfaces. To set the port-level value back to the global value, use the default parameter
with the violation recovery-time command. For example, the following command sets the violation
recovery time for port 2/1 on chassis 1 back to the global value of 600:
-> violation 1/2/1 recovery-time default
To disable the violation recovery timer mechanism, set the recovery time to zero. For example:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 1-17
Interfaces Violation Recovery Configuring Ethernet Ports
The maximum recovery attempts value configured for a specific interface overrides the global value
configured for all switch interfaces. To set the port-level value back to the global value, use the default
parameter with the violation recovery-maximum command. For example, the following command sets
the number of recovery attempts for port 2/1 on chassis 1 back to the global value of 3:
-> violation 1/2/1 recovery-maximum default
To disable the violation recovery maximum attempts mechanism, set the number of attempts to zero. For
example:
show interfaces Displays the administrative status, link status, violations, recovery
time, maximum recovery attempts and the value of the wait-to-restore
timer.
show violation Displays the address violations that occur on ports with LPS restric-
tions. This command displays a port violation for sticky port security
when the maximum number of MAC address of the connected worksta-
tion that the switch learns.
show violation-recovery- Displays the globally configured recovery time, SNMP recovery trap
configuration enable/disable status and maximum recovery attempts.
For more information about the resulting displays from these commands, see the OmniSwitch AOS Release
8 CLI Reference Guide.
• An interface recovers from a violation due to the automatic recovery timer mechanism.
page 1-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet Ports Interfaces Violation Recovery
• When the WTR timer is running, the interface is physically up but the link status is down.
The interfaces wait-to-restore command is used to configure the WTR timer value, in multiples of 5. For
example, the following commands set the WTR timer value to 300 seconds:
-> interfaces 1/1/1 wait-to-restore 300
To disable the WTR timer mechanism, set the timer value to zero. For example:
-> interfaces 1/1/1 wait-to-restore 0
When the interface goes down, the WTS timer will be started. If the interface comes back up while the
WTS timer is running, then WTS timer will be stopped and no link down event will be sent. Otherwise,
after the WTS timer expiries a link-down event will be sent to all the relevant applications.
Consider the following when configuring the wait-to-shutdown timer:
• If the interface comes back up while the WTS timer is still running, the WTS timer is stopped and no
link down event is sent to other switch applications.
• The WTR timer functionality has no impact on link-error or link-flap detection; these features are
configurable even when the WTS timer is disabled.
• The timer value can be modified when the WTS timer is running; however, the new timer value does
not take effect until after the current running timer expires.
• When the wait-to-shutdown timer is running there would be packet loss on that interface. This is
because the port is physical down and only the link-down event is not being communicated to the
switch applications which will continue to send packets to the interface.
• The link-status of the remote connected port will be down when the WTS timer is running since the
port is physically down.
The interfaces wait-to-shutdown command is used to configure the WTS timer value, in multiples of 10
milliseconds. For example, the following commands set the WTR timer value to 30 seconds:
-> interfaces 1/1/1 wait-to-shutdown 30000
To disable the WTR timer mechanism, set the timer value to zero. For example:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 1-19
Link Fault Propagation Configuring Ethernet Ports
show interfaces link- Displays Link Monitoring statistics, such as the link flap and error
monitoring statistics counts and the port state (shutdown, down, up).
show interfaces link- Displays the Link Monitoring configuration, such as the monitoring
monitoring config status, monitoring window time, and the link flap and error thresholds.
violation recovery-maximum Displays the administrative status, link status, violations, recovery
time, maximum recovery attempts and the value of the wait-to-restore
timer.
For more information about the resulting displays from these commands, see the OmniSwitch AOS Release
8 CLI Reference Guide.
• If all the source ports in the group go down, LFP waits a configured amount of time then shuts down
another set of interfaces (configured as destination ports) that are associated with the same group.
• When any one of the source ports comes back up, all of the destination ports are brought back up and
network connectivity is restored.
The LFP source and destination ports can be physical or link aggregation ports. If the destination port is a
link aggregation port the shutdown consists of shutting down all members of the link aggregation group
(physically down). However, the link aggregation group remains administratively enabled.
page 1-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet Ports Link Fault Propagation
• If a port that is not a member of a link aggregate at the time a violation occurred is added to a link
aggregate, the switch will not shut down the port.
• SNMP traps cannot be configured for LFP. The interface violation recovery mechanism will be
responsible for sending traps when a port is shutdown or recovered by LFP.
• If the wait-to-restore (WTR) timer is configured on the source ports of a LFP group with link
monitoring enabled, the state of the destination ports of the group will be determined by the link state
of the ports after the WTR timer has expired.
See “Interfaces Violation Recovery” on page 1-15 for information of learning port violations.
1 Create an LFP group. This type of group identifies the source ports to monitor and the destination
ports to bring down when all of the source ports go down. To create an LFP group, use the link-fault-
propagation group command. For example:
-> link-fault-propagation group 1
2 Associate source ports with the LFP group. To associate source ports to an LFP group, use the link-
fault-propagation group source command. For example:
-> link-fault-propagation group 1 source port 1/1/2-5 2/1/3
3 Associate destination ports with the LFP group. To associate destination ports with an LFP group,
use the link-fault-propagation group destination command. For example:
-> link-fault-propagation group 1 destination port 1/1/5-8 2/1/3
4 Configure the LFP wait-to-shutdown timer. This timer specifies the amount of time that LFP will
wait before shutting down all the destination ports. To configure this timer value, use the link-fault-prop-
agation group wait-to-shutdown command. For example:
-> link-fault-propagation group 1 wait-to-shutdown 70
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 1-21
Link Fault Propagation Configuring Ethernet Ports
Note. Optional. To verify the LFP configuration, use the show link-fault-propagation group command.
For example:
Group Id : 6
Source Port(s) : 1/2 1/6 1/9,
Destination Port(s) : 1/10-11 1/13,
Group-Src-Ports Status : down,
Admin Status : disable,
Wait To Shutdown : 5
See the OmniSwitch AOS Release 8 CLI Reference Guide for more information about LFP commands.
page 1-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet Ports Link Fault Propagation
OS-1
2/1
1
1/1 3/1
DHL L2 Network
1
Access LACP 1
Stby 1
In this example:
• When interfaces 2/1 and 3/1 on OS-1 are down, the access switch will keep interface 1/1 as active and
traffic will still be forwarded to OS-1 even though it has no network connectivity.
• To allow the switch to use the standby interface the link on OS-1 would need to be disabled so that
interface 1/1 on the access switch leaves the LACP group.
-> link-fault-propagation group 1 source port 2/1 3/1 destination linkagg 1
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 1-23
Link Fault Propagation Configuring Ethernet Ports
page 1-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
2 Configuring UDLD
UniDirectional Link Detection (UDLD) is a protocol for detecting and disabling unidirectional Ethernet
fiber or copper links caused by mis-wiring of fiber strands, interface malfunctions, media converter faults,
and so on. The UDLD operates at Layer 2 in conjunction with IEEE 802.3 - Layer 1 fault detection
mechanisms.
UDLD is a lightweight protocol that can be used to detect and disable one-way connections before they
create dangerous situations such as Spanning Tree loops or other protocol malfunctions. The protocol is
mainly used to advertise the identities of all the UDLD-capable devices attached to the same LAN
segment and to collect the information received on the ports of each device to determine whether the Layer
2 communication is functioning properly. All connected devices must support UDLD for the protocol to
successfully identify and disable unidirectional links. When UDLD detects a unidirectional link, the
protocol administratively shuts down the affected port and generates a trap to alert the user.
In This Chapter
This chapter describes how to configure UDLD parameters through the Command Line Interface (CLI).
CLI commands are used in the configuration examples; for more details about the syntax of commands,
see the OmniSwitch AOS Release 8 CLI Reference Guide.
Configuration procedures described in this chapter include the following:
• “Configuring UDLD” on page 2-6.
• “Configuring the Probe-Timer” on page 2-7 to configure the probe-message advertisement timer.
• “Configuring the Echo-Wait-Timer” on page 2-7 to configure the echo-based detection timer.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 2-1
UDLD Specifications Configuring UDLD
UDLD Specifications
Platforms Supported OmniSwitch 6860, 6860E
Maximum number of UDLD ports per system Up to maximum physical ports per system
UDLD Defaults
Parameter Description Command Default
UDLD administrative state udld Disabled
UDLD status of a port udld port Disabled
UDLD operational mode udld mode Normal
Probe-message advertisement timer udld probe-timer 15 seconds
Echo-based detection timer udld echo-wait-timer 8 seconds
page 2-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring UDLD Quick Steps for Configuring UDLD
2 To enable the UDLD protocol on a port, use the udld port command by entering udld port, followed
by the slot and port number, and enable. For example:
-> udld port 1/1/6 enable
3 Configure the operational mode of UDLD by entering udld port, followed by the slot and port
number, mode, and the operational mode. For example:
-> udld port 1/1/6 mode aggressive
4 Configure the probe-message advertisement timer on port 6 of slot 1 as 17 seconds using the following
command:
-> udld port 1/1/6 probe-timer 17
Note. Optional. Verify the UDLD global configuration by entering the show udld configuration command
or verify the UDLD configuration on a port by entering the show udld configuration port command. For
example:
-> show udld configuration
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 2-3
UDLD Overview Configuring UDLD
UDLD Overview
UDLD is a Layer 2 protocol used to examine the physical configuration connected through fiber-optic or
twisted-pair Ethernet cables. When a port is affected and only a unidirectional link is working, UDLD
detects and administratively shuts down the affected port, and alerts the user. Unidirectional links can
create hazardous situations such as Spanning-Tree topology loops caused, for instance, by unwiring of
fiber strands, interface malfunctions, faults of the media converter, and so on.
The UDLD feature is supported on the following port types:
• Copper ports
• Fiber ports
• Aggressive mode
UDLD works with the Layer 1 mechanisms to determine the physical status of a link. A unidirectional link
occurs whenever the traffic sent from a local device is received by its neighbor; but the traffic from the
neighbor is not received by the local device.
Normal Mode
In this mode, the protocol depends on explicit information instead of implicit information. If the protocol
is unable to retrieve any explicit information, the port is not put in the shutdown state; instead, it is marked
as Undetermined. The port is put in the shutdown state only when:
• It is explicitly determined that the link is defective
• When it is determined on the basis of UDLD-PDU processing that link has become unidirectional.
Aggressive Mode
In this mode, UDLD checks whether the connections are correct and the traffic is flowing bidirectionally
between the respective neighbors. The loss of communication with the neighbor is considered an event to
put the port in shutdown state. Thus, if the UDLD PDUs are not received before the expiry of a timer, the
port is put in the UDLD-shutdown state. Since the lack of information is not always due to a defective
link, this mode is optional and is recommended only for point-to-point links.
UDLD shuts down the affected interface when one of these problems occurs:
• On fiber-optic or twisted-pair links, one of the interfaces cannot send or receive traffic.
• On fiber-optic or twisted-pair links, one of the interfaces is down while the other is up.
page 2-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring UDLD UDLD Overview
Echo detection
UDLD depends on an echo-detection mechanism. UDLD restarts the detection window on its side of the
connection and sends echo messages in response to the request, whenever a UDLD device learns about a
new neighbor or receives a re-synchronization request from an out-of-sync neighbor. This behavior is the
same on all UDLD neighbors because the sender of the echoes expects to receive an echo as a response.
If the detection window ends and no valid response is received, the link is shut down, depending on the
UDLD mode. When UDLD is in normal mode, the link is considered to be undetermined and is not shut
down. When UDLD is in aggressive mode, the link is considered to be unidirectional, and the interface is
shut down.
In normal mode, if UDLD is in the advertisement or in the detection phase and all the neighbor cache
entries are aged out, UDLD restarts the link-up sequence to re-synchronize with potentially out-of-sync
neighbors.
In aggressive mode, if UDLD is in the advertisement or in the detection phase and all the neighbors of a
port are aged out, UDLD restarts the link-up sequence to re-synchronize with potentially out-of-sync
neighbors. UDLD shuts down the port, after the continuous messages, if the link state is undetermined.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 2-5
Configuring UDLD Configuring UDLD
Configuring UDLD
This section describes how to use Command Line Interface (CLI) commands to do the following:
• “Enabling and Disabling UDLD” on page 2-6.
Note. See the “UDLD Commands” chapter in the OmniSwitch AOS Release 8 CLI Reference Guide for
more information about UDLD CLI commands.
To disable UDLD on a switch, use the udld command with the disable parameter. For example, the
following command disables UDLD on a switch:
-> udld disable
To disable UDLD on a port, use the udld port command with the disable parameter. For example, the
following command disables UDLD on a range of ports:
-> udld port 1/5/21-24 disable
page 2-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring UDLD Configuring UDLD
To configure the mode for multiple ports, specify a range of ports. For example:
-> udld port 1/2/7-18 mode normal
To configure the probe-timer for multiple ports, specify a range of ports. For example:
-> udld port 1/1/8-21 probe-timer 18
Use the no form of this command to reset the timer. For example, the following command resets the timer
for port 4 of slot 6:
-> no udld port 1/6/4 probe-timer
To configure the echo-wait-timer for multiple ports, specify a range of ports. For example:
-> udld port 1/1/8-21 echo-wait-timer 9
Use the no form of this command to reset the timer. For example, the following command resets the timer
for port 6 of slot 4:
-> no udld port 1/4/6 echo-wait-timer
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 2-7
Verifying the UDLD Configuration Configuring UDLD
For more information about the resulting display from these commands, see the OmniSwitch AOS Release
8 CLI Reference Guide. An example of the output for the show udld configuration port and show udld
statistics port commands is also given in “Quick Steps for Configuring UDLD” on page 2-3.
page 2-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
3 Managing Source
Learning
Transparent bridging relies on a process referred to as source learning to handle traffic flow. Network
devices communicate by sending and receiving data packets that each contain a source MAC address and a
destination MAC address. When packets are received on switch network interface (NI) module ports,
source learning examines each packet and compares the source MAC address to entries in a MAC address
database table. If the table does not contain an entry for the source address, then a new record is created
associating the address with the port it was learned on. If an entry for the source address already exists in
the table, a new one is not created.
Packets are also filtered to determine if the source and destination address are on the same LAN segment.
If the destination address is not found in the MAC address table, then the packet is forwarded to all other
switches that are connected to the same LAN. If the MAC address table does contain a matching entry for
the destination address, then there is no need to forward the packet to the rest of the network.
In This Chapter
This chapter describes how to manage source learning entries in the switch MAC address table (often
referred to as the forwarding or filtering database) through the Command Line Interface (CLI). CLI
commands are used in the configuration examples; for more details about the syntax of commands, see the
OmniSwitch CLI Reference Guide.
Configuration procedures described in this chapter include:
• “Using Static MAC Addresses” on page 3-3.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 3-1
Source Learning Specifications Managing Source Learning
page 3-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Source Learning MAC Address Table Overview
• The specified port must already belong to the specified VLAN. Use the vlan members untagged
command to assign a port to a VLAN before you configure the static MAC address.
• Only traffic from other ports associated with the same VLAN is directed to the static MAC address
port.
• Static MAC addresses are permanent addresses. This means that a static MAC address remains in use
even if the MAC ages out or the switch is rebooted.
• There are two types of static MAC address behavior supported: bridging (default) or filtering. Enter
filtering to set up a denial of service to block potential hostile attacks. Traffic sent to or from a filtered
MAC address is dropped. Enter bridging for regular traffic flow to or from the MAC address.
• If a packet received on a port associated with the same VLAN contains a source address that matches a
static MAC address, the packet is discarded. The same source address on different ports within the
same VLAN is not supported.
• If a static MAC address is configured on a port link that is down or disabled, an asterisk appears to the
right of the MAC address in the display output. The asterisk indicates that this is an invalid MAC
address. When the port link comes up, however, the MAC address is then considered valid and the
asterisk no longer appears next to the address in the display.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 3-3
Using Static MAC Addresses Managing Source Learning
Use the no form of this command to clear MAC address entries from the table. :
-> no mac-learning vlan 1 port 1/1/1 static mac-address [Link] bridg-
ing
To verify static MAC address configuration and other table entries, use the show mac-learning command.
For more information about this command, see the OmniSwitch CLI Reference Guide.
For more information about configuring a link aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation” and Chapter 10, “Configuring Dynamic Link Aggregation.”
page 3-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Source Learning Using Static Multicast MAC Addresses
[Link] to [Link]
[Link][Link]
[Link]XX:XX:XX:XX
• In addition to configuring the same static multicast address for multiple ports within a given VLAN, it
is also possible to use the same multicast address across multiple VLANs.
• The specified port or link aggregate ID must already belong to the specified VLAN.
Use the no form of the mac-learning multicast mac-address command to delete static multicast MAC
address entries:
-> no mac-learning vlan 20 port 1/1/1 multicast mac-address [Link]
If a a MAC address, port and VLAN ID are not specified with this form of the command, then all static
multicast addresses are deleted. For example, the following command deletes all static MAC addresses,
regardless of their port or VLAN assignments:
-> no mac-learning multicast
To verify the static MAC address configuration and other table entries, use the show mac-learning and
show mac-learning commands. For more information about these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 3-5
Using Static Multicast MAC Addresses Managing Source Learning
page 3-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Source Learning Configuring MAC Address Table Aging Time
A MAC address learned on any VLAN port ages out when the time since a packet with the particular
address was last seen on the port exceeds 1200 seconds.
Note. An inactive MAC address can take up to twice as long as the aging time value specified to age out of
the MAC address table. For example, if an aging time of 60 seconds is specified, the MAC ages out any
time between 60 and 120 seconds of inactivity.
To set the aging time back to the default value, use the default parameter. For example, the following sets
the aging time for all VLANs back to the default value:
-> mac-learning aging-time default
To display the aging time value use the show mac-learning aging-time command. For more information
about this command, see the OmniSwitch CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 3-7
Configuring the Source Learning Status Managing Source Learning
To enable the source learning status for a port or link aggregate, use the source-learning command with
the enable option. For example:
-> mac-learning port 1/1/10 enable
-> mac-learning port 1/1/15-20 enable
-> mac-learning linkagg 10 enable
Disabling source learning on a port or link aggregate is useful on a ring configuration, where a switch
within the ring does not need to learn the MAC addresses that the same switch is forwarding to another
switch within the ring,. This functionality is also useful in Transparent LAN Service configurations, where
the service provider device does not need to learn the MAC addresses of the customer network.
Configuring the source learning status is not allowed on the following types of switch ports:
• Ports enabled with Learned Port Security (LPS).
Consider the following guidelines when changing the source learning status for a port or link aggregate:
• Disabling source learning on a link aggregate disables MAC address learning on all member ports of
the link aggregate.
• MAC addresses dynamically learned on a port or aggregate are cleared when source learning is
disabled.
• Statically configured MAC addresses are not cleared when source learning is disabled for the port or
aggregate. In addition, configuring a new static MAC address is allowed even when source learning is
disabled.
page 3-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Source Learning Increasing the MAC Address Table Size
For example:
-> mac-learning mode distributed
WARNING: Source Learning mode has changed - must do write memory and reload
Note. All three of the above configuration steps are required to enable or disable the MAC mode. If any
of the above steps are skipped, the status of the mode is not changed.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 3-9
Displaying Source Learning Information Managing Source Learning
show mac-learning Displays a list of all MAC addresses known to the MAC address
table, including static and multicast MAC addresses.
show mac-learning aging-time Displays the current MAC address aging timer value by switch or
VLAN.
show mac-learning mode Displays the current status of the distributed MAC source learning
mode.
For more information about the resulting displays from these commands, see the OmniSwitch AOS Release
8 CLI Reference Guide.
page 3-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
4 Configuring VLANs
In a flat bridged network, a broadcast domain is confined to a single LAN segment or even a specific
physical location, such as a department or building floor. In a switch-based network, such as one
comprised of Alcatel-Lucent switching systems, a broadcast domain, or VLAN can span multiple physical
switches and can include ports from a variety of media types. For example, a single VLAN could span
three different switches located in different buildings and include a variety of Ethernet port configurations,
such as 802.1q tagged VLAN member ports and/or a link aggregate of ports.
In This Chapter
This chapter describes how to define and manage VLAN configurations through the Command Line
Interface (CLI). CLI commands are used in the configuration examples; for more details about the syntax
of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Configuration procedures described in this chapter include:
• “Creating/Modifying VLANs” on page 4-4.
For information about Spanning Tree, see Chapter 6, “Configuring Spanning Tree Parameters.”
For information about routing, see Chapter 16, “Configuring IP.”
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 4-1
VLAN Specifications Configuring VLANs
VLAN Specifications
The maximum limit values provided in the following Specifications table are subject to available system
resources.
VLAN Defaults
Parameter Description Command Default
VLAN identifier (VLAN ID) vlan VLAN 1 predefined on each
switch.
VLAN administrative state vlan Enabled
VLAN description vlan name VLAN ID
VLAN Spanning Tree state spantree vlan admin-state Enabled
VLAN IP router interface ip interface None
VLAN port associations vlan members untagged All ports initially associated
with default VLAN 1.
page 4-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLANs Sample VLAN Configuration
Note. Optional. Creating a new VLAN involves specifying a VLAN ID that is not already assigned to an
existing VLAN. To determine if a VLAN already exists in the switch configuration, enter show vlan. If
VLAN 100 does not appear in the show vlan output, then it does not exist on the switch. For example:
-> show vlan
vlan type admin oper ip mtu name
------+-------+-------+------+------+------+------------------
1 std Ena Ena Ena 1500 VLAN 1
4094 vcm Ena Ena Dis 1500 VCM IPC
1 Create VLAN 100 with a description (for example, Finance IP Network) using the following
command:
-> vlan 100 name “Finance IP Network”
2 Define an IP interface using the following command to assign an IP host address of [Link] to
VLAN 100 that enables forwarding of VLAN traffic to other subnets:
-> ip interface vlan_100_ip address [Link] vlan 100
3 Assign switch ports 2 through 4 VLAN 100 using the following command:
Note. Optional. To verify the VLAN 100 configuration, use the show vlan command. For example:
-> show vlan 100
Name : Finance IP Network,
Type : Static Vlan,
Administrative State : Enabled,
Operational State : Disabled,
IP Router Port : [Link] [Link] forward e2,
IP MTU : 1500
To verify that ports 1/3/2-4 were assigned to VLAN 100, use the show vlan members command. For
example:
-> show vlan 100 members
port type status
--------+---------+--------------
3/1/2 default inactive
3/1/3 default inactive
3/1/4 default inactive
To verify the details about the specific VLAN port 3/2, use the show vlan members command with the
port keyword and port number. For example:
-> show vlan 100 members port 3/1/2
type : default,
status : inactive,
vlan admin : disabled,
vlan oper : disabled,
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 4-3
VLAN Management Overview Configuring VLANs
In addition to the above tasks, VLAN management software tracks and reports the following information
to other switch software applications:
• VLAN configuration changes, such as adding or deleting VLANs, modifying the status of VLAN
properties (for example, administrative, Spanning Tree, and authentication status), changing the VLAN
description, or configuring VLAN router interfaces.
• VLAN port associations triggered by VLAN management and other switch software applications, such
as 802.1Q VLAN tagging.
• The VLAN operational state, which is inactive until at least one active switch port is associated with
the VLAN.
Creating/Modifying VLANs
The initial configuration for all Alcatel-Lucent switches consists of a default VLAN 1 and all switch ports
are initially assigned to this VLAN. When a switching module is added to the switch, the physical ports
are also related to the assigned VLAN 1. If additional VLANs are not configured on the switch, then the
entire switch is treated as one large broadcast domain. All ports receive traffic from all other ports.
In compliance with the IEEE 802.1Q standard, each VLAN is identified by a unique number, referred to as
the “VLAN ID”. The user specifies a VLAN ID to create, modify or remove a VLAN and to assign switch
ports to a VLAN. When a packet is received on a port, the VLAN ID of the port is inserted into the packet.
The packet is then bridged to other ports that are assigned to the same VLAN ID. In essence, the VLAN
broadcast domain is defined by a collection of ports and packets assigned to its VLAN ID.
The operational status of a VLAN remains inactive until at least one active switch port is assigned to the
VLAN. This means that VLAN properties, such as Spanning Tree or router interfaces, also remain
inactive. Ports are considered active if they are connected to an active network device. Non-active port
assignments are allowed, but do not change the operational state of the VLAN.
Ports can be statically assigned to VLANs. When a port is assigned to a VLAN, a VLAN port association
(VPA) is created and tracked by VLAN management switch software. For more information about VPAs,
see “Assigning Ports to VLANs” on page 4-6.
page 4-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLANs Creating/Modifying VLANs
Adding/Removing a VLAN
To add a VLAN to the switch configuration, enter vlan followed by a unique VLAN ID, an optional
administrative status, and an optional description. For example, the following command creates VLAN
755 with a description:
-> vlan 755 name “IP Finance Network”
By default, administrative status and Spanning Tree are enabled when the VLAN is created. The name
parameter for VLAN is optional.
Note. Quotation marks are required if the description contains multiple words separated by spaces. If the
description consists of only one word or multiple words separated by another character, such as a hyphen,
then quotes are not required.
You can also specify a contiguous range of VLAN IDs by using a hyphen with the vlan command. For
example, the following commands create VLANs 10 through 15 and 100 through 105 on the switch:
-> vlan 10-15 name “Marketing Network”
-> vlan 100-105 name “Marketing Network”
To remove a VLAN from the switch configuration, use the no form of the vlan command.
-> no vlan 200
-> no vlan 100-105
-> no vlan 10-15
When a VLAN is deleted, any router interfaces defined for the VLAN are removed and all VLAN port
associations are dropped. If the VLAN deleted is the default VLAN for a port, the port returns to default
VLAN 1. If the VLAN deleted is not a default VLAN, then the ports are directly detached from the
VLAN. For more information about VLAN router interfaces, see “Configuring VLAN IP Interfaces” on
page 4-9.
To view a list of VLANs already configured on the switch, use the show vlan command. See “Verifying
the VLAN Configuration” on page 4-12 for more information.
When the administrative status for a VLAN is disabled, VLAN port assignments are retained but traffic is
not forwarded on these ports.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 4-5
Assigning Ports to VLANs Configuring VLANs
When the vlan members command is used, the port’s default VLAN assignment is changed to the
specified VLAN. The previous default VLAN assignment for the port (for example, VLAN 1, VLAN 10
or VLAN 200) is dropped.
The vlan members command is also used to change the default VLAN assignment for an aggregate of
ports. The link aggregate control number is specified instead of a port. For example, the following
command assigns link aggregate 10 to VLAN 755:
-> vlan 755 members linkagg 10 untagged
For more information about configuring an aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation.”
Use the no form of the vlan members command to remove a default VPA. When this is done, VLAN 1 is
restored as the default VLAN for the port.
-> no vlan 955 members port 2/1/5
page 4-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLANs Assigning Ports to VLANs
VLAN 1 VLAN 1
untagged untagged
Switch 1 Switch 2
port 4/1/3
VLAN 2 VLAN 2
tagged port 2/1/1 tagged
VLAN 3 VLAN 3
tagged tagged
Switch 1 and 2 have three VLANs, one for untagged traffic and two for tagged traffic. The ports connect-
ing Switch 1 and 2 are configured in such a manner that the ports accept both tagged traffic for VLANS 2
and 3 and untagged traffic for VLAN 1.
A port can only be assigned to one untagged VLAN (in every case, this is the default VLAN
configuration). In this example the default VLAN for port 2/1/1 and port 4/1/3 is VLAN 1. The port can
be assigned to as many 802.1Q-tagged VLANs as necessary.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 4-7
Enabling/Disabling Spanning Tree for a VLAN Configuring VLANs
Port 4/1/3 is now configured to carry packets tagged with VLAN 5, even though VLAN 5 is not the
default VLAN for the port.
To enable tagging on link aggregation groups, enter the link aggregation group identification number in
place of the port number, as shown:
-> vlan 5 members linkagg 8 tagged
For further information on creating link aggregation groups, see Chapter 9, “Configuring Static Link
Aggregation,” or Chapter 10, “Configuring Dynamic Link Aggregation.”
To remove 802.1Q tagging from a selected port or link aggregate, use the untagged parameter.
-> vlan 5 members linkagg 8 untagged
Note. The link aggregation group must be created first before it can be set to use 802.1Q tagging.
Note. The single flat mode STP instance is referred to as the CIST (Common and Internal Spanning Tree)
instance.
In the flat mode, if the CIST instance is disabled, then it is disabled for all configured VLANs. However,
disabling STP on an individual VLAN excludes only those VLAN ports from the flat STP algorithm.
If the Spanning Tree operating mode is set to per-vlan mode, there is a single Spanning Tree instance for
each VLAN broadcast domain. Enabling or disabling STP on a VLAN in this mode includes or excludes
the VLAN from the per-vlan STP algorithm.
The spantree vlan admin-state command is used to enable/disable a Spanning Tree instance for an
existing VLAN. In the following examples, Spanning Tree is disabled on VLAN 255 and enabled on
VLAN 755:
-> spantree vlan 255 admin-state disable
-> spantree vlan 755 admin-state enable
STP does not become operationally active on a VLAN unless the VLAN is operationally active, which
occurs when at least one active port is assigned to the VLAN. Also, STP is enabled/disabled on individual
ports. So even if STP is enabled for the VLAN, a port assigned to that VLAN must also have STP enabled.
See Chapter 6, “Configuring Spanning Tree Parameters.”
page 4-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLANs Enabling/Disabling Source Learning
Disabling source learning on a VLAN causes the VLAN to be flooded with unknown unicast traffic.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 4-9
Bridging VLANs Across Multiple Switches Configuring VLANs
1 Create a VLAN on each switch with the same VLAN ID number (for example, VLAN 10).
2 On each switch, assign the ports that provide connections to other switches to the VLAN created in
Step 1.
3 On each switch, assign the ports that provide connections to end user devices (for example,
workstations) to the VLAN created in Step 1.
4 Connect switches and end user devices to the assigned ports.
The following diagram shows the physical configuration of an example VLAN bridging domain:
Switch B Switch C
[Link] [Link]
2/2 3/10
VLAN 10 VLAN 10
2/3 3/9
2/10 3/2
VLAN 10 VLAN 10
2/9 3/1
VLAN 10 VLAN 10 VLAN 10 VLAN 10
3/8 3/3
Switch A Switch D
[Link]
[Link]
In the above diagram, VLAN 10 exists on all four switches and the connection ports between these
switches are assigned to VLAN 10. The workstations can communicate with each other because the ports
to which they are connected are also assigned to VLAN 10. It is important to note that connection cables
do not have to connect to the same port on each switch. The key is that the port must belong to the same
VLAN on each switch. To carry multiple VLANs between switches across a single physical connection
cable, use the 802.1Q tagging feature (see “Using 802.1Q Tagging” on page 4-7).
The connection between Switch C and D is shown with a broken line because the ports that provide this
connection are in a blocking state. Spanning Tree is active by default on all switches, VLANs and ports.
The Spanning Tree algorithm determined that if all connections between switches were active, a network
loop would exist that could cause unnecessary broadcast traffic on the network. The path between Switch
page 4-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLANs Bridging VLANs Across Multiple Switches
C and D was shut down to avoid such a loop. See Chapter 6, “Configuring Spanning Tree Parameters,” for
information about how Spanning Tree configures network topologies that are loop free.
The following diagram shows the same bridging domain example as seen by the end user workstations.
Because traffic between these workstations is bridged across physical switch connections within the
VLAN 10 domain, the workstations are basically unaware that the switches even exist. Each workstation
believes that the others are all part of the same VLAN, even though they are physically connected to
different switches.
VLAN 10
[Link]
[Link]
[Link]
[Link]
Creating a VLAN bridging domain across multiple switches allows VLAN members to communicate with
each other, even if they are not connected to the same physical switch. This is how a logical grouping of
users can traverse a physical network setup without routing and is one of the many benefits of using
VLANs.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 4-11
Verifying the VLAN Configuration Configuring VLANs
show vlan Displays a list of all VLANs configured on the switch and the status of
related VLAN properties (for example, admin and Spanning Tree status
and router port definitions).
show vlan members Displays a list of VLAN port assignments.
show ip interface Displays VLAN IP router interface information.
Type Description
default The port was statically assigned to the VLAN using the vlan members
untagged command. The VLAN is now the port’s configured default
VLAN.
qtagged The port was statically assigned to the VLAN using the vlan members
tagged command. The VLAN is a static secondary VLAN for the 802.1Q
tagged port.
mirror The port is assigned to the VLAN because it is configured to mirror another
port that is assigned to the same VLAN. For more information about the
Port Mirroring feature, see Chapter 35, “Diagnosing Switch Problems.”
Status Description
inactive Port is not active (administratively disabled, down, or nothing connected to
the port) for the VPA.
blocking Port is active, but not forwarding traffic for the VPA.
forwarding Port is forwarding all traffic for the VPA.
filtering Mobile port traffic is filtered for the VPA; only traffic received on the port
that matches VLAN rules is forwarded. Occurs when a mobile port’s
VLAN is administratively disabled or the port’s default VLAN status is
disabled. Does not apply to fixed ports.
The following example displays VPA information for all ports in VLAN 200:
-> show vlan 200 members
port type status
--------+---------+--------------
3/1/24 default inactive
5/1/12 qtagged blocking
page 4-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLANs Verifying the VLAN Configuration
• VLAN 200 is an 802.1Q-tagged VLAN for port 5/1/12, which is an active port but currently blocked
from forwarding traffic.
For more information about the resulting displays from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 4-13
Verifying the VLAN Configuration Configuring VLANs
page 4-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
5 Configuring High
Availability VLANs
High availability (HA) VLANs, unlike standard VLANs, allow you to send traffic intended for a single
destination MAC address to multiple switch ports. These high availability VLANs can be used to manage
server clusters.
In This Chapter
This chapter describes the basic components of high availability VLANs and how to configure them
through the Command Line Interface (CLI). CLI commands are used in the configuration examples; for
more details about the syntax of commands, see the OmniSwitch CLI Reference Guide.
Configuration procedures described in this chapter include:
• Creating a VLAN on page 5-6.
Note. You can also configure and monitor high availability VLANs with WebView, Alcatel-Lucent’s
embedded web-based device management application. WebView is an interactive and easy-to-use GUI that
can be launched from OmniVista or a web browser. Please refer to WebView online documentation for
more information on configuring and monitoring high availability VLANs with WebView.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 5-1
High Availability VLANs Specifications Configuring High Availability VLANs
page 5-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring High Availability VLANs Quick Steps for Creating High Availability VLANs
2 Create a default VLAN for the HA VLAN ports with the vlan command as shown below:
-> vlan 10
3 Assign member ports to the new default VLAN with the vlan members untagged command as shown
below:
-> vlan 10 members port 1/1/3 untagged
-> vlan 10 members port 1/1/4 untagged
-> vlan 10 members port 1/1/5 untagged
4 Assign mac-address for the new server cluster by using the command server-cluster mac-address. For
example:
-> server-cluster 1 vlan 10 port 1/1/3-5 mac-address [Link]
Note. Optional. You can display the configuration of high availability VLANs with the show server-clus-
ter command. For example:
-> show server-cluster 1
Cluster Id : 1,
Cluster Name : L2-cluster,
Cluster Mode : L2,
Cluster Mac-address : [Link],
Cluster Vlan : 12,
Administrative State: Enabled,
Operational State : Disabled,
Operational Flag : VPA is not forwarding
Multi-Chassis Status : N/A
Multi-Chassis OutOfSync Reason : N/A
VFL Status : N/A
An example of what these commands look like entered sequentially on the command line:
-> server-cluster 1 mode L2
-> vlan 10
-> vlan 10 members port 1/1/3 untagged
-> vlan 10 members port 1/1/4 untagged
-> vlan 10 members port 1/1/5 untagged
-> server-cluster 1 vlan 10 port 1/1/3-5 mac-address [Link]
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 5-3
High Availability VLAN Overview Configuring High Availability VLANs
Note. The L2 mode is currently supported in AOS using the static mac-address command and L3 mode by
the static ARP command.
page 5-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring High Availability VLANs High Availability VLAN Overview
OmniSwitch
OmniSwitch 7800
MAC Address:
[Link]
MAC Address:
[Link]
High
Availability
VLAN
MAC Address:
[Link]
Ingress Egress
Ports Ports
In the above example, packets received on the ingress ports that are destined for the high availability
VLAN MAC address are sent out the egress ports that are members of the same VLAN. The MAC address
is virtual to the server cluster, individual servers may have different physical MAC [Link] all three
servers are connected to egress ports, they all receive the ingress port traffic. This provides a high level of
availability in that if one of the server connections goes down, the other connections still forward traffic to
one of the redundant servers.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 5-5
Configuring High Availability VLANs on a Switch Configuring High Availability VLANs
Note. Use the show server-cluster command to verify the HA VLAN configuration on the switch. See
“Displaying High Availability VLAN Status” on page 5-16 for more information.
Note. This section provides only a basic description of creating and deleting VLANs. For a complete
description of configuring and monitoring VLANs on a switch, please refer to Chapter 4, “Configuring
VLANs.”
Creating a VLAN
To create a new VLAN use the vlan command by entering vlan followed by the VLAN ID number. For
example, to create a VLAN with a VLAN ID number of 10 enter
-> vlan 10
You can also specify the administrative status and a name for the VLAN with the vlan command. For
example, to administratively enable (the default) a VLAN when you configure it enter vlan followed by
the VLAN ID number and enable.
For example, to create VLAN 10 and administratively enable it enter
-> vlan 10 enable
page 5-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring High Availability VLANs Configuring High Availability VLANs on a Switch
Deleting a VLAN
To delete a VLAN use the no form of the vlan command by entering no vlan followed by the VLAN’s ID
number. For example, to delete high availability VLAN 10 enter:
-> no vlan 10
To assign linkagg “1” to server cluster “3’, enter the commands as:
-> server-cluster 3 linkagg 1
If you want a name to be assigned along with the cluster mode, enter the commands as:
-> server-cluster 1 name l2_cluster mode l2
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 5-7
Configuring High Availability VLANs on a Switch Configuring High Availability VLANs
To remove server cluster from a high availability VLAN, use the no form of the command. For example,
-> no server-cluster 1
-> no server-cluster 2
To add more than one MAC address to a high availability VLAN, enter each address on the same
command line separated by a space. For example, to assign MAC addresses [Link],
[Link], and [Link], to high availability VLAN 30, you would enter:
-> server-cluster mac-address vlan 30 mac [Link] [Link]
[Link].
To remove more than one MAC address from a high availability VLAN using a single command, enter
each address on the same command line separated by a space. For example, to remove MAC addresses
[Link], [Link], and [Link], from high availability VLAN 30, you would
enter:
-> server-cluster mac-address vlan 30 no mac [Link] [Link]
[Link].
Note. Removing the last MAC address from an HA VLAN is not allowed. Deleting the VLAN is required
when there is only one MAC address left.
page 5-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring High Availability VLANs Application Examples
Application Examples
This section contains the following HAVLAN application examples:
• “Example 1: Layer 2 Server Cluster” on page 5-9.
• “Example 3: Layer 3 Server Cluster with IP Multicast Address to Cluster (IGMP)” on page 5-13.
• The traffic which ingresses on 1/1/1 or 1/1/2 destined to the server cluster MAC address and the
VLAN is forwarded to all the egress ports configured.(1/1/3,1/1/4,1/1/5).
• Here the ingress ports must be in the same VLAN as the server cluster VLAN and egress ports and
other traffic must be switched according to the normal switching logic.
Configuration Example
In this example, a packet can be an L2 or IP switched packet and Egress port can also be a linkagg port.
1 Create a server cluster that will become the HA VLAN by using the command server-cluster and
configure the mode. For example:
-> server-cluster 1 mode l2
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 5-9
Application Examples Configuring High Availability VLANs
2 Create a default VLAN for the HA VLAN ports with the vlan command as shown below:
-> vlan 10
3 Assign member ports to the new default VLAN with the vlan members untagged command as shown
below:
-> vlan 10 members port 1/1/3 untagged
-> vlan 10 members port 1/1/4 untagged
-> vlan 10 members port 1/1/5 untagged
4 Assign mac-address for the new server cluster by using the command server-cluster mac-address. For
example:
-> server-cluster 1 vlan 10 port mac-address [Link]
Note. Optional. You can display the configuration of high availability VLANs with the show server-clus-
ter command. For example:
-> show server-cluster 1
Cluster Id : 1,
Cluster Name : L2-cluster,
Cluster Mode : L2,
Cluster Mac-address : [Link],
Cluster Vlan : 12,
Administrative State: Enabled,
Operational State : Disabled,
Operational Flag : VPA is not forwarding
An example of what these commands look like entered sequentially on the command line:
-> server-cluster 1 mode L2
-> vlan 10
-> vlan 10 members port 1/1/3 untagged
-> vlan 10 members port 1/1/4 untagged
-> vlan 10 members port 1/1/5 untagged
-> server-cluster 1 vlan 10 port 1/1/3-5 mac-address [Link]
page 5-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring High Availability VLANs Application Examples
• The traffic which ingresses on 1/1/1 or 1/1/2 destined to the server cluster IP is routed to all the egress
ports configured (1/1/3,1/1/4,1/1/5). The ingress ports are on a different VLAN as the server cluster IP
interface.
• However, all the egress ports need to be in the same VLAN as the IP interface of server cluster. The
other traffic must be switched according to the normal switching/routing logic.
• Egress port can be a linkagg port as well.
Configuration Example
In this example, a packet is an L3 or IP switched packet.
1 Create a server cluster that will become the HA VLAN by using the command server-cluster and
configure the mode. For example:
-> server-cluster 2 mode L3
2 Create a default VLAN for the HA VLAN ports with the vlan command. For example:
-> vlan 12
3 Assign member ports to the new default VLAN with the vlan members untagged command. For
example:
-> vlan 12 members port 1/1/3 untagged
-> vlan 12 members port 1/1/4 untagged
-> vlan 12 members port 1/1/5 untagged
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 5-11
Application Examples Configuring High Availability VLANs
4 Assign an IP address for the by using the ip interface command. For example:
5 Assign mac-address for the new server cluster by using the command server-cluster mac-address. For
example:
-> server-cluster 2 ip [Link] mac-address static [Link]
Note. Optional. You can display the configuration of high availability VLANs with the show server-clus-
ter command. For example:
-> show server-cluster 2
Cluster Id : 2,
Cluster Name : L3-cluster,
Cluster Mode : L3,
Cluster Mac-address : [Link],
Cluster Vlan : 12,
Administrative State: Enabled,
Operational State : Enabled,
Operational Flag : -
An example of what these commands look like entered sequentially on the command line:
-> server-cluster 2 mode L3
-> vlan 12
-> vlan 12 members port 1/1/3 tagged
-> vlan 12 members port 1/1/4 tagged
-> vlan 12 members port 1/1/5 tagged
-> ip interface "vlan 12"
-> ip interface "vlan 12" address [Link]/24 vlan 12
-> server-cluster 2 ip [Link] mac-address static [Link]
page 5-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring High Availability VLANs Application Examples
Note. When a server cluster tries to send a bridged or routed packet to itself, a copy of the packet goes back
to the sender’s (server cluster) port.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 5-13
Application Examples Configuring High Availability VLANs
Configuration Example
In this example, a packet is an L3 IP switched packet and Egress port can also be a linkagg port.
1 Create a server cluster that will become the HA VLAN by using the command server-cluster and
configure the mode. For example:
-> server-cluster 3 mode L3
2 Create a default VLAN for the HA VLAN ports with the vlan command as shown below:
-> vlan 12
3 Assign member ports to the new default VLAN with the vlan members untagged command as shown
below:
-> vlan 12 members port 1/1/3 untagged
-> vlan 12 members port 1/1/4 untagged
-> vlan 12 members port 1/1/5 untagged
4 Assign mac-address for the new server cluster by using the command server-cluster mac-address. For
example:
-> server-cluster 3 ip [Link] mac-address static [Link]
5 If you want to assign a dynamic mac-address for the server cluster, enter the command as follows:
6 Enable the admin state of the IP multicast by using the ip multicast admin-state enable command. IP
multicast admin state must be enabled for the IGMP reports to be processed., else the cluster will be opera-
tionally down.
-> ip multicast admin-state enable
-> server-cluster 3 igmp-mode enable
-> server-cluster 3 ip-multicast [Link]
When IGMP mode is enabled for the server cluster, all static ports will be reset in igmp mode.
Note. Optional. You can display the configuration of high availability VLANs with the show server-clus-
ter command. For example:
-> show server-cluster 3
Cluster Id : 3,
Cluster Name : -,
Cluster Mode : L3,
Cluster IP : [Link],
Cluster Mac-Address : [Link],
Cluster Mac Type : Static,
IGMP-Mode : Enabled,
Cluster Multicast IP : [Link],
Administrative State : Enabled,
Operational State : Disabled,
Operational Flag : No IGMP members
page 5-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring High Availability VLANs Application Examples
An example of what these commands look like entered sequentially on the command line:
-> server-cluster 3 mode L3
-> vlan 12
-> vlan 12 members port 1/1/3 untagged
-> vlan 12 members port 1/1/4 untagged
-> vlan 12 members port 1/1/5 untagged
-> server-cluster 3 ip [Link] mac-address static [Link]
-> ip multicast admin-state enable
-> server-cluster 3 igmp-mode enable
-> server-cluster 3 ip-multicast [Link]
Note. In order to process IGMP reports, it is required to enable IP mulitcast by using the ip multicast
admin-state enable command.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 5-15
Displaying High Availability VLAN Status Configuring High Availability VLANs
To display the status and configuration of high availability VLANs you use the show server-cluster
command. To display the status and configuration of all high availability VLANs on a switch enter:
-> show server-cluster
To display the status and configuration of a single high availability VLAN cluster enter show server-clus-
ter followed by the server cluster ID number. For example, to display the status and configuration of high
availability server cluster id “1”enter
-> show server-cluster 1
Note. For more information on the CLI commands, See the OmniSwitch AOS Release 8 CLI Reference
Guide
page 5-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
6 Configuring Spanning Tree
Parameters
The Spanning Tree Algorithm and Protocol (STP) is a self-configuring algorithm that maintains a loop-
free topology on a network. STP helps to provide data path redundancy and network scalability. The
OmniSwitch STP implementation, based on the IEEE 802.1D standard, distributes the Spanning Tree load
between the primary management module and the network interface modules. This functionality improves
network robustness by providing a Spanning Tree that continues to respond to BPDUs (Bridge Protocol
Data Unit) and port link up and down states in the event of a fail over to a backup management module or
switch.
Alcatel-Lucent’s distributed implementation also incorporates the following Spanning Tree features:
• Configures a physical topology into a single Spanning Tree to ensure that there is only one data path
between any two switches.
• Supports fault tolerance within the network topology. The Spanning Tree is reconfigured in the event
of a data path or bridge failure or when a new switch is added to the topology.
• Supports two Spanning Tree operating modes: flat (single STP instance per switch) and per-VLAN
(single STP instance per VLAN). The per-VLAN mode can be configured to inter-operate with the
proprietary Per-VLAN Spanning Tree (PVST+) feature of Cisco.
• Supports three Spanning Tree Algorithms; 802.1D (STP), 802.1w (RSTP), and 802.1Q 2005 (MSTP).
• Allows 802.1Q tagged ports and link aggregate logical ports to participate in the calculation of the STP
topology.
• Provides loop-guard security to prevent network loops caused due to inconsistencies in data traffic.
The Distributed Spanning Tree software is active on all switches by default. As a result, a loop-free
network topology is automatically calculated based on default Spanning Tree bridge, VLAN, and port
parameter values. It is only necessary to configure the Spanning Tree parameters to change how the
topology is calculated and maintained.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-1
In This Chapter Configuring Spanning Tree Parameters
In This Chapter
This chapter provides an overview about how Spanning Tree works and how to configure Spanning Tree
parameters through the Command Line Interface (CLI). CLI commands are used in the configuration
examples; for more details about the syntax of commands, see the OmniSwitch AOS Release 8 CLI
Reference Guide.
Configuration procedures described in this chapter include:
• Selecting the Spanning Tree operating mode (flat or per-VLAN) on page 6-21.
page 6-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Spanning Tree Specifications
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-3
Spanning Tree Bridge Parameter Defaults Configuring Spanning Tree Parameters
page 6-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Multiple Spanning Tree (MST) Region Defaults
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-5
Spanning Tree Overview Configuring Spanning Tree Parameters
page 6-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Spanning Tree Overview
The following table provides a list of port role types and the port and/or bridge properties that the
Spanning Tree Algorithm examines to determine which role to assign to the port.
Note. The distinction between a backup port and an alternate port was introduced with the IEEE 802.1w
standard to help define rapid transition of an alternate port to a root port.
The role a port plays or can potentially play in the active Spanning Tree topology determines the port
operating state; discarding, learning, or forwarding. The port state is also configurable and it is possible
to enable or disable the administrative status of port and/or specify a forwarding or blocking state that is
only changed through user intervention.
The Spanning Tree Algorithm only includes ports in its calculations that are operational (link is up) and
have an enabled administrative status. The following table compares and defines 802.1D and 802.1w port
states and their associated port roles:
STP Port State RSTP Port State Port State Definition Port Role
Disabled Discarding Port is down or administratively disabled Disabled
and is not included in the topology.
Blocking Discarding Frames are dropped, nothing is learned or Alternate, Backup
forwarded on the port. Port is temporarily
excluded from topology.
Learning Learning Port is learning MAC addresses that are seen Root, Designated
on the port and adding them to the bridge
forwarding table, but not transmitting any
data. Port is included in the active topology.
Forwarding Forwarding Port is transmitting and receiving data and is Root, Designated
included in the active topology.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-7
Spanning Tree Overview Configuring Spanning Tree Parameters
Once the Spanning Tree is calculated, there is only one root bridge, one designated bridge for each LAN,
and one root port on each bridge (except for the root bridge). Data travels back and forth between bridges
over forwarding port connections that form the best, non-redundant path to the root. The active topology
ensures that network loops do not exist.
Root ID The Bridge ID for the bridge that this bridge believes is the root.
Root Path Cost The sum of the Path Costs that lead from the root bridge to this bridge port.
The Path Cost is a configurable parameter value. The IEEE 802.1D standard specifies a
default value that is based on port speed. See “Configuring Port Path Cost” on
page 6-37 for more information.
Bridge ID An eight-byte hex value that identifies this bridge within the Spanning Tree. The first
two bytes contain a configurable priority value and the remaining six bytes contain a
bridge MAC address. See “Configuring the Bridge Priority” on page 6-28 for more
information.
Each switch chassis is assigned a dedicated base MAC address. This is the MAC
address that is combined with the priority value to provide a unique Bridge ID for the
switch. For more information about the base MAC address, see the appropriate
Hardware Users Guide for the switch.
Port ID A 16-bit hex value that identifies the bridge port that transmitted this BPDU. The first 4
bits contain a configurable priority value and the remaining 12 bits contain the physical
switch port number. See “Configuring Port Priority” on page 6-36 for more
information.
The sending and receiving of Configuration BPDU between switches participating in the bridged network
constitute the root bridge election; the best path to the root is determined and then advertised to the rest of
the network. BPDU provide enough information for the STP software running on each switch to
determine the following:
• Which bridge serves as the root bridge.
• The shortest path between each bridge and the root bridge.
• The port state (forwarding or discarding) for each bridge port based on the role the port plays in the
active Spanning Tree topology.
The following events trigger the transmitting and/or processing of BPDU in order to discover and maintain
the Spanning Tree topology:
• When a bridge first comes up, it assumes it is the root and starts transmitting Configuration BPDU on
all its active ports advertising its own bridge ID as the root bridge ID.
page 6-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Spanning Tree Overview
• When a bridge receives BPDU on its root port that contains more attractive information (higher
priority parameters and/or lower path costs), it forwards this information on to other LANs to which it
is connected for consideration.
• When a bridge receives BPDU on its designated port that contains information that is less attractive
(lower priority values and/or higher path costs), it forwards its own information to other LANs to
which it is connected for consideration.
STP evaluates BPDU parameter values to select the best BPDU based on the following order of
precedence:
1 The lowest root bridge ID (lowest priority value, then lowest MAC address).
3 If root path costs are equal, the bridge ID of the bridge sending the BPDU.
4 If the previous three values tie, then the port ID (lowest priority value, then lowest port number).
When a topology change occurs, such as when a link goes down or a switch is added to the network, the
affected bridge sends Topology Change Notification (TCN) BPDU to the designated bridge for its LAN.
The designated bridge then forwards the TCN to the root bridge. The root then sends out a Configuration
BPDU and sets a Topology Change (TC) flag within the BPDU to notify other bridges that there is a
change in the configuration information. Once this change is propagated throughout the Spanning Tree
network, the root stops sending BPDU with the TC flag set and the Spanning Tree returns to an active,
stable topology.
Note. You can restrict the propagation of TCNs on a port. To restrict TCN propagation on a port, see
“Configuring STP Port Parameters” on page 6-34.
Loop-guard on OmniSwitch
STP relies on continuous reception or transmission of BPDUs based on the port role. The designated port
or primary port transmits BPDUs, and the non-designated ports receive BPDUs. When one of the non-
designated ports in a spanning tree network stop receiving BPDUs, then the STP conceives that the
network is loop free. However, when a non-designated (Alternate, Root, or Backup) port becomes desig-
nated and moves to a forwarding state, a loop is created in the network.
With Loop Guard, if a switch stops receiving BPDUs on a non-designated port, the switch places the port
into the STP loop-inconsistent blocking state thus preventing the occurrence of loop in the network.
Loop-guard can be configured on individual ports on per-port or per-VLAN basis. A port can have both
roles:
• Designated
• Non-designated for mutually exclusive set of VLANs or MSTP-instances (in MSTP mode)
If loop-guard is enabled on the port, it does not affect the forward or blocking state for a designated port.
In case of BPDU timeout, if a loop-guard enabled port fails to receive three consecutive BPDUs, STP
converts the port explicitly to a blocked port.
When loop-guard is enabled, if a switch stops receiving BPDUs on a non-designated port, the switch
places the port into the STP loop-inconsistent blocking state.
By default, loop-guard is disabled on all the switch ports. User can configure loop-guard on any port
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-9
Spanning Tree Overview Configuring Spanning Tree Parameters
irrespective of its STP state or role. However, the feature functions only on non-designated (Alternate,
Root, or Backup) STP ports.
Note.
• In the flat mode, as there is a single STP instance on all the VLANs, the loop-guard state of the ports is
same across all the VLANs on the switch.
• In MSTP mode, there is a single STP instance for each MSTI instance. In this case, loop-guard state of
port is same across all the VLANs of a given MSTP instance. Hence if a loop-guard error occurs on
any single port, it affects all the other ports related to the MSTI.
• In 1X1 mode, there is a single STP instance assigned for each VLAN. Hence if a loop-guard error
occurs on any single VLAN, it does not affect the other VLANs.
page 6-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Spanning Tree Overview
Topology Examples
The following diagram shows an example of a physical network topology that incorporates data path
redundancy to ensure fault tolerance. These redundant paths, however, create loops in the network
configuration. If a device connected to Switch A sends broadcast packets, Switch A floods the packets out
all of its active ports. The switches connected to Switch A in turn floods the broadcast packets out their
active ports, and Switch A eventually receives the same packets back and the cycle starts over again. This
causes severe congestion on the network, often referred to as a broadcast storm.
Switch D Switch C
Switch A
Switch B
The Spanning Tree Algorithm prevents network loops by ensuring that there is always only one active link
between any two switches. This is done by transitioning one of the redundant links into a blocking state,
leaving only one link actively forwarding traffic. If the active link goes down, then the Spanning Tree
transitions one of the blocked links to the forwarding state to take over for the downed link. If a new
switch is added to the network, the Spanning Tree topology is automatically recalculated to include the
monitoring of links to the new switch.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-11
Spanning Tree Overview Configuring Spanning Tree Parameters
The following diagram shows the logical connectivity of the same physical topology as determined by the
Spanning Tree Algorithm:
Switch D Switch C
(Root Bridge)
2/1/3 PC=4 3/1/8
Bridge ID
10, [Link]
2/1/2 PC=19 3/1/9 Bridge ID
2/1/1 13, [Link]
3/1/10
PC=19 PC=100
2/1/10 3/1/2
Bridge ID
11, [Link] PC=19
2/1/9 3/1/1
Bridge ID
12, [Link]
Switch A
(Designated Bridge) Switch B
In the above active Spanning Tree topology example, the following configuration decisions were made as
a result of calculations performed by the Spanning Tree Algorithm:
• Switch D is the root bridge because its bridge ID has a priority value of 10 (the lower the priority value,
the higher the priority the bridge has in the Spanning Tree). If all four switches had the same priority,
then the switch with the lowest MAC address in its bridge ID would become the root.
• Switch A is the designated bridge for Switch B, because it provides the best path for Switch B to the
root bridge.
• Port 2/1/9 on Switch A is a designated port, because it connects the LAN from Switch B to Switch A.
• All ports on Switch D are designated ports, because Switch D is the root and each port connects to a
LAN.
• Ports 2/1/10, 3/1/1, and 3/1/8 are the root ports for Switches A, B, and C, respectively, because they
offer the shortest path towards the root bridge.
• The port 3/1/9 connection on Switch C to port 2/1/2 on Switch D is in a discarding (blocking) state, as
the connection these ports provides is redundant (backup) and has a higher path cost value than the 2/1/
3 to 3/1/8 connection between the same two switches. As a result, a network loop is avoided.
• The port 3/1/2 connection on Switch B to port 3/1/10 on Switch C is also in a discarding (blocking)
state, as the connection these ports provides has a higher path cost to root Switch D than the path
between Switch B and Switch A. As a result, a network loop is avoided.
page 6-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters MST General Overview
• “What is the Common and Internal Spanning Tree Instance” on page 6-18.
Note. Although MSTP provides the ability to define MSTIs while running in the flat mode, port state and
role computations are automatically calculated by the CST algorithm across all MSTIs. However, it is
possible to configure the priority and/or path cost of a port for a particular MSTI so that a port remains in a
forwarding state for an MSTI instance, even if it is blocked as a result of automatic CST computations for
other instances.
The following diagrams help to further explain how MSTP works by comparing how port states are
determined on per-VLAN STP/RSTP mode, flat mode STP/RSTP, and flat mode MSTP switches.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-13
MST General Overview Configuring Spanning Tree Parameters
3/1/1 2/1/1
VLAN 100 VLAN 100
4/1/2 5/1/1
VLAN 200 VLAN 200
|| 5/1/2
4/1/8
• VLAN 100 and VLAN 200 are each associated with their own Spanning Tree instance.
• The connection between 3/1/1 and 2/1/1 is left in a forwarding state because it is part of the VLAN 100
Spanning Tree instance and is the only connection for that instance.
Note. If additional switches containing a VLAN 100 are connected to the switches in this diagram, then the
3/1/1 to 2/1/1 port connection gets into blocking state. The port connection is converted to blocking state,
only if the VLAN 100 Spanning Tree instance determines it is required, to avoid a network loop.
• The connections between 4/1/8 and 5/1/2 and 5/1/2 and 5/1/1 are seen as redundant because they are
both controlled by the VLAN 200 Spanning Tree instance and connect to the same switches. The
VLAN 200 Spanning Tree instance determines which connection provides the best data path and
transitions the other connection to a blocking state.
3/1/1 2/1/1
VLAN 100 VLAN 100
4/1/2 5/1/1
||
VLAN 200 VLAN 200
|| 5/1/2
4/1/8
page 6-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters MST General Overview
3/1/1 2/1/1
VLAN 100 VLAN 100
CIST-0 CIST-0
4/1/2 5/1/1
VLAN 150 || VLAN 150
4/1/8 5/1/2
VLAN 200 || VLAN 200
MSTI-2 MSTI-2
2/1/12 3/1/6
VLAN 250 || VLAN 250
• VLANs 100 and 150 are not associated with an MSTI. They are controlled by the default CIST
instance 0 that exists on every switch.
• VLANs 200 and 250 are associated with MSTI 2 so their traffic can traverse a path different from that
determined by the CIST.
• Ports are blocked the same way they were blocked in the flat mode STP/RSTP example; all port
connections are compared to each other across VLANs to determine which connection provides the
best path.
However, because VLANs 200 and 250 are associated to MSTI 2, it is possible to change the port path
cost for ports 2/1/12, 3/1/6, 4/1/8 and/or 5/1/2 so that they provide the best path for MSTI 2 VLANs,
but do not carry CIST VLAN traffic or cause CIST ports to transition to a blocking state.
Another alternative is to assign all VLANs to an MSTI, leaving no VLANs controlled by the CIST. As
a result, the CIST BPDU contains only MSTI information.
See “Sample MSTI Configuration” on page 6-49 for more information about how to direct VLAN traffic
over separate data paths using MSTP.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-15
MST General Overview Configuring Spanning Tree Parameters
Using MSTP has the following items in common with STP (802.1D) and RSTP (802.1w) protocols:
• Each protocol ensures one data path between any two switches within the network topology. This
prevents network loops from occurring while at the same time allowing for redundant path
configuration.
• Each protocol provides automatic reconfiguration of the network Spanning Tree topology in the event
of a connection failure and/or when a switch is added to or removed from the network.
• All three protocols are supported in the flat Spanning Tree operating mode.
• The flat mode CST instance automatically determines port states and roles across VLAN port and
MSTI associations. This is because the CST instance is active on all ports and only one BPDU is used
to forward information for all MSTIs.
• MSTP is based on RSTP.
page 6-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters MST General Overview
• VLAN to MSTI table – Generated when VLANs are associated with MSTIs. Identifies the VLAN to
MSTI mapping for the switch.
Switches that share the same values for the configuration attributes described above belong to the same
region. For example, in the diagram below:
• Switches A, B, and C all belong to the same region because they all are configured with the same
region name, revision level, and have the same VLANs mapped to the same MSTI.
• The CST for the entire network sees Switches A, B, and C as one virtual bridge that is running a single
Spanning Tree instance. As a result, CST blocks the path between Switch C and Switch E instead of
blocking a path between the MST region switches to avoid a network loop.
• The paths between Switch A and Switch C and the redundant path between Switch B and Switch C
were blocked as a result of the Internal Spanning Tree (IST) computations for the MST Region. See
“What is the Internal Spanning Tree (IST) Instance” on page 6-18 for more information.
Switch A Switch D
|| CST
IST
||
||
In addition to the attributes described above, the MST maximum hops parameter defines the number of
bridges authorized to propagate MST BPDU information. In essence, this value defines the size of the
region in that once the maximum number of hops is reached, the BPDU is discarded.
The maximum number of hops for the region is not one of the attributes that defines membership in the
region. See “Sample MST Region Configuration” on page 6-47 for a tutorial on how to configure MST
region parameters.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-17
MST General Overview Configuring Spanning Tree Parameters
Note. When MSTP is the active flat mode protocol, explicit Spanning Tree bridge commands are required
to configure parameter values. Implicit commands are for configuring parameters when the STP or RSTP
protocols are in use. See “Using Spanning Tree Configuration Commands” on page 6-26 for more
information.
page 6-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters MST General Overview
• Map VLANs to MSTI – All existing VLANs are mapped to the default CIST instance 0.
Associating a VLAN to an MSTI specifies which Spanning Tree instance determines the best data path
for traffic carried on the VLAN. In addition, the VLAN-to-MSTI mapping is also one of three MST
configuration attributes used to determine that the switch belongs to a particular MST region.
For a tutorial on setting up an example MST configuration, see “Sample MST Region Configuration” on
page 6-47 and “Sample MSTI Configuration” on page 6-49.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-19
MST General Overview Configuring Spanning Tree Parameters
• STP and RSTP use a 16-bit port path cost (PPC) and MSTP uses a 32-bit PPC. When the protocol is
changed to MSTP, the bridge priority and PPC values for the flat mode CIST instance are reset to their
default values.
• It is possible to configure the switch to use 32-bit PPC value for all protocols (see the spantree path-
cost-mode command page for more information). If this is the case, then the PPC for the CIST is not
reset when the protocol is changed to/from MSTP.
• This implementation of MSTP is compliant with the IEEE 802.1Q 2005 standard and thus provides
interconnectivity with MSTP compliant systems.
page 6-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Spanning Tree Operating Modes
The following diagram shows a flat mode switch with STP (802.1D) as the active protocol. All ports,
regardless of their default VLAN configuration or tagged VLAN assignments, are considered part of one
Spanning Tree instance. To see an example of a flat mode switch with MSTP (802.1s) as the active
protocol, see Chapter 6, “Configuring Spanning Tree Parameters.”
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-21
Spanning Tree Operating Modes Configuring Spanning Tree Parameters
Flat STP
In the above example, if port 8/1/3 connects to another switch and port 8/1/5 connects to that same switch,
the Spanning Tree Algorithm would detect a redundant path and transition one of the ports into a blocking
state. The same holds true for the tagged ports.
page 6-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Spanning Tree Operating Modes
The following diagram shows a switch running in the per-VLAN Spanning Tree mode and shows Span-
ning Tree participation for both fixed and tagged ports.
STP 2 STP 3
STP 4
Switch
Port 1/1/3 Port 1/1/5
Default VLAN 5 Default VLAN 10
VLAN 2 (tagged)
Port 2/1/5
Port 2/1/3
Default VLAN 2
Default VLAN 5
VLAN 10 (tagged)
In the above example, STP2 is a single Spanning Tree instance since VLAN 5 contains only fixed ports.
STP 3 and STP 4 are a combination of single and 802.1Q Spanning Tree instances because VLAN 2
contains both fixed and tagged ports. On ports where VLAN 2 is the default VLAN, BPDU are not tagged.
on ports where VLAN 2 is a tagged VLAN, BPDU are also tagged.
Note. In the flat Spanning Tree mode, both the OmniSwitch and Cisco switches can interoperate seamlessly
using the standard MSTP protocol.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-23
Spanning Tree Operating Modes Configuring Spanning Tree Parameters
Configuration Overview
The spantree pvst+compatibility command is used to enable or disable the PVST+ interoperability mode
globally for all switch ports and link aggregates or on a per-port/link aggregate basis. By default, PVST+
compatibility is disabled.
To globally enable or disable PVST+ interoperability, enter the following commands:
-> spantree pvst+compatibility enable
-> spantree pvst+compatibility disable
To enable or disable PVST+ interoperability for a specific port or link aggregate, use the spantree
pvst+compatibility command with the port or linkagg parameter. For example:
-> spantree pvst+compatibility port 1/1/3 enable
-> spantree pvst+compatibility port 2/1/24 disable
-> spantree pvst+compatibility linkagg 3 enable
-> spantree pvst+compatibility linkagg 10 disable
page 6-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Spanning Tree Operating Modes
• Send and receive tagged PVST+ BPDUs for other tagged VLANs.
• Send and receive untagged PVST+ BPDUs for the port's default VLAN
• Send and receive tagged PVST+ BPDUs for other tagged VLANs
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-25
Using Spanning Tree Configuration Commands Configuring Spanning Tree Parameters
Switches. For more information on path cost mode, refer “Configuring the Path Cost Mode” on
page 6-32.
• Dynamic aggregate link (LACP) functions properly between OmniSwitch and Cisco switches. The
Cisco switches send the BPDUs only on one physical link of the aggregate, similar to the OmniSwitch
Primary port functionality. The path cost assigned to the aggregate link is not the same between
OmniSwitch and Cisco switches since vendor-specific formulas are used to derive the path cost.
Manual configuration is recommended to match the Cisco path cost assignment for an aggregate link.
For more information on the configuration of path cost for aggregate links, refer “Path Cost for Link
Aggregate Ports” on page 6-38.
The table below shows the default Spanning Tree values.
These commands (referred to as explicit commands) allow the configuration of a particular Spanning Tree
instance independent of which mode and/or protocol is currently active on the switch. The configuration,
however, does not go active until the switch is changed to the appropriate mode. For example, if the switch
is running in the per-VLAN mode, the following explicit command changes the MSTI 3 priority to 12288:
-> spantree msti 3 priority 12288
page 6-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Configuring STP Bridge Parameters
Even though the above command is accepted in the per-VLAN mode, the new priority value does not take
effect until the switch mode is changed to flat mode.
Note. When a snapshot is taken of the switch configuration, the explicit form of all Spanning Tree
commands is captured. For example, if the priority of MSTI 2 was changed from the default value to a
priority of 16384, then spantree msti 2 priority 16384 is the command captured to reflect this in the
snapshot file. In addition, explicit commands are captured for both flat and per-VLAN mode
configurations.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-27
Configuring STP Bridge Parameters Configuring Spanning Tree Parameters
The following sections provide information and procedures for using the bridge configuration commands
and also includes command examples.
Note. When configuring the protocol value for a VLAN instance, MSTP is not an available option. This
protocol is only supported on the flat mode instance.
To configure the protocol for the flat mode CIST instance, use either the spantree protocol command or
the spantree protocol command with the cist parameter. Note that both commands are available when the
switch is running in either mode (per-VLAN or flat). For example, the following commands configure the
protocol for the flat mode instance to MSTP:
-> spantree cist protocol mstp
-> spantree protocol mstp
Note. Configuring a Spanning Tree bridge instance with a priority value that causes the instance to become
the root is recommended, instead of relying on the comparison of switch base MAC addresses to determine
the root.
If the switch is running in the per-VLAN Spanning Tree mode, then a priority value is assigned to each
VLAN instance. If the switch is running in the flat Spanning Tree mode, the priority is assigned to the flat
page 6-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Configuring STP Bridge Parameters
mode instance or a Multiple Spanning Tree Instance (MSTI). In both cases, the default priority value is
assigned. Note that priority value for an MSTI must be a multiple of 4096.
To change the bridge priority value for a VLAN instance regardless of which mode (per-VLAN or flat) is
active for the switch, use the spantree priority command with the vlan parameter. For example, the
following command changes the priority for VLAN 455 to 25590:
-> spantree vlan 455 priority 25590
Note. If PVST+ mode is enabled on the switch, then the priority values can be assigned only in the
multiples of 4096 to be compatible with the Cisco MAC Reduction mode; any other values result in an
error message.
To change the bridge priority value for the flat mode CIST instance, use either the spantree priority
command or the spantree priority command with the cist parameter. Note that both commands are
available when the switch is running in either mode (per-VLAN or flat). For example, the following
commands change the bridge priority value for the flat mode instance to 12288:
-> spantree cist priority 12288
-> spantree priority 12288
The bridge priority value is also configurable for a Multiple Spanning Tree Instance (MSTI). To configure
this value for an MSTI, use the spantree priority command with the msti parameter and specify a priority
value that is a multiple of 4096. For example, the following command configures the priority value for
MSTI 10 to 61440:
-> spantree msti 10 priority 61440
Note. Lowering the hello time interval improves the robustness of the Spanning Tree algorithm. Increasing
the hello time interval lowers the overhead of Spanning Tree processing.
If the switch is running in the per-VLAN Spanning Tree mode, then a hello time value is defined for each
VLAN instance. If the switch is running in the flat Spanning Tree mode, then a hello time value is defined
for the single flat mode instance. In both cases, the default hello time value is used.
To change the bridge hello time value for a VLAN instance regardless of which mode (per-VLAN or flat)
is active for the switch, use the spantree hello-time command with the vlan parameter. For example, the
following command changes the hello time for VLAN 455 to 5 seconds:
-> spantree vlan 455 hello-time 5
To change the bridge hello time value for the flat mode CIST instance, use either the spantree hello-time
command or the spantree hello-time command with the cist parameter. Note that both commands are
available when the switch is running in either mode (per-VLAN or flat). For example, the following
commands change the hello time value for the flat mode instance to 10:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-29
Configuring STP Bridge Parameters Configuring Spanning Tree Parameters
Note that the bridge hello time is not configurable for Multiple Spanning Tree Instances (MSTI). These
instances inherit the hello time from the flat mode instance (CIST).
Note. Configuring a low max-age time can cause the Spanning Tree to reconfigure the topology more
often.
To change the bridge max-age time value for a VLAN instance regardless of which mode (per-VLAN or
flat) is active for the switch, use the spantree max-age command with the vlan parameter. For example,
the following command changes the max-age time for VLAN 455 to 10 seconds:
-> spantree vlan 455 max-age 10
To change the max-age time value for the flat mode CIST instance, use either the spantree max-age
command or the spantree max-age command with the cist parameter. Note that both commands are
available when the switch is running in either mode (per-VLAN or flat). For example, the following
commands change the max-age time value for the flat mode instance to 10:
-> spantree max-age 10
-> spantree cist max-age 10
Note. The max-age time is not configurable for Multiple Spanning Tree Instances (MSTI). These instances
inherit the max-age time from the flat mode instance (CIST).
page 6-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Configuring STP Bridge Parameters
If the switch is running in the per-VLAN Spanning Tree mode, then a forward delay time value is defined
for each VLAN instance. If the switch is running in the flat Spanning Tree mode, then the forward delay
time value is defined for the flat mode instance. In both cases, the default forward delay time is used.
Note. Specifying a low forward delay time can cause temporary network loops, because packets can get
forwarded before Spanning Tree configuration or change notices have reached all nodes in the network.
To change the bridge forward delay time value for a VLAN instance regardless of which mode (per-
VLAN or flat) is active for the switch, use the spantree forward-delay command with the vlan
parameter. For example, the following command changes the forward delay time for VLAN 455 to 10
seconds:
-> spantree vlan 455 forward-delay 10
To change the forward-delay time value for the flat mode CIST instance, use either the spantree forward-
delay command or the spantree forward-delay command with the cist parameter. Note that both
commands are available when the switch is running in either mode (per-VLAN or flat). For example, the
following commands change the forward-delay time value for the flat mode instance to 10:
-> spantree forward-delay 10
-> spantree cist forward-delay 10
Note. The forward delay time is not configurable for Multiple Spanning Tree Instances (MSTI). These
instances inherit the forward delay time from the flat mode instance (CIST).
To enable or disable the switching of Spanning Tree BPDU for only the CIST instance when the switch is
running in the flat mode, use the spantree bpdu-switching command:
-> spantree cist bpdu-switching enable
-> spantree cist bpdu-switching disable
To enable or disable BPDU switching on a VLAN, use the vlan parameter along with spantree bpdu-
switching [Link] example, the following commands enable BPDU switching on VLAN 10 and
disable it on VLAN 20:
-> spantree vlan 10 bpdu-switching enable
-> spantree vlan 20 bpdu-switching disable
Note. Disabling BPDU switching on a Spanning Tree disabled VLAN must not cause network loops to go
undetected.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-31
Configuring STP Bridge Parameters Configuring Spanning Tree Parameters
Note. Cisco supports two default path cost modes: long or short, similar to the OmniSwitch per-VLAN
implementation. If you have configured PVST+ mode in the OmniSwitch, it is recommended that the same
default path cost mode must be configured in the same way in all the switches, so that, the path costs for
similar interface types are consistent when connecting ports between OmniSwitch and Cisco Switches.
VLAN 1 VLAN 1
4/1/2 5/1/1
802.1q tag
MSTI-1 VLAN 2 VLAN 2 MSTI-1
In the above diagram, port 4/12 is the Root port and port 5/1/1 is a Designated port for MSTI 1. AVC is
not enabled. If another link with the same speed and lower port numbers is added to default VLAN 1 on
page 6-32 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Configuring STP Bridge Parameters
both switches, the new link becomes the root for MSTI 1 and the tagged link between VLAN 2 is blocked,
as shown below:
3/1/1 2/1/1
VLAN 1 VLAN 1
||
4/1/2 802.1q tag 5/1/1
MSTI-1 VLAN 2 VLAN 2 MSTI-1
If AVC was enabled in the above example, AVC would have assigned the new link an infinite path cost
value that would make this link undesirable as the root for MSTI 1.
Balancing VLANs across links according to their Multiple Spanning Tree Instance (MSTI) grouping is
highly recommended to ensure that there is not a loss of connectivity during any possible topology
changes. Enabling AVC on the switch is another way to prevent undesirable ports from becoming the root
for an MSTI.
To change the default status of the AVC on the switch and to globally enable this feature for all MSTIs,
use the spantree auto-vlan-containment command. Once AVC is globally enabled, then it is possible to
disable AVC for individual MSTIs using the same command. For example, the following commands glob-
ally enable AVC and then disable it for MSTI 10:
-> spantree auto-vlan-containment enable
-> spantree msti 10 auto-vlan-containment disable
Note. An administratively set port path cost takes precedence and prevents AVC configuration of the path
cost. The exception to this is if the port path cost is administratively set to zero, which resets the path cost to
the default value. In addition, AVC does not have any effect on root bridges.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-33
Configuring STP Port Parameters Configuring Spanning Tree Parameters
• Port state (forwarding or blocking) is dynamically determined by the Spanning Tree Algorithm, not
manually set.
The following is a summary of Spanning Tree port configuration commands. For more information about
these commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
page 6-34 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Configuring STP Port Parameters
The following sections provide information and procedures for using Spanning Tree port
configuration commands and also includes command examples.
To change the port Spanning Tree status for the flat mode instance, use the spantree cist command. Note
that this command is available when the switch is running in either mode (per-VLAN or flat). For exam-
ple, the following command disables the Spanning Tree status on port 1/1/24 for the flat mode instance:
-> spantree cist port 1/1/24 disable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-35
Configuring STP Port Parameters Configuring Spanning Tree Parameters
For more information about configuring an aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation,” and Chapter 10, “Configuring Dynamic Link Aggregation.”
Enabling/Disabling Loop-guard
By default, loop-guard is disabled on ports associated with VLANs that have Spanning Tree enabled. This
feature, when enabled prevents inconsistencies that cause network loops.
Use the spantree loop-guard command to enable or disable loop-guard on a port or link aggregate. For
example, the following commands enable and disable loop-guard on port 1/2 of chassis 1:
Note. Use the show spantree and related commands to view the loop-guard related information for per-
port, per-VLAN, CIST or MSTI instances.
page 6-36 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Configuring STP Port Parameters
To change the port priority value for the flat mode instance, use the spantree priority command with the
cist and port parameters. Note that this command is available when the switch is running in either per-
VLAN or flat mode. An instance number is not required. For example, the following command changes
the priority value for port 1/1/24 for the flat mode instance to 15:
-> spantree cist port 1/1/24 priority 15
The port priority value is also configurable for a Multiple Spanning Tree Instance (MSTI). To configure
this value for an MSTI, use the spantree priority command with the msti and port parameters. For exam-
ple, the following command configures the priority value for port 1/1/12 for MSTI 10 to 5:
-> spantree msti 10 port 1/1/12 priority 5
Note that configuring the port priority value for a MSTI is allowed in both modes (per-VLAN and flat)
only when the Spanning Tree protocol is set to MSTP.
For more information about configuring an aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation,” and Chapter 10, “Configuring Dynamic Link Aggregation.”
IEEE 802.1D
Link Speed
Recommended Value
10 MB 2,000,000
100 MB 200,000
1 GB 20,000
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-37
Configuring STP Port Parameters Configuring Spanning Tree Parameters
IEEE 802.1D
Link Speed
Recommended Value
10 Gbps 2,000
Is a 16-bit path cost value is in use and the path_cost is set to zero, the following IEEE 802.1D recom-
mended default path cost values based on link speed are used:
IEEE 802.1D
Link Speed
Recommended Value
4 Mbps 250
10 Mbps 100
16 Mbps 62
100 Mbps 19
1 Gbps 4
10 Gbps 2
Spanning Tree is automatically enabled on a port and the path cost is set to the default value. If the switch
is running in the per-VLAN Spanning Tree mode, then the port path cost applies to the specified VLAN
instance associated with the port. If the switch is running in the flat Spanning Tree mode, then the port
path cost applies across all VLANs associated with the port. The flat mode instance is specified as the port
instance, even if the port is associated with other VLANs.
The spantree vlan path-cost command configures the port path cost value for a VLAN instance when the
switch is running in either mode (per-VLAN or flat). For example, the following command configures a
16-bit path cost value for port 8/1/1 for VLAN 10 to 19 (the port speed is 100 MB, 19 is the recom-
mended value):
-> spantree vlan 10 port 8/1/1 path-cost 19
To change the port path cost value for the flat mode instance regardless of which mode (per-VLAN or flat)
is active for the switch, use the spantree cist path-cost command. For example, the following command
configures a 32-bit path cost value for port 1/1/24 for the flat mode instance to 20,000 (the port speed is 1
GB, 20,000 is the recommended value):
-> spantree cist port 1/1/24 path-cost 20000
The port path cost value is also configurable for a Multiple Spanning Tree Instance (MSTI). To configure
this value for an MSTI, use the spantree msti path-cost command and specify the MSTI ID for the
instance number. For example, the following command configures the path cost value for port 1/1/12 for
MSTI 10 to 19:
-> spantree msti 10 port 1/1/12 path-cost 19
Note that configuring the port path cost value for a MSTI is allowed in both modes (per-VLAN and flat)
only when the Spanning Tree protocol is set to MSTP.
page 6-38 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Configuring STP Port Parameters
If a 32-bit path cost value is in use and the path_cost for a link aggregate is set to zero, the following
default values based on link speed and link aggregate size are used:
If a 16-bit path cost value is in use and the path_cost for a link aggregate is set to zero, the following
default values based on link speed and link aggregate size are used. Note that for Gigabit ports the aggre-
gate size is not applicable in this case:
To change the path cost value for a link aggregate, use the spantree cist path cost, spantree msti path
cost, or spantree vlan path cost command with the linkagg parameter and a link aggregate control (ID)
number. For example, the following command sets the path cost for link aggregate 10 associated with
VLAN 755 to 19:
-> spantree vlan 755 linkagg 10 path-cost 19
For more information about configuring an aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation,” and Chapter 10, “Configuring Dynamic Link Aggregation.”
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-39
Configuring STP Port Parameters Configuring Spanning Tree Parameters
To change the port Spanning Tree mode for the flat mode instance, use the spantree cist mode command.
Note that the command is available when the switch is running in either mode (per-VLAN or flat) and an
instance number is not required. For example, the following command configures the Spanning Tree mode
on port 1/1/24 for the flat mode instance:
-> spantree cist port 1/1/24 mode blocking
For more information about configuring an aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation,” and Chapter 10, “Configuring Dynamic Link Aggregation.”
page 6-40 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Configuring STP Port Parameters
• Edge port (port is at the edge of a bridged LAN, does not receive BPDU and has only one MAC
address learned). Edge ports, however, will operationally revert to a point to point or a no point to
point connection type if a BPDU is received on the port.
A port is considered connected to a point-to-point LAN segment if the port belongs to a link aggregate of
ports, or if auto negotiation determines if the port must run in full duplex mode, or if full duplex mode was
administratively set. Otherwise, that port is considered connected to a no point-to-point LAN segment.
Rapid transition of a designated port to forwarding can only occur if the port connection type is defined as
a point to point or an edge port. Defining a port connection type as a point to point or as an edge port
makes the port eligible for rapid transition, regardless of what actually connects to the port. However, an
alternate port is always allowed to transition to the role of root port regardless of the alternate port connec-
tion type.
Note. Configure ports that will connect to a host (PC, workstation, server, etc.) as edge ports so that these
ports will transition directly to a forwarding state and not trigger an unwanted topology change when a
device is connected to the port. If a port is configured as a point to point or no point to point connection
type, the switch will assume a topology change when this port goes active and will flush and relearn all
learned MAC addresses for the port’s assigned VLAN.
If the switch is running in the per-VLAN Spanning Tree mode, then the connection type applies to the
specified VLAN instance associated with the port. If the switch is running in the flat Spanning Tree mode,
then the connection type applies across all VLANs associated with the port. The flat mode instance is
referenced as the port instance, even if the port is associated with other VLANs.
By default, Spanning Tree is automatically enabled on the port, the connection type is set to auto point-to-
point, and auto edge port detection is enabled. The auto point-to-point setting determines the connection
type based on the operational status of the port. The auto edge port setting determines the operational edge
port status for the port.
The spantree vlan connection and spantree cist connection commands are used to configure the port
connection type for a VLAN instance or the CIST instance. See “Configuring the Edge Port Status” on
page 6-42 for information about configuring the auto edge port status for a port.
To change the port connection type for a VLAN instance regardless of which mode (per-VLAN or flat) is
active for the switch, use the spantree vlan connection command. For example, the following command
defines the connection type for port 8/11 associated with VLAN 10.
-> spantree vlan 10 port 8/1/1 connection autoptp
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-41
Configuring STP Port Parameters Configuring Spanning Tree Parameters
To change the port Spanning Tree mode for the flat mode instance regardless of which mode (per-VLAN
or flat) is active for the switch, use the spantree cist connection command. For example, the following
command configures the connection type for port 1/24 for the flat mode instance:
-> spantree cist port 1/1/24 connection ptp
Note. The spantree vlan connection and spantree cist connection commands only configure one port at a
time.
For more information about configuring an aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation,” and Chapter 10, “Configuring Dynamic Link Aggregation.”
To configure the edge port status for a VLAN instance regardless of which mode (per-VLAN or flat) is
active for the switch, use the spantree vlan auto-edge command or the spantree vlan admin-edge
command. For example:
page 6-42 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Configuring STP Port Parameters
Note that the above commands also provide optional syntax; restricted-role or root-guard. For example,
the following two commands perform the same function:
-> spantree vlan port 2/1/1 restricted-role enable
-> spantree vlan port 2/1/1 root-guard enable
When root guard is enabled for a port, it cannot become the root port, even if it is the most likely
candidate for becoming the root port. However, this same port is designated as the alternate port when the
root port is selected.
Enabling the restricted role status is used by network administrators to prevent bridges external to the core
region of the network from influencing the Spanning Tree topology. However, note that enabling the
restricted role status for a port may impact connectivity within the network.
Enabling the restricted TCN status is used by network administrators to prevent bridges external to the
core region of the network from causing unnecessary MAC address flushing in that region. However, note
that enabling the restricted TCN status for a port may impact Spanning Tree connectivity.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-43
Sample Spanning Tree Configuration Configuring Spanning Tree Parameters
Switch D Switch C
(Root Bridge)
VLAN 255 Bridge ID 2/1/3 PC=4 3/1/8
10, [Link]
PC=4 PC=19
3/1/2
2/1/10
2/1/8 PC=4 3/1/3
VLAN 255 Bridge ID
32768, [Link]
2/1/9 PC=4 3/1/1
• Each switch configuration has a VLAN 255 defined. The Spanning Tree administrative status for this
VLAN was enabled by default when the VLAN was created.
• VLAN 255 on each switch is configured to use the 802.1w (rapid reconfiguration) Spanning Tree
Algorithm and Protocol.
• Ports 2/1/1-3, 2/1/8-10, 3/1/1-3, and 3/1/8-10 provide connections to other switches and are all assigned
to VLAN 255 on their respective switches. The Spanning Tree administrative status for each port is
enabled by default.
page 6-44 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Sample Spanning Tree Configuration
• The path cost for each port connection defaults to a value based on the link speed. For example, the
connection between Switch B and Switch C is a 100 Mbps link, which defaults to a path cost of 19.
• VLAN 255 on Switch D is configured with a Bridge ID priority value of 10, which is less than the
same value for VLAN 255 configured on the other switches. As a result, VLAN 255 was elected the
Spanning Tree root bridge for the VLAN 255 broadcast domain.
• A root port is identified for VLAN 255 on each switch, except the root VLAN 255 switch. The root
port identifies the port that provides the best path to the root VLAN.
• VLAN 255 on Switch A was elected the designated bridge because it offers the best path cost for
Switch B to the root VLAN 255 on Switch D.
• Port 1/2/9 on Switch A is the designated port for the Switch A to Switch B connection because Switch
A is the designated bridge for Switch B.
• Redundant connections exist between Switch D and Switch C. Ports 2/1/2 and 3/1/9 are in a discarding
(blocking) state because this connection has a higher path cost than the connection provided through
ports 2/1/3 and 3/1/8. As a result, a network loop condition is avoided.
• Redundant connections also exist between Switch A and Switch B. Although the path cost value for
both of these connections is the same, ports 2/1/8 and 3/1/3 are in a discarding state because their port
priority values (not shown) are higher than the same values for ports 2/1/10 and 3/1/1.
• The ports that provide the connection between Switch B and Switch C are in a discarding (blocking)
state, because this connection has a higher path cost than the other connections leading to the root
VLAN 255 on Switch D. As a result, a network loop is avoided.
2 Assign the switch ports that provide connections between each switch to VLAN 255. For example, the
following commands entered on Switches A, B, C, and D, respectively, assign the ports shown in the
example network diagram on page 6-44 to VLAN 255:
3 Change the Spanning Tree protocol for VLAN 255 to RSTP (Rapid Spanning Tree Protocol) on each
switch using the following command:
-> spantree vlan 255 protocol rstp
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-45
Sample Spanning Tree Configuration Configuring Spanning Tree Parameters
4 Change the bridge priority value for VLAN 255 on Switch D to 10 using the following command
(leave the priority for VLAN 255 on the other three switches set to the default value):
-> spantree vlan 255 priority 10
VLAN 255 on Switch D has the lowest Bridge ID priority value of all four switches, which qualifies it as
the Spanning Tree root VLAN for the VLAN 255 broadcast domain.
Note. To verify the VLAN 255 Spanning Tree configuration on each switch use the following show
commands. The following outputs are for example purposes only and not match values shown in the sample
network configuration:
-> show spantree vlan 255
Spanning Tree Parameters for Vlan 255
Spanning Tree Status : ON,
Protocol : IEEE RAPID STP,
mode : per vlan (1 STP per Vlan),
Priority : 32768(0x0FA0),
Bridge ID : 8000-[Link],
Designated Root : 000A-[Link],
Cost to Root Bridge : 4,
Root Port : Slot 3 Interface 8,
Next Best Root Cost : 0,
Next Best Root Port : None,
Tx Hold Count : 6,
Topology Changes : 3,
Topology age : [Link]
Current Parameters (seconds)
Max Age = 30,
Forward Delay = 15,
Hello Time = 2
Parameters system uses when attempting to become root
System Max Age = 30,
System Forward Delay = 15,
System Hello Time = 2
page 6-46 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Sample MST Region Configuration
Note. An additional configurable MST region parameter defines the maximum number of hops authorized
for the region but is not considered when determining regional [Link] maximum hops value is
the value used by all bridges within the region when the bridge is acting as the root of the MST region.
This section provides a tutorial for defining a sample MST region configuration, as shown in the diagram
below:
Switch A Switch D
|| CST
IST
||
||
In order for switches A, B, and C in the above diagram to belong to the same MST region, they must all
share the same values for region name, revision level, and configuration digest (VLAN-to-MSTI
mapping).
The following steps are performed on each switch to define Alcatel-Lucent Marketing as the MST
region name, 2000 as the MST region revision level, map exiting VLANs to existing MSTIs, and 3 as the
maximum hops value for the region:
1 Configure an MST Region name using the spantree mst region name command. For example:
2 Configure the MST Region revision level using the spantree mst region revision-level command. For
example:
-> spantree mst region revision-level 2000
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-47
Sample MST Region Configuration Configuring Spanning Tree Parameters
3 Map VLANs 100 and 200 to MSTI 2 and VLANs 300 and 400 to MSTI 4 using the spantree msti
vlan command to define the configuration digest. For example:
-> spantree msti 2 vlan 100 200
-> spantree msti 4 vlan 300 400
See the “Sample MSTI Configuration” on page 6-49 for a tutorial on how to create and map MSTIs to
VLANs.
4 Configure 3 as the maximum number of hops for the region using the spantree mst region max-hops
command. For example:
-> spantree mst region max-hops 3
Note. (Optional) Verify the MST region configuration on each switch with the show spantree mst
command. For example:
-> show spantree mst region
All switches configured with the exact same values as shown in the above example are considered members
of the Alcatel-Lucent Marketing MST region.
page 6-48 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Sample MSTI Configuration
3/1/1 2/1/1
VLAN 100 VLAN 100
CIST-0 CIST-0
4/1/2 5/1/1
VLAN 150 || VLAN 150
4/1/8 5/1/2
VLAN 200 || VLAN 200
MSTI-1 MSTI-1
2/1/12 3/1/6
VLAN 250 || VLAN 250
Switch A Switch B
Flat Mode MSTP Quick Steps Example
1 Change the Spanning Tree operating mode, if necessary, on Switch A and Switch B from per-VLAN to
flat mode using the spantree mode command. For example:
-> spantree mode flat
Note that defining an MSTP configuration requires the use of explicit Spanning Tree commands,
which are available in both the flat and per-VLAN mode. As a result, this step is optional. See “Using
Spanning Tree Configuration Commands” on page 6-26 for more information.
2 Change the Spanning Tree protocol to MSTP using the spantree protocol command. For example:
3 Create VLANs 100, 200, 300, and 400 using the vlan command. For example:
4 Assign switch ports to VLANs, as shown in the above diagram, using the vlan members untagged
command. For example, the following commands assign ports 3/1/1, 4/1/2, 4/1/8, and 2/1/12 to VLANs
100, 150, 200, and 250 on Switch A:
-> vlan 100 members port 3/1/1 untagged
-> vlan 150 members port 4/1/2 untagged
-> vlan 200 members port 4/1/8 untagged
-> vlan 250 members port 2/1/12 untagged
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-49
Sample MSTI Configuration Configuring Spanning Tree Parameters
The following commands assign ports 2/1/1, 5/1/1, 5/1/2, and 3/1/6 to VLANs 100, 150, 200, and 250
on Switch B:
5 Create one MSTI using the spantree msti command. For example:
All VLANs are associated with the CIST instance. As a result, VLANs 100 and 150 do not require any
configuration to map them to the CIST instance.
7 Configure the port path cost (PPC) for all ports on both switches associated with MSTI 1 to a PPC
value that is lower than the PPC value for the ports associated with the CIST instance using the spantree
msti path-cost command. For example, the PPC for ports associated with the CIST instance is set to the
default of 200,000 for 100 MB connections. The following commands change the PPC value for ports
associated with the MSTI 1 to 20,000:
Note. In this example, port connections between VLANs 150, 200, and 250 are blocked on each switch
initially, as shown in the diagram on page 6-49. This is because in flat mode MSTP, each instance is active
on all ports resulting in a comparison of connections independent of VLAN and MSTI associations.
To avoid this and allow VLAN traffic to flow over separate data paths based on MSTI association, Step 7 of
this tutorial configures a superior port path cost value for ports associated with MSTI 1. As a result, MSTI
1 selects one of the data paths between its VLANs as the best path, rather than the CIST data paths, as
shown in the diagram on page 6-51.
page 6-50 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Spanning Tree Parameters Sample MSTI Configuration
3/1/1 2/1/1
VLAN 100 VLAN 100
CIST-0 CIST-0
4/1/2 5/1/1
VLAN 150 || VLAN 150
4/1/8 5/1/2
VLAN 200 VLAN 200
MSTI-1 MSTI-1
2/1/12 3/1/6
VLAN 250 || VLAN 250
Switch A Switch B
Note. Of the two data paths available to MSTI 1 VLANs, one is blocked because it is considered redundant
for that instance. In addition, the CIST data path remains available for CIST VLAN traffic.
Another solution to this scenario is to assign all VLANs to an MSTI, leaving no VLANs controlled by the
CIST. As a result, the CIST BPDU contains only MSTI information. See “How MSTP Works” on
page 6-13 for more information.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 6-51
Verifying the Spanning Tree Configuration Configuring Spanning Tree Parameters
show spantree cist Displays the Spanning Tree bridge configuration for the flat mode
Common and Internal Spanning Tree (CIST) instance.
show spantree msti Displays Spanning Tree bridge information for a Multiple Spanning
Tree Instance (MSTI).
show spantree vlan Displays the Spanning Tree bridge information for a VLAN instance.
show spantree cist ports Displays Spanning Tree port information for the flat mode Common and
Internal Spanning Tree (CIST) instance.
show spantree msti ports Displays Spanning Tree port information for a flat mode Multiple
Spanning Tree Instance (MSTI).
show spantree vlan ports Displays Spanning Tree port information for a VLAN instance.
show spantree mst Displays the Multiple Spanning Tree (MST) information for a MST
region or the specified port or link aggregate on the switch.
show spantree cist vlan-map Displays the range of VLANs associated with the flat mode Common
and Internal Spanning Tree (CIST) instance.
show spantree msti vlan-map Displays the range of VLANs associated with the specified Multiple
Spanning Tree Instance (MSTI).
show spantree map-msti Displays the Multiple Spanning Tree Instance (MSTI) that is associated
to the specified VLAN.
show spantree mode Displays the current global Spanning Tree mode parameter values for
the switch, such as the current running mode (per-VLAN or flat) for the
switch
For more information about the resulting displays from these commands, see the OmniSwitch AOS Release
8 CLI Reference Guide. An example of the output for the show spantree vlan and show spantree vlan
ports commands is also given in “Example Network Configuration Steps” on page 6-45.
page 6-52 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
7 Configuring Shortest
Path Bridging
The Alcatel-Lucent OmniSwitch supports Shortest Path Bridging MAC (SPB-M), as defined in the IEEE
802.1aq standard. SPB-M uses the Provider Backbone Bridge (PBB) network model to encapsulate (using
IEEE 802.1ah headers) and tunnel customer traffic through the network backbone. The shortest path trees
upon which the PBB network infrastructure operates are determined using a version of the Intermediate
System-to-Intermediate System (IS-IS) link state protocol that supports TLV extensions for SPB (ISIS-
SPB).
Incorporating SPB-M into the network infrastructure provides the following benefits:
• Transparently extends Layer 2 connections (VLAN segments) across a large virtual service Layer 2
backbone network.
• Maintains a loop-free network while providing efficient use of available bandwidth, especially in a
mesh topology. All connections between all switches in the topology remain active (no blocking of
redundant links).
• A shortest path is automatically calculated between each bridge and every other bridge in the data
center mesh, resulting in low latency and sub-second convergence times needed to support critical
network bridging requirements.
• Can process a large number of customer MAC addresses without overrunning provider network
resources. Customer MAC addresses are only learned on Backbone Edge Bridges (BEB), where
customer traffic is then encapsulated and tunneled through the network core infrastructure. Backbone
Core Bridges (BCB) do not have to learn any customer MAC addresses.
• Provides a clear separation of customer traffic (between different customers and between the provider
network domain). Entry points for customer traffic are clearly defined on the participating BEBs.
Customer traffic is identified and associated with a specific service instance bound to the PBB
infrastructure.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-1
In This Chapter Configuring Shortest Path Bridging
In This Chapter
This chapter provides an overview about how Shortest Path Bridging MAC (SPB-M) works and how to
configure SPB-M through the Command Line Interface (CLI). CLI commands are used in the
configuration examples; for more details about the syntax of commands, see the OmniSwitch AOS Release
8 CLI Reference Guide.
This chapter includes the following topics:
• “Shortest Path Bridging Specifications” on page 7-3.
page 7-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Shortest Path Bridging Specifications
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-3
SPB-M Parameter Defaults Configuring Shortest Path Bridging
page 7-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging SPB-M Service Defaults
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-5
Shortest Path Bridging Overview Configuring Shortest Path Bridging
page 7-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Shortest Path Bridging Overview
In this network,
• The BEBs are SPB-M capable (ISIS-SPB configured and enabled) and form a shortest path bridging
network that also includes the SPB-M capable Backbone Core Bridges (BCBs).
• Each bridge calculates a shortest path tree (SPT) for each BVLAN with itself as the root of each tree.
• SPB Ethernet service instances identified by I-SIDs are created on each BEB. Each I-SID is associated
with a BVLAN ID. The BVLAN is configured on each bridge (BEB and BCB) in the backbone
network. However, the I-SID itself and the I-SID association with the BVLAN is only configured on
each BEB that will service customer traffic.
• A Service Access Point (SAP) is configured on each BEB to identify the access port on which
customer traffic will enter the PBBN, the SPB service instance that will tunnel the traffic through the
network, and the type of customer traffic to forward (for example, only specific CVLAN IDs, untagged
traffic only, or all tagged traffic). Basically, the SAP binds access ports and the specified customer
traffic received on those ports to the service.
• Layer 2 traffic from the connected edge networks enters the BEBs through access ports. The SAP
configuration on the receiving access port is applied to classify which frames are mapped to which
services, if any.
• Classified traffic is then encapsulated into 802.1ah frames by the BEB before the frames are
transmitted through the backbone network.
• The 802.1ah encapsulated frames are forwarded on the shortest path through the entire PBBN to reach
the intended destination BEB. The BCBs switch traffic based on the destination backbone MAC
address (BMAC)—bridge MAC address of the BEB—provided in the 802.1ah header and do not
process any I-SID information in the frame.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-7
Shortest Path Bridging Overview Configuring Shortest Path Bridging
Spanning Tree
The following diagram shows an example Provider Backbone Bridge (PBB) network with a single
backbone VLAN using the Spanning Tree protocol for network loop protection with the same path cost on
all links:
Bridge B
MAC: B, priority: 2
ROOT
Bridge A Bridge C
MAC: A, priority: 1 MAC: C, priority: 3
Bridge D
MAC: D, priority: 4
In this example, Bridge A is the Root bridge. As a result, customer traffic entering Bridge A would always
use the shortest path to reach every other bridge in the network. However, traffic entering Bridge D that is
destined for Bridge C must traverse the path through Bridge A to reach Bridge C, even though Bridge D is
directly connected to Bridge C. Clearly the path from Bridge D to Bridge C is not the shortest path in this
case.
page 7-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Shortest Path Bridging Overview
ISIS-SPB
The IEEE 802.1aq standard for SPB specifies the use of the IS-IS link state protocol instead of Spanning
Tree to form sets of shortest path trees through the network. When SPB is used, each bridge is the Root for
all traffic entering that bridge. As a result, each bridge can provide the shortest path to every other bridge
in the network.
The bridging methodology needed to allow each bridge to serve as its own root bridge is enforced through
the use of SPB BVLANs. This type of VLAN does not learn customer MAC addresses or flood unknown
unicast and multicast traffic. In addition, network loops are mitigated through strict ingress checks based
on the source MAC address of frames received on the BVLAN (frames received from an unexpected
source are discarded).
SPB-M uses an extended version of the IS-IS protocol that supports SPB (ISIS-SPB) to calculate the SPB-
M network topology. In addition, the learning and propagation of source MAC addresses is handled
through the ISIS-SPB control plane, instead of through the data plane.
When calculating the SPB-M network topology, ISIS-SPB must meet Layer 2 requirements to create
congruent and symmetric paths. To do this, SPB-M supports 16 predefined Equal Cost Tree (ECT)
algorithms to break ties when two or more equal cost paths to the same destination are discovered. The
same ECT algorithm is configured for the same BVLAN ID on each SPB switch in the network to ensure
congruent, symmetric paths for the service traffic bound to that BVLAN.
Basically, to create a unicast tree, SPB-M simply computes the shortest path from every bridge with each
bridge serving as the Root (as shown below) and populates the Layer 2 forwarding database (FDB) on the
SPB bridges with MAC addresses.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-9
Shortest Path Bridging Overview Configuring Shortest Path Bridging
Bridge B Bridge B
MAC: B, priority: 2 MAC: B, priority: 2
B, C
A, D C
A, B
Bridge D Bridge D
MAC: D, priority: 4 MAC: D, priority: 4
(3) (4)
page 7-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Shortest Path Bridging Overview
Bridge B
MAC: B, priority: 2
A,D C
B,C A,B
Bridge A D D Bridge C
MAC: A, priority: 1 MAC: C, priority: 3
A,B C
Bridge D
MAC: D, priority: 4
As shown in Figure 4, all the backbone MAC (BMAC) addresses are learned by the switches when ISIS-
SPB converges. The path taken by each unicast flow (for example ABC, CBA) are reverse path congruent
and travel the shortest path through the network.
In the ISIS-SPB topology (Figure 4), the link between Bridge D and Bridge C carries traffic, whereas in
the Spanning Tree topology (Figure 3), this link is blocked. Although these examples are based on traffic
distribution for a single BVLAN, the ability to make all links in the topology available at all times is
especially advantageous in highly redundant, meshed networks.
Although the link between Bridge D and Bridge C is used in the ISIS-SPB topology, traffic flow is
relatively low in comparison to the other links. To make better use of this link, a second BVLAN could be
created and assigned a different ECT algorithm to trigger ISIS-SPB calculations of a separate set of SPTs
for the second BVLAN. This is similar to creating a new Multiple Spanning Tree (MST) instance in a
Spanning Tree topology to create a different tree and assigning a new VLAN to that instance.
Each ECT algorithm uses a different calculation to break ties when paths between SPB bridges are equal
cost. Another method to influence the SPT calculation is to modify the bridge priority for the switch or
change the link cost metric for the SPB interface connection between two switches.
Multicast Traffic
SPB-M supports two methods for replicating and forwarding multicast traffic (or unknown destination
traffic) received from customer equipment: head-end replication and tandem replication.
• Head-end replication. Multicast traffic is replicated once for each receiver, encapsulated with the
BMAC address, and then sent as a unicast packet to each destination. This method is more suited for
networks where there is a low demand for multicast traffic.
• Tandem replication. Multicast traffic is replicated only where there is a fork in the SPT and each
branch has at least one receiver. Each multicast source bridge in the SPB-M network is the root for a
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-11
Shortest Path Bridging Overview Configuring Shortest Path Bridging
multicast distribution tree (MDT). A MDT is created per-source per-BVLAN and it is pruned
according to whether the SPB node is on the shortest path of a multicast transmitter and receiver. For
those MDTs that cross a given Backbone Edge Bridge (BCB), that BCB needs to generate a multicast
forwarding table for each such MDT.
Multicast traffic originating from a bridge is encapsulated with a special multicast BMAC DA that
identifies the source of the traffic and then forwarded on the tree. Participating bridges that receive the
packet will then know the source of the traffic and will use the multicast forwarding information for
that source to switch the packet to the appropriate destination.
SPB Services
The SPB-M network topology consists of two layers:
• The backbone infrastructure (control plane) layer. ISIS-SPB builds the backbone layer by defining
loop-free, shortest path trees (SPTs) through the backbone network (see “SPB-M Shortest Path Trees”
on page 7-8 for more information).
• The services (data plane) layer. The service layer is based on the Provider Backbone Bridging (PBB)
framework as defined in the IEEE 802.1ah standard. SPB-M supports the 802.1ah MAC-in-MAC
method for data encapsulation. SPB-M services transport the encapsulated traffic over the ISIS-SPB
infrastructure.
The SPB service layer framework is comprised of the following components:
• Backbone Edge Bridge (BEB). An OmniSwitch is considered a BEB if the switch is SPB capable and
at least one service access point (SAP) and one SPB interface is configured on the switch. The BEB
marks the boundary between the customer network and the PBB network (PBBN).
• Backbone Core Bridge (BCB). An OmniSwitch is considered a BCB if the switch is SPB capable and
no SAPs are configured but at least one SPB interface is configured on the switch to forward
encapsulated SPB-M network traffic. Note that the requirement for configuring a BCB is based on
whether or not the network topology includes a transit bridge.
• Service Instance Identifier (I-SID). Configured only on a BEB, this component identifies a backbone
service instance that will tunnel the encapsulated data traffic through the PBBN between BEBs. The I-
SID is bound to a BVLAN ID and a Service Manager SPB service ID when the service is created.
• Access Port. A port or link aggregate configured as an SPB access port. This type of port is configured
on the BEBs and defines the point at which traffic from other provider networks or directly from
customer networks enters the PBBN. The access port is also associated with a Layer 2 profile that
specifies how to process protocol control frames received on the port
• Service Access Point (SAP)—A SAP is a logical service entity (also referred to as a virtual port) that
is configured on a BEB to bind an access port to an SPB service ID and specify the type of customer
traffic ((untagged, single-tagged, double-tagged, or all) to encapsulate and tunnel through the PBBN.
• SPB Interface (Network Port)—A port or link aggregate configured as an SPB interface that resides
on either a BEB or a BCB and connects to the backbone network. Network ports carry customer traffic
encapsulated in 802.1ah frames and are associated with all BVLANs on the switch. Customer traffic
ingressing on a network port is switched to another network port (on BCBs) or to an access port (on
BEBs).
Once the ISIS-SPB infrastructure and the SPB service-based architecture is defined, the following service
components are dynamically created by the OmniSwitch. No user-configuration is required.
page 7-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Shortest Path Bridging Overview
• Service Distribution Point (SDP)—An SDP provides a logical point at which customer traffic is
directed from one BEB to another BEB. SDPs are used to set up distributed services, which consist of
at least one SAP on a local node, one SAP on a remote node, and an SDP binding the service on both
nodes.
• Mesh SDP—A mesh SDP represents the binding of an SPB service instance to an SDP. The SDP then
distributes the service connectivity to other BEBs through the ISIS-SPB shortest path trees.
BCB-5 BCB-6
Customer Frame Customer Frame Customer Frame Customer Frame Customer Frame
1. CVLAN tag = 10 I-SID = 500 I-SID = 500 I-SID = 500 5. BEB-2 has SAP with
Frame enters BEB-1 on matching I-SID 500 and
SAP 1/12:10, which is BVLAN = 4001 BVLAN = 4001 BVLAN = 4001 BVLAN 4001. BEB-2
associated with I-SID B-SA = BEB-1 B-SA = BEB-1 B-SA = BEB-1 strips 802.1ah header
500 and BVLAN 4001. from frame and forwards
B-DA = BEB-2 B-DA = BEB-2 B-DA = BEB-2 to destination.
2. BEB-1 encapsulates 3. BCB-1 switches frame 4. BCB-4 switches frame
frame with 802.1ah header based on the B-DA and based on the B-DA and
and forwards along the forwards along SPT to forwards along SPT to
SPT to BCB-1. BCB-4. BEB-2.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-13
Shortest Path Bridging Overview Configuring Shortest Path Bridging
configuration to the topology can provide an alternate service path for other traffic from the same
customer or traffic from a completely different customer.
• SPB BVLAN 4001 and 4002 are created and assigned to ECT ID 1 and 2, respectively, on every switch
(BEBs and BCBs) in the topology. These BVLANs serve as the transport entity on which ISIS-SPB
builds the shortest path trees and SPB services tunnel data.
• The switch ports connecting each SPB switch with the next-hop SPB switch are configured as SPB
interface ports. This type of port is used to forward ISIS-SPB control packets and serves as a network
port for tunneling encapsulated traffic through SPB services.
• The service access points (SAPs) created on BEB-1 and BEB-2 determine which frames from
Customer A are accepted on the SAP port, where they are then encapsulated and mapped to the
associated service. Other SAPs exist on these switches for the other service path.
• When a frame tagged with VLAN 10 ingresses on port 1/12, the frame is encapsulated in an 802.1ah
header. The header specifies the BMAC for BEB-1 as the B-SA, the BMAC for BEB-2 as the B-DA,
the SAP I-SID (500), and the SAP BVLAN (4001).
• All other frames ingressing on SAP 1/12:10 that are not tagged with VLAN 10 are dropped, unless
there are other SAPs configured for that port that will classify those frames.
• The encapsulated frame is then forwarded along the BVLAN 4001 shortest path tree (SPT) to BEB-2,
where the 802.1ah header is stripped off and the frame is forwarded to the appropriate destination port.
• The entire process for encapsulating and tunneling customer frames is the same for frames ingressing
on port 2/1 of BEB-2 destined for BEB-1.
How it Works
• There is one instance of ISIS-SPB supported in the backbone topology. This instance is activated once
the BVLANs and SPB interfaces are created and the administrative status of ISIS-SPB is enabled for
each switch.
• When ISIS-SPB is administratively enabled on each switch, all the configured SPB interfaces start to
advertise Hello packets to discover and establish adjacencies with other SPB switches.
• Once adjacencies are established, link state packets (LSPs) are generated with SPB-specific TLVs and
shortest path trees from each switch to all other switches are calculated.
• Each SPB switch learns the backbone MAC (BMAC) address and associated BVLAN IDs of every
SPB switch in the network and stores that information in a local forwarding database. The BMAC
address is the bridge MAC address of the switch and is advertised by ISIS-SPB as the System ID.
• ISIS-SPB then informs Service Manager of the reachability of the BMAC/BVLAN combinations. This
information is used to automatically create a service distribution point (SDP) between the same
BVLAN on each BEB.
• When ISIS-SPB receives advertisement of a service instance identifier (I-SID) from a remote BEB that
matches an I-SID created on the local switch, the SDP (BMAC/BVLAN) of the remote BEB is bound
to the I-SID. The binding of a service to an SDP is referred to as a mesh SDP.
• Basically, an SDP is a dynamically created logical entity that distributes service connectivity to other
BEBs through the ISIS-SPB shortest path [Link] customer frames are then classified into a
specific SAP, the frames are encapsulated and tunneled through the mesh SDP (service/SDP bind)
associated with that SAP.
page 7-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Shortest Path Bridging Overview
IP over SPBM
The OmniSwitch implementation of SPBM provides L2 VPN capability that bridges L2 customer LAN
segments. Customer edge (CE) devices form peers and exchange routing information, as well as perform
the necessary IP forwarding. Then the SPBM BEBs bridge the already routed IP traffic across the SPBM
backbone.
In addition to L2 VPN, the OmniSwitch also provides an IP over SPBM capability that consolidates the
routing functionality of CE devices into the BEB devices. The Virtual Routing and Forwarding (VRF)
instances on different BEBs are tied together via backbone I-SIDs across the same SPBM backbone that is
used to support Layer 2 VPNs.
The OmniSwitch IP over SPBM solution supports two methods for combining L3 routing and L2 SPBM
in the same switch: VPN-Lite and L3 VPN.
VPN-Lite
The VPN-Lite method provides a gateway between a regular SPBM service and a router within the same
OmniSwitch chassis. This solution provides a specific advantage in that it allows a single box to represent
two tiers in a typical fat-tree network, which is popular in data center deployments.
In addition, a VPN-Lite configuration can act purely as a L3 VPN when configured correctly. In this
mode, existing routing protocols can form adjacencies across the SPBM PBB network. To keep it purely a
L3 VPN, the administrator makes sure that no SPBM SAPs that can inject bridged flows are allowed to
attach to the I-SID designated for the specific VPN.
The VPN-Lite approach uses the SPBM network in the same way a VLAN is used for transporting L3
frames. Each BEB or host can inject frames into the I-SID as needed, and BEBs can decide to bridge or
route those frames based on their inner and outer destination MAC address.
L3 VPN
When the L3 VPN method is implemented, the OmniSwitch acts as an access or edge router to multiple
VRFs and connects these VRFs across an SPBM PBB network. Each VPN is identified by a local VRF
instance on each BEB and globally in the backbone by an I-SID in the PBB header. ISIS-SPB will import
and export routes from the local routing protocols running inside their respective VRFs. In essence, ISIS-
SPB is creating tunnels between BEBs through which routed frames are sent to reach their target
networks.
The OmniSwitch L3 VPN solution is based on the IETF drafts IP/IPVPN services with IEEE 802.1aq
SPB(B) networks and uses IS-IS TLVs to exchange routes between the BEBs that host the same VPN
services. This approach also gives an administrator the ability to build VPNs and extend them over an
SPBM core.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-15
Shortest Path Bridging Overview Configuring Shortest Path Bridging
• The loopback port assigned to the SPB SAP is referred to as the L3 VPN access port.
• The VLAN associated with both loopback ports is referred to as the L3 VPN VLAN.
The loopback cable connects a VRF to an SPB SAP and can carry traffic from different VRFs tagged with
different L3 VPN VLANs. The following diagram shows a logical depiction of the IP over SPB loopback
configuration:
SPBM Backbone
SAP 1/2:400 SAP 1/5:400
VRF-1 VRF-1
Customer 1 .
Customer 1
Network A Network B
How it Works
This section describes the VPN-Lite and L3 VPN control and data plane operations in an IP over SPB
network configuration. Although both approaches require the L3 VPN loopback configuration, they differ
in how routing protocol control packets are exchanged and processed to support IP over SPB.
page 7-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Shortest Path Bridging Overview
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-17
Interaction With Other Features Configuring Shortest Path Bridging
• Ingress filtering based on the source MAC address—frames received on ports that do not have an
incoming source MAC address pre-programmed by ISIS-SPB are discarded.
• IP interfaces are not supported on BVLANs.
When disabled, statistics collection is no longer available for Service Manager to provide this function for
SPB services. To restore statistics collection functionality for SPB services, if necessary, use the following
command:
-> service stats enable
When enabled, statistics collection is no longer available for AppMon and only available for SPB services.
Link Aggregation
• Both static and dynamic link aggregates are configurable as SPB-M service access ports and as SPB-M
network interfaces.
• Note that a link aggregate must consist of all access ports or all network ports. SPB-M functionality is
not supported on link aggregates that consist of a mixture of SPB-M ports and standard switch ports.
page 7-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Interaction With Other Features
OAM
• OAM support per the IEEE 802.1ah standard for Provider Backbone Bridging (PBB) is applied at the
customer VLAN (CVLAN) and the backbone VLAN (BVLAN) level. Support at the service instance
(I-SID) level is not available.
• The OmniSwitch proprietary Layer 2 ping and traceroute features are available to troubleshoot
CVLAN and BVLAN domains, including an I-SID check.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-19
Interaction With Other Features Configuring Shortest Path Bridging
VRF
IP over SPB uses Virtual Routing Forwarding (VRF) instances to exchange routes with I-SIDs. This is
accomplished via the Global Route Manager (GRM). VRF routes are exported to the GRM table and
imported into I-SIDs; I-SID routes are exported to the GRM table and imported into VRFs.
• A binding is created between a VRF and the I-SIDs to identify which I-SIDs will export routes to the
GRM for the specified VRF (see “Configuring IP over SPB” on page 7-46 for more information).
• The ip import command has an optional isid parameter that notifies GRM to import the routes from
the specified I-SID into the requesting VRF.
page 7-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Quick Steps for Configuring SPB-M
2 Use the spb bvlan command to create BVLANs 4001 and 4002 on each switch (edge and core
switches) that will participate in the SPB-M topology.
-> spb bvlan 4001
-> spb bvlan 4002
3 Use the spb isis bvlan ect-id command to change the equal cost tree (ECT) algorithm ID for the speci-
fied BVLAN, as necessary, to make sure that the same ECT ID is assigned to the same BVLAN ID on
each switch in the SPB-M topology.
-> spb isis bvlan 4001 ect-id 1
-> spb isis bvlan 4002 ect-id 2
4 Use the spb isis control-bvlan command to designate one of the BVLANs on each SPB switch as the
control BVLAN for the SPB instance. The control BVLAN is used to exchange ISIS-SPB control packets
with neighboring SPB switches.
-> spb isis control-bvlan 4001
5 Use the spb isis interface command to configure a port or link aggregate as an SPB interface. This
type of interface sends PDUs to detect neighboring SPB switches and form adjacencies and also serves as
a network port that is used to carry encapsulated service traffic through the SPB-M backbone network.
-> spb isis interface port 1/1-3
-> spb isis interface port 1/1-4
6 Use the spb isis admin-state command to enable the SPB instance for the switch. Enabling ISIS-SPB
on the switch triggers the transmission of hello packets from the SPB interfaces, which starts the process
of defining the SPB infrastructure and calculating the shortest path trees (SPTs) through the topology.
-> spb isis admin-state enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-21
Quick Steps for Configuring SPB-M Configuring Shortest Path Bridging
2 Use the service spb command to create an SPB service and associate that service with a backbone
service instance identifier (I-SID) and BVLAN.
-> service spb 1 isid 500 bvlan 4001 admin-state enable
-> service spb 2 isid 501 bvlan 4002 admin-state enable
3 Use the service spb sap command to create a service access point (SAP) by associating an SPB service
with SAP ID. A SAP ID is comprised of a port or link aggregate and an encapsulation value that identifies
the customer traffic to associate with the service.
-> service spb 1 sap port 1/12:10 admin-state enable
-> service spb 1 sap port 2/1:10 admin-state enable
-> service spb 2 sap port 1/12:0 admin-state enable
-> service spb 2 sap port 1/12:all admin-state enable
In this example, SAPs 1/12:10 and 2/1:10 map traffic ingressing on these SAPs that has an outer tag
(customer VLAN tag) equal to 10 to the service associated with the SAP. In this case, SPB service 1
(ISID=500, BVLAN=4001). SAPs 1/12:all and 2/1:all map all tagged and untagged traffic ingressing on
these SAPs to the service associated with the SAP.
page 7-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Quick Steps for Configuring SPB-M
BCB-5 BCB-6
-> system name BCB-5 -> system name BCB-6
-> spb bvlan 4001 -> spb bvlan 4001
-> spb bvlan 4002 -> spb bvlan 4002
-> spb isis bvlan 4001 ect-id 1 -> spb isis bvlan 4001 ect-id 1
-> spb isis bvlan 4002 ect-id 2 -> spb isis bvlan 4002 ect-id 2
-> spb isis control-bvlan 4001 -> spb isis control-bvlan 4001
-> spb interface port 1/1-3 -> spb interface port 1/1-3
-> spb isis admin-state enable -> spb isis admin-state enable
BEB-1 BEB-2
-> service access port 1/12 -> service access port 1/12
-> service spb 1 isid 500 bvlan 4001 -> service spb 1 isid 500 bvlan 4001
-> service spb 2 isid 501 bvlan 4002 -> service spb 2 isid 501 bvlan 4002
-> service spb 1 sap port 1/12:10 admin-state enable -> service spb 1 sap 1/12:10 admin-state enable
-> service spb 2 sap port 1/12:0 admin-state enable -> service spb 2 sap 1/12:0 admin-state enable
-> service spb 2 sap port 1/12:all admin-state enable -> service spb 2 sap 1/12:all admin-state enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-23
Configuring SPB-M Configuring Shortest Path Bridging
Configuring SPB-M
Configuring the SPB-M backbone and service layers requires several steps. These steps are outlined here
and further described throughout this section. For a brief tutorial on configuring SPB-M, see “Quick Steps
for Configuring SPB-M” on page 7-21.
page 7-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
4 Configure an SPB service access point (SAP). A SAP binds an SPB service to an access (customer-
facing) port and defines which customer traffic to tunnel through the service. Each SAP is associated to
one service name, but a single service can have multiple SAPs to which it is associated. See “Verifying the
SPB Service Configuration” on page 7-38.
For more information about Service Manager commands, see Chapter 47, “Service Manager Commands,”
in the OmniSwitch AOS Release 8 CLI Reference Guide.
ISIS-SPB
This implementation of the ISIS-SPB protocol supports only a single topology with a multi-topology
identifier (MT-ID) of zero.
• The ISIS-SPB protocol instance is independent of IP IS-IS, or other network layer protocol identifiers
(NLPIDs) riding in the same IS-IS implementation. However, ISIS-SPB and IP IS-IS can coexist on
the same switch.
• ISIS-SPB interfaces, link state packet databases (LSPDB), and forwarding information are all created
and maintained within the single ISIS-SPB instance.
• IS-IS Level 1 point-to-point adjacencies are supported; Level 2 is not supported at this time.
• SPB interfaces are associated with a link metric cost that is configurable, thus providing the ability to
change the logical topology created by the ISIS-SPB instance. However, if different metric values are
configured on each side of a link, ISIS-SPB will choose the higher-valued one as the metric to use for
both sides. This is necessary to enforce the symmetry of SPT calculations in both directions across the
link.
• Enabling SPB for the switch automatically triggers the transmission of Hello packets from the SPB
interfaces, thus starting the process of discovery and forming adjacencies to build shortest path trees.
Backbone VLANs
• The BVLAN configuration must be the same on each SPB switch within the PBB [Link]
example, if BVLAN 10 with an ECT ID of 1 is configured on one switch, then BVLAN 10 with an
ECT ID of 1 must exist on all other SPB bridges in the network to ensure proper calculation of the
ISIS-SPB shortest path trees through the backbone.
• If more than one BVLAN is needed, configure each BVLAN with a different ECT algorithm ID. For
example, if two BVLANs (BVLAN 4001 and BVLAN 4002) are needed for a specific SPB-M
topology, then create BVLAN 4001 with ECT ID 1 and BVLAN 4002 with ECT ID 2 on each switch
that is going to participate in the topology.
Note. When adding another BVLAN to an existing SPB-M topology instance, create the new BVLAN and
its associated ECT ID on every switch first, then configure the SPB service association for the BVLAN.
Creating SPB services before the BVLAN configuration is complete on all switches can cause problems
with forming adjacencies or may even cause an SPB switch to drop existing adjacencies.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-25
Configuring SPB-M Configuring Shortest Path Bridging
• In most cases one BVLAN is sufficient for virtualizing traffic through the network backbone.
However, configuring more than one BVLAN provides alternate routes for tunneling customer traffic.
This can also provide a form of load balancing by distributing traffic over different BVLAN segments.
• All encapsulated traffic within the BVLAN domain is unicast with a resolved source and destination
BMAC addresses. Frames received on BVLAN ports that do not have an incoming source MAC
address pre-programmed by ISIS-SPB are discarded.
Configuring BVLANs
The SPB-M backbone VLAN (BVLAN) provides the foundation on which ISIS-SPB shortest path trees
are built and SPB-M services tunnel encapsulated customer data through the Provider Backbone Bridge
network (PBBN). Configuring a BVLAN on a switch is also the first step in setting up the ISIS-SPB
infrastructure and in making an OmniSwitch an SPB-capable node.
Note. The BVLAN configuration must be the same on each OmniSwitch that is going to participate in the
SPB-M network topology. So if BVLAN 4001 is created on one switch, then BVLAN 4001 must be created
on all other switches in the SPB-M network.
To create a BVLAN, use the spb bvlan command with the optional name parameter. For example:
-> spb bvlan 4001 name spb-4001
If the name parameter is not specified with this command, the VLAN ID is used for the name by default.
For example, the following command creates BVLAN 4001 with “VLAN 4001” as the name:
-> spb bvlan 4001
To remove a BVLAN, use the no form of the spb bvlan command. For example:
-> no spb bvlan 4001
Note. When adding another BVLAN to an existing SPB-M topology instance, create the new BVLAN and
its associated ECT ID on every switch first, then configure the SPB service association for the BVLAN.
Creating SPB services before the BVLAN configuration is complete on all switches can cause problems
with forming adjacencies or may even cause an SPB switch to drop existing adjacencies.
page 7-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
A control BVLAN also carries regular encapsulated SPB domain traffic in addition to ISIS-SPB control
packets. In other words, a VLAN can serve as both a regular BVLAN and a control BVLAN at the same
time.
BVLANs: 4
The BVLAN is a special type of VLAN that is created and maintained by VLAN Manager. As a result, it
also appears in the VLAN Manager show command displays. For example, in the following show vlan
output display, VLANs 4001 through 4004 are included and “spb” appears in the “type” column:
-> show vlan
vlan type admin oper ip mtu name
-----+------+-----+-----+-----+-----+------------
1 std Dis Dis Dis 1500 VLAN 1
1000 std Ena Ena Ena 1500 VLAN 1000
4001 spb Ena Ena Dis 1524 VLAN 4001
4002 spb Ena Ena Dis 1524 VLAN 4002
4003 spb Ena Ena Dis 1524 VLAN 4003
4004 spb Ena Ena Dis 1524 VLAN 4004
4094 mcm Ena Dis Dis 9198 MCM IPC
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-27
Configuring SPB-M Configuring Shortest Path Bridging
To view configuration information for an individual BVLAN, use the show vlan command and specify the
BVLAN ID. For example:
-> show vlan 4001
Name : VLAN 4001,
Type : Backbone vlan,
Administrative State : enabled,
Operational State : disabled,
IP Router Port : disabled,
IP MTU : 1524
• After adjacencies are established, exchanges link state packets (LSPs) with SPB neighbors to build a
local LSP database (LSPDB). A switch’s adjacencies are reflected in the contents of its link state
packets. This relationship between adjacencies and link state allows the protocol to detect downed
routers in a timely fashion.
• Serves as a network port by forwarding encapsulated SPB service traffic on backbone VLANs
(BVLANs) through the SPB-M Provider Backbone Bridge (PBB) network.
To configure a port or link aggregate as SPB interface, use the spb isis interface command. For example:
-> spb isis interface port 1/10
-> spb isis interface linkagg 5
When a port is converted to an SPB interface, the interface is automatically assigned to all existing
BVLANs. There is one ISIS-SPB instance per switch, and each BVLAN and SPB interface are associated
with that instance. However, it is also possible to tag SPB interfaces to carry traffic for standard VLANs.
The spb isis interface command is also used to optionally configure the following parameter values:
• admin-state—Administratively enables or disables the SPB interface. By default, the interface is
enabled when the SPB interface is created.
• hello-interval—Specifies the amount of time, in seconds, to wait between each transmission of a hello
packet from this interface. By default, the hello time interval is set to nine seconds.
• hello-multiplier—Specifies an integer value that is multiplied by the hello interval time to determine
the amount of time, in seconds, a receiving bridge holds onto the hello packets transmitted from this
interface. By default, the hello multiplier is set to three.
• metric—An integer value that specifies the link cost to reach the destination backbone MAC (BMAC),
By default, the link cost is set to ten. Changing the link metric value provides a method for changing
the logical topology as calculated by ISIS-SPB.
The following command examples change the default hello and metric values for the SPB interface:
-> spb isis interface port 4/7 hello-interval 60
-> spb isis interface linkagg 3 hello-multiplier 10
-> spb isis interface port 2/1 metric 100
-> spb isis interface linkagg 5 hello-interval 20 hello-multiplier 5 metric 200
page 7-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
Interfaces : 7
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-29
Configuring SPB-M Configuring Shortest Path Bridging
To verify the global SPB configuration for the switch, use the show spb isis info command. For example:
-> show spb isis info
SPB ISIS Bridge Info:
System Id = e8e7.3233.1831,
System Hostname = BEB-1,
SPSourceID = 03-18-31,
SPBM System Mode = auto,
BridgePriority = 32768 (0x8000),
MT ID = 0,
Control BVLAN = 4001,
Area Address = 0.0.0,
Level Capability = L1,
Admin State = UP,
LSDB Overload = Disabled,
Last Enabled = Thu Aug 2 [Link] 2012,
Last SPF = Fri Aug 3 [Link] 2012,
SPF Wait = Max: 1000 ms, Initial: 100 ms, Second: 300 ms,
LSP Lifetime = 1200,
LSP Wait = Max: 1000 ms, Initial: 0 ms, Second: 300 ms,
Graceful Restart = Disabled,
GR helper-mode = Disabled,
# of L1 LSPs = 8
Control Address = [Link] (AllL1)
page 7-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
ISIS-SPB advertises the system name to identify the switch to other SPB peer switches.
Note. Each switch that is going to participate in the SPB topology must use the same area address and must
use an address that is different from the ISIS-IP area address.
To set the source ID back to the default value, use the spb isis source-id command with the auto
parameter. For example:
-> spb isis source-id auto
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-31
Configuring SPB-M Configuring Shortest Path Bridging
By default, the control MAC address is set to [Link] (all Level 1 Intermediate Systems). The
following parameters are used with the spb isis control-address command to change the control MAC
address:
• alll1—All Level 1 Intermediate Systems ([Link]).
For example, the following command changes the default control MAC address from AllL1 to AllL2:
-> spb isis control-address alll2
To change one or more of the wait time values, it is only necessary to specify the parameter for the desired
change. For example:
-> spb isis spf-wait max-wait 5000
-> spb isis spf-wait initial-wait 1000
-> spb isis spf-wait second-wait 2000
To set the wait time values back to the default settings. use the spb isis spf-wait command without
specifying any of the parameters. For example:
-> spb isis spf-wait
page 7-32 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
To change one or more of the wait time values, it is only necessary to specify the parameter for the desired
change. For example:
-> spb isis lsp-wait max-wait 5000
-> spb isis lsp-wait initial-wait 2500
-> spb isis lsp-wait second-wait 3000
To set the wait time values back to the default settings. use the spb isis lsp-wait command without
specifying any of the parameters. For example:
-> spb isis lsp-wait
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-33
Configuring SPB-M Configuring Shortest Path Bridging
Some advantages of manually triggering the overload state condition, even if the instance is no where near
its resource limits, are as follows:
• The switch is designated as “leaf node” that should never carry transit traffic. Configuring the link
metric value for the SPB interfaces on the switch and attached peers is another method for preventing
the switch from receiving transit traffic, but enabling the overload state is a much quicker way to
achieve the same results and requires less configuration.
• When there is a need to remove the switch from service (temporarily or permanently). In this scenario,
network availability is increased because peer switches will detect the overload state of the switch and
gracefully transition to alternate paths, while the “manually overloaded” switch continues to forward
packets. Just simply shutting the switch down would cause more disruption to network traffic.
When the overload state is either dynamically or manually enabled for the switch, the overload bit is set in
LSP 0 to indicate that this ISIS-SPB instance is not available to accept transit traffic. However, an ISIS-
SPB switch operating in the overload state is still used only if there is no alternate path to reach the
intended destination.
When the overload state is enabled, the switch will operate in this state for an infinite amount of time. To
configure the switch to remain in the overload state for only a specific amount of time (in seconds), use the
spb isis overload command with the optional timeout parameter. For example:
-> spb isis overload timeout 500
To disable the overload state, use the no form of the spb isis overload command. For example:
-> no spb isis overload
It is also possible to specify that the overload state is enabled for the switch after every system bootup.
This is done using the spb isis overload-on-boot command, which also has an optional timeout
parameter. For example:
-> spb isis overload-on-boot timeout 500
To disable the overload-on-boot option, use the no form of the spb isis overload-on-boot command. For
example:
-> no spb isis overload-on-boot timeout 500
Note that the no spb isis overload command does not disable the overload-on-bootup option.
page 7-34 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
The helper mode can be disabled on the switch with the spb isis graceful-restart helper command. For
example, to disable the helper support for neighboring switches, enter the following:
-> ip isis graceful-restart helper disable
To disable support for graceful restart, use the no form of the spb isis graceful-restart command. For
example:
-> no spb isis graceful-restart
Enabling/Disabling ISIS-SPB
By default ISIS-SPB is disabled on the switch. To enable ISIS-SPB, use the spb isis admin-state
command with the enable option. For example:
-> spb isis admin-state enable
To disable the ISIS-SPB instance on the switch, enter the spb isis admin-state command with the disable
option. When the ISIS-SPB status s disabled for the switch, the related configuration settings and statistics
are retained.
-> spb isis admin-state disable
Note. Enabling ISIS-SPB on a switch starts the process of ISIS-SPB discovery, adjacency building, and
shortest path tree calculations. Make sure that the SPB-M configuration is set up first, then enable ISIS-
SPB on each switch that will participate in the SPB-M network.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-35
Configuring SPB-M Configuring Shortest Path Bridging
The BVLAN ID specified with the service spb command must already exist in the switch configuration.
However, the I-SID number specified creates a new I-SID that is bound to the BVLAN for this service.
Note. When adding another BVLAN to an existing SPB-M topology instance, create the new BVLAN and
its associated ECT ID on every switch first, then configure the SPB service association for the BVLAN.
Creating SPB services before the BVLAN configuration is complete on all switches can cause problems
with forming adjacencies or may even cause an SPB switch to drop existing adjacencies.
Refer to the OmniSwitch CLI Reference Guide for more information about the above parameters and
related commands.
page 7-36 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
When VLAN translation is disabled, frames simply egress without any modification of the VLAN tags. In
other words, the frames are transparently bridged without tag modification.
The following table shows the required translation (tag is added or replaced) that takes place when the
egress SAP configuration is applied to the possible frame types (untagged, tagged, double-tagged). Note
that in this table the terms “ITAG” and “OTAG” refer to inner tag and outer tag, respectively.
VLAN translation is enabled at two different levels: the service level and access port level. To enable
translation at the service level, use the service spb vlan-xlation command. For example:
-> service spb 1 vlan-xlation enable
To enable VLAN translation for all services, use the all parameter with the same command. For example:
-> service spb all vlan-xlation enable
To disable VLAN translation, use the service spb vlan-xlation command with the disable parameter. For
example:
-> service spb 1 vlan-xlation disable
-> service spb all vlan-xlation disable
To enable VLAN translation at the port level, use the service access vlan-xlation command. For example:
-> service access port 1/11 vlan-xlation enable
See “Configuring Service Access Ports” on page 7-40 for more information.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-37
Configuring SPB-M Configuring Shortest Path Bridging
To view the configuration for an individual service, use the show spb isis services command and specify
the SPB service ID. For example:
-> show service spb 1
SPB Service Detailed Info
Service Id : 1, Description : ,
ISID : 1000, BVlan : 4001,
Multicast-Mode : Headend, Tx/Rx Bits : 0/0,
Admin Status : Up, Oper Status : Up,
Stats Status : No, Vlan Translation : No,
Service Type : SPB, Allocation Type : Static,
MTU : 9194, Def Mesh VC Id : 1,
SAP Count : 4, SDP Bind Count : 1,
Ingress Pkts : 0, Ingress Bytes : 0,
Egress Pkts : 0, Egress Bytes : 0,
Mgmt Change : 08/10/2012 [Link], Status Change : 08/10/2012 [Link]
page 7-38 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
• Configure Layer 2 profiles to determine how control packets are processed on access ports.
• Create a SAP by associating a SAP ID with an SPB service ID. A SAP ID is comprised of an access
port and an encapsulation value, which is used to identify the type of customer traffic (untagged,
single-tagged, or double-tagged) to map to the associated service.
• When a SAP is deleted, all configuration parameters for the SAP are also deleted.
• A SAP is owned by and associated with the service that was specified at the time the SAP was created.
• If a port is administratively shutdown, all SAPs on that port become operationally out of service.
• Both fixed ports and link aggregates are configurable as access ports. Only access ports are associated
with SAPs.
• Bridging functionality is not supported on access ports or link aggregates.
• Configuring multiple SAPs on an access port that map different VLAN tags to the same service can
cause a MAC move when the same customer MAC (CMAC) ingresses the access port with different
VLAN tags. For example, a CMAC has two flows tagged with VLAN 10 and VLAN 20 ingressing
access port 1/1 and both are mapped to service 100.
-> service spb 100 sap port 1/1:10
-> service spb 100 sap port 1/1:20
To avoid the MAC move in this scenario, use one of the following alternative SAP configurations.
Configure the SAPs with different services:
-> service spb 100 sap port 1/1:10
-> service spb 200 sap port 1/1:20
Configure a default SAP to classify both flows into the same service:
-> service spb 100 sap port 1/1:all
See “Creating the Service Access Point” on page 7-42 for more information.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-39
Configuring SPB-M Configuring Shortest Path Bridging
To revert an access port back to a regular switch port or link aggregate, use the no form of the service
access command. For example:
-> no service access port 1/2
-> no service access linkagg 5
To disable VLAN translation on an access port, use the service access vlan-xlation command with the
disable option. For example:
-> service access port 1/3 vlan-xlation disable
-> service access linkagg 10 vlan-xlation disable
Protocol Default
STP tunnel
802.1x drop
802.1ab drop
802.3ad peer
GVRP tunnel
MVRP tunnel
AMAP discard
page 7-40 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
If the default profile values are not sufficient, use the service l2profile command with the tunnel,
discard, and peer options to create a new profile. For example, the following command creates a profile
named “DropL2”:
-> service l2profile DropL2 stp discard gvrp discard 802.1ab discard
• When a profile is created, the new profile inherits the default profile settings for processing control
frames. The default settings are applied with the new profile unless they are explicitly changed. For
example, the profile “DropL2” was configured to discard STP, GVRP, and 802.1ab frames. No other
protocol settings were changed, so the default settings still apply for the other protocols.
• Remove any profile associations with access ports before attempting to modify or delete the profile.
To delete a Layer 2 profile, use the no form of the service l2profile command. For example, the following
command deletes the “DropL2” profile:
-> no service l2profile DropL2
Use the show service l2profile command to view a list of profiles that are already configured for the
switch. This command also displays the attribute values for each profile.
To change the profile associated with the access port back to the default profile (def-access-profile), use
the default option with the service access l2profile command. For example:
-> service port 1/4 l2profile default
-> service access linkagg 5 l2profile DropL2
Use the show service access command to display profile associations for access ports.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-41
Configuring SPB-M Configuring Shortest Path Bridging
*Note that the :all (wildcard) parameter is also configurable as the inner tag value for double-tagged
frames (for example, “10:all” specifies double-tagged packets with an outer tag equal to 10 and an
inner tag with any value).
The following service spb sap command example creates a SAP that will direct customer traffic
ingressing on access port 1/4 that is tagged with VLAN ID 50 to service 100:
-> service spb 100 sap 1/4:50 description “BEB1 to SPB100 CVLAN 50”
page 7-42 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
In the above example, the 1/4:50 designation is referred to as the SAP ID or the encapsulation ID. This
means that if no other SAPs are configured for port 1/4, then any traffic ingressing on that port is dropped
if the traffic is not tagged with VLAN 50.
It is possible to configure more than one SAP for the same access port, which provides a method for
segregating incoming traffic into multiple services. For example, the following SAP configuration for port
2/3 sends incoming traffic to three different services based on the VLAN tags of the frames received:
-> service spb 2000 sap port 2/3:all
-> service spb 200 sap port 2/3:100
-> service spb 1000 sap port 2/3:100.200
In this example,
• Frames double-tagged with 100 (outer tag) and 200 (inner tag) are sent on service 1000.
• All other frames (those that are not single-tagged with 100 or double-tagged with 100 and 200) are sent
on service 2000.
The following SAP ID classification precedence is applied when there are multiple SAPs for one access
port:
1 Double-tagged (Outer VLAN + Inner VLAN) - Highest
3 Single-tagged (VLAN)
4 Single-tagged (wildcard)
5 Untagged - Lowest.
Refer to the OmniSwitch AOS Release 8 CLI Reference Guide for more information about the command
parameters.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-43
Configuring SPB-M Configuring Shortest Path Bridging
Note that untagged Layer 2 control packets (for example, BPDU, GVRP, and AMAP) are always tunneled
(if enabled) through the Provider Backbone Bridge (PBB) network with the default EXP bits set to 7, so
that they can arrive at the destination bridge at the highest COS queue of 7. As a result, trusted and
untrusted SAPs configured on the access ports will not affect the Layer 2 control packets ingressing on the
access ports.
By default, a SAP is trusted with the priority set to best effort (zero). Use the no form of the service spb
sap trusted command with the priority option to change the SAP mode to untrusted. For example:
-> service spb 100 sap 1/4:50 no trusted priority 7
When a SAP is trusted, the priority value contained in tagged customer packets is used; untagged packets
are assigned the default priority value (zero). When a SAP is untrusted, the priority value configured for
the SAP is assigned to both tagged and untagged customer packets.
Total Ports: 5
page 7-44 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
To then view configuration information for a specific SAP, use the show service spb sap command. For
example:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-45
Configuring SPB-M Configuring Shortest Path Bridging
In this example, VLAN 200, port 1/1, access port 1/2, and IP interface “L3vpn1” will serve as the L3
VPN components required for the loopback configuration. A physical cable will connect port 1/1 to
access port 1/2. The SPB BVLAN and I-SID are required to create the SAP for access port 1/2.
2 Configure VPN-Lite routing protocols. If using the VPN-Lite approach, configure the routing
protocols on the “L3vpn1” IP interface created in Step 1. Otherwise, skip Step 2 and go to Step 3. For
example:
-> vrf-1 ip static-route [Link]/24 gateway [Link]
The VPN-Lite approach only requires configuring the physical L3 VPN loopback and configuring
routing protocols on the L3 VPN IP interface to exchange routes. The remaining steps in this section
are used to configure the L3 VPN approach, which uses ISIS-SPB to exchange routes.
3 Configure VRF-ISID bindings for the L3 VPN. A VRF-ISID binding identifies the loopback port
configuration that will do L3 forwarding on the VRF side of the loopback and SPB bridging on the SAP
side of the loopback. VRF import and export commands are used to exchange routes between the VRF and
I-SID specified in the binding configuration. For example:
-> spb ipvpn bind vrf-1 isid 1000 gateway [Link] all-routes
-> vrf-1 ip export all-routes
-> vrf-1 ip import isid 1000 all-routes
In this example, “vrf-1” is bound to SPB I-SID 1000 and gateway [Link] identifies the loopback IP
interface. All routes in “vrf-1” are exported to the Global Route Manager (GRM), which then exports
the routes to I-SID 1000. The last command in this sequence sets up the import of I-SID 1000 routes
from the GRM into “vrf-1”. The all-routes parameter specifies that no route-map filtering is applied to
exported or imported routes; all routes are allowed.
4 Optionally configure route redistribution between VRFs and/or I-SIDs. Route redistribution is
configurable between a VRF and I-SID or between two I-SIDs (inter-I-SID route leaking). For example:
-> spb ipvpn redist source-isid 2000 destination-isid 1000 all-routes
-> spb ipvpn redist source-vrf-2 destination-isid 2000 all-routes
page 7-46 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
In addition to exchanging routes between VRFs and I-SIDs, it is also possible to configure redistribution
of routes between two I-SIDs or between a VRF and an I-SID. To verify the redistribution configuration
for L3 VPN routes, use the show spb ipvpn redist command. For example:
To display the L3 VPN route table, use the show spb ipvpn route-table. For example:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-47
Configuring SPB-M Configuring Shortest Path Bridging
Multiple I-SIDs
In this sample IP over SPB topology, Network A is able to communicate with Network B across two I-
SIDs. This scenario could be expanded to connect multiple customer sites together to form a VPN cloud.
Network A
[Link]/24
1/1 BEB-A
1/2
L3 VPN IP [Link]/24 L3 VPN IP [Link]/24
I-SID 2000
I-SID 1000
1/2
1/1 BEB-B .
L3 VPN IP [Link]/24 L3 VPN IP [Link]/24
Network B
[Link]/24
The following CLI command examples are used to configure the sample IP over SPB topology shown in
“Figure 8: Multiple I-SIDS” on page 7-48. In this topology, port 1/1 is the L3 VPN router port, port 1/2 is
the L3 VPN access port, and VLAN 200 and VLAN 400 are the L3 VPN VLANs.
Common for BEB-A and BEB-B:
-> service access port 1/2
-> vlan 200
-> vlan 200 members port 1/1 tagged
-> vlan 400
-> vlan 400 members port 1/1 tagged
-> service 1000 spb isid 1000 bvlan 40 admin-state enable
-> service 1000 sap port 1/2:200 admin-state enable
-> service 2000 spb isid 2000 bvlan 41 admin-state enable
-> service 2000 sap port 1/2:400 admin-state enable
-> vrf-1
BEB-A:
-> vrf-1 ip interface l3vpn1 vlan 200 address [Link]/24
-> vrf-1 ip interface l3vpn2 vlan 400 address [Link]/24
BEB-B:
-> vrf-1 ip interface l3vpn1 vlan 200 address [Link]/24
-> vrf-1 ip interface l3vpn2 vlan 400 address [Link]/24
page 7-48 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
VPN-Lite
The following commands are used only in a VPN-Lite configuration:
BEB-A:
-> vrf-1 ip static-route [Link]/24 gateway [Link]
-> vrf-1 ip static-route [Link]/24 gateway [Link]
BEB-B:
-> vrf-1 ip static-route [Link]/24 gateway [Link]
-> vrf-1 ip static-route [Link]/24 gateway [Link]
L3 VPN
The following commands are used only in a L3 VPN configuration:
BEB-A:
-> vrf-1 ip export all-routes
-> spb ipvpn bind vrf-1 isid 1000 gateway [Link] all-routes
-> spb ipvpn bind vrf-1 isid 2000 gateway [Link] all-routes
-> vrf-1 ip import isid 1000 all-routes
-> vrf-1 ip import isid 2000 all-routes
BEB-B:
-> vrf-1 ip export all-routes
-> spb ipvpn bind vrf-1 isid 1000 gateway [Link] all-routes
-> spb ipvpn bind vrf-1 isid 2000 gateway [Link] all-routes
-> vrf-1 ip import isid 1000 all-routes
-> vrf-1 ip import isid 2000 all-routes
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-49
Configuring SPB-M Configuring Shortest Path Bridging
Network A
[Link]/24
L3 VPN IP [Link]/24
1/1
1/2
I-SID 1000
VRF-1
BEB-A
1/1
BEB-C 1/2
L3 VPN IP [Link]/24
L3 VPN IP [Link]/24
BEB-B
I-SID 2000
1/2 VRF-1 Network C
1/1 [Link]/24
.
L3 VPN IP [Link]/24
Network B
[Link]/24
The following CLI command examples are used to configure the sample IP over SPB topology shown in
“Figure 9: Inter-ISID Routing Example (One VRF)” on page 7-50. In this topology, Network A binds to I-
SID 1000 in VRF-1, Network B binds to I-SID 2000 in VRF-1, and Network C binds to both I-SIDs in
VRF-1.
BEB-A:
-> service access port 1/2
-> vlan 200
-> vlan 200 members port 1/1 tagged
-> service 1000 spb isid 1000 bvlan 40 admin-state enable
-> service 1000 sap port 1/2:200 admin-state enable
-> vrf-1
-> vrf-1 ip interface l3vpn1 vlan 200 address [Link]/24
-> vrf-1 ip export all-routes
-> spb ipvpn bind vrf-1 isid 1000 gateway [Link] all-routes
-> vrf-1 ip import isid 1000 all-routes
BEB-B
-> service access port 1/2
-> vlan 400
-> vlan 400 members port 1/1 tagged
-> service 2000 spb isid 2000 bvlan 41 admin-state enable
-> service 2000 sap port 1/2:400 admin-state enable
page 7-50 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
-> vrf-1
-> vrf-1 ip interface l3vpn2 vlan 400 address [Link]/24
-> vrf-1 ip export all-routes
-> spb ipvpn bind vrf-1 isid 2000 gateway [Link] all-routes
-> vrf-1 ip import isid 2000 all-routes
BEB-C:
-> service access port 1/2
-> vlan 200
-> vlan 200 members port 1/1 tagged
-> vlan 400
-> vlan 400 members port 1/1 tagged
-> service 1000 spb isid 1000 bvlan 40 admin-state enable
-> service 1000 sap port 1/2:200 admin-state enable
-> service 2000 spb isid 2000 bvlan 41 admin-state enable
-> service 2000 sap port 1/2:400 admin-state enable
-> vrf-1
-> vrf-1 ip interface l3vpn1 vlan 200 address [Link]/24
-> vrf-1 ip interface l3vpn2 vlan 400 address [Link]/24
-> spb ipvpn bind vrf-1 isid 1000 gateway [Link] all-routes
-> spb ipvpn bind vrf-1 isid 2000 gateway [Link] all-routes
-> spb ipvpn redist source-isid 1000 destination-isid 2000 all-routes
-> spb ipvpn redist source-isid 2000 destination-isid 1000 all-routes
-> vrf-1 ip import all-routes
-> vrf-1 ip export all-routes
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-51
Configuring SPB-M Configuring Shortest Path Bridging
Network A
[Link]/24
L3 VPN IP [Link]/24
1/1
1/2
I-SID 1000
BEB-A VRF-1
1/1
BEB-C 1/2
L3 VPN IP [Link]/24
L3 VPN IP [Link]/24
BEB-B
I-SID 2000
VRF-2
1/2 Network C
1/1 [Link]/24
.
L3 VPN IP [Link]/24
Network B
[Link]/24
The following CLI command examples are used to configure the sample IP over SPB topology shown in
“Figure 10: Inter-ISID Routing Example (Two VRF)” on page 7-52. In this topology, Network A binds to
I-SID 1000 in VRF-1, Network B binds to I-SID 2000 in VRF-2, and Network C binds to both I-SIDs in
VRF-1.
BEB-A:
-> service access port 1/2
-> vlan 200
-> vlan 200 members port 1/1 tagged
-> service 1000 spb isid 1000 bvlan 40 admin-state enable
-> service 1000 sap port 1/2:200 admin-state enable
-> vrf-1
-> vrf-1 ip interface l3vpn1 vlan 200 address [Link]/24
-> vrf-1 ip export all-routes
-> spb ipvpn bind vrf-1 isid 1000 gateway [Link] all-routes
-> vrf-1 ip import isid 1000 all-routes
BEB-B
-> service access port 1/2
-> vlan 400
-> vlan 400 members port 1/1 tagged
-> service 2000 spb isid 2000 bvlan 41 admin-state enable
-> service 2000 sap port 1/2:400 admin-state enable
page 7-52 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Configuring SPB-M
-> vrf-2
-> vrf-2 ip interface l3vpn2 vlan 400 address [Link]/24
-> vrf-2 ip export all-routes
-> spb ipvpn bind vrf-1 isid 2000 gateway [Link] all-routes
-> vrf-2 ip import isid 2000 all-routes
BEB-C:
-> service access port 1/2
-> vlan 200
-> vlan 200 members port 1/1 tagged
-> vlan 400
-> vlan 400 members port 1/1 tagged
-> service 1000 spb isid 1000 bvlan 40 admin-state enable
-> service 1000 sap port 1/2:200 admin-state enable
-> service 2000 spb isid 2000 bvlan 41 admin-state enable
-> service 2000 sap port 1/2:400 admin-state enable
-> vrf-1
-> vrf-1 ip interface l3vpn1 vlan 200 address [Link]/24
-> vrf-1 ip interface l3vpn2 vlan 400 address [Link]/24
-> spb ipvpn bind vrf-1 isid 1000 gateway [Link] all-routes
-> spb ipvpn bind vrf-2 isid 2000 gateway [Link] all-routes
-> spb ipvpn redist source-isid 1000 destination-isid 2000 all-routes
-> spb ipvpn redist source-isid 2000 destination-isid 1000 all-routes
-> spb ipvpn redist source-vrf vrf-1 destination-isid 2000 all-routes
-> vrf-1 ip import isid 1000 all-routes
-> vrf-1 ip import isid 2000 all-routes
-> vrf-1 ip export all-routes
-> vrf-2 ip import vrf-1 all-routes
-> vrf-2 ip import isid 1000 all-routes
-> vrf-2 ip import isid 2000 all-routes
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-53
Verifying the SPB Backbone and Services Configuring Shortest Path Bridging
show spb isis info Displays the global status and configuration for the ISIS-SPB instance
on the switch.
show spb isis bvlans Displays the backbone VLAN (BVLAN) configuration for the switch.
show spb isis interface Displays the SPB interface (network port) configuration for the switch.
show spb isis adjacency Displays information about the ISIS-SPB adjacencies created for the
SPB switch.
show spb isis database Displays ISIS-SPB topology information maintained in the link state
database (LSDB).
show spb isis nodes Displays the discovered node-level parameter values for all of the ISIS-
SPB switches participating in the topology.
show spb isis unicast-table Displays the unicast forwarding information for the BVLAN topology.
show spb isis services Displays a network-wide view of existing services to help verify that
SPB services are correctly advertised and learned by ISIS-SPB
show spb isis spf Displays the shortest path first (SPF) information to all known SPB
switches for a specific BVLAN.
show spb isis multicast-table Displays the multicast forwarding entries for services.
show spb isis multicast-sources Displays all the known multicast sources across the SPB domain and
BVLANs.
show spb isis multicast- Displays the shortest path first (SPF) readability for a known multicast
sources-spf source bridge for a specific BVLAN.
show spb isis ingress-mac-filter Displays the ingress MAC filter for multicast traffic for a given BVLAN
operating in the (*,G) mode.
page 7-54 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Shortest Path Bridging Verifying the SPB Backbone and Services
show service access Displays the service access (customer-facing) port configuration.
show service l2profile Displays the Layer 2 profile definitions. These profiles are applied to
service access ports to determine how Layer 2 control protocol frames
are processed on these ports.
show service Displays the service configuration.
show service spb ports Displays all the virtual ports (SAPs, SDPs) that are associated with an
SPB service.
show service spb sap Displays the configuration information for the specified SAP ID
associated with the specified service.
show service sdp Displays the dynamic Service Distribution Point (SDP) configuration.
show service mesh-sdp Displays the dynamic SDP-to-service binding configuration.
show service spb debug-info Displays debug information for the virtual ports associated with the SPB
service.
show service spb counters Displays the traffic statistics for the specified SPB service and
associated virtual ports.
clear service spb counters Clears the traffic statistics for the specified SPB service and associated
virtual ports.
For more information about the resulting displays from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 7-55
Verifying the SPB Backbone and Services Configuring Shortest Path Bridging
page 7-56 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
8 Configuring Loopback
Detection
Loopback Detection (LBD) automatically detects the loop and shutdown the port involved in the loop.
This prevents forwarding loops on ports that have forwarded network traffic which has looped back to the
originating switch. LBD detects and prevents Layer 2 forwarding loops on a port either in the absence of
other loop detection mechanisms such as STP/RSTP/MSTP, or when these mechanisms cannot detect it
(for example, a client's equipment may drop BPDUs, or the STP protocol may be restricted to the network
edge).
A provider network with a set of multiple switches interconnected together can be logically viewed as a
large single switch. The large single switch provides service access points to customers' networks.
Configuration faults in customer networks can result in loops spanning both provider and customer
networks. This can result in broadcast storms. In order to protect provider's network from broadcast
storms, loops that involve SAP ports need to be detected and broken.
The LBD can detect and break loops created on the service-access interface.
For a service-access interface, LBD can be enabled for a specific port or linkagg. LBD for service-access
points allows shutting down only the specific interface of the link involved in the loop.
The switch can be configured to process LBD frames received from a different or remote system. The port
of the remote system is shut down, rather than passing it as invalid LBD frames.
When loopback occurs, a trap is sent and the event is logged. The port which is shutdown due to LBD is
automatically recovered if autorecovery-timer is set or the port can manually be enabled again when the
problem is resolved.
In This Chapter
This chapter describes the LBD feature and how to configure it through the Command Line Interface
(CLI). CLI commands are used in the configuration examples; for more details about the syntax of
commands, see the OmniSwitch AOS Release 8 CLI Reference Guide. This chapter provides an overview
of LBD and includes the following information:
• “LBD Specifications” on page 8-2
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 8-1
LBD Specifications Configuring Loopback Detection
LBD Specifications
Platforms Supported OmniSwitch 6860, 6860E
Ports Supported There is no restriction on the type of ports on
which the LBD can be enabled. But it is
recommended LBD should be enabled on the
edge ports.
Transmission Timer The valid range is from 5 to 600 seconds.
Autorecovery Timer The valid range is from 30 to 86400 seconds.
page 8-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Loopback Detection LBD Defaults
LBD Defaults
The following table shows LBD default values.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 8-3
Quick Steps for Configuring LBD Configuring Loopback Detection
2 To enable the LBD protocol on a port, use the loopback-detection port command. For example:
Note. Once the default LBD is enabled on the switch, the remote-origin LBD can be configured. It can be
enabled globally or on a per port using the loopback-detection command with the remote-origin
parameter. For example:
-> loopback-detection remote-origin enable
-> loopback-detection port 1/1/2 remote-origin enable
3 Configure the LBD transmission timer by using the loopback-detection service-access command. For
example:
-> loopback-detection transmission-timer 200
4 To change the auto-recovery timer for Loopback detection, use the command loopback-detection
autorecovery-timer. By default, the violation recovery time is 300 seconds.
-> loopback-detection autorecovery-timer 600
Note. Optional. Verify the LBD global configuration by entering the loopback-detection autorecovery-
timer configuration command or verify the LBD configuration on a port by entering the show loopback-
detection port command. For example:
To verify the LBD statistics of a port, use the show loopback-detection statistics port command. For
example:
page 8-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Loopback Detection Quick Steps for Configuring LBD
See the OmniSwitch AOS Release 8 CLI Reference Guide for information about the fields in this display.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 8-5
LBD Overview Configuring Loopback Detection
LBD Overview
Loopback Detection (LBD) automatically detects and prevents L2 forwarding loops on a port. LBD
operates in addition to STP which detects forwarding loops. When a loopback is detected, the port is
disabled and goes into a shutdown state. A trap is sent and the event is logged.
When enabling and configuring Loopback Detection:
• Enable Loopback Detection globally on the switch.
The switch periodically sends out LBD frame from loopback detection enabled port and concludes that the
port is looped back if it receives the frame on any of the loop-back detection enabled ports.
Remote-origin LBD can be enabled and configured per port to process the LBD frames received from a
remote system.
For service-access ports, LBD detects the loop for all the LBD edge ports involved.
Transmission Timer
Transmission timer is the time duration in seconds at which the port sends LBD frame on the link. When
any port is getting blocked due to loopback detection, there will be no further transmission and receiving
of any traffic on the blocked port. The port will be go to shutdown state.
By default, the transmission timer for loopback detection is 30 seconds.
The following scenario shows the operation of the remote-origin LBD functionality:
page 8-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Loopback Detection Remote-origin LBD Overview
VC1
In the two systems VC1 and VC2, VC1 has both default LBD and remote origin LBD enabled globally
and at the interface level (3/4). On VC2 only the default LBD is enabled globally and at interface level.
When LBD frame is transmitted from VC2 (1/4) to VC1 (3/4) the remote LBD frame is processed in VC1,
the MAC address of the transmitting system is recorded and the receiving port (3/4) is moved to shut
down.
When LBD frame is transmitted from VC1 (3/1) to VC2 (1/1) the LBD frame is dropped as the remote-
origin LBD is not enabled.
Note. In case, if remote-origin LBD is enabled on both the systems, the system which receives the first
remote LBD frame will shut down the port.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 8-7
Interaction With Other Features Configuring Loopback Detection
Link Aggregation
When loopback is detected on any one of the Linkagg port, all the ports of the linkagg will be shutdown
due to loopback detection.
page 8-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Loopback Detection Configuring LBD
Configuring LBD
This section describes how to use Alcatel-Lucent Command Line Interface (CLI) commands to configure
LBD on a switch.
• Enable LBD on a switch or port (see “Enabling LBD” on page 8-9)
• Enable remote-origin LBD on a switch or port (see“Enabling Remote-origin LBD” on page 8-9)
• Configure the LBD transmission timer (see “Configuring the LBD Transmission Timer” on page 8-10)
• View the LBD statistics on a port (see “Viewing LBD Statistics” on page 8-10)
• Recover a port from LBD shutdown (see “Recovering a Port from LBD Shutdown” on page 8-10)
Enabling LBD
By default, LBD is disabled on the switch. To enable LBD on a switch, use the loopback-detection
command. For example, the following command enables LBD on a switch:
-> loopback-detection enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 8-9
LBD for Service Access Interface Configuring Loopback Detection
To enable remote-origin LBD on multiple ports, specify a range of ports. For example:
-> loopback-detection port 3/1/1-8 remote-origin enable
Note. See “Remote-origin LBD Overview” on page 8-6 for more details.
page 8-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Loopback Detection LBD for Service Access Interface
LBD can be configured for linkagg only if the linkagg is of the type service-access. For example, the
following command enables LBD on linkagg 1:
-> loopback-detection service-access linkagg 1 enable
• LBD cannot be configured on linkagg which has member ports running LBD configuration and vice
versa.
• When a linkagg is in violation or shutdown state, the member ports cannot be deleted from the linkagg.
Note. Before configuring the LBD using the “service-access” option the port or linkagg must be configured
for service access. Use the service access command, to configure the port or linkagg for service access.
When LBD is enabled on ports without the 'service-access' keyword, the LBD behaves as normal LBD
feature.
1 If Virtual Private (VP) or Virtual Forwarding Instance (VFI) information is present in the packet
driver, then the LBD packet is processed else the packet is dropped.
2 The initiator session identifier (ISID) of the packet is extracted from the VP or VFI information and
compared with the LBD packet TLV ISID. If the ISID does not match, the packet is dropped.
3 If ISID matches, then the LBD packet TLV path cost is compared with the receiving LBD service
access port path cost. If the LBD path cost is lesser, the receiving access port is shut down. If LBD path
cost is higher, then the packet is dropped.
4 If path costs are equal, then LBD packet bridge MAC and receiving access port bridge MAC is
compared. If LBD packet bridge MAC is lesser, then the receiving access port is shutdown. If LBD Bridge
MAC is higher, then the packet is dropped.
5 If LBD packet bridge MAC and receiving access port bridge MAC are same (that is, same switch),
then LBD packet port ID and access port ID is compared. If LBD packet port ID is lesser, then the
receiving access port is shutdown. If LBD packet port ID is higher, then the packet is dropped.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 8-11
LBD for Service Access Interface Configuring Loopback Detection
Sample Scenarios
Scenario 1
• 1/2 and 2/2 are SAP ports having same ISID and path cost.
• Loopback-detection is enabled with option 'service-access' on ports 1/2 and 2/2; traffic loops through 1/
2 and 2/2.
• Port 2/2 is shutdown in case B has higher bridge identifier, since 1/2 and 2/2 has equal path costs.
page 8-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Loopback Detection LBD for Service Access Interface
Scenario 2
• 1/2 and 1/3 are SAP ports having same ISID and path cost.
• Loopback-detection is enabled with option 'service-access' on ports 1/2 and 1/3; traffic loops through
1/2 and 1/3.
• Port 1/3 is shutdown as the interface has higher port identifier, since 1/2 and 1/3 has equal path costs.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 8-13
Verifying the LBD Configuration Configuring Loopback Detection
loopback-detection autorecovery- Displays the global LBD configuration information for the switch.
timer
show loopback-detection port Displays LBD configuration information for all ports on the switch.
show loopback-detection statistics Displays LBD statistics information for a specific port on the switch.
port
For more information about the resulting display from these commands, see the OmniSwitch AOS Release
8 CLI Reference Guide.
page 8-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
9 Configuring Static Link
Aggregation
Alcatel-Lucent’s static link aggregation software allows you to combine several physical links into one
large virtual link known as a link aggregation group. Using link aggregation provides the following
benefits:
• Scalability. It is possible to configure a maximum number of link aggregation groups as mentioned in
the “Static Link Aggregation Specifications” table that consist of multiple Ethernet links.
• Reliability. A link aggregate can operate even if one of the physical links, that is part of the link
aggregate group, gets disabled.
• Ease of Migration. Link aggregation can ease the transition from 100-Mbps Ethernet backbones to
Gigabit or 10-Gigabit Ethernet backbones.
In This Chapter
This chapter describes the basic components of static link aggregation and how to configure them through
the Command Line Interface (CLI). CLI commands are used in the configuration examples; for more
details about the syntax of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Configuration procedures described in this chapter include:
• “Configuring Static Link Aggregation Groups” .
Note. You can also configure and monitor static link aggregation with WebView, Alcatel-Lucent’s embed-
ded web-based device management application. WebView is an interactive and easy-to-use GUI that can be
launched from OmniVista or a web browser. Please refer to the WebView online documentation for more
information on configuring and monitoring static link aggregation with WebView.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 9-1
Static Link Aggregation Specifications Configuring Static Link Aggregation
page 9-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Static Link Aggregation Quick Steps for Configuring Static Link Aggregation
1 Create the static aggregate link on the local switch with the linkagg static agg size command. For
example:
-> linkagg static agg 1 size 4
2 Assign all the necessary ports with the linkagg static port agg command. For example:
3 Create a VLAN for this static link aggregate group with the vlan members command. For example:
4 Create the equivalent static aggregate link on the remote switch with the linkagg static agg size
command. For example:
-> linkagg static agg 1 size 4
5 Assign all the necessary ports with the linkagg static port agg command. For example:
6 Create a VLAN for this static link aggregate group with the vlan members command. For example:
Note. Optional. You can verify your static link aggregation settings with the linkagg range command
along with the agg keyword and aggregate group ID. For example:
-> show linkagg agg 1
Static Aggregate
SNMP Id : 40000001,
Aggregate Number : 1,
SNMP Descriptor : Omnichannel Aggregate Number 1 ref 40000001 size
4,
Name : ,
Admin State : ENABLED,
Operational State : UP,
Aggregate Size : 4,
Number of Selected Ports : 4,
Number of Reserved Ports : 4,
Number of Attached Ports : 4,
Primary Port : 1/1/1
You can also use the show linkagg port port command to display information on specific ports. See “Dis-
playing Static Link Aggregation Configuration and Statistics” on page 9-11 for more information on the
show commands.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 9-3
Quick Steps for Configuring Static Link Aggregation Configuring Static Link Aggregation
An example of what these commands look like entered sequentially on the command line on the local
switch:
-> linkagg static agg 1 size 4
-> linkagg static port 1/1/1-4 agg 1
-> vlan 10 port default 1
And an example of what these commands look like entered sequentially on the command line on the
remote switch:
-> linkagg static agg 1 size 4
-> linkagg static port 1/1/9-12 agg 1
-> vlan 10 port default 1
page 9-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Static Link Aggregation Static Link Aggregation Overview
This chapter describes static link aggregation. For information on dynamic link aggregation, please refer
to Chapter 10, “Configuring Dynamic Link Aggregation.”
Static Group
Example of a Static Link Aggregate Group Network
See “Configuring Static Link Aggregation Groups” on page 9-6 for information on using Command Line
Interface (CLI) commands to configure static aggregate groups and see “Displaying Static Link
Aggregation Configuration and Statistics” on page 9-11 for information on using CLI to monitor static
aggregate groups.
• 802.1Q. For more information on configuring and monitoring 802.1Q see Chapter 4, “Configuring
VLANs.”
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 9-5
Configuring Static Link Aggregation Groups Configuring Static Link Aggregation
• Spanning Tree. For more information on Spanning Tree see Chapter 9, “Configuring Static Link
Aggregation.”
Note. See “Application Example” on page 9-10 for tutorials on using link aggregation with other features.
Note. See “Quick Steps for Configuring Static Link Aggregation” on page 9-3 for a brief tutorial on config-
uring these mandatory parameters.
Alcatel-Lucent’s link aggregation software is preconfigured with the default values for static aggregate
groups as shown in the table in “Static Link Aggregation Default Values” on page 9-2. If you need to
modify any of these parameters, please see “Modifying Static Aggregation Group Parameters” on page 9-9
for more information.
Note. See the “Link Aggregation Commands” chapter in the OmniSwitch AOS Release 8 CLI Reference
Guide for complete documentation of CLI commands for link aggregation.
1 Create the Static Aggregate Group on the Local and Remote Switches. To create a static aggregate
group use the linkagg static agg size command, which is described in “Creating and Deleting a Static
Link Aggregate Group” on page 9-7.
2 Assign Ports on the Local and Remote Switches to the Static Aggregate Group. To assign ports to
the static aggregate group you use the linkagg static port agg command, which is described in “Adding
and Deleting Ports in a Static Aggregate Group” on page 9-7.
Note. Depending on the needs of your network you need to configure additional parameters. Commands to
configure optional static aggregate parameters are described in “Modifying Static Aggregation Group
Parameters” on page 9-9.
page 9-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Static Link Aggregation Configuring Static Link Aggregation Groups
As an option you can also specify a name and/or the administrative status of the group by entering linkagg
static agg followed by the user-specified aggregate number, size, the number of links in the static
aggregate group, name, the optional name, admin-state, and either enable or disable (the default is
enable).
For example, to create static aggregate group 5 called “static1” consisting of eight links that is
administratively disabled enter:
-> linkagg static agg 5 size 8 name static1 admin-state disable
Note. You must delete any attached ports with the linkagg static port agg command before you can delete
a static link aggregate group.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 9-7
Configuring Static Link Aggregation Groups Configuring Static Link Aggregation
For example, to assign port 1/1/4 to static aggregate group 10, enter:
-> linkagg static port 1/1/4 agg 10
page 9-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Static Link Aggregation Modifying Static Aggregation Group Parameters
• Static aggregate group administrative state (see “Modifying the Static Aggregate Group Administrative
State” on page 9-9)
Note. If you want to specify spaces within a name for a static aggregate group the name must be specified
within quotes (for example, “Static Aggregate Group 4”).
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 9-9
Application Example Configuring Static Link Aggregation
Application Example
Static link aggregation groups are treated by the switch software the same way it treats individual
physical ports. This section demonstrates this by providing a sample network configuration that uses static
link aggregation along with other software features. In addition, a tutorial is provided that shows how to
configure this sample network using Command Line Interface (CLI) commands.
The figure below shows VLAN 8, which has been configured on static aggregate 1 and uses 802.1Q
tagging. The actual physical links connect ports 4/1/1, 4/1/2, 4/1/3, and 4/1/4 on Switch A to port 2/1/41,
2/1/42, 2/1/43, and 2/1/44 on Switch B.
Switch A Switch B
Note. Only the steps to configure the local (i.e., Switch A) switch are provided here since the steps to con-
figure the remote (i.e., Switch B) switch are similar.
1 Configure static aggregate group 1 by entering linkagg static agg 1 size 4 as shown below:
2 Assign ports 4/1/1, 4/1/2, 4/1/3, and 4/1/4 to static aggregate group 1 by entering:
-> vlan 8
4 Configure 802.1Q tagging with a tagging ID of 8 on static aggregate group 1 (on VLAN 8) by entering:
5 Repeat steps 1 through 4 on Switch B. Substitute the port numbers of the commands with the
appropriate port numbers of Switch B.
page 9-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Static Link Aggregation Displaying Static Link Aggregation Configuration and Statistics
When you use the show linkagg command without specifying the link aggregation group number and
when you use the show linkagg port command without specifying the port number these commands
provide a “global” view of switch-wide link aggregate group and link aggregate port
information, respectively.
For example, to display global statistics on all link aggregate groups (both static and dynamic), enter:
-> show linkagg
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+--------+--------+-----+-----------+----------+-------+-----+
1 Static 40000001 4 ENABLED DOWN 0 0
2 Static 40000002 8 ENABLED DOWN 0 0
10 Dynamic 40000010 8 ENABLED DOWN 0 0
For example, to display global statistics on all ports associated with link aggregate groups (both static and
dynamic), enter:
-> show linkagg port
When you use the show linkagg agg command with the link aggregation group number and when you use
the show linkagg port command with the port number these commands provide detailed views of link
aggregate group and link aggregate port information, respectively. These detailed views provide excellent
tools for diagnosing and troubleshooting problems.
For example, to display detailed statistics for port 4/1/1 that is attached to static link aggregate group 1,
enter:
-> show linkagg port 4/1/1
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 9-11
Displaying Static Link Aggregation Configuration and Statistics Configuring Static Link Aggregation
Note. See the “Link Aggregation Commands” chapter in the OmniSwitch AOS Release 8 CLI Reference
Guide for complete documentation of show commands for link aggregation.
page 9-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
10 Configuring Dynamic Link
Aggregation
Alcatel-Lucent’s dynamic link aggregation software allows you to combine several physical links into one
large virtual link known as a link aggregation group. Using link aggregation provides the following
benefits:
• Scalability. It is possible to configure up to a maximum number of link aggregation groups as
mentioned in “Dynamic Link Aggregation Specifications” on page 10-2, that consist of multiple
Ethernet links
• Reliability. If one of the physical links in a link aggregate group goes down (unless it is the last one)
the link aggregate group can still operate.
• Ease of Migration. Link aggregation can ease the transition from 100-Mbps Ethernet backbones to
Gigabit or 10-Gibabit Ethernet backbones.
In This Chapter
This chapter describes the basic components of dynamic link aggregation and how to configure them
through the Command Line Interface (CLI). CLI commands are used in the configuration examples; for
more details about the syntax of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Configuring dynamic link aggregation groups on “Configuring Dynamic Link Aggregate Groups” on
page 10-8.
• Configuring ports so they can be aggregated in dynamic link aggregation groups on “Configuring Ports
to Join and Removing Ports in a Dynamic Aggregate Group” on page 10-10.
• Modifying dynamic link aggregation parameters on “Modifying Dynamic Link Aggregate Group
Parameters” on page 10-12.
Note. You can also configure and monitor dynamic link aggregation with WebView, Alcatel-Lucent’s
embedded Web-based device management application. WebView is an interactive and easy-to-use GUI
that can be launched from OmniVista or a Web browser. Please refer to the WebView online documenta-
tion for more information on configuring and monitoring dynamic link aggregation with WebView.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-1
Dynamic Link Aggregation Specifications Configuring Dynamic Link Aggregation
page 10-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Dynamic Link Aggregation Default Values
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-3
Quick Steps for Configuring Dynamic Link Aggregation Configuring Dynamic Link Aggregation
1 Create the dynamic aggregate group on the local (actor) switch with the linkagg lacp agg size
command as shown below:
-> linkagg lacp agg 2 size 8 actor admin-key 5
2 Configure ports (the number of ports must be less than or equal to the size value set in step 1) with the
same actor administrative key (which allows them to be aggregated) with the linkagg lacp agg actor
admin-key command. For example:
-> linkagg lacp port 1/1/1 actor admin-key 5
-> linkagg lacp port 1/1/4 actor admin-key 5
-> linkagg lacp port 3/1/3 actor admin-key 5
-> linkagg lacp port 5/1/4 actor admin-key 5
-> linkagg lacp port 6/1/1-2 actor admin-key 5
-> linkagg lacp port 7/1/3 actor admin-key 5
-> linkagg lacp port 8/1/1 actor admin-key 5
3 Create a VLAN for this dynamic link aggregate group with the vlan command. For example:
4 Create the equivalent dynamic aggregate group on the remote (partner) switch with the linkagg lacp
agg size command as shown below:
-> linkagg lacp agg 2 size 8 actor admin-key 5
5 Configure ports (the number of ports must be less than or equal to the size value set in step 4) with the
same actor administrative key (which allows them to be aggregated) with the linkagg lacp agg actor
admin-key command. For example:
-> linkagg lacp port 1/2/1 actor admin-key 5
-> linkagg lacp port 1/3/1 actor admin-key 5
-> linkagg lacp port 3/1/3 actor admin-key 5
-> linkagg lacp port 3/1/6 actor admin-key 5
-> linkagg lacp port 5/1/1 actor admin-key 5
-> linkagg lacp port 5/1/6 actor admin-key 5
-> linkagg lacp port 8/1/1 actor admin-key 5
-> linkagg lacp port 8/1/3 actor admin-key 5
6 Create a VLAN for this dynamic link aggregate group with the vlan command. For example:
page 10-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Quick Steps for Configuring Dynamic Link Aggregation
Note. As an option, you can verify your dynamic aggregation group settings with the linkagg range com-
mand on either the actor or the partner switch. For example:
-> show linkagg agg 2
Dynamic Aggregate
SNMP Id : 40000002,
Aggregate Number : 2,
SNMP Descriptor : Dynamic Aggregate Number 2 ref 40000002 size 8,
Name : ,
Admin State : ENABLED,
Operational State : UP,
Aggregate Size : 8,
Number of Selected Ports : 8,
Number of Reserved Ports : 8,
Number of Attached Ports : 8,
Primary Port : 1/1/1,
LACP
MACAddress : [Link],
Actor System Id : [Link],
Actor System Priority : 0,
Actor Admin Key : 5,
Actor Oper Key : 0,
Partner System Id : [Link],
Partner System Priority : 0,
Partner Admin Key : 5,
Partner Oper Key : 0
You can also use the show linkagg port port command to display information on specific ports. See “Dis-
playing Dynamic Link Aggregation Configuration and Statistics” on page 10-29 for more information on
show commands.
An example of what these commands look like entered sequentially on the command line on the actor
switch:
-> linkagg lacp agg 2 size 8 actor admin-key 5
-> linkagg lacp port 1/1/1 actor admin-key 5
-> linkagg lacp port 1/1/4 actor admin-key 5
-> linkagg lacp port 3/1/3 actor admin-key 5
-> linkagg lacp port 5/1/4 actor admin-key 5
-> linkagg lacp port 6/1/1-2 actor admin-key 5
-> linkagg lacp port 7/1/3 actor admin-key 5
-> linkagg lacp port 8/1/1 actor admin-key 5
-> vlan 2 members linkagg 2 untagged
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-5
Dynamic Link Aggregation Overview Configuring Dynamic Link Aggregation
An example of what these commands look like entered sequentially on the command line on the partner
switch:
-> linkagg lacp agg 2 size 8 actor admin-key 5
-> linkagg lacp port 1/2/1 actor admin-key 5
-> linkagg lacp port 1/3/1 actor admin-key 5
-> linkagg lacp port 1/3/3 actor admin-key 5
-> linkagg lacp port 3/1/6 actor admin-key 5
-> linkagg lacp port 5/1/1 actor admin-key 5
-> linkagg lacp port 5/1/6 actor admin-key 5
-> linkagg lacp port 8/1/1 actor admin-key 5
-> linkagg lacp port 8/1/3 actor admin-key 5
-> vlan 2 members linkagg 2 untagged
This chapter describes dynamic link aggregation. For information on static link aggregation, please refer to
Chapter 9, “Configuring Static Link Aggregation.”
page 10-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Dynamic Link Aggregation Overview
Dynamic Group
See “Configuring Dynamic Link Aggregate Groups” on page 10-8 for information on using Command
Line Interface (CLI) commands to configure dynamic aggregate groups and see “Displaying Dynamic
Link Aggregation Configuration and Statistics” on page 10-29 for information on using the CLI to moni-
tor dynamic aggregate groups.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-7
Configuring Dynamic Link Aggregate Groups Configuring Dynamic Link Aggregation
• 802.1Q. For more information on configuring and monitoring 802.1Q, see Chapter 4, “Configuring
VLANs.”
• Spanning Tree. For more information on Spanning Tree, see Chapter 6, “Configuring Spanning Tree
Parameters.”
Note. See “Application Examples” on page 10-26 for tutorials on using link aggregation with other fea-
tures.
Note. See “Quick Steps for Configuring Dynamic Link Aggregation” on page 10-4 for a brief tutorial on
configuring these mandatory parameters.
Alcatel-Lucent’s link aggregation software is preconfigured with the default values for dynamic aggregate
groups and ports shown in the table in “Dynamic Link Aggregation Default Values” on page 10-3. For
most configurations, using only the steps described in “Creating and Deleting a Dynamic Aggregate
Group” on page 10-9 is necessary to configure a dynamic link aggregate group. However, if you need to
modify any of the parameters listed in the table on page 10-3, please see “Modifying Dynamic Link
Aggregate Group Parameters” on page 10-12 for more information.
Note. See the “Link Aggregation Commands” chapter in the OmniSwitch AOS Release 8 CLI Reference
Guide for complete documentation of show commands for link aggregation.
page 10-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Configuring Dynamic Link Aggregate Groups
1 Create the Dynamic Aggregate Groups on the Local (Actor) and Remote (Partner) Switches. To
create a dynamic aggregate group use the linkagg lacp agg size command, which is described in “Creat-
ing and Deleting a Dynamic Aggregate Group” on page 10-9.
2 Configure the Same Administrative Key on the Ports You Want to Join the Dynamic Aggregate
Group. To configure ports with the same administrative key (which allows them to be aggregated), use
the linkagg lacp agg actor admin-key command, which is described in “Configuring Ports to Join and
Removing Ports in a Dynamic Aggregate Group” on page 10-10.
Note. Depending on the needs of your network you need to configure additional parameters. Commands to
configure optional dynamic link aggregate parameters are described in “Modifying Dynamic Link Aggre-
gate Group Parameters” on page [Link] commands must be executed after you create a dynamic
aggregate group.
You can create up to 32 link aggregation (both static and dynamic) groups for a standalone switch and up
to 128 groups for a chassis-based switch. In addition, you can also specify optional parameters shown in
the table below. These parameters must be entered after size and the user-specified number of links.
For example, Alcatel-Lucent recommends assigning the actor admin key when you create the dynamic
aggregate group to help ensure that ports are assigned to the correct group. To create a dynamic aggregate
group with aggregate number 3 consisting of two ports with an admin actor key of 10, for example, enter:
-> linkagg lacp agg 3 size 2 actor admin-key 10
Note. The optional keywords for this command can be entered in any order as long as they are entered after
size and the user-specified number of links.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-9
Configuring Dynamic Link Aggregate Groups Configuring Dynamic Link Aggregation
Note. You cannot delete a dynamic aggregate group if it has any attached ports. To remove attached ports
you must disable the dynamic aggregate group with the linkagg lacp agg admin-state command, which is
described in “Disabling a Dynamic Aggregate Group” on page 10-13.
You must execute the linkagg lacp port actor admin-key command on all ports in a dynamic aggregate
group. If not, the ports are unable to join the group.
In addition, you can also specify optional parameters shown in the table below. These keywords must be
entered after the actor admin-key and the user-specified actor administrative key value.
Note. The actor admin-state and partner admin-state keywords have additional parameters, which are
described in “Modifying the Actor Port System Administrative State” on page 10-17 and “Modifying the
Partner Port System Administrative State” on page 10-21, respectively.
page 10-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Configuring Dynamic Link Aggregate Groups
All of the optional keywords listed above for this command can be entered in any order as long as they
appear after the actor admin-key keywords and their user-specified value.
For example, to configure actor administrative key of 10, a local system ID (MAC address) of
[Link], and a local priority of 65535 to port 4/1/1, enter:
-> linkagg lacp port 4/1/1 actor admin-key 10 actor system-id [Link]
actor system-priority 65535
Ports must be deleted in the reverse order in which they were configured. For example, if port 4/1/4
through 4/1/6 were configured to join dynamic aggregate group 2 you must first delete port 4/1/6, then
port 4/1/5, and so forth. The following is an example of how to delete ports in the proper sequence from
the console:
-> no linkagg lacp port 4/1/6
-> no linkagg lacp port 4/1/5
-> no linkagg lacp port 4/1/4
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-11
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
Note. You must create a dynamic aggregate group before you can modify group or port parameters. See
“Configuring Dynamic Link Aggregate Groups” on page 10-8 for more information.
• Group administrative state (see “Modifying the Dynamic Aggregate Group Administrative State” on
page 10-13)
• Group local (actor) switch actor administrative key (see “Configuring and Deleting the Dynamic
Aggregate Group Actor Administrative Key” on page 10-14)
• Group local (actor) switch system priority (see “Modifying the Dynamic Aggregate Group Actor
System Priority” on page 10-14)
• Group local (actor) switch system ID (see “Modifying the Dynamic Aggregate Group Actor System
ID” on page 10-15)
• Group remote (partner) administrative key (see “Modifying the Dynamic Aggregate Group Partner
Administrative Key” on page 10-15)
• Group remote (partner) system priority (see “Modifying the Dynamic Aggregate Group Partner System
Priority” on page 10-16)
• Group remote (partner) switch system ID (see “Modifying the Dynamic Aggregate Group Partner
System ID” on page 10-16)
page 10-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
Note. If you want to specify spaces within a name, the name must be enclosed in quotes. For example:
-> linkagg lacp agg 4 name "Engineering Lab"
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-13
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
page 10-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-15
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
page 10-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
• Actor port system priority (see “Modifying the Actor Port System Priority” on page 10-19)
• Actor port priority (see “Modifying the Actor Port Priority” on page 10-20)
Note. See “Configuring Ports to Join and Removing Ports in a Dynamic Aggregate Group” on page 10-10
for information on modifying a dynamic aggregate group administrative key. A port can belong to only one
aggregate group.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-17
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
Note. Specifying none removes all administrative states from the LACPDU configuration. For example:
-> linkagg lacp port 5/1/49 actor admin-state none
For example, to set bits 0 (active) and 2 (aggregate) on dynamic aggregate actor port 5/1/49 you would
enter:
-> linkagg lacp port 5/1/49 actor admin-state active aggregate
For example, to set bits 0 (active) and 2 (aggregate) on dynamic aggregate actor port 5/1/49, enter:
-> linkagg lacp port 5/1/49 actor admin-state active aggregate
page 10-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
Note. Since individual bits with the LACPDU frame are set with the linkagg lacp agg actor admin-state
command you can set some bits on and restore other bits within the same command. For example, if you
wanted to restore bit 2 (aggregate) to its default settings and set bit 0 (active) on dynamic aggregate actor
port 5/1/49 you would enter:
-> no linkagg lacp agg 5/1/49 actor admin-state active aggregate
For example, to modify the system ID of the dynamic aggregate actor port 7/1//3 to [Link]
and document that the port is 10 Mbps Ethernet you would enter:
-> linkagg lacp port 7/1/3 actor system-id [Link]
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-19
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
For example, to modify the system priority of dynamic aggregate actor port 2/1/5 to 200, enter:
-> linkagg lacp port 2/1/5 actor system-priority 200
For example, to modify the actor port priority of dynamic aggregate actor port 2/1/1 to 100, enter:
-> linkagg lacp port 2/1/1 actor port-priority 100
page 10-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
• Partner port system ID (see “Modifying the Partner Port System ID” on page 10-23)
• Partner port system priority (see “Modifying the Partner Port System Priority” on page 10-24)
• Partner port administrative state (see “Modifying the Partner Port Administrative Status” on
page 10-24)
• Partner port priority (see “Modifying the Partner Port Priority” on page 10-25)
See Chapter 1, “Configuring Ethernet Ports,” for information on configuring Ethernet ports.
Keyword Definition
active Specifies that bit 0 in LACPDU frames is set, which indicates that the
link is able to exchange LACPDU frames. By default, this bit is set.
timeout Specifies that bit 1 in LACPDU frames is set, which indicates that a
short time-out is used for LACPDU frames. When this bit is disabled, a
long time-out is used for LACPDU frames. By default, this bit is set.
aggregate Specifies that bit 2 in LACPDU frames is set, which indicates that the
system considers this link to be a potential candidate for aggregation. If
this bit is not set, the system considers the link to be individual (it can
only operate as a single link). By default, this bit is set.
synchronize Specifies that bit 3 in the partner state octet is enabled. When this bit is
set, the port is allocated to the correct dynamic aggregation group. If
this bit is not enabled, the port is not allocated to the correct
aggregation group. By default, this value is disabled.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-21
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
Keyword Definition
collect Specifying this keyword has no effect because the system always
determines its value. When this bit (bit 4) is set by the system,
incoming LACPDU frames are collected from the individual ports that
make up the dynamic aggregate group.
distribute Specifying this keyword has no effect because the system always
determines its value. When this bit (bit 5) is set by the system,
distributing outgoing frames on the port is disabled.
default Specifying this keyword has no effect because the system always
determines its value. When this bit (bit 6) is set by the system, it
indicates that the partner is using defaulted actor information
administratively configured for the partner.
expire Specifying this keyword has no effect because the system always
determines its value. When this bit (bit 7) is set by the system, the actor
cannot receive LACPDU frames.
Note. Specifying none removes all administrative states from the LACPDU configuration. For example:
-> linkagg lacp port 7/1/49 partner admin-state none
For example, to set bits 0 (active) and 2 (aggregate) on dynamic aggregate partner port 7/1/49, enter:
-> linkagg lacp port 7/1/49 partner admin-state active aggregate
For example, to set bits 0 (active) and 2 (aggregate) on dynamic aggregate partner port 7/1/49 and docu-
ment that the port is a Gigabit Ethernet port, enter:
-> linkagg lacp port 7/1/49 partner admin-state active aggregate
Note. Since individual bits with the LACPDU frame are set with the linkagg lacp port partner admin
state command you can set some bits on and restore other bits to default values within the same command.
For example, if you wanted to restore bit 2 (aggregate) to its default settings and set bit 0 (active) on
dynamic aggregate partner port 7/1/1, enter:
-> no linkagg lacp port 7/1/1 partner admin-state active aggregate
page 10-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
For example, to modify the administrative key of a dynamic aggregate group partner port 6/1/1, enter:
-> linkagg lacp port 6/1/1 partner admin-key 1000
For example, to modify the system ID of dynamic aggregate partner port 6/1/49 to [Link],
enter:
-> linkagg lacp port 6/1/49 partner admin system-id [Link]
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-23
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
page 10-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
For example, to modify the port priority of dynamic aggregate partner port 4/1/3 to 100, enter:
-> linkagg lacp port 4/1/3 partner admin-port priority 100
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-25
Application Examples Configuring Dynamic Link Aggregation
Application Examples
Dynamic link aggregation groups are treated by the software on the switch as similar to individual
physical ports. This section demonstrates the dynamic link aggregation feature by providing sample
network configurations that use dynamic aggregation along with other software features. In
addition, tutorials are provided that show how to configure these sample networks by using Command
Line Interface (CLI) commands.
Switch A
Dynamic Aggregate
Group 5
VLAN 10 has been configured to
use this group with Spanning
Tree with a priority of 15.
Switch C
Dynamic Aggregate
Group 7
VLAN 12 with 802.1Q tagging
using 802.1p priority has been
configured to use this group.
The steps to configure VLAN 10 (Spanning Tree example) are described in “Link Aggregation and Span-
ning Tree Example” on page 10-27. The steps to configure VLAN 12 (802.1Q and 802.1p example) are
described in “Link Aggregation and QoS Example” on page 10-28.
Note. Although you need to configure both the local ( Switch A) and remote ( Switches B and C) switches,
only the steps to configure the local switch are provided since the steps to configure the remote switches are
similar.
page 10-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Application Examples
Note. Only the steps to configure the local ( Switch A) are provided here since the steps to configure the
remote ( Switch B) are similar.
2 Configure ports 5/1/5 and 5/1/6 with the same actor administrative key (5) by entering:
-> vlan 10
4 If the Spanning Tree Protocol (STP) has been disabled on this VLAN (STP is enabled by default),
enable it on VLAN 10 by entering:
5 Configure VLAN 10 (which uses dynamic aggregate group 5) to the highest (15) priority possible by
entering:
-> spantree vlan 10 linkagg 5 priority 15
6 Repeat steps 1 through 5 on Switch B. Substitute the port numbers of the commands with the
appropriate port numbers of Switch B.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-27
Application Examples Configuring Dynamic Link Aggregation
Note. Only the steps to configure the local ( Switch A) switch are provided here since the steps to
configure the remote ( Switch C) switch would not be significantly different.
2 Configure ports 4/1/1, 4/1/2, 4/1/3, and 4/1/4 the same actor administrative key (7) by entering:
-> vlan 12
4 Configure 802.1Q tagging with a tagging ID ( VLAN ID) of 12 on dynamic aggregate group 7 by
entering:
-> vlan 12 members 7 tagged
5 If the QoS Manager has been disabled (it is enabled by default) enable it by entering:
Note. Optional. Use the show qos config command to determine if the QoS Manager is enabled or dis-
abled.
7 Configure an 802.1p policy action with the highest priority possible (7) for VLAN 12 called
“vlan12_action” by entering:
-> policy action vlan12_action 802.1P 7
8 Configure a QoS rule called “vlan12_rule” by using the policy condition and policy rules you
configured in steps 8 and 9 above by entering:
-> policy rule vlan12_rule enable condition vlan12_condition action
vlan12_action
9 Enable your 802.1p QoS settings by entering qos apply as shown below:
10 Repeat steps 1 through 9 on Switch C. Use the same commands as mentioned in the previous steps.
Substitute the port numbers of the commands with the appropriate port numbers of Switch C.
page 10-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dynamic Link Aggregation Displaying Dynamic Link Aggregation Configuration and Statistics
Note. If you do not use the qos apply command any QoS policies previously configured, are lost on the
next switch reboot.
When you use the show linkagg command without specifying the link aggregation group number and
when you use the show linkagg port command without specifying the port number, these commands
provide a “global” view of switch-wide link aggregate group and link aggregate port information,
respectively.
For example, to display global statistics on all link aggregate groups (both dynamic and static), enter:
-> show linkagg
When you use the show linkagg command with the agg keyword and the link aggregation group number
and when you use the show linkagg port command with the port number, these commands provide
detailed views of the link aggregate group and port information, respectively. These detailed views
provide excellent tools for diagnosing and troubleshooting problems.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 10-29
Displaying Dynamic Link Aggregation Configuration and Statistics Configuring Dynamic Link Aggregation
For example, to display detailed statistics for port 2/1/1 that is attached to dynamic link aggregate group 1,
enter:
-> show linkagg port 2/1/1
See the “Link Aggregation Commands” chapter in the OmniSwitch AOS Release 8 CLI Reference Guide
for complete documentation of show commands for link aggregation
page 10-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
11 Configuring Dual-Home
Links
Dual-Home Link (DHL) is a high availability feature that provides fast failover between core and edge
switches without implementing Spanning Tree. The OmniSwitch provides the following method for
implementing a DHL solution:
DHL Active-Active—an edge technology that splits a number of VLANs between two active links. The
forwarding status of each VLAN is modified by DHL to prevent network loops and maintain connectivity
to the core when one of the links fails. This solution does not require link aggregation.
In This Chapter
This chapter describes the basic components of DHL solutions and how to configure them through the
Command Line Interface (CLI). CLI commands are used in the configuration examples; for more details
about the syntax of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Information and procedures described in this chapter include:
• “Dual-Home Link Specifications” on page 11-2.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 11-1
Dual-Home Link Specifications Configuring Dual-Home Links
page 11-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dual-Home Links Dual-Home Link Active-Active
• Two DHL links associated with the session (link A and link B). A physical switch port or a logical link
aggregate (linkagg) ID are configurable as a DHL link.
• A group of VLANs (or pool of common VLANs) in which each VLAN is associated (802.1q tagged)
with both link A and link B.
• A VLAN-to-link mapping that specifies which of the common VLANs each DHL link services. This
mapping prevents network loops by designating only one active link for each VLAN, even though both
links remain active and are associated with each of the common VLANs.
When one of the two active DHL links fails or is brought down, the VLANs mapped to that link are then
forwarded on the remaining active link to maintain connectivity to the core. When the failed link comes
back up, DHL waits a configurable amount of time before the link resumes forwarding of its assigned
VLAN traffic.
The following diagram shows how DHL works when operating in a normal state (both links up) and when
operating in a failed state (one link is down):
Edge Edge
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 11-3
Dual-Home Link Active-Active Configuring Dual-Home Links
Protected VLANs
A protected VLAN is one that is assigned to both links in a DHL session. This means that if the link to
which the VLAN is mapped fails, the VLAN is moved to the other active DHL link to maintain
connectivity with the core switches.
Any VLAN that is only assigned to one of the DHL links is considered an unprotected VLAN. This type
of VLAN is not eligible for DHL support if the link to which the VLAN is assigned fails.
• LPS ports
• NNI ports
• Mobile ports
• 802.1x ports
• GVRP ports.
• UNI ports
Note. No CLI error message is displayed when DHL is configured using a port type that is not supported.
page 11-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dual-Home Links Dual-Home Link Active-Active
topology change event and the MAC address table is not automatically flushed. This can create stale MAC
address entries that are looking for end devices over the wrong link.
To avoid stale MAC address entries in the forwarding tables of the core switches, some type of
communication needs to occur between the edge uplink switch and the core switches. The DHL Active-
Active feature provides two methods for clearing stale MAC address entries: MVRP Enhanced Operation
or Raw Flooding. Selecting which one of these methods to use is done on a per-DHL session basis.
Raw Flooding
When a DHL link fails or recovers and Raw Flooding is enabled for the DHL session, the switch performs
the following tasks to trigger MAC movement:
• Identify a list of MAC addresses within the effected VLANs that were learned on non-DHL ports
(MAC addresses that were reachable through the effected VLANs).
• Create a tagged packet for each of these addresses. The SA for the packet is one of the MAC addresses
from the previously-generated list; the VLAN tag is the resident VLAN for the MAC address; the DA
is set for broadcast (all Fs); the body is just filler.
• Transmit the generated packet once for each VLAN-MAC address combination. These packets are sent
on the link that takes over for the failed link or on a link that has recovered from a failure.
The MAC movement triggered by the Raw Flooding method clears any stale MAC entries. However,
flooded packets are often assigned a low priority and the switch may filter such packets in a highly utilized
network.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 11-5
Dual-Home Link Active-Active Configuring Dual-Home Links
• Do not change the link assignments for the DHL session while the session is enabled.
• Configuring a MAC address flush method (MVRP or Raw Flooding) is recommended if the DHL
session ports span across switch modules. This configuration improves convergence time.
• Enabling the registrar mode as “forbidden” is recommended before MVRP is enabled on DHL links.
1 Configure a set of VLANs that the two DHL session links service.
2 Identify two ports or link aggregates that serve as the links for the DHL session then assign both links
to the same default VLAN. Make sure the default VLAN is one of the VLANs created in Step 1. For
example, the following commands assign VLAN 100 as the default VLAN for port 1/1/10 and linkagg 5:
-> vlan 100 members port 1/1/10 untagged
-> vlan 100 members linkagg 5 untagged
3 Associate (802.1q tag) the ports identified in Step 2 to each one of the VLANs created in Step 1, except
for the default VLAN already associated with each port. For example, the following commands associate
port 1/1/10 and linkagg 5 with VLANs 101-110:
-> vlan 101-110 members port 1/1/10 tagged
-> vlan 101-110 members linkagg 5 tagged
In the above command example, port 1/1/10 and linkagg 5 are only tagged with VLANs 101-110 because
VLAN 100 is already the default VLAN for both ports.
4 Create a DHL session using the dhl name command. For example:
-> dhl 10
5 Configure the pre-emption (recovery) timer for the DHL session using the dhl num pre-emption-time
command. By default, the timer is set to 30 seconds, so it is only necessary to change this parameter if the
default value is not sufficient. For example, the following command changes the timer value 500 seconds:
page 11-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dual-Home Links Dual-Home Link Active-Active
6 Configure the MAC address flushing method for the DHL session using the dhl num mac-flushing
command and specify either the raw or mvrp parameter option. By default, the MAC flushing method is
set to none. For example, the following command selects the MVRP method:
-> dhl 10 mac-flushing mvrp
7 Configure two links (linkA and linkB) for the DHL session using the dhl num linka linkb command.
Specify the ports identified in Step 1 as linkA and linkB. For example:
-> dhl 10 linka linkagg 5 linkb port 1/1/10
8 Select VLANs from the set of VLANs created in Step 2 and map those VLANs to linkB using the dhl
num vlan-map linkb command. Any VLAN not mapped to linkB is automatically mapped to linkA. By
default, all VLANs are mapped to linkA. For example, the following command maps VLANs 11-20 to
linkB:
-> dhl 10 vlan-map linkb 11-20
9 Administratively enable the DHL session using the dhl num admin-state command. For example:
See “Dual-Home Link Active-Active Example” on page 11-8 for a DHL application example.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 11-7
Dual-Home Link Active-Active Configuring Dual-Home Links
2 Configure 802.1q tagging on VLANs 2-10 for port 1/1/10. Because VLAN 1 is the default VLAN for
port 1/1/10, there is no need to tag VLAN 1.
-> vlan 2-10 members port 1/1/10 tagged
3 Configure 802.1q tagging on the VLANs 2-10 for port 1/1/12. Because VLAN 1 is the default VLAN
for port 1/1/12, there is no need to tag VLAN 1.
-> vlan 2-10 members port 1/1/12 tagged
page 11-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dual-Home Links Dual-Home Link Active-Active
5 Configure port 1/1/10 and port 1/1/12 as the dual-home links (linkA, linkB) for the DHL session.
7 Specify Raw Flooding as the MAC flushing technique to use for this DHL session.
8 Enable the administrative state of the DHL session using the following command:
Core Switches:
2 Configure 802.1q tagging on VLANs 2-10 for port 1/10 on the Core 1 switch. VLAN 1 is the default
VLAN for port 1/10, so there is no need to tag VLAN 1.
-> vlan 2-10 members port 1/1/10 tagged
Core 1 Switch:
-> vlan 2-10
Core 2 Switch:
-> vlan 2-10
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 11-9
Dual-Home Link Active-Active Configuring Dual-Home Links
In the above topology, all uplinked switches are connected to the core network through redundant links,
and the links are configured to use DHL Active-Active. Spanning Tree is disabled on all the DHL enabled
ports of the uplinked devices.
page 11-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Dual-Home Links Dual-Home Link Active-Active
In the above topology, the link between the uplink device other than core network is not recommended as
it creates a loop in the network. This topology violates the principle that uplink switches can only be
connected to the network cloud through the core network.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 11-11
Displaying the Dual-Home Link Configuration Configuring Dual-Home Links
Note. See the “Link Aggregation Commands” chapter in the OmniSwitch AOS Release 8 CLI Reference
Guide for complete documentation of show commands for link aggregation.
page 11-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
12 Configuring ERP
The ITU-T G.8032/Y.1344 Ethernet Ring Protection (ERP) switching mechanism is a self-configuring
algorithm that maintains a loop-free topology while providing data path redundancy and network
scalability. ERP provides fast recovery times for Ethernet ring topologies by utilizing traditional Ethernet
MAC and bridge functions.
Loop prevention is achieved by allowing traffic to flow on all except one of the links within the protected
Ethernet ring. This link is blocked and is referred to as the Ring Protection Link (RPL). When a ring
failure condition occurs, the RPL is unblocked to allow the flow of traffic to continue through the ring.
Alcatel-Lucent OmniSwitch also supports ERPv2 according to the ITU-T recommendation G.8032 03/
2010. ERPv2 implementation helps maintain a loop-free topology in multi-ring and ladder networks that
contain interconnection nodes, interconnected shared links, master rings and sub-rings.
The following chapter details the different functionalities and configuration settings required for ERP and
ERPv2.
In This Chapter
This chapter provides an overview about how Ethernet Ring Protection (ERP) works and how to configure
its parameters through the Command Line Interface (CLI). CLI commands are used in the configuration
examples; for more details about the syntax of commands, see the OmniSwitch AOS Release 8 CLI
Reference Guide.
The following information and configuration procedures are included in this chapter:
• “ERP Overview” on page 12-4.
• “Quick Steps for Configuring ERP with Standard VLANs” on page 12-11.
• “Quick Steps for Configuring ERP with VLAN Stacking” on page 12-12
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-1
ERP Specifications Configuring ERP
ERP Specifications
The following table specifies the ERP related specifications:
page 12-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP ERP Defaults
ERP Defaults
Parameter Description Command Default
ERP ring status erp-ring Disabled
RPL status for the node erp-ring rpl-node Disabled
The wait-to-restore timer value for erp-ring wait-to-restore 5 minutes
the RPL node
The guard-timer value for the ring erp-ring guard-timer 50 centi-seconds
node
The NNI-SVLAN association type ethernet-service svlan nni STP
ERPv2 Defaults
The Ethernet Ring Protection (ERP) erp-ring virtual-channel Enabled
Ring Virtual Channel.
Revertive mode on a specified node. erp-ring revertive Enabled
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-3
ERP Overview Configuring ERP
ERP Overview
Ethernet Ring Protection (ERP) is a protection switching mechanism for Ethernet ring topologies, such as
multi-ring and ladder networks. This implementation of ERP is based on the Recommendation ITU-T
G.8032/Y.1344 and uses the ring Automatic Protection Switching (APS) protocol to coordinate the
prevention of network loops within a bridged Ethernet ring.
Loop prevention is achieved by allowing the traffic to flow on all but one of the links within the protected
Ethernet ring. This link is blocked and is referred to as the Ring Protection Link (RPL). When a ring
failure condition occurs, the RPL is unblocked to allow the flow of traffic to continue through the ring.
One designated node within the ring serves as the RPL owner and is responsible for blocking the traffic
over the RPL. When a ring failure condition occurs, the RPL owner is responsible for unblocking the RPL
so that the link can forward traffic to maintain ring connectivity.
The ERPv2 capability supports multi-ring and ladder networks with interconnection nodes, interconnected
shared links, master rings and sub-rings. The following features are also supported:
• R-APS Virtual Channel
• Revertive/Non-Revertive modes
A shared link can be a part of one master ring. The sub-rings connected to the interconnection nodes are
open. The sub-rings cannot use shared links.
page 12-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP ERP Overview
CCM—When an Ethernet ring contains no ERP capable nodes, CCM (Continuity Check Messages) are
required to monitor the ring-port connectivity across the L2 network.
MEG and MEL—The switches in the Management Entity Group with given priority as MEG level
(MEL).
NR and SF—Not Reachable and Signal Failure specify the status messages that can be sent as part of the
R-APS messages.
ERP Timers
Wait To Restore (WTR) Timer. This timer is used by the RPL to verify stability of the Etherenet ring.
WTR Timer determines the number of minutes the RPL switch waits before returning the RPL ports to a
blocked state after the ring has recovered from a link failure.
Some important points about the WTR Timer are as follows:
• The timer is started when the RPL node receives an R-APS (NR) message that indicates ring protection
is no longer required.
• The timer is stopped when the RPL owner receives an R-APS (SF) message while WTR is running,
which indicates that an error still exists in the ring.
• When the time runs out, the RPL port is blocked and an R-APS (NR, RB) message is transmitted from
both the ring ports to indicate that the RPL is blocked.
• Refer to the “ERP Specifications” on page 12-2 for timer defaults and valid ranges.
Guard Timer. When the failed link recovers, a ring node starts the Guard Timer. The Guard Timer is
used to prevent the ring nodes from receiving outdated R-APS messages that are no longer relevant.
Some important points about the Guard Timer are as follows:
• When the Guard Timer is running, any R-APS messages received are not forwarded.
• The Guard Timer value must be greater than the maximum expected forwarding delay time for which it
takes one R-APS message to circulate around the ring. This calculated value is required to prevent any
looping scenarios within the ring.
• Refer to the “ERP Specifications” on page 12-2 for timer defaults and valid ranges.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-5
ERP Overview Configuring ERP
Normal Mode
If a link or node failure occurs in the ring shown in the above illustration, the ring transitions as follows
into the protection mode:
• Nodes adjacent to the failure detect and report the failure using the R-APS (SF) message.
• The R-APS (SF) message triggers the RPL owner to unblock the RPL.
• All nodes in the ring flush all the dynamic MAC addresses learned on their ring ports.
page 12-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP ERP Overview
Protection Mode
When the failed link shown in the above illustration recovers, the ring transitions as follows back to the
idle mode:
• Nodes adjacent to the recovered link initiate an R-APS (NR) message and start the Guard Timer.
• When the RPL owner receives the R-APS (NR) message, it starts the Wait-To-Restore timer (WTR),
which is the set period of time that must elapse before the RPL owner blocks the RPL.
• Once the WTR timer expires, the RPL owner blocks the RPL and transmits an R-APS (NR, RB)
message indicating that RPL is blocked (RB).
• On receiving the R-APS (NR, RB) message, ring nodes flush all the dynamic MAC addresses learned
on their ring ports and unblock any previously blocked ports.
• The ring is now operating in the idle mode. The RPL is blocked and all other ring links are operational.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-7
ERP Overview Configuring ERP
Illustration of ERPv2 on Multi Ring and Ladder Network with RPLs and Shared Links
page 12-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP ERP Overview
Note. The Service VLAN must be tagged, no support of "untagged" service VLAN. The sub ring and mas-
ter ring cannot use the same service VLAN.
Revertive/Non-Revertive Mode
Revertive mode is configured for compatibility between ERPv1 and ERPv2 nodes in the same ring. When
the ERPv2 node is operating with ERP v1 node in the same ring, it operates in revertive mode regardless
of user configuration.
Non-Revertive mode: Under non-revertive mode, when the failure condition recovers, the port that has
been blocked stays blocked and the unblocked RPL stays unblocked.
An exclusive clear operation can also be performed for non-revertive mode and revertive mode using the
ERPv2 CLI to clear any pending state.
Note. All the nodes and ring ports must be configured with the same default or untagged VLAN.
Example: To configure an untagged R-APS channel for ring 1, a default or untagged VLAN must be
configured on the ring ports on all nodes:
-> vlan 4000
-> vlan 4000 members port 1/1-2 untagged
-> erp-ring 1 port1 1/1 port2 1/2 service-vlan 4000 level 2
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-9
Interaction With Other Features Configuring ERP
Multicast
• IP multicast switching (IPMS) treats the ERP Service VLAN the same as any other configured VLAN
on the switch. The ERP Service VLAN may carry data traffic, and if enabled and configured to do so,
IPMS will perform regular multicast snooping on that VLAN.
• Disabling IPMS on the ERP Service VLAN is recommended if IP multicast routing or multicast
snooping is enabled for the switch.
Spanning Tree
STP is automatically disabled when ERP is enabled on any port.
VLAN Stacking
ERP has the following interactions with VLAN Stacking:
• ERP is supported on Network Network Interface (NNI) ports; it is not supported on UNI ports.
• Tunneling of STP BPDUs across UNI ports is supported in a VLAN stacking configuration.
See “Configuring ERP with VLAN Stacking NNIs” on page 12-16 for more information.
Source Learning
The ERP protocol determines and performs the MAC address flushing per port.
QoS Interface
The interaction between ERP and QoS is for the purpose so that R-APS PDUs can be handled
appropriately by the switch.
MVRP
ERP NI must provide blocking or forwarding state of ERP ports to MVRP.
page 12-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP Quick Steps for Configuring ERP with Standard VLANs
1 Create a VLAN using the vlan command and add the ring ports.
2 Create ERP ring ID 1, ERP Service VLAN and MEG Level and associate two ports to the ring using
the erp-ring command.
-> erp-ring 1 port1 1/1/1 port2 1/1/2 service-vlan 1001 level 1
3 Configure the RPL on one node using the erp-ring rpl-node command.
4 Create additional VLANs and add to the ring ports using the vlan command.
5 Enable the ERP ring configuration using the erp-ring enable command.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-11
Quick Steps for Configuring ERP with VLAN Stacking Configuring ERP
1 Create a VLAN Stacking SVLAN 1001 using the ethernet-service svlan command.
2 Create a VLAN Stacking service and associate the service with SVLAN 1001 using the ethernet-
service service-name command.
-> ethernet-service service-name CustomerA svlan 1001
3 Configure ports 1/1/1 and 1/1/2 as VLAN Stacking Network Network Interface (NNI) ports, associate
the ports with SVLAN 1001, and configure them for use with ERP using the ethernet-service svlan nni
command.
-> ethernet-service nni port 1/1/1
-> ethernet-service nni port 1/1/2
-> ethernet-service svlan 1001 nni port 1/1/1
-> ethernet-service svlan 1001 nni port 1/1/2
4 Create ERP ring ID 1 and associate the two NNI ports to the ring using the erp-ring command.
5 Configure the RPL on one node using the erp-ring rpl-node command.
6 Create additional SVLANs and add to the ring ports using the ethernet-service svlan command.
7 Enable the ERP ring configuration using the erp-ring enable command.
page 12-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP ERP Configuration Overview and Guidelines
3 Configure an RPL port. When a ring port is configured as an RPL port, the node to which the port
belongs becomes the RPL owner. The RPL owner is responsible for blocking and unblocking the RPL.
See “Configuring an RPL Port” on page 12-15.
4 Change the Wait-To-Restore timer value. This timer value determines how long the RPL owner waits
before restoring the RPL to a forwarding state. See “Setting the Wait-to-Restore Timer” on page 12-15.
5 Change the Guard timer value. This timer value determines an amount of time during which ring nodes
ignore R-APS messages. See “Setting the Guard Timer” on page 12-15.
6 Configure the ring port to receive the loss of connectivity event for a Remote Ethernet OAM endpoint.
See “Configuring ERP with VLAN Stacking NNIs” on page 12-16.
7 Configure a VLAN Stacking NNI-to-SVLAN association for ERP control. This is done to include an
SVLAN in a ring configuration. See “Configuring ERP with VLAN Stacking NNIs” on page 12-16.
8 Clear ERP statistics. Commands to clear ERP statistics for a single ring or multiple rings are described
in “Clearing ERP Statistics” on page 12-17.
Configuration Guidelines
Use the following guidelines when configuring ERP for the switch:
• Physical switch ports and logical link aggregate ports can be configured as ERP ring ports. This also
includes VLAN Stacking Network Network Interface (NNI) ports.
• ERP is not supported on mobile ports, mirroring ports, link aggregate member ports, multicast VLAN
receiver ports (ERP is supported on Multicast VLAN sender ports only), or VLAN Stacking User
Network Interface (UNI) ports.
• An ERP ring port can belong to only one ERP ring at a time.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-13
Configuring an ERP Ring Configuring ERP
1 Determine which two ports on the switch are the ring ports. For example, ports 1/1/1 and 1/1/2.
2 Determine which VLAN on the switch is the ERP service VLAN for the ring. If the VLAN does not
exist, create the VLAN. For example:
-> vlan 500
3 Create the ERP ring configuration on each switch using the erp-ring command. For example the
following command configures an ERP ring with ring ID 1 on ports 1/1/2 and 1/1/2 along with service
VLAN 500 and MEG level 1.
-> erp-ring 1 port1 1/1/1 port2 1/1/2 service-vlan 500 level 1
-> erp-ring 1 enable
To configure link aggregate logical ports as ring ports, use the erp-ring command with the linkagg param-
eter. For example:
-> erp-ring 1 port1 linkagg 1 port2 linkagg 2 service-vlan 500 level 1
-> erp-ring 1 enable
4 Repeat Steps 1 through 6 for each switch that participates in the ERP ring. Make sure to use the same
VLAN ID and MEG level for the service VLAN on each switch.
Use the show erp command to verify the ERP ring configuration. For more information about this
command, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Note. Administratively disable ring ports before deleting the ring to avoid creating any network loops.
Once a ring is deleted, then administratively enable the ports under Spanning Tree protocol.
page 12-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP Configuring an ERP Ring
Note. RPL node can be configured only when the ring is disabled; RPL configuration applied to the ring
while it is enabled is rejected.
To remove the RPL node configuration for the specified ring, use the no form of the erp-ring rpl-node
command. For example:
-> no erp-ring 1 rpl-node
To verify the RPL node configuration for the switch, use the show erp command. For more information
about this command, see the OmniSwitch AOS Release 8 CLI Reference Guide.
The above command is only used on a switch that serves as the RPL node for the ERP ring. The specified
ERP ring ID must already exist in the switch configuration.
To restore the timer back to the default setting, use the no form of the erp-ring wait-to-restore command.
For example:
-> no erp-ring 1 wait-to-restore
To verify the WTR configuration, use the show erp command. For more information about this command,
see the OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-15
Configuring an ERP Ring Configuring ERP
To restore the Guard Timer back to the default value, use the no form of the erp-ring guard-timer
command. For example:
-> no erp-ring 1 guard-timer
To verify the configured Guard Timer, use the show erp command. For more information about this
command, see the OmniSwitch AOS Release 8 CLI Reference Guide.
The above commands configure ports 1/1/1 and 1/1/2 as NNI ports for SVLAN 1001. Note that the
SVLAN specified must already exist in the switch configuration.
To configure an ERP ring with NNI-SVLAN associations, use the erp-ring command but specify an
SVLAN ID for the service VLAN and the associated NNI ports as the ring ports. For example:
-> erp-ring 1 port1 1/1/1 port2 1/1/2 service-vlan 1001 level 2
-> erp-ring 1 enable
Note the following when configuring an ERP ring with VLAN Stacking NNI-SVLAN associations:
• Only two ERP type NNI associations are allowed per SVLAN.
• Configuring an ERP ring on 802.1q tagged port associations with SVLANs is not allowed.
• Configuring an ERP Ring on an STP type NNI association with an SVLAN is not allowed.
• If an SVLAN that is not associated with any NNI ports is configured as the service VLAN for an ERP
ring, the NNI ring ports are automatically associated with that SVLAN at the time the ring is created.
• SVLAN User Network Interface (UNI) associations are not eligible for ERP ring protection.
• If the ERP type NNI ports are connected to the STP path through UNI ports, then STP BPDUs can be
tunneled with the help of VLAN-stacking mechanism.
• Deleting an ERP service VLAN and it is associated NNI ports is only allowed when the ERP ring itself
is deleted using the no for of the erp-ring command. None of the VLAN Stacking CLI commands can
remove a service VLAN consisting of an NNI-SVLAN association.
page 12-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP Configuring an ERP Ring
To clear ERP statistics for a specific ring in the switch, use the clear erp statistics command with the ring
parameter to specify a ring ID. For example:
-> clear erp statistics ring 5
To clear ERP statistics for a specific ring port, use the clear erp statistics command with the ring and
port parameters. For example:
-> clear erp statistics ring 5 port 1/1/2
To clear ERP statistics for a specific link aggregate ring port, use clear erp statistics command with the
ring and linkagg parameters. For example:
-> clear erp statistics ring 5 linkagg 2
Use the show erp statistics command to verify ERP statistics. For more information about this command,
see the OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-17
ERPv2 Configuration Overview and Guidelines Configuring ERP
1 Optional: Configure tagged ports or link aggregate ports before configuring ERP.
2 Configure an ERP ring with same ERP ring ID on all switches in the network.
4 Set the same Management Entity Group (MEG) (for example, level 2) for all switches.
5 Assign one switch to be the RPL owner. Configure the port connected to the Ring Protection Link as an
RPL port.
6 Enable the configured ERPv2 ring.
8 Use the default settings for the guard timer and WTR timer values. These values can be adjusted as
necessary.
The following sub-sections provide the details on prerequisites and different configurations for switches to
set up an ERPv2 ring network, using Alcatel-Lucent OmniSwitch CLI commands.
• An SVLAN must exist before an ERP ring is created and must be unique per ring.
• The RPL can be placed anywhere on the major ring including the shared links.
• The RPL can be placed anywhere on the sub-rings, including the sub-ring-port. Since the sub-ring is
not closed using the shared link, the RPL cannot be placed on the shared link.
Configuration Parameters
The following conditions must be considered before configuring an ERPv2 port:
• A given port can only be configured on one ring.
page 12-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP ERPv2 Configuration Overview and Guidelines
• The RPL can be placed anywhere on the Master Ring, including the shared links.
• The RPL can be placed anywhere on the Sub Rings, including the only ring port of the interconnection
nodes. Since the sub-ring is not closed using the shared link, the RPL cannot be placed on the shared
link.
A sub-ring on the non-interconnection node can be configured using the following command:
Switch 2-> erp-ring 2 port1 1/1/1 port2 1/1/3 service-vlan 10 level 2
A sub ring on the interconnection node can be configured using the following command:
Switch 3-> erp-ring 3 sub-ring-port 1/1/3 service-vlan 10 level 2
Step 3: Create traffic VLANs and add to ring ports as necessary using VM commands
-> vlan 100-400
-> vlan 100-300 members port 1/1/5 tagged
-> vlan 100-300 members port 1/1/3 tagged
-> vlan 201-400 members port 1/1/6 tagged
Note. The traffic VLANs could be added or deleted as needed at any time during the configuration.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-19
ERPv2 Configuration Overview and Guidelines Configuring ERP
R-APS messages from the sub-ring on the interconnection node are forwarded as normal data to the major
ring ports.A node is identified as interconnection node when at least one ring is configured with a sub-
ring-port.
R-APS messages from the sub-ring are tagged with the sub-ring SVLAN, are forwarded to the major ring
member ports of this SVLAN.
Note. All the ring ports in major ring must be member of the sub-ring SVLAN to support R-APS virtual
channel.
Now, R-APS messages from the sub-ring on the interconnection node are not forwarded to any other ports.
R-APS messages are forwarded even on the blocked ports in the sub-ring. A configuration object is
required for the sub-ring to disable the R-APS virtual channel.
page 12-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP ERPv2 Configuration Overview and Guidelines
Note. Virtual channel configuration must be consistent among all nodes of the sub-ring.
Non-revertive Mode
Under non-revertive mode, when the failure recovers, the blocked port stays blocked and the unblocked
RPL stays unblocked. Revertive mode is enabled by default. Operator can enable non-revertive mode by
setting following command.
When the ERPv2 node is operating with ERPv1 node in the same ring, it operates in different way for
compatibility. In this mode, revertive mode is always assumed, it operates in revertive mode regardless of
user configuration.
-> erp-ring 2 revertive disable
• The ring is set in a revertive mode but the WTR timer has not expired.
The command can only be issued on the RPL owner node and when the ring is in the NR state and WTR
timer not expired or no WTR (non-revertive mode)
When the command is accepted, the RPL owner node blocks its RPL port, and transmits an R-APS (NR,
RB) message in both directions. Upon receiving the R-APS (NR, RB), each node unblocks its blocking
ports and performs a flush operation when applicable.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-21
Sample Ethernet Ring Protection Configuration Configuring ERP
RI
2/1 Fa NG
Fa ] 1/2 Pr
17 ot
6.1. [17
2.1 ec
.1 tio
72 6.1
nL
[1 .14
] IN
K
NK (R
LI PL
NG )
RI [17
2.1
6.1 Fa
.13 2/1
8] RPL ]
2/2 6.1.1 Switch C
a Port
Switch E F 2.1
7
[1
Fa
1/2
]
[17
.10
1/2
Fa
2.1
6.1
RPL Owner
6.1
2.1
.21
[17
RIN ]
INK
GL
GL
INK
RIN
[17
.9]
2.1
6.1
2/2
Fa
6.1
2.1
Fa
RING LINK
2/1
.22
[17
]
Fa 2/2 Fa 1/1
[[Link]] [[Link]]
Switch A Switch B
Configuring the sample ERP ring network shown in the above diagram involves the following tasks:
1 Configure an ERP ring with ERP ring ID 1 on all switches in the network.
3 Set the Management Entity Group (MEG) level to 2 for all switches.
4 Switch C is the RPL owner; configure the port connected to the Ring Protection Link as a RPL port.
7 Use the default settings for the guard timer and WTR timer values. These values can be adjusted as
necessary.
page 12-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP Sample Ethernet Ring Protection Configuration
2 Configure Switch C as the RPL owner for the ring using the following commands to designate port 2/1
as the RPL port:
-> erp-ring 1 disable
-> erp-ring 1 rpl-node port 2/1
-> erp-ring 1 enable
3 Verify the ERP ring configuration on any switch using the following command:
Ring Id : 1,
Ring Port1 : 2/1,
Ring Port2 : 1/2,
Ring Status : enabled,
Service VLAN : 10,
WTR Timer (min) : 5,
Guard Timer (centi-sec) : 50,
MEG Level : 2,
Ring State : idle,
Ring Node Type : rpl,
RPL Port : 2/1,
Last State Change : SUN DEC 25 [Link] 2016 (sysUpTime 00h:01m:31s)
The above output example shows that ERP ring 1 is created on ring ports 2/1 and 1/2 with service VLAN
10, WTR timer of 5 mins, Guard timer of 50 centi-seconds, MEG level 2, and port 2/1 is the RPL port.
4 Verify the status of an ERP ring port on any switch using the following command:
Ring-Id : 1
Ring Port Status : forwarding,
Ring Port Type : non-rpl,
Ethoam Event : disabled
The above command shows the forwarding status of the port, the type of ring port (RPL or non-RPL), and
ETHOAM event status.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-23
Sample ERPv2 Ring Configuration Configuring ERP
page 12-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP Sample ERPv2 Ring Configuration
The following sub-sections provide the details on prerequisites and different configurations for switches to
set up an ERPv2 ring network, using Alcatel-Lucent OmniSwitch CLI commands.
Step 3: Create traffic VLANs and add to ring ports as necessary using VM commands on Switch A.
Switch A -> vlan 100-400
Switch A -> vlan 100-300 members port 2/1 tagged
Switch A -> vlan 100-300 members port 2/2 tagged
Switch A -> vlan 201-400 members port 1/6 tagged
Step 2: Configure Switch B as RPL Node using the erp-ring epl-node command:
Switch B -> erp-ring 1 epl-node 2/2
Step 4: Create traffic VLANs and add to ring ports as necessary Switch B.
Switch B -> vlan 100-400
Switch B -> vlan 100-300 members port 1/1 tagged
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-25
Sample ERPv2 Ring Configuration Configuring ERP
page 12-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring ERP Verifying the ERP Configuration
show erp Displays the ERP configuration information for all rings, a specific ring,
or for a specific ring port.
show erp statistics Displays the ERP statistics for all rings, a specific ring, or a specific ring
port.
show ethernet-service Displays configuration information for VLAN Stacking Ethernet
services, which includes SVLANs and NNI port associations.
show ethernet-service nni Displays the VLAN Stacking NNI configuration.
show ethernet-service vlan Displays a list of SVLANs configured for the switch.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 12-27
Verifying the ERP Configuration Configuring ERP
page 12-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
13 Configuring MVRP
Multiple VLAN Registration Protocol (MVRP) is a standards-based Layer 2 network protocol for
automatic configuration of VLAN information on switches. It was defined in the 802.1ak amendment to
802.1Q-2005.
MVRP provides a method to share VLAN information and configure the needed VLANs within a Layer 2
network. For example, in order to add a switch port to a VLAN, only the end port, or the VLAN-
supporting network device connected to the switch port, must be reconfigured, and all necessary VLAN
trunks are dynamically created on the other MVRP-enabled switches. MVRP helps to maintain VLAN
configuration dynamically based on current network configurations.
In This Chapter
This chapter describes the MVRP feature and how to configure it through the Command Line Interface
(CLI). CLI commands are used in the configuration examples; for more details about the syntax of
commands, see the OmniSwitch AOS Release 8 CLI Reference Guide. This chapter provides an overview
of MVRP and includes the following information:
• “Enabling MVRP” on page 13-7
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 13-1
MVRP Specifications Configuring MVRP
MVRP Specifications
IEEE Standards Supported IEEE 802.1ak-2007 Amendment 7: Multiple Registration Protocol
IEEE 802.1Q-2005 Corrigendum 2008
Platforms Supported OmniSwitch 6860, 6860E
Maximum MVRP VLANs 4K
MVRP Defaults
The following table lists the defaults for MVRP configuration.
page 13-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring MVRP Quick Steps for Configuring MVRP
2 Assign a port to the VLAN using the vlan members command. For example:
3 Tag the port with one or more VLANs using the vlan members command. For example:
5 Enable MVRP on the port by using the mvrp port command. For example, the following command
enables MVRP on port 1/1/2 of the switch:
-> mvrp port 1/1/2 enable
6 Optional: Restrict a port from becoming a member of the statically created VLAN by using the mvrp
static-vlan-restrict command. For example, the following command restricts port 1/1/5 from becoming a
member of static VLAN 10:
-> mvrp port 1/1/5 static-vlan-restrict vlan 10
Note. To view the global configuration details of the router, enter the show mvrp configuration command.
The globally configured details are displayed as shown:
-> show mvrp configuration
To view the MVRP configuration for a specific port, enter the show mvrp port command. The
configuration data of the particular port is displayed as shown:
-> show mvrp port 1/1/2
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 13-3
MRP Overview Configuring MVRP
MRP Overview
Multiple Registration Protocol (MRP) was introduced as a replacement for GARP with the IEEE 802.1ak-
2007 amendment. The Multiple VLAN Registration Protocol (MVRP) defines a MRP Application that
provides the VLAN registration service.
MVRP provides a mechanism for dynamic maintenance of the contents of dynamic VLAN registration
Entries for each VLAN, and for propagating the information they contain to other bridges. This
information allows MVRP-aware devices to dynamically establish and update their knowledge of the set
of VLANs that currently have active members, and through which ports those members can be reached.
The main purpose of MVRP is to allow switches to automatically discover some of the VLAN information
that would otherwise have to be manually configured.
MVRP Overview
MVRP acts as an MRP application, sending and receiving MVRP information encapsulated in an ethernet
frame on a specific MAC address. MVRP allows both end stations and bridges in a bridged local area
network to issue and revoke declarations relating to membership of VLANs. Each MVRP device that
receives the declaration in the network creates or updates a dynamic VLAN registration entry in the
filtering database to indicate that the VLAN is registered on the reception port.
In this way, MVRP provides a method to share VLAN information within a layer 2 network dynamically,
and configure the required VLANs. For example, in order to add a switch port to a VLAN, only the end
port, or the VLAN-supporting network device connected to the switch port, must be reconfigured, and all
necessary VLAN trunks are dynamically created on the other MVRP-enabled switches. Without using
MVRP, either a manual configuration of VLAN trunks or use of a manufacturer specific proprietary
method is necessary. MVRP helps to maintain VLAN configuration dynamically based on current network
configurations.
1 2 3 4 5
page 13-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring MVRP MVRP Overview
Switch A has 3 VLANs configured as static VLANs (10, 20, and 30). Other switches on the same network
learn these 3 VLANs as dynamic VLANs. Also, the end station connected on port 5 is statically
configured for VLAN 50. Port 1 on Switch A is manually configured for VLANs 10, 20, and 30. All the
ports are in the same Spanning tree instance and are in forwarding state. Hence, as the Initial Configuration
of MVRP diagram shows,
1 Port 1 on Switch A advertises VLAN IDs (VIDs) 10, 20, and 30.
2 Port 2 on Switch B receives the advertisements. VLANs 10, 20, and 30 are created as VLANs on this
Switch B and Port 2 become a member of VLANs 10, 20, and 30.
3 Port 3 on Switch B is triggered to advertise VLANs 10, 20, and 30, but does not become a member of
these VLANs.
4 Port 4 on Switch C receives the advertisements. VLANs 10, 20, and 30 are created as VLANs on
Switch C and Port 4 become a member of VLANs 10, 20, and 30.
5 Port 5 advertises VLANs 10, 20, and 30, but this port is not a member of these VLANs.
Note. Default VLAN (VLAN 1) exists on all switches, but it is not considered here.
The configuration sequence of advertisements and registration of VLANs results in the following
configuration.
1 2 3 4 5
Here, the end station advertises itself as a member of VLAN 50. As the Dynamic Learning of VLANs 10,
20, and 30 diagram shows,
1 Port 5 receives the advertisement and Switch C creates VLAN 50 as a dynamic VLAN. Port 5 of
Switch C becomes a member of VLAN 50.
2 Port 4 advertises VLAN 50, but is not a member of VLAN 50.
3 Port 3 of Switch B receives the advertisement, Switch B creates the dynamic VLAN 50, and Port 3
becomes a member of VLAN 50.
4 Port 2 advertises VLAN 50, but is not a member of this VLAN.
5 Port 1 on Switch A receives the advertisement, creates dynamic VLAN 50. Port 1 becomes a member
of VLAN 50.
The resulting configuration is depicted as follows:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 13-5
MVRP Overview Configuring MVRP
1 2 3 4 5
Note. Every port on a switch is not a member of all the VLANs. Only those ports that receive the
advertisement become members of the VLAN being advertised.
STP
The MVRP feature is supported only in STP flat mode. If MVRP is configured in the system with STP flat
mode, then STP mode cannot be changed to per-VLAN mode. When a topology change is detected by
STP, MAC addresses for the dynamic VPAs learned by MVRP is also deleted.
page 13-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring MVRP Configuring MVRP
Configuring MVRP
This section describes how to configure MVRP using the Command Line Interface (CLI) commands.
Enabling MVRP
MVRP is used primarily to prune unnecessary broadcast and unknown unicast traffic, and to create and
manage VLANs. MVRP has to be globally enabled on a switch before it can start forwarding MVRP
frames. When a port is enabled for MVRP, it cannot be converted as an aggregate or a VLAN stacking
User port.
To enable MVRP globally on the switch, enter the mvrp command at the CLI prompt as shown:
-> mvrp enable
To disable MVRP globally on the switch, use disable option of the mvrp command as shown:
-> mvrp disable
Note. Disabling MVRP globally leads to the deletion of all learned VLANs.
MVRP can be enabled on ports regardless of whether it is globally enabled or not. However, for the port
to become an active participant, MVRP must be globally enabled on the switch. By default, MVRP is
disabled on the ports. To enable MVRP on a specified port, use the mvrp port command.
For example:
-> mvrp port 1/1/2 enable
To disable MVRP on a specific port, use disable option of the mvrp port command as shown:
-> mvrp port 1/1/2 enable
Note. MVRP can be configured only on fixed, 802.1 Q and aggregate ports. It cannot be configured on
aggregate and VLAN Stacking User ports.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 13-7
Configuring MVRP Configuring MVRP
To view the registration mode of the port, use the show mvrp port command. For example:
-> show mvrp port 1/1/2
To view the registration mode of the port, use the show mvrp port command. For example,
-> show mvrp port 1/1/2
Note. The registration mode for the default VLANs of all the ports in the switch is set to normal.
page 13-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring MVRP Configuring MVRP
To view the registration mode of the port, use the show mvrp port command. For example,
-> show mvrp port 1/1/2
To view the MVRP configurations for all the ports, including timer values, registration and applicant
modes, enter the following:
-> show mvrp port enable
When a port is set to participant mode, MVRP protocol exchanges are allowed only if the port is set to the
STP forwarding state.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 13-9
Configuring MVRP Configuring MVRP
To set the applicant mode of port 1/2 to participant mode, enter the following:
-> mvrp port 1/1/2 applicant participant
When a port is set to non-participant mode, MVRP PDUs are not sent through the STP forwarding and
blocking ports.
To set the applicant mode of port 1/1/2 to non-participant mode, enter the following:
-> mvrp port 1/1/2 applicant non-participant
The applicant mode of the port can be set to the default value by using the mvrp applicant command. To
set the MVRP applicant mode of port 1/1/2 to the default mode (active mode), enter the following
command:
-> mvrp port 1/1/2 applicant active
• Leave timer—The wait time taken to remove the port from the VLAN after receiving a Leave message
on that port.
• LeaveAll timer—The time an MVRP instance takes to generate LeaveAll messages. The LeaveAll
message instructs the port to modify the MVRP state of all its VLANs to Leave.
• Periodic timer—The time frequency with which the messages are transmitted again and again.
When you set the timer values, the value for the Leave timer must be greater than or equal to twice the
Join timer value plus 100 milliseconds.(Leave>=Join * 2 +100). The LeaveAll timer value must be
greater than or equal to the Leave timer value (LeaveAll >= Leave). If you attempt to set a timer value
that does not adhere to these rules, an error message is displayed.
For example, if you set the Leave timer to 1200 ms and attempt to configure the Join timer to 600 ms, an
error is returned. Set the Leave timer to at least 1300 ms and then set the Join timer to 600 ms.
To modify the Join timer value, use the mvrp timer join command. For example, to modify the Join timer
value of port 1/1/2, enter the following:
-> mvrp port 1/1/2 timer join 600
The Join timer value of port 1/1/2 is now set to 600 ms.
To set the Leave timer value of port 1/1/2 to 1800 ms, enter the command as shown:
-> mvrp port 1/1/2 timer leave 1800
To set the LeaveAll timer of port 1/1/2 to 30000 ms, enter the command as shown:
-> mvrp port 1/1/2 timer leaveall 30000
To set the Periodic timer of port 1/1/2 to 1 second, enter the command as shown:
-> mvrp port 1/1/2 timer periodic-timer 1
To view the timer value assigned to a particular port, use the show mvrp timer command.
page 13-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring MVRP Configuring MVRP
Note. Set the same MVRP timer value on all the connected devices.
Here, VLAN 4 cannot be learned by the device dynamically. However, if the VLAN exists on the device
as a static VLAN, it can be mapped to the receiving port.
To allow dynamic VLAN registrations on the port, use the no form of the mvrp restrict-vlan-registra-
tion command as shown:
-> no mvrp port 1/1/1 restrict-vlan-registration vlan 4
Here, the port 1/1/9 is restricted from becoming a MVRP member of VLAN 5.
To restrict a port from becoming a member of a range of statically created VLANs, enter the mvrp static-
vlan-restrict command as shown:
-> mvrp port 1/1/9 static-vlan-restrict vlan 5-9
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 13-11
Configuring MVRP Configuring MVRP
page 13-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring MVRP Verifying the MVRP Configuration
show mvrp last-pdu-origin Displays the source MAC address of the last MVRP message
received on specific ports or aggregates.
show mvrp configuration Displays the global configuration for MVRP.
show mvrp linkagg Displays the MVRP configuration for a specific port or an aggregate
of ports.
show mvrp port Displays the MVRP configurations for all the ports, including timer
values, registration and applicant modes.
show mvrp vlan-restrictions Displays the list of VLANS learned through MVRP and their details.
show mvrp timer Displays the timer values configured for all the ports or a specific
port.
show mvrp statistics Displays the MVRP statistics for all the ports, aggregates, or specific
ports.
clear mvrp statistics Clears MVRP statistics for all the ports, an aggregate of ports, or a
specific port.
For more information about the output details that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 13-13
Verifying the MVRP Configuration Configuring MVRP
page 13-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
14 Configuring 802.1AB
Link Layer Discovery Protocol (LLDP) and LLDPv2 is a standard that provides a solution for the
configuration issues caused by expanding networks. LLDP supports the network management software
used for complete network management. LLDP is implemented as per the IEEE 802.1AB standard. LLDP
specifically defines a standard method for Ethernet network devices and Media Endpoint Devices (MED)
to exchange information with its neighboring devices and maintain a database of the information. The
exchanged information, passed as LLDPDU, is in TLV (Type, Length, Value) format. The information
available to the network management software must be as new as possible; hence, remote device
information is periodically updated.
In This Chapter
This chapter describes the basic components of 802.1AB and how to configure them through the
Command Line Interface (CLI). The CLI commands are used in the configuration examples; for more
details about the syntax of commands, see Chapter 14, “802.1AB Commands,” in the OmniSwitch AOS
Release 8 CLI Reference Guide.
Configuration procedures described in this chapter include the following:
• “Quick Steps for Configuring 802.1AB” on page 14-4
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 14-1
802.1AB Specifications Configuring 802.1AB
802.1AB Specifications
Platforms Supported OmniSwitch 6860, 6860E
IEEE Specification IEEE 802.1AB-2009 Station and Media Access
Control Connectivity Discovery
Maximum number of network policies that 8
can be associated with a port
Maximum number of network policies that 32
can be configured on the switch
Nearest Edge MAC Address [Link]
Nearest Bridge MAC Address [Link]
Nearest Customer MAC Address [Link]
Non-TPMR Address [Link]
page 14-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring 802.1AB 802.1AB Defaults Table
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 14-3
Quick Steps for Configuring 802.1AB Configuring 802.1AB
2 To control per port notification status about a change in a remote device associated to a port, use the
lldp notification command. For example:
-> lldp port 1/1/47 notification enable
3 To control per port management TLV to be incorporated in the LLDPDUs, use the lldp tlv
management command. For example:
-> lldp port 1/1/47 tlv management port-description enable
4 Set the transmit time interval for LLDPDUs. To set the timer for a 50 second delay, use the lldp
nearest-edge mode command. For example:
-> lldp transmit interval 50
5 Set the LLDPDUs transmit fast start count required for LLDP Fast Restart mechanism to be activated.
Note. Optional. Verify the LLDP per port statistics by entering the show lldp statistics command. For
example:
-> show lldp statistics
Chas/ LLDPDU LLDPDU LLDPDU LLDPDU LLDPDU TLV TLV Device
Slot/Port Tx TxLenErr Rx Errors Discards Unknown Discards Ageouts
---------+---------+---------+---------+---------+---------+---------+---------+--------
1/1/1 453 0 452 0 0 0 0 0
1/1/2 452 0 453 0 0 0 0 0
1/1/5 452 0 473 0 0 476 476 0
1/1/8 455 0 464 0 0 0 0 0
1/1/9 456 0 464 0 0 0 0 0
To verify the remote system information, use the show lldp remote-system command. For example:
-> show lldp remote-system
Remote LLDP Agents on Local Slot/Port: 1/1/47,
Chassis ID Subtype = 4 (MAC Address),
Chassis ID = [Link],
Port ID Subtype = 7 (Locally assigned),
Port ID = 2048,
Port Description = (null),
System Name = (null),
System Description = (null),
Capabilities Supported = none supported,
Capabilities Enabled = none enabled,
For more information about this display, see the OmniSwitch CLI Reference Guide.
page 14-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring 802.1AB 802.1AB Overview
802.1AB Overview
LLDP is a Layer 2 protocol used to detect adjacent devices in a network. Each device in a network sends
and receives LLDPDUs through all ports on which the protocol is enabled. If the protocol is disabled on a
port, then LLDPDUs received on that port are dropped.
The LLDPDUs are transmitted at a certain interval. This transmission interval can be configured. When an
LLDPDU is received from a neighboring device, the LLDPDU software validates the frame and stores the
information in the remote device Management Information Base (MIB). This information ages
periodically. If an LLDPDU is not received from the same device within the time specified in the TTL
TLV of the LLDPDU, the information is updated in the related MIB.
By exchanging information with all the neighbors, each device gets to know its neighbor on each port. The
information contained in the LLDPDU is transmitted in the TLV (Type, Length, Value) format and falls
under two categories:
• Mandatory
• Optional
Each LLDPDU contains all the five mandatory TLVs and optional TLVs.
There are many other LLDP features supported on OmniSwitch AOS as follows:
• Multiple LLDP agents (Nearest-Bridge, Nearest-Customer, Non-TPMR)
Mandatory TLVs
The mandatory TLV information contains the following information with regard to the LAN device:
• MSAP (MAC service access point) identifier.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 14-5
802.1AB Overview Configuring 802.1AB
Optional TLVs
The optional TLVs defined as part of LLDP are grouped into the following sets listed below:
Note. This optional TLV set is required for all LLDP implementation.
Note. If one TLV from this set is included in the LLDPDU, then all the other TLVs need to be included.
When an 802.1AB supporting system receives an LLDPDU containing MED capability TLV, then the
remote device is identified as an edge device, for example, IP phone and IP PBX, among others. In such a
case, the switch stops sending LLDPDU and starts sending MED LLDPDU on the port connected to the
edge device.
page 14-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring 802.1AB 802.1AB Overview
mac-phy TLV
When mac-phy is configured the power class detection is done via hardware by the switch’s PoE control-
ler and the maximum power for the port is based on the class of the powered device. Powered devices can
draw up to the maximum amount of power allowed for it’s class without any negotiation with the switch.
power-via-mdi TLV
When power-via-mdi is configured the power for the powered device is negotiated using the optional
power via MDI TLV in the LLDPDU. The powered device can request additional power using the power
via MDI TLV. The switch will check the current PoE budget and if power is available the switch will
provide the requested power to the powered device. If power is unavailable, the switch will respond with
the existing maximum power information.
• Power negotiation is supported for Class 4 powered devices.
• The maximum power a powered device can request cannot exceed the maximum power allowed for the
PoE class in which the powered device is detected.
• If the port is manually configured with a maximum power value, the powered device cannot receive
more power than the maximum configured value.
For an example on how to configure LLDP PoE Negotiation, see “Enabling and Disabling 802.3 TLV” on
page 14-13.
• Inventory management, allowing network administrators to track their network devices, and determine
their characteristics (manufacturer, software and hardware versions, and serial / asset number).
• Support for receiving, storing and advertising of VLAN information from and to remote Network
Connectivity Devices and Media Endpoint Devices (MEDs).
• Support for receiving and storing of Inventory Management TLVs from remote Media Endpoint
Devices.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 14-7
802.1AB Overview Configuring 802.1AB
page 14-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring 802.1AB 802.1AB Overview
Aging Time
The LLDP specific information of the remote system is stored in the LLDP MIB. The TTL TLV carries a
positive value in seconds, and conveys to the other device the duration for which this information is valid.
Once a remote device is learned on a local port, if the receiving device does not receive an LLDPDU from
the same remote device and on the same local port within the TTL mentioned in the previous LLDPDU,
then the local device discards the related entry from its database. This is called the aging time and can be
set by the user.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 14-9
802.1AB Overview Configuring 802.1AB
management VLAN being advertised by its neighbor and enables the DHCP client interface on a tagged
interface for that VLAN.
See the “Managing Automatic Remote Configuration Download” chapter in the OmniSwitch AOS Release
8 Switch Management Guide for additional information on the Automatic Remote Configuration feature.
The OmniSwitch supports the following two modes:
Nearest-Bridge Mode:
• Nearest-bridge Mode is the default mode for LLDP.
• Nearest-bridge Mode uses the LLDP standard "nearest-bridge" address of [Link] as the
destination MAC address.
• When running in Nearest-bridge Mode LLDP frames with the nearest-edge MAC address are not
processed by LLDP but are flooded as normal L2 multicast frames.
Nearest-Edge Mode:
• The switch must be configured to operate in Nearest-edge mode.
• Nearest-edge Mode uses the Nearest-edge MAC address of [Link] as the destination MAC
address, this MAC address is not configurable.
• When LLDP is set to Nearest-edge Mode LLDP frames with a destination MAC address of
[Link] are processed by LLDP.
• When running in Nearest-edge Mode LLDP frames with the nearest-bridge MAC address are not
processed by LLDP but are flooded as normal L2 multicast frames.
page 14-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring 802.1AB Configuring 802.1AB
Configuring 802.1AB
The following sections list detail procedures to enable 802.1AB and assign ports to 802.1AB.
To set the LLDPDU flow on port 1/1/4 as receive, enter the following command at the CLI prompt:
-> lldp port 1/1/4 lldpdu rx
To disable the flow of LLDPDU on a switch, enter the lldp lldpdu command:
-> lldp chassis lldpdu disable
To disable the flow of LLDPDU on port 5 of slot 1, enter the following command at the CLI prompt:
-> lldp port 1/1/5 lldpdu disable
To set the LLDPDU flow for nearest-bridge agent on a switch as transmit and receive, enter the lldp
lldpdu command:
-> lldp nearest-bridge chassis lldpdu tx-and-rx
To set the LLDPDU flow on port 1/1/4 for non-tpmr agent as receive, enter the following command at the
CLI prompt:
-> lldp non-tpmr port 1/1/4 lldpdu rx
To enable the flow of LLDPDU on a switch for nearest-edge, enter the lldp lldpdu command:
-> lldp nearest-edge chassis lldpdu enable
To disable the flow of LLDPDU on port 5 of slot 1, enter the following command at the CLI prompt:
-> lldp all port 1/1/5 lldpdu disable
To enable notification on port 1/1/2, enter the following command at the CLI prompt:
-> lldp port 1/1/2 notification enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 14-11
Configuring 802.1AB Configuring 802.1AB
To disable notification on port 1/1/4, enter the following command at the CLI prompt:
-> lldp port 1/1/4 notification disable
To enable the management TLV on port 1/1/3, enter the following command at the CLI prompt:
-> lldp port 1/1/3 tlv management system-capabilities enable
To disable the management TLV on a switch, enter the lldp tlv management command:
-> lldp chassis tlv management port-description disable
To disable management TLV on port 1/1/3, enter the following command at the CLI prompt:
-> lldp port 1/1/3 tlv management system-capabilities disable
To enable the management TLV LLDPDU transmission for non TPMR switch agent, enter the lldp tlv
management command:
-> lldp non-tpmr chassis tlv management port-description enable
To enable the management TLV for all agents on port 1/1/3, enter the following command at the CLI
prompt:
-> lldp all port 1/1/3 tlv management system-capabilities enable
page 14-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring 802.1AB Configuring 802.1AB
To enable the 802.1 TLV on port 1/1/1, enter the following command at the CLI prompt:
-> lldp port 1/1/1 tlv dot1 vlan-name enable
To disable the 802.1 TLV on a switch, enter the lldp tlv dot1 command:
-> lldp chassis tlv dot1 port-vlan disable
To disable 802.1 TLV on port 1/1/2, enter the following command at the CLI prompt:
-> lldp port 1/1/2 tlv dot1 vlan-name disable
To enable the 802.1 TLV for nearest-bridge agent on a switch, enter the lldp tlv dot1 command:
-> lldp nearest-bridge slot 1/1 tlv dot1 vlan-name enable
To enable the 802.1 TLV for non-TPMR agent on a switch, enter the lldp tlv dot1 command:
-> lldp non-tpmr slot 1/1 tlv dot1 port-vlan enable
To enable the 802.3 TLV on port 1/1/4, enter the following command at the CLI prompt:
-> lldp port 1/1/4 tlv dot3 mac-phy enable
To disable the 802.3 TLV on a switch, enter the lldp tlv dot3 command, as shown:
-> lldp chassis tlv dot3 mac-phy disable
To disable 802.3 TLV on port 1/1/5, enter the following command at the CLI prompt:
-> lldp port 1/1/5 tlv dot3 mac-phy disable
To enable the power-via-mdi 802.3 TLV for slot, enter the following at the CLI prompt:
-> lldp slot 1/1 tlv dot3 power-via-mdi enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 14-13
Configuring 802.1AB Configuring 802.1AB
To enable the MED TLV on port 1/1/4, enter the following command at the CLI prompt:
-> lldp port 1/1/4 tlv med capability enable
To disable the MED TLV on a switch, enter the lldp tlv med command, as shown:
-> lldp chassis tlv med power disable
To disable MED TLV on port 1/1/3, enter the following command at the CLI prompt:
-> lldp port 1/1/3 tlv med capability disable
To enable the Application Priority TLV on port 1/1/4, enter the following command at the CLI prompt:
-> lldp port 1/1/4 tlv application enable
To disable the Application Priority TLV on a switch, enter the lldp tlv application command, as shown:
-> lldp chassis tlv application disable
To disable the Application Priority TLV on port 1/1/3, enter the following command at the CLI prompt:
-> lldp port 1/1/3 tlv application disable
To enable the Application Priority TLV on port 1/1/4 for nearest-bridge LLDP agent, enter the following
command at the CLI prompt:
-> lldp nearest-bridge port 1/1/3 application enable
page 14-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring 802.1AB Configuring 802.1AB
To set the credit-max value for LLDPDUs, the number of consecutive LLDPDUs that can be transmitted
at any time, enter:
-> lldp credit max num 25
To set the fast-init value for LLDPDUs, The number of consecutive LLDPDUs that can be transmitted
when MED endpoint neighbor is detected, enter:
-> lldp fast-init num 5
To set the fast-transmit value for LLDPDUs, time interval between transmissions during fast
transmission period, enter:
-> lldp fast-transmit seconds 5
Note: The Time To Live is a multiple of the transmit interval and transmit hold-multiplier.
Note: In a specified interval, generating more than one notification-event is not possible.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 14-15
Verifying 802.1AB Configuration Configuring 802.1AB
For more information about the resulting display, see Chapter 14, “802.1AB Commands,” in the
OmniSwitch AOS Release 8 CLI Reference Guide.
page 14-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
15 Configuring SIP Snooping
Session Initiation Protocol (SIP) address the key challenge of real time delivery and monitoring
requirements for media streams from SIP devices.
SIP Snooping prioritizes voice and video traffic over non-voice traffic.
• Identifies and marks the SIP and its corresponding media streams. Each media stream contains Real
Time Protocol (RTP) and Real Time Control Protocol (RTCP) flows. Marking is done using the DSCP
field in the IP header.
• Provides user configured QOS treatment for SIP/RTP/RTCP traffic flows based on its marking.
• Also snoops voice quality metrics of media streams from their RTCP packets and displays them to the
user with knowledge of media reception quality in real time and helps to diagnose the problems on
their quality. Also in addition, trap will be generated when voice quality parameters like Jitter, Round
trip time, Packet-lost, R-factor and MOS values of media streams crosses user configured threshold.
In This Chapter
This chapter describes the SIP Snooping feature, and how to configure it through the Command Line Inter-
face (CLI). For more details about the syntax of commands, see the OmniSwitch AOS Release 8 CLI Refer-
ence Guide.
The following information and procedures are included in this chapter:
• “Quick Steps for Configuring SIP Snooping” on page 15-4.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 15-1
SIP Snooping Specifications Configuring SIP Snooping
page 15-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring SIP Snooping Parameter Description and Values
Note. When the Jitter, Packet Lost, and RTT crosses the configured threshold traps are raised. And when
the R-factor and MOS goes below the configured threshold traps are raised.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 15-3
Quick Steps for Configuring SIP Snooping Configuring SIP Snooping
2 Create a policy action for the SIP condition using the policy action command. For example,
3 Configure the policy rule for the SIP policy to classify inbound and outbound media streams. Use the
policy rule command. For example,
-> policy rule Voice_46 condition Voice action DSCP46
-> policy rule Video_32 condition Video action DSCP32
-> qos apply
Note. For more information on policy condition, policy action, and policy rule, see “Configuring QOS”
chapter in the OmniSwitch AOS Release 8 Network Configuration Guide.
4 Enable SIP Snooping using the sip-snooping admin-state command. For example:
Note. When SIP snooping is enabled globally the SIP snooping is enabled on all ports and linkagg. The
user can disable SIP snooping on specific port or linkagg (see Step 5).
5 Configure port/linkagg level SIP Snooping for the switch. Use the sip-snooping admin-state
command with the port or linkagg parameter. For example,
-> sip-snooping port 1/1/5-6 admin-state enable
-> sip-snooping linkagg 1/1/10 admin-state enable
6 Configure the port/linkagg mode to force-edge for the port to which the SIP phone is connected. Use
the sip-snooping mode command. For example,
-> sip-snooping port 1/1/5-6 mode force-edge
-> sip-snooping linkagg 1/1/10 mode force-edge
7 Configure the port/linkagg mode to force-non-edge for uplink port connecting to the call server. Use
the sip-snooping mode command. For example,
-> sip-snooping port 1/5-6 mode force-non-edge
-> sip-snooping linkagg 1/1/10 mode force-non-edge
page 15-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring SIP Snooping SIP Snooping Overview
• Bandwidth needs are growing at a faster pace than the network technologies that need to address them.
• Elastic traffic, such as TCP-based non-real time traffic, tends to use any additional bandwidth
available.
It is essential to differentiate the various types of traffic, based on application, user, and context, and
provide applicable service levels for each.
• Voice and video traffic should be prioritized over non-voice traffic.
• Mission critical data traffic should be provided a bandwidth guarantee for better performance.
The network should be able to monitor the quality of this traffic and inform the user if it is not within the
required expectation. SIP Snooping addresses this issue for media streams managed by SIP.
The SIP snooping feature snoops voice quality metrics of media streams from their corresponding control
packets and displays them to the user with knowledge of media reception quality in real time and helps to
diagnose the problems on their quality. In addition, a trap is generated when the voice quality parameters
crosses a user configured threshold.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 15-5
Using SIP Snooping Configuring SIP Snooping
• SIP user agents (e.g., SIP phones). SIP user agents are directly connected to edge switches
One SIP Server is connected to the Core switch within the campus infrastructure The server is responsible
for all the SIP functions such as registrar, proxy, redirect, gateway.
page 15-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring SIP Snooping Using SIP Snooping
Interoperability
SIP Snooping can interact with the following equipment:
No Equipment Description
1 OpenTouch Business Edition 1.1 Server SIP based server from Alcatel Lucent
500 Users (OTBE)
2 Alcatel Lucent OXE IP Media Gateway MR3 Part of OTBE
3 Alcatel Lucent PCX Enterprise RM3 Part of OTBE
4 Open Touch soft-phone - My Instant Communicator Part of OTBE
5 8082 My IC Phone OpenTouch SIP Phone
6 LifeSize Passport(Model: LFZ014) SIP endpoint
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 15-7
SIP Snooping Configuration Guidelines Configuring SIP Snooping
On the edge switch, it is recommended to disable auto phone with the qos no phones command. For
example
-> qos no phones
Set all edge ports, including network edge ports to the un-trusted mode. Also ensure uplink port and all the
traversing ports to other SIP endpoint are in trust mode.
All SIP based calls using other than configured trusted call server will not be subject to the configured SIP
QOS treatment
page 15-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring SIP Snooping SIP Snooping Configuration Guidelines
The SIP Snooping TCP port configuration is used to snoop the SIP packets, when the SIP endpoints
switches from UDP to TCP to send SIP packets of more than 1300 bytes in size.
This allows the SIP snooping functionality for the configured UDP ports only.
This marks the SIP messages with the configured SIP control DSCP.
This marks the SOS-Call RTP/RTCP packets with the configured SOS call dscp.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 15-9
SIP Snooping Configuration Guidelines Configuring SIP Snooping
The SIP snooping feature offers configurable thresholds for each performance metric and each media
types.
-> sip-snooping threshold audio jitter 30
-> sip-snooping threshold video jitter 50
-> sip-snooping threshold audio packet-lost 40
-> sip-snooping threshold video packet-lost 30
-> sip-snooping threshold audio round-trip-delay 180
-> sip-snooping threshold video round-trip-delay 180
-> sip-snooping threshold audio R-factor 30
-> sip-snooping threshold video R-factor 30
-> sip-snooping threshold audio MOS 1
-> sip-snooping threshold video MOS 2
Policy Condition
All other policy conditions are still supported for the SIP policy rules. This allows specific QOS treatments
(policy actions) for media streams based on the origin of the call. For instance, a SIP policy condition can
be combined with:
• Source port
• Source IP address/subnet
page 15-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring SIP Snooping SIP Snooping Configuration Guidelines
Other source conditions are also supported but are not foreseen to provide real benefits.
The policy condition is not used as such in the hardware filtering entry, but is used by the SIP snooping
module to determine the policy rule that the new RTP flow is matching. Also, SIP policy rules are
supported in ingress and UNP policy lists.
Policy Action
All other policy actions are still supported for SIP policy rules. For instance:
• DSCP—marks the DSCP value for the RTP/RTCP packets and maps the internal priority to this DSCP
• Rate Limiter
Policy Rule
A SIP policy rule is a rule that has the keyword SIP (audio/video/other) in the policy condition and a
corresponding policy action.
The SIP policy rule is configured as follows.
-> policy condition Voice_srcip_SIP1 source ip [Link] mask [Link] sip
audio
-> policy condition Video_srcip_SIP1 source ip [Link] mask [Link] sip
video
-> policy action DSCP56 dscp 56
-> policy action DSCP32 dscp 32
-> policy rule Voice_srcip_SIP1_rule condition Voice_srcip_SIP1 action DSCP56
-> policy rule Video_srcip_SIP1_rule condition Video_srcip_SIP1 action DSCP32
-> qos apply
Note that a SIP policy rule does not apply for the SIP signaling messages. A SIP policy rule can however
apply for a SOS call since a SOS call is a audio media. However, the DSCP marking and rate limiter for
an SOS call cannot be overwritten by a SIP policy rule.
Unsupported Topologies
The SIP snooping functions and the QOS actions require that the network paths used by the SIP signaling
messages and the RTP/RTCP flows are the same and are “symmetric”. For this reason, the following
topologies are not supported:
• ECMP Routing
• VRRP
In such topologies, it would be possible that one switch/router sees the SIP signaling messages and creates
the dialog with the appropriate QOS actions (i.e. ACLs), but the RTP/RTCP traffic will not be seen by this
switch/router. It would also be possible that the SIP signaling messages and/or RTP/RTCP packets are
load balanced between 2 switch/routers.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 15-11
SIP Snooping Use Case Configuring SIP Snooping
Expectations
• Voice media streams from SIP1 to SIP2 will be marked with DSCP 56
• Video media streams from Video SIP1 to Video SIP2 will be marked with DSCP 32
• Voice media streams from SIP2 to SIP1 will be marked with DSCP 46
• Voice media streams from Video SIP2 to Video SIP1 will be marked with DSCP 48
page 15-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring SIP Snooping SIP Snooping Use Case
SIP Condition
In this example, specific QOS treatments are configured based on the source IP subnet.
• Voice source IP subnet [Link] = DSCP 56
The active call records can be viewed by using the following command:
-> show sip-snooping call-records active-calls full
Legend: start date time duration media-type end-reason
call-id / from-tag / to-tag
IP address port DSCP (forward/reverse)
policy-rule (F/R)
--------------------------------------------------------------------------------
2013-11-21 [Link](PST) 0d 16h 13m 41s Audio -
6dddf3236f2d564c / d1fc26f8da / 0061D0A0-7C50-1200-83AF-F1A3FE87AA77-1439499
IP/DSCP [Link] 6000 NA/NA [Link] 6000 NA/NA
Policy-Rule r6 r1
Pkt-Count 2920807 2920807
Pkt-Loss 0 0 0.00 0% 0 0 0.00 0%
Jitter 1 198714 17.34 0% 1 49 0.32 0%
Delay 9 29 16.44 0% 9 29 16.44 0%
R-factor 35 96 35.42 99% 30 96 32.00 99%
MOS 1.00 4.00 1.80 99% 1.00 4.00 1.60 99%
-----------------------------------------------------------------------------------
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 15-13
SIP Snooping Use Case Configuring SIP Snooping
--------------------------------------------------------------------------------
2002-04-06 [Link] UTC 0d 0h 4m 15s Audio -
0010CFC0-4A05-10DA-B960-F1A3FE87AA77-23025@[Link] / 0010CFE8-4A05-10DA-B960-
F1A3FE87AA77-258649 / 1668946822
IP/DSCP [Link] 6000 56/56 [Link] 6000 46/46
Policy-Rule Voice_srcip_SIP1_rule Voice_srcip_SIP2_rule
Pkt-Count 12272 61385
Pkt-Loss 0 0 0.00 0% 0 0 0.00
0%
Jitter 0 0 0.00 0% 0 0 0.00
0%
Delay 0 0 0.00 0% 0 0 0.00
0%
R-factor 0 0 0.00 0% 96 96 96.00
0%
MOS 0 0 0.00 0% 44 44 44.00
-----------------------------------------------------------------------------------
Number of Call Records: 1
Similar to the above example, more conditions can be combined in a single SIP rule.
• Video source IP subnet [Link]= RTCP—packets for these RTP flows are trapped to CPU and have
their DSCP unchanged.
-> policy action DSCP32 rtcp-monitoring enable trust-DSCP
• Voice source IP subnet [Link] = DSCP 46 + No RTCP monitoring—RTCP packets for these RTP
flows are not trapped to CPU and assigned with DSCP 46.
-> policy action DSCP46 dscp 46 rtcp-monitoring disable
• Video source IP subnet [Link] = DSCP 48 + RTCP monitoring and explicit DSCP 46—RTCP
packets for these RTP flows are trapped to CPU and assigned with DSCP 46.
-> policy action DSCP48 dscp 48 rtcp-monitoring enable rtcp-dscp 46
page 15-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring SIP Snooping SIP Snooping Limitations
• SIP Registrar, outbound proxy, proxy, redirect functions should be provided by the same server called
the SIP Server.
• All initial SIP messages between User Agents must go through the SIP Server. Direct SIP session
establishment between end users will be not supported.
• Outbound proxy configured on phone and trusted call server configured on switch must be the same.
• Only SIP over UDP and SIP over UDP/TCP is supported. Solution does not support SIP over SCTP or
MPLS and SIP over TLS.
• Encrypted RTCP or SDP is not supported.
• Only RTP or RTP profile AVP is supported to carry media. SAVP, AVPF, SAVPF are not supported.
• Only IP address is supported. DNS resolution and FQDN name are not supported in SDP
• RTCP port assignment is taken as one higher than corresponding RTP. Other methods for RTCP port
assignment is not supported
• Media quality metrics displayed to the user only convey the presence of problem in voice and video
transmission quality. Exact location and device responsible for it will not be known and it is expected
that the user will find it by other means and take corrective action.
• QOS SIP policy modifications should be applied for the new calls only and not for existing ones.
• DSCP marking will be done for only [(64 * TCAM Slice Value)-4] SIP audio calls, if a call is through
linkagg on a stack.
• No VRF awareness. Similarly, NAT transversal (ICE, TURN, STUN solution) is not supported.
• Emergency call identification is based on user configured string. Usage of priority or resource-priority
header is not considered.
• SIP IP address and RTP IP address of end point at edge port must be same, otherwise TCAM entries
will not be created.
• Media that flows before TCAM entries are installed does not get configured QOS treatment.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 15-15
Verifying the SIP Snooping Configuration Configuring SIP Snooping
page 15-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
16 Configuring IP
Internet Protocol (IP) is primarily a network-layer (Layer 3) protocol that contains addressing and control
information that enables packets to be forwarded. Along with Transmission Control Protocol (TCP), IP
represents the heart of the Internet protocols. IP has two primary responsibilities, providing
connectionless, best-effort delivery of datagrams through an internetwork; and providing fragmentation
and reassembly of datagrams to support data links with different Maximum Transmission Unit (MTU)
sizes.
Note. IP routing (Layer 3) can be accomplished using static routes or by using one of the IP routing
protocols, Routing Information Protocol (RIP) and Open Shortest Path First (OSPF). For more information
on these protocols see Chapter 20, “Configuring RIP,” in this manual; or “Configuring OSPF” in the
OmniSwitch AOS Release 8 Advanced Routing Configuration Guide.
Two versions of Internet Protocol is supported - IPv4 and IPv6. For more information about using IPv6,
see Chapter 18, “Configuring IPv6.”
In This Chapter
This chapter describes IP and how to configure it through the Command Line Interface (CLI). It includes
instructions for enabling IP forwarding, configuring IP route maps, as well as basic IP configuration
commands (for example, ip default-ttl). CLI commands are used in the configuration examples; for more
details about the syntax of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide. This
chapter provides an overview of IP and includes information about the following procedures:
• IP Forwarding
– Configuring an IP Interface (see page 16-8)
– Configuring a Managed IP Interface (see page 16-11)
– Creating a Static Route or Recursive Static Route (see page 16-11)
– Creating a Default Route (see page 16-13)
– Configuring Address Resolution Protocol (ARP) (see page 16-13)
• IP Configuration
– Configuring the Router Primary Address (see page 16-17)
– Configuring the Router ID (see page 16-17)
– Configuring the Time-to-Live (TTL) Value (see page 16-18)
– Configuring Route Map Redistribution (see page 16-18)
– IP-Directed Broadcasts (see page 16-24)
– Protecting the Switch from Denial of Service (DoS) attacks (see page 16-24)
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-1
In This Chapter Configuring IP
• Managing IP
– Internet Control Message Protocol (ICMP) (see page 16-30)
– Using the Ping Command (see page 16-32)
– Tracing an IP Route (see page 16-33)
– Displaying TCP Information (see page 16-33)
– Displaying User Datagram Protocol (UDP) Information (see page 16-34)
– Service Assurance Agent (SAA) (see page 16-34)
• Tunneling
– Generic Routing Encapsulation (page 16-34)
– IP Encapsulation within IP (page 16-34)
– Tunneling operation (page 16-35)
– Configuring a Tunnel Interface (page 16-36)
• VRF Route Leak
– Quick Steps for Configuring VRF Route Leak (page 16-38)
– Configuring VRF Route Leak (page 16-39)
– Verifying VRF Route Leak Configuration (page 16-40)
page 16-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Specifications
IP Specifications
The maximum limit values provided in the following Specifications table are subject to available system
resources:
IP Defaults
The following table lists the defaults for IP configuration through the ip command.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-3
Quick Steps for Configuring IP Forwarding Configuring IP
Note. The operational status of a VLAN remains inactive until at least one active switch port is assigned to
the VLAN. If the ports are connected to an active network device, they are considered active. Non-active
port assignments are allowed, but do not change the operational state of the VLAN.
To forward packets to a different VLAN on a switch, create an IP interface on each VLAN. The following
steps provide a quick tutorial of how to enable IP forwarding between VLANs “from scratch”. If active
VLANs have already been created on the switch, you only need to create IP interfaces on each VLAN
(Steps 5 and 6).
1 Create VLAN 10 with a description (for example, VLAN 10) using the vlan command. For example:
2 Create VLAN 20 with a description (for example, VLAN 20) using the vlan command. For example:
3 Assign an active port to VLAN 10 using the vlan members untagged command. For example:
4 Assign an active port to VLAN 20 using the vlan members command. For example:
Note. See Chapter 4, “Configuring VLANs,” for more information about how to create VLANs.
page 16-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Overview
IP Overview
IP is a network-layer (Layer 3) protocol that contains addressing and control information that enables
packets to be forwarded on a network. IP is the primary network-layer protocol in the Internet protocol
suite. Along with TCP, IP represents the heart of the Internet protocols.
IP Protocols
IP is associated with Layer 3 and Layer 4 protocols. These protocols are built into the base code loaded on
the switch. A brief overview of the supported IP protocols is described in the following sections.
Transport Protocols
IP is both connectionless (it forwards each datagram separately) and unreliable (it does not guarantee
delivery of datagrams). This means that a datagram can be damaged in transit, thrown away by a busy
switch, or never make it to its destination. The resolution of these transit problems is to use a Layer 4-
transport protocol, such as:
• TCP—A major data transport mechanism that provides reliable, connection-oriented, full-duplex data
streams. While the role of TCP is to add reliability to IP, TCP relies upon IP to do the actual delivering
of datagrams.
• UDP—A secondary transport-layer protocol that uses IP for delivery. UDP is not connection-oriented
and does not provide reliable end-to-end delivery of datagrams. Few applications can safely use UDP
to send datagrams that do not require the extra overhead added by TCP. For more information on UDP,
see Chapter 22, “Configuring DHCP Relay.”
Application-Layer Protocols
Application-layer protocols are used for switch configuration and management:
• Bootstrap Protocol (BOOTP)/Dynamic Host Configuration Protocol (DHCP)—can be used by an end
station to obtain an IP address. The switch provides a DHCP Relay that allows BOOTP requests/replies
to cross different networks.
• Simple Network Management Protocol (SNMP)—Allows communication between SNMP managers
and SNMP agents on an IP network. Network administrators use SNMP to monitor network
performance and manage network resources. For more information, see the “Using SNMP” chapter in
the OmniSwitch AOS Release 8 Switch Management Guide.
• Telnet—Used for remote connections to a device. You can telnet to a switch and configure the switch
and the network by using the CLI.
• SSH—Used for remote connections to a device. You can SSH to a switch and configure the switch and
the network by using the CLI.
• File Transfer Protocol (FTP)—Enables the transfer of files between hosts. This protocol is used to load
new images onto the switch.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-5
IP Overview Configuring IP
Additional IP Protocols
Many additional IP-related protocols can be used with IP forwarding. These protocols are included as part
of the base code.
• Address Resolution Protocol (ARP)—Used to match the IP address of a device with its physical
(MAC) address. For more information, see “Configuring Address Resolution Protocol (ARP)” on
page 16-13.
• Virtual Router Redundancy Protocol (VRRP)—Used to back up routers. For more information, see
Chapter 24, “Configuring VRRP.”
• Internet Control Message Protocol (ICMP)—Specifies the generation of error messages, test packets,
and informational messages related to IP. ICMP supports the ping command used to determine if hosts
are online. For more information, see “Internet Control Message Protocol (ICMP)” on page 16-30.
• Multicast Services—Includes IP multicast switching (IPMS). For more information, see Chapter 26,
“Configuring IP Multicast Switching.”
page 16-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Forwarding
IP Forwarding
Network device traffic is bridged (switched) at the Layer-2 level between ports that are assigned to the
same VLAN. However, if a device needs to communicate with another device that belongs to a different
VLAN, then Layer 3 routing is necessary to transmit traffic between the VLANs. Bridging decides to
forward the packets based on the destination MAC address of the packet. Routing decides on where to
forward packets based on the IP network address of the packet (for example, IP - [Link]).
Alcatel-Lucent switches support routing of IP traffic. A VLAN is available for routing when at least one
router interface is defined for that VLAN and at least one active port is associated with the VLAN. If a
VLAN does not have a router interface, the ports associated with that VLAN are in essence firewalled
from other VLANs.
IP multi-netting is also supported. A network is said to be multi-netted when multiple IP subnets are
brought together within a single broadcast domain. Each interface is configured with a different subnet. As
a result, traffic from each configured subnet can coexist on the same VLAN.
In the illustration below, an IP router interface has been configured on each VLAN. Therefore,
workstations connected to ports on VLAN 1 on Switch 1 can communicate with VLAN 2; and
workstations connected to ports on VLAN 3 on Switch 2 can communicate with VLAN 2. Also, ports
from both switches have been assigned to VLAN 2, and a physical connection has been made between the
switches. Therefore, workstations connected to VLAN 1 on Switch 1 can communicate with workstations
connected to VLAN 3 on Switch 2.
Switch 1 Switch 2
= IP Router Interface
Physical
VLAN 2 Connection VLAN 2
VLAN 1 [Link] VLAN 3
[Link]
IP Forwarding
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-7
IP Forwarding Configuring IP
Configuring an IP Interface
IP is enabled by default. Using IP, devices connected to ports on the same VLAN are able to
communicate. However, to forward packets to a different VLAN, create at least one IP interface on each
VLAN.
Use the ip interface command to define IP interfaces for an existing VLAN. The following parameter
values are configured with this command:
• A unique interface name (text string up to 16 characters) is used to identify the IP interface. Specifying
this parameter is required to create or modify an IP interface.
• The VLAN ID of an existing VLAN.
• An IP address to assign to the interface (for example, [Link]). Router interface IP addresses
must be unique. You cannot have two-router interfaces with the same IP address.
• A subnet mask (defaults to the IP address class). It is possible to specify the mask in dotted decimal
notation (for example, [Link]) or with a slash (/) after the IP address followed by the number of
bits to specify the mask length (for example, [Link]/24).
• The forwarding status for the interface (defaults to forwarding). A forwarding router interface sends IP
frames to other subnets. A router interface that is not forwarding can receive frames from other hosts
on the same subnet.
• An Ethernet-II or SNAP encapsulation for the interface (defaults to Ethernet-II). The encapsulation
determines the framing type the interface uses when generating frames that are forwarded out of VLAN
ports. Select an encapsulation that matches the encapsulation of the majority of VLAN traffic.
• The Local Proxy ARP status for the VLAN. If enabled, traffic within the VLAN is routed instead of
bridged. ARP requests return the MAC address of the IP router interface defined for the VLAN. For
more information about Local Proxy ARP, see “Local Proxy ARP” on page 16-15.
• The primary interface status. Designates the specified IP interface as the primary interface for the
VLAN. By default, the first interface bound to a VLAN becomes the primary interface for that VLAN.
The following ip interface command example creates an IP interface named Marketing with an IP
network address of [Link] and binds the interface to VLAN 455:
-> ip interface Marketing address [Link] vlan 455
The name parameter is the only parameter required with this command. Specifying additional parameters
is only necessary to configure a value other than the default value for that parameter. For example, all of
the following commands create an IP router interface for VLAN 955 with a class A subnet mask, an
enabled forwarding status, Ethernet-II encapsulation, and a disabled Local Proxy ARP and primary
interface status:
-> ip interface Accounting address [Link] mask [Link] vlan 955 forward e2
no local-proxy-arp no primary
-> ip interface Accounting address [Link]/8 vlan 955
-> ip interface Accounting address [Link] vlan 955
page 16-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Forwarding
When changing the IP address for the interface, the subnet mask reverts to the default mask value if it was
previously set to a non-default value and it is not specified when changing the IP address. For example,
the following command changes the IP address for the Accounting interface:
-> ip interface Accounting address [Link]
The subnet mask for the Accounting interface was previously set to [Link]. The above example
resets the mask to the default value of [Link] because [Link] is a Class A address and no other mask
was specified with the command. This only occurs when the IP address is modified; all other parameter
values remain unchanged unless otherwise specified.
To avoid the problem in the above example, enter the non-default mask value whenever the IP address is
changed for the interface. For example:
-> ip interface Accounting address [Link] mask [Link]
-> ip interface Accounting address [Link]/8
Use the show ip interface command to verify IP router interface changes. For more information about
these commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
To view a list of IP interfaces configured on the switch, use the show ip interface command. For more
information about this command, see the OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-9
IP Forwarding Configuring IP
• Creating this interface does not deduct from the total number of IP interfaces allowed per VLAN or
switch.
• To change the address, remove the interface using the no ip interface Loopback0 command and re-
add it with the new address.
• OSPF advertises the host route to the Loopback0 IP interface in its Router-LSAs (as a Stub link) as an
internal route into all its configured areas.
See the OmniSwitch AOS Release 8 Advanced Routing Configuration Guide for more information.
page 16-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Forwarding
The following command configures user-defined source IP interface for the FTP application:
-> ip service source-ip ipVlan100 ftp
Notes.
• Use “all” option in the command to configure a common source IP address for the applications. If for a
particular application, specific source IP address is configured and the “all” option is also set, the
configured source IP address foip r the application is used as the outgoing interface.
• If a source IP interface is not defined for an application, the application uses the outgoing interface
address as the source IP.
A source IP address is configurable for the following applications within the VRF context:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-11
IP Forwarding Configuring IP
For example, to create a static route to IP address [Link] through interface Int1you would enter:
-> ip static-route [Link] interface Int1
If you want to use the natural subnet mask, the subnet mask is not required. By default, the switch imposes
a natural mask on the IP address. In the above example, the Class B mask of [Link] is implied. If you
do not want to use the natural mask, enter a subnet mask. For example, to create a static route to IP address
[Link], enter the Class C mask of [Link]:
-> ip static-route [Link] mask [Link] gateway [Link]
Specifying the length of the mask in bits is also supported. For example, the above static route is also
configurable using the following command:
-> ip static-route [Link]/24 gateway [Link]
When you create a static route, the default metric value of 1 is used. However, you can change the priority
of the route by increasing its metric value. The lower the metric value, the higher the priority. This metric
is added to the metric cost of the route. The metric range is 1 to 15. For example:
-> ip static-route [Link]/24 gateway [Link] metric 5
Static routes do not age out of the IP Forwarding table; delete them from the table. Use the no ip static
route command to delete a static route. Specify the destination IP address of the route as well as the IP
page 16-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Forwarding
address of the first hop (gateway). For example, to delete a static route to IP address [Link] through
gateway [Link], you would enter:
-> no ip static-route [Link] gateway [Link]
The IP Forwarding table includes routes learned through one of the routing protocols (RIP, OSPF, BGP)
as well as any static routes that are configured. Use the show ip routes command to display the IP
Forwarding table.
A route to the [Link] address must be learned by a dynamic routing protocol for the recursive static
route to be active.
Specifying the length of the mask in bits is also supported. For example, the above default route is also
configurable using the following command:
-> ip static-route [Link]/0 gateway [Link]
Note. You cannot create a default route by using the EMP port as a gateway.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-13
IP Forwarding Configuring IP
Configuring a permanent ARP entry with a multicast address is also supported. For example, the following
command creates a permanent multicast ARP entry:
-> arp [Link] [Link]
When configuring a static multicast ARP entry, do not use any of the following multicast addresses:
[Link] to [Link]
[Link][Link]
[Link]XX:XX:XX:XX
The IP address and hardware address (MAC address) are required when you add an entry to the ARP
table. Optionally, you can also specify:
• Alias. Use the alias keyword to specify that the switch acts as an alias (proxy) for this IP address.
When the alias option is used, the switch responds to all ARP requests for the specified IP address with
its own MAC address. This option is not related to Proxy ARP as defined in RFC 925.
For example:
-> arp [Link] [Link] alias
• ARP Name. Use the arp-name parameter to specify a name for the permanent ARP entry.
For example:
-> arp [Link] [Link] arp-name server1
• Interface. Use the interface parameter to set the interface for ARP resolution.
For example:
-> arp [Link] [Link] arp-name server1 interface Int1
Note. As most hosts support the use of address resolution protocols to determine and cache address infor-
mation (called dynamic address resolution), it is not required to specify permanent ARP entries.
page 16-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Forwarding
Use the show arp command to display the ARP table and verify that the entry was deleted.
Note. You can also use the no arp command to delete a dynamic entry from the table.
Note. Dynamic entries remain in the ARP table until they time out. If the switch does not receive data from
a host for this user-specified time, the entry is removed from the table. If another packet is received from
this host, the switch goes through the discovery process again to add the entry to the table. The switch uses
the MAC Address table time-out value as the ARP time-out value. Use the mac-learning aging-time
command to set the time-out value.
When Local Proxy ARP is enabled for any one IP router interface associated with a VLAN, the feature is
applied to the entire VLAN. It is not necessary to enable it for each interface. However, if the IP interface
that has the Local Proxy ARP feature enabled is moved to another VLAN, Local Proxy ARP is enabled
for the new VLAN and must be enabled on another interface for the old VLAN.
ARP Filtering
ARP filtering is used to determine whether the switch responds to ARP requests that contain a specific IP
address. ARP filtering is used in conjunction with the Local Proxy ARP application; however, it is
available for use on its own or with other applications.
By default, no ARP filters exist in the switch configuration. When there are no filters present, all ARP
packets are processed, unless they are blocked or redirected by some other feature.
Use the arp filter command to specify the following parameter values required to create an ARP filter:
• An IP address (for example, [Link]) used to determine whether an ARP packet is filtered.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-15
IP Forwarding Configuring IP
• An IP mask (for example, [Link]) used to identify which part of the ARP packet IP address is
compared to the filter IP address.
• An optional VLAN ID to specify that the filter is only applied to ARP packets from that VLAN.
• Which ARP packet IP address to use for filtering (sender or target). If the target IP address in the ARP
packet matches a target IP specified in a filter, then the disposition for that filter applies to the ARP
packet. If the sender IP address in the ARP packet matches a sender IP specified in a filter, then the
disposition for that filter applies to the ARP packet.
• The filter disposition (block or allow). If an ARP packet meets filter criteria, the switch is either
blocked from responding to the packet or allowed to respond to the packet depending on the filter
disposition. Packets that do not meet any filter criteria are responded to by the switch.
The following arp filter command example creates an ARP filter, which blocks the switch from
responding to ARP packets that contain a sender IP address that starts with 198:
-> arp filter [Link] mask [Link] sender block
Up to 200 ARP filters can be defined on a single switch. To remove an individual filter, use the no form of
the arp filter command. For example:
-> no arp filter [Link]
To clear all ARP filters from the switch configuration, use the clear arp filter command. For example:
-> clear arp filter
Use the show arp filter command to verify the ARP filter configuration. For more information on ARP
Filtering and other ARP filter commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
page 16-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Configuration
IP Configuration
IP is enabled on the switch by default and a few options that can, or need to be, configured. This section
provides instructions for basic IP configuration options.
To display the current route preference configuration, use the show ip route-pref command:
-> show ip route-pref
Protocol Route Preference Value
------------+------------------------
Local 1
Static 2
OSPF 110
RIP 120
EBGP 190
IBGP 200
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-17
IP Configuration Configuring IP
The default hop count is 64. The valid range is 1 to 255. Use the show ip config command to display the
default TTL value.
2 Configure redistribution to apply a route map, as described in “Configuring Route Map Redistribu-
tion” on page 16-22.
page 16-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Configuration
The ip route-map command is used to configure route map statements and provides the following action,
match, and set parameters:
Refer to the “IP Commands” chapter in the OmniSwitch AOS Release 8 CLI Reference Guide for more
information about the ip route-map command parameters and usage guidelines.
Once a route map is created, it is then applied using the ip service source-ip command. See “Configuring
Route Map Redistribution” on page 16-22 for more information.
Route Maps are also used for VRF route leaking and RIP route filtering. See “VRF Route Leak” on
page 16-38 section for more information.
The above command creates the ospf-to-bgp route map, assigns a sequence number of 10 to the route
map, and specifies a permit action.
To optionally filter routes before redistribution, use the ip route-map command with a match parameter
to configure match criteria for incoming routes. For example,
-> ip route-map ospf-to-bgp sequence-number 10 match tag 8
The above command configures a match statement for the ospf-to-bgp route map to filter routes based on
their tag value. When this route map is applied, only OSPF routes with a tag value of eight are
redistributed into the BGP network. All other routes with a different tag value are dropped.
Note. Configuring match statements is not required. However, if a route map does not contain any match
statements and the route map is applied using the ip service source-ip command, the router redistributes all
routes into the network of the receiving protocol.
Use the ip route-map command with a set parameter to modify route information before redistribution.
For example,
-> ip route-map ospf-to-bgp sequence-number 10 set tag 5
The above command configures a set statement for the ospf-to-bgp route map that changes the route tag
value to five. As this statement is part of the ospf-to-bgp route map, it is only applied to routes that have
an existing tag value equal to eight.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-19
IP Configuration Configuring IP
To delete a specific sequence number within a route map, enter no ip route-map followed by the route
map name, then sequence-number followed by the actual number. For example, the following command
deletes sequence 10 from the redistipv4 route map:
-> no ip route-map redistipv4 sequence-number 10
In the above example, the redistripv4 route map is not deleted. Only those statements associated with
sequence 10 are removed from the route map.
To delete a specific statement within a route map, enter no ip route-map followed by the route map name,
then sequence-number followed by the sequence number for the statement, then either match or set and
the match or set parameter and value. For example, the following command deletes only the match tag 8
statement from route map redistipv4 sequence 10:
-> no ip route-map redistipv4 sequence-number 10 match tag 8
To configure a new sequence of statements for an existing route map, specify the same route map name
but use a different sequence number. For example, the following commands create a sequence 20 for the
rm_1 route map:
-> ip route-map rm_1 sequence-number 20 action permit
page 16-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Configuration
Sequence 10 and sequence 20 are both linked to route map rm_1 and are processed in ascending order
according to their sequence number value. There is an implied logical OR between sequences. As a result,
if there is no match for the tag value in sequence 10, then the match interface statement in sequence 20 is
processed. However, if a route matches the tag 8 value, then sequence 20 is not used. The set statement for
whichever sequence was matched is applied.
A route map sequence can contain multiple match statements. If these statements are of the same kind (for
example, match tag 5, match tag 8, and so on) then a logical OR is implied between each like statement. If
the match statements specify different types of matches (for example, match tag 5, match ip4 interface to-
finance, and so on), then a logical AND is implied between each statement. For example, the following
route map sequence redistributes a route if its tag is either 8 or 5:
-> ip route-map rm_1 sequence-number 10 action permit
-> ip route-map rm_1 sequence-number 10 match tag 5
-> ip route-map rm_1 sequence-number 10 match tag 8
If the route has a tag of 8 or 5 and the route was learned on the IPv4 interface to-finance, the following
route map sequence redistributes a route:
-> ip route-map rm_1 sequence-number 10 action permit
-> ip route-map rm_1 sequence-number 10 match tag 5
-> ip route-map rm_1 sequence-number 10 match tag 8
-> ip route-map rm_1 sequence-number 10 match ipv4-interface to-finance
To add addresses to an access list, use the ip access-list address (IPv4) or the ipv6 access-list address
(IPv6) command. For example, the following commands add addresses to an existing access list:
-> ip access-list ipaddr address [Link]/8
-> ipv6 access-list ip6addr address 2001::/64
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-21
IP Configuration Configuring IP
Use the same access list name each time the above commands are used to add additional addresses to the
same access list. In addition, both commands provide the ability to configure if an address and/or its
matching subnet routes are permitted (the default) or denied redistribution. For example:
-> ip access-list ipaddr address [Link]/16 action deny redist-control all-
subnets
-> ipv6 access-list ip6addr address 2001::1/64 action permit redist-control no-
subnets
For more information about configuring access list commands, see the “IP Commands” chapter in the
OmniSwitch AOS Release 8 CLI Reference Guide.
OSPF routes received by the router interface are processed based on the contents of the ospf-to-bgp route
map. Routes that match criteria specified in this route map are either allowed or denied redistribution into
the BGP network. The route map can also specify the modification of route information before the route is
redistributed. See “Using Route Maps” on page 16-18 for more information.
To remove a route map redistribution configuration, use the no form of the ip redist command. For
example:
-> no ip redist ospf into bgp route-map ospf-to-bgp
Source Destination
Protocol Protocol Status Route Map
------------+------------+---------+--------------------
LOCAL4 RIP Enabled rip_1
LOCAL4 OSPF Enabled ospf_2
LOCAL4 BGP Enabled bgp_3
RIP OSPF Enabled ospf-to-bgp
page 16-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Configuration
The resulting ospf-to-bgp route map redistribution configuration does the following
• Denies the redistribution of Type 2 external OSPF routes with a tag set to five.
• Redistributes into BGP all routes learned on the intf_ospf interface and sets the metric for such routes
to 255.
• Redistributes into BGP all other routes that are not processed by sequence 10 or 20, and sets the tag for
such routes to eight.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-23
IP Configuration Configuring IP
IP-Directed Broadcasts
An IP directed broadcast is an IP datagram that has all zeros or all 1 in the host portion of the destination
IP address. The packet is sent to the broadcast address of a subnet to which the sender is not directly
attached. Directed broadcasts are used in denial-of-service “smurf” attacks. In a smurf attack, a continuous
stream of ping requests is sent from a falsified source address to a directed broadcast address, resulting in a
large stream of replies, which can overload the host of the source address. By default, the switch drops
directed broadcasts. Directed broadcasts must not be enabled.
Use the ip directed-broadcast command to enable or disable IP-directed broadcasts. For example:
-> ip directed-broadcast enable
Use the show ip config command to display the IP-directed broadcast state.
• [Link].
page 16-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Configuration
• 0.x.x.x.
Note. In both the conditions described above in “Multicast IP and MAC Address Mismatch”, packets are
dropped and SNMP traps are generated.
– the destination IP is a unicast IP and the destination MAC address is either a Broadcast or Multicast
address. In such a condition, an event is recorded in the DoS statistics. No SNMP traps are
generated as valid packets can also fall under this category.
• Ping overload—Floods a switch with a large number of ICMP packets, resulting in the switch using a
large amount of CPU time to respond to these packets. If the number of ICMP packets exceed 100 per
second, a DoS attack is detected. By default, the detection of attack is disabled.
• Packets with loopback source IP address—Packets with an invalid source address of [Link]/8
(loopack network) are received by the switch. When such packets are detected, they are dropped, and
SNMP traps are generated.
The switch can be set to detect various types of port scans by monitoring for TCP or UDP packets sent to
open or closed ports. Monitoring is done in the following manner:
• Packet penalty values set. TCP and UDP packets destined for open or closed ports are assigned a
penalty value. Each time a packet of this type is received, its assigned penalty value is added to a
running total. This total is cumulative and includes all TCP and UDP packets destined for open or
closed ports.
• Port scan penalty value threshold. The switch is given a port scan penalty value threshold. This
number is the maximum value the running penalty total can achieve before triggering an SNMP trap.
• Decay value. A decay value is set. The running penalty total is divided by the decay value every
minute.
• Trap generation. If the total penalty value exceeds the set port scan penalty value threshold, a trap is
generated to alert the administrator that a port scan can be in progress.
For example, imagine that a switch is set so that TCP and UDP packets destined for closed ports are given
a penalty of 10, TCP packets destined for open ports are given a penalty of 5, and UDP packets destined
for open ports are given a penalty of 20. The decay is set to 2, and the switch port scan penalty value
threshold is set to 2000:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-25
IP Configuration Configuring IP
.
DoS Settings
UDP/TCP closed = 10
UDP open = 20
TCP open = 5
Threshold = 2000
Decay = 2
Penalty Total = 0
In 1 minute, 10 TCP closed port packets and 10 UDP closed port packets are received. This brings the total
penalty value to 200, as shown using the following equation:
(10 TCP X 10 penalty) + (10 UDP X 10 penalty) = 200
This value would be divided by 2 (due to the decay) and decreased to 100. The switch would not record a
port scan:
DoS Settings
UDP/TCP closed = 10
UDP open = 20
TCP open = 5
Threshold = 2000
Decay = 2
In the next minute, 10 more TCP and UDP closed port packets are received, along with 200 UDP open
port packets. This would bring the total penalty value to 4300, as shown using the following equation:
(100 previous minute value) + (10 TCP X 10 penalty) + (10 UDP X 10 penalty) +
(200 UDP X 20 penalty) = 4300
This value would be divided by 2 (due to decay) and decreased to 2150. The switch would record a port
scan and generate a trap to warn the administrator:
page 16-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Configuration
DoS Settings
UDP/TCP closed = 10
UDP open =20
TCP open = 5
Threshold = 2000
Decay = 2
10 TCP closed port packets
The above functions and how to set their values are covered in the sections that follow.
Each type has its own command to assign a penalty value. Penalty values can be any non-negative inte-
ger. Each time a packet is received that matches an assigned penalty, the total penalty value for the switch
is increased by the penalty value of the packet in question.
To assign a penalty value to TCP/UDP packets bound for a closed port, use the ip dos scan close-port-
penalty command with a penalty value. For example, to assign a penalty value of 10 to TCP/UDP packets
destined for closed ports, enter the following:
-> ip dos scan close-port-penalty 10
To assign a penalty value to TCP packets bound for an open port, use the ip dos scan tcp open-port-
penalty command with a penalty value. For example, to assign a penalty value of 10 to TCP packets
destined for opened ports, enter the following:
-> ip dos scan tcp open-port-penalty 10
To assign a penalty value to UDP packets bound for an open port, use the ip dos scan udp open-port-
penalty command with a penalty value. For example, to assign a penalty value of 10 to TCP/UDP packets
destined for closed ports, enter the following:
-> ip dos scan udp open-port-penalty 10
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-27
IP Configuration Configuring IP
To disable DoS traps, enter the same ip dos trap command, as shown:
-> ip dos trap disable
ARP Poisoning
ARP Poisoning allows an attacker to sniff and tamper the data frames on a network. It also modifies or
halts the traffic. The principle of ARP Poisoning is to send false or spoofed ARP messages to an Ethernet
LAN.
Alcatel-Lucent introduces the functionality that detects the presence of an ARP poisoning host on a
network. This functionality uses a configured restricted IP addresses, so that the switch does not get ARP
response on sending an ARP request. If an ARP response is received, then an event is logged and the user
is alerted using an SNMP trap.
Use the ip dos arp-poison restricted-address command to add an ARP Poison restricted address. Enter
the command, followed by the IP address. For example, to add an ARP Poison restricted address as
[Link], you would enter:
-> ip dos arp-poison restricted-address [Link]
To delete an ARP Poison restricted address, enter no ip dos arp-poison restricted-address followed by
the IP address. For example:
-> no ip dos arp-poison restricted-address [Link]
page 16-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP IP Configuration
To verify the number of attacks detected for configured ARP poison restricted addresses, use the show ip
service source-ip command. For more information about this command, see the OmniSwitch AOS Release
8 CLI Reference Guide.
Enabling/Disabling IP Services
When a switch initially boots up, all supported TCP/UDP well-known service ports are enabled (open).
Although these ports provide access for essential switch management services, such as telnet, FTP,
SNMP, they also are vulnerable to DoS attacks. It is possible to scan open service ports and launch such
attacks based on well-known port information.
The ip service command allows you to disable (close) TCP/UDP well-known service ports selectively and
enable them when necessary. This command only operates on TCP/UDP ports that are opened by default.
It has no impact on ports that are opened by loading applications, such as RIP and BGP.
In addition, the ip service command allows you to designate which service to enable or disable by
specifying the name of a service as well as changing the well-known port number associated with that
service. For example, the following commands disable the telnet service, change the port and re-enable the
service:
-> ip service telnet admin-state disable
-> ip service telnet port 20999
-> ip service telnet admin-state enable
Use default parameter to revert the port number of a service to the default port number.
-> ip service telnet port default
The following table lists ip service command options for specifying TCP/UDP services and also includes
the well-known port number associated with each service:
service port
ftp 21
ssh 22
telnet 23
http 80
https 443
network-time 123
snmp 161
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-29
Managing IP Configuring IP
Managing IP
The following sections describe IP commands that can be used to monitor and troubleshoot IP forwarding
on the switch.
page 16-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Managing IP
To list the ICMP message information use the show icmp control command.
In addition to the icmp type command, many commonly used ICMP messages have separate CLI
commands for convenience. The following table lists the ICMP message name, type, and code:
These commands are entered as the icmp type command, only without specifying a type or code. The
echo, timestamp, and address mask commands have options for distinguishing between a request or a
reply, and the unreachable command has options distinguishing between a network, host, protocol, or port.
For example, to enable an echo request message, enter the following:
-> icmp echo request enable
Note. Enabling host-unreachable and net-unreachable messages are not recommended as it can cause the
switch instability due to high-CPU conditions depending upon the volume of traffic required by these mes-
sages.
See Chapter 16, “IP Commands,” for specifics on the ICMP message commands.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-31
Managing IP Configuring IP
To disable all ICMP messages, enter the same command with the disable keyword. For example:
-> icmp messages enable
Likewise, to set the Timestamp Reply minimum packet gap to 100 microseconds, enter the following:
-> icmp timestamp reply min-pkt-gap 100
When you ping a device, the device IP address or host name is required. Optionally, you can also specify:
• Count. Use the count keyword to set the number of frames to be transmitted.
• Size. Use the size keyword to set the size, in bytes, of the data portion of the packet sent for this ping.
You can specify a size or a range of sizes up to 60000.
• Interval. Use the interval keyword to set the frequency, in seconds, that the switch polls the host.
• Time-out. Use the time-out keyword to set the number of seconds the program waits for a response
before timing out.
page 16-32 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Managing IP
• source-interface. Use the source-interface keyword to set the IP address to be used as source IP for
the ping packets.
• data-pattern. Use the data-pattern keyword to set the data pattern to be used in the data field of the
ping packets.
• dont-fragment. Use the dont-fragment keyword to set the don't-fragment bit in the IP packet.
• tos. Use the tos keyword to set the type of service field in the IP header.
For example, to send a ping with a count of 2, a size of 32 bytes, an interval of 2 seconds, time-out of 10
seconds, a source-interface using mgmt, tos of 1, data-pattern of AB and dont-fragment you would enter:
-> ping [Link] count 2 size 32 interval 2 timeout 10 source-interface mgmt
tos 1 data-pattern AB dont-fragment
Note. If you change the default values, they only apply to the current ping. The next time you use the ping
command, the default values are used unless you enter different values again.
Tracing an IP Route
The traceroute command is used to find the path taken by an IP packet from the local switch to a
specified destination. This command displays the individual hops to the destination as well as timing
information. When using this command, enter the name of the destination as part of the command line
(either the IP address or host name). Use the optional max-hop parameter to set a maximum hop count to
the destination. If the trace reaches this maximum hop count without reaching the destination, the trace
stops.
For example, to perform a traceroute to a device with an IP address of [Link] with a maximum hop
count of 10 you would enter:
-> traceroute [Link] max-hop 10
• source-interface. Use the source-interface keyword to set the source IP interface to be used in the
traceroute packets.
• probes. Use the probes keyword to set the number of packets (retry) to be sent for each hop-count.
• timeout. Use the timeout keyword to set the time to wait for the response of each probe packet.
• port. Use the port keyword to set the destination port number to be used in the probing packets.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-33
Tunneling Configuring IP
Tunneling
Tunneling is a mechanism that can encapsulate a wide variety of protocol packet types and route them
through the configured tunnels. Tunneling is used to create a virtual point-to-point link between routers at
remote points in a network. This feature supports the creation, administration, and deletion of IP interfaces
whose underlying virtual device is a tunnel. The Alcatel-Lucent implementation provides support for two
tunneling protocols: Generic Routing Encapsulation (GRE) and IP encapsulation within IP(IPIP).
IP Encapsulation within IP
IPIP tunneling is a method by which an IP packet is encapsulated within another IP packet. The Source
Address and Destination Address of the outer IP header identifies the endpoints of tunnel. Whereas Source
Address and Destination Address of the inner IP header identifies the original sender and recipient of the
packet, respectively.
Consider the following when configuring the IPIP tunnel interfaces:
• A switch can support up to 127 IPIP tunnel interfaces.
• IPIP tunnel interfaces are included in the maximum number of IP interfaces that are supported on the
switch.
page 16-34 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Tunneling
Tunneling operation
The following diagram illustrates how packets are forwarded over the tunnel.
IP Host IP Host
[Link] Switch A Switch B
[Link] [Link]
IP Host IP Host
[Link]
In the given diagram, IP packets flowing from the private IP network [Link] to the private IP network
[Link] are encapsulated by the tunneling protocol at switch A and forwarded to switch B. Intermediate
switches route the packets using addresses in the delivery protocol header. Switch B extracts the original
payload and routes it to the appropriate destination in the [Link] network.
The tunnel interface is identified as being up when all of the following are satisfied:
• Both source and destination addresses are assigned.
• The source address of the tunnel is one of the switch's IP interface addresses that is either a VLAN or
Loopback0 interface.
• A route is available to reach the destination IP address. A route whose egress interface is a
VLAN-based interface is available for its destination IP address. The switch supports assigning an IP
address as well as routes to a tunnel interface.
This section describes how to configure a tunnel interface using GRE and IPIP, using Command Line
Interface (CLI) commands.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-35
Tunneling Configuring IP
In this example, the GRE tunnel named “gre” is created and assigned a source IP address of [Link]
and a destination IP address of [Link].
You can configure an IP address for the GRE tunnel interface using the ip interface command as shown:
-> ip interface "gre" address [Link] mask [Link]
In this example, the IPIP tunnel named “ipip” is created and assigned a source IP address of [Link]
and a destination IP address of [Link].
You can configure an IP address for the IPIP tunnel interface using the ip interface command as shown:
-> ip interface "ipip" address [Link] mask [Link]
Notes.
• An interface can be configured only as a VLAN or a Tunnel interface.
• To display information about the configured tunnels on the switch, use the show ip interface.
page 16-36 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Verifying the IP Configuration
show ip interface Displays the usability status of interfaces configured for IP.
show ip routes Displays the IP Forwarding table.
show ip route-pref Displays the configured route preference of a router.
show ip router database Displays a list of all routes (static and dynamic) that exist in the IP
router database.
show ip config Displays IP configuration parameters.
show ip protocols Displays switch routing protocol information and status.
show ip router-id Displays the status of TCP/UDP service ports. Includes service name
and well-known port number.
show arp Displays the ARP table.
show arp filter Displays the ARP filter configuration for the switch.
show icmp control This command allows the viewing of the ICMP control settings.
show ip dos config Displays the configuration parameters of the DoS scan for the switch.
show ip dos statistics Displays the statistics on detected port scans for the switch.
show ip service source-ip Displays the number of attacks detected for a restricted address.
For more information about the displays that result from these commands, see the
OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-37
VRF Route Leak Configuring IP
• Buildings where multiple companies sharing the same router reside in individual VRFs have to access
common services like logistics, common network equipment that is a part of an independent VRF.
VRF Route Leak feature can be used to forward routes from one VRF routing table to another VRF
routing table, allowing routing from one VRF to a gateway in another VRF.
2 Define protocol preference for export policy route map using the ip route-map match command. This
route map controls the export of routes from the VRF FDB (Forwarding Routing Database) to the GRT
(Global Routing Table). A route-map with no specific match clause matches all FDB routes. For example,
-> ip route-map R1 match protocol static
3 Export routes from the source VRF to the GRT using the ip export command. For example,
4 Define protocol preference for import policy route map using the ip route-map match command. This
route map controls the import of routes from the GRT. For example,
-> ip route-map R2 match protocol static
5 Import the leaked routes from the GRT using the ip import command. For example,
6 Configure route preference for imported routes using the ip route-pref command with the import
parameter. For example,
-> ip route-pref import 100
7 Redistribute imported routes to other routing protocols that are imported and added to the RDB from
other VRFs using the ip service source-ip command. For example,
-> ip redist import into ospf route-map R3 status enable
page 16-38 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP VRF Route Leak
To export routes from a specific VRF, specify the VRF globally or enter into the specific VRF instance
and enter ip export command:
-> vrf vrf2 ip export route-map R1
Note. As a pre-requisite to export routes, create a route-map and define protocol preference for the route
map by using ip route-map and ip route-map match commands. Route map configured for an export pol-
icy can contain any of the following filter and set options:
• Filter options: ip-address, ip-next-hop, tag, protocol, ipv4-interface, metric, route-type
• Set option: tag, metric
For route map configuration and match extensions, see “Using Route Maps” on page 16-18.
To disable exporting of routes from the VRF to the GRT, use the no form of this command as shown:
-> no ip export R1
Note. As a pre-requisite to import routes, create a route-map and define protocol preference for the route
map by using ip route-map and ip route-map match commands. Route map configured for the import
policy can contain any of the following filter and set options:
• Filter options: ip-address, ip-next-hop, tag, metric
• Set option: tag, metric
For route map configuration and match extensions, “Using Route Maps” on page 16-18.
To import routes from the GRT to the destination VRF, enter the ip import command at the CLI prompt
as shown:
-> ip import vrf V1 route-map R2
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 16-39
VRF Route Leak Configuring IP
To disable importing of routes from the GRT, use the no form of this command as shown:
-> no ip import VRF V1
Leaked routes are only for forwarding. If a local route is leaked, that interface is not accessible in the
importing VRF. Another switch will not be able to ping the interface in the import VRF.
The imported routes are also displayed under the protocol field as IMPORT in the show ip routes, show
ip route-pref, show ip redist, and show ip router database commands.
For more information about the output details that result from the show commands, see the OmniSwitch
AOS Release 8 CLI Reference Guide.
page 16-40 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
17 Configuring Multiple VRF
Multiple Virtual Routing and Forwarding (VRF) provides a mechanism for segmenting Layer 3 traffic into
virtual routing domains (instances) on the same switch. Each routing instance independently maintains its
own routing and forwarding table, peer, and interface information.
In This Chapter
This chapter describes the Multiple VRF feature and how to configure it through the Command Line
Interface (CLI). CLI commands are used in the configuration examples; for more details about the syntax
of commands, see the OmniSwitch CLI Reference Guide. This chapter provides an overview of Multiple
VRF and includes the following information:
• “VRF Specifications” on page 17-2.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 17-1
VRF Specifications Configuring Multiple VRF
VRF Specifications
The VRF functionality described in this chapter is supported unless otherwise stated in the following
specifications table or specifically noted within any other section of this chapter. Note that any maximum
limits provided in this table are subject to available system resources.
VRF Defaults
Parameter Description Command Default Value/Comments
Active VRF instance vrf Default VRF instance with
max profile capabilities
page 17-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Multiple VRF Quick Steps for Configuring Multiple VRF
Note. Configuring a VRF instance name is case sensitive. In addition, if the name specified does not exist,
a VRF instance is automatically created. As a result, it is possible to accidentally create or delete instances.
Use the show vrf command to verify the VRF instance configuration before selecting, adding, or removing
instances.
1 Create VRF instance, IpOne, using the vrf command. For example:
In this example, the change in the command prompt from “->” to “IpOne: ->” indicates that the
instance was created and is now the active VRF CLI context. Any commands entered at this point
apply to this instance, unless the commands entered are not supported in multiple VRF instances.
2 Create a second VRF instance, IpTwo, using the vrf command. For example:
In this example, IpOne was the active instance until IpTwo was created and replaced IpOne as the
active VRF CLI context.
3 Select IpOne for the active VRF instance and create an IP router interface on VLAN 100 and VLAN
101 using the ip interface command. For example:
IpTwo::-> vrf IpOne
IpOne::-> ip interface intf100 address [Link]/24 vlan 100
IpOne::-> ip interface intf101 address [Link]/24 vlan 101
IpOne::->
4 Configure [Link] as the primary router ID address for the IpOne VRF instance using the ip router
router-id command. For example:
IpOne::-> ip router router-id [Link]
IpOne::->
5 Create an IP static route for the IpOne VRF instance using the ip static-route command. For example:
6 Load and enable the RIP protocol for the IpOne VRF instance using the ip load rip and ip rip admin-
state commands. For example:
IpOne::-> ip load rip
IpOne::-> ip rip admin-state enable
IpOne::->
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 17-3
Quick Steps for Configuring Multiple VRF Configuring Multiple VRF
7 Enable RIP on IP interface “intf100” in the IpOne VRF instance using the ip rip interface admin-
state command. For example:
IpOne::-> ip rip interface intf100 admin-state enable
IpOne::->
8 Select IpTwo for the active VRF instance and create an IP router interface on VLAN 102 using the ip
interface command. For example:
IpOne::-> vrf IpTwo
IpTwo::-> ip interface intf102 address [Link]/24 vlan 102
IpTwo::->
9 Configure [Link] as the primary router ID address for the IpTwo VRF instance using the ip router
router-id command. For example:
IpTwo::-> ip router router-id [Link]
IpTwo::->
10 Load and enable the BGP protocol for the IpTwo VRF instance using the ip load bgp command. For
example:
IpTwo::-> ip load bgp
IpTwo::->
11 Configure a BGP neighbor for the IpTwo VRF instance using the ip bgp neighbor, ip bgp neighbor
remote-as, and ip bgp neighbor admin-state commands. For example:
IpTwo::-> ip bgp neighbor [Link]
IpTwo::-> ip bgp neighbor [Link] remote-as 1000
IpTwo::-> ip bgp neighbor [Link] status enable
12 Optional. To configure a VRF instance as a low profile VRF (restricted routing protocols and capabili-
ties) use the vrf command with the profile low parameter option. For example:
IpTwo::-> vrf IpThree profile low
IpThree::->
By default, a VRF instance is created using max profile capabilities. Low profile VRFs use less switch
resources, which allows more VRF instances to operate on the switch.
Note. Verify the Multiple VRF configuration using the show vrf command:
IpOne::-> show vrf
Virtual Routers Profile Protocols
--------------------+-------+-------------------
default default BGP PIM VRRP
IpOne max RIP
IpTwo max BGP
IpThree low
page 17-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Multiple VRF Quick Steps for Configuring Multiple VRF
See the OmniSwitch CLI Reference Guide for information about the fields in the above displays.
An example of what the Quick Steps configuration commands look like when entered sequentially on the
switch:
-> vlan 100
-> vlan 101
-> vlan 102
-> vrf IpOne
IpOne::-> vrf IpTwo
IpTwo::-> vrf IpOne
IpOne::-> ip interface intf100 address [Link]/24 vlan 100
IpOne::-> ip interface intf101 address [Link]/24 vlan 101
IpOne::-> ip router router-id [Link]
IpOne::-> ip static-route [Link]/24 gateway [Link]
IpOne::-> ip load rip
IpOne::-> ip rip admin-state enable
IpOne::-> ip rip interface intf100 admin-state enable
IpOne::-> vrf IpTwo
IpTwo::-> ip interface intf102 address [Link]/24 vlan 102
IpTwo::-> ip router router-id [Link]
IpTwo::-> ip load bgp
IpTwo::-> ip bgp neighbor [Link]
IpTwo::-> ip bgp neighbor [Link] remote-as 1000
IpTwo::-> ip bgp neighbor [Link] admin-state enable
IpTwo::-> vrf IpThree profile low
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 17-5
Multiple VRF Overview Configuring Multiple VRF
page 17-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Multiple VRF Multiple VRF Overview
Customer A
Site 2
VRF A
PE 2
Customer A
Site 1
VRF A VRF A
Customer B
Site 2
VRF B
VRF B
Customer B
Site 1
VRF B VRF A
VRF B
VRF B
VRF C Customer C
Site 2
VRF C
PE 3
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 17-7
Multiple VRF Overview Configuring Multiple VRF
VRF Profiles
The VRF feature supports two types of VRF instances: a low profile instance and a max profile instance.
The type of profile assigned to a VRF instance determines the routing protocols and capabilities supported
within that instance.
• Low profile VRFs only support IPv4 and VRRP, with routing capabilities restricted to static and
imported routes. In addition, limiting low profiles to 9 routes and 3 IP interfaces is highly
recommended.
• Max profile VRFs support full VRF routing capabilities and limits.
The type of profile applied is determined at the time the VRF instance is created. The default VRF
instance uses the max profile capabilities; configuring the default VRF profile is not allowed.
Using low profile VRFs gives an administrator the ability to create VRFs with minor routing capabilities
and complexity. Low profiles take up less switch resources than max profiles, which allows for creating
more VRFs on the switch.
The ability to create many low profile VRFs is particularly useful in cases where all traffic only flows
through a handful of individual routes to reach specific destinations; the administrator can separate many
network access points into VRFs. For example: in a building there may be many tenants that need to reach
several end stations and one or two WAN access points through a shared core network. Each private
network needs its own address space, but does not need a routing protocol to share many routes (may only
need a default route).
A combination of low and max profiles is allowed on the switch. However, the total number of VRFs
allowed on the switch may differ depending on the availability of switch resources and the number of low
and max profile VRFs configured.
Note. Only those commands for features that are VRF aware are accepted within the context of a VRF
instance. Default VRF applications are supported only in the default VRF instance. For more information
about VRF supported applications, see .“VRF Interaction With Other Features” on page 17-11
The CLI command prompt indicates which instance is the active VRF context; the instance name is added
as a prefix to the command prompt. For example, if VRF instance IpOne is the current context, then IpOne
appears in the CLI command prompt. For example:
IpOne: ->
When the default VRF instance is the active context, no VRF name appears in the command prompt. For
example, the following prompt indicates that the default VRF instance is the current context:
->
It is also possible to enter configuration commands for other non-default instances from within the default
VRF CLI context. For more information about how to do this and additional examples of using the VRF
page 17-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Multiple VRF Multiple VRF Overview
context-based CLI, see “Configuring VRF Instances” on page 17-15 and “Verifying the VRF
Configuration” on page 17-18.
Note. All VRF instances are active in terms of routing and forwarding tasks whether or not the instance is
the current CLI context. Selecting a VRF instance as the CLI context simply indicates the instance to which
any configuration or show commands apply.
ASCII-File-Only Syntax
When configuration commands for VRF-aware applications are configured and saved in an ASCII file
(typically through the snapshot command) or the switch [Link] file, a prefix is added to these
commands to indicate the name of the VRF instance to which the commands apply. For example:
! VRF
vrf vrfOne
! IP
vrf vrfOne ip interface intf100 address [Link]/24 vlan 100
vrf vrfOne ip interface intf101 address [Link]/24 vlan 101
vrf vrfOne ip router router-id [Link]
vrf vrfOne ip static route [Link]/24 gateway [Link]
! RIP
vrf vrfOne ip load rip
vrf vrfOne ip rip status enable
vrf vrfOne ip rip interface intf100 status enable
In this example, vrfOne is added to the beginning of the IP and RIP configuration command lines. This
indicates that these commands apply to the vrfOne instance. If a command line does not contain an
instance name, then that command is for an application that applies only to the default VRF instance or the
application is not VRF-aware.
Default VRF commands appear first in an ASCII or [Link] file, followed by commands for VRF-
aware applications configured in non-default instances.
Management VRF
The Management VRF feature gives the user the ability to control which VRF is used for the various
switch management protocols (Telnet, RADIUS, and so on.)
The following level of support is provided:
• Level 0 - The management service may only appear in the Default VRF.
• Level 1 - User may specify a single VRF that all management services can be configured in. For
example, both RADIUS and LDAP can use vrf-1.
• Level 2 - Each management service or multiple management services can be configured for a different
VRF. For example, RADIUS in vrf-1, LDAP in vrf-2, SNMP in vrf-3.
• Level 3 - A management service can appear in multiple VRFs. For example, SSH and Telnet in vrf-1
and vrf-2.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 17-9
Multiple VRF Overview Configuring Multiple VRF
page 17-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Multiple VRF VRF Interaction With Other Features
The following subsections provide additional information related to Multiple VRF interaction with
specific applications.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 17-11
VRF Interaction With Other Features Configuring Multiple VRF
Console HTTP
Telnet SNMP
FTP
SSH (ssh, sftp, and scp)
• If the VRF instance that the servers (RADIUS / TACACS+ / LDAP) reside on is deleted or disabled,
access to the servers is disabled as well.
• More than one management service can use the same VRF instance. For example, both RADIUS and
and LDAP can use the same VRF instance “VrfA”.
BGPv4
• Each BGPv4 routing instance requires configuration of an Autonomous System number, router ID
number, and primary IP address that is explicit to the associated VRF instance.
• BGP neighbors defined for a specific VRF instance and address family (IPv4 and IPv6) peer with
neighbors accessible through interfaces associated with the same VRF instance.
• More than one VRF including the default VRF can be used for Telnet / SSH sessions.
FTP
• FTP session “to” the switch is VRF aware.
• A maximum of four combined FTP sessions are allowed simultaneously across all VRFs on the switch.
page 17-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Multiple VRF VRF Interaction With Other Features
NTP
Supports VRF configuration for all NTP operations (both client and server).
WebView
Supports VRF configuration for "WebView Server" and "WebView Access".
Syslog Server
Supports VRF configuration for forwarding swlog output to the syslog daemon of the switch (or host).
VRF Policies
• A VRF policy condition parameter is available to specify a VRF name to which the policy condition
applies. This parameter can also specify the default VRF, and a no form of the command exists to
remove a VRF condition parameter. For example:
-> qos policy condition c1 vrf engr_vrf
-> qos policy condition c2 vrf default
-> qos policy condition c1 no vrf
• VRF policies are configured in the default VRF, similar to how all other QoS policies are configured.
If the VRF name specified does not exist, the policy is not allocated any system resources.
• Policies that do not specify a VRF name are considered global policies and are applied across all VRF
instances and VLANs.
• Policies that specify the default VRF apply only to traffic in the default VRF instance.
• Policies that specify a VRF name apply only to traffic in the VRF instance associated with that name.
• The switch network group is supported only in VRF policies that specify the default VRF instance. If
this group is specified in a global policy (no VRF specified) then the policy is applied across all VRF
instances.
SNMP
• SNMPv3 is required to manage VRF instances; SNMPv1 and v2 are not supported.
• Configuring the management station to use SNMPv3 is required to receive traps from VRF-aware
applications.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 17-13
VRF Interaction With Other Features Configuring Multiple VRF
VLANs
Configuring an interface for a VLAN also associates that VLAN with the active VRF context. A VLAN,
however, can only belong to one VRF instance at a time. As a result, all interfaces configured for a VLAN
must belong to the same VRF instance. See “Assigning IP Interfaces to a VRF Instance” on page 17-17 for
more information.
UDP/DHCP Relay
VRF support for UDP/DHCP Relay allows for the configuration and management of relay agents and
servers within the context of a VRF instance.
The following guidelines apply when configuring UDP/DHCP Relay within the context of VRF instances:
• A separate DHCP server is required for each VRF instance to which DHCP packets are relayed to and
from the server. The server must reside in the same VRF as the originating requests. For example, the
following command configures the DHCP server address for the vrfOne instance:
-> vrf vrfOne
vrfOne:> ip helper address [Link]
The above configuration relays all DHCP packets within the vrfOne instance to the specified server
which also resides in the vrfOne instance.
• A separate UDP relay setting for port/service to VLAN is required per VRF instance. For example, the
following command configures the forwarding of specific UDP packets to VLAN 100 within the
context of the vrfTwo instance:
-> ip udp dns vlan 100
• When a VRF instance is deleted, all UDP/DHCP Relay configuration associated with that instance is
also deleted. However, if the VRF instance is created again with the same name, the relay configuration
previously associated with that name is not restored.
page 17-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Multiple VRF Configuring VRF Instances
The initial configuration of an Alcatel-Lucent switch consists of a default VRF instance, which is always
active when the switch starts up and is not removable from the switch configuration. Any subsequent
configuration of switch applications applies only to the default instance. To provide multiple, independent
IP routing domains on the same switch, configuring additional VRF instances is required.
The VRF CLI is context-based in that commands used to configure VRF-aware applications are applied to
the active VRF instance. A VRF instance becomes active when the instance is either created or selected
using the vrf command.
A VRF instance is identified by a name, which is specified at the time the instance is configured. For
example, the following command creates the IpOne instance:
-> vrf IpOne
IpOne: ->
In this example, instance IpOne is created and made the active VRF context at the same time. Note that
the CLI command prompt indicates the active context by displaying the name of the VRF instance as part
of the actual prompt. Any subsequent commands entered on this command line are applied to the IpOne
instance.
Within the context of the default VRF instance, it is also possible to enter configuration commands for
another instance. For example, to configure an IP interface for instance IpOne from within the CLI context
of the default instance, prefix the ip interface command with vrf command followed by the name of the
instance. For example:
-> vrf IpOne ip interface intf100 address [Link]/24 vlan 100
->
The above command creates the IP interface for VRF IpOne but does not change the CLI context in which
the command was entered. The default VRF instance remains the active context.
Note. The default VRF instance is the only VRF CLI context within which configuration of another
instance is allowed.
Changing the profile for an existing VRF instance is not allowed. To change the profile, first delete the
VRF then create it again with a different profile. For example, to change profile IpTwo to a max profile
VRF, use the following commands:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 17-15
Configuring VRF Instances Configuring Multiple VRF
In this example, the profile max parameter option is not needed, since the max profile is applied by
default. However, this parameter was used here to demonstrate the command syntax.
The total number of VRFs allowed depends on the available switch memory. At 80% memory usage, a
low memory warning is displayed when a new VRF is created. When 90% usage is reached, creating a
new VRF is stopped. For example:
-> vrf LowProfVrf500 profile low
+++ WARNING: Memory usage over 80%, creating VRF
In the above example, selecting the IpTwo instance changed the VRF CLI context from IpOne to IpTwo.
Any subsequent commands entered apply to the IpTwo instance.
Note. If the instance name specified with the vrf command does not exist, a VRF instance is automatically
created. In addition, configuring a VRF instance name is case sensitive. As a result, it is possible to acci-
dentally create or delete instances. Use the show vrf command to verify the VRF instance configuration
before selecting, adding, or removing instances.
To return to the default VRF instance from within the context of another instance, enter the vrf command
with or without the optional default parameter. For example, both of the following commands return the
CLI context to the default VRF instance:
IpOne: -> vrf
IpOne: -> vrf default
Note that the command prompt for the default VRF instance does not display the instance name.
page 17-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Multiple VRF Configuring VRF Instances
Once an IP interface is associated with a VRF instance, Layer 3 traffic on that interface is routed within
the domain of the VRF instance. In other words, such traffic is only routed between other IP interfaces that
are associated with the same VRF instance. Any additional routing protocol traffic configured for that
same interface is also routed within the associated VRF domain.
Use the following guidelines when configuring IP interfaces for a VRF instance:
• A single IP interface as well as the VLAN associated with the interface, can only belong to one VRF
instance at a time.
• Once a VLAN is associated with a specific VRF instance, configuring an interface for that VLAN
within the context of any other instance, is not allowed. For example, if the first IP interface configured
for VLAN 100 was associated with the VRF IpOne instance, then any subsequent IP interface
configuration for VLAN 100 is only allowed within the context of the IpOne instance.
• A VRF instance can have multiple VLAN associations, even though a VLAN can only have one VRF
association.
To view a list of VRF instances configured on the switch, use the show vrf command. For more
information about this command, see the OmniSwitch CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 17-17
Verifying the VRF Configuration Configuring Multiple VRF
The VRF CLI context determines which information is displayed using application-specific show
commands. For example, if IpOne is the active VRF context, then only IP interfaces associated with IpOne
are displayed.
-> vrf IpOne
IpOne: -> show ip interface
Total 1 interfaces
Name IP Address Subnet Mask Status Forward Device
--------------------+---------------+---------------+------+-------+--------
Loopback [Link] [Link] UP NO Loopback
intfone [Link] [Link] DOWN NO vlan 200
Note that when the default VRF CLI context is active, the show commands can display specific
information for another instance. This is done by first entering the vrf command followed by the instance
name and then the show command. For example, the following command displays the IP interfaces
configured for IpOne from within the context of the default VRF CLI:
-> vrf IpOne show ip interface
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
page 17-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
18 Configuring IPv6
Internet Protocol version 6 (IPv6) is the next generation of Internet Protocol version 4 (IPv4). Both
versions are supported along with the ability to tunnel IPv6 traffic over IPv4. Implementing IPv6 solves
the limited address problem currently facing IPv4, which provides a 32-bit address space. IPv6 increases
the address space available to 128 bits.
In This Chapter
This chapter describes IPv6 and how to configure it through Command Line Interface (CLI). The CLI
commands are used in the configuration examples; for more details about the syntax of commands, see the
OmniSwitch AOS Release 8 CLI Reference Guide.
This chapter provides an overview of IPv6 and includes information about the following procedures:
• Configuring an IPv6 interface (see page 18-15)
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-1
IPv6 Specifications Configuring IPv6
IPv6 Specifications
Note that the maximum limit values provided in the following Specifications table are subject to available
system resources:
page 18-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 IPv6 Specifications
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-3
IPv6 Defaults Configuring IPv6
IPv6 Defaults
The following table lists the defaults for IPv6 configuration through the ipv6 command.
page 18-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 Quick Steps for Configuring IPv6 Routing
Note that when the IPv6 interface is configured, the switch automatically generates a link-local address
for the interface. This allows for communication with other interfaces and/or devices on the same link,
but does not provide routing between interfaces.
2 Assign a unicast address to the v6if-v200 interface by using the ipv6 address command. For example:
3 Configure an IPv6 interface for VLAN 300 by using the ipv6 interface command. For example:
4 Assign a unicast address to the v6if-v300 interface by using the ipv6 address command. For example:
Note. Optional. To verify the IPv6 interface configuration, enter show ipv6 interface For example:
-> show ipv6 interface
Name IPv6 Address/Prefix Length Status Device
--------------------+------------------------------------------+-------+-----------
v6if-v200 fe80::2d0:95ff:fe12:fab5/64 Down VLAN 200
[Link]/64
[Link]/64
v6if-v300 fe80::2d0:95ff:fe12:fab6/64 Down VLAN 300
[Link]/64
[Link]/64
loopback ::1/128 Active Loopback
fe80::1/64
Note that the link-local addresses for the two new interfaces and the loopback interface were automatically
created and included in the show ipv6 interface display output. In addition, the subnet router anycast
address that corresponds to the unicast address is also automatically generated for the interface.
5 Enable RIPng for the switch by using the ipv6 load rip command. For example:
6 Create a RIPng interface for each of the IPv6 VLAN interfaces by using the ipv6 rip interface
command. For example:
-> ipv6 rip interface v6if-v200
-> ipv6 rip interface v6if-v300
IPv6 routing is now configured for VLAN 200 and VLAN 300 interfaces, but it is not active until at least
one port in each VLAN goes active.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-5
IPv6 Overview Configuring IPv6
IPv6 Overview
IPv6 provides the basic functionality that is offered with IPv4 but includes the following enhancements
and features not available with IPv4:
• Increased IP address size—IPv6 uses a 128-bit address, a substantial increase over the 32-bit IPv4
address size. Providing a larger address size also significantly increases the address space available,
thus eliminating the concern over running out of IP addresses. See “IPv6 Addressing” on page 18-7 for
more information.
• Auto-configuration of addresses—When an IPv6 interface is created or a device is connected to the
switch, an IPv6 link-local address is automatically assigned for the interface and/or device. See “Auto-
configuration of IPv6 Addresses” on page 18-9 for more information.
• Anycast addresses—A new type of address. Packets sent to an anycast address are delivered to one
member of the anycast group.
• Simplified header format—A simpler IPv6 header format is used to keep the processing and
bandwidth cost of IPv6 packets as low as possible. As a result, the IPv6 header is only twice the size of
the IPv4 header despite the significant increase in address size.
• Improved support for header options—Improved header option encoding allows more efficient
forwarding, fewer restrictions on the length of options, and greater flexibility to introduce new options.
• Security improvements—Extension definitions provide support for authentication, data integrity, and
confidentiality.
• Neighbor Discovery protocol—A protocol defined for IPv6 that detects neighboring devices on the
same link and the availability of those devices. Additional information that is useful for facilitating the
interaction between devices on the same link is also detected (for example, neighboring address
prefixes, address resolution, duplicate address detection, link MTU, and hop limit values, etc.).
This implementation of IPv6 also provides the following mechanisms to maintain compatibility between
IPv4 and IPv6:
• Dual-stack support for both IPv4 and IPv6 on the same switch.
• Embedded IPv4 addresses in the four lower-order bytes of the IPv6 address.
The remainder of this section provides a brief overview of the new IPv6 address notation, auto-
configuration of addresses, and tunneling of IPv6 over IPv4.
page 18-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 IPv6 Overview
IPv6 Addressing
One of the main differences between IPv6 and IPv4 is that the address size has increased from 32 bits to
128 bits. Going to a 128-bit address also increases the size of the address space to the point where running
out of IPv6 addresses is not a concern.
The following types of IPv6 addresses are supported:
Link-local—A link-local address is a private unicast address that identifies an interface or device on the
local network. This type of address allows communication with devices and/or neighboring nodes that are
attached to the same physical link. Note that when the communication is between two nodes that are not
attached to the same link, both nodes must have a configured global unicast address. Routing between
link-local addresses is not available because link-local addresses are not known or advertised to the
general network. Link-local addresses are unique only for a link and the same link-local address may be
used on multiple interfaces.
Unicast—Standard unicast addresses, similar to IPv4.
Unique Local IPv6 Unicast—IPv6 unicast address format that is globally unique and intended for local
communications, usually inside of a [Link] addresses are not expected to be routable on the global
Internet.
Multicast—Addresses that represent a group of devices. Traffic sent to a multicast address is delivered to
all members of the multicast group.
Anycast—Traffic that is sent to this type of address is delivered to one member of the anycast group. The
device that receives the traffic is usually the one that is easiest to reach as determined by the active routing
protocol.
Note. IPv6 does not support the use of broadcast addresses. This functionality is replaced using improved
multicast addressing capabilities.
IPv6 address types are identified by the high-order bits of the address, as shown in the following table:
Note that anycast addresses are unicast addresses that are not identifiable by a known prefix.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-7
IPv6 Overview Configuring IPv6
2 [Link]
With IPv6 addresses that have long strings of zeros, the benefit of zero compression is more dramatic. For
example, address [Link] becomes FF00::4501:32.
Note that hexadecimal notation used for IPv6 addresses resembles the notation which is used for MAC
addresses. However, it is important to remember that IPv6 addresses still identify a device at the Layer 3
level and MAC addresses identify a device at the Layer 2 level.
Another supported IPv6 address notation includes embedding an IPv4 address as the four lower-order
bytes of the IPv6 address. This is especially useful when dealing with a mixed IPv4/IPv6 network. For
example:
[Link][Link]
page 18-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 IPv6 Overview
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-9
IPv6 Overview Configuring IPv6
• Use the well-known prefix FC00::/7 to allow for easy filtering at site boundaries.
• Allow sites to be combined or privately interconnected without creating any address conflicts or
requiring renumbering of interfaces that use these prefixes.
• Internet Service Provider independent and can be used for communications inside of a site without
having any permanent or intermittent Internet connectivity.
• If accidentally leaked outside of a site through routing or DNS, there is no conflict with any other
addresses.
• In practice, applications may treat these addresses like global scoped addresses.
A 40-bit global identifier is used to make the local IPv6 address prefixes globally unique. This global ID
can either be explicitly configured, or created using the pseudo-algorithm recommended in RFC 4193.
page 18-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 IPv6 Overview
Note. Dynamic routing protocols are not supported over 6to4 tunnels. However, it is possible to configure
dynamic routing for a configured tunnel. See “Configuring IPv6 Tunnel Interfaces” on page 18-19 for more
information.
6to4 Tunnels
6to4 tunneling provides a mechanism for transporting IPv6 host traffic over an IPv4 network infrastructure
to other IPv6 hosts and/or domains without having to configure explicit tunnel endpoints. Instead, an IPv6
6to4 tunnel interface is created at points in the network where IPv6 packets are encapsulated (IPv4 header
added) prior to transmission over the IPv4 network or decapsulated (IPv4 header stripped) for
transmission to an IPv6 destination.
An IPv6 6to4 tunnel interface is identified by its assigned address, which is derived by combining a 6to4
well-known prefix (2002) with a globally unique IPv4 address and embedded as the first 48 bits of an IPv6
address. For example, [Link]/64, where d467:8a89 is the hex equivalent of the IPv4 address
[Link].
6to4 tunnel interfaces are configured on routers and identify a 6to4 site. Because 6to4 tunnels are point-to-
multi-point in nature, any one 6to4 router can communicate with one or more other 6to4 routers across the
IPv4 cloud. Additionally, IPv6 multicast traffic cannot be forwarded over a 6to4 tunnel. Two common
scenarios for using 6to4 tunnels are described below.
IPv4 Domain
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-11
IPv6 Overview Configuring IPv6
3 The 6to4 border router encapsulates IPv6 packets with IPv4 headers and sends to the destination 6to4
border router over the IPv4 domain.
4 The destination 6to4 border router strips IPv4 header and forwards to 6to4 destination host.
IPv4 Domain
IPv6
Router
6to4 Host
IPv6 Site
IPv6 Host
2 The IPv6 host traffic received by the relay router that has a next hop address that matches 2002::/16 is
routed to the 6to4 tunnel interface configured on the relay router.
3 The traffic routed to the 6to4 tunnel interface is then encapsulated into IPv4 headers and sent to the
page 18-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 IPv6 Overview
4 The destination 6to4 router strips the IPv4 header and forwards it to the IPv6 destination host.
For more information about configuring an IPv6 6to4 tunnel interface, see “Configuring an IPv6
Interface” on page 18-15 and “Configuring IPv6 Tunnel Interfaces” on page 18-19. For more detailed
information and scenarios by using 6to4 tunnels, refer to RFC 3056.
Configured Tunnels
A configured tunnel is where the endpoint addresses are manually configured to create a point-to-point
tunnel. This type of tunnel is similar to the 6to4 tunnel on which IPv6 packets are encapsulated in IPv4
headers to facilitate communication over an IPv4 network. The difference between the two types of
tunnels is that configured tunnel endpoints require manual configuration, whereas 6to4 tunneling relies on
an embedded IPv4 destination address to identify tunnel endpoints. Additionally, IPv6 multicast traffic
can be sent over configured tunnels allows RIPng and OSPFv3 to run over a configured tunnel.
For more information about IPv6 configured tunnels, see “Configuring IPv6 Tunnel Interfaces” on
page 18-19. For more detailed information about configured tunnels, refer to RFC 4213.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-13
IPv6 Overview Configuring IPv6
page 18-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 Configuring an IPv6 Interface
• If creating a VLAN interface, the VLAN must already exist. See Chapter 4, “Configuring VLANs,” for
more information.
• If creating a tunnel interface, a tunnel ID or 6to4 is specified. Only one 6to4 tunnel is allowed per
switch, so it is not necessary to specify an ID when creating this type of tunnel.
• If a tunnel ID is specified, then a configured tunnel interface is created. This type of tunnel requires
additional configuration by using the ipv6 address global-id command. See “Configuring IPv6 Tunnel
Interfaces” on page 18-19 for more information.
• Each VLAN can have one IPv6 interface. Configuring both an IPv4 and IPv6 interface on the same
VLAN is allowed. Note that the VLAN interfaces of both types are not active until at least one port
associated with the VLAN goes active.
• A link-local address is automatically configured for an IPv6 interface, except for 6to4 tunnels, when
the interface is configured. For more information regarding how this address is formed, see “Auto-
configuration of IPv6 Addresses” on page 18-9.
• Assigning more than one IPv6 address to a single IPv6 interface is allowed.
• Assigning the same link-local address to multiple interfaces is allowed. Each global unicast prefix,
subset of, or superset of a prefix can only exist on one interface. For example, if an interface for VLAN
100 is configured with an address [Link]/64, an interface for VLAN 200 cannot have
an address [Link]/64.
• Each IPv6 interface anycast address must also have a unique prefix. However, multiple devices may
share the same anycast address prefix to identify themselves as members of the anycast group.
To create an IPv6 interface for a VLAN or configured tunnel, enter ipv6 interface followed by an
interface name, then vlan (or tunnel) followed by a VLAN ID (or tunnel ID). For example, the following
two commands create an IPv6 interface for VLAN 200 and an interface for tunnel 35:
-> ipv6 interface v6if-v200 vlan 200
-> ipv6 interface v6if-tunnel-35 tunnel 35
To create an IPv6 interface for a 6to4 tunnel, use the following command:
-> ipv6 interface v6if-6to4 tunnel 6to4
Use the show ipv6 interface command to verify the interface configuration for the switch. For more
information about this command, see the OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-15
Configuring an IPv6 Interface Configuring IPv6
Note. If the global-id has not previously been specified with the commands above it will automatically be
generated when the first IPv6 local-unicast address command is issued.
Once the global ID is generated the ipv6 address local-unicast command can be used to generate a unique
local address using the configured global-id.
When an existing interface name is specified with the ipv6 interface command, the command modifies
specified parameters for that interface. If an unknown interface name is entered along with an existing
VLAN or tunnel parameter, a new interface is created with the name specified.
page 18-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 Assigning IPv6 Addresses
In the above example, [Link] is specified as the subnet prefix and 20 is the interface
identifier. Note that the IPv6 address is expressed using CIDR notation to specify the prefix length. In the
above example, /64 indicates a subnet prefix length of 64 bits.
To use the MAC address of an interface or device as the interface ID, specify the eui-64 option with this
command. For example:
-> ipv6 address [Link]/64 eui-64 v6if-v200
• Any field of an address may contain all zeros or all ones. The exception to this is the interface
identifier portion of the address, which cannot be all zeros. If the eui-64 option is specified with the
ipv6 address command, this is not an issue.
• The EUI-64 interface identifier takes up the last 64 bits of the 128-bit IPv6 address. If the subnet prefix
combined with the EUI-64 interface ID is longer than 128 bits, an error occurs and the address is not
created.
A subnet router anycast address is automatically created when a global unicast address is assigned to an
interface. The anycast address is derived from the global address by adding an interface ID of all zeros to
the prefix of the global address. For example, the global address [Link]/64 generates the
anycast address [Link]/64.
• Devices, such as a PC, are eligible for stateless auto-configuration of unicast addresses in addition to
the link-local address. If this type of configuration is in use on the network, manual configuration of
addresses on the PC is not required.
• IPv6 VLAN or tunnel interfaces are only eligible for stateless auto-configuration of their link-local
addresses. Manual configuration of addresses is required for all additional addresses.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-17
Assigning IPv6 Addresses Configuring IPv6
See “IPv6 Addressing” on page 18-7 for an overview of IPv6 address notation. Refer to RFC 4291 for
more technical address information.
Note that the subnet router anycast address is automatically deleted when the last unicast address of the
same subnet is removed from the interface.
page 18-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 Configuring IPv6 Tunnel Interfaces
In the above example, 2002 is the well-known prefix that identifies a 6to4 tunnel. The C633:6489 part of
the address that follows 2002 is the hex equivalent of the IPv4 address [Link]. Note that an IPv4
interface configured with the embedded IPv4 address is required on the switch. In addition, do not
configure a private (for example, [Link]), broadcast, or unspecified address as the embedded IPv4
address.
One of the main benefits of 6to4 tunneling is that no other configuration is required to identify tunnel
endpoints. The router that the 6to4 tunnel interface is configured on will encapsulate IPv6 packets in IPv4
headers and send them to the IPv4 destination address where they will be processed. This is particularly
useful in situations where the IPv6 host is isolated.
The second type of tunnel supported is referred to as a configured tunnel. With this type of tunnel it is
necessary to specify an IPv4 address for the source and destination tunnel endpoints. Note that if
bidirectional communication is desired, then it is also necessary to create the tunnel interface at each end
of the tunnel.
Creating an IPv6 configured tunnel involves the following general steps:
• Create an IPv6 tunnel interface using the ipv6 interface command.
• Associate an IPv4 source and destination address with the tunnel interface by using the ipv6 interface
command. These addresses identify the tunnel endpoints.
• Associate an IPv6 address with the tunnel interface by using the ipv6 address command.
• Configure a tunnel interface and associated addresses at the other end of tunnel.
Note that dynamic routing protocols are not supported over 6to4 tunnels, but are allowed over configured
tunnels. To use this protocol on a configured tunnel, a dynamic routing protocol interface is created for the
tunnel interface. For example, the following command creates a RIPng interface for tunnel v6if-tunnel-
137:
-> ipv6 rip interface v6if-tunnel-137
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-19
Creating an IPv6 Static Route Configuring IPv6
Note that in the example above the IPv6 interface name for the gateway was included. This parameter is
required only when a link local address is specified as the gateway.
When you create a static route, the default metric value of 1 is used. However, you can change the priority
of the route by increasing its metric value. The lower the metric value, the higher the priority. This metric
is added to the metric cost of the route. The metric range is 1 to 15. For example:
-> ipv6 static-route [Link]/64 gateway fe80::2d0:95ff:fe6a:f458 v6if-137
metric 3
Static routes do not age out of the IPv6 Forwarding table; you must delete them from the table. Use the no
ipv6 static-route command to delete a static route. You must specify the destination IPv6 address of the
route as well as the IPv6 address of the first hop (gateway). For example, to delete the static you would
enter:
-> no ip static-route [Link]/64 gateway fe80::2d0:95ff:fe6a:f458 v6if-137
The IPv6 Forwarding table includes routes learned through one of the routing protocols (RIP, OSPF, BGP)
as well as any static routes that are configured. Use the show ipv6 routes command to display the IPv6
Forwarding table.
Note. A static route is not active unless the gateway it is using is active.
page 18-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 Configuring the Route Preference of a Router
To display the current route preference configuration, use the show ipv6 route-pref command:
-> show ipv6 route-pref
Protocol Route Preference Value
------------+------------------------
Local 1
Static 2
OSPF 110
RIP 120
EBGP 190
IBGP 200
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-21
Configuring Route Map Redistribution Configuring IPv6
2 Configure redistribution to apply a route map, as described in “Configuring Route Map Redistribu-
tion” on page 18-26.
Refer to the “IP Commands” chapter in the OmniSwitch AOS Release 8 CLI Reference Guide for more
information about the ip route-map command parameters and usage guidelines.
Once a route map is created, it is then applied using the ipv6 redist command. See “Configuring Route
Map Redistribution” on page 18-26 for more information.
page 18-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 Configuring Route Map Redistribution
The above command creates the ospf-to-rip route map, assigns a sequence number of 10 to the route
map, and specifies a permit action.
To optionally filter routes before redistribution, use the ip route-map command with a match parameter
to configure match criteria for incoming routes. For example,
-> ip route-map ospf-to-rip sequence-number 10 match tag 8
The above command configures a match statement for the ospf-to-rip route map to filter routes based on
their tag value. When this route map is applied, only OSPF routes with a tag value of eight are
redistributed into the RIP network. All other routes with a different tag value are dropped.
Note. Configuring match statements is not required. However, if a route map does not contain any match
statements and the route map is applied using the ipv6 redist command, the router redistributes all routes
into the network of the receiving protocol.
To modify route information before it is redistributed, use the ip route-map command with a set
parameter. For example,
-> ip route-map ospf-to-rip sequence-number 10 set tag 5
The above command configures a set statement for the ospf-to-rip route map that changes the route tag
value to five. Because this statement is part of the ospf-to-rip route map, it is only applied to routes that
have an existing tag value equal to eight.
The following is a summary of the commands used in the above examples:
-> ip route-map ospf-to-rip sequence-number 10 action permit
-> ip route-map ospf-to-rip sequence-number 10 match tag 8
-> ip route-map ospf-to-rip sequence-number 10 set tag 5
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-23
Configuring Route Map Redistribution Configuring IPv6
To delete a specific sequence number within a route map, enter no ip route-map followed by the route
map name, then sequence-number followed by the actual number. For example, the following command
deletes sequence 10 from the redistipv4 route map:
-> no ip route-map redistipv4 sequence-number 10
Note that in the above example, the redistripv4 route map is not deleted. Only those statements associated
with sequence 10 are removed from the route map.
To delete a specific statement within a route map, enter no ip route-map followed by the route map name,
then sequence-number followed by the sequence number for the statement, then either match or set and
the match or set parameter and value. For example, the following command deletes only the match tag 8
statement from route map redistipv4 sequence 10:
-> no ip route-map redistipv4 sequence-number 10 match tag 8
To configure a new sequence of statements for an existing route map, specify the same route map name
but use a different sequence number. For example, the following command creates a new sequence 20 for
the rm_1 route map:
-> ip route-map rm_1 sequence-number 20 action permit
-> ip route-map rm_1 sequence-number 20 match ipv4-interface to-finance
-> ip route-map rm_1 sequence-number 20 set metric 5
page 18-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 Configuring Route Map Redistribution
Sequence 10 and sequence 20 are both linked to route map rm_1 and are processed in ascending order
according to their sequence number value. Note that there is an implied logical OR between sequences. As
a result, if there is no match for the tag value in sequence 10, then the match interface statement in
sequence 20 is processed. However, if a route matches the tag 8 value, then sequence 20 is not used. The
set statement for whichever sequence was matched is applied.
A route map sequence may contain multiple match statements. If these statements are of the same kind
(for example, match tag 5, match tag 8, etc.) then a logical OR is implied between each like statement. If
the match statements specify different types of matches (for example match tag 5, match ip4 interface to-
finance, etc.), then a logical AND is implied between each statement. For example, the following route
map sequence will redistribute a route if its tag is either 8 or 5:
-> ip route-map rm_1 sequence-number 10 action permit
-> ip route-map rm_1 sequence-number 10 match tag 5
-> ip route-map rm_1 sequence-number 10 match tag 8
The following route map sequence will redistribute a route if the route has a tag of 8 or 5 and the route
was learned on the IPv6 interface to-finance:
-> ip route-map rm_1 sequence-number 10 action permit
-> ip route-map rm_1 sequence-number 10 match tag 5
-> ip route-map rm_1 sequence-number 10 match tag 8
-> ip route-map rm_1 sequence-number 10 match ipv6-interface to-finance
To add addresses to an access list, use the ip access-list address (IPv4) or the ipv6 access-list address
(IPv6) command. For example, the following commands add addresses to an existing access list:
-> ip access-list ipaddr address [Link]/8
-> ipv6 access-list ip6addr address 2001::/64
Use the same access list name each time the above commands are used to add additional addresses to the
same access list. In addition, both commands provide the ability to configure if an address and/or its
matching subnet routes are permitted (the default) or denied redistribution. For example:
-> ip access-list ipaddr address [Link]/16 action deny redist-control all-
subnets
-> ipv6 access-list ip6addr address 2001::1/64 action permit redist-control no-
subnets
For more information about configuring access list commands, see the “IP Commands” chapter in the
OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-25
Configuring Route Map Redistribution Configuring IPv6
Note. A router automatically becomes an Autonomous System Border Router (ASBR) when redistribution
is configured on the router.
A source protocol is a protocol from which the routes are learned. A destination protocol is the one into
which the routes are redistributed. Make sure that both protocols are loaded and enabled before
configuring redistribution.
Redistribution applies criteria specified in a route map to routes received from the source protocol.
Therefore, configuring redistribution requires an existing route map. For example, the following command
configures the redistribution of OSPFv3 routes into the RIPng network using the ospf-to-rip route map:
-> ipv6 redist ospf into rip route-map ospf-to-rip
OSPFv3 routes received by the router interface are processed based on the contents of the ospf-to-rip route
map. Routes that match criteria specified in this route map are either allowed or denied redistribution into
the RIPng network. The route map may also specify the modification of route information before the route
is redistributed. See “Using Route Maps” on page 18-22 for more information.
To remove a route map redistribution configuration, use the no form of the ipv6 redist command. For
example:
-> no ipv6 redist ospf into rip route-map ospf-to-rip
Use the show ipv6 redist command to verify the redistribution configuration:
-> show ipv6 redist
Source Destination
Protocol Protocol Status Route Map
------------+------------+---------+--------------------
localIPv6 RIPng Enabled ipv6rm
OSPFv3 RIPng Enabled ospf-to-rip
page 18-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 Configuring LPND
The resulting ospf-to-rip route map redistribution configuration does the following:
• Denies the redistribution of Type 2 external OSPFv3 routes with a tag set to five.
• Redistributes into RIPng all routes learned on the intf_ospf interface and sets the metric for such routes
to 255.
• Redistributes into RIPng all other routes (those not processed by sequence 10 or 20) and sets the tag for
such routes to eight.
Configuring LPND
To enable LPND, use the command ipv6 interface with the parameter local-proxy-nd. For example, the
following command enables the LPND on the “vlan_1” IPv6 interface:
-> ipv6 interface vlan_1 local-proxy-nd
To disable LPND, use the no form of the ipv6 interface command. For example, the following command
disables the LPND on the “vlan_1” IPv6 interface:
-> ipv6 interface vlan_1 no local-proxy-nd
To set the per-interface limit, use the ipv6 interface commands ‘neighbor limit’ option. For example, the
following command sets the “vlan_1” interface limit to 100 entries:
-> ipv6 interface vlan_1 neighbor-limit 100
Note. To view the information on IPV6 cache limit, use the show ipv6 information command.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-27
Configuring NUD Configuring IPv6
Configuring NUD
To specify the maximum number of neighbor solicitations to be sent during the NUD process, use the ipv6
interface command with the retrans-max parameter. For example:
-> ipv6 interface vlan_1 retrans-max 5
This example sets the maximum number of neighbor solicitations to 5 for the “vlan_1” interface.
To modify the fixed interval at which the neighbor solicitations are sent during the NUD process, use the
ipv6 interface command with retrans-timer parameter. For example:
-> ipv6 interface vlan_1 retrans-timer 3000
This example sets the interval between neighbor solicitations to 3 seconds (3000 ms) for the “vlan_1”
interface.
To enable using an exponentially increasing interval between the neighbor solicitations sent during the
NUD process, use the ipv6 interface command with retrans-backoff' parameter. The interval between
subsequent neighbor solicitations will be calculated using the formula, NS interval = ibn, where,
i = the retransmit interval (retrans-timer)
b = the retransmit backoff (retrans-backoff)
n = the current neighbor solicitation number (starting at 0 for the first transmit)
For example:
-> ipv6 interface vlan_1 retrans-max 5 retrans-timer 1000 retrans-backoff 3
This example results in up to 5 neighbor solicitations being sent during the NUD process with intervals of
1, 3, 9, and 27 seconds.
Note. The retrans-max and retrans-timer options also affect neighbor solicitations sent during the initial
neighbor discovery process when attempting to resolve a new address. However, the exponential backoff
(retrans-backoff) does not apply to initial neighbor discovery.
page 18-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 Configuring RA Filtering
Configuring RA Filtering
To enable RA filtering on an interface, use the ipv6 ra-filter command. For example:
-> ipv6 ra-filter vlan-3
This example enables RA filtering on the “vlan-3” interface. All RAs received on the interface will be
dropped.
To specify a trusted port, use the ipv6 ra-filter command with the trusted-port option. For example:
-> ipv6 ra-filter vlan-3 trusted-port 1/1/22
This specifies that port 1/1/22 is trusted on the “vlan-3” interface. RAs received on this port will be
forwarded to all other clients connected to the interface. RAs received on any other port will still be
dropped.
To remove a trusted port use the following command:
-> no ipv6 ra-filter vlan-3 trusted-port linkagg 2
Note. To view the RA filter configuration for an ipv6 interface, use the show ipv6 ra-filter command.
Note. Though the DHCPv6 relay is enabled on the switch it has to be explicitly enabled on the interface, for
the DHCPv6 client messages to be relayed.
2 Configure the interface for the DHCPv6 relay using the ipv6 dhcp relay interface admin-state
command. For example:
-> ipv6 dhcp relay int1 admin-state enable
Note. At least one relay destination should be configured before enabling the DHCPv6 relay on an
interface.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-29
DHCPv6 Relay Overview Configuring IPv6
3 Configure the DHCPv6 relay destination using the ipv6 dhcp relay destination command. For
example the following command configures the DHCPv6 relay destination for the “int1” interface:
-> ipv6 dhcp relay int1 destination 3001::3
Note. A maximum of five destinations can be configured for an interface. If the relay destination is a local-
link then the interface name for the local-link should be specified. For example:
-> ipv6 dhcp relay int1 destination fe80::64 int1
Relay-Reply Messages
When the DHCPv6 relay agent connected to the client receives the relay-reply message, it verifies if the
DHCPv6 relay is enabled or disabled on the interface identified by the address in the link-address field. If
the DHCPv6 relay is disabled, the message is discarded. If the DHCPv6 relay is enabled then the DHCPv6
message is extracted and sent to the address contained in the relay-reply message.
page 18-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPv6 Configuring DHCPv6 Relay
Note. Even though the DHCPv6 relay is enabled on the switch, it has to be explicitly enabled on the IPv6
interface for the DHCPv6 client messages to be relayed.
Note. At least one relay destination should be configured before enabling DHCPv6 relay on an interface.
Note. If the relay destination is a local-link then the interface-ID of the local-link should be specified.
A maximum of five destinations can be configured for an interface. The DHCPv6 relay for the interface
will be automatically disabled when all the relay destinations configured for that interface is removed.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 18-31
Verifying the IPv6 Configuration Configuring IPv6
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
page 18-32 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
19 Configuring IPsec
Internet Protocol security (IPsec) is a suite of protocols for securing IPv6 communications by
authenticating and/or encrypting each IPv6 packet in a data stream. IPsec is a framework of open standards
designed to provide inter-operable, high quality, cryptographically-based security for IPv6 networks
through the use of appropriate security protocols, cryptographic algorithms, and cryptographic keys. The
set of security services offered includes access control, connectionless integrity, data origin authentication,
detection and rejection of replays (a form of partial sequence integrity), and confidentiality (through
encryption).
These security services are provided through use of two security protocols, the Authentication Header
(AH) and the Encapsulating Security Payload (ESP), and through the use of cryptographic key
management procedures and protocols.
In This Chapter
This chapter describes the basic components of IPsec and how to configure them through the Command
Line Interface (CLI). CLI commands are used in the configuration examples; for more details about the
syntax of commands, see the OmniSwitch CLI Reference Guide.
Configuration procedures described in this chapter include:
• Master Key Configuration (see “Configuring an IPsec Master Key” on page 19-10).
• Security Policy Rule Configuration (see “Configuring an IPsec Rule” on page 19-14).
• Security Association Key Configuration (see “Configuring IPsec SA Keys” on page 19-16).
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 19-1
IPsec Specifications Configuring IPsec
IPsec Specifications
Platforms Supported OmniSwitch 6860, 6860E
IP Version Supported IPv6
RFCs Supported 4301 - Security Architecture for the Internet
Protocol
4302 - IP Authentication Header (AH)
4303 - IP Encapsulating Security Payload (ESP)
4305 - Cryptographic Algorithm Implementation
Requirements for ESP and AH
4308 - Cryptographic Suites for IPsec
Encryption Algorithms Supported for ESP NULL, 3DES-CBC, and AES-CBC
Key lengths supported for Encryption 3DES-CBC - 192 bits
Algorithms AES-CBC - 128, 192, or 256 bits
Authentication Algorithms Supported for HMAC-SHA1-96, HMAC-MD5-96, and AES-
AH XCBC-MAC-96
Key lengths supported for Authentication HMAC-MD5 - 128 bits
Algorithms HMAC-SHA1 - 160 bits
AES-XCBC-MAC - 128 bits
Master Security Key formats Hexadecimal (16 bytes) or String (16 characters)
Priority value range for IPsec Policy 1 - 1000 (1=highest priority, 1000=lowest priority)
Index value range for IPsec Policy Rule 1 - 10
SPI Range 256 - 999999999
Modes Supported Transport
License Requirements Advanced License
IPsec Defaults
The following table shows the default settings of the configurable IPsec parameters.
page 19-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPsec Quick Steps for Configuring an IPsec AH Policy
1 Configure the master security key. The master security key must be set if keys are to be encrypted
when saved in the [Link] and snapshot files.
-> ipsec security-key master-key-12345
2 Define the policy. A policy defines the traffic that requires IPsec protection. The commands below
define a bi-directional policy for any protocol and the associated IPv6 address ranges. For example:
-> ipsec policy ALLoutMD5 source [Link]/64 destination [Link]/64
protocol any out ipsec admin-state disable
3 Define the rule. A rule defines the security services for the traffic defined by its associated policy. For
example the commands below add an AH rule to the polices defined above:
-> ipsec policy ALLoutMD5 rule 1 ah
-> ipsec policy ALLinMD5 rule 1 ah
4 Enable the policies. A policy cannot be enabled until the rules are defined. Now that rules have been
defined, enable the policy using the commands below:
-> ipsec policy ALLoutMD5 admin-state enable
-> ipsec policy ALLinMD5 admin-state enable
5 Define the Security Keys. Each SA has its own unique set of security keys. The key name is the SA
name that is going to use the key and the length must match the authentication algorithm key size. Keys
must be defined before the SA can be enabled.
-> ipsec key ALLoutMD5_SA sa-authentication 0x11112222333344445555666677778888
-> ipsec key ALLinMD5_SA sa-authentication 0x11112222333344445555666677778888
6 Define the SA. An SA specifies the actual actions to be performed. The security parameters index
(SPI) helps identify the source/destination pair. The security parameters index (SPI) in combination with
the source and destination addresses uniquely identifies an SA. An identical SA (same SPI, source, and
destination) must be configured on both systems exchanging IPsec protected traffic.
-> ipsec sa ALLoutMD5_SA ah source [Link] destination [Link] spi
2000 authentication HMAC-MD5 admin-state enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 19-3
Quick Steps for Configuring an IPsec Discard Policy Configuring IPsec
1 Define the policy. The commands below use similar policy information as in the previous example but
the action has been changed to discard:
-> ipsec policy Discard_ALLoutMD5 source [Link]/64 destination
[Link]/64 protocol any out discard admin-state enable
page 19-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPsec IPsec Overview
IPsec Overview
IPsec provides protection to IPv6 traffic. To achieve this, IPsec provides security services for IPv6 packets
at the network layer. These services include access control, data integrity, authentication, protection
against replay, and data confidentiality. IPsec enables a system to select the security protocols, encryption
and authentication algorithms, and use any cryptographic keys as required. IPsec uses the following two
protocols to provide security for an IPv6 datagram:
• Encapsulating Security Payload (ESP) to provide confidentiality, data origin authentication and
connectionless integrity.
• Authentication Header (AH) to provide connectionless integrity and data origin authentication for IPv6
datagrams and to provide optional protection against replay attacks. Unlike ESP, AH does not provide
confidentiality.
IPsec on an OmniSwitch operates in Transport mode. In transport mode only the payload of the IPv6
packet is encapsulated, and an IPsec header (AH or ESP) is inserted between the original IPv6 header and
the upper-layer protocol header. The figure below shows an IPv6 packet protected by IPsec in transport
mode.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 19-5
IPsec Overview Configuring IPsec
16 24 32-bit
Sequence Number
ESP is identified by a value of 50 in the IPv6 header. The ESP header is inserted after the IPv6 header and
before the upper layer protocol header. The Security Parameter Index (SPI) in the ESP header is a 32-bit
value that, combined with the destination address and protocol in the preceding IPv6 header, identifies the
security association (SA) to be used to process the packet. SPI helps distinguish multiple SA’s configured
for the same source and destination combination. The payload data field carries the data that is being
encrypted by ESP. The Authentication digest in the ESP header is used to verify data integrity.
Authentication is always applied after encryption, so a check for validity of the data is done upon receipt
of the packet and before decryption.
Encryption Algorithms
There are several different encryption algorithms that can be used in IPsec. However, the most commonly
used algorithms are “AES” and “3DES”. These algorithms are used for encrypting IPv6 packets.
• Advanced Encryption Standard - Cipher Block Chaining - (AES-CBC)
The AES-CBC mode comprises three different key lengths; AES-128, AES-192 and AES-256. Each block
of plaintext is XOR'd with the previous encrypted block before being encrypted again.
• Triple DES (3DES)
A mode of the DES encryption algorithm that encrypts data three times. Three 64-bit keys are used,
instead of one, for an overall key length of 192 bits (the first encryption is encrypted with second key, and
the resulting cipher text is again encrypted with a third key). 3DES is a more powerful version of DES.
page 19-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPsec IPsec Overview
Authentication Algorithms
• HMAC-MD5 - An algorithm that produces a 128-bit hash (also called a digital signature or message
digest) from a message of arbitrary length and a 16-byte key. The resulting hash is used, like a
fingerprint of the input, to verify content and source authenticity and integrity.
• HMAC-SHA1 - An algorithm that produces a 160-bit hash from a message of arbitrary length and a
20-byte key. It is generally regarded as more secure than MD5 because of the larger hashes it produces.
• AES-XCBC-MAC-96 - An algorithm that uses AES [AES] in CBC mode [MODES] with a set of
extensions [XCBC-MAC-1] to overcome the limitations of the classic CBC-MAC algorithm. It uses
the AES block cipher with an increased block size and key length (128 bits) which enables it to
withstand continuing advances in crypto-analytic techniques and computational capability. Its goal is
to ensure that the datagram is authentic and cannot be modified in transit.
Unlike ESP, AH does not encrypt the data. Therefore, it has a much simpler header than ESP. The figure
below shows an AH-protected IPv6 packet.
IP Packet protected by AH
AH is identified by a value of 51 in the IPv6 header. The Next header field indicates the value of the upper
layer protocol being protected (for example, UDP or TCP) in the transport mode. The payload length field
in the AH header indicates the length of the header. The SPI, in combination with the source and
destination addresses, helps distinguish multiple SAs configured for the same source and destination
combination. The AH header provides a means to verify data integrity. It is similar to the integrity check
provided by the ESP header with one key difference. The ESP integrity check only verifies the contents of
the ESP payload. AH's integrity check also includes portions of the packet header as well.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 19-7
IPsec Overview Configuring IPsec
• The IPv6 datagram can be permitted to pass without being subjected to any IPsec processing.
The system decides which packets are processed and how they are processed by using the combination of
the policy and the SA. The policy is used to specify which IPsec protocols are used such as AH or ESP
while the SA specifies the algorithms such as AES and HMAC-MD5.
• Policy Rules - Determines whether AH, ESP, or a combination of both must be used.
• Security Associations (SAs) - Determines which algorithms must be used to secure the traffic.
• SA Keys - Determines the keys to be used with the SA to secure the traffic.
IPsec Policy
IPsec Policies define which traffic requires IPsec processing. The policy requires the source and
destination of the traffic to be specified as IPv6 addresses. The policy may cover all traffic from source to
destination or may further restrict it by specifying an upper-layer protocol, source, and/or destination ports.
Each policy is unidirectional, applying either to inbound or outbound traffic. Therefore, to cover all traffic
between a source and destination, two policies would need to be defined.
page 19-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPsec IPsec Overview
SA Keys
Keys are used for encrypting and authenticating the traffic. Key lengths must match what is required by
the encryption or authentication algorithm specified in the SA. Key values may be specified either in
hexadecimal format or as a string.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 19-9
Configuring IPsec on the OmniSwitch Configuring IPsec
• Use SSH, HTTPS, or SNMPv3 to prevent sensitive information such as SA keys from being sent in the
clear.
• Restrict IPsec commands to authorized users only. This is described in Chapter 6, “Managing Switch
User Accounts.” in the OmniSwitch AOS Release 8 Switch Management Guide.
Configuring IPsec for securing IPv6 traffic on a switch requires several steps which are explained below
• Configure the master security key for the switch which is used to encrypt and decrypt the configured
SA keys. This is described in “Configuring an IPsec Master Key” on page 19-10.
• Configure an IPsec Security Policy on the switch. This is described in “Configuring an IPsec Policy”
on page 19-11.
• Set an IPsec rule for the configured IPsec Security Policy on the switch. This is described in
“Configuring an IPsec Rule” on page 19-14.
• Enable the Security Policy. This is described in “Enabling and Disabling a Policy” on page 19-12.
• Configure the authentication and encryption keys required for manually configured IPsec Security
associations (SA). This is described in “Configuring IPsec SA Keys” on page 19-16
• Configure an IPsec Security Association on the switch by setting parameters such as Security
Association type, encryption and authentication for SA. This is described in “Configuring an IPsec SA”
on page 19-15.
Configuring IPsec for discarding IPv6 traffic on a switch requires a single step:
• Configure the IPsec Discard policy on the switch which is used to discard or filter the IPv6 packets.
This is described in “Discarding Traffic using IPsec” on page 19-9.
or
Note. The key value can be specified either in hexadecimal format (16 bytes in length) or as a string (16
characters in length). A warning message is logged if SA keys are set without the Master Key being set.
To change the master security key specify the old and new key values.
-> ipsec security-key new_master_key_1 new_master_key_2
page 19-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPsec Configuring IPsec on the OmniSwitch
The above command replaces the old security key with the new key value. The old key value must be
entered to modify an existing key. If an incorrect old key value is entered, then setting the new key will
fail.
When the master security key is set or changed, its value is immediately propagated to the secondary
CMM. When the master security key is changed, save and synchronize the current configuration to ensure
the proper operation of IPsec in the event of a switch reboot or takeover.
Note. By default, no master security key is set for the switch. When no master security key is configured for
the switch, the SA key values are written unencrypted to permanent storage ([Link] or other
configuration file).
Remote System
-> ipsec policy tcp_out source [Link] destination [Link] proto-
col tcp out ipsec description “IPsec on all outbound TCP” admin-state enable
The above commands configure a bi-directional IPsec policy for IPv6 traffic destined to or from the
specified IPv6 addresses and indicates the traffic must be processed using IPsec.
Prefixes can also be used when configuring a policy to match a range of addresses as shown below:
-> ipsec policy tcp_in source 3ffe::/16 destination 4ffe::/16 protocol tcp in ipsec
description “Any 3ffe to any 4ffe” admin-state enable
Use the no form of the command to remove the configured IPsec policy. For example:
-> no ipsec policy tcp_in
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 19-11
Configuring IPsec on the OmniSwitch Configuring IPsec
Note. Policies cannot be enabled until at least one rule is configured. See “Configuring an IPsec Rule” on
page 19-14.
Note. If two security policies have the same priority then the one configured first will be processed first.
-> ipsec policy telnet_ipsec priority 200 source [Link]/32 destination ::/0
port 23 protocol tcp in ipsec admin-state disable
-> ipsec policy telnet_clear priority 100 source [Link] destination ::/0
port 23 protocol tcp in none
1 Policy telnet_deny is the lowest priority policy. It will discard any incoming telnet connection
attempts.
2 Policy telnet_ipsec covers a subset of the source addresses of telnet_deny. With its greater priority, it
overrides telnet_deny and allows incoming telnet connections from addresses starting with the prefix
[Link]/32 as long as they are protected by ESP.
3 The policy telnet_clear overrides telnet_ipsec, allowing telnet connection attempts from the host to be
accepted without any IPsec protection.
4 Policy telnet_malicious can be configured to handle a known malicious system that otherwise would
fall under the telnet_ipsec policy. Its priority of 1 ensures that it always takes precedence and discards any
incoming telnet connection attempts from the known malicious system.
page 19-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPsec Configuring IPsec on the OmniSwitch
• ipsec - Allows IPsec processing of the traffic to which this policy is applied.
If the action is ipsec, then a rule must be defined before the policy can be enabled. Additionally, SAs and
SA keys must also be configured to support the rule.
• none - No action is performed.
The above commands could be modified to discard the traffic instead of processing using IPsec.
-> ipsec policy tcp_in discard
-> ipsec policy tcp_out discard
The following table lists the various protocols that can be specified, refer to the ipsec policy command for
additional details.
protocol
any icmp6[type type] tcp udp
ospf vrrp number protocol
Verifying a Policy
To verify the configured IPsec policy, use the show ipsec policy command. For example:
-> show ipsec policy
Name Priority Source-> Destination Protocol Direction Action State
-----------+--------+-----------------------------+--------+-------+-------+------
tcp_in 500 [Link]->[Link] TCP in ipsec esp active
tcp_out 500 [Link]->[Link] TCP out ipsec esp active
ftp-in-drop 100 ::/0->::/0 TCP in discard disabled
telnet-in-1 100 2000::/48->::/0 TCP in ipsec disabled
Note. The presence of a ‘+’ sign in the ‘Source->Destination’ or ‘Action’ indicates the values has been
truncated to fit. View a specific security policy to view additional details.
You can also verify the configuration of a specific security policy by using the show ipsec policy
command followed by the name of the security policy. For example:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 19-13
Configuring IPsec on the OmniSwitch Configuring IPsec
The above command applies the configured IPsec security policy with rule 1 to ESP. The index value
specified determines the order in which a rule must get applied to the payload. The policy name
configured for the IPsec policy rule must be the same as the policy name configured for the IPsec security
policy. It’s possible to first encrypt the original content of an IPv6 packet using ESP and then authenticate
the packet using AH by configuring an ESP rule with an index of one and then configuring the AH rule
with an index of two. For example:
-> ipsec policy tcp_in rule 1 esp
-> ipsec policy tcp_in rule 2 ah
Use the no form of this command to remove the configured IPsec rule for an IPsec security policy. For
example:
page 19-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPsec Configuring IPsec on the OmniSwitch
Configuring an IPsec SA
IPsec Security Association (SA) is a set of security information that describes a particular kind of secure
connection between two devices. An SA specifies the actual IPsec algorithms applied to the IPv6 traffic
(for example encryption using 3DES, HMAC-SHA1 for authentication).
To configure an IPsec Security Association, use the ipsec sa command along with the type of security
association, IPv6 source address, IPv6 destination address, encryption and authentication algorithms used
for SA. For example:
Local System
-> ipsec sa tcp_in_ah ah source [Link] destination [Link] spi
9901 authentication hmac-sha1 description "HMAC SHA1 on traffic from 99 to 1"
Remote System
-> ipsec sa tcp_out_ah ah source [Link] destination [Link] spi
9901 authentication hmac-sha1 description "HMAC SHA1 on traffic from 99 to 1"
The above commands configure bi-directional IPsec SAs of AH type for data traffic to and from source
IPv6 addresses [Link] and [Link] with security parameter indexes (SPI) of 9901 and 9902.
The combination of SPI, source, and destination addresses uniquely identify an SA. The above commands
also configure hmac-shal as the type of authentication algorithm which is to be used for the IPv6 traffic
covered by the configured SA.
Note. The IPsec endpoints must have identical SAs (SPI, source address, destination addresses) configured
Configuring ESP or AH
The IPsec SA can be configured as ESP or AH. In the above example, the IPsec SA is configured as AH.
You can also configure the SA as ESP, as shown below:
-> ipsec sa tcp_in_ah esp source [Link] destination [Link] spi
9901 encryption 3DES-CBC description "3DES on traffic from 99 to 1"
You can use the encryption parameter to specify the encryption algorithm to be used for the traffic
covered by the SA. This parameter can only be used when the SA type is ESP.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 19-15
Configuring IPsec on the OmniSwitch Configuring IPsec
The above command configures an IPsec SA of ESP using aes-cbs and a key length of 192 bits. You can
allow an IPsec SA to operate as an ESP confidentiality-only SA by using the none option with the
authentication parameter or by simply omitting the authentication parameter from the command.
Refer to “Configuring IPsec SA Keys” on page 19-16 or the ipsec sa command for supported encryption
types and key lengths.
Verifying IPsec SA
To display the configured IPsec SA, use the show ipsec sa command. For example:
To display the configuration of a specific IPsec SA, use the show ipsec sa command followed by the name
of the configured IPsec SA. For example:
Name = tcp_in_ah
Type = AH
Source = [Link],
Destination = [Link],
SPI = 9901
Encryption = none
Authentication = hmac-sha1
State = active
Description:
"HMAC SHA1 on traffic from 99 to 1
The above command configures an IPsec SA key named tcp_in_ah. This IPsec SA key will be used for the
AH authentication protocol and has a value of 0x11223344556677889900112233445566.
The length of the key value must match the value that is required by the encryption or authentication
algorithm that will use the key. The table shown below displays the key lengths for the supported
algorithms:
page 19-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPsec Configuring IPsec on the OmniSwitch
Use the following information to determine how to create the proper key size:
• Number of Characters = Key Size (in bits) / 8; Ex. A 160-bit key would require 20 characters for the
key.
• Number of Hexidecimal = Key Size (in bits) / 4; Ex. A 160-bit key would require 40 hexidecimal
digits.
Note. The name parameter must be the same as the name of the manually configured IPsec SA. Also, the
combination of the key name and type must be unique.
Use the no form of this command to delete the configured IPsec SA key. For example:
-> no ipsec key tcp_in_ah
The above command shows the number of manually configured SAs along with their encryption key
lengths in bits respectively. To display the IPsec SA keys used for authentication, use the show ipsec key
command, as shown below:
-> show ipsec key sa-authentication
Authentication Keys
Name Length (bits)
--------------------+----------------
tcp_in_ah 160
sa_1 128
sa_5 160
The above command shows the number of manually configured SAs along with their authentication key
lengths in bits respectively.
Note. Due to security reasons, key values will not be displayed; only key names and key lengths will be
displayed.
Once IPsec is configured for IPv6 on the switch, you can monitor the incoming and outgoing packets for
the configured parameters by using the show ipsec ipv6 statistics command.
Inbound:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 19-17
Configuring IPsec on the OmniSwitch Configuring IPsec
Successful = 2787
Policy violation = 0
No SA found = 0
Unknown SPI = 0
AH replay check failed = 0
ESP replay check failed = 0
AH authentication success = 93
AH authentication failure = 0
ESP authentication success = 25
ESP authentication failure = 0
Packet not valid = 0
No memory available = 0
Outbound:
Successful = 5135
Policy violation = 0
No SA found = 19
Packet not valid = 0
No memory available = 0
page 19-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPsec Additional Examples
Additional Examples
Configuring ESP
The example below shows the commands for configuring ESP between two OmniSwitches for all TCP
traffic.
Switch A Switch B
ESP
Switch A
-> ipsec security-key master-key-12345
-> ipsec policy tcp_out source 3ffe::100 destination 3ffe::200 protocol tcp out
ipsec description “IPsec on TCP to 200”
-> ipsec policy tcp_in source 3ffe::200 destination 3ffe::100 protocol tcp in
ipsec description “IPsec on TCP from 200”
-> ipsec sa tcp_out_esp esp source 3ffe::100 destination 3ffe::200 spi 1000
encryption des-cbc authentication hmac-sha1 description “ESP to 200” admin-state
enable
-> ipsec sa tcp_in_esp esp source 3ffe::200 destination 3ffe::100 spi 1001
encryption des-cbc authentication hmac-sha1 description “ESP from 200” admin-
state enable
Switch B
-> ipsec security-key master-key-12345
-> ipsec policy tcp_out source 3ffe::200 destination 3ffe::100 protocol tcp out
ipsec description “IPsec on TCP to 100”
-> ipsec policy tcp_in source 3ffe::100 destination 3ffe::200 protocol tcp in
ipsec description “IPsec on TCP from 100”
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 19-19
Additional Examples Configuring IPsec
-> ipsec sa tcp_out_esp esp source 3ffe::200 destination 3ffe::100 spi 1001
encryption des-cbc authentication hmac-sha1 description “ESP to 100” admin-state
enable
-> ipsec sa tcp_in_esp esp source 3ffe::100 destination 3ffe::200 spi 1000
encryption des-cbc authentication hmac-sha1 description “ESP from 100” admin-
state enable
page 19-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IPsec Additional Examples
Switch A Switch B
Switch A
-> ipsec policy DISCARD_UDPout source fe80::100 destination ff02::9 protocol udp
out discard
-> ipsec policy DISCARD_UDPin source fe80::200 destination ff02::9 protocol udp
in discard
Switch B
-> ipsec policy DISCARD_UDPout source fe80::200 destination ff02::9 protocol udp
out discard
-> ipsec policy DISCARD_UDPin source fe80::100 destination ff02::9 protocol udp
in discard
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 19-21
Verifying the IPsec Configuration Configuring IPsec
For more information about the resulting displays form these commands, see the “IPsec Commands”
chapter in the OmniSwitch CLI Reference Guide.
Examples of the above commands and their outputs are given in the section “Configuring IPsec on the
OmniSwitch” on page 19-10
page 19-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
20 Configuring RIP
Routing Information Protocol (RIP) is a widely used Interior Gateway Protocol (IGP) that uses hop count
as its routing metric. RIP-enabled routers update neighboring routers by transmitting a copy of their own
routing table. The RIP routing table uses the most efficient route to a destination, that is, the route with the
fewest hops and longest matching prefix.
The switch supports RIP version 1 (RIPv1), RIP version 2 (RIPv2), and RIPv2 that is compatible with
RIPv1. It also supports text key and MD5 authentication, on an interface basis, for RIPv2.
In This Chapter
This chapter describes RIP and how to configure it through the Command Line Interface (CLI). It includes
instructions for configuring basic RIP routing and fine-tuning RIP by using optional RIP configuration
parameters (for example, RIP send/receive option and RIP interface metric). It also details RIP
redistribution, which allows a RIP network to exchange routing information with networks running
different protocols (for example, OSPF and BGP). CLI commands are used in the configuration examples;
for more details about the syntax of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
This chapter provides an overview of RIP and includes information about the following procedures:
• RIP Routing
– Loading RIP (see page 20-6)
– Enabling RIP (see page 20-7)
– Creating a RIP Interface (see page 20-7)
– Enabling a RIP Interface (see page 20-7)
• RIP Options
– Configuring the RIP Forced Hold-Down Interval (see page 20-9)
– Configuring the RIP Update Interval (see page 20-9)
– Configuring the RIP Invalid Timer (see page 20-10)
– Configuring the RIP Garbage Timer (see page 20-10)
– Configuring the RIP Hold-Down Timer (see page 20-10)
– Enabling a RIP Host Route (see page 20-11)
• RIP Redistribution
– Configuring Route Redistribution (see page page 20-12)
• RIP Security
– Configuring Authentication Type (see page 20-18)
– Configuring Passwords (see page 20-18)
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 20-1
RIP Specifications Configuring RIP
RIP Specifications
Platforms Supported OmniSwitch 6860, 6860E
RFCs Supported RFC 1058–RIP v1
RFC 2453–RIP v2
RFC 1722–RIP v2 Protocol Applicability Statement
RFC 1724–RIP v2 MIB Extension
Maximum Number of Interfaces 10
Maximum Number of Peers 100
Maximum Number of Routes 10K
Maximum number of ECMP next hop entries 16
RIP Defaults
The following table lists the defaults for RIP configuration through the ip rip command.
page 20-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring RIP Quick Steps for Configuring RIP Routing
1 Create VLAN 1 with a description (for example, VLAN 1) by using the vlan command. For example:
2 Create VLAN 2 with a description (for example, VLAN 2) by using the vlan command. For example:
3 Assign an active port to VLAN 1 by using the vlan members untagged command. For example, the
following command assigns port 1/1/1 to VLAN 1:
-> vlan 1 members port 1/1/1 untagged
4 Assign an active port to VLAN 2 by using the vlan members command. For example, the following
command assigns port 1/1/2 VLAN 2:
-> vlan 2 members port 1/1/2 untagged
5 Configure an IP interface to enable IP routing on a VLAN by using the ip interface command. For
example:
-> ip interface vlan-1 address [Link] vlan 1
6 Configure an IP interface to enable IP routing on a VLAN by using the ip interface command. For
example:
-> ip interface vlan-2 address [Link] vlan 2
7 Load RIP into the switch memory by using the ip load rip command. For example:
8 Enable RIP on the switch by using the ip rip admin-state command. For example:
9 Create a RIP interface on VLAN 1 by using the ip rip interface command. For example:
10 Enable the RIP interface by using the ip rip interface admin-state command. For example:
11 Create an RIP interface on VLAN 2 by using the ip rip interface command. For example:
Note. For more information on VLANs and router ports, see Chapter 4, “Configuring VLANs.”
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 20-3
RIP Overview Configuring RIP
RIP Overview
In switching, traffic can be transmitted from one media type to another within the same VLAN. Switching
happens at Layer 2, the link layer; routing happens at Layer 3, the network layer. In IP routing, traffic can
be transmitted across VLANs. When IP routing is enabled, the switch uses routing protocols to build
routing tables that keep track of stations in the network and decide the best path for forwarding data. When
the switch receives a packet to be routed, it strips off the MAC header and examines the IP header. It looks
up the source/destination address in the routing table, and then adds the appropriate MAC address to the
packet. Calculating routing tables and stripping/adding MAC headers to packets is performed by switch
software.
IP is associated with several Layer 3 routing protocols. RIP is built into the base code loaded onto the
switch. Others are part of Alcatel-Lucent’s optional Advanced Routing Software. IP supports the
following IP routing protocols:
• RIP—An IGP that defines how routers exchange information. RIP makes routing decisions by using a
“least-cost path” method. RIPv1 and RIPv2 services allow the switch to learn routing information from
neighboring RIP routers. For more information and instructions for configuring RIP, see “RIP Routing”
on page 20-6.
• Open Shortest Path First (OSPF)—An IGP that provides a routing function similar to RIP but uses
different techniques to determine the best route for a datagram. OSPF is part of Alcatel-Lucent’s
optional Advanced Routing Software. For more information see the “Configuring OSPF” chapter in the
OmniSwitch AOS Release 8 Advanced Routing Configuration Guide.
When RIP is initially enabled on a switch, it issues a request for routing information, and listens for
responses to the request. If a switch configured to supply RIP hears the request, it responds with a
response packet based on information in its routing database. The response packet contains destination
network addresses and the routing metric for each destination. When a RIP response packet is received,
RIP takes the information and rebuilds the switch’s routing database, adding new routes and “better”
(lower metric) routes to destinations already listed in the database.
RIP uses a hop count metric to measure the distance to a destination. In the RIP metric, a switch advertises
directly connected networks at a metric of 1. Networks that are reachable through one other gateway are 2
hops, networks that are reachable through two gateways are 3 hops, etc. Thus, the number of hops (or hop
count) along a path from a given source to a given destination refers to the number of networks that are
traversed by a datagram along that path. When a switch receives a routing update that contains a new or
changed destination network entry, the switch adds one to the metric value indicated in the update and
enters the network in the routing table. After updating its routing table, the switch immediately begins
transmitting routing updates to inform other network switches of the change. These updates are sent
independently of the regularly scheduled updates. By default, RIP packets are broadcast every 30 seconds,
even if no change has occurred anywhere in a route or service.
RIP deletes routes from the database if the next switch to that destination says the route contains more than
15 hops. In addition, all routes through a gateway are deleted by RIP if no updates are received from that
gateway for a specified time period. If a gateway is not heard from for 120 seconds, all routes from that
gateway are placed in a hold-down state. If the hold-down timer value is exceeded, the routes are deleted
from the routing database. These intervals also apply to deletion of specific routes.
page 20-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring RIP RIP Overview
RIP Version 2
RIP version 2 (RIPv2) adds additional capabilities to RIP. Not all RIPv2 enhancements are compatible
with RIPv1. To avoid supplying information to RIPv1 routes that could be misinterpreted, RIPv2 can only
use non-compatible features when its packets are multicast. Multicast is not supported by RIPv1. On
interfaces that are not compatible with IP multicast, the RIPv1-compatible packets used do not contain
potentially confusing information. RIPv2 enhancements are listed below.
• Next Hop—RIPv2 can advertise a next hop other than the switch supplying the routing update. This
capability is useful when advertising a static route to a silent switch not using RIP, since packets
passing through the silent switch do not have to cross the network twice.
• Network Mask—RIPv1 assumes that all subnetworks of a given network have the same network mask.
It uses this assumption to calculate the network masks for all routes received. This assumption prevents
subnets with different netmasks from being included in RIP packets. RIPv2 adds the ability to specify
the network mask with each network in a packet. Because RIPv1 switches ignore the network mask in
RIPv2 packets, their calculation of the network mask could possibly be wrong. For this reason, RIPv1-
compatible RIPv2 packets cannot contain networks that would be misinterpreted by RIPv1. These
networks must only be provided in native RIPv2 packets that are multicast.
• Authentication—RIPv2 packets can contain an authentication key that can be used to verify the
validity of the supplied routing data. Authentication can be used in RIPv1-compatible RIPv2 packets,
but RIPv1 switches ignore authentication information. Authentication is a simple password in which an
authentication key of up to 16 characters is included in the packet. If this key does not match the
configured authentication key, the packet is discarded. For more information on RIP authentication, see
“RIP Security” on page 20-18.
• IP Multicast—IP Multicast Switching (IPMS) is a one-to-many communication technique employed by
emerging applications such as video distribution, news feeds, netcasting, and resource discovery.
Unlike unicast, which sends one packet per destination, multicast sends one packet to all devices in any
subnetwork that has at least one device requesting the multicast traffic. For more information on IPMS,
see Chapter 26, “Configuring IP Multicast Switching.”
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 20-5
RIP Routing Configuring RIP
RIP Routing
IP routing requires IP router interfaces to be configured on VLANs and a routing protocol to be enabled
and configured on the switch. RIP also requires a RIP interface to be created and enabled on the routing
interface. In the illustration below, a router interface and RIP interface have been configured on each
VLAN. Therefore, workstations connected to ports on VLAN 1 on Switch 1 can communicate with VLAN
2; workstations connected to ports on VLAN 3 on Switch 2 can communicate with VLAN 2. Also, ports
from both switches have been assigned to VLAN 2, and a physical connection has been made between the
switches. Therefore, workstations connected to VLAN 1 on Switch 1 can communicate with workstations
connected to VLAN 3 on Switch 2.
Switch 1 Switch 2
Router interface/
= RIP Interface
Physical
VLAN 1 VLAN 2 Connection VLAN 3
VLAN 2
[Link] [Link] [Link]
[Link]
RIP Routing
Loading RIP
When the switch is initially configured, RIP must be loaded into the switch memory. Use the ip load rip
command to load RIP.
To remove RIP from the switch memory, you must manually edit the [Link] file. The [Link] file
is an ASCII text-based file that controls many of the switch parameters. Open the file and delete all
references to RIP. You must reboot the switch when this is complete.
Note. In simple networks where only IP forwarding is required, you need not use RIP. If you are not using
RIP, it is best not to load it to save switch resources.
page 20-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring RIP RIP Routing
Enabling RIP
RIP is disabled by default. Use the ip rip admin-state command to enable RIP routing on the switch. For
example:
-> ip rip admin-state enable
Use the ip rip admin-state disable command to disable RIP routing on the switch. Use the show ip rip
command to display the current RIP status.
Use the no ip rip interface command to delete a RIP interface. Use the show ip rip interface command
to display configuration and error information for a RIP interface.
Note. You can create a RIP interface even if an IP router interface has not been configured. However, RIP
does not function unless a RIP interface is created and enabled on an IP router interface. See Chapter 4,
“Configuring VLANs,” and Chapter 16, “Configuring IP,” for more information.
To disable an RIP interface, use the disable keyword with the ip rip interface admin-state command. For
example to disable RIP routing on a RIP interface rip-1 you would enter:
-> ip rip interface rip-1 admin-state disable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 20-7
RIP Routing Configuring RIP
• v1compatible. Only RIPv2 broadcast packets (not multicast) is sent by the switch.
To set the default RIP send option use the ip rip interface send-version command.
Use the show ip rip interface command to display the current interface send option.
To set the default RIP receive option use the ip rip interface recv-version command.
Note. When you configure a metric for a RIP interface, this metric cost is added to the metric of the incom-
ing route.
Use the ip rip interface metric command to configure the RIP metric or cost for routes generated by a
RIP interface. Enter the IP address of the RIP interface as well as a metric value. For example, to set a
metric value of 2 for the RIP interface rip-1 you would enter:
-> ip rip interface rip-1 metric 2
The valid metric range is 1 to 15. To change the default value use the ip rip interface metric command.
Use the show ip rip interface command to display the current interface metric.
page 20-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring RIP RIP Options
RIP Options
The following sections detail procedures for configuring RIP options. RIP must be loaded and enabled on
the switch before you can configure any of the RIP configuration options.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 20-9
RIP Options Configuring RIP
page 20-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring RIP RIP Options
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 20-11
Configuring Redistribution Configuring RIP
Configuring Redistribution
It is possible to configure the RIP protocol to advertise routes learned from other routing protocols into the
RIP network. Such a process is referred to as route redistribution and is configured using the ip service
source-ip command.
Redistribution uses route maps to control how external routes are learned and distributed. A route map
consists of one or more user-defined statements that can determine which routes are allowed or denied
access to the RIP network. In addition a route map can also contain statements that modify route
parameters before they are redistributed.
When a route map is created, it is given a name to identify the group of statements that it represents. This
name is required by the ip redist command. Therefore, configuring route redistribution involves the
following steps:
1 Create a route map, as described in “Using Route Maps” on page 20-12.
2 Configure redistribution to apply a route map, as described in “Configuring Route Map Redistribu-
tion” on page 20-16.
Refer to the “IP Commands” chapter in the OmniSwitch CLI Reference Guide for more information about
the ip route-map command parameters and usage guidelines.
Once a route map is created, it is then applied using the ip service source-ip command. See “Configuring
Route Map Redistribution” on page 20-16 for more information.
page 20-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring RIP Configuring Redistribution
The above command creates the ospf-to-rip route map, assigns a sequence number of 10 to the route
map, and specifies a permit action.
To optionally filter routes before redistribution, use the ip route-map command with a match parameter
to configure match criteria for incoming routes. For example,
-> ip route-map ospf-to-rip sequence-number 10 match tag 8
The above command configures a match statement for the ospf-to-rip route map to filter routes based on
their tag value. When this route map is applied, only OSPF routes with a tag value of eight are
redistributed into the RIP network. All other routes with a different tag value are dropped.
Note. Configuring match statements is not required. However, if a route map does not contain any match
statements and the route map is applied using the ip service source-ip command, the router redistributes all
routes into the network of the receiving protocol.
To modify route information before it is redistributed, use the ip route-map command with a set
parameter. For example,
-> ip route-map ospf-to-rip sequence-number 10 set tag 5
The above command configures a set statement for the ospf-to-rip route map that changes the route tag
value to five. Because this statement is part of the ospf-to-rip route map, it is only applied to routes that
have an existing tag value equal to eight.
The following is a summary of the commands used in the above examples:
-> ip route-map ospf-to-rip sequence-number 10 action permit
-> ip route-map ospf-to-rip sequence-number 10 match tag 8
-> ip route-map ospf-to-rip sequence-number 10 set tag 5
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 20-13
Configuring Redistribution Configuring RIP
To delete a specific sequence number within a route map, enter no ip route-map followed by the route
map name, then sequence-number followed by the actual number. For example, the following command
deletes sequence 10 from the redistipv4 route map:
-> no ip route-map redistipv4 sequence-number 10
Note that in the above example, the redistripv4 route map is not deleted. Only those statements associated
with sequence 10 are removed from the route map.
To delete a specific statement within a route map, enter no ip route-map followed by the route map name,
then sequence-number followed by the sequence number for the statement, then either match or set and
the match or set parameter and value. For example, the following command deletes only the match tag 8
statement from route map redistipv4 sequence 10:
-> no ip route-map redistipv4 sequence-number 10 match tag 8
To configure a new sequence of statements for an existing route map, specify the same route map name
but use a different sequence number. For example, the following command creates a new sequence 20 for
the rm_1 route map:
-> ip route-map rm_1 sequence-number 20 action permit
-> ip route-map rm_1 sequence-number 20 match ipv4-interface to-finance
-> ip route-map rm_1 sequence-number 20 set metric 5
page 20-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring RIP Configuring Redistribution
Sequence 10 and sequence 20 are both linked to route map rm_1 and are processed in ascending order
according to their sequence number value. Note that there is an implied logical OR between sequences. As
a result, if there is no match for the tag value in sequence 10, then the match interface statement in
sequence 20 is processed. However, if a route matches the tag 8 value, then sequence 20 is not used. The
set statement for whichever sequence was matched is applied.
A route map sequence contains multiple match statements. If these statements are of the same kind (for
example, match tag 5, match tag 8, etc.) then a logical OR is implied between each like statement. If the
match statements specify different types of matches (for example match tag 5, match ip4 interface to-
finance, etc.), then a logical AND is implied between each statement. For example, the following route
map sequence redistributes a route if its tag is either 8 or 5:
-> ip route-map rm_1 sequence-number 10 action permit
-> ip route-map rm_1 sequence-number 10 match tag 5
-> ip route-map rm_1 sequence-number 10 match tag 8
The following route map sequence redistributes a route if the route has a tag of 8 or 5 and the route was
learned on the IPv4 interface to-finance:
-> ip route-map rm_1 sequence-number 10 action permit
-> ip route-map rm_1 sequence-number 10 match tag 5
-> ip route-map rm_1 sequence-number 10 match tag 8
-> ip route-map rm_1 sequence-number 10 match ipv4-interface to-finance
To add addresses to an access list, use the ip access-list address (IPv4) or the ipv6 access-list address
(IPv6) command. For example, the following commands add addresses to an existing access list:
-> ip access-list ipaddr address [Link]/16
-> ipv6 access-list ip6addr address 2001::1/64
Use the same access list name each time the above commands are used to add additional addresses to the
same access list. In addition, both commands provide the ability to configure if an address and/or its
matching subnet routes are permitted (the default) or denied redistribution. For example:
-> ip access-list ipaddr address [Link]/16 action deny redist-control all-
subnets
-> ipv6 access-list ip6addr address 2001::1/64 action permit redist-control no-
subnets
For more information about configuring access list commands, see the “IP Commands” chapter in the
OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 20-15
Configuring Redistribution Configuring RIP
RIP routes received by the router interface are processed based on the contents of the ospf-to-rip route
map. Routes that match criteria specified in this route map are either allowed or denied redistribution into
the RIP network. The route map can also specify the modification of route information before the route is
redistributed. See “Using Route Maps” on page 20-12 for more information.
To remove a route map redistribution configuration, use the no form of the ip redist command. For
example:
-> no ipv6 redist ospf into rip route-map ospf-to-rip
Source Destination
Protocol Protocol Status Route Map
------------+------------+---------+--------------------
LOCAL4 RIP Enabled rip_1
LOCAL4 OSPF Enabled ospf_2
LOCAL4 BGP Enabled bgp_3
RIP OSPF Enabled ospf-to-rip
page 20-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring RIP Configuring Redistribution
The resulting ospf-to-rip route map redistribution configuration does the following:
• Denies the redistribution of Type 2 external OSPF routes with a tag set to five.
• Redistributes into RIP all routes learned on the intf_ospf interface and sets the metric for such routes to
255.
• Redistributes into RIP all other routes (those not processed by sequence 10 or 20) and sets the tag for
such routes to eight.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 20-17
RIP Security Configuring RIP
RIP Security
By default, there is no authentication used for a RIP. However, you can configure a password for a RIP
interface. To configure a password, you must first select the authentication type (simple or MD5), and then
configure a password.
For example, to configure the RIP interface rip-1 for simple authentication you would enter:
-> ip rip interface rip-1 auth-type simple
To configure the RIP interface rip-1 for MD5 authentication you would enter:
-> ip rip interface rip-1 md5 auth-type md5
Configuring Passwords
If you configure simple or MD5 authentication you must configure a text string that is used as the
password for the RIP interface. If a password is used, all switches that are intended to communicate with
each other must share the same password.
After configuring the interface for simple authentication as described above, configure the password for
the interface by using the ip rip interface auth-key command. Enter the IP address of the RIP interface,
and then enter a 16-byte text string. For example to configure a password “nms” you would enter:
-> ip rip interface rip-1 auth-key nms
page 20-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring RIP Verifying the RIP Configuration
show ip rip Displays the RIP status and general configuration parameters (for
example, forced hold-down timer).
show ip rip routes Displays the RIP routing database. The routing database contains all
the routes learned through RIP.
show ip rip interface Displays the RIP interface status and configuration.
show ip rip peer Displays active RIP neighbors (peers).
show ip redist Displays the currently configured RIP redistribution filters.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 20-19
Verifying the RIP Configuration Configuring RIP
page 20-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
21 Configuring BFD
In This Chapter
This chapter describes the basic components of BFD and how to configure them through the Command
Line Interface (CLI). CLI commands are used in the configuration examples; for more details about the
syntax of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Global Configuration (see page 21-12).
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-1
BFD Specifications Configuring BFD
BFD Specifications
RFCs Supported 5880—Bidirectional Forwarding Detection
5881—Bidirectional Forwarding Detection
for IPv4 and IPv6 (Single Hop)
5882—Generic Application of Bidirectional
Forwarding Detection
Platforms Supported OmniSwitch 6860, 6860E
Maximum Number of BFD Sessions Chassis - 32
Virtual Chassis - 100
Protocols Supported BGP, OSPF, VRRP Remote Address Tracking
only, and Static Routes.
IPv6 protocols not supported.
Modes Supported Asynchronous
Echo
(Demand Mode not supported)
BFD Defaults
The following table shows the default settings of the configurable BFD parameters.
page 21-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD Quick Steps for Configuring BFD
• Configuring Layer 3 protocols to use BFD (see “Quick Steps for Configuring BFD Support for Layer 3
Protocols” on page 21-5).
Note. Configuring a BFD session explicitly with an IP interface name is optional, and must be used if
user defined BFD session parameters need to be applied. All the steps for explicit configuration are men-
tioned as optional.
If BFD is not explicitly configured, the default BFD global session parameters (transmit, receive and echo
intervals) are applied to the BFD sessions.
The following steps provide a brief tutorial for configuring a BFD session and related parameters:
1 Configure a BFD session on IP interface using the ip bfd interface command. For example:
Optional: Configure the BFD session explicitly with an IP interface name if non-default BFD session
parameters are required for BFD sessions that must be run separate from the IP interface.
-> ip bfd interface bfd_int_1
2 Optional: Configure a global transmit time interval for all BFD sessions using the ip bfd transmit
command. This command defines a default transmit value that is automatically applied when a BFD
session is created. For example:
-> ip bfd transmit 500
3 Optional: Configure the transmit time interval for a specific BFD session using the ip bfd interface
transmit command. The value set with this command overrides the global transmit value configured for
the routing instance. For example:
-> ip bfd interface bfd-vlan-101 transmit 500
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-3
Quick Steps for Configuring BFD Configuring BFD
4 Optional: Configure a global receive time interval for all BFD sessions using the ip bfd receive
command. This command defines a default receive time value that is automatically applied when a BFD
session is created. For example:
-> ip bfd receive 500
5 Optional: Configure the receive time interval for a specific BFD session using the ip bfd interface
receive command. The value set with this command overrides the global receive time value configured for
the routing instance:
-> ip bfd interface bfd-vlan-101 receive 500
6 Optional: Configure a global detection time multiplier value for all BFD sessions using the ip bfd
multiplier command. For example:
-> ip bfd multiplier 5
7 Optional: Configure the BFD session detection time multiplier value using the ip bfd interface
multiplier command. For example:
-> ip bfd interface bfd-vlan-101 multiplier 5
Note. Demand mode is not supported. The default operational mode is Asynchronous with the echo func-
tion enabled. However, Static Routing and VRRP protocol support BFD in the echo-only operational mode.
8 Optional: Configure the global BFD echo packet time interval using the ip bfd echo-interval
command. This command defines a default echo packet time value that is automatically applied when a
BFD session is created. For example:
-> ip bfd echo-interval 500
9 Optional: Configure the echo time interval for a specific BFD session using the ip bfd interface
echo-interval command. The echo time interval value set with this command overrides the global echo
time interval configured for the routing instance. For example:
-> ip bfd interface bfd-vlan-101 echo-interval 500
10 Optional: Enable the administrative status of a BFD interface using the ip bfd interface admin-state
command. For example:
-> ip bfd interface bfd-vlan-101 admin-state enable
Note. BFD parameters are not configurable once the BFD administrative status is enabled on the interface.
11 Enable the BFD protocol for the routing instance globally using the ip bfd admin-state command. For
example:
-> ip bfd admin-state enable
page 21-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD Quick Steps for Configuring BFD
Note. Optional. Verify the BFD interface session status and configuration using the show ip bfd interfaces
command. For example:
-> show ip bfd interfaces one
Interface Name = one,
Interface IP Address = [Link],
Admin Status = Enabled,
Desired Transmit Interval = 300,
Minimum Receive Interval = 300,
Detection Time Multiplier = 3,
Minimum Echo Receive Interval = 300,
Authentication Present = No,
Oper Status = UP
To verify the global BFD configuration for the switch, use the show ip bfd command. For example:
-> show ip bfd
BFD Version Number = 1,
Admin Status = Enabled,
Desired Tranmit Interval = 300,
Minimum Receive Interval = 300,
Detection Time Multiplier = 3,
Minimum Echo Receive Interval = 300,
Applications Registered = STATIC-ROUTING OSPF PIM DVMRP
See the “BFD Commands” chapter in the OmniSwitch AOS Release 8 CLI Reference Guide for information
about the fields in this display.
• OSPF
• VRRP Tracking
• Static routes
Once the BFD configuration is in place (see “Quick Steps for Configuring BFD” on page 21-3), the steps
described in the following sections are used to configure BFD interaction with the supported Layer 3
protocols.
2 Enable BFD session on specific OSPF interface using the ip ospf interface bfd-state command or on
all OSPF interfaces using the ip ospf bfd-state all-interfaces command. For example:
-> ip ospf interface int1 bfd-state enable
-> ip ospf bfd-state all-interfaces
3 Establish BFD sessions with all OSPF DR neighbors in full states only or with all neighbors greater
than or equal to the “2-way” state using the ip ospf interface bfd-state drs-only command or the ip ospf
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-5
Quick Steps for Configuring BFD Configuring BFD
2 Enable BFD for specific BGP neighbors using the ip bgp neighbor bfd-state command or for all BGP
neighbors using the ip bgp bfd-state all-neighbors command. For example:
-> ip bgp neighbor [Link] bfd-state enable
-> ip bgp bfd-state all-neighbors enable
2 Enable BFD for a specific track policy using the vrrp track address bfd-state command. For
example:
-> vrrp track 2 address [Link] bfd-state enable
Make sure that the track policy is associated with at least one of the virtual routers. In addition, note that
the value of the address parameter must be a remote interface address. BFD cannot be configured for a
local interface address.
Note. To display the VRRP tracking policies on which BFD is enabled, use the show vrrp track command.
-> show vrrp track
Track Admin Oper BFD
ID Policy State State Pri Status
-----+-----------------------+-------------+--------+-------+---------------
1 [Link] Enabled Down 50 Enabled
2 [Link] Enabled Down 25 Enabled
See the “VRRP Commands” chapter in the OmniSwitch AOS Release 8 CLI Reference Guide for informa-
tion about the fields in this display.
• if multiple routes are configured with the same gateway address, only one BFD session is run.
page 21-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD Quick Steps for Configuring BFD
Note. To display the static routes on which BFD is enabled use the show ip router database command
along with the protocol static option. For example:
See the “IP Commands” chapter in the OmniSwitch AOS Release 8 CLI Reference Guide for information
about the fields in this display.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-7
BFD Overview Configuring BFD
BFD Overview
Detecting communication failures as soon as possible is the first step in any network recovery process;
until a failure is detected, network convergence can’t begin. By rapidly detecting failures, BFD enables
faster convergence of routing protocols particularly on shared media such as ethernet.
The BFD protocol is very similar to the widely-used Hello mechanisms prevalent in a majority of routing
protocols, with the exception that BFD tests bidirectional communication links, has smaller packets, and is
focused exclusively on path-failure detection. BFD can also be less CPU-intensive in routers with
distributed architecture because unlike routing protocol Hello packets, BFD packets can be processed on
the interface modules rather than the control plane.
BFD protocol is a fairly simple Hello protocol designed to provide fast forwarding path failure detection
that can be enabled at the interface and routing protocol levels. It helps in the verification of forwarding
plane-to-forwarding plane connectivity (including links, interfaces, tunnels). It allows semantic separation
of forwarding plane connectivity and control plane connectivity. BFD is a single mechanism that works
independently of underlying media, data, and network protocols. It can be associated with any routing
protocol running between two systems. Moreover, it requires no changes to the existing protocols.
This implementation of BFD can be associated with tracking of next hops with the BGP, OSPF, VRRP
and other static route protocols.
• BFD is not tied to any particular routing protocol. As a result, BFD provides a generic and consistent
failure detection mechanism for OSPF, BGP, VRRP Remote Tracking, and static routes.
• BFD is less CPU-intensive than reduced timer mechanisms for routing protocols.
page 21-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD BFD Overview
In case a system stops receiving the packets within the predetermined time frame, some component in the
bidirectional path to that particular system is assumed to have failed, and the BFD system simply informs
its client protocol that a failure has occurred. It does this by sending rapid failure detection notices to
respective registered routing protocols in the local router to initiate the router table recalculation process in
order to accelerate routing convergence and network uptime.
In order to agree with its peers about how rapidly failure detection takes place, each system estimates the
rate at which it can send and receive BFD control packets. This design also enables fast systems on shared
medium with a slow system to detect failures more rapidly between fast systems while allowing the slow
system to participate to the best of its ability.
This implementation of BFD supports the Asynchronous mode. In this mode, BFD neighbors periodically
send BFD control packets to each other. A time interval for transmitting and receiving such packets is
negotiated between the two BFD systems. If a neighboring system fails to receive a number of control
packets continuously over a specific period of time, the session is considered down and BFD informs the
appropriate routing protocol.
In addition to the operational mode, an Echo function is available to verify the forwarding path between
neighboring BFD systems. When enabled, a BFD system transmits Echo packets to a BFD neighbor,
which then sends the packets back to the originating system along the forwarding path. If no Echo packets
are received back from the BFD neighbor within a configured Echo time interval, the session is considered
down.
The Echo function is a configurable option and can work on its own or simultaneously with the
Asynchronous mode. Note that using the Echo function with the Asynchronous mode lowers the rate at
which control packets are sent because Echo packets are then used to detect session liveliness. In addition,
transmitting Echo packets is only allowed over a single hop; transmitting BFD control packets is allowed
over multiple hops.
Once a BFD session is started, the BFD peers can decide whether or not Echo packets are actually
transmitted. A session is considered down when the peers receive no BFD control packets from each other
or if sufficient Echo packets are missed within a specific period of time.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-9
BFD Overview Configuring BFD
Note. The BFD control packet has a mandatory section and an optional authentication section.
Authentication is not supported in this implementation of the BFD protocol.
Field Description
Version The version number of the BFD
protocol.
My Discriminator An identifier for the BFD session
connecting to the local side.
Sequence Number The sequence number for this
packet. This value is
incremented for each successive
packet transmitted for a session.
page 21-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD BFD Overview
Demultiplexing
Each BFD session must be able to uniquely identify itself and received BFD packets among the myriad of
BFD sessions that are running. Each BFD peer must choose an identifying and unique discriminator value.
This value is sent in the “My Discriminator” field of the BFD control packet, and is reflected back in the
“Your Discriminator” field of the control packet sent from the remote peer. Once the system has echoed
the respective “Your Discriminator” value back to its peer, the packets are demultiplexed (converted back
into their original separate signals).
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-11
Configuring BFD Configuring BFD
Configuring BFD
Configuring BFD for your network requires the following approach:
1 Optional: Configure a BFD session and related session parameter values. Once configured, enable all
participating BFD sessions before configuring BFD interoperability with the supported Layer 3 protocols.
See “Configuring BFD Session Parameters” on page 21-12 for more information.
2 Configure BFD support for the Layer 3 protocols for which BFD establishes sessions. This
implementation of BFD supports the IPv4 versions of BGP, OSPF, VRRP remote tracking, and static
routes. See “Configuring BFD Support for Layer 3 Protocols” on page 21-15 for more information.
At the end of the chapter is a simple BFD network diagram with instructions on how it can be created on a
router-by-router basis. See “BFD Application Example” on page 21-24 for more information.
• Transmit time interval (see “Configuring the BFD Transmit Time interval” on page 21-13).
• Receive time interval (see “Configuring the BFD Receive Time Interval” on page 21-13).
• Echo interval (see “Configuring the BFD Echo Interval” on page 21-13).
Note. Once the default state of the BFD session is changed and the session is enabled, parameter values are
no longer configurable. To subsequently change parameter values, disable the BFD session. See “Enabling
or Disabling BFD Status” on page 21-14 for more information.
The above command configures BFD with the name bfd-vlan-101. See “Enabling or Disabling BFD
Status” on page 21-14 for more information.
To delete the BFD session, use the no form of the above command. For example:
-> no ip bfd interface bfd-vlan-101
Note. The BFD interface session must be associated to an existing IP interface that is configured with an IP
address.
page 21-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD Configuring BFD
The above command changes the global transmit time interval to 500 msecs.
To change the transmit time interval for a specific BFD interface session, use the ip bfd interface
transmit command along with the name and transmit time interval in milliseconds. For example:
-> ip bfd interface bfd-vlan-101 transmit 500
The above command changes the transmit time interval value to 500 msecs on bfd-vlan-101.
The global transmit time interval serves as the default interval value for transmitting BFD control packets.
This default value is overridden when a specific transmit value is configured.
The above command configures the global receive time interval of 500 msecs.
To change the receive time interval for BFD control packets, use the ip bfd interface receive command.
For example:
-> ip bfd interface bfd-vlan-101 receive 500
The above command changes the receive time interval value to 500 msecs on bfd-vlan-101.
The global receive time interval serves as the default interval value for receiving BFD control packets.
The default interval value is overridden when a specific receive value is configured.
The above command sets the echo interval to 500 milliseconds globally on all BFD sessions.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-13
Configuring BFD Configuring BFD
To change the BFD echo time interval for a particular BFD session, use the ip bfd interface echo-interval
command. For example:
-> ip bfd interface bfd-vlan-101 echo-interval 500
The above command configures the echo time interval value to 500 milliseconds on bfd-vlan-101.
The global echo packet time interval serves as the default interval value. The default interval value is
overridden when a specific value is configured.
To disable the global BFD status for the routing instance, use the ip bfd admin-state command with the
disable keyword. For example:
-> ip bfd admin-state disable
The above command disables BFD globally on the routing instance. Note that disabling BFD does not
remove the existing BFD configuration from the routing instance. Also, when BFD is globally disabled, all
BFD functionality is disabled for the routing instance, but configuring BFD is still allowed.
To enable a BFD session, use the ip bfd interface admin-state command. For example:
-> ip bfd interface bfd-vlan-101 admin-state enable
page 21-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD Configuring BFD
To verify the BFD status and configuration for the switch, use the show ip bfd command,. For example:
The above command shows that BFD is registered with the OSPF protocol and has a transmit interval of
300 msecs, receive interval of 300 msecs, multiplier 3, and echo interval of 300 msecs.
To verify the BFD status and configuration, use the show ip bfd interfaces command. For example:
The output above displays the interfaces participating in the BFD sessions, along with their IP interface
names and respective BFD session parameters. To see additional detail for a specific interface, use the
show ip bfd interfaces command and specify an interface name. For example:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-15
Configuring BFD Configuring BFD
Note. OSPF must be running on all participating routers, and BFD must be configured and enabled on the
participating OSPF interfaces. See “Configuring BFD Session Parameters” on page 21-12 for more
information.
1 To associate BFD with the OSPF protocol and to change the default BFD status for the OSPF protocol,
register OSPF with BFD at the protocol level using the ip ospf bfd-state command. For example:
-> ip ospf bfd-state enable
The BFD status for the OSPF protocol is now enabled, which means that communication between OSPF
and BFD is enabled. To de-register OSPF with BFD, enter the following command:
-> ip ospf bfd-state disable
2 To verify the BFD status for OSPF protocol, use the show ip ospf command. For example:
->show ip ospf
Router Id = [Link],
OSPF Version Number = 2,
Admin Status = Enabled,
Area Border Router ? = No,
AS Border Router Status = Disabled,
Route Tag = 0,
SPF Hold Time (in seconds) = 10,
SPF Delay Time (in seconds) = 5,
MTU Checking = Disabled,
# of Routes = 9,
# of AS-External LSAs = 0,
# of self-originated LSAs = 1,
# of LSAs received = 0,
External LSDB Limit = -1,
Exit Overflow Interval = 0,
# of SPF calculations done = 4,
# of Incr SPF calculations done = 0,
# of Init State Nbrs = 0,
# of 2-Way State Nbrs = 0,
# of Exchange State Nbrs = 0,
# of Full State Nbrs = 0,
# of attached areas = 1,
# of Active areas = 1,
# of Transit areas = 0,
# of attached NSSAs = 0,
Default Route Origination = none,
Default Route Metric-Type/Metric = type2 / 1
BFD Status = Disabled
3 Once OSPF is registered with BFD at the protocol level, enable the OSPF interface(s) that participate
in BFD using the ip ospf interface bfd-state command. For example:
-> ip ospf interface vlan-10 bfd-state enable
page 21-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD Configuring BFD
The above command enables BFD on the interface named vlan-10. To enable BFD on all configured
OSPF interfaces, use the ip ospf bfd-state all-interfaces command. For example:
-> ip ospf bfd-state all-interfaces enable
To disable BFD for all configured OSPF interfaces, use the ip ospf bfd-state all-interfaces command
with the disable keyword. For example:
-> ip ospf bfd-state all-interfaces disable
4 To display the BFD status on an OSPF interface, use the show ip ospf interface command.
For example:
-> show ip ospf interface
5 Once OSPF is registered with BFD at the protocol level and BFD is enabled on the desired OSPF inter-
face(s), use the show ip bfd interfaces command to display BFD-enabled interfaces. For example:
-> show ip bfd interfaces
6 To establish BFD sessions with neighbors that are in full state only, enter the ip ospf interface bfd-
state drs-only command as shown below:
-> ip ospf interface int1 bfd-state drs-only
The above command establishes a BFD session on interface named int1 with OSPF DR neighbors in full
state only.
7 To establish a BFD session on an interface with all neighbors which are greater than or equal to “2-
way” state, use the ip ospf interface bfd-state all-neighbors command as shown below:
-> ip ospf interface int2 bfd-state all-neighbors enable
The above command establishes a BFD session on interface named int2 with all OSPF neighbors that are
greater than or equal to “2-way” state.
When any neighbors are added to this interface, OSPF informs BFD about the newly added neighbor(s);
BFD then establishes a session with them. Use the show ip bfd sessions command to view BFD sessions
with all BFD neighbors as shown below:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-17
Configuring BFD Configuring BFD
To view a BFD session with a particular neighbor, use the show ip bfd sessions command followed by the
session number. For example:
-> show ip bfd sessions 1
Local discriminator = 1,
Neighbor IP Address = [Link],
Requested Session Type = ASYNC ,
Interface IfIndex = 2,
Source UDP Port = 49153,
State = UP,
Session Operating Mode = None,
Remote discriminator = 1,
Negotiated Tx interval = 300,
Negotiated Rx interval = 300,
Echo Rx interval = 300,
Multiplier = 3,
Applications Registered: = OSPF PIM
Whenever there is any change to the interface/neighbor list or interface/neighbor state, OSPF immediately
informs BFD about the changes. Additionally, whenever BFD detects any changes to the other end, BFD
updates its database accordingly and informs OSPF for its fastest convergence.
Note. BFD must be configured and enabled on the participating BGP interfaces. See “Configuring BFD
Session Parameters” on page 21-12 for more information.
1 To associate BGP protocol with BFD liveliness detection, register BGP with BFD at the protocol level
using the ip bgp bfd-state command as shown below:
-> ip bgp bfd-state enable
The BFD status for the BGP protocol is now enabled, which means that communication between BGP and
BFD is enabled. To de-register BGP with BFD, enter the following command:
-> ip bgp bfd-state disable
To verify the BFD status for BGP protocol, you can use the show ip bgp command as shown below:
page 21-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD Configuring BFD
2 Once BGP is registered with BFD at the protocol level, you need to enable BFD for particular BGP
neighbors using the ip bgp neighbor bfd-state command as shown below:
-> ip bgp neighbor [Link] bfd-state enable
The above command enables BFD for neighbor with IP address [Link]. To enable BFD for all
BGP neighbors, use the ip bgp bfd-state all-neighbors command as shown below:
-> ip bgp bfd-state all-neighbors enable
To disable BFD for all configured BGP neighbors, use the ip bgp bfd-state all-neighbors with the
disable keyword, as shown below:
-> ip bgp bfd-state all-neighbors disable
To display the BFD status of BGP neighbors, use the show ip bgp neighbors command. For example:
Nbr address As Admin state Oper state BGP Id Up/Down BFD Status
---------------+-----+-----------+------------+-----------+------------+---------
[Link] 2 enabled established [Link] 00h:02m:19s enabled
Use the show ip bfd sessions command to view BFD sessions with all BFD neighbors. For example:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-19
Configuring BFD Configuring BFD
Local discriminator = 1,
Neighbor IP Address = [Link],
Requested Session Type = ASYNC ,
Interface IfIndex = 2,
Source UDP Port = 49152,
State = UP,
Session Operating Mode = None,
Remote discriminator = 1,
Negotiated Tx interval = 300,
Negotiated Rx interval = 300,
Echo Rx interval = 300,
Multiplier = 3,
Applications Registered: = BGP PIM
BFD status for VRRP protocol is now enabled which means that socket communication between VRRP
and BFD is enabled. To de-register VRRP with BFD, enter the following command at the system prompt:
-> vrrp bfd-state disable
To verify the BFD status for VRRP protocol, you can use the show vrrp command as shown below:
page 21-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD Configuring BFD
IP Admin Adv.
VRID VLAN Address(es) Status Priority Preempt Interval
----+ ----+ -------------+----------+----------+----------+---------
1 1 [Link] Enabled 255 Yes 1
[Link]
2 15 [Link] Disabled 100 No 1
2 Once VRRP is registered with BFD at the protocol level, enable BFD for a particular VRRP track
policy using the vrrp track address bfd-state command. Ensure that the track policy is associated with at
least one of the virtual routers. For example:
-> vrrp track 2 address [Link] bfd-state enable
The above command enables BFD for a track policy with VRRP track number 2 and a remote interface
address of [Link].
Note. The value of the address parameter must be a remote interface address. BFD cannot be configured for
a local interface address.
Use the show vrrp track command to verify whether BFD is enabled for a particular track policy. For
example:
Use the show ip bfd interfaces command to verify the BFD interface/session configuration and operation
status.
Once the track policy is configured, the BFD session is established with the remote IP address. BFD
session is also established with the BFD neighbors.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-21
Configuring BFD Configuring BFD
Use the show ip bfd sessions command to view BFD sessions with all BFD neighbors. For example:
Local discriminator = 2,
Neighbor IP Address = [Link],
Requested Session Type = ECHO,
Interface IfIndex = 4,
Source UDP Port = 49153,
State = UP,
Session Operating Mode = None,
Remote discriminator = 0,
Negotiated Tx interval = 0,
Negotiated Rx interval = 0,
Echo Rx interval = 300,
Multiplier = 3,
Applications Registered: = VRRP PIM
The above command enables BFD support for a static route with destination ip address as [Link],
destination network mask as [Link], and gateway address as [Link].
In order to create a BFD session for a static route, the gateway address must not match with any local
interface address of the switch. If multiple routes are configured with the same gateway address, only one
BFD session is run. You can verify the BFD session list which shows the gateway address using the show
ip bfd sessions command.
To enable BFD support for all static routes, use the ip static-route all bfd-state command:
-> ip static-route all bfd-state enable
To verify the static routes on which BFD is enabled, use the show ip router database command with the
protocol static option. For example:
page 21-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD Configuring BFD
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-23
BFD Application Example Configuring BFD
Router 1
Router ID [Link]
VLAN 12 VLAN 31
Interface 12.x.x.x Interface 31.x.x.x
VLAN 23
Interface 23.x.x.x
Router 2 Router 3
Router ID [Link] Router ID [Link]
The following steps are used to configure the example BFD-enabled OSPF network as shown in the
diagram above.
Note. Configuring a BFD session explicitly with an IP interface name on individual routers is optional, and
must be used if user defined BFD session parameters need to be applied. All the steps for explicit configu-
ration are mentioned as optional.
page 21-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD BFD Application Example
Note. The ports is statically assigned to the router VLANs, as a VLAN must have a physical port assigned
to it in order for the IP router interface to function.
-> vlan 12
-> ip interface vlan-12 vlan 12 address [Link] mask [Link]
-> vlan 12 members port 1/1/2
-> vlan 10
-> ip interface vlan-10 vlan 10 address [Link] mask [Link]
-> vlan 10 members port 1/1/3-5
-> vlan 23
-> ip interface vlan-23 vlan 23 address [Link] mask [Link]
-> vlan 23 members port 1/1/2
-> vlan 20
-> ip interface vlan-20 vlan 20 address [Link] mask [Link]
-> vlan 20 members port 1/1/3-5
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-25
BFD Application Example Configuring BFD
• VLAN 12 handles the backbone connection from Router 1 to Router 2, using the IP router port [Link]
and physical port 1/1/1.
• VLAN 23 handles the backbone connection from Router 2 to Router 3, using the IP router port [Link]
and physical port 1/1/2.
• VLAN 20 handles the device connections to Router 2, using the IP router port [Link] and physical
ports 1/1/3-5. More ports could be added at a later time if necessary.
The router was assigned the Router ID of [Link].
Router 3 (using ports 1/1/1 and 1/1/2 for the backbone, and ports 1/1/3-5 for end devices):
-> vlan 23
-> ip interface vlan-23 vlan 23 address [Link] mask [Link]
-> vlan 23 members port 1/1/1
-> vlan 31
-> ip interface vlan-31 vlan 31 address [Link] mask [Link]
-> vlan 31 members port 1/1/2
-> vlan 30
-> ip interface vlan-30 vlan 30 address [Link] mask [Link]
-> vlan 30 members port 1/1/3-5
page 21-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD BFD Application Example
Router 2
-> ip ospf interface vlan-12
-> ip ospf interface vlan-12 area [Link]
-> ip ospf interface vlan-12 admin-state enable
Router 3
-> ip ospf interface vlan-23
-> ip ospf interface vlan-23 area [Link]
-> ip ospf interface vlan-23 admin-state enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-27
BFD Application Example Configuring BFD
Router 2
-> ip bfd interface vlan-12
-> ip bfd interface vlan-12 admin-state enable
Router 3
-> ip bfd interface vlan-23
-> ip bfd interface vlan-23 admin-state enable
• Set the minimum amount of time BFD waits to receive control packets to 200 milliseconds.
• Set the global BFD Echo packet time interval to 200 milliseconds.
page 21-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring BFD Verifying the BFD Configuration
• To check the BFD status at the OSPF protocol level, use the show ip ospf command. This command is
also used to check the general OSPF configuration. For OSPF interfaces, use the show ip ospf
interface command.
show ip bfd Displays the global BFD configuration for the routing instance.
show ip bfd interfaces Displays the BFD interface configuration for the switch.
show ip bfd sessions Displays the BFD neighbors and session states.
show ip ospf Displays the BFD status for the OSPF protocol.
show ip ospf interface Displays the BFD status for OSPF interfaces.
show ip bgp Displays the BFD status for the BGP protocol.
show ip bgp neighbors Displays the BFD status for BGP neighbors.
show vrrp Displays the BFD status for the VRRP protocol.
show vrrp track Displays the BFD status for a track policy.
show ip router database Displays the BFD status for static routes.
protocol static
For more information about the resulting displays form these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide. Examples of the above commands and their outputs are given in the
section “Configuring BFD” on page 21-12.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 21-29
Verifying the BFD Configuration Configuring BFD
page 21-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
22 Configuring DHCP Relay
The User Datagram Protocol (UDP) is a connectionless transport protocol that runs on top of IP networks.
The DHCP Relay allows you to use nonroutable protocols (such as UDP) in a routing environment. UDP
is used for applications that do not require the establishment of a session and end-to-end error checking.
Email and file transfer are two applications that could use UDP. UDP offers a direct way to send and
receive datagrams over an IP network and is primarily used for broadcasting messages. This chapter
describes the DHCP Relay feature. This feature allows UDP broadcast packets to be forwarded across
VLANs that have IP routing enabled.
In This Chapter
This chapter describes the basic components of DHCP Relay and how to configure them. CLI commands
are used in the configuration examples. For more details about the syntax of commands, see the
OmniSwitch AOS Release 8 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Quick steps for configuring DHCP Relay on page 22-4.
• Setting the Relay Forwarding Option to Standard and Per-VLAN on page 22-11.
• Using automatic IP configuration to obtain an IP address for the switch on page 22-12.
For information about the IP protocol, see Chapter 16, “Configuring IP.”
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-1
DHCP Relay Specifications Configuring DHCP Relay
page 22-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring DHCP Relay DHCP Relay Defaults
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-3
Quick Steps for Setting Up DHCP Relay Configuring DHCP Relay
2 Set the forward delay timer for the DHCP relay. To set the timer for a 15 second delay, use the
following command:
-> ip helper forward-delay 15
3 Set the maximum hop count value. To set a hop count of 3, use the following command:
Note. Optional. To verify the DHCP Relay configuration, enter the show ip helper command. The display
shown for the DHCP Relay configured in the above Quick Steps is shown here:
-> show ip helper
Ip helper :
Forward Delay (seconds) = 15,
Max number of hops = 3,
Relay Agent Information = Disabled,
PXE support = Disabled,
Forward option = standard mode,
Bootup Option = Disable
Forwarding address list (Standard mode): [Link]
Note. For more information about this display, see the “DHCP Relay” chapter in the OmniSwitch AOS
Release 8 CLI Reference Guide.
page 22-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring DHCP Relay DHCP Relay Overview
• Configurable options: DHCP server IP address, Forward Delay, Maximum Hops, Forwarding Option,
automatic switch IP configuration
The port numbers indicate the destination port numbers in the UDP header. The DHCP Relay verifies
whether the forward delay time (specified by the user) has elapsed before sending the packet down to
UDP with the destination IP address replaced by the address (also specified by the user).
If the relay is configured with multiple IP addresses, then the packet is sent to all IP address destinations.
The DHCP Relay also verifies that the maximum hop count has not been exceeded. If the forward delay
time is not met or the maximum hop count is exceeded, the BOOTP/DHCP packet is discarded by the
DHCP Relay.
The forwarding option allows you to specify if the relay must operate in the standard and per-VLAN-only
mode. The standard mode forwards all DHCP packets on a global relay service. The per-VLAN-only
mode forwards DHCP packets that originate from a specific VLAN. See “Setting the Relay Forwarding
Option” on page 22-11 for more information.
DHCP Relay service enables automatic IP address configuration for default VLAN 1 when a switch that is
not configured boots up. If this function is enabled, the switch broadcasts a BootP or a DHCP request
packet at boot time. When the switch receives an IP address from a BootP/DHCP server, the address is
assigned to default VLAN 1. See “Enabling Automatic IP Configuration” on page 22-12 for more
information.
Alternately, the relay function can be provided by an external router connected to the switch; in this case,
the relay is configured on the external router.
DHCP
DHCP (Dynamic Host Configuration Protocol) provides a framework for passing configuration
information to Internet hosts on a TCP/IP network. It is based on the Bootstrap Protocol (BOOTP), adding
the ability to automatically allocate reusable network addresses and additional configuration options.
DHCP consists of the following two components:
• A protocol for delivering host-specific configuration parameters from a DHCP server to a host.
DHCP is built on a client-server model in which a designated DHCP server allocates network addresses
and delivers configuration parameters to dynamically configured hosts. It supports the following three
mechanisms for IP address allocation.
Automatic—DHCP assigns a permanent IP address to a host.
Dynamic—DHCP assigns an IP address to a host for a limited period of time (or until the host
explicitly relinquishes the address).
Manual—The network administrator assigns a host IP address and DHCP simply conveys the assigned
address to the host.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-5
DHCP Relay Overview Configuring DHCP Relay
The DHCP Relay Agent provides the network interfaces dynamic IP addresses from the DHCP server
present on a different VLAN. This feature can be configured using the ip helper and related commands.
The Generic UDP Relay forwards the broadcast packets with pre-configured destination UDP port
information to destination VLAN or VLANs. This feature can be configured using the ip udp relay and
related commands.
For more information on the CLI commands related to DHCP Relay, see the “DHCP Relay Commands”
chapter in the OmniSwitch AOS Release 8 CLI Reference Guide.
page 22-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring DHCP Relay DHCP Relay Overview
OmniSwitch
External Router
with
DHCP Relay
[Link]
DHCP Clients VLAN 1
IN OUT
[Link]
DHCP Server
[Link]
DHCP Clients
The external router inserts the subnet address of the first hop segment into the DHCP request frames from
the DHCP clients. This subnet address allows the DHCP server to locate the segment on which the
requesting client resides. In this example, all clients attached to the OmniSwitch are DHCP-ready and
have the same subnet address ([Link]) inserted into each of the requests by the DHCP Relay function of
the router. The DHCP server assigns a different IP address to each of the clients. The switch does not need
an IP address assigned to it. All DHCP clients are members of either a default VLAN or an IP protocol
VLAN.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-7
DHCP Relay Overview Configuring DHCP Relay
DHCP Relay
[Link] [Link]
(Router Port IP Address) (Router Port IP Address)
VLAN 2 VLAN 3
[Link] [Link]
DHCP Clients
[Link] [Link]
DHCP Client DHCP Server [Link]
DHCP Client
DHCP Clients in Two VLANs
During initialization, each network client forwards a DHCP request frame to the DHCP server using the
local broadcast address. For these locally attached stations, the frame is simply switched from one station
to another.
In this case, the DHCP server and clients must be members of the same VLAN (they can also be members
of the default VLAN).
Since the clients in the application example are not members of the same VLAN as the DHCP server, they
must request an IP address through the DHCP Relay routing entity in the switch. When a DHCP request
frame is received by the DHCP Relay entity, it is forwarded from VLAN 3 to VLAN 2. All the DHCP-
ready clients in VLAN 3 must be members of the same VLAN, and the switch must have the DHCP Relay
function configured.
page 22-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring DHCP Relay DHCP Relay Implementation
Global DHCP
For the global DHCP service, you must identify an IP address for the DHCP server.
The DHCP Relay forwards BOOTP/DHCP broadcasts to and from the specified address. If multiple
DHCP servers are used, one IP address must be configured for each server.
To delete an IP address, use the no form of the ip helper address command. The IP address specified
with this syntax is deleted. If an IP address is not specified with this syntax, then all IP helper addresses
are deleted. The following command deletes an IP helper address:
-> no ip helper address [Link]
Per-VLAN DHCP
For the Per-VLAN DHCP service, you must identify the number of the VLAN that makes the relay
request.
The following syntax identifies two DHCP servers for VLAN 4 at two different IP addresses:
-> ip helper address [Link] [Link] vlan 4
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-9
DHCP Relay Implementation Configuring DHCP Relay
To delete an IP address, use the no form of the ip helper address command. The IP address specified with
this syntax is deleted. If an IP address is not specified with this syntax, then all IP helper addresses are
deleted. The following command deletes a helper address for IP address [Link]:
-> no ip helper address [Link]
The only parameter that is required for DHCP relay is the IP address to the DHCP server or to the next hop
to the DHCP server. The default values can be accepted for forward delay, hop count, and relay
forwarding option.
Alternately the relay function can be provided by an external router connected to the switch; in this case,
the relay must be configured on the external router.
page 22-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring DHCP Relay DHCP Relay Implementation
The hops value represents the maximum number of relays. The default maximum hops value is set to four.
This maximum hops value applies only to DHCP Relay. All other switch services ignore this value.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-11
Using Automatic IP Configuration Configuring DHCP Relay
Note. Automatic IP address configuration only supports the assignment of a permanent IP address to the
switch. Make sure that the DHCP server is configured with such an address before using this feature.
Using automatic IP configuration also allows the switch to specify the type of request packet to send;
BootP or DHCP. When the BootP/DHCP server receives the request packet from the switch, it processes
the request and sends an appropriate reply packet. When the switch receives a reply packet from the
BootP/DHCP server, one or more of the following occurs:
• The router port for VLAN 1 is assigned the IP address provided by the server.
• If the reply packet contains a subnet mask for the IP address, the mask is applied to the VLAN 1 router
port address. Otherwise, a default mask is determined based upon the class of the IP address. For
example, if the IP address is a Class A, B, or C address, then [Link], [Link], or [Link]
is used for the subnet mask.
• If the reply packet from the server contains a gateway IP address, then a static route entry of [Link] is
created on the switch with the gateway address provided by the server.
Note. If the VLAN 1 router port is already configured with an IP address, the switch does not broadcast a
request packet at boot time even if automatic IP configuration is enabled.
To verify IP router port configuration for VLAN 1, use the show ip interface and show ip routes
commands. For more information about these commands, refer to the OmniSwitch AOS Release 8 CLI
Reference Guide.
The next time the switch boots up, DHCP Relay broadcasts a BootP request packet as the default or DHCP
request packet if DHCP is enabled to obtain an IP address for default VLAN 1.
To disable automatic IP configuration for the switch, use the ip helper boot-up command with the disable
option, as shown below:
-> ip helper boot-up disable
page 22-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring DHCP Relay Configuring UDP Port Relay
• The ip udp relay service command can also be used to enable or disable relay for DHCP well known
ports 67 and 68.
• If the BOOTP/DHCP relay service is disabled, the ip helper configuration is not retained and all
dependent functionalities, like automatic IP configuration for VLAN 1 and telnet, is disrupted.
• The DHCP Relay Agent Service must support the BOOTP/DHCP protocol, specifically UDP port 67
and 68.
• Use port 67 and/or port 68 with the ip udp relay service command to assign the well-known service
BOOTP.
• Relaying DHCP traffic is available on a global and per-VLAN basis. Using this function on a per-
VLAN basis requires setting the DHCP relay forwarding mode to per-vlan-only. UDP port relay for
generic services is only available on a per-VLAN basis, however it does not require enabling the per-
vlan-only forwarding option.
Configuring UDP Port Relay for generic UDP services is a two-step process. The first step involves
enabling UDP Port Relay on the generic service port. The second step involves specifying a VLAN that
relays and forwards the traffic destined for the generic service port. Both steps are required and are
described below.
To enable relay on a user-defined UDP service port, enter the service port number using the ip udp relay
port command. For example, the following command enables relay on service port 3047:
-> ip udp relay port 3047
To disable a relay operation for a UDP service port, use the no form of the ip udp relay service
command. For example, the following command disables relay on the DNS well-known service port:
-> ip udp relay no service DNS
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-13
Configuring UDP Port Relay Configuring DHCP Relay
To disable a relay operation for a UDP service port, use the no form of the ip udp relay port command.
For example, the following command disables relay on the DNS well-known service port:
-> ip udp relay no port 3047
For more information about using the ip udp relay service and ip udp relay port command, see the
OmniSwitch AOS Release 8 CLI Reference Guide.
Note. The ip udp relay service vlan command works only if UDP Port Relay is already enabled on the
specified service port. In addition, when assigning a VLAN to the BOOTP/DHCP service ports, set the
DHCP relay forwarding mode to per-vlan-only first before trying to assign the VLAN.
To specify more than one VLAN with a single command, enter a range of VLANs. For example, the
following command assigns VLANs 6 through 8 as forwarding VLANs for the NBNS/NBDD well-known
service ports:
-> ip udp relay service nbns vlan 6-8
If UDP Port Relay was enabled on a not well-known service port, then enter the service port number
instead of the service name along with the port keyword. For example, the following command assigns
VLAN 100 as a forwarding VLAN for UDP service port 3047:
-> ip udp relay port 3047 vlan 100
To remove a VLAN association with a UDP service port, use the no form of the ip udp relay service vlan
command. For example, the following command removes the VLAN 6 association with the NBNS well-
known service port:
-> no ip udp relay service nbns vlan 6
For more information about using the ip udp relay service vlan command, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
page 22-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring DHCP Relay Configuring UDP Port Relay
How the Relay Agent Processes DHCP Packets from the Client
The following table describes how the relay agent processes DHCP packets received from clients when
the Option-82 feature is enabled for the switch:
If the DHCP packet from the client ... The relay agent ...
Contains a zero gateway IP address ([Link]) and Inserts Option-82 with unique information to
no Option-82 data. identify the client source.
Contains a zero gateway IP address ([Link]) and Drops the packet, keeps the Option-82 data and
Option-82 data. forwards the packet, or replaces the Option-82
data with its own Option-82 data and forwards the
packet.
How the Relay Agent Processes DHCP Packets from the Server
When the relay agent receives a DHCP packet from the DHCP server, the agent:
1 Extracts the VLAN ID from the Circuit ID sub-option field in the packet and compares the MAC
address of the IP router interface for that VLAN to the MAC address contained in the Remote ID sub-
option field in the same packet.
2 Drops the DHCP packet if the IP router interface MAC address and the Remote ID MAC address are
not the same.
3 If the two MAC addresses match, then a check is made to see if the port value in the Circuit ID sub-
option field in the packet matches a port that is associated with the VLAN also identified in the Circuit ID
sub-option field.
4 If the port information does not identify an actual port associated with the Circuit ID VLAN, then the
agent tries to deliver the packet back to the port where the device is located.
5 If the port information does identify an actual port associated with the Circuit ID VLAN, then the agent
strips the Option-82 data from the packet and unicasts the packet to the port identified in the Circuit ID
sub-option.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-15
Configuring DHCP Security Features Configuring DHCP Relay
• Remote ID—the MAC address of the router interface associated with the VLAN ID specified in the
Circuit ID suboption.
The dhcp-snooping option-82-data-insertion command is used to configure the type of data (base MAC
address, system name, interface alias, or user-defined) that is inserted into the above Option-82
suboptions. The system name and user-defined text are reported in ASCII text format, but the MAC
address is still reported in hex-based format.
By default, the relay agent drops client DHCP packets it receives that already contain Option-82 data.
However, it is possible to configure an Option-82 policy to specify how such packets are treated. See
“Configuring DHCP Security Features” on page 22-16 for more information.
The DHCP Option-82 feature is only applicable when DHCP relay is used to forward DHCP packets
between clients and servers associated with different VLANs. In addition, a secure IP network must exist
between the relay agent and the DHCP server.
page 22-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring DHCP Relay Configuring DHCP Security Features
How the Relay Agent Processes DHCP Packets from the Client
The following table describes how the relay agent processes DHCP packets received from clients when
the Option-82 feature is enabled for the switch:
If the DHCP packet from the client ... The relay agent ...
Contains a zero gateway IP address ([Link]) and Inserts Option-82 with unique information to
no Option-82 data. identify the client source.
Contains a zero gateway IP address ([Link]) and Drops the packet, keeps the Option-82 data and
Option-82 data. forwards the packet, or replaces the Option-82
data with its own Option-82 data and forwards the
packet.
How the Relay Agent Processes DHCP Packets from the Server
Note. If a DHCP server does not support Option-82, the server strips the option from the packet. If the
server does support this option, the server will retain the Option-82 data received and send it back in a reply
packet.
When the relay agent receives a DHCP packet from the DHCP server and the Option-82 feature is
enabled, the agent will:
1 Extract the VLAN ID from the Circuit ID suboption field in the packet and compare the MAC address
of the IP router interface for that VLAN to the MAC address contained in the Remote ID suboption field
in the same packet.
2 If the IP router interface MAC address and the Remote ID MAC address are not the same, then the
agent will drop the packet.
3 If the two MAC addresses match, then a check is made to see if the port value in the Circuit ID
suboption field in the packet matches a port that is associated with the VLAN also identified in the Circuit
ID suboption field.
4 If the port information does not identify an actual port associated with the Circuit ID VLAN, then the
agent will drop the packet.
5 If the port information does identify an actual port associated with the Circuit ID VLAN, then the agent
strips the Option-82 data from the packet and unicasts the packet to the port identified in the Circuit ID
suboption.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-17
Configuring DHCP Security Features Configuring DHCP Relay
This same command is also used to disable this feature. For example:
-> ip helper agent-information disable
Note. Since this feature is not available on a per-VLAN basis, DHCP Option-82 functionality is not
restricted to ports associated with a specific VLAN. Instead, DHCP traffic received on all ports is eligible
for Option-82 data insertion when it is relayed by the agent.
• keep—The existing Option-82 data in the DHCP packet is retained and the packet is forwarded to the
server.
• replace—The existing Option-82 data in the DHCP packet is replaced with local relay agent data and
then forwarded to the server.
For example, the following commands configure DHCP Option-82 policies:
-> ip helper agent-information policy drop
-> ip helper agent-information policy keep
-> ip helper agent-information policy replace
Note. This type of policy applies to all DHCP packets received on all switch ports. In addition, if a packet
that contains existing Option-82 data also contains a gateway IP address that matches a local subnet
address, the relay agent will drop the packet and not apply any existing Option-82 policy.
page 22-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring DHCP Relay Configuring DHCP Security Features
• The packet already contains Option-82 data in the options field and the Option-82 check function is
enabled. See “Bypassing the Option-82 Check on Untrusted Ports” on page 22-22 for more
information.
If none of the above are true, then DHCP Snooping accepts and forwards the packet. When a DHCPACK
packet is received from a server, the following information is extracted from the packet to create an entry
in the DHCP Snooping binding table:
• MAC address of the DHCP client.
• IP address for the client that was assigned by the DHCP server.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-19
Configuring DHCP Security Features Configuring DHCP Relay
• The VLAN associated with the port from where the DHCP packet originated.
After extracting the above information and populating the binding table, the packet is then forwarded to
the port from where the packet originated. Basically, the DHCP Snooping feature prevents the normal
flooding of DHCP traffic. Instead, packets are delivered only to the appropriate client and server ports.
Note. DHCP Snooping drops server packets received on untrusted ports (ports that connect to devices
outside the network or firewall). It is important to configure ports connected to DHCP servers as trusted
ports so that traffic to/from the server is not dropped.
page 22-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring DHCP Relay Configuring DHCP Security Features
When DHCP Snooping is enabled at the switch level, all DHCP packets received on all switch ports are
screened/filtered by DHCP Snooping. By default, only client DHCP traffic is allowed on the ports, unless
the trust mode for a port is configured to block or allow all DHCP traffic. See “Configuring the Port Trust
Mode” on page 22-22 for more information.
In addition, the following functionality is also activated by default when switch-level DHCP Snooping is
enabled:
• The DHCP Snooping binding table is created and maintained. To configure the status or add a static
entry to this table, use the dhcp-snooping binding admin-state command.
• MAC address verification is performed to compare the source MAC address of the DHCP packet with
the client hardware address contained in the packet. To configure the status of MAC address
verification, use the dhcp-snooping mac-address-verification command.
• Option-82 data is inserted into the packet and then DHCP reply packets are only sent to the port from
where the DHCP request originated, instead of flooding these packets to all ports. To configure the
status of Option-82 data insertion, use the dhcp-snooping option-82-data-insertion command.
• The base MAC address of the switch is inserted into the Circuit ID and Remote ID suboptions of the
Option-82 field. To configure the type of data (base MAC address, system name, or user-defined) that
is inserted into the Option-82 suboptions, use the dhcp-snooping option-82 format command. The
system name and user-defined text are reported in ASCII text format, but the MAC address is still
reported in hex-based format.
When this feature is enabled at the VLAN level, DHCP Snooping functionality is only applied to ports
that are associated with a VLAN that has this feature enabled. Up to 64 VLANs can have DHCP Snooping
enabled.
Note. Enabling DHCP Snooping at the switch level is not allowed if it is enabled for one or more VLANs.
By default, when DHCP Snooping is enabled for a specific VLAN, MAC address verification and Option-
82 data insertion is also enabled for the VLAN by default. To disable or enable either of these two
features, use the dhcp-snooping vlan command with either the mac-address-verification or option-82-
data-insertion parameters. For example:
-> dhcp-snooping vlan 200 mac-address-verification disable
-> dhcp-snooping vlan 200 option-82-data-insertion disable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-21
Configuring DHCP Security Features Configuring DHCP Relay
Note. If the binding table functionality is enabled, disabling Option-82 data insertion for the VLAN is not
allowed. See “Configuring the DHCP Snooping Binding Table” on page 22-23 for more information.
Note. If DHCP Snooping is not enabled for a VLAN, then all ports associated with the VLAN are
considered trusted ports. VLAN-level DHCP Snooping does not filter DHCP traffic on ports associated
with a VLAN that does not have this feature enabled.
It is also possible to specify a range of ports. For example, the following command changes the trust mode
for ports 2/1 through 2/10 on chassis 1 to trusted:
-> dhcp-snooping port 1/2/1-10 trust
Note. It is necessary to configure ports connected to DHCP servers within the network and/or firewall as
trusted ports so that necessary DHCP traffic to/from the server is not blocked. Configuring the port mode as
trusted also identifies the device connected to that port as a trusted device within the network.
page 22-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring DHCP Relay Configuring DHCP Security Features
Note that enabling the binding table functionality is not allowed if Option-82 data insertion is not enabled
at either the switch or VLAN level.
In addition, it is also possible to configure static binding table entries. This type of entry is created using
available dhcp-snooping binding command parameters to define the static entry. For example, the
following command creates a static DHCP client entry:
-> dhcp-snooping binding [Link] port 1/1/15 address [Link] lease-
time 3 vlan 200
To remove a static binding table entry, use the no form of the dhcp-snooping binding command. For
example:
-> no dhcp-snooping binding [Link] port 1/1/15 address [Link]
lease-time 3 vlan 200
To view the DHCP Snooping binding table contents, use the show dhcp-snooping binding command. See
the OmniSwitch AOS Release 8 CLI Reference Guide for example outputs of this command.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-23
Configuring DHCP Security Features Configuring DHCP Relay
Note. Do not manually change the [Link] file. This file is used by DHCP Snooping to preserve
and maintain binding table entries. Changing the file name or contents can cause problems with this
functionality or with the DHCP Snooping application itself.
The amount of time, in seconds, between each automatic save is referred to as the binding table timeout
value. By default, the timeout value is 300 seconds. To configure this value, use the dhcp-snooping
binding timeout command. For example, the following command sets the timeout value to 1500 seconds:
-> dhcp-snooping binding timeout 1500
Each time an automatic save is performed, the [Link] file is time stamped.
Synchronizing the binding table is only done when this command is used. There is no automatic triggering
of this function. In addition, it is important to note that synchronizing the binding table loads
[Link] file contents into memory. This is the reverse of saving the binding table contents in
memory to the [Link] file, which is done at automatic time intervals as defined by the binding
table timeout value. See “Configuring the Binding Table Timeout” on page 22-24 for more information.
When binding table retention is enabled, entries remain in the table for the term of their DHCP lease and
are not removed even when the MAC address for the entry is cleared from the MAC address table.
To disable binding table retention, use the following command:
-> dhcp-snooping binding persistency disable
page 22-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring DHCP Relay Configuring DHCP Security Features
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 22-25
Verifying the DHCP Relay Configuration Configuring DHCP Relay
show ip helper Displays the current forward delay time, the maximum number of hops,
the forwarding option (standard), and each of the DHCP server IP
addresses configured.
show ip helper statistics Displays the number of packets the DHCP Relay service has received
and transmitted, the number of packets dropped due to forward delay
and maximum hops violations, and the number of packets processed
since the last time these statistics were displayed.
show ip udp relay Displays the VLAN assignments to which the traffic received on the
UDP service ports is forwarded. Displays the current configuration for
UDP services by service name or by service port number.
show ip udp relay statistics Displays the current statistics for each UDP port relay service. These
statistics include the name of the service, the forwarding VLAN(s)
configured for that service, and the number of packets the service has
sent and received.
no ip helper statistics Displays the VLAN assignments to which the traffic received on the
specified UDP service port is forwarded.
show dhcp-snooping vlan Displays a list of VLANs that have DHCP Snooping enabled and
whether or not MAC address verification and Option-82 data insertion
is enabled for each VLAN.
show dhcp-snooping port Displays the DHCP Snooping trust mode for the port and the number of
packets destined for the port that were dropped due to a DHCP
Snooping violation.
show dhcp-snooping binding Displays the contents of the DHCP Snooping binding table (database).
Notes.
• Use the show ip udp relay command to reset the IP helper statistics for VRF instances.
• Use the no ip helper statistics command to reset the generic UDP Relay Service related statistics.
page 22-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
23 Configuring an Internal
DHCP Server
The Dynamic Host Configuration Protocol (DHCP) offers a framework to provide configuration
information to client interfaces on an IPv4 or IPv6 IP network. DHCP is based on the Bootstrap Protocol
(BOOTP) and provides additional capabilities, such as dynamic allocation of reusable network addresses
and configuration options.
A DHCP server provides dynamic IP addresses on lease for client interfaces on a network. It manages a
pool of IP addresses and information about client configuration parameters. The DHCP server obtains an
IP address request from the client interfaces. After obtaining the requests, the DHCP server assigns an IP
address, a lease period, and other IP configuration parameters, such as the subnet mask and the default
gateway.
This chapter describes how to configure the internal DHCP server on the OmniSwitch.
In This Chapter
This chapter describes configuration of the DHCP server and how to modify the configuration through the
Command Line Interface (CLI). CLI commands are used in the configuration examples; for more details
on the syntax of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Configuration procedures described in this chapter include:
• “DHCP Server Specifications” on page 23-2.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-1
DHCP Server Specifications Configuring an Internal DHCP Server
Dynamic DHCP:
The DHCP server assigns an IP address to a client for
a limited period of time or until the client explicitly
releases the address.
OmniSwitch IPv4 Configuration Files [Link]
[Link]
[Link]
OmniSwitch IPv6 Configuration Files [Link]
[Link]
[Link]
Maximum number of leases 8000
Maximum lease information file size 375 KB
page 23-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Quick Steps to Configure Internal DHCP Server
Note. For detailed information on how to configure the DHCP server on OmniSwitch, see the Configuring
DHCP Server on OmniSwitch section. The *.conf and *.pcy files can be created using VitalQIP, refer to the
VitalQIP documentation for additional information.
-> cd /flash/switch
2 Copy the [Link] file and save it as [Link]. The [Link] file can then be
customized as necessary.
-> cp [Link] [Link]
3 Copy the [Link] file and save it as [Link]. The [Link] file can then be
customized as necessary.
4 Customize the [Link] and [Link] files according to your requirements. Use the vi command to
modify the existing configuration file.
-> vi [Link]
Declare dynamic DHCP options, global options, and server configuration parameters for client interfaces
in the [Link] file. Add DHCP related information for a particular subnet.
For example, for the subnet [Link], define the dynamic DHCP range, router option, domain name and
other details using the following code:
server-identifier [Link];
Note. See “Configuration File Parameters and Syntax” on page 23-15 for details on what each of the
optional keywords specify.
5 After entering the required information in the [Link] file. Type :wq to save the changes made to
the [Link] file.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-3
Quick Steps to Configure Internal DHCP Server Configuring an Internal DHCP Server
Notes.
• If the [Link] file is corrupted, the [Link] file is used as a backup file.
• If the [Link] file is updated successfully, then the [Link] file is over written with
the configurations present in the [Link] file.
• Properly configured [Link] and [Link] files can be transferred to the switch remotely instead
of using the vi editor.
6 Restart the DHCP server using the dhcp-server restart command. The changes made in the
[Link] file are applied to the OmniSwitch.
-> dhcp-server restart
Note. The dhcp-server restart command automatically updates the [Link], [Link] and
[Link] files.
page 23-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server DHCP Server Overview
A DHCP server uses the Dynamic Host Configuration Protocol to provide initialization parameters to the
clients in the network.
4 The server responds with a dynamic address in a defined range or one based on a MAC address.
• Dynamically modify the DHCP configuration, using the vi editor, or through an accurately configured
text file transferred to the switch.
• Restart the DHCP server.
• View the DHCP server statistics through the command line interface.
VitalQIP Server
The VitalQIP framework provides a complete solution for IP Address Management. The OmniSwitch runs
the relevant components for a remote server such as Message Service and Active Lease that interact with
the QIP server. The QIP server can be used to generate the required conf and pcy files which can used on
the OmniSwitch to allow it to act as a remote server.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-5
Interaction With Other Features Configuring an Internal DHCP Server
BootP/UDP Relay
The BootP/UDP relay is automatically disabled on the default VRF when the internal DHCP server is
enabled on the switch.
IP Interfaces
The DHCP client gets a lease only if the switch has an IP interface and the DHCP server is configured for
that particular subnet. If there are no IP address ranges defined for the incoming client interface, then the
client is not assigned a lease.
In case of IP multinetting, the primary interface address is used to calculate the subnet of the interface. If
there are no IP interfaces configured in the system, then the packet sent from the client is dropped.
VitalQIP Server
The VitalQIP framework provides a complete solution for IP Address Management. The OmniSwitch runs
the relevant components for a remote server such as Message Service and Active Lease that interact with
the VitalQIP server.
page 23-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Configuring DHCP Server on OmniSwitch
• DHCP Configuration files: The dhcpd(v6).conf file is used to configure specific DHCP server
settings on the switch such as IP address ranges and options. The dhcpd(v6).[Link] file is a
backup for the dhcpd(v6).conf file.
• DHCP Server Database file: The dhcpd(v6)[Link] file is activated only during takeover and server
restart of the DHCP server. It contains lease details of the client IP addresses.
Policy file
The policy file is used to configure the DHCP related policies according to user requirements. The
dhcpd(v6).[Link] file provides a basic template to create a policy file. The DHCP server policy
parameters can be defined using the policy file. Ideally, most of the server parameters are kept static.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-7
Configuring DHCP Server on OmniSwitch Configuring an Internal DHCP Server
AbusiveClientLockout=0
AddManualToGlobalDuidPool=1
AllowClientPacketsWithInvalidOptions=1
AllowUnencodedFqdn=1
CheckTransactionID=0
ClientFqdnOptionSupport=client
ClientHostNameProcessing=correct
ClientProcessingWaitTime=3000
CompressedLog=0
DefaultLease=60000
DHCPv6SocketAddr=[Link]
DuidWarningsToEventLog=0
;
ForceClass=user
HonorRequestedLeaseTime=1
LogLeaseGrantAndRenew=0
MaxOutgoingDhcpMessageSize=1024
MaxPendingSeconds=120
MaxUnavailableTime=3600
MinimumRequestedLeaseTime=3600
NumberOfThreads=15
RegisteredClientsOnly=0
ReplyToUnmanagedInformationRequests=1
SendRequestedParamsOnly=1
SendUnicastOption=1
;ServerDuidDefault=0001000146e6ebb10003ba3cbb0d
ServerPreference=255
ServerStatefulMode=1
UpdateQIP=all
The updated dhcpd(v6).pcy file is effective only after the dhcp-server restart command is performed.
See the “Policy File Parameters and Syntax” on page 23-31 table for additional information on individual
policy parameters and how to apply the policies for internal DHCP server on the OmniSwitch.
• dhcpd(v6).[Link]
The following sections provide detailed information on the dhcpd(v6).conf and dhcpd(v6).[Link]
files.
page 23-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Configuring DHCP Server on OmniSwitch
dhcpd(v6).conf File
The dhcpd(v6).conf file is used to declare DHCP options and global options for the DHCP clients. The
dhcpd(v6).[Link] file contains the default configuration parameters to setup the internal DHCP
server. The template file can be copied to the dhcpd(v6).conf file for editing.
The dhcpd(v6).conf can be used to define the following:
• IP subnets
• Declarations: Describe the topology of the network and provide addresses for the clients. Parameters
can be listed under declarations that override the global parameters.
• Comments: Provide a description for the parameters and declarations. Lines beginning with a hash
mark (#) are considered comments and they are optional.
#IP subnet
subnet [Link] netmask [Link]
{
#Dynamic scope and parameters that apply to this scope overriding global params.
Note. A subnet declaration must be included for every subnet in the network related to the DHCP server.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-9
Configuring DHCP Server on OmniSwitch Configuring an Internal DHCP Server
Details about valid parameters and declarations are listed in the table found in “Configuration File
Parameters and Syntax” on page 23-15.
v6-subnet [Link]/64 {
policy minimum-requested-lifetime 800;
v6-manual-dhcp duid 00-02-00-00-00-09-0c-cd-84-d3-03-00-0a-14
[Link] {
option posix-timezone "MST7MDT6,116/[Link],298/[Link]";
}
page 23-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Configuring DHCP Server on OmniSwitch
dhcpd(v6).[Link] File
The dhcpd(v6).[Link] file is used as a backup file when the dhcpd(v6).conf file is corrupted. If
the dhcpd(v6).conf file is affected, then the DHCP server generates an error. In such an instance, the
DHCP server configuration is updated according to the dhcpd(v6).[Link] file. The
dhcpd(v6).[Link] file is now used to configure the internal DHCP server, provide IP addresses on
lease, and maintain DHCP related information.
The dhcpd(v6).[Link] file is overwritten with the configurations in the dhcpd(v6).conf file when
the DHCP configurations are setup or updated and the internal DHCP server is restarted successfully. At
this point, the dhcpd(v6).conf and dhcpd(v6).[Link] files are identical.
If any modifications are made in the dhcpd(v6).conf file, the DHCP server must be restarted so that the
configuration is updated on the OmniSwitch. The dhcp-server restart command automatically updates
the dhcpd(v6).conf and dhcpd(v6).[Link] files.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-11
DHCP Server Application Example Configuring an Internal DHCP Server
3 The [Link] file defines the 200.0.0.X network and 220.0.0.X network.
4 The subnet mask and DNS server address are global declarations since they are the same for each
subnet.
5 The default router address and lease times are declared as a part of the scope since they are different for
each subnet.
6 The resulting sample code for the [Link] file is as follows:
#Global parameters
option subnet-mask [Link];
option domain-name-servers [Link];
subnet [Link] netmask [Link]
{
dynamic-dhcp range [Link] [Link]
{
option routers [Link];
option dhcp-lease-time 20000;
}
}
page 23-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server DHCP Server Application Example
OmniSwitch
[Link]
with
DHCP Relay
IP ROUTER AND
10 DHCP SERVER
11 13
12
IN OUT
...
[Link]-20 [Link]
DHCP Clients DNS Server
[Link]
DHCP Clients
Illustration of Internal DHCP Server Application Example
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-13
Verifying the DHCP Server Configuration Configuring an Internal DHCP Server
show dhcp-server leases Displays the leases offered by the DHCP server.
show dhcp-server statistics Displays the statistics of the DHCP server.
For more information about the resulting displays from these commands, see the OmniSwitch AOS Release
8 CLI Reference Guide.
page 23-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Configuration File Parameters and Syntax
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-15
Configuration File Parameters and Syntax Configuring an Internal DHCP Server
page 23-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Configuration File Parameters and Syntax
29 perform-mask- option perform- boolean False True indicates that the client should
discovery mask-discovery perform subnet mask discovery.
false;
False indicates that no mask
discovery must be performed.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-17
Configuration File Parameters and Syntax Configuring an Internal DHCP Server
33 static-routes option static- ip_address_ N/A Specifies the list of static routes that
routes pair_list the client should install in its routing
[Link]
[Link];
cache. If multiple routes to the same
destination are specified, they are
listed in descending order of priority.
The routes consist of a list of IP
address pairs. The first address is the
router for the destination. The default
route ([Link]) is an illegal
destination for a static route.
34 "trailer- option trailer- boolean False Select True to identify whether the
encapsulation encapsulation client should negotiate the use of
false;
trailers (RFC 893) when using the
Address Resolution Protocol (ARP).
Select False to prevent the use of
trailers.
35 arp-cache- option arp- numeric N/A Specifies the time-out in seconds for
timeout cache-timeout ARP cache entries, from 0 to
10;
2,147,483,647.
36 ieee802-3- option ieee boolean False Use this option to identify the use of
encapsulation 802-3- Ethernet Version 2 (RFC 894) or
encapsulation
false;
IEEE 802.3 (RFC 1042)
encapsulation for Ethernet interface.
Select True to use RFC 1042
encapsulation.
Select False to use RFC 894
encapsulation.
37 default-tcp-ttl option default- numeric N/A Defines the default time-to-live (in
tcp-ttl 1; seconds) to use when sending TCP
segments. Enter a value from 1 to
255.
page 23-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Configuration File Parameters and Syntax
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-19
Configuration File Parameters and Syntax Configuring an Internal DHCP Server
page 23-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Configuration File Parameters and Syntax
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-21
Configuration File Parameters and Syntax Configuring an Internal DHCP Server
page 23-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Configuration File Parameters and Syntax
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-23
Configuration File Parameters and Syntax Configuring an Internal DHCP Server
page 23-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Configuration File Parameters and Syntax
option 177
[010378797a0203
78797a030378797
a040378797a0503
78797a060378797
a07010008010009
0378797a];
123 TSP Primary ip_address N/A Specifies the IP address of the TSP’s
DHCP Server primary DHCP server from which an
Address MTA is permitted to accept a DHCP
OFFER.
124 TSP Secondary ip_address N/A Specifies the IP address of the TSP’s
DHCP Server secondary DHCP server from which
Address an MTA is permitted to accept a
DHCP OFFER.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-25
Configuration File Parameters and Syntax Configuring an Internal DHCP Server
page 23-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Configuration File Parameters and Syntax
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-27
Configuration File Parameters and Syntax Configuring an Internal DHCP Server
page 23-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Configuration File Parameters and Syntax
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-29
Configuration File Parameters and Syntax Configuring an Internal DHCP Server
page 23-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Policy File Parameters and Syntax
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-31
Policy File Parameters and Syntax Configuring an Internal DHCP Server
Default
Num Policy Usage Description
Value
7 Lease Lease 60000 Specifies the time interval in milli seconds after
Expiration Expiration msecs which the lease expiration processing occurs.
SleepTime =
SleepTime 120000
Note: This value must not be less than 1 minute.
8 MaxPending MaxPending 10 Specifies the number of seconds that an offered lease
Seconds Seconds = 20 remains in a pending state.
page 23-32 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring an Internal DHCP Server Policy File Parameters and Syntax
Default
Num Policy Usage Description
Value
18 PingBefore PingBefore True If this value is set to True, the DHCP server performs
ManualDhcp ManualDhcp a ping before assigning a static DHCP address. If an
= False
ICMP_REPLY is received from the ping, then the
DHCP offer is not sent to the client and the address is
marked as unavailable.
19 PingBefore PingBefore False If this value is set to True, the DHCP server performs
ManualBootp ManualBootp a ping before assigning a static BootP address. If an
= True
ICMP_REPLY is received, the BootP reply is not
sent to the client, and the BootP address is marked as
unavailable.
20 Registered Registered False This poilcy is used when the MAC pool addresses are
ClientsOnly Clients defined at either the global or the subnet level.
Only = True
If this value is set to True, the DHCP information is
provided to the clients that have a known MAC
address (configured in a MAC pool). If MAC pool
addresses are not defined at either the global or the
subnet level, the none of the devices are provided a
DHCP lease.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 23-33
Policy File Parameters and Syntax Configuring an Internal DHCP Server
Default
Num Policy Usage Description
Value
24 Deny DenyConnectio None This policy does not allow connections from listed IP
ConnectionList nList=IP addresses and networks. An example of listed IP
addresses
addresses would be:
DenyConnectionList=[Link],[Link]/8.
In this example, connections from the loopback
address and the Class A 10 network are not allowed.
If this policy is set to All, connections from all IP
addresses and networks are not allowed.
If AllowConnectionList and DenyConnectionList are
set at the same time, AllowConnectionList takes
precedence over the DenyConnectionList.
25 AllowConnectio AllowConnecti All This policy allows connections from all listed IP
nList onList=IP addresses and networks. An example of listed IP
addresses
addresses would be:
AllowConnectionList=[Link],[Link]/8.
In this example, connections from the loopback
address and the Class A 10 network are allowed.
If this policy is set to All, connections from all IP
addresses and networks are allowed.
If AllowConnectionList and DenyConnectionList are
set at the same time.
AllowConnectionList takes precedence over the
DenyConnectionList.
26 ListenPort Any valid port Ephemeral This policy specifies which port the service listens for
number messages. Ephemeral indicates that the service will
use a port that is dynamically allocated by the
operating system. It will register this port with the
local message service. To accept messages from
previous releases of VitalQIP, set this policy to the
service name qip_ctl, or the port number 1096. Ports
are usually less than 32,000.
27 ACKPeriod Numeric 0 This policy specifies how often an ACK will be
expected when leases are transmitted to the GUI. By
default, only the last packet is ACKed.
page 23-34 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
24 Configuring VRRP
The Virtual Router Redundancy Protocol (VRRPv2/VRRPv3) is a standard router redundancy protocol
supported in IPv4/IPv6, based on RFC 3768 and RFC 2787. It provides redundancy by eliminating the
single point of failure inherent in a default route environment. The VRRPv2/VRRPv3 router, which
controls the IPv4/IPv6 address associated with a virtual router is called the master router, and is
responsible for forwarding virtual router advertisements. If the master router becomes unavailable, the
highest priority backup router will transition to the master state. The Alcatel-Lucent implementation of
VRRP also supports the collective management of virtual routers on a switch.
Notes.
• This VRRPv3 implementation is based on the latest Internet Draft, Virtual Router Redundancy Proto-
col for IPv6, September 2004.
• RFC 3768, which obsoletes RFC 2338, does not include support for authentication types. As a result,
configuring VRRP authentication is no longer supported in this release.
In This Chapter
This chapter describes VRRPv2/VRRPv3 and how to configure it through the Command Line Interface
(CLI). CLI commands are used in the configuration examples; for more details about the syntax of
commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
This chapter provides an overview of VRRP and includes information about the following:
• “Creating/Deleting a Virtual Router” on page 24-10.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-1
In This Chapter Configuring VRRP
page 24-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP VRRP Specifications
VRRP Specifications
Platforms Supported OmniSwitch 6860, 6860E
RFCs Supported RFC 3768–Virtual Router Redundancy Protocol
RFC 2787–Definitions of Managed Objects for the Virtual
Router Redundancy Protocol
Compatible with HSRP No
Maximum number of VRRPv2 and VRRPv3 255
virtual routers
Maximum number of IP addresses per 16
instance
VRRP Defaults
The following table lists the defaults for VRRP configuration through the vrrp command and the relevant
command keywords:
The following table lists the defaults for VRRP configuration using the VRRP collective management
features and the relevant command:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-3
VRRP Defaults Configuring VRRP
page 24-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP Quick Steps for Creating a Virtual Router
-> vrrp 6 4
The VLAN must already be created on the switch. For information about creating VLANs, see
Chapter 4, “Configuring VLANs.”
2 Configure an IP address for the virtual router.
Note. IP can be used as an optional parameter instead of Address in the above example.
3 Repeat steps 1 through 2 on all of the physical switches that will participate in backing up the
address(es) associated with the virtual router.
4 Enable VRRP on each switch.
Note. Optional. To verify the VRRP configuration, enter the show vrrp [Link] display is similar to
the one shown here:
VRRP trap generation: Enabled
VRRP startup delay: 45 (expired)
IP Admin Adv
VRID VLAN Address(es) Status Priority Preempt Interval
----+-----+----------------+----------+----------+--------+---------
6 4 [Link] Enabled 100 yes 1
Note. For more information about this display, see the OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-5
VRRP Overview Configuring VRRP
VRRP Overview
VRRP allows the routers on a LAN to backup a default route. VRRP dynamically assigns responsibility
for a virtual router to a physical router (VRRP router) on the LAN. The virtual router is associated with an
IP address (or set of IP addresses) on the LAN. A virtual router master is elected to forward packets for the
virtual router’s IP address. If the master router becomes unavailable, the highest priority backup router will
transition to the master state.
Note. The IP address that is backed up may be the IP address of a physical router, or it may be a virtual IP
address.
The example provided here is intended for understanding VRRP and does not show a configuration that
would be used in an actual network.
VRRP Routers
OmniSwitch A OmniSwitch B
VRID 1
Master 1 Backup 1 Virtual Router
IP A
IP A IP B
default gateway to IP A
client station
In this example, each physical router is configured with a virtual router, VRID 1 which is associated with
IP address A. OmniSwitch A is the master router because it contains the physical interface to which IP
address A is assigned. OmniSwitch B is the backup router. The client is configured with a gateway address
of IP A.
When VRRP is configured on these switches, and both the switches are available, OmniSwitch A will
respond to ARP requests for IP address A using the virtual router’s MAC address ([Link])
instead of the physical MAC address assigned to the interface. OmniSwitch A will accept packets sent to
the virtual MAC address and forward them as appropriate; it will also accept packets addressed to IP
address A (such as ping requests).
Note. A ping request to the VRRP IP will not be replied to if the request is from the local CMM which is
also acting as the VRRP Master. Only ping requests that originate from external routers will be replied to.
OmniSwitch B will respond to ARP requests for IP address B using the interface’s physical MAC address.
It will not respond to ARP requests for IP address A or to the virtual router MAC address.
page 24-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP VRRP Overview
If OmniSwitch A becomes unavailable, OmniSwitch B becomes the master router. OmniSwitch B will
then respond to ARP requests for IP address A using the virtual router’s MAC address
([Link]). It will also forward packets for IP address B and respond to ARP requests for IP
address B using the OmniSwitch’s physical MAC address.
OmniSwitch B uses IP address B to access the LAN. However, IP address B is not backed up. Therefore,
when OmniSwitch B becomes unavailable, IP address B also becomes unavailable.
Each VRRP router may backup one or more virtual routers. The VRRP router containing the physical
interfaces to which the virtual router IP addresses are assigned is called the IP address owner. If it is
available, the IP address owner will function as the master router. The master router assumes the
responsibility of forwarding packets sent to the IP addresses associated with the virtual router and
answering ARP requests for these addresses.
To minimize network traffic, only the master router sends VRRP advertisements on the LAN. The IP
address assigned to the physical interface on the current master router is used as the source address in
VRRP advertisements. The advertisements communicate the priority and state of the master router
associated with the VRID to all VRRP routers. The advertisements are IP multicast datagrams sent to the
VRRP multicast address [Link] (as determined by the Internet Assigned Numbers Authority).
If a master router becomes unavailable, it stops sending VRRP advertisements on the LAN. The backup
routers know that the master is unavailable based on the following algorithm:
Master Down Interval = (3 * Advertisement Interval) + Skew Time
where Advertisement Interval is the time interval between VRRP advertisements, and Skew Time is
calculated based on the VRRP router’s priority value as follows:
Skew Time = (256 - Priority) / 256
If the backup routers are configured with priority values that are close in value, there may be a timing
conflict, and the first backup to take over may not be the one with the highest priority; and a backup with a
higher priority will then preempt the new master. The virtual router may be configured to prohibit any
preemption attempts, except by the IP address owner. An IP address owner, if it is available, will always
become master of any virtual router associated with its IP addresses.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-7
VRRP Overview Configuring VRRP
Note. Duplicate IP address/MAC address messages may display when a backup takes over for a master,
depending on the timing of the takeover and the configured advertisement interval. This is particularly true
if more than one backup is configured.
Note. By default, in AOS Release 8.1.1, packets that originate from a switch with an address assigned to a
VRRPv3 virtual router will use the physical MAC as their source, not the VRRP virtual MAC. The ipv6
virtual-source-mac command can be used to modify this behavior resulting in the VRRP virtual MAC
being used as the source. This command has no effect on VRRP advertisements, which will always be sent
using the VRRP virtual MAC as the source.
Note. In AOS Release 8.1.1, packets that originate from a switch with an address assigned to a VRRPv3
virtual router will always use the VRRP virtual MAC.
ARP Requests
Each virtual router has a single well-known MAC address, which is used as the MAC address in ARP
instead of a VRRP router's physical MAC address. When an end host sends an ARP request to the master
router’s IP address, the master router responds to the ARP request using the virtual router MAC address. If
a backup router takes over for the master, and an end host sends an ARP request, the backup will reply to
the request using the virtual router MAC address.
Gratuitous ARP requests for the virtual router IP address or MAC address are broadcast when the
OmniSwitch becomes the master router. For VRRP interfaces, gratuitous ARP requests are delayed at
system boot until both the IP address and the virtual router MAC address are configured.
If an interface IP address is shared by a virtual router, the routing mechanism does not send a gratuitous
ARP for the IP address (since the virtual router will send a gratuitous ARP). This prevents traffic from
being forwarded to the router before the routing tables are stabilized.
ICMP Redirects
ICMP redirects are not sent out over VRRP interfaces.
page 24-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP Interaction With Other Features
VRRP Tracking
A virtual router priority can be conditionally modified to prevent another router from taking over as
master. Tracking policies are used to conditionally modify the priority setting whenever a port, IP address
and or IP interface associated with a virtual router goes down.
A tracking policy consists of a tracking ID, the value used to decrease the priority value, and the port
number, IP address, or IP interface name to be monitored by the policy. The policy is then associated with
one or more virtual routers.
Note. VRRP3 does not support the collective management functionality in this release.
• Router Discovery Protocol (RDP)—If RDP is enabled on the switch, and VRRP is enabled, RDP will
advertise VLAN IP addresses of virtual routers depending on whether there are virtual routers active on
the LAN, and whether those routers are backups or masters. When there are no virtual routers active on
the VLAN (either acting as master or backup), RDP will advertise all VLAN IP addresses. However, if
virtual routers are active, RDP will advertise IP addresses for any master routers; RDP will not
advertise IP addresses for backup routers.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-9
VRRP Configuration Overview Configuring VRRP
If QoS filtering rules (Access Control Lists) are configured for Layer 3 traffic on a VRRP router, all of
the VRRP routers on the LAN must be configured with the same filtering rules; otherwise the security
of the network is compromised. For more information about filtering, see Chapter 27, “Configuring
QoS.”
• Conflicting VRRP Parameters Across Switches
All virtual routers with the same VRID on the LAN must be configured with the same advertisement
interval and IP addresses. If the virtual routers are configured differently, it may result in more than one
virtual router acting as the master router. This in turn would result in duplicate IP and MAC address
messages as well as multiple routers forwarding duplicate packets to the virtual router MAC address.
Use the show vrrp statistics command to check for conflicting parameters. For information about
configuring VRRP parameters, see the remaining sections of this chapter.
page 24-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP VRRP Configuration Overview
• Preempt mode (vrrp preempt): To change from the default preempt mode and to turn it off, use no
preempt. Use preempt to turn it back on. For more information about the preempt mode, see “Setting
Preemption for Virtual Routers” on page 24-13.
• Advertising interval (vrrp interval): Measured in seconds. Use the interval keyword with the desired
number of seconds for the delay in sending VRRP advertisement packets. You can change the default
interval value and set a desired value. See “Configuring the Advertisement Interval” on page 24-12.
The following example creates a virtual router (with VRID 7) on VLAN 2 with a priority of 75. The
preempt mode of the router is enabled and VRRP advertisements will be sent at intervals of 2 seconds:
-> vrrp 7 2 priority 75 preempt interval 2
Note. All virtual routers with the same VRID on the same LAN must be configured with the same
advertising interval; otherwise the network may produce duplicate IP or MAC address messages.
The vrrp command may also be used to specify whether the virtual router is enabled or disabled.
However, the virtual router must have an IP address assigned to it before it can be enabled. Use the vrrp
address command as described in the next section to specify an IP address or addresses.
To delete a virtual router, use the no form of the vrrp command with the relevant VRID and VLAN ID.
For example:
-> no vrrp 7 3
Virtual router 7 on VLAN 3 is deleted from the configuration. (The virtual router does not have to be
disabled before you delete it.)
For more information about the vrrp command syntax, see the OmniSwitch AOS Release 8 CLI Reference
Guide.
In this example, the vrrp address command specifies that virtual router 6 on VLAN 4 will be used to
backup IP address [Link]. The virtual router is then enabled with the vrrp command.
Note that if a virtual router is to be the IP address owner, then all addresses on the virtual router must
match an address on the switch interface.
To remove an IP address from a virtual router, use the no form of the vrrp address command. For
example:
-> vrrp 6 4 admin-state disable
-> vrrp 6 4 no address [Link]
In this example, virtual router 6 is disabled. (A virtual router must be disabled before IP addresses may be
added/removed from the router.) IP address [Link] is then removed from the virtual router with the no
form of the vrrp address command.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-11
VRRP Configuration Overview Configuring VRRP
In this example, virtual router 6 is disabled. (If you are modifying an existing virtual router, the virtual
router must be disabled before it may be modified.) The vrrp command is then used to set the advertising
interval for virtual router 6 to 5 seconds. Optionally, you can also preface the advertising keyword before
interval.
In this example, virtual router 6 is disabled. (If you are modifying an existing virtual router, it must be
disabled before it is modified.) The virtual router priority is then set to 50. Setting the value to 50 provides
the router with a lower priority in the VRRP network.
page 24-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP VRRP Configuration Overview
Note. In certain cases, this may not be a desirable behavior, as when the original master comes back and
immediately causes all the traffic to switch back to it.
If all virtual routers have the preempt mode enabled, the virtual router with the highest priority will
become the master. If the master router goes down, the highest priority backup router will become the
master. If the previous master or any other virtual router comes up with the preempt mode enabled and has
a higher priority value, this router will become the new master.
To prevent a router with a higher priority value from automatically taking control from a master router
with a lower priority value, disable the preempt mode for the higher priority router. This is done by using
the no preempt keywords with the vrrp command (vrrp preempt). For example:
-> vrrp 6 4 admin-state disable
-> vrrp 6 4 no preempt
Note. The virtual router that owns the IP address(es) associated with the physical router always becomes
the master router if it is available, regardless of the preempt mode setting and the priority values of the
backup routers.
In the above example, the first command administratively disables virtual router 6. (If you are modifying
an existing virtual router, it must be disabled before it is modified.). The second command disables the
preempt mode for the same router. Henceforth, router 6 will not preempt another virtual router with a
lower priority. For more information see “Configuring Virtual Router Priority” on page 24-12.
In this example, a virtual router is created on VLAN 3 with a VRID of 7. An IP address is then assigned to
the virtual router. The virtual router is then enabled on the switch.
To disable a virtual router, use the disable keyword.
-> vrrp 7 3 admin-state disable
A virtual router must be disabled before it may be modified. Use the vrrp command to disable the virtual
router first; then use the command again to modify the parameters. For example:
-> vrrp 7 3 admin-state disable
-> vrrp 7 3 priority 200
-> vrrp 7 3 admin-state enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-13
VRRP Configuration Overview Configuring VRRP
In this example, virtual router 7 on VLAN 3 is disabled. The virtual router is then modified to change its
priority setting. (For information about configuring the priority setting, see “Configuring Virtual Router
Priority” on page 24-12.) The virtual router is then re-enabled and will be active on the switch.
The switch now waits 75 seconds after its reboot before it becomes available to take over as master for
another router.
page 24-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP VRRP Configuration Overview
You can change the default priority value of all the virtual routers on a switch using the vrrp priority
command. For example:
-> vrrp priority 50
You can change the default preempt mode of all the virtual routers on a switch using the vrrp preempt
command. For example:
-> vrrp no preempt
These commands will set the new default values only for the virtual routers that are newly created.
However, you can apply the new default value to the existing virtual routers. To apply the new default
value to the existing virtual routers; you must first disable the virtual routers, then apply the new default
value using the vrrp set command and enable the virtual routers again.
For example, to change the default priority value to 50 on all the existing virtual routers on a switch, enter
the following:
-> vrrp priority 50
-> vrrp admin-state disable
-> vrrp set priority
-> vrrp admin-state enable
The first command configures the default priority value as 50 for all the virtual routers on the switch. The
next command disables all the virtual routers on the switch. The vrrp set command in this sequence
applies the new default priority value to the existing virtual routers. This value will be applied only to the
virtual routers that already have the default value and not the values configured either individually or
through group. This is because the configured values take priority over the default values.
For the modified default values to effect the virtual routers which are configured with a value either
individually or through group, you can use the vrrp set command along with the override option. For
example:
-> vrrp set priority override
Note. You can specify a parameter such as interval, priority, preempt or all in the vrrp set command to set
and/or override the existing value with the new default values. The all option resets and/or overrides the
existing advertising interval value, priority value and preempt mode with the modified default values.
The next command enables all the virtual routers on the switch except the virtual routers that are disabled
individually or through group. To enable all the virtual routers on the switch including those which are
disabled individually or through group, you can use the vrrp command along with the enable-all option
as follows:
-> vrrp admin-state enable-all
Note. This collective virtual routers management functionality will not affect the ability to change the
administrative status and parameter values of an individual virtual router.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-15
VRRP Configuration Overview Configuring VRRP
This command creates a virtual router group 25. Use the no form of the same command to delete a virtual
router group. For example:
-> no vrrp group 25
Note. When a virtual router group is deleted, the virtual routers assigned to the group become unassigned.
However, this does not have any impact on the virtual routers.
After creating a virtual router group, you have to add virtual routers to the group using the vrrp group-
association command, as follows:
-> vrrp 10 1 group-association 25
The above command adds the virtual router 10 on VLAN 1 to the virtual router group 25. A virtual router
need not be disabled in order to be added to a virtual router group. However, the virtual router will not
adopt the group’s default parameter values until those values are applied by re-enabling the virtual router.
To remove a virtual router from a virtual router group, use the no form of the same command as follows:
-> vrrp 10 1 no group-association 25
Note that a virtual router need not to be disabled to be removed from a group.
You can change the default values of the parameters like advertising interval, priority and preempt of all
the virtual routers in a virtual router group using the vrrp group command, as follows:
-> vrrp group 25 advertising interval 50 priority 50 no preempt
The above command configures the default value for advertising interval as 50 seconds, priority as 150
and preempting mode as no preempt. These parameters can be modified at any time but will not have any
effect on the virtual routers in the group until you disable, then apply the group default value using the
vrrp group set command and enable the virtual router group again.
For the modified default values to be applied to the virtual routers in a group, you must disable the virtual
router group, then apply the group default value using the vrrp group set command and enable the virtual
router group again. For example:
-> vrrp group 25 interval 50
-> vrrp group 25 admin-state disable
-> vrrp group 25 set interval
-> vrrp group 25 admin-state enable
The first command configures the default interval value as 50 for all the virtual routers in the virtual router
group 25. The next command disables all the virtual routers in the group. The vrrp group set command in
this sequence applies the new default interval value to all the virtual routers in the group. This value will
be applied only to the virtual routers in the group that already have the default value and not the values
configured individually. This is because the configured values take priority over the default values.
page 24-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP VRRP Configuration Overview
For the modified default values to affect the virtual routers in the group, including the virtual routers that
are configured with a value individually, you can use the vrrp group set command along with the
override option. For example:
-> vrrp group set interval override
Note. You can specify a parameter such as interval, priority, preempt or all in the vrrp group set command
to set and/or override the existing value with the new default values. The all option resets and/or overrides
the existing advertising interval value, priority value and preempt mode with the modified default values.
The next command enables all the virtual routers in the group except the virtual routers that are disabled
individually. To enable all the virtual routers in the group including those which are disabled individually,
you can use the vrrp group command with the enable-all option as follows:
-> vrrp group 25 admin-state enable-all
Note. Even though a virtual router may be assigned to a group, its parameter values and administrative
status can still be modified individually.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-17
Verifying the VRRP Configuration Configuring VRRP
show vrrp Displays the virtual router configuration for all virtual routers or for a
particular virtual router.
show vrrp statistics Displays statistics about VRRP packets for all virtual routers configured
on the switch or for a particular virtual router.
show vrrp track Displays information about tracking policies on the switch.
show vrrp track-association Displays the tracking policies associated with virtual routers.
show vrrp group Displays the default parameter values for all the virtual router groups or
for a specific virtual router group.
show vrrp group-association Displays the virtual routers that are associated with a group.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
page 24-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP VRRPv3 Configuration Overview
If QoS filtering rules (Access Control Lists) are configured for Layer 3 traffic on a VRRP router, all of
the VRRP routers on the LAN must be configured with the same filtering rules; otherwise the security
of the network will be compromised. For more information about filtering, see Chapter 27, “Configur-
ing QoS.”
• Conflicting VRRPv3 Parameters Across Switches
All virtual routers with the same VRID on the LAN must be configured with the same advertisement
interval and IP addresses. If the virtual routers are configured differently, it may result in more than
one virtual router acting as the master router. This in turn would result in duplicate IP and MAC
address messages as well as multiple routers forwarding duplicate packets to the virtual router MAC
address. Use the show vrrp statistics command to check for conflicting parameters. For information
about configuring VRRPv3 parameters, see the remaining sections of this chapter.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-19
VRRPv3 Configuration Overview Configuring VRRP
• Preempt mode (vrrp preempt): To change from the default preempt mode and to turn it off, use no
preempt. Use preempt to turn it back [Link] more information about the preempt mode, see “Setting
Preemption for VRRPv3 Virtual Routers” on page 24-22.
• Accept mode: The accept mode allows the master router to accept packets addressed to the IPv6
address owner as its own. Use the no accept mode to prevent the master router from accepting packets
addressed to the IPv6 address owner.
• Advertising interval (vrrp interval): Measured in seconds. Use the interval keyword with the desired
number of centiseconds for the delay in sending VRRPv3 advertisement packets. You can change the
default interval value and set a desired value. See “Configuring the VRRPv3 Advertisement Interval”
on page 24-21.
Notes.
• The maximum number of virtual routers supported is based on the 100 centisecond interval. A smaller
interval will result in a relatively lesser number of virtual routers.
• The centisecond interval cannot be less than 10 centiseconds.
The following example creates a VRRPv3 virtual router (with VRID 7) on VLAN 2 with a priority of 75,
and no preempt. VRRPv3 advertisements will be sent at intervals of 200 centiseconds:
-> vrrp3 7 2 priority 75 no preempt interval 200
Note. All VRRPv3 virtual routers with the same VRID on the same LAN must be configured with the same
advertisement interval; otherwise the network may produce duplicate IPv6 or MAC address messages.
The vrrp3 command may also be used to specify whether the VRRPv3 virtual router is enabled or
disabled. For more information about the vrrp3 command syntax, see the OmniSwitch AOS Release 8 CLI
Reference Guide.
To delete a VRRPv3 virtual router, use the no form of the vrrp3 command with the relevant VRID and
VLAN ID. For example:
-> no vrrp3 7 3
VRRPv3 virtual router 7 on VLAN 3 is deleted from the configuration. (The virtual router does not have
to be disabled before you delete it.)
In the above example, the vrrp3 address command specifies that VRRPv3 virtual router 6 on VLAN 4
will be used to backup IPv6 address fe80::200:5eff:fe00:20a. The virtual router is then enabled with
the vrrp3 command.
page 24-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP VRRPv3 Configuration Overview
If a virtual router is to be the IP address owner, then all addresses on the virtual router must match an
address on the switch interface. This includes the virtual router's link local address. In other words, a
virtual router can not be the IP address owner if its link local address does not match the interface link
local address.
To remove an IPv6 address from a virtual router, use the no form of the vrrp3 address command. For
example:
-> vrrp3 6 4 admin-state disable
-> vrrp3 6 4 no address fe80::200:5eff:fe00:20a
In this example, VRRPv3 virtual router 6 is disabled. (A VRRPv3 virtual router must be disabled before
IPv6 addresses may be added/removed from the router.) IP address fe80::200:5eff:fe00:20a is then
removed from the virtual router with the no form of the vrrp3 address command.
In this example, VRRPv3 virtual router 6 is disabled. (If you are modifying an existing virtual router, the
virtual router must be disabled before it may be modified.) The vrrp3 command is then used to set the
advertising interval for virtual router 6 to 500 centiseconds.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-21
VRRPv3 Configuration Overview Configuring VRRP
Also, if a router is the IPv6 address owner and the priority value is not set to 255, the switch will set its
priority to 255 when the router is enabled.
To set the priority, use the vrrp3 command with the priority keyword and the desired value. For example:
-> vrrp3 6 4 admin-state disable
-> vrrp3 6 4 priority 50
In this example, VRRPv3 virtual router 6 is disabled. (If you are modifying an existing virtual router, the
virtual router must be disabled before it may be modified.) The virtual router priority is then set to 50. The
priority value is relative to the priority value configured for other virtual routers backing up the same IPv6
address. Changing the default priority value and setting it to 50 would typically provide a router with
lower priority in the VRRPv3 network.
Note. The VRRPv3 virtual router that owns the IPv6 address(es) associated with the physical router always
becomes the master router if is available, regardless of the preempt mode setting and the priority values of
the backup routers.
To disable preemption for a VRRPv3 virtual router, use the vrrp3 command with the no preempt
keywords. For example:
-> vrrp3 6 4 admin-state disable
-> vrrp3 6 4 no preempt
In this example, virtual router 6 is disabled. (If you are modifying an existing virtual router, the virtual
router must be disabled before it may be modified.) The virtual router is then configured to disable
preemption. If this virtual router takes over for an unavailable router, a router with a higher priority will
not be able to preempt it. For more information about priority, see “Configuring the VRRPv3 Virtual
Router Priority” on page 24-21.
page 24-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP VRRPv3 Configuration Overview
In this example, a VRRPv3 virtual router is created on VLAN 3 with a VRID of 7. An IPv6 address is
then assigned to the virtual router. The virtual router is then enabled on the switch.
To disable a VRRPv3 virtual router, use the disable keyword.
-> vrrp 7 3 admin-state disable
A VRRPv3 virtual router must be disabled before it may be modified. Use the vrrp3 command to disable
the virtual router first; then use the command again to modify the parameters. For example:
-> vrrp3 7 3 admin-state disable
-> vrrp3 7 3 priority 200
-> vrrp3 7 3 admin-state enable
In this example, VRRPv3 virtual router 7 on VLAN 3 is disabled. The VRRPv3 virtual router is then
modified to change its priority setting. (For information about configuring the priority setting, see
“Configuring the VRRPv3 Virtual Router Priority” on page 24-21.) The virtual router is then re-enabled
and will be active on the switch.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-23
Verifying the VRRPv3 Configuration Configuring VRRP
show vrrp3 Displays the VRRPv3 virtual router configuration for all virtual routers
or for a particular virtual router.
show vrrp3 statistics Displays statistics about VRRPv3 packets for all VRRPv3 virtual
routers configured on the switch or for a particular virtual router.
show vrrp3 track-association Displays the tracking policies associated with VRRPv3 virtual routers.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
page 24-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP Creating Tracking Policies
In this example, a tracking policy ID (3) is created and enabled for IP address [Link]. If this address
becomes unreachable, a virtual router associated with this track ID will have its priority decremented by
50. Note that the enable keyword administratively activates the tracking policy, but the policy does not
take effect until it is associated with one or more virtual routers (see the next section).
Similarly, to create a tracking policy ID (3) for IPv6 address [Link], use the following command:
-> vrrp track 3 admin-state enable priority 50 address [Link]
If this address becomes unreachable, a virtual router associated with this track ID will have its priority
decremented by 50.
Note the following:
• A virtual router must be administratively disabled before a tracking policy for the virtual router can be
added.
• VRRP tracking does not override IP address ownership (the IP address owner will always have priority
to become master, if it is available).
When the virtual router is re-enabled, tracking policy 3 will be used for that virtual router.
A tracking policy must not be associated with a virtual router on the same port or interface. For example:
-> ip interface vlan-4 address [Link] vlan 4
-> vrrp track 2 ipv4-interface vlan-4
-> vrrp 5 4 track-association 2
This configuration is allowed but will not really have an effect. If the associated interface goes down, this
virtual router goes down as well and the tracking policy is not applied.
Note. A master and a backup virtual router must not be tracking the same IP address; otherwise, when the
IP address becomes unreachable, both virtual routers will have their priorities decremented, and the backup
may temporarily take over if the master discovers that the IP address is unreachable before the backup.
Typically you must not configure the same IP address tracking policies on physical VRRP routers that
backup each other; otherwise, the priority will be decremented for both master and backup when the entity
being tracked goes down.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-25
VRRP Application Example Configuring VRRP
VRID 1
Master 1 Backup 1
[Link]
Virtual Routers
VRID 2
Backup 2 Master 2
[Link]
[Link] [Link]
VLAN 5
Note. The same VRRP configuration must be set up on each switch. The VRRP router that contains, or
owns, the IP address will automatically become the master for that virtual router. If the IP address is a
virtual address, the virtual router with the highest priority will become the master router.
page 24-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP VRRP Application Example
In this scenario, the master of VRID 1 will respond to ARP requests for IP address A using the virtual
router MAC address for VRID 1 ([Link]). OmniSwitch 1 is the master for VRID 1 since it
contains the physical interface to which [Link] is assigned. If OmniSwitch A must become
unavailable, OmniSwitch B will become master for VRID 1.
In the same way, the master of VRID 2 will respond to ARP requests for IP address B using the virtual
router MAC address for VRID 2 ([Link]). OmniSwitch B is the master for VRID 2 since it
contains the physical interface to which [Link] is assigned. If OmniSwitch B must become
unavailable, OmniSwitch A will become master for [Link]. This configuration provides
uninterrupted service for the end hosts.
VRID 1
Master 1 Backup 1
[Link]
Virtual Routers
VRID 2
Backup 2 Master 2
[Link]
[Link] [Link]
VLAN 5
In this example, the master for virtual router 1 has a priority of 100 and the backup for virtual router 1 has
a priority of 75. The virtual router configuration for VRID 1 and 2 on VRRP router A is as follows:
-> vrrp 1 5 priority 100 preempt
-> vrrp 2 5 priority 75
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-27
VRRP Application Example Configuring VRRP
The virtual router configuration for VRID 1 and 2 on VRRP router B is as follows:
-> vrrp 1 5 priority 75
-> vrrp 2 5 priority 100 preempt
To ensure workstation clients 1 and 2 have connectivity to the internet, configure a tracking policy on
VRRP router A to monitor port 1/1/1 and associate the policy with VRID 1.
-> vrrp track 1 admin-state enable priority 50 port 1/1/1
-> vrrp 1 5 track-association 1
If port 1/1/1 on VRRP router A goes down, the master for virtual router A is still functioning but
workstation clients 1 and 2 will not be able to get to the Internet. With this tracking policy enabled,
however, master router 1’s priority will be temporarily decremented to 50, allowing backup router 1 to
take over and provide connectivity for those workstations. When port 1/1/1 on VRRP router A comes
backup, master 1 will take over again.
Note. Preempt must be set on switch A virtual router 1, and switch B virtual router 2, in order for the
correct master to assume control once their respective ports 1/1/1 return to viability. In our example, once
port 1/1/1 on switch A is functioning again we want switch A to reestablish itself as the master. See
“Setting Preemption for Virtual Routers” on page 24-13 for more information about enabling preemption.
page 24-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP VRRPv3 Application Example
VRID 1
Master 1 Backup 1
[Link]
Virtual Routers
VRID 2
Backup 2 Master 2
[Link]
[Link] [Link]
VLAN 5
Note. The same VRRPv3 configuration must be set up on each switch. The VRRPv3 router that contains, or
owns, the IPv6 address will automatically become the master for that virtual router. If the IPv6 address is a
virtual address, the virtual router with the highest priority will become the master router.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-29
VRRPv3 Application Example Configuring VRRP
In this scenario, the master of VRID 1 will respond to neighbor solicitation with a neighbor advertisement
for IPv6 address A using the virtual router MAC address for VRID 1 ([Link]). OmniSwitch 1
is the master for VRID 1 since it contains the physical interface to which [Link]s assigned. If
OmniSwitch A must become unavailable, OmniSwitch B will become master for VRID 1.
In the same way, the master of VRID 2 will respond to neighbor solicitation for IPv6 address B using the
virtual router MAC address for VRID 2 ([Link]). OmniSwitch B is the master for VRID 2
since it contains the physical interface to which [Link] is assigned. If OmniSwitch B must
become unavailable, OmniSwitch A will become master for [Link]. This configuration provides
uninterrupted service for the end hosts.
VRID 1
Master 1 Backup 1
[Link]
Virtual Routers
VRID 2
Backup 2 Master 2
[Link]
[Link] [Link]
VLAN 5
In this example, the master for virtual router 1 has a priority of 100 and the backup for virtual router 1 has
a priority of 75. The virtual router configuration for VRID 1 and 2 on VRRPv3 router A is as follows:
-> vrrp3 1 5 priority 100 preempt
-> vrrp3 2 5 priority 75
page 24-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VRRP VRRPv3 Application Example
The virtual router configuration for VRID 1 and 2 on VRRPv3 router B is as follows:
-> vrrp3 1 5 priority 75
-> vrrp3 2 5 priority 100 preempt
To ensure workstation clients 1 and 2 have connectivity to the internet, configure a tracking policy on
VRRPv3 router A to monitor port 1/1/1 and associate the policy with VRID 1.
-> vrrp3 track 1 admin-state enable priority 50 port 1/1/1
-> vrrp3 1 5 track-association 1
If port 1/1/1 on VRR3 router A goes down, the master for virtual router A is still functioning, but
workstation clients 1 and 2 will not be able to get to the Internet. With this tracking policy enabled,
however, master router 1’s priority will be temporarily decremented to 50, allowing backup router 1 to
take over and provide connectivity for those workstations. When port 1/1/1 on VRRPv3 router A comes
backup, master 1 will take over again.
Note. Preempt must be set on switch A virtual router 1, and switch B virtual router 2, in order for the
correct master to assume control once their respective ports 1/1/1 return to viability. In our example, once
port 1/1/1 on switch A is functioning again we want switch A to reestablish itself as the master. See “Setting
Preemption for Virtual Routers” on page 24-13 for more information about enabling preemption.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 24-31
VRRPv3 Application Example Configuring VRRP
page 24-32 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
25 Configuring Server Load
Balancing
Alcatel-Lucent’s Server Load Balancing (SLB) software provides a method to logically manage a group of
physical servers sharing the same content (known as a server farm) as one large virtual server (known as
an SLB cluster). SLB clusters are identified and accessed using either a Virtual IP (VIP) address or a QoS
policy condition. Traffic is always routed to VIP clusters and either bridged or routed to policy condition
clusters. The OmniSwitch operates at wire speed to process client requests and then forward them to the
physical servers within the cluster.
Using SLB clusters can provide cost savings (costly hardware upgrades can be delayed or avoided),
scalability (as the demands on your server farm grow you can add additional physical servers), reliability
(if one physical server goes down the remaining servers can handle the remaining workload), and
flexibility (you can tailor workload requirements individually to servers within a cluster).
In This Chapter
This chapter describes the basic components of Server Load Balancing and how to configure them through
the Command Line Interface (CLI). CLI commands are used in the configuration examples; for more
details about the syntax of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Procedures to configure SLB on a switch on page 25-11.
• Procedures for troubleshooting and maintenance on page 25-17 and page 25-22.
Note. You can also configure and monitor Server Load Balancing with WebView, Alcatel-Lucent’s embed-
ded web-based device management application. WebView is an interactive and easy-to-use GUI that can be
launched from OmniVista or a web browser. Please refer to WebView online documentation for more
information on configuring and monitoring Server Load Balancing with WebView.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 25-1
Server Load Balancing Specifications Configuring Server Load Balancing
page 25-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Server Load Balancing Server Load Balancing Default Values
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 25-3
Quick Steps for Configuring Server Load Balancing Configuring Server Load Balancing
2 Configure the SLB VIP cluster using the ip slb cluster command with the vip parameter. For example:
3 Assign physical servers to the SLB cluster and specify a relative weight for each server (default value
for weight is 1) with the ip slb server ip cluster command. For example:
-> ip slb server ip [Link] cluster WorldWideWeb
-> ip slb server ip [Link] cluster WorldWideWeb weight 4
-> ip slb server ip [Link] cluster WorldWideWeb weight 6
-> ip slb server ip [Link] cluster WorldWideWeb admin-state disable
weight 8
As an option, you can verify your SLB settings by entering show ip slb cluster followed by the name of
the SLB cluster. For example:
-> show ip slb cluster WorldWideWeb
Cluster WorldWideWeb
VIP : [Link],
Type : L3,
Admin status : Enabled,
Operational status : In Service,
Ping period (seconds) : 60,
Ping timeout (milliseconds) : 3000,
Ping retries : 3,
Probe : None,
Number of packets : 3800,
Number of servers : 4
Server [Link]
Admin status = Enabled, Operational Status = In Service,
Weight = 4, Availability (%) = 100
Server [Link]
Admin status = Enabled, Operational Status = In Service,
Weight = 6, Availability (%) = 98
Server [Link]
Admin status = Enabled, Operational Status = Discovery,
Weight = 1, Availability (%) = 0
Server [Link]
Admin status = Disabled, Operational Status = Disabled,
Weight = 8, Availability (%) = 0
An example of what these configuration commands look like entered sequentially on the command line:
-> ip slb admin-state enable
-> ip slb cluster WorldWideWeb vip [Link]
-> ip slb server ip [Link] cluster WorldWideWeb
page 25-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Server Load Balancing Quick Steps for Configuring Server Load Balancing
1 Create the QoS policy condition that classifies traffic for the SLB cluster. For example:
2 Configure the SLB cluster using the ip slb cluster command with the condition parameter. For
example:
-> ip slb cluster Intranet condition c1
3 Assign physical servers to the SLB condition cluster and specify a relative weight for each server
(default value for weight is 1) with the ip slb server ip cluster command. For example:
-> ip slb server ip [Link] cluster Intranet
-> ip slb server ip [Link] cluster Intranet weight 4
-> ip slb server ip [Link] cluster Intranet admin-state disable weight 2
Note. As an option, you can configure an SLB server as a backup server. See “Configuring a Server in an
SLB Cluster as a Backup Server” on page 25-16 for more information.
As an option, you can verify your SLB settings by entering show ip slb cluster followed by the name of
the SLB cluster. For example:
-> show ip slb cluster Intranet
Cluster Intranet
VIP : [Link],
Type : L3
Admin status : Enabled,
Operational status : In Service,
Ping period (seconds) = 60,
Ping timeout (milliseconds) = 3000,
Ping retries = 3,
Probe = None,
Number of packets = 10000,
Number of servers = 2
Server [Link]
Admin status = Enabled, Operational status = In Service,
Weight = 1, Availability (%) = 100
Server [Link]
Admin status = Enabled, Operational status = In Service,
Weight = 4, Availability (%) = 99
Server [Link]
Admin status = Disabled, Operational status = Disabled,
Weight = 2, Availability (%) = 0
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 25-5
Quick Steps for Configuring Server Load Balancing Configuring Server Load Balancing
As an option, you can also display traffic statistics for an SLB condition cluster by entering show ip slb
cluster followed by the cluster name and the statistics parameter. For example, the following command
displays the packet count for traffic that is classified for the “Intranet” cluster:
-> show ip slb cluster Intranet statistics
Admin Operational
Cluster Name Status Status Count
-----------------------+--------+--------------------+--------
Intranet Enabled In Service 2 Servers
Src IP [Link]/[Link] 2500
IP Dst TCP Port 80
Src IP [Link]/[Link] 2500
IP Dst TCP Port 80
Src IP [Link]/[Link] 2500
IP Dst TCP Port 80
Src IP [Link]/[Link] 2500
IP Dst TCP Port 80
An example of what the configuration commands look like entered sequentially on the command line:
-> policy network group SOURCE [Link] [Link] [Link] [Link]
-> policy condition c1 source network group SOURCE destination tcp-port 80
-> qos apply
-> ip slb cluster Intranet condition cl
-> ip slb server ip [Link] cluster Intranet
-> ip slb server ip [Link] cluster Intranet weight 4
-> ip slb server ip [Link] cluster Intranet admin-state disable weight 2
You can verify your SLB settings by entering show ip slb cluster server followed by the name of the SLB
cluster. For example:
-> show ip slb cluster Intranet server [Link]
Cluster Intranet
VIP [Link]
Server [Link]
Admin status : Disabled,
Oper status : In Service,
Probe = None,
Admin weight = 2,
Availability time (%) = 98,
Ping failures = 0,
Last ping round trip time (milliseconds) = 1,
Probe status = OK,
Note. Once a cluster is created, the Virtual IP or condition cannot be modified. To modify these values,
delete the cluster and re-create the cluster with the different VIP and conditions.
page 25-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Server Load Balancing Server Load Balancing Overview
Note. Alcatel-Lucent also offers link aggregation, which combines multiple Ethernet links into one virtual
channel. Please refer to Chapter 10, “Configuring Dynamic Link Aggregation,”for more information on
link aggregation and dynamic link aggregation, and to Chapter 9, “Configuring Static Link Aggregation,”
for information on static (OmniChannel) link aggregation.
Note. See “Configuring and Deleting SLB Clusters” on page 25-12 for more information on configuring
VIP and condition clusters.
When the Layer-2 mode is active (condition clusters only), request packets are not modified and are only
switched within the same VLAN domain. The Layer-2 or Layer-3 mode is selected when the condition
cluster is configured on the switch. See “Configuring an SLB Cluster with a QoS Policy Condition” on
page 25-12 for more information.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 25-7
Server Load Balancing Overview Configuring Server Load Balancing
OmniSwitch 7800
Switch
Intranet
or
Internet
Client A Client B
page 25-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Server Load Balancing Server Load Balancing Overview
OmniSwitch 7800
Switch
Note. See “Modifying the Relative Weight of a Physical Server” on page 25-16 for information on
modifying the relative weights of servers in an SLB cluster.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 25-9
Server Load Balancing Overview Configuring Server Load Balancing
Note. You can use the show ip slb cluster server command, which is described in “Displaying Server
Load Balancing Status and Statistics” on page 25-22, to display link and ping status of physical servers.
These health checks performed by the switch are used by the SLB software to determine the operational
states of servers. The possible operational states are described in the table below:
Operational States
Disabled The server has been administratively disabled by the user.
No Answer The server has not responded to ping requests from the switch.
Link Down There is a bad connection to the server.
Discovery The switch is pinging a physical server.
In Service The server can be used for client connections.
Retrying The switch is making another attempt to bring up the server.
In Release 5.1.6 and later you can configure probes to monitor the health of clusters and servers. See
“Configuring SLB Probes” on page 25-18 for more information.
page 25-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Server Load Balancing Configuring Server Load Balancing on a Switch
Note. See “Quick Steps for Configuring Server Load Balancing” on page 25-4 for a brief tutorial on config-
uring these mandatory parameters.
When configuring SLB parameters for an SLB cluster, you must perform the following steps:
1 Enable Server Load Balancing on Your Switch. To enable Server Load Balancing (SLB) on a
switch, use the ip slb admin-state command, which is described in “Enabling and Disabling Server Load
Balancing” on page 25-11.
2 Configure the Logical Server Load Balancing Cluster. To configure a logical SLB cluster, use the
ip slb cluster command, which is described in “Configuring and Deleting SLB Clusters” on page 25-12.
3 Assign Physical Servers to the Logical Server Load Balancing Cluster. To add physical servers to a
logical SLB cluster, use the ip slb server ip cluster command, which is described in “Assigning Servers
to and Removing Servers from a Cluster” on page 25-14.
Note. Routing (which is enabled by default) must be enabled on a switch or Server Load Balancing will not
operate.
Alcatel-Lucent’s SLB software is preconfigured with the default values shown in the table in “Server
Load Balancing Default Values” on page 25-3. Depending on the requirements of your network and server
farm, you may need to configure more parameters than the mandatory ones described in this section. See
“Modifying Optional Parameters” on page 25-15 for information on configuring additional SLB
parameters.
Note. You must enable or disable Server Load Balancing on an entire switch. You cannot enable SLB on a
per port or per slot basis.
Enabling SLB
To enable SLB switch wide, use the ip slb admin-state command by entering:
-> ip slb admin-state enable
Disabling SLB
To disable SLB switch wide, use the ip slb admin-state command by entering:
-> ip slb admin-state disable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 25-11
Configuring Server Load Balancing on a Switch Configuring Server Load Balancing
• To use spaces in an SLB cluster name, enclose the entire name within quotation marks (for example,
“web server”).
• The VIP address of the SLB cluster must be an address in the same subnet as the servers.
• VIP only supports the Layer-3 SLB mode, which is enabled by default.
To configure an SLB cluster that uses VIP classification to bridge or route client requests to the cluster
servers, use the ip slb cluster command with the vip parameter. For example, to configure an SLB cluster
called “Web_Server” with a VIP address of [Link], you would enter:
-> ip slb cluster Web_Server vip [Link]
• To use spaces in an SLB cluster name, enclose the entire name within quotation marks (for example,
“web server2”).
• The QoS policy condition name specified must the switch configuration.
To configure an SLB cluster that uses a QoS policy condition to qualify client requests for bridging or
routing to the cluster servers, use the ip slb cluster command with the condition parameter and either the
l2 or l3 parameter. For example, to configure an SLB cluster called “Web_Server2” with the “cond1”
policy condition and using the L2 mode, you would enter:
-> ip slb cluster Web_Server2 condition cond1 l2
The condition created in the above example, “cond1”, uses the source port value to classify traffic. When
this same condition is associated with an SLB cluster, client requests received on the specified source port
are then sent to a server that is a member of the associated cluster.
page 25-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Server Load Balancing Configuring Server Load Balancing on a Switch
The following QoS policy conditions are supported individually and in combination with each other when
used to configure SLB condition clusters:
See Chapter 27, “Configuring QoS,” for more information about configuring and displaying QoS policy
conditions.
You can also use the show policy condition command to display policy conditions and the show policy
action command to display policy actions. See Chapter 27, “Configuring QoS,” for more information on
configuring and displaying QoS policies.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 25-13
Configuring Server Load Balancing on a Switch Configuring Server Load Balancing
Note. When you delete an SLB cluster you also delete the QoS policy, condition, and rule associated with
the cluster.
Note. You can also use the ip slb server ip cluster command to administratively disable or enable a server
(see “Taking a Server On/Off Line” on page 25-17).
For example, to assign three physical servers with IP addresses of [Link], [Link], and
[Link], respectively, to an SLB cluster called “Web_Server”, enter the following CLI commands:
-> ip slb server ip [Link] cluster Web_Server
-> ip slb server ip [Link] cluster Web_Server
-> ip slb server ip [Link] cluster Web_Server
page 25-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Server Load Balancing Modifying Optional Parameters
Note. If you set the ping period to any value other than 0, then the ping period must be greater than or equal
to the ping timeout value divided by 1000. For example, if the ping timeout is 5000 milliseconds, the ping
period must be at least 5 seconds. The ping timeout value can be modified with the ip slb cluster ping tim-
eout command, which is described in “Modifying the Ping Timeout” on page 25-15.
Note. You can modify the ping period with the ip slb cluster ping period command, which is described in
“Modifying the Ping Period” on page 25-15.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 25-15
Modifying Optional Parameters Configuring Server Load Balancing
Server weights are relative. For example, if Servers A and B have respective weights of 5 and 10 within a
cluster, Server A would get half the traffic of server B. Since weights are relative, assigning Servers A and
B respective weights of 1 and 2, or 5 and 10, etc., would produce identical results.
Note. The ip slb server ip cluster command is also used to add or remove servers from an SLB cluster (see
“Assigning Servers to and Removing Servers from a Cluster” on page 25-14) and for administratively
enabling and disabling a server in an SLB cluster (see “Taking a Server On/Off Line” on page 25-17).
Assigning a weight of 0 (zero) to a server prevents this server from being assigned any new
[Link] server becomes a backup server.
page 25-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Server Load Balancing Taking Clusters and Servers On/Off Line
Note. The ip slb server ip cluster command is also used to add or remove physical servers from an SLB
cluster (see “Assigning Servers to and Removing Servers from a Cluster” on page 25-14).
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 25-17
Configuring SLB Probes Configuring Server Load Balancing
page 25-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Server Load Balancing Configuring SLB Probes
Note. See “Creating SLB Probes” on page 25-18 for a list of valid probe types.
For example, to set the timeout for an HTTP SLB probe called “server_probe1” to 12000 seconds, enter:
-> ip slb probe server_probe1 http timeout 12000
Note. See “Creating SLB Probes” on page 25-18 for a list of valid probe types.
For example, to set the period for an HTTP SLB probe called “server_probe1” to 120 seconds, enter:
-> ip slb probe server_probe1 http period 120
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 25-19
Configuring SLB Probes Configuring Server Load Balancing
Note. See “Creating SLB Probes” on page 25-18 for a list of valid probe types.
For example, to set the TCP/UDP port for an HTTP SLB probe called “server_probe1” to 200 enter:
-> ip slb probe server_probe1 http port 200
Note. See “Creating SLB Probes” on page 25-18 for a list of valid probe types.
For example, to set the number of retries for an HTTP SLB probe called “server_probe1” to 10, enter:
-> ip slb probe server_probe1 http retries 10
page 25-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Server Load Balancing Configuring SLB Probes
Note. The URL must be the relative web page name to be retrieved.
For example, to set the URL for an HTTP SLB probe called “server_probe1” to “pub/[Link]”, enter:
-> ip slb probe server_probe1 http url pub/[Link]
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 25-21
Displaying Server Load Balancing Status and Statistics Configuring Server Load Balancing
The show ip slb, show ip slb servers, and show ip slb clusters commands provide a “global” view of
switch-wide SLB parameters. These commands are particularly helpful in fine-tuning configurations. For
example, if you wanted to get a quick look at the status of all SLB clusters you would use the show ip slb
clusters command as shown below:
-> show ip slb clusters
Admin Operational # %
Cluster Name VIP/COND Status Status Srv Avail
----------------+----------------+--------+-------------------+-----+---------
WorldWideWeb [Link] Enabled In Service 3 95
Intranet [Link] Enabled In Service 2 100
FileTransfer [Link] Enabled Out of Service 2 50
In the example above, two SLB clusters (“WorldWideWeb” and “Intranet”) are administratively enabled
and are “in service” (at least one physical server is operational in the cluster). The third SLB cluster
(“FileTransfer”) is administratively enabled but is “out of service” (no physical servers are operational in
the cluster).
The show ip slb cluster command provides detailed configuration information and statistics for individual
SLB clusters. To use the show ip slb cluster command, enter the command followed by the name of the
SLB cluster, as shown below:
-> show ip slb cluster WorldWideWeb
A statistics parameter is available with both the show ip slb clusters and show ip slb cluster commands
to provide a packet count of traffic that was qualified and sent to a QoS policy condition cluster. To use
this parameter, enter either of these commands with their required parameters and optionally specify the
statistics parameter, as shown below:
-> show ip slb clusters statistics
-> show ip slb cluster Intranet statistics
Note. See page 25-4 and page 25-6 for samples of the show ip slb cluster command output.
page 25-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Server Load Balancing Displaying Server Load Balancing Status and Statistics
The show ip slb cluster server command provides detailed configuration information and statistics for
individual SLB servers. To use the show ip slb cluster server command, enter the command, the name of
the SLB cluster that the server belongs to, server, and the IP address of the server. For example, to display
statistics and parameters for a server with an IP address of [Link] that belongs to an SLB cluster
called “Web_Server” you would enter:
-> show ip slb cluster Web_Server server [Link]
In the example above, the server with an IP address of [Link] is shown to be administratively
enabled and “in service” (this means that, this server is being used for SLB cluster client connections) with
the administrative weight assigned as 3.
The show ip slb probes command provides both a global view of SLB probes and a detailed configuration
information and statistics for individual probes. For example, to view the status of all probes enter show ip
slb probes as shown below:
-> show ip slb probes
In the example above there are three probes configured on the switch.
To view detailed information on a single probe enter show ip slb probes followed by the probe name as
shown in the example below:
-> show ip slb probes phttp
Probe phttp
Type = HTTP,
Period (seconds) = 60,
Timeout (milliseconds) = 3000,
Retries = 3,
Port = 0,
Username = ,
Password = ,
Expect = ,
Status = 200,
URL = /,
Note. See the “Server Load Balancing Commands” chapter in the OmniSwitch AOS Release 8 CLI Refer-
ence Guide for complete syntax information on SLB show commands.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 25-23
Displaying Server Load Balancing Status and Statistics Configuring Server Load Balancing
page 25-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
26 Configuring IP Multicast
Switching
In This Chapter
This chapter describes the basic components of IPMS and how to configure them through the Command
Line Interface (CLI). CLI commands are used in the configuration examples; for more details about the
syntax of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Enabling and disabling IP Multicast Switching and Routing on page 26-9.
• Enabling and disabling IPv6 Multicast Switching and Routing on page 26-25.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-1
IPMS Specifications Configuring IP Multicast Switching
Note. You can also configure and monitor IPMS with WebView, Alcatel-Lucent’s embedded Web-based
device management application. WebView is an interactive and easy-to-use GUI that can be launched from
OmniVista or a Web browser. Please refer to WebView’s online documentation for more information on
configuring and monitoring IPMS/IPMSv6 with WebView.
IPMS Specifications
The table below lists specifications for Alcatel-Lucent’s IPMS software.
page 26-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching IPMSv6 Specifications
IPMSv6 Specifications
The table below lists specifications for Alcatel-Lucent’s IPMSv6 software.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-3
IPMS Default Values Configuring IP Multicast Switching
page 26-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching IPMSv6 Default Values
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-5
IPMS Overview Configuring IP Multicast Switching
IPMS Overview
A multicast group is defined by a multicast group address, which is a Class D IP address in the range
[Link] to [Link]. (Addresses in the range [Link] to [Link] are reserved for
boundaries.) The multicast group address is indicated in the destination address field of the IP header. (See
“Reserved IP Multicast Addresses” on page 26-7 for more information.)
IPMS tracks the source VLAN on which the Internet Group Management Protocol (IGMP) requests are
received. The network interfaces verify that a multicast packet is received by the switch on the source (or
expected) port.
IPMS Example
The figure on the following page shows an IPMS network where video content can be provided to clients
that request it. A server is attached to the switch that provides the source (i.e, multicast) IP addresses.
Clients from two different attached networks send IGMP reports to the switch to receive the video content.
OmniSwitch
Video
Source Port
Multicast Group
(dynamically built)
Multicast Stream
(destination IP address)
Multicast Server
Ports on end stations send (source IP address)
IGMP requests to receive
multicast traffic.
Network A
Network B
page 26-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching IPMS Overview
IP Multicast Routing
IP multicast routing can be used for IP Multicast Switching and Routing (IPMSR). IP multicast routing is
a way of controlling multicast traffic across networks. The IP multicast router discovers which networks
want to receive multicast traffic by sending out Internet Group Management Protocol (IGMP) queries and
receiving IGMP reports from attached networks. The IGMP reports signal that users want to join a
multicast group.
If there is more than one IP multicast router in the network, the router with the lowest IP address is elected
as the querier router, which is responsible for querying the subnetwork for group members.
The IP multicast routing package provides the following two separate protocols:
• Protocol Independent Multicast — Sparse Mode (PIM-SM) and Dense Mode (PIM-DM), which is
described in “PIM” on page 26-8.
• Distance Vector Multicast Routing Protocol (DVMRP), which is described in “DVMRP” on
page 26-8.
The multicast routing protocols build and maintain a multicast routing database. The multicast routing
protocols forward multicast traffic to networks that have requested group membership to a specific
multicast group. IPMS uses decisions made by the routing protocols and forwards multicast traffic to ports
that request group membership. See the OmniSwitch AOS Release 8 Advanced Routing Configuration
Guide for more information on IP multicast routing protocols.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-7
IPMS Overview Configuring IP Multicast Switching
PIM
Protocol-Independent Multicast (PIM) is an IP multicast routing protocol that uses routing information
provided by unicast routing protocols, such as RIP and OSPF. Sparse Mode PIM (PIM-SM) contrasts with
flood-and-prune dense mode multicast protocols, such as DVMRP and PIM Dense Mode (PIM-DM), in
that multicast forwarding in PIM-SM is initiated only through specific requests. Downstream routers must
explicitly join PIM-SM distribution trees in order to receive multicast streams on behalf of directly-
connected receivers or other downstream PIM-SM routers. This paradigm of receiver-initiated forwarding
makes PIM-SM ideal for network environments where receiver groups are thinly populated and bandwidth
conservation is a concern, such as in Wide Area Networks (WANs). PIM-DM packets are transmitted on
the same socket as PIM-SM packets as both use the same protocol and message format. Unlike PIM-SM,
in PIM-DM there are no periodic joins transmitted; only explicitly triggered prunes and grafts. In PIM-
DM, unlike PIM-SM, there is no Rendezvous Point (RP).
DVMRP
Distance Vector Multicast Routing Protocol (DVMRP) is a distributed multicast routing protocol that
dynamically generates per-source delivery trees based upon routing exchanges. When a multicast source
begins to transmit, the multicast data is flooded down the delivery tree to all points in the network.
DVMRP then prunes (i.e., removes branches from) the delivery tree where the traffic is unwanted. This is
in contrast to PIM-SM, which uses receiver-initiated (i.e., forward path) multicasting.
IGMP Version 3
IGMP is used by IPv4 systems (hosts and routers) to report their IP multicast group memberships to any
neighboring multicast routers. IGMP Version 2 (IGMPv2) handles forwarding by IP multicast destination
address only. IGMP Version 3 (IGMPv3) handles forwarding by source IP address and IP multicast
destination address. All three versions (IGMPv1, IGMPv2, and IGMPv3) are supported.
Note. See “Configuring the IGMP Version” on page 26-11 for information on configuring the IGMP
version.
In IGMPv2, each membership report contains only one multicast group. In IGMPv3, membership reports
contain many multicast groups up to the Maximum Transmission Unit (MTU) size of the interface.
IGMPv3 uses source filtering and reports multicast memberships to neighboring routers by sending
membership reports. IGMPv3 also supports Source Specific Multicast (SSM) by allowing hosts to report
interest in receiving packets only from specific source addresses or from all but specific source addresses.
page 26-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Configuring IPMS on a Switch
Note. See the “IP Multicast Switching Commands” chapter in the OmniSwitch AOS Release 8 CLI
Reference Guide for complete documentation of IPMS CLI commands.
Note. SeeIf IP Multicast switching and routing is enabled on the system, the VLAN configuration overrides
the configuration of the system.
You can also enable IP Multicast switching and routing on the specified VLAN by entering:
-> ip multicast vlan 2 admin-state enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-9
Configuring IPMS on a Switch Configuring IP Multicast Switching
You can also enable the IGMP querier-forwarding on the specified VLAN by entering:
-> ip multicast vlan 2 querier-forwarding enable
page 26-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Configuring IPMS on a Switch
You can also change the IGMP protocol version on the specified VLAN by entering:
-> ip multicast vlan 5 version 1
You can also configure a link aggregation group as an IGMP static neighbor port by entering ip multicast
static-neighbor followed by the VLAN and link aggregation group number.
For example, to configure link aggregation group 7 with designated VLAN 2 as a static neighbor you
would enter:
-> ip multicast static-neighbor vlan 2 linkagg 7
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-11
Configuring IPMS on a Switch Configuring IP Multicast Switching
You can also configure a link aggregation group as an IGMP static querier port by entering ip multicast
static-querier followed by the VLAN and link aggregate. For example:.
-> ip multicast static-querier vlan 2 linkagg 7
You can also configure a link aggregation group as an IPMS static group by entering ip multicast static-
group, followed by the VLAN and link aggregate. For example:
-> ip multicast static-group [Link] vlan 2 linkagg 7
page 26-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Configuring IPMS on a Switch
All the initial multicast packets sent by the multicast source are buffered. The following are the
limitations:
• In a given instance, the IPMS system can buffer only a configurable number of multicast packets per
flow that are trapped to the IPMS software for learning the multicast flow. If the number of packets
buffered for a given flow reaches the maximum configured limit, then the IPMS system will not buffer
any new multicast packets for that flow. The maximum number of initial multicast packets allowed to
be buffered per multicast flow is configured using ip multicast initial-packet-buffer max-packet and
ipv6 multicast initial-packet-buffer max-packet for IPv4 and IPv6, respectively.
For example:
-> ip multicast initial-packet-buffer max-packet 4
• In a given instance, the IPMS system can buffer initial multicast packets only for a configurable
number of flows globally on the switch. If the number of flows that are being buffered reaches the
maximum configured limit, then the IPMS will not buffer initial multicast packets for any new flows in
the system. The maximum number of IPv4 and IPv6 multicast flows allowed for initial packet buffer-
ing is configured using ip multicast initial-packet-buffer max-flow and ipv6 multicast initial-
packet-buffer max-flow, respectively.
For example:
-> ip multicast initial-packet-buffer max-flow 32
• The buffered initial multicast packets for a flow will not be retained in the IPMS system forever. If the
buffered packets are not sent to the destination (multicast clients) within a specified time, then the buff-
ered packets will be dropped in the IPMS system. The timeout value for the initial buffered IPv4 and
IPv6 multicast packets is configured using ip multicast initial-packet-buffer timeout and ipv6 multi-
cast initial-packet-buffer timeout, respectively.
For example:
-> ip multicast initial-packet-buffer timeout 2
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-13
Configuring IPMS on a Switch Configuring IP Multicast Switching
• There may be loss of a few initial multicast packets while programming the IPMS index and sending
buffered packets;
> When the multicast routing protocol has greater than 255 interfaces - In a given instance, if there are
more that 255 interfaces, the IPMS system will initially send the buffered multicast packets to the
clients connected to a maximum of 255 interfaces. Then the remaining route information will be
processed. However, the IPMS system begins communicating with the NI without waiting for
complete route information. This may cause a loss of buffered packets to the remaining interfaces.
> When ingress and egress are on the same VLAN - In any instance, if local clients are present in the
ingress VLAN, the IPMS system will immediately generate an IPMC index for the switching port
and will send the buffered packets. However, there is a delay in receiving the response from the
routed clients. This may cause a loss of buffered packets for the routed clients.
These limitations are overcome by delaying the IPMC index generation in IPMS system. This delay is
configured using ip multicast initial-packet-buffer min-delay and ipv6 multicast initial-packet-
buffer min-delay for IPv4 and IPv6 multicast packets, respectively.
-> ip multicast initial-packet-buffer min-delay 200
• Flood-unknown and buffer packet features are mutually exclusive. Flood-unknown must be disabled
for the packet buffering feature to function. Use ip multicast flood-unknown and ipv6 multicast
flood-unknown commands to disable the flood-unknown feature for IPv4 and IPv6 multicast flow,
respectively.
For example:
-> ip multicast flood-unknown disable
• Use show configuration snapshot ipms, show ip multicast initial-packet-buffer and show ipv6
multicast initial-packet-buffer commands to view the status of the packet buffering functionality.
To disable buffering of IPv6 initial multicast packet in the IPMS NI, use the following command. For
example,
-> ipv6 multicast initial-packet-buffer admin-state disable
page 26-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Modifying IPMS Parameters
You can also modify the IGMP query interval on the specified VLAN by entering:
-> ip multicast vlan 2 query-interval 60
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-15
Modifying IPMS Parameters Configuring IP Multicast Switching
You can also modify the IGMP last member query interval on the specified VLAN by entering:
-> ip multicast vlan 3 last-member-query-interval 60
To restore the IGMP last member query interval to its default value.
You can also restore the IGMP last member query interval on the specified VLAN by entering:
-> ip multicast vlan 2 last-member-query-interval 0
To restore the IGMP last member query interval to its default value.
You can also modify the IGMP query response interval on the specified VLAN by entering:
-> ip multicast vlan 3 query-response-interval 6000
page 26-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Modifying IPMS Parameters
You can also modify the IGMP router timeout on the specified VLAN by entering:
-> ip multicast vlan 2 router-timeout 360
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-17
Modifying IPMS Parameters Configuring IP Multicast Switching
You can also restore the IGMP router timeout on the specified VLAN by entering:
-> ip multicast vlan 2 router-timeout 0
You can also modify the source timeout on the specified VLAN by entering:
-> ip multicast vlan 2 source-timeout 360
page 26-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Modifying IPMS Parameters
You can also enable the IGMP querying on the specified VLAN by entering:
-> ip multicast vlan 2 querying enable
Note. If the links are known to be lossy, then robustness variable can be set to a higher value (7).
You can also modify the IGMP robustness variable from 1 to 7 on the specified VLAN by entering:
-> ip multicast vlan 2 robustness 3
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-19
Modifying IPMS Parameters Configuring IP Multicast Switching
You can also enable IGMP spoofing on the specified VLAN by entering:
-> ip multicast vlan 2 spoofing enable
page 26-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Modifying IPMS Parameters
You can also enable IGMP zapping on the specified VLAN by entering:
-> ip multicast vlan 2 zapping enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-21
Modifying IPMS Parameters Configuring IP Multicast Switching
To set the IGMP group limit for a VLAN and replace an existing session use the ip multicast vlan max-
group command as shown below:
-> ip multicast vlan 10 max-group 25 action replace
To set the IGMP group limit for a port and drop any requests above the limit, use the ip multicast port
max-group command as shown below:
-> ip multicast port 1/1/1 max-group 25 action drop
page 26-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching IPMSv6 Overview
IPMSv6 Overview
An IPv6 multicast address identifies a group of nodes. A node can belong to any number of multicast
groups. IPv6 multicast addresses are classified as fixed scope multicast addresses and variable scope
multicast addresses.(See the “Reserved IPv6 Multicast Addresses” on page 26-24.)
IPMSv6 tracks the source VLAN on which the Multicast Listener Discovery Protocol (MLD) requests are
received. The network interfaces verify that a multicast packet is received by the switch on the source (or
expected) port.
IPMSv6 Example
The figure on the following page shows an IPMSv6 network where video content can be provided to
clients that request it. A server is attached to the switch that provides the source (i.e, multicast) IPv6
addresses. Clients from two different attached networks send MLD reports to the switch to receive the
video content.
OmniSwitch
Video
Source Port
Multicast Group
(dynamically built)
Multicast Stream
(destination IPv6 address)
Multicast Server
Ports on end stations send (source IPv6 address)
MLD requests to receive
multicast traffic.
Network A
Network B
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-23
IPMSv6 Overview Configuring IP Multicast Switching
Address Description
[Link] reserved
[Link] node-local scope address
[Link] link-local scope
[Link] unassigned
[Link] unassigned
[Link] site-local scope
[Link] unassigned
[Link] unassigned
[Link] organization-local scope
[Link] unassigned
[Link] unassigned
[Link] unassigned
[Link] unassigned
[Link] unassigned
[Link] global scope
[Link] reserved
MLD Version 2
MLD is used by IPv6 systems (hosts and routers) to report their IPv6 multicast group memberships to any
neighboring multicast routers. MLD Version 1 (MLDv1) handles forwarding by IPv6 multicast destination
addresses only. MLD Version 2 (MLDv2) handles forwarding by source IPv6 addresses and IPv6
multicast destination addresses. Both MLDv1 and MLDv2 are supported.
Note. See “Configuring the MLD Version 2” on page 26-26 for information on configuring the IGMP
version.
MLDv2 uses source filtering and reports multicast memberships to neighboring routers by sending
membership reports. MLDv2 also supports Source Specific Multicast (SSM) by allowing hosts to report
interest in receiving packets only from specific source addresses or from all but specific source addresses.
page 26-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Configuring IPMSv6 on a Switch
Note. See the “IP Multicast Switching Commands” chapter in the OmniSwitch AOS Release 8 CLI
Reference Guide for complete documentation of IPMSv6 CLI commands.
Note. If IPv6 Multicast switching and routing is enabled on the system, the VLAN configuration overrides
the configuration of the system.
You can also enable IPv6 Multicast switching and routing on the specified VLAN by entering:
-> ipv6 multicast vlan 2 admin-state enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-25
Configuring IPMSv6 on a Switch Configuring IP Multicast Switching
You can also enable the MLD querier-forwarding on the specified VLAN by entering:
-> ipv6 multicast vlan 2 querier-forwarding enable
page 26-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Configuring IPMSv6 on a Switch
You can also configure a link aggregation group as an MLD static neighbor port by entering ipv6
multicast static-neighbor, followed by the VLAN and link aggregate. For example:
-> ipv6 multicast static-neighbor vlan 2 linkagg 7
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-27
Configuring IPMSv6 on a Switch Configuring IP Multicast Switching
You can also configure a link aggregation group as an MLD static querier port by entering ipv6 multicast
static-querier, followed by the VLAN and link aggregate. For example:
-> ipv6 multicast static-querier vlan 2 linkagg 7
You can also configure a link aggregation group as an MLD static group by entering ipv6 multicast
static-group, followed by the IPv6 address, VLAN, and link aggregate. For example:
-> ipv6 multicast static-group ff05::6 vlan 2 linkagg 7
page 26-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Modifying IPMSv6 Parameters
You can also modify the MLD query interval on the specified VLAN by entering:
-> ipv6 multicast vlan 2 query-interval 160
You can also restore the MLD query interval on the specified VLAN by entering:
-> no ipv6 multicast vlan 2 query-interval
You can also modify the MLD last member query interval on the specified VLAN by entering:
-> ipv6 multicast vlan 3 last-member-query-interval 2200
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-29
Modifying IPMSv6 Parameters Configuring IP Multicast Switching
To restore the MLD last member query interval to its default value.
You can also restore the MLD last member query interval on the specified VLAN by entering:
-> ipv6 multicast vlan 2 last-member-query-interval 0
To restore the MLD last member query interval to its default value.
You can also modify the MLD query response interval on the specified VLAN by entering:
-> ipv6 multicast vlan 3 query-response-interval 20000
page 26-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Modifying IPMSv6 Parameters
You can also restore the MLD query response interval on the specified VLAN by entering:
-> ipv6 multicast van 2 query-response-interval 0
You can also modify the MLD router timeout on the specified VLAN by entering:
-> ipv6 multicast vlan 2 router-timeout 360
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-31
Modifying IPMSv6 Parameters Configuring IP Multicast Switching
You can also modify the source timeout on the specified VLAN by entering:
-> ipv6 multicast vlan 2 source-timeout 60
You can also enable the MLD querying on the specified VLAN by entering:
-> ipv6 multicast vlan 2 querying enable
page 26-32 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Modifying IPMSv6 Parameters
Note. If the links are known to be lossy, then robustness can be set to a higher value (7).
You can also modify the MLD robustness variable from 1 to 7 on the specified VLAN by entering:
-> ipv6 multicast vlan 2 robustness 3
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-33
Modifying IPMSv6 Parameters Configuring IP Multicast Switching
You can also enable MLD spoofing on the specified VLAN by entering:
-> ipv6 multicast vlan 2 spoofing enable
page 26-34 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Modifying IPMSv6 Parameters
You can also enable MLD zapping on the specified VLAN by entering:
-> ipv6 multicast vlan 2 zapping enable
You can also disable MLD zapping on the specified VLAN by entering:
-> ipv6 multicast vlan 2 zapping disable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-35
Modifying IPMSv6 Parameters Configuring IP Multicast Switching
To set the MLD group limit for a VLAN and replace any requests above the limit, use the ip multicast
vlan max-group command as shown below:
-> ipv6 multicast vlan 10 max-group 25 action replace
To set the MLD group limit for a port and drop any requests above the limit, use the ip multicast port
max-group command as shown below:
-> ipv6 multicast port 1/1/1 max-group 25 action drop
page 26-36 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching IPMS Application Example
Video OmniSwitch
Multicast Server
(source IP address)
Static Neighbor
Attached to 1/1/5.
Static Querier
Attached to 1/1/2.
Network Clients
Network clients send IGMP
requests to receive multicast
traffic.
The network administrator has determined that the network is too lossy and therefore the robustness
variable needs to be set to a higher (i.e., 7) value.
Follow the steps below to configure this network:
Note. All the steps following Step 1 (which must be executed first) can be entered in any order.
2 Configure the client attached to Port 5 as a static neighbor belonging to VLAN 5 by entering:
3 Configure the client attached to Port 2 as a static querier belonging to VLAN 5 by entering:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-37
IPMS Application Example Configuring IP Multicast Switching
An example of what these commands look like entered sequentially on the command line:
-> ip multicast admin-state enable
-> ip multicast static-neighbor vlan 5 port 1/1/5
-> ip multicast static-querier vlan 5 port 1/1/2
-> ip multicast robustness 7
As an option, you can use the ipv6 multicast initial-packet-buffer min-delay, show ip multicast
neighbor, and show ip multicast querier commands to confirm your settings as shown below:
-> show ip multicast
Status: = Enabled
Querying: = Disabled
Proxying: = Disabled
Spoofing: = Disabled
Zapping: = Disabled
Querier Forwarding: = Disabled
Version: = 1
Robustness: = 2
Query Interval (seconds): = 125
Query Response Interval (milliseconds): = 10000
Last Member Query Interval(milliseconds): = 1000
Unsolicited Report Interval (seconds) = 1,
Router Timeout (seconds): = 90
Source Timeout (seconds): = 30
Total 1 Neighbors
Host Address VLAN Port Static Count Life
---------------+-----+-----+-------+------+-----
[Link] 5 1/1/5 no 1 86
Total 1 Queriers
Host Address VLAN Port Static Count Life
---------------+-----+-----+-------+------+-----
[Link] 5 1/1/2 no 1 250
page 26-38 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching IPMSv6 Application Example
OmniSwitch
Video
Multicast Server
(source IPv6 address)
Static Neighbor
Attached to 1/1/5.
Static Querier
Attached to Slot 1/1/2.
Network Clients
Network clients send MLD
requests to receive multicast
traffic.
The network administrator has determined that the network is too lossy and therefore the robustness
variable needs to be set to a higher (i.e., 7) value.
Follow the steps below to configure this network:
Note. All the steps following Step 1 (which must be executed first) can be entered in any order.
2 Configure the client attached to Port 5 as a static MLD neighbor belonging to VLAN 5 by entering:
3 Configure the client attached to Port 2 as a static MLD querier belonging to VLAN 5 by entering:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-39
IPMSv6 Application Example Configuring IP Multicast Switching
An example of what these commands look like entered sequentially on the command line:
-> ipv6 multicast admin-state enable
-> ipv6 multicast static-neighbor vlan 5 port 1/1/5
-> ipv6 multicast static-querier vlan 5 port 1/1/2
-> ipv6 multicast robustness 7
As an option, you can use the show ipv6 multicast, show ipv6 multicast neighbor, and show ipv6
multicast querier commands to confirm your settings as shown below:
-> show ipv6 multicast
Status: = Enabled
Querying: = Disabled
Proxying: = Disabled
Spoofing: = Disabled
Zapping: = Disabled
Querier Forwarding: = Disabled
Version: = 1
Robustness: = 2
Query Interval (seconds): = 125
Query Response Interval (milliseconds): = 10000
Last Member Query Interval(milliseconds): = 1000
Unsolicited Report Interval (seconds) = 1,
Router Timeout (seconds): = 90
Source Timeout (seconds): = 30
Total 1 Neighbors
Host Address VLAN Port Static Count Life
-------------------------+-----+-----+-------+------+-----
fe80::2a0:ccff:fed3:2853 5 1/1/5 no 1 6
Total 1 Queriers
Host Address VLAN Port Static Count Life
-------------------------+-----+-----+-------+------+-----
fe80::2a0:ccff:fed3:2854 5 1/1/2 no 1 6
page 26-40 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring IP Multicast Switching Displaying IPMS Configurations and Statistics
ipv6 multicast initial-packet- Displays the general IP Multicast switching and routing configuration
buffer min-delay parameters on a switch.
show ip multicast group Displays all detected multicast groups that have members. If you do not
specify an IP address then all multicast groups on the switch is
displayed.
show ip multicast neighbor Displays all neighboring multicast routers.
show ip multicast querier Displays all multicast queriers.
show ip multicast port Displays the IPMS multicast forwarding table. If you do not specify a
multicast group IP address, then the forwarding table for all multicast
groups are displayed.
show ip multicast source Displays the IPMS multicast source table. If you do not specify a
multicast group IP address, then the source table for all multicast groups
are displayed.
show ip multicast tunnel Displays the IP multicast switch and routing tunneling table entries
matching the specified IP multicast group address, or all the entries if no
IP multicast address is specified.
If you are interested in a quick look at IPMS groups on your switch you could use the show ip multicast
group command. For example:
-> show ip multicast group
Total 3 Groups
Group Address Source Address VLAN Port Mode Static Count Life
---------------+---------------+-----+-----+--------+-------+------+-----
[Link] [Link] 1 1/1/1 exclude no 1 257
[Link] [Link] 1 1/1/1 exclude no 1 218
[Link] [Link] 1 1/1/13 exclude yes 0 0
Note. See the “IP Multicast Switching Commands” chapter in the OmniSwitch AOS Release 8 CLI
Reference Guide for complete documentation on IPMS show commands.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 26-41
Displaying IPMSv6 Configurations and Statistics Configuring IP Multicast Switching
show ipv6 multicast Displays the general IPv6 Multicast switching and routing configuration
parameters on a switch.
show ipv6 multicast group Displays all detected multicast groups that have members. If you do not
specify an IPv6 address, then all multicast groups on the switch are
displayed.
show ipv6 multicast neighbor Displays all neighboring IPv6 multicast routers.
show ipv6 multicast querier Displays all IPv6 multicast queriers.
show ipv6 multicast port Displays the IPMSv6 multicast forwarding table. If you do not specify a
multicast group IPv6 address, then the forwarding table for all multicast
groups are displayed.
show ipv6 multicast source Displays the IPMSv6 multicast source table. If you do not specify a
multicast group IPv6 address, then the source table for all multicast
groups are displayed.
show ipv6 multicast tunnel Display the IPv6 multicast switch and routing tunneling table entries
matching the specified IPv6 multicast group address, or all the entries if
no IPv6 multicast address is specified.
If you are interested in a quick look at IPMSv6 groups on your switch you could use the
show ipv6 multicast group command. For example:
-> show ipv6 multicast group
Total 3 Groups
Group Address Source Address VLAN Port Mode Static Count Life
----------------+---------------+-----+-----+--------+-------+------+-----
ff05::5 :: 1 1/1/1 exclude no 1 145
ff05::6 3333::1 1 1/1/1 exclude no 1 242
Note. See the “IPv6 Multicast Switching Commands” chapter in the OmniSwitch AOS Release 8 CLI
Reference Guide for complete documentation on IPMS show commands.
page 26-42 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
27 Configuring QoS
The OmniSwitch software and queue management architecture provide a way to identify traffic entering
the network and manipulate flows coming through the switch. The flow manipulation (generally referred
to as Quality of Service or QoS) can be as simple as configuring QoS policies to allow/deny traffic or as
complicated as remapping 802.1p bits from a Layer 2 network to ToS values in a Layer 3 network.
The types of policies typically used include, but are not limited to, the following:
• Basic QoS—includes traffic prioritization and bandwidth shaping.
• ICMP policies—includes filtering, prioritizing, and/or rate limiting ICMP traffic for security.
• Policy Based Mirroring—includes mirror-to-port (MTP) policies for mirroring ingress, egress, or both
ingress and egress traffic.
• Access Control Lists (ACLs)—ACLs are a specific type of QoS policy that is used for Layer 2 and
Layer 3/4 filtering. See “Using Access Control Lists” on page 27-55.
This implementation of QoS integrates traffic management with QoS scheduling. Embedded profiles apply
the QoS admission control and bandwidth management configurations to traffic flows.
In This Chapter
This chapter describes QoS in general and how policies, port-based QoS configuration, and queue
management are used on the switch. It provides information about configuring QoS through the Command
Line Interface (CLI). CLI commands are used in the configuration examples; for more details about the
syntax of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
The following topics and procedures are included in this chapter:
• “QoS General Overview” on page 27-3.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-1
QoS Specifications Configuring QoS
QoS Specifications
The QoS functionality described in this chapter is supported on the OmniSwitch 6860 switches, unless
otherwise stated in the following QoS Specifications table or specifically noted within any other section of
this chapter. Note that any maximum limits provided in the QoS Specifications table are subject to
available system resources.
Maximum number of QoS policy lists per switch 32 (excludes the default list)
Maximum number of QoS policy lists per Universal 1
Network Profile (UNP)
Port Default Trusted Mode Untrusted
page 27-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS QoS General Overview
OmniSwitch
email server
QoS sits in the ingress and egress software path. IP calls QoS to validate packets destined for the switch.
IP also calls QoS to validate and/or prioritize packets originating from the switch.
The general order of events with respect to the OmniSwitch implementation of QoS are as follows:
1 Classification—Packets are classified and marked according to policies and traffic behavior. This is
accomplished on the ingress using technologies, such as 802.1p, IP precedence and Diffserv Code Point
(DSCP). See “Classification” on page 27-4 for more information.
2 Congestion Management—Classified packets are prioritized and placed into queues based on Class of
Service (CoS) markings to ensure preferential treatment to high priority traffic. See “Congestion Manage-
ment” on page 27-9.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-3
Classification Configuring QoS
3 Traffic Policing and Shaping—Packet flows are policed or shaped to limit the rate of traffic received
or sent by the switch. See “Traffic Policing and Shaping” on page 27-13.
Classification
Classification is the process of identifying certain types of network traffic (flows) and then, if necessary,
marking a specific flow or group of flows with a priority (class of service) value. The class of service
(CoS) value assigned is then used by other QoS features to determine how the flow is treated throughout
the network.
The CoS value assigned to a specific flow is based on one of the following technologies:
• IP Precedence—Type of Service (ToS) or Differentiated Services (DiffServ).
ToS refers to using the three precedence bits of the ToS field in an IP packet to specify a priority value
ranging from 0 (lowest) to 7 (highest).
DiffServ uses the DiffServ Code Point (DSCP) value specified in the first 6 bits of the ToS field. The
DSCP determines the CoS by specifying a per-hop behavior (PHB) for a specific flow or group of
flows. The PHB indicates the forwarding behavior of a flow by specifying bandwidth, queueing
schemes, and criteria for dropping packets.
• Layer 2 802.1p Priority
The 802.1p priority value is specified in the Tag Control Info (TCI) field of an Ethernet frame. This
value also ranges from 0 (lowest) to 7 (highest) and maps to the ToS precedence values.
The OmniSwitch output queuing capability uses these CoS values to determine the forwarding treatment
by prioritizing flows based on application and network requirements. For more information about output
queue (congestion) management, see “Congestion Management” on page 27-9.
A policy (or a policy rule) is made up of a condition and an action. The condition specifies parameters
that the switch examines in incoming flows, such as destination address or Type of Service (ToS) bits.
The action specifies what the switch does with a flow that matches the condition; for example, it can
queue the flow with a higher priority, or reset the ToS bits. See “QoS Policy Overview” on page 27-21
for more information.
• Access Control Lists (ACLs)
ACLs are QoS policies used to control whether or not packets are allowed or denied at the switch or
router interface. ACLs are sometimes referred to as filtering lists and may also specify priority-setting
actions. See “Using Access Control Lists” on page 27-55 for more information.
• Port-based QoS
Individual ports are configured to either trust (recognize) or not trust (do not recognize) existing 802.1p
or ToS/DSCP values within a packet or to apply a user-defined default classification value. Port-based
QoS often works in conjunction with QoS policy rules to prioritize packet flows. By default, all switch
ports are untrusted. See “Configuring Trusted Ports” on page 27-7 for more information.
page 27-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Classification
When packets ingress on a switch port, the packets are classified and marked as follows:
• If a packet matches a QoS policy rule that sets a new priority value (802.1p or ToS/DSCP), the egress
priority for the packet is set using the value specified in the rule.
• If a packet ingresses on a trusted port and does not match any QoS policy that sets priority, then the
existing 802.1p value (non-IP packets) or the ToS/DSCP value (IP packets) or the default classification
priority configured for the port is used to determine priority for the packet.
• If a packet ingresses on an untrusted port and does not match any QoS policy that sets priority, then the
the default 802.1p value configured for the port (tagged/untagged non-IP packets) or the default ToS/
DSCP value configured for the port (IP packets) is used to determine priority for the packet.
• If the default classification value for the port is set to DSCP, the DSCP value of a tagged IP packet is
mapped to the 802.1p value for that same packet. In other words, the 802.1p priority is overwritten
with the precedence bits of the DSCP value. This does not apply to Layer 2 packets. See “Maintaining
the 802.1p Priority for IP Packets” on page 27-56 for more information.
• The egress priority for a packet ingressing on a VLAN Stacking port (a trusted port) is set using the
existing 802.1p value or configured through an associated VLAN Stacking service.
• IP phone traffic is automatically trusted by default. See “Automatic QoS Prioritization for IP Phone
Traffic” on page 27-5 for more information.
• The switch can bridge and route traffic to the same destination.
• All IP packets are prioritized based on ToS if the default classification on the port is set to DSCP. If
DSCP is not the default classification, then the IP packets are prioritized based on 802.1p.
Note that Layer 3 ACLs are effected on bridged IP traffic and Layer 2 ACLs are effected on routed traffic.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-5
Classification Configuring QoS
In addition to prioritizing IP phone traffic, it is also possible to automatically prioritize non-IP phone
traffic. This is done by adding up to four MAC addresses or four ranges of MAC addresses to the
predefined QoS “alaPhone” MAC address group. See “Creating MAC Groups” on page 27-49 for more
information.
To disable automatic IP phone traffic prioritization for the switch, enter the following command:
-> qos no phones
The QoS IP phone prioritization and Sip-Snooping features are mutually exclusive. The RTP/RTCP (Real-
time Transfer Protocol/Real-time Transfer Control Protocol) packets are treated based on QoS IP phone
FFP rule, because MAC addresses can be in 00-80-9F-xx-xx-xx range. If QoS IP phone prioritization
feature is enabled when Sip-Snooping feature is enabled, an error message is displayed and vice versa.
Hence, to enable QoS IP phone prioritization disable Sip-Snooping feature using sip-snooping admin-
state disable command. Similarly, to enable Sip-Snooping feature disable QoS IP phone prioritization
feature using qos no phones command.
Note. Notes:
• QoS IP phone prioritization is configured, by default, on initialization.
• When automatic prioritization of IP phone traffic is enabled, QoS policies that specify priority are not
applied to the IP phone traffic. Other QoS policies, however, are applied to this type of traffic as usual.
If a policy specifies rate limiting, then the policy with the lowest rate limiting value is applied.
page 27-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Classification
• If the incoming 802.1p or ToS/DSCP flow does not match a policy, the switch places the flow into a
default queue and prioritizes the flow based on the 802.1p or ToS/DSCP value in the flow.
• If the incoming 802.1p or ToS/DSCP flow matches a policy, the switch queues the flow based on the
policy action.
The port trust setting can be configured globally or on a per-port basis to override the global setting.
To configure the global setting on the switch, use the qos trust-ports command. For example:
-> qos trust ports
To configure individual ports as trusted, use the qos port trusted command with the desired chassis/slot/
port number. For example:
-> qos port 1/3/2 trusted
The global setting is active immediately; however, the port setting requires qos apply to activate the
change. See “Applying the Configuration” on page 27-63 for more information.
To display information about QoS ports, such as whether or not the port is trusted, use the show qos port
command. For example:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-7
Classification Configuring QoS
To activate the configuration, enter the qos apply command. See “Applying the Configuration” on
page 27-63 for more information.
For actions that set 802.1p bits, note that a limited set of policy conditions are supported. See “Condition
and Action Combinations” on page 27-25 for more information.
Note. 802.1p mapping can also be set for Layer 3 traffic, which typically has the 802.1p bits set to zero.
page 27-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Congestion Management
Congestion Management
Queuing mechanisms are used to manage congestion on egress ports. When congestion occurs, packets are
prioritized and placed into queues based on the CoS markings assigned to the packets during
classification. If there is no congestion on the egress port, packets are sent out as soon as they are received.
There are eight egress queues allocated for each port on an OmniSwitch. Traffic management and QoS
scheduling for these queues is done through the use of pre-defined Queue Set Profiles (QSPs). For more
information, see “Queue Sets” on page 27-9 and “QSet Profiles” on page 27-10.
Queue Sets
The queue management and related QoS functions are implemented using a framework based on Queue
Sets (QSets). A QSet is a set of eight egress port queues that are associated with each switch port.
The QSET framework involves the following elements:
• QSet instance (QSI)—A QSI is a logical entity that refers to a set of eight queues. Each port in the
switch is automatically associated with a QSI.
• QSet profile (QSP)—a profile associated with each QSI that defines the output scheduling behavior
for the queues associated with the QSet instance. There are four pre-defined QSPs, with QSP 1 serving
as the default profile that is automatically assigned to each QSI. See “QSet Profiles” on page 27-10.
When a physical switch port comes up, a QSet instance (a set of eight queues) is automatically associated
with the port for unicast traffic. In addition, the default QSet profile (QSP 1) is automatically assigned to
the QSI.
If a port attaches to a link aggregate (LAG), a QSI and default QSP 1 are automatically associated with the
LAG ID. Each time a port joins the LAG, the QSI for the port is imported into the LAG. When this
occurs, the LAG QSI becomes the parent and the member port QSI is the child. Note that when a member
port leaves a LAG, the QSI and profile for the port reverts back to the default values.
The following example diagram demonstrates the relationship between switch ports, QSet instances, and
profiles. See “QSet Profiles” on page 27-10 for more information.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-9
Congestion Management Configuring QoS
• Ingress packets destined for port 1/1/1 and port 1/1/2 are queued into CoS queues.
• The centralized scheduler maintains a QSI for port 1/1/1 and port 1/1/2.
• The QSP assigned to the QSI for port 1/1/1 and port 1/1/2 is applied by the scheduler to all flows
destined for port 1/1/1 or port 1/1/2.
• There are four pre-defined QSPs supported. In this example, the default QSP 1 is associated with the
QSI for port 1/1/1. However, QSP 4 was assigned to the QSI for port 1/1/2.
QSet Profiles
There are four pre-defined QSet profiles (QSP 1 - 4) supported. Each profile defines the following
bandwidth management attributes that are applied to traffic destined for the port or link aggregate QSet
instance associated with the profile:
• The percentage of bandwidth allocated for and shared by all of the QSet queues. This value is taken
from the port to which the QSet profile is applied (either port speed or the user-defined bandwidth for
the port is used).
• The administrative status of statistics collection for the QSet queues.
• The queue specific (QSpec) priority used for output scheduling on each of the eight QSet queues.
To determine how flows are mapped to the egress queues based on ingress priority markings, see the
“QSet Profile Mapping” on page 27-11. This section contains CoS priority mapping tables for each QSet
profile.
• There is only one QSP assigned to each QSet instance and only one QSet instance per port or link
aggregate (LAG). However, a LAG may show multiple QSet instances, one for each port that is a
member of the LAG.
• When a port leaves a LAG, the default QSP 1 profile is associated with the QSet instance for that port.
In other words, if the QSet instance for a port was associated with QSP 4 when the port joined the
LAG, the port is associated with QSP 1 when it leaves the LAG.
page 27-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Congestion Management
The qos qsi qsp command is used to change the QSP for a specific QSet instance (QSI). For example:
-> qos qsi port 1/1/2 qsp 2
-> qos qsi port 1/2/1-10 qsp 3
-> qos qsi linkagg 5 qsp 3
To view the QSet profile configuration for the switch, use the show qos qsp command.
See the OmniSwitch AOS Release 8 CLI Reference Guide for more information about the qos qsi qsp and
related show commands.
Queue Queue
Scheduling Weight 802.1p ToS DSCP Notes
ID Type
8 SP7 SP 100% 7 7 7.x Straight SP7
7 SP6 SP 100% 6 6 6.x Straight SP6 with starvation
6 SP5 SP 100% 5 5 5.x, 5.6 Straight SP5 with starvation
(“unprotected” EF)
5 SP4 SP 100% 4 4 4.x Straight SP4 with starvation
4 SP3 SP 100% 3 3 3.x Straight SP3 with starvation
3 SP2 SP 100% 2 2 2.x Straight SP2 with starvation
2 SP1 SP 100% 1 1 1.x Straight SP1 with starvation
1 SP0 SP 100% 0 0 0 Straight SP0 with starvation
Queue Queue
Scheduling Weight 802.1p ToS DSCP Notes
ID Type
8 EF SP 20% X(5) X(5) 5.6 Protected EF
7 SP7+SP6 SP 100% 7, 6 7, 6 7.x, 6.x Straight SP 7 and 6 max (effective
CIR = PR minus EF PIR)
6 SP5 SP 100% 5 5 5.x Straight SP5 with starvation
5 SP4 SP 100% 4 4 4.x Straight SP4 with starvation
4 SP3 SP 100% 3 3 3.x Straight SP3 with starvation
3 SP2 SP 100% 2 2 2.x Straight SP2 with starvation
2 SP1 SP 100% 1 1 1.x Straight SP1 with starvation
1 SP0 SP 100% 0 0 0 Straight SP0 with starvation
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-11
Congestion Management Configuring QoS
Queue Queue
Scheduling Weight 802.1p ToS DSCP Notes
ID Type
8 EF SP 20% X(5) X(5) 5.6 Protected EF
7 WFQ7+6 WFQ 20% 7, 6 7, 6 7.x, 6.x WFQ
6 WFQ5 WFQ 12% 5 5 5.x WFQ
5 WFQ4 WFQ 12% 4 4 4.x WFQ
4 WFQ3 WFQ 12% 3 3 3.x WFQ
3 WFQ2 WFQ 38% 2 2 2.x WFQ
2 WFQ1 WFQ 4% 1 1 1.x WFQ
1 WFQ0 WFQ 2% 0 0 0 WFQ
Queue Queue
Scheduling Weight 802.1p ToS DSCP Notes
ID Type
8 EF SP 20% X(5) X(5) 5.6 Protected EF
7 SP7+6 SP 100% 7, 6 7, 6 7.x, 6.x SP 7 with effective CIR = PR
minus EF PIR
6 SP5 SP 100% 5 5 5.x SP 6 with effective CIR = PR
minus EF PIR (starvable)
"Mission Critical" data/video
5 AF4 WFQ 40% x x 4.1, 4.2, 4.3 AF4 WFQ (starvable)
4 AF3 WFQ 30% x x 3.1, 3.2, 3.3 AF3 WFQ (starvable)
3 AF2 WFQ 20% x x 2.1, 2.2, 2.3 AF2 WFQ (starvable)
2 AF1 WFQ 10% x x 1.1, 1.2, 1.3 AF1 WFQ (starvable)
1 BE WFQ 0% 4, 3, 2, 4, 3, 2, 4.0, 3.0, BE not guaranteed
1, 0 1, 0 2.0, 1.0, 0.0
page 27-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Traffic Policing and Shaping
Policing
• QoS Tri-Color Marking (TCM) policy. A TCM policy consists of a policy action that specifies
packet rates and burst sizes. The policy condition defines the type of traffic for TCM to meter and then
color mark (green, yellow, or red) based on conformance with the rate limits defined in the policy
action. See “Tri-Color Marking” on page 27-14.
• QoS bandwidth policy actions. Maximum bandwidth and depth policy actions are used in QoS policy
rules to specify a maximum ingress bandwidth rate and bucket size. See “Configuring Policy
Bandwidth Policing” on page 27-17 for more information.
• E-Services bandwidth parameters. The VLAN Stacking Service Access Point (SAP) profile defines
an ingress and egress bandwidth rate limiting configuration for an Ethernet Service. See Chapter 36,
“Configuring VLAN Stacking,” for more information.
• Universal Network Profile (UNP) bandwidth parameters. UNP Edge and VLAN profiles define an
ingress and egress bandwidth rate limiting configuration for UNP ports that are assigned to the Edge or
VLAN profile. See Chapter 31, “Configuring Access Guardian,”for more information.
Shaping
• Port-based QoS bandwidth shaping. The QoS CLI provides two commands for setting the maximum
ingress and egress bandwidth for a specific port. These QoS port parameters define the rate at which
traffic is received and sent on the specified port. See “Configuring Policy Bandwidth Policing” on
page 27-17.
• Queue bandwidth shaping. Queuing mechanisms are used to manage congestion on egress ports.
There are eight egress queues allocated for each port on an OmniSwitch. Traffic management and QoS
scheduling for these queues is done through the use of pre-defined Queue Set Profiles (QSPs). See
“Congestion Management” on page 27-9 for more information.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-13
Traffic Policing and Shaping Configuring QoS
Tri-Color Marking
This implementation of a Tri-Color Marking (TCM) provides a mechanism for policing network traffic by
limiting the rate at which traffic is sent or received on a switch interface. The TCM policier meters traffic
based on user-configured packet rates and burst sizes and then marks the metered packets as green, yellow,
or red based on the metering results.
The following diagram illustrates the basic operation of TCM:
The TCM policier meters each packet and passes the metering result along with the packet to the Marker.
Depending upon the result sent by the Meter, the packet is then marked with either the green, yellow, or
red color. The marked packet stream is then transmitted on the egress based on the color-coded priority
assigned.
The TCM Meter operates in Color-Blind mode (the Color-Aware mode is not supported). In the Color-
Blind mode, the Meter assumes that the incoming packet stream is uncolored.
There are two types of TCM marking supported:
• Single-Rate TCM (srTCM)—Packets are marked based on a Committed Information Rate (CIR) value
and two associated burst size values: Committed Burst Size (CBS) and Peak Burst Size (PBS).
• Two-Rate TCM (trTCM)—Packets are marked based on a CIR value and a Peak Information Rate
(PIR) value and two associated burst size values: CBS and PBS.
Both srTCM and trTCM operate in the same basic manner, as shown in the above diagram. The main
difference between the two types is that srTCM uses one rate limiting value (CIR) and trTCM uses two
rate limiting values (CIR and PIR) to determine packet marking.
The type of TCM used is determined when the policier is configured; depending on which rates and burst
size values are configured, TCM functions in ether single-rate or two-rate mode. There is no explicit
command to select the type of TCM. See “Configuring Tri-Color Marking” on page 27-15 for more
information.
Based on the TCM type used, packets are marked as follows:
page 27-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Traffic Policing and Shaping
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-15
Traffic Policing and Shaping Configuring QoS
To configure a TCM QoS policy action, use the policy action cir command with one or more of the above
parameters. Configuring the cbs and pbs parameters is optional. If a value is not specified for either one,
the default value is used for both parameters. For example:
-> policy action A1 cir 10M
To specify one or both of the burst size values, use the cbs and pbs parameters. For example:
-> policy action A2 cir 10m cbs 4k
-> policy action A3 cir 10m cbs 4k pbs 10m
All of these command examples configure the TCM meter to operate in the Single-Rate TCM (srTCM)
mode. To configure the meter to operate in the Two-Rate TCM (trTCM) mode, use the pir parameter and
specify a peak information rate value that is greater than the committed information rate value. For
example, the following commands configure the meter to use the trTCM mode:
-> policy action A4 cir 10m cbs 4k pir 20m
-> policy action A5 cir 10m cbs 4k pir 20m pbs 40m
Once a TCM policy action is configured, the action can be used in a policy rule to rate limit traffic
according to the specified rates and burst sizes. Traffic that matches a TCM policy is marked green, red, or
yellow based on the rate limiting results.
To remove the TCM configuration from a QoS policy action, use the no form of the policy action cir
command. For example:
-> policy action A6 no cir
Note that the rates and burst sizes can be specified in abbreviated units, in this case, 10m.
The rule is not active on the switch until the qos apply command is entered. When the rule is activated,
any flows coming into the switch from source IP address [Link] is metered and marked according to the
TCM policier parameters specified in the tcm1 policy action.
page 27-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Traffic Policing and Shaping
Setting the DEI bit for yellow egress packets ensures that the upstream switch is made aware that the
packet was marked yellow. The upstream switch can then decide to drop the DEI marked packets first
when the network is congested. When a switch receives a yellow packet with the DEI bit set and DEI
mapping is enabled, the packet is mapped to an internal drop precedence or yellow color marking for the
switch.
When the default QoS classification value is set to DSCP, the DEI bit is not relevant for DSCP packets.
As a result, the color/congestion is derived from the values carried in the DSCP bit, not from the incoming
DEI. However, if the default QoS classification is set to 802.1p, the DEI/CFI is honored for both Layer 2
and Layer 3 traffic.
The switch can be set globally so that DEI bit marking and mapping is enabled for all ports. Individual
ports can be configured to override the global setting
To configure the switch to map ingress traffic marked with the DEI bit, use the qos dei command with the
ingress parameter option. For example:
-> qos dei ingress
To configure the DEI bit operation for an individual port, use the qos dei with the ingress or egress
parameter option. For example:
-> qos port 1/1/10 dei egress
-> qos port 1/1/11 dei ingress
See the OmniSwitch AOS Release 8 CLI Reference Guide for more information about these commands.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-17
Traffic Policing and Shaping Configuring QoS
• If a policy condition applies to ports that are located on different slots, the maximum bandwidth limit
specified is multiplied by the number of slots involved. For example, if a rule is configured to apply a
maximum bandwidth limit of 10M to ports 1/1/1, 1/3/10, and 1/4/5, then the actual bandwidth limit
enforced for all three ports is 30M.
• If a policy condition applies to ports that are all on the same slot, then the maximum bandwidth value
specified in the rule is not increased.
• Ingress bandwidth limiting is done using a minimum granularity of an 8Kbps, depending on the port
rate (for example, 1G, 10G, or 40G).
• The show active policy rule command displays green, yellow, and red packet and bytes counters based
on the rate-limit policy action parameter.
• Rate limiting is done on a per-slot, per-chassis basis. So if a port group consists of multiple chassis or
slot ports, then the configured rate-limit policy action is shared among the slot/chassis ports in the port
group.
• Although bandwidth policies are applied to ingress ports, it is possible to specify a destination port or
destination port group in a bandwidth policy as well. Doing so, effects egress rate limiting/egress
policing on the ingress port itself. The limitation of bridged port traffic only on destination ports
applies in this case as well.
The following subsections provide examples of ingress maximum bandwidth policies using both source
and destination port groups.
In this example, if both ports 1 and 2 are active ports, the 10000 bps maximum bandwidth is shared by
both ports. In other words, maximum bandwidth policies for port groups define a maximum bandwidth
value that is a total bandwidth amount for all ports, not an amount for each port.
The maximum traffic received by a destination port is dependent on how many slots are sending traffic to
the destination port. However, each slot is restricted to sending only 10k.
In this example, the specified ports for pgroup2 span across two slots. As a result, the maximum
bandwidth limit specified by the policy action is increased to 20K for all of the ports. The bandwidth limit
is increased by multiplying the number of slots by the specified bandwidth value.
page 27-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Traffic Policing and Shaping
In this example, the TCM rate limiting action (RateLimDscp) is applied to all the member ports of the
PGroup (ports 1/1/1-24) that receive traffic that matches the SrcPorts condition parameters. The rate
limiting value is shared between the qualifying PGroup ports.
If the goal is to apply the RateLimDscp action to each qualifying group port on an individual basis (ports
do not share the rate limit value applied with other ports), then configuring a separate rule for each port is
required. For example:
-> policy condition SrcPort1 source port 1/1 source network group IP destination
network group IP dscp 46 service UDP
-> policy condition SrcPort2 source port 1/2 source network group IP destination
network group IP dscp 46 service UDP
...
-> policy condition SrcPort24 source port 1/24 source network group IP
destination network group IP dscp 46 service UDP
-> policy action RateLimDscp dscp 46 cir 20M cbs 8K
-> policy rule PortRule1 condition SrcPort1 action RateLimDscp
-> policy rule PortRule2 condition SrcPort2 action RateLimDscp
...
-> policy rule PortRule24 condition SrcPort24 action RateLimDsc
The above configuration is a tedious and time consuming process. However, if the source port group
condition is configured as a split-group, then only one policy rule is required to apply rate limiting to each
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-19
Traffic Policing and Shaping Configuring QoS
individual port. For example, the following policy rule configures SrcPorts as a source port split-group
policy condition:
-> policy port group PGroup 1/1/1-24
-> policy service UDP source udp-port 32000-33000 destination udp port 32000-
33000
-> policy network group IP [Link] mask [Link]
-> policy condition SrcPorts source port split-group PGroup source network group
IP destination network group IP dscp 46 service UDP
-> policy action RateLimDscp dscp 46 cir 20M cbs 8K
-> policy rule PortRule condition SrcPorts action RateLimDscp
In this example, all of the qualifying ports in the PGroup are rate limited on an individual, per-port basis.
This greatly simplifies the configuration process.
When configuring per-port rate limiting with a source port split-group, consider the following guidelines:
• A source port group is the only QoS group that supports the split-group option; other QoS groups (for
example, a destination port group or network group) do not support the split-group option.
• A policy rule containing a source port split-group condition can only belong to the default policy list.
Assigning this type of rule to other QoS policy lists is not allowed.
• Do not use a shared bandwidth policy action (policy action shared) in a policy rule that specifies a
source port split-group condition. This type of action shares rate limiting resources with all other rules
that contain the same shared policy action. Sharing these resources with rules that contain a split-group
condition is not allowed.
• When a source port split-group condition is used, a sub-rule is created for each member port of the
split-group. Each sub-rule is assigned a unique split rule ID. For example, if the source port group
contains two ports (1/1/2 and 1/1/3) and is configured as a source port split-group condition for a rate
limiting policy rule, then two sub-rules (Split Rule ID 1 for port 1/1/2 and Split rule ID 2 for port 1/1/3)
are automatically created by the switch to accommodate the per-port rate limiting on each of these two
ports.
Use the show active policy rule command with the extended parameter option to view the sub-rules and
related statistics for a policy rule that contains a source port split-group policy condition.
• The configured port-based egress bandwidth limit takes precedence over an egress queue limit
configured on the same port.
page 27-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS QoS Policy Overview
Note. Note. Polices can only be modified using the same source used to create them. Policies configured
through PolicyView can only be edited through PolicyView. Policies created directly on the switch through
the CLI or WebView can only be edited on the switch. Policies are created through the CLI or WebView,
however, to override policies created in PolicyView. And vice versa.
This section discusses policy configuration using the CLI. For information about using WebView to
configure the switch, see the OmniSwitch AOS Release 8 Switch Management Guide. For information
about configuring policies through PolicyView, see the PolicyView online help.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-21
QoS Policy Overview Configuring QoS
Policy Lists
A QoS policy list provides a method for grouping multiple policy rules together and applying the group of
rules to specific types of [Link] type of traffic to which a policy list is applied is determined by the
type of list that is configured. There are two types of policy lists:
• Default—All rules are associated with a default policy list when the rules are created. This list is not
configurable, but it is possible to direct QoS to not assign a rule to this list.
• User Network Profile (UNP)—This type of policy list is associated with the Universal Network
Profile (UNP) that is supported on the OmniSwitch 6860. The rules in this list are applied to device
traffic that was classified into the profile.
For more information, see “Creating Policy Lists” on page 27-42.
Valid Policies
The switch does not allow you to create invalid condition/action combinations; if you enter an invalid
combination, an error message is displayed. A list of valid condition and actions is given in “Policy
Conditions” on page 27-23 and “Policy Actions” on page 27-24.
It is possible to configure a valid QoS rule that is active on the switch, however the switch is not able to
enforce the rule because some other switch function (for example, routing) is disabled.
page 27-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS QoS Policy Overview
Policy Conditions
The following conditions are supported and can be combined with other conditions and/or actions:
The CLI prevents you from configuring invalid condition combinations that are never allowed; however, it
does allow you to create combinations that are supported in some scenarios. For example, you might
configure source ip and a destination ip for the same condition.
Consider the following guidelines when configuring policy conditions:
• IPv4 and IPv6 conditions cannot be combined.
• Source and destination MAC address conditions cannot be used in IPv6 policy rules.
• IP multicast traffic (not IGMP) is treated as regular traffic; QoS functionality works the same way with
this type of traffic, with the exception that the destination port condition does not apply.
• The IP multicast condition works in combination with Layer 1, Layer 2, and Layer 3 destination
conditions only if these conditions specify the device that sends the IGMP report packet.
• Source and destination parameters can be combined in Layer 2, Layer 3, and Layer 4 conditions.
• In a given rule, ToS or DSCP can be specified for a condition with priority specified for the action.
• Individual items and their corresponding groups cannot be combined in the same condition. For
example, a source IP address cannot be included in a condition with a source IP network group.
• The Layer 1 destination port condition only applies to bridged traffic, not routed traffic.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-23
QoS Policy Overview Configuring QoS
• Layer 2 and Layer 3 rules are always effected on bridged and routed traffic. As a result, combining
source or destination TCP/UDP port and IP protocol in a condition is allowed.
• While configuring an AppMon enforcement policy rule, multiple condition parameters (for example,
source IP, destination IP, source VLAN and so on) cannot be defined in a single policy condition along
with the application name or group.
For specific information about how to configure policy conditions and actions to create a policy rule, see
“Creating Policies” on page 27-35.
Policy Actions
The following actions are supported and can be combined with other actions.
The CLI prevents you from configuring invalid action combinations that are never allowed; however, it
does allow you to create combinations that are supported in some scenarios. For example, an action
specifying maximum bandwidth can be combined with an action specifying priority.
Use the following “Policy Action Combinations Table” together with the “Supported Policy Actions
Table” as a guide when creating policy actions.
page 27-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS QoS Policy Overview
For specific information about how to configure policy conditions and actions to create a policy rule, see
“Creating Policies” on page 27-35.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-25
QoS Defaults Configuring QoS
QoS Defaults
The following tables list the defaults for global QoS parameters, individual port settings, policy rules,
default policy rules, and queue management profiles.
page 27-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS QoS Defaults
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-27
QoS Defaults Configuring QoS
The following are the default QSet Profile (QSP 1) settings applied to each QSI:
QSP 1 Default
Bandwidth 100%
QP1–QP8 Queue Type Strict Priority
QP1–QP8 CIR PIR 0%, 100%
WFQ Mode WERR
WFQ Weight 1
page 27-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS QoS Defaults
Note that in the current software release, the deny and drop options produce the same effect that is, the
traffic is silently dropped.
• The switch network group—The switch has a default network group, called switch, that includes all IP
addresses configured for the switch itself. This default network group can be used in policies. See
“Creating Network Groups” on page 27-46 for more information about network groups.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-29
Configuring QoS Configuring QoS
Configuring QoS
QoS configuration involves the following general steps:
page 27-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Configuring Global QoS Parameters
Enabling/Disabling QoS
By default QoS is enabled on the switch. If QoS policies are configured and applied, the switch attempts
to classify traffic and apply relevant policy actions.
To disable the QoS, use the qos command. For example:
-> qos disable
QoS is immediately disabled. When QoS is disabled globally, any flows coming into the switch are not
classified (matched to policies).
To re-enable QoS, enter the qos command with the enable option:
-> qos enable
QoS is immediately re-enabled. Any policies that are active on the switch are used to classify traffic
coming into the switch.
Note that individual policy rules can be enabled or disabled with the policy rule command.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-31
Configuring Global QoS Parameters Configuring QoS
To display information about any QoS rules on the switch, enter debug qos rule:
-> debug qos rule
To change the type of debugging, use no with the relevant type of information that you want to remove.
For example:
-> debug qos no rule
To turn off debugging (which effectively turns off logging), enter the following:
-> no debug qos
The number of lines in the log is changed. To activate the change, enter the qos apply command.
Note. If you change the number of log lines, the QoS log can be completely cleared. To change the log lines
without clearing the log, set the log lines in the [Link] file; the log is set to the specified number of
lines at the next reboot.
The log level is changed immediately but the setting is not saved in flash. To activate the change, enter the
qos apply command. For more information about the qos apply command, see “Applying the
Configuration” on page 27-63.
Note. A high log level value impacts the performance of the switch.
To activate the change, enter the qos apply command. For more information about the qos apply
command, see “Applying the Configuration” on page 27-63.
page 27-32 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Configuring Global QoS Parameters
If event forwarding is disabled, NMS applications can still query the QoS software for events, but the
events are not sent in real time.
To disable immediate forwarding of events to switch logging, enter the following command:
-> qos no log console
To activate the change, enter the qos apply command. For more information about the qos apply
command, see “Applying the Configuration” on page 27-63.
Use the swlog output command to configure switch logging to output logging events to the console. Note
that this is in addition to sending log events to a file in the flash file system of the switch. See the “Using
Switch Logging” chapter in the OmniSwitch AOS Release 8 Network Configuration Guide for more
information.
Insert rule 0
Rule index at 0
Insert rule 1
Rule index at 1
Insert rule 2
Rule index at 2
Enable rule r1 (1) 1,1
Enable rule r2 (0) 1,1
Enable rule yuba1 (2) 1,1
Verify rule r1(1)
Enable rule r1 (1) 1,1
Really enable r1
Update condition c1 for rule 1 (1)
Verify rule r2(1)
Enable rule r2 (0) 1,1
Really enable r2
Update condition c2 for rule 0 (1)
Verify rule yuba1(1)
Enable rule yuba1 (2) 1,1
Really enable yuba1
Update condition yubamac for rule 2 (1)
QoS Manager started TUE MAR 10 [Link] 2002
Match rule 2 to 1
Match rule 2 to 2
Match rule 2 to 3
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-33
Configuring Global QoS Parameters Configuring QoS
The log display can be modified through the qos log lines, qos log level, and debug qos commands. The
log display can also be output to the console through the qos log console command or sent to the policy
software in the switch (which manages policies downloaded from an LDAP server) through the qos
forward log command.
Statistics are displayed through the show qos statistics command. For more information about this
command, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Note. The qos reset command only affects the global configuration. It does not affect any policy
configuration.
show qos config Displays global information about the QoS configuration.
show qos statistics Displays statistics about QoS events.
For more information about the syntax and displays of these commands, see the OmniSwitch AOS Release
8 CLI Reference Guide.
page 27-34 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Creating Policies
Creating Policies
This section describes how to create policies in general. For information about configuring specific types
of policies, see “Policy Applications” on page 27-66.
Basic commands for creating policies are as follows:
policy condition
policy action
policy rule
This section describes generally how to use these commands. For additional details about command
syntax, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Note. A policy rule can include a policy condition or a policy action that was created through PolicyView
rather than the CLI. But a policy rule, policy action, or policy condition can only be modified through the
source that created it. For example, if an action was created in PolicyView, it can be included in a policy
rule configured through the CLI, but it cannot be modified through the CLI.
Policies are not used to classify traffic until the qos apply command is entered. See “Applying the
Configuration” on page 27-63.
2 Create a policy action with the policy action command. For example:
-> policy action action2 priority 7
3 Create a policy rule with the policy rule command. For example:
-> policy rule my_rule condition cond3 action action2
4 Use the qos apply command to apply the policy to the configuration. For example:
-> qos apply
Note. (Optional) To verify that the rule has been configured, use the show policy rule command. The
display is similar to the following:
-> show policy rule
Rule name : my_rule
Condition name = cond3,
Action name = action2,
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-35
Creating Policies Configuring QoS
An example of how the example configuration commands might display when entered sequentially on the
command line is given here:
-> policy condition cond3 source ip [Link]
-> policy action action2 priority 7
-> policy rule my_rule condition cond3 action action2
-> qos apply
ASCII-File-Only Syntax
When the policy rule, policy condition, and policy action commands as well as any of the condition
group commands are configured and saved in an ASCII file (typically through the snapshot command),
the commands included in the file include syntax indicating the origin of the command. The origin
specifies where the rule, condition, condition group, or action was created, either an LDAP server or the
CLI (from ldap or from cli). For built-in QoS objects, the syntax displays as from blt. For example:
-> policy action A2 from ldap disposition accept
The from option is configurable (for LDAP or CLI only) on the command line; however, it is not
recommended that origin of a QoS object be modified. The blt keyword indicates built-in; this keyword
cannot be used on the command line. For information about built-in policies and QoS groups, see “How
Policies Are Used” on page 27-21.
Note. Policy condition configuration is not active until the qos apply command is entered. See “Applying
the Configuration” on page 27-63.
To create or modify a policy condition, use the policy condition command with the keyword for the type
of traffic you want to classify, for example, an IP address or group of IP addresses. In this example, a
condition (c3) is created for classifying traffic from source IP address [Link]:
-> policy condition c3 source ip [Link]
There are many options for configuring a condition, depending on how you want the switch to classify
traffic for this policy. An overview of the options is given here. Later sections of this chapter describe how
to use the options in particular network situations.
Note. The group options in this command refer to groups of addresses, services, or ports that you configure
separately through policy group commands. Rather than create a separate condition for each address,
service, or port, use groups and attach the group to a single condition. See “Using Condition Groups in
Policies” on page 27-45 for more information about setting up groups.
page 27-36 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Creating Policies
More than one condition parameter can be specified. Some condition parameters are mutually exclusive.
For supported combinations of condition parameters, see “Policy Conditions” on page 27-23.
The condition is not activated on the switch until you enter the qos apply command.
The specified parameter (in this case, a source IP address) is removed from the condition (c3) at the next
qos apply.
Note. You cannot remove all parameters from a policy condition. A condition must be configured with at
least one parameter.
The condition (c3) cannot be deleted if it is currently being used by a policy rule. If a rule is using the
condition, the switch displays an error message. For example:
ERROR: c3 is being used by rule ‘my_rule’
In this case, the condition is not deleted. The condition (c3) must first be removed from the policy rule
(my_rule). See “Creating Policy Rules” on page 27-39 for more information about setting up rules.
If c3 is not used by a policy rule, it is deleted after the next qos apply.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-37
Creating Policies Configuring QoS
In this example, the action (Block) has a disposition of drop (disposition determines whether a flow is
allowed or dropped on the switch). This action can be used in a policy rule to deny a particular type of
traffic specified by a policy condition.
Note. Policy action configuration is not active until the qos apply command is entered. See “Applying the
Configuration” on page 27-63.
More than one action parameter can be specified. Some parameters are mutually exclusive. In addition,
some action parameters are only supported with particular condition parameters. For information about
supported combinations of condition and action parameters, see “Policy Conditions” on page 27-23 and
“Policy Actions” on page 27-24. See the OmniSwitch AOS Release 8 CLI Reference Guide for details
about command syntax.
Note. If you combine priority with 802.1p, dscp, tos, or map, in an action, the priority value is used to
prioritize the flow.
This example removes the configured priority value from action a6. If any policy rule is using action a6,
the default action is to allow the flow classified by the policy condition.
The specified parameter (in this case, priority) is removed from the action at the next qos apply.
page 27-38 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Creating Policies
The action cannot be deleted if it is currently being used by a policy rule. If a rule is using the action, the
switch displays an error message. For example:
ERROR: a6 is being used by rule ‘my_rule’
In this case, the action is not deleted. The action (a6) must first be removed from the policy rule
(my_rule). See “Creating Policy Rules” on page 27-39 for more information about setting up rules.
If a6 is not used by a policy rule, it is deleted after the next qos apply.
The rule (rule5) only takes effect after the qos apply command is entered. For more information about the
qos apply command, see “Applying the Configuration” on page 27-63.
The policy rule command can specify the following keywords:
In addition, a policy rule can be administratively disabled or re-enabled using the policy rule command.
By default rules are enabled. For a list of rule defaults, see “Policy Rule Defaults” on page 27-28.
Information about using the policy rule command options is given in the next sections.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-39
Creating Policies Configuring QoS
-> policy validity period vp01 hours 13:00 to 19:00 days monday friday
-> policy rule r01 validity period vp01
Note the following when using validity periods to restrict the times when a rule is active:
• Only one validity period is associated with a policy rule. Each time this command is entered with a
validity period name specified, the existing period name is overwritten with the new one.
• A rule is only in effect when all the parameters of its validity period are true. In the above example,
rule r01 is only applied between 13:00 and 19:00 on Mondays and Fridays. During all other times and
days, the rule is not applied.
• Software and hardware resources are allocated for rules associated with a validity period even if the
validity period is not active. Pre-allocating the resources makes sure the rule can be enforced when the
validity period becomes active.
Disabling Rules
By default, rules are enabled. Rules are disabled or re-enabled through the policy rule command using the
disable and enable options. For example:
-> policy rule rule5 disable
Note. If qos disable is entered, the rule is not used to classify traffic even if the rule is enabled. For more
information about enabling/disabling QoS globally, see “Enabling/Disabling QoS” on page 27-31.
Rule Precedence
The switch attempts to classify flows coming into the switch according to policy precedence. Only the rule
with the highest precedence is applied to the flow. This is true even if the flow matches more than one
rule.
Precedence is particularly important for Access Control Lists (ACLs). For more details about precedence
and examples for using precedence, see Chapter 27, “Configuring QoS.”
page 27-40 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Creating Policies
Saving Rules
The save option marks the policy rule so that the rule is captured in an ASCII text file (using the
configuration snapshot command) and saved to the working directory (using the issu slot command). By
default, rules are saved.
If the save option is removed from a rule, the qos apply command activates the rule for the current
session, but the rule is not saved over a reboot. Typically, the no save option is used for temporary
policies that you do not want saved in the switch configuration file.
To remove the save option from a policy rule, use no with the save keyword. For example:
-> policy rule rule5 no save
To reconfigure the rule as saved, use the policy rule command with the save option. For example:
-> policy rule rule5 save
For more information about the configuration snapshot, write memory, and copy running-config
working commands, see the OmniSwitch AOS Release 8 Switch Management Guide and the OmniSwitch
AOS Release 8 CLI Reference Guide.
For more information about applying rules, see “Applying the Configuration” on page 27-63.
Logging Rules
Logging a rule is useful for determining the source of firewall attacks. To specify that the switch must log
information about flows that match the specified policy rule, use the policy rule command with the log
option. For example:
-> policy rule rule5 log
To stop the switch from logging information about flows that match a particular rule, use no with the log
keyword. For example:
-> policy rule rule5 no log
When logging is active for a policy rule, a logging interval is applied to specify how often to look for
flows that match the policy rule. By default, the interval time is set to 30 seconds. To change the log
interval time, use the optional interval keyword with the log option. For example:
-> policy rule rule5 log interval 1500
Note that setting the log interval time to 0 specifies to log as often as possible.
Deleting Rules
To remove a policy rule, use the no form of the command.
-> no policy rule rule1
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-41
Creating Policies Configuring QoS
Note that the no default-list option was used to create the rules. Using this option is recommended when
creating a policy list for a UNP. See “Guidelines for Configuring Policy Lists” on page 27-43.
The following example creates a policy rule (rule1) that is automatically assigned to the default policy list.
-> policy condition cond1 source mac [Link] source vlan 100
-> policy action act1 disposition drop
-> policy rule rule1 condition cond1 action act1
-> qos apply
In this example, the no default-list parameter is not used with the policy rule command, so the rule is
automatically assigned to the default policy list. The default list always exists and is not configurable. As a
result, the policy list command is not required to assign the rule to the default list.
By default, a policy list is enabled at the time the list is created. To disable or enable a policy list, use the
following commands:
-> policy list unp1_rules disable
-> policy list unp1_rules enable
To remove an individual rule from a UNP policy list, use the following command:
-> policy list unp1_rules no rules r2
To remove an entire UNP policy list from the switch configuration, use the following command:
-> no policy list unp1_rules
Use the show policy list command to display the QoS policy rule configuration for the switch.
page 27-42 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Creating Policies
• If a rule is a member of multiple policy lists but one or more of these lists are disabled, the rule is still
active for those lists that are enabled.
• If the QoS status of an individual rule is disabled, then the rule is disabled for all policy lists, even if a
list to which the policy belongs is enabled.
• Policy lists are not active on the switch until the qos apply command is issued.
The no default-list option can also remove an existing rule from the default list. For example, the r2 rule
already exists in the switch configuration but was not excluded from the default list at the time the rule
was created. The following command removes the rule from the default list:
-> policy rule r2 condition c1 action a1 no default-list
To add an existing rule to the default list, use the default-list parameter option of the policy rule
command. For example:
-> policy rule r2 condition c1 action a1 default-list
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-43
Creating Policies Configuring QoS
Rules associated with the default policy list are applied only to ingress traffic, unless the rule is also
assigned to an egress policy list.
show policy condition Displays information about all pending and applied policy conditions or
a particular policy condition configured on the switch. Use the applied
keyword to display information about applied conditions only.
show policy action Displays information about all pending and applied policy actions or a
particular policy action configured on the switch. Use the applied
keyword to display information about applied actions only.
show policy rule Displays information about all pending and applied policy rules or a
particular policy rule. Use the applied keyword to display information
about applied rules only.
show active policy rule Displays applied policy rules that are active (enabled) on the switch.
page 27-44 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Using Condition Groups in Policies
2 Attach the group to a policy condition. For more information about configuring conditions, see “Creat-
ing Policy Conditions” on page 27-36.
-> policy condition cond3 source network group netgroup1
Note. (Optional) Use the show policy network group command to display information about the network
group. Each type of condition group has a corresponding show command. For example:
-> show policy network group
Group Name: From Entries
Switch blt [Link]
[Link]
3 Attach the condition to a policy rule. (For more information about configuring rules, see “Creating
Policy Rules” on page 27-39.) In this example, action act4 has already been configured. For example:
-> policy rule my_rule condition cond3 action act4
4 Apply the configuration. See “Applying the Configuration” on page 27-63 for more information about
this command.
-> qos apply
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-45
Using Condition Groups in Policies Configuring QoS
Note. Network group configuration is not active until the qos apply command is entered.
In this example, a policy network group called netgroup2 is created with two IPv4 addresses. No mask is
specified, so the IPv4 addresses are assumed to be host addresses.
-> policy network group netgroup2 [Link] [Link]
In the next example, a policy network group called netgroup3 is created with two IPv4 addresses. The
first address also specifies a mask.
-> policy network group netgroup3 [Link] mask [Link] [Link]
In this example, the [Link] address is sub-netted, so that any address in the subnet is included in the
network group. For the second address, [Link], a mask is not specified; the address is assumed to be a
host address.
The network group can then be associated with a condition through the policy condition command. The
network group must be specified as a source network group or destination network group. In this
example, netgroup3 is configured for condition c4 as source network group:
-> policy condition c4 source network group netgroup3
To remove addresses from a network group, use no and the relevant address(es). For example:
-> policy network group netgroup3 no [Link]
This command deletes the [Link] address from netgroup3 after the next qos apply.
To remove a network group from the configuration, use the no form of the policy network group
command with the relevant network group name. The network group must not be associated with any
policy condition or action. For example:
-> no policy network group netgroup3
If the network group is not currently associated with any condition or action, the network group
netgroup3 is deleted from the configuration after the next qos apply.
page 27-46 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Using Condition Groups in Policies
If a condition or an action is using netgroup3, the switch displays an error message similar to the
following:
ERROR: netgroup3 is being used by condition 'c4'
In this case, remove the network group from the condition first, then enter the no form of the policy
network group command. For example:
-> policy condition c4 no source network group
-> no policy network group netgroup3
The policy condition command removes the network group from the condition. (See “Creating Policy
Conditions” on page 27-36 for more information about configuring policy conditions.) The network group
is deleted at the next qos apply.
Creating Services
Policy services are made up of TCP or UDP ports or port ranges. They include source or destination ports,
or both, but the ports must be the same type (TCP or UDP). Mixed port types cannot be included in the
same service.
Policy services can be associated with policy service groups, which are then associated with policy
conditions; or they can be directly associated with policy conditions.
To create a service, use the policy service command. With this command, there are two different methods
for configuring a service. You can specify the protocol and the IP port; or you can use shortcut keywords.
The following table lists the keyword combinations:
An IP protocol (TCP or UDP), source IP port and/or destination IP port (or port range) must be associated
with a service. IP port numbers are well-known port numbers defined by the IANA. For example, port
numbers for FTP are 20 and 21; Telnet is 23.
In this example, a policy service called telnet1 is created with the TCP protocol number (6) and the well-
known Telnet destination port number (23).
-> policy service telnet1 protocol 6 destination ip port 23
A shortcut for this command replaces the protocol and destination ip port keywords with destination
tcp port:
-> policy service telnet1 destination tcp port 23
In the next example, a policy service called ftp2 is created with port numbers for FTP (20 and 21):
-> policy service ftp2 protocol 6 source ip port 20-21 destination ip port 20
A shortcut for this command replaces the protocol, source ip port, and destination ip port keywords
with source tcp port and destination tcp port:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-47
Using Condition Groups in Policies Configuring QoS
-> policy service ftp2 source tcp port 20-21 destination tcp port 20
Multiple services created through the policy service command can be associated with a policy service
group; or, individual services can be configured for a policy condition. If you have multiple services to
associate with a condition, configure a service group and attach it to a condition. Service groups are
described in “Creating Service Groups” on page 27-48.
Note. Service configuration is not active until the qos apply command is entered.
The ftp2 service is deleted from the configuration at the next qos apply if the service is not currently
associated with a policy condition or a service group.
In this example, a policy service group called serv_group is created with two policy services (telnet1 and
ftp2). The policy services were created with the policy service command. (See “Creating Services” on
page 27-47 for information about configuring policy services.)
Note. The policy service group can include only services with all source ports, all destination ports, or all
source and destination ports. For example, the group cannot include a service that specifies a source port
and another service that specifies a destination port.
The service group can then be associated with a condition through the policy condition command. For
example:
-> policy condition c6 service group serv_group
This command configures a condition called c6 with service group serv_group. All of the services
specified in the service group are included in the condition. (For more information about configuring
conditions, see “Creating Policy Conditions” on page 27-36.)
Note. Service group configuration must be specifically applied to the configuration with the qos apply
command.
To delete a service from the service group, use no with the relevant service name. For example:
-> policy service group serv_group no telnet1
In this example, the service telnet1 is removed from policy service group serv_group.
To delete a service group from the configuration, use the no form of the policy service group command.
The service group must not be associated with any condition. For example:
page 27-48 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Using Condition Groups in Policies
Service group serv_group is deleted at the next qos apply. If serv_group is associated with a policy
condition, an error message displays instead. For example:
ERROR: serv_group is being used by condition 'c6'
In this case, remove the service group from the condition first; then enter the no policy service group
command. For example:
-> policy condition c6 no service group
-> no policy service group serv_group
The policy condition command removes the service group from the policy condition. (See “Creating
Policy Conditions” on page 27-36 for more information about configuring policy conditions.) The service
group is deleted at the next qos apply.
This command creates MAC group macgrp2 with two MAC addresses. The first address includes a MAC
address mask, so that any MAC address starting with [Link] is included in macgrp2.
The MAC group can then be associated with a condition through the policy condition command. Note
that the policy condition specifies whether the group must be used for source or destination. For example:
-> policy condition cond3 source mac group macgrp2
This command creates a condition called cond3 that can be used in a policy rule to classify traffic by
source MAC addresses. The MAC addresses are specified in the MAC group. For more information about
configuring conditions, see “Creating Policy Conditions” on page 27-36.
Note. MAC group configuration is not active until the qos apply command is entered.
To delete addresses from a MAC group, use no and the relevant address(es):
-> policy mac group macgrp2 no [Link]
This command specifies that MAC address [Link] is deleted from macgrp2 at the next qos
apply.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-49
Using Condition Groups in Policies Configuring QoS
To delete a MAC group, use the no form of the policy mac group command with the relevant MAC group
name. The group must not be associated with any policy condition. For example:
-> no policy mac group macgrp2
MAC group macgrp2 is deleted at the next qos apply. If macgrp2 is associated with a policy
condition, an error message displays instead:
ERROR: macgrp2 is being used by condition 'cond3'
In this case, remove the MAC group from the condition first; then enter the no policy mac group
command. For example:
-> policy condition cond3 no source mac group
-> no policy mac group macgrp2
The policy condition command removes the MAC group from the condition. See “Creating Policy
Conditions” on page 27-36 for more information about configuring policy conditions. The MAC group is
deleted at the next qos apply.
The port group can then be associated with a condition through the policy condition command. Note that
the policy condition specifies whether the group must be used for source or destination. For example:
-> policy condition cond4 source port group techpubs
This command creates a condition called cond4 that can be used in a policy rule to classify traffic by
source port number. The port numbers are specified in the port group. For more information about
configuring conditions, see “Creating Policy Conditions” on page 27-36.
Note. Port group configuration is not active until the qos apply command is entered.
To delete ports from a port group, use no and the relevant port number.
-> policy port group techpubs no 1/2/1
This command specifies that port 2/1 is deleted from the techpubs port group at the next qos apply.
To delete a port group, use the no form of the policy port group command with the relevant port group
name. The port group must not be associated with any policy condition. For example:
-> no policy port group techpubs
The port group techpubs are deleted at the next qos apply. If techpubs is associated with a policy
condition, an error message displays instead:
ERROR: techpubs is being used by condition 'cond4'
page 27-50 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Using Condition Groups in Policies
In this case, remove the port group from the condition first; then enter the no policy port group
command. For example:
-> policy condition cond4 no source port group
-> no policy port group techpubs
The policy condition command removes the port group from the policy condition. (See “Creating Policy
Conditions” on page 27-36 for more information about configuring policy conditions.) The port group is
deleted at the next qos apply.
show policy network group Displays information about all pending and applied policy network
groups or a particular network group. Use the applied keyword to
display information about applied groups only.
show policy service Displays information about all pending and applied policy services or a
particular policy service configured on the switch. Use the applied
keyword to display information about applied services only.
show policy service group Displays information about all pending and applied policy service
groups or a particular service group. Use the applied keyword to display
information about applied groups only.
show policy mac group Displays information about all pending and applied MAC groups or a
particular policy MAC group configured on the switch. Use the applied
keyword to display information about applied groups only.
show policy port group Displays information about all pending and applied policy port groups
or a particular port group. Use the applied keyword to display
information about applied groups only.
See the OmniSwitch AOS Release 8 CLI Reference Guide for more information about the syntax and
output for these commands.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-51
Using Map Groups Configuring QoS
2 Attach the map group to a policy action. See “Creating Policy Actions” on page 27-38 for more infor-
mation about creating policy actions.
-> policy action tosMap map tos to 802.1p using tosGroup
Note. (Optional) Use the show policy map group command to verify the map group.
-> show policy map group
Group Name From Entries
+tosGroup cli 1-2:5
4:5
5-6:7
Note. For more information about this command, see “Verifying Map Group Configuration” on page 27-54
and the OmniSwitch AOS Release 8 CLI Reference Guide.
3 Attach the action to a policy rule. In this example, the condition Traffic is already configured. For
more information about configuring rules, see “Creating Policy Rules” on page 27-39.
-> policy rule r3 condition Traffic action tosMap
4 Apply the configuration. For more information about this command, see “Applying the Configuration”
on page 27-63.
-> qos apply
page 27-52 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Using Map Groups
The to and from values are separated by a colon (:). If traffic with 802.1p bits comes into the switch and
matches a policy that specifies the Map1 action, the bits are remapped according to Group2. If the
incoming 802.1p value is 1 or 2, the value is mapped to 5. If the incoming 802.1p value is 3, the outgoing
value is 3 (the map group does not specify any mapping for a value of 3). If the incoming 802.1p value is
4, the value is mapped to 5. If the incoming 802.1p value is 5 or 6, the value is mapped to 7.
When mapping to a different type of value, however (ToS/DSCP to 802.1p), any values in the incoming
flow that matches the rule but that are not included in the map group is zeroed out. For example, the
following action specifies the same map group but instead specifies mapping 802.1p to ToS:
-> policy action Map2 map tos to 802.1p using Group2
In this case, if ToS traffic comes into the switch and matches a policy that specifies the Map2 action, the
ToS value is mapped according to Group2 if the value is specified in Group2. If the incoming ToS value
is 2, the value is mapped to 5; however, if the incoming value is 3, the switch maps the value to zero
because there is no mapping in Group2 for a value of 3.
Note. Ports on which the flow is mapped must be a trusted port; otherwise the flow is dropped.
The to and from values are separated by a colon (:). For example, a value of 2 is mapped to 5.
Note. Map group configuration is not active until the qos apply command is entered.
The remapping group can then be associated with a rule through the policy action command. In this
example, a policy condition called Traffic has already been configured.
-> policy action tosMap map tos to 802.1p using tosGroup
-> policy rule r3 condition Traffic action tosMap
To delete mapping values from a group, use no and the relevant values:
-> policy map group tosGroup no 1-2:4
The specified values are deleted from the map group at the next qos apply.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-53
Using Map Groups Configuring QoS
To delete a map group, use the no form of the policy map group command. The map group must not be
associated with a policy action. For example:
-> no policy map group tosGroup
If tosGroup is currently associated with an action, an error message similar to the following displays:
ERROR: tosGroup is being used by action 'tosMap'
In this case, remove the map group from the action, then enter the no policy map group command:
-> policy action tosMap no map group
-> no policy map group tosGroup
Note. For Layer 2 flows, you cannot have more than one action that maps DSCP.
page 27-54 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Using Access Control Lists
• Security ACLs—for improving network security. These ACLs utilize specific security features, such as
UserPorts groups to prevent source IP address spoofing, ICMP drop rules and TCP connection rules.
Layer 2 ACLs
Layer 2 filtering filters traffic at the MAC layer. Layer 2 filtering can be done for both bridged and routed
packets. As MAC addresses are learned on the switch, QoS classifies the traffic based on:
• MAC address or MAC group
• Source VLAN
The switch classifies the MAC address as both source and destination.
In this scenario, traffic with a source MAC address of [Link] coming in on VLAN 5 would
match condition Address1, which is a condition for a policy rule called FilterA. FilterA is then applied to
the flow. Since FilterA has an action (BlockTraffic) that is set to deny traffic, the flow would be denied
on the switch.
Note that although this example contains only Layer 2 conditions, it is possible to combine Layer 2 and
Layer 3 conditions in the same policy.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-55
Using Access Control Lists Configuring QoS
2 Define policy conditions for the port group; one condition for each L2 priority (802.1p) value.
3 Define policy actions that stamp the IP traffic with the L2 priority value.
4 Define policy rules using the conditions and actions created in Steps 2 and 3.
For example:
Note. For pure Layer 2 packets, trusted ports retain the 802.1p value of the packet and queue the packets
according to that priority value.
page 27-56 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Using Access Control Lists
Layer 3 ACLs
The QoS software in the switch filters routed and bridged traffic at Layer 3.
For Layer 3 filtering, the QoS software in the switch classifies traffic based on:
• Source IP address or source network group
• IP protocol
• ICMP code
• ICMP type
Traffic with a source IP address of [Link], a source IP port of 23, using protocol 6, matches condition
addr2, which is part of FilterL31. The action for the filter (Block) is set to deny traffic. The flow is
dropped on the switch.
Note that although this example contains only Layer 2 conditions, it is possible to combine Layer 2 and
Layer 3 conditions in the same policy.
In this example, a network group, GroupA, is configured with three IP addresses. Condition cond7
includes GroupA as a destination group. Flows coming into the switch destined for any of the specified IP
addresses in the group matches rule FilterL32. FilterL32 is configured with an action (Ok) to allow the
traffic on the switch.
Note that although this example contains only Layer 2 conditions, it is possible to combine Layer 2 and
Layer 3 conditions in the same policy.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-57
Using Access Control Lists Configuring QoS
IPv6 ACLs
An ACL is considered an IPv6 ACL if the ipv6 keyword and/or any of the following specific policy
condition keywords are used in the ACL to classify/filter IPv6 traffic:
Note that IPv6 ACLs are effected only on IPv6 traffic. All other ACLs/policies with IP conditions that do
not use the IPv6 keyword are effected only on IPv4 traffic. For example:
-> policy condition c1 tos 7
-> policy condition c2 tos 7 ipv6
In the above example, c1 is an IPv4 condition and c2 is an IPv6 condition. ACLs that use c1 are
considered IPv4 policies; ACLs that use c2 are considered IPv6 policies. In addition, consider the
following examples:
-> policy condition c3 source port 1/1/10
-> policy condition c4 source port 1/1/10 ipv6
Condition c3 applies to all traffic ingressing on port 1/10. However, condition c4 applies only to IPv6
traffic ingressing on port 1/1/10.
Note the following when configuring IPv6 ACLs:
• Trusted/untrusted behavior is the same for IPv6 traffic as it is for IPv4 traffic.
• IPv6 policies do not support the use of network groups, service groups, map groups, or MAC groups.
• The default (built-in) network group, “Switch”, only applies to IPv4 interfaces. There is no such group
for IPv6 interfaces.
page 27-58 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Using Access Control Lists
For multicast filtering, the switch classifies traffic based on the multicast IP address or multicast network
group and any destination parameters. Note that the destination parameters are used for the client from
which the switch receives the IGMP request.
The multicast ip or multicast network group keyword is required in the condition configured for a
multicast ACL.
The following keywords can be used in the condition to indicate the client parameters:
If a destination group is specified, the corresponding single value keyword cannot be combined in the
same condition. For example, if a destination port is specified, a destination port group cannot be specified
in the same condition.
To filter multicast clients, specify the multicast IP address, which is the address of the multicast group or
stream, and specify the client IP address, VLAN, MAC address, or chassis/slot/port. For example:
-> qos default multicast disposition deny
-> policy condition Mclient1 multicast ip [Link] destination vlan 5
-> policy action ok disposition accept
-> policy rule Mrule condition Mclient1 action ok
In this example, any traffic coming in on VLAN 5 requesting membership to the [Link] multicast group
is allowed to pass through.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-59
Using Access Control Lists Configuring QoS
always available and active on the switch. Note that ARPs intended for use by a local subnet, AVLAN,
VRRP, and Local Proxy ARP are not discarded.
• ARP ACLs—It is also possible to create an ACL that examines the source IP address in the header of
ARP packets. This is done by specifying the ARP ethertype (0x0806) and source IP address.
Note that the UserPorts group applies to both bridged and routed traffic, and it is not necessary to include
the UserPorts group in a condition and/or rule for the group to take effect. Once ports are designated as
members of this group, IP spoofed traffic is blocked while normal traffic is still allowed on the port.
To specify multiple types of traffic on the same command line, enter each type separated by a space. For
example:
-> qos user-port filter ospf bgp rip
Note that a slot and port is not required with the qos user-port command. This is because the command
applies to all ports that are members of the UserPorts group.
The following qos user-port command example uses the shutdown option to administratively disable the
user port if the specified type of traffic is received on that port:
-> qos user-port shutdown bpdu
Note that an SNMP trap is sent whenever a user port shutdown occurs. To enable a port disabled by a user
port shutdown operation, use the interfaces command to administratively enable the port or disconnect
and reconnect the port cable.
To disable the filter or shutdown function, use the no form of the qos user-port command. For example,
the following command disables the filtering operation for all user ports:
-> qos no user-port filter
Note that any changes to the UserPorts profile (for example, adding or removing a traffic type) are not
made until the qos apply command is performed.
page 27-60 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Using Access Control Lists
Note that the above policy only blocks ICMP echo traffic, all other ICMP traffic is still allowed.
This example ACL policy prevents any TCP connection from being initiated to the [Link] network
and all other IP traffic to the [Link] network. Only TCP connections initiated from the [Link]
network are allowed.
Note that the above example ACL would prevent FTP sessions. See the policy condition established
command page in the OmniSwitch AOS Release 8 CLI Reference Guide for more information.
An ACL can also be defined using the tcpflags parameter to examine and qualify specific TCP flags
individually or in combination with other flags. This parameter can be used to prevent specific DOS
attacks, such as the christmas tree.
The following example use the tcpflags condition parameter to determine if the F (fin) and S (syn) TCP
flag bits are set to one and the A (ack) bit is set to zero:
-> policy condition c1 tcpflags all f s mask f s a
In this example, a match must occur on all the flags or the packet is not allowed. If the optional command
keyword any was used, then a match need only occur on any one of the flags. For example, the following
condition specifies that either the A (ack) bit or the R (rst) bit must equal one:
-> policy condition c1 tcpflags any a r mask a r
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-61
Using Access Control Lists Configuring QoS
Note that if a flag is specified on the command line after the any or all keyword, then the match value is
one. If the flag only appears as part of the mask, then the match value is zero. See the policy condition
tcpflags command page in the OmniSwitch AOS Release 8 CLI Reference Guide for more information.
page 27-62 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Applying the Configuration
The qos apply command must be included in an ASCII text configuration file when QoS commands are
included. The command must be included after the last QoS command.
When the configuration is not yet applied, it is referred to as the pending configuration.
Global Commands. Many global QoS commands are active immediately on the switch without qos
apply. The settings configured by these commands become active immediately. Other global commands
must specifically be applied. The commands are listed in the following table:
Port and Policy Commands. All port parameters and policy parameters must be applied with the qos
apply command.
The pending configuration is useful for reviewing policy rules before actually applying them to the switch.
Applied policy rules can also be administratively disabled (inactive). If a rule is administratively disabled,
the rule exists in the applied configuration but does not be used to classify flows. For more information
about disabling/re-enabling a policy rule, see “Creating Policy Rules” on page 27-39.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-63
Applying the Configuration Configuring QoS
This command ignores any pending policies (any additions, modifications, or deletions to the policy
configuration since the last qos apply) and writes the last applied policies to the pending configuration. At
this point, the pending policies are the same as the last applied policies.
In this example, there are two new pending policies and three applied policies:
In this scenario, you can do one of two things. To write the applied policies back to the pending
configuration, use qos revert. Or, to delete all policy rule configuration, enter qos apply. If qos apply is
entered, the empty set of pending policies are written to the applied policies and all policy rule
configuration is deleted.
page 27-64 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Applying the Configuration
show policy condition Displays information about all pending and applied policy conditions or
a particular policy condition configured on the switch. Use the applied
keyword to display information about applied conditions only.
show policy action Displays information about all pending and applied policy actions or a
particular policy action configured on the switch. Use the applied
keyword to display information about applied actions only.
show policy rule Displays information about all pending and applied policy rules or a
particular policy rule. Use the applied keyword to display information
about applied rules only.
show policy network group Displays information about all pending and applied policy network
groups or a particular network group. Use the applied keyword to
display information about applied groups only.
show policy service Displays information about all pending and applied policy services or a
particular policy service configured on the switch. Use the applied
keyword to display information about applied services only.
show policy service group Displays information about all pending and applied policy service
groups or a particular service group. Use the applied keyword to display
information about applied groups only.
show policy mac group Displays information about all pending and applied MAC groups or a
particular policy MAC group configured on the switch. Use the applied
keyword to display information about applied groups only.
show policy port group Displays information about all pending and applied policy port groups
or a particular port group. Use the applied keyword to display
information about applied groups only.
show policy map group Displays information about all pending and applied policy map groups
or a particular map group. Use the applied keyword to display
information about applied groups only.
For more information about these commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-65
Policy Applications Configuring QoS
Policy Applications
Policies are used to classify incoming flows and treat the relevant outgoing flows. There are many ways to
classify the traffic and many ways to apply QoS parameters to the traffic.
Classifying traffic can be as simple as identifying a Layer 2 or Layer 3 address of an incoming flow.
Treating the traffic might involve prioritizing the traffic or rewriting an IP address. How the traffic is
treated (the action in the policy rule) typically defines the type of policy:
This section describes how to configure basic QoS policies and 802.1p/ToS/DSCP marking and mapping
policies. Policies used for Layer 2 and Layer 3/4 filters, are commonly referred to as Access Control Lists
(ACLs). Filtering is discussed in Chapter 27, “Configuring QoS.”
Policies can also be used for prioritizing traffic in dynamic link aggregation groups. For more information
about dynamic link aggregates, see Chapter 10, “Configuring Dynamic Link Aggregation.”
Note. If multiple addresses, services, or ports must be given the same priority, use a policy condition group
to specify the group and associate the group with the condition. See “Using Condition Groups in Policies”
on page 27-45 for more information about groups.
page 27-66 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Policy Applications
Note that some condition parameters can be used in combination only under particular circumstances;
also, there are restrictions on condition/action parameter combinations. See “Policy Conditions” on
page 27-23 and “Policy Actions” on page 27-24.
Basic Commands
The following policy action commands are used for traffic prioritization or policing (rate limiting):
policy action priority
policy action maximum bandwidth
policy action maximum depth
To set up traffic prioritization and/or bandwidth policing, follow the steps in the next section. For more
information about command syntax and options, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Note that QoS ports can also be configured for bandwidth shaping through the qos port maximum
ingress-bandwidth and qos port maximum egress-bandwidth commands.
OmniSwitch
Network 1 Any
[Link] Network
priority applied
To create a policy rule to prioritize the traffic from Network 1, first create a condition for the traffic that
you want to prioritize. In this example, the condition is called ip_traffic. Then create an action to
prioritize the traffic as highest priority. In this example, the action is called high. Combine the condition
and the action into a policy rule called rule1.
-> policy condition ip_traffic source ip [Link] mask [Link]
-> policy action high priority 7
-> policy rule rule1 condition ip_traffic action high
The rule is not active on the switch until the qos apply command is entered on the command line. When
the rule is activated, any flows coming into the switch from [Link] is given the highest priority.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-67
Policy Applications Configuring QoS
Note that the bandwidth can be specified in abbreviated units, in this case, 1k. The rule is not active on the
switch until the qos apply command is entered.
Redirection Policies
A redirection policy sends traffic that matches the policy to a specific port or link aggregate instead of the
originally intended destination. This type of policy can use any condition; the policy action determines
which port or link aggregate to which the traffic is sent.
The following policy action commands are used for port and link aggregate redirection:
policy action redirect port
policy action redirect linkagg
Note the following regarding the use and configuration of redirection policies:
• Redirection policies apply to both bridged and routed traffic.
• When redirecting routed traffic from VLAN A to VLAN B, the redirect port or link aggregate ID must
belong to VLAN B (tagged or default VLAN).
• Routed packets (from VLAN A to VLAN B) are not modified after they are redirected; the source and
MAC address remain the same. In addition, if the redirect port or link aggregate ID is tagged, the
redirected packets have a tag from the ingress VLAN A.
• If a route exists for the redirected flow, then redirected packets are the final post-routing packets.
• If a route does not exist for the redirected flow, the flow is not redirected to the specified port or link
aggregate ID and is “blackholed”. As soon as a route is available, the flow is then redirected as
specified in the policy.
• In most cases, a redirected flow does not trigger an update to the routing and ARP tables. When the
ARP table is cleared or timed out, port/link aggregate redirection cease until the ARP table is refreshed.
If necessary, create a static route for the flow or assign the redirect port or link aggregate ID to the
ingress VLAN (VLAN A) to send packets to the redirect port until a route is available.
• When redirecting bridged traffic on VLAN A, the redirect port or link aggregate ID must belong to
VLAN A (tagged or default VLAN).
In the following example, flows destined for UDP port 80 is redirected to switch port 3/2:
-> policy condition L4PORTCOND destination udp port 80
-> policy action REDIRECTPORT redirect port 1/3/2
-> policy rule L4PORTRULE condition L4PORTCOND action REDIRECTPORT
In the following example, flows destined for IP address [Link] are redirected to link aggregate 10:
-> policy condition L4LACOND destination IP [Link]
-> policy action REDIRECTLA redirect linkagg 10
-> policy rule L4LARULE condition L4LACOND action REDIRECTLA
Note that in both examples above, the rules are not active on the switch until the qos apply command is
entered on the command line.
page 27-68 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Policy Applications
When the above rule is activated, any flows coming into the switch from source IP address [Link]
are mirrored to port 1/1/10. It is also possible to combine the MTP action with other actions. For example:
-> policy condition c1 source ip [Link]
-> policy action a1 mirror ingress 1/1/10 disposition drop
-> policy rule r1 condition c1 action a1
-> qos apply
This policy rule example combines the MTP action with the drop action. As a result, this rule drops
ingress traffic with a source IP of [Link], but the mirrored traffic from this source is not dropped
and is forwarded to port 1/1/10.
Note the following regarding the use and configuration of mirroring policies:
• Only one policy-based MTP session is supported at any given time. As a result, all mirroring policies
must specify the same destination port.
• In addition to one policy-based MTP session, the switch can support one port-based mirroring session,
one remote port mirroring session, and one port monitoring session all running at the same time.
• Policy based mirroring and the port-based mirroring feature can run simultaneously on the same port.
• Rule precedence is applied to all mirroring policies that are configured for the same switch ASIC. If
traffic matches a mirror rule on one ASIC with a lower precedence than a non-mirroring rule on a
different ASIC, the traffic is mirrored in addition to the actions specified by the higher precedence rule.
This policy (icmpRule) drops all ICMP traffic. To limit the dropped traffic to ICMP echo requests (pings)
and/or replies, use the policy condition icmptype to specify the appropriate condition. For example,
-> policy condition echo icmptype 8
-> policy condition reply icmptype 0
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-69
Policy Applications Configuring QoS
In the next example, the policy map group command specifies a group of values that must be mapped; the
policy action map command specifies what must be mapped (802.1p to 802.1p, ToS/DSCP to 802.1p) and
the mapping group that must be used. For more details about creating map groups, see “Creating Map
Groups” on page 27-53.
Here, traffic from two different subnets must be mapped to 802.1p values in a network called Network C.
A map group (tosGroup) is created with mapping values.
-> policy map group tos_group 1-4:4 5-7:7
-> policy condition SubnetA source ip [Link] mask [Link]
-> policy condition SubnetB source ip [Link] mask [Link]
-> policy action map_action map tos to 802.1p using tos_group
The map_action specifies that ToS values is mapped to 802.1p with the values specified in tos_group.
With these conditions and action set up, two policy rules can be configured for mapping Subnet A and
Subnet B to the ToS network:
-> policy rule RuleA condition SubnetA action map_action
-> policy rule RuleB condition SubnetB action map_action
page 27-70 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Policy Applications
Subnet A
[Link] OmniSwitch
Network C
Mapping
policy
Subnet B
[Link]
Mapping Application
Note. Note. When a PBR QoS rule is applied to the configuration, it is applied to the entire switch, unless
you specify a built-in port group in the policy condition.
Policy Based Routing can be used to redirect traffic to a particular gateway based on source or destination
IP address, source or destination network group, source or destination TCP/UDP port, a service or service
group, IP protocol, or built-in source port group.
Traffic can be redirected to a particular gateway regardless of what routes are listed in the routing table.
Note that the gateway address does not have to be on a directly connected VLAN; the address can be on
any network that is learned by the switch.
Note. Note. the routing table has a default route of [Link], traffic matching a PBR policy is redirected to
the route specified in the policy. For information about viewing the routing table, see Chapter 16,
“Configuring IP.”
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-71
Policy Applications Configuring QoS
Policy Based Routing can be used to redirect untrusted traffic to a firewall. In this case, note that reply
packets are not allowed back through the firewall.
[Link]
[Link]
[Link]
Firewall
[Link]
[Link]
OmniSwitch
In this example, all traffic originating in the 10.3 network is routed through the firewall, regardless of
whether or not a route exists.
-> policy condition Traffic3 source ip [Link] mask [Link]
-> policy action Firewall permanent gateway ip [Link]
-> policy rule Redirect_All condition Traffic3 action Firewall
Note that the functionality of the firewall is important. In the example, the firewall is sending the traffic to
be routed remotely. If you instead set up a firewall to send the traffic back to the switch to be routed, you
must set up the policy condition with a built-in source port group so that traffic coming back from the
firewall does not get looped and sent back out to the firewall. For example:
[Link]
[Link]
[Link]
Firewall
[Link]
[Link]
OmniSwitch
In this scenario, traffic from the firewall is sent back to the switch to be re-routed. But because the traffic
re-enters the switch through a port that is not in the Slot01 port group, the traffic does not match the
Redirect_All policy and is routed normally through the switch.
page 27-72 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring QoS Policy Applications
-> policy condition Traffic3 source ip [Link] mask [Link] source port
group Slot01
-> policy action Firewall permanent gateway ip [Link]
-> policy rule Redirect_All condition Traffic3 action Firewall
Make sure to enter the qos apply command to activate the policy rule on the switch. Otherwise the rule is
saved as part of the pending configuration, but is not active.
Non-Contiguous Masks
Non-contiguous masks expand the accepted inputs for the Access Control List (ACL) netmask to facilitate
load distribution through Policy Based Routing (PBR). The feature allows masks consisting of any
combination of zeros (0) and ones (1). Previously only traditional netmasks were supported and only
allowed up to eight bits of zeros to be sparsely distributed in the mask. Traditional netmasks begin with
ones followed by a contiguous sequence of zeros (for example, [Link]). The non-contiguous mask
feature supports IPv4 and IPv6 address masks in policy condition statements that contain any sequence of
zeros and ones.
The following example illustrates how ACLs can be used to select a subset of the source IP address to be
matched and then routed to various gateway-IP addresses using conditions, actions, and rules. The next-
hop gateway-IP address must be on a subnet that the router has a directly connected interface for.
! route 1,9,17,33,(1+(n*8))
-> policy condition c2 source ip [Link] mask [Link]
-> policy action a2 permanent gateway-ip [Link]
-> policy rule r2 condition c2 action a2
! route 2,10,18,34,(2+(n*8))
-> policy condition c3 source ip [Link] mask [Link]
-> policy action a3 permanent gateway-ip [Link]
-> policy rule r3 condition c3 action a3
! route 3,11,19,35,(3+(n*8))
-> policy condition c4 source ip [Link] mask [Link]
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 27-73
Policy Applications Configuring QoS
! route 4,12,20,36,(4+(n*8))
-> policy condition c5 source ip [Link] mask [Link]
-> policy action a5 permanent gateway-ip [Link]
-> policy rule r5 condition c5 action a5
! route 5,13,21,37,(5+(n*8))
-> policy condition c6 source ip [Link] mask [Link]
-> policy action a6 permanent gateway-ip [Link]
-> policy rule r6 condition c6 action a6
! route 6,14,22,38,(6+(n*8))
-> policy condition c7 source ip [Link] mask [Link]
-> policy action a7 permanent gateway-ip [Link]
-> policy rule r7 condition c7 action a7
! route 7,15,23,39,(7+(n*8))
-> policy condition c8 source ip [Link] mask [Link]
-> policy action a8 permanent gateway-ip [Link]
-> policy rule r8 condition c8 action a8
-> qos apply
Note the following regarding the use and configuration of IPv4 non-contiguous masks.
• Automatic resolution through Address Resolution Protocol (ARP) for next-hop (permanent gateway-
IP) addresses is not supported if a mask contains more than 8-bits of non-contiguous zeros. As a result,
other mechanisms have to be used to resolve the MAC addresses such as server load balancing ping
probing or static ARP entries.
• A Server Load Balancing (SLB) configuration can be used to probe IPv4 addresses. This allows for
dynamic resolution of the IPv4 next hop policy based route. For example:
-> vlan 14 admin-state enable
-> vlan 14 members port 1/1/14 untagged
-> ip interface "v4_v14" vlan 14 admin-state enable
-> ip address [Link]
-> ip slb cluster pbr_servers vip [Link]
-> ip slb server ip [Link] cluster pbr_servers
-> ip slb server ip [Link] cluster pbr_servers
-> ip slb server ip [Link] cluster pbr_servers
-> ip slb server ip [Link] cluster pbr_servers
-> ip slb server ip [Link] cluster pbr_servers
-> ip slb server ip [Link] cluster pbr_servers
-> ip slb server ip [Link] cluster pbr_servers
-> ip slb server ip [Link] cluster pbr_servers
page 27-74 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
28 Managing Policy
Servers
Quality of Service (QoS) policies that are configured through Alcatel-Lucent’s PolicyView network
management application are stored on a Lightweight Directory Access Protocol (LDAP) server.
PolicyView is an OmniVista application that runs on an attached workstation.
In This Chapter
This chapter describes how LDAP directory servers are used with the switch for policy management.
There is no required configuration on the switch. When policies are created on the directory server through
PolicyView, the PolicyView application automatically configures the switch to communicate with the
server. This chapter includes information about modifying configuration parameters through the
Command Line Interface (CLI) if manual reconfiguration is necessary. For more details about the syntax
of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
Throughout this chapter the term policy server is used to refer to LDAP directory servers used to store
policies. Procedures described in this chapter include:
• “Installing the LDAP Policy Server” on page 28-3
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 28-1
Policy Server Specifications Managing Policy Servers
page 28-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Policy Servers Policy Server Overview
Note. The switch has separate mechanisms for managing QoS policies stored on an LDAP server and QoS
policies configured directly on the switch. For more information about creating policies directly on the
switch, see Chapter 27, “Configuring QoS.”
Information about installing the LDAP policy server is included in this chapter. Consult the server
manufacturer documentation for detailed information about configuring the server.
OmniSwitch
PolicyView workstation
IP traffic;
voice and video
traffic
LDAP server
See your server documentation for additional details on setting up the server.
See the next sections of this chapter for information about modifying policy server parameters or viewing
information about policy servers.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 28-3
Modifying Policy Servers Managing Policy Servers
Note. SSL configuration must be done manually through the policy server command.
For information about policy server parameter defaults, see “Policy Server Defaults” on page 28-2.
In this example, an LDAP server with an IP address of [Link] is not used to download policies. Any
policies already downloaded to the switch are not affected by disabling the server.
To re-enable the server, specify enable.
-> policy server [Link] admin-state enable
If the policy server is not created on the default port, the no form of the command must include the port
number. For example:
-> no policy server [Link] 5000
page 28-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Policy Servers Modifying Policy Servers
Note that the port number must match the port number configured on the policy server.
If the port number is modified, any existing entry for that policy server is not removed. Another entry is
simply added to the policy server table.
Note. If you enable SSL, the port number is automatically set to 636. (This does not create another entry in
the port table.)
For example, if you configure a policy server with port 389 (the default), and then configure another
policy server with the same IP address but port number 5000, two entries display on the show policy
server screen.
-> policy server [Link]
-> policy server [Link] port number 5000
-> show policy server
To remove an entry, use the no form of the policy server command. For example:
-> no policy server [Link] port number 389
If this command is entered, a user with a username of kandinsky and a password of blue is able to access
the LDAP server to modify parameters on the server itself.
Note that the search-base path must be a valid path in the server directory structure.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 28-5
Modifying Policy Servers Managing Policy Servers
SSL is now enabled between the specified server and the switch. The port number in the switch
configuration is automatically set to 636, which is the port number typically used for SSL; however, the
port number must be configured with whatever port number is set on the server. For information about
configuring the port number, see “Modifying the Port Number” on page 28-5.
To disable SSL, use no ssl with the command:
-> policy server [Link] no ssl
SSL is disabled for the [Link] policy server. No additional policies can be saved to the directory server
from the PolicyView application.
Use the show policy server long command to display the last load time. For example:
-> show policy server long
LDAP server 0
IP address : [Link],
TCP port : 16652,
Enabled : Yes,
Operational Status : Down,
Preference : 99,
Authentication : password,
SSL : Disabled,
login DN : cn=DirMgr
searchbase : o=company
Last load time : 02/14/12 [Link]
page 28-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Policy Servers Verifying the Policy Server Configuration
Note. If polices are applied from PolicyView or vice versa, it activates all current configuration.
For more information about configuring policies through the CLI, see Chapter 27, “Configuring QoS.”
show policy server Displays information about servers from which policies can be
downloaded to the switch.
show policy server long Displays detailed information about an LDAP policy server.
show policy server statistics Displays statistics about policy directory servers.
show policy server rules Displays the names of policies originating on a directory server that
have been downloaded to the switch.
show policy server events Displays any events related to a directory server.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 28-7
Verifying the Policy Server Configuration Managing Policy Servers
page 28-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
29 Managing Authentication
Servers
This chapter describes authentication servers and how they are used with the switch. The types of servers
described include Remote Authentication Dial-In User Service (RADIUS), Lightweight Directory Access
Protocol (LDAP), Terminal Access Controller Access Control System (TACACS+), and SecurID ACE/
Server.
In This Chapter
The chapter includes some information about attributes that must be configured on the servers, but it
primarily addresses configuring the switch through the Command Line Interface (CLI) to communicate
with the servers to retrieve authentication information about users.
Configuration procedures described include:
• Configuring a RADIUS Server. This procedure is described in “RADIUS Servers” on page 29-7.
• Configuring a TACACS+ Server. This procedure is described in “TACACS+ Server” on page 29-12.
• Configuring an LDAP Server. This procedure is described in “LDAP Servers” on page 29-14.
For information about using servers for authenticating users to manage the switch, see the “Switch
Security” chapter in the OmniSwitch AOS Release 8 Switch Management Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-1
Authentication Server Specifications Managing Authentication Servers
page 29-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Authentication Servers Server Defaults
Server Defaults
The defaults for authentication server configuration on the switch are listed in the tables in the next
sections.
* The port defaults are based on the older RADIUS standards; some servers are set up with port numbers
based on the newer standards (ports 1812 and 1813, respectively).
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-3
Quick Steps For Configuring Authentication Servers Managing Authentication Servers
Note. (Optional) Verify the server configuration by entering the show aaa server command. For example:
-> show aaa server
Server name = rad1
Server type = RADIUS,
IP Address 1 = [Link],
IP Address 2 = [Link]
Retry number = 3,
Timeout (in sec) = 2,
Authentication port = 1645,
Accounting port = 1646
Server name = ldap2
Server type = LDAP,
IP Address 1 = [Link],
Port = 389,
Domain name = cn=manager,
Search base = c=us,
Retry number = 3,
Timeout (in sec) = 2,
Server name = Tacacs1
ServerIp = [Link]
ServerPort = 49
Encryption = MD5
Timeout = 5 seconds
Status = UP
See the CLI Reference Guide for information about the fields in this display.
3 If you are using ACE/Server, there is no required switch configuration; however, you must FTP the
[Link] file from the server to the /network directory of the switch.
4 Configure authentication on the switch. This step is described in other chapters. For a quick overview
of using the configured authentication servers with Authenticated Switch Access, see the OmniSwitch AOS
Release 8 Switch Management Guide.
page 29-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Authentication Servers Server Overview
Server Overview
Authentication servers are sometimes referred to as AAA servers (authentication, authorization, and
accounting). These servers are used for storing information about users who want to manage the switch
(Authenticated Switch Access) and users who need access to a particular VLAN or VLANs
(Authenticated VLANs).
RADIUS, TACACS +, or LDAP servers can be used for Authenticated Switch Access and/or
Authenticated VLANs. Another type of server, SecurID ACE/Server, can be used for authenticated switch
access only; the ACE/Server is an authentication-only server (no authorization or accounting). Only
RADIUS servers are supported for 802.1X Port-based Network Access Control.
The following table describes how each type of server can be used with the switch:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-5
Server Overview Managing Authentication Servers
A RADIUS server supporting the challenge and response mechanism as defined in RADIUS RFC 2865
can access an ACE/Server for authentication purposes. The ACE/Server is then used for user
authentication, and the RADIUS server is used for user authorization.
user
The switch polls the server The switch polls the server OmniSwitch 6648
privileges
and receives login and privi- for login information, and
lege information about the OmniSwitch checks the switch for privi- OmniSwitch
user. lege information.
page 29-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Authentication Servers RADIUS Servers
RADIUS Servers
RADIUS is a standard authentication and accounting protocol defined in RFC 2865 and RFC 2866. A
built-in RADIUS client is available in the switch. A RADIUS server that supports Vendor Specific
Attributes (VSAs) is required. The Alcatel-Lucent attributes can include VLAN information, time-of-day,
or slot/port restrictions.
Standard Attributes
The following tables list RADIUS server attributes 1–39 and 60–63, their descriptions, and whether the
Alcatel-Lucent RADIUS client in the switch supports them. Attribute 26 is for vendor-specific
information and is discussed in “Vendor-Specific Attributes for RADIUS” on page 29-9. Attributes
40–59 are used for RADIUS accounting servers and are listed in “RADIUS Accounting Server Attributes”
on page 29-10.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-7
RADIUS Servers Managing Authentication Servers
page 29-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Authentication Servers RADIUS Servers
The Alcatel-Lucent-Auth-Group attribute is used for Ethernet II only. If a different protocol, or more than
one protocol is required, use the Alcatel-Lucent-Auth-Group-Protocol attribute instead. For example:
Alcatel-Lucent-Auth-Group-Protocol 23: IP_E2 IP_SNAP
Alcatel-Lucent-Auth-Group-Protocol 24: IPX_E2
In this example, authenticated users on VLAN 23 can use Ethernet II or SNAP encapsulation.
Authenticated users on VLAN 24 can use IPX with Ethernet II.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-9
RADIUS Servers Managing Authentication Servers
page 29-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Authentication Servers RADIUS Servers
The following table lists the VSAs supported for RADIUS accounting servers. The attributes in the
[Link] file can be modified if necessary.
When creating a new server, at least one host name or IP address (specified by the host keyword) is
required as well as the shared secret (specified by the key keyword).
In this example, the server name is rad1, the host address is [Link], the backup address is [Link],
and the shared secret is amadeus. Note that the shared secret must be configured exactly the same as on
the server.
-> aaa radius-server rad1 host [Link] [Link] key amadeus
To modify a RADIUS server, enter the server name and the desired parameter to be modified.
-> aaa radius-server rad1 key mozart
If you are modifying the server and have just entered the aaa radius-server command to create or modify
the server, you can use command prefix recognition. For example:
-> aaa radius-server rad1 retransmit 5
-> timeout 5
For information about server defaults, see “Server Defaults” on page 29-3.
To remove a RADIUS server, use the no form of the command:
-> no aaa radius-server rad1
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-11
TACACS+ Server Managing Authentication Servers
TACACS+ Server
Terminal Access Controller Access Control System (TACACS+) is a standard authentication and
accounting protocol defined in RFC 1321 that employs TCP for reliable transport. A built-in TACACS+
client is available in the switch. A TACACS+ server allows access control for routers, network access
servers, and other networked devices through one or more centralized servers. The protocol also allows
separate authentication, authorization, and accounting services. By allowing arbitrary length and content
authentication exchanges, it allows clients to use any authentication mechanism.
The TACACS+ client offers the ability to configure multiple TACACS+ servers. This can be done by the
user. When the primary server fails, the client tries the subsequent servers. Multiple server configurations
are applicable only for backup and not for server chaining.
In the TACACS+ protocol, the client queries the TACACS+ server by sending TACACS+ requests. The
server responds with reply packets indicating the status of the request.
• Authentication. TACACS+ protocol provides authentication between the client and the server. It also
ensures confidentiality because all the exchanges are encrypted. The protocol supports fixed
passwords, one-time passwords, and challenge-response queries. Authentication is not a mandatory
feature, and it can be enabled without authorization and accounting. During authentication if a user is
not found on the primary TACACS+ server, the authentication fails. The client does not try to
authenticate with the other servers in a multiple server configuration. If the authentication succeeds,
then Authorization is performed.
• Authorization. Enabling authorization determines if the user has the authority to execute a specified
command. TACACS+ authorization cannot be enabled independently. The TACACS+ authorization is
enabled automatically when the TACACS+ authentication is enabled.
• Accounting. The process of recording what the user is attempting to do or what the user has done is
Accounting. The TACACS+ accounting must be enabled on the switches for accounting to succeed.
Accounting can be enabled irrespective of authentication and authorization. TACACS+ supports three
types of accounting:
Start Records—Indicate the service is about to begin.
Stop Records—Indicates the services has just terminated.
Update Records—Indicates the services are still being performed.
• Authentication and Authorization are combined together and cannot be performed independently.
• On the fly, command authorization is not supported. Authorization is similar to the AOS partition
management families.
• Only inbound ASCII logins are supported.
page 29-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Authentication Servers TACACS+ Server
When creating a new server, at least one host name or IP address (specified by the host keyword) is
required as well as the shared secret (specified by the key keyword).
In this example, the server name is tac1, the host address is [Link], the backup address is [Link], and
the shared secret is otna. Note that the shared secret must be configured exactly the same as on the server.
-> aaa tacacs+-server tac1 host [Link] [Link] key otna
To modify a TACACS+ server, enter the server name and the desired parameter to be modified.
-> aaa tacacs+-server tac1 key tnemelc
If you are modifying the server and have just entered the aaa tacacs+-server command to create or
modify the server, you can use command prefix recognition. For example:
-> aaa tacacs+-server tac1 timeout 5
For information about server defaults, see “Server Defaults” on page 29-3.
To remove a TACACS+ server, use the no form of the command:
-> no aaa tacacs+-server tac1
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-13
LDAP Servers Managing Authentication Servers
LDAP Servers
Lightweight Directory Access Protocol (LDAP) is a standard directory server protocol. The LDAP client
in the switch is based on several RFCs: 1798, 2247, 2251, 2252, 2253, 2254, 2255, and 2256. The
protocol was developed as a way to use directory services over TCP/IP and to simplify the directory access
protocol (DAP) defined as part of the Open Systems Interconnection (OSI) effort. Originally it was a
front-end for X.500 DAP.
The protocol synchronizes and governs the communications between the LDAP client and the LDAP
server. The protocol also dictates how its databases of information, which are normally stored in
hierarchical form, are searched, from the root directory down to distinct entries.
In addition, LDAP has its own format that permits LDAP-enabled Web browsers to perform directory
searches over TCP/IP.
2 Copy the relevant schema LDIF files from the Alcatel-Lucent software CD to the configuration
directory on the server. (Each server type has a command line tool or a GUI tool for importing LDIF files.)
Database LDIF files can also be copied and used as templates. The schema files and the database files are
specific to the server type. The files available on the Alcatel-Lucent software CD include the following:
aaa_schema.[Link]
aaa_schema.[Link]
aaa_schema.[Link]
aaa_schema.[Link]
aaa_schema.[Link]
aaa_database.[Link]
aaa_database.[Link]
aaa_database.[Link]
aaa_database.[Link]
aaa_database.[Link]
3 After the server files have been imported, restart the server.
Information in the server files must match information configured on the switch through the
aaa ldap-server command. For example, the port number configured on the server must be the same as
the port number configured on the switch. See “Configuring the LDAP Authentication Client” on
page 29-25 for information about using this command.
page 29-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Authentication Servers LDAP Servers
entries definition
dn: <distinguished name> Defines the DN (required).
objectClass: top Defines top object class (at least one is required). Object
class defines the list of attributes required and allowed in
directory server entries.
objectClass: organizationalUnit Specifies that organizational unit must be part of the object
class.
ou: <organizationalUnit name> Defines the name of the organizational unit.
<list of attritbutes> Defines the list of optional entry attributes.
Common Entries
The most common LDIF entries describe people in companies and organizations. The structure for such an
entry might look like the following:
dn: <distinguished name>
objectClass: top
objectClass: person
objectClass: organizational Person
cn: <common name>
sn: <surname>
<list of optional attributes>
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-15
LDAP Servers Managing Authentication Servers
This is how the entry would appear with actual data in it.
dn: uid=yname, ou=people, o=yourcompany
objectClass: top
objectClass: person
objectClass: organizational Person
cn: your name
sn: last name
givenname: first name
uid: yname
ou: people
description:
<list of optional attributes>
...
Directory Entries
Directory entries are used to store data in directory servers. LDAP–enabled directory entries contain
information about an object (person, place, or thing) in the form of a Distinguished Name (DN) that must
be created in compliance with the LDAP protocol naming conventions.
Distinguished names are constructed from Relative Distinguished Names (RDNs), related entries that
share no more than one attribute value with a DN. RDNs are the components of DNs, and DNs are string
representations of entry names in directory servers.
Distinguished names typically consist of descriptive information about the entries they name, and
frequently include the full names of individuals in a network, their email addresses, TCP/IP addresses,
with related attributes such as a department name, used to further distinguish the DN. Entries include one
or more object classes, and often a number of attributes that are defined by values.
Object classes define all required and optional attributes (a set of object classes is referred to as a
“schema”). As a minimum, every entry must include the DN and one defined object class, like the name of
an organization. Attributes required by a particular object class must also be defined. Some commonly
used attributes that comprise a DN include the following:
Country (c), State or Province (st), Locality (l),
Organization (o), Organization Unit (ou),
and Common Name (cn)
Although each attribute would necessarily have its own values, the attribute syntax determines what kind
of values are allowed for a particular attribute, for example, (c=US), where country is the attribute and US
is the value. Extra consideration for attribute language codes is required if entries are made in more than
one language.
Entries are usually based on physical locations and established policies in a Directory Information Tree
(DIT); the DN locates an entry in the hierarchy of the tree. Alias entries pointing to other entries can also
be used to circumvent the hierarchy during searches for entries.
Once a directory is set up, DN attributes must thereafter be specified in the same order to keep the
directory paths consistent. DN attributes are separated by commas as shown in this example:
cn=your name, ou=your function, o= your company, c=US
As there are other conventions used, please refer to the appropriate RFC specification for further details.
page 29-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Authentication Servers LDAP Servers
In addition to managing attributes in directory entries, LDAP makes the descriptive information stored in
the entries accessible to other applications. The general structure of entries in a directory tree is shown in
the following illustration. It also includes example entries at various branches in the tree.
ROOT
dn=c=US
c=Canada c=US
dn=o=your company,c=US
Directory Searches
DNs are always the starting point for searches unless indicated otherwise in the directory schema.
Searches involve the use of various criteria including scopes and filters which must be predefined, and
utility routines, such as Sort. Searches must be limited in scope to specific durations and areas of the
directory. Some other parameters used to control LDAP searches include the size of the search and
whether to include attributes associated with name searches.
Base objects and scopes are specified in the searches, and indicate where to search in the directory. Filters
are used to specify entries to select in a given scope. The filters are used to test the existence of object
class attributes, and enable LDAP to emulate a “read” of entry listings during the searches. All search
preferences are implemented by means of a filter in the search. Filtered searches are based on some
component of the DN.
Directory Modifications
Modifications to directory entries contain changes to DN entry attribute values, and are submitted to the
server by an LDAP client application. The LDAP-enabled directory server uses the DNs to find the entries
to either add or modify their attribute values.
Attributes are automatically created for requests to add values if the attributes are not already contained in
the entries.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-17
LDAP Servers Managing Authentication Servers
All attributes are automatically deleted when requests to delete the last value of an attribute are submitted.
Attributes can also be deleted by specifying delete value operations without attaching any values.
Modified attribute values are replaced with other given values by submitting replace requests to the server,
which then translates and performs the requests.
components description
<ldap> Specifies TCP/IP connection for LDAP protocol. (The <ldaps>
prefix specifies SSL connection for LDAP protocol.)
<hostname> Host name of directory server or computer, or its IP address (in dot-
ted decimal format).
<port> TCP/IP port number for directory server. If using TCP/IP and
default port number (389), port need not be specified in the URL.
SSL port number for directory server (default is 636).
page 29-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Authentication Servers LDAP Servers
components description
<base_dn> DN of directory entry where search is initiated.
<attributes> Attributes to be returned for entry search results. All attributes are
returned if search attributes are not specified.
<scope> Different results are retrieved depending on the scopes associated
with entry searches.
• Change Password
• Password History
• Account Lockout
• LDAP Error Messages (for example, Invalid Username/Password, Server Data Error, etc.)
For instructions on installing LDAP-enabled directory servers, refer to the vendor-specific instructions.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-19
LDAP Servers Managing Authentication Servers
Note. Server schema extensions must be configured before the aaa ldap-server command is configured.
attribute description
bop-asa-func-priv-read-1 Read privileges for the user.
bop-asa-func-priv-read-2 Read privileges for the user.
bop-asa-func-priv-write-1 Write privileges for the user.
bop-asa-func-priv-write-2 Write privileges for the user.
bop-asa-allowed-access Whether the user has access to configure the switch.
bop-asa-snmp-level-security Whether the user can have SNMP access, and the
type of SNMP protocol used.
bop-shakey A key computed from the user password with the
alp2key tool.
bop-md5key A key computed from the user password with the
alp2key tool.
allowedtime The periods of time the user is allowed to log into the
switch.
switchgroups The VLAN ID and protocol (IP_E2, IP_SNAP, IPX-
_E2, IPX_NOV, IPX_LLC, IPX_SNAP).
page 29-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Authentication Servers LDAP Servers
LDAP snmp-
Level Definition
level-security
no 1 No SNMP access allowed
no auth 2 SNMP access allowed without any SNMP authentication and
encryption
sha 3 SHA authentication algorithm needed for authenticating SNMP
md5 4 MD5 authentication algorithm needed for authenticating SNMP
sha+des 5 SHA authentication algorithm and DES encryption needed for
authentication SNMP
md5+des 6 MD5 authentication algorithm and DES encryption needed for
authentication SNMP
For more information about configuring users on the switch, see the Switch Security chapter of the
OmniSwitch AOS Release 8 Switch Management Guide.
An example using the alp2key tool to compute the SHA and MD5 keys for mypassword:
ors40595{}128: alp2key mypassword
bop-shakey: 0xb1112e3472ae836ec2b4d3f453023b9853d9d07c
bop-md5key: 0xeb3ad6ba929441a0ff64083d021c07f1
ors40595{}129:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-21
LDAP Servers Managing Authentication Servers
Note. The bop-shakey and bop-md5key values must be recomputed and copied to the server any time a
user password is changed.
AccountStartTime
User account start times are tracked in the AccountStartTime attribute of the directory entry of the user
that keeps the time stamp and accounting information of user log-ins. The following fields (separated by
carriage returns “|”) are contained in the Login log. Some fields are only used for Layer 2 Authentication.
Fields Included For Any Type of Authentication
• User account ID or username client entered to log-in: variable length digits.
• Switch VLAN number client joins in multiple authority mode (0=single authority; 2=multiple author-
ity); variable-length digits.
• Switch slot number to which client connects: nn
AccountStopTime
User account stop times are tracked in the AccountStopTime attribute that keeps the time stamp and
accounting information of successful user log-outs. The same fields as above (separated by carriage
returns “|”) are contained in the Logout log. A different carriage return such as the # sign can be used in
some situations. Additionally, these fields are included but apply only to the Logout log:
Fields For Any Type of Authentication
• Log-out reason code, for example LOGOFF(18) or DISCONNECTED BY ADMIN(19)
page 29-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Authentication Servers LDAP Servers
• Number of bytes received on the port during the client session from log-in to log-out: variable length
digits.
• Number of bytes sent on the port during the client session from log-in to log-out: variable length digits.
• Number of frames received on the port during the client session from log-in to log-out: variable length
digits.
• Number of frames sent on the port during the client session from log-in to log-out: variable length
digits.
AccountFailTime
The AccountFailTime attribute log records the time stamp and accounting information of unsuccessful
user log-ins. The same fields in the Login Log—which are also part of the Logout log (separated by
carriage returns “|”)—are contained in the Login Fail log. A different carriage return such as the # sign can
be used in some situations. Additionally, these fields are included but apply only to the Login Fail log.
• User account ID or username client entered to log-in: variable length digits.
• Log-in fail error code: nn. For error code descriptions refer to the vendor-specific listing for the
specific directory server in use.
• Log-out reason code, for example PASSWORD EXPIRED(7) or AUTHENTICATION FAILURE(21).
Dynamic Logging
Dynamic logging can be performed by an LDAP-enabled directory server if an LDAP server is configured
first in the list of authentication servers configured through the aaa accounting session command. Any
other servers configured are used for accounting (storing history records) only. For example:
-> aaa accounting session ldap2 rad1 rad2
In this example, server ldap2 is used for dynamic logging, and servers rad1 and rad2 is used for
accounting.
If you specify a RADIUS server first, all of the servers specified is used for recording history records (not
logging). For example:
-> aaa accounting session rad1 ldap2
In this example, both the rad1 and ldap2 servers is used for history only. Dynamic logging does not take
place on the LDAP server.
Dynamic entries are stored in the LDAP-enabled directory server database from the time the user
successfully logs in until the user logs out. The entries are removed when the user logs out.
• Entries are associated with the switch the user is logged into.
• Each dynamic entry contains information about the user connection. The related attribute in the server
is bop-loggedusers.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-23
LDAP Servers Managing Authentication Servers
Attribute Description
bop-basemac MAC range, which uniquely identifies the switch.
bop-switchname Host name of the switch.
bop-loggedusers Current activity records for every user logged
onto the switch identified by bop-basemac.
Each switch that is connected to the LDAP-enabled directory server has a DN starting with
bop-basemac-xxxxx, ou=bop-logging. If the organizational unit ou=[Link] exists somewhere in the
tree under searchbase, logging records are written on the server. See the documentation of the server
manufacturer for more information about setting up the server.
The bop-loggedusers attribute is a formatted string with the following syntax:
loggingMode : accessType ipAddress port macAddress vlanList userName
The fields are defined here:
For example:
“ASA 0 : CONSOLE IP [Link] Jones”
page 29-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Managing Authentication Servers LDAP Servers
Note. The server must be configured with the appropriate schema before the aaa ldap-server command is
configured.
The keywords for the aaa ldap-server command are listed here:
In this example, the switch can communicate with an LDAP server (called ldap2) that has an IP address of
[Link], a domain name of cn=manager, a password of tpub, and a searchbase of c=us. These parameters
must match the same parameters configured on the server itself.
Note. The distinguished name must be different from the searchbase name.
In this example, an existing LDAP server is modified with a different password, and then the timeout is
modified on a separate line. These two command lines are equivalent to:
-> aaa ldap-server ldap2 password my_pass timeout 4
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 29-25
Verifying the Authentication Server Configuration Managing Authentication Servers
transferred to the switch through FTP to the /flash/certified or /flash/working directory and must be named
[Link]. The switch merges either or both of these files into a file called [Link].
To set up SSL on the server, specify ssl with the aaa ldap-server command:
-> aaa ldap-server ldap2 ssl
The switch automatically sets the port number to 636 when SSL is enabled. The 636 port number is
typically used on LDAP servers for SSL. The port number on the switch must match the port number
configured on the server. If the port number on the server is different from the default, use the aaa
ldap-server command with the port keyword to configure the port number. For example, if the server port
number is 635, enter the following:
-> aaa ldap-server ldap2 port 635
The switch can now communicate with the server on port 635.
To remove SSL from the server, use no with the ssl keyword. For example:
-> aaa ldap-server ldap2 no ssl
show aaa server Displays information about a particular AAA server or AAA servers.
An example of the output for this command is given in “Quick Steps For Configuring Authentication
Servers” on page 29-4. For more information about the output of this command, see the OmniSwitch CLI
Reference Guide.
page 29-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
30 Configuring Universal
Network Profiles
The Universal Network Profile (UNP) feature provides network administrators with the ability to define
and apply network access control to specific types of devices by grouping such devices according to
specific matching profile criteria. This allows network administrators to create virtual machine network
profiles (vNPs) and user network profiles from a unified framework of operation and administration.
UNP is not limited to creating profiles for only certain types of devices. However, the following
classification methods implemented through UNP functionality and profile criteria provide the ability to
tailor profiles for specific devices (physical or virtual):
• MAC-based and 802.1X-based authentication using a RADIUS-capable server.
• Redirection to ClearPass Policy Manager (CPPM) for Bring Your Own Devices (BYOD) user device
registration, integrity check, UNP assignment, and policy list assignment.
• Switch-wide classification rules to classify users based on port and device attributes (for example,
source MAC, Group ID, IP address). No authentication required.
• VLAN tag classification to create VLAN port or Service Access Point (SAP) associations based on the
VLAN ID contained in device packets.
• Default UNP classification for traffic not classified through other methods.
Basically, UNP functionality is used to define profile-based VLANs or Shortest Path Bridging (SPB)
services to which network devices are assigned. The profile can allow, deny, or require actions by users or
machines on the network. Because membership to a VLAN or service is based on UNP profile criteria,
devices assigned to the VLAN or service are not tied to a specific port or switch. This flexibility allows
device mobility within the network while maintaining network security.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-1
In This Chapter Configuring Universal Network Profiles
In This Chapter
This chapter provides an overview of the UNP feature and describes how to configure the port-based
functionality and profile attributes through the Command Line Interface (CLI). CLI commands are used in
the configuration examples; for more details about the syntax of commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
The following information and procedures are included in this chapter:
• “Quick Steps for Configuring UNP” on page 30-7
UNP Specifications
Platforms supported OmniSwitch 6860, 6860E
Number of UNPs per switch 1K
Number of UNP users per switch 256
Authentication type 802.1X and MAC-based authentication
Profile type Edge, VLAN, and SPB service
UNP port type Edge, bridge, and SPB access
UNP classification rules MAC address, MAC OUI, MAC address range, IP
address, VLAN tag, Port, Group ID, authentication type,
and LLDP (IP Phones TLV).
Number of QoS policy lists per switch 32 (includes the default list)
Number of QoS policy lists per UNP 1
page 30-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles UNP Defaults
UNP Defaults
The following default settings are applied when the Universal Network Profile (UNP) feature is enabled
on a switch port.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-3
UNP Defaults Configuring Universal Network Profiles
page 30-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles UNP Defaults
See “Configuring a UNP Edge Profile” on page 30-43 for more information about Edge profiles.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-5
UNP Defaults Configuring Universal Network Profiles
See “Configuring a UNP VLAN Profile” on page 30-45 for more information about VLAN profiles.
See “Configuring a UNP SPB Profile” on page 30-48 for more information about SPB service profiles.
See Chapter 7, “Configuring Shortest Path Bridging,” for more information about SPB services.
page 30-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Quick Steps for Configuring UNP
2 Use the unp vlan-mapping edge-profile command to assign a VLAN ID to a profile. When traffic
received on a port is classified into the UNP, the port on which the traffic is received is assigned to the
VLAN associated with the profile. For example, the following command assigns VLAN ID 500 to the
“EP-1” profile:
-> unp vlan-mapping edge-profile EP-1 vlan 500
3 Use the unp edge-profile qos-policy-list command to optionally assign a list of QoS policy rules to a
UNP (see “Quick Steps for Configuring QoS Policy Lists” on page 30-18). For example:
-> unp edge-profile EP-1 qos-policy-list qlist1
4 Use the unp edge-profile location-policy command to optionally assign an existing location-based
policy to the profile. For example:
-> unp edge-profile EP-1 location-policy ale-na
5 Use the unp edge-profile period-policy command to optionally assign an existing time-based policy
to the profile. For example:
-> unp edge-profile EP-1 period-policy plist1
7 Use the unp edge-profile captive-portal-profile command to optionally assign an existing Captive
Portal configuration profile to the UNP Edge profile. For example:
-> unp edge-profile EP-1 captive-portal-profile CP1
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-7
Quick Steps for Configuring UNP Configuring Universal Network Profiles
8 Use the unp edge-profile authentication-flag command to optionally enable or disable the
authentication flag for the profile. When enabled, only authenticated users are allowed into the profile. For
example:
-> unp edge-profile EP-1 authentication-flag enable
9 Use the unp edge-profile mobile-tag command to optionally enable or disable the mobile tagging for
the profile. When enabled, a tagged VLAN association is created when the user port moves into the profile
VLAN. When disabled, VLAN association is untagged. For example:
-> unp edge-profile EP-1 mobile-tag enable
10 Use the unp edge-profile redirect command to optionally enable or disable the redirect status for the
profile. When enabled, the profile can interact with the ClearPass Policy Manager (CPPM) server, as part
of the OmniSwitch Bring Your Own Device (BYOD) solution. For example:
-> unp edge-profile EP-1 redirect enable
11 Use the unp edge-profile bandwidth commands to optionally configure the maximum ingress, egress,
and depth bandwidth values that are applied to UNP ports that are assigned to the Edge profile. For
example:
-> unp edge-profile EP-1 maximum-ingress-bandwidth 10M
-> unp edge-profile EP-1 maximum-egress-bandwidth 10M
-> unp edge-profile EP-1 maximum-ingress-depth 10000
-> unp edge-profile EP-1 maximum-egress-depth 10000
Note. Verify the profile configuration using the show unp edge-profile command. For example:
Verify the VLAN mapping for each profile using the show unp edge-profile vlan-mapping command. For
example:
See the OmniSwitch AOS Release 8 CLI Reference Guide for information about the fields in this display.
For more information about defining Edge profile parameters, see “Configuring Profiles” on page 30-43.
page 30-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Quick Steps for Configuring UNP
2 Use the unp vlan-profile qos-policy-list command to optionally assign a list of QoS policy rules to a
UNP (see “Quick Steps for Configuring QoS Policy Lists” on page 30-18). For example:
-> unp vlan-profile unp4 vlan 200 qos-policy-list unp4_list
3 Use the unp vlan-profile mobile-tag command to optionally enable or disable the mobile tagging for
the profile. When enabled, a tagged VLAN association is created when the user port moves into the profile
VLAN. When disabled, the VLAN association is untagged. For example:
-> unp vlan-profile unp4 vlan 200 mobile-tag enable
4 Use the unp vlan-profile bandwidth commands to optionally configure the maximum ingress, egress,
and depth bandwidth values that are applied to UNP ports that are assigned to the VLAN profile. For
example:
-> unp vlan-profile unp4 vlan 200 maximum-ingress-bandwidth 10M
-> unp vlan-profile unp4 vlan 200 maximum-egress-bandwidth 10M
-> unp vlan-profile unp4 vlan 200 maximum-ingress-depth 10000
-> unp vlan-profile unp4 vlan 200 maximum-egress-depth 10000
Note. Verify the profile configuration using the show unp vlan-profile command. For example:
See the OmniSwitch AOS Release 8 CLI Reference Guide for information about the fields in this display.
For more information about defining VLAN profile parameters, see “Configuring Profiles” on page 30-43.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-9
Quick Steps for Configuring UNP Configuring Universal Network Profiles
The tag-value, isid, and bvlan parameters are used to define an SPB Service Access Point (SAP) for
devices classified into the “spb1” profile.
2 Use the unp spb-profile qos-policy-list command to optionally assign a list of QoS policy rules to a
UNP (see “Quick Steps for Configuring QoS Policy Lists” on page 30-18). For example:
-> unp spb-profile spb1 tag-value 10 isid 1525 bvlan 4001 qos-policy-list
spb1_list
3 Use the unp spb-profile multicast-mode command to change the multicast replication mode for the
SPB service associated with the profile SAP. For example:
-> unp spb-profile spb1 tag-value 10 isid 1525 bvlan 4001 multicast-mode tandem
4 Use the unp spb-profile vlan-xlation command to change the VLAN translation status for the profile.
For example:
-> unp spb-profile spb1 tag-value 10 isid 1525 bvlan 4001 vlan-xlation enable
5 Use the unp spb-profile mobile-tag command to optionally enable or disable the mobile tagging for
the profile. When enabled, a tagged VLAN association is created when the user port moves into the profile
SAP. When disabled, the VLAN association is untagged. For example:
-> unp spb-profile spb1 tag-value 10 isid 1525 bvlan 4001 mobile-tag enable
Note. Verify the profile configuration using the show unp spb-profile command. For example:
See the OmniSwitch AOS Release 8 CLI Reference Guide for information about the fields in this display.
For more information about defining SPB profile parameters, see “Configuring Profiles” on page 30-43.
page 30-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Quick Steps for Configuring UNP
2 Use the unp auth-server-down timeout command to configure how long a device remains in the
authentication server down UNP. The timer is set to 60 seconds by default and is triggered when a device
is learned in the authentication server down UNP. For example:
-> unp auth-server-down edge-profile timeout 60
3 Use the unp redirect port-bounce command to optionally enable or disable the port bounce action on
UNP ports. For example:
-> unp redirect port-bounce enable
4 Use the unp redirect pause-timer command to configure how long, in seconds, the switch will filter
traffic to trigger re-authentication. When the timer value is set to zero, the timer is disabled. For example:
-> unp redirect pause-timer 180
5 Use the unp redirect proxy-server-port command to configure the HTTP proxy server port number
to use for redirection to a ClearPass Policy Manager (CPPM) server. For example:
-> unp redirect proxy-server-port 8887
6 Use the unp redirect-server command to configure an IP network address to allow redirection of
HTTP traffic to a CPPM server. For example:
-> unp redirect-server [Link]
7 Use the unp redirect allowed-name command to configure additional IP network addresses to which
a user can access (these are in addition to the CPPM server IP address). For example:
-> unp redirect allowed-name DomainController ip-address [Link] ip-mask
[Link]
8 Use the unp dynamic-vlan-configuration command to enable the switch to automatically create a
VLAN if the VLAN ID specified for a UNP VLAN profile does not already exist.
-> unp dynamic-vlan-configuration enable
Note. Dynamic UNP VLANs are not saved in the switch configuration file ([Link]). When the next
switch reboot occurs, the device ages out, or the UNP is deleted, the dynamic VLAN configuration is
removed.
9 Use the unp dynamic-profile-configuration command to enable the switch to automatically create a
UNP VLAN profile. The profile is dynamically created when the trust VLAN tag is enabled for the UNP
port and the VLAN tag of an ingress packet matches an MVRP VLAN that is not assigned to a profile, or
the VLAN ID of the tag does not exist on the switch.
-> unp dynamic-profile-configuration enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-11
Quick Steps for Configuring UNP Configuring Universal Network Profiles
Note. Verify the UNP global parameter configuration using the show unp global configuration command.
For example:
Mode : Edge
Auth Server Down UNP = UNP-temp,
Auth Server Down Timeout = 60,
Redirect Port Bounce = Enabled,
Redirect Pause Timer = 180
Redirect http proxy-port = 8080
Redirect Server IP = [Link]
Allowed IP = DomainController,
[Link]/[Link],
See the OmniSwitch AOS Release 8 CLI Reference Guide for information about the fields in this display.
2 Use the unp port edge-template command to assign a pre-defined edge port configuration to a UNP
edge port. An Edge port template can be used to apply pre-defined values for the port parameters
described in this section.
-> unp port 1/1/10 edge-template classify-template
3 Use the unp port group-id command to assign a UNP edge port to a numerical Group ID.
4 Use the unp unp-customer-domain command to assign UNP bridge and SPB access ports to a
numerical customer domain ID.
-> unp port 1/1/1-3 customer-domain 1
5 Use the unp default-edge-profile command to designate an existing UNP Edge profile as the default
profile for an edge port. Devices are assigned to the default profile when UNP authentication and/or
classification is not available or is unsuccessful.
-> unp port 1/1/10 default-edge-profile def_unp1
page 30-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Quick Steps for Configuring UNP
6 Use the unp default-vlan-profile command to designate an existing UNP VLAN profile as the default
profile for a bridge port. Devices are assigned to the default profile when UNP authentication and/or
classification is not available or is unsuccessful.
-> unp port 1/1/11 default-vlan-profile def_vlan_unp1
7 Use the unp default-spb-profile command to designate an existing UNP SPB profile as the default
profile for an SPB access port. Devices are assigned to the default profile when UNP authentication and/or
classification is not available or is unsuccessful.
-> unp port 1/1/11 default-spb-profile def_spb_unp1
8 Use the unp aaa-profile command to assign an existing AAA configuration profile to a UNP edge
port.
-> unp port 1/1/10 aaa-profile A1
9 Use the unp mac-authentication command to enable MAC authentication on the UNP port.
10 Use the unp mac-authentication pass-alternate command to designate and existing profile to which a
device is assigned if successful MAC authentication does not return a UNP name.
-> unp port 1/1/10 mac-authentication pass-alternate-unp MacPass
11 Use the unp 802.1x-authentication command to enable 802.1X authentication on the UNP port.
12 Use the unp 802.1x-authentication pass-alternate command to designate and existing profile to
which a device is assigned if successful 802.1x authentication does not return a UNP name.
-> unp port 1/1/10 802.1x-authentication pass-alternate-unp 1xPass
13 Use the unp 802.1x-authentication tx-period command to configure the amount of time to wait (in
seconds) between transmissions of 802.1X EAP Request Identity packets on the UNP port.
-> unp port 1/1/10 802.1x-authentication tx-period 60
14 Use the unp 802.1x-authentication supp-timeout command to configure the amount of time to wait
before timing out 802.1X users attempting to authenticate on the UNP port.
-> unp port 1/1/10 802.1x-authentication supp-timeout 120
15 Use the unp 802.1x-authentication max-req command to configure the maximum number of times to
requests for authentication information are transmitted to the 802.1X users on the UNP port.
-> unp port 1/1/10 802.1x-authentication max-req 10
16 Use the unp 802.1x-authentication bypass command to configure whether 802.1X authentication is
skipped on the UNP port.
-> unp port 1/1/10 802.1x-authentication bypass enable
Configuring the bypass option is not allowed if an 802.1x authentication failure policy is configured
for the UNP port.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-13
Quick Steps for Configuring UNP Configuring Universal Network Profiles
17 Use the unp mac-authentication allow-eap command to configure whether 802.1X authentication is
attempted after MAC authentication on a UNP port that has 802.1X authentication bypass enabled.
-> unp port 1/1/10 mac-authentication allow-eap pass
In this example, 802.1X authentication is attempted only when MAC authentication passes.
18 Use the unp 802.1x-authentication failure-policy command to configure whether or not MAC
authentication is attempted after the initial 802.1X authentication attempt fails.
-> unp port 1/1/10 802.1x-authentication failure-policy mac-authentication
Configuring an 802.1X failure policy is not allowed if the 802.1X bypass operation is enabled on the
UNP port.
19 Use the unp classification command to enable classification on the UNP port. When enabled, UNP
classification rules are applied to device traffic received on the port when 802.1X or MAC authentication
is not available or is unsuccessful. See “Quick Steps for Configuring UNP Classification Rules” on
page 30-16.
-> unp port 1/1/10 classification enable
20 Use the unp trust-tag command to configure the trust VLAN ID tag status for the UNP port. When
enabled, the VLAN ID of a tagged packet is used to determine how the packet is classified.
-> unp port 1/1/10 trust-tag enable
21 Use the unp direction command to configure whether network access control is applied to both
incoming and outgoing traffic or only applied to incoming traffic on a UNP edge or bridge port.
-> unp port 1/1/10 direction in
The unp direction command options are in and both (the default). When the direction is set to both,
then egress broadcast, unknown unicast, and multicast traffic is blocked on the UNP port. When the
direction is set to in, these same traffic types are not blocked.
page 30-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Quick Steps for Configuring UNP
Note. Verify the UNP port configuration using the show unp port command with the config option. For
example:
To display information about device MAC addresses learned on a UNP port, use the show unp user
command. For example:
Total users : 3
See the OmniSwitch AOS Release 8 CLI Reference Guide for information about the fields in this display.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-15
Quick Steps for Configuring UNP Configuring Universal Network Profiles
2 Use the unp classification group-id command to classify a device based on the Group ID associated
with the UNP edge port to which the device is connected. This rule is only available to classify a device
into a UNP Edge profile.
-> unp classification group-id GRP1 edge-profile myProfile1
3 Use the unp classification mac-address command to classify a device based on the source MAC
address of the device.
-> unp classification mac-address [Link] edge-profile serverA
4 Use the unp classification mac-oui command to classify a device based on the Organizationally
Unique Identifier (OUI) of the source MAC address associated with a device. This rule is only available to
classify a device into a UNP Edge profile.
-> unp classification mac-oui [Link] edge-profile myProfile1
5 Use the unp classification mac-address-range command to classify device MAC addresses that fall
within a range of MAC addresses.
-> unp classification mac-address-range [Link] [Link]
edge-pr0file name serverB
6 Use the unp classification lldp med-endpoint ip-phone command to classify an IP phone when the
LLDP TLVs from the phone are detected. This rule is only available to classify a device into a UNP Edge
profile.
-> unp classification lldp med-endpoint ip-phone edge-profile myProfile1
page 30-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Quick Steps for Configuring UNP
7 Use the unp classification authentication-type command to classify a device based on the type of
authentication the device successfully completed. This rule is only available to classify a device into a
UNP Edge profile.
-> unp classification authentication-type 802.1X edge-profile myProfile1
8 Use the unp classification ip-address command to classify a device based on the source IP address of
the device.
-> unp classification ip-address [Link] [Link] edge-profile marketing
9 Use the unp classification vlan-tag command to classify a device based on the VLAN ID tag of the
device traffic.
-> unp classification vlan-tag 10 edge-profile marketing
2 To configure a MAC address and Group ID binding rule combination, use the unp classification mac-
address command with the mac-address and group-id parameter options.
-> unp classification mac-address [Link] group-id GRP1 edge-profile
Pr1
3 To configure a MAC address, IP address, and port binding rule combination, use the unp classification
mac-address command with the mac-address, ip-address, and port parameter options.
-> unp classification mac-address [Link] ip-address [Link] mask
[Link] port 1/1/1 edge-profile Pr3
4 To configure a MAC address, IP address, port, and VLAN tag binding rule combination, use the unp
classification mac-address command with the mac-address, ip-address, port, and vlan-tag parameter
options.
-> unp classification mac-address [Link] ip-address [Link]
[Link] port 1/1/1 vlan-tag 10 edge-profile Pr3
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-17
Quick Steps for Configuring UNP Configuring Universal Network Profiles
Note. Verify the UNP classification rule configuration using the show unp classification command. For
example:
See the OmniSwitch AOS Release 8 CLI Reference Guide for information about the fields in this display.
page 30-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Quick Steps for Configuring UNP
3 Assign one or more QoS policy rules to the policy list using the policy list rules command.
4 Assign the QoS policy list to a UNP using the unp edge-profile, unp vlan-profile, or unp spb-profile
command.
-> unp edge-profile Employee vlan 500 qos-policy-list logon-role
-> unp vlan-profile unp1 vlan 200 qos-policy-list employee-role
-> unp spb-profile spb2 tag-value 20:100 isid 1525 bvlan 4001 qos-policy-list
service-user
Note. Verify the QoS policy list configuration using the show policy list command. For example:
Verify the UNP association for the policy list using the show unp edge-profile command. For example:
See the OmniSwitch AOS Release 8 CLI Reference Guide for information about the fields in this display.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-19
UNP Overview Configuring Universal Network Profiles
UNP Overview
A Universal Network Profile (UNP) provides a method for dynamically assigning network devices to a
VLAN domain. A profile consists of configurable attributes that help to define a group of users or devices
that have similar requirements for access to network resources. A device sending traffic that matches such
attributes is then assigned to a VLAN that is associated with the UNP. The UNP may also specify a QoS
policy list that is subsequently applied to device traffic associated with the UNP.
Dynamic assignment of devices using UNPs is achieved through port-based functionality that provides the
ability to authenticate and classify device traffic. Authentication verifies the device identity and provides a
UNP name. In the event authentication is not available or is unsuccessful, classification rules associated
with the UNPs, as well as the UNP port configuration attributes, are applied to the traffic to determine the
UNP assignment.
Profile Types
UNP supports three types of classification profiles:
• VLAN profile. This type of profile creates a VLAN-port association (VPA) for device traffic that is
classified into the profile. The VPA represents an association between the UNP port on which the
device traffic was received and the VLAN ID specified by the profile. Once classified into a specific
profile, device traffic is tagged to forward on the UNP VLAN.
• Edge profile. This type of profile also creates a VPA between the UNP port on which device traffic
was received and the VLAN ID associated with the profile. Device traffic is then forwarded on the
VLAN ID associated with the profile. Specifically designed to offer network access control to edge
devices, Edge profiles offer additional attributes to redirect devices for internal Captive Portal
authentication and integration with the OmniSwitch Bring Your Own Device (BYOD) solution.
• SPB profile. The OmniSwitch supports Shortest Path Bridging (SPB) service profiles. This type of
profile creates an association between device traffic that is classified into the profile and a Service
Access Point (SAP). Once classified into a specific profile, device traffic is then forwarded on the SPB
service associated with the SAP.
The OmniSwitch supports two separate traffic domains: VLAN and service. The availability of two
VLAN-based profiles (Edge and VLAN) and an SPB service profile provides an efficient method for
network access control and dynamic assignment of device traffic to one of these domains.
Using the VLAN and Edge profiles, an administrator can implement the same UNP name across the entire
network infrastructure, as the VLAN association is kept locally on each switch. For example, the
administrator can deploy the UNP named “Engineering” in one building using VLAN 10, while the same
UNP deployed in another building can use VLAN 20. The same UNP access controls are applied to all
profile devices in each building, even though they belong to different VLANs.
The SPB service profile is particularly useful in the Alcatel-Lucent Data Center solution to facilitate
virtual machine (VM) discovery and movement. UNP service profiles used for such purposes are also
referred to as virtual network profiles (vNPs).
The following table provides a list of configurable profile attributes and the profile type (VLAN, Edge, or
SPB) that supports each attribute. For example:
• Classification rules are configurable for a UNP Edge, VLAN, and SPB profile, so the “Supported
Profile” field contains “All profiles” for this attribute.
page 30-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles UNP Overview
• The VLAN mapping is only configurable for a UNP Edge and VLAN profile, so the “Supported
Profile” field contains “Edge and VLAN profiles” for this attribute.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-21
UNP Overview Configuring Universal Network Profiles
• The STP status is configurable and is enabled by default for dynamic VLANs. This STP instance is
included in the maximum number of 1x1 STP instances allowed when the switch is running in the 1x1
STP mode.
However, UNP dynamic VLANs differ from standard VLANs as follows:
• A dynamic VLAN cannot be deleted using standard VLAN commands. The VLAN is only removed
when the UNP to which the VLAN is assigned is deleted.
• UNP dynamic VLANs are identified as a separate type of VLAN. The vlan show commands will
display this type of VLAN with the default name of “UNP-DYN-VLAN” and the designated type as
“UNP Dynamic Vlan”.
• Dynamic VLANs are not saved in the “! VLAN:” section of the switch configuration file ([Link]).
However, the unp commands to enable dynamic VLAN configuration and create the UNP are saved in
the “! DA-UNP:” section of the [Link] file. As a result, the VLAN is created again on the next switch
bootup.
For more information, see “Enabling Dynamic VLAN Configuration” on page 30-46.
page 30-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles UNP Overview
Dynamic profiles are saved in the switch configuration, and profile attributes are configurable in the same
manner as manually created profiles.
• If the VNID value specified in a VXLAN service profile does not exist, the switch will dynamically
create the expected service with the specified VNID and then the SAP.
Dynamically creating services and related SAPs is subject to available switch resources. If an attempt to
dynamically create a service or SAP fails, for any reason, the MAC addresses classified for the service
profile are learned as filtering.
Note. Dynamically created SAPs are not saved to the switch configuration file.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-23
UNP Overview Configuring Universal Network Profiles
• BVLAN—The SPB control BVLAN configured for the switch serves as the BVLAN for the dynamic
SAP.
• I-SID number—The system default I-SID number (10,000,000) plus the customer domain ID number
(zero by default) multiplied by 10,000. For example, if the UNP access port on which traffic is received
belongs to customer domain 200, then the calculation to determine the I-SID is as follows:
10,000,000 + (200 * 10,000) = 12,000,000
• SPB Service ID number—A reserved service ID (32768) that represents the association between the
default system I-SID and the control BVLAN. This value increments by 1 for each additional dynamic
service (SPB or VXLAN) that is created and only has local significance.
When a UNP bridge port is dynamically assigned to a VLAN that is associated with an Edge or VLAN
profile, a VLAN port association (VPA) is created and tracked by VLAN management software on each
switch. Because the UNP configuration is applied to each device connected or forwarded through a UNP
port, the UNP port can associate with more than one VLAN.
UNP access ports are not dynamically assigned to VLANs. Instead, traffic received on the port is
classified to a Service Access Point (SAP). A SAP is a virtual port that maps classified device traffic to a
service.
page 30-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles UNP Overview
• A MAC address range classification rule is associated with a UNP Edge profile named “Engineering”.
This rule defines a MAC address range of “[Link] through [Link]”.
• A device connecting to port 1/1/10 with a source MAC address that falls within the specified MAC
address range is assigned to the “Engineering” profile. The device and port on which the device was
learned are also dynamically assigned to the VLAN associated with the profile.
Enabling classification and defining classification rules is optional with UNP. When enabled, however,
classification rules are only applied to UNP ports when one of the following occurs:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-25
UNP Overview Configuring Universal Network Profiles
• 802.1X and/or MAC authentication is enabled but the RADIUS server is not configured.
• 802.1X and/or MAC authentication is enabled but RADIUS authentication did not return a UNP name
or failed.
If classification is disabled on a UNP port, classification rules are not applied to traffic received on that
port. If both authentication and classification are disabled on a UNP port, traffic received on that port is
blocked, unless a default UNP is configured for that port.
page 30-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles UNP Overview
Note. Binding classification rules are only associated with UNP Edge profiles and take precedence over
individual classification rules.
Note. Extended classification rules are only associated with UNP Edge profiles and take precedence over
all other UNP classification rule types (individual rules and binding rules).
For more information, see “Configuring UNP Classification Rules” on page 30-51.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-27
UNP Overview Configuring Universal Network Profiles
How it Works
There is no global switch setting to invoke the UNP functionality. Instead, UNP is enabled on individual
switch ports and profiles are defined to determine the dynamic VLAN assignment for devices connected
through the UNP ports. When UNP is enabled on a switch port, the following device classification process
is triggered when the port receives traffic.
page 30-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Interaction With Other Features
Access Guardian
Access Guardian is a combination of authentication, device compliance, and access control functions that
provide a proactive solution for network security. Implemented through the switch hardware and software,
Access Guardian helps administrators:
• Determine who is on the network.
The OmniSwitch Access Guardian feature is configured and applied through the framework of the UNP
feature. UNP is enabled on switch ports to activate the following Access Guardian functionality:
• Network access control and Quality of Service (QoS) on a per-user basis.
• Authentication and classification of devices into UNP Edge, VLAN, or Shortest Path Bridging (SPB)
profiles.
• MAC-based and 802.1X-based authentication using a RADIUS-capable server.
• Switch-wide classification rules to classify users based on port and device attributes (for example,
source MAC, Group ID, IP address). No authentication required.
• Default UNP classification for traffic not classified through other methods.
• Internal Captive Portal for Web-based authentication. Provides dynamic role change for the user
device.
• Integration with ClearPass Policy Manager (CPPM) as part of the OmniSwitch Bring Your Own
Device (BYOD) network access solution.
See Chapter 31, “Configuring Access Guardian,” for more information.
• The LPS learning window is set globally but not on a per-port basis. So the window is applied to all
UNP ports.
• When LPS is enabled or disabled on a UNP edge or bridge port (LPS is not supported on UNP access
ports), MAC addresses already learned on that port are flushed.
• Configuring a static MAC address is not allowed on a UNP port unless LPS is also enabled on the
same port.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-29
Interaction With Other Features Configuring Universal Network Profiles
• When both LPS and UNP are enabled on the same port,
– UNP first authenticates and classifies any MAC addresses received, then LPS rules are applied.
– If a MAC address violates any of the LPS rules for the port, the address may get filtered or the port
violated even if UNP initially determined the address was valid. In other words, LPS rules take
precedence over UNP to determine if a MAC address is bridged or filtered on the port.
• If UNP classifies a MAC address as learning but LPS learns the address as filtering, an untagged
packet will show as filtering in the default VLAN for the port and a tagged packet MAC will show as
filtering in the specific tagged VLAN.
• When a MAC address is filtered by LPS, the show unp edge-user command will display “LPS-
Blocked” as the classification source for that MAC address.
See Chapter 34, “Configuring Learned Port Security,” for more information.
page 30-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Interaction With Other Features
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-31
UNP Configuration Overview Configuring Universal Network Profiles
• Optionally configure classification rules for the profile. When classification is enabled on a UNP port,
these rules are applied to traffic received on the port to determine which UNP is applied to the traffic.
See“Configuring UNP Classification Rules” on page 30-51.
• Enable or disable dynamic VLAN configuration of the VLANs associated with a VLAN classification
profile. The status of dynamic VLAN configuration is applied to all VLAN profiles. See “Enabling
Dynamic VLAN Configuration” on page 30-46.
• Enable or disable dynamic configuration of VLAN classification profiles. A dynamic profile is created
only when specific traffic conditions occur on UNP bridge ports. See “Enabling Dynamic VLAN
Profile Configuration” on page 30-47.
• Define a temporary UNP to which devices classified on UNP edge or bridge ports are assigned in the
event the authentication server is down or unreachable. A configurable timer is also available to specify
how long a device remains in this temporary UNP. See“Configuring an Authentication Server Down
UNP” on page 30-34.
page 30-32 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
See “Configuring UNP Port Parameters” on page 30-35 for more information about configuring UNP port
functionality.
In this example, the rad1 server is used for authenticating user devices connected to UNP ports on which
802.1X authentication is enabled. If rad1 becomes unavailable, the switch then uses rad2 for 802.1X
authentication.
To set the switch to use specific servers for MAC authentication, use the aaa device-authentication
command with the mac parameter. For example:
-> aaa device-authentication mac rad1 rad2
In this example, the rad1 server is used for authenticating user devices connected to UNP ports on which
MAC authentication is enabled. As in the 802.1X authentication example, if rad1 becomes unavailable,
the switch will then use rad2 for MAC authentication.
To set the switch to use specific servers for internal Captive Portal authentication, use the aaa device-
authentication command with the captive-portal parameter. For example:
-> aaa device-authentication captive-portal rad1 rad2
In this example, the rad1 server is used for authenticating user devices connected to UNP ports that are
classified into an Edge profile that has Captive Portal authentication enabled. As in the 802.1X and MAC
authentication example, if rad1 becomes unavailable, the switch will then use rad2 for internal Captive
Portal authentication.
Note. The same RADIUS servers can be used for 802.1x, MAC, and Captive Portal authentication. Using
different servers for each type of authentication is allowed but not required. For more information about
configuring authentication servers, see Chapter 35, “AAA Commands.”
For more information about authenticating and classifying devices on UNP ports, see “Device
Authentication and Classification” on page 30-25.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-33
Configuring UNP Port-Based Access Control Configuring Universal Network Profiles
After a device is classified into the VLAN for this UNP, an attempt to re-authenticate the device is made
after a specific period of time (60 seconds by default). To change this time value, use the unp auth-
server-down timeout command.
-> unp auth-server-down edge-profile timeout 120
Configuring an authentication server down UNP is highly recommended when MAC or 802.1X
authentication is enabled on any UNP port or link aggregate. This is because after a switch reload, the
traffic from devices connected to UNP ports and link aggregates reaches the switch and triggers the
authentication process before route convergence has completed and the server can be reached.
• If an authentication server down UNP is configured, devices are temporarily learned in that profile and
authentication is automatically attempted again after the timeout period expires. This allows time for
the server to become reachable from the switch after a reload.
• If an authentication server down UNP is not configured, devices are learned as filtering and will remain
in that state. There is no further attempt to authenticate these devices again.
The authentication down UNP and related timer value are applied to all traffic received on all UNP ports
in the event the RADIUS server becomes unreachable. To verify if this setting is enabled or disabled, use
the show unp global configuration command.
Note. When device authentication fails due to an unreachable RADIUS server, an event message is sent to
the switch logging utility (swlog). See Chapter 37, “Using Switch Logging,” for more information.
There are three UNP port types supported: edge, bridge, and SPB access. When UNP is initially enabled,
the port type is set to “edge” by default. To enable UNP and specify a port type, use the unp port
command with the port-type parameter. For example:
-> unp port 1/1/12 port-type bridge
-> unp linkagg 5 port-type bridge
-> unp port 1/1/13 port-type spb-access
To remove the UNP configuration from a port or link aggregate, use the no form of the unp port
command. For example:
-> no unp port 1/1/3
-> no unp linkagg 10
page 30-34 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
To change the port type of an existing UNP port, remove the current UNP configuration using the no unp
port or no unp linkagg command then use the unp port-type command to set the new port type. For
example:
-> no unp port 1/12
-> unp port 1/12 port-type bridge
-> no unp linkagg 5
-> unp linkagg 5 port-type bridge
Note. Any configuration change to a UNP-enabled port will flush all MAC addresses learned on that port.
This applies only to CLI commands used to configure UNP port parameters.
When UNP is enabled on a port without specifying a port type, the port type is set to “Edge” by default
and all traffic is blocked on the port until a UNP port-based configuration is defined. The following table
lists all the UNP commands that are used to configure UNP port parameters for the specified type of UNP
port. For example:
• The 802.1x and MAC authentication parameters are configurable for all UNP port types (edge, bridge,
and SPB), so the “Port Type” field contains “All ports” for these parameters.
• The redirect port bounce parameter is only configurable for a UNP edge port, so the “Port Type” field
contains “Edge port” for this parameter.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-35
Configuring UNP Port-Based Access Control Configuring Universal Network Profiles
unp 802.1x-authentication tx- Configures the re-transmission time interval for UNP All ports
period ports on which 802.1X authentication is enabled.
unp 802.1x-authentication supp- Configures the amount of time the switch will wait All ports
timeout before timing out an 802.1X user attempting to
authenticate through the port.
unp 802.1x-authentication max- Configures the maximum number of times the switch All ports
req will transmit a request for authentication information to
an 802.1X user on the port.
unp mac-authentication allow-eap Configures whether to attempt 802.1X authentication All ports
after MAC authentication passes or fails on a UNP port
that has 802.1X bypass enabled.
unp mac-authentication Configures the status of MAC authentication for the All ports
UNP port.
unp mac-authentication pass- Assigns the name of an existing UNP as an alternate All ports
alternate profile. If successful MAC authentication does not
return a UNP, the device can be classified into this
alternate profile.
unp classification Configures the status of device classification for the All port types
UNP port. When enabled, UNP port and rule
classification parameters are applied if device
authentication does not provide a UNP name for a
device connected to the port.
unp default-edge-profile Assigns the name of an existing UNP as the default Edge port
unp default-vlan-profile profile for the UNP port. If device authentication or Bridge port
unp default-spb-profile classification does not provide a UNP name for a user SPB port
device, the device can be classified into the default
profile.
unp port group-id Assigns a UNP port to a numerical group ID. All UNP Edge port
ports assigned to the same group ID represent a logical
group domain to which specific UNP configuration and
classification can be applied.
unp unp-customer-domain Assigns a UNP port to a numerical customer domain Bridge port
ID. Groups UNP ports together in a logical group. SPB port
Similar to the group ID assignment for Edge ports.
unp aaa-profile Assigns the name of an existing AAA configuration Edge port
profile to a UNP port.
unp port edge-template Assigns the name of an Edge port template to the UNP Edge port
port. This type of template applies a pre-defined
configuration to the port. All of the other commands
specified in this table are configurable parameters for
the Edge port template.
unp direction Configures whether egress broadcast, unknown Edge port
unicast, or multicast traffic is allowed on the UNP port. Bridge port
unp trust-tag Configures the option of whether to trust the VLAN ID All ports
of a tagged packet to determine how the packet is
classified.
page 30-36 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
• Specific 802.1X parameters, such as re-transmission interval, supplicant timeout, or maximum number
of times to request authentication information from an 802.1X user.
• 802.1X authentication bypass.
• 802.1X authentication after MAC authentication passes or fails on a UNP port that has 802.1X bypass
enabled.
• An 802.1X failure policy to determine if MAC authentication or classification is attempted after
802.1X authentication fails.
• Device classification status to determine if UNP classification rules are used to select an Edge profile.
• An alternate UNP Edge profile for when successful 802.1X or MAC authentication does not return a
UNP name.
• The name of an AAA configuration profile to assign to the port.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-37
Configuring UNP Port-Based Access Control Configuring Universal Network Profiles
Use the unp port edge-template command to assign an AAA profile to a UNP port or UNP link
aggregate. For example:
-> unp port 1/1/5 edge-template up1
-> unp port 1/2/1-5 edge-template up2
-> unp linkagg 10 edge-template up3
-> unp linkagg 10-50 edge-template up4
Use the show unp edge-template command to display the UNP Edge port template configuration.
For more information about the commands described in this section, see the OmniSwitch AOS Release 8
CLI Reference Guide.
page 30-38 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
Configuring 802.1x authentication bypass is done using the unp 802.1x-authentication bypass and unp
mac-authentication allow-eap commands. The unp 802.1x-authentication bypass command enables or
disables the bypass operation. The following unp mac-authentication allow-eap command parameters
determine if subsequent 802.1x authentication is attempted on the device after MAC authentication:
• pass—802.1x authentication is attempted if the device passes the initial MAC authentication. If the
device fails MAC authentication, 802.1x authentication is bypassed (EAP frames are ignored) and the
device is classified as a non-supplicant.
• fail—802.1x authentication is attempted if the device fails the initial MAC authentication. If the device
passes MAC authentication, 802.1x authentication is bypassed (EAP frames are ignored) and the
device is classified as a non-supplicant.
• noauth—802.1x authentication is automatically attempted if there is no MAC authentication available
for the port.
• none (the default)—802.1x authentication is permanently bypassed. Only MAC authentication is
performed and the device is classified as a non-supplicant.
Configuration Guidelines
Consider the following guidelines before configuring 802.1x authentication bypass:
• The 802.1x bypass operation is only supported on UNP ports with 802.1x authentication enabled. See
“Configuring UNP Port Parameters” on page 30-35 for more information about configuring the access
control mode.
• If a port has supplicants connected and 802.1x bypass is enabled for that port, the supplicants are
automatically logged off to undergo authentication according to the enabled bypass configuration.
• When the 802.1x bypass configuration is modified or disabled, any non-supplicant devices are
automatically logged off the port. This will free up those devices to undergo the authentication
specified by the new bypass configuration.
• If re-authentication is configured for the UNP port and 802.1X bypass is enabled, the MAC
authentication followed by 802.1x authentication is initially performed as configured. However, only
802.1x authentication is performed during the re-authentication process, so there is no recheck to see if
the MAC address of the user device is restricted.
• Enabling 802.1X bypass is not allowed on UNP ports that are configured with an 8021X failure policy.
• When successful MAC authentication returns a UNP and the 802.1x bypass operation is configured to
initiate 802.1x authentication when a device passes MAC authentication, the device is not moved into
that UNP. Instead, the device is moved into the UNP returned by 802.1x authentication. If 802.1x
authentication does not provide such information, the device is moved based on the UNP port-based
configuration.
• When 802.1X bypass is enabled and after MAC authentication, the port will be in a waiting state until
the 802.1X authentication process complete.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-39
Configuring UNP Port-Based Access Control Configuring Universal Network Profiles
The resulting Access Guardian authentication process for a device connected to UNP port 2/1 is as follows
for this example:
• MAC authentication is triggered when the first frame from the new user is received, whether it is an
EAP frame or not.
• EAP frames for this user are ignored until MAC authentication completes (RADIUS returns an Access-
Accept or a Access-Reject response).
• If the initial MAC authentication passes (that is, Access-Accept), 802.1x authentication is bypassed for
this user and all EAP frames are ignored.
• If the initial MAC authentication fails (that is, Access-Reject), 802.1x authentication is attempted for
the user. During this transition, the EAP frames are allowed and the switch must force the supplicant to
restart a fresh EAP session by sending a multicast Request Identity EAPOL on the port. This is because
the supplicant may have already sent an EAPOL Start.
See “Configuring QoS Policy Lists” on page 30-50 for more information.
• Profile bandwidth parameters. Configurable bandwidth parameter values associated with an Edge or
VLAN profile (not configurable for an SPB profile) are applied to traffic that is classified into the Edge
or VLAN profile. For example, the following commands define profile bandwidth parameters to rate
limit traffic on all device ports assigned to the “UNP-1” Edge profile.
-> unp edge-profile UNP-1 maximum-ingress-bandwidth 10M
-> unp edge-profile UNP-1 maximum-egress-bandwidth 10M
-> unp edge-profile unp-1 maximum-ingress-depth 1
-> unp edge-profile unp-1 maximum-egress-depth 1
• The maximum ingress and egress depth values are configured in Kbps.
• The default value for the maximum ingress and egress depth settings is calculated by dividing the
maximum ingress or egress bandwidth value by 25. For example, if the ingress bandwidth value is set
page 30-40 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
to 500K, then the ingress depth value defaults to 20K (500K/25=20K). However, if this calculation
results in a value of 0 or 1, then the default value is set to 2K.
• “Per user" bandwidth profiling is not supported. If there are multiple users authenticating through a
port, then the bandwidth limitation of the last user overrides the existing bandwidth limitations, if any.
• Runtime modification of UNP ingress or egress bandwidth is allowed; the modified values are then
applied to both new and already authenticated user devices learned on the profile. The new runtime
values become the latest bandwidth values for the profile, so they are applied to all user devices
associated with the profile.
• The bandwidth limitation applied on a port through UNP classification is not removed when a user logs
out or ages out. An administrator can override the bandwidth limitation through the qos port command
or by removing the UNP configuration on the port.
• If any port bandwidth parameter value defined for a UNP profile is modified, then the other parameters
need to be configured again, otherwise they will be set to their default values. For example, consider a
UNP profile with maximum egress bandwidth set to 100M and egress depth set to 10K, where the
maximum bandwidth is changed to 200M. In this scenario, only the modified maximum bandwidth is
considered, but the egress depth is reset to the default value unless the required value is specifically
configured again.
• If port bandwidth values are applied through UNP profile (Edge or VLAN) bandwidth parameters and
also through a QoS policy list associated with the same profile, then the minimum of both the values is
applied on the UNP port.
Note. The same bandwidth behavior applies when the user is authenticated with QoS port bandwidth, QoS
port configuration being the latest configuration.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-41
Configuring UNP Port-Based Access Control Configuring Universal Network Profiles
• UNP bridge ports and VLAN profiles are assigned to customer domain IDs.
• UNP SPB access ports and profiles are also assigned to customer domain IDs.
By default, all UNP edge ports are assigned to group 0 and all UNP bridge and SPB access ports are
assigned to customer domain 0. To add additional group or customer domain IDs, use the unp group-id
command or the unp customer-domain command. For example:
-> unp group-id 2
-> unp customer-domain 2
To assign UNP edge ports to a group ID, use the unp port group-id command. For example:
-> unp port 1/1/1-3 group-id 2
-> unp linkagg 5 group-id 52
To assign UNP bridge or SPB access ports to a customer domain ID, use the unp unp-customer-domain
command. For example:
-> unp port 1/1-3 unp-customer-domain 2
-> unp linkagg 5 unp-customer-domain 5
See “Configuring Classification Rules for UNP Port Domains” on page 30-51 for more information.
page 30-42 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
Configuring Profiles
Universal Network Profiles (UNP) are assigned to host devices through the device authentication process,
the application of profile classification rules, or based on the UNP port configuration. There are three
types of profiles supported: Edge, VLAN, and Shortest Path Bridging (SPB). The type of profile applied
to port traffic is based on the port type. For example:
– Edge profiles classify traffic received on UNP edge ports.
– VLAN profiles classify traffic received on UNP bridge ports.
– SPB service profiles classify traffic received on UNP access ports.
This section provides information about how to configure UNP Edge, VLAN, and SPB profiles.
Command Description
unp edge-profile Creates an Edge profile and associates the profile with a name.
unp edge-profile qos-policy-list Assigns a QoS policy list to an Edge profile. If there is no list
assigned to a profile, users classified into that profile are granted full
access within the profile VLAN domain.
unp edge-profile location-policy Assigns the name of a location-based policy to the Edge profile.
This type of policy defines criteria (such as the slot/port, system
name and location) to determine if a device is accessing the network
from a valid location.
unp edge-profile period-policy Assigns the name of a time-based policy to the Edge profile. This
type of policy specifies the days and times during which a device
can access the network.
unp edge-profile captive-portal- Configures the status of internal Captive Portal authentication for
authentication the profile. When enabled, triggers the Captive Portal authentication
process for users classified into the profile.
unp edge-profile captive-portal- Assigns the name of a Captive Portal profile that applies a specific
profile Captive Portal configuration to devices assigned to the Edge profile.
This type of profile is applied when Captive Portal is enabled for the
Edge profile and overrides the global Captive Portal configuration.
unp edge-profile authentication- Configures the status of the authentication flag for the profile. When
flag enabled, only devices that were successfully authenticated are
allowed into the Edge profile.
unp edge-profile mobile-tag Configures the mobile tagging status for the profile. When enabled,
the UNP port to which a device is connected is tagged with the
VLAN ID associated with the Edge profile when the device is
classified into that profile.
unp edge-profile redirect Configures the redirect status for the profile. When enabled, the
profile honors Change of Authorization (CoA) and Disconnect
request (DM) messages to interact with the ClearPass Policy
Manager (CPPM) as part of the OmniSwitch BYOD solution.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-43
Configuring UNP Port-Based Access Control Configuring Universal Network Profiles
unp edge-profile maximum-ingress- Configures the maximum amount of bandwidth allocated for ingress
bandwidth traffic on UNP bridge ports assigned to the Edge profile.
unp edge-profile maximum-egress- Configures the maximum amount of bandwidth allocated for egress
bandwidth traffic on UNP bridge ports assigned to the Edge profile.
unp edge-profile maximum-ingress- Configures how much traffic is allowed to burst over the maximum
depth ingress bandwidth limit on UNP bridge ports assigned to the Edge
profile.
unp edge-profile maximum-egress- Configures how much traffic is allowed to burst over the maximum
depth egress bandwidth limit on UNP bridge ports assigned to the Edge
profile.
unp vlan-mapping edge-profile Maps a VLAN ID to an Edge profile. Devices classified into the
Edge profile are dynamically assigned into the VLAN associated
with the profile.
page 30-44 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
To configure a UNP Edge profile, use the unp edge-profile commands and the unp vlan-mapping edge-
profile command. For example, the following command creates the “guest_user” profile to assign devices
to VLAN 500 and apply the rules from the “temp_rules” policy list:
-> unp edge-profile guest_user
-> unp edge-profile qos-policy-list temp_rules
-> unp vlan-mapping edge-profile guest_user vlan 500
To verify the UNP configuration for the switch, use the show unp edge-profile command. For more
information about profiles, see “Profile Types” on page 30-20.
For more information about the unp commands described in this section, see the “UNP Commands”
chapter in the OmniSwitch AOS Release 8 CLI Reference Guide.
Command Description
unp vlan-profile Creates a VLAN profile and associates the profile with a name and
VLAN ID.
unp vlan-profile qos-policy-list Assigns a QoS policy list to a VLAN profile. If there is no list
assigned to a profile, users classified into that profile are granted full
access within the profile VLAN domain.
unp vlan-profile mobile-tag Configures the mobile tagging status for the profile. When enabled,
the UNP port to which a device is connected is tagged with the
VLAN ID associated with the VLAN profile when the device is
classified into that profile.
unp vlan-profile maximum-ingress- Configures the maximum amount of bandwidth allocated for ingress
bandwidth traffic on UNP bridge ports assigned to the VLAN profile.
unp vlan-profile maximum-egress- Configures the maximum amount of bandwidth allocated for egress
bandwidth traffic on UNP bridge ports assigned to the VLAN profile.
unp vlan-profile maximum-ingress- Configures how much traffic is allowed to burst over the maximum
depth ingress bandwidth limit on UNP bridge ports assigned to the VLAN
profile.
unp vlan-profile maximum-egress- Configures how much traffic is allowed to burst over the maximum
depth egress bandwidth limit on UNP bridge ports assigned to the VLAN
profile.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-45
Configuring UNP Port-Based Access Control Configuring Universal Network Profiles
UNP port on which the traffic is received is configured with alternate classification methods (see
“Configuring UNP Port Parameters” on page 30-35).
• Specifying a QoS policy list name that is inactive or does not already exist in the switch configuration
is allowed. However, the list will remain inactive for the UNP until the list is enabled or configured
using the QoS policy list commands (see “Configuring QoS Policy Lists” on page 30-50).
• A UNP VLAN profile can be configured as a default profile for a UNP bridge port. If authentication
and classification do not return a profile name, the device is then assigned to the default VLAN profile
associated with the bridge port on which the device was learned. See “Configuring UNP Port
Parameters” on page 30-35.
To configure a UNP VLAN profile, use the unp vlan-profile command. For example, the following
command creates the “guest_user” profile to assign devices to VLAN 500 and applies the rules from the
“temp_rules” policy list:
-> unp vlan-profile guest_user vlan 500 qos-policy-list temp_rules
To verify the VLAN profile configuration for the switch, use the show unp vlan-profile command. For
more information about profiles, see “Configuring Profiles” on page 30-43.
For more information about the unp commands described in this section, see the “UNP Commands”
chapter in the OmniSwitch AOS Release 8 CLI Reference Guide.
Use the disable option with the dynamic-vlan-configuration command to disable dynamic configuration.
-> unp dynamic-vlan-configuration disable
Dynamic VLAN configuration is a global UNP setting that applies to all profiles. To verify if this setting
is enabled or disabled, use the show unp global configuration command.
Consider the following when enabling dynamic VLAN configuration:
• The VLAN status and other port (non-UNP port) assignments are configurable using standard VLAN
commands. In addition, the STP status of the VLAN is configurable and enabled by default when the
dynamic VLAN is created.
• A dynamic VLAN cannot be deleted using standard VLAN commands (no vlan vlan_id).
• UNP dynamic VLANs are identified as a separate type of VLAN. The vlan show commands will
display this type with the default name of “UNP-DYN-VLAN” and the designated type as “UNP
Dynamic Vlan”. For example:
-> show vlan 450
Name : UNP-DYN-VLAN,
Type : UNP Dynamic Vlan,
Administrative State : enabled,
Operational State : disabled,
page 30-46 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
• Dynamic VLANs are not saved in the “! VLAN:” section of the switch configuration file ([Link]).
However, the unp commands to enable dynamic VLAN configuration and create the UNP are saved in
the “! DA-UNP:” section of [Link] (see the following sample [Link] file). As a result, the VLAN is
created again on the next switch bootup.
Use the disable option with the dynamic-profile-configuration command to disable this functionality.
For example:
-> unp dynamic-profile-configuration disable
Dynamic profile configuration is a global UNP setting that is applied to traffic on any UNP bridge port
that is configured to trust the VLAN tag of the incoming packets. To verify if this setting is enabled or
disabled, use the show unp global configuration command.
Consider the following when enabling dynamic profile configuration:
• A profile is only dynamically created if the trust VLAN tag is enabled for the UNP bridge port and the
packet VLAN tag matches an MVRP VLAN ID that is not assigned to a UNP or there is no matching
VLAN ID in the switch configuration.
• Dynamically created profiles are saved in the [Link] file for the switch.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-47
Configuring UNP Port-Based Access Control Configuring Universal Network Profiles
• After the dynamic profile is created, changing the VLAN profile name, associated VLAN ID, or the
QoS policy list is allowed. To avoid any confusion, change the profile name if the VLAN ID associated
with the profile has changed.
• When the dynamic profile configuration option is enabled along with the dynamic VLAN configuration
option, if the dynamically created profile refers to a VLAN that is an MVRP VLAN, then the MVRP
VLAN is automatically converted to a dynamic UNP VLAN (UNP-DYN-VLAN).
Command Description
unp spb-profile Creates an SPB profile and associates the profile with a name, a
VLAN tag value, a Service Instance ID (I-SID), and a Backbone
VLAN (BVLAN) ID. The VLAN tag, I-SID, and BVLAN values
are used to define a Service Access Point (SAP) for profile traffic.
unp spb-profile qos-policy-list Assigns a QoS policy list to an SPB profile. If there is no list
assigned to a profile, users classified into that profile are granted full
access within the profile service domain.
unp spb-profile multicast-mode Configures the multicast replication mode (head-end or tandem) for
the SPB service that is associated with the SPB profile. The
multicast mode determines how non-unicast packets are replicated
through the SPB backbone network.
unp spb-profile vlan-xlation Configures the status of VLAN translation for egress traffic
associated with the SPB profile. When enabled, the VLAN tags for
profile traffic are processed according to the settings for the SAP on
which the frames will egress, not according to the settings for the
SAP on which the frames were received.
unp spb-profile mobile-tag Configures the mobile tagging status for the profile. When enabled,
the UNP port to which a device is connected is tagged with the
BVLAN ID associated with the SPB profile when the device is
classified into that profile.
0 (zero) The VLAN tag of the packet is used to determine the SAP
encapsulation value. Setting the profile tag value to zero has the
same result as enabling trust VLAN tag for the UNP SPB access
port.
Outer VLAN tag The outer VLAN tag value to use for the SAP encapsulation value.
page 30-48 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
Inner and outer VLAN tags The inner and outer VLAN tag values to use for the SAP
encapsulation value.
• If classified traffic is untagged, then zero is used for the SAP encapsulation value (for example, 1/2:0).
• If the I-SID value specified does not exist in the switch configuration, the service is dynamically
created first then the SAP is dynamically created and associated with this service.
• The BVLAN associated with an SPB service profile must already exist in the switch configuration.
• If the VLAN tag value of the classified traffic does not match the tag value specified in the profile,
UNP will check to see if the trust VLAN tag option is enabled for the UNP SPB access port. If so, a
SAP is assigned using the VLAN tag values of the traffic. If not, the traffic is learned as filtering on the
UNP port.
• The default setting for the SPB multicast mode is the head-end mode.
– When the head-end multicast mode is used, a non-unicast packet received on an SPB access port is
replicated once for each receiver in the provider backbone bridge (PBB) network using its unicast
base MAC (BMAC) address.
– When the tandem multicast mode is used, a non-unicast packet received on an SPB access port is
replicated once at each node using the multicast group address.
• Specifying a QoS policy list name that is inactive or does not already exist in the switch configuration
is allowed. However, the list will remain inactive for the UNP until the list is enabled or configured
using the QoS policy list commands (see “Configuring QoS Policy Lists” on page 30-50).
• A UNP SPB profile can be configured as a default profile for a UNP SPB access port. If authentication
and classification do not return a profile name, the device is then assigned to the default SPB profile
associated with the UNP SPB access port on which the device was learned. See “Configuring UNP
Port Parameters” on page 30-35.
To configure a UNP SPB service profile, use the unp spb-profile command. For example, the following
command creates the “vNP1” profile to assign device traffic tagged with VLAN 10 to service 1500 bound
to BVLAN 500 and apply the rules from the “ServerA_rules” policy list:
-> unp spb-profile vNP1 tag-value 10 isid 1500 bvlan 500 qos-policy-list
ServerA_rules
The following command example changes the multicast replication mode and enables egress VLAN
translation for the service profile:
-> unp spb-profile spb3 tag-value 200 isid 1500 bvlan 4002 multicast-mode tandem
vlan-xlation enable
To verify the UNP SPB service profile configuration for the switch, use the show unp spb-profile
command. For more information about profiles, see “Configuring Profiles” on page 30-43.
For more information about the unp commands described in this section, see the “UNP Commands”
chapter in the OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-49
Configuring UNP Port-Based Access Control Configuring Universal Network Profiles
Note that the no default-list option was used to create the rules in this example. Using this option is
recommended when creating a policy list for a UNP.
Consider the following guidelines when configuring QoS/ACL policy rules and lists:
• A default policy list exists in the switch configuration. Rules are added to this list when the rule is
created. A rule can belong to multiple policy lists. As a result, the rule remains a member a of the
default list even when it is subsequently assigned to additional lists.
• Each time a rule is assigned to a policy list, an instance of that rule is created. Each instance is
allocated system resources. To exclude a rule from the default policy list, use the no default-list option
of the policy rule command when the rule is created. For example:
-> policy rule r1 condition c1 action a1 no default-list
• Up to 32 policy lists (including the default list) are supported per switch. Only one policy list per UNP
is allowed, but a policy list can be associated with multiple profiles.
• If a rule is a member of multiple policy lists but one or more of these lists are disabled, the rule is still
active for those lists that are enabled.
• If the QoS status of an individual rule is disabled, then the rule is disabled for all policy lists, even if a
list to which the policy belongs is enabled.
• Policy lists are not active on the switch until the qos apply command is issued.
Use the show policy list command to display the QoS policy rule configuration for the switch.
For more information about configuring QoS/ACL policy lists, see “Creating Policy Lists” on page 27-42
in Chapter 27, “Configuring QoS.”
For more information about using QoS policy lists to assign and/or dynamically change role-based access
for devices connected to UNP ports, see Chapter 31, “Configuring Access Guardian.”
page 30-50 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
For example, the following command is used to configure a MAC address range rule and assign that rule
to an existing UNP Edge profile named “Engineering”:
-> unp classification mac-address-range [Link] [Link]
edge-profile Engineering
If the source MAC address of a device falls within the specified range of the example rule, then the device
is classified into the “Engineering” profile and assigned to the VLAN associated with that profile.
The VLAN tag rule can be combined with other rules to include the tag as a required parameter to match
for the rule. For example, to include the VLAN tag with a MAC address rule, use the unp classification
mac-address rule command with the vlan-tag option:
-> unp classification mac-address [Link] vlan-tag 10 vlan-profile
serverA
In this example, a device is classified with UNP “serverA” if the source MAC address of the device is
“[Link]” and device packets are tagged with VLAN 10.
When a VLAN tag rule is combined with another rule, the combined rule takes precedence over the rule
that does not specify a VLAN tag. For example, a rule that specifies a MAC address and a VLAN tag
takes precedence over a rule that specifies only a MAC address.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-51
Configuring UNP Port-Based Access Control Configuring Universal Network Profiles
• The unp-customer-domain parameter is configurable for rules that classify traffic into a UNP VLAN
or SPB profile. The classification rules are then applied only to UNP bridge and SPB access ports that
are assigned to the specified customer domain ID. For example, the following commands configure
classification rules that are applied only to UNP bridge or SPB access ports that are assigned to
customer domain IDs 10, 5, and 2:
-> unp classification vlan-tag 100 unp-customer-domain 10 vlan-profile
serverA_unp
-> unp classification ip-address [Link] mask [Link] unp-customer-domain 5
spb-profile vm-1
-> unp classification mac-address [Link] unp-customer-domain 2 vlan-
profile serverB_unp
• The group-id parameter is configurable for rules that classify traffic into UNP Edge profiles. The
classification rules are then applied only to UNP edge ports that are assigned to the specified group ID.
For example, the following commands configure classification rules that are applied only to UNP edge
ports that are assigned to group IDs 10 and 20:
-> unp classification group-id 10 edge-profile myProfile1
-> unp classification ip-address [Link] group-id 1 edge-profile myProfile1
-> unp classification mac-address [Link] group-id 1 vlan-tag 200
edge-profile myProfile1
See “Configuring UNP Port Domains” on page 30-42 for more information.
If the source MAC address, source IP address, and port of a device matches the MAC address, IP address,
and port defined in the example binding rule, then the device is classified into the “Profile-1” profile and
assigned to the VLAN associated with that profile.
page 30-52 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
For example, the following commands create an extended classification rule named “ext-r1” with the
precedence value set to 255 and assign the rule to a UNP Edge profile named “corporate”:
-> unp classification-rule ext-r1 precedence 255
-> unp classification-rule ext-r1 edge-profile corporate
Next, the following commands define a port rule and an authentication type rule and assign the rules to the
“ext-r1” extended rule:
-> unp classification-rule ext-r1 port 1/1/10
-> unp classification-rule ext-r1 authentication-type 8021x
Note that the “ext-1” rule combines a port rule and an authentication type rule. This combination of rules
is not allowed in a binding rule configuration.
The precedence value assigned to an extended classification rule is used to determine precedence among
only extended classification rules. However, all extended rules take precedence over all individual and all
binding rules. So if a device matches a binding rule (or an individual rule) and an extended rule, the device
is classified into the profile associated with the extended rule.
Use the show unp classification and show unp classification-rule commands to verify the UNP
classification rule configuration for the switch. For more information about UNP rules, see “UNP
Classification Rules” on page 30-25.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-53
UNP Application Example Configuring Universal Network Profiles
UNP Classification
The illustration below shows the sample UNP configuration described in this section. In this configuration,
• Pre-defined UNPs on the OmniSwitch 6860 are associated with a profile name, VLAN ID, and
optionally any classification rules and/or a QoS policy list.
• The RADIUS server is configured with UNP profile names associated with device MAC addresses.
• UNP functionality is enabled on the OmniSwitch 6860 ports that are connected to network devices that
will generate traffic to which UNP profiles are applied.
ACLs, ACLs
QoS, QoS,
VLAN VLAN VM Server
[Link]
Employee
[Link] [Link] [Link]
As soon as the network devices connected to the UNP ports start sending traffic, the switch applies the
UNP port and profile configuration to determine which UNP to apply to the traffic. Once the appropriate
UNP is identified, the device and the port to which the device is connected are dynamically assigned to the
VLAN associated with the UNP.
Because the UNP port and profile configuration is applied to each device connected to or through a UNP
port, it is possible for that port to belong to more than one UNP VLAN. For example, if on the server the
virtual machine “VM-1” is associated with UNP1, and “VM-2” with “UNP2” and “VM-3” with “UNP3”,
then the port to which the server is connected is dynamically assigned to VLANs 10, 20, and 30.
page 30-54 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles UNP Application Example
2 Enable MAC authentication for the switch and specify the RADIUS server to use for authenticating
non-supplicants using the aaa device-classification mac command.
-> aaa device-classification mac rad1
-> vlan 10
-> vlan 20
-> vlan 30
2 Configure UNP1 with VLAN 10 and a MAC classification rule using the unp edge-profile and unp
classification mac-address commands.
-> unp edge-profile unp1
-> unp vlan-mapping edge-profile vlan 10
-> unp classification mac-address [Link] edge-profile unp1
3 Configure UNP2 with VLAN 20 and a MAC classification rules using the unp edge-profile and unp
classification mac-address commands.
-> unp edge-profile unp2
-> unp vlan-mapping edge-profile vlan 20
-> unp classification mac-address [Link] edge-profile unp2
-> unp classification mac-address [Link] edge-profile unp2
4 Create a QoS policy list for UNP2 and then associate the list to UNP2 using the unp edge-profile qos-
policy-list command parameter.
-> policy condition c1 source ip [Link]
-> policy action a1 redirect port 1/2
-> policy rule r1 condition c1 action a1
-> policy list list1 type unp
-> policy list list1 rules r1 enable
5 Configure UNP3 with VLAN 30 and a MAC classification rule using the unp edge-profile and unp
classification mac-address commands.
-> unp edge-profile unp2
-> unp vlan-mapping edge-profile vlan 30
-> unp classification mac-address [Link] edge-profile unp2
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-55
UNP Application Example Configuring Universal Network Profiles
2 Enable MAC authentication on the UNP ports using the unp mac-authentication command. If
authentication is not enabled, the MAC of the device connected to the port is not sent to the RADIUS
server for authentication.
-> unp port 2/1/1-10 mac-authentication enable
4 Enable classification on the UNP ports using the unp classification command. If classification is not
enabled, UNP will not apply profile rules to classify traffic.
-> unp port 2/1/1-10 classification enable
5 Configure a default UNP, if necessary, using the unp default-edge-profile command. This UNP is
applied when all other options fail to classify the device.
-> unp port 2/1/1-10 default-edge-profile def_unp
2 Change the authentication server down timer value, if necessary, using the unp auth-server-down
timeout command. When the timer value expires for a device, re-authentication and/or classification is
attempted for that device.
-> unp auth-server-down edge-profile timeout 120
page 30-56 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Universal Network Profiles Verifying the UNP Configuration
show unp edge-profile Displays the Edge profile configuration for the switch.
show unp vlan-profile Displays the VLAN profile configuration for the switch.
show unp spb-profile Displays the Shortest Path Bridging (SPB) service profile configuration
for the switch.
show unp classification Displays the classification rules configured for each profile.
show unp global configuration Displays the status of dynamic VLAN configuration and whether or not
an authentication server down UNP is configured.
show unp group-id Displays the group IDs configured for the switch. This type of ID is
used to group UNP edge ports into logical domains.
show unp customer-domain Displays the customer domain IDs configured for the switch. This type
of ID is used to group UNP bridge and SPB access ports into logical
domains.
show unp port Displays the UNP port configuration for the switch. Lists ports that are
UNP-enabled and the status of parameters for that port.
show unp user Displays the MAC addresses learned on the UNP ports. This includes
the UNP name, VLAN ID, and the status of the MAC on the port.
For more information about these commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 30-57
Verifying the UNP Configuration Configuring Universal Network Profiles
page 30-58 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
31 Configuring Access
Guardian
Access Guardian refers to the following Alcatel-Lucent OmniSwitch security functions that work together
to provide a dynamic, proactive network security solution:
• Universal Network Profile (UNP)—Access Guardian is configured and applied through the
framework of the UNP feature. UNP is enabled on switch ports to activate Access Guardian
functionality that is used to authenticate and classify users into UNP Edge, VLAN, or Shortest Path
Bridging (SPB) profiles. Each profile is mapped to a VLAN ID or SPB Service Access Point (SAP) to
which the user is dynamically assigned. Specific UNP port configurations help to simplify and easily
replicate the same configuration across multiple ports.
• Authentication, Authorization, and Accounting (AAA)—Provides the switch-based authentication
and accounting configuration that defines the RADIUS-capable servers to use for each type of Access
Guardian authentication (802.1X, MAC, and Captive Portal). AAA profiles define a specific AAA
configuration that can be applied at the port level (overrides the global AAA configuration).
• Bring Your Own Device (BYOD) - OmniSwitch / ClearPass Integration: The OmniSwitch
leverages Access Guardian functionality along with the ClearPass Policy Manager (CPPM) to provide
the overall BYOD solution. BYOD allows a wired guest, device, or authenticated user to connect to the
network through an OmniSwitch edge device using the CPPM for unified authentication. CPPM
provides the framework for device onboarding, guest registration and authentication, as well as device
posture checking and profiling.
• Captive Portal—Internal and external Captive Portal Web-based authentication. Internal Captive
Portal authentication is provided through an internal Web server on the OmniSwitch that presents
default or customized Web pages to the user. A post-authentication and/or post-classification process to
validate user credentials and dynamically assign a new role (policy list) to enforce user access to the
network. External, guest Captive Portal authentication is provided through the OmniSwitch Access
Guardian interaction with the ClearPass Policy Manager.
• Quarantine Manager and Remediation (QMR)—QMR is a switch-based application that restricts
the network access of known quarantined users and provides a remediation path to allow quarantined
users to regain their network access.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-1
In This Chapter Configuring Access Guardian
In This Chapter
This chapter provides an overview of Access Guardian security features and describes how to configure
these features through the Command Line Interface (CLI). CLI commands are used in the configuration
examples; for more details about the syntax of commands, see the OmniSwitch AOS Release 8 CLI
Reference Guide.
The following information and procedures are included in this chapter:
• “Access Guardian Specifications” on page 31-3.
For more information about configuring the UNP feature, see Chapter 30, “Configuring Universal
Network Profiles.”
page 31-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Specifications
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-3
Access Guardian Defaults Configuring Access Guardian
page 31-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Defaults
See “Configuring a UNP Edge Profile” on page 31-35 for more information about Edge profiles.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-5
Access Guardian Defaults Configuring Access Guardian
See “Configuring a UNP VLAN Profile” on page 31-38 for more information about VLAN profiles.
See “Configuring a UNP SPB Profile” on page 31-41 for more information about SPB service profiles.
See Chapter 7, “Configuring Shortest Path Bridging,” for more information about SPB services.
page 31-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Defaults
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-7
Access Guardian Defaults Configuring Access Guardian
page 31-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Defaults
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-9
Access Guardian Defaults Configuring Access Guardian
page 31-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Overview
The Access Guardian features work together to provide a dynamic, integrated security framework. As
shown in the following diagram:
Classification
Role-Based
Access
Restrict or Block
The Access Guardian feature is implemented through the following switch-based functionality:
• MAC-based and 802.1X-based authentication using a RADIUS-capable server.
• Universal Network Profile (UNP) framework to provide network access control and Quality of Service
(QoS) on a per-user basis.
• Switch-wide classification rules to classify users based on port and device attributes (for example,
source MAC, Group ID, IP address). No authentication required.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-11
Access Guardian Overview Configuring Access Guardian
• Default UNP classification for traffic not classified through other methods.
• Internal Captive Portal for Web-based authentication. Provides dynamic role change for the user
device.
• Integration with ClearPass Policy Manager (CPPM) as part of the OmniSwitch Bring Your Own
Device (BYOD) network access solution.
This chapter documents the functionality of the Access Guardian feature and how it is configured on the
OmniSwitch.
Device Authentication
Physical devices attached to a LAN port on the switch through a point-to-point LAN connection can be
authenticated through the switch using port-based network access control. This control is available through
the Universal Network Profile (UNP) feature implemented on the switch.
Access Guardian uses the UNP feature to provide configurable authentication and classification
mechanisms for both 802.1x clients (supplicants) and non-802.1x clients (non-supplicants). The following
options for authentication are available:
• 802.1X authentication for supplicants.
Uses Extensible Authentication Protocol (EAP) between an end device and a network device (NAS) to
authenticate the supplicant through a RADIUS server. If authentication returns a UNP, the supplicant is
assigned to that UNP. If a UNP name is not returned or authentication fails, then the UNP port and
classification rule configuration provides the network access control for the supplicant.
• MAC-based authentication for non-supplicants.
MAC-based authentication does not require any agent or special protocol on the non-supplicant device;
the source MAC address of the device is verified through a remote RADIUS server. The switch sends
RADIUS frames to the server with the source MAC address embedded in the username and password
attributes. If authentication returns a UNP name, the non-supplicant is assigned to that profile. If a UNP
name is not returned or authentication fails, then the UNP port and classification rule configuration
provides the network access control for the non-supplicant.
For non-supplicant authentication, the client MAC address is sent as username and password. The
administrator can configure the password and username on the authentication server as the MAC
address of the client. The calling-station-ID, accounting-session-ID are also sent for authentication. All
these IDs can be in uppercase or lowercase.
• Internal Captive Portal authentication.
Internal Captive Portal authentication is a configurable option for a UNP Edge profile that is applied
after a user is initially assigned to that profile (after the initial 802.1X or MAC authentication or
classification process). Captive Portal provides a secondary level of authentication that is used to apply
a new role (QoS policy list) to the user. This type of authentication may change the Edge profile
assignment for the user device.
When a user is classified into a profile that has the Captive Portal option enabled, a Web page is
presented to the user device to prompt the user to enter login credentials. The credentials are then
authenticated through a RADIUS server. If the authentication process results in a new policy list or
new Edge profile, the policy list or profile is applied to the user device. If a policy list or profile is not
assigned or authentication fails, the policy list associated with the initial Edge profile is used to define
the network access role for the user.
page 31-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Overview
External Captive Portal authentication is provided through the OmniSwitch Bring Your Own Device
(BYOD) solution. Access Guardian, through the UNP port and profile framework, redirects user device
traffic to the ClearPass Policy Manager (CPPM) server for Guest Access using the CPPM Guest
module.
802.1X and MAC authentication are Layer 2 mechanisms that are configured and invoked at the port
level. A UNP port is enabled with either 802.1X, MAC, or both types of authentication. Devices
connected to UNP ports undergo the type of authentication configured on the port.
Internal and external Captive Portal authentication are Layer 3 mechanisms that are invoked through the
UNP Edge profile configuration. Devices connected to UNP ports initially undergo Layer 2 authentication
and/or classification at the port level to determine an initial UNP Edge profile assignment. Then, based on
the profile settings, the user may be redirected for Layer 3 authentication.
The authentication functionality provided allows the administrator to assign the appropriate method of
authentication. Multiple authentication methods for multiple users (many users or different types of users,
such as IP phones) are supported on the same port.
Device Classification
Successful device authentication can result in a UNP profile assignment for the user device. However, if
authentication is not available or does not return a profile name for whatever reason, the following
additional UNP device classification methods are available to classify a user device into a profile:
• UNP classification rules. Switch-wide classification rules to classify users based on port and device
attributes (for example, source MAC, Group ID, IP address). Classification rules are associated with
profiles and are applied to traffic received on UNP-enabled ports. When any of the traffic matches one
of the classification rules, the user device is dynamically assigned to the matching profile.
• Alternate pass UNP. A UNP associated with a UNP port to which traffic is assigned when successful
802.1X or MAC authentication does not return a UNP name.
• Default UNP. A UNP associated with a UNP port to which traffic is assigned when other
authentication or classification attempts fail to provide a profile name.
• Trust VLAN tag. Configured on a UNP port to specify whether or not to trust the VLAN tag of the
packets received on the port. If this option is enabled and the VLAN tag matches an existing VLAN in
the switch configuration, the traffic is assigned to that VLAN when other authentication or
classification attempts fail to provide a profile name.
• Authentication server down UNP. A global UNP that provides a temporary profile for devices unable
to authenticate because the RADIUS server is unreachable. This profile is associated with a timer that
determines how long the device remains in the temporary profile before authentication is attempted
again.
Enabling 802.1X and/or MAC authentication on UNP ports is optional; an administrator may decide to use
UNP classification rules instead. When enabled, however, the authentication method takes precedence
over classification methods.
Role-based Access
When a user is authenticated and/or classified into a UNP profile, the initial role of that user is determined
by whether or not there is a QoS policy list associated with the profile.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-13
Access Guardian Overview Configuring Access Guardian
• If there is no policy list available, then the user has full access to the switch and network resources as
provided through the profile VLAN or service domain to which the user was assigned.
• If a policy list is available, then the QoS policy rules associated with that list are applied to the port and
traffic of the user device.
Access Guardian provides the following post-authentication and post-classification mechanisms for
dynamically changing the role (QoS policy list) applied to a user device.
• Internal Captive Portal. User undergoes a secondary authentication process through Captive Portal
Web-based authentication. Successful Captive Portal authentication applies the QoS policy list returned
from the RADIUS server or specified in the Captive Portal authentication pass configuration. The
newly obtained policy list overrides the policy list associated with the Edge profile to which the device
was initially assigned. The outcome of this process may change the Edge profile assignment for the
user device. See “Using Captive Portal Authentication” on page 31-48 for more information.
• Location and Time Policies. When a user classified into the Edge profile violates a location or time
policy associated with the profile, a built-in unauthorized restricted role is applied to that user,
overriding the policy list associated with the profile.
• Built-in Restricted Roles. When one of the built-in restricted roles is applied to a user device, an
implicit QoS policy list associated with that role is applied to that device instead of the Edge profile
policy list. A custom policy list can be associated with a restricted role to override the built-in role.
• User-defined Roles. When the state of a device matches specific conditions configured for a user-
defined role. An explicit QoS policy list associated with this type of role is applied to the device instead
of the Edge profile policy list.
User-Defined Roles
A user-defined role applies an explicit QoS policy list to an Access Guardian user based on the following
conditions:
page 31-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Overview
• The type of authentication applied to the user device (802.1X, MAC, or none). Can also define this
condition based on whether or not the user failed 802.1X or MAC authentication.
• The user is in a Captive Portal post-login state.
The explicit policy list is not applied to a user unless all of the conditions configured for the user-defined
role are met.
In addition to these conditions, a precedence value is configured for user-defined roles. This value is used
to determine precedence among other user-defined roles. Every time the user context changes for a device,
all the user-defined roles are checked to see if there is a role that matches the current user context.
UNP Profiles
Access Guardian role-based network access is achieved through the OmniSwitch Universal Network
Profile (UNP) feature. A UNP profile defines network access for one or more user devices. Each device
that is assigned to a specific profile is granted network access based on the profile criteria, instead of on an
individual MAC address, IP address, or port basis.
Assigning users to a profile provides greater flexibility and scalability across the network. Administrators
can use profiles to group users according to function. All users assigned to the same UNP become
members of that profile group. The UNP then determines what network access resources are available to a
group of users, regardless of source subnet, VLAN, or other characteristics.
Dynamic assignment of devices to UNP profiles is achieved through UNP port-based functionality that
provides the ability to authenticate and classify device traffic. Authentication verifies the device identity
and provides a UNP name. In the event authentication is not available or is unsuccessful, classification
rules associated with profiles or UNP port configuration parameters are applied to the traffic to determine
the UNP assignment.
UNP supports three types of classification profiles:
• VLAN profile. This type of profile creates a VLAN-port association (VPA) for device traffic that is
classified into the profile. The VPA represents an association between the UNP port on which the
device traffic was received and the VLAN ID specified by the profile. Once classified into a specific
profile, device traffic is tagged to forward on the UNP VLAN.
• Edge profile. This type of profile also creates a VPA between the UNP port on which device traffic
was received and the VLAN ID associated with the profile. Device traffic is then forwarded on the
VLAN ID associated with the profile. Specifically designed to offer network access control to edge
devices, Edge profiles offer additional attributes to redirect devices for internal Captive Portal
authentication and integration with the OmniSwitch Bring Your Own Device (BYOD) solution.
• SPB profile. The OmniSwitch supports Shortest Path Bridging (SPB) service profiles. This type of
profile creates an association between device traffic that is classified into the profile and a Service
Access Point (SAP). Once classified into a specific profile, device traffic is then forwarded on the SPB
service associated with the SAP.
The OmniSwitch supports two separate traffic domains: VLAN and service. The availability of two
VLAN-based profiles (Edge and VLAN) and an SPB service profile provides an efficient method for
network access control and dynamic assignment of device traffic to one of these domains.
Using the VLAN and Edge profiles, an administrator can implement the same UNP name across the entire
network infrastructure, as the VLAN association is kept locally on each switch. For example, the
administrator can deploy the UNP named “Engineering” in one building using VLAN 10, while the same
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-15
Access Guardian Overview Configuring Access Guardian
UNP deployed in another building can use VLAN 20. The same UNP access controls are applied to all
profile devices in each building, even though they belong to different VLANs.
The SPB service profile is particularly useful in the Alcatel-Lucent Data Center solution to facilitate
virtual machine (VM) discovery and movement. UNP service profiles used for such purposes are also
referred to as virtual network profiles (vNPs).
The following table provides a list of configurable profile attributes and the profile type that supports each
attribute. For example:
• Classification rules are configurable for a UNP Edge, VLAN, and SPB profile, so the “Supported
Profile” field contains “All profiles” for this attribute.
• The VLAN mapping is only configurable for a UNP Edge and VLAN profile, so the “Supported
Profile” field contains “Edge and VLAN profiles” for this attribute.
page 31-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Overview
For more information about configuring a UNP, see “Configuring UNP Profiles” on page 31-35 and
Chapter 30, “Configuring Universal Network Profiles.”
• A MAC address range classification rule is associated with a UNP Edge profile named “Engineering”.
This rule defines a MAC address range of “[Link] through [Link]”.
• A device connecting to port 1/1/10 with a source MAC address that falls within the specified MAC
address range is assigned to the “Engineering” profile. The device and port on which the device was
learned are also dynamically assigned to the VLAN associated with the profile.
Enabling classification and defining classification rules is optional with UNP. When enabled, however,
classification rules are only applied to UNP ports when one of the following occurs:
• 802.1X and MAC authentication are disabled on the port.
• 802.1X and/or MAC authentication is enabled but the RADIUS server is not configured.
• 802.1X and/or MAC authentication is enabled but RADIUS authentication did not return a UNP name
or failed.
If classification is disabled on a UNP port, classification rules are not applied to traffic received on that
port. If both authentication and classification are disabled on a UNP port, traffic received on that port is
blocked, unless a default UNP is configured for that port.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-17
Access Guardian Overview Configuring Access Guardian
• The MAC address rule is configurable for a UNP Edge, VLAN, and SPB profile, so the “Supported
Profile” field contains “All profiles” for the MAC address rule type.
• The Port rule is only configurable for a UNP Edge profile, so the “Supported Profile” field contains
“Edge profile” for the Port rule type.
The rules are listed in the order of precedence (highest to lowest).
page 31-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Overview
Note. Binding classification rules are only associated with UNP Edge profiles and take precedence over
individual classification rules.
Note. Extended classification rules are only associated with UNP Edge profiles and take precedence over
all other UNP classification rule types (individual rules and binding rules).
For more information see “Configuring UNP Classification Rules” on page 31-45 and Chapter 30,
“Configuring Universal Network Profiles.”.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-19
Interaction With Other Features Configuring Access Guardian
• A configurable redirect parameter for UNP Edge profiles to allow devices assigned to the profile to
honor CoA and DM messages from the CPPM.
• A port bounce operation is configurable on UNP ports to trigger re-authentication of non-supplicants
upon receipt of CoA and DM messages.
• A global pause timer is available to determine the amount of time the switch filters traffic from non-
supplicant (non-802.1X) devices on all UNP ports. This is done to clear the context of the user and is
triggered upon receipt of a CoA message that requires a VLAN change for the device.
For more information about the OmniSwitch BYOD solution, see “Bring Your Own Devices (BYOD)
Overview” on page 31-77.
• The LPS learning window is set globally but not on a per-port basis. So the window applies to all UNP
ports.
• When LPS is enabled or disabled on a UNP edge or bridge port (LPS is not supported on UNP access
ports), MAC addresses already learned on that port are flushed.
• Configuring a static MAC address is not allowed on a UNP port unless LPS is also enabled on the same
port.
• When both LPS and UNP are enabled on the same port,
page 31-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Interaction With Other Features
– UNP first authenticates and classifies any MAC addresses received, then LPS rules are applied.
– If a MAC address violates any of the LPS rules for the port, the address may get filtered or the port
violated even if UNP initially determined the address was valid. In other words, LPS rules take
precedence over UNP to determine if a MAC address is bridged or filtered on the port.
• If UNP classifies a MAC address as learning but LPS learns the address as filtering, an untagged
packet will show as filtering in the default VLAN for the port and a tagged packet MAC will show as
filtering in the specific tagged VLAN.
• When a MAC address is filtered by LPS, the show unp edge-user command will display “LPS-
Blocked” as the classification source for that MAC address.
• The UNP port configuration determines the following for devices connected to a UNP port or link
aggregate:
– The type of authentication (802.1X and/or MAC) attempted, if any.
– Whether device classification is enabled to move devices into profiles based on the outcome of the
authentication process, if any.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-21
Interaction With Other Features Configuring Access Guardian
– If devices that do not receive a UNP assignment through the authentication or classification process
are assigned to a default profile associated with the port.
• There are three type of UNP ports supported: Edge, Bridge, and SPB access. The traffic received on
each port type is classified into the corresponding profile type (Edge, VLAN, and SPB) for each port.
Classification rules configured for each profile type are applied only to traffic learned on UNP ports to
which the profile is applied. For example:
– Edge profiles classify traffic received on UNP edge ports.
– VLAN profiles classify traffic received on UNP bridge ports.
– SPB service profiles classify traffic received on UNP access ports.
page 31-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-23
Configuring Port-Based Network Access Control Configuring Access Guardian
In this example, the rad1 server is used for authenticating user devices connected to UNP ports on which
802.1X authentication is enabled. If rad1 becomes unavailable, the switch then uses rad2 for 802.1X
authentication.
To set the switch to use specific servers for MAC authentication, use the aaa device-authentication
command with the mac parameter. For example:
-> aaa device-authentication mac rad1 rad2
In this example, the rad1 server is used for authenticating user devices connected to UNP ports on which
MAC authentication is enabled. As in the 802.1X authentication example, if rad1 becomes unavailable,
the switch will then use rad2 for MAC authentication.
To set the switch to use specific servers for internal Captive Portal authentication, use the aaa device-
authentication command with the captive-portal parameter. For example:
-> aaa device-authentication captive-portal rad1 rad2
In this example, the rad1 server is used for authenticating user devices connected to UNP ports that are
classified into an Edge profile that has Captive Portal authentication enabled. As in the 802.1X and MAC
authentication example, if rad1 becomes unavailable, the switch will then use rad2 for internal Captive
Portal authentication.
Note. The same RADIUS servers can be used for 802.1x, MAC, and Captive Portal authentication. Using
different servers for each type of authentication is allowed but not required. For more information about
configuring authentication servers, see Chapter 35, “AAA Commands.”
For more information about authentication of supplicant and non-supplicant devices, see “Device
Authentication” on page 31-12.
Accounting Servers
Use the aaa accounting command to create an accounting server entry for 802.1X, MAC, and Captive
Portal authentication. For example, the following commands specify accounting servers for each type of
authentication:
-> aaa accounting mac rad1 rad2 rad3
-> aaa accounting 802.1x rad1 rad2 rad3 rad4
-> aaa accounting captive-portal rad1 rad2 rad3
Optionally, the Switch Logging (syslog) facility can be used for the accounting function. For example, the
following commands specify syslog as the accounting server for each type of authentication:
-> aaa accounting 802.1x syslog [Link] port 8000
-> aaa accounting mac syslog [Link] port 8000
-> aaa accounting captive-portal syslog [Link] port 8000
Accounting with the local syslog facility is not allowed if RADIUS accounting is already configured. In
other words, configure either RADIUS or syslog accounting.
page 31-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
The aaa session-timeout, aaa interim-interval, and aaa 802.1x re-authentication include a trust-radius
option that is disabled by default. When enabled, the value for the time is taken from the following
RADIUS attribute values returned from the RADIUS server. For example:
• The Session-Timeout attribute value received in an Access-Accept messages is used for the session
timeout and 802.1X re-authentication parameter values.
• The Acct-Interim-Interval attribute value received in an Access-Accept message is used for the
accounting interim update interval parameter.
Use the show aaa config command to display the current authentication session parameters values for
each type of authentication.
Use the show aaa radius config command to display RADIUS client attribute values and the MAC
address format.
For more information about the commands described in this section, see the OmniSwitch AOS Release 8
CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-25
Configuring Port-Based Network Access Control Configuring Access Guardian
• The accounting server to use for 802.1X, MAC, and Captive Portal authentication.
• Authentication session parameter values, such as the session timeout, inactivity timeout, interim
accounting interval, or 802.1X re-authentication interval.
• RADIUS attribute values for NAS-Port and NAS-Identifier attributes.
• MAC address format used when a MAC address is specified in the Calling-Station-ID and Called-
Station-ID attributes.
AAA profiles can be used to apply different sets of AAA configuration parameters to different sets of
ports. For example, different AAA profiles could be created to point to different RADIUS servers for each
authentication method. This would allow the switch to interact with a specific server on one set of ports
and interact with a different server on another set of ports.
In addition, an AAA profile can be assigned to a Captive Portal profile to define specific AAA
configuration options for Captive Portal authentication. A Captive Portal profile is assigned to a UNP
Edge profile and applied when Captive Portal authentication is enabled for the Edge profile.
Use the unp aaa-profile command to assign an AAA profile to a UNP port or UNP link aggregate. For
example:
-> unp port 1/1/5 aaa-profile A1
-> unp port 1/2/1-5 aaa-profile A2
-> unp linkagg 10 aaa-profile A3
-> unp linkagg 2-5 aaa-profile A4
Use the captive-portal-profile command to assign an AAA configuration profile to a Captive Portal
Profile. For example:
-> captive-portal-profile cp_p1 aaa-profile aaa-p1
page 31-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
Use the show aaa profile command to display the AAA profile configuration.
For more information about the commands described in this section, see the OmniSwitch AOS Release 8
CLI Reference Guide.
After a device is classified into the VLAN for this UNP, an attempt to re-authenticate the device is made
after a specific period of time (60 seconds by default). To change this time value, use the unp auth-
server-down timeout command.
-> unp auth-server-down edge-profile timeout 120
Configuring an authentication server down UNP is highly recommended when MAC or 802.1X
authentication is enabled on any UNP port or link aggregate. This is because after a switch reload, the
traffic from devices connected to UNP ports and link aggregates reaches the switch and triggers the
authentication process before route convergence has completed and the server can be reached.
• If an authentication server down UNP is configured, devices are temporarily learned in that profile and
authentication is automatically attempted again after the timeout period expires. This allows time for
the server to become reachable from the switch after a reload.
• If an authentication server down UNP is not configured, devices are learned as filtering and will remain
in that state. There is no further attempt to authenticate these devices again.
The authentication down UNP and related timer value are applied to all traffic received on all UNP ports
in the event the RADIUS server becomes unreachable. To verify if this setting is enabled or disabled, use
the show unp global configuration command.
Note. When device authentication fails due to an unreachable RADIUS server, an event message is sent to
the switch logging utility (swlog). See Chapter 37, “Using Switch Logging,” for more information.
There are three UNP port types supported: edge, bridge, and SPB access. When UNP is initially enabled,
the port type is set to “edge” by default. To enable UNP and specify a port type, use the unp port
command with the port-type parameter. For example:
-> unp port 1/1/12 port-type bridge
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-27
Configuring Port-Based Network Access Control Configuring Access Guardian
To remove the UNP configuration from a port or link aggregate, use the no form of the unp port
command. For example:
-> no unp port 1/1/3
-> no unp linkagg 10
To change the port type of an existing UNP port, remove the current UNP configuration using the no unp
port or no unp linkagg command then use the unp port-type command to set the new port type. For
example:
-> no unp port 1/12
-> unp port 1/12 port-type bridge
-> no unp linkagg 5
-> unp linkagg 5 port-type bridge
page 31-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
unp 802.1x-authentication max- Configures the maximum number of times the switch All ports
req will transmit a request for authentication information to
an 802.1X user on the port.
unp mac-authentication allow-eap Configures whether to attempt 802.1X authentication All ports
after MAC authentication passes or fails on a UNP port
that has 802.1X bypass enabled.
unp mac-authentication Configures the status of MAC authentication for the All ports
UNP port.
unp mac-authentication pass- Assigns the name of an existing UNP as an alternate All ports
alternate profile. If successful MAC authentication does not
return a UNP, the device can be classified into this
alternate profile.
unp classification Configures the status of device classification for the All port types
UNP port. When enabled, UNP port and rule
classification parameters are applied if device
authentication does not provide a UNP name for a
device connected to the port.
unp default-edge-profile Assigns the name of an existing UNP as the default Edge port
unp default-vlan-profile profile for the UNP port. If device authentication or Bridge port
unp default-spb-profile classification does not provide a UNP name for a user SPB port
device, the device can be classified into the default
profile.
unp port group-id Assigns a UNP port to a numerical group ID. All UNP Edge port
ports assigned to the same group ID represent a logical
group domain to which specific UNP configuration and
classification can be applied.
unp unp-customer-domain Assigns a UNP port to a numerical customer domain Bridge port
ID. Groups UNP ports together in a logical group. SPB port
Similar to the group ID assignment for Edge ports.
unp aaa-profile Assigns the name of an existing AAA configuration Edge port
profile to a UNP port.
unp port edge-template Assigns the name of an Edge port template to the UNP Edge port
port. This type of template applies a pre-defined
configuration to the port. All of the other commands
specified in this table are configurable parameters for
the Edge port template.
unp direction Configures whether egress broadcast, unknown Edge port
unicast, or multicast traffic is allowed on the UNP port. Bridge port
unp trust-tag Configures the option of whether to trust the VLAN ID All ports
of a tagged packet to determine how the packet is
classified.
unp vlan Configures an untagged VLAN-port association All ports
between the specified UNP port and VLAN ID.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-29
Configuring Port-Based Network Access Control Configuring Access Guardian
commands must already exist in the switch configuration. See “UNP Profiles” on page 31-15 for more
information.
• The AAA profile configuration applied to a UNP Edge port overrides the global AAA configuration for
the switch. See“Using AAA Configuration Profiles” on page 31-26 for more information.
• When an Edge template is assigned to a UNP Edge port, the parameter values defined in the template
will override any existing UNP port configuration. In addition, any attempt to explicitly configure a
port that is associated with a template is not allowed.
• Enabling both 802.1X and MAC authentication is allowed on the same port, but 802.1X authentication
is attempted first unless 802.1X authentication bypass is also enabled for the port (see “Configuring
802.1x Authentication Bypass” on page 31-31).
For more information about the commands described in this section, see the “UNP Commands” chapter in
the OmniSwitch AOS Release 8 CLI Reference Guide.
• Specific 802.1X parameters, such as re-transmission interval, supplicant timeout, or maximum number
of times to request authentication information from an 802.1X user.
• 802.1X authentication bypass.
• 802.1X authentication after MAC authentication passes or fails on a UNP port that has 802.1X bypass
enabled.
• An 802.1X failure policy to determine if MAC authentication or classification is attempted after
802.1X authentication fails.
• Device classification status to determine if UNP classification rules are used to select an Edge profile.
• An alternate UNP Edge profile for when successful 802.1X or MAC authentication does not return a
UNP name.
• The name of an AAA configuration profile to assign to the port.
page 31-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
Use the unp port edge-template command to assign an AAA profile to a UNP port or UNP link
aggregate. For example:
-> unp port 1/1/5 edge-template up1
-> unp port 1/2/1-5 edge-template up2
-> unp linkagg 10 edge-template up3
-> unp linkagg 10-50 edge-template up4
Use the show unp edge-template command to display the UNP Edge port template configuration.
For more information about the commands described in this section, see the OmniSwitch AOS Release 8
CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-31
Configuring Port-Based Network Access Control Configuring Access Guardian
• fail—802.1x authentication is attempted if the device fails the initial MAC authentication. If the device
passes MAC authentication, 802.1x authentication is bypassed (EAP frames are ignored) and the
device is classified as a non-supplicant.
• noauth—802.1x authentication is automatically attempted if there is no MAC authentication available
for the port.
• none (the default)—802.1x authentication is permanently bypassed. Only MAC authentication is
performed and the device is classified as a non-supplicant.
Configuration Guidelines
Consider the following guidelines before configuring 802.1x authentication bypass:
• The 802.1x bypass operation is only supported on UNP ports with 802.1x authentication enabled. See
“Configuring UNP Port-Based Functionality” on page 31-27 for more information about configuring
the access control mode.
• If a port has supplicants connected and 802.1x bypass is enabled for that port, the supplicants are
automatically logged off to undergo authentication according to the enabled bypass configuration.
• When the 802.1x bypass configuration is modified or disabled, any non-supplicant devices are
automatically logged off the port. This will free up those devices to undergo the authentication
specified by the new bypass configuration.
• If re-authentication is configured for the UNP port and 802.1X bypass is enabled, the MAC
authentication followed by 802.1x authentication is initially performed as configured. However, only
802.1x authentication is performed during the re-authentication process, so there is no recheck to see if
the MAC address of the user device is restricted.
• Enabling 802.1X bypass is not allowed on UNP ports that are configured with an 8021X failure policy.
• When successful MAC authentication returns a UNP and the 802.1x bypass operation is configured to
initiate 802.1x authentication when a device passes MAC authentication, the device is not moved into
that UNP. Instead, the device is moved into the UNP returned by 802.1x authentication. If 802.1x
authentication does not provide such information, the device is moved based on the UNP port-based
configuration.
• When 802.1X bypass is enabled and after MAC authentication, the port will be in a waiting state until
the 802.1X authentication process complete.
The resulting Access Guardian authentication process for a device connected to UNP port 2/1 is as follows
for this example:
• MAC authentication is triggered when the first frame from the new user is received, whether it is an
EAP frame or not.
• EAP frames for this user are ignored until MAC authentication completes (RADIUS returns an Access-
Accept or a Access-Reject response).
page 31-32 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
• If the initial MAC authentication passes (that is, Access-Accept), 802.1x authentication is bypassed for
this user and all EAP frames are ignored.
• If the initial MAC authentication fails (that is, Access-Reject), 802.1x authentication is attempted for
the user. During this transition, the EAP frames are allowed and the switch must force the supplicant to
restart a fresh EAP session by sending a multicast Request Identity EAPOL on the port. This is because
the supplicant may have already sent an EAPOL Start.
See “Configuring QoS Policy Lists” on page 31-43 for more information.
• Profile bandwidth parameters. Configurable bandwidth parameter values associated with an Edge or
VLAN profile (not configurable for an SPB profile) are applied to traffic that is classified into the Edge
or VLAN profile. For example, the following commands define profile bandwidth parameters to rate
limit traffic on all device ports assigned to the “UNP-1” Edge profile.
-> unp edge-profile UNP-1 maximum-ingress-bandwidth 10M
-> unp edge-profile UNP-1 maximum-egress-bandwidth 10M
-> unp edge-profile unp-1 maximum-ingress-depth 1
-> unp edge-profile unp-1 maximum-egress-depth 1
• The maximum ingress and egress depth values are configured in Kbps.
• The default value for the maximum ingress and egress depth settings is calculated by dividing the
maximum ingress or egress bandwidth value by 25. For example, if the ingress bandwidth value is set
to 500K, then the ingress depth value defaults to 20K (500K/25=20K). However, if this calculation
results in a value of 0 or 1, then the default value is set to 2K.
• “Per user" bandwidth profiling is not supported. If there are multiple users authenticating through a
port, then the bandwidth limitation of the last user overrides the existing bandwidth limitations, if any.
• Runtime modification of UNP ingress or egress bandwidth is allowed; the modified values are then
applied to both new and already authenticated user devices learned on the profile. The new runtime
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-33
Configuring Port-Based Network Access Control Configuring Access Guardian
values become the latest bandwidth values for the profile, so they are applied to all user devices
associated with the profile.
• The bandwidth limitation applied on a port through UNP classification is not removed when a user logs
out or ages out. An administrator can override the bandwidth limitation through the qos port command
or by removing the UNP configuration on the port.
• If any port bandwidth parameter value defined for a UNP profile is modified, then the other parameters
need to be configured again, otherwise they will be set to their default values. For example, consider a
UNP profile with maximum egress bandwidth set to 100M and egress depth set to 10K, where the
maximum bandwidth is changed to 200M. In this scenario, only the modified maximum bandwidth is
considered, but the egress depth is reset to the default value unless the required value is specifically
configured again.
• If port bandwidth values are applied through UNP profile (Edge or VLAN) bandwidth parameters and
also through a QoS policy list associated with the same profile, then the minimum of both the values is
applied on the UNP port.
Note. The same bandwidth behavior applies when the user is authenticated with QoS port bandwidth, QoS
port configuration being the latest configuration.
page 31-34 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
There are two types of domain IDs: a group ID and a customer domain ID. The type of domain ID to use
is based on the port and profile type to which the ID is assigned. For example:
• UNP edge ports and profiles are assigned to group IDs.
• UNP bridge ports and VLAN profiles are assigned to customer domain IDs.
• UNP SPB access ports and profiles are also assigned to customer domain IDs.
By default, all UNP edge ports are assigned to group 0 and all UNP bridge and SPB access ports are
assigned to customer domain 0. To add additional group or customer domain IDs, use the unp group-id
command or the unp customer-domain command. For example:
-> unp group-id 2
-> unp customer-domain 2
To assign UNP edge ports to a group ID, use the unp port group-id command. For example:
-> unp port 1/1/1-3 group-id 2
-> unp linkagg 5 group-id 52
To assign UNP bridge or SPB access ports to a customer domain ID, use the unp unp-customer-domain
command. For example:
-> unp port 1/1-3 unp-customer-domain 2
-> unp linkagg 5 unp-customer-domain 5
See “Configuring Classification Rules for UNP Port Domains” on page 31-45 for more information.
Command Description
unp edge-profile Creates an Edge profile and associates the profile with a name.
unp edge-profile qos-policy-list Assigns a QoS policy list to an Edge profile. If there is no list
assigned to a profile, users classified into that profile are granted full
access within the profile VLAN domain.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-35
Configuring Port-Based Network Access Control Configuring Access Guardian
unp edge-profile location-policy Assigns the name of a location-based policy to the Edge profile.
This type of policy defines criteria (such as the slot/port, system
name and location) to determine if a device is accessing the network
from a valid location.
unp edge-profile period-policy Assigns the name of a time-based policy to the Edge profile. This
type of policy specifies the days and times during which a device
can access the network.
unp edge-profile captive-portal- Configures the status of internal Captive Portal authentication for
authentication the profile. When enabled, triggers the Captive Portal authentication
process for users classified into the profile.
unp edge-profile captive-portal- Assigns the name of a Captive Portal profile that applies a specific
profile Captive Portal configuration to devices assigned to the Edge profile.
This type of profile is applied when Captive Portal is enabled for the
Edge profile and overrides the global Captive Portal configuration.
unp edge-profile authentication- Configures the status of the authentication flag for the profile. When
flag enabled, only devices that were successfully authenticated are
allowed into the Edge profile.
unp edge-profile mobile-tag Configures the mobile tagging status for the profile. When enabled,
the UNP port to which a device is connected is tagged with the
VLAN ID associated with the Edge profile when the device is
classified into that profile.
unp edge-profile redirect Configures the redirect status for the profile. When enabled, the
profile honors Change of Authorization (CoA) and Disconnect
request (DM) messages to interact with the ClearPass Policy
Manager (CPPM) as part of the OmniSwitch BYOD solution.
unp edge-profile maximum-ingress- Configures the maximum amount of bandwidth allocated for ingress
bandwidth traffic on UNP bridge ports assigned to the Edge profile.
unp edge-profile maximum-egress- Configures the maximum amount of bandwidth allocated for egress
bandwidth traffic on UNP bridge ports assigned to the Edge profile.
unp edge-profile maximum-ingress- Configures how much traffic is allowed to burst over the maximum
depth ingress bandwidth limits on UNP edge ports assigned to the Edge
profile.
unp edge-profile maximum-egress- Configures how much traffic is allowed to burst over the maximum
depth egress bandwidth limits on UNP edge ports assigned to the Edge
profile.
unp vlan-mapping edge-profile Maps a VLAN ID to an Edge profile. Devices classified into the
Edge profile are dynamically assigned into the VLAN associated
with the profile.
page 31-36 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
• The QoS rules within a policy list are applied to all members of the Edge profile group to enforce
access to network resources. Only one policy list is allowed per profile, but multiple profiles may use
the same policy list. See “Configuring QoS Policy Lists” on page 31-43 for more information.
• If a device violates a location or time period policy, the device is placed into an unauthorized state,
even though it is still assigned to the profile. In this state, a built in QoS policy list is applied to the
device to restrict the role of the device.
• Captive Portal authentication is applied as a post-authentication and/or post-classification mechanism
to devices assigned to the Edge profile. Captive Portal provides a Web-based authentication
mechanism to dynamically change the role-based access (policy list) for a user. See “Using Captive
Portal Authentication” on page 31-48 for more information.
• Enabling internal Captive Portal authentication is not allowed on profiles that have the redirect flag
enabled. When the redirect flag is enabled, external Captive Portal authentication is triggered for the
device. See “Bring Your Own Devices (BYOD) Overview” on page 31-77 for more information.
• To ensure proper redirection for devices classified into a redirect Edge profile (redirect flag is enabled),
configure the redirection server as the preferred server through AAA commands for MAC and 802.1X
authentication. See “Bring Your Own Devices (BYOD) Overview” on page 31-77 for more
information.
• UNP classification rules can be defined for a UNP Edge profile to provide an additional method for
classifying a device into an Edge profile. If authentication is not available or does not return a profile
name, classification rules are applied to determine the profile assignment. See “Configuring UNP
Classification Rules” on page 31-45 for more information.
• A UNP Edge profile can be configured as a default profile for a UNP edge port. If authentication and
classification do not return a profile name, the device is then assigned to the default Edge profile
associated with the edge port on which the device was learned. See “Configuring UNP Port-Based
Functionality” on page 31-27.
To configure a UNP Edge profile, use the unp edge-profile commands and the unp vlan-mapping edge-
profile command. For example, the following command creates the “guest_user” profile to assign devices
to VLAN 500 and apply the rules from the “temp_rules” policy list:
-> unp edge-profile guest_user
-> unp edge-profile qos-policy-list temp_rules
-> unp vlan-mapping edge-profile guest_user vlan 500
To verify the Edge profile configuration for the switch, use the show unp edge-profile command. For
more information about profiles, see “UNP Profiles” on page 31-15.
For more information about the unp commands described in this section, see the “UNP Commands”
chapter in the OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-37
Configuring Port-Based Network Access Control Configuring Access Guardian
Command Description
unp vlan-profile Creates a VLAN profile and associates the profile with a name and
VLAN ID.
unp vlan-profile qos-policy-list Assigns a QoS policy list to a VLAN profile. If there is no list
assigned to a profile, users classified into that profile are granted full
access within the profile VLAN domain.
unp vlan-profile mobile-tag Configures the mobile tagging status for the profile. When enabled,
the UNP port to which a device is connected is tagged with the
VLAN ID associated with the VLAN profile when the device is
classified into that profile.
unp vlan-profile maximum-ingress- Configures the maximum amount of bandwidth allocated for ingress
bandwidth traffic on UNP bridge ports assigned to the VLAN profile.
unp vlan-profile maximum-egress- Configures the maximum amount of bandwidth allocated for egress
bandwidth traffic on UNP bridge ports assigned to the VLAN profile.
unp vlan-profile maximum-ingress- Configures how much traffic is allowed to burst over the maximum
depth ingress bandwidth limits on UNP bridge ports assigned to the
VLAN profile.
unp vlan-profile maximum-egress- Configures how much traffic is allowed to burst over the maximum
depth egress bandwidth limits on UNP bridge ports assigned to the VLAN
profile.
page 31-38 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
To verify the VLAN profile configuration for the switch, use the show unp vlan-profile command. For
more information about profiles, see “UNP Profiles” on page 31-15.
For more information about the unp commands described in this section, see the “UNP Commands”
chapter in the OmniSwitch AOS Release 8 CLI Reference Guide.
Use the disable option with the dynamic-vlan-configuration command to disable dynamic configuration.
-> unp dynamic-vlan-configuration disable
Dynamic VLAN configuration is a global UNP setting that applies to all profiles. To verify if this setting
is enabled or disabled, use the show unp global configuration command.
Consider the following when enabling dynamic VLAN configuration:
• The VLAN status and other port (non-UNP port) assignments are configurable using standard VLAN
commands. In addition, the STP status of the VLAN is configurable and enabled by default when the
dynamic VLAN is created.
• A dynamic VLAN cannot be deleted using standard VLAN commands (no vlan vlan_id).
• UNP dynamic VLANs are identified as a separate type of VLAN. The vlan show commands will
display this type with the default name of “UNP-DYN-VLAN” and the designated type as “UNP
Dynamic Vlan”. For example:
-> show vlan 450
Name : UNP-DYN-VLAN,
Type : UNP Dynamic Vlan,
Administrative State : enabled,
Operational State : disabled,
IP Router Port : disabled,
IP MTU : 1500
• Dynamic VLANs are not saved in the “! VLAN:” section of the switch configuration file ([Link]).
However, the unp commands to enable dynamic VLAN configuration and create the UNP are saved in
the “! DA-UNP:” section of [Link] (see the following sample [Link] file). As a result, the VLAN is
created again on the next switch bootup.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-39
Configuring Port-Based Network Access Control Configuring Access Guardian
! DA-UNP:
unp dynamic-vlan-configuration enable
unp vlan-profile temp1 vlan 450
unp vlan-profile unpTemp vlan 10
unp vlan-profile unpTemp2 vlan 10
unp classification mac-address [Link] vlan-profile unpTemp2
unp classification mac-address [Link] vlan-profile unpTemp2
unp classification ip-address [Link] mask [Link] vlan-profile unpTemp2
unp port 1/1/11 port-type bridge
unp port 1/1/11 802.1x-authentication enable
unp port 1/1/11 classification enable
unp port 1/1/12 port-type bridge
unp port 1/1/12 mac-authentication enable
unp port 1/1/12 classification enable
Use the disable option with the dynamic-profile-configuration command to disable this functionality.
For example:
-> unp dynamic-profile-configuration disable
Dynamic profile configuration is a global UNP setting that is applied to traffic on any UNP bridge port
that is configured to trust the VLAN tag of the incoming packets. To verify if this setting is enabled or
disabled, use the show unp global configuration command.
Consider the following when enabling dynamic profile configuration:
• A profile is only dynamically created if the trust VLAN tag is enabled for the UNP bridge port and the
packet VLAN tag matches an MVRP VLAN ID that is not assigned to a UNP or there is no matching
VLAN ID in the switch configuration.
• Dynamically created profiles are saved in the [Link] file for the switch.
page 31-40 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
Command Description
unp spb-profile Creates an SPB profile and associates the profile with a name, a
VLAN tag value, a Service Instance ID (I-SID), and a Backbone
VLAN (BVLAN) ID. The VLAN tag, I-SID, and BVLAN values
are used to define a Service Access Point (SAP) for profile traffic.
unp spb-profile qos-policy-list Assigns a QoS policy list to an SPB profile. If there is no list
assigned to a profile, users classified into that profile are granted full
access within the profile service domain.
unp spb-profile multicast-mode Configures the multicast replication mode (head-end or tandem) for
the SPB service that is associated with the SPB profile. The
multicast mode determines how non-unicast packets are replicated
through the SPB backbone network.
unp spb-profile vlan-xlation Configures the status of VLAN translation for egress traffic
associated with the SPB profile. When enabled, the VLAN tags for
profile traffic are processed according to the settings for the SAP on
which the frames will egress, not according to the settings for the
SAP on which the frames were received.
unp spb-profile mobile-tag Configures the mobile tagging status for the profile. When enabled,
the UNP port to which a device is connected is tagged with the
BVLAN ID associated with the SPB profile when the device is
classified into that profile.
0 (zero) The VLAN tag of the packet is used to determine the SAP
encapsulation value. Setting the profile tag value to zero has the
same result as enabling trust VLAN tag for the UNP SPB access
port.
Outer VLAN tag The outer VLAN tag value to use for the SAP encapsulation value.
Inner and outer VLAN tags The inner and outer VLAN tag values to use for the SAP
encapsulation value.
• If classified traffic is untagged, then zero is used for the SAP encapsulation value (for example, 1/2:0).
• If the I-SID value specified does not exist in the switch configuration, the service is dynamically
created first then the SAP is dynamically created and associated with this service.
• The BVLAN associated with an SPB service profile must already exist in the switch configuration.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-41
Configuring Port-Based Network Access Control Configuring Access Guardian
• If the VLAN tag value of the classified traffic does not match the tag value specified in the profile,
UNP will check to see if the trust VLAN tag option is enabled for the UNP SPB access port. If so, a
SAP is assigned using the VLAN tag values of the traffic. If not, the traffic is learned as filtering on the
UNP port.
• The default setting for the SPB multicast mode is the head-end mode.
– When the head-end multicast mode is used, a non-unicast packet received on an SPB access port is
replicated once for each receiver in the provider backbone bridge (PBB) network using its unicast
base MAC (BMAC) address.
– When the tandem multicast mode is used, a non-unicast packet received on an SPB access port is
replicated once at each node using the multicast group address.
• Specifying a QoS policy list name that is inactive or does not already exist in the switch configuration
is allowed. However, the list will remain inactive for the UNP until the list is enabled or configured
using the QoS policy list commands (see “Configuring QoS Policy Lists” on page 31-43).
• A UNP SPB profile can be configured as a default profile for a UNP SPB access port. If authentication
and classification do not return a profile name, the device is then assigned to the default SPB profile
associated with the UNP SPB access port on which the device was learned. See “Configuring UNP
Port-Based Functionality” on page 31-27.
To configure a UNP SPB service profile, use the unp spb-profile command. For example, the following
command creates the “vNP1” profile to assign device traffic tagged with VLAN 10 to service 1500 bound
to BVLAN 500 and apply the rules from the “ServerA_rules” policy list:
-> unp spb-profile vNP1 tag-value 10 isid 1500 bvlan 500 qos-policy-list
ServerA_rules
The following command example changes the multicast replication mode and enables egress VLAN
translation for the service profile:
-> unp spb-profile spb3 tag-value 200 isid 1500 bvlan 4002 multicast-mode tandem
vlan-xlation enable
To verify the UNP SPB service profile configuration for the switch, use the show unp spb-profile
command. For more information about profiles, see “UNP Profiles” on page 31-15.
For more information about the unp commands described in this section, see the “UNP Commands”
chapter in the OmniSwitch AOS Release 8 CLI Reference Guide.
page 31-42 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
Note the following guidelines when configuring QoS policy rules and lists:
• A default policy list exists in the switch configuration. Rules are added to this list when the rule is
created. A rule can belong to multiple policy lists. As a result, the rule remains a member a of the
default list even when it is subsequently assigned to additional lists.
• Each time a rule is assigned to a policy list, an instance of that rule is created. Each instance is
allocated system resources. To exclude a rule from the default policy list, use the no default-list option
of the policy rule command when the rule is created. For example:
-> policy rule r1 condition c1 action a1 no default-list
• Up to 32 policy lists (including the default list) are supported per switch. Only one policy list per UNP
is allowed, but a policy list can be associated with multiple profiles.
• If a rule is a member of multiple policy lists but one or more of these lists are disabled, the rule is still
active for those lists that are enabled.
• If the QoS status of an individual rule is disabled, then the rule is disabled for all policy lists, even if a
list to which the policy belongs is enabled.
• Policy lists are not active on the switch until the qos apply command is issued.
Use the show policy list command to display the QoS policy rule configuration for the switch.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-43
Configuring Port-Based Network Access Control Configuring Access Guardian
the user. To override the built-in policy list with an explicitly configured policy list, use the unp
restricted-role policy-list command. For example:
-> unp restricted-role unauthorized policy-list unauth1
-> unp restricted-role qmr policy-list quarantined1
-> unp restricted-role cp-prelogin policy-list cplogin1
When an explicit policy list assignment is removed, the switch reverts back to using the built-in policy list
associated with the restricted role state.
Use the show unp restricted-role command to display the explicit policy list configuration for restricted
roles.
• A precedence value used to determine precedence among other user-defined rules. The valid
precedence range is 1 (lowest) through 255 (highest).
• One or more of the following conditions:
– The name of a UNP Edge profile to which the user must belong.
– The device is not authenticated.
– The type of authentication (802.1X or MAC) the device successfully passed or failed.
– The device is in a Captive Portal post-login state.
• The name of an existing QoS policy list.
To configure a user-defined role, use the unp user-role command. For example:
-> unp user-role role1
-> unp user-role role2 precedence 255
-> unp user-role role1 policy-list role1-list
-> unp user-role role1 edge-profile edge1
-> unp user-role role1 authentication-type 8021x
-> unp user-role role1 cp-status-post-login
page 31-44 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
For example, the following command is used to configure a MAC address range rule and assign that rule
to an existing UNP Edge profile named “Engineering”:
-> unp classification mac-address-range [Link] [Link]
edge-profile Engineering
If the source MAC address of a device falls within the specified range of the example rule, then the device
is classified into the “Engineering” profile and assigned to the VLAN associated with that profile.
The VLAN tag rule can be combined with other rules to include the tag as a required parameter to match
for the rule. For example, to include the VLAN tag with a MAC address rule, use the unp classification
mac-address rule command with the vlan-tag option:
-> unp classification mac-address [Link] vlan-tag 10 vlan-profile
serverA
In this example, a device is classified with UNP “serverA” if the source MAC address of the device is
“[Link]” and device packets are tagged with VLAN 10.
When a VLAN tag rule is combined with another rule, the combined rule takes precedence over the rule
that does not specify a VLAN tag. For example, a rule that specifies a MAC address and a VLAN tag
takes precedence over a rule that specifies only a MAC address.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-45
Configuring Port-Based Network Access Control Configuring Access Guardian
• The unp-customer-domain parameter is configurable for rules that classify traffic into a UNP VLAN
or SPB profile. The classification rules are then applied only to UNP bridge and SPB access ports that
are assigned to the specified customer domain ID. For example, the following commands configure
classification rules that are applied only to UNP bridge or SPB access ports that are assigned to
customer domain IDs 10, 5, and 2:
-> unp classification vlan-tag 100 unp-customer-domain 10 vlan-profile
serverA_unp
-> unp classification ip-address [Link] mask [Link] unp-customer-domain 5
spb-profile vm-1
-> unp classification mac-address [Link] unp-customer-domain 2 vlan-
profile serverB_unp
• The group-id parameter is configurable for rules that classify traffic into UNP Edge profiles. The
classification rules are then applied only to UNP edge ports that are assigned to the specified group ID.
For example, the following commands configure classification rules that are applied only to UNP edge
ports that are assigned to group IDs 10 and 20:
-> unp classification group-id 10 edge-profile myProfile1
-> unp classification ip-address [Link] group-id 1 edge-profile myProfile1
-> unp classification mac-address [Link] group-id 1 vlan-tag 200
edge-profile myProfile1
See “Configuring UNP Port Domains” on page 31-34 for more information.
If the source MAC address, source IP address, and port of a device matches the MAC address, IP address,
and port defined in the example binding rule, then the device is classified into the “EdgeProf-1” profile
and assigned to the VLAN associated with that profile.
page 31-46 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Configuring Port-Based Network Access Control
For example, the following commands create an extended classification rule named “ext-r1” with the
precedence value set to 255 and assign the rule to a UNP Edge profile named “corporate”:
-> unp classification-rule ext-r1 precedence 255
-> unp classification-rule ext-r1 edge-profile corporate
Next, the following commands define a port rule and an authentication type rule and assign the rules to the
“ext-r1” extended rule:
-> unp classification-rule ext-r1 port 1/1/10
-> unp classification-rule ext-r1 authentication-type 8021x
Note that the “ext-1” rule combines a port rule and an authentication type rule. This combination of rules
is not allowed in a binding rule configuration.
The precedence value assigned to an extended classification rule is used to determine precedence among
only extended classification rules. However, all extended rules take precedence over all individual and all
binding rules. So if a device matches a binding rule (or an individual rule) and an extended rule, the device
is classified into the profile associated with the extended rule.
Use the show unp classification and show unp classification-rule commands to verify the UNP
classification rule configuration for the switch. For more information about UNP rules, see “UNP
Classification Rules” on page 31-17.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-47
Using Captive Portal Authentication Configuring Access Guardian
2 A domain specific policy list specified in the Captive Portal authentication pass configuration of a
Captive Portal profile.
3 A policy list specified in the Captive Portal authentication pass configuration of a Captive Portal
profile.
4 A domain specific policy list specified in the global Captive Portal authentication pass setting for the
switch.
5 A policy list specified in the global Captive Portal authentication pass setting for the switch.
6 A policy list associated with a UNP Edge profile returned from the RADIUS server.
7 A policy list associated with a domain specific UNP Edge profile that is specified in the global Captive
Portal authentication pass setting for the switch.
8 A policy list associated with a UNP Edge profile that is specified in the global Captive Portal
authentication pass setting for the switch.
An external, guest Captive Portal authentication mechanism is provided through the Access Guardian
OmniSwitch integration with the ClearPass Policy Manager (CPPM). See “Bring Your Own Devices
(BYOD) Overview” on page 31-77 for more information.
This section provides the following information regarding configuring and using the OmniSwitch internal
Captive Portal mechanism:
• “Configuration Tasks and Guidelines” on page 31-49
page 31-48 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Using Captive Portal Authentication
Note. Make sure the DNS server configuration reflects the same Captive Portal redirect URL name and IP
address that is configured for the OmniSwitch.
• Configure a custom proxy port number for Captive Portal sessions. Optionally, use the captive-
portal proxy-server-port command to specify a proxy port number other than 8080 (the default).
• Configure a UNP Edge profile with Captive Portal authentication enabled. Captive Portal is
triggered when a user device is classified into an Edge profile on which Captive Portal authentication is
enabled. For more information, see “Configuring a UNP Edge Profile” on page 31-35.
• Assign the QoS policy list to change the user role. Captive Portal is a post-authentication and/or
classification process that is used to dynamically change the user role (QoS policy list applied to the
user). After the user successfully logs in, the RADIUS server returns a new policy list or UNP Edge
profile to apply to the user device. If the RADIUS server does not return a policy list or profile name,
then the QoS policy list or Edge profile name specified through the captive-portal authentication-
pass command is used instead. This command can also be used to specify a domain-specific policy
(the policy list or UNP Edge profile is only applied to user devices from a specific domain).
• Configure a redirect URL for successful Captive Portal login. Optionally, use the captive-portal
success-redirect-url command to redirect a user to a specific site after the user successfully logs in
through the Captive Portal session. By default, no Captive Portal success redirect URL is configured.
• Make sure that a standard browser is available on the client device. No specialized client software
is required. When a device is classified into a UNP Edge profile that has Captive Portal enabled, the
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-49
Using Captive Portal Authentication Configuring Access Guardian
user device is placed into a pre-login role. In this role the user is allowed to contact a DHCP server to
obtain an IP address and contact a DNS server to resolve the Captive Portal URL to get the Captive
Portal IP address, which is associated with the internal Web server on the switch. See “Authenticating
with Captive Portal” on page 31-54 for more information.
2 Configure the RADIUS server with the IP address of the OmniSwitch and the same shared secret that
was assigned through the AAA RADIUS server configuration in Step 1.
3 Add the user name and password details in the RADIUS server.
4 Enable the Captive Portal session timer to determine the amount of time the user session remains active
after a successful login (the default time is set to 12 hours). For example:
-> aaa captive-portal session-timeout enable
5 Configure a UNP Edge profile and enable Captive Portal authentication on the profile. For example:
6 Enable UNP functionality on the port that will connect the user device to the OmniSwitch and assign
the profile created in Step 5 as the default profile for the port. For example:
-> unp port 1/1/20
-> unp port 1/1/20 default-edge-profile Captive-Portal
7 Configure the Captive Portal redirect URL and Captive Portal IP address. For example:
8 Configure the DNS servers with a mapping between “[Link]” and the10.123.0.1 IP
address. The user device resolves this URL through access to the DNS server to get the Captive Portal IP
address, which is mapped to the internal Web server on the OmniSwitch.
2 When the client opens a Web browser and attempts to access any URL, the client is prompted with the
Captive Portal login page. This is the Web page presented by the internal server on the OmniSwitch.
3 When the client enters the appropriate login credentials and clicks on the “Submit” button on the login
page, the client is presented with the Captive Portal status page. This page indicates that the login was
successful and the remaining session time.
page 31-50 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Using Captive Portal Authentication
4 Use the show unp edge-user status command on the OmniSwitch to display the status of the Access
Guardian classification and Captive Portal authentication process for the MAC address of the client.
• The number of login attempts allowed for the Captive Portal session.
• The name of the QoS policy list or UNP Edge profile to apply when Captive Portal authentication is
successful but the RADIUS server did not return a policy list or profile name.
Captive Portal profiles can be used to apply a custom Captive Portal configuration to different sets of user
devices based on the Edge profile assignment for the device.
Captive Portal profiles are only valid for UNP Edge profiles on which Captive Portal authentication is
enabled. Use the unp edge-profile captive-portal-authentication command to enable Captive Portal
authentication for an Edge profile. For example:
-> unp edge-profile unp-edge1 captive-portal-authentication enable
Use the unp edge-profile captive-portal-profile command to assign a Captive Portal configuration
profile to a UNP Edge profile. For example:
-> unp edge-profile unp-edge1 captive-portal-profile cp_p1
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-51
Using Captive Portal Authentication Configuring Access Guardian
Use the show captive-portal profile-name command to display the Captive Portal profile configuration.
For more information about the commands described in this section, see the OmniSwitch AOS Release 8
CLI Reference Guide.
4 Use the captive-portal name command to reload the Web configuration (use the CN name as specified
in the new certificate):
-> captive-portal name CN_ name
Note. The certificate must be in the x509 format. To generate an x509 formatted certificate (.pem), perform
the following on a Linux or Unix machine:
1 Have the private key and the CA signed certificate available.
2 Issue the "cat privateKey ca_certificate | tee switch_cert_file”(i.e default_cportalCert.pem) command.
4 Once the custom files are created with the images and information the file type requires, download the
files to the “/flash/switch/captive_portal/custom_files” folder.
5 Enable Captive Portal customization using the captive-portal customization command.
When a Captive Portal session is initiated, the switch checks to see if there is a “custom_files” folder; if
so, then the files in that folder are incorporated presented to the user. If there are no files found or the
“custom_files” folder does not exit, the default Web page components found in the “release_files folder
are incorporated and presented to the user.
page 31-52 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Using Captive Portal Authentication
Consider the following guidelines when customizing Captive Portal Web page components:
• The “release_files” folder is overwritten each time the switch reboots; DO NOT modify the files in this
folder for custom use.
• The folders "assets" and "templates" under the “/flash/switch/captive_portal/custom_files/” directory
are used to create and display Web pages to Captive Portal users when the switch reboots or at runtime
when Captive Portal customization is enabled for the switch, if the “custom_files” folder exists.
• Anything in the custom "assets" folder is statically served by the internal Web server on the switch
whenever they are requested. These pages are typically .css files, javascript files, or the acceptable use
policy and are linked to files in the custom "templates" folder.
• The custom "templates" folder contains the Web pages that are dynamically served to users depending
on the Captive Portal state of each user. The file names in this folder must not be changed. The login
form field names and form action in these pages must not be changed. The variables in these pages, as
denoted by "<?=$(name)?>”, are substituted in place by the internal Web server.
• Filenames are case sensitive. When creating a custom file, ensure that the filename matches the
filename exactly as shown in the “release_files” folder.
• Enabling Captive Portal customization automatically triggers the use of the custom Web pages at
runtime. There is no need to reboot the switch to trigger this action.
The following is an example of a customized Captive Portal login page:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-53
Using Captive Portal Authentication Configuring Access Guardian
• The device is assigned to a UNP Edge profile on which Captive Portal authentication is enabled.
When these authentication conditions are met, Access Guardian places the device MAC address into a
Captive Portal pre-login state. In this state, the device is allowed to directly contact a DHCP server to get
an IP address and get the DNS server address.
Next, the user opens a Web browser and the initial HTTP/HTTPS requests are responded to with the
Captive Portal redirect name. The user device contacts the DNS server to resolve the redirect name and
receives the configured Captive Portal IP address. Requests are then sent to the Captive Portal IP address
that is mapped to the internal OmniSwitch Web server. The internal server responds to the HTTP/HTTPS
requests by presenting a Captive Portal login page to the user device.
page 31-54 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Using Captive Portal Authentication
4 Click on the “Acceptable Use Policy” box to activate the “Submit” button.
5 Click the “Submit” button to login to the network. When the “Submit” button is clicked, Captive Portal
sends the user information provided in the login window to the RADIUS server for authentication.
6 If user authentication is successful, the following status and logout messages are displayed:
The user is now logged into the network and has access to all network resources as determined by the
Captive Portal role (QoS policy list) assigned to the user. The original Edge profile and associated
VLAN membership for the user was not changed; only the QoS policy list returned from the RADIUS
server is applied to the user.
7 Before leaving the Captive Portal status page (shown in Step 6) or closing the browser window, note
the URL presented on the status page.
Note. A user is automatically logged out of the network if the Captive Portal session time limit is reached.
For more information, see “Configuring Authentication Session Parameters” on page 31-25.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-55
Using Quarantine Manager and Remediation Configuring Access Guardian
• A list containing the quarantined MAC address is manually configured on every switch in the network.
After the list of quarantined MAC addresses is known, OVQM can add these addresses to the Quarantine
MAC group and push the configuration to the switches in a logical group or to all switches.
The Access Guardian Quarantine Manager and Remediation (QMR) feature moves the users associated
with the quarantined MAC addresses to a QMR restricted role. A built-in policy list is associated with the
QMR role that restricts quarantined users to communicating with a designated remediation server until
their quarantined status is corrected.
The following QMR components are configured through Access Guardian CLI commands:
• Quarantined MAC address group. The Access Guardian configures the name of the Quarantine
MAC group on the OmniSwitch. This MAC address group contains the MAC addresses of users that
are quarantined and are candidates for remediation.
The default name of the MAC group is "Quarantined”, but the name can be changed using the qos
quarantine mac-group command. For example:
-> qos quarantine mac-group badMacs
• Remediation server and exception subnets. When a client is quarantined, all the traffic from the
client is blocked by default. However, the administrator can configure access to some exception
subnets to which the quarantined client can be redirected, such as the IP address of a remediation server
to obtain updates and correct its quarantined state.
The qmr quarantine allowed-name command is used to designate IP addresses that a quarantined
client can access. For example:
-> qmr quarantine allowed-name it-helpdesk [Link] ip-mask [Link]
Configuring a maximum of three IP subnets is allowed. Make sure the IP address for the remediation
server is included in the allowed list of subnets.
• Remediation server URL. The Access Guardian qmr quarantine path command is used to specify a
URL to which users are redirected for remediation. For example:
-> qmr quarantine path [Link]
• Quarantined Page. When a client is quarantined and a remediation server URL is not configured,
QMR can send a Quarantine Page to notify the client of its quarantined state. To enable or disable the
sending of a Quarantine Page, use the qmr quarantine page command. For example:
-> qmr quarantine page enable
page 31-56 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Using Quarantine Manager and Remediation
• QMR custom proxy port. This specifies the HTTP proxy port number to which quarantined client
traffic is redirected for remediation. The default HTTP port used is TCP 80 and TCP 8080.
The qmr quarantine custom-proxy command is used to configure a different proxy port number to
use. For example:
-> qmr quarantine custom-proxy 8888
QMR works on UNP and non-UNP ports. On non-UNP ports, L2 source learning receives the quarantined
MAC addresses from QMR and changes the MAC status to 'quarantined'. However, on UNP ports, L2
source learning will not show the quarantined MAC addresses as 'quarantined'. In this case, the
appropriate status of the MAC address is displayed through UNP commands.
Use the show qmr command to verify the QMR configuration on the switch and use the show quarantine
mac group command to display a list of the quarantined MAC addresses known to the switch.
For an example of configuring a custom QMR role (policy list) to apply to quarantined users, see the
“Application Example 6: Restricted Role (Policy List) Assignment” on page 31-69.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-57
Access Guardian Application Examples Configuring Access Guardian
Internet
RADIUS Server
DHCP/DNS/ADS Server
OmniVista
page 31-58 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Application Examples
2 Create the required UNP Edge profile and map the profile to VLAN 20.
3 Create another UNP Edge profile that will serve as a default profile; map the profile to VLAN 10.
4 Create a MAC range classification rule and associate the rule to the “corporate” UNP edge-profile.
How it Works
In this example, traffic received on the UNP port triggers the following classification process:
• Device traffic is examined and matched against all UNP classification rules.
• If the MAC address of a user device is within the range of MAC addresses specified in a MAC address
range rule, the user is classified into the “corporate” profile and assigned to VLAN 20.
• If the MAC address of a user is not within the MAC address range and does not match any other UNP
classification rules on the switch, then the user is classified into the default edge-profile and assigned
to VLAN 10.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-59
Access Guardian Application Examples Configuring Access Guardian
• The MAC addresses are learned in the assigned VLANs and the device port is now an untagged
member of the assigned VLANs.
3 Configure the template to assign a default UNP Edge profile to the UNP port.
4 Assign the template to the UNP Edge ports to apply the template configuration.
Using an Edge port template to configure UNP ports helps to simplify and expedite the configuration
process. Templates allow the administrator to easily replicate a specific configuration across multiple UNP
ports.
2 Configure the switch to use “alu-authserver” (identified in Step 1) for 802.1X device authentication.
page 31-60 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Application Examples
5 Create the required UNP Edge profile and map the profile to VLAN 20.
6 Create another UNP Edge profile that will serve as a default profile; map the profile to VLAN 10.
8 Configure the template to enable 802.1x authentication and define an alternate UNP profile to use if
the RADIUS server does not return a UNP Edge profile name upon successful authentication.
-> unp edge-template 802.1x-template 802.1x-authentication enable
-> unp edge-template 802.1x-template 802.1x-authentication pass-alternate edge-
profile corporate
How it Works
In this example, traffic received on the UNP port will trigger the following device authentication process
on the switch:
• Supplicant device traffic will trigger 802.1 x authentications first.
• If 802.1x authentication passes, the client is classified into to the “corporate” UNP Edge profile and
assigned to VLAN 20 or classified into the UNP profile returned from RADIUS server.
• If 802.1x authentication fails and classification is not enabled and a default Edge profile is not
assigned, the MAC address of the user device is filtered (blocked).
• In this example, MAC authentication and classification are not enabled on the UNP port, so neither
MAC authentication or classification will be triggered for a non-supplicant device. However, a default
UNP Edge profile is configured for the port, so a non-supplicant device will get classified into that
profile.
2 Configure the profile to specify the “alu-authserver” for 802.1X device authentication.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-61
Access Guardian Application Examples Configuring Access Guardian
3 Configure the profile to specify the “alu-authserver” for RADIUS server accounting.
4 Assign the AAA profile to a UNP port or to a UNP edge port template.
2 Create an AAA profile to pre-define and apply a specific AAA configuration for this example.
page 31-62 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Application Examples
4 Create the QoS policy list to apply to the user upon successful Captive Portal authentication.
7 Create another Edge profile to use as a default profile for a UNP port.
9 Create an Edge port template to pre-define and apply configuration parameters to the UNP port.
10 Set the default Edge profile parameter for the Edge port template to “guest”.
Setting the default Edge profile to “guest” will move the clients into VLAN 30 first. Then a policy list
received through Captive Portal authentication is applied to the user (overriding the policy list, if any,
that was previous applied through the “guest” profile.
11 Assign the Edge port template to a UNP port.
12 Create a Captive Portal profile to pre-define and apply Captive Portal configuration parameters.
13 Set the Captive Portal profile parameters for the authentication pass policy list and the success URL.
The Captive Portal IP address is set to [Link] by default.
-> captive-portal-profile cp-profile authentication-pass policy-list cp-default
-list
-> captive-portal-profile cp-profile success-redirect-url [Link]
[Link]
The authentication pass parameter specifies the policy list to apply to the device if Captive Portal
authentication is successful but the RADIUS server does not return a policy list. The success URL
specifies where to redirect the user device after a successful Captive Portal authentication attempt.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-63
Access Guardian Application Examples Configuring Access Guardian
14 Enable Captive Portal for the Edge profile and assign the Captive Portal profile to the same Edge
profile.
-> unp edge-profile guest captive-portal-authentication enable
-> unp edge-profile guest captive-portal-profile cp-profile
How it Works
In this example, traffic arriving on the UNP port triggers the following process on the switch:
• The UNP port is not enabled with authentication or classification, so the client is assigned to the default
UNP Edge profile and associated VLAN.
• Since the default UNP Edge profile (associated with Edge template assigned to the port) is enabled for
Captive Portal authentication, the Captive Portal authentication process is triggered.
• The client is placed into a built-in Captive Portal pre-login role which does the following:
– Only allows client access for DHCP, DNS, ARP, and ICMP traffic.
– Traps and redirects client HTTP/HTTPS traffic to the internal Captive Portal Web server on the
switch. The Captive Portal server name and IP address was resolved by the client through DNS.
– Client is presented with an internal Captive Portal login page.
– Client enters user credentials which are then authenticated through the RADIUS server designated
for Captive Portal authentication.
• Successful Captive Portal authentication results in the assignment of a policy list that was returned
from the RADIUS server or specified through the Captive Portal authentication pass configuration.
• The client remains in the “guest” Edge profile assigned to VLAN 30 and is presented with a Captive
Portal login status page.
• If Captive Portal authentication fails, the client remains in the built-in Captive Portal pre-login role.
page 31-64 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Application Examples
2 Create an AAA profile to pre-define and apply a specific AAA configuration for this example.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-65
Access Guardian Application Examples Configuring Access Guardian
8 Create an Edge port template to pre-define and apply configuration parameters to the UNP port.
9 Set the default Edge profile parameter for the Edge port template to “guest”.
10 Set the MAC and 802.1X authentication parameters to “enable” for the Edge port template. Can also
define a pass alternate UNP Edge profile for the template if the RADIUS server does not return a UNP
Edge profile name when 802.1X or MAC authentication passes.
-> unp edge-template auth-template mac-authentication enable
-> unp edge-template auth-template 802.1x-authentication enable
-> unp edge-template auth-template mac-authentication pass-alternate edge-
profile corporate
-> unp edge-template auth-template 802.1x-authentication pass-alternate edge-
profile corporate
14 Create a UNP Edge profile with Captive Portal enabled and assign the Captive Portal profile to the
Edge profile.
-> unp edge-profile guest captive-portal-authentication enable
-> unp edge-profile guest captive-portal-profile cp-profile
How it Works
In this application example, traffic received on the UNP port triggers the following actions on the switch:
• Traffic from a supplicant device triggers the 802.1X authentication process.
• If 802.1X authentication passes, the client is classified into the “corporate” Edge profile or classified
into the Edge profile returned from the RADIUS server.
• If 802.1X authentication fails, the client is classified into the default Edge profile associated with the
UNP port. This is because rule classification is disabled on the port. Captive Portal authentication is
enabled for the default Edge profile.
• Traffic from a non-supplicant device triggers the MAC authentication process.
• If MAC authentication passes, the client is classified into the “corporate” Edge profile or classified into
the Edge profile returned from the RADIUS server.
• IF MAC authentication fails, the client is classified into the default Edge profile associated with the
UNP port. This is because rule classification is disabled on the port. Captive Portal authentication is
enabled for the default Edge profile.
page 31-66 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Application Examples
• The Captive Portal authentication pass condition applies a new access policy list to the client.
• If Captive Portal authentication fails, the client remains in a built-in Captive Portal pre-login state.
The VLAN associated with the UNP Edge profile the IP phone is assigned to must be tagged on the port
after authentication. The following configuration steps provide a brief tutorial for how to achieve this:
1 Configure a RADIUS server.
2 Create an AAA profile to pre-define and apply a specific AAA configuration for this example.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-67
Access Guardian Application Examples Configuring Access Guardian
9 Create UNP Edge port template to pre-define and apply configuration parameters to the UNP port.
10 Set the default Edge profile parameter for the Edge port template to “default-profile”.
11 Set the MAC and 802.1X authentication parameters to “enable” for the Edge port template. Can also
define a pass alternate UNP Edge profile for the template if the RADIUS server does not return a UNP
Edge profile name when 802.1X or MAC authentication passes.
-> unp edge-template voice-template mac-authentication enable
-> unp edge-template voice-template 802.1x-authentication enable
-> unp edge-template voice-template mac-authentication pass-alternate edge-
profile corporate
-> unp edge-template voice-template 802.1x-authentication pass-alternate edge-
profile corporate
How it Works
The expected traffic flow for this application example is as follows:
• EAP frames are the first frames sent by the IP phone on link up. The EAP frames are untagged.
page 31-68 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Application Examples
• LLDP frames are exchanged between phone and the switch. This will be untagged traffic but will be
accepted by the switch since these are control frames.
• Subsequent data traffic will be tagged with the right VLAN after the LLDP exchange; this traffic will
be accepted because the VLAN is a tagged member of the port.
• A list containing the quarantined MAC is manually configured on every switch in the network.
After the list of quarantined MAC addresses is known, OVQM can add these addresses to the Quarantine
MAC group and push the configuration to the switches in a logical group or to all switches. Access
Guardian then moves the users associated with the quarantined MAC addresses to a QMR restricted role.
There is a built-in policy list associated with the QMR restricted role that can be replaced with a user-
defined policy list. For example, the administrator may want to use the following explicit policy list for
QMR redirection instead of the built-in policy list:
-> policy service http80 destination tcp-port 80
-> policy service http443 destination tcp-port 443
-> policy service http8080 destination tcp-port 8080
-> policy service http8081 destination tcp-port 8081
-> policy service group alaRestrictedHttpSG http80 http443 http8080 http8081
-> policy condition qmr_traffic service group alaRestrictedHttpSG
-> policy action qmr_action redirect module qmr
-> policy rule qmr_rule condition qmr_traffic action qmr_action no default-list
-> policy list qmr_list type unp
-> policy list qmr_list rules qmr_rule
-> qos apply
With minor changes (such as changing the redirect module option to “captive-portal” or “byod”), this
example policy list may also be useful for internal Captive Portal and OmniSwitch BYOD redirection.
The following OmniSwitch configuration demonstrates assigning a different role (explicit policy list) to a
quarantine user as well as an example of configuring QMR on the switch:
1 Use the unp restricted-role policy-list command to assign a new policy list to replace the built-in
QMR policy list. This is an optional command.
-> unp restricted-role qmr policy-list qmr_list
2 Configure the name of the Quarantine MAC Group. The default name of this group is “Quarantined”,
so changing the name is optional. To change the name of this group, use the qos quarantine mac-group
command.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-69
Access Guardian Application Examples Configuring Access Guardian
Make sure the name of this group on the OmniSwitch matches the group name used by OVQM
3 The Quarantine MAC address group is populated from the same group located on an LDAP server.
However, it is also possible to manually add MAC addresses to the MAC address group on the switch.
-> policy mac group Quarantined [Link]
4 Apply the QoS configuration for the MAC group name change (Step 2) and the manual MAC address
changes (Step 3) to take effect on the switch.
-> qos apply
5 Add the IP address and subnet of the remediation server to a list of allowed IP addresses using the qmr
quarantine allowed-name command. The allowed IP list specifies IP network addresses that a device is
allowed to communicate with while in a quarantined state.
-> qmr quarantine allowed-name it-helpdesk [Link] ip-mask [Link]
6 Create the path to the remediation server using the qmr quarantine path command.
7 If there is no quarantine path to redirect to, use the qmr quarantine page command to direct the
switch to send a quarantine page to inform the user of the quarantined state.
-> qmr quarantine page enable
For more information about the QMR feature, see “Using Quarantine Manager and Remediation” on
page 31-56.
-> unp policy validity-period guest-time days Monday tuesday wednesday thursday
friday saturday sunday timezone PST hours 9:00 TO 18:00
2 Assign the time policies created in Step 1 to an existing UNP Edge profile.
3 Assign a new policy list to replace the built-in policy list for the Unauthorized role.
page 31-70 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Access Guardian Application Examples
2 Assign the location policies created in Step 1 to an existing UNP Edge profile.
3 Assign a new policy list to replace the built-in policy list for the Unauthorized role.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-71
Verifying Access Guardian Users Configuring Access Guardian
Total users : 1
Total users : 1
Total users : 1
Total users : 2
page 31-72 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Verifying Access Guardian Users
2 The show unp edge-user status command displays the status of the authentication and validation
process for MAC addresses learned on a UNP Edge port or link aggregate:
-> show unp edge-user status port 1/1/1
Profile Profile Auth Role Restricted
Port Mac address Name Source Type Status Name Role Source CP Redirect Access
-----+-----------------+--------+--------+------+-------+----+-----------+--+--------+-------
1/1/1 [Link] Prf1 Radius 8021x Passed emp1 Profile Y - -
Total users : 1
Total users : 1
Total users : 1
3 The show unp edge-user details command displays additional details about MAC addresses learned
on a UNP Edge port or link aggregate:
-> show unp edge-user details port 1/1/10
Port: 1/1/10
MAC-Address: [Link]
Access Timestamp : 04/01/1970 [Link],
User Name : guest1,
IP-address : [Link],
Vlan : 10,
Authentication Type : 802.1X,
Authentication Status : Authenticated,
Authentication Failure Reason : -,
Authentication Retry Count : -,
Authentication Server IP Used = [Link],
Authentication Server Used = rad1,
Server Reply-Message = -,
Profile : Employee,
Profile Source : RADIUS Server Profile,
Classification profile rule : -,
Role : Employee,
Role Source : Profile,
User role rule : -,
Restricted Access : No,
Location Policy Status : Passed,
Time Policy Status : Passed,
Captive-Portal Status : -,
QMR Status : Passed,
Redirect Url : -,
SIP Call Type = Not in a call,
SIP Media Type = None,
Applications = None
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-73
Verifying Access Guardian Users Configuring Access Guardian
MAC-Address: [Link]
Access Timestamp : 06/01/1989 [Link],
User Name : guest2,
IP-address : [Link],
Vlan : 20,
Authentication Type : MAC,
Authentication Status : Authenticated,
Authentication Failure Reason : -,
Authentication Retry Count : -,
Authentication Server IP Used = [Link],
Authentication Server Used = rad1,
Server Reply-Message = -,
Profile : Contractor,
Profile Source : RADIUS Server Profile,
Classification profile rule : -,
Role : Contractor,
Role Source : Profile,
User role rule : -,
Restricted Access : No,
Location Policy Status : Passed,
Time Policy Status : Passed,
Captive-Portal Status : Passed,
QMR Status : -,
Redirect Url : -,
SIP Call Type = Normal Call,
SIP Media Type = Video,
Applications = None
-> show unp edge-user details linkagg 100
Port: 0/100
MAC-Address: [Link]
Access Timestamp : 02/01/2013 [Link],
User Name : guest3,
IP-address : [Link],
Vlan : 30,
Authentication Type : MAC,
Authentication Status : Authenticated,
Authentication Failure Reason : -,
Authentication Retry Count : -,
Authentication Server IP Used = [Link],
Authentication Server Used = rad1,
Server Reply-Message = -,
Profile : Employee,
Profile Source : RADIUS Server Profile,
Classification profile rule : -,
Role : Contractor,
Role Source : Profile,
User role rule : -,
Restricted Access : No,
Location Policy Status : Passed,
Time Policy Status : Passed,
Captive-Portal Status : Passed,
QMR Status : -,
Redirect Url : -,
SIP Call Type = Not in a call,
SIP Media Type = None,
Applications = ;Facebook;rediff;
For more information about the displays that result from these commands, see the “UNP Commands”
chapter in the OmniSwitch AOS Release 8 CLI Reference Guide.
page 31-74 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Verifying Access Guardian Users
• port chassis/slot/port—Flushes the MAC addresses of all users connected to the specified switch port.
For example:
-> unp edge-user flush port 1/9
• linkagg agg_id—Flushes the MAC addresses of all users connected to the specified link aggregate. For
example:
-> unp edge-user flush linkagg 10
• type {802.1x, mac, none}—Flushes the MAC addresses of all users authenticated with the specified
authentication type or users that have not been authenticated. For example:
-> unp edge-user flush type 802.1x
-> unp edge-user flush type mac
-> unp edge-user flush type none
• edge-profile profile_name—Flushes the MAC addresses of all users associated with the specified Edge
profile name. Combine this parameter with the mac-address parameter to flush a specific user
associated with the specified Edge profile name. For example:
-> unp edge-user flush edge-profile EP-1
-> unp edge-user flush edge-profile EP-1 mac-address [Link]
Logging a group of users out of the network is particularly useful if configuration changes are required to
any Access Guardian features. The unp edge-user flush command is only available to the switch admin
user. The admin account, however, is protected from any attempts to log out the admin user.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-75
Verifying the Access Guardian Configuration Configuring Access Guardian
show unp global configuration Displays the global UNP parameter settings for the switch
show unp port Displays the UNP configuration for a port or link aggregate.
show unp port 802.1x statistics Displays 802.1X statistics for a UNP port or link aggregate on which
802.1X authentication is enabled.
show unp port configured- Displays the VLANs assigned to UNP edge and bridge ports or link
vlans aggregates.
show unp edge-template Displays the UNP Edge port template configuration.
show unp group-id Displays the UNP Group ID configuration. This type of ID is used to
group UNP edge ports into a logical domain.
show unp customer-domain Displays the UNP customer domain ID configuration. This type of ID is
used to group UNP bridge and SPB access ports into a logical domain.
show unp edge-profile Displays the UNP Edge profile configuration.
show unp edge-profile vlan- Displays the VLAN ID association for UNP Edge profiles.
mapping
show unp classification Displays the UNP classification rule configuration for individual and
binding rules.
show unp classification-rule Displays the UNP extended classification rule configuration.
show unp user-role Displays the UNP user-defined role configuration.
show unp restricted-role Displays the explicit policy list configuration for built-in restricted
roles.
show aaa device-authentication Displays a list of RADIUS servers assigned to provide 802.1X, MAC,
or Captive Portal authentication.
show aaa accounting Displays a list of RADIUS servers assigned to provide 802.1X, MAC,
or Captive Portal accounting.
show aaa config Displays the AAA parameter configuration for 802.1X, MAC, and
Captive Portal sessions
show aaa profile Displays the AAA profile configuration.
show captive-portal Displays the global Captive Portal settings for the switch.
configuration
show captive-portal profile- Displays the Captive Portal configuration for the switch.
name
show qmr Displays the global QMR settings for the switch.
show quarantine mac group Displays the contents of the Quarantined MAC address group.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
page 31-76 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Bring Your Own Devices (BYOD) Overview
• Integration with Access Guardian UNPs, 802.1x authentication, and MAC authentication.
Note. See “UNP Profiles” on page 31-15 for additional information about UNPs and authentication
methods.
• Restricted access to the network and validation for end user devices, including employees with IT
supplied devices, IP phones, employees personal devices, guest devices, access points, cameras, and
silent devices (such as printers).
• CPPM can act as a RADIUS server for new deployments or RADIUS proxy for existing networks.
• Captive Portal redirect using a new dynamic redirect URL Vendor Specific Attribute (VSA).
The remainder of this section focuses on OmniSwitch integration with the CPPM. Refer to the following
for more information:
• OmniAccess WLAN documentation.
• ClearPass Policy Manager documentation for in-depth server configuration and licensing requirements.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-77
Bring Your Own Devices (BYOD) Overview Configuring Access Guardian
RADIUS/Active Directory
Wireless
Edge Switch Controller/Authenticator
Access Points
non-supplicant
(guest) Non-Supplicant
page 31-78 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Bring Your Own Devices (BYOD) Overview
ClearPass Guest
The OmniSwitch BYOD solution supports guest self registration, sponsored guest access, and pre-
registration of guest devices using MAC and Captive Portal authentication.
• Self Registration
– An integrated external Captive Portal for guest or visitor registration.
– Redirection to a customizable guest registration Captive Portal
• Sponsored Access
– SMS and text email notification
• Device profiling as a basis for grooming traffic and improving network security based on device
category, such as:
– Device Category - Computer, Printer, AP
– OS Family - MAC, Android, Windows, Linux
– Device name and OS version
– Useful for wired devices such as printers, access points, IP Phones, and cameras
• Controlled access and remediation for compromised devices
ClearPass Onboard
The BYOD solution supports the following services for device on-boarding and device management for
guest and registered devices:
• Automatic configuration of Wireless, Wired 802.1X, VPN settings of personal and corporate devices
that are connecting to the network for the first time.
• Management of digital certificates.
• Device on-boarding system is integrated with the external Captive Portal, which is separate from the
internal OmniSwitch Captive Portal.
• Integration with the Enterprise Active Directory for authentication of employee credentials before
device credentials are issued.
• Device provisioning supported through Aruba Quick Connect or Apple OTA API.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-79
Bring Your Own Devices (BYOD) Overview Configuring Access Guardian
• Quick Connect supports native supplicants on Windows Vista, XP, 7, Apple, and Android devices.
ClearPass OnGuard
ClearPass OnGuard agents perform advanced endpoint posture checking to ensure compliance is met
before the devices connect. OnGuard has the following functionalities:
• Enhanced capabilities for endpoint compliance and control.
• Anti-virus, anti-spyware, firewall checks and more using the persistent or dissolvable agent.
• Centrally view the online status of all devices from the ClearPass Policy Manager platform.
• Support for the Dynamic Vendor Specific Attribute (VSA) URL redirect is implemented using the
OmniSwitch VSAs. The VSAs must be downloaded and installed on the ClearPass server.
• A port bounce capability is configurable on the OmniSwitch to ensure a clean re-authentication process
for non-supplicant devices.
• A PAUSE timer is configurable to flush out a user context (that is used for a welcome page or other
user context information) on timer expiry.
RFC-3576 Attributes
ClearPass RADIUS servers and the OmniSwitch can be configured with particular attributes defined in
RFC 3576. These attributes carry specific authentication, authorization, and configuration details about
RADIUS requests to and replies from the server. This section describes the attributes specific to an
OmniSwitch BYOD solution.
page 31-80 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Bring Your Own Devices (BYOD) Overview
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-81
Bring Your Own Devices (BYOD) Overview Configuring Access Guardian
page 31-82 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Bring Your Own Devices (BYOD) Overview
1 Download the [Link] file from the Service & Support website.
Import Dictionary:
Dictionary->Import
Dictionary
Reboot CPPM
Server Configuration-
>Reboot
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-83
Bring Your Own Devices (BYOD) Overview Configuring Access Guardian
Port Bounce
A port bounce is used to terminate a user session and discard all associated session context for non-
supplicants. This is done by disabling and re-enabling the port and clearing any authentication state for the
devices on the port. A port bounce action is configurable through the unp redirect port-bounce
command.
• Port bounce is used for MAC authenticated non-supplicant users.
• On receipt of a Disconnect Request (DM) or Change of Authorization (CoA) message, the OmniSwitch
determines if the user needs to move or change VLANs.
• If the new UNP specifies a different VLAN ID, the port bouncing feature is enforced as per
configuration for non-supplicants.
• When a device changes VLANs and it is the only device on the port, the switch port is bounced to
ensure a clean reconnection and get the correct IP address through DHCP.
• Port bouncing is enforced only if the non-supplicant user is the only user on the port. Also if a CoA
message is received for a non-supplicant user and port bouncing is disabled globally but is enabled on
the port on which the non-supplicant user has been classified, then the port is bounced.
Pause Timer
The switch clears all authentication states of the device by pausing for a period of time. The value for this
period of time is configurable through the unp redirect pause-timer command.
When non-supplicant devices are detected, the switch must pause for some period of time before
redirection to the specified URLs. The pause mechanism is enforced when the following conditions are
met.
• COA message received by the switch indicates VLAN movement for the non-supplicant user, and
• Port bouncing is disabled for the user port or disabled globally for the switch.
The pause mechanism ensures that all traffic from the user is dropped until the global pause timer expires
and the corresponding user context is removed.
Note. The Port Bounce and Pause Timer functions apply only to non-supplicant devices. For supplicant
devices, there is no difference whether Port Bounce is enabled or Pause Timer is enabled. The user context
for supplicant devices is removed by triggering the re-authentication of the supplicant user and the device
moves into a new UNP Edge profile and VLAN after re-authentication.
page 31-84 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Bring Your Own Devices (BYOD) Overview
• Set the switch to use the CPPM server for 802.1X and MAC authentication. The authentication process
will determine the UNP Edge profile to which BYOD users are classified.
• Configure the UNP profiles that will be returned from the CPPM server. Enable the redirect flag on
each of these profiles.
• Configure the CPPM server as the redirect server for the switch.
• Configure UNP port-based functionality on the switch ports that will connect to the user devices.
• Configure the OmniSwitch to relay DHCP traffic to the CPPM server as well as the DHCP server,
which assigns the IP addresses to the clients connected to the switch. CPPM uses this information to
assist with device profiling.
• Configure the CPPM server with the IP address of the OmniSwitch. In addition, configure the CPPM
with the same shared secret that was assigned through the AAA RADIUS server configuration on the
OmniSwitch.
• Configure the CPPM server with the required services (for example, MAC authentication, 802.1x, and
any generic RADIUS enforcement service) to support the following features.
– Device profiling
– Device Onboarding
– Guest Registration
– Posture check
– Captive portal
The following generic configuration examples apply only to the OmniSwitch components for interaction
with a CPPM server. For more detailed application examples, refer to “BYOD Application Examples” on
page 31-95.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-85
Bring Your Own Devices (BYOD) Overview Configuring Access Guardian
To support interaction with the CPPM server, the same Edge profile name must be configured on both the
OmniSwitch and the CPPM server. In addition, the redirect flag for the OmniSwitch profile must be
enabled. For example:
-> unp edge-profile UNP-guest redirect enable
-> unp edge-profile UNP-restricted redirect enable
Once an Edge profile is created with the redirect flag enabled, then the profile must be mapped to a VLAN
ID. Users classified into the Edge profile are dynamically assigned to the associated VLAN ID. To assign
a VLAN ID to an Edge profile, use the unp vlan-mapping edge-profile command. For example:
-> unp vlan-mapping edge-profile UNP-guest vlan 100
-> unp vlan-mapping edge-profile UNP-restricted vlan 455
If the OmniSwitch redirect server IP address does not match the redirect IP address in the CPPM server
configuration, HTTP traffic is not redirected to the URL.
To allow the user device to access other servers (such as a remediation server), use the unp redirect
allowed-name command. For example:
-> unp redirect allowed-name server2 ip-address [Link] ip-mask [Link]
page 31-86 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Bring Your Own Devices (BYOD) Overview
In this example, the custom QoS redirect policy list named “req_policy_list” is created with the required
items (highlighted in blue). To allow this custom policy list to override the built-in policy, the CPPM is
configured to return the “req_policy_list” list name in the Alcatel-Access-Policy-List VSA.
In this example, both 802.1X and MAC authentication is enabled on UNP port 1/1/4. In addition, an
802.1X authentication failure policy is configured for the port to direct the switch to attempt MAC
authentication after a device on port 1/1/4 fails 802.1X authentication. This is particularly helpful when
a guest device with built-in 802.1X credentials fails the initial 802.1X authentication process.
If a port is not specified with the unp redirect port-bounce command, the status is changed on a global
basis for all UNP ports. For example:
-> unp redirect port-bounce disable
The port-level setting overrides the global setting for the port bounce operation.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-87
Bring Your Own Devices (BYOD) Overview Configuring Access Guardian
4 The OmniSwitch assigns the user to the UNP obtained from the ClearPass server.
4 The OmniSwitch assigns the device to the UNP obtained from the ClearPass server.
5 ClearPass determines the appropriate role of the user after performing registration and sends the final
UNP to the OmniSwitch through a RADIUS CoA request or through a RADIUS Access-Accept packet for
onboarding.
page 31-88 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Bring Your Own Devices (BYOD) Overview
• Resolution (Translating service instance names to address and port numbers for use)
2 Associate the interface created in Step 1 with the mDNS tunnel relay using the mdns-relay tunnel
command. For example, the following command associates the “byod_dev” interface with the mDNS
tunnel relay:
-> mdns-relay tunnel byod_dev
3 Enable the mDNS feature on the switch using the mdns-relay command. For example:
Notes.
• Configure the GRE tunnel interface before attempting to associate the interface with the mDNS tunnel
relay. An IP address is required to bring the interface up; if necessary, specify a dummy IP address
when configuring the interface.
• Only a Layer 2 GRE tunnel is supported.
• The GRE tunnel must also be configured on the WLAN controller. Refer to the OmniAccess WLAN
user guide for additional information on configuring a WLAN controller.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-89
Bring Your Own Devices (BYOD) Overview Configuring Access Guardian
The mDNS feature is enabled on the OmniSwitch to support the mDNS service. A Layer 2 GRE tunnel
interface is configured from the WLAN controller to the OmniSwitch to relay the mDNS messages.
The mDNS message from the Bonjour capable wired service device is encapsulated and relayed from the
OmniSwitch to the configured WLAN controller over the GRE tunnel. The WLAN controller then relays
the mDNS messages received via the OmniSwitch GRE tunnel to the APs over the AP GRE tunnels.
Note. The WLAN controller uses a multicast optimization algorithm and forwards Bonjour response
messages to targeted user devices, instead of all devices on all APs. This limits the unnecessary flooding of
the Bonjour/mDNS traffic to improve the Wi-Fi performance.
When the mDNS relay is disabled on the switch, the mDNS packets are handled in the conventional way.
For more information about the mDNS configuration and show commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
page 31-90 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Bring Your Own Devices (BYOD) Overview
• The switch obtains the VLAN ID from inside the 802.1q header of the SSDP frame and floods the
frame on that VLAN (untagged or tagged based on the egress port frame) towards the client.
SSDP frames received from the WLAN controller are encapsulated as follows:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-91
Bring Your Own Devices (BYOD) Overview Configuring Access Guardian
2 Associate the interface created in Step 1 with SSDP relay using the ssdp-relay tunnel command. For
example, the following command configures the “byod_dev” tunnel interface to relay SSDP packets:
-> ssdp-relay tunnel byod_dev
3 Enable the SSDP relay feature on the switch using the ssdp-relay command. For example:
4 To verify the SSDP relay configuration on the switch, use the show ssdp-relay config command. For
example:
-> show ssdp-relay config
ssdp-relay admin status : disabled,
ssdp-relay tunnel interface : byod_dev,
ssdp-relay operational status : down
Configuration Guidelines
Consider the following guidelines when configuring SSDP Relay functionality for the switch:
• Configure the GRE tunnel interface before attempting to associate the interface with the SSDP tunnel
relay. An IP address is required to bring the interface up; if necessary, specify a dummy IP address
when configuring the interface.
• The GRE tunnel must also be configured on the WLAN controller. Refer to the OmniAccess WLAN
user guide for additional information on configuring a WLAN controller.
• The SSDP and mDNS relay features both require an association with a GRE tunnel IP interface. If both
of these features are required on the switch, configure both to use the same tunnel interface. There is
only one Layer 2 GRE tunnel established between the switch and the WLAN controller, so both
features need to use the same GRE tunnel.
• Only a Layer 2 IPv4 GRE tunnel is supported. However, IPv6 SSDP frames from the client are also
relayed through the IPv4 GRE tunnel, as the payload includes the Layer 2 headers (only Layer 2 GRE
mode is supported by the WLAN controller) regardless of the inner IPv6 header.
page 31-92 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian Bring Your Own Devices (BYOD) Overview
DNLA-Capable TV
VLAN Y
DNLA-Capable Printer
In this example:
• The WLAN controller handles the SSDP discovery process between the wired client and end service
devices. Encapsulated SSDP packets are sent between the controller and the OS6860 through the Layer
2 GRE tunnel until discovery is complete.
• The OS6800 relays SSDP packets from the DNLA-capable printer and TV to the WLAN controller
through the Layer 2 GRE tunnel. See “Messages Received by the OmniSwitch from Wired SSDP
Devices” on page 31-91.
• The OmniSwitch 6860 receives encapsulated SSDP packets through the GRE tunnel from the WLAN
controller. The switch then extracts the SSDP frames from the encapsulated packets and forwards them
to the destined end service device (DNLA-capable printer or TV). See “Messages Received by the
OmniSwitch from the WLAN Controller” on page 31-91.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-93
Bring Your Own Devices (BYOD) Overview Configuring Access Guardian
RADIUS/Active Directory
In this example:
• The OS6800 relays SSDP packets from the DNLA-capable printer and TV to the WLAN controller
through the Layer 2 GRE tunnel. See “Messages Received by the OmniSwitch from Wired SSDP
Devices” on page 31-91.
• The WLAN controller sends a RADIUS request to the CPPM to request the policies needed to
determine the end service devices that are available to the wireless clients. The following policies are
the type of policies that may be returned:
– Identity based policies.
– Role based policies.
– Location based policies.
– Time based policies.
• The WLAN controller applies the service policies and sends encapsulated SSDP packets through the
Layer 2 GRE tunnel to the end service devices connected to the OS6800.
• The OmniSwitch 6860 receives encapsulated SSDP packets through the GRE tunnel from the WLAN
controller. The switch then extracts the SSDP frames from the encapsulated packets and forwards them
to the destined end service device (DNLA-capable printer or TV). See “Messages Received by the
OmniSwitch from the WLAN Controller” on page 31-91.
page 31-94 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian BYOD Application Examples
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-95
BYOD Application Examples Configuring Access Guardian
ClearPass
RADIUS Server RADUS/RADIUS
Proxy
“alu-cppm”
([Link])
authentication
request authorization
response
OmniSwitch ([Link])
page 31-96 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian BYOD Application Examples
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-97
BYOD Application Examples Configuring Access Guardian
Create Profile:
Attributes (tab)
- Type: Radius:IETF
- Filter-ID (11)
- Value = UNP-employee
(Note: must match UNP
Profile on OmniSwitch)
Create Enforcement
Policy:
Rules (tab)
Summary
page 31-98 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian BYOD Application Examples
Add OmniSwitch to
ClearPass Database
Devices (tab)
Service (tab)
Configure 802.1x
Authentication
Authentication (tab)
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-99
BYOD Application Examples Configuring Access Guardian
Configure Enforcement
Enforcement (tab)
Reorder Authentication
Devices
Devices
page 31-100 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian BYOD Application Examples
Configure PC
Properties
Configure PC
Advanced Settings
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-101
BYOD Application Examples Configuring Access Guardian
Confirm device
Authentication
OmniSwitch
Confirm Device
Authentication
ClearPass
page 31-102 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian BYOD Application Examples
Create Authentication
Source
Authentication-Sources-
Add Authentication
Source
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-103
BYOD Application Examples Configuring Access Guardian
Create Profile:
Profile (tab)
- Name: ALU IP Phone
Profile
- Template: Aruba
RADIUS Enforcement
Attributes (tab)
- Type: Radius:IETF
- Filter-ID (11)
- Value = UNP-phone
(Note: must match UNP
Profile on OmniSwitch)
Create Enforcement
Policy:
Rules (tab)
- Type: Authentication
- Name: Source
- Operator: EQUALS
- Value: Static Mac
Database
- Profile Name: ALU IP
Phone Profile
page 31-104 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian BYOD Application Examples
Add MAC
Authentication Service
Service (tab)
-Type: MAC
Authentication
Authentication (tab)
- Authentication
Sources: Static MAC
Database
Enforcement (tab)
- Enforcement Policy:
ALU IP Phone
Enforcement Policy
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-105
BYOD Application Examples Configuring Access Guardian
page 31-106 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian BYOD Application Examples
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-107
BYOD Application Examples Configuring Access Guardian
Name- Alcatel-Lucent
Secure Access
Page name: secure-
access
Vendor Settings:
Alcatel-Lucent
Login Method: Server-
initiated
Pre-Auth Check:None
Terms: checked
Default URL:
[Link]
Override Destination:
checked
page 31-108 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian BYOD Application Examples
Create Restricted
Profile:
Enforcement->Profiles
Template: RADIUS
Based Enforcement
Name: ALU Restricted
Profile
Type: RADIUS
Action: Accept
Attribute Type:
Radius:IETF, Alcatel-
Lucent-Enterprise
Attribute Name: Filter-
ID, Alcatel-Redirection-
URL
Attribute Value: UNP-
restricted, (redirect URL)
Template: RADIUS
Change of Authorization
(CoA)
Name: ALU Guest CoA
Profile
RADIUS CoA Template:
Aruba-Change-User-Role
Attributes Type:
Radius:IETF
Attribute Name: Filter-
ID
Attribute Value: UNP-
guest
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-109
BYOD Application Examples Configuring Access Guardian
Add MAC
Authentication Service
Configuration->Services
Type: MAC
Authentication
Name: ALU Wired
MAC Authentication
Service
Monitor Mode:
Disabled
Service Rule Type:
Radius:IETF
Service Rule Name:
NAS-Port-Type
Service Rule
Operator:
BELONGS_TO
Service Rule Value:
Ethernet (15)
Authentication
Methods: Allow All
MAC AUTH
Enforcement Policy:
ALU Wired MAC
Enforcement Policy
Add Web
Authentication Service
Configuration->Services
Type: Web-based
Authentication
Name: ALU Wired
Captive Portal
Authentication Service
Authentication
Sources: [Guest user
Repository] [Local SQL
DB]
Enforcement Policy:
ALU Wired Captive
Portal Enforcement
Policy
page 31-110 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Access Guardian BYOD Application Examples
Example Redirect
Example login
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 31-111
BYOD Application Examples Configuring Access Guardian
show unp global configuration Displays global BYOD parameter values, such as the redirection
server name, the port bounce status, and pause timer value.
show unp edge-user Displays the status of the new BYOD clients that access the network.
page 31-112 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
32 Configuring Application
Monitoring and Enforcement
Application usage patterns in the enterprise network is changing with the increase in use of the social
networking, browser based file sharing, and peer to peer applications. The use of these applications result
in the new traffic patterns in the network that are not straightforward to distinguish.
OmniSwitch Application Monitoring and Enforcement (AppMon) feature addresses the key challenges of
real time classification of flows at application level by providing differential QoS treatment in the form of
higher priority marking and security policies at application level. AppMon feature improves the quality of
user experience through application aware network optimization and control.
Application Enforcement feature allows the switch to differentiate between different traffic flows and
assign the proper QoS and Security policies. The feature also provides appropriate QoS marking to
applications flows as per the Application-aware user configuration QoS policies.
Application Monitoring feature collects and reports the application specific flow information over a
period. Based on this data, application specific enforcement policies can be designed.
Note. AppMon is supported in a virtual chassis of OmniSwitch 6860 and OmniSwitch 6860E platforms
where at least one OmniSwitch 6860E is mandatory for the feature to work.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 32-1
In This Chapter Configuring Application Monitoring and Enforcement
In This Chapter
This chapter provides an overview of the AppMon feature and describes how to configure this feature
through the Command Line Interface (CLI). CLI commands are used in the configuration examples; for
more details about the syntax of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
The following information and procedures are included in this chapter:
• “AppMon Specifications” on page 32-3.
page 32-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Application Monitoring and Enforcement AppMon Specifications
AppMon Specifications
AppMon feature is supported in a stack of OmniSwitch 6860 and OmniSwitch 6860E platforms where at
least one OmniSwitch 6860E is mandatory for the feature to work.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 32-3
AppMon Defaults Configuring Application Monitoring and Enforcement
AppMon Defaults
Description Keyword Default
AppMon default global status app-mon admin-state Disabled
AppMon default status on the app-mon port admin-state Disabled
physical port
AppMon L3 mode app-mon l3-mode Enabled for both
monitoring and
enforcement (both
Ipv4, Ipv6)
AppMon L4 mode app-mon l4-mode Enabled (both TCP
and UDP)
AppMon flow-table enforcement app-mon flow-table enforcement stats Disabled
statistics
Flow table aging interval (only app-mon aging enforcement Application specific
Enforcement)
Logging threshold app-mon logging-threshold 20000 flows
AppMon flow sync collection app-mon flow-sync enforcement interval 60 seconds
interval (only Enforcement)
page 32-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Application Monitoring and Enforcement Application Monitoring and Enforcement Overview
• Application List - list of applications supported for monitoring or enforcement. Applications can be
added to this list using the application name or application group.
• Application Group - a group of applications. The group can be added to the application list.
• QoS policy: QoS policy configuration at application level or application group level.
Application Monitoring
The following diagram provides a high-level example of Application Monitoring process:
Application
Signatures
Application
Update
Monitoring
flow database
Process
and
application
records Apply
Signatures Matched
Flows
Signature
Matching
Packet Sampling
AppMon
Port
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 32-5
Application Monitoring and Enforcement Overview Configuring Application Monitoring and Enforcement
• Report application specific flow details including 5-tuple flow credentials, total number of flows,
number of flows per application, and so on.
Application Enforcement
The following diagram provides a high-level example of Application Enforcement process:
Application
Signatures UNP
Policy List
Update Application
Enforcement QoS
flow database; Policy
policy rule, Process
flow counters,
flow aging Apply
Signatures Matched
Flows
Signature
Matching
Packet Sampling
AppMon
Port
• Report the identified application flow information to CPU for UNP/VNP association.
• Policy enforcement that provides user configured application specific QoS treatment for application
traffic flows including higher DSCP/802.1p or internal priority marking that translates to higher egress
queue for traffic scheduling. QoS treatment can also include security policies that can perform policy
action such as dropping or rate limiting the flows.
page 32-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Application Monitoring and Enforcement Application Monitoring and Enforcement Overview
• Report application specific flow details including 5-tuple flow credentials, total number of flows,
number of flows per application, and so on.
• Associate QoS policies with UNP profile and provide user level policy treatment. Main QoS policy
action includes DSCP/802.1p/Priority Marking, Disposition drop/accept, and rate-limiter. Application
flows may come with DSCP marking as found appropriate by the end device. Application enforcement
feature overrides these values if QoS is configured, and marks them with values customized for
network as per configuration.
• Display application information as part of per UNP user level.
• Existing QoS policy configuration framework is used for the enforcement policy configuration where
application name/group can be specified. QoS policies provides treatment to bi-direction flow basis
and not per uni-direction flow.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 32-7
Application Monitoring and Enforcement Overview Configuring Application Monitoring and Enforcement
1 Use the app-mon admin-state command to globally enable AppMon functionality on the switch.
2 Use the app-mon port admin-state command to enable AppMon functionality on one or more switch
ports. For example, the following command enables AppMon on ports 1/1/2 through 1/1/5:
-> app-mon port 1/1/2-5 admin-state enable
3 Add or remove applications or application groups to an application list for enforcement or monitoring
using the app-mon app-list command. Separate application list is maintained for both enforcement and
monitor features. For example:
-> app-mon app-list enforcement add app-name whatsapp
-> app-mon app-list monitor add app-group apg2
4 To enable the set of application signatures configured for AppMon, use the app-mon apply command.
This activates both enforcement and monitoring application lists for flow classification.
-> app-mon apply
Note. Verify the AppMon configuration using the show app-mon config and show app-mon port
commands. For example:
-> show app-mon config
Admin State : Enable,
Operational State : Enable,
L3-IPv4 : Enable,
L3-IPv6 : Enable,
Enforcement Flow-Table Stats : Enable,
Enforcement Flow-Sync Interval : 10 seconds,
Monitor Logging Threshold : 20000,
Enforcement Logging Threshold : 20000,
App-Pool Applications : 10,
Monitor Applied Applications : 10,
Enforcement Applied Applications : 10,
Upgraded Signature File Type : Factory,
AOS Compatible Signature Kit Version : 1,
Signature Kit version : 1.1.1
page 32-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Application Monitoring and Enforcement Application Signature File/Kit
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 32-9
Application Signature File/Kit Configuring Application Monitoring and Enforcement
• Source L4 port
• Destination L4 port
page 32-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Application Monitoring and Enforcement Configuring AppMon
Configuring AppMon
This section provides the following information about how to configure AppMon on the OmniSwitch:
• “Configuration Guidelines” on page 32-12.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 32-11
Configuring AppMon Configuring Application Monitoring and Enforcement
Configuration Guidelines
Review the guidelines in this section before configuring AppMon on the OmniSwitch.
• AppMon works on an application level and not on individual application events/operations. On
configuring an application, all associated events are considered for application monitoring and
enforcement.
• Supports only IP traffic (TCP or UDP).
• AppMon must not be configured on user ports and uplink ports at the same time.
• AppMon does not support link aggregate interface. AppMon is supported at individual port level only.
Also, port will not be allowed to be configured in the link aggregate if AppMon is enabled on the port.
• Does not support tunneled traffic, encrypted traffic, and fragmented traffic (supported only if initial
fragmented packet contains the signature).
• Software policy lookup considers AppMon enforcement specific policies for a given application name
only when it is part of an active application list. In case of policy configured both for application and
application group where same application is part, policy will be selected based on what is configured in
the active application list. Active application list allows only one application at a time, either directly
added in the application list or added through an application group.
• Application enforcement cannot be provided to IP flows which moves between NIs (due to link
aggregate, STP block scenario, or L3 ECMP group configuration).
• If an AppMon flow is detected on a UNP port, then AppMon UNP policy list is applied to the flow. If
UNP policy list is not configured, then default QoS policy list is applied. For non-UNP ports, default
QoS policy list is applied. The show unp edge-user details command displays the list of enforcement
applications used by the UNP user. For example:
-> show unp edge-user details
Port: 4/1/6
MAC-Address: [Link]
Access Timestamp = 02/18/2014 [Link],
User Name = [Link],
IP-Address = [Link],
Vlan = 25,
Authentication Type = Mac,
Authentication Status = Authenticated,
Authentication Failure Reason = -,
Authentication Retry Count = 0,
Authentication Server IP Used = [Link],
Authentication Server Used = cppm,
Server Reply-Message = -,
Profile = UNP-device,
Profile Source = Auth - Pass - Server UNP,
Profile From Auth Server = UNP-device,
Classification Profile Rule = -,
Role = pl3,
Role Source = L2-Profile,
User Role Rule = -,
Restricted Access = No,
Location Policy Status = -,
Time Policy Status = -,
Captive-Portal Status = -,
QMR Status = Passed,
Redirect Url = -,
page 32-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Application Monitoring and Enforcement Configuring AppMon
• For QoS policies, AppMon can be enabled on any OmniSwitch 6860 or OmniSwitch 6860E element of
the network for enforcing policy actions such as drop, 802.1p/DSCP priority marking, and rate
limiting. Only the edge switches need to enable AppMon enforcement functionality for higher priority
QoS treatment. Intermediate switches in the network must only provide consistent QoS treatment based
on the earlier marking done by edge switches, whereas core switches only provide QoS treatment.
• AppMon enforcement configures both ingress/egress flow tracking configuration on each port when
enabled. If both ports are disabled for a given flow, flow is not tracked and QoS treatment is not given.
• To upgrade an OmniSwitch from an 8.1.1 image to an 8.2.1 image, remove the existing AppMon
configuration and use the write memory command. After a successful upload of an 8.2.1 image,
configure the required AppMon settings.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 32-13
Configuring AppMon Configuring Application Monitoring and Enforcement
Enabling/Disabling AppMon
To enable AppMon feature globally on the switch, use the app-mon admin-state command with the
enable option. By default, AppMon is disabled on the switch.
-> app-mon admin-state enable
To disable AppMon functionality, use the app-mon admin-state command with the disable option.
-> app-mon admin-state disable
When slot option is used, then AppMon configuration is applied on all physical ports of that particular
slot.
To disable AppMon functionality on a port or slot, use the app-mon port admin-state command with
disable option. For example:
-> app-mon port 1/1/2-5 admin-state disable
-> app-mon slot 1/1 admin-state disable
page 32-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Application Monitoring and Enforcement Configuring AppMon
Create Auto-Groups
Auto-Group functionality automatically creates application-groups based on the classification of supported
applications in the signature file. The ‘Category’ field is used for classification (for example, Youtube will
be part of Web category, and Webex will be part of Audio/Video category).
To create application groups automatically on the switch, use the app-mon auto-group create command.
-> app-mon auto-group create
On using the app-mon auto-group create command, the following action will be taken:
• Category-based application groups are created. If the application group already exist with category
names, those groups are updated from the existing application pool. Application group update includes
addition of all the applications of a given category from the application pool to the corresponding auto-
application group. The auto-application group retains any additional applications added by the user.
• Modifications are allowed in auto-application groups with addition of applications using the app-mon
app-group command. Deletion of applications is also allowed for any application in the group.
Modifications to the auto-application groups are retained on reboot, if saved by using the appapp-mon
apply and write memory commands.
• On signature file update, if the “auto-group create” option is given, category-based application groups
are created or updated if they already exist.
• It is mandatory to enter appapp-mon apply to save the auto-group configuration on the switch.
To add a range of applications or multiple applications to an application group, use the from and to
options.
-> app-mon app-group apg1 add from sip to viber
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 32-15
Configuring AppMon Configuring Application Monitoring and Enforcement
For example, the following example adds an application group to the application list. Application group
enables addition of multiple applications to the application list.
-> app-mon app-list add app-group apg1
To remove an application from an application list, use the following command. For example:
-> app-mon app-list remove app-name whatsapp
When app-mon apply command is used, any application configured more than once in an application list
(individually or as a part of application group) is checked. The app-mon apply command will not be
successful until the conflict is resolved. Use the show app-mon app-list command with the monitor
conflict or the enforcement conflict parameter option to display the available conflicts in an application
list. The duplicate application names must be removed for successful app-mon apply.
page 32-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Application Monitoring and Enforcement Configuring AppMon
The following command disables monitoring and enforcement for IPv4 packets:
-> app-mon l3-mode ipv4 admin-state disable
The following command disables monitoring and enforcement for UDP flows:
-> app-mon port 1/1/2 l4-mode udp admin-state disable
A specific L4 port range can be excluded from the AppMon operation using the app-mon l4port-exclude
command. The valid Exclude ID range is 1–8. The valid port range is 1–65535.
For example, to exclude TCP port 20 to port 30 from the AppMon operation, use the following command:
-> app-mon l4port-exclude range-id 5 tcp-service-port start 20 end 30
Use the no form of the app-mon l4port-exclude command to delete the range. For example,
-> no app-mon l4port-exclude range-id 6
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 32-17
Configuring AppMon Configuring Application Monitoring and Enforcement
The following command disables flow-table statistics update for enforcement applications:
-> app-mon flow-table enforcement stats admin-state disable
To configure the default aging interval, use the default keyword. For example:
-> app-mon aging enforcement app-name tftp default
page 32-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Application Monitoring and Enforcement Configuring AppMon
When used with the enforcement option, the threshold is configured for the number of matched flows to
be saved on to the log file for enforcement applications. For example, the following command configures
a threshold value of 30000 for enforcement applications.
-> app-mon logging-threshold enforcement num-of-flows 30000
To configure the default logging threshold, 20000, use the default keyword as shown.
-> app-mon logging-threshold monitor num-of-flows default
To configure the default interval value, 60 seconds, use the default keyword as shown.
-> app-mon flow-sync enforcement interval default
Default flow-sync interval is 300 seconds for monitoring. This is not user configurable.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 32-19
Configuring AppMon Configuring Application Monitoring and Enforcement
• While configuring the QoS policies, the application name or the application group must exist in
AppMon.
• Destination port or port group based policy condition is not supported for AppMon.
Configure AppMon enforcement QoS policy rules using the policy condition command. An application
name or application-group name can be specified in the policy condition as shown below.
-> policy condition c1 app-mon-application-group appgroup1
-> policy condition c2 app-mon-application-name watsapp
For more information about configuring QoS policy rules for AppMon, see the “QoS Policy Commands”
chapter in the OmniSwitch AOS Release 8 CLI Reference Guide and the Chapter 27, “Configuring QoS.”
chapter in this guide.
page 32-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Application Monitoring and Enforcement Verifying AppMon Configuration
show app-mon config Displays global AppMon configuration, which includes information
about admin-state, running mode, IP mode, aging-timer, and total
signatures.
show app-mon port Displays AppMon status per physical port or per slot for the switch.
show app-mon app-pool Displays all the applications that are part of an application pool.
show app-mon app-list Displays a list of applications and application groups added to an
application list.
show app-mon app-group Displays the details of all the applications in an application group.
show app-mon app-record Displays current-hour application-record information as well the
historic application-records on the hourly or 24-hours basis for
monitored applications.
show app-mon ipv4-flow-table Displays the flow table for IPv4 flows entries for enforcement and
monitor flows.
show app-mon ipv6-flow-table Displays the flow table for IPv6 flows entries for enforcement and
monitor flows.
show app-mon l4port-exclude Displays the port range excluded from AppMon operation.
show app-mon stats Displays the number of flow statistics.
show app-mon aging Displays the aging interval for each application for enforcement feature.
enforcement
show app-mon vc-topology Displays the AppMon VC topology.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 32-21
Verifying AppMon Configuration Configuring Application Monitoring and Enforcement
page 32-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
33 Configuring Port
Mapping
Port Mapping is a security feature that controls communication between peer users. Each session
comprises of a session ID, a set of user ports, and/or a set of network ports. The user ports within a session
cannot communicate with each other and can only communicate through network ports. In a port mapping
session with user port set A and network port set B, the ports in set A can only communicate with the ports
in set B. If set B is empty, the ports in set A can communicate with rest of the ports in the system.
A port mapping session can be configured in the unidirectional or bidirectional mode. In the unidirectional
mode, the network ports can communicate with each other within the session. In the bidirectional mode,
the network ports cannot communicate with each other. Network ports of a unidirectional port mapping
session can be shared with other unidirectional sessions, but cannot be shared with any sessions configured
in the bidirectional mode. Network ports of different sessions can communicate with each other.
In This Chapter
This chapter describes the port mapping security feature and explains how to configure the same through
the Command Line Interface (CLI).
Configuration procedures described in this chapter include:
• Creating/Deleting a Port Mapping Session—see “Creating a Port Mapping Session” on page 33-4 or
“Deleting a Port Mapping Session” on page 33-4.
• Enabling/Disabling a Port Mapping Session—see “Enabling a Port Mapping Session” on page 33-5 or
“Disabling a Port Mapping Session” on page 33-5.
• Configuring a Port Mapping Direction—see “Configuring Unidirectional Port Mapping” on page 33-5
and “Restoring Bidirectional Port Mapping” on page 33-5.
• Configuring an example Port Mapping Session—see “Sample Port Mapping Configuration” on
page 33-6.
• Verifying a Port Mapping Session—see “Verifying the Port Mapping Configuration” on page 33-7.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 33-1
Port Mapping Specifications Configuring Port Mapping
page 33-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Port Mapping Quick Steps for Configuring Port Mapping
2 Enable the port mapping session with the port-mapping command. For example:
Note. You can verify the configuration of the port mapping session by entering show port-mapping fol-
lowed by the session ID.
-> show port-mapping 8
You can also verify the status of a port mapping session by using the show port-mapping status com-
mand.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 33-3
Creating/Deleting a Port Mapping Session Configuring Port Mapping
You can create a port mapping session with link aggregate network ports. For example:
-> port-mapping 3 network-port linkagg 7
-> port-mapping 3 network-port linkagg 8
-> port-mapping 3 network-port linkagg 9
You can specify all the ports of a slot to be assigned to a mapping session. For example, to create a port
mapping session 3 with all the ports of slot 1 as network ports, enter:
-> port-mapping 3 network-port slot 1/1
You can specify a range of ports to be assigned to a mapping session. For example, to create a port
mapping session 4 with ports 5 through 8 as user ports, enter:
-> port-mapping 4 user-port 1/1/5-8
page 33-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Port Mapping Enabling/Disabling a Port Mapping Session
Note. To change the direction of an active session with network ports, delete the network ports of the ses-
sion, change the direction, and recreate the network ports.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 33-5
Sample Port Mapping Configuration Configuring Port Mapping
The Switch D is configured by creating a port mapping session 1 with user ports 2/1, 2/2 and network
ports 1/1/1.
3/1/1 3/1/2 3/1/3 2/1/1
Switch A Switch C
1/1/1 1/1/1 3/1/1
2/1/1
1/1/2 3/1/2
2/1/2
1/1/3 Switch B Switch D
1/1/1 2/1/1
2/1/1
2/1/2
2/1/2
3/1/1 3/1/1
page 33-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Port Mapping Verifying the Port Mapping Configuration
2 Create two port mapping sessions on Switch A using the following commands:
4 Similarly, create and enable a port mapping session 1 on Switch D using the following commands:
show port-mapping status Displays the status of one or more port mapping sessions.
show port-mapping Displays the configuration of one or more port mapping sessions.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 33-7
Verifying the Port Mapping Configuration Configuring Port Mapping
page 33-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
34 Configuring Learned
Port Security
Learned Port Security (LPS) provides a mechanism for authorizing source learning of MAC addresses on
Ethernet ports. The only types of Ethernet ports that LPS does not support are link aggregate and 802.1Q
trunked link aggregate ports. Using LPS to control source MAC address learning provides the following
benefits:
• A configurable source learning time limit that applies to all LPS ports.
• A configurable limit on the number of MAC addresses (bridged and filtered) allowed on an LPS port.
• Three methods for handling unauthorized traffic: administratively disable the LPS port, stop all traffic
on the port(port remains up), or only block traffic that violates LPS criteria.
In This Chapter
This chapter provides an overview of the LPS feature and describes how to configure LPS parameters
through the Command Line Interface (CLI). CLI commands are used in the configuration examples; for
more details about the syntax of commands, see the OmniSwitch AOS Release 8 CLI Reference Guide.
The following information and procedures are included in this chapter:
• “Learned Port Security Specifications” on page 34-2.
For more information about source MAC address learning, see Chapter 3, “Managing Source Learning.”
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 34-1
Learned Port Security Specifications Configuring Learned Port Security
page 34-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Learned Port Security Sample Learned Port Security Configuration
• Defining the maximum number of learned MAC addresses allowed on an LPS port.
• Defining the time limit for which source learning is allowed on all LPS ports.
Quick Steps
1 Enable LPS on ports 6 through 8 using the following commands:
2 Set the total number of learned MAC addresses allowed on the same ports to 25 using the following
command:
-> port-security port 1/1/6-8 maximum 25
3 Configure the amount of time in which source learning is allowed on all LPS ports to 30 minutes using
the following command:
-> port-security learning-window 30
4 Select shutdown for the LPS violation mode using the following command:
Note. Optional. To verify LPS port configurations, use the command show port-security. For example:
-> show port-security port 1/1/1
Port: 1/1/1
Admin-State : ENABLED,
Operation Mode : ENABLED,
Max MAC bridged : 3,
Trap Threshold : 1,
Violation : RESTRICT
Max MAC filtered : 5,
Low MAC Range : [Link],
High MAC Range : [Link],
Violating MAC : NULL
To verify the new source learning time limit value, use the show port-security learning-window com-
mand. For example:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 34-3
Sample Learned Port Security Configuration Configuring Learned Port Security
page 34-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Learned Port Security Learned Port Security Overview
Additional LPS functionality allows the user to specify how the LPS port handles unauthorized traffic.
The following options are available for this purpose:
• Block traffic that violates LPS port restrictions; authorized traffic is forwarded on the port.
• Administratively down the LPS port when unauthorized traffic is received; all traffic is stopped.
• 802.1Q tagged
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 34-5
Learned Port Security Overview Configuring Learned Port Security
• Allow MAC movement. When this option is enabled, a pseudo-static MAC address learned on one
port can move to another port in the same VLAN without getting dropped.
• Automatically learn MAC addresses as static MAC addresses. When this option is enabled, learned
MAC addresses are automatically converted to static MAC addresses during the learning window time.
• Pseudo Static. A dynamically learned MAC address that is treated the same as a regular static address
(will not age out). However, pseudo-static MAC addresses are not saved in the running configuration
of the switch.
• Dynamic Bridged. MAC address that are dynamically learned as bridged addresses up to the
maximum number of bridged addresses allowed on the LPS port. When this maximum is reached,
subsequent addresses are dynamically learned as filtered MAC addresses.
• Dynamic Filtered. MAC addresses that are dynamically learned as filtered address up to the maximum
number of filtered addresses allowed on the LPS port.
page 34-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Learned Port Security Learned Port Security Overview
Is the learning YES Bridged MAC NO Is MAC address YES
window open?
address count authorized
within
reached? range?
NO YES NO
YES Filtered MAC
address count
reached?
NO
Drop packet, send trap, MAC address learned as NO Is the no aging
disable port or restrict a dynamic filtered address enabled?
option
unlearned packet
YES
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 34-7
Learned Port Security Overview Configuring Learned Port Security
Note. If the LPS learning window time period is set to infinity, enabling the convert to static function is not
allowed. If convert to static is already enabled and the learning window time is changed to infinity, convert
to static is automatically disabled.
page 34-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Learned Port Security Learned Port Security Overview
Note. Statically configured authorized MAC addresses are displayed permanently in the MAC address
table for the specified LPS port; they are not learned on any other port in the same VLAN.
• The maximum number of MAC addresses that can be filtered on the port.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 34-9
Interaction With Other Features Configuring Learned Port Security
• The violation mode selected for the port; restrict, discard, or shutdown.
• The management status for the MAC address entry; configured or dynamic.
If the LPS port is shut down or the network device is disconnected from the port, the LPS table entries and
the source learning MAC address table entries for the port are automatically cleared.
To view the contents of the LPS table, use the show port-security command. Refer to the OmniSwitch
AOS Release 8 CLI Reference Guide for more information about this command.
Access Guardian
LPS is one of the Access Guardian security functions that helps to ensure that only certain devices are
allowed to connect to the switch. The LPS functionality is used to control which MAC addresses are
allowed on a switch port.
page 34-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Learned Port Security Configuring Learned Port Security
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 34-11
Configuring Learned Port Security Configuring Learned Port Security
Note. When LPS is enabled on an active port, all MAC addresses learned on that port prior to the time LPS
was enabled are cleared from the source learning MAC address table.
To disable all the LPS ports on a chassis, use the port-security chassis admin-state command, as shown:
-> port-security chassis admin-state disable
When LPS is disabled on a port, the MAC address entries for that port are retained in the LPS table. The
next time LPS is enabled on the port, the same LPS table entries become active again. If there is a switch
reboot before the switch configuration is saved, however, dynamic MAC address entries are discarded
from the table.
When the LPS port is locked, all learning on the port is stopped.
After LPS is removed, all the dynamic and static MAC addresses are flushed and unrestricted learning of
new MAC addresses is enabled.
page 34-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Learned Port Security Configuring Learned Port Security
Note. When the time limit value expires, source learning of any new dynamic bridged MAC addresses is
stopped on all LPS ports, even if the number of bridged addresses learned does not exceed the maximum
allowed. However, after the window has closed, the switch will continue to learn dynamic filtered MAC
addresses until the maximum number of filtered addresses allowed is reached.
Setting the LPS learning window time value to zero (the default) configures an infinite learning window
for LPS ports. For example:
-> port-security learning-window 0
Use the show port-security learning-window command to determine the current settings for the LPS
learning window.
no-aging Specifies whether or not learned dynamic MAC addresses can age
out. See “Configuring the MAC Address Aging Status” on
page 34-14.
convert-to-static Specifies whether or not learned dynamic bridged MAC addresses
are converted to static MAC addresses when the learning window
closes. See “Converting Dynamic MAC Addresses to Static MAC
Addresses” on page 34-14.
learn-as-static Specifies whether or not learned dynamic bridged MAC addresses
are automatically converted to static MAC addresses during the
learning window time frame. See “Learning MAC Addresses as
Static MAC Addresses” on page 34-15.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 34-13
Configuring Learned Port Security Configuring Learned Port Security
To disable this option for the learning window, use the following command:
-> port-security learning-window no-aging disable
The number of converted static MAC addresses cannot exceed the maximum number of MAC addresses
allowed on the LPS ports.
By default, converting dynamic MAC addresses to static MAC addresses is disabled. To enable this option
for the learning window, use the following command:
-> port-security learning-window 30 convert-to-static enable
If the LPS learning window time is set to zero (infinity), enabling the convert-to-static option is not
allowed. For example:
-> port-security learning-window 0 convert-to-static enable
ERROR: Convert-to-static cannot be configured along with infinite learning-
window
The following command disables this option for the learning window:
-> port-security learning-window 30 convert-to-static disable
page 34-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Learned Port Security Configuring Learned Port Security
If the LPS learning window is set to a specific time and the convert-to-static option is enabled, the
convert-to-static option is automatically disabled when the learning window time is set to zero. For
example:
-> port-security learning-window 10 convert-to-static enable
The following command disables this option for the learning window:
-> port-security learning-window 30 learn-as-static disable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 34-15
Configuring Learned Port Security Configuring Learned Port Security
The following command disables this option for the learning window:
-> port-security learning-window 30 mac-move disable
To enable this functionality, use the boot-up enable parameter with the port-security learning-window
command. For example:
-> port-security learning-window boot-up disable
Note. After the boot-up option is enabled (either by default or explicitly configured), perform the write
memory command to save the port-security learning-window command to the switch configuration
([Link] file). This will ensure that the learning window will automatically start when the switch
reboots.
To specify a maximum number of MAC addresses allowed for multiple ports, specify a range of ports. For
example:
-> port-security port 1/1/10-15 maximum 10
-> port-security port 1/1/1-5 maximum 25
If there are 10 configured authorized MAC addresses for an LPS port and the maximum number of
addresses allowed is set to 15, then only 5 dynamically learned MAC address are allowed on this port.
If the maximum number of MAC addresses allowed is reached before the switch LPS time limit expires,
then all source learning of dynamic and configured bridged MAC addresses is stopped on the LPS port.
However, the switch will continue to learn subsequent addresses as filtered until the maximum number of
filtered MAC addresses allowed on the port is reached.
page 34-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Learned Port Security Configuring Learned Port Security
Sending a trap when this threshold is reached provides notification of newly learned bridged MAC
addresses. Trap contents includes identifying information about the MAC, such as the address itself, the
corresponding IP address, switch identification, and the port number on which the MAC was learned.
To specify a maximum number of filtered MAC addresses learned on multiple ports, specify a range of
ports or multiple slots. For example:
-> port-security port 1/1/9-15 max-filtering 10
-> port-security port 1/1/1-5 max-filtering 25
The following command examples configure a MAC address range for a range of ports:
-> port-security port 1/1/1-5 mac-range low [Link] high
[Link]
-> port-security port 1/1/1-4 mac-range low [Link] high
[Link]
To restore the range to the default values, use the port-security parameter followed by the port keyword
and port designation of the port and the mac-range. The MAC address range is restored to
[Link] and [Link] when the low and high MAC addresses are excluded. For example,
the following command sets the authorized MAC address range to the default values for port 12:
-> port-security port 1/1/12 mac-range
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 34-17
Configuring Learned Port Security Configuring Learned Port Security
In addition, specifying a low end MAC and a high end MAC is optional. If either one is not specified, the
default value is used. For example, the following commands set the authorized MAC address range on the
specified ports to [Link]–[Link] and [Link]–[Link]
-> port-security port 1/1/8 mac-range low pp:da:25:59:0c
-> port-security port 1/1/10 mac-range high [Link]
Refer to the OmniSwitch AOS Release 8 CLI Reference Guide for more information about this command.
Note. Unauthorized source MAC addresses are not learned in the LPS table but are still recorded in the
source learning MAC address table with a filtered operational status. This allows the user to view MAC
addresses that were attempting unauthorized access to the LPS port.
By default, the security violation mode for an LPS port is set to restrict. To configure the security
violation mode for an LPS port, enter port-security followed by the port designation of the port, then
violation followed by restrict, discard, or shutdown. For example, the following command selects the
shutdown mode for port 1:
-> port-security port 1/1/1 violation shutdown
To configure the security violation mode for multiple LPS ports, specify a range of ports or multiple slots.
For example:
-> port-security port 1/1/1-10 violation shutdown
-> port-security port 1/1/10-15 violation restrict
page 34-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Learned Port Security Configuring Learned Port Security
Note. To verify the details about LPS violations, use the show violation command.
-> show violation
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 34-19
Displaying Learned Port Security Information Configuring Learned Port Security
show port-security Displays Learned Port Security (LPS) configuration and table
entries.
show port-security learning-window Displays the amount of time during which source learning can
occur on all LPS ports.
show violation Displays the address violations that occur on ports with LPS
restrictions.
For more information about the resulting display from these commands, see the OmniSwitch AOS Release
8 CLI Reference Guide. An example of the output for the show port-security, show port-security
learning-window and show violation commands is also given in “Sample Learned Port Security
Configuration” on page 34-3.
page 34-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
35 Diagnosing Switch
Problems
Several tools are available for diagnosing problems that occur with the switch. These tools include:
• Port Mirroring
• Port Monitoring
• sFlow
Port mirroring copies all incoming and outgoing traffic from configured mirror ports to a second mirroring
Ethernet port, where it can be monitored with a Remote Network Monitoring (RMON) probe or network
analysis device without disrupting traffic flow on the mirrored port. The port monitoring feature allows
you to examine packets to and from a specific Ethernet port. sFlow is used for measuring high speed
switched network traffic. It is also used for collecting, storing, and analyzing the traffic data. Switch
Health monitoring software checks previously configured threshold levels for the switch’s consumable
resources, and notifies the Network Monitoring Station (NMS) if those limits are violated.
In This Chapter
This chapter describes port mirroring, port monitoring, remote monitoring (RMON) probes, sFlow, and
switch health features and explains how to configure the same through the Command Line Interface (CLI).
Configuration procedures described in this chapter include:
• Creating or Deleting a Port Mirroring Session—see “Creating a Mirroring Session” on page 35-17 or
“Deleting A Mirroring Session” on page 35-20.
• Protection from Spanning Tree changes (Port Mirroring)—see “Unblocking Ports (Protection from
Spanning Tree)” on page 35-18.
• Enabling or Disabling Port Mirroring Status—see “Enabling or Disabling Mirroring Status” on
page 35-18 or “Disabling a Mirroring Session (Disabling Mirroring Status)” on page 35-19.
• Configuring Port Mirroring Direction—see “Configuring Port Mirroring Direction” on page 35-19.
• Enabling or Disabling a Port Mirroring Session—see “Enabling or Disabling a Port Mirroring Session
(Shorthand)” on page 35-20.
• Configuring a Port Monitoring Session—see “Configuring a Port Monitoring Session” on page 35-23.
• Enabling a Port Monitoring Session—see “Enabling a Port Monitoring Session” on page 35-23.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-1
In This Chapter Diagnosing Switch Problems
• Disabling a Port Monitoring Session—see “Disabling a Port Monitoring Session” on page 35-23.
• Deleting a Port Monitoring Session—see “Deleting a Port Monitoring Session” on page 35-23.
• Pausing a Port Monitoring Session—see “Pausing a Port Monitoring Session” on page 35-24.
• Configuring the persistence of a Port Monitoring Session—see “Configuring Port Monitoring Session
Persistence” on page 35-24.
• Configuring a Port Monitoring data file—see “Configuring a Port Monitoring Data File” on
page 35-24.
• Configuring a Port Monitoring direction—see “Configuring Port Monitoring Direction” on page 35-25.
• Displaying Port Monitoring Status and Data—see “Displaying Port Monitoring Status and Data” on
page 35-25.
• Configuring a sFlow Session—see “Configuring an sFlow Session” on page 35-27.
• Configuring a Fixed Primary Address—see “Configuring a Fixed Primary Address” on page 35-28.
• Enabling or Disabling RMON Probes—see “Enabling or Disabling RMON Probes” on page 35-32.
For information about additional Diagnostics features such as Switch Logging and System Debugging/
Memory Management commands, see Chapter 37, “Using Switch Logging.”
page 35-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Port Mirroring Overview
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-3
Port Mirroring Overview Diagnosing Switch Problems
Note. Optional. To verify the port mirroring configuration, enter show port-mirroring status followed by
the port mirroring session ID number. The display is similar to the one shown below:
-> show port-mirroring status 6
For more information about this command, see “Displaying Port Mirroring Status” on page 35-20 or the
“Port Mirroring and Monitoring Commands” chapter in the OmniSwitch AOS Release 8 CLI Reference
Guide.
page 35-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Port Monitoring Overview
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-5
Port Monitoring Overview Diagnosing Switch Problems
2 Enable the port monitoring session by entering port-monitoring, followed by the port monitoring
session ID, source, the port number of the port to be monitored, and enable. For example:
-> port-monitoring 6 source 2/1/3 enable
3 Optional. Configure optional parameters. For example, to create a file called “monitor1” for port
monitoring session 6 on port 2/3, enter:
-> port-monitoring 6 source 2/1/3 file monitor1
Note. Optional. To verify the port monitoring configuration, enter show port-monitoring status, followed
by the port monitoring session ID number. The display is similar to the one shown below:
-> show port-monitoring status
page 35-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems sFlow Overview
sFlow Overview
The following sections detail the specifications, defaults, and quick set up steps for the sFlow feature.
Detailed procedures are found in “sFlow” on page 35-26.
sFlow Specifications
RFCs Supported 3176 - sFlow Management Information Base
Platforms Supported OmniSwitch 6860, 6860E
Receiver/Sampler/Polling Instances 2
Sampling length of packet
type of frame
source and destination MACs
source and destination VLANs
source and destination priorities
source and destination IP addressessource and
destination ports
tcp flags and tos
Polling In octets
Out octets
Number of Rx Unicast packets
Number of Tx Unicast packets
Number of Rx Multicast packets
Number of Tx Multicast packets
Number of Rx Broadcast packets
Number of Tx Broadcast packets
In Errors
Out Errors
Agent IP Address Configurable using sflow agent ip command.
sFlow Defaults
The following table shows sFlow default values:
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-7
sFlow Overview Diagnosing Switch Problems
1 To create a sFlow receiver session, use the sflow receiver command by entering sflow receiver,
followed by the receiver index, name, and the IP address. For example:
-> sflow receiver 1 name Golden address [Link]
2 Optional. Configure optional parameters. For example, to specify the timeout value “65535” for sFlow
receiver session on address [Link], enter:
-> sflow receiver 1 name Golden address [Link] timeout 65535
Note. Optional. To verify the sFlow receiver configuration, enter show sflow receiver, followed by the
sFlow receiver index. The display is similar to the one shown below:
-> show sflow receiver
Receiver 1
Name = Golden
Address = IP_V4 [Link]
UDP Port = 6343
Timeout = 65535
Packet Size= 1400
DatagramVer= 5
For more information about this command, see “sFlow” on page 35-26 or the “sFlow Commands” chapter
in the OmniSwitch AOS Release 8 CLI Reference Guide.
1 To create a sFlow sampler session, use the sflow sampler command by entering sflow sampler,
followed by the instance ID, port list, receiver, and the rate. For example:
-> sflow sampler 1 2/1/1-5 receiver 1 rate 2048
2 Optional. Configure optional parameters. For example, to specify the sample-hdr-size value “128” for
sFlow sampler instance 1 on ports 2/1-5, enter:
-> sflow sampler 1 2/1/1-5 receiver 1 rate 2048 sample-hdr-size 128
Note. Optional. To verify the sFlow sampler configuration, enter show sflow sampler, followed by the
sFlow sampler instance ID. The display is similar to the one shown below:
-> show sflow sampler 1
Instance Interface Receiver Rate Sample-Header-Size
-----------------------------------------------------------------
1 2/1/1 1 2048 128
1 2/1/2 1 2048 128
1 2/1/3 1 2048 128
1 2/1/4 1 2048 128
1 2/1/5 1 2048 128
For more information about this command, see “sFlow” on page 35-26 or the “sFlow Commands” chapter
in the OmniSwitch AOS Release 8 CLI Reference Guide.
page 35-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems sFlow Overview
1 To create a sFlow poller session, use the sflow poller command by entering sflow poller, followed by
the instance ID, port list, receiver, and the interval. For example:
-> sflow poller 1 2/1/6-10 receiver 1 interval 30
Note. Optional. To verify the sFlow poller configuration, enter show sflow poller, followed by the sFlow
poller instance ID. The display is similar to the one shown below:
-> show sflow poller
Instance Interface Receiver Interval
-------------------------------------------
1 2/1/6 1 30
1 2/1/7 1 30
1 2/1/8 1 30
1 2/1/9 1 30
1 2/1/10 1 30
For more information about this command, see “sFlow” on page 35-26 or the “sFlow Commands” chapter
in the OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-9
Remote Monitoring (RMON) Overview Diagnosing Switch Problems
RMON Specifications
RFCs Supported 2819 - Remote Network Monitoring
Management Information Base
Platforms Supported OmniSwitch 6860, 6860E
RMON Functionality Supported Basic RMON 4 group implementation
–Ethernet Statistics group
–History (Control and Statistics) group
–Alarms group
–Events group
RMON Functionality Not Supported RMON 10 group*
RMON2*
–Host group
–HostTopN group
–Matrix group
–Filter group
–Packet Capture group
(*An external RMON probe that includes
RMON 10 group and RMON2 be used where
full RMON probe functionality is required.)
Flavor (Probe Type) Ethernet/History/Alarm
Status Active/Creating/Inactive
History Control Interval (seconds) 1 to 3600
History Sample Index Range 1 to 65535
Alarm Interval (seconds) 1 to 2147483647
Alarm Startup Alarm Rising Alarm/Falling Alarm/
RisingOrFalling Alarm
Alarm Sample Type Delta Value/Absolute
RMON Traps Supported RisingAlarm/FallingAlarm
These traps are generated whenever an Alarm
entry crosses either its Rising Threshold or its
Falling Threshold and generates an event
configured for sending SNMP traps.
page 35-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Remote Monitoring (RMON) Overview
2 To verify the RMON probe configuration, enter the show rmon probes command, with the keyword
for the type of probe. For example, to display the statistics probes, enter the following:
-> show rmon probes stats
3 To view statistics for a particular RMON probe, enter the show rmon probes command, with the
keyword for the type of probe, followed by the entry number for the desired RMON probe. For example:
-> show rmon probes 1011
For more information about these commands, see “Displaying a List of RMON Probes” on page 35-33,
“Displaying Statistics for a Particular RMON Probe” on page 35-34, or the “RMON Commands” chapter
in the OmniSwitch AOS Release 8 CLI Reference Guide.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-11
Switch Health Overview Diagnosing Switch Problems
page 35-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Switch Health Overview
The default settings for the command you entered is displayed. For example:
Rx Threshold = 80
TxRx Threshold = 80
Memory Threshold = 80
CPU Threshold = 80
Sampling Interval (Secs) = 10
2 Enter the appropriate command to change the required health threshold or health sampling interval
parameter settings or reset all health statistics for the switch. For example:
-> health threshold memory 85
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-13
Port Mirroring Diagnosing Switch Problems
Port Mirroring
On chassis-based or standalone switches, you can set up port mirroring sessions between Ethernet ports
within the same switch.
All Ethernet ports support port mirroring. When port mirroring is enabled, the active “mirrored” port
transmits and receives network traffic normally, and the “mirroring” port receives a copy of all transmit
and receive traffic to the active port. You can connect an RMON probe or network analysis device to the
mirroring port to see an exact duplication of traffic on the mirrored port without disrupting network traffic
to and from the mirrored port.
Port mirroring runs in the Chassis Management software and is supported for Ethernet ports. In addition,
the switch supports “N-to-1” port mirroring, where up to 128 source ports can be mirrored to a single
destination port.
Refer to the Port Mirroring Specifications Table in the “Port Mirroring Overview” on page 35-3 for the
number of mirroring sessions supported.
Note. When port mirroring is enabled, some performance degradation may occur, since all frames received
and transmitted by the mirrored port are copied and sent to the mirroring port
page 35-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Port Mirroring
NMS
Workstation
Mirrored
(Active) Port
(w/ Incoming &
Outgoing Frames)
Mirroring
(Monitoring) Port
(w/ Copied Incoming
& Outgoing Frames)
Relationship Between Mirrored and Mirroring Ports
Note. If the mirroring port monitors mirrored traffic on an RMON probe belonging to a different VLAN
than the mirrored port, it must be protected from blocking due to Spanning Tree updates. See “Unblocking
Ports (Protection from Spanning Tree)” on page 35-18 for details.
The diagram on the following page illustrates how port mirroring can be used with an external RMON
probe to copy RMON probe frames and Management frames to and from the mirroring and mirrored
ports. Frames received from an RMON probe attached to the mirroring port can be seen as being received
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-15
Port Mirroring Diagnosing Switch Problems
by the mirrored port. These frames from the mirroring port are marked as if they are received on the
mirrored port before being sent over the switch backplane to an NMS station. Therefore, management
frames destined for the RMON probe are first forwarded out of the mirrored port. After being received on
the mirrored port, copies of the frames are mirrored out of the mirroring port—the probe attached to the
mirroring port receives the management frames.
NMS Workstation
A. RMON probe frames sent from the mirroring port
Mirroring Port
Mirrored
C. Management frames from the NMS Workstation are sent to the mirrored port....
D. ...and port mirroring sends copies of the
Management frames to the mirroring port.
NMS Workstation
Mirroring Port
Mirrored Port
RMON Probe
OmniSwitch
page 35-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Port Mirroring
• There must not be any physical loop present in the Remote Port Mirroring VLAN.
• Remote port mirroring (RPMIR) MTP port can have tagged VLAN and untagged default VLAN on it.
• The VLAN ID used for RPMIR cannot be assigned to the MTP port.
• The VLAN ID used for RPMIR cannot be assigned to the unblocked VLAN.
• On the intermediate and destination switches, source learning must be disabled or overridden on the
ports belonging to the Remote Port Mirroring VLAN.
• The mac-learning vlan disable command can be used to override source learning on an OmniSwitch.
• 802.1AB (LLDP)
• 802.3ag (OAM)
For more information and an example of a Remote Port Mirroring configuration, see “Remote Port
Mirroring” on page 35-17.
To create a remote port mirroring session, enter the port-mirroring source destination command and
include the port mirroring session ID number, the source and destination ports, and the remote port
mirroring VLAN ID as shown in the following example:
-> port-mirroring 8 source 1/1/1 destination 1/1/2 rpmir-vlan 1000
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-17
Port Mirroring Diagnosing Switch Problems
This command line specifies remote port mirroring session 8, with the source (mirrored) port located on
port 1/1/1, the destination (mirroring) port 1/1/2, and the remote port mirroring VLAN 1000.
Creating an “N-to-1” port mirroring session is supported where multiple source ports can be mirrored to a
single destination port as in the following example:
-> port-mirroring 1 source 1/1/2 destination 2/1/4
-> port-mirroring 1 source 2/1/1 destination 2/1/4
-> port-mirroring 1 source 2/1/3 destination 2/1/4
As an option, you can specify a range of source ports and/or multiple source ports as in the following
example:
-> port-mirroring 1 source 1/1/2-6 destination 2/1/4
In the following example, ports 1/9, 2/7, and 3/5 are mirrored on destination port 2/4 in session 1:
-> port-mirroring 1 source 1/1/9 2/1/7 3/1/5 destination 2/1/4
-> port-mirroring 1 source 1/1/2-6 1/1/9 2/1/7 3/1/5 destination 2/1/4
Note. Ports can be added after a port mirroring session has been configured.
page 35-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Port Mirroring
Note. You can modify the parameters of a port mirroring session that has been disabled.
Keep in mind that the port mirroring session configuration remains valid, even though port mirroring has
been turned off.
Note. The port mirroring session identifier and port locations of the designated interfaces must always be
specified.
Note. Optionally, you can also specify the optional unblocked VLAN ID number and either enable or dis-
able on the same command line.
In this example, the command specifies port mirroring session 6 and the mirroring direction is
unidirectional and inward bound:
-> port-mirroring 6 source 2/1/3 destination 6/1/4 inport
In this example, the command specifies port mirroring session 6 and the mirroring direction is
unidirectional and outward bound:
-> port-mirroring 6 source 2/1/3 destination 6/1/4 outport
You can use the bidirectional keyword to restore a mirroring session to its default bidirectional
configuration. For example:
-> port-mirroring 6 source 2/1/3 destination 6/1/4 bidirectional
Note. The port mirroring session identifier and port locations of the designated interfaces must always be
specified.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-19
Port Mirroring Diagnosing Switch Problems
Note. Port mirroring session parameters cannot be modified when a mirroring session is enabled. Before
you can modify parameters, the mirroring session must be disabled.
To disable a port mirroring session, enter the port-mirroring command, followed by the port mirroring
session ID number and the keyword disable. The following command disables port mirroring session 6
(turning port mirroring off):
-> port-mirroring 6 disable
page 35-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Port Mirroring
Destination switch
Intermediate
switch
3/1/1
Local MTP
Source switch 1/1/2 2/1/2 3/1/2
2/1/1
Destination Port
RPMir
Source VLAN - 1000
Port
1/1/1
Note. If the intermediate switches are not OmniSwitches, refer to the vendor documentation for instructions
on disabling or overriding source learning.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-21
Port Monitoring Diagnosing Switch Problems
Port Monitoring
An essential tool of the network engineer is a network packet capture device. A packet capture device is
usually a PC-based computer, such as the Sniffer®, that provides a means for understanding and measuring
data traffic of a network. Understanding data flow in a VLAN-based switch presents unique challenges,
primarily because traffic moves inside the switch, especially on dedicated devices.
The port monitoring feature allows you to examine packets to and from a specific Ethernet port. Port
monitoring has the following features:
• Software commands to enable and display captured port data.
• A file called [Link] is created in the /flash memory when you configure and enable a port
monitoring session.
• Data packets time stamped.
• Only the first 64 bytes of the traffic is captured in ‘brief’ mode. If the monitoring capture-type is set to
‘full’ the entire packet is captured.
• Link Aggregation ports can be monitored.
• If both mirroring and monitoring are enabled, then packets is either mirrored or monitored (i.e., sent to
CPU), whichever comes first. See “Mirroring on Multiple Ports” on page 35-15 for more information.
You can select to dump real-time packets to a file. Once a file is captured, you can FTP it to a Sniffer or
PC for viewing.
page 35-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Port Monitoring
In addition, you can also specify optional parameters shown in the table below. These parameters must be
entered after the port number.
keywords
file no file size
no overwrite inport outport
bidirectional timeout enable
disable capture-type full
brief
For example:
-> port-monitoring 6 source 2/1/3 enable
These keywords can be used when creating the port monitoring session or afterwards. See the sections
below for more information on using these keywords.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-23
Port Monitoring Diagnosing Switch Problems
To resume a paused port monitoring session, use the port-monitoring command by entering port -
monitoring, followed by the port monitoring session ID and resume. For example, to resume port
monitoring session 6, enter:
-> port-monitoring 6 resume
Optionally, you can also configure the size of the file and/or you can configure the data file so that more-
recent packets does not overwrite older packets in the data file if the file size is exceeded.
To create a file and configure its size, use the port-monitoring source CLI command, file, the name of
the file, size, and the size of the file in 16K byte increments. For example:
-> port-monitoring 6 source 2/1/3 file /flash/user_port size 3
To select the the type of port monitoring information captured, use the port-monitoring source CLI
command by entering port-monitoring, followed by the user-specified session ID number, source, the
port to be monitored, a slash (/), the port number of the port, file, the name of the file, and the capture-
type keyword followed by the keywords, full or brief. For example:
-> port-monitoring 6 source 2/1/3 file /flash/user_port capture-type full
To prevent more recent packets from overwriting older packets in the data file, if the file size is exceeded,
use the port-monitoring source CLI command, file, the name of the file, and overwrite off. For example:
-> port-monitoring 6 source 2/1/3 file user_port overwrite off
To allow more recent packets from overwriting older packets in the data file if the file size is exceeded
(the default), use the port-monitoring source CLI command, file, the name of the file, and overwrite on.
page 35-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Port Monitoring
For example:
-> port-monitoring 6 source 2/1/3 file /flash/user_port overwrite on
Note. The size and no overwrite options can be entered on the same command line.
For example, use the show port-monitoring file command to display port monitoring data:
-> show port-monitoring file
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide. The show port-monitoring command displays only 170 packets from the
port monitor file.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-25
sFlow Diagnosing Switch Problems
sFlow
sFlow is a network monitoring technology that gives visibility in to the activity of the network, by
providing network usage information. It provides the data required to effectively control and manage the
network usage. sFlow is a sampling technology that meets the requirements for a network traffic
monitoring solution.
sFlow is an industry standard with many vendors delivering products with this support. Some of the
applications of the sFlow data include:
• Detecting, diagnosing, and fixing network problems
• Capacity planning
sFlow is a sampling technology embedded within switches/routers. It provides the ability to monitor the
traffic flows. It requires a sFlow agent software process running as part of the switch software and a sFlow
collector which receives and analyses the monitored data. The sFlow collector makes use of SNMP to
communicate with a sFlow agent in order to configure sFlow monitoring on the device (switch).
sFlow agent running on the switch/router, combines interface counters and traffic flow (packet) samples
preferably on all the interfaces into sFlow datagrams that are sent across the network to an sFlow collector.
Packet sampling on the switch/router is typically performed by the switching/routing ASICs, providing
wire-speed performance. In this case, sFlow agent does very little processing, by packaging data into
sFlow datagrams that are immediately sent on network. This minimizes the memory and CPU utilization
by sFlow agent.
sFlow Manager
The sFlow manager is the controller for all the modules. It initializes all other modules. It interfaces with
the Ethernet driver to get the counter samples periodically and reads sampled packets. The counter
samples are given to the poller and sampled packets are given to the sampler to format a UDP packet.
Each sFlow manager instance has multiples of receiver, sampler, and poller instances. Each user
programmed port has an individual sampler and poller. The sampler and poller could be potentially
pointing to multiple receivers if the user has configured multiple destination hosts.
Receiver
The receiver module has the details about the destination hosts where the sFlow datagrams are sent out. If
there are multiple destinations then each destination has an instance of the receiver. All these receivers are
attached to the sFlow manager instance and to an associated sample/poller.
page 35-26 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems sFlow
Sampler
The sampler is the module which gathers samples and fills up the sampler part of the UDP datagram.
Poller
The poller is the module which gets counter samples from Ethernet driver and fills up the counter part of
the UDP datagram.
In addition, you can also specify optional parameters shown in the table below. These parameters can be
entered after the IP address.
keywords
timeout packet-size
forever version
udp-port
For example, to configure sFlow receiver session 6 on switch [Link] and to specify the packet-size
and timeout value, enter:
-> sflow receiver 6 name sflowtrend address [Link] packet-size 1400
timeout 600
To configure a sFlow sampler session, use the sflow sampler command by entering sflow sampler,
followed by the instance ID number, the port to be monitored, a slash (/), and the port number and
receiver, the receiver_index.
For example, to configure sampler session 1 on port 2/3, enter:
-> sflow sampler 1 port 2/3 receiver 6
In addition, you can also specify optional parameters shown in the table below. These parameters can be
entered after the receiver index.
keywords
rate
sample-hdr-size
For example:
-> sflow sampler 1 port 2/1/3 receiver 6 rate 512 sample-hdr-size 128
To configure a sFlow poller session, use the sflow poller command. For example:
-> sflow poller 3 port 1/1/1 receiver 6
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-27
sFlow Diagnosing Switch Problems
In addition, you can also specify the optional interval parameter after the receiver index value. For
example:
-> sflow poller 3 port 1/1/1 receiver 6 interval 5
In this example, “ipVlan100” is the name of the IP interface that will serve as the IP address for the sFlow
agent.
Receiver 1
Name = Golden
Address = IP_V4 [Link]
UDP Port = 6343
Timeout = 65535
Packet Size= 1400
DatagramVer= 5
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
page 35-28 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems sFlow
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 8 CLI Reference Guide.
To delete a sFlow sampler session, use the no form of the sflow sampler command. For example:
-> no sflow sampler 1 port 2/1/3
To delete a sFlow poller session, use the no form of the sflow poller command. For example:
-> no sflow poller 3 port 1/1/1
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-29
Remote Monitoring (RMON) Diagnosing Switch Problems
C. Management frames from the NMS Workstation are sent to the mirrored port....
NMS Workstation
RMON Probe
OmniSwitch
page 35-30 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Remote Monitoring (RMON)
RMON probes can be enabled or disabled through CLI commands. Configuration of Alarm threshold
values for RMON traps is a function reserved for RMON-monitoring NMS stations.
This feature supports basic RMON 4 group implementation in compliance with RFC 2819, including the
Ethernet Statistics, History (Control & Statistics), Alarms and Events groups (described below).
Note. RMON 10 group and RMON2 are not implemented in the current release. An external RMON probe
that includes RMON 10 group and RMON2 be used where full RMON probe functionality is required.
Ethernet Statistics
Ethernet statistics probes are created whenever new ports are inserted and activated in the chassis. When a
port is removed from the chassis or deactivated, the Ethernet statistics group entry associated with the
physical port is invalidated and the probe is deleted.
The Ethernet statistics group includes port utilization and error statistics measured by the RMON probe
for each monitored Ethernet interface on the switch. Examples of these statistics include CRC (Cyclic
Redundancy Check)/alignment, undersized/oversized packets, fragments, broadcast/multicast/unicast, and
bandwidth utilization statistics.
Alarm
The Alarm group collects periodic statistical samples from variables in the probe and compares them to
previously configured thresholds. If a sample crosses a previously configured threshold value, an Event is
generated. Examples include Absolute or Relative Values, Rising or Falling Thresholds on the Utilization
Frame Count and CRC Errors.
Event
The Event group controls generation and notification of events from the switch to NMS stations. For
example, customized reports based on the type of Alarm can be generated, printed and/or logged.
Note. The following RMON groups are not implemented: Host, HostTopN, Matrix, Filter, and Packet
Capture.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-31
Remote Monitoring (RMON) Diagnosing Switch Problems
To enable or disable an entire group of RMON probes of a particular flavor type (such as Ethernet
Statistics, History, or Alarm), enter the command without specifying an entry-number, as shown in the
following examples.
The following command disables all currently defined (disabled) RMON Ethernet Statistics probes:
-> rmon probes stats disable
The following command enables all currently defined (disabled) RMON History probes:
-> rmon probes history enable
The following command enables all currently defined (disabled) RMON Alarm probes:
-> rmon probes alarm enable
Note. Network activity on subnetworks attached to an RMON probe can be monitored by Network Man-
agement Software (NMS) applications.
page 35-32 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Remote Monitoring (RMON)
A display showing all current statistics RMON probes must appear, as shown in the following example:
Entry Chas/Slot/Port Flavor Status Duration System Resources
-------+-----------+-----------+----------+---------------+---------------------
4001 4/1/1 Ethernet Active [Link] 275 bytes
4008 4/1/8 Ethernet Active [Link] 275 bytes
4005 4/1/5 Ethernet Active [Link] 275 bytes
This table entry displays probe statistics for all probes on the switch. The probes are active, utilize 275
bytes of memory, and 25 minutes have elapsed since the last change in status occurred.
To show a list of the history probes, enter:
-> show rmon probes history
A display showing all current history RMON probes must appear, as shown in the following example:
Entry Chas/Slot/Port Flavor Status Duration System Resources
-------+--------+---------+-----------+----------+------+----------
1 1/1/1 History Active [Link] 5464 bytes
30562 1/1/35 History Active [Link] 312236 bytes
30817 1/1/47 History Active [Link] 5200236 bytes
The table entry displays statistics for RMON History probes on the switch.
To show a list of the alarm probes, enter:
-> show rmon probes alarm
A display showing all current alarm RMON probes must appear, as shown in the following example:
Entry Chas/Slot/Port Flavor Status Duration System Resources
-------+-----------+-----------+----------+---------------+--------------------
31927 1/1/35 Alarm Active [Link] 608 bytes
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-33
Remote Monitoring (RMON) Diagnosing Switch Problems
A display showing statistics for the specified RMON probe appears, as shown in the following sections.
page 35-34 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Remote Monitoring (RMON)
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-35
Remote Monitoring (RMON) Diagnosing Switch Problems
A display showing all logged RMON Events must appear, as shown in the following example:
Entry Time Description
---------+----------------+-----------------------------------------------------
1 [Link] etherStatsPkts.4008: [Falling trap] “Falling Event”
2 [Link] etherStatsCollisions.2008: “Rising Event”
3 [Link] etherStatsCollisions.2008: “Rising Event”
The display shown above identifies the Entry number of the specified Event, along with the elapsed time
since the last change in status (measured in hours/minutes/seconds) and a description of the Alarm
condition detected by the probe for all RMON Logged Events. For example, Entry number 3 is linked to
etherStatsCollisions.2008: [Rising trap] “Rising Event,” an Alarm condition detected by the RMON probe
in which a trap was generated based on a Rising Threshold Alarm, with an elapsed time of 39 minutes
since the last change in status.
A display showing the specific logged RMON Event must appear, as shown in the following example:
Entry Time Description
---------+----------------+-----------------------------------------------------
3 [Link] etherStatsCollisions.2008: “Rising Event”
The display shown above identifies the Entry number of the specified Event, along with the elapsed time
since the last change in status (measured in hours/minutes/seconds) and a description of the Alarm
condition detected by the probe for the specific RMON Logged Event. For example, Entry number 3 is
linked to etherStatsCollisions.2008: [Rising trap] “Rising Event,” an Alarm condition detected by the
RMON probe in which a trap was generated based on a Rising Threshold Alarm, with an elapsed time of
39 minutes since the last change in status.
page 35-36 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Monitoring Switch Health
NMS Workstation
OmniSwitch
• Threshold level
Additionally, Health Monitoring provides the capacity to specify thresholds for the resource utilization
levels it monitors and generates traps based on the specified threshold criteria.
The following sections include a discussion of CLI commands that can be used to configure resource
parameters and monitor or reset statistics for switch resources. These commands include:
• health threshold—Configures threshold limits for input traffic (RX), output/input traffic (TX/RX),
memory usage, CPU usage, and chassis temperature. See page 35-38 for more information.
• show health configuration—Displays current health threshold settings. See page 35-39 for details.
• health interval—Configures sampling interval between health statistics checks. See page 35-39 for
more information..
• show health —Displays health statistics for the switch, as percentages of total resource capacity. See
page 35-40 for more information.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-37
Monitoring Switch Health Diagnosing Switch Problems
Note. When a resource falls back below the configured threshold, an addition trap is sent to the user. This
indicates that the resource is no longer operating beyond its configured threshold limit.
The health threshold command is used to configure threshold limits for input traffic (RX), output/input
traffic (TX/RX), memory usage and CPU usage.
To configure thresholds for these resources, enter the health threshold command, followed by the input
traffic, output/input traffic, memory usage, or CPU usage where:
For example, to specify a CPU usage threshold of 85 percent, enter the following command:
-> health threshold cpu 85
For more information on the health threshold command, refer to Chapter 44, “Health Monitoring
Commands,” in the OmniSwitch AOS Release 8 CLI Reference Guide.
Note. When you specify a new value for a threshold limit, the value is automatically applied across all lev-
els of the switch (switch, module, and port). You cannot select differing values for each level.
page 35-38 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Diagnosing Switch Problems Monitoring Switch Health
Note. For detailed definitions of each of the threshold types, refer to “Configuring Resource Thresholds”
on page 35-38, as well as Chapter 44, “Health Monitoring Commands,” in the OmniSwitch AOS Release 8
CLI Reference Guide.
Valid values for the seconds parameter include 1, 2, 3, 4, 5, 6, 10, 12, 15, 20, or 30.
Rx Threshold = 80,
TxRx Threshold = 80,
Memory Threshold = 80,
CPU Threshold = 80,
Sampling Interval (Secs) = 10
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 35-39
Monitoring Switch Health Diagnosing Switch Problems
page 35-40 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
36 Configuring VLAN
Stacking
VLAN Stacking provides a mechanism to tunnel multiple customer VLANs (CVLAN) through a service
provider network using one or more service provider VLANs (SVLAN) by way of 802.1Q double-tagging
or VLAN Translation. This feature enables service providers to offer their customers Transparent LAN
Services (TLS). This service is multipoint in nature so as to support multiple customer sites or networks
distributed over the edges of a service provider network.
This implementation of VLAN Stacking offers the following functionality:
• Ingress bandwidth sharing across User Network Interface (UNI) ports.
• Ingress bandwidth rate limiting on a per UNI port, per CVLAN, or CVLAN per UNI port basis.
• CVLAN (inner) tag 802.1p-bit mapping to SVLAN (outer) tag 802.1p bit.
• CVLAN (inner) tag DSCP mapping to SVLAN (outer) tag 802.1p bit.
In This Chapter
This chapter describes the basic components of VLAN Stacking and how to define a service-based or port-
based configuration through the Command Line Interface (CLI). CLI commands are used in the
configuration examples; for more details about the syntax of commands, see the OmniSwitch AOS Release
8 CLI Reference Guide.
This chapter provides an overview of VLAN Stacking and includes the following topics:
• “VLAN Stacking Specifications” on page 36-2.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 36-1
VLAN Stacking Specifications Configuring VLAN Stacking
Tunneled Frames:
STP, MVRP,
Discarded Frames:
802.1ab, VTP VLAN, Uplink
Fast, PVST, PAGP, DTP, CDP
page 36-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLAN Stacking VLAN Stacking Overview
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 36-3
VLAN Stacking Overview Configuring VLAN Stacking
The following illustration shows how VLAN Stacking uses the above components to tunnel customer
traffic through a service provider network:
Provider
Customer A
LAN
Site 2
Provider Edge 2
Customer A
Site 1
Transit Bridge
Customer B
EMAN Site 2
Provider Edge 1
Provider Edge 3
Customer B
Site 1
NNI Port
UNI Port
NNI Port
page 36-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLAN Stacking VLAN Stacking Overview
2 Double Tagging inserts the SVLAN tag in the packet. The packet is sent out the network port with
double tags (SVLAN+CVLAN).
MAC DA MAC SA SVLAN Tag CVLAN Tag ETYPE Payload
(6) (6) (4) (4) 0x0800
3 VLAN Translation replaces the CVLAN Tag with SVLAN Tag. The packet is sent out the network
port with a single tag (SVLAN).
MAC DA MAC SA SVLAN Tag ETYPE Payload
(6) (6) (4) 0x0800
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 36-5
VLAN Stacking Overview Configuring VLAN Stacking
page 36-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLAN Stacking Interaction With Other Features
Link Aggregation
• Both static and dynamic link aggregation are supported with VLAN Stacking.
• Note that a link aggregate must consist of all UNI or all NNI ports. VLAN Stacking functionality is not
supported on link aggregates that consist of a mixture of VLAN Stacking ports and conventional
switch ports.
• If there is a conflict between VLAN Stacking Service attributes and the QoS configuration, the VLAN
Stacking attributes are given precedence over QoS policies.
• QoS applies the inner source vlan and inner 802.1p policy conditions to the CVLAN (inner) tag of
VLAN Stacking packets.
• QoS applies the source vlan and 802.1p policy conditions to the SVLAN (outer) tag of VLAN
Stacking packets.
Spanning Tree
• Spanning Tree is automatically enabled for VLAN Stacking SVLANs. The Spanning Tree status for an
SVLAN is configurable through VLAN Stacking commands. Note that the SVLAN Spanning Tree
status applies only to the service provider network topology.
• BPDU frames are tunneled by default. See “Configuring a UNI Profile” on page 36-19 for information
about configuring VLAN Stacking to tunnel or discard Spanning Tree BPDU.
• See “Configuring VLAN Stacking Network Ports” on page 36-13 for information about configuring
VLAN Stacking interoperability with legacy Spanning Tree BPDU systems.
• A back door link configuration is not supported. This occurs when there is a link between two
customer sites that are both connected to a VLAN Stacking provider edge switch.
• A dual home configuration is not supported. This type of configuration consists of a single customer
site connected to two different VLAN Stacking switches or two switches at a customer site connect to
two different VLAN Stacking switches.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 36-7
Quick Steps for Configuring VLAN Stacking Configuring VLAN Stacking
1 Create a VLAN Stacking VLAN (SVLAN) 1001 using the ethernet-service svlan command.
2 Create a VLAN Stacking service and associate the service with SVLAN 1001 using the ethernet-
service service-name command.
-> ethernet-service service-name CustomerA svlan 1001
3 Configure port 1/1/1 as a VLAN Stacking Network Network Interface (NNI) port and associate the port
with SVLAN 1001 using the ethernet-service svlan nni command.
-> ethernet-service svlan 1001 nni port 1/1/1
4 Create a VLAN Stacking Service Access Point (SAP) and associate it to the “CustomerA” service
using the ethernet-service sap command.
-> ethernet-service sap 10 service-name CustomerA
5 Configure port 1/1/49 as a VLAN Stacking User Network Interface (UNI) port and associate the port
with SAP ID 10 using the ethernet-service sap uni command.
-> ethernet-service sap 10 uni port 1/1/49
6 Associate traffic from customer VLANs (CVLAN) 10 and 20 with SAP 10 using the ethernet-service
sap cvlan command.
-> ethernet-service sap 10 cvlan 10
-> ethernet-service sap 10 cvlan 20
7 (Optional) Create a SAP profile that applies an ingress bandwidth of 10, translates the CVLAN tag, and
maps the CVLAN priority to the SVLAN priority using the ethernet-service sap-profile command.
-> ethernet-service sap-profile sap-video1 ingress-bandwidth 10 cvlan translate
priority map-inner-to-outer-p
8 (Optional) Associate the “sap-video1” profile with SAP 10 using the ethernet-service sap sap-profile
command.
-> ethernet-service sap 10 sap-profile sap-video1
9 (Optional) Create a UNI port profile to block STP control frames received on UNI ports using the
ethernet-service uni-profile command.
-> ethernet-service uni-profile uni_1 l2-protocol stp discard
10 (Optional) Associate the “uni_1” profile with port 1/1/49 using the ethernet-service uni uni-profile
command.
-> ethernet-service uni port 1/1/49 uni-profile uni_1
page 36-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLAN Stacking Quick Steps for Configuring VLAN Stacking
Note. Verify the VLAN Stacking Ethernet service configuration using the show ethernet-service
command:
-> show ethernet-service
See the OmniSwitch AOS Release 8 CLI Reference Guide for information about the fields in this display.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 36-9
Configuring VLAN Stacking Services Configuring VLAN Stacking
page 36-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLAN Stacking Configuring VLAN Stacking Services
Configuring SVLANs
SVLANs carry customer traffic and are not configurable or modifiable using standard VLAN commands.
The ethernet-service svlan command is used to create an SVLAN. This command provides parameters to
specify the type of SVLAN: svlan for customer [Link] example, the following command creates a
customer SVLAN:
-> ethernet-service svlan 300
Similar to standard VLANs, the administrative and Spanning Tree status for the SVLAN is enabled by
default and the SVLAN ID is used as the default name. The ethernet-service svlan command also
provides parameters for changing any of these status values and the name. These are the same parameters
that are used to change these values for standard VLANs. For example, the following commands change
the administrative and Spanning Tree status and name for SVLAN 300:
-> ethernet-service svlan 300 disable
-> ethernet-service svlan 300 stp disable
-> ethernet-service svlan 300 name “Customer A”
To delete an SVLAN from the switch configuration, use the no form of the ethernet-service svlan
command. For example, to delete SVLAN 300 enter:
-> no ethernet-service svlan 300
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 36-11
Configuring VLAN Stacking Services Configuring VLAN Stacking
Note that when an SVLAN is deleted, all port associations with the SVLAN are also removed.
Use the show ethernet-service vlan command to display a list of VLAN Stacking VLANs configured for
the switch.
The SVLAN ID specified with this command must already exist in the switch configuration; entering a
standard VLAN ID is not allowed. See “Configuring SVLANs” on page 36-11 for more information.
Once the VLAN Stacking service is created, the name is used to configure and display all components
associated with that service. The service name provides a single point of reference for a specific VLAN
Stacking configuration. For example, the following show ethernet-service command display shows how
the service name identifies a VLAN Stacking service and components related to that service:
-> show ethernet-service
page 36-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLAN Stacking Configuring VLAN Stacking Services
To delete a service from the switch configuration, use the no form of the ethernet-service service-name
command. For example, the following command deletes the “Video-Service” service:
-> no ethernet-service service-name Video-Service
Note that when a VLAN Stacking service is deleted, the SVLAN ID association with the service is
automatically deleted. However, if one or more VLAN Stacking service access point (SAP) are associated
with the service, remove the SAPs first before attempting to delete the service.
When a port is converted to a NNI port, the default VLAN for the port is changed to a VLAN that is
reserved for the VLAN Stacking application. At this point, the port is no longer configurable using
standard VLAN port commands.
The ethernet-service nni command is also used to optionally specify the following parameter values that
are applied to traffic proessed by the NNI port:
• tpid—Configures the vendor TPID value for the SVLAN tag. This value is set to the default and is
applied to traffic egressing on the NNI port and is compared to the SVLAN tag of packets ingressing
on the NNI port. If the configured NNI TPID value and the ingress packet value match, then the packet
is considered an SVLAN tagged packet. If these values do not match, then the packet is classified as a
non-SVLAN tagged packet.
• stp legacy-bpdu—Specifies whether or not legacy Spanning Tree BPDU are tunneled on the NNI port.
The following command example configures the vendor TPID for NNI port 2/1/1 to 0x88a8 and enables
support for Spanning Tree legacy BPDU:
-> ethernet-service nni port 2/1/1 tpid 88a8 stp legacy-bpdu enable
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 36-13
Configuring VLAN Stacking Services Configuring VLAN Stacking
• Enable legacy BPDU support only on VLAN Stacking network ports that are connected to legacy
BPDU switches. Enabling legacy BPDU between AOS switches may cause flooding or an unstable
network.
• If legacy BPDU is enabled on a network port while at same time BPDU flooding is enabled on user
ports, make sure that tagged customer BPDUs are not interpreted by intermediate switches in the
provider network.
• If the peer switch connected to the VLAN Stacking network port supports the Provider MAC address
(i.e., STP, 802.1ad/D6.0 MAC), then enabling legacy BPDU support is not required on the network
port. Refer to the following table to determine the type of STP MAC used:
STP
Customer MAC {0x01, 0x80, 0xc2, 0x00, 0x00, 0x00}
Provider MAC address (802.1ad/D6.0) {0x01, 0x80, 0xc2, 0x00, 0x00, 0x08}
Provider MAC address (Legacy MAC) {0x01, 0x80, 0xc2, 0x00, 0x00, 0x00}
Provider MAC address {0x01, 0x80, 0xc2, 0x00, 0x00, 0x0D}
• STP legacy BPDU are supported only when the flat Spanning Tree mode is active on the switch.
• NNI ports can be 802.1q tagged with normal VLANs. The TPID of the packets tagged with the normal
VLAN is 0x8100 (regardless of the TPID of the NNI port). This allows the NNI port to carry both
802.1q tagged traffic and SVLAN tagged traffic.
When a port is associated with an SVLAN using this command, the port is automatically defined as an
NNI to carry traffic for the specified SVLAN.
To delete an NNI port association with an SVLAN, use the no form of the ethernet-service svlan nni
command. For example, the following command deletes the NNI 2/1/1 and SVLAN 300 association:
-> no ethernet-service svlan 300 nni port 2/1/1
Use the show ethernet-service nni command to display the NNI port configuration for the switch.
• Customer VLANs (CVLANs). See “Configuring the Type of Customer Traffic to Tunnel” on
page 36-16.
page 36-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLAN Stacking Configuring VLAN Stacking Services
• SAP profile. Each SAP is associated with a single profile. This profile contains attributes that are used
to define traffic engineering parameters applied to traffic ingressing on UNI ports that are associated
with the SAP. See “Configuring a Service Access Point Profile” on page 36-18.
The above components are all configured separately using different VLAN Stacking commands. The
ethernet-service sap command is for creating a SAP ID and associating the ID with a VLAN Stacking
service. For example, the following command creates SAP 20 and associates it with Video-Service:
-> ethernet-service sap 20 service-name Video-Service
To delete a VLAN Stacking SAP from the switch configuration, use the no form of the ethernet-service
sap command. For example, the following command deletes SAP 20:
-> no ethernet-service sap 20
Note that when the SAP is deleted, all UNI port, CVLAN, and profile associations are automatically
dropped. It is not necessary to remove these items before deleting the SAP.
A VLAN Stacking SAP basically identifies the location where customer traffic enters the provider
network edge, the type of customer traffic to service, parameters to apply to the traffic, and the service that
will process the traffic for tunneling through the provider network.
Consider the following when configuring a VLAN Stacking SAP:
• A SAP is assigned to only one service, but a service can have multiple SAPs. So, a single service can
process and tunnel traffic for multiple UNI ports and customers.
• Associating multiple UNI ports to one SAP is allowed.
• A default SAP profile is associated with the SAP at the time the SAP is created. This profile contains
the following default attribute values:
The above default attribute values are applied to customer traffic associated with the SAP. Only one
profile is assigned to each SAP; however, it is possible to use the same profile for multiple SAPs.
• To use different profile attribute values, create a new profile and associate it with the SAP. See
“Configuring a Service Access Point Profile” on page 36-18. Each time a profile is assigned to a SAP,
the existing profile is overwritten with the new one.
Use the show ethernet-service sap command to display the SAPs configured for the switch. Use the
show ethernet-service command to display a list of VLAN Stacking services and the SAPs associated
with each service.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 36-15
Configuring VLAN Stacking Services Configuring VLAN Stacking
A UNI port is a customer-facing port on which traffic enters the VLAN Stacking service. When the port is
associated with a service access point, the port is automatically defined as a UNI port and the default
VLAN for the port is changed to a VLAN that is reserved for the VLAN Stacking application.
To delete a UNI port association with a VLAN Stacking SAP, use the no form of the ethernet-service sap
uni command. For example, the following command deletes the association between UNI 1/1/1 and SAP
20:
-> no ethernet-service sap 20 uni port 1/1/1
Note that when the last SAP association for the port is deleted, the port automatically reverts back to a
conventional switch port and is no longer VLAN Stacking capable.
Consider the following when configuring VLAN Stacking UNI ports:
• All customer traffic received on the UNI port is dropped until customer VLANs (CVLAN) are
associated with the port. See “Configuring the Type of Customer Traffic to Tunnel” on page 36-16.
• A default UNI profile is assigned to the port at the time the port is configured. This profile defines how
control frames received on the UNI ports are processed. While Spanning Tree frames are automatically
tunneled, all other protocol control frames are dropped.
• To use different profile attribute values, create a new profile and associate it with the UNI port. See
“Configuring a UNI Profile” on page 36-19. Each time a profile is assigned to a UNI, the existing
profile is overwritten with the new one.
• Only fixed ports can be converted to UNI ports.
Use the show ethernet-service uni command to display a list of UNI ports and the profile association for
each port.
In this example, customer frames tagged with VLAN ID 500 that are received on SAP 20 UNI ports are
processed by the service to which SAP 20 is associated. This includes applying profile attributes
associated with SAP 20 to the qualifying customer frames. If no other customer traffic is specified for SAP
20, all other frames received on SAP 20 UNI ports are dropped.
In addition to specifying one or more CVLANs, it is also possible to specify the following parameters
when using the ethernet-service sap cvlan command:
page 36-16 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLAN Stacking Configuring VLAN Stacking Services
• all—Specifies that all untagged and tagged frames are accepted on the UNI ports. This mapping
denotes that all customer frames that do not map to any other SAP, will be mapped into this service.
• untagged—Specifies that only untagged frames are accepted on the UNI ports. This mapping denotes
that only untagged frames will be mapped into this service.
For example, the following command specifies that all untagged frames are accepted on UNI ports
associated with SAP 20:
-> ethernet-service sap 20 cvlan untagged
Use the no form of the ethernet-service sap cvlan command to delete an association between customer
traffic and a VLAN Stacking SAP. For example, the following command deletes the association between
CVLAN 500 and SAP 20:
-> no ethernet-service sap 20 cvlan 500
Note that when the last customer traffic association is deleted from a SAP, the SAP itself is not
automatically deleted. No traffic is accepted or processed by a SAP in this state, but the SAP ID is still
known to the switch.
Consider the following when configuring the type of customer traffic to tunnel:
• If no customer traffic is associated with a VLAN Stacking SAP, then the SAP does not process any
traffic for the service.
• Only one all or untagged designation is allowed for any given SAP; specifying both for the same SAP
is not allowed.
• Only one untagged designation is allowed per UNI port, even if the UNI port is associated with
multiple SAPs.
• Only one all designation is allowed per UNI port, even if the UNI port is associated with multiple
SAPs.
Use the show ethernet-service command to display the type of customer traffic associated with each SAP
configured for the switch
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 36-17
Configuring VLAN Stacking Services Configuring VLAN Stacking
A default profile, named “default-sap-profile”, is automatically assigned to the SAP at the time the SAP is
created (see “Configuring a VLAN Stacking Service Access Point” on page 36-14). It is only necessary to
create a new profile to specify different attribute values if the default profile values (see above) are not
sufficient.
The following command provides an example of creating a new SAP profile to specify a different method
for mapping the SVLAN priority value:
-> ethernet-service sap-profile map_pbit priority map-inner-to-outer-p
In this example the map_pbit profile specifies priority mapping of the CVLAN inner tag 802.1p value to
the SVLAN outer tag value. The other attributes in this profile are set to their default values.
To delete a SAP profile, use the no form of the ethernet-service sap-profile command. For example, the
following command deletes the map_pbit profile:
-> no ethernet-service sap-profile map_pbit
page 36-18 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLAN Stacking Configuring VLAN Stacking Services
• A CVLAN-UNI combination associated with a SAP having egress bandwidth configuration is unique
and it cannot be configured on any other SAP with egress bandwidth configuration.
Use the show ethernet-service sap-profile command to view a list of profiles that are already configured
for the switch. This command also displays the attribute values for each profile.
To change the profile associated with the SAP back to the default profile, specify “default-sap-profile” for
the profile name. For example:
-> ethernet-service sap 20 sap-profile default-sap-profile
Use the show ethernet-service sap command to display the SAP configuration, which includes the profile
association for each SAP.
A default UNI profile, named “default-uni-profile”, already exists in the switch configuration and is
automatically associated with a UNI port. Use the show ethernet-service uni-profile command to display
the default profile settings. For example:
-> show ethernet-service uni-profile default-uni-profile
Profile Name Stp 802.1x 802.3ad 802.1ab MVRP AMAP
-------------------+--------+--------+---------+---------+--------+---------
default-uni-profile tunnel tunnel tunnel tunnel tunnel tunnel
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 36-19
Configuring VLAN Stacking Services Configuring VLAN Stacking
To delete a UNI profile, use the no form of the ethernet-service uni-profile command. For example, the
following command deletes the uni_1 profile:
-> no ethernet-service uni-profile uni_1
The show ethernet-service uni-profile command is also used to view a list of all profiles that are already
configured for the switch.
To change the profile associated with the UNI port back to the default profile, specify “default-uni-profile”
for the profile name. For example:
-> ethernet-service uni port 1/1/1 uni-profile default-uni-profile
Use the show ethernet-service uni command to display the profile associations for each UNI port.
page 36-20 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLAN Stacking VLAN Stacking Application Example
Customer A Customer A
Site 1 Site 2
MAN CLOUD
PE1 PE2
NNI 3/1/1 NNI 3/1/1
SVLAN 200
UNI 2/1/1 UNI 2/1/1
CVLAN 10 CVLAN 10
Customer B Customer B
Site 1 Site 2
VLAN Stacking Application
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 36-21
VLAN Stacking Application Example Configuring VLAN Stacking
2 Configure two VLAN Stacking services on PE1 and PE2 using the ethernet-service service-name
command. Configure one service with the name “CustomerA” and the other service with the name
“Customer B”. Assign “CustomerA” service to SVLAN 100 and “CustomerB” service to SVLAN 200.
-> ethernet-service service-name CustomerA svlan 100
-> ethernet-service service-name CustomerB svlan 200
3 Configure port 3/1/1 on PE1 and PE2 as VLAN Stacking NNI ports using the ethernet-service svlan
nni command. Associate each port with both SVLAN 100 and SVLAN 200.
-> ethernet-service svlan 100 nni port 3/1/1
-> ethernet-service svlan 200 nni port 3/1/1
4 Configure a VLAN Stacking SAP with ID 20 on PE1 and PE2 using the ethernet-service sap. Associ-
ate the SAP with the “CustomerA” service.
-> ethernet-service sap 20 service-name CustomerA
5 Configure a VLAN Stacking SAP with ID 30 on PE1 and PE2 using the ethernet-service sap
command. Associate the SAP with the “CustomerB” service.
-> ethernet-service sap 30 service-name CustomerB
6 Configure port 1/1/1 on PE1 and PE2 as a VLAN Stacking UNI port and associate 1/1/1 with SAP 20
using the ethernet-service sap uni command.
-> ethernet-service sap 20 uni port 1/1/1
7 Configure port 2/1/1 on PE1 and PE2 as a VLAN Stacking UNI port and associate 2/1/1 with SAP 30
using the ethernet-service sap uni command.
-> ethernet-service sap 30 uni port 2/1/1
8 Configure SAP 20 on PE1 and PE2 to accept all customer traffic using the ethernet-service sap cvlan
command.
-> ethernet-service sap 20 cvlan all
9 Configure SAP 30 on PE1 and PE2 to accept only customer traffic that is tagged with CVLAN 10
using the ethernet-service sap cvlan command.
-> ethernet-service sap 30 cvlan 10
10 Create a SAP profile on PE1 and PE2 that will map the inner CVLAN tag 802.1p value to the outer
SVLAN tag using the ethernet-service sap-profile command.
-> ethernet-service sap-profile map_pbit priority map-inner-to-outer-p
page 36-22 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring VLAN Stacking VLAN Stacking Application Example
11 Associate the “map_pbit” profile to SAP 30 using the ethernet-service sap sap-profile command.
This profile only applies to Customer B traffic, so it is not necessary to associate the profile with SAP 20.
-> ethernet-service sap 30 sap-profile map_pbit
12 Verify the VLAN Stacking service configuration using the show ethernet-service command.
The following is an example of what the sample configuration commands look like entered sequentially
on the command line of the provider edge switches:
-> ethernet-service svlan 100
-> ethernet-service service-name CustomerA svlan 100
-> ethernet-service svlan 100 nni port 3/1/1
-> ethernet-service sap 20 service-name CustomerA
-> ethernet-service sap 20 uni 1/1/1
-> ethernet-service sap 20 cvlan all
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 36-23
Verifying the VLAN Stacking Configuration Configuring VLAN Stacking
show ethernet-service vlan Displays the SVLAN configuration for the switch.
show ethernet-service Displays the VLAN Stacking service configuration for the switch.
show ethernet-service sap Displays the VLAN Stacking service access point (SAP)
configuration for the switch.
show ethernet-service nni Displays configuration information for NNI port parameters.
show ethernet-service uni Displays profile associations for UNI ports.
show ethernet-service uni-profile Displays UNI profile attribute values.
show ethernet-service sap-profile Displays SAP profile attribute values.
For more information about the resulting displays from these commands, see the OmniSwitch AOS Release
8 CLI Reference Guide. An example of the output for the show ethernet-service command is also given in
“Quick Steps for Configuring VLAN Stacking” on page 36-8.
page 36-24 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
37 Using Switch Logging
Switch logging is an event logging utility that is useful in maintaining and servicing the switch. Switch
logging uses a formatted string mechanism to either record or discard event data from switch applications.
The log records are copied to the output devices configured for the switch. Log records can be sent to a
text file and written into the flash file system. The log records can also be scrolled to the console of the
switch or to a remote IP address.
Switch logging information can be customized and configured through Command Line Interface (CLI)
commands, WebView, and SNMP. Log information can be helpful in resolving configuration or
authentication issues, as well as general switch errors.
This chapter describes the switch logging feature, how to configure it and display switch logging
information through the Command Line Interface (CLI). CLI commands are used in the configuration
examples. For more details about the syntax of commands, see the OmniSwitch AOS Release 8 CLI
Reference Guide.
In This Chapter
The following procedures are described:
• “Enabling Switch Logging” on page 37-5
Note. Switch logging commands are not intended for use with low-level hardware and software debugging.
It is strongly recommended that you contact an Alcatel-Lucent Customer Service representative for assis-
tance with debugging functions.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 37-1
Switch Logging Specifications Using Switch Logging
page 37-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Using Switch Logging Quick Steps for Configuring Switch Logging
-> swlog
2 Specify the ID of the application to be logged along with the logging severity level.
Here, the application ID specifies bridging and the severity is set to the “warning” level.
3 Specify the output device to which the switch logging information must be sent.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 37-3
Switch Logging Overview Using Switch Logging
Note. Although switch logging provides complementary functionality to switch debugging facilities, the
switch logging commands are not intended for use with low-level hardware and software debugging
functions.
page 37-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Using Switch Logging Switch Logging Commands Overview
Numeric
CLI Keyword Application ID
Equivalent
IDLE 255 APPID_IDLE
DIAG 0 APPID_DIAGNOSTICS
IPC-DIAG 1 APPID_IPC_DIAGNOSTICS
QDRIVER 2 APPID_QDRIVER
QDISPATCHER 3 APPID_QDISPATCHER
IPC-LINK 4 APPID_IPC_LINK
NI-SUPERVISION 5 APPID_NI_SUP_AND_PROBER
INTERFACE 6 APPID_ESM_DRIVER
802.1Q 7 APPID_802.1Q
VLAN 8 APPID_VLAN_MGR
GM 9 APPID_GROUPMOBILITY (RESERVED)
BRIDGE 10 APPID_SRCLEANING
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 37-5
Switch Logging Commands Overview Using Switch Logging
Numeric
CLI Keyword Application ID
Equivalent
STP 11 APPID_SPANNINGTREE
LINKAGG 12 APPID_LINKAGGREGATION
QOS 13 APPID_QOS
RSVP 14 APPID_RSVP
IP 15 APPID_IP
IPMS 17 APPID_IPMS
AMAP 18 APPID_XMAP
GMAP 19 APPID_GMAP
AAA 20 APPID_AAA
IPC-MON 21 APPID_IPC_MON
IP-HELPER 22 APPID_BOOTP_RELAY
PMM 23 APPID_MIRRORING_MONITORING
MODULE 24 APPID_L3HRE
SLB 25 APPID_SLB
EIPC 26 APPID_EIPC
CHASSIS 64 APPID_CHASSISUPER
PORT-MGR 65 APPID_PORT_MANAGER
CONFIG 66 APPID_CONFIGMANAGER
CLI 67 APPID_CLI
SNMP 68 APPID_SNMP_AGENT
WEB 69 APPID_WEBMGT
MIPGW 70 APPID_MIPGW
SESSION 71 APPID_SESSION_MANAGER
TRAP 72 APPID_TRAP_MANAGER
POLICY 73 APPID_POLICY_MANAGER
DRC 74 APPID_DRC
SYSTEM 75 APPID_SYSTEM_SERVICES
HEALTH 76 APPID_HEALTHMON
NAN-DRIVER 78 APPID_NAN_DRIVER
RMON 79 APPID_RMON
TELNET 80 APPID_TELNET
PSM 81 APPID_PSM
FTP 82 APPID_FTP
SMNI 83 APPID_SMNI
DISTRIB 84 APPID_DISTRIB
page 37-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Using Switch Logging Switch Logging Commands Overview
Numeric
CLI Keyword Application ID
Equivalent
EPILOGUE 85 APPID_EPILOGUE
LDAP 86 APPID_LDAP
NOSNMP 87 APPID_NOSNMP
SSL 88 APPID_SSL
DBGGW 89 APPID_DBGGW
LANPOWER 108 APPID_LANPOWER
The level keyword assigns the error-type severity level to the specified application IDs. Values range from
2 (highest severity) to 9 (lowest severity). The values are defined in the following table:
The following command makes the same assignment by using the severity level and application numbers.
-> swlog appid 75 level 3
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 37-7
Switch Logging Commands Overview Using Switch Logging
To disable the switch logging output to the console, enter the following command:
-> no swlog output console
To disable the switch logging output to flash memory, enter the following command:
-> no swlog output flash
page 37-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Using Switch Logging Switch Logging Commands Overview
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 37-9
Switch Logging Commands Overview Using Switch Logging
This command causes the switch to clear all the switch logging information and begin recording again. As
a result, the switch displays a shorter file when you execute the show log swlog command. You want to
use swlog clear when the switch logging display is too long due to some of the data being old or out of
date.
No confirmation message appears on the screen.
page 37-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Using Switch Logging Switch Logging Commands Overview
Note. Switch logging frequently records a very large volume of data. It can take several minutes for all the
switch logging information to scroll to the console screen.
------------------------+--------------+-------+--------------------------------
MON NOV 11 [Link] 2005 SYSTEM info Switch Logging files cleared by
command
MON NOV 11 [Link] 2005 WEB info The HTTP session login successfu
l!
MON NOV 11 [Link] 2005 WEB info The HTTP session login successfu
l!
MON NOV 11 [Link] 2005 TELNET info New telnet connection, Address,
[Link]
MON NOV 11 [Link] 2005 TELNET info Session 4, Created
MON NOV 11 [Link] 2005 WEB info The HTTP session user logout suc
cessful!
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 37-11
Switch Logging Commands Overview Using Switch Logging
page 37-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
38 Configuring Ethernet
OAM
The rise in the number of Ethernet service instances has resulted in service providers requiring a powerful
and robust set of management tools to maintain Ethernet service networks. Service provider networks are
large and intricate, often consisting of different operators that work together to provide the customers with
end-to-end services. The challenge for the service providers is to provide a highly available, convergent
network to the customer base. Ethernet OAM (Operations, Administration, and Maintenance) provides the
detection, resiliency, and monitoring capability for end-to-end service guarantee in an Ethernet network.
In This Chapter
This chapter describes the Ethernet OAM feature, how to configure it and display Ethernet OAM informa-
tion through the Command Line Interface (CLI). For more details about the syntax of commands, see the
OmniSwitch AOS Release 8 CLI Reference Guide.
The following information and procedures are included in this chapter:
• “Ethernet OAM Overview” on page 38-3.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 38-1
Ethernet OAM Specifications Configuring Ethernet OAM
page 38-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet OAM Ethernet OAM Overview
• Point-to-point MA: logical sub-MA component only between two MEPs MA.
• Maintenance Domain: One or more MAs under the same administrative control.
• Remote Fault Propagation (RFP): Propagates connectivity fault events into the interface attached to a
MEP.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 38-3
Ethernet OAM Overview Configuring Ethernet OAM
• The MEPs are configured on edge ports within the domain for each EVC. The MIPs are configured on
relevant ports within the domain itself (interior ports).
• The network administrator selects the relevant points within the network to determine where
maintenance points are needed. The maintenance point configuration defines the MD.
• MDs are assigned an unique level number (between 0 and 7) to help identify and differentiate the MD
within the domain hierarchy. For example, different organizations, such as operators (levels 0, 1, 2),
service providers (levels 3, 4), and customers (levels 5, 6, 7), are involved in a Metro Ethernet Service.
• Each organization can have its own Maintenance Domain, designated by the assigned level number to
specify the scope of management needed for that domain.
The following illustration shows an example of the CFM Maintenance Domain hierarchy:
Customer
Domain
Provider
Domain
Customer Customer
Network Network
page 38-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet OAM Ethernet OAM Overview
Fault Management
Service OAM Connectivity Fault Management consists of three types of messages that are used to help
network administrators detect, verify, and isolate when a problem occurs in the network:
• Continuity Check Messages (CCM)—These are multicast messages exchanged periodically by MEPs
to detect loss of service connectivity between MEPs. These messages are also used by MEPs and MIPs
to discover other MEPs within a domain.
• Linktrace Messages (LTM)—These messages are transmitted by a MEP to trace the path to a
destination maintenance point. The receiving maintenance point responds to LTMs with a linktrace
reply (LTR). This mechanism is similar to the UDP Trace Route function. The transmission of
linktrace messages is requested by an administrator.
• Loopback Messages (LBM)—These messages are transmitted by a MEP to a specified MIP or MEP
to determine whether or not the maintenance point is reachable. The receiving maintenance point
responds to LBMs with a loopback reply (LBR). This mechanism is not used to discover a path to the
destination; it is similar to the Ping function. The transmission of loopback messages is requested by an
administrator.
Performance Monitoring
The ITU-T Y.1731 Recommendation addresses the need to monitor performance to help enforce customer
service level agreements (SLAs). Frame delay (latency) and frame delay variation (jitter) are important
performance objectives, especially for those applications (such as voice) that cannot function with a high
level of latency or jitter.
This implementation of Service OAM supports Ethernet frame delay measurement (ETH-DM) and is
compliant with Y.1731. The ETH-DM feature allows for the configuration of on-demand OAM to
measure frame delay and frame delay variation between endpoints.
Frame delay measurement is performed between peer MEPs (measurements to MIPs are not done) within
the same MA. Although the OmniSwitch implementation of ETH-DM is compliant with ITU-T Y.1731,
delay measurement can be performed for both ITU-T Y.1731 and IEEE 802.1ag MEPs.
Any MEP can initiate or reply to an ETH-DM request, depending on the type of delay measurement
requested. There are two types of delay measurements supported: one-way and two-way.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 38-5
Ethernet OAM Overview Configuring Ethernet OAM
One-way ETH-DM
• A MEP sends one-way delay measurement (1DM)) frames to a peer MEP. The sending MEP inserts
the transmission time into the 1DM frame at the time the frame is sent.
• When a MEP receives a 1DM frame, the MEP calculates the one-way delay as the difference between
the time at which the frame was received and the transmission time indicated by the frame timestamp
(receive time minus transmission time).
• One-way delay measurement statistics are gathered and stored on the receiving MEP (the MEP that
receives a 1DM request).
• One-way ETH-DM requires clock synchronization between the sending and receiving MEPs. Using
NTP for clock synchronization is recommended.
Two-way ETH-DM
• A MEP sends delay measurement message (DMM) frames to a peer MEP to request a two-way ETH-
DM. The sending MEP inserts the transmission time into the DMM frame at the time the frame is sent.
• When a MEP receives a DMM frame, the MEP responds to the DMM with a delay message reply
(DMR) frame that contains the following timestamps:
– Timestamp copied from the DMM frame.
– Timestamp indicating when the DMM frame was received.
– Timestamp indicating the time at which the receiving MEP transmitted the DMR frame back to the
sending MEP.
• When a MEP receives a DMR frame, the MEP compares all the DMR timestamps with the time at
which the MEP received the DMR frame to calculate the two-way delay.
• The two-way delay is the difference between the time the originating MEP sent a DMM request and the
time at which the originating MEP received a DMR frame minus the time taken by the responding
MEP to process the DMM request.
• Two-way delay measurement statistics are gathered and stored on the originating MEP (the MEP that
initiates a DMM request).
• This method does not require clock synchronization between the transmitting and receiving MEPs.
page 38-6 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet OAM Ethernet OAM Overview
Support for both the IEEE and ITU-T Ethernet CFM standards allows interoperability between OmniS-
witch 802.1ag and Y.1731 CFM with the following minor configuration requirements:
• The OmniSwitch MD format must be configured as “none”.
• ITU-T Y.1731 uses the “icc-based” format for a MEG, so the OmniSwitch MA format must also be
configured to use the “icc-based” format.
• When the OmniSwitch MA is configured with the “icc-based” format, the MA name is automatically
padded with zeros if the name specified is less than 13 characters.
The OmniSwitch CLI commands to configure an MD and MA include the “none” and “icc-based” format
options. See “Configuring Ethernet OAM” on page 38-9 for more information.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 38-7
Quick Steps for Configuring Ethernet OAM Configuring Ethernet OAM
2 Create an Ethernet OAM Maintenance Association using the ethoam association command. For
example:
-> ethoam association alcatel-sales format string domain [Link]
vlan 10
3 Create an Ethernet OAM Maintenance End Point using the ethoam endpoint admin-state command.
For example:
-> ethoam endpoint 100 domain [Link] association alcatel-sales
direction up port 1/1/10
4 Administratively enable the Ethernet OAM Maintenance End Point using the ethoam endpoint
admin-state command. For example:
-> ethoam endpoint 100 domain [Link] association alcatel-sales
admin-state enable
5 Enable Continuity Check Messages for the Ethernet OAM Maintenance End Point using the ethoam
endpoint rfp command. For example:
-> ethoam endpoint 100 domain [Link] association alcatel-sales
ccm enable
6 Configure the Message Handling Function (MHF) value of an Ethernet OAM Maintenance Domain
using the ethoam domain mhf command. For example:
-> ethoam domain [Link] mhf explicit
7 Configure the endpoint list for the Ethernet OAM Maintenance Association using the ethoam
association endpoint-list command. For example:
-> ethoam association alcatel-sales domain [Link] endpoint-list
100
8 Enable the maintenance entity to initiate transmitting loopback messages to obtain loopback replies
using the ethoam loopback command. For example:
-> ethoam loopback target-endpoint 15 source-endpoint 100 domain [Link]-
[Link] association alcatel-sales
page 38-8 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet OAM Configuring Ethernet OAM
Note that with this implementation of Ethernet OAM, it is only possible to delete an MD when there is no
Maintenance Association, End Point, or Intermediate Point associated with the MD.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 38-9
Configuring Ethernet OAM Configuring Ethernet OAM
To modify the default Ethernet OAM Maintenance Domain, use the ethoam default-domain level
command, as shown:
-> ethoam default-domain vlan 100 level 4 mhf none
Note. The no form of this command restores the default Ethernet OAM Maintenance Domain value.
Note that with this implementation of Ethernet OAM, it is only possible to delete an MA when there is no
Maintenance End Point (MEP) or Maintenance Intermediate Point (MIP) associated with the MA.
By default, the CCM interval is set to 10 seconds. To modify this value for an MA, use the ethoam associ-
ation ccm-interval command:
-> ethoam association alcatel-sales domain [Link] ccm-interval
interval1m
To modify the MEP list of an MA, use the ethoam association endpoint-list command, as shown:
-> ethoam association alcatel-sales domain [Link] endpoint-list
100-200
To remove the MEP list from an Ethernet OAM Maintenance Association, enter:
-> no ethoam association alcatel-sales domain [Link] endpoint-
list 100-200
page 38-10 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet OAM Configuring Ethernet OAM
To configure the administrative state of a MEP, use the ethoam endpoint admin-state command. For
example:
-> ethoam end-point 100 domain [Link] association alcatel-sales
admin-state enable
• The virtual MEP is configured on a virtual port and not attached to any switch interface.
• The behavior of virtual MEP will be the same as that of the MEPs created on physical ports.
• The Remote Fault Propagation feature is not supported for virtual UP MEP.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 38-11
Configuring Ethernet OAM Configuring Ethernet OAM
To configure the priority values for Continuity Check Messages and Linktrace Messages transmitted by a
MEP, use the ethoam endpoint priority command. For example:
-> ethoam end-point 100 domain [Link] association alcatel-sales
priority 6
To configure the lowest priority fault alarm for the lowest defect priority for a MEP, use the ethoam
endpoint lowest-defect-priority command. For example:
-> ethoam end-point 100 domain [Link] association alcatel-sales
lowest-defect-priority all-defect
Configuring Loopback
To initiate transmitting Loopback messages (LBMs) and obtaining Loopback replies (LBRs), use the
ethoam loopback command. For example:
-> ethoam loopback target-endpoint 10 source-endpoint 20 domain MD association
MA number 3
Reply from [Link] bytes=64 seq=0 time=100ms
Reply form [Link] bytes=64 seq=0 time=112ms
Request timed out.
----[Link] ETH-LB Statistics----
3 packets transmitted, 2 packets received, 33% packet loss
round-trip (ms) min/avg/max = 100/106/112
Configuring Linktrace
To initiate transmitting Linktrace messages (LTMs) and detecting Linktrace replies (LTR), use the
ethoam linktrace command. For example:
-> ethoam linktrace [Link] end-point 4 domain [Link]
association alcatel_sales flag fdbonly hop-count 32
page 38-12 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Configuring Ethernet OAM Configuring Ethernet OAM
One-Way ETH-DM
The ethoam one-way-delay command is used to configure a one-way ETH-DM (1DM) to monitor perfor-
mance between two MEPs. For example, the following command is used to initiate the transmission of
1DM frames to a target MEP:
-> ethoam one-way-delay target-endpoint 10 source-endpoint 12 domain MD1
association MA1 vlan-priority 4
This command initiates the sending of 1DM frames from MEP 12 to MEP 10, which does not reply to
frames received from MEP 12. The latency and jitter statistics are gathered and stored on the receiving
MEP, which is MEP 10 in this example.
An option to specify a target MAC address, instead of a MEP ID, is also supported. For example:
-> ethoam one-way-delay target-macaddress [Link] source-endpoint 12
domain MD association MA vlan-priority 4
One-way delay measurement statistics are gathered and stored on the receiving MEP (the MEP that
receives a 1DM request).
Note. One-way ETH-DM requires clock synchronization between the sending and receiving MEPs. Using
NTP for clock synchronization is recommended.
Two-Way ETH-DM
The ethoam two-way-delay command is used to configure a two-way ETH-DM to monitor roundtrip
performance between two MEPs. For example, the following command is used to initiate the transmission
of delay measurement message (DMM) frames to a target MEP:
-> ethoam two-way-delay target-endpoint 10 source-endpoint 12 domain MD
association MA vlan-priority 4
Reply from [Link] delay=2584us jitter=282us
This command initiates the sending of DMM frames from MEP 12 to MEP 10. However, with two-way
delay measurement, the receiving MEP replies with delay message response (DMR) frames to the sending
MEP. In this example, MEP 10 sends DMR frames back to MEP 12.
An option to specify a target MAC address, instead of a MEP ID, is also supported. For example:
-> ethoam two-way-delay target-macaddress [Link] source-endpoint 12
domain MD association MA vlan-priority 4
Reply form [Link] delay=2584us jitter=282us
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page 38-13
Verifying the Ethernet OAM Configuration Configuring Ethernet OAM
show ethoam Displays the information of all the Management Domains configured on
the switch.
show ethoam domain Displays the information of a specific Management Domain configured
on the switch.
show ethoam domain Displays the information of a specific MA in a Management Domain
association configured on the switch.
show ethoam domain Displays the information of a specific MEP in a Management Domain
association end-point configured on the switch.
show ethoam remote-endpoint Displays the information of all remote MEPs learned as a part of the
domain CCM message exchange.
show ethoam default-domain Displays all the default MD information for all the VLANs or a specific
configuration VLAN.
show ethoam default-domain Displays the values of scalar Default-MD objects
configuration
show ethoam vlan Displays the vlan association for a specified VLAN-ID
show ethoam cfmstack Displays the contents of CFM Stack Managed Object, which determines
the relationships among MEPs and MIPs on a specific switch port.
show ethoam linktrace-reply Displays the content of the Linktrace reply (LTR) returned by a
previously transmitted LTM. This command displays the LTR based on
the transaction identifier or sequence number of the LTM for which the
LTR is to be displayed
show ethoam linktrace-tran-id Displays the transaction identifiers returned by previously generated
LTMs from a specified MEP.
show ethoam statistics Displays the Ethernet OAM statistics of all the Management Domains
configured on the switch. Also, displays the statistics of all the MAs and
matching MEPs for all the MDs.
show ethoam config-error Displays the configuration error for a specified VLAN, port or linkagg.
page 38-14 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
A Software License and
Copyright Statements
This appendix contains Alcatel-Lucent and third-party software vendor license and copyright statements.
IMPORTANT. Please read the terms and conditions of this license agreement carefully before opening
this package.
By opening this package, you accept and agree to the terms of this license agreement. If you are not
willing to be bound by the terms of this license agreement, do not open this package. Please
promptly return the product and any materials in unopened form to the place where you obtained it
for a full refund.
1. License Grant. This is a license, not a sales agreement, between you (the “Licensee”) and Alcatel-
Lucent. Alcatel-Lucent hereby grants to Licensee, and Licensee accepts, a non-exclusive license to use
program media and computer software contained therein (the “Licensed Files”) and the accompanying
user documentation (collectively the “Licensed Materials”), only as authorized in this License Agreement.
Licensee, subject to the terms of this License Agreement, may use one copy of the Licensed Files on the
Licensee’s system. Licensee agrees not to assign, sublicense, transfer, pledge, lease, rent, or share their
rights under this License Agreement. Licensee may retain the program media for backup purposes with
retention of the copyright and other proprietary notices. Except as authorized under this paragraph, no
copies of the Licensed Materials or any portions thereof may be made by Licensee and Licensee shall not
modify, decompile, disassemble, reverse engineer, or otherwise attempt to derive the Source Code.
Licensee is also advised that Alcatel-Lucent products contain embedded software known as firmware
which resides in silicon. Licensee may not copy the firmware or transfer the firmware to another medium.
2. Alcatel-Lucent’s Rights. Licensee acknowledges and agrees that the Licensed Materials are the sole
property of Alcatel-Lucent and its licensors (herein “its licensors”), protected by U.S. copyright law,
trademark law, and are licensed on a right to use basis. Licensee further acknowledges and agrees that all
rights, title, and interest in and to the Licensed Materials are and shall remain with Alcatel-Lucent and its
licensors and that no such right, license, or interest shall be asserted with respect to such copyrights and
trademarks. This License Agreement does not convey to Licensee an interest in or to the Licensed
Materials, but only a limited right to use revocable in accordance with the terms of this License
Agreement.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page A-1
Alcatel-Lucent License Agreement Software License and Copyright Statements
3. Confidentiality. Alcatel-Lucent considers the Licensed Files to contain valuable trade secrets of
Alcatel-Lucent, the unauthorized disclosure of which could cause irreparable harm to Alcatel-Lucent.
Except as expressly set forth herein, Licensee agrees to use reasonable efforts not to disclose the Licensed
Files to any third party and not to use the Licensed Files other than for the purpose authorized by this
License Agreement. This confidentiality obligation shall continue after any termination of this License
Agreement.
4. Indemnity. Licensee agrees to indemnify, defend and hold Alcatel-Lucent harmless from any claim,
lawsuit, legal proceeding, settlement or judgment (including without limitation Alcatel-Lucent’s
reasonable United States and local attorneys’ and expert witnesses’ fees and costs) arising out of or in
connection with the unauthorized copying, marketing, performance or distribution of the Licensed Files.
5. Limited Warranty. Alcatel-Lucent warrants, for Licensee’s benefit alone, that the program media
shall, for a period of ninety (90) days from the date of commencement of this License Agreement (referred
to as the Warranty Period), be free from defects in material and workmanship. Alcatel-Lucent further
warrants, for Licensee benefit alone, that during the Warranty Period the Licensed Files shall operate
substantially in accordance with the functional specifications in the User Guide. If during the Warranty
Period, a defect in the Licensed Files appears, Licensee may return the Licensed Files to Alcatel-Lucent
for either replacement or, if so elected by Alcatel-Lucent, refund of amounts paid by Licensee under this
License Agreement. EXCEPT FOR THE WARRANTIES SET FORTH ABOVE, THE LICENSED
MATERIALS ARE LICENSED “AS IS” AND ALCATEL-LUCENT AND ITS LICENSORS
DISCLAIM ANY AND ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED,
INCLUDING (WITHOUT LIMITATION) ANY IMPLIED WARRANTIES OF MERCHANTABILITY
OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW THE
EXCLUSION OF IMPLIED WARRANTIES SO THE ABOVE EXCLUSIONS MAY NOT APPLY TO
LICENSEE. THIS WARRANTY GIVES THE LICENSEE SPECIFIC LEGAL RIGHTS. LICENSEE
MAY ALSO HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE.
6. Limitation of Liability. Alcatel-Lucent’s cumulative liability to Licensee or any other party for any
loss or damages resulting from any claims, demands, or actions arising out of or relating to this License
Agreement shall not exceed the license fee paid to Alcatel-Lucent for the Licensed Materials. IN NO
EVENT SHALL ALCATEL-LUCENT BE LIABLE FOR ANY INDIRECT, INCIDENTAL,
CONSEQUENTIAL, SPECIAL, OR EXEMPLARY DAMAGES OR LOST PROFITS, EVEN IF
ALCATEL-LUCENT HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME
STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION TO
INCIDENTAL OR CONSEQUENTIAL DAMAGES MAY NOT APPLY TO LICENSEE.
7. Export Control. This product is subject to the jurisdiction of the United States. Licensee may not
export or reexport the Licensed Files, without complying with all United States export laws and
regulations, including but not limited to (i) obtaining prior authorization from the U.S. Department of
Commerce if a validated export license is required, and (ii) obtaining “written assurances” from licensees,
if required.
8. Support and Maintenance. Except as may be provided in a separate agreement between Alcatel-
Lucent and Licensee, if any, Alcatel-Lucent is under no obligation to maintain or support the copies of the
Licensed Files made and distributed hereunder and Alcatel-Lucent has no obligation to furnish Licensee
with any further assistance, documentation or information of any nature or kind.
9. Term. This License Agreement is effective upon Licensee opening this package and shall continue until
terminated. Licensee may terminate this License Agreement at any time by returning the Licensed
Materials and all copies thereof and extracts therefrom to Alcatel-Lucent and certifying to Alcatel-Lucent
in writing that all Licensed Materials and all copies thereof and extracts therefrom have been returned or
erased by the memory of Licensee’s computer or made non-readable. Alcatel-Lucent may terminate this
License Agreement upon the breach by Licensee of any term hereof. Upon such termination by Alcatel-
page A-2 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Software License and Copyright Statements Alcatel-Lucent License Agreement
Lucent, Licensee agrees to return to Alcatel-Lucent or destroy the Licensed Materials and all copies and
portions thereof.
10. Governing Law. This License Agreement shall be construed and governed in accordance with the
laws of the State of California.
11. Severability. Should any term of this License Agreement be declared void or unenforceable by any
court of competent jurisdiction, such declaration shall have no effect on the remaining terms herein.
12. No Waiver. The failure of either party to enforce any rights granted hereunder or to take action against
the other party in the event of any breach hereunder shall not be deemed a waiver by that party as to
subsequent enforcement of rights or subsequent actions in the event of future breaches.
13. Notes to United States Government Users. Software and documentation are provided with restricted
rights. Use, duplication or disclosure by the government is subject to (i) restrictions set forth in GSA ADP
Schedule Contract with Alcatel-Lucent’s reseller(s), or (ii) restrictions set forth in subparagraph (c) (1)
and (2) of 48 CFR 52.227-19, as applicable.
[Link] Party Materials. Licensee is notified that the Licensed Files contain third party software and
materials licensed to Alcatel-Lucent by certain third party licensors. Some third party licensors are third
part beneficiaries to this License Agreement with full rights of enforcement. Please refer to the section
entitled “Third Party Licenses and Notices” on page -4 for the third party license and notice terms.
OmniSwitch AOS Release 8 Network Configuration Guide November 2015 page A-3
Third Party Licenses and Notices Software License and Copyright Statements
page A-4 OmniSwitch AOS Release 8 Network Configuration Guide November 2015
Index dynamic link aggregation 10-4, 10-26
high availability VLANs 5-3
ICMP policies 27-69
IP 16-4
IPMS 26-37, 26-39
IPv6 18-5
Layer 3 ACLs 27-57
policies 27-66
Numerics policy map groups 27-52
Port Mapping 33-3, 33-7
10/100/1000 ports
port mirroring 35-4
defaults 1-4
port monitoring 35-6, 35-8
802.1AB 14-1
QoS 27-35, 27-66
defaults 14-3
RIP 20-3
specifications 14-2
RMON 35-11
verify information about 14-16
Server Load Balancing 23-3, 25-4
802.1Q
Spanning Tree Algorithm and Protocol 6-11, 6-44
enabling notification 14-11
static link aggregation 9-3, 9-10
trusted ports 27-22
switch health 35-13
802.1X
switch logging 37-3
specifications 30-2, 31-3, 32-3
UDLD 2-3
802.1x command 31-8, 31-10
VLANs 4-3, 4-10
802.3ad
VRRP 24-5, 24-26, 24-29
see dynamic link aggregation
VRRP3 24-30
applied configuration 27-63
A how to verify 27-65
aaa ldap-server command ARP
LDAP authentication 29-25 clearing the ARP cache 16-15
aaa radius-server command creating a permanent entry 16-14
RADIUS authentication 29-11, 29-13 deleting a permanent entry 16-14
Access Control Lists dynamic entry 16-14
see ACLs filtering 16-15
access list 20-15 local proxy 16-15
creating 20-15 arp command 16-14
ACLs arp filter command 16-15
interaction with VRRP 24-10, 24-19 assigning ports to VLANs 4-6
Layer 2 27-55 Authenticated Switch Access
Layer 3 27-57 LDAP VSAs 29-20
Layer 3 application examples 27-57 authentication servers
multicast 27-58 application example 29-4
security features 27-59 defaults 29-3
actions how backups work 29-5
combined with conditions 27-24, 27-25 see LDAP authentication servers, RADIUS authentication
creating policy actions 27-38 servers
Address Resolution Protocol automatic IP configuration 22-12
see ARP
Alcatel Mapping Adjacency Protocol 15-1
B
alerts 37-7
backbone VLAN 7-18, 7-26
AMAP
backup router
see Alcatel Mapping Adjacency Protocol
VRRP 24-7
Application example
BGP IPv6
Learned Port Security Configuration 34-3
configuring 16-35
application example
boundary port 6-19
Ethernet OAM 38-8
BPDU
VLAN Stacking 16-2, 16-36
see Bridge Protocol Data Units
application examples
bridge 1x1 slot/port path cost command 6-38
authentication servers 29-4
bridge auto-vlan-containment commmand 6-33
Configuring 802.1AB 14-4
bridge cist hello time command 6-28, 6-29, 6-30, 6-31
DHCP Relay 22-4, 22-7, 22-8
ip dos scan udp open-port-penalty command 16-27 ip slb probe url command 25-21
ip dos trap command 16-28 ip slb probe username command 25-20
ip helper address command 22-9 ip slb server ip cluster command 25-4, 25-5, 25-14, 25-16,
ip helper boot-up command 22-12 25-17
ip helper forward delay command 22-10 ip static-route command 16-12, 18-20
ip helper maximum hops command 22-11 IPMS 26-1
ip helper per-vlan command 22-11 adding static members 26-12, 26-13, 26-14
ip helper standard command 22-11 adding static neighbors 26-11
ip interface command 20-3 adding static queriers 26-12
ip load rip command 20-3, 20-6 application examples 26-37, 26-39
ip multicast igmp-proxy-version command 26-10, 26-26 defaults 26-3, 26-5
ip multicast neighbor-timeout command 26-10, 26-17, deleting static members 26-12, 26-28
26-18, 26-26, 26-32 deleting static neighbors 26-12
ip multicast query-interval command 26-15, 26-16, 26-29 deleting static queriers 26-12, 26-28
ip multicast static-member command 26-12 displaying 26-41, 26-42
ip multicast static-neighbor command 26-27 DVMRP 26-8
ip multicast static-querier command 26-12 enabling 26-9, 26-20, 26-21, 26-22, 26-34, 26-35, 26-36
IP Multicast Switching IGMPv2 26-11, 26-27
see IPMS IGMPv3 26-8, 26-11, 26-26
ip multicast switching command 26-9, 26-20, 26-25, 26-34 neighbor timeout 26-17, 26-18, 26-19, 26-31, 26-33
IP multinetting 16-7 optional multicast routing software 26-7
ip redist command 20-12 overview 26-6
ip rip force-holddowntimer command 20-9 PIM-SM 26-8
ip rip garbage-timer command 20-10 query interval 26-15, 26-16, 26-29, 26-30
ip rip holddown-timer command 20-10 RFCs 26-2, 26-3
ip rip host-route command 20-11 specifications 26-2, 26-3
ip rip interface auth-key command 20-18 IPv6 18-1
ip rip interface auth-type command 20-18 addressing 18-7
ip rip interface command 20-3, 20-7 application examples 18-5
ip rip interface metric command 20-8 autoconfiguration of addresses 18-9
ip rip interface recv-version command 20-8 defaults 18-4
ip rip interface send-version command 20-7 specification 18-2
ip rip interface status command 20-3, 20-7 tunneling types 18-19
ip rip invalid-timer command 20-10 verify information about 18-32
ip rip route-tag command 20-9 ipv6 access-list address command 20-15
ip rip status command 20-3, 20-7 ipv6 access-list command 20-15
ip rip update-interval command 20-9 ipv6 address command 18-5, 18-17
ip route-pref command 16-17 ipv6 interface command 18-5, 18-15, 18-16
IP router ports 16-8 ipv6 interface tunnel source destination command 18-15
modifying 16-9 ipv6 load rip command 18-5
removing 16-9, 17-17 ipv6 rip interface command 18-5
ip router primary-address command 16-17 ipv6 route-pref command 18-21
ip router router-id command 16-17 ISIS-SPB 7-9
ip service command 16-29, 16-39
ip slb admin command 25-4, 25-11
J
ip slb cluster admin status command 25-17
jumbo frames 1-2
ip slb cluster command 25-4, 25-5, 25-12
ip slb cluster ping period command 25-15
ip slb cluster ping retries command 25-16 L
ip slb cluster ping timeout command 25-15 LACP
ip slb probe command 25-18, 25-19 see dynamic link aggregation
ip slb probe expect command 25-21 lacp agg actor admin key command 10-4, 10-10
ip slb probe password command 25-20 lacp agg actor admin state command 10-17
ip slb probe period command 25-19 lacp agg actor port priority command 10-20
ip slb probe port command 25-20 lacp agg actor system id command 10-19
ip slb probe retries command 25-20 lacp agg actor system priority command 10-19
ip slb probe send command 25-21 lacp agg partner admin key command 10-23
ip slb probe status command 25-21 lacp agg partner admin port command 10-24
ip slb probe timeout command 25-19 lacp agg partner admin port priority command 10-25
lacp agg partner admin state command 10-21 learned MAC addresses 3-3
lacp agg partner admin system id command 10-23 static MAC addresses 3-3
lacp agg partner admin system priority command 10-24 MAC addresses
lacp linkagg actor admin key command 10-14 aging time 3-7, 6-30
lacp linkagg actor system id command 10-15 dynamic link aggregation 10-15, 10-16, 10-19, 10-23
lacp linkagg actor system priority command 10-14 learned 3-3
lacp linkagg admin state command 10-13 statically assigned 3-3
lacp linkagg name command 10-13 mac-address-table command 3-3
lacp linkagg partner admin key command 10-15 map groups 27-52
lacp linkagg partner system id command 10-16 application 27-70
lacp linkagg partner system priority command 10-16 creating 27-53
lacp linkagg size command 10-4, 10-9 verifying information 27-54
Layer 2 master router
statistics counters 1-5 VRRP 24-7
LDAP accounting servers MLD Zapping 26-35
dynamic log 29-23 MST 6-13
standard attributes 29-22 Internal Spanning Tree (IST) Instance 6-18
LDAP authentication servers Interoperability 6-19
directory entries 29-16 Migration 6-19, 6-20
functional privileges 29-21 MSTI 6-16
passwords for 29-19 MSTP 6-13
schema extensions 29-16 Multiple Spanning Tree Region 6-17
SNMP attributes on authentication servers 29-21 Multicast Listener Discovery (MLD) 26-26
SSL 29-25 Multiple Spanning Tree
VSAs for Authenticated Switch Access 29-20 defaults 6-5
LDAP servers
see policy servers
N
used for QoS policies 28-3
non combo ports
Learned Port Security
configuring 1-4
database table 34-9
defaults 34-2
disabling 34-12 O
enabling 34-12 OSPF 20-4
overview 34-5 defaults 19-2, 21-2
specifications 34-2 loading software 21-12
Learned Port Security Configuration specifications 19-2, 21-2
Application example 34-3 OSPF redistribution policies
Lightweight Directory Access Protocol deleting 16-20, 16-22, 18-24, 18-26, 20-16
see LDAP servers
line speed 1-4
link aggregation
P
dynamic link aggregation 10-1, 11-1 PBB see Provider Backbone Bridge
Spanning Tree parameters 6-36, 6-37, 6-38, 6-40, 6-42 pending configuration 27-63
static link aggregation 9-1 pending policies
lldp lldpdu command 14-4 deleting 27-63
lldp notification command 14-4 Per VLAN DHCP 22-9
lldp tlv dot1 command 14-13 PIM-SM 26-8
lldp tlv dot3 command 14-13 ping
lldp tlv management command 14-4 IP 16-32
lldp tlv med command 14-14 ping command 16-32
logged events policies
detail level 27-32 application examples 27-66
types of events 27-31 applied 27-63
built-in 27-29
conditions 27-36
M creating policy actions 27-38
MAC address table 3-1, 3-3 how the switch uses them 27-21
aging time 3-7 Policy Based Routing 27-71
duplicate MAC addresses 3-3 precedence 27-40