Fastiron Ethernet Switch Platform and Layer 2 Switching: Configuration Guide
Fastiron Ethernet Switch Platform and Layer 2 Switching: Configuration Guide
03 December 2013
Preface..................................................................................................................................... 9
Document conventions......................................................................................9
Brocade Resources.........................................................................................11
Getting technical help......................................................................................11
Document feedback........................................................................................ 12
Metro Features..................................................................................................................... 69
Supported metro features............................................................................. 69
Topology groups........................................................................................... 69
Master VLAN and member VLANs................................................... 70
Control ports and free ports.............................................................. 70
Topology group configuration considerations................................... 71
Configuring a topology group............................................................71
Displaying topology group information.............................................. 72
Metro Ring Protocol ..................................................................................... 73
Metro Ring Protocol configuration notes........................................... 75
MRP rings without shared interfaces (MRP Phase 1).......................75
MRP rings with shared interfaces (MRP Phase 2)............................77
Ring initialization............................................................................... 79
How ring breaks are detected and healed........................................ 83
Master VLANs and customer VLANs................................................ 85
Link Aggregation...................................................................................................................133
Supported trunk group and dynamic link aggregation features.....................133
Overview of link aggregation.........................................................................134
LAG formation rules...................................................................................... 134
Configuration notes for FastIron devices in a traditional stack......................135
Maximum number of LAGs........................................................................... 137
Migrating from a previous release to 08.0.00a LAG or LACP configuration. 138
Downgrade considerations............................................................................139
LAG hashing on stacking products .............................................................. 139
Removing Layer 2 information from trunk hash output..................... 140
Configuring a LAG.........................................................................................140
Creating a Link Aggregation Group (LAG)........................................ 140
Creating a Link Aggregation Group (LAG) using the LAG ID option.141
Deploying a LAG........................................................................................... 145
Commands available under LAG once it is deployed....................... 146
Disabling ports within a LAG............................................................. 146
Enabling ports within a LAG..............................................................147
Adding a Port to Currently Deployed LAG........................................ 147
Deleting a Port from a Currently Deployed LAG............................... 147
Monitoring an individual LAG port..................................................... 148
Assigning a name to a port within a LAG.......................................... 148
Enabling sFlow forwarding on a port in a LAG..................................149
Setting the sFlow sampling rate for a port in a LAG..........................150
GVRP..................................................................................................................................219
Supported GVRP features.......................................................................... 219
GVRP overview...........................................................................................219
GVRP application examples....................................................................... 220
Dynamic core and fixed edge..........................................................221
Dynamic core and dynamic edge....................................................222
Fixed core and dynamic edge......................................................... 222
Fixed core and fixed edge...............................................................222
VLAN names created by GVRP.................................................................. 222
Configuration notes for GVRP.....................................................................222
VLANs.................................................................................................................................355
Supported VLAN features........................................................................... 355
VLAN overview............................................................................................356
Types of VLANs.............................................................................. 356
Modifying a port-based VLAN......................................................... 361
Default VLAN.................................................................................. 371
802.1Q tagging................................................................................373
Spanning Tree Protocol (STP)........................................................ 375
Virtual routing interfaces................................................................. 375
VLAN and virtual routing interface groups...................................... 378
Dynamic, static, and excluded port membership............................ 378
Super aggregated VLANs............................................................... 381
Trunk group ports and VLAN membership......................................381
Summary of VLAN configuration rules............................................ 382
Routing between VLANs.............................................................................383
Virtual routing interfaces (Layer 2 Switches only)........................... 383
Routing between VLANs using virtual routing interfaces (Layer
3 Switches only)........................................................................ 383
Dynamic port assignment (Layer 2 Switches and Layer 3
Switches)................................................................................... 384
Index.................................................................................................................................. 441
● Document conventions......................................................................................................9
● Brocade Resources.........................................................................................................11
● Getting technical help......................................................................................................11
● Document feedback........................................................................................................ 12
Document conventions
Text formatting conventions
The following text formatting conventions may be used in the flow of the text to highlight specific words
or phrases.
Format Description
Convention Description
Convention Description
In Fibre Channel products, square brackets may be used instead for this
purpose.
\
Indicates a “soft” line break in command examples. If a backslash separates
two lines of a command input enter the entire command at the prompt without
the backslash
NOTE
A note provides a tip, guidance, or advice, emphasizes important information, or provides a reference
to related information.
ATTENTION
An Attention statement indicates potential damage to hardware or data.
CAUTION
A Caution statement alerts you to situations that can be potentially hazardous to you or cause
damage to hardware, firmware, software, or data.
DANGER
A Danger statement indicates conditions or situations that can be potentially lethal or
extremely hazardous to you. Safety labels are also attached directly to products to warn of
these conditions or situations
Brocade Resources
Related publications
You can download additional publications supporting your product from the Brocade website at
www.brocade.com.
• Adapter documentation is available on the Downloads and Documentation for Brocade Adapters
page. Select your platform and scroll down to the documentation section.
• For all other products, select the Brocade product to open the individual product page, click the
Brocade product name or image to open the individual product page. The user manuals are
available in the resources module at the bottom of the page under the Documentation category.
Preferred method of contact for non- Required for Sev 1-Critical and Sev [email protected]
urgent issues: 2-High issues:
Please include:
• My Cases through MyBrocade • Continental US:
• Problem summary
• Software downloads & licensing 1-800-752-8061
• Serial number
tools • Europe, Middle East, Africa,
and Asia Pacific: +800-AT • Installation details
• Knowledge Base
FIBREE (+800 28 34 27 33) • Environment description
• For areas unable to access toll
free number: +1-408-333-6061
• Toll-free numbers are available
in many countries.
Document feedback
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a topic
needs further development, we want to hear from you. You can provide feedback in two ways:
• Through the online feedback form in the HTML documents posted on www.brocade.com.
• By sending your feedback to [email protected].
Provide the publication title, part number, and as much detail as possible, including the topic
heading and page number if applicable, as well as your suggestions for improvement.
● Introduction..................................................................................................................... 13
● Audience......................................................................................................................... 14
● What’s new in this document ......................................................................................... 14
● Related publications........................................................................................................14
● How command information is presented in this guide.....................................................15
Introduction
This guide includes procedures for configuring the software. The software procedures show how to
perform tasks using the CLI. This guide also describes how to monitor Brocade products using statistics
and summary screens.
Supported Hardware
This guide supports the following product families from Brocade:
• FastIron X Series devices (chassis models):
‐ FastIron SX 800
‐ FastIron SX 1600
• Brocade FCX Series (FCX) Stackable Switch
• Brocade ICX 6610 (ICX 6610) Stackable Switch
• Brocade ICX 6430 Series (ICX 6430)
• Brocade ICX 6450 Series (ICX 6450)
• Borcade ICX 6650 Series (ICX 6650)
• Brocade TurboIron 24X Series
NOTE
The Brocade ICX 6430-C switch supports the same feature set as the Brocade ICX 6430 switch unless
otherwise noted.
NOTE
The Brocade ICX 6450-C12-PD switch supports the same feature set as the Brocade ICX 6450 switch
unless otherwise noted.
For information about the specific models and modules supported in a product family, refer to the
hardware installation guide for that product family. Related publications on page 14 lists the hardware
installation guides.
Unsupported features
Features that are not documented in Related publications on page 14 are not supported.
Audience
This document is designed for network engineers with a working knowledge of Layer 2 and Layer 3
switching and routing.
If you are using a Brocade Layer 3 Switch, you should be familiar with the following protocols if
applicable to your network - IP, RIP, OSPF, BGP, IGMP, PIM, and VRRP.
Preboot eXecution Provides PXE boot support with MCT nodes and Link Aggregation
Environment boot support dynamic LAG ports.
Designated Protection Ensures that a port cannot go to the designated Spanning Tree Protocol
forwarding state in STP 802.1d or 802.1w.
Packet InError Detection Identifies links that receive more number of bad frames Basic Layer 2 Features
than configured threshold and disables them to avoid
instability in the network.
Related publications
The following Brocade Communication Systems, Inc documents supplement the information in this
guide and can be located at http://www.brocade.com/ethernetproducts
• FastIron Ethernet Switch Administration Guide
• FastIron Ethernet Switch Layer 3 Routing Configuration Guide
• FastIron Ethernet Switch IP Multicast Configuration Guide,
• FastIron Ethernet Switch Security Configuration Guide
• FastIron Ethernet Switch Software Upgrade Guide
• FastIron Switch Stacking Configuration Guide
• FastIron Ethernet Switch Traffic Management Guide
• FastIron Ethernet Switch Software Licensing Guide
• FastIron Feature Support Matrix
• Brocade TurboIron 24X Series Configuration Guide
• Brocade ICX 6430-C Switch Installation Guide
• Brocade ICX 6430 and ICX 6450 Stackable Switches Hardware Installation Guide
• Brocade FCX Series Hardware Installation Guide
• Brocade FastIron ICX 6610 Stackable Switch Hardware Installation Guide
• Brocade ICX 6650 Ethernet Switch Installation Guide
Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800
FSX 1600
Multi-port static MAC address 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 Yes
Static MAC entries with option to set 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
traffic priority
Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800
FSX 1600
Address locking (for MAC 08.0.01 08.0.011 08.0.011 08.0.011 08.0.011 08.0.011
addresses)
MAC address filter override of 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
802.1X
MAC address filtering on source and 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
destination MAC addresses
MAC address move notification 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
Ability to disable MAC learning 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
Dynamic buffer allocation for QoS 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
priorities
Link Fault Signaling (LFS) for 10G No 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
The procedures in this chapter describe how to configure basic Layer 2 parameters.
Brocade devices are configured at the factory with default parameters that allow you to begin using the
basic features of the system immediately. However, many of the advanced features such as VLANs or
routing protocols for the device must first be enabled at the system (global) level before they can be
configured. If you use the Command Line Interface (CLI) to configure system parameters, you can find
these system level parameters at the Global CONFIG level of the CLI.
NOTE
• Before assigning or modifying any router parameters, you must assign the IP subnet (interface)
addresses for each port.
• For information about configuring IP addresses, DNS resolver, DHCP assist, and other IP-related
parameters, refer to the FastIron Ethernet Switch Layer 3 Routing Configuration Guide .
• For information about the Syslog buffer and messages, refer to the FastIron Ethernet Switch
Administration Guide .
NOTE
Port regions do not apply to trunk group configurations on the FastIron X Series devices. However, port
regions do apply to port monitoring and unknown unicast configurations on FastIron X Series devices.
• SX-FI48GPP: ports 1 - 48 belong to port region 0
• SX-FI-2XG: ports 1 - 2 belong to port region 0
• SX-FI-8XG: ports 1 - 8 belong to port region 0
• SX-FI-24HF: ports 1 - 24 belong to port region 0
• SX-FI-24GPP: ports 1 - 24 belong to port region 0
NOTE
This section provides instructions for enabling and disabling STP. For configuration procedures and
more information about STP, refer to Spanning Tree Protocol on page 255 in this guide.
STP must be enabled at the system level to allow assignment of this capability on the VLAN level. On
devices running Layer 2 code, STP is enabled by default. On devices running Layer 3 code, STP is
disabled by default.
To enable STP for all ports on a Brocade device, enter the following command.
device(config)#spanning tree
Syntax: [no] spanning-tree
You can also enable and disable spanning tree on a port-based VLAN and on an individual port basis,
and enable advanced STP features. Refer to Spanning Tree Protocol on page 255.
NOTE
The MAC learning rate control feature is not supported on FastIron X Series devices.
You can set a rate limit to control CPU address updating. The range for this rate limit is 200 to 50,000
per second. The MAC learning rate limit applies to each packet processor, which means that for a
system with two packet processors, each processor can send address messages to the CPU at the
established rate limit.
Syntax: [no] cpu-limit addr-msgs msgsRateLimit
NOTE
Actual rates in hardware may have a variance of +200 or -100.
Changing the MAC age time and disabling MAC address learning
To change the MAC address age timer, enter a command such as the following.
device(config)#mac-age-time 60
Syntax: [no] mac-age-time secs
secs specifies the number of seconds. Possible values differ depending on the version of software
running on your device, as follows:
• On Brocade FCX Series devices, you can configure the MAC address age timer to 0 or a value
from 10-1000 (seconds). If you set the MAC age time to 0, aging is disabled.
• On FastIron X Series devices, you can configure 0 or a value from 10 - 86,400 (seconds), in 10-
second intervals. If you set the MAC age time to 0, aging is disabled.
• On ICX Series devices, you can configure the MAC address age timer to 0 or a value from 10-570
(seconds). If you set the MAC age time to 0, aging is disabled.
On ICX 6650, you can configure a value from 0 or a value from 10-600. The defaut is 300. If you set
the MAC age time to 0, aging is disabled.
NOTE
Usually, the actual MAC age time is from one to two times the configured value. For example, if you
set the MAC age timer to 60 seconds, learned MAC entries age out after remaining unused for
between 60 - 120 seconds. However, if all of the following conditions are met, then the MAC entries
age out after a longer than expected duration:
• The MAC age timer is greater than 630 seconds.
• The number of MAC entries is over 6000.
• All MAC entries are learned from the same packet processor.
• All MAC entries age out at the same time.
device#show mac-address
Total active entries from all ports = 3
Total static entries from all ports = 1
MAC-Address Port Type VLAN
0000.0034.1234 15 Static 1
0000.0038.2f24 14 Dynamic 1
0000.0038.2f00 13 Dynamic 1
0000.0086.b159 10 Dynamic 1
In the output of the show mac-address command, the Type column indicates whether the MAC entry
is static or dynamic. A static entry is one you create using the static-mac-address command. A
dynamic entry is one that is learned by the software from network traffic.
The output of the show mac-addres s command on FSX devices include an Index column which
indicates the index where the entry exists in the hardware MAC table.
NOTE
The show mac-address command output does not include MAC addresses for management ports,
since these ports do not support typical MAC learning and MAC-based forwarding.
NOTE
Brocade devices running Layer 3 code also support the assignment of static IP Routes, static ARP, and
static RARP entries. For details on configuring these types of static entries, refer to "Adding a static IP
route" and "Adding a static ARP entry" sections in the FastIron Ethernet Switch Layer 3 Routing
Configuration Guide .
You can manually input the MAC address of a device to prevent it from being aged out of the system
address table.
This option can be used to prevent traffic for a specific device, such as a server, from flooding the
network with traffic when it is down. Additionally, the static MAC address entry is used to assign higher
priorities to specific MAC addresses.
You can specify traffic priority (QoS) and VLAN membership (VLAN ID) for the MAC Address as well as
specify the device type of either router or host.
The default and maximum configurable MAC table sizes can differ depending on the device. To
determine the default and maximum MAC table sizes for your device, display the system parameter
values. Refer to Displaying and modifying system parameter default settings on page 34.
device(config)#vlan 2
device(config-vlan-2)#static-mac-address 0000.0063.67FF drop
Syntax: [no] static-mac-address mac-addr drop
Use the no form of the command to remove the static MAC address drop configuration.
NOTE
Flow-based MAC address learning is only supported on FastIron X Series devices.
This section describes flow-based MAC address learning and how to enable it on a FastIron X Series
switch.
NOTE
Even when flow-based MAC address learning is enabled, some MAC addresses, including but not
limited to control MACs, static MACs, multicast MACs, and MAC addresses resolved through ARP, will
continue to be global MAC addresses. These MAC addresses are always programmed in all packet
processors in a Layer 2 or Layer 3 switch.
NOTE
Global MAC addresses have priority over dynamic flow-based MAC addresses. To ensure that global
MAC addresses are in sync across all packet processors, flow-based MAC addresses may be
overwritten in one or more packet processors. The MAC addresses will be relearned and
reprogrammed using the flow-based method as needed by incoming traffic flows.
• When a flow-based MAC address moves, it is deleted from all of the packet processors, then
relearned on each packet processor individually, as needed by incoming traffic flows.
• The software MAC address table in the CPU uses a hashing algorithm. Because hash collisions
can occur and may consume software resources, the FastIron may not be able to support up to
32K MAC addresses.
• The system can scale up to 32K MAC addresses, however, each packet processor is limited to a
maximum of 16K MAC addresses. This limit still applies, as this is a hardware limitation.
device(config)#mac-learning-flow-based
This command enables flow-based MAC address learning. All dynamically-learned MAC addresses are
flushed from the hardware and software MAC tables and are subsequently learned using flow-based
MAC address learning.
Syntax: [no] mac-learning-flow-based
Use the no form of the command to disable flow-based MAC address learning. When disabled, all
dynamically-learned MAC addresses are flushed from the hardware and software MAC tables and are
subsequently learned using global MAC address learning.
NOTE
FCX devices do not support flow-based MACs and the capacity of the MAC address table cannot be
altered on FCX devices.
NOTE
On ICX 6650, you can increase the capacity of the MAC address table of up to 64K MAC addresses. By
default, up to 64K MAC addresses are supported.
To increase the capacity of the MAC table, enter commands such as the following.
NOTE
You must save the configuration and reload the software to place the system-max mac change into
effect.
Syntax: system-max mac max-flow-MACs
The max-flow-MACs parameter specifies the maximum number of MAC addresses in the MAC table.
For flow-based MACs, the minimum value is 16K and the default value is 32K (16k for FSX).
Use the command show default values to display the default, maximum, and currently configured
values for the MAC address table.
NOTE
VLAN IDs 4087, 4090, and 4093 are reserved for Brocade internal use only. VLAN 4094 is reserved for
use by Single STP. Also, if you are running an earlier release, VLAN IDs 4091 and 4092 may be
reserved for Brocade internal use only. If you want to use VLANs 4091 and 4092 as configurable
VLANs, you can assign them to different VLAN IDs. For more information, refer to Assigning different
VLAN IDs to reserved VLANs 4091 and 4092 on page 384
NOTE
The second command is optional and also creates the VLAN if the VLAN does not already exist. You
can enter the first command after you enter the second command if you first exit to the global CONFIG
level of the CLI.
NOTE
Tagging does not apply to the default VLAN.
When using the CLI, ports are defined as either tagged or untagged at the VLAN level.
device(config)#vlan 4
device(config-vlan-4)#tagged e 5
NOTE
MAC address move notification does not detect MAC movements across an MCT cluster between MCT
peers. It only detects MAC movements locally within a cluster MCT peer.
0000.0000.0024 7/1
7/2 Apr 29
18:29:35 10
0000.0000.001e 7/1
7/2 Apr 29
18:29:35 10
0000.0000.0023 7/1
7/2 Apr 29
18:29:35 10
0000.0000.001d 7/1
7/2 Apr 29
18:29:35 10
0000.0000.001c 7/1
7/2 Apr 29
18:29:35 10
(output truncated)
Syntax: show notification mac-movement threshold-rate
The following table defines the fields in the output of the show notification mac-movement
threshold-rate command.
TABLE 2 Field definitions for the show notification mac-movement threshold-rate command
Field Description
Threshold-Rate Mac Movement Specifies whether the MAC movement notification threshold rate is enabled.
Notification is
Configured Threshold-Rate The rate in MAC address moves per sampling interval after which a
notification is issued. The range is from 1 through 50000.
Configured Sampling-Interval The sampling interval in seconds over which the number of MAC address
moves is measured. The range is from 1 through 86400, which is the number
of seconds in a day.
Number of entries in the One entry for each time a MAC address notification threshold was reached.
notification table
Last Move-Time The time of the last move occurred.It uses the system up time If there is no
time server configured.
Vlan-id The VLAN for the port where the MAC address movement was detected.
The software places an upper limit on the number of MAC addresses for which MAC address-specific
data is reported. This limit is necessary to do this because it is not possible to report on all MAC
addresses when many move.
The following example configures a history interval of 10 seconds.
The following table defines the fields in the output of the show notification mac-movement interval-
history command.
TABLE 3 Field definitions for the show notification mac-movement interval-history command
Field Description
Interval-History Mac Movement Specifies whether the interval-history data collection is enabled.
Notification is
Configured Interval The interval over which the MAC address movement statistics were
collected.
Number of macs that moved in the The number of MAC addresses that moved during the configured interval,
interval regardless of how many times each address moved.
Total number of moves in the interval The total number of MAC address moves over the configured interval.
Interval Move-Count The number of times the MAC address has moved within the interval.
Last Move-Time The time of the last MAC move occurred. It uses the system up time If
there is no time server configured.
Vlan-id The VLAN for the port where the MAC address movement was detected.
Parameter Definition
hw-ip-next-hop IP next hops and routes, including unicast next hops and multicast route entries
hw-logical-interface Hardware logical interface pairs (physical port and VLAN pairs)
Parameter Definition
vlan VLANs
NOTE
If you accidentally enter a value that is not within the valid range of values, the CLI will display the
valid range for you.
To increase the number of IP subnet interfaces you can configure on each port on a device running
Layer 3 code from 24 to 64, enter the following commands.
device(config)#system-max ip-subnet-port 64
device(config)#write memory
device(config)#exit
device#reload
Syntax: system-max ip-subnet-port num
The num parameter specifies the maximum number of subnet addresses per port and can be from 24
- 128. The default is 24.
Cut-through switching
Brocade ICX 6650 operates in cut-through switching mode, meaning it starts forwarding a frame even
before the whole frame has been received. The amount of time the device takes to start forwarding the
packet (referred to as the switch's latency) is on the order of a few microseconds only, regardless of
the packet size. The Table provides the latency details.
Packet size in bytes 10G latency in microseconds (10G to 40G latency in microseconds(40G to 40G)
10G)
64 1.41 1.26
Packet size in bytes 10G latency in microseconds (10G to 40G latency in microseconds(40G to 40G)
10G)
• If there is any over-subscription on the egress port, either due to speed mismatch or network
topology, the device will buffer the packets and the forwarding behavior will be similar to store-and-
forward mode.
• If an FCS error is determined when the packet is processed by the ingress pipe, it is dropped at the
end of the ingress pipe. When an FCS error is determined after the packet transmission to the
egress port has begun, it is transmitted with a faulty CRC. When an FCS error is determined during
a packet transmission the packet truncated.
• Forwarding from fast speed ports to slower ports is equivalent to store-and-forward (has to be
stored first). Forwarding from slower speed ports to faster ports is also equivalent to store-and-
forward (to avoid underrun).
• Cut-through switching is not enabled on 1G ports.
• Cut-through minimum packet size is 128 bytes.
• Features that are based on the packet length are not supported since the packet is transmitted
before being fully received.
NOTE
This section applies to FastIron X Series devices only. To configure dynamic buffer limits Brocade FCX
Series, and ICX devices, refer to Dynamic buffer allocation for FCX and ICX devices on page 46.
By default, Brocade IronWare software allocates a certain number of buffers to the outbound transmit
queue for each port, based on QoS priority (traffic class). The buffers control the total number of
packets permitted in the outbound transmit queue for the port. For each port, the Brocade device
defines the maximum outbound transmit buffers, also called queue depth limits , as follows:
• Total Transmit Queue Depth Limit - The total maximum number of transmit buffers allocated for all
outbound packets on a port. Packets are added to the port's outbound queue as long as the
number of buffers currently in use is less than the total transmit queue depth limit. When this limit is
reached, any new packets attempting to enter the port’s transmit queue will be dropped until at
least one buffer is freed.
• Transmit Queue Depth Limit for a Given Traffic Class - The maximum number of transmit buffers
allocated for packets with a given traffic class (0 through 7) on a port. Packets with the specified
traffic class are added to the port’s outbound queue as long as the number of buffers currently in
use for that traffic class is less than the transmit queue depth limit for the traffic class. When this
limit is reached, any new packets with the specified traffic class attempting to enter the port’s
transmit queue will be dropped.
Except for the third-generation Interface modules, you can increase or decrease both of these queue
depth limits per port. On the SX-FI48GPP, SX-FI-24GPP, SX-FI-24HF, SX-FI-2XG or SX-FI-8XG
modules, to increase or decrease the queue depth limits for a port, you configure a buffer profile and
then apply it to the port. A buffer profile can be tied to one or more ports. Therefore, if you change the
configuration on one port, it will change the configuration on all ports associated with the same buffer
profile.
Dynamic buffer allocation for QoS is useful in situations where applications have intermittent bursts of
oversubscription. For example, by increasing the buffers on the egress port, the Brocade device will be
able to forward oversubscribed packets instead of dropping them.
NOTE
The SX-FI48GPP Interface module supports 48 tri-speed (10/100/1000) ports. When the ports are
configured at lower speeds, for example, 100 Mbps or 10 Mbps, the maximum queue depth is less
than 256 when egress congestion occurs at the front-end Network Processor (NP) of the SX-FI48GPP
module. If egress congestion occurs at the back-end NP of the SX-FI48GPP module, the maximum
queue depth is 4095. The limit for buffer sharing is 4088.
Port type Maximum queue depth Maximum queue depth Total maximum queue
per port, per priority 0 - 6 per port, per priority 7 depth
Configuring the total transmit queue depth limit for FastIron X Series
devices
NOTE
To configure the total transmit queue depth limit on a third-generation module, refer to Buffer profile
configuration on page 44.
To set the total transmit queue depth limit on a port, enter a command such as the following.
device(config)#qd 2 2049
This command sets the queue depth limit on port 2 to 2049. Packets are added to the port's outbound
queue as long as the packets do not cause the port to exceed 2048 buffers. If the port reaches its
queue depth limit of 2049, any new packets attempting to enter the port transmit queue will be dropped
until at least one buffer is freed.
Syntax: qd port limit
The limit variable can be a value from 0 through 4095. Table 6 on page 42 lists the default values.
Configuring the transmit queue depth limit for a given traffic class on
FastIron X Series devices
NOTE
To configure transmit queue depth limits for an SX-FI48GPP module, refer to Buffer profile configuration
on page 44.
To set the transmit queue depth limit on a port for a given traffic class, first enter the transmit queue
depth limit for the traffic class, and then specify the traffic class.
device(config)#qd 2 200 7
This command sets the queue depth limit on port 2 to 200 for packets with a traffic class of 7. Packets
with priority 7 are added to the outbound queue on port 2 as long as the packets do not exceed 199
buffers. When the port reaches its queue depth limit of 200, packets with the given traffic class will be
dropped.
Syntax: qd port limit traffic-class
The limit variable can be a value from 0 through 4095 and cannot exceed the total transmit queue depth
limit configured for the port. Table 6 on page 42 lists the default values.
The sum of the queue depth limits for individual traffic classes on a port does not need to equal the total
queue depth limit for the port:
• If the sum of the individual traffic class queue depth limits exceeds the total port limit and the total
port limit is reached, any buffer that gets released can be used by any traffic class queue that has
not reached its individual limit.
• If the sum of the individual traffic class queue depth limits is less than the total port limit, the
remaining buffers can be used only by packets with a priority of 7.
The traffic-class variable can be a value from 0 through 7, where 7 is the highest priority queue.
device(config)#buffer-sharing-full
Syntax: [no] buffer-sharing-full
The buffer-sharing-full command sets the total transmit queue depth limit and the transmit queue
depth limits for each Traffic Class to 4095 for all ports of the device. The command overrides any
existing individually configured queue depth limits.
ATTENTION
The buffer-sharing-full command should be used carefully. By entering this command, there is no
limit on the number of buffers a port or a specific priority on a port can use. One port could potentially
use up all the available buffers of its port region and cause starvation on other ports of the port region.
NOTE
In the case of SX-FI48GPP module, the queue depth configured using the qd command is not
applicable when the port is set to speeds lower than 1Gbps. The qd command is applicable only when
the port is set to speeds greater than 1Gbps.
Because port 1/1 is associated with buffer profile 2, this command sets the queue depth limit for
buffer profile 2 to 1000. Packets are added to the outbound queue of a port as long as the packets
do not cause the port to exceed 1000 buffers. If the port reaches its queue depth limit of 1000, any
new packets attempting to enter the transmit queue will be dropped until at least one buffer is freed.
Syntax: [no] qd slotnum/portnum limit
The limit variable can be a value from 0 through 4095. The default is 4095.
3. If desired, configure the queue depth limit for a given traffic class. For example, to change the
queue depth limit for buffer profile 2 to 300 for packets with a traffic class of 1, enter the following
command.
device(config)#show configuration
qd 1/1 profile-id 2
qd 1/2 profile-id 2
!
qd 1/1 1000
qd 1/2 1000
qd 1/1 300 1
qd 1/2 300 1
Syntax: show configuration
NOTE
The SX-FI48GPP Interface module supports 48 tri-speed (10/100/1000) ports. When the ports are
configured at lower speeds, for example 100 Mbps or 10 Mbps, the maximum queue depth is less than
256 when egress congestion occurs at the front-end Network Processor (NP) of the SX-FI48GPP
module. If egress congestion occurs at the back-end NP of the SX-FI48GPP module, the maximum
queue depth is 4095. The limit for buffer sharing is 4088.
Configuring buffer profiles with qd-descriptor and qd-buffer commands on FCX and ICX
devices
The 48-port Brocade stackable switch has two packet processors. The 24-port Brocade stackable
switch has a single packet processor. For devices in a traditional stack, each stack unit has the
possibility of two packet processors, but the second processor for a 24-port stack unit cannot be
configured. The number of actual available packet processors depends on the type and number of
switches in the stack.
For example, for an 8-unit stack of 48 ports, the packet processor numbering scheme is as follows:
• Stack unit 1 - Packet processors 0 and 1
• Stack unit 2 - Packet processors 2 and 3
• Stack unit 3 - Packet processors 4 and 5
• Stack unit 4 - Packet processors 6 and 7
• Stack unit 5 - Packet processors 8 and 9
• Stack unit 6 - Packet processors 10 and 11
Configuration steps for buffer profile with qd-descriptor and qd-buffer commands on FCX and
ICX
The descriptor and buffer allocation process occurs in four sequential steps using the qd-buffer and
qd-descriptor commands.
NOTE
For FCX devices, when you reset buffer values for the 10 Gbps ports, the buffer values for the rear-
panel 10 Gbps and16 Gbps ports are also reset.
1. Configure the allowable port descriptors. Port descriptors set the limit for the ports. The minimum
limit for the port descriptors is 16. The maximum limit of the port descriptors depends on the
hardware device. Port descriptor limits of different platforms are listed in the section Buffer and
descriptor maximum and default allocation values on page 52. Configure the allowable port
descriptors by entering a command similar to the following.
device# qd-descriptor 1 2 76
Syntax: [no] qd-descriptor devicenum porttypeval numdescriptors
The devicenum variable refers to the device in the stacking unit. The device number starts from 0.
The porttypeval variable is 1 for 1 Gbps ports and 2 for 10 Gbps ports.
The numdescriptors variable refers to the number of descriptors to allocate.
2. Configure the queue descriptors. The minimum limit for queue descriptors is 16. The system default
queue descriptors for different platforms are listed in Buffer and descriptor maximum and default
allocation values on page 52. Configure the queue descriptors for the queue by entering a
command similar to the following.
device# qd-descriptor 1 2 76 2
Syntax: [no] qd-descriptor devicenum porttypeval numdescriptors priorityqueue
The devicenum variable refers to the device in the stacking unit. The device number starts from 0.
The porttypeval variable is 1 for 1 Gbps ports and 2 for 10 Gbps ports.
The numdescriptors variable refers to the number of descriptors to allocate.
The priorityqueue variable refers to the specific queue of the port from 0 through 7.
3. Configure the port buffers. The minimum limit for port buffers is 16. The maximum limit for the port
buffer depends on the hardware device. Port buffer limits of different platforms are listed in Buffer
and descriptor maximum and default allocation values on page 52. Configure the allowable
packet buffers by entering a command similar to the following.
device# qd-buffer 1 2 76
Syntax: [no] qd-buffer devicenum porttypeval numbuffers
The devicenum variable refers to the device in the stacking unit. The device number starts from 0.
The porttypeval variable is 1 for 1 Gbps ports and 2 for 10 Gbps ports.
device# qd-buffer 1 2 76 2
Syntax: [no] qd-buffer devicenum porttypeval numbuffers priorityqueue
The devicenum variable refers to the device in the stacking unit. The device number starts from 0.
The porttypeval variable is 1 for 1 Gbps ports and 2 for 10 Gbps ports.
The numbuffers variable refers to the number of buffers to allocate.
The priorityqueue variable refers to the specific queue of the port from 0 through 7.
qd-descriptor 0 1 4095
qd-descriptor 1 1 4095
qd-descriptor 2 1 4095
qd-descriptor 4 1 4095
qd-descriptor 5 1 4095
qd-descriptor 6 1 4095
qd-descriptor 0 2 4095
qd-descriptor 1 2 4095
qd-descriptor 2 2 4095
qd-descriptor 4 2 4095
qd-descriptor 5 2 4095
qd-descriptor 6 2 4095
qd-descriptor 0 1 4095 0
qd-descriptor 1 1 4095 0
qd-descriptor 2 1 4095 0
qd-descriptor 4 1 4095 0
qd-descriptor 5 1 4095 0
qd-descriptor 6 1 4095 0
qd-descriptor 0 2 4095 0
qd-descriptor 1 2 4095 0
qd-descriptor 2 2 4095 0
qd-descriptor 4 2 4095 0
qd-descriptor 5 2 4095 0
qd-descriptor 6 2 4095 0
qd-buffer 0 1 4095
qd-buffer 1 1 4095
qd-buffer 2 1 4095
qd-buffer 4 1 4095
qd-buffer 5 1 4095
qd-buffer 6 1 4095
qd-buffer 0 2 4095
qd-buffer 1 2 4095
qd-buffer 2 2 4095
qd-buffer 4 2 4095
qd-buffer 5 2 4095
qd-buffer 6 2 4095
qd-buffer 0 1 4095 0
qd-buffer 1 1 4095 0
qd-buffer 2 1 4095 0
qd-buffer 4 1 4095 0
qd-buffer 5 1 4095 0
qd-buffer 6 1 4095 0
qd-buffer 0 2 4095 0
qd-buffer 1 2 4095 0
qd-buffer 2 2 4095 0
qd-buffer 4 2 4095 0
qd-buffer 5 2 4095 0
qd-buffer 6 2 4095 0
NOTE
Buffer profiles can be configured for 10 Gbps and 1 Gbps ports, but not for ICX 6610 40 Gbps ports.
The 10 Gbps profile will apply to ICX 6430 and 6450 stacking ports, as well as FCX 16 Gbps stacking
ports.
NOTE
The no form of the command sets the profile port type to 1 Gbps.
Port type modification resets the profile to its default value. All the port and queue buffers and
descriptors will be set to either 1 Gbps or 10 Gbps defaults as per the configuration, which means
all the user configurations for the port and its queues will be lost.
NOTE
Port type modifications on an active profile are not allowed.
3. Configure the port buffers. Port buffer sets the maximum buffer limit for the ports. The maximum
limit depends on the hardware device. Port buffer limits of different platforms are listed in the
section Buffer and descriptor maximum and default allocation values on page 52. To configure
the port buffers for the user-configurable buffer profile named "profile1", enter the following
command at the profile configuration level.
The queue-num variable refers to the number of the queue of a port from 0 through 7.
The decimal variable refers to the number of descriptors.
NOTE
Values in the following tables are for software traffic classes (TCs) or QoS priority (qosp) levels.
NOTE
In FCX devices, the maximum buffer value that can be configured using the qd-buffer command is
7955.
1 Gbps buffers and descriptors 10 Gbps buffers and 40 Gbps buffers and
descriptors descriptors
TC1 32 48 64
TC2 32 48 64
TC3 32 48 64
TC4 32 48 64
TC5 64 96 144
TC6 64 96 144
TC7 64 96 144
TC2 96 NA 96 NA
TC3 96 NA 96 NA
TC4 96 NA 96 NA
Displaying the user-configurable buffer profile configuration on FCX and ICX devices
To display the specified user-configurable buffer profile configuration, use the show qd-buffer-profile
user-profile-name command.
To display all the user-configurable buffer profiles configured on the device, use the show qd-buffer-
profile active-profile command.
To display all the buffer profiles configured on the device, use the show qd-buffer-profile all command.
The following example shows that the user-configurable buffer profile "OneGigProfile" is configured for
1 Gbps ports with the number of buffers and descriptors allocated to each queue. Note that buffers
and descriptors displayed in this example are not necessarily default values.
Traffic Class 1 50 38
Traffic Class 2 50 38
Traffic Class 3 50 38
Traffic Class 4 50 38
Traffic Class 5 50 38
Traffic Class 6 132 132
Traffic Class 7 20 20
Syntax: show qd-buffer user-profile-name | all
The following table defines the fields in the output of the show qd-buffer all command.
Field Description
device(config)# qd-share-level 2
Syntax: qd-share-level level
The level variable is the buffer sharing level, which is a decimal valu levele. The range of valid values
for FCX is from 1 to 8. The range of valid values for an ICX 6610 is from 2 through 8.
For descriptions of the buffer sharing levels for FCX devices, refer to FCX buffer sharing levels on page
56.
For descriptions of the buffer sharing levels for ICX 6610 devices, refer to ICX 6610 buffer sharing
levels on page 56.
For descriptions of the buffer sharing levels for ICX 6430 and 6450 devices, refer to ICX 6430 and ICX
6450 buffer sharing levels on page 57.
Buffer sharing level Shared buffer limit (in buffers) Shared buffer total (in kilobytes)
1 256 64
2 1024 250
3 1536 375
4 2048 500
6 3072 750
7 3584 875
8 4096 1000
Buffer sharing level Shared buffer limit Shared buffer total (in Pool 0 sharing buffers (in
kilobytes) kilobytes)
1 Not supported
TABLE 14 ICX 6430 and ICX 6450 buffer sharing level definitions
Buffer sharing level Shared buffer limit (in buffers) Shared buffer total (in kilobytes)
1 256 64
3 1536 375
4 2048 500
5 2560 625
6 3072 750
7 3584 875
8 4096 1000
device(config)# buffer-sharing-full
Syntax: [no] buffer-sharing-full
The command overrides any existing configured queue depth limits and buffer allocation.
ATTENTION
Use the buffer-sharing-full command carefully. By entering this command, there is no limit to the
number of buffers a port or a specific priority on a port can use. One port could potentially use up all the
available buffers of its port region and cause starvation on other ports of the port region.
To prevent traffic loss during temporary network bursts, it is recommended that you use guaranteed
(port, queue) buffers allocation or shared buffer allocation to adjust queue depth, rather than enabling
the buffer-sharing-full command.
NOTE
The buffer-sharing-full command can create unpredictable behavior during traffic congestion or a
blocking scenario, compromising network stability (by losing control packets), QoS, and stacking.
NOTE
Configuring buffer profiles for VoIP traffic is not supported on FastIron X Series and ICX 6650 devices.
Default buffer settings are currently optimized for 1 GbE-to-1 GbE traffic. Configuring VoIP buffer
profiles adds buffer profiles for 1 GbE-to-100 Mbit traffic, simplifying configuration and improving
performance.
VoIP profiles allows you to configure a pre-defined set of buffers and descriptors for the priority 0 and 7.
These profiles support VoIP traffic that uses priority 7, with 10 Mbps or 100 Mbps uplink ports and 1000
Mbps downlink ports.
NOTE
In previous software versions, you could manually configure buffers and descriptors using qd
commands. Buffer profiles for VoIP cannot coexist with qd commands. You may use buffer profiles for
VoIP or qd command, but not both at the same time.
NOTE
The port-region num can be either 0 (ports 0/1/1 to 0/1/24) or 1 (ports 0/1/25 to 0/1/48).
NOTE
FCX and ICX models (except ICX 6650) do support this command.
Buffer and descriptor maximum and default allocation values for ICX
6650
The table below lists the maximum and default buffers and descriptors values of a port and its queues
on Brocade ICX 6650. Values in the following tables are for software traffic classes (TCs) or QoS
priority (qosp) levels.
TC1 32 48 64
TC2 32 48 64
TC3 32 48 64
TC4 32 48 64
TC5 64 96 144
TC6 64 96 144
TC7 64 96 144
NOTE
Remote fault notification (RFN) is only available for 1 Gbps Ethernet Fiber ports. It is not available for
10/100 ports and Gbps Ethernet Copper ports. This feature is not available on ICX 6430and ICX 6450
devices.
For fiber-optic connections, you can optionally configure a transmit port to notify the receive port on the
remote device whenever the transmit port becomes disabled.
When you enable this feature, the transmit port notifies the remote port whenever the fiber cable is
either physically disconnected or has failed. When this occurs and the feature is enabled, the device
disables the link and turns OFF both LEDs associated with the ports.
device(config)#interface e 0/1/1
device(config-if-e1000-0/1/1)#gig-default neg-off
To re-enable RFN, use the following command.
device(config)#interface e 0/1/1
device(config-if-e1000-0/1/1)#gig-default auto-gig
Syntax: gig-default { neg-off | auto-gig }
For more information about the parameters supported with the gig-default command, see "Changing
the Gbps fiber negotiation mode" section in the FastIron Ethernet Switch Administration Guide .
NOTE
Enable LFS on any device prior to connecting that device with FastIron platforms. Any connecting
device must have LFS currently enabled to ensure interoperability.
When LFS is enabled on an interface, the following Syslog messages are generated when the link
goes up or down, or when the TX or RX fiber is removed from one or both sides of the link that has
LFS enabled.
device(config)#interface e 1/1
device(config-if-e1000-1/1)#link-fault-signal
Syntax: [no] link-fault-signal
Use the no form of the command to disable LFS.
Brocade ICX 6650 devices support Layer 2 jumbo frames on 10/100, 100/100/1000, 40GbE and
10GbE ports. Conventionally, jumbo frames can carry up to 9,000 bytes MTU. In cut-through mode, in
jumbo mode, the MTU is 10200 which uses 20 buffers. In non-jumbo mode MTU is 1522 which uses 3
buffers.
NOTE
It is recommended to use Packet InError Detection only on required ports. If you enable this on a large
number of ports in a device and use a very short sampling interval, it may lead to heavy CPU usage.
NOTE
The inError count configured on the primary port of a LAG is inherited by other member ports of the
LAG. However, the LAG ports are individually sampled for inError packets. Therefore, inError packets
on a port disable only that port and not the entire LAG.
NOTE
Executing commands that clear the packet counters, such as the clear statistics command may
interfere with the proper functioning of Packet InError Detection because these commands reset the
inError packet count.
Commands
errdisable packet-inerror-detect
Enables the device to monitor configured ports for inError packets and defines the sampling time
interval in which the number of inError packets is counted. The no form of this command disables this
monitoring.
Command Default There is no monitoring for inError packets on any port of the device.
Parameters sampling-interval
Specifies the sampling interval in seconds. It can take a value in the inclusive range of 2 to
60 seconds.
Usage Guidelines If the number of inError packets exceeds the configured threshold for two consecutive sampling
windows, then the configured port is error-disabled.
Examples The following example shows the sampling interval set to three seconds.
Brocade(config)# errdisable packet-inerror-detect interval 3
packet-inerror-detect
Enables the monitoring of a port for inError packets and defines the maximum number of inError
packets that is allowed for the port in the configured sampling interval. The no form of this command
disables the monitoring of a port for inError packets.
no packet-inerror-detect inError-count
Command Default The Packet InError Detect feature is disabled for the port.
Parameters inError-count
Specifies the maximum number of inError packets that is allowed for a port in the configured
sampling interval. The value can range from 10 to 4294967295.
Usage Guidelines If the number of inError packets received at the port exceeds this value for two consecutive sampling
windows, then the port is set to the error-disabled state.
NOTE
This command enables the monitoring for inError packets on the port only if you have run the
errdisable packet-inerror-detect command in global configuration mode to enable this monitoring
globally for the device.
Examples The following example shows the maximum number of allowed inError packets for a port set to the
value 10.
Brocade(config)# interface ethernet 1/1/1
Brocade(config-if-e1000-1/1/1)# packet-inerror-detect 10
show packet-inerror-detect
Displays details related to the monitoring for inError packets for configured ports.
Usage Guidelines You can use this show command to view details related to the monitoring for inError packets for
configured ports.
Command Output The show packet-inerror-detect command displays the following information:
Packet inError count The number of inError packets received in the sampling interval for the
specific port.
Examples The following example shows the output for this command.
Brocade# show packet-inerror-detect
NOTE
MRP and VSRP are not supported on ICX 6430-C devices.
Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800
FSX 1600
Metro Ring Protocol 1 (MRP 1) 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
Metro Ring Protocol 2 (MRP 2) 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
Extended MRP ring IDs from 1 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
through 1023
Virtual Switch Redundancy Protocol 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
(VSRP)
VSRP and MRP signaling 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
Topology groups
A topology group is a named set of VLANs that share a Layer 2 topology. Topology groups simplify
configuration and enhance scalability of Layer 2 protocols by allowing you to run a single instance of a
Layer 2 protocol on multiple VLANs.
You can use topology groups with the following Layer 2 protocols:
• STP/RSTP
• MRP
• VSRP
• 802.1W
Topology groups simplify Layer 2 configuration and provide scalability by enabling you to use the
same instance of a Layer 2 protocol for multiple VLANs. For example, if a Brocade device is deployed
in a Metro network and provides forwarding for two MRP rings that each contain 128 VLANs, you can
configure a topology group for each ring. If a link failure in a ring causes a topology change, the
change is applied to all the VLANs in the ring topology group. Without topology groups, you would
need to configure a separate ring for each VLAN.
NOTE
Since free ports are not controlled by the master port Layer 2 protocol, they are assumed to always be
in the Forwarding state.
device(config)#topology-group 2
device(config-topo-group-2)#master-vlan 2
device(config-topo-group-2)#member-vlan 3
device(config-topo-group-2)#member-vlan 4
device(config-topo-group-2)#member-vlan 5
device(config-topo-group-2)#member-group 2
These commands create topology group 2 and add the following:
• Master VLAN 2
• Member VLANs 2, 3, and 4
• Member VLAN group 2
Syntax: [no] topology-group group-id
The group-id parameter specifies the topology group ID and can be from 1 - 256.
Syntax: [no] master-vlan vlan-id
This command adds the master VLAN. The VLAN must already be configured. Make sure all the Layer
2 protocol settings in the VLAN are correct for your configuration before you add the VLAN to the
topology group. A topology group can have only one master VLAN.
NOTE
When removing the master VLAN from the topology group, spanning tree is disabled on the master
VLAN.
NOTE
If you remove the master VLAN (by entering no master-vlan vlan-id ), the software selects the new
master VLAN from member VLANs. For example, if you remove master VLAN 2 from the example
above, the CLI converts member VLAN 3 into the new master VLAN. The new master VLAN inherits the
Layer 2 protocol settings of the older master VLAN.
NOTE
If you add a new master VLAN to a topology group that already has a master VLAN, the new master
VLAN replaces the older master VLAN. All member VLANs and VLAN groups follow the Layer 2
protocol settings of the new master VLAN.
Syntax: [no] member-vlan vlan-id
The vlan-id parameter specifies a VLAN ID. The VLAN must already be configured.
Syntax: [no] member-group num
The num specifies a VLAN group ID. The VLAN group must already be configured.
NOTE
Once you add a VLAN or VLAN group as a member of a topology group, all the Layer 2 protocol
configuration information for the VLAN or group is deleted. For example, if STP is configured on a
VLAN and you add the VLAN to a topology group, the STP configuration is removed from the VLAN.
Once you add the VLAN to a topology group, the VLAN uses the Layer 2 protocol settings of the
master VLAN. If you remove a member VLAN or VLAN group from a topology group, you will need to
reconfigure the Layer 2 protocol information in the VLAN or VLAN group.
device#show topology-group
Topology Group 3
=================
master-vlan 2
member-vlan none
Common control ports L2 protocol
ethernet 1/1 MRP
ethernet 1/2 MRP
ethernet 1/5 VSRP
ethernet 2/22 VSRP
Per vlan free ports
ethernet 2/3 Vlan 2
Field Description
master-vlan The master VLAN for the topology group. The settings for STP, MRP, or VSRP on the
control ports in the master VLAN apply to all control ports in the member VLANs within the
topology group.
Common control ports The master VLAN ports that are configured with Layer 2 protocol information. The Layer 2
protocol configuration and state of these ports in the master VLAN applies to the same port
numbers in all the member VLANs.
L2 protocol The Layer 2 protocol configured on the control ports. The Layer 2 protocol can be one of
the following:
• MRP
• STP
• VSRP
Per vlan free ports The ports that are not controlled by the Layer 2 protocol information in the master VLAN.
NOTE
MRP portocol is not supported on the Brocade ICX-6430-C devices.
The ring in this example consists of four MRP nodes (Brocade switches). Each node has two
interfaces with the ring. Each node also is connected to a separate customer network. The nodes
forward Layer 2 traffic to and from the customer networks through the ring. The ring interfaces are all
in one port-based VLAN. Each customer interface can be in the same VLAN as the ring or in a
separate VLAN.
One node is configured as the master node of the MRP ring. One of the two interfaces on the master
node is configured as the primary interface; the other is the secondary interface. The primary interface
originates Ring Health Packets (RHPs), which are used to monitor the health of the ring. An RHP is
forwarded on the ring to the next interface until it reaches the secondary interface of the master node.
The secondary interface blocks the packet to prevent a Layer 2 loops.
Also, when you configure an MRP ring, any node on the ring can be designated as the master node
for the ring. A master node can be the master node of more than one ring. (Refer to Figure 2 on page
76.) Each ring is an independent ring and RHP packets are processed within each ring.
In this example, two nodes are each configured with two MRP rings. Any node in a ring can be the
master for its ring. A node also can be the master for more than one ring.
FIGURE 3 Examples of multiple rings sharing the same interface - MRP Phase 2
On each node that will participate in the ring, you specify the ring ID and the interfaces that will be used
for ring traffic. In a multiple ring configuration, a ring ID determines its priority. The lower the ring ID, the
higher priority of a ring.
For example, in Figure 4 on page 78, the ID of all interfaces on all nodes on Ring 1 is 1 and all
interfaces on all nodes on Ring 2 is 2. Port 1/1 on node S1 and Port 2/2 on S2 have the IDs of 1 and 2
since the interfaces are shared by Rings 1 and 2.
The ring ID is also used to determine an interface priority. Generally, a ring ID is also the ring priority
and the priority of all interfaces on that ring. However, if the interface is shared by two or more rings,
then the highest priority (lowest ID) becomes the priority of the interface. For example, in Figure 4 on
page 78, all interfaces on Ring 1, except for Port 1/1 on node S1 and Port 2/2 on node S2 have a
priority of 1. Likewise, all interfaces on Ring 2, except for Port 1/1 on node S1 and Port 2/2 on node S2
have a priority of 2. Port 1/1 on S1 and Port 2/2 on S2 have a priority of 1 since 1 is the highest priority
(lowest ID) of the rings that share the interface.
If a node has interfaces that have different IDs, the interfaces that belong to the ring with the highest
priority become regular ports. Those interfaces that do not belong to the ring with the highest priority
become tunnel ports. In Figure 4 on page 78, nodes S1 and S2 have interfaces that belong to Rings 1
and 2. Those interfaces with a priority of 1 are regular ports. The interfaces with a priority of 2 are the
tunnel ports since they belong to Ring 2, which has a lower priority than Ring 1.
In Figure 4 on page 78, any of the nodes on Ring 1, even S1 or S2, can be a master node since none of
its interfaces are tunnel ports. However in Ring 2, neither S1 nor S2 can be a master node since these
nodes contain tunnel ports.
Ring initialization
The ring shown in Figure 1 on page 74 shows the port states in a fully initialized ring without any broken
links. Figure 5 on page 79 shows the initial state of the ring, when MRP is first enabled on the ring
switches. All ring interfaces on the master node and member nodes begin in the Preforwarding state
(PF).
MRP uses Ring Health Packets (RHPs) to monitor the health of the ring. An RHP is an MRP protocol
packet. The source address is the MAC address of the master node and the destination MAC address
is a protocol address for MRP. The Master node generates RHPs and sends them on the ring. The
state of a ring port depends on the RHPs.
Each RHP also has a sequence number. MRP can use the sequence number to determine the round-
trip time for RHPs in the ring. Refer to Metro Ring Protocol diagnostics on page 88.
Port 2/1 on Ring 1 master node is the primary interface of the master node. The primary interface
forwards an RHP packet on the ring. Since all the interfaces on Ring 1 are regular ports, the RHP
packet is forwarded to all the interfaces until it reaches Port 2/2, the secondary interface of the master
node. Port 2/2 then blocks the packet to complete the process.
On Ring 2, Port 3/1, is the primary interface of the master node. It sends an RHP packet on the ring.
Since all ports on S4 are regular ports, the RHP packet is forwarded on those interfaces. When the
packet reaches S2, the receiving interface is a tunnel port. The port compares the packet priority to its
priority. Since the packet priority is the same as the tunnel port priority, the packet is forwarded up the
link shared by Rings 1 and 2.
When the RHP packet reaches the interface on node S2 shared by Rings 1 and 2, the packet is
forwarded since its priority is less than the interface priority. The packet continues to be forwarded to
node S1 until it reaches the tunnel port on S1. That tunnel port determines that the RHP packet priority
is equal to the port priority and forwards the packet. The RHP packet is forwarded to the remaining
interfaces on Ring 2 until it reaches port 3/2, the secondary interface of the master node. Port 3/2 then
blocks the packet to prevent a loop.
When the RHP packet from Ring 2 reached S2, it was also forwarded from S2 to S3 on Ring 1 since
the port on S2 has a higher priority than the RHP packet. The packets is forwarded around Ring 1 until
it reaches port 2/2, Ring 1 the secondary port. The RHP packet is then blocked by that port.
If a break in the ring occurs, MRP heals the ring by changing the states of some of the ring interfaces:
• Blocking interface - The Blocking interface on the Master node has a dead timer. If the dead time
expires before the interface receives one of its ring RHPs, the interface changes state to
Preforwarding. Once the secondary interface changes state to Preforwarding:
‐ If the interface receives an RHP, the interface changes back to the Blocking state and
resets the dead timer.
‐ If the interface does not receive an RHP for its ring before the Preforwarding time expires,
the interface changes to the Forwarding state, as shown in Figure 8 on page 83.
• Forwarding interfaces - Each member interface remains in the Forwarding state.
When the broken link is repaired, the link interfaces come up in the Preforwarding state, which allows
RHPs to travel through the restored interfaces and reach the secondary interface on the Master node:
• If an RHP reaches the Master node secondary interface, the ring is intact. The secondary
interface changes to Blocking. The Master node sets the forwarding bit on in the next RHP. When
the restored interfaces receive this RHP, they immediately change state to Forwarding.
• If an RHP does not reach the Master node secondary interface, the ring is still broken. The Master
node does not send an RHP with the forwarding bit on. In this case, the restored interfaces
remain in the Preforwarding state until the preforwarding timer expires, then change to the
Forwarding state.
If the link between shared interfaces breaks (Figure 9 on page 84), the secondary interface on Ring
1 master node changes to a preforwarding state. The RHP packet sent by port 3/1 on Ring 2 is
forwarded through the interfaces on S4, then to S2. The packet is then forwarded through S2 to S3,
but not from S2 to S1 since the link between the two nodes is not available. When the packet reaches
Ring 1 master node, the packet is forwarded through the secondary interface since it is currently in a
preforwarding state. A secondary interface in preforwarding mode ignores any RHP packet that is not
from its ring. The secondary interface changes to blocking mode only when the RHP packet forwarded
by its primary interface is returned.
The packet then continues around Ring 1, through the interfaces on S1 to Ring 2 until it reaches Ring
2 master node. Port 3/2, the secondary interface on Ring 2 changes to blocking mode since it received
its own packet, then blocks the packet to prevent a loop.
FIGURE 9 Flow of RHP packets when a link for shared interfaces breaks
RHP packets follow this flow until the link is restored; then the RHP packet returns to it normal flow as
shown in Figure 7 on page 82.
Notice that each customer has their own VLAN. Customer A has VLAN 30 and Customer B has VLAN
40. Customer A host attached to Switch D can reach the Customer A host attached to Switch B at Layer
2 through the ring. Since Customer A and Customer B are on different VLANs, they will not receive
each other traffic.
You can configure MRP separately on each customer VLAN. However, this is impractical if you have
many customers. To simplify configuration when you have a lot of customers (and therefore a lot of
VLANs), you can use a topology group.
A topology group enables you to control forwarding in multiple VLANs using a single instance of a Layer
2 protocol such as MRP. A topology group contains a master VLAN and member VLANs. The master
VLAN contains all the configuration parameters for the Layer 2 protocol (STP, MRP, or VSRP). The
member VLANs use the Layer 2 configuration of the master VLAN.
In Figure 10 on page 85, VLAN 2 is the master VLAN and contains the MRP configuration parameters
for ring 1. VLAN 30 and VLAN 40, the customer VLANs, are member VLANs in the topology group.
Since a topology group is used, a single instance of MRP provides redundancy and loop prevention for
both the customer VLANs.
If you use a topology group:
• The master VLAN must contain the ring interfaces. The ports must be tagged, since they will be
shared by multiple VLANs.
• The member VLAN for a customer must contain the two ring interfaces and the interfaces for the
customer. Since these interfaces are shared with the master VLAN, they must be tagged. Do not
add another customer interfaces to the VLAN.
For more information about topology groups, refer to Topology groups on page 69.
Refer to MRP CLI example on page 93 for the configuration commands required to implement the
MRP configuration shown in Figure 10 on page 85.
NOTE
There are no new commands or parameters to configure MRP with shared interfaces (MRP Phase 2).
• Disable one of the ring interfaces. This prevents a Layer 2 loop from occurring while you are
configuring the devices for MRP.
• Add an MRP ring to a port-based VLAN. When you add a ring, the CLI changes to the
configuration level for the ring, where you can perform the following tasks.
‐ Optionally, specify a name for the ring.
‐ On the master node only, enable the device to be the master for the ring. Each ring can
have only one master node.
‐ Specify the MRP interfaces. Each device has two interfaces to an MRP ring.
‐ Optionally, change the hello time and the preforwarding time. These parameters control
how quickly failover occurs following a change in the state of a link in the ring.
‐ Enable the ring.
• Optionally, add the ring VLAN to a topology group to add more VLANs to the ring. If you use a
topology group, make sure you configure MRP on the group master VLAN. Refer to Topology
groups on page 69.
• Re-enable the interface you disabled to prevent a Layer 2 loop. Once MRP is enabled, MRP will
prevent the Layer 2 loop.
• On FCX devices, when configuring MRP-1 or MRP-2 rings on a VLAN, using the metro-rings
command in addition to the metro-ring command is highly recommended. Since these devices do
not support mac-range filtering, the metro-rings command greatly reduces the number of FDB
entries.
NOTE
If you plan to use a topology group to add VLANs to the ring, make sure you configure MRP on the
topology group master VLAN.
device(config)#vlan 2
device(config-vlan-2)#metro-ring 1
device(config-vlan-2-mrp-1)#name CustomerA
device(config-vlan-2-mrp-1)#master
device(config-vlan-2-mrp-1)#ring-interface ethernet 1/1 ethernet 1/2
device(config-vlan-2-mrp-1)#enable
These commands configure an MRP ring on VLAN 2. The ring ID is 1, the ring name is CustomerA, and
this node (this Brocade device) is the master for the ring. The ring interfaces are 1/1 and 1/2. Interface
1/1 is the primary interface and 1/2 is the secondary interface. The primary interface will initiate RHPs
by default. The ring takes effect in VLAN 2.
device(config)#vlan 2
device(config-vlan-2)#metro-ring 1
device(config-vlan-2-mrp-1)#name CustomerA
device(config-vlan-2-mrp-1)#ring-interface ethernet 1/1 ethernet 1/2
device(config-vlan-2-mrp-1)#enable
device(config-vlan-2-mrp-1)#metro-ring 2
device(config-vlan-2-mrp-2)#name CustomerB
device(config-vlan-2-mrp-2)#ring-interface ethernet 1/1 ethernet 1/2
device(config-vlan-2-mrp-2)#enable
Syntax: [no] metro-ring ring id
The ring-id parameter specifies the ring ID. The ring-id can be from 1 - 1023; ID 256 is reserved for
VSRP.
On FCX and ICX devices, enter the metro-rings in addition to the metro-ring command as shown
below.
device(config)#vlan 2
device(config-vlan-2)#metro-rings 1 2
device(config-vlan-2)#metro-ring 1
device(config-vlan-2-mrp-1)#name CustomerA
device(config-vlan-2-mrp-1)#ring-interface ethernet 1/1 ethernet 1/2
device(config-vlan-2-mrp-1)#enable
device(config-vlan-2-mrp-1)#metro-ring 2
device(config-vlan-2-mrp-2)#name CustomerB
device(config-vlan-2-mrp-2)#ring-interface ethernet 1/1 ethernet 1/2
device(config-vlan-2-mrp-2)#enable
Syntax: [no] metro-rings ringid ringid . ..
The ring id variables identify the metro rings you want to configure on the VLAN.
Syntax: [no] name string
The string parameter specifies a name for the ring. The name is optional, but it can be up to 20
characters long and can include blank spaces. If you use a name that has blank spaces, enclose the
name in double quotation marks (for example: "Customer A").
Syntax: [no] master
Configures this node as the master node for the ring. Enter this command only on one node in the ring.
The node is a member (non-master) node by default.
Syntax: [no] ring-interface ethernet primary-if ethernet secondary-if
The ethernet primary-if parameter specifies the primary interface. On the master node, the primary
interface is the one that originates RHPs. Ring control traffic and Layer 2 data traffic will flow in the
outward direction from this interface by default. On member nodes, the direction of traffic flow depends
on the traffic direction selected by the master node. Therefore, on a member node, the order in which
you enter the interfaces does not matter.
The ethernet secondary-if parameter specifies the secondary interface.
NOTE
To take advantage of every interface in a Metro network, you can configure another MRP ring and
either configure a different Master node for the ring or reverse the configuration of the primary and
secondary interfaces on the Master node. Configuring multiple rings enables you to use all the ports in
the ring. The same port can forward traffic one ring while blocking traffic for another ring.
Syntax: [no] enable
The enable command enables the ring.
device(config-vlan-2-mrp-1)#hello-time 200
device(config-vlan-2-mrp-1)#preforwarding-time 400
These commands change the hello time to 200 ms and change the preforwarding time to 400 ms.
Syntax: [no] hello-time ms
Syntax: [no] preforwarding-time ms
The ms specifies the number of milliseconds. For the hello time, you can specify from 100 - 1000 (one
second). The default hello time is 100 ms. The preforwarding time can be from 200 - 5000 ms, but
must be at least twice the value of the hello time and must be a multiple of the hello time. The default
preforwarding time is 300 ms. A change to the hello time or preforwarding time takes effect as soon as
you enter the command.
device(config-vlan-2-mrp-1)#diagnostics
Syntax: [no] diagnostics
NOTE
This command is valid only on the master node.
Field Description
RHP average time The average round-trip time for an RHP packet on the ring. The calculated time has
a granularity of 1 microsecond.
Recommended hello time The hello time recommended by the software based on the RHP average round-trip
time.
Recommended Prefwing time The preforwarding time recommended by the software based on the RHP average
round-trip time.
Diag frame sent The number of diagnostic RHPs sent for the test.
Diag frame lost The number of diagnostic RHPs lost during the test.
If the recommended hello time and preforwarding time are different from the actual settings and you
want to change them, refer to Metro Ring Protocol configuration on page 86.
device#show metro
Metro Ring 1
=============
Ring State Ring Master Topo Hello Prefwing
id role vlan group time(ms) time(ms)
2 enabled member 2 not conf 100 300
Ring interfaces Interface role Forwarding state Active
interface Interface Type
ethernet 1/1 primary disabled
none Regular
ethernet 1/2 secondary forwarding ethernet
2 Tunnel
RHPs sent RHPs rcvd TC RHPs rcvd State changes
3 0 0 4
Syntax: show metro [ ring-id ]
This display shows the following information.
Field Description
State The state of MRP. The state can be one of the following:
Ring role Whether this node is the master for the ring. The role can be one of the following:
• master
• member
Field Description
Master vlan The ID of the master VLAN in the topology group used by this ring. If a topology group is used
by MRP, the master VLAN controls the MRP settings for all VLANs in the topology group.
NOTE
The topology group ID is 0 if the MRP VLAN is not the master VLAN in a topology group. Using
a topology group for MRP configuration is optional.
Hello time The interval, in milliseconds, at which the Forwarding port on the ring master node sends Ring
Hello Packets (RHPs).
Prefwing time The number of milliseconds an MRP interface that has entered the Preforwarding state will wait
before changing to the Forwarding state.
If a member port in the Preforwarding state does not receive an RHP within the Preforwarding
time (Prefwing time), the port assumes that a topology change has occurred and changes to
the Forwarding state.
The secondary port on the Master node changes to Blocking if it receives an RHP, but changes
to Forwarding if the port does not receive an RHP before the preforwarding time expires.
NOTE
A member node Preforwarding interface also changes from Preforwarding to Forwarding if it
receives an RHP whose forwarding bit is on.
NOTE
If the interfaces are trunk groups, only the primary ports of the groups are listed.
• primary
Field Description
Forwarding state Whether MRP Forwarding is enabled on the interface. The forwarding state can be one of the
following:
Active interface The physical interfaces that are sending and receiving RHPs.
NOTE
If a port is disabled, its state is shown as "disabled".
NOTE
If an interface is a trunk group, only the primary port of the group is listed.
NOTE
This field applies only to the master node. On non-master nodes, this field contains 0. This is
because the RHPs are forwarded in hardware on the non-master nodes.
NOTE
On most Brocade devices, this field applies only to the master node. On non-master nodes,
this field contains 0. This is because the RHPs are forwarded in hardware on the non-master
nodes. However, on the FastIron devices, the RHP received counter on non-master MRP
nodes increment. This is because, on FastIron devices, the CPU receives a copy of the RHPs
forwarded in hardware.
TC RHPs rcvd The number of Topology Change RHPs received on the interface. A Topology Change RHP
indicates that the ring topology has changed.
State changes The number of MRP interface state changes that have occurred. The state can be one of the
states listed in the Forwarding state field.
NOTE
For simplicity, the figure shows the VLANs on only two switches. The CLI examples implement the ring
on all four switches.
device(config)#vlan 2
device(config-vlan-2)#tag ethernet 1/1 to 1/2
device(config-vlan-2)#metro-ring 1
device(config-vlan-2-mrp-1)#name "Metro A"
device(config-vlan-2-mrp-1)#master
device(config-vlan-2-mrp-1)#ring-interface ethernet 1/1 ethernet 1/2
device(config-vlan-2-mrp-1)#enable
device(config-vlan-2-mrp-1)#exit
device(config-vlan-2)#exit
The following commands configure the customer VLANs. The customer VLANs must contain both the
ring interfaces as well as the customer interfaces.
device(config)#vlan 30
device(config-vlan-30)#tag ethernet 1/1 to 1/2
device(config-vlan-30)#tag ethernet 2/1
device(config-vlan-30)#exit
device(config)#vlan 40
device(config-vlan-40)#tag ethernet 1/1 to 1/2
device(config-vlan-40)#tag ethernet 4/1
device(config-vlan-40)#exit
The following commands configure topology group 1 on VLAN 2. The master VLAN is the one that
contains the MRP configuration. The member VLANs use the MRP parameters of the master VLAN.
The control interfaces (the ones shared by the master VLAN and member VLAN) also share MRP state.
device(config)#topology-group 1
device(config-topo-group-1)#master-vlan 2
device(config-topo-group-1)#member-vlan 30
device(config-topo-group-1)#member-vlan 40
device(config)#vlan 2
device(config-vlan-2)#tag ethernet 1/1 to 1/2
device(config-vlan-2)#metro-ring 1
device(config-vlan-2-mrp-1)#name "Metro A"
device(config-vlan-2-mrp-1)#ring-interface ethernet 1/1 ethernet 1/2
device(config-vlan-2-mrp-1)#enable
device(config-vlan-2)#exit
device(config)#vlan 30
device(config-vlan-30)#tag ethernet 1/1 to 1/2
device(config-vlan-30)#tag ethernet 2/1
device(config-vlan-30)#exit
device(config)#vlan 40
device(config-vlan-40)#tag ethernet 1/1 to 1/2
device(config-vlan-40)#tag ethernet 4/1
device(config-vlan-40)#exit
device(config)#topology-group 1
device(config-topo-group-1)#master-vlan 2
device(config-topo-group-1)#member-vlan 30
device(config-topo-group-1)#member-vlan 40
device(config)#vlan 2
device(config-vlan-2)#tag ethernet 1/1 to 1/2
device(config-vlan-2)#metro-ring 1
device(config-vlan-2-mrp-1)#name "Metro A"
device(config-vlan-2-mrp-1)#ring-interface ethernet 1/1 ethernet 1/2
device(config-vlan-2-mrp-1)#enable
device(config-vlan-2)#exit
device(config)#vlan 30
device(config-vlan-30)#tag ethernet 1/1 to 1/2
device(config-vlan-30)#tag ethernet 2/1
device(config-vlan-30)#exit
device(config)#vlan 40
device(config-vlan-40)#tag ethernet 1/1 to 1/2
device(config-vlan-40)#tag ethernet 4/1
device(config-vlan-40)#exit
device(config)#topology-group 1
device(config-topo-group-1)#master-vlan 2
device(config-topo-group-1)#member-vlan 30
device(config-topo-group-1)#member-vlan 40
device(config)#vlan 2
device(config-vlan-2)#tag ethernet 1/1 to 1/2
device(config-vlan-2)#metro-ring 1
device(config-vlan-2-mrp-1)#name "Metro A"
device(config-vlan-2-mrp-1)#ring-interface ethernet 1/1 ethernet 1/2
device(config-vlan-2-mrp-1)#enable
device(config-vlan-2)#exit
device(config)#vlan 30
device(config-vlan-30)#tag ethernet 1/1 to 1/2
device(config-vlan-30)#tag ethernet 2/1
device(config-vlan-30)#exit
device(config)#vlan 40
device(config-vlan-40)#tag ethernet 1/1 to 1/2
device(config-vlan-40)#tag ethernet 4/1
device(config-vlan-40)#exit
device(config)#topology-group 1
device(config-topo-group-1)#master-vlan 2
device(config-topo-group-1)#member-vlan 30
device(config-topo-group-1)#member-vlan 40
VSRP
Virtual Switch Redundancy Protocol (VSRP) is a Brocade proprietary protocol that provides redundancy
and sub-second failover in Layer 2 and Layer 3 mesh topologies. Based on the Brocade Virtual Router
Redundancy Protocol Extended (VRRP-E), VSRP provides one or more backups for a Layer 2 Switch
or Layer 3 Switch. If the active Layer 2 Switch or Layer 3 Switch becomes unavailable, one of the
backups takes over as the active device and continues forwarding traffic for the network.
The FastIron family of switches support full VSRP as well as VSRP-awareness . A Brocade device that
is not itself configured for VSRP but is connected to a Brocade device that is configured for VSRP, is
VSRP aware .
NOTE
VSRP protocol is not supported on the Brocade ICX 6430-C devices. Only VSRP-awareness is
supported.
You can use VSRP for Layer 2, Layer 3, or for both layers. On Layer 3 Switches, Layer 2 and Layer 3
share the same VSRP configuration information. On Layer 2 Switches, VSRP applies only to Layer 2.
The following example shows an example of a VSRP configuration.
FIGURE 11 VSRP mesh - redundant paths for Layer 2 and Layer 3 traffic
In this example, two Brocade devices are configured as redundant paths for VRID 1. On each of the
devices, a Virtual Router ID (VRID) is configured on a port-based VLAN. Since VSRP is primarily a
Layer 2 redundancy protocol, the VRID applies to the entire VLAN. However, you can selectively
remove individual ports from the VRID if needed.
Following Master election (described below), one of the Brocade devices becomes the Master for the
VRID and sets the state of all the VLAN ports to Forwarding. The other device is a Backup and sets all
the ports in its VRID VLAN to Blocking.
If a failover occurs, the Backup becomes the new Master and changes all its VRID ports to the
Forwarding state.
NOTE
The link between VSRP Master and VSRP Backup is "optional" in Figure 11 on page 95. However, if
the VSRP-aware device is a Brocade FastIron family device, such as ICX 6610, FCX/SX/ ICX
6430/6450 and ICX 6650, this link is required and recommended. This is due to the need for
interoperability between devices of these two platforms having different default timers. The link
between the VSRP Master and Backup guarantees that the VSRP Hello message is flowing between
the VSRP Master and the VSRP Standby directly to cause VSRP transition instead of relying on
VSRP-Aware devices to forward and risk missing the VSRP Hello message.
Other Brocade devices can use the redundant paths provided by the VSRP devices. In this example,
three Brocade devices use the redundant paths. A Brocade device that is not itself configured for
VSRP but is connected to a Brocade device that is configured for VSRP, is VSRP aware . In this
example, the three Brocade devices connected to the VSRP devices are VSRP aware. A Brocade
device that is VSRP aware can failover its link to the new Master in sub-second time, by changing the
MAC address associated with the redundant path.
When you configure VSRP, make sure each of the non-VSRP Brocade devices connected to the
VSRP devices has a separate link to each of the VSRP devices.
NOTE
802.1Q-n-Q tagging and Aggregated VLANs are not supported on the Brocade ICX 6430-C devices.
• The VLAN supports IGMP snooping version 2 and version 3 when VSRP or VSRP-aware is
configured on a VLAN.
NOTE
If you want to provide Layer 3 redundancy only, disable VSRP and use VRRP-E.
VSRP failover
Each Backup listens for Hello messages from the Master. The Hello messages indicate that the Master
is still available. If the Backups stop receiving Hello messages from the Master, the election process
occurs again and the Backup with the highest priority becomes the new Master.
Each Backup waits for a specific period of time, the Dead Interval, to receive a new Hello message from
the Master. If the Backup does not receive a Hello message from the Master by the time the Dead
Interval expires, the Backup sends a Hello message of its own, which includes the Backup's VSRP
priority, to advertise the Backup's intent to become the Master. If there are multiple Backups for the
VRID, each Backup sends a Hello message.
When a Backup sends a Hello message announcing its intent to become the Master, the Backup also
starts a hold-down timer. During the hold-down time, the Backup listens for a Hello message with a
higher priority than its own.
• If the Backup receives a Hello message with a higher priority than its own, the Backup resets its
Dead Interval and returns to normal Backup status.
• If the Backup does not receive a Hello message with a higher priority than its own by the time the
hold-down timer expires, the Backup becomes the new Master and starts forwarding Layer 2 traffic
on all ports.
If you increase the timer scale value, each timer value is divided by the scale value. To achieve sub-
second failover times, you can change the scale to a value up to 10. This shortens all the VSRP timers
to 10 percent of their configured values.
Backups each have a configured priority of 100, and have three ports in VRID 1 in VLAN 10, each
Backup begins with an equal priority, 100. This is shown in the following figure.
However, if one of the VRID ports goes down on one of the Backups, that Backup priority is reduced. If
the Master priority is reduced enough to make the priority lower than a Backup priority, the VRID fails
over to the Backup. The following figure shows an example.
You can reduce the sensitivity of a VSRP device to failover by increasing its configured VSRP priority.
For example, you can increase the configured priority of the VSRP device on the left in Figure 13 on
page 98 to 150. In this case, failure of a single link does not cause failover. The link failure caused the
priority to be reduced to 100, which is still equal to the priority of the other device. This is shown in the
following figure.
Track ports
Optionally, you can configure track ports to be included during VSRP priority calculation. In VSRP, a
track port is a port that is not a member of the VRID VLAN, but whose state is nonetheless considered
when the priority is calculated. Typically, a track port represents the exit side of traffic received on the
VRID ports. By default, no track ports are configured.
When you configure a track port, you assign a priority value to the port. If the port goes down, VSRP
subtracts the track port priority value from the configured VSRP priority. For example, if the you
configure a track port with priority 20 and the configured VSRP priority is 100, the software subtracts 20
from 100 if the track port goes down, resulting in a VSRP priority of 80. The new priority value is used
when calculating the VSRP priority. The following figure shows an example.
In Figure 15 on page 100, the track port is up. SInce the port is up, the track priority does not affect the
VSRP priority calculation. If the track port goes down, the track priority does affect VSRP priority
calculation, as shown in the following figure.
100 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VSRP interval timers
includes the port number in the record. Each subsequent time the device receives a Hello message for
the same VRID and VLAN, the device checks the port number:
• If the port number is the same as the port that previously received a Hello message, the VSRP-
aware device assumes that the message came from the same VSRP Master that sent the previous
message.
• If the port number does not match, the VSRP-aware device assumes that a VSRP failover has
occurred to a new Master, and moves the MAC addresses learned on the previous port to the new
port.
The VRID records age out if unused. This can occur if the VSRP-aware device becomes disconnected
from the Master. The VSRP-aware device will wait for a Hello message for the period of time equal to
the following.
VRID Age = Dead Interval + Hold-down Interval + (3 x Hello Interval)
The values for these timers are determined by the VSRP device sending the Hello messages. If the
Master uses the default timer values, the age time for VRID records on the VSRP-aware devices is as
follows.
3 + 3 + (3 x 1) = 9 seconds
In this case, if the VSRP-aware device does not receive a new Hello message for a VRID in a given
VLAN, on any port, the device assumes the connection to the Master is unavailable and removes the
VRID record.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 101
53-1002967-03
VSRP parameters
VSRP parameters
The following table lists the VSRP parameters.
NOTE
On a Layer 3 Switch, you must disable VSRP to
use VRRP-E or VRRP.
Virtual Router ID The ID of the virtual switch you are creating by None Configuring basic
(VRID) configuring multiple devices as redundant links. VSRP parameters on
You must configure the same VRID on each page 105
device that you want to use to back up the links.
Timer scale The value used by the software to calculate all 1 Changing the timer
VSRP timers. Increasing the timer scale value scale on page 107
decreases the length of all the VSRP timers
equally, without changing the ratio of one timer to
another.
Interface parameters
NOTE
MD5 is not supported.
102 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Metro Features
VSRP-Aware The type of authentication the VSRP-aware Not configured Configuring security
Authentication devices will use on a VSRP backup switch: features on a VSRP-
type aware device on
• No authentication - The device does not page 108
accept incoming packets that have
authentication strings.
• Simple - The device uses a simple text-string
as the authentication string for accepting
incoming packets.
VRID parameters
VSRP device type Whether the device is a VSRP Backup for the Not configured Configuring basic
VRID. VSRP parameters on
page 105
All VSRP devices for a given VRID are Backups.
VSRP ports The ports in the VRID VLAN that you want to use All ports in the Removing a port
as VRID interfaces. You can selectively exclude VRID VLAN from the VRID VLAN
individual ports from VSRP while allowing them to on page 109
remain in the VLAN.
VRID IP address A gateway address you are backing up. None Configuring a VRID
Configuring an IP address provides VRRP-E Layer IP address on page
3 redundancy in addition to VSRP LAyer 2 109
redundancy.
The VRID IP address must be in the same subnet
as a real IP address configured on the VSRP
interface, but cannot be the same as a real IP
address configured on the interface.
NOTE
This parameter is valid only on Layer 3 Switches.
Backup priority A numeric value that determines a Backup 100 for all Changing the backup
preferability for becoming the Master for the VRID. Backups priority on page 109
During negotiation, the device with the highest
priority becomes the Master.
In VSRP, all devices are Backups and have the
same priority by default.
If two or more Backups are tied with the highest
priority, the Backup with the highest IP address
becomes the Master for the VRID.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 103
53-1002967-03
Metro Features
Preference of When you save a Backup configuration, the Configured timer Saving the timer
timer source software can save the configured VSRP timer values are saved values received from
values or the VSRP timer values received from the the master on page
Master. 110
Saving the current timer values instead of the
configured ones helps ensure consistent timer
usage for all the VRID devices.
NOTE
The Backup always gets its timer scale value from
the Master.
Time-to-Live (TTL) The maximum number of hops a VSRP Hello 2 Changing the TTL
packet can traverse before being dropped. You setting on page 110
can specify from 1 - 255.
Hello interval The amount of time between Hello messages from One second Changing the hello
the Master to the Backups for a given VRID. interval setting on
page 111
The interval can be from 1 - 84 seconds.
Dead interval The amount of time a Backup waits for a Hello Three times the Changing the dead
message from the Master for the VRID before Hello Interval interval setting on
determining that the Master is no longer active. page 111
If the Master does not send a Hello message
before the dead interval expires, the Backups
negotiate (compare priorities) to select a new
Master for the VRID.
Backup Hello The amount of time between Hello messages from Disabled Changing the backup
state and interval a Backup to the Master. hello state and
60 seconds interval setting on
The message interval can be from 60 - 3600 when enabled page 111
seconds.
You must enable the Backup to send the
messages. The messages are disabled by default
on Backups. The current Master sends Hello
messages by default.
Hold-down interval The amount of time a Backup that has sent a Hello 3 seconds Changing the hold-
packet announcing its intent to become Master down interval setting
waits before beginning to forward traffic for the on page 112
VRID. The hold-down interval prevents Layer 2
loops from occurring during VSRP rapid failover.
The interval can from 1 - 84 seconds.
Track priority A VSRP priority value assigned to the tracked 5 Changing the default
ports. If a tracked port link goes down, the VRID track priority setting
port VSRP priority is reduced by the amount of the on page 112
tracked port priority.
104 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring basic VSRP parameters
Track port A track port is a port or virtual routing interface that None Specifying a track
is outside the VRID but whose link state is tracked port setting on page
by the VRID. Typically, the tracked interface 113
represents the other side of VRID traffic flow
through the device.
If the link for a tracked interface goes down, the
VSRP priority of the VRID interface is changed,
causing the devices to renegotiate for Master.
Backup preempt Prevents a Backup with a higher VSRP priority Enabled Disabling or re-
mode from taking control of the VRID from another enabling backup pre-
Backup that has a lower priority but has already emption setting on
assumed control of the VRID. page 113
VRID active state The active state of the VSRP VRID. Disabled Configuring basic
VSRP parameters on
page 105
RIP parameters
Suppression of A Layer 3 Switch that is running RIP normally Disabled Suppressing RIP
RIP advertises routes to a backed up VRID even when advertisement from
advertisements the Layer 3 Switch is not currently the active Layer (routes are backups on page
3 Switch for the VRID. Suppression of these advertised) 114
advertisements helps ensure that other Layer 3
Switches do not receive invalid route paths for the
VRID.
NOTE
This parameter is valid only on Layer 3 Switches.
NOTE
If you already have a port-based VLAN but only want to use VSRP on a sub-set of the VLANs ports,
you can selectively remove ports from VSRP service in the VLAN. Refer to Removing a port from the
VRID VLAN on page 109.
• Configure a VRID:
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 105
53-1002967-03
Configuring optional VSRP parameters
‐ Specify that the device is a backup. Since VSRP, like VRRP-E, does not have an
"owner", all VSRP devices are backups. The active device for a VRID is elected based
on the VRID priority, which is configurable.
‐ Activate the VRID.
The following example shows a simple VSRP configuration.
device(config)#vlan 200
device(config-vlan-200)#tag ethernet 1/1 to 1/8
device(config-vlan-200)#vsrp vrid 1
device(config-vlan-200-vrid-1)#backup
device(config-vlan-200-vrid-1)#activate
Syntax: [no] vsrp vrid num
The num parameter specifies the VRID and can be from 1 - 255.
Syntax: [no] backup [ priority value ] [ track-priority value ]
This command is required. In VSRP, all devices on which a VRID are configured are Backups. The
Master is then elected based on the VSRP priority of each device. There is no "owner" device as there
is in VRRP.
For information about the command optional parameters, refer to the following:
• Changing the backup priority on page 109
• Changing the default track priority setting on page 112
Syntax: [no] activate
or
Syntax: enable | disable
device(config)#router vsrp
Syntax: [no] router vsrp
Since VRRP and VRRP-E do not apply to Layer 2 Switches, there is no need to disable VSRP and
there is no command to do so. The protocol is always enabled.
106 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Changing the timer scale
2 0.5 seconds
2 1.5 seconds
2 30 seconds
2 1.5 second
NOTE
The Backups always use the value of the timer scale received from the Master, and the value from the
Master will be written in the configuration file.
To change the timer scale, enter a command such as the following at the global CONFIG level of the
CLI.
device(config)# scale-timer 2
This command changes the scale to 2. All VSRP, VRRP, and VRRP-E timer values will be divided by 2.
Syntax: [no] scale-timer num
The num parameter specifies the multiplier. You can specify a timer scale from 1 - 10.
Configuring authentication
If the interfaces on which you configure the VRID use authentication, the VSRP packets on those
interfaces also must use the same authentication. VSRP supports the following authentication types:
• No authentication - The interfaces do not use authentication.
• Simple - The interfaces use a simple text-string as a password in packets sent on the interface. If
the interfaces use simple password authentication, the VRID configured on the interfaces must use
the same authentication type and the same password.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 107
53-1002967-03
Configuring security features on a VSRP-aware device
To configure a simple password, enter a command such as the following at the VLAN configuration
level.
device(config)#vlan 10
device(config-vlan-10)#vsrp-aware vrid 3 simple-text-auth pri-key
Syntax: vsrp-aware vrid vridnumber simple-text-auth string
device(config)#vlan 10
device(config-vlan-10)#vsrp-aware vrid 2 no-auth
Syntax: vsrp-aware vrid vridnumber no-auth
The following configuration specifies no authentication for VSRP hello packets received on ports 1/1,
1/2, 1/3, and 1/4 in VRID 4. For these ports, the VSRP device will not accept incoming packets that
have authentication strings.
device(config)#vlan 10
device(config-vlan-10)#vsrp-aware vrid 4 no-auth port-list ethe 1/1 to 1/4
Syntax: [no] vsrp-aware vrid vridnumber no-auth port-list portrange
vrid number is a valid VRID (from 1 to 255).
no-auth specifies no authentication as the preferred VSRP-aware security method. The VSRP device
will not accept incoming packets that have authentication strings.
simple-text-auth string specifies the authentication string for accepting VSRP hello packets, where
string can be up to 8 characters.
108 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Removing a port from the VRID VLAN
port-list port range specifies the range of ports to include in the configuration.
NOTE
The VRID IP address must be in the same subnet as a real IP address configured on the VSRP
interface, but cannot be the same as a real IP address configured on the interface.
NOTE
Failover applies to both Layer 2 and Layer 3.
To specify an IP address to back up, enter a command such as the following at the configuration level
for the VRID.
device(config-vlan-200-vrid-1)#ip-address 10.10.10.1
Syntax: [no] ip-address ip-addr
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 109
53-1002967-03
Saving the timer values received from the master
• The backup priority is used for election of the Master. The VSRP Backup with the highest priority
value for the VRID is elected as the Master for that VRID. The default priority is 100. If two or
more Backups are tied with the highest priority, the Backup with the highest IP address becomes
the Master for the VRID.
• The track priority is used with the track port feature. Refer to VSRP priority calculation on page 97
and Changing the default track priority setting on page 112.
To change the backup priority, enter a command such as the following at the configuration level for the
VRID.
device(config-vlan-200-vrid-1)#backup priority 75
Syntax: [no] backup [ priority value ] [ track-priority value ]
The priority value parameter specifies the backup priority for this interface and VRID. Specify a value
as follows:
• For VRRP, specify a value from 3 - 254. The default is 100.
• For VSRP and VRRP-E, specify a value from 6 - 255. The default is 100.
For a description of the track-priority value parameter, refer to Changing the default track priority
setting on page 112.
device(config-vlan-200-vrid-1)#save-current-values
Syntax: [no] save-current-values
NOTE
An MRP ring is considered to be a single hop, regardless of the number of nodes in the ring.
110 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Changing the hello interval setting
To change the TTL for a VRID, enter a command such as the following at the configuration level for the
VRID.
device(config-vlan-200-vrid-1)#initial-ttl 5
Syntax: [no] initial-ttl num
The num parameter specifies the TTL and can be from 1 - 255. The default TTL is 2.
device(config-vlan-200-vrid-1)#hello-interval 10
Syntax: [no] hello-interval num
The num parameter specifies the interval and can be from 1 - 84 seconds. The default is 1 second.
NOTE
The default Dead interval is three times the Hello interval plus one-half second. Generally, if you change
the Hello interval, you also should change the Dead interval on the Backups.
NOTE
If you change the timer scale, the change affects the actual number of seconds.
device(config-vlan-200-vrid-1)#dead-interval 30
Syntax: [no] dead-interval num
The num parameter specifies the interval and can be from 1 - 84 seconds. The default is 3 seconds.
NOTE
If you change the timer scale, the change affects the actual number of seconds.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 111
53-1002967-03
Changing the hold-down interval setting
To enable a Backup to send Hello messages to the Master, enter a command such as the following at
the configuration level for the VRID.
device(config-vlan-200-vrid-1)#advertise backup
Syntax: [no] advertise backup
When a Backup is enabled to send Hello messages, the Backup sends a Hello message to the Master
every 60 seconds by default. You can change the interval to be up to 3600 seconds.
To change the Backup Hello interval, enter a command such as the following at the configuration level
for the VRID.
device(config-vlan-200-vrid-1)#backup-hello-interval 180
Syntax: [no] backup-hello-interval num
The num parameter specifies the message interval and can be from 60 - 3600 seconds. The default is
60 seconds.
NOTE
If you change the timer scale, the change affects the actual number of seconds.
device(config-vlan-200-vrid-1)#hold-down-interval 4
Syntax: [no] hold-down-intervalnum
The num parameter specifies the hold-down interval and can be from 1 - 84 seconds. The default is 3
seconds.
NOTE
If you change the timer scale, the change affects the actual number of seconds.
112 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Specifying a track port setting
• To change the default track priority, use the backup priority value track-priority value command,
described below.
• To override the default track priority for a specific track port, use the track-port command. Refer to
Specifying a track port setting on page 113.
To change the track priority, enter a command such as the following at the configuration level for the
VRID.
NOTE
The priority num option changes the priority of the specified interface, overriding the default track port
priority. To change the default track port priority, use the backup track-priority num command.
device(config-vlan-200-vrid-1)#non-preempt-mode
Syntax: [no] non-preempt-mode
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 113
53-1002967-03
Suppressing RIP advertisement from backups
NOTE
This parameter applies only if you specified an IP address to back up and is valid only on Layer 3
Switches.
device(config)#router rip
device(config-rip-router)#use-vrrp-path
Syntax: [no] use-vrrp-path
VSRP-aware interoperablilty
The vsrp-aware tc-vlan-flush command should be used in network configurations in which the
Brocade switch operates as the VSRP-Aware device connecting to a FastIron platforms configured as
a VSRP Master.
The command is available at the VLAN level, and is issued per a specific VRID, as shown here for
VRID 11.
114 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying VRID information
Field Description
Total number of VSRP The total number of VRIDs configured on this device.
routers defined
auth-type The authentication type in effect on the ports in the VSRP VLAN.
VRID parameters
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 115
53-1002967-03
Metro Features
Field Description
state This device VSRP state for the VRID. The state can be one of the following:
• initialize - The VRID is not enabled (activated). If the state remains "initialize"
after you activate the VRID, make sure that the VRID is also configured on the
other routers and that the routers can communicate with each other.
NOTE
If the state is "initialize" and the mode is incomplete, make sure you have specified the
IP address for the VRID.
Administrative-status The administrative status of the VRID. The administrative status can be one of the
following:
• disabled - The VRID is configured on the interface but VSRP or VRRP-E has not
been activated on the interface.
• enabled - VSRP has been activated on the interface.
Advertise-backup Whether the device is enabled to send VSRP Hello messages when it is a Backup.
This field can have one of the following values:
• disabled - The device does not send Hello messages when it is a Backup.
• enabled - The device does send Hello messages when it is a Backup.
Preempt-mode Whether the device can be pre-empted by a device with a higher VSRP priority after
this device becomes the Master. This field can have one of the following values:
save-current The source of VSRP timer values preferred when you save the configuration. This
field can have one of the following values:
NOTE
For the following fields:
116 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Metro Features
Field Description
priority The device preferability for becoming the Master for the VRID. During negotiation, the
Backup with the highest priority becomes the Master.
If two or more Backups are tied with the highest priority, the Backup interface with the
highest IP address becomes the Master for the VRID.
hello-interval The number of seconds between Hello messages from the Master to the Backups for
a given VRID.
dead-interval The configured value for the dead interval. The dead interval is the number of seconds
a Backup waits for a Hello message from the Master for the VRID before determining
that the Master is no longer active.
If the Master does not send a Hello message before the dead interval expires, the
Backups negotiate (compare priorities) to select a new Master for the VRID.
NOTE
If the value is 0, then you have not configured this parameter.
hold-interval The number of seconds a Backup that intends to become the Master will wait before
actually beginning to forward Layer 2 traffic for the VRID.
If the Backup receives a Hello message with a higher priority than its own before the
hold-down interval expires, the Backup remains in the Backup state and does not
become the new Master.
initial-ttl The number of hops a Hello message can traverse after leaving the device before the
Hello message is dropped.
NOTE
An MRP ring counts as one hop, regardless of the number of nodes in the ring.
next hello sent in The amount of time until the Master dead interval expires. If the Backup does not
receive a Hello message from the Master by the time the interval expires, either the IP
address listed for the Master will change to the IP address of the new Master, or this
Layer 3 Switch itself will become the Master.
NOTE
This field applies only when this device is a Backup.
Forwarding ports The member ports that are currently in the Forwarding state. Ports that are forwarding
on the Master are listed. Ports on the Standby, which are in the Blocking state, are not
listed.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 117
53-1002967-03
Displaying the active interfaces for a VRID
Field Description
VLAN ID The VLAN that contains the VSRP-aware device connection with the VSRP Master and Backups.
Last Port The most recent active port connection to the VRID. This is the port connected to the current Master. If
a failover occurs, the VSRP-aware device changes the port to the port connected to the new Master.
The VSRP-aware device uses this port to send and receive data through the backed up node.
device(config)#vlan 100
device(config-vlan-100)#vsrp vrid 1
device(config-vlan-100-vrid-1)#restart-ports 5
Syntax: [no] restart-ports seconds
118 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying ports that Have the VSRP fast start feature enabled
This command shuts down all the ports that belong to the VLAN when a failover occurs. All the ports will
have the specified VRID.
To configure a single port on a VSRP-configured device to shut down when a failover occurs, then
restart after a period of time, enter the following command.
Displaying ports that Have the VSRP fast start feature enabled
The show vsrp vrid command shows the ports on which the VSRP fast start feature is enabled.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 119
53-1002967-03
Metro Features
establish a data path from the host to a VSRP-linked device. The following figure below shows two
possible data paths from the host to Device 1.
FIGURE 17 Two data paths from host on an MRP ring to a VSRP-linked device
If a VSRP failover from master to backup occurs, VSRP needs to inform MRP of the topology change;
otherwise, data from the host continues along the obsolete learned path and never reach the VSRP-
linked device, as shown in the following figure.
A signaling process for the interaction between VSRP and MRP ensures that MRP is informed of the
topology change and achieves convergence rapidly. When a VSRP node fails, a new VSRP master is
selected. The new VSRP master finds all MRP instances impacted by the failover. Then each MRP
instance does the following:
• The MRP node sends out an MRP PDU with the mac-flush flag set three times on the MRP ring.
• The MRP node that receives this MRP PDU empties all the MAC entries from its interfaces that
participate on the MRP ring.
• The MRP node then forwards the MRP PDU with the mac-flush flag set to the next MRP node that
is in forwarding state.
120 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Metro Features
The process continues until the Master MRP node secondary (blocking) interface blocks the packet.
Once the MAC address entries have been flushed, the MAC table can be rebuilt for the new path from
the host to the VSRP-linked device as shown in the following figure.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 121
53-1002967-03
122 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
UDLD and Protected Link Groups
Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800
FSX 1600
Unidirectional Link Detection (UDLD) 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
(Link keepalive)
UDLD overview
Uni-Directional Link Detection (UDLD) monitors a link between two Brocade devices and brings the
ports on both ends of the link down if the link goes down at any point between the two devices. This
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 123
53-1002967-03
UDLD for tagged ports
feature is useful for links that are individual ports and for trunk links. The following figure shows an
example.
Normally, a Brocade device load balances traffic across the ports in a trunk group. In this example,
each Brocade device load balances traffic across two ports. Without the UDLD feature, a link failure on
a link that is not directly attached to one of the Brocade devices is undetected by the Brocade devices.
As a result, the Brocade devices continue to send traffic on the ports connected to the failed link.
When UDLD is enabled on the trunk ports on each Brocade device, the devices detect the failed link,
disable the ports connected to the failed link, and use the remaining ports in the trunk group to forward
the traffic.
Ports enabled for UDLD exchange proprietary health-check packets once every second (the keepalive
interval). If a port does not receive a health-check packet from the port at the other end of the link
within the keepalive interval, the port waits for two more intervals. If the port still does not receive a
health-check packet after waiting for three intervals, the port concludes that the link has failed and
takes the port down.
124 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuration notes and feature limitations for UDLD
Enabling UDLD
NOTE
This section shows how to configure UDLD for untagged control packets. To configure UDLD for tagged
control packets, refer to Enabling UDLD for tagged ports on page 125.
To enable UDLD on a port, enter a command such as the following at the global CONFIG level of the
CLI.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 125
53-1002967-03
Changing the Keepalive interval
NOTE
You must configure the same VLANs that will be used for UDLD on all devices across the network;
otherwise, the UDLD link cannot be maintained.
device(config)#link-keepalive interval 4
Syntax: [no] link-keepalive interval num
The num parameter specifies how often the ports send a UDLD packet. You can specify from 1 - 60, in
100 ms increments. The default is 5 (500 ms).
device(config)#link-keepalive retries 10
Syntax: [no] link-keepalive retries num
The num parameter specifies the maximum number of times the port will try the health check. You can
specify a value from 3 - 64. The default is 7.
device#show link-keepalive
Total link-keepalive enabled ports: 4
Keepalive Retries: 3 Keepalive Interval: 1 Sec.
Port Physical Link Logical Link State Link-vlan
4/1 up up FORWARDING 3
4/2 up up FORWARDING
4/3 down down DISABLED
4/4 up down DISABLED
Syntax: show link-keepalive
126 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying information for a single port
Field Description
Total link-keepalive enabled The total number of ports on which UDLD is enabled.
ports
Keepalive Retries The number of times a port will attempt the health check before concluding that the
link is down.
Physical Link The state of the physical link. This is the link between the Brocade port and the
directly connected device.
Logical Link The state of the logical link. This is the state of the link between this Brocade port
and the Brocade port on the other end of the link.
If a port is disabled by UDLD, the change also is indicated in the output of the show interfaces brief
command. An example is given below.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 127
53-1002967-03
UDLD and Protected Link Groups
Field Description
Current State The state of the logical link. This is the link between this Brocade port and the Brocade port
on the other end of the link.
Remote MAC Addr The MAC address of the port or device at the remote end of the logical link.
Remote Port The port number on the Brocade device at the remote end of the link.
Local System ID A unique value that identifies this Brocade device. The ID can be used by Brocade technical
support for troubleshooting.
Remote System ID A unique value that identifies the Brocade device at the remote end of the link.
Packets sent The number of UDLD health-check packets sent on this port.
Packets received The number of UDLD health-check packets received on this port.
Transitions The number of times the logical link state has changed between up and down.
The show interface ethernet command also displays the UDLD state for an individual port. In
addition, the line protocol state listed in the first line will say "down" if UDLD has brought the port
down. An example is given below.
In this example, the port has been brought down by UDLD. Notice that in addition to the information in
the first line, the port state on the fourth line of the display is listed as DISABLED.
128 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Clearing UDLD statistics
NOTE
When UDLD and protected links are configured on a port and the link goes down, protected links will
not come up after UDLD becomes "healthy" again without first physically disabling then re-enabling the
link.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 129
53-1002967-03
UDLD with protected link groups configuration notes
FIGURE 21
130 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
UDLD and Protected Link Groups
1. Specify the member ports in the protected link group. Enter a command such as the following.
device(config)#protected-link-group 10 e 1 to 4
2. Optionally specify which port will be the active port for the protected link group. Enter a command
such as the following.
device(config)#protected-link-group 10 active-port 1
NOTE
If you do not explicitly configure an active port, the Brocade device automatically assigns one as
the first port in the protected link group to come up.
These commands configure port e1 as the active port and ports e2 - e4 as standby ports. If port 1
goes down, the Brocade device enables the first available standby port, and switches the traffic to
that port. Since the above configuration consists of a statically configured active port, the active
port pre-empts other ports in the protected link group. Refer to About active ports on page 129.
Syntax: [no] protected-link-group group-ID ethernet port to port
The group-ID parameter specifies the protected link group number. Enter a number from 1 - 32.
Syntax: [no] protected-link-group group-ID active-port ethernet port
The group-ID parameter specifies the protected link group number. Enter a number from 1 - 32.
Viewing information about protected link groups
You can use the following show commands to view information about protected link groups:
• show protected-link-group
• show interface brief
• show interface
The following shows example output for the show protected-link-group command.
device#show protected-link-group
Group ID: 1
Member Port(s): ethe 1 to 7
Configured Active Port: 7
Current Active Port: 7
Standby Port(s): ethe 5
Total Number of Protected Link Groups: 1
Syntax: show protected-link-group [ group-ID ]
TABLE 25 CLI display of protected link group information
Field Description
Member Port(s) The ports that are members of the protected link group.
Configured Active Port The statically configured active port. If you do not statically configure an active port,
this value will be "None".
Current Active Port The current active port for the protected link group. If all member ports are down, this
value will be "None".
The show interface brief command also displays information about protected link groups.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 131
53-1002967-03
UDLD and Protected Link Groups
device#show int e 3
GigabitEthernet3 is up, line protocol is up, link keepalive is enabled
Port up for 60 seconds
Hardware is GigabitEthernet, address is 0000.00a8.7140 (bia
0000.00a8.7142)
Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx
Configured mdi mode AUTO, actual MDIX
Member of 3 L2 VLANs, port is tagged, port state is protected-link-
inactive
BPDU guard is Disabled, ROOT protect is Disabled
Link Error Dampening is Disabled
STP configured to ON, priority is level0
....
some lines ommitted for brevity
In the above output, the port state is protected-link-inactive which means port 3 is an inactive
port in a protected link group.
Syntax: show interface ethernet port
132 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Link Aggregation
Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800
FSX 1600
Trunk threshold for static trunk 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
groups
Flexible trunk group membership 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
802.3ad link aggregation (dynamic 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
trunk groups)
Link Aggregation Control Protocol 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
(LACP)
Single link static trunk 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 133
53-1002967-03
Overview of link aggregation
NOTE
The Keep Alive LAG functionality was referred to as Single Link LACP in previous releases.
The new LAG configuration procedures supersede the previous configurations procedures for LAGs
and Dynamic Link Aggregation. When a Brocade device is upgraded to 08.0.00a any configurations
for LAGs or Dynamic Link Aggregation defined in releases prior to 08.0.00a will be converted to a
08.0.00a (and later) compatible LAG configuration. Details about how this conversion is performed are
described in Migrating from a previous release to 08.0.00a LAG or LACP configuration on page 138.
LAG formation rules
134 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuration notes for FastIron devices in a traditional stack
All LAG ports must have the same ACL configurations; otherwise, the LAG is rejected.
• All LAG member properties must match the primary port of the LAG with respect to the following
parameters:
‐ Port tag type (untagged or tagged port)
‐ Default port speed and duplex
‐ Configured port speed and duplex
‐ TOS-based Configuration - During deployment the configuration on the primary port is
replicated to all ports and on undeployment, each port inherits the same TOS-based QoS
configuration.
To change port parameters, you must change them on the primary port. The software automatically
applies the changes to the other ports in the LAG.
• Make sure the device on the other end of the LAG link can support the same number of ports in the
link.
• Legacy ports and 48 Gbps copper ports cannot be members of the same LAG in hardware
configurations such as the following:
‐ 48-port 10/100/1000 Mbps (RJ45) Ethernet PoE interface module (SX-FI48GPP) and
IPv4/IPv6 interface modules or management modules with user ports.
• Combination of different generations of ports cannot be members of the same LAG under the
following hardware configurations:
‐ 24-port fiber and copper Ethernet PoE/Fiber interfaces (SX-FI24GPP, SX-FI24GF) and
IPv4/IPv6 interface modules or management modules with user ports
‐ 2-port 10G and 8-port 10G interfaces (SX-FI8XG, SX-FI2XG) and the IPv4/IPv6 interface
modules or management modules with user ports
• The FastIron SX chassis supports up to 12 ports per LAG and a maximum of 255 trunk groups only
when the following third generation interface modules are installed in the chassis:
‐ SX-FI48GPP--48-port 10/100/1000 Mbps Ethernet PoE interface module
‐ SX-FI24GPP--24-port Gigabit Ethernet copper interface module
‐ SX-FI24HF--24-port Gigabit Ethernet fiber interface module
‐ SX-FI2XG--2-port 10 Gigabit Ethernet interface module
‐ SX-FI8XG--8-port 10 Gigabit Ethernet interface module
• Cross module LAG is only supported between the same generation SX cards.
• LAG is supported on 1-GbE or 10-GbE ports.
• You cannot combine 1-GbE and 10-GbE ports in the same LAG.
• Port assignment on a module need not be consecutive. The port range can contain gaps. For
example, you can configure ports 1, 3, and 4 (excluding 2).
• Although the FastIron devices have port ranges, they do not apply to LAGs.
• You can select any port to be the primary port of the LAG.
• Make sure the device on the other end of the LAG can support the same number of ports in the
link. For example, if you configure a 3-port LAG on the FSX and the other end is a different type of
switch, make sure the other switch can support a 3-port LAG.
• All the ports must be connected to the same physical or logical device at the other end.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 135
53-1002967-03
Link Aggregation
NOTE
Cascaded LAG between stack units are supported on Brocade ICX devices only.
The following notes apply to FastIron stackabledevices that are part of an traditional stack:
• If a stack unit fails or is removed from the stack, its static LAG configuration becomes a reserved
configuration on the Active Controller. Any remaining ports of the static LAG in the traditional
stack continue to function.
• When a new stack unit is added to a traditional stack, the new unit receives running configuration
and LAG information, including a list of ports that are up and are members of a LAG, from the
Active Controller.
• Before merging two traditional stack devices, make sure that there are no static LAGs configured
between them. This can result in self-looped ports.
• You cannot configure LAG between cross units in a mixed stack.
• You cannot create a LAG between devices that belong to different product lines in a mixed stack.
For example, between an ICX 6610 and an ICX 6450.
• When a traditional stack device with static LAG partitions into multiple traditional stacks, loops and
forwarding errors may occur. In these cases, user intervention is required to remove the loops.
• 10 Gbps links support up to eight ports in a LAG for stackable units.
The following figure displays an example of a valid, Keep ALIVE LAG link between two devices. This
configuration does not aggregate ports but uses the LACP PDUs to maintain the connection status
between the two ports.
136 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Maximum number of LAGs
The following figure shows an example of a valid 2-port LAG link between devices where the ports on
each end are on the same interface module. Ports in a valid 2-port LAG on one device are connected to
two ports in a valid 2-port LAG on another device.
The following figure shows an example of two devices connected over a 4 port LAG where the ports on
each end of the LAG are on different interface modules.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 137
53-1002967-03
Migrating from a previous release to 08.0.00a LAG or LACP configuration
ICX 6430 29 29 1, 2, 3, 4, 5, 6, 7, or 8
ICX 6450 124 124
ICX 6610 120 120
138 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Downgrade considerations
a) A static LAG is created containing the port list specified in the trunk command. This LAG
is then automatically deployed.
b) The lowest-numbered port from the original trunk list is selected as the primary port of the
LAG.
c) The converted LAG is named "LAG_x", where "x" is a unique number assigned by the
system starting from 1.
2. For any dynamic link aggregation (LACP) group configured using the port-level link-aggregate
commands, the following conversion procedure is followed.
a) A dynamic LAG is created by grouping all ports in the original configuration having the
same link-aggregation key.
b) If link-aggregate active/passive is configured originally, the converted dynamic LAG is
configured as deployed, otherwise is not be converted because such ports were originally
not operating under LACP.
c) If the original mode is passive, the converted dynamic LAG will be configured as deploy
passive . Otherwise active mode is the default.
d) The timeout configuration set by the command link-aggregate configure timeout will be
converted to the lacp-timeout command.
e) The value of the link-aggregate configure key command is used in the conversion in
determining the set of ports that form an LAG, so prior to upgrade the key must be
configured on all the link-agg groups. In the new LAG user interface, there is no need for a
user to explicitly configure a key. Each dynamic LAG will automatically select a unique key
for the system. Hence the original configured key will not be retained.
NOTE
You cannot copy configurations to the running configurations from a TFTP server. It is not
supported when you upgrade from a software version earlier to 08.0.00a to 8.0
configuration. The configuration must be saved on flash as startup configuration and
reload is required without write-memory.
f) The command link-aggregate configure system-priority is retired and will not be
directly converted. This value is currently not in use by the system's LACP protocol
processing, and will maintain a default value of 1.
g) The lowest-numbered port will be selected as the primary port of the LAG.
h) Port names configured in the original interface configuration will be converted to port
names within the LAG.
i) The converted LAG will be named "LAG_x", where "x" is a unique number assigned by the
system starting from 1.
Downgrade considerations
When you downgrade to an earlier software version from 08.0.00a, all the existing LAG configuration
will be lost.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 139
53-1002967-03
Removing Layer 2 information from trunk hash output
NOTE
Removing Layer 2 information from trunk hash output is not supported on FastIron X Series devices.
FastIron stackable devices support the option to exclude Layer 2 information in the trunk hash
calculation for IP packets.
Configuring a LAG
The following configuration procedures are used to configure a LAG. Depending upon whether you are
configuring a static, dynamic or keep-alive LAG, the configuration procedures may or may not apply as
described:
• Creating a Link Aggregation Group - Required for all static, dynamic or keep alive LAGs.
• Adding Ports to a LAG - Required for all static, dynamic, or keep alive LAGs. A keep alive LAG
contains only one port while static and dynamic LAGs can have 1 to 12 ports.
• Configuring the Primary Port for a LAG - Required for all static and dynamic LAGs. Since a keep
alive LAG contains only one port, it is unnecessary to configure this parameter.
• Configuring the Load Sharing Type - Optional for all static and dynamic LAGs. Since a keep alive
LAG contains only one port, it is unnecessary to configure this parameter.
• Specifying the LAG Threshold for a LAG Group - Optional for static and dynamic LAGs. Since a
keep alive LAG contains only one port, it is unnecessary to configure this parameter.
• Configuring an LACP Timeout - Optional for dynamic and keep alive LAGs.
140 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Creating a Link Aggregation Group (LAG) using the LAG ID option
The dynamic option specifies that the LAG with the name specified by the lag-name variable will be
configured as a dynamic LAG.
The keep-alive option specifies that the LAG with the name specified by the lag-name variable will be
configured as a keep-alive LAG. The keep-alive LAG configuration is a new configuration option to
configure a LAG for use in keep alive applications similar to the UDLD feature.
NOTE
The LAG id parameter is for static and dynamic LAGs only. No explicit configuration of a LAG ID is
allowed on keepalive LAGs.
The static parameter specifies that the LAG with the name specified by the lag-name variable will be
configured as a static LAG.
The dynamic option specifies that the LAG with the name specified by the lag-name variable will be
configured as a dynamic LAG.
Configuration considerations
LAG IDs are unique for each LAG in the system. The same LAG ID cannot be assigned to two or more
different LAGs. If a LAG ID is already used, the CLI will reject the new LAG configuration and display an
error message that suggests the next available LAG ID that can be used.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 141
53-1002967-03
Link Aggregation
NOTE
If you upgrade from an earlier version to a version with the LAG ID configuration feature, the old
configuration file will be parsed correctly and each LAG configured will get a LAG ID automatically.
!
lag lag1 static id 124
ports ethernet 1/1/2 to 1/1/3
primary-port 1/1/3
deploy
!
: show lag command and the output.
142 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Creating a keepalive LAG
LAG Configuration:
Ports: e 3/14
Port Count: 1
Primary Port: none
Trunk Type: hash-based
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 143
53-1002967-03
Configuring the primary port for a LAG
NOTE
This configuration is only applicable for configuration of a static or dynamic LAGs.
NOTE
This configuration is only applicable for only the configuration of static LAGs.
For example, the following commands establish a LAG group consisting of 4 ports, then establish a
threshold for this LAG group of 3 ports.
NOTE
The trunk-threshold command should be configured only at one end of the trunk. If it is set on both
sides, link failures will result in race-conditions and the will not function properly.
NOTE
Use a short LACP timeout when setting the trunk-threshold value equal to the number of links in the
LAG or connecting to third party devices. See Configuring an LACP timeout on page 145.
144 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring an LACP timeout
NOTE
This configuration is applicable to the configuration of dynamic or keep-alive LAGs only.
Deploying a LAG
After configuring a LAG, you must explicitly enable it before it begins aggregating traffic. This task is
accomplished by executing the deploy command within the LAG configuration. After the deploy
command runs, the LAG is in the aggregating mode. Only the primary port within the LAG is available at
the individual interface level. All the secodary ports should have the same IP directed-broadcast
configuration as the primary port. Any configuration performed on the primary port applies to all ports
within the LAG. The running configuration will no longer display deployed LAG ports other than the
primary port.
To deploy a LAG, at least one port must be in the LAG and the primary port must be specified for non
keep-alive LAGs. After a non keep-alive LAG is deployed, a LAG is formed. If there is only one port in
the LAG, a single port LAG is formed. For a dynamic LAG, LACP is started for each LAG port. For a
keep-alive LAG, no LAG is formed and LACP is started on the LAG port.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 145
53-1002967-03
Commands available under LAG once it is deployed
You can deploy a LAG as shown in the following for the "blue" LAG.
Brocade(config-lag-test)#interface e 7/8
Brocade(config-if-e1000-7/8)#disable
Brocade(config-if-e1000-7/8)#
146 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Enabling ports within a LAG
Brocade(config-lag-test)#interface e 7/8
Brocade(config-if-e1000-7/8)#enable
Brocade(config-if-e1000-7/8)#
NOTE
In an operational dynamic LAG, adding a port causes port flapping for all LAG ports. This may cause
loss of traffic.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 147
53-1002967-03
Monitoring an individual LAG port
NOTE
When a port is deleted from a currently deployed LAG, the MAC address of the port is changed back
to its original value.
NOTE
In an operational dynamic LAG, removing an operational port causes port flapping for all LAG ports.
This may cause loss of traffic.
NOTE
You can use only one mirror port for each monitored LAG port. You cannot configure mirroring on an
undeployed LAG.
To monitor traffic on an individual port in a LAG group, run the following commands.
148 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Allowable characters for LAG names
device(config-lag-blue)# deploy
device(config-lag-blue)# port-name orange ethernet 1/3/1
Syntax: [no] port-name name ethernet stack/slot/port
The name variable specifies the port name. The name can be up to 50 characters long.
Use the ethernet option with the appropriate stack/slot/port variable to apply the specified name to an
Ethernet port within the LAG.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 149
53-1002967-03
Setting the sFlow sampling rate for a port in a LAG
For a keep-alive LAG, sFlow can be enabled only at the interface level and not at a lag context. To
configure sFLow for an interface belonging to the keep-alive lag, configure directly under the interface.
Brocade(config-lag-test)#interface e 7/8
Brocade(config-if-e1000-7/8)#sflow forwarding
Brocade(config-if-e1000-7/8)#
Brocade(config-lag-test)#interface e 7/8
Brocade(config-if-e1000-7/8)#sflow sample 512
Brocade(config-if-e1000-7/8)#
150 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Link Aggregation
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 151
53-1002967-03
Link Aggregation
Total number of LAGS The total number of LAGs that have been configured on the device.
Total number of The total number of LAGs on the device that are currently deployed.
deployed LAGS
Total number of trunks The total number of LAGs that have been created on the LAG. The total number of
created LAGs available are shown also. Since keep-alive LAGs do not use a LAG ID, they are
not listed and do not subtract for the number of LAGs available.
LACP System The system priority configured for the device.The ID is the system priority which is the
Priority /ID base MAC address of the device.
LACP Long timeout The number of seconds used for the LACP Long timeout mode. This is only applicable
for dynamic or keep-alive LAGs.
LACP Short timeout The number of seconds used for the LACP Short timeout mode. This is only applicable
for dynamic or keep-alive LAGs.
The following information is displayed per-LAG in the show lag brief command.
LAG The name of the LAG, LAG ID number, the configured type of the LAG: static, dynamic,
or keep-alive, status of LAG deployment: deployed or not
The following information is displayed per-LAG the show lag command for each LAG configured.
LAG Configuration
152 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Link Aggregation
• Trunk Type: The load sharing method configured for the LAG: hash-based.
Deployment
• Active Primary The port within the LAG where most protocol packets are transmitted. This is not the
same as the configured Primary Port of the LAG.
Link The status of the link which can be one of the following:
• up
• down
Dupl The duplex state of the port, which can be one of the following:
• Full
• Half
• None
Tag Indicates whether the ports have 802.1q VLAN tagging. The value can be Yes or No.
Pri Indicates the Quality of Service (QoS) priority of the ports. The priority can be a value
from 0-7.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 153
53-1002967-03
Link Aggregation
Act Indicates the link aggregation mode, which can be one of the following:
If link aggregation is enabled (and the mode is passive), the port can send and
receive LACPDU messages to participate in negotiation of an aggregate link
initiated by another port, but cannot search for a link aggregation port or initiate
negotiation of an aggregate link.
• Yes - The mode is active. The port can send and receive LACPDU messages.
Tio Indicates the timeout value of the port. The timeout value can be one of the following:
• L - Long. The LAG group has already been formed and the port is therefore using a
longer message timeout for the LACPDU messages exchanged with the remote
port. Typically, these messages are used as confirmation of the health of the
aggregate link.
• S - Short. The port has just started the LACPDU message exchange process with
the port at the other end of the link. The S timeout value also can mean that the link
aggregation information received from the remote port has expired and the ports
are starting a new information exchange.
Agg Indicates the link aggregation state of the port. The state can be one of the following:
Syn Indicates the synchronization state of the port. The state can be one of the following:
• No - The port is out of sync with the remote port. The port does not understand the
status of the LACPDU process and is not prepared to enter a LAG link.
• Syn - The port is in sync with the remote port. The port understands the status of
the LACPDU message exchange process, and therefore knows the LAG group to
which it belongs, the link aggregation state of the remote port, and so on.
Dis Indicates the collection state of the port, which determines whether the port is ready to
send traffic over the LAG link:
• Col - The port is ready to send traffic over the LAG link.
• No - The port is not ready to send traffic over the LAG link.
Col Indicates the distribution state of the port, which determines whether the port is ready to
receive traffic over the LAG link.
• Dis - The port is ready to receive traffic over the LAG link.
• No - The port is not ready to receive traffic over the LAG link.
Def Indicates whether the port is using default link aggregation values. The port uses default
values if it has not received link aggregation information through LACP from the port at
the remote end of the link. This field can have one of the following values:
• Def - The port has not received link aggregation values from the port at the other
end of the link and is therefore using its default link aggregation LACP settings.
• No - The port has received link aggregation information from the port at the other
end of the link and is using the settings negotiated with that port.
154 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Preboot eXecution Environment boot support
Exp Indicates whether the negotiated link aggregation settings have expired. The settings
expire if the port does not receive an LACPDU message from the port at the other end of
the link before the message timer expires. This field can have one of the following
values:
• Exp - The link aggregation settings this port negotiated with the port at the other
end of the link have expired. The port is now using its default link aggregation
settings.
• No - The link aggregation values that this port negotiated with the port at the other
end of the link have not expired. The port is still using the negotiated settings.
NOTE
You can enable PXE boot support on only one member port of a dynamic LAG.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 155
53-1002967-03
Commands
The following example shows PXE boot support enabled on member port 3/1/1
of a dynamic LAG R4-dyn.
Brocade(config)# lag R4-dyn
Brocade(config-lag-R4-dyn)# force-up ethernet 3/1/1
Commands
force-up ethernet
Forces the member port of a dynamic LAG to be logically operational even when the dynamic LAG is
not operating. The no form of the command causes the specified port to be logically operational only
when the dynamic LAG is operating.
Command Default The member ports of a dynamic LAG are logically operational only when the dynamic LAG is operating.
Parameters port
Specifies the port.
Usage Guidelines When the dynamic LAG is not operational, the port goes to "force-up" mode and the show lag
command output shows the operational status "Ope" of this port as "Frc". In this mode, the port is
logically operational, which enables a PXE-capable host to boot from the network using this port. Once
the host successfully boots from the network, the dynamic LAG can form to connect the host to the
network with the LAG link. Even if the dynamic LAG fails later, this port is brought back to "force-up"
mode and remains logically operational.
If any port in a dynamic LAG receives an LACPDU, the port in force-up mode leaves the force-mode
and becomes a member port in the dynamic LAG.
Examples The following example shows PXE boot support enabled on member port 3/1/1 of a dynamic LAG R4-
dyn.
Brocade(config)# lag R4-dyn
Brocade(config-lag-R4-dyn)# force-up ethernet 3/1/1
156 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Multi-Chassis Trunking
Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800
FSX 1600
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 157
53-1002967-03
How MCT works
detections allowing all links to be active. If a failure is detected, traffic is dynamically allocated across
the remaining links with the failure detection and allocation of traffic occurring in sub-second time
without impacting the rest of the network.
MCT inherits all of the benefits of a trunk group by providing multiple physical links to act as a single
logical link. The new available bandwidth is an aggregate of all the links in the group. The traffic is
shared across the links in the group using dynamic flow-based load balancing and traffic is moved to a
remaining link group in sub-seconds in the event of a failure in one of the links. MCT eliminates the
single point of failure that exists at a device level when all links of a trunk terminate on the same
device without the overhead associated with spanning tree. MCT diverts a subset of the links to a
second device to provide redundancy and sub-second fault detection at the device level.
158 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
MCT terminology
• Traffic received from an ICL port is not forwarded to the Cluster Client Edge Ports (CCEPs) if the
MCT peer device has the reach ability to the same cluster client.
• Traffic received from non-ICL ports is forwarded the same way as non-MCT devices.
• Known unicast, multicast, and broadcast traffic received on Cluster Edge Ports (CEP) or ICL ports
is forwarded to the destination port.
• For unknown unicast, multicast, and broadcast traffic received on ICL ports, the forwarding
behavior depends on the peer MCT device’s ability to reach the same client.
• Unknown unicast, multicast, and broadcast traffic received from CCEP is forwarded as usual, with
the default behavior to flood the entire VLAN.
• The cluster ID must be unique when there are multiple clusters interconnected in a topology. For
example, in a cascaded Stage 2 MCT cluster, the cluster ID on a stage 1 pair of switch should be
different from the cluster ID on a stage 2 pair of switch.
MCT terminology
• MCT cluster: A pair of devices (switches) that is clustered together using MCT to appear as a
single logical device. The devices are connected as peers through an Inter-Chassis Link (ICL).
• MCT cluster device: One of the two devices in an MCT cluster.
• MCT peer device: From the perspective of an MCT cluster device, the other device in the MCT
cluster.
• MCT cluster client: A device that connects with MCT cluster devices through static or dynamic
trunks. It can be a switch or an endpoint server host in the single-level MCT topology or another
pair of MCT devices in a multi-tier MCT topology.
• Inter-Chassis Link (ICL): A single-port or multi-port 1 GbE or 10 GbE interface between the two
MCT cluster devices. It provides the control path for CCP for the cluster and also serves as the
data path between the two devices.
• MCT VLANs: VLANs on which MCT cluster clients are operating. Any VLAN that has an ICL port is
an MCT VLAN, even though it does not have any clients.
• MCT session VLANs: The VLAN used by the MCT cluster for control operations. CCP protocol runs
over this VLAN. The interface can be a single link or a trunk group port. If it is a trunk group port, it
should be the primary port of the trunk group. The MCT session VLAN subnet is not distributed in
routing protocols using redistribute commands.
• MCT keep-alive VLAN: The VLAN that provides a backup control path in the event that ICL goes
down.
• Cluster Communication Protocol (CCP): A Brocade proprietary protocol that provides reliable,
point-to-point transport to synchronize information between MCT cluster devices. It is the default
MCT control path between the two peer devices. CCP comprises two main components: CCP peer
management and CCP client management. CCP peer management deals with establishing, and
maintaining a TCP transport session between peers, while CCP client management provides
event-based, reliable packet transport to CCP peers.
• Cluster Client Edge Port (CCEP): A physical port or trunk group interface on an MCT cluster device
that is connected to client devices.
• Cluster Edge Port (CEP): A port on an MCT cluster device that belongs to the MCT VLAN and
connects to an upstream core switch/router, but is neither a CCEP not an ICL.
• RBridgeID: RBridgeID is a value assigned to MCT cluster devices and clients to uniquely identify
them, and helps in associating the source MAC address with an MCT device.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 159
53-1002967-03
Multi-Chassis Trunking
configuration example, and Two-level MCT example on page 202 for a two-level or cascading
configuration example.
Basic MCT data flow works as follows.
Broadcast, unknown unicast, and multicast (BUM) traffic from a client through a CCEP
1. Traffic originates at the client.
2. Because the link between the client switch and the MCT cluster is a trunk, the traffic travels over
one physical link. In the example in Figure 26 on page 160, the traffic travels over the link
towards cluster device 2. The traffic enters the MCT cluster through the CCEP of cluster device 2.
3. The traffic is sent to any local CEPs and CCEPs. It passes to the peer cluster device over the ICL
link, where it is sent to the peer device’s local CEPs.
4. Traffic does not pass back down to the client through the CCEP.
Refer to the following figure.
160 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Multi-Chassis Trunking
3. Depending on the destination, the traffic may pass over the ICL link to the other cluster device. In
the example in Figure 27 on page 161, the destination is on cluster device 1, so the traffic is
forwarded out to the ICL port.
4. The traffic passes out to the destination.
Refer to the following figure.
Broadcast, unknown unicast, and multicast (BUM) traffic from a client through a CEP
1. Traffic originates at the client and enters one of the MCT cluster devices through a CEP.
2. The traffic is sent to the peer cluster device through the ICL link and also sent to any local CCEPs
and CEPs. Once traffic is received on the peer cluster device, it will be sent to its local CEPs.
3. Traffic does not pass back down to the client through the CCEP.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 161
53-1002967-03
Multi-Chassis Trunking
162 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Multi-Chassis Trunking
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 163
53-1002967-03
MCT and VLANs
164 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
MCT feature interaction
• Cluster client automatic configuration is designed for generating new clients, not for updating an
existing client.
• A single client span across multiple devices is not supported (cascading MCT). For example, the
configuration of cascading MCT through cluster client automatic configuration is not supported.
• Multiple clients on the same device are not supported.
• LACP client interface auto-detection is supported only for devices running release 7.4 software and
later on FastIron platforms.
• RBridgeID collision: When hash collisions occur, cluster client automatic configuration reports
errors, and manual intervention is required.
For cluster client automatic configuration to work, the following prerequisites are required on the cluster
side:
• The cluster must be configured on both MCT cluster devices.
• An MCT VLAN must be configured on both MCT cluster devices.
• The trunk group configuration must be removed from the client interfaces.
• The client interfaces must be up and operational.
• The cluster ID must be unique when there are multiple clusters interconnected in a topology. For
example, in a cascaded Stage 2 MCT cluster, the cluster ID on a stage 1 pair of switch should be
different from the cluster ID on a stage 2 pair of switch.
The following prerequisites are required on the client side:
• VLAN and trunk group configuration must be completed.
• Link Level Discovery Protocol (LLDP) must be enabled.
Refer to Setting up cluster client automatic configuration on page 170 for detailed instructions on the
cluster client automatic configuration process.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 165
53-1002967-03
MCT configuration considerations
‐ If the trusted ports are off the CCEP, the arp inspection trust or dhcp snoop trust
command must be used on the CCEPs and ICL ports.
‐ DHCP and ARP entries are created on both MCT cluster devices if the flow traverses
both the CCEP and ICL.
• Hitless failover. If the failover operation is performed with a cluster configuration, the TCP session
is reestablished. The MAC addresses from the cluster peer devices will be revalidated and
programmed accordingly.
• Hitless upgrade. If the upgrade operation is performed with a cluster configuration, the TCP
session is reestablished. The MAC addresses from the cluster peer devices will be revalidated
and programmed accordingly.
The following FastIron features are not supported with MCT:
• LACP on ICL.
• MSTP, VSRP, RIP, OSPF, IS-IS, and BGP.
• IPv6, VRRP-E (IPv6), and VRRPv3.
• GRE on the ICL VE interfaces.
• DAI on the CCEPs.
• Host security features (port MAC security, multi-port authentication, 802.1X, DAI, DHCP
snooping) on CCEPs.
• Multi-port ARP on ICL or CCEPs.
• Web authentication on MCT VLANs.
166 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Differences in configuring MCT for the switch and router image
Configuring MCT
This section provides basic configuration steps, which should be completed in the specified order.
Step 1: Configure LAG on page 167
Step 2: Configure the session VLAN and recommended keep-alive VLAN on page 168
Step 3: Configure the cluster on page 168
Step 4: Configure clients on page 169
After completing these steps, you can verify the configuration by running the show cluster command.
Refer to Displaying peer and client states on page 191.
NOTE
ICL LAG only supports static trunks.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 167
53-1002967-03
Step 2: Configure the session VLAN and recommended keep-alive VLAN
device-1(config-vlan-3000)#router-interface ve 3000
device-1(config)# interface ve 3000
device-1(config-vif-3000)#ip address 10.1.1.3/24
For switches, add the following commands.
device-2
(config)# vlan 3001 name MCT-keep-alive
device-2
(config-vlan-3001)#tagged ethernet 2/10
device-2
(config-vlan-3001)#exit
device-2
(config)# vlan 3000 name Session-VLAN
device-2
(config-vlan-3000)# tagged ether 2/5 to 2/6
device-2
(config-vlan-3000)#no spanning-tree
For routers, add the following commands.
device-2
(config-vlan-3000)#router-interface ve 3000
device-2
(config)#interface ve 3000
device-2
(config-vif-3000)#ip address 10.1.1.2/24
For switches, add the following commands.
device-2
(config)#ip address 10.1.1.2/24
To implicitly configure the session VLAN and add the ICL as a tagged member of the VLAN, enter the
following commands.
168 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Step 4: Configure clients
device-1(config)#cluster SX 4000
device-1(config-cluster-SX)#rbridge-id 3
device-1(config-cluster-SX)#session-vlan 3000
device-1(config-cluster-SX)#keep-alive-vlan 3001
device-1(config-cluster-SX)#icl SX-MCT ethernet 1/7
device-1(config-cluster-SX)#peer 10.1.1.2 rbridge-id 2 icl SX-MCT
device-1(config-cluster-SX)#deploy
To configure Brocade-2 for the cluster in the Figure 31 on page 185 topology, enter the following
commands.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 169
53-1002967-03
Setting up cluster client automatic configuration
To configure Client-2 on Brocade-2 in the Figure 31 on page 185 topology, enter the following
command.
device-1(config-cluster-SX)#client-auto-detect start
Within one minute, the system reports information and errors (if there are mismatches such as an
LACP configuration mismatch). You can fix the mismatch while the process is running.
3. Check and fix the automatically detected clients.
NOTE
At this point, the client configuration does not appear in the running configuration and cannot be
modified. Static trunk and LACP configuration are not effective yet.
4. Configure automatically detected clients into the running configuration.
device-1(config-cluster-SX)#client-auto-detect config
All automatically configured client information is now published into the running configuration and
the static trunk configuration will be generated, created, and deployed. LACP will start. By default,
clients are in the non-deployed state and the CCEPs will be put into the disable state. Ports that
are successfully programmed as CCEP will be removed from the autoconfig-enabled port list. If
the port list is empty, which means all ports are configured into clients successfully, the automatic
configuration process will be stopped. The original LLDP configuration will be restored. Otherwise,
the automatic configuration process will continue only on the ports still left in the list.
170 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Other cluster client automatic configuration commands
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 171
53-1002967-03
Cluster failover mode
NOTE
Brocade recommends using keep-alive VLANs with the MCT configurations. This will provide a
alternative reachability if the ICL interface goes down. However, a keep-alive VLAN should not be
configured when bpdu-flood-enable is configured. Refer to BPDU forwarding on page 179.
• ICL interface or CCP goes down (keep-alive not configured)
When the keep-alive VLAN is not configured, both cluster devices will keep forwarding. Use the client-
isolation strict command to remove the client interface as soon as the ICL link goes down and
completely isolates the client.
• Double failures (for example, when the ICL goes down and the client interface goes down on one
of the MCT cluster devices)
Multiple failures could drop traffic in this scenario, even if there is a physical path available.
NOTE
The CLI will allow modification of the client isolation mode on MCT cluster devices even when the
cluster is deployed. You must create the same isolation mode on both cluster devices.
MCT cluster devices can operate in two modes. Both peer devices should be configured in the same
mode.
Loose mode (default): When the CCP goes down, the peer device performs the master/slave
negotiation. After negotiation, the slave shuts down its peer ports, whereas the master peer ports
continue to forward the traffic (keep-alive VLAN configured).
If the keep-alive VLAN is not configured, both peer devices become master and both of the client ports
stay up.
172 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Shutting down all client interfaces
NOTE
Keep-alive VLAN configuration is not allowed when the client isolation mode is strict, and when the
keep-alive VLAN is configured, client isolation mode cannot be configured as strict.
device-1(config-cluster-SX))# keep-alive-vlan 10
Syntax: [no] keep-alive-vlan vlan-id
The vlan_id variable specifies the VLAN range. Possible values are from 1 to 4089.
When the CCP is down, the following results occur.
• If the keep-alive VLAN is configured, then CCRR messages are sent every second over that VLAN.
• When CCP is down and the keep-alive VLAN is configured, master/slave selection is based on
following criteria:
‐ If one device’s CCEPs are up and the peer’s CCEPs are down, then the peer with the
local CCEPs down becomes the slave.
‐ Otherwise, the device with the higher RBridgeID becomes the slave.
• If no packets are received from the peer device for a period of three seconds, then the peer is
considered down.
• If the keep-alive VLAN is not configured and both the peer devices are up, then both peers keep
forwarding the traffic independently.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 173
53-1002967-03
Layer 2 behavior with MCT
The hold-time variable can be from 3 to 65535 and must be at least 3 times the keep-alive time. The
default is 90 seconds.
NOTE
The keep-alive VLAN and keep-alive timers are not related. The keep-alive timer is used by CCP.
MAC operations
This section describes MAC address-related configuration operations.
174 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
MAC show commands
Cluster Multi-Destination Local MAC (CML): A static MAC entry is configured locally on the MCT
VLAN. Any static MAC address configured on MCT VLAN will have ICL added by default so it will
automatically become a multi-destination MAC entry. The local configuration generates a local MDB,
any CML entry can still have up to 2 MDBs associated with, one local and one remote. The remote
MDB comes with the remote static configuration for the same (MAC, VLAN). If the dynamic MAC and
static configuration co-exist, the dynamic MAC address will be removed whether it is locally learnt or
learned from MDUP. The port list of a CML entry has a ICL port, the client ports from the client list in the
local and remote (if exists) configuration, and all locally configured CEP ports.
Cluster Multi-Destination Remote MAC (CMR): A static MAC entry is configured on MCT VLAN on
the peer side and there is no associated local configuration. The CMR entry has only the remote MDB.
The port list of a CMR entry has an ICL port, and all the client ports from the client list in the remote
configuration. When there is local configuration for the same entry, the CMR is converted to CML.
MAC aging
Only the local MAC entries are aged on a cluster device. The remote MAC address entries are aged
based on explicit MDUP messages only.
The remote MAC addresses learned through MDUP messages are dynamic addresses with the
exception that they never age from FDB.
MAC flush
If the CEP is down, the MAC addresses are flushed and individual MAC deletion messages are sent to
the peer device.
If the CCEP local port is down, the MAC addresses are flushed locally and individual MAC deletion
messages are sent to the peer device.
If the clear mac command is given, all the MDB and FDB are rebuilt.
If the clear mac vlan command is given, all the local MDB and FDB are rebuilt for that VLAN.
MAC movement happens normally on the local device.
CEP to CCEP MAC movement - MAC movement normally happens on the local device, and deletes all
the other MDBs from the peer to create a new local MDB.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 175
53-1002967-03
MAC clear commands
device#clear mac
Syntax: clear mac
176 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Syncing router MAC addresses to peer MCT devices
================
MDUP Data buffers in queue : 0
MDUP Statistics
===============
MDUP Update Messages sent: 7
Add Mac sent: 20
Del Mac sent: 0
Move Mac sent: 0
MDUP Mac Info Messages sent: 1
MDUP Flush Messages sent: 1
MDUP Synch Messages sent: 0
MDUP Update Messages received: 3
Add Mac received: 40
Del Mac received: 0
Move Mac received: 0
MDUP Mac Info Messages received: 0
MDUP Flush Messages received: 0
MDUP Synch Messages received: 0
Syntax: show mac mdup-stats
Dynamic trunks
MCT client creates a single dynamic trunk group towards the MCT cluster devices. The dynamic trunk
group consists of two trunk groups, each of which is configured on one of the MCT devices. A dynamic
trunk group runs Link Aggregation Control Protocol (LACP).
For the two dynamic trunk groups of the MCT to behave as a single trunk group from the MCT client’s
perspective, both of the dynamic trunk groups should have the same LACP system ID and key, referred
to as the MCT system ID and MCT key.
The LACP system ID in the FSX product normally comes from the port MAC address. To support LACP
over MCT, it is necessary to obtain the ID in another way. To do so, MCT uses a pre-defined algorithm.
NOTE
Each MCT cluster device has a unique cluster ID, and one MCT client ID. The LACP key is predefined
from the client ID and cluster ID. The user cannot change the key.
MCT does not involve stacking, and control protocol synchronization is minimal. The LACP runs
independently on the cluster devices.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 177
53-1002967-03
MCT Layer 2 protocols
shut down. If loop detection BDPUs are received on the ICL port, then instead of shutting down the
ICL links, all the CCEPs will be error-disabled and the user will be notified with the following log
message.
device(config)#vlan 1905
device(config-vlan-1905)#loop-detection
device(config-vlan-1905)#end
MRP
• An ICL interface cannot be configured as an MRP secondary interface or vice versa, because the
ICL cannot be BLOCKING.
• MRP cannot be enabled on MCT CCEP port and vice versa.
STP/RSTP
STP is not recommended to be configured on MCT VLANs at MCT cluster devices. By default, the
spanning tree is disabled in the MCT VLANs. If the network topology may be creating Layer 2 loops
through external connections, STP could be enabled on switches outside the MCT cluster to prevent
the Layer 2 loop. The MCT cluster devices will perform a pass-through forwarding of STP BPDUs
received through its ports in the MCT VLAN.
• In rare cases in which the network topology consists of Layer 2 loops outside the MCT cluster that
require STP/RSTP to be enabled on MCT VLANs in the cluster, the CCEPs will always be in the
spanning tree disabled state. Refer to MCT configuration examples using STP on page 212to
view deployment scenarios where STP is used in an MCT configuration to prevent Layer 2 loops.
• The STP/RSTP algorithms have been modified such that ICL never goes to blocking. The ICL
guard mechanism ensures that if ICL is going into a blocking state, then the port on which the
superior BPDUs are being received is moved to blocking state and the ICL guard timer starts
running on it. This timer runs as long as superior BPDUs are received on this interface. As long as
this timer runs on an interface, the superior BPDUs are dropped.
• The new BLK_BY_ICL STP state indicates that the superior BPDUs were received on this
interface, which could have led to blocking of the ICL interface, with the result that the CL port
guard mechanism has been triggered on this port.
• In a 802.1s MSTP deployment, Brocade recommends disabling spanning tree on the MCT cluster
devices at the global level. MSTP cannot be configured on individual cluster devices.
• An MCT cluster can support up to 32 spanning tree instances.
178 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
BPDU forwarding
BPDU forwarding
If the network deploys single STP or IEEE 802.1s (MSTP), both the MCT cluster devices must be
configured using the bpdu-flood-enable command to flood the single STP/MSTP BPDUs in the SSTP/
MSTP domain (forward to all of the ports in the cluster switch irrespective of VLAN.)
Syntax: [no] bpdu-flood-enable
When bpdu-flood-enable is configured, there should not be any links other than the ICL (including the
keep-alive VLAN link) connecting the two MCT cluster devices. If there is an additional link, then the
flooded BPDU will cause a loop and high CPU utilization.
Protocol-based VLANs
Protocol and subnet VLANs can be configured on MCT VLANS, however, ICL and CCEPs cannot be
configured as dynamic members of protocol based VLANs (and vice versa). ICL and CCEP can either
be excluded or static members of protocol based VLANs. CEPs can be configured as dynamic or static,
or exclude members of protocol based VLANs.
In a cluster, both cluster devices should have exactly same protocol VLAN membership with respect to
ICL and CCEP. ICL and CCEPs should be configured with same type of protocol/VLAN membership,
although there is no such restriction from the CLI.
Uplink switch
Uplink switch is supported on MCT VLANs. ICLs and CCEPs can be configured as uplink-switch ports.
Both cluster devices should have exactly same uplink-switch port memberships with respect to the ICL
and CCEPs.
IGMP/MLD snooping
Snooping can be configured globally or at the VLAN level. Each cluster device in the MCT VLAN can be
configured either as active or passive. There is no restriction for cluster devices to run active-active or
passive-passive configuration.
The following commands show configuration commands for the VLAN level (IGMP), VLAN level (MLD),
global level (IGMP/MLD), and for PIM-SM and PIM6-SM.
VLAN level (IGMP)
device(config)#vlan 100
device(config-vlan-100)#multicast active/passive
VLAN level (MLD)
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 179
53-1002967-03
IGMP/MLD snooping behavior on MCT cluster devices
device(config)#vlan 100
device(config-vlan-100)#multicast passive
device(config-vlan-100)# multicast pimsm-snooping
PIM6-SM snooping (configured only on a VLAN and requires MLD snooping to run in a passive mode):
device(config)#vlan 100
device(config-vlan-100)#multicast6 passive
device(config-vlan-100)# multicast6 pimsm-snooping
180 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
PIM-SM and PIM6-SM snooping over MCT
(S,G)Join on (MCT-1)CCEP (*,G)->CCEP [s], ICL [s] (*,G)->CCEP [s], ICL [s]
a.) *ICL: The ICL port is added as default whenever CCEP is in OIF. The data traffic receiving from ICL port will be filtered out by egress
filter (dynamically programmed) on CCEPs.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 181
53-1002967-03
Forcing a port up in a basic MCT configuration
a.) *ICL: The ICL port is added as default whenever CCEP is in OIF. The data traffic receiving from ICL port will be filtered out by egress
filter (dynamically programmed) on CCEPs.
NOTE
When multiple ports from the same server are connected to an ICX 6650, the port on the ICX 6650
connected to the PXE-capable port on the server is the port that must be configured to the force-up
state. The PXE-capable port varies from server to server.
182 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Layer 3 behavior with MCT
• If the force-up port goes down while in a link aggregation group, the port continues to perform like a
normal LACP trunk, with the server operational with some ports down.
• If the force-up port stops receiving LACPDU, the port ignores the time-out and stays operational.
To configure the LACP client in a force-up state, use the client-interface link-aggregation force-
up ethernet command at the Client level.
dvmrp No No
follow No No
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 183
53-1002967-03
Multi-Chassis Trunking
igmp No No
irdp No Yes
local-proxy-arp No Yes
metric No Yes
multicast-boundary No No
ospf No No
pim No No
pim-sparse No No
policy No Yes
proxy-arp No Yes
redirect No Yes
rip No No
tunnel No No
vrrp No Yes
vrrp-extended No Yes
a.) *ICL: The ICL port is added as default whenever CCEP is in OIF. The data traffic receiving from ICL port will be filtered out by egress
filter (dynamically programmed) on CCEPs.
184 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Layer 3 unicast over MCT
Device A
MCT Configuration
!
vlan 10 by port
tagged ethe 3/1
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 185
53-1002967-03
Device B
router-interface ve 10
!
interface ve 10
ip address 10.1.1.1 255.255.255.0
!
cluster L3UC 1
rbridge-id 101
session-vlan 10
icl L3icl ethernet 3/1
peer 10.1.1.2 rbridge-id 102 icl L3icl
deploy
client s1
rbridge-id 300
client-interface ethernet 3/3
deploy
!
VRRP-E Configuration
!
vlan 100 by port
tagged ethe 3/1 ethe 3/3
router-interface ve 100
!
router vrrp-extended
!
interface ve 100
ip address 10.1.1.1 255.255.255.0
ip vrrp-extended vrid 1
backup priority 255
ip-address 10.1.1.254
enable
!
Device B
MCT Configuration
!
vlan 10 by port
tagged ethe 3/1
router-interface ve 10
!
interface ve 10
ip address 10.1.1.2 255.255.255.0
!
cluster L3UC 1
rbridge-id 102
session-vlan 10
icl L3icl ethernet 3/1
peer 10.1.1.1 rbridge-id 101 icl L3icl
deploy
client s1
rbridge-id 300
client-interface ethernet 3/25
deploy
!
VRRP-E Configuration
!
vlan 100 by port
tagged ethe 3/1 ethe 3/25
router-interface ve 100
186 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Switch S1
!
router vrrp-extended
!
interface ve 100
ip address 10.1.1.2 255.255.255.0
ip vrrp-extended vrid 1
backup
ip-address 10.1.1.254
enable
!
Switch S1
!
trunk ethe 3 to 4
!
vlan 100 by port
tagged ethe 3 to 4
router-interface ve 100
!
interface ve 100
ip address 10.1.1.100 255.255.255.0
!
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 187
53-1002967-03
ARP resolution
ARP resolution
ARP resolution is initially done through the ICL if the S1 MAC address is not already known on the
CCEP at A. When the MDUP message from the cluster peer device moves the S1 MAC from ICL to
CCEP, the ARP is also moved.
If S1 triggers an ARP request, it generally does so for the default gateway address (virtual IP address
if VRRP is deployed). This ARP request can reach A either directly from S1, or through B.
• If the ARP request reaches A directly, it replies through the same port on which it learned S1's
MAC address.
• If the request is by way of B, S1's ARP response will be learned on the ICL first, then it will move
to the CCEP link when the MDUP message for S1's MAC address is received from B.
188 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Multi-Chassis Trunking
ICL. The VRRP or VRRP-E master router will broadcast hello packets to all VLAN member ports,
including ICL ports.
Configuration considerations
• MCT devices must have complete routing information using static routes for Layer 3 forwarding.
• For MCT devices configured with VRRP or VRRP-E, track-port features can be enabled to track the
link status to the core devices so the VRRP or VRRP-E failover can be triggered.
• It is not supported to configure several Layer 3 features on VE of the session VLAN. If already
configured, such a VLAN cannot be made the session VLAN.
• It is not supported to configure UC/MC routing protocols and the IP follow feature on VEs of
member VLANs. If already configured, such a VLAN cannot be made a member VLAN.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 189
53-1002967-03
VRRP-E short-path forwarding and revertible option
• IPv6 configurations are not supported on VEs of session and member VLANs,
• Route-only ports cannot be used as CCEP and ICL ports.
• Global route-only configuration is mutually exclusive with MCT cluster configuration.
• It is not supported to use MCT management interface IPs for tunnel source.
• It is not supported to configure static and policy based routes using VE on MCT session VLAN.
• Configurations to redistribute connected routes will not advertise IPs on MCT management
interface.
• IP addresses on the MCT management interface should not be used for BGP peers on
neighboring devices.
• IP addresses on the MCT management interface should not be used for static configurations on
neighboring devices.
• The track port feature should be used for VRRP switchover and controlling the validity of SPF
feature.
• Up to 64 VRRP or VRRP-E instances are supported on an MCT cluster; however, with Jumbo
enabled, a maximum of 32 VRRP or VRRP-E instances is supported on an MCT cluster.
NOTE
Brocade recommends disabling ICMP redirect globally to avoid unintended CPU forwarding of traffic
when VRRP or VRRP-E is configured.
device(config-if-e1000-vrid-2)#short-path-forwarding revert-priority 60
Syntax: [no] short-path-forwarding [ revert-priority value]
Use the supplied priority value as a threshold to determine if the short-path-forwarding behavior should
be effective or not. If one or more ports tracked by the track-port command go down, the current
190 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying MCT information
priority of VRRP-E will be lowered by a specific amount configured in the track-port command for each
port that goes down.
Once the current-priority is lower than the threshold, short path forwarding will be temporarily
suspended and revert back to the regular VRRP-E forwarding behavior (non-short path forwarding
behavior).
The reverting behavior is only temporary. If one or more of the already down ports tracked by the track-
port command come back, it is possible that the current priority of VRRP-E will be higher than the
threshold again and the short-path-forwarding behavior will be resumed.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 191
53-1002967-03
Displaying cluster, peer, and client states
Client Info:
------------
Client: c1, rbridge-id: 300, Deployed
Client Port: 3/11
State: Up
Number of times Local CCEP down: 0
Number of times Remote CCEP down: 0
Number of times Remote Client undeployed: 0
Total CCRR packets sent: 4
Total CCRR packets received: 3
cluster and client undeployed Neither the cluster nor client is deployed.
192 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying information about Ethernet interfaces
Receive 3 2415 0 37
0
TCP connection is up
TCP connection is initiated by 10.1.1.2
TCP connection tcbHandle not pending
TCP connection packets not received
**************TCP Connection Details*********************
TCP Connection state: ESTABLISHED Maximum segment size: 1436
Local host: 10.1.1.2, Local Port: 12203
Remote host: 10.1.1.1, Remote Port: 4175
ISentSeq: 1867652277 SendNext: 1867660731 TotUnAck: 0
TotSent: 8454 ReTrans: 9 UnAckSeq: 1867660731
IRcvSeq: 3439073167 RcvNext: 3439078415 SendWnd: 16384
TotalRcv: 5248 DupliRcv: 16 RcvWnd: 16384
SendQue: 0 RcvQue: 0 CngstWnd: 1452
Syntax: show cluster [ cluster_name/cluster-id ] ccp peer [ details ]
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 193
53-1002967-03
Displaying STP information
device#show span
...
STP instance owned by VLAN 10
Global STP (IEEE 802.1D) Parameters:
VLAN Root Root Root Prio Max He- Ho- Fwd Last Chg Bridge
ID ID Cost Port rity Age llo ld dly Chang cnt
Address
Hex sec sec sec sec sec
10 00000012f2aacf84 4 7/15 8000 20 2 1 15
10 1 00243822226e
Port STP Parameters:
Port Prio Path State Fwd Design
Designated Designated
Num rity Cost Trans Cost
Root Bridge
Hex
7/15 80 4 FWD_BY_MCT 1 0 00000012f2aacf84
00000012f2aacf84
7/21 80 4 BLK_BY_ICL 1 4 00000012f2aacf84
800000243822226e
7/23 80 4 FORWARDING 7 4 00000012f2aacf84
800000243822226e
STP instance owned by VLAN 15
Global STP (IEEE 802.1D) Parameters:
VLAN Root Root Root Prio Max He- Ho- Fwd Last Chg Bridge
ID ID Cost Port rity Age llo ld dly Chang cnt
Address
Hex sec sec sec sec sec
15 00000012f2aacf84 4 7/15 8000 20 2 1 15
10 1 00243822226e
Port STP Parameters:
Port Prio Path State Fwd Design
Designated Designated
Num rity Cost Trans Cost
Root Bridge
Hex
7/15 80 4 BLK_BY_MCT 1 0 00000012f2aacf84
00000012f2aacf84
194 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying information for multicast snooping
(*,G) entry:
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 195
53-1002967-03
Multi-Chassis Trunking
196 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
MCT configuration examples
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 197
53-1002967-03
Single-level MCT example
198 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Client 1 - Configuration
Client 1 - Configuration
This section presents the configuration for client 1 in Figure 33 on page 198.
!
vlan 1905 by port
tagged ethe 5/1/47 to 5/1/48 ethe 7/1/1 to 7/1/3 ethe 8/1/1 to 8/1/3 ethe
8/1/45
spanning-tree
!
!
lag lag_client1_1 dynamic id 100
ports ethe 7/1/1 to 7/1/3
primary-port 7/1/1
deploy
lag lag_client1_2 dynamic id 101
ports ethe 8/1/1 to 8/1/3
primary-port 8/1/1
deploy
Client 2- Configuration
This section presents the configuration for client 2 in Figure 33 on page 198.
!
vlan 1905 name MAC-scaling-vlan by port
tagged ethe 1/1/1 to 1/1/3 ethe 1/1/45 ethe 2/1/47 to 2/1/48 ethe 3/1/1 to
3/1/3
spanning-tree
!
!
lag lag_client2_1 dynamic id 200
ports ethe 1/1/1 to 1/1/3
primary-port 1/1/1
deploy
lag lag_client2_2 dynamic id 201
ports ethe 3/1/1 to 3/1/3
primary-port 3/1/1
deploy
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 199
53-1002967-03
AGG-B(R2) - Configuration
AGG-B(R2) - Configuration
This section presents the configuration for the AGG-B(R2) cluster device in Figure 33 on page 198.
200 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Multi-Chassis Trunking
hostname R2
!
interface ve 2
ip address 192.168.10.2 255.255.0.0
!
interface ve 3
ip address 192.168.10.3 255.255.0.0
!
interface ve 4
ip address 192.168.10.4 255.255.0.0
!
cluster MCT1 1
rbridge-id 2
session-vlan 2
keep-alive-vlan 3
icl BH1 ethernet 2/1
peer 10.0.0.1 rbridge-id 1 icl BH1
deploy
client client-1
rbridge-id 1901
client-interface ethe 1/21
deploy
client client-2
rbridge-id 1902
client-interface ethe 1/17
!
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 201
53-1002967-03
Two-level MCT example
The client configuration is the same as in the single-level example (refer to Single-level MCT example
on page 198).
202 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
AGG-B (R2) - Configuration
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 203
53-1002967-03
Multi-Chassis Trunking
204 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
DIST-A (R3) - Configuration
!
lag lag_dist_a_1 dynamic id 15
ports ethe 1/1 to 1/12
primary-port 1/1
deploy
lag lag_dist_a_2 dynamic id 16
ports ethe 15/1 to 15/2
primary-port 15/1
deploy
!
vlan 5 name session-vlan by port
tagged ethe 1/1 to 1/2
router-interface ve 5
!
vlan 6 name keep-alive-vlan by port
tagged ethe 11/25 to 11/36
router-interface ve 6
spanning-tree
!
!
vlan 1905 name MAC-scaling-vlan by port
tagged ethe 1/1 to 1/2 ethe 3/24 ethe 15/1 to 15/2
!
hostname R3
hitless-failover enable
!
lag lag_1 dynamic id 20
ports ethe 11/25
primary-port 11/25
deploy
!
.........................................................
!
lag lag_2 dynamic id 22
ports ethe 11/36
primary-port 11/36
deploy
!
interface ve 5
ip address 10.2.1.1 255.255.0.0
!
interface ve 6
ip address 10.2.1.2 255.255.0.0
!
cluster MCT2 2
rbridge-id 2
session-vlan 5
keep-alive-vlan 6
icl BH3 ethernet 1/1
peer 192.168.1.2 rbridge-id 4 icl BH3
deploy
client AGG-A
rbridge-id 1801
client-interface ethernet 15/2
deploy
client AGG-B
rbridge-id 1802
client-interface ethernet 15/1
deploy
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 205
53-1002967-03
DIST-B (R4) - Configuration
206 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
MCT configuration with VRRP-E example
!
lag lag_sx800a dynamic id 55
ports ethe 5/1 to 5/2
primary-port 5/1
deploy
!
port-name "ICL-To_SX800B_eth5/1" ethernet 5/1
port-name "ICL-To_SX800B_eth5/2" ethernet 5/2
!
!
vlan 110 name VRRP-E by port
tagged ethe 4/1 ethe 5/1 to 5/2
router-interface ve 110
!
vlan 1000 name ICL-Session-VLAN by port
tagged ethe 5/1 to 5/2
router-interface ve 1000
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 207
53-1002967-03
SX800A - VRRP-E configuration
!
vlan 1001 name MCT-Keep-Alive by port
tagged ethe 5/3
!
interface ve 1000
ip address 10.0.0.254 255.255.255.252
!
cluster FI-MCT 1750
rbridge-id 801
session-vlan 1000
keep-alive-vlan 1001
icl FI_SX-MCT ethernet 5/1
peer 10.0.0.253 rbridge-id 800 icl FI_SX-MCT
deploy
client S1-SW
rbridge-id 777
client-interface ethe 4/1
deploy
!
!
router vrrp-extended
!
interface ve 110
port-name S1-SW
ip address 10.110.0.253 255.255.255.0
ip vrrp-extended vrid 110
backup
ip-address 10.110.0.254
short-path-forwarding
enable
!
!
vlan 110 name VRRP-E by port
tagged ethe 4/1 ethe 5/1 to 5/2
router-interface ve 110
!
vlan 1000 name ICL-Session-VLAN by port
tagged ethe 5/1 to 5/2
router-interface ve 1000
!
vlan 1001 name MCT-Keep-Alive by port
tagged ethe 5/3
!
interface ve 1000
ip address 10.0.0.253 255.255.255.252
!
cluster FI-MCT 1750
rbridge-id 800
session-vlan 1000
keep-alive-vlan 1001
icl FI_SX-MCT ethernet 5/1
peer 10.0.0.254 rbridge-id 801 icl FI_SX-MCT
deploy
208 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
SX800B - VRRP-E configuration
client S1-SW
rbridge-id 777
client-interface ethe 4/1
deploy
!
!
router vrrp-extended
!
interface ve 110
port-name S1-SW
ip address 10.110.0.252 255.255.255.0
ip vrrp-extended vrid 110
backup
ip-address 10.110.0.254
short-path-forwarding
enable
!
S1-SW configuration
This example presents the configuration for the S1-SW device in Figure 34 on page 202.
!
lag lag_s1_sw dynamic id 60
ports ethe 1/1/1 to 1/1/2
primary-port 1/1/1
deploy
!
Vlan 110 by port
tagged ethe 1/1/1 to 1/1/2
router-interface ve 110
!
interface ve 110
ip address 10.110.0.1 255.255.255.0
!
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 209
53-1002967-03
Multicast snooping configuration example
The following example shows the configuration for multicast snooping for the MCT1 cluster device in
the above figure.
210 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Multi-Chassis Trunking
!
vlan 3000 name session by port
tagged ethe 7/3
router-interface ve 3000
vlan 3001 name keep-alive-vlan
tagged eth 7/4
interface ve 3000
ip address 10.1.1.2 255.255.255.0
!
cluster SX 3000
rbridge-id 2
session-vlan 3000
keep-alive-vlan 3001
icl SX-MCT ethernet 7/3
peer 10.1.1.3 rbridge-id 3 icl SX-MCT
deploy
client client-1
rbridge-id 100
client-interface ethernet 7/5
deploy
!
The following example shows the configuration for multicast snooping for the MCT2 cluster device in
Figure 36 on page 210.
!
vlan 100 by port
tagged ethe 3/3
untagged ethe 3/7 ethe 3/8
multicast passive
multicast pimsm-snooping
multicast6 passive
multicast6 pimsm-snooping
!
vlan 3000 name session by port
tagged ethe 3/3
router-interface ve 3000
vlan 3001 name keep-alive-vlan
tagged eth 3/4
interface ve 3000
ip address 10.1.1.3 255.255.255.0
!
cluster SX 3000
rbridge-id 3
session-vlan 3000
keep-alive-vlan 3001
icl SX-MCT ethernet 3/3
peer 10.1.1.2 rbridge-id 2 icl SX-MCT
deploy
client client-1
rbridge-id 100
client-interface ethernet 3/7
deploy
!
The following example shows the global configuration for multicast snooping for the MCT1 cluster
device in Figure 36 on page 210.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 211
53-1002967-03
MCT configuration examples using STP
router-interface ve 3000
vlan 3001 name keep-alive-vlan
tagged eth 7/4
ip multicast active
interface ve 3000
ip address 10.1.1.2 255.255.255.0
!
cluster SX 3000
rbridge-id 2
session-vlan 3000
keep-alive-vlan 3001
icl SX-MCT ethernet 7/3
peer 10.1.1.3 rbridge-id 3 icl SX-MCT
deploy
client client-1
rbridge-id 100
client-interface ethernet 7/5
deploy
!
The following example shows the global configuration for multicast snooping for the MCT2 cluster
device in Figure 36 on page 210.
!
vlan 100 by port
tagged ethe 3/3
tagged ethe 3/7 ethe 3/8
!
vlan 1000 by port
tagged ethe 3/3
tagged ethe 3/7 ethe 3/8
!
vlan 3000 name session by port
tagged ethe 3/3
router-interface ve 3000
vlan 3001 name keep-alive-vlan
tagged eth 3/4
ip multicast passive
interface ve 3000
ip address 10.1.1.3 255.255.255.0
!
cluster SX 3000
rbridge-id 3
session-vlan 3000
keep-alive-vlan 3001
icl SX-MCT ethernet 3/3
peer 10.1.1.2 rbridge-id 2 icl SX-MCT
deploy
client client-1
rbridge-id 100
client-interface ethernet 3/7
deploy
212 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Multi-Chassis Trunking
The following figure shows the base configuration of the MCT cluster, MCT clients, and the associated
link-aggregation. The scenarios are depicted based on this network topology.
Router-1 configuration
!
trunk ethe 1/1 to 1/3
trunk ethe 1/5 to 1/7
trunk ethe 2/1 to 2/2
!
vlan 2 name session-vlan by port
tagged ethe 2/1 to 2/2
router-interface ve 2
!
vlan 3 name keep-alive-vlan by port
tagged ethe 1/12
router-interface ve 3
!
vlan 1905 name MAC-scaling-vlan by port
tagged ethe 1/1 to 1/3 ethe 1/5 to 1/7 ethe 1/15 to
1/16 ethe 2/1 to 2/2 ethe 2/4 ethe 3/1 ethe 3/3
!
hostname R1
!
link-keepalive ethe 1/1 to 1/3 ethe 1/5 to 1/7
hitless-failover enable
!
interface ve 2
ip address 21.1.1.1 255.255.255.0
!
interface ve 3
!
trunk ethe 1/17 to 1/19
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 213
53-1002967-03
Multi-Chassis Trunking
Client-1 - Configuration
!
trunk ethe 7/1/1 to 7/1/3 ethe 8/1/1 to 8/1/3
!
vlan 1905 by port
tagged ethe 5/1/47 to 5/1/48 ethe 7/1/1 to 7/1/3 ethe 8/1/1 to 8/1/3 ethe
8/1/45
!
link-keepalive ethe 7/1/1 to 7/1/3 ethe 8/1/1 to 8/1/3
!
interface ethernet 5/1/47
link-aggregate configure timout short
link-aggregate configure key 20001
link-aggregate active
!
interface ethernet 5/1/48
link-aggregate configure timout short
link-aggregate configure key 20001
link-aggregate active
!
lldp run
end
Client-2 - Configuration
!
trunk ethe 1/1/1 to 1/1/3 ethe 3/1/1 to 3/1/3
!
vlan 1905 name MAC-scaling-vlan by port
tagged ethe 1/1/1 to 1/1/3 ethe 1/1/45 ethe 2/1/47 to 2/1/48 ethe 3/1/1
to 3/1/3
2/1/48 ethe 3/1/1 to 3/1/3
!
link-keepalive ethe 1/1/1 to 1/1/3 ethe 3/1/1 to 3/1/3
!
interface ethernet 2/1/47
link-aggregate configure timeout short
link-aggregate configure key 20001
link-aggregate active
!
interface ethernet 2/1/48
link-aggregate configure key 20001
link-aggregate configure timeout short
link-aggregate active
!
lldp run
end
214 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Example 1: Configure the Per-VLAN Spanning Tree on the MCT Clients
Client-1 Configuration
Client-2 Configuration
Client-2(config)#vlan 1901
Client-2(config-vlan-1901)#spanning-tree 802-1w
Client-2(config-vlan-1901)#spanning-tree 802-1w priority 4095
Client-2(config-vlan-1901)#vlan 1905
Client-2(config-vlan-1901)#spanning-tree 802-1w
Client-2(config-vlan-1901)#end
The MCT cluster switches do not have the spanning tree configured, but the BPDUs are passed
through and the Spanning Tree on the clients converges.
Use the show 802-1w vlan <vlan-id> command to display the RSTP information for the specified port-
based VLAN.
Router-1 configuration
Router-1(config)#bpdu-flood-enable
Warning - Any recieved untagged BPDUs will now be flooded to all the ports.
Router-2 configuration
Router-2(config)#bpdu-flood-enable
Warning - Any recieved untagged BPDUs will now be flooded to all the ports.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 215
53-1002967-03
Example 3: Configure Multiple Spanning Tree (MSTP) on the MCT Clients
Client-1 configuration
Client-2 configuration
Router-1 configuration
Router-1(config)#bpdu-flood-enable
Warning - Any recieved untagged BPDUs will now be flooded to all the ports.
Router-2 configuration
Router-2(config)#bpdu-flood-enable
Warning - Any recieved untagged BPDUs will now be flooded to all the ports.
Client-1 configuration
216 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Multi-Chassis Trunking
Enter MSTP scope would remove STP and topology group related configuration
for system
Are you sure? (enter ‘y’ or ‘n’): y
‘MSTP Start’ need to be entered in order to activate this MSTP feature
Client-1(config)#mstp start
Client-1(config)#mstp instance 1 vlan 1901
Client-1(config)#mstp instance 1 vlan 1905
Client-1(config)#
Client-2 configuration
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 217
53-1002967-03
218 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
GVRP
Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800
FSX 1600
Configurable GVRP base VLAN ID 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
Ability to disable VLAN advertising 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
Ability to disable VLAN learning 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
GVRP overview
GARP VLAN Registration Protocol (GVRP) is a Generic Attribute Registration Protocol (GARP)
application that provides VLAN registration service by means of dynamic configuration (registration) and
distribution of VLAN membership information.
A Brocade device enabled for GVRP can do the following:
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 219
53-1002967-03
GVRP application examples
• Learn about VLANs from other Brocade devices and configure those VLANs on the ports that
learn about the VLANs. The device listens for GVRP Protocol Data Units (PDUs) from other
devices, and implements the VLAN configuration information in the PDUs.
• Advertise VLANs configured on the device to other Brocade devices. The device sends GVRP
PDUs advertising its VLANs to other devices. GVRP advertises statically configured VLANs and
VLANs learned from other devices through GVRP.
GVRP enables a Brocade device to dynamically create 802.1Q-compliant VLANs on links with other
devices that are running GVRP. GVRP reduces the chances for errors in VLAN configuration by
automatically providing VLAN ID consistency across the network. You can use GVRP to propagate
VLANs to other GVRP-aware devices automatically, without the need to manually configure the
VLANs on each device. In addition, if the VLAN configuration on a device changes, GVRP
automatically changes the VLAN configurations of the affected devices.
The Brocade implementation of GARP and GVRP is based on the following standards:
• ANSI/IEEE standard 802.1D, 1998 edition
• IEEE standard 802.1Q, 1998 edition; approved December 8, 1998
• IEEE draft P802.1w/D10, March 26, 2001
• IEEE draft P802.1u/D9, November 23, 2000
• IEEE draft P802.1t/D10, November 20, 2000
In this example, a core device is attached to three edge devices. Each of the edge devices is attached
to other edge devices or host stations (represented by the clouds).
The effects of GVRP in this network depend on which devices the feature is enabled on, and whether
both learning and advertising are enabled. In this type of network (a core device and edge devices),
you can have the following four combinations:
220 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Dynamic core and fixed edge
In this configuration, the edge devices are statically (manually) configured with VLAN information. The
core device dynamically configures itself to be a member of each of the edge device VLANs. The
operation of GVRP on the core device results in the following VLAN configuration on the device:
• VLAN 20
‐ 1/24 (tagged)
‐ 6/24 (tagged)
• VLAN 30
‐ 6/24 (tagged)
‐ 8/17 (tagged)
• VLAN 40
‐ 1/24 (tagged)
‐ 8/17 (tagged)
VLAN 20 traffic can now travel through the core between edge devices A and B. Likewise, VLAN 30
traffic can travel between B and C and VLAN 40 traffic can travel between A and C. If an edge device is
moved to a different core port or the VLAN configuration of an edge device is changed, the core device
automatically reconfigures itself to accommodate the change.
Notice that each of the ports in the dynamically created VLANs is tagged. All GVRP VLAN ports
configured by GVRP are tagged, to ensure that the port can be configured for additional VLANs.
NOTE
This example assumes that the core device has no static VLANs configured. However, you can have
static VLANs on a device that is running GVRP. GVRP can dynamically add other ports to the statically
configured VLANs but cannot delete statically configured ports from the VLANs.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 221
53-1002967-03
Dynamic core and dynamic edge
222 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
GVRP
configuration and reload the software. The maximum number you can specify is listed in
the Maximum column of the show default values display.
• The default VLAN (VLAN 1) is not advertised by the Brocade implementation of GVRP. The default
VLAN contains all ports that are not members of statically configured VLANs or VLANs enabled for
GVRP.
NOTE
The default VLAN has ID 1 by default. You can change the VLAN ID of the default VLAN, but only
before GVRP is enabled. You cannot change the ID of the default VLAN after GVRP is enabled.
• Single STP must be enabled on the device. Brocade implementation of GVRP requires Single STP.
If you do not have any statically configured VLANs on the device, you can enable Single STP as
follows.
device(config)#vlan 1
device(config-vlan-1)#exit
device(config)#span
device(config)#span single
These commands enable configuration of the default VLAN (VLAN 1), which contains all the device
ports, and enable STP and Single STP.
• All VLANs that are learned dynamically through GVRP are added to the single spanning tree.
• All ports that are enabled for GVRP become tagged members of the GVRP base VLAN (4093). If
you need to use this VLAN ID for another VLAN, you can change the GVRP VLAN ID. Refer to
Changing the GVRP base VLAN ID on page 224. The software adds the GVRP base VLAN to the
single spanning tree.
• All VLAN ports added by GVRP are tagged.
• GVRP is supported only for tagged ports or for untagged ports that are members of the default
VLAN. GVRP is not supported for ports that are untagged and are members of a VLAN other than
the default VLAN.
• To configure GVRP on a trunk group, enable the protocol on the primary port in the trunk group.
The GVRP configuration of the primary port is automatically applied to the other ports in the trunk
group.
• You can use GVRP on a device even if the device has statically configured VLANs. GVRP does not
remove any ports from the statically configured VLANs, although GVRP can add ports to the
VLANS. GVRP advertises the statically configured VLANs. Ports added by GVRP do not appear in
the running-config and will not appear in the startup-config file when save the configuration. You
can manually add a port to make the port a permanent member of the VLAN. After you manually
add the port, the port will appear in the running-config and be saved to the startup-config file when
you save the configuration.
• VLANs created by GVRP do not support virtual routing interfaces or protocol-based VLANs. virtual
routing interfaces and protocol-based VLANs are still supported on statically configured VLANs
even if GVRP adds ports to those VLANs.
• You cannot manually configure any parameters on a VLAN that is created by GVRP. For example,
you cannot change STP parameters for the VLAN.
• The GVRP timers (Join, Leave, and Leaveall) must be set to the same values on all the devices
that are exchanging information using GVRP.
• If the network has a large number of VLANs, the GVRP traffic can use a lot of CPU resources. If
you notice high CPU utilization after enabling GVRP, set the GVRP timers to longer values. In
particular, set the Leaveall timer to a longer value. Refer to Changing the GVRP timers on page
226.
• The feature is supported only on Ethernet ports.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 223
53-1002967-03
GVRP configuration
NOTE
If you plan to change the GVRP base VLAN ID (4093) or the maximum configurable value for the
Leaveall timer (300000 ms by default), you must do so before you enable GVRP.
GVRP configuration
To configure a device for GVRP, globally enable support for the feature, then enable the feature on
specific ports. Optionally, you can disable VLAN learning or advertising on specific interfaces.
You can also change the protocol timers and the GVRP base VLAN ID.
NOTE
If you want to change the GVRP base VLAN ID, you must do so before enabling GVRP.
To change the GVRP base VLAN ID, enter a command such as the following at the global CONFIG
level of the CLI.
device(config)#gvrp-base-vlan-id 1001
This command changes the GVRP VLAN ID from 4093 to 1001.
Syntax: [no] gvrp-base-vlan-id vlan-id
The vlan-id parameter specifies the new VLAN ID. You can specify a VLAN ID from 2 - 4092 or 4095.
NOTE
You must enter this command before enabling GVRP. Once GVRP is enabled, you cannot change the
maximum Leaveall timer value.
NOTE
This command does not change the default value of the Leaveall timer itself. The command only
changes the maximum value to which you can set the Leaveall timer.
224 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Enabling GVRP
To increase the maximum value you can specify for the Leaveall timer, enter a command such as the
following at the global CONFIG level of the CLI.
device(config)#gvrp-max-leaveall-timer 1000000
Syntax: [no] gvrp-max-leaveall-timer ms
The ms parameter specifies the maximum number of ms to which you can set the Leaveall timer. You
can specify from 300000 - 1000000 (one million) ms. The value must be a multiple of 100 ms. The
default is 300000 ms.
Enabling GVRP
To enable GVRP, enter commands such as the following at the global CONFIG level of the CLI.
device(config)#gvrp-enable
device(config-gvrp)#enable all
The first command globally enables support for the feature and changes the CLI to the GVRP
configuration level. The second command enables GVRP on all ports on the device.
The following command enables GVRP on ports 1/24, 2/24, and 4/17.
NOTE
Leaveall messages are still sent on the GVRP ports.
The all keyword disables VLAN advertising on all ports enabled for GVRP.
To specify a list of ports, enter each port as ethernet port followed by a space. For example, ethernet
1/24 ethernet 6/24 ethernet 8/17
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 225
53-1002967-03
Disabling VLAN learning
To specify a range of ports, enter the first port in the range as ethernet port followed by the last port in
the range. For example, ethernet 1/1 to 1/8 .
You can combine lists and ranges in the same command. For example: enable ethernet 1/1 to 1/8
ethernet 1/24 ethernet 6/24 ethernet 8/17.
NOTE
The port still advertises VLAN information unless you also disable VLAN advertising.
NOTE
When all ports in a dynamically created VLAN (one learned through GVRP) leave the VLAN, the
VLAN is immediately deleted from the device's VLAN database. However, this empty VLAN is still
maintained in the GVRP database for an amount of time equal to the following. (number-of-
GVRP-enabled-up-ports) * (2 * join-timer)While the empty VLAN is in the GVRP database, the
226 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Timer configuration requirements
VLAN does not appear in the show vlans display but does still appear in the show gvrp vlan all
display.
• Leaveall - The minimum interval at which GVRP sends Leaveall messages on all GVRP interfaces.
Leaveall messages ensure that the GVRP VLAN membership information is current by aging out
stale VLAN information and adding information for new VLAN memberships, if the information is
missing. A Leaveall message instructs the port to change the GVRP state for all its VLANs to
Leaving, and remove them unless a Join message is received before the Leave timer expires. By
default, you can set the Leaveall timer to a value from five times the Leave timer - maximum value
allowed by software (configurable from 300000 - 1000000 ms). The default is 10000.
NOTE
The actual interval is a random value between the Leaveall interval and 1.5 * the Leaveall time or
the maximum Leaveall time, whichever is lower.
NOTE
You can increase the maximum configurable value of the Leaveall timer from 300000 ms up to
1000000 ms using the gvrp-max-leaveall-timer command. (Refer to Increasing the maximum
configurable value of the Leaveall timer on page 224.)
NOTE
When you enter this command, all the running GVRP timers are canceled and restarted using the new
times specified by the command.
device(config-gvrp)#default-timers
Syntax: default-timers
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 227
53-1002967-03
Converting a VLAN created by GVRP into a statically-configured VLAN
device(config)#vlan 22
device(config-vlan-222)#tagged ethernet 1/1 to 1/8
These commands convert GVRP-created VLAN 22 containing ports 1/1 through 1/8 into statically-
configured VLAN 22.
Syntax: [no] vlan vlan-id
Syntax: [no] tagged ethernet port [to port | ethernet port]
Use the same commands to statically add ports that GVRP added to a VLAN.
NOTE
You cannot add the VLAN ports as untagged ports.
NOTE
After you convert the VLAN, the VLAN name changes from "‘GVRP_VLAN_vlan-id " to
"STATIC_VLAN_vlan-id ".
To specify a list of ports, enter each port as ethernetport followed by a space. For example, ethernet
1/24 ethernet 6/24 ethernet 8/17
To specify a range of ports, enter the first port in the range as ethernetport followed by the last port in
the range. For example, ethernet 1/1 to 1/8 .
You can combine lists and ranges in the same command. For example: enable ethernet 1/1 to 1/8
ethernet 1/24 ethernet 6/24 ethernet 8/17.
228 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying GVRP configuration information
• GVRP statistics
• CPU utilization statistics
• GVRP diagnostic information
device#show gvrp
GVRP is enabled on the system
GVRP BASE VLAN ID : 4093
GVRP MAX Leaveall Timer : 300000 ms
GVRP Join Timer : 200 ms
GVRP Leave Timer : 600 ms
GVRP Leave-all Timer : 10000 ms
===========================================================================
Configuration that is being used:
block-learning ethe 1/3
block-applicant ethe 2/7 ethe 2/11
enable ethe 1/1 to 1/7 ethe 2/1 ethe 2/7 ethe 2/11
===========================================================================
Spanning Tree: SINGLE SPANNING TREE
Dropped Packets Count: 0
===========================================================================
Number of VLANs in the GVRP Database: 15
Maximum Number of VLANs that can be present: 4095
===========================================================================
Syntax: show gvrp [ ethernet port]
This display shows the following information.
Field Description
Protocol state The state of GVRP. The display shows one of the following:
GVRP MAX Leaveall The maximum number of ms to which you can set the Leaveall timer.
Timer
NOTE
To change the maximum value, refer to Increasing the maximum configurable value of
the Leaveall timer on page 224.
NOTE
For descriptions of the Join, Leave, and Leaveall timers or to change the timers, refer
to Changing the GVRP timers on page 226.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 229
53-1002967-03
GVRP
Field Description
Configuration that is being The configuration commands used to enable GVRP on individual ports. If GVRP
used learning or advertising is disabled on a port, this information also is displayed.
NOTE
The current release supports GVRP only with Single STP.
Dropped Packets Count The number of GVRP packets that the device has dropped. A GVRP packet can be
dropped for either of the following reasons:
NOTE
If GVRP support is not globally enabled, the device does not drop the GVRP packets
but instead forwards them at Layer 2.
• GVRP packets are received with an invalid GARP Protocol ID. The protocol ID
must always be 0x0001.
NOTE
This number includes the default VLAN (1), the GVRP base VLAN (4093), and the
single STP VLAN (4094). These VLANs are not advertised by GVRP but are
maintained as "Registration Forbidden".
Maximum Number of The maximum number of VLANs that can be configured on the device. This number
VLANs that can be includes statically configured VLANs, VLANs learned through GVRP, and VLANs 1,
present 4093, and 4094.
To change the maximum number of VLANs the device can have, use the system-
max vlan num command. Refer to Displaying and modifying system parameter
default settings on page 34"Displaying and modifying system parameter default
settings" on page 20.
To display detailed GVRP information for an individual port, enter a command such as the following.
230 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying GVRP VLAN information
Field Description
GVRP Learning Whether the port can learn VLAN information from GVRP.
GVRP Applicant Whether the port can advertise VLAN information into GVRP.
VLAN Membership The VLANs of which the port is a member. For each VLAN, the following information is shown:
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 231
53-1002967-03
GVRP
Field Description
NOTE
This number includes the default VLAN (1), the GVRP base VLAN (4093), and the
single STP VLAN (4094). These VLANs are not advertised by GVRP but are included in
the total count.
Maximum Number of The maximum number of VLANs that can be configured on the device. This number
VLANs that can be includes statically configured VLANs, VLANs learned through GVRP, and VLANs 1,
present 4093, and 4094.
To change the maximum number of VLANs the device can have, use the system-
max vlan num command. Refer to "Displaying and modifying system parameter
default settings" on page 20.
To display detailed information for a specific VLAN, enter a command such as the following.
232 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying GVRP statistics
Field Description
Timer to Delete Entry Running Whether all ports have left the VLAN and the timer to delete the VLAN itself is
running. The timer is described in the note for the Leave timer in Changing the
GVRP timers on page 226.
Legend The meanings of the letter codes used in other parts of the display.
Forbidden Members The ports that cannot become members of a VLAN advertised or leaned by GVRP.
Fixed Members The ports that are statically configured members of the VLAN. GVRP cannot
remove these ports.
Normal(Dynamic) Members The ports that were added by GVRP. These ports also can be removed by GVRP.
To display detailed information for all VLANs, enter the show gvrp vlan all command.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 233
53-1002967-03
GVRP
Field Description
Invalid Messages/Attributes The number of invalid messages or attributes received or skipped. This can occur
Skipped in the following cases:
Failed Registrations The number of failed registrations that have occurred. A failed registration can
occur for the following reasons:
• Join requests were received on a port that was blocked from learning
dynamic VLANs (GVRP Blocking state).
• An entry for a new GVRP VLAN could not be created in the GVRP database.
To display GVRP statistics for all ports, enter the show gvrp statistics all command.
234 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Clearing GVRP statistics
NOTE
Although some of the devices in these configuration examples do not have statically configured VLANs,
this is not a requirement. You always can have statically configured VLANs on a device that is running
GVRP.
device> enable
device#configure terminal
device(config)#gvrp-enable
device(config-gvrp)#enable all
These commands globally enable GVRP support and enable the protocol on all ports.
Enter the following commands on edge device A.
device> enable
device#configure terminal
device(config)#vlan 20
device(config-vlan-20)#untag ethernet 2/1
device(config-vlan-20)#tag ethernet 4/24
device(config-vlan-20)#vlan 40
device(config-vlan-40)#untag ethernet 2/1
device(config-vlan-40)#tag ethernet 4/24
device(config-vlan-40)#exit
device(config)#gvrp-enable
device(config-gvrp)#enable ethernet 4/24
device(config-gvrp)#block-learning ethernet 4/24
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 235
53-1002967-03
Dynamic core and dynamic edge
These commands statically configure two port-based VLANs, enable GVRP on port 4/24, and block
GVRP learning on the port. The device will advertise the VLANs but will not learn VLANs from other
devices.
Enter the following commands on edge device B.
device> enable
device#configure terminal
device(config)#vlan 20
device(config-vlan-20)#untag ethernet 2/24
device(config-vlan-20)#tag ethernet 4/1
device(config-vlan-20)#vlan 30
device(config-vlan-30)#untag ethernet 4/24
device(config-vlan-30)#tag ethernet 4/1
device(config-vlan-30)#exit
device(config)#gvrp-enable
device(config-gvrp)#enable ethernet 4/1
device(config-gvrp)#block-learning ethernet 4/1
Enter the following commands on edge device C.
device> enable
device#configure terminal
device(config)#vlan 30
device(config-vlan-30)#untag ethernet 2/24
device(config-vlan-30)#tag ethernet 4/1
device(config-vlan-20)#vlan 40
device(config-vlan-40)#untag ethernet 4/24
device(config-vlan-40)#tag ethernet 4/1
device(config-vlan-40)#exit
device(config)#gvrp-enable
device(config-gvrp)#enable ethernet 4/1
device(config-gvrp)#block-learning ethernet 4/1
device> enable
device#configure terminal
device(config)#gvrp-enable
device(config-gvrp)#enable all
device> enable
device#configure terminal
device(config)#vlan 20
device(config-vlan-20)#tag ethernet 1/24
device(config-vlan-20)#tag ethernet 6/24
device(config-vlan-20)#vlan 30
device(config-vlan-30)#tag ethernet 6/24
236 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Fixed core and fixed edge
device> enable
device#configure terminal
device(config)#gvrp-enable
device(config-gvrp)#enable all
device(config-gvrp)#block-applicant all
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 237
53-1002967-03
238 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Port mirroring and Monitoring
Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800
FSX 1600
Port mirroring and monitoring 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
(mirroring of both inbound and
outbound traffic on individual ports)
ACL-based mirroring of denied traffic 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.013
NOTE
FCX and ICX devices support only ingress VLAN-based mirroring. FSX devices support both ingress
and egress VLAN-based mirroring.
The procedures in this chapter describe how to configure port mirroring on Brocade devices.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 239
53-1002967-03
Port mirroring and monitoring configuration
Port mirroring can be used as a diagnostic tool or debugging feature, especially for preventing attacks.
Port mirroring can be managed locally or remotely.
You can configure port mirroring, by assigning a port (known as the Monitor port), from which the
packets are copied and sent to a destination port (known as the Mirror port). All packets received on
the Monitor port or issued from it, are forwarded to the second port. You next attach a protocol
analyzer on the mirror port to monitor each segment separately. The analyzer captures and evaluates
the data without affecting the client on the original port.
The mirror port may be a port on the same switch with an attached RMON probe, a port on a different
switch in the same hub, or the switch processor.
Ingress mirror ports 1 per port region 1 per port region 1 per port region
Egress mirror ports 1 per port region 1 per port region 1 per port region
NOTE
FastIron X Series devices support multiple ingress and egress mirror ports. For 1 Gbps ports, ports in
groups of 12 share one ingress mirror port and one egress mirror port. Therefore, ports 1 and 2 cannot
have different mirror ports, but ports 1 and 13 can (port 25, for third-generation modules). Each 10
Gbps port (or each third-generation 10 GbE module) can have one ingress mirror port and one egress
mirror port.
NOTE
For devices other than the FastIron X Series, it is possible to configure more than eight egress ports,
although only the first eight are operational. This is also true for mirrored VLANs - more than eight can
be configured, but only the first eight are operational.
240 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuration notes for port mirroring and monitoring
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 241
53-1002967-03
Command syntax for port mirroring and monitoring
Monitoring a port
To configure port monitoring on an individual port on a Brocade device, enter commands similar to the
following.
242 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Mirroring configuration on a traditional stack
NOTE
If you enter no config-trunk-ind , all port configuration commands are removed from the individual
ports and the configuration of the primary port is applied to all the ports. Also, once you enter the no
config-trunk-ind command, the enable, disable, and monitor commands are valid only on the primary
port and apply to the entire trunk group.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 243
53-1002967-03
Configuring mirroring for ports on the same stack member in a traditional stack example
Configuring mirroring for ports on the same stack member in a traditional stack example
In this example, the mirror ports are assigned to different monitor ports.
Creating an ACL-based inbound mirror clause for FCX and ICX devices
The following example shows how to configure an ACL-based inbound mirror clause.
1. Configure the mirror port.
device(config)#interface e 1/1/5
device(config-if-e1000-1/1/5)#ip access-group 101 in
4. Create the ACL mirror port.
244 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Destination mirror port
• SX-FI-24GPP
• SX-FI-24HF
• SX-FI-2XG
• SX-FI-8XG
On all other interface modules, you can select traffic to be mirrored using only a permit clause.
Ports from a port region must be mirrored to the same destination mirror port
Port regions, as described in About port regions on page 18, are important when defining a destination
mirror port. This is because all traffic mirrored from any single port in a port region is mirrored to the
same destination mirror port as traffic mirrored from any other port in the same port region. For
example, ports 1/1 to 1/12 are in the same port region. If you configure ports 1/1 and 1/2 to mirror their
traffic, they should use the same destination mirror port as shown in the following configuration.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 245
53-1002967-03
Specifying the destination mirror port for trunk ports
When a destination port is configured for any port within a port region, traffic from any ACL with a
mirroring clause assigned to any port in that port region is mirrored to that destination port. This will
occur even if a destination port is not explicitly configured for the port with the ACL configured. In the
following example, an ACL with a mirroring clause (101) is applied to a port (1/1). Another port in the
same region (1/3) has a destination port set (4/3). In this example, traffic generated from operation of
ACL 101 is mirrored to port 4/3 even though a destination port has not explicitly been defined for traffic
from port 1/1.
NOTE
If a destination mirror port is not configured for any ports within the port region where the port-mirroring
ACL is configured, the ACL does not mirror the traffic but the ACL is applied to traffic on the port.
NOTE
If you want to add a port configured for ACL-based mirroring to a trunk, you must first remove the
ACL-mirror-port command from the port configuration. You can then add the port to a trunk that can
then be configured for ACL-based trunk mirroring.
246 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring ACL-based mirroring for ACLs bound to virtual interfaces
device(config)#vlan 10
device(config-vlan-10)#tagged ethernet 4/1 to 4/2
device(config-vlan-10)#tagged ethernet 5/3
device(config-vlan-10)#router-interface ve 10
device(config)#interface ethernet 4/1
device(config-if-e10000-4/1)#ACL-mirror-port ethernet 5/1
device(config)#interface ve 10
device(config-vif-10)#ip address 10.10.10.254/24
device(config-vif-10)#ip access-group 102 in
device(config)#access-list 102 permit ip any any mirror
In this configuration, the ACL-mirror-port command is applied to port 4/1, which is a member of ve 10.
Because of this, ACL-based mirroring will only apply to VLAN 10 traffic that arrives on ports 4/1 and 4/2.
It will not apply to VLAN 10 traffic that arrives on port 5/3 because that port belongs to a port group
differant from ports 4/1 and 4/2. This is because if you apply ACL-based mirroring on an entire VE, and
enable mirroring in only one port region, traffic that is in the same VE but on a port in a different port
region will not be mirrored.
To make the configuration apply ACL-based mirroring to VLAN 10 traffic arriving on port 5/3, you must
add the following commands to the configuration.
device(config)#vlan 10
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 247
53-1002967-03
MAC address filter-based mirroring
NOTE
The MAC address filter-based mirroring feature is not supported on FastIron X Series devices.
This feature allows traffic entering an ingress port to be monitored from a mirror port connected to a
data analyzer, based on specific source and destination MAC addresses. This feature supports
mirroring of inbound traffic only. Outbound mirroring is not supported.
MAC-filter-based mirroring allows a user to specify a particular stream of data for mirroring using a
filter. This eliminates the need to analyze all incoming data to the monitored port. To configure MAC-
filter-based mirroring, the user must perform three steps:
1. Define a mirror port
2. Create a MAC address filter with a mirroring clause
3. Apply the MAC address filter to an interface
248 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
2. Creating a MAC address filter with a mirroring clause
NOTE
Port-based mirroring and VLAN-based mirroring can not be enabled on a port at the same time.
VLAN-based mirroring
NOTE
VLAN-based mirroring is supported on FastIron X Series devices equipped with third generation or later
modules and ICX 6650 devices. Refer to VLAN-based mirroring on page 251.
The VLAN-based mirroring feature allows users to monitor all incoming traffic in one or more VLANs by
sending a mirror image of that traffic to a configured mirror port. This feature meets the requirements of
CALEA (Communications Assistance for Law Enforcement Act of 1994).
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 249
53-1002967-03
Displaying VLAN-based mirroring status
NOTE
For FCX and ICX 6650 devices, because it is possible to have multiple mirror ports, monitor ports
must specify which mirror port they are monitoring.
To disable mirroring on VLAN 20, enter the following commands.
device(config)#vlan 20
device(config-VLAN-20)#no monitor ethernet 1/1/21
device(config-VLAN-20)#end
device#show vlan
Total PORT-VLAN entries: 4
Maximum PORT-VLAN entries: 4060
Legend: [Stk=Stack-Unit, S=Slot]
PORT-VLAN 1, Name DEFAULT-VLAN, Priority level0, Spanning tree On
Untagged Ports: (Stk0/S1) 3 4 5 6 7 8 9 10 11 12 13 14
Untagged Ports: (Stk0/S1) 15 16 17 18 19 20 21 22 23 24 25 26
Untagged Ports: (Stk0/S1) 27 28 29 30 31 32 33 34 35 36 37 38
Untagged Ports: (Stk0/S1) 39 40 41 42 43 44 45 46 47 48
Untagged Ports: (Stk0/S2) 1 2
Tagged Ports: None
Uplink Ports: None
DualMode Ports: None
Mac-Vlan Ports: None
Monitoring: Disabled
PORT-VLAN 10, Name [None], Priority level0, Spanning tree On
Untagged Ports: (Stk0/S1) 1
Tagged Ports: None
Uplink Ports: None
DualMode Ports: None
Mac-Vlan Ports: None
Monitoring: Enabled
PORT-VLAN 20, Name [None], Priority level0, Spanning tree On
Untagged Ports: (Stk0/S1) 2
Tagged Ports: None
Uplink Ports: None
DualMode Ports: None
Mac-Vlan Ports: None
Monitoring: Disabled
250 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLAN-based mirroring
• All incoming traffic (tagged and untagged) in the VLAN is mirrored. mirroring is "as-is", and is not
affected by the configuration of the mirror port itself. Incoming tagged traffic is sent out tagged and
incoming untagged traffic is sent out untagged, regardless of which VLANs the mirror port belongs
to, and whether the mirror port is tagged or untagged.
• VLAN-based mirroring is supported on Layer 2 and Layer 3 images.
VLAN-based mirroring
WIth the new FastIron X Series of modules, the sFlow processing has been separated from the packet
mirroring functionality. This allows for support of VLAN-based mirroring on the FastIron X Series
devices. The packet processor on the FastIron X Series of modules also allows for egress VLAN-based
mirroring. In order for VLAN-based monitoring to function, the FastIron X Series must have only the
following SX modules installed.
The following interface modules are new to the FastIron X Series:
• SX-FI-24GPP
• SX-FI-24HF
• SX-FI-2XG
• SX-FI-8XG
• SX-FI48GPP
NOTE
Egress VLAN-based mirroring is not currently supported on the stacking platforms.
The FastIron X Series of modules are capable of monitoring 4096 VLANs. In a chassis environment,
this introduces restrictions to the number of ports that can be configured as mirror ports. Because a
single VLAN can contain 384 untagged ports (24 per slot) if that VLAN is configured for monitoring,
every device must have an identical number of corresponding analyzer ports. However, the egress
mirror-port and ingress mirror-port do not have to be the same. You can use two separate ports.
This introduces restrictions on port-based mirroring coexisting with VLAN-based mirroring. Port-based
mirroring allows for multiple ports to be configured as mirror-ports. However, once a particular port
belonging to a particular device is configured for monitoring to a specific mirror-port, no other mirror-port
can be used to monitor any other port on that device. This restriction has been extended to VLAN-
based mirroring, with one caveat: only one mirror-port in either direction at a time can exist within the
system. Refer to About port regions on page 18 for a list of valid port ranges on these devices.
VLAN-based mirroring is also supported on ICX 6650 devices.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 251
53-1002967-03
Tagged versus untagged ports in VLANs
• Port mirroring can be configured concurrently with VLAN-based mirroring, but only one mirror-port
can be used for both.
• sFlow can be enabled concurrently with VLAN-based mirroring and port mirroring.
• VLAN-based mirroring is supported on the default VLAN. If the default VLAN is changed
dynamically, the configuration is not lost.
• VLAN-based mirroring on VLAN groups is not supported, but it is supported on topology groups.
• In the case of enabling VLAN-based monitoring on the interface modules in an MCT-enabled
chassis, the VLAN configuration is not synced across the cluster. Each chassis in the cluster is
configured independently for VLAN configuration.
One of the concerns about VLAN-based mirroring is the effects of ingress and egress ACLs, as well as
rate shaping and rate limiting, on mirrored packets:
• Ingress VLAN-based mirroring: Any packets that are coming in from the network on the VLAN
should be mirrored out. Any ingress ACL actions or rate limiting actions do not take precedence in
this case.
• Egress VLAN-based mirroring: Any packets that are sent out onto the network are not affected by
egress ACLs or rate shaping.
See the following table for a summary of the effects of ACLs and rate limiting.
Ingress ACL on port Packets ingress mirrored at expected Packets egress mirrored at expected
(sent) rate (sent) rate
Egress ACL on port Packets ingress mirrored at expected Packets egress mirrored at expected
(sent) rate (sent) rate
Ingress rate limiting on port Packets ingress mirrored at expected Packets egress mirrored at the limited
(sent) rate rate
Egress rate shaping on port Packets ingress mirrored at expected Packets egress mirrored at expected
(sent) rate (sent) rate
Packets sent VLAN-based Which port in VLAN Ingress mirror traffic Egress mirror traffic
mirroring direction is monitored count expectation count expectation
252 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring VLAN-based mirroring
The above table can be summarized into the following two rules, assuming that VLAN-based mirroring
and port mirrroring are operating concurrently.
• If the VLAN is ingress monitored, and ports belonging to the VLAN are also ingress monitored, the
ingress traffic is only mirrored once and there are no duplicated mirrored packets.
• If the VLAN is egress monitored and ports belonging to the VLAN are also egress monitored, the
egress traffic is mirrored for each egress port, as well as the VLAN, resulting in several duplicated
mirrored packets. The count of duplicate packets is computed as (1 + Number of egress mirrored
ports in the VLAN) * Number of egress packets.
In addition to the previously mentioned rules, the behavior of VLAN-based mirroring is affected by the
tag type of the ports belonging to that VLAN, as shown in the following table.
Ingress tag type Egress tag type VLAN-based mirroring direction Mirrored traffic tag type
As illustrated in the above table, regardless of the egress port tag type, if a VLAN is egress mirrored,
the mirrored traffic is always tagged. This functionality is built into the hardware and is the expected
behavior, as the tag acts as an identifier for monitored traffic on the mirror-port (in case the mirror-port
belongs to some other VLAN).
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 253
53-1002967-03
Displaying VLAN-based mirroring status
device(config-VLAN-10)#exit
device(config)#vlan 20
device(config-VLAN-20)#monitor ethernet 6/24 output
device(config-VLAN-20)#end
For example, to enable bidirectional mirroring on VLANs 10 and 20, to mirror port e 6/24, enter the
following commands.
device(config)#vlan 20
device(config-VLAN-20)#no monitor ethernet 6/24
device(config-VLAN-20)#end
device(config-if-e1000-5/2)#show vlan 10
Total PORT-VLAN entries: 2
Maximum PORT-VLAN entries: 64
Legend: [Stk=Stack-Id, S=Slot]
PORT-VLAN 10, Name To-SXR1600, Priority level0, Spanning tree Off
Untagged Ports: (S5) 2 4
Tagged Ports: None
Uplink Ports: None
DualMode Ports: None
RX Monitoring: Disabled
TX Monitoring: Enabled
Syntax: [no] monitor ethernet port [ input | output | both ]
254 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800
FSX 1600
802.1s Multiple Spanning Tree 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
802.1W Rapid Spanning Tree 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
Protocol (RSTP)
802.1D Spanning Tree Support 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
Enhanced IronSpan support includes 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
Fast Port Span, Fast Uplink Span,
and Single-instance Span
FastIron Layer 2 devices (switches) 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
support up to 254 spanning tree
instances for VLANs
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 255
53-1002967-03
STP overview
Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800
FSX 1600
STP overview
The Spanning Tree Protocol (STP) eliminates Layer 2 loops in networks, by selectively blocking some
ports and allowing other ports to forward traffic, based on global (bridge) and local (port) parameters
you can configure.
STP related features, such as RSTP and PVST, extend the operation of standard STP, enabling you
to fine-tune standard STP and avoid some of its limitations.
You can enable or disable STP on a global basis (for the entire device), a port-based VLAN basis (for
the individual Layer 2 broadcast domain), or an individual port basis.
Configuration procedures are provided for the standard STP bridge and port parameters.
Device type Default STP type Default STP state Default STP state of new VLANs1
256 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
Device type Default STP type Default STP state Default STP state of new VLANs1
ICX 6650
1. When you create a port-based VLAN, the new VLAN STP state is the same as the default STP state on the device. The new VLAN
does not inherit the STP state of the default VLAN. The Single Spanning Tree Protocol (SSTP) is another type of STP. SSTP includes all
VLANs on which STP is enabled in a single spanning tree. Refer to Single Spanning Tree (SSTP) on page 318.
2. MSTP stands for “Multiple Spanning Tree Protocol”. In this type of STP, each port-based VLAN, including the default VLAN, has its own
spanning tree. References in this documentation to “STP” apply to MSTP.
The following table lists the default STP bridge parameters. The bridge parameters affect the entire
spanning tree. If you are using MSTP, the parameters affect the VLAN. If you are using SSTP, the
parameters affect all VLANs that are members of the single spanning tree.
Forward Delay The period of time spent by a port in the listening and learning state 15 seconds
before moving on to the learning or forwarding state, respectively.
Possible values: 4 - 30
The forward delay value is also used for the age time of dynamic seconds
entries in the filtering database, when a topology change occurs.
Maximum Age The interval a bridge will wait for a configuration BPDU from the root 20 seconds
bridge before initiating a topology change.
Possible values: 6 - 40
seconds
Hello Time The interval of time between each configuration BPDU sent by the 2 seconds
root bridge.
Possible values: 1 - 10
seconds
Priority A parameter used to identify the root bridge in a spanning tree 32768
(instance of STP). The bridge with the lowest value has the highest
priority and is the root. Possible values: 0 - 65535
NOTE
If you plan to change STP bridge timers, Brocade recommends that you stay within the following
ranges, from section 8.10.2 of the IEEE STP specification. 2 * (forward_delay -1) >= max_agemax_age
>= 2 * (hello_time +1)
The following table lists the default STP port parameters. The port parameters affect individual ports
and are separately configurable on each port.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 257
53-1002967-03
Enabling or disabling the Spanning Tree Protocol (STP)
Priority The preference that STP gives this port relative to other 128
ports for forwarding traffic out of the spanning tree.
Possible values: 0 - 240 (configurable in
A higher numerical value means a lower priority. increments of 16)
Path Cost The cost of using the port to reach the root bridge. When 10 Mbps - 100
selecting among multiple links to the root bridge, STP
chooses the link with the lowest path cost and blocks the 100 Mbps - 19
other paths. Each port type has its own default STP path Gbps - 4
cost.
10 Gbps - 2
Possible values are 0 - 65535
NOTE
The CLI converts the STP groups into topology groups when you save the configuration. For backward
compatibility, you can still use the STP group commands. However, the CLI converts the commands
into the topology group syntax. Likewise, the show stp-group command displays STP topology
groups.
NOTE
When you configure a VLAN, the VLAN inherits the global STP settings. However, once you begin to
define a VLAN, you can no longer configure standard STP parameters globally using the CLI. From
that point on, you can configure STP only within individual VLANs.
To enable STP for all ports in all VLANs on a Brocade device, enter the spanning-tree command.
device(config)# spanning-tree
The spanning-tree command enables a separate spanning tree in each VLAN, including the default
VLAN.
258 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Enabling or disabling STP in a port-based VLAN
NOTE
The number of spanning tree instances ranges from 1 - 254, with 32 as the default.
device(config)#vlan 10
device(config-vlan-10)#spanning-tree
Syntax: [no] spanning-tree
NOTE
If you change the STP state of the primary port in a trunk group, it affects all ports in the trunk group.
device(config)#interface 1/1
device(config-if-e1000-1/1)#spanning-tree
Syntax: [no] spanning-tree
NOTE
If you plan to change STP bridge timers, Brocade recommends that you stay within the following
ranges, from section 8.10.2 of the IEEE STP specification. 2 * (forward_delay -1) >= max_agemax_age
>= 2 * (hello_time +1)
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 259
53-1002967-03
Changing STP port parameters
To change a STP bridge priority on a Brocade device to the highest value to make the device the root
bridge, enter the following command.
device(config)#spanning-tree priority 0
The command in this example changes the priority on a device on which you have not configured port-
based VLANs. The change applies to the default VLAN. If you have configured a port-based VLAN on
the device, you can configure the parameters only at the configuration level for individual VLANs.
Enter commands such as the following.
device(config)#vlan 20
device(config-vlan-20)#spanning-tree priority 0
To make this change in the default VLAN, enter the following commands.
device(config)#vlan 1
device(config-vlan-1)#spanning-tree priority 0
Syntax: [no] spanning-tree [ forward-delay value] | [hello-time value] | [maximum-age value] |
[priority value]
The forward-delayvalue parameter specifies the forward delay and can be a value from 4 - 30
seconds. The default is 15 seconds.
NOTE
You can configure a Brocade device for faster convergence (including a shorter forward delay) using
Fast Span or Fast Uplink Span. Refer to STP feature configuration on page 270.
The hello-time value parameter specifies the hello time and can be a value from 1 - 10 seconds. The
default is 2 seconds.
NOTE
This parameter applies only when this device or VLAN is the root bridge for its spanning tree.
The maximum-age value parameter specifies the amount of time the device waits for receipt of a
configuration BPDU from the root bridge before initiating a topology change. You can specify from 6 -
40 seconds. The default is 20 seconds.
The priority value parameter specifies the priority and can be a value from 0 - 65535. A higher
numerical value means a lower priority. Thus, the highest priority is 0. The default is 32768.
You can specify some or all of these parameters on the same command line. If you specify more than
one parameter, you must specify them in the order shown above, from left to right.
device(config)#vlan 10
device(config-vlan-10)#spanning-tree ethernet 5 path-cost 15 priority 64
Syntax: spanning-tree ethernet port path-cost value | priority value | disable | enable
The path-cost value parameter specifies the port cost as a path to the spanning tree root bridge. STP
prefers the path with the lowest cost. You can specify a value from 0 - 65535.
The default depends on the port type:
260 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
STP protection enhancement
• 10 Mbps - 100
• 100 Mbps - 19
• Gbps - 4
• 10 Gbps - 2
• The priorityvalue parameter specifies the preference that STP gives this port relative to other ports
for forwarding traffic out of the spanning tree. If you are upgrading a device that has a configuration
saved under an earlier software release, and the configuration contains a value from 0 - 7 for a port
STP priority, the software changes the priority to the default when you save the configuration while
running the new release.
The disable and enable parameter disables or re-enables STP on the port. The STP state change
affects only this VLAN. The port STP state in other VLANs is not changed.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 261
53-1002967-03
Viewing the STP Protection Configuration
To clear the BPDU drop counters for all ports on the device that have STP Protection enabled, enter
the following command at the Global CONFIG level of the CLI.
device(config)#clear stp-protect-statistics
To clear the BPDU drop counter for a specific port that has STP Protection enabled, enter the
following command at the Global CONFIG level of the CLI.
device#clear stp-protect-statistics e 2
Syntax: clear stp-protect-statistics [ethernet port]
device#show stp-protect
Port ID BPDU Drop Count
3 478
5 213
6 0
12 31
To view STP Protection configuration for a specific port, enter the following command at any level of
the CLI.
device#show stp-protect e 3
STP-protect is enabled on port 3. BPDU drop count is 478
If you enter the show stp-protect command for a port that does not have STP protection enabled, the
following message displays on the console.
device#show stp-protect e 4
STP-protect is not enabled on port 4.
Syntax: show stp-protect [ethernet port]
device#show span
262 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
Field Description
VLAN ID The port-based VLAN that contains this spanning tree (instance of STP). VLAN 1 is the default
VLAN. If you have not configured port-based VLANs on this device, all STP information is for
VLAN 1.
Root ID The ID assigned by STP to the root bridge for this spanning tree.
Root Cost The cumulative cost from this bridge to the root bridge. If this device is the root bridge, then the
root cost is 0.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 263
53-1002967-03
Spanning Tree Protocol
Field Description
Root Port The port on this device that connects to the root bridge. If this device is the root bridge, then
the value is "Root" instead of a port number.
Priority Hex This device or VLAN STP priority. The value is shown in hexadecimal format.
NOTE
If you configure this value, specify it in decimal format. Refer to Changing STP bridge
parameters on page 259.
Max age sec The number of seconds this device or VLAN waits for a configuration BPDU from the root
bridge before deciding the root has become unavailable and performing a reconvergence.
Hello sec The interval between each configuration BPDU sent by the root bridge.
Hold sec The minimum number of seconds that must elapse between transmissions of consecutive
Configuration BPDUs on a port.
Fwd dly sec The number of seconds this device or VLAN waits following a topology change and
consequent reconvergence.
Last Chang sec The number of seconds since the last time a topology change occurred.
Chg cnt The number of times the topology has changed since this device was reloaded.
NOTE
If this address is the same as the Root ID, then this device or VLAN is the root bridge for its
spanning tree.
NOTE
If you configure this value, specify it in decimal format. Refer to Changing STP port parameters
on page 260.
264 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying the STP state of a port-based VLAN
Field Description
State The port STP state. The state can be one of the following:
• BLOCKING - STP has blocked Layer 2 traffic on this port to prevent a loop. The device or
VLAN can reach the root bridge using another port, whose state is FORWARDING. When
a port is in this state, the port does not transmit or receive user frames, but the port does
continue to receive STP BPDUs.
• DISABLED - The port is not participating in STP. This can occur when the port is
disconnected or STP is disabled on the port.
• FORWARDING - STP is allowing the port to send and receive frames.
• LISTENING - STP is responding to a topology change and this port is listening for a
BPDU from neighboring bridges in order to determine the new topology. No user frames
are transmitted or received during this state.
• LEARNING - The port has passed through the LISTENING state and will change to the
FORWARDING state, depending on the results of STP reconvergence. The port does not
transmit or receive user frames during this state. However, the device can learn the MAC
addresses of frames that the port receives during this state and make corresponding
entries in the MAC table.
• DESIGNATED INCONSISTENT - This shows as DESI-INCONS in the output. You can
disallow the designated forwarding state on a port in STP 802.1d or 802.1w with the
spanning-tree designated-protect command. If STP tries to put this port into the
designated forwarding role, the device would put this port into a designated inconsistent
STP state. This is effectively equivalent to the listening state in STP in which a port
cannot transfer any user traffic. When STP no longer marks this port as a designated
port, the device automatically removes the port from the designated inconsistent state.
Fwd Trans The number of times STP has changed the state of this port between BLOCKING and
FORWARDING.
Design Cost The cost to the root bridge as advertised by the designated bridge that is connected to this
port. If the designated bridge is the root bridge itself, then the cost is 0. The identity of the
designated bridge is shown in the Design Bridge field.
Designated Root The root bridge as recognized on this port. The value is the same as the root bridge ID listed in
the Root ID field.
Designated Bridge The designated bridge to which this port is connected. The designated bridge is the device that
connects the network segment on the port to the root bridge.
device#show vlans
Total PORT-VLAN entries: 2
Maximum PORT-VLAN entries: 16
legend: [S=Slot]
PORT-VLAN 1, Name DEFAULT-VLAN, Priority level0, Spanning tree On
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 265
53-1002967-03
Spanning Tree Protocol
NOTE
The line in the above output, VLAN 1 - MULTIPLE SPANNING TREE (MSTP) ACTIVE, is not the
802.1s standard. It is the same Global STP (IEEE 802.1D) type as shown in the output of the show
span CLI command.
If a port is disabled, the only information shown by this command is "DISABLED". If a port is enabled,
this display shows the following information.
Syntax: show span detail [ vlan vlan-id [ethernet port | num]
The vlan vlan-id parameter specifies a VLAN.
The num parameter specifies the number of VLANs you want the CLI to skip before displaying detailed
STP information. For example, if the device has six VLANs configured (VLAN IDs 1, 2, 3, 99, 128, and
256) and you enter the command show span detail 4 , detailed STP information is displayed for
VLANs 128 and 256 only.
NOTE
If the configuration includes VLAN groups, the show span detail command displays the master
VLANs of each group but not the member VLANs within the groups. However, the command does
indicate that the VLAN is a master VLAN. The show span detail vlan vlan-id command displays the
information for the VLAN even if it is a member VLAN. To list all the member VLANs within a VLAN
group, enter the show vlan-group [ group-id ] command.
266 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
Field Description
Active Spanning The VLAN that contains the listed ports and the active Spanning Tree protocol.
Tree protocol
The STP type can be one of the following:
NOTE
If STP is disabled on a VLAN, the command displays the following message instead:
"Spanning-tree of port-vlan vlan-id is disabled."
Active global timers The global STP timers that are currently active, and their current values. The following timers
can be listed:
• Hello - The interval between Hello packets. This timer applies only to the root bridge.
• Topology Change (TC) - The amount of time during which the topology change flag in
Hello packets will be marked, indicating a topology change. This timer applies only to the
root bridge.
• Topology Change Notification (TCN) - The interval between Topology Change
Notification packets sent by a non-root bridge toward the root bridge. This timer applies
only to non-root bridges.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 267
53-1002967-03
Spanning Tree Protocol
Field Description
Port number and The internal port number and the port STP state.
STP state
The internal port number is one of the following:
• The port interface number, if the port is the designated port for the LAN.
• The interface number of the designated port from the received BPDU, if the interface is
not the designated port for the LAN.
• BLOCKING - STP has blocked Layer 2 traffic on this port to prevent a loop. The device
or VLAN can reach the root bridge using another port, whose state is FORWARDING.
When a port is in this state, the port does not transmit or receive user frames, but the
port does continue to receive STP BPDUs.
• DISABLED - The port is not participating in STP. This can occur when the port is
disconnected or STP is administratively disabled on the port.
• FORWARDING - STP is allowing the port to send and receive frames.
• LISTENING - STP is responding to a topology change and this port is listening for a
BPDU from neighboring bridges in order to determine the new topology. No user frames
are transmitted or received during this state.
• LEARNING - The port has passed through the LISTENING state and will change to the
BLOCKING or FORWARDING state, depending on the results of STP reconvergence.
The port does not transmit or receive user frames during this state. However, the device
can learn the MAC addresses of frames that the port receives during this state and make
corresponding entries in the MAC table.
NOTE
If the state is DISABLED, no further STP information is displayed for the port.
Port Path cost The STP path cost for the port.
Port Priority This STP priority for the port. The value is shown as a hexadecimal number.
Root The ID assigned by STP to the root bridge for this spanning tree.
Designated Bridge The MAC address of the designated bridge to which this port is connected. The designated
bridge is the device that connects the network segment on the port to the root bridge.
Designated Port The port number sent from the designated bridge.
Designated Path The cost to the root bridge as advertised by the designated bridge that is connected to this
Cost port. If the bridge is the root bridge itself, then the cost is 0. The identity of the designated
bridge is shown in the Designated Bridge field.
268 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying detailed STP information for a single port in a specific VLAN
Field Description
Active Timers The current values for the following timers, if active:
• Message age - The number of seconds this port has been waiting for a hello message
from the root bridge.
• Forward delay - The number of seconds that have passed since the last topology
change and consequent reconvergence.
• Hold time - The number of seconds that have elapsed since transmission of the last
Configuration BPDU.
BPDUs Sent and The number of BPDUs sent and received on this port since the software was reloaded.
Received
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 269
53-1002967-03
STP feature configuration
270 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Disabling and re-enabling fast port span
generate a topology change notification for the port. In this situation, the notification is unnecessary
since a change in the state of the host does not affect the network topology.
• Fast Port Span eliminates unnecessary MAC cache aging that can be caused by topology change
notifications. Bridging devices age out the learned MAC addresses in their MAC caches if the
addresses are unrefreshed for a given period of time, sometimes called the MAC aging interval.
When STP sends a topology change notification, devices that receive the notification use the value
of the STP forward delay to quickly age out their MAC caches. For example, if a device normal
MAC aging interval is 5 minutes, the aging interval changes temporarily to the value of the forward
delay (for example, 15 seconds) in response to an STP topology change.
In normal STP, the accelerated cache aging occurs even when a single host goes up or down. Because
Fast Port Span does not send a topology change notification when a host on a Fast Port Span port
goes up or down, the unnecessary cache aging that can occur in these circumstances under normal
STP is eliminated.
Fast Port Span is a system-wide parameter and is enabled by default. Thus, when you boot a device, all
the ports that are attached only to end stations run Fast Port Span. For ports that are not eligible for
Fast Port Span, such as ports connected to other networking devices, the device automatically uses the
normal STP settings. If a port matches any of the following criteria, the port is ineligible for Fast Port
Span and uses normal STP instead:
• The port is 802.1Q tagged
• The port is a member of a trunk group
• The port has learned more than one active MAC address
• An STP Configuration BPDU has been received on the port, thus indicating the presence of
another bridge on the port.
You also can explicitly exclude individual ports from Fast Port Span if needed. For example, if the only
uplink ports for a wiring closet switch are Gbps ports, you can exclude the ports from Fast Port Span.
NOTE
The fast port-span command has additional parameters that let you exclude specific ports. These
parameters are shown in the following section.
device(config)#fast port-span
device(config)#write memory
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 271
53-1002967-03
Excluding specific ports from fast port span
272 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Active uplink port failure
transitions the forwarding to one of the other redundant uplink ports in just one second. All Fast Uplink
Span-enabled ports are members of a single Fast Uplink Span group.
NOTE
To avoid the potential for temporary bridging loops, Brocade recommends that you use the Fast Uplink
feature only for wiring closet switches (switches at the edge of the network cloud). In addition, enable
the feature only on a group of ports intended for redundancy, so that at any given time only one of the
ports is expected to be in the forwarding state.
NOTE
When the wiring closet switch (Brocade device) first comes up or when STP is first enabled, the uplink
ports still must go through the standard STP state transition without any acceleration. This behavior
guards against temporary routing loops as the switch tries to determine the states for all the ports. Fast
Uplink Span acceleration applies only when a working uplink becomes unavailable.
NOTE
Use caution when changing the spanning tree priority. If the switch becomes the root bridge, Fast
Uplink Span will be disabled automatically.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 273
53-1002967-03
Configuring a Fast Uplink Port Group
Hex
1/1/2 80 0 DISABLED 0 0 0000000000000000
0000000000000000
1/1/3 80 0 DISABLED 0 0 0000000000000000
0000000000000000
1/1/4 80 4 FORWARDING 1 2 000000c100000001
8000000011111111
1/1/5 80 0 DISABLED 0 0 0000000000000000
0000000000000000
1/1/6 80 0 DISABLED 0 0 0000000000000000
274 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring Fast Uplink Span within a VLAN
0000000000000000
1/1/7 80 0 DISABLED 0 0 0000000000000000
0000000000000000
1/1/8 80 0 DISABLED 0 0 0000000000000000
0000000000000000
1/1/9 80 0 DISABLED 0 0 0000000000000000
0000000000000000
Syntax: show span fast-uplink-span
device(config)#vlan 10
device(config-vlan-10)#untag ethernet 8/1 to 8/2
device(config-vlan-10)#fast uplink-span ethernet 8/1 to 8/2
Syntax:[no] fast uplink-span ethernet port-no
To check the status of Fast Uplink Span for a specified VLAN.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 275
53-1002967-03
Bridges and bridge port roles
NOTE
This rapid convergence will not occur on ports connected to shared media devices, such as hubs. To
take advantage of the rapid convergence provided by 802.1W, make sure to explicitly configure all
point-to-point links in a topology.
The convergence provided by the standard 802.1W protocol occurs more rapidly than the
convergence provided by previous spanning tree protocols because of the following:
• Classic or legacy 802.1D STP protocol requires a newly selected Root port to go through listening
and learning stages before traffic convergence can be achieved. The 802.1D traffic convergence
time is calculated using the following formula.
2 x FORWARD_DELAY + BRIDGE_MAX_AGE.
If default values are used in the parameter configuration, convergence can take up to 50 seconds. (In
this document STP will be referred to as 802.1D.)
• RSTP Draft 3 works only on bridges that have Alternate ports, which are the precalculated "next
best root port". (Alternate ports provide back up paths to the root bridge.) Although convergence
occurs from 0 - 500 milliseconds in RSTP Draft 3, the spanning tree topology reverts to the
802.1D convergence if an Alternate port is not found.
• Convergence in 802.1w bridge is not based on any timer values. Rather, it is based on the explicit
handshakes between Designated ports and their connected Root ports to achieve convergence in
less than 500 milliseconds.
276 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
NOTE
All examples in this document assume that all ports in the illustrated topologies are point-to-point links
and are homogeneous (they have the same path cost value) unless otherwise specified.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 277
53-1002967-03
Spanning Tree Protocol
The topology in the following figure contains four bridges. Switch 1 is the root bridge since it has the
lowest bridge priority. Switch 2 through Switch 4 are non-root bridges.
278 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Edge ports and edge port roles
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 279
53-1002967-03
Spanning Tree Protocol
Edge ports assume Designated port roles. Port flapping does not cause any topology change events
on Edge ports since 802.1W does not consider Edge ports in the spanning tree calculations.
However, if any incoming RST BPDU is received from a previously configured Edge port, 802.1W
automatically makes the port as a non-edge port. This is extremely important to ensure a loop free
Layer 2 operation since a non-edge port is part of the active RSTP topology.
The 802.1W protocol can auto-detect an Edge port and a non-edge port. An administrator can also
configure a port to be an Edge port using the CLI. It is recommended that Edge ports are configured
explicitly to take advantage of the Edge port feature, instead of allowing the protocol to auto-detect
them.
280 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Point-to-point ports
Point-to-point ports
To take advantage of the 802.1W features, ports on an 802.1W topology should be explicitly configured
as point-to-point links using the CLI. Shared media should not be configured as point-to-point links.
NOTE
Configuring shared media or non-point-to-point links as point-to-point links could lead to Layer 2 loops.
The topology in the following figure is an example of shared media that should not be configured as
point-to-point links. In this figure, a port on a bridge communicates or is connected to at least two ports.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 281
53-1002967-03
Edge port and non-edge port states
282 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
Handshake mechanisms
To rapidly transition a Designated or Root port into a forwarding state, the Port Role Transition state
machine uses handshake mechanisms to ensure loop free operations. It uses one type of handshake if
no Root port has been assigned on a bridge, and another type if a Root port has already been
assigned.
NOTE
Proposed will never be asserted if the port is connected on a shared media link.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 283
53-1002967-03
Spanning Tree Protocol
• Sync - Once the Root port is elected, it sets a sync signal on all the ports on the bridge. The
signal tells the ports to synchronize their roles and states (Figure 43 on page 285). Ports that are
284 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
non-edge ports with a role of Designated port change into a discarding state. These ports have to
negotiate with their peer ports to establish their new roles and states.
• Synced - Once the Designated port changes into a discarding state, it asserts a synced signal.
Immediately, Alternate ports and Backup ports are synced. The Root port monitors the synced
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 285
53-1002967-03
Spanning Tree Protocol
signals from all the bridge ports. Once all bridge ports asserts a synced signal, the Root port
asserts its own synced signal as shown in the following figure.
286 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
• Agreed - The Root port sends back an RST BPDU containing an agreed flag to its peer Designated
port and moves into the forwarding state. When the peer Designated port receives the RST BPDU,
it rapidly transitions into a forwarding state.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 287
53-1002967-03
Spanning Tree Protocol
At this point, the handshake mechanism is complete between Switch 100, the root bridge, and Switch
200.
Switch 200 updates the information on the Switch 200 Designated ports (Port2 and Port3) and
identifies the new root bridge. The Designated ports send RST BPDUs, containing proposal flags, to
their downstream bridges, without waiting for the hello timers to expire on them. This process starts
the handshake with the downstream bridges.
For example, Port2/Switch 200 sends an RST BPDU to Port2/Switch 300 that contains a proposal flag.
Port2/Switch 300 asserts a proposed signal. Ports in Switch 300 then set sync signals on the ports to
synchronize and negotiate their roles and states. Then the ports assert a synced signal and when the
Root port in Switch 300 asserts its synced signal, it sends an RST BPDU to Switch 200 with an agreed
flag.
This handshake is repeated between Switch 200 and Switch 400 until all Designated and Root ports
are in forwarding states.
288 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
The handshake that occurs between Switch 60 and Switch 100 follows the one described in the
previous section (Handshake when no root port is elected on page 283). The former root bridge
becomes a non-root bridge and establishes a Root port (Figure 47 on page 290).
However, since Switch 200 already had a Root port in a forwarding state, 802.1W uses the Proposing -
> Proposed -> Sync and Reroot -> Sync and Rerooted -> Rerooted and Synced -> Agreed handshake:
• Proposing and Proposed - The Designated port on the new root bridge (Port4/Switch 60) sends an
RST BPDU that contains a proposing signal to Port4/Switch 200 to inform the port that it is ready to
put itself in a forwarding state (Figure 47 on page 290). 802.1W algorithm determines that the RST
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 289
53-1002967-03
Spanning Tree Protocol
BPDU that Port4/Switch 200 received is superior to what it can generate, so Port4/Switch 200
assumes a Root port role.
• Sync and Reroot - The Root port then asserts a sync and a reroot signal on all the ports on the
bridge. The signal tells the ports that a new Root port has been assigned and they are to
renegotiate their new roles and states. The other ports on the bridge assert their sync and reroot
290 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
signals. Information about the old Root port is discarded from all ports. Designated ports change
into discarding states as shown in the following figure.
• Sync and Rerooted - When the ports on Switch 200 have completed the reroot phase, they assert
their rerooted signals and continue to assert their sync signals as they continue in their discarding
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 291
53-1002967-03
Spanning Tree Protocol
states. They also continue to negotiate their roles and states with their peer ports as shown in the
following figure.
• Synced and Agree - When all the ports on the bridge assert their synced signals, the new Root
port asserts its own synced signal and sends an RST BPDU to Port4/Switch 60 that contains an
agreed flag as shown in the following figure. The Root port also moves into a forwarding state.
292 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
The old Root port on Switch 200 becomes an Alternate Port as shown in the following figure. Other
ports on that bridge are elected to appropriate roles.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 293
53-1002967-03
802.1W convergence in a simple topology
The Designated port on Switch 60 goes into a forwarding state once it receives the RST BPDU with
the agreed flag.
Recall that Switch 200 sent the agreed flag to Port4/Switch 60 and not to Port1/Switch 100 (the port
that connects Switch 100 to Switch 200). Therefore, Port1/Switch 100 does not go into forwarding
state instantly. It waits until two instances of the forward delay timer expires on the port before it goes
into forwarding state.
At this point the handshake between the Switch 60 and Switch 200 is complete.
The remaining bridges (Switch 300 and Switch 400) may have to go through the reroot handshake if a
new Root port needs to be assigned.
294 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
NOTE
The remaining examples assume that the appropriate handshake mechanisms occur as port roles and
states change.
Convergence at start up
In the following figure, two bridges Switch 2 and Switch 3 are powered up. There are point-to-point
connections between Port3/Switch 2 and Port3/Switch 3.
At power up, all ports on Switch 2 and Switch 3 assume Designated port roles and are at discarding
states before they receive any RST BPDU.
Port3/Switch 2, with a Designated role, transmits an RST BPDU with a proposal flag to Port3/Switch 3.
A ports with a Designated role sends the proposal flag in its RST BPDU when they are ready to move to
a forwarding state.
Port3/Switch 3, which starts with a role of Designated port, receives the RST BPDU and finds that it is
superior to what it can transmit; therefore, Port3/Switch 3 assumes a new port role, that of a Root port.
Port3/Switch 3 transmits an RST BPDU with an agreed flag back to Switch 2 and immediately goes into
a forwarding state.
Port3/Switch 2 receives the RST BPDU from Port3/Switch 3 and immediately goes into a forwarding
state.
Now 802.1W has fully converged between the two bridges, with Port3/Switch 3 as an operational root
port in forwarding state and Port3/Switch 2 as an operational Designated port in forwarding state.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 295
53-1002967-03
Spanning Tree Protocol
296 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
Now, Port3/Switch 3 is currently in a discarding state and is negotiating a port role. It received RST
BPDUs from Port3/Switch 2. The 802.1W algorithm determines that the RST BPDUs Port3/Switch 3
received are superior to those it can transmit; however, they are not superior to those that are currently
being received by the current Root port (Port4). Therefore, Port3 retains the role of Alternate port.
Ports 3/Switch 1 and Port5/Switch 1 are physically connected. Port5/Switch 1 received RST BPDUs that
are superior to those received on Port3/Switch 1; therefore, Port5/Switch 1 is given the Backup port role
while Port3 is given the Designated port role. Port3/Switch 1, does not go directly into a forwarding
state. It waits until the forward delay time expires twice on that port before it can proceed to the
forwarding state.
Once convergence is achieved, the active Layer 2 forwarding path converges as shown in the following
figure.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 297
53-1002967-03
Convergence after a link failure
298 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Convergence in a complex 802.1W topology
When Port2/Switch 2 receives the RST BPDUs, 802.1W algorithm determines that the RST BPDUs the
port received are better than those received on Port3/Switch 3; therefore, Port2/Switch 2 is given the
role of a Root port. All the ports on Switch 2 are informed that a new Root port has been assigned which
then signals all the ports to synchronize their roles and states. Port3/Switch 2, which was the previous
Root port, enters a discarding state and negotiates with other ports on the bridge to establish its new
role and state, until it finally assumes the role of a Designated port.
Next, the following happens:
• Port3/Switch 2, the Designated port, sends an RST BPDU, with a proposal flag to Port3/Switch 3.
• Port2/Switch 2 also sends an RST BPDU with an agreed flag to Port2/Switch 1 and then places
itself into a forwarding state.
When Port2/Switch 1 receives the RST BPDU with an agreed flag sent by Port2/Switch 2, it puts that
port into a forwarding state. The topology is now fully converged.
When Port3/Switch 3 receives the RST BPDU that Port3/Switch 2 sent, 802.1W algorithm determines
that these RST BPDUs are superior to those that Port3/Switch 3 can transmit. Therefore, Port3/Switch 3
is given a new role, that of an Alternate port. Port3/Switch 3 immediately enters a discarding state.
Now Port3/Switch 2 does not go into a forwarding state instantly like the Root port. It waits until the
forward delay timer expires twice on that port while it is still in a Designated role, before it can proceed
to the forwarding state. The wait, however, does not cause a denial of service, since the essential
connectivity in the topology has already been established.
When fully restored, the topology is the same as that shown on Figure 53 on page 296.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 299
53-1002967-03
Spanning Tree Protocol
In the above figure, Switch 5 is selected as the root bridge since it is the bridge with the highest
priority. Lines in the figure show the point-to-point connection to the bridges in the topology.
Switch 5 sends an RST BPDU that contains a proposal flag to Port5/Switch 2. When handshakes are
completed in Switch 5, Port5/Switch 2 is selected as the Root port on Switch 2. All other ports on
Switch 2 are given Designated port role with discarding states.
Port5/Switch 2 then sends an RST BPDU with an agreed flag to Switch 5 to confirm that it is the new
Root port and the port enters a forwarding state. Port7 and Port8 are informed of the identity of the
new Root port. 802.1W algorithm selects Port7 as the Designated port while Port8 becomes the
Backup port.
Port3/Switch 5 sends an RST BPDU to Port3/Switch 6 with a proposal flag. When Port3/Switch 5
receives the RST BPDU, handshake mechanisms select Port3 as the Root port of Switch 6. All other
ports are given a Designated port role with discarding states. Port3/Switch 6 then sends an RST
BPDU with an agreed flag to Port3/Switch 5 to confirm that it is the Root port. The Root port then goes
into a forwarding state.
Now, Port4/Switch 6 receives RST BPDUs that are superior to what it can transmit; therefore, it is
given the Alternate port role. The port remains in discarding state.
Port5/Switch 6 receives RST BPDUs that are inferior to what it can transmit. The port is then given a
Designated port role.
Next Switch 2 sends RST BPDUs with a proposal flag to Port3/Switch 4. Port3 becomes the Root port
for the bridge; all other ports are given a Designated port role with discarding states. Port3/Switch 4
sends an RST BPDU with an agreed flag to Switch 2 to confirm that it is the new Root port. The port
then goes into a forwarding state.
Now Port4/Switch 4 receives an RST BPDU that is superior to what it can transmit. The port is then
given an Alternate port role, and remains in discarding state.
Likewise, Port5/Switch 4 receives an RST BPDU that is superior to what it can transmit. The port is
also given an Alternate port role, and remains in discarding state.
Port2/Switch 2 transmits an RST BPDU with a proposal flag to Port2/Switch 1. Port2/Switch 1
becomes the Root port. All other ports on Switch 1 are given Designated port roles with discarding
states.
Port2/Switch 1 sends an RST BPDU with an agreed flag to Port2/Switch 2 and Port2/Switch 1 goes
into a forwarding state.
Port3/Switch 1 receives an RST BPDUs that is inferior to what it can transmit; therefore, the port
retains its Designated port role and goes into forwarding state only after the forward delay timer
expires twice on that port while it is still in a Designated role.
Port3/Switch 2 sends an RST BPDU to Port3/Switch 3 that contains a proposal flag. Port3/Switch 3
becomes the Root port, while all other ports on Switch 3 are given Designated port roles and go into
discarding states. Port3/Switch 3 sends an RST BPDU with an agreed flag to Port3/Switch 2 and
Port3/Switch 3 goes into a forwarding state.
Now, Port2/Switch 3 receives an RST BPDUs that is superior to what it can transmit so that port is
given an Alternate port state.
Port4/Switch 3 receives an RST BPDU that is inferior to what it can transmit; therefore, the port retains
its Designated port role.
Ports on all the bridges in the topology with Designated port roles that received RST BPDUs with
agreed flags go into forwarding states instantly. However, Designated ports that did not receive RST
BPDUs with agreed flags must wait until the forward delay timer expires twice on those port. Only then
will these port move into forwarding states.
The entire 802.1W topology converges in less than 300 msec and the essential connectivity is
established between the designated ports and their connected root ports.
300 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Propagation of topology change
After convergence is complete, the following figure shows the active Layer 2 path of the topology in
Figure 56 on page 299.
NOTE
Edge ports, Alternate ports, or Backup ports do not need to propagate a topology change.
The TCN is sent in the RST BPDU that a port sends. Ports on other bridges in the topology then
acknowledge the topology change once they receive the RST BPDU, and send the TCN to other
bridges until all the bridges are informed of the topology change.
For example, Port3/Switch 2 in the following figure, fails. Port4/Switch 3 becomes the new Root port.
Port4/Switch 3 sends an RST BPDU with a TCN to Port4/Switch 4. To propagate the topology change,
Port4/Switch 4 then starts a TCN timer on itself, on the bridge Root port, and on other ports on that
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 301
53-1002967-03
Spanning Tree Protocol
bridge with a Designated role. Then Port3/Switch 4 sends RST BPDU with the TCN to Port4/Switch 2.
(Note the new active Layer 2 path in the following figure.)
Switch 2 then starts the TCN timer on the Designated ports and sends RST BPDUs that contain the
TCN as follows (Figure 59 on page 303):
302 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 303
53-1002967-03
Compatibility of 802.1W with 802.1D
Then Switch 1, Switch 5, and Switch 6 send RST BPDUs that contain the TCN to Switch 3 and Switch
4 to complete the TCN propagation as shown in the following figure.
304 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring 802.1W parameters on a Brocade device
For example, in the following figure, Switch 10 and Switch 30 receive legacy BPDUs from Switch 20.
Ports on Switch 10 and Switch 30 begin sending BPDUs in STP format to allow them to operate
transparently with Switch 20.
Once Switch 20 is removed from the LAN, Switch 10 and Switch 30 receive and transmit BPDUs in the
STP format to and from each other. This state will continue until the administrator enables the force-
migration-check command to force the bridge to send RSTP BPDU during a migrate time period. If
ports on the bridges continue to hear only STP BPDUs after this migrate time period, those ports will
return to sending STP BPDUs. However, when the ports receive RST BPDUs during the migrate time
period, the ports begin sending RST BPDUs. The migrate time period is non-configurable. It has a value
of three seconds.
NOTE
The IEEE standards state that 802.1W bridges need to interoperate with 802.1D bridges. IEEE
standards set the path cost of 802.1W bridges to be between 1 and 200,000,000; whereas path cost of
802.1D bridges are set between 1 and 65,535. In order for the two bridge types to be able to
interoperate in the same topology, the administrator needs to configure the bridge path cost
appropriately. Path costs for either 802.1W bridges or 802.1D bridges need to be changed; in most
cases, path costs for 802.1W bridges need to be changed.
NOTE
With RSTP running, enabling static trunk on ports that are members of VLAN 4000 will keep the system
busy for 20 to 25 seconds.
Brocade devices are shipped from the factory with 802.1W disabled. Use the following methods to
enable or disable 802.1W. You can enable or disable 802.1W at the following levels:
• Port-based VLAN - Affects all ports within the specified port-based VLAN. When you enable or
disable 802.1W within a port-based VLAN, the setting overrides the global setting. Thus, you can
enable 802.1W for the ports within a port-based VLAN even when 802.1W is globally disabled, or
disable the ports within a port-based VLAN when 802.1W is globally enabled.
• Individual port - Affects only the individual port. However, if you change the 802.1W state of the
primary port in a trunk group, the change affects all ports in the trunk group.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 305
53-1002967-03
Spanning Tree Protocol
device(config)#vlan 10
device(config-vlan-10)#spanning-tree 802-1w
Syntax: [no] spanning-tree 802-1w
conf t
vlan 120
tag e 1 to e 2
spanning-tree 802-1w
spanning-tree 802-1w priority 1001
end
To avoid this issue, 802.1W commands/settings that are pasted into the configuration should be in the
following order.
1. Ports that are not yet connected
2. 802.1W RSTP settings
3. Ports that are already up
Example
conf t
vlan 120
untag e 3
spanning-tree 802-1w
spanning-tree 802-1w priority 1001
tag e 1 to 2
end
In the above configuration, untagged port e3 is added to VLAN 120 before the 802.1W RSTP settings,
and ports e1 and e2 are added after the 802.1W RSTP settings. When these commands are pasted
into the running configuration, the ports will properly operate in 802.1W RSTP mode.
306 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
NOTE
If you change the 802.1W state of the primary port in a trunk group, the change affects all ports in that
trunk group.
To disable or enable 802.1W on an individual port, enter commands such as the following.
device(config)#interface e 1
device(config-if-e1000-1)#no spanning-tree
Syntax: [no] spanning-tree
device(config)#vlan 20
device(config-vlan-20)#spanning-tree 802-1w priority 0
To make this change in the default VLAN, enter the following commands.
device(config)#vlan 1
device(config-vlan-1)#spanning-tree 802-1w priority 0
Syntax: spanning-tree 802-1w [ forward-delay value] | [hello-time value] | [max-age time] | [force-
version value] | [priority value]
The forward-delay value parameter specifies how long a port waits before it forwards an RST BPDU
after a topology change. This can be a value from 4 - 30 seconds. The default is 15 seconds.
The hello-time value parameter specifies the interval between two hello packets. This parameter can
have a value from 1 - 10 seconds. The default is 2 seconds.
The max-age value parameter specifies the amount of time the device waits to receive a hello packet
before it initiates a topology change. You can specify a value from 6 - 40 seconds. The default is 20
seconds.
The value of max-age must be greater than the value of forward-delay to ensure that the downstream
bridges do not age out faster than the upstream bridges (those bridges that are closer to the root
bridge).
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 307
53-1002967-03
Spanning Tree Protocol
The force-version value parameter forces the bridge to send BPDUs in a specific format. You can
specify one of the following values:
• 0 - The STP compatibility mode. Only STP (or legacy) BPDUs will be sent.
• 2 - The default. RST BPDUs will be sent unless a legacy bridge is detected. If a legacy bridge is
detected, STP BPDUs will be sent instead.
The default is 2.
The priority value parameter specifies the priority of the bridge. You can enter a value from 0 - 65535.
A lower numerical value means the bridge has a higher priority. Thus, the highest priority is 0. The
default is 32768.
You can specify some or all of these parameters on the same command line. If you specify more than
one parameter, you must specify them in the order shown above, from left to right.
device(config)#vlan 10
device(config-vlan-10)#spanning-tree 802-1w ethernet 5 path-cost 15
priority 64
Syntax: spanning-tree 802-1w ethernet port path-cost value | priority value | [admin-edge-port] |
[admin-pt2pt-mac] | [force-migration-check]
The path-cost value parameter specifies the cost of the port path to the root bridge. 802.1W prefers
the path with the lowest cost. You can specify a value from 1 - 20,000,000. The following table shows
the recommended path cost values from the IEEE standards.
308 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying information about 802-1W
• You can specify a value from 0 – 240, in increments of 16. If you enter a value that is not divisible
by 16, the software returns an error message. The default value is 128. A higher numerical value
means a lower priority; thus, the highest priority is 0.
• Set the admin-edge-port to enabled or disabled. If set to enabled, then the port becomes an edge
port in the domain.
Set the admin-pt2pt-mac to enabled or disabled. If set to enabled, then a port is connected to another
port through a point-to-point link. The point-to-point link increases the speed of convergence. This
parameter, however, does not auto-detect whether or not the link is a physical point-to-point link.
The force-migration-check parameter forces the specified port to sent one RST BPDU. If only STP
BPDUs are received in response to the sent RST BPDU, then the port will go return to sending STP
BPDUs.
Example
Suppose you want to enable 802.1W on a system with no active port-based VLANs and change the
hello-time from the default value of 2 to 8 seconds. Additionally, suppose you want to change the path
and priority costs for port 5 only. To do so, enter the following commands.
device#show
802-1w
--- VLAN 1 [ STP Instance owned by VLAN 1 ] ----------------------------
VLAN 1 BPDU cam_index is 2 and the IGC and DMA master Are(HEX) 0 1 2 3
Bridge IEEE 802.1W Parameters:
Bridge Bridge Bridge Bridge Force tx
Identifier MaxAge Hello FwdDly Version Hold
hex sec sec sec cnt
800000e080541700 20 2 15 Default 3
RootBridge RootPath DesignatedBri- Root Max Fwd Hel
Identifier Cost dge Identifier Port Age Dly lo
hex hex sec sec sec
800000e0804c9c00 200000 800000e0804c9c00 1 20 15 2
Port IEEE 802.1W Parameters:
<--- Config Params -->|<-------------- Current state -----------------
>
Port Pri PortPath P2P Edge Role State Designa- Designated
Num Cost Mac Port ted cost bridge
1 128 200000 F F ROOT FORWARDING 0 800000e0804c9c00
2 128 200000 F F DESIGNATED FORWARDING 200000 800000e080541700
3 128 200000 F F DESIGNATED FORWARDING 200000 800000e080541700
4 128 200000 F F BACKUP DISCARDING 200000 800000e080541700
Syntax: show 802-1w [ vlan vlan-id]
The vlan vlan-id parameter displays 802.1W information for the specified port-based VLAN.
The show 802-1w command shows the information listed in the following figure.
Field Description
VLAN ID The port-based VLAN that owns the STP instance. VLAN 1 is the default VLAN. If you have
not configured port-based VLANs on this device, all 802.1W information is for VLAN 1.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 309
53-1002967-03
Spanning Tree Protocol
Field Description
Bridge Max Age The configured max age for this bridge. The default is 20.
Bridge Hello The configured hello time for this bridge.The default is 2.
Bridge FwdDly The configured forward delay time for this bridge. The default is 15.
Force-Version The configured force version value. One of the following value is displayed:
txHoldCnt The number of BPDUs that can be transmitted per Hello Interval. The default is 3.
Root Bridge ID of the Root bridge that is associated with this bridge
Identifier
Root Path Cost The cost to reach the root bridge from this bridge. If the bridge is the root bridge, then this
parameter shows a value of zero.
Designated Bridge The bridge from where the root information was received.It can be from the root bridge itself,
Identifier but it could also be from another bridge.
Root Port The port on which the root information was received. This is the port that is connected to the
Designated Bridge.
Max Age The max age is derived from the Root port. An 802.1W-enabled bridge uses this value,
along with the hello and message age parameters to compute the effective age of an RST
BPDU.
The message age parameter is generated by the Designated port and transmitted in the
RST BPDU. RST BPDUs transmitted by a Designated port of the root bridge contains a
message value of zero.
Effective age is the amount of time the Root port, Alternate port, or Backup port retains the
information it received from its peer Designated port. Effective age is reset every time a port
receives an RST BPDU from its Designated port. If a Root port does not receive an RST
BPDU from its peer Designated port for a duration more than the effective age, the Root port
ages out the existing information and recomputes the topology.
If the port is operating in 802.1D compatible mode, then max age functionality is the same as
in 802.1D (STP).
310 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
Field Description
Fwd Dly The number of seconds a non-edge Designated port waits until it can apply any of the
following transitions, if the RST BPDU it receives does not have an agreed flag:
When a non-edge port receives the RST BPDU it goes into forwarding state within 4 seconds
or after two hello timers expire on the port.
Fwd Dly is also the number of seconds that a Root port waits for an RST BPDU with a
proposal flag before it applies the state transitions listed above.
If the port is operating in 802.1D compatible mode, then forward delay functionality is the
same as in 802.1D (STP).
Hello The hello value derived from the Root port. It is the number of seconds between two Hello
packets.
Pri The configured priority of the port. The default is 128 or 0x80.
Port Path Cost The configured path cost on a link connected to this port.
• Root
• Designated
• Alternate
• Backup
• Disabled
Refer to Bridges and bridge port roles on page 276 for definitions of the roles.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 311
53-1002967-03
Spanning Tree Protocol
Field Description
State The port current 802.1W state. A port can have one of the following states:
• Forwarding
• Discarding
• Learning
• Disabled
Refer to Bridge port states on page 281 and Edge port and non-edge port states on page
282.
Designated Cost The best root path cost that this port received, including the best root path cost that it can
transmit.
Designated Bridge The ID of the bridge that sent the best RST BPDU that was received on this port.
Field Description
VLAN ID ID of the VLAN that owns the instance of 802.1W and whether or not it is active.
312 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
Field Description
txHoldCount The number of BPDUs that can be transmitted per Hello Interval. The default is 3.
• Root
• Designated
• Alternate
• Backup
• Disabled
Refer to Bridges and bridge port roles on page 276for definitions of the roles.
State The port current 802.1W state. A port can have one of the following states:
• Forwarding
• Discarding
• Learning
• Disabled
Refer to Bridge port states on page 281 and Edge port and non-edge port states on page
282.
Path Cost The configured path cost on a link connected to this port.
Priority The configured priority of the port. The default is 128 or 0x80.
AdminOperEdge Indicates if the port is an operational Edge port. Edge ports may either be auto-detected or
configured (forced) to be Edge ports using the CLI:
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 313
53-1002967-03
802.1W Draft 3
Field Description
ActiveTimers Shows what timers are currently active on this port and the number of seconds they have
before they expire:
• rrWhile - Recent root timer. A non-zero value means that the port has recently been a
Root port.
• rcvdInfoWhile - Received information timer. Shows the time remaining before the
information held by this port expires (ages out). This timer is initialized with the effective
age parameter. (Refer to the Max Age field in the Table 47 on page 309.)
• rbWhile - Recent backup timer. A non-zero value means that the port has recently been
a Backup port.
• helloWhen - Hello period timer. The value shown is the amount of time between hello
messages.
• tcWhile - Topology change timer. The value shown is the interval when topology change
notices can be propagated on this port.
• fdWhile - Forward delay timer.
• mdelayWhile - Migration delay timer. The amount of time that a bridge on the same LAN
has to synchronize its migration state with this port before another BPDU type can
cause this port to change the BPDU that it transmits.
Machine States The current states of the various state machines on the port:
Refer to the "Port Role Selection state machines" section in Changes to port roles and states
on page 282 for details on state machines.
Received Shows the number of BPDU types the port has received:
802.1W Draft 3
As an alternative to full 802.1W, you can configure 802.1W Draft 3. 802.1W Draft 3 provides a subset
of the RSTP capabilities described in the 802.1W STP specification.
802.1W Draft 3 support is disabled by default. When the feature is enabled, if a root port on a Brocade
device that is not the root bridge becomes unavailable, the device can automatically Switch over to an
alternate root port, without reconvergence delays. 802.1W Draft 3 does not apply to the root bridge,
since all the root bridge ports are always in the forwarding state.
The following figure shows an example of an optimal STP topology. In this topology, all the non-root
bridges have at least two paths to the root bridge (Switch 1 in this example). One of the paths is
314 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
through the root port. The other path is a backup and is through the alternate port. While the root port is
in the forwarding state, the alternate port is in the blocking state.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 315
53-1002967-03
Spanning Tree Protocol
If the root port on a Switch becomes unavailable, 802.1W Draft 3 immediately fails over to the
alternate port, as shown in the following figure.
In this example, port 3/3 on Switch 3 has become unavailable. In standard STP (802.1D), if the root
port becomes unavailable, the Switch must go through the listening and learning stages on the
alternate port to reconverge with the spanning tree. Thus, port 3/4 must go through the listening and
learning states before entering the forwarding state and thus reconverging with the spanning tree.
802.1W Draft 3 avoids the reconvergence delay by calculating an alternate root port, and immediately
failing over to the alternate port if the root port becomes unavailable. The alternate port is in the
blocking state as long as the root port is in the forwarding state, but moves immediately to the active
state if the root port becomes unavailable. Thus, using 802.1W Draft 3, Switch 3 immediately fails over
to port 3/4, without the delays caused by the listening and learning states.
802.1W Draft 3 selects the port with the next-best cost to the root bridge. For example, on Switch 3,
port 3/3 has the best cost to the root bridge and thus is selected by STP as the root port. Port 3/4 has
the next-best cost to the root bridge, and thus is selected by 802.1W Draft 3 as the alternate path to
the root bridge.
Once a failover occurs, the Switch no longer has an alternate root port. If the port that was an alternate
port but became the root port fails, standard STP is used to reconverge with the network. You can
minimize the reconvergence delay in this case by setting the forwarding delay on the root bridge to a
lower value. For example, if the forwarding delay is set to 15 seconds (the default), change the
forwarding delay to a value from 3 - 10 seconds.
During failover, 802.1W Draft 3 flushes the MAC addresses leaned on the unavailable root port,
selects the alternate port as the new root port, and places that port in the forwarding state. If traffic is
flowing in both directions on the new root port, addresses are flushed (moved) in the rest of the
spanning tree automatically.
316 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning tree reconvergence time
NOTE
802.1W Draft 3 does not apply when a failed root port comes back up. When this happens, standard
STP is used.
NOTE
If reconvergence involves changing the state of a root port on a bridge that supports 802.1D STP but
not 802.1W Draft 3, then reconvergence still requires the amount of time it takes for the ports on the
802.1D bridge to change state to forwarding (as needed), and receive BPDUs from the root bridge for
the new topology.
NOTE
STP must be enabled before you can enable 802.1W Draft 3.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 317
53-1002967-03
Single Spanning Tree (SSTP)
device(config)#vlan 10
device(config-vlan-10)#spanning-tree rstp
Syntax: [no] spanning-tree rstp
This command enables 802.1W Draft 3. You must enter the command separately in each port-based
VLAN in which you want to run 802.1W Draft 3.
NOTE
This command does not also enable STP. To enable STP, first enter the spanning-tree command
without the rstp parameter. After you enable STP, enter the spanning-tree rstp command to enable
802.1W Draft 3.
NOTE
This command does not also enable single STP. To enable single STP, first enter the spanning-tree
single command without the rstp parameter. After you enable single STP, enter the spanning-tree
single rstp command to enable 802.1W Draft 3.
To disable 802.1W Draft 3 on a device that is running single STP, enter the following command.
318 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
SSTP defaults
SSTP defaults
SSTP is disabled by default. When you enable the feature, all VLANs on which STP is enabled become
members of a single spanning tree. All VLANs on which STP is disabled are excluded from the single
spanning tree.
To add a VLAN to the single spanning tree, enable STP on that VLAN.To remove a VLAN from the
single spanning tree, disable STP on that VLAN.
When you enable SSTP, all the ports that are in port-based VLANs with STP enabled become members
of a single spanning tree domain. Thus, the ports share a single BPDU broadcast domain. The Brocade
device places all the ports in a non-configurable VLAN, 4094, to implement the SSTP domain. However,
this VLAN does not affect port membership in the port-based VLANs you have configured. Other
broadcast traffic is still contained within the individual port-based VLANs. Therefore, you can use SSTP
while still using your existing VLAN configurations without changing your network. In addition, SSTP
does not affect 802.1Q tagging. Tagged and untagged ports alike can be members of the single
spanning tree domain.
NOTE
When SSTP is enabled, the BPDUs on tagged ports go out untagged.
If you disable SSTP, all VLANs that were members of the single spanning tree run MSTP instead. In
MSTP, each VLAN has its own spanning tree. VLANs that were not members of the single spanning
tree were not enabled for STP. Therefore, STP remains disabled on those VLANs.
Enabling SSTP
To enable SSTP, use one of the following methods.
NOTE
If the device has only one port-based VLAN (the default VLAN), then the device is already running a
single instance of STP. In this case, you do not need to enable SSTP. You need to enable SSTP only if
the device contains more than one port-based VLAN and you want all the ports to be in the same STP
broadcast domain.
To configure the Brocade device to run a single spanning tree, enter the following command at the
global CONFIG level.
device(config)#spanning-tree single
NOTE
If the device has only one port-based VLAN, the CLI command for enabling SSTP is not listed in the
CLI. The command is listed only if you have configured a port-based VLAN.
To change a global STP parameter, enter a command such as the following at the global CONFIG level.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 319
53-1002967-03
Displaying SSTP information
The commands shown above override the global setting for STP priority and set the priority to 10 for
port 1/1.
Here is the syntax for the global STP parameters.
Syntax: [no] spanning-tree single [ forward-delay value] [hello-time value] | [maximum-age time] |
[priority value]
Here is the syntax for the STP port parameters.
Syntax: [no] spanning-tree single [ ethernet port path-cost value | priority value]
NOTE
Both commands listed above are entered at the global CONFIG level.
device#show span
Syntax: show span [ vlan vlan-id] | [pvst-mode] | [num] | [detail [vlan vlan-id [ethernet port] | num]]
The vlan vlan-id parameter displays STP information for the specified port-based VLAN.
The pvst-mode parameter displays STP information for the device Per VLAN Spanning Tree (PVST+)
compatibility configuration. Refer to PVST/PVST+ compatibility on page 325.
The num parameter displays only the entries after the number you specify. For example, on a device
with three port-based VLANs, if you enter 1, then information for the second and third VLANs is
displayed, but information for the first VLAN is not displayed. Information is displayed according to
VLAN number, in ascending order. The entry number is not the same as the VLAN number. For
example, if you have port-based VLANs 1, 10, and 2024, then the command output has three STP
entries. To display information for VLANs 10 and 2024 only, enter show span 1 .
The detail parameter and its additional optional parameters display detailed information for individual
ports. Refer to Displaying detailed STP information for each interface on page 265.
320 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
STP load balancing
STP per VLAN group allows you to group VLANs and apply the same STP parameter settings to all the
VLANs in the group. The following figure shows an example of a STP per VLAN group implementation.
A master VLAN contains one or more member VLANs. Each of the member VLANs in the STP Group
runs the same instance of STP and uses the STP parameters configured for the master VLAN. In this
example, the FastIron switch is configured with VLANs 3, 4, 13, and 14. VLANs 3 and 4 are grouped in
master VLAN 2, which is in STP group 1. VLANs 13 and 14 are grouped in master VLAN 12, which is in
STP group 2. The VLANs in STP group 1 all share the same spanning tree. The VLANs in STP group 2
share a different spanning tree.
All the portss are tagged. The ports must be tagged so that they can be in both a member VLAN and
the member's master VLAN. For example, ports 1/1 - 1/4 are in member VLAN 3 and also in master
VLAN 2 (since master VLAN 2 contains member VLAN 3).
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 321
53-1002967-03
Spanning Tree Protocol
master VLANs (2 and 12). Notice that changes to STP parameters are made in the master VLANs
only, not in the member VLANs.
device(config)#vlan 2
device(config-vlan-2)#spanning-tree priority 1
device(config-vlan-2)#tagged ethernet 1/1 to 1/4
device(config-vlan-2)#vlan 3
device(config-vlan-3)#tagged ethernet 1/1 to 1/4
device(config-vlan-3)#vlan 4
device(config-vlan-4)#tagged ethernet 1/1 to 1/4
device(config-vlan-4)#vlan 12
device(config-vlan-12)#spanning-tree priority 2
device(config-vlan-12)#tagged ethernet 1/1 to 1/4
device(config-vlan-12)#vlan 13
device(config-vlan-13)#tagged ethernet 1/1 to 1/4
device(config-vlan-13)#vlan 14
device(config-vlan-14)#tagged ethernet 1/1 to 1/4
device(config-vlan-14)#exit
The following commands configure the STP groups.
device(config)#stp-group 1
device(config-stp-group-1)#master-vlan 2
device(config-stp-group-1)#member-vlan 3 to 4
device(config-stp-group-1)#exit
device(config)#stp-group 2
device(config-stp-group-2)#master-vlan 12
device(config-stp-group-2)#member-vlan 13 to 14
Syntax: [no] stp-group num
This command changes the CLI to the STP group configuration level. The following commands
are valid at this level. The num parameter specifies the STP group ID and can be from 1 - 32.
Syntax: [no] master-vlan num
This command adds a master VLAN to the STP group. The master VLAN contains the STP
settings for all the VLANs in the STP per VLAN group. The num parameter specifies the VLAN ID.
An STP group can contain one master VLAN.
If you delete the master VLAN from an STP group, the software automatically assigns the first
member VLAN in the group to be the new master VLAN for the group.
Syntax: [no] member-vlan num [ to num]
This command adds additional VLANs to the STP group. These VLANs also inherit the STP
settings of the master VLAN in the group.
Syntax: [no] member-group num
This command adds a member group (a VLAN group) to the STP group. All the VLANs in the
member group inherit the STP settings of the master VLAN in the group. The num parameter
specifies the VLAN group ID.
NOTE
This command is optional and is not used in the example above. For an example of this
command, refer to Configuration example for STP load sharing on page 323.
322 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuration example for STP load sharing
In this example, each of the devices in the core is configured with a common set of master VLANs, each
of which contains one or more member VLANs. Each of the member VLANs in an STP group runs the
same instance of STP and uses the STP parameters configured for the master VLAN.
The STP group ID identifies the STP instance. All VLANs within an STP group run the same instance of
STP. The master VLAN specifies the bridge STP parameters for the STP group, including the bridge
priority. In this example, each of the devices in the core is configured to be the default root bridge for a
different master VLAN. This configuration ensures that each link can be used for forwarding some
traffic. For example, all the ports on the root bridge for master VLAN 1 are configured to forward BPDUs
for master VLAN spanning tree. Ports on the other devices block or forward VLAN 1 traffic based on
STP convergence. All the ports on the root bridge for VLAN 2 forward VLAN 2 traffic, and so on.
All the portss are tagged. The ports must be tagged so that they can be in both a member VLAN and
the member's master VLAN. For example, port 1/1 - and ports 5/1, 5/2, and 5/3 are in member VLAN 2
and master VLAN 1 (since master VLAN a contains member VLAN 2).
Here are the commands for configuring the root bridge for master VLAN 1 in figure Figure 64 on page
321 for STP per VLAN group. The first group of commands configures the master VLANs. Notice that
the STP priority is set to a different value for each VLAN. In addition, the same VLAN has a different
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 323
53-1002967-03
Spanning Tree Protocol
STP priority on each device. This provides load balancing by making each of the devices a root bridge
for a different spanning tree.
device(config)#vlan 1
device(config-vlan-1)#spanning-tree priority 1
device(config-vlan-1)#tag ethernet 1/1 ethernet 5/1 to 5/3
device(config-vlan-1)#vlan 201
device(config-vlan-201)#spanning-tree priority 2
device(config-vlan-201)#tag ethernet 1/2 ethernet 5/1 to 5/3
device(config-vlan-201)#vlan 401
device(config-vlan-401)#spanning-tree priority 3
device(config-vlan-401)#tag ethernet 1/3 ethernet 5/1 to 5/3
...
device(config-vlan-3601)#vlan 3801
device(config-vlan-3801)#spanning-tree priority 20
device(config-vlan-3801)#tag ethernet 1/20 ethernet 5/1 to 5/3
device(config-vlan-3801)#exit
The next group of commands configures VLAN groups for the member VLANs. Notice that the VLAN
groups do not contain the VLAN numbers assigned to the master VLANs. Also notice that no STP
parameters are configured for the groups of member VLANs. Each group of member VLANs will
inherit its STP settings from its master VLAN.
Set the bridge priority for each master VLAN to the highest priority (1) on one of the devices in the
STP per VLAN group configuration. By setting the bridge priority to the highest priority, you make the
device the default root bridge for the spanning tree. To ensure STP load balancing, make each of the
devices the default root bridge for a different master VLAN.
device(config)#stp-group 1
device(config-stp-group-1)#master-vlan 1
device(config-stp-group-1)#member-group 1
device(config-stp-group-1)#member-vlan 4001 4004 to 4010
device(config-stp-group-1)#stp-group 2
device(config-stp-group-2)#master-vlan 201
device(config-stp-group-2)#member-group 2
device(config-stp-group-2)#member-vlan 4002 4003 4011 to 4015
device(config-stp-group-2)#stp-group 3
device(config-stp-group-3)#master-vlan 401
device(config-stp-group-3)#member-group 3
...
device(config-stp-group-19)#stp-group 20
device(config-stp-group-20)#master-vlan 3081
device(config-stp-group-20)#member-group 20
324 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
PVST/PVST+ compatibility
PVST/PVST+ compatibility
The FastIron family of switches support Cisco's Per VLAN Spanning Tree plus (PVST+), by allowing the
device to run multiple spanning trees (MSTP) while also interoperating with IEEE 802.1Q devices1.
NOTE
Brocade ports automatically detect PVST+ BPDUs and enable support for the BPDUs once detected.
You do not need to perform any configuration steps to enable PVST+ support. However, to support the
IEEE 802.1Q BPDUs, you might need to enable dual-mode support.
Support for Cisco's Per VLAN Spanning Tree plus (PVST+), allows a Brocade device to run multiple
spanning trees (MSTP) while also interoperating with IEEE 802.1Q devices. Brocade ports
automatically detect PVST+ BPDUs and enable support for the BPDUs once detected. The
enhancement allows a port that is in PVST+ compatibility mode due to auto-detection to revert to the
default MSTP mode when one of the following events occurs:
• The link is disconnected or broken
• The link is administratively disabled
• The link is disabled by interaction with the link-keepalive protocol
This enhancement allows a port that was originally interoperating with PVST+ to revert to MSTP when
connected to a Brocade device.
1 Cisco user documentation for PVST/PVST+ refers to the IEEE 802.1Q spanning tree as the Common Spanning Tree (CST).
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 325
53-1002967-03
VLAN tags and dual mode
(the IEEE 802.1Q VLAN) are processed by PVST+ regions. The following figure shows the interaction
of IEEE 802.1Q, PVST, and PVST+ regions.
326 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring PVST+ support
NOTE
If you disable PVST+ support, the software still automatically enables PVST+ support if the port
receives a BPDU with PVST+ format.
NOTE
If 802.1W and pvst-mode (either by auto-detection or by explicit configuration) are enabled on a tagged
VLAN port, 802.1W will treat the PVST BPDUs as legacy 802.1D BPDUs.
device(config-if-1/1)#dual-mode
Syntax: [no] dual-mode [vlan-id]
The vlan-id specifies the port Port Native VLAN. This is the VLAN on which the port will support
untagged frames. By default, the Port Native VLAN is the same as the default VLAN (which is VLAN 1
by default).
For more information about the dual-mode feature, refer to "Dual-mode VLAN ports" on page 410.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 327
53-1002967-03
Displaying PVST+ support information
Field Description
NOTE
The command lists information only for the ports on which PVST+ support is enabled.
Method The method by which PVST+ support was enabled on the port. The method can be one of the following:
328 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Tagged port using default VLAN 1 as its port native VLAN
device(config)#vlan-group 1 vlan 2 to 4
device(config-vlan-group-1)#tagged ethernet 1/1
device(config-vlan-group-1)#exit
device(config)#interface ethernet 1/1
device(config-if-1/1)#dual-mode
device(config-if-1/1)#pvst-mode
These commands configure a VLAN group containing VLANs 2, 3, and 4, add port 1/1 as a tagged port
to the VLANs, and enable the dual-mode feature and PVST+ support on the port. The dual-mode
feature allows the port to send and receive untagged frames for the default VLAN (VLAN 1 in this case)
in addition to tagged frames for VLANs 2, 3, and 4. Enabling the PVST+ support ensures that the port is
ready to send and receive PVST+ BPDUs. If you do not manually enable PVST+ support, the support is
not enabled until the port receives a PVST+ BPDU.
The configuration leaves the default VLAN and the port Port Native VLAN unchanged. The default
VLAN is 1 and the port Port Native VLAN also is 1. The dual-mode feature supports untagged frames
on the default VLAN only. Thus, port 1/1 can send and receive untagged BPDUs for VLAN 1 and can
send and receive tagged BPDUs for the other VLANs.
Port 1/1 will process BPDUs as follows:
• Process IEEE 802.1Q BPDUs for VLAN 1.
• Process tagged PVST BPDUs for VLANs 2, 3, and 4.
• Drop untagged PVST BPDUs for VLAN 1.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 329
53-1002967-03
Untagged port using VLAN 2 as port native VLAN
device(config)#default-vlan-id 4000
device(config)#vlan 1
device(config-vlan-1)#tagged ethernet 1/1
device(config-vlan-1)#exit
device(config)#vlan 2
device(config-vlan-2)#tagged ethernet 1/1
device(config-vlan-2)#exit
device(config)#interface ethernet 1/1
device(config-if-1/1)#dual-mode 2
device(config-if-1/1)#pvst-mode
device(config-if-1/1)#exit
These commands change the default VLAN ID, configure port 1/1 as a tagged member of VLANs 1
and 2, and enable the dual-mode feature and PVST+ support on port 1/1. Since VLAN 1 is tagged in
this configuration, the default VLAN ID must be changed from VLAN 1 to another VLAN ID. Changing
the default VLAN ID from 1 allows the port to process tagged frames for VLAN 1. VLAN 2 is specified
with the dual-mode command, which makes VLAN 2 the port Port Native VLAN. As a result, the port
processes untagged frames and untagged PVST BPDUs on VLAN 2.
NOTE
Although VLAN 2 becomes the port untagged VLAN, the CLI still requires that you add the port to the
VLAN as a tagged port, since the port is a member of more than one VLAN.
Port 1/1 will process BPDUs as follows:
• Process IEEE 802.1Q BPDUs for VLAN 1.
• Process untagged PVST BPDUs for VLAN 2.
• Drop tagged PVST BPDUs for VLAN 1.
Note that when VLAN 1 is not the default VLAN, the ports must have the dual-mode feature enabled in
order to process IEEE 802.1Q BPDUs.
For example, the following configuration is incorrect.
device(config)#default-vlan-id 1000
device(config)#vlan 1
device(config-vlan-1)#tagged ethernet 1/1 to 1/2
device(config-vlan-1)#exit
device(config)#interface ethernet 1/1
device(config-if-1/1)#pvst-mode
device(config-if-1/1)#exit
330 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
PVRST compatibility
device(config)#default-vlan-id 1000
device(config)#vlan 1
device(config-vlan-1)#tagged ethernet 1/1 to 1/2
device(config-vlan-1)#exit
device(config)#interface ethernet 1/1
device(config-if-1/1)#pvst-mode
device(config-if-1/1)#dual-mode
device(config-if-1/1)#exit
device(config)#interface ethernet 1/2
device(config-if-1/2)#pvst-mode
device(config-if-1/2)#dual-mode
device(config-if-1/2)#exit
Setting the ports as dual-mode ensures that the untagged IEEE 802.1Q BPDUs reach the VLAN 1
instance.
PVRST compatibility
PVRST, the "rapid" version of per-VLAN spanning tree (PVST), is a Cisco proprietary protocol. PVRST
corresponds to the Brocade full implementation of IEEE 802.1w (RSTP). Likewise, PVST, also a Cisco
proprietary protocol, corresponds to the Brocade implementation of IEEE 802.1D (STP). When a
Brocade device receives PVRST BPDUs on a port configured to run 802.1w, it recognizes and
processes these BPDUs and continues to operate in 802.1w mode.
PVRST compatibility is automatically enabled when a port receives a PVRST BPDU.
BPDU guard
In an STP environment, switches, end stations, and other Layer 2 devices use Bridge Protocol Data
Units (BPDUs) to exchange information that STP will use to determine the best path for data flow.
The BPDU guard, an enhancement to STP, removes a node that reflects BPDUs back in the network. It
enforces the STP domain borders and keeps the active topology predictable by not allowing any
network devices behind a BPDU guard-enabled port to participate in STP.
In some instances, it is unnecessary for a connected device, such as an end station, to initiate or
participate in an STP topology change. In this case, you can enable the STP BPDU guard feature on
the Brocade port to which the end station is connected. STP BPDU guard shuts down the port and puts
it into an errdisable state. This disables the connected device's ability to initiate or participate in an STP
topology. A log message is then generated for a BPDU guard violation, and a CLI message is displayed
to warn the network administrator of a severe invalid configuration. The BPDU guard feature provides a
secure response to invalid configurations because the administrator must manually put the interface
back in service if errdisable recovery is not enabled.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 331
53-1002967-03
Enabling BPDU protection by port
NOTE
BPDU guard is not supported on tagged ports. It can be configured on a tagged port, but the
configuration will have no effect.
device#show int e 2
Gigabit Ethernet2 is ERR-DISABLED (bpduguard), line protocol is down
To re-enable a port that is in errdisable state, you must first disable the port then re-enable it. Enter
commands such as the following.
device(config)#int e 2
device(config-if-e1000-2)#disable
device(config-if-e1000-2)#enable
If you attempt to enable an errdisabled port without first disabling it, the following error message will
appear on the console.
device(config-if-e1000-2)#enable
Port 2 is errdisabled, do disable first and then enable to enable it
332 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
BPDU guard status example configurations
device#show stp-bpdu-guard
BPDU Guard Enabled on:
Interface Violation
Port 1 No
Port 2 No
Port 3 No
Port 4 No
Port 5 No
Port 6 No
Port 7 No
Port 8 No
Port 9 No
Port 10 No
Port 11 No
Port 12 Yes
Port 13 No
The following example shows how to configure BPDU guard at the interface level and to verify the
configuration by issuing the show stp-bpdu-guard and the show interface commands.
device(config)#interface ethernet 1
device(config-if-e1000-1)#stp-bpdu-guard
device(config-if-e1000-1)#
device(config-if-e1000-1)#show stp-bpdu-guard
BPDU Guard Enabled on:
Port
1
device(config-if-e1000-1)#
device(config-if-e1000-1)#show interfaces ethernet 1
GigabitEthernet1 is up, line protocol is up
Port up for 40 seconds
Hardware is GigabitEthernet, address is 0000.00a0.7100 (bia 0000.00a0.7100)
Configured speed auto, actual 100Mbit, configured duplex fdx, actual fdx
Configured mdi mode AUTO, actual MDI
Member of L2 VLAN ID 2, port is untagged, port state is FORWARDING
BPDU guard is Enabled
, ROOT protect is Disabled
STP configured to ON, priority is level0, flow control enabled
mirror disabled, monitor disabled
Not member of any active trunks
Not member of any configured trunks
No port name
IPG MII 96 bits-time, IPG GMII 96 bits-time
IP MTU 1500 bytes
300 second input rate: 8 bits/sec, 0 packets/sec, 0.00% utilization
300 second output rate: 256 bits/sec, 0 packets/sec, 0.00% utilization
88 packets input, 15256 bytes, 0 no buffer
Received 75 broadcasts, 13 multicasts, 0 unicasts
1 input errors, 0 CRC, 0 frame, 0 ignored
0 runts, 0 giants
4799 packets output, 313268 bytes, 0 underruns
Transmitted 90 broadcasts, 4709
NOTE
The port up/down time is required only for physical ports and not for loopback/ ve/ tunnel ports.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 333
53-1002967-03
BPDU guard status example console messages
Root guard
The standard STP (802.1D), RSTP (802.1W) or 802.1S does not provide any way for a network
administrator to securely enforce the topology of a switched layer 2 network. The forwarding topology
of a switched network is calculated based on the root bridge position, along with other parameters.
This means any switch can be the root bridge in a network as long as it has the lowest bridge ID. The
administrator cannot enforce the position of the root bridge. A better forwarding topology comes with
the requirement to place the root bridge at a specific predetermined location. Root Guard can be used
to predetermine a root bridge location and prevent rogue or unwanted switches from becoming the
root bridge.
When root guard is enabled on a port, it keeps the port in a designated role. If the port receives a
superior STP Bridge Protocol Data Units (BPDU), it puts the port into a ROOT-INCONSISTANT state
and triggers a log message and an SNMP trap. The ROOT-INCONSISTANT state is equivalent to the
BLOCKING state in 802.1D and to the DISCARDING state in 802.1W. No further traffic is forwarded
on this port. This allows the bridge to prevent traffic from being forwarded on ports connected to rogue
or misconfigured STP bridges.
Once the port stops receiving superior BPDUs, root guard automatically sets the port back to learning,
and eventually to a forwarding state through the spanning-tree algorithm.
Configure root guard on all ports where the root bridge should not appear. This establishes a
protective network perimeter around the core bridged network, cutting it off from the user network.
NOTE
Root guard may prevent network connectivity if it is improperly configured. Root guard must be
configured on the perimeter of the network rather than the core.
NOTE
Root guard is not supported when MSTP is enabled.
334 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Enabling STP root guard
Designated Protection
Designated Protection ensures that a port cannot go to the designated forwarding state in STP 802.1d
or 802.1w. For example, a fast uplink port should never become a designated port to avoid loops in a
network topology. It should either be a root port in any STP state or a non-root port in a blocking state.
You can enable Designated Protection on the port to ensure that it does not go to the designated
forwarding state. If STP tries to put this port into the designated forwarding state, the device puts this
port into a designated inconsistent STP state. This is effectively equivalent to the listening state in STP
in which a port cannot transfer any user traffic. When STP no longer marks this port as a designated
port, the port is automatically removed from the designated inconsistent state.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 335
53-1002967-03
Enabling Designated Protection on a port
Designation Protection is a port-level feature, while the designated inconsistent state is a per-STP-
instance, per-port state. In PVST, a port can belong to several VLANs where each VLAN runs a
separate spanning tree instance. The designated inconsistent state in one spanning tree instance
does not affect the traffic in other spanning tree instances.
For example, consider an interface eth 1 that is in VLAN 20 and VLAN 50. VLAN 20 runs one instance
of STP and VLAN 50 runs another instance. Interface eth1 can be in the designated inconsistent state
for VLAN 50 and block the VLAN 50 traffic while it is in root forwarding state for VLAN 20 and allow
VLAN 20 traffic.
You can view the status of the Designated Protection feature on a port with the show interface
ethernet command for that port.
NOTE
You cannot enable Designated Protection and Root Guard on the same port.
The following example shows that the designated forwarding state is disallowed
on Ethernet interface 1/1/1.
Brocade(config)# ethernet interface 1/1/1
Brocade(config-if-e1000-1/1/1)# spanning-tree designated-
protect
336 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Enabling an error-disabled port manually
NOTE
When automatic recovery re-enables the port, the port is not in the error-disabled state, but it can
remain down for other reasons, such as the Tx/Rx of the fibre optic not being seated properly. Thus, the
port is not able to receive the signal from the other side. In this case, after the optic is inserted correctly,
you should manually disable the port and then enable it.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 337
53-1002967-03
Displaying the recovery state for all conditions
STP: VLAN 50 BPDU-guard port 3 detect (Received BPDU), putting into err-
disable state
A Syslog message such as the following is generated after the recovery timer expires.
338 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
802.1s Multiple Spanning Tree Protocol
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 339
53-1002967-03
Configuration notes
The following definitions describe the STP instances that define an MSTP configuration.
Common Spanning (CST) - CST is defined in 802.1q and assumes one spanning-tree instance for
the entire bridged network regardless of the number of VLANs. In MSTP, an MSTP region appears as
a virtual bridge that runs CST.
Internal Spanning Tree (IST) - IST is a new terminology introduced in 802.1s. An MSTP bridge must
handle at least these two instances: one IST and one or more MSTIs (Multiple Spanning Tree
Instances). Within each MST region, the MSTP maintains multiple spanning-tree instances. Instance 0
is a special instance known as IST, which extends CST inside the MST region. IST always exists if the
switch runs MSTP. Besides IST, this implementation supports up to 15 MSTIs, numbered from 1 to
4094.
Common and Internal Spanning Trees (CIST) - CIST is a collection of the ISTs in each MST region
and the CST that interconnects the MST regions and single spanning trees.
Multiple Spanning Tree Instance (MSTI) - The MSTI is identified by an MST identifier (MSTid) value
between 1 and 4094.
MSTP Region - These are clusters of bridges that run multiple instances of the MSTP protocol.
Multiple bridges detect that they are in the same region by exchanging their configuration (instance to
VLAN mapping), name, and revision-level. Therefore, if you need to have two bridges in the same
region, the two bridges must have identical configurations, names, and revision-levels. Also, one or
more VLANs can be mapped to one MSTP instance (IST or MSTI) but a VLAN cannot be mapped to
multiple MSTP instances.
NOTE
One or more VLANs can be mapped to one MSTP instance (IST or MSTI) but a VLAN cannot be
mapped to multiple MSTP instances.
Configuration notes
When configuring MSTP, note the following:
• With MSTP running, enabling static trunk on ports that are members of many VLANs (4000 or
more VLANs) will keep the system busy for 20 to 25 seconds.
340 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Reduced occurrences of MSTP reconvergence
NOTE
MSTP is not operational however until the mstp start command is issued as described in Forcing ports
to transmit an MSTP BPDU on page 346.
Once the system is configured into MSTP mode, CIST (sometimes referred to as "instance 0") is
created and all existing VLANs inside the MSTP scope are controlled by CIST. In addition, whenever
you create a new VLAN inside MSTP scope, it is put under CIST control by default. In the Brocade
MSTP implementation however, a VLAN ID can be pre-mapped to another MSTI as described in
Configuring an MSTP instance on page 344. A VLAN whose ID is pre-mapped, will attach to the
specified MSTI instead of to the CIST when created.
NOTE
Once under MSTP mode, CIST always controls all ports in the system. If you do not want a port to run
MSTP, configure the no spanning-tree command under the specified interface configuration.
Using the no option on a system that is configured for MSTP mode changes the system to non-MSTP
mode. When this switch is made, all MSTP instances are deleted together with all MSTP configurations.
ALL VLANs inside the original MSTP scope will not run any Layer-2 protocols after the switch.
NOTE
MSTP reconvergence occurs when the VLAN to MSTI mapping is changed using the mstp instance
command.
You can optionally remove VLAN to MSTI mappings from the configuration. Refer to Deleting a VLAN to
MSTI mapping on page 342.
The following shows an example application.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 341
53-1002967-03
Example application of MSTP reconvergence
device(config-vlan-20)#show run
Current configuration:
!
ver 04.2.00bT3e1
!
!
vlan 1 name DEFAULT-VLAN by port
no spanning-tree
!
vlan 10 by port
tagged ethe 1 to 2
no spanning tree
!
vlan 20 by port <----- VLAN 20 configuration
tagged ethe 1 to 2
no spanning-tree
!
mstp scope all
mstp instance 0 vlan 1
mstp instance 1 vlan 20
mstp start
some lines ommitted for brevity...
device(config-vlan-20)#no vlan 20 <----- VLAN 20 deleted
device(config-vlan-20)#show run
Current configuration:
!
ver 04.2.00bT3e1
!
!
vlan 1 name DEFAULT-VLAN by port
no spanning-tree
!
vlan 10 by port
tagged ethe 1 to 2
no spanning-tree
!
mstp scope all
mstp instance 0 vlan 1
mstp instance 1 vlan 10
mstp instance 1 vlan 20 <----- VLAN to MSTI mapping kept in
mstp start running configuration, even
though
VLAN 20 was deleted
342 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Viewing the MSTP configuration digest
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 343
53-1002967-03
Setting the MSTP name
device(config)#mstp revision 4
Syntax: [no] mstp revision revision-number
The revision parameter specifies the revision level for MSTP that you are configuring on the switch. It
can be a number from 0 and 65535. The default revision number is 0.
344 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring bridge priority for an MSTP instance
NOTE
The system does not allow an MSTI without any VLANs mapped to it. Consequently, removing all
VLANs from an MSTI, deletes the MSTI from the system. The CIST by contrast will exist regardless of
whether or not any VLANs are assigned to it or not. Consequently, if all VLANs are moved out of a
CIST, the CIST will still exist and functional.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 345
53-1002967-03
Setting ports to be operational edge ports
device(config)#mstp edge-port-auto-detect
Syntax: [no] mstp edge-port-auto-detect
NOTE
If this feature is enabled, it takes the port about 3 seconds longer to come to the enable state.
346 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol
device(config)#mstp start
Syntax: [no] mstp start
The no option disables MSTP from operating on a switch.
Examples of an MSTP configuration
In the following figure, four Brocade device routers are configured in two regions. There are four VLANs
in four instances in Region 2. Region 1 is in the CIST.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 347
53-1002967-03
Spanning Tree Protocol
348 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying MSTP statistics
device#show mstp
MSTP Instance 0 (CIST) - VLANs: 1
----------------------------------------------------------------------------
Bridge Bridge Bridge Bridge Bridge Root Root Root Root
Identifier MaxAge Hello FwdDly Hop MaxAge Hello FwdDly Hop
hex sec sec sec cnt sec sec sec cnt
8000000cdb80af01 20 2 15 20 20 2 15 19
Root ExtPath RegionalRoot IntPath Designated Root
Bridge Cost Bridge Cost Bridge Port
hex hex hex
8000000480bb9876 2000 8000000cdb80af01 0 8000000480bb9876 3/1
Port Pri PortPath P2P Edge Role State Designa- Designated
Num Cost Mac Port ted cost bridge
3/1 128 2000 T F ROOT FORWARDING 0
8000000480bb9876
MSTP Instance 1 - VLANs: 2
----------------------------------------------------------------------------
Bridge Max RegionalRoot IntPath Designated Root Root
Identifier Hop Bridge Cost Bridge Port Hop
hex cnt hex hex cnt
8001000cdb80af01 20 8001000cdb80af01 0 8001000cdb80af01 Root 20
Port Pri PortPath Role State Designa- Designated
Num Cost ted cost bridge
3/1 128 2000 MASTER FORWARDING 0 8001000cdb80af01
Syntax: show mstp instance-number
The instance-number variable specifies the MSTP instance that you want to display information for.
Field Description
MSTP Instance The ID of the MSTP instance whose statistics are being displayed. For the CIST, this
number is 0.
VLANs The number of VLANs that are included in this instance of MSTP. For the CIST this number
will always be 1.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 349
53-1002967-03
Spanning Tree Protocol
Field Description
Root Hop Cnt Maximum hop count left from the root bridge.
ExtPath Cost The configured path cost on a link connected to this port to an external MSTP region.
Regional Root Bridge The Regional Root Bridge is the MAC address of the Root Bridge for the local region.
IntPath Cost The configured path cost on a link connected to this port within the internal MSTP region.
Designated Bridge The MAC address of the bridge that sent the best BPDU that was received on this port.
Root Port Port indicating shortest path to root. Set to "Root" if this bridge is the root bridge.
• Master
• Root
• Designated
• Alternate
• Backup
• Disabled
350 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying MSTP information for a specified instance
Field Description
State The port current spanning tree state. A port can have one of the following states:
• Forwarding
• Discarding
• Learning
• Disabled
Max Hop cnt The maximum hop count configured for this instance.
device#show mstp 1
MSTP Instance 1 - VLANs: 2
----------------------------------------------------------------------------
Bridge Max RegionalRoot IntPath Designated Root Root
Identifier Hop Bridge Cost Bridge Port Hop
hex cnt hex hex cnt
8001000cdb80af01 20 8001000cdb80af01 0 8001000cdb80af01 Root 20
Port Pri PortPath Role State Designa- Designated
Num Cost ted cost bridge
3/1 128 2000 MASTER FORWARDING 0 8001000cdb80af01
Refer to Table 50 on page 349 for details about the display parameters.
device#show mstp 0
MSTP Instance 0 (CIST) - VLANs: 1
----------------------------------------------------------------------------
Bridge Bridge Bridge Bridge Bridge Root Root Root Root
Identifier MaxAge Hello FwdDly Hop MaxAge Hello FwdDly Hop
hex sec sec sec cnt sec sec sec cnt
8000000cdb80af01 20 2 15 20 20 2 15 19
Root ExtPath RegionalRoot IntPath Designated Root
Bridge Cost Bridge Cost Bridge Port
hex hex hex
8000000480bb9876 2000 8000000cdb80af01 0 8000000480bb9876 3/1
Port Pri PortPath P2P Edge Role State Designa- Designated
Num Cost Mac Port ted cost bridge
3/1 128 2000 T F ROOT FORWARDING 0
8000000480bb9876
To display details about the MSTP configuration, enter the following command.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 351
53-1002967-03
Commands
Name : Reg1
Revision : 1
Version : 3 (MSTP mode)
Status : Started
Instance VLANs
-------- ------------------------------------------------------
0 4093
To display details about the MSTP that is configured on the device, enter the following command.
Commands
spanning-tree designated-protect
Disallows the designated forwarding state on a port in STP 802.1d or 802.1w. The no form of this
command allows the designated forwarding state on a port in STP 802.1d or 802.1w.
no spanning-tree designated-protect
Command Default STP (802.1d or 802.1w) can put a port into designated forwarding state.
Parameters None
Usage Guidelines If STP tries to put a port into designated forwarding state, the device puts this port into the designated
inconsistent STP state. This is effectively equivalent to the listening state in STP in which a port cannot
forward any user traffic. When STP no longer marks this port as a designated port, the port is
automatically removed from the designated inconsistent state.
NOTE
You use this command to enable Designated Protection at the port-level while the designated
inconsistent state is a per-STP-instance, per-port state.
352 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
show span designated-protect
NOTE
You cannot enable Designated Protection and Root Guard on the same port.
Examples The following example shows that the designated forwarding state is disallowed on an Ethernet
interface 1/1/1.
Brocade(config)# ethernet interface 1/1/1
Brocade(config-if-e1000-1/1/1)# spanning-tree designated-protect
Command Output The show span designated-protect command displays the following information:
Examples The following example shows the command output, which indicates that the designated forwarding state
is disallowed for interfaces 2/1/7, 2/1/19, and 2/2/3.
Brocade(config)# show span designated-protect
Designated Protection Enabled on:
Ports: (U2/M1) 7 19
Ports: (U2/M2) 3
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 353
53-1002967-03
354 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLANs
Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800
FSX 1600
Uplink Ports Within a Port-Based 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
VLAN
Protocol VLANs (AppleTalk, IPv4, 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
dynamic IPv6, and IPX)
Layer 3 Subnet VLANs (Appletalk, IP 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01
subnet network, and IPX)
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 355
53-1002967-03
VLAN overview
Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800
FSX 1600
VLAN overview
The following sections provide details about the VLAN types and features supported on the FastIron
family of switches.
Types of VLANs
This section describes the VLAN types supported on Brocade devices.
356 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Layer 2 port-based VLANs
Protocol VLANs differ from IP subnet, IPX network, and AppleTalk VLANs in an important way. Protocol
VLANs accept any broadcast of the specified protocol type. An IP subnet, IPX network, or AppleTalk
VLAN accepts only broadcasts for the specified IP subnet, IPX network, or AppleTalk cable range.
NOTE
Protocol VLANs are different from IP subnet, IPX network, and AppleTalk cable VLANs. A port-based
VLAN cannot contain both an IP subnet, IPX network, or AppleTalk cable VLAN and a protocol VLAN
for the same protocol. For example, a port-based VLAN cannot contain both an IP protocol VLAN and
an IP subnet VLAN.
NOTE
VLAN IDs 4087, 4090, and 4093 are reserved for Brocade internal use only. VLAN 4094 is reserved for
use by Single STP. Also, if you are running an earlier release, VLAN IDs 4091 and 4092 may be
reserved for Brocade internal use only. If you want to use VLANs 4091 and 4092 as configurable
VLANs, you can assign them to different VLAN IDs. For more information, refer to Assigning different
VLAN IDs to reserved VLANs 4091 and 4092 on page 384
NOTE
Each port-based VLAN can contain either tagged or untagged ports. A port cannot be a member of
more than one port-based VLAN unless the port is tagged. 802.1Q tagging allows the port to add a four-
byte tag field, which contains the VLAN ID, to each packet sent on the port. You also can configure port-
based VLANs that span multiple devices by tagging the ports within the VLAN. The tag enables each
device that receives the packet to determine the VLAN the packet belongs to. 802.1Q tagging applies
only to Layer 2 VLANs, not to Layer 3 VLANs.
Because each port-based VLAN is a separate Layer 2 broadcast domain, by default each VLAN runs a
separate instance of the Spanning Tree Protocol (STP).
Layer 2 traffic is bridged within a port-based VLAN and Layer 2 broadcasts are sent to all the ports
within the VLAN.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 357
53-1002967-03
VLANs
The following figure shows an example of a Brocade device on which a Layer 2 port-based VLAN has
been configured.
358 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLANs
To create the two port-based VLANs shown in the above figure, enter the following commands.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 359
53-1002967-03
Configuring port-based VLANs on FSX-A
STP priority is configured to force FSX-A to be the root bridge for VLANs RED and BLUE. The STP
priority on FSX-B is configured so that FSX-B is the root bridge for VLANs GREEN and BROWN.
To configure the Port-based VLANs on the FSX Layer 2 Switches in the above figure, use the
following method.
device> enable
device# configure terminal
device(config)# hostname FSX-A
device-A(config)# vlan 2 name BROWN
device-A(config-vlan-2)# untagged ethernet 1 to 4 ethernet 17
device-A(config-vlan-2)# tagged ethernet 25 to 26
device-A(config-vlan-2)# spanning-tree
device-A(config-vlan-2)# vlan 3 name GREEN
device-A(config-vlan-3)# untagged ethernet 5 to 8 ethernet 18
device-A(config-vlan-3)# tagged ethernet 25 to 26
device-A(config-vlan-3)# spanning-tree
device-A(config-vlan-3)# vlan 4 name BLUE
device-A(config-vlan-4)# untagged ethernet 9 to 12 ethernet 19
device-A(config-vlan-4)# tagged ethernet 25 to 26
device-A(config-vlan-4)# spanning-tree
device-A(config-vlan-4)# spanning-tree priority 500
device-A(config-vlan-4)# vlan 5 name RED
device-A(config-vlan-5)# untagged ethernet 13 to 16 ethernet 20
device-A(config-vlan-5)# tagged ethernet 25 to 26
device-A(config-vlan-5)# spanning-tree
device-A(config-vlan-5)# spanning-tree priority 500
device-A(config-vlan-5)# end
device-A# write memory
360 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring port-based VLANs on FSX-B
device> en
device# configure terminal
device(config)# hostname FSX-B
device-B(config)# vlan 2 name BROWN
device-B(config-vlan-2)# untagged ethernet 1 to 4
device-B(config-vlan-2)# tagged ethernet 25 to 26
device-B(config-vlan-2)# spanning-tree
device-B(config-vlan-2)# spanning-tree priority 500
device-B(config-vlan-2)# vlan 3 name GREEN
device-B(config-vlan-3)# untagged ethernet 5 to 8
device-B(config-vlan-3)# tagged ethernet 25 to 26
device-B(config-vlan-3)# spanning-tree
device-B(config-vlan-3)# spanning-tree priority 500
device-B(config-vlan-3)# vlan 4 name BLUE
device-B(config-vlan-4)# untagged ethernet 9 to 12
device-B(config-vlan-4)# tagged ethernet 25 to 26
device-B(config-vlan-4)# vlan 5 name RED
device-B(config-vlan-5)# untagged ethernet 13 to 16
device-B(config-vlan-5)# tagged ethernet 25 to 26
device-B(config-vlan-5)# end
device-B# write memory
device> en
device# configure terminal
device(config)# hostname FSX-C
device-C(config)# vlan 2 name BROWN
device-C(config-vlan-2)# untagged ethernet 1 to 4
device-C(config-vlan-2)# tagged ethernet 25 to 26
device-C(config-vlan-2)# vlan 3 name GREEN
device-C(config-vlan-3)# untagged ethernet 5 to 8
device-C(config-vlan-3)# tagged ethernet 25 to 26
device-C(config-vlan-3)# vlan 4 name BLUE
device-C(config-vlan-4)# untagged ethernet 9 to 12
device-C(config-vlan-4)# tagged ethernet 25 to 26
device-C(config-vlan-4)# vlan 5 name RED
device-C(config-vlan-5)# untagged ethernet 13 to 16
device-C(config-vlan-5)# tagged ethernet 25 to 26
device-C(config-vlan-5)# end
device-C# write memory
Syntax: vlan vlan-id by port
Syntax: untagged ethernet [slotnum/]portnum [to [slotnum/]portnum | ethernet [slotnum/]portnum]
Syntax: tagged ethernet [slotnum/]portnum [to <[slotnum/]portnum> | ethernet [slotnum/]portnum]
Syntax: [no] spanning-tree
Syntax: spanning-tree [ ethernet [slotnum/]portnum path-cost value priority value] forward-delay
value hello-time value maximum-age time priority value
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 361
53-1002967-03
Removing a port-based VLAN
device-A> enable
No password has been assigned yet...
device-A# configure terminal
device-A(config)#
2. Enter the following command.
device-A(config)# no vlan 5
device-A(config)#
3. Enter the following commands to exit the CONFIG level and save the configuration to the system-
config file on flash memory.
device-A(config)#
device-A(config)# end
device-A# write memory
device-A#
4. Repeat steps 1 - 3 on FSX-B.
Syntax: [no] vlan vlan-id by port
device-A> enable
No password has been assigned yet...
device-A# configure terminal
device-A(config)#
2. Access the level of the CLI for configuring port-based VLAN 4 by entering the following command.
device-A(config)#
device-A(config)# vlan 4
device-A(config-vlan-4)#
3. Enter the following commands.
device-A(config-vlan-4)#
device-A(config-vlan-4)# no untagged ethernet 11
deleted port ethe 11 from port-vlan 4.
device-A(config-vlan-4)#
4. Enter the following commands to exit the VLAN CONFIG mode and save the configuration to the
system-config file on flash memory.
device-A(config-vlan-4)#
device-A(config-vlan-4)# end
device-A# write memory
362 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Multi-range VLAN
You can remove all the ports from a port-based VLAN without losing the rest of the VLAN
configuration. However, you cannot configure an IP address on a virtual routing interface unless the
VLAN contains ports. If the VLAN has a virtual routing interface, the virtual routing interface IP
address is deleted when the ports associated with the interface are deleted. The rest of the VLAN
configuration is retained.
Multi-range VLAN
The multi-range VLAN feature allows users to use a single command to create and configure multiple
VLANs. These VLANs can be continuous, for example from 2 to 7 or discontinuous, for example, 2 4 7.
NOTE
The maximum number of VLANs you can create or configure with a single command is 64.
device(config)#vlan 2 to 7
device(config-mvlan-2-7)#
Syntax: [no] vlan num to num
To create discontinuous VLANs, enter command such as the following.
device(config)#vlan 2 4 7
device(config-mvlan-2*7)#exit
Syntax: [no] vlan num num num
You can also create continuous and discontinuous VLANs. To create continuous and discontinuous
VLANs, enter command such as the following.
device(config)#vlan 2 to 7 20 25
device(config-mvlan-2*25)#
Syntax: [no] vlan num to num num
device(config)#no vlan 2 to 7
Syntax: [no] vlan num to num
To delete discontinuous VLANs, enter command such as the following.
device(config)#no vlan 2 4 7
Syntax: [no] vlan num num num
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 363
53-1002967-03
VLANs
You can also delete continuous and discontinuous VLANs. To delete continuous and discontinuous
VLANs, enter command such as the following.
device(config)#no vlan 2 to 7 20 25
Syntax: [no] vlan num to num num
If a single multi-range VLAN command contains more than 64 VLANs, the CLI does not add the VLAN
IDs but instead displays an error message. An example is given below.
device(config)#vlan 16 17 20 to 24
device(config-mvlan-16*24)#tag e 1/1/1
device(config-mvlan-16*24)#
The first command will take you to the multi-range VLAN configuration mode. The second command
will add tagged ethernet port 1/1/1 in the specified VLANs, VLAN 16 17 20 21 22 23 and 24.
The following VLAN parameters can be configured with the specified VLAN range.
Command Explanation
atalk-proto
Set AppleTalk protocol VLAN
clear
Clear table/statistics/keys
decnet-proto Set decnet protocol VLAN
monitor
Monitor Ingress Traffic on this VLAN(Enable VLAN
364 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLANs
Command Explanation
NOTE
In FSX platform, the mac-vlan-permit command is not available in the multi-range vlan configuration
mode.
The VLAN parameters configured for the VLAN range are written in the configuration file of the
individual VLANs. These VLAN parameters can also be removed or modified from the individual VLANs.
In the following example, as the first step, create VLANs 16 17 20 21 22 23 24. Further, as the second
step, add Ethernet port 1/1/1 in all the VLANs. As the third step, enabled 802.1w spanning tree on all
these VLANs.
device(config)#vlan 16 17 20 to 24
device(config-mvlan-16*24)#tag e 1/1/1
device(config-mvlan-16*24)#
Added tagged port(s) ethe 1/1/1 to port-vlan16.
Added tagged port(s) ethe 1/1/1 to port-vlan 17.
Added tagged port(s) ethe 1/1/1 to port-vlan 20.
Added tagged port(s) ethe 1/1/1 to port-vlan 21.
Added tagged port(s) ethe 1/1/1 to port-vlan 22.
Added tagged port(s) ethe 1/1/1 to port-vlan 23.
Added tagged port(s) ethe 1/1/1 to port-vlan 24.
device(config-mvlan-16*24)#span 802-1w
The Ethernet port e 1/1/1 and spanning tree 802.1w is added to the database of each VLAN separately.
You can verify the configuration with the show running-config command. See the example below.
device(config-mvlan-16*24)#show run
Current configuration:
!
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 365
53-1002967-03
VLANs
!
output omitted
!
!
vlan 1 name DEFAULT-VLAN by port
!
vlan 16 by port
tagged ethe 1/1/1
spanning-tree 802-1w
!
vlan 17 by port
tagged ethe 1/1/1
spanning-tree 802-1w
!
vlan 20 by port
tagged ethe 1/1/1
spanning-tree 802-1w
!
vlan 21 by port
tagged ethe 1/1/1
spanning-tree 802-1w
!
vlan 22 by port
tagged ethe 1/1/1
spanning-tree 802-1w
!
vlan 23 by port
tagged ethe 1/1/1
spanning-tree 802-1w
!
vlan 24 by port
tagged ethe 1/1/1
spanning-tree 802-1w
!
!
output omitted
!
!
Now you can modify any one or some of the VLANs. See the example below.
In the following example, disable the spanning tree 802.1w on VLANs 22,23 and 24, And, verify with
show running-config output that the spanning tree 802.1w is disabled on specified VLANs, VLAN 22,
23 and 24 and not on the VLANs 16, 17, 20 and 21.
device(config)#vlan 22 to 24
device(config-mvlan-22-24)#no span 8
device(config-mvlan-22-24)#exit
device(config)#show run
Current configuration:
output omitted
!
!
vlan 1 name DEFAULT-VLAN by port
!
vlan 16 by port
tagged ethe 1/1/1
spanning-tree 802-1w
!
vlan 17 by port
tagged ethe 1/1/1
spanning-tree 802-1w
!
vlan 20 by port
tagged ethe 1/1/1
spanning-tree 802-1w
!
366 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLANs
vlan 21 by port
tagged ethe 1/1/1
spanning-tree 802-1w
vlan 22 by port
tagged ethe 1/1/1
!
vlan 23 by port
tagged ethe 1/1/1
!
vlan 24 by port
tagged ethe 1/1/1
output omitted
device(config)#vlan 4 to 6
device(config-mvlan-4-6)#show 802-1w
--- VLAN 4 [ STP Instance owned by VLAN 4 ] ----------------------------
Bridge IEEE 802.1W Parameters:
Bridge Bridge Bridge Bridge Force tx
Identifier MaxAge Hello FwdDly Version Hold
hex sec sec sec cnt
8000002022227700 20 2 15 Default 3
RootBridge RootPath DesignatedBri- Root Max Fwd Hel
Identifier Cost dge Identifier Port Age Dly lo
hex hex sec sec sec
8000002022227700 0 8000002022227700 Root 20 15 2
Port IEEE 802.1W Parameters:
<--- Config Params --><-------------- Current state -----------------
>
Port Pri PortPath P2P Edge Role State Designa- Designated
Num Cost Mac Port ted cost bridge
1/1/1 128 20000 F F DESIGNATED FORWARDING 0
8000002022227700
--- VLAN 5 [ STP Instance owned by VLAN 5 ] ----------------------------
Bridge IEEE 802.1W Parameters:
Bridge Bridge Bridge Bridge Force tx
Identifier MaxAge Hello FwdDly Version Hold
hex sec sec sec cnt
8000002022227700 20 2 15 Default 3
RootBridge RootPath DesignatedBri- Root Max Fwd Hel
Identifier Cost dge Identifier Port Age Dly lo
hex hex sec sec sec
8000002022227700 0 8000002022227700 Root 20 15 2
Port IEEE 802.1W Parameters:
<--- Config Params --><-------------- Current state -----------------
>
Port Pri PortPath P2P Edge Role State Designa- Designated
Num Cost Mac Port ted cost bridge
1/1/1 128 20000 F F DESIGNATED FORWARDING 0
8000002022227700
--- VLAN 6 [ STP Instance owned by VLAN 6 ] ----------------------------
Bridge IEEE 802.1W Parameters:
Bridge Bridge Bridge Bridge Force tx
Identifier MaxAge Hello FwdDly Version Hold
hex sec sec sec cnt
8000002022227700 20 2 15 Default 3
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 367
53-1002967-03
Layer 3 protocol-based VLANs
Command Definition
368 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLANs
The following figure shows an example of Layer 3 protocol VLANs configured within a Layer 2 port-
based VLAN.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 369
53-1002967-03
Integrated Switch Routing (ISR)
NOTE
The Layer 3 Switch uses the lowest MAC address on the device (the MAC address of port 1 or 1/1) as
the MAC address for all ports within all virtual routing interfaces you configure on the device.
The routing parameters and the syntax for configuring them are the same as when you configure a
physical interface for routing. The logical interface allows the Layer 3 Switch to internally route traffic
between the protocol-based VLANs without using physical interfaces.
All the ports within a protocol-based VLAN must be in the same port-based VLAN. The protocol-based
VLAN cannot have ports in multiple port-based VLANs, unless the ports in the port-based VLAN to
which you add the protocol-based VLAN are 802.1Q tagged.
You can configure multiple protocol-based VLANs within the same port-based VLAN. In addition, a
port within a port-based VLAN can belong to multiple protocol-based VLANs of the same type or
different types. For example, if you have a port-based VLAN that contains ports 1 - 10, you can
configure port 5 as a member of an AppleTalk protocol VLAN, an IP protocol VLAN, and an IPX
protocol VLAN, and so on.
370 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Default VLAN
NOTE
The Layer 3 Switch routes packets between VLANs of the same protocol. The Layer 3 Switch cannot
route from one protocol to another.
NOTE
IP subnet VLANs are not the same thing as IP protocol VLANs. An IP protocol VLAN sends all IP
broadcasts on the ports within the IP protocol VLAN. An IP subnet VLAN sends only the IP subnet
broadcasts for the subnet of the VLAN. You cannot configure an IP protocol VLAN and an IP subnet
VLAN within the same port-based VLAN. This note also applies to IPX protocol VLANs and IPX network
VLANs, and to AppleTalk protocol VLANs and AppleTalk cable VLANs.
Default VLAN
By default, all the ports on a FastIron device are in a single port-based VLAN. This VLAN is called the
DEFAULT-VLAN and is VLAN number 1. FastIron devices do not contain any protocol VLANs or IP
subnet, IPX network, or AppleTalk cable VLANs by default.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 371
53-1002967-03
VLANs
The following figure shows an example of the default Layer 2 port-based VLAN.
When you configure a port-based VLAN, one of the configuration items you provide is the ports that
are in the VLAN. When you configure the VLAN, the Brocade device automatically removes the ports
that you place in the VLAN from DEFAULT-VLAN. By removing the ports from the default VLAN, the
Brocade device ensures that each port resides in only one Layer 2 broadcast domain.
NOTE
Information for the default VLAN is available only after you define another VLAN.
Some network configurations may require that a port be able to reside in two or more Layer 2
broadcast domains (port-based VLANs). In this case, you can enable a port to reside in multiple port-
based VLANs by tagging the port. Refer to the following section.
If your network requires that you use VLAN ID 1 for a user-configured VLAN, you can reassign the
default VLAN to another valid VLAN ID. Refer to Assigning a different VLAN ID to the default VLAN on
page 384.
372 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
802.1Q tagging
802.1Q tagging
802.1Q tagging is an IEEE standard that allows a networking device to add information to a Layer 2
packet in order to identify the VLAN membership of the packet. Brocade devices tag a packet by adding
a four-byte tag to the packet. The tag contains the tag value, which identifies the data as a tag, and also
contains the VLAN ID of the VLAN from which the packet is sent.
• The default tag value is 8100 (hexadecimal). This value comes from the 802.1Q specification. You
can change this tag value on a global basis on Brocade devices if needed to be compatible with
other vendors’ equipment.
• The VLAN ID is determined by the VLAN on which the packet is being forwarded.
The following figure shows the format of packets with and without the 802.1Q tag. The tag format is
vendor-specific. To use the tag for VLANs configured across multiple devices, make sure all the devices
support the same tag format.
If you configure a VLAN that spans multiple devices, you need to use tagging only if a port connecting
one of the devices to the other is a member of more than one port-based VLAN. If a port connecting
one device to the other is a member of only a single port-based VLAN, tagging is not required.
If you use tagging on multiple devices, each device must be configured for tagging and must use the
same tag value. In addition, the implementation of tagging must be compatible on the devices. The
tagging on all Brocade devices is compatible with other Brocade devices.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 373
53-1002967-03
Support for 802.1ad (Q-in-Q) tagging
The following figure shows an example of two devices that have the same Layer 2 port-based VLANs
configured across them. Notice that only one of the VLANs requires tagging.
802.1 ad tagging for Brocade FCX Series and ICX 6650 devices
The following enhancements allow the Brocade FCX Series and ICX 6650 devices, including those in
an IronStack, to use Q-in-Q and SAV, by allowing the changing of a tag profile for ports:
• In addition to the default tag type 0x8100, you can now configure one additional global tag profile
with a number from 0xffff.
• Tag profiles on a single port, or a group of ports can be configured to point to the global tag
profile.
For example applications and configuration details, refer to 802.1ad tagging configuration on page
419.
374 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Spanning Tree Protocol (STP)
To configure a global tag profile, enter the following command in the configuration mode.
NOTE
If you configure a port-based VLAN on the device, the VLAN has the same STP state as the default
STP state on the device. Thus, on Layer 2 Switches, new VLANs have STP enabled by default. On
Layer 3 Switches, new VLANs have STP disabled by default. You can enable or disable STP in
each VLAN separately. In addition, you can enable or disable STP on individual ports.
• Port-based VLAN - Affects all ports within the specified port-based VLAN.
STP is a Layer 2 protocol. Thus, you cannot enable or disable STP for individual protocol VLANs or for
IP subnet, IPX network, or AppleTalk cable VLANs. The STP state of a port-based VLAN containing
these other types of VLANs determines the STP state for all the Layer 2 broadcasts within the port-
based VLAN. This is true even though Layer 3 protocol broadcasts are sent on Layer 2 within the
VLAN.
It is possible that STP will block one or more ports in a protocol VLAN that uses a virtual routing
interface to route to other VLANs. For IP protocol and IP subnet VLANs, even though some of the
physical ports of the virtual routing interface are blocked, the virtual routing interface can still route so
long as at least one port in the virtual routing interface protocol VLAN is not blocked by STP.
If you enable Single STP (SSTP) on the device, the ports in all VLANs on which STP is enabled
become members of a single spanning tree. The ports in VLANs on which STP is disabled are excluded
from the single spanning tree.
For more information, refer to Spanning Tree Protocol on page 255.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 375
53-1002967-03
VLANs
Brocade devices send Layer 3 traffic at Layer 2 within a protocol VLAN. However, Layer 3 traffic from
one protocol VLAN to another must be routed.
If you want the device to be able to send Layer 3 traffic from one protocol VLAN to another, you must
configure a virtual routing interface on each protocol VLAN, then configure routing parameters on the
virtual routing interfaces. For example, to enable a Layer 3 Switch to route IP traffic from one IP
subnet VLAN to another, you must configure a virtual routing interface on each IP subnet VLAN, then
configure the appropriate IP routing parameters on each of the virtual routing interfaces.
376 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLANs
The following figure shows an example of Layer 3 protocol VLANs that use virtual routing interfaces for
routing.
FIGURE 78 Use virtual routing interfaces for routing between Layer 3 protocol VLANs
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 377
53-1002967-03
VLAN and virtual routing interface groups
Dynamic ports
Dynamic ports are added to a VLAN when you create the VLAN. However, if a dynamically added port
does not receive any traffic for the VLAN protocol within ten minutes, the port is removed from the
VLAN. However, the port remains a candidate for port membership. Thus, if the port receives traffic for
the VLAN protocol, the device adds the port back to the VLAN.
After the port is added back to the VLAN, the port can remain an active member of the VLAN up to 20
minutes without receiving traffic for the VLAN protocol. If the port ages out, it remains a candidate for
VLAN membership and is added back to the VLAN when the VLAN receives protocol traffic. At this
point, the port can remain in the VLAN up to 20 minutes without receiving traffic for the VLAN protocol,
and so on.
Unless you explicitly add a port statically or exclude a port, the port is a dynamic port and thus can be
an active member of the VLAN, depending on the traffic it receives.
NOTE
You cannot configure dynamic ports in an AppleTalk cable VLAN. The ports in an AppleTalk cable
VLAN must be static. However, ports in an AppleTalk protocol VLAN can be dynamic or static.
378 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLANs
The following figure shows an example of a VLAN with dynamic ports. Dynamic ports not only join and
leave the VLAN according to traffic, but also allow some broadcast packets of the specific protocol to
"leak" through the VLAN. Refer to Broadcast leaks on page 381.
FIGURE 79 VLAN with dynamic ports--all ports are active when you create the VLAN
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 379
53-1002967-03
VLANs
SUBNET Ports in a new protocol VLAN that do not receive traffic for the VLAN protocol age out after
10 minutes and become candidate ports. The above figure shows what happens if a candidate port
receives traffic for the VLAN protocol.
FIGURE 80 VLAN with dynamic ports--candidate ports become active again if they receive protocol
traffic
380 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Static ports
Static ports
Static ports are permanent members of the protocol VLAN. The ports remain active members of the
VLAN regardless of whether the ports receive traffic for the VLAN protocol. You must explicitly identify
the port as a static port when you add it to the VLAN. Otherwise, the port is dynamic and is subject to
aging out.
Excluded ports
If you want to prevent a port in a port-based VLAN from ever becoming a member of a protocol, IP
subnet, IPX network, or AppleTalk cable VLAN configured in the port-based VLAN, you can explicitly
exclude the port. You exclude the port when you configure the protocol, IP subnet, IPX network, or
AppleTalk cable VLAN.
Excluded ports do not leak broadcast packets. Refer to Broadcast leaks on page 381.
Broadcast leaks
A dynamic port becomes a member of a Layer 3 protocol VLAN when traffic from the VLAN's protocol is
received on the port. After this point, the port remains an active member of the protocol VLAN, unless
the port does not receive traffic from the VLAN's protocol for 20 minutes. If the port does not receive
traffic for the VLAN's protocol for 20 minutes, the port ages out and is no longer an active member of
the VLAN.
To enable a host that has been silent for awhile to send and receive packets, the dynamic ports that are
currently members of the Layer 3 protocol VLAN "leak" Layer 3 broadcast packets to the ports that have
aged out. When a host connected to one of the aged out ports responds to a leaked broadcast, the port
is added to the protocol VLAN again.
To "leak" Layer 3 broadcast traffic, an active port sends 1/8th of the Layer 3 broadcast traffic to the
inactive (aged out) ports.
Static ports do not age out and do not leak broadcast packets.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 381
53-1002967-03
Summary of VLAN configuration rules
NOTE
You cannot have a protocol-based VLAN and a subnet or network VLAN of the same protocol type in
the same port-based VLAN. For example, you can have an IPX protocol VLAN and IP subnet VLAN in
the same port-based VLAN, but you cannot have an IP protocol VLAN and an IP subnet VLAN in the
same port-based VLAN, nor can you have an IPX protocol VLAN and an IPX network VLAN in the
same port-based VLAN.
As a Brocade device receives packets, the VLAN classification starts from the highest level VLAN first.
Therefore, if an interface is configured as a member of both a port-based VLAN and an IP protocol
VLAN, IP packets coming into the interface are classified as members of the IP protocol VLAN
because that VLAN is higher in the VLAN hierarchy.
382 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Routing between VLANs
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 383
53-1002967-03
Dynamic port assignment (Layer 2 Switches and Layer 3 Switches)
each router. Full backbone routing can be achieved by configuring routing on each physical interface
that connects to the backbone. Routing is independent of STP when configured on a physical
interface.
If your ISR design requires that you switch IP, IPX, or Appletalk at Layer 2 while simultaneously
routing the same protocols over a single backbone, then create multiple port-based VLANs and use
VLAN tagging on the backbone links to separate your Layer 2 switched and Layer 3 routed networks.
There is a separate STP domain for each port-based VLAN. Routing occurs independently across
port-based VLANs or STP domains. You can define each end of each backbone link as a separate
tagged port-based VLAN. Routing will occur independently across the port-based VLANs. Because
each port-based VLAN STP domain is a single point-to-point backbone connection, you are
guaranteed to never have an STP loop. STP will never block the virtual router interfaces within the
tagged port-based VLAN, and you will have a fully routed backbone.
NOTE
This command does not change the properties of the default VLAN. Changing the name allows you to
use the VLAN ID "1" as a configurable VLAN.
384 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Viewing reassigned VLAN IDs for reserved VLANs 4091 and 4092
device(config)# exit
device# reload
NOTE
You must save the configuration (write mem) and reload the software to place the change into effect.
The above configuration changes the VLAN ID of 4091 to 10. After saving the configuration and
reloading the software, you can configure VLAN 4091 as you would any other VLAN.
Syntax: [no] reserved-vlan-map vlan 4091 | 4092 new-vlan vlan-id
For vlan-id , enter a valid VLAN ID that is not already in use. For example, if you have already defined
VLAN 20, do not try to use "20 as the new VLAN ID. Valid VLAN IDs are numbers from 1 - 4090, 4093,
and 4095. VLAN ID 4094 is reserved for use by the Single Spanning Tree feature.
Viewing reassigned VLAN IDs for reserved VLANs 4091 and 4092
To view the assigned VLAN IDs for reserved VLANs 4091 and 4092, use the show reserved-vlan-map
command. The reassigned VLAN IDs also display in the output of the show running-config and show
config commands.
The following shows example output for the show reserved-vlan-map command.
Field Description
Reserved Purpose Describes for what the VLAN is reserved. Note that the description is for Brocade internal
VLAN management.
1. If you reassign a reserved VLAN without saving the configuration and reloading the software, the reassigned VLAN ID will display in the
Re-assign column. However, the previously configured or default VLAN ID will display in the Current column until the configuration is
saved and the device reloaded.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 385
53-1002967-03
Enable spanning tree on a VLAN
NOTE
When port-based VLANs are not operating on the system, STP is set on a system-wide level at the
global CONFIG level of the CLI.
1. Access the global CONFIG level of the CLI on FSX-A by entering the following commands.
device-A> enable
No password has been assigned yet...
device-A# configure terminal
device-A(config)#
2. Access the level of the CLI for configuring port-based VLAN 3 by entering the following command.
device-A(config)#
device-A(config)# vlan 3
device-A(config-vlan-3)#
3. From VLAN 3 configuration level of the CLI, enter the following command to enable STP on all
tagged and untagged ports associated with VLAN 3.
device-B(config-vlan-3)#
device-B(config-vlan-3)# spanning-tree
device-B(config-vlan-3)#
4. Enter the following commands to exit the VLAN CONFIG mode and save the configuration to the
system-config file on flash memory.
device-B(config-vlan-3)#
device-B(config-vlan-3)# end
device-B# write memory
device-B#
5. Repeat steps 1 - 4 on FSX-B.
NOTE
You do not need to configure values for the STP parameters. All parameters have default values
as noted below. Additionally, all values will be globally applied to all ports on the system or on the
port-based VLAN for which they are defined.
To configure a specific path-cost or priority value for a given port, enter those values using the key
words in the brackets [ ] shown in the syntax summary below. If you do not want to specify values
for any given port, this portion of the command is not required.
Syntax: vlan vlan-id by port
Syntax: [no] spanning-tree
Syntax: spanning-tree [ ethernet [slotnum/] portnum path-cost value priority value] forward-
delay value hello-time value maximum-age time priority value
386 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring IP subnet, IPX network and protocol-based VLANs
• Hello Time - the interval of time between each configuration BPDU sent by the root bridge. Possible
values: 1 - 10 seconds. Default is 2.
• Priority - a parameter used to identify the root bridge in a network. The bridge with the lowest value
has the highest priority and is the root. Possible values: 1 - 65,535. Default is 32,678.
Port parameters (applied to a specified port within a VLAN):
• Path Cost - a parameter used to assign a higher or lower path cost to a port. Possible values: 1 -
65535. Default is (1000/Port Speed) for Half-Duplex ports and is (1000/Port Speed)/2 for Full-
Duplex ports.
• Priority - value determines when a port will be rerouted in relation to other ports. Possible values: 0
- 255. Default is 128.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 387
53-1002967-03
VLANs
To configure the VLANs shown in the above figure, use the following procedure.
1. To permanently assign ports 1 - 8 and port 25 to IP subnet VLAN 10.1.1.0, enter the following
commands.
388 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
IP subnet, IPX network, and protocol-based VLANs within port-based VLANs
Suppose you need to provide three separate STP domains across an enterprise campus backbone.
The first STP domain (VLAN 2) requires a set of ports at each Layer 2 Switch location to be statically
mapped to IP only. No other protocols can enter the switches on this set of ports.
A second set of ports within STP domain VLAN 2 will be restricted to only IPX traffic. The IP and IPX
protocol VLANs will overlap on Port 1 of FSX-A to support both protocols on the same router interface.
The IP subnets and IPX network that span the two protocol VLANs will be determined by the FastIron
router configuration. The IP and IPX Protocol VLANs ensure that only the ports included in the each
Layer 3 protocol VLAN will see traffic from the FastIron router.
The second STP domain (VLAN 3) requires that half the ports in the domain are dedicated to IP subnet
10.1.1.0/24 and the other ports are dedicated to IPX network 1. Similar to VLAN 2, Port 9 from VLAN 3
will be used to carry this IP subnet and IPX network to the FastIron router. No other protocols will be
allowed to enter the network on VLAN 3. Also, no IP packets with a source address on subnet
10.1.1.0/24 or IPX packets with a source address on network 1 will be allowed to enter the switches on
VLAN 3.
There is no need to segment Layer 3 broadcast domains within the STP broadcast domain (VLAN 4).
The FastIron router will dictate the IP subnets and IPX network that are on VLAN 4. There are no Layer
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 389
53-1002967-03
Configuring Layer 3 VLANs on FSX-A
3 protocol restrictions on VLAN 4; however, the FastIron router is configured to only forward IP and
IPX between STP domains.
To configure the Layer 3 VLANs on the FSX Layer 2 Switches in the above figure, use the following
procedure.
device-A >en
device-A# config t
device-A(config)# vlan 2 name IP_IPX_Protocol
device-A(config-vlan-2)# untagged e1 to 8
device-A(config-vlan-2)# tagged e25 to 26
2. Enable STP and set the priority to force FSX-A to be the root bridge for VLAN 2.
device-A(config-vlan-2)# spanning-tree
device-A(config-vlan-2)# spanning-tree priority 500
device-A(config-vlan-2)#
3. Create the IP and IPX protocol-based VLANs and statically assign the ports within VLAN 2 that
will be associated with each protocol-based VLAN.
390 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring Layer 3 VLANs on FSX-B
4. To prevent machines with non-IP protocols from getting into the IP portion of VLAN 2, create
another Layer 3 protocol VLAN to exclude all other protocols from the ports that contains the IP-
protocol VLAN. To do so, enter the following commands.
device# config t
device(config)# host device-B
device-B(config)#vlan 2 name IP_IPX_Protocol
device-B(config-vlan-2)# untagged e1 to 8
device-B(config-vlan-2)# tagged e25 to 26
device-B(config-vlan-2)# spanning-tree
device-B(config-vlan-2)# ip-proto name Red
device-B(config-vlan-ip-proto)# # no dynamic
device-B(config-vlan-ip-proto)# static e1 to 4 e25 to 26
device-B(config-vlan-ip-proto)# exclude e5 to 8
device-B(config-vlan-ip-proto)# ipx-proto name Blue
device-B(config-vlan-ipx-proto)# no dynamic
device-B(config-vlan-ipx-proto)# static e5 to 8 e25 to 26
device-B(config-vlan-ipx-proto)# exclude e1 to 4
device-B(config-vlan-other-proto)# vlan 3 name IP-Sub_IPX-Net_VLANs
device-B(config-vlan-3)# untagged e9 to 16
device-B(config-vlan-3)# tagged e25 to 26
device-B(config-vlan-3)# spanning-tree
device-B(config-vlan-3)# spanning-tree priority 500
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 391
53-1002967-03
Configuring Layer 3 VLANs on FSX-C
device# config t
device(config)# host device-C
device-C(config)# vlan 2 name IP_IPX_Protocol
device-C(config-vlan-2)# untagged e1 to 8
device-C(config-vlan-2)# tagged e25 to 26
device-C(config-vlan-2)# spanning-tree
device-C(config-vlan-2)# ip-proto name Red
device-C(config-vlan-ip-proto)# no dynamic
device-C(config-vlan-ip-proto)# static e1 to 4 e25 to 26
device-C(config-vlan-ip-proto)# exclude e5 to 8
device-C(config-vlan-ip-proto)# ipx-proto name Blue
device-C(config-vlan-ipx-proto)# no dynamic
device-C(config-vlan-ipx-proto)# static e5 to 8 e25 to 26
device-C(config-vlan-ipx-proto)# exclude e1 to 4
device-C(config-vlan-other-proto)# vlan 3 name IP-Sub_IPX-Net_VLANs
device-C(config-vlan-3)# untagged e9 to 16
device-C(config-vlan-3)# tagged e25 to 26
device-C(config-vlan-3)# spanning-tree
device-C(config-vlan-3)# ip-sub 10.1.1.0/24 name Green
device-C(config-vlan-ip-subnet)# no dynamic
device-C(config-vlan-ip-subnet)# static e9 to 12 e25 to 26
device-C(config-vlan-ip-subnet)# exclude e13 to 16
device-C(config-vlan-ip-subnet)# ipx-net 1 ethernet_802.3 name Brown
device-C(config-vlan-ipx-network)# no dynamic
device-C(config-vlan-ipx-network)# static e13 to 16 e25 to 26
device-C(config-vlan-ipx-network)# exclude e9 to 12
device-C(config-vlan-ipx-network)# vlan 4 name Purple_ALL-Protocols
device-C(config-vlan-4)# untagged e17 to 24
device-C(config-vlan-4)# tagged e25 to 26
device-C(config-vlan-4)# spanning-tree
NOTE
The Layer 3 Switch forwards all IPv6 multicast packets to all ports except the port that received the
packet, and does not distinguish among subnet directed multicasts.
392 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Routing between VLANs using virtual routing interfaces (Layer 3 Switches only)
You can add the VLAN ports as static ports or dynamic ports. A static port is always an active member
of the VLAN. Dynamic ports within any protocol VLAN age out after 10 minutes if no member protocol
traffic is received on a port within the VLAN. The aged out port, however, remains as a candidate
dynamic port for that VLAN. The port becomes active in the VLAN again if member protocol traffic is
received on that port.
Once a port is re-activated, the aging out period for the port is reset to 20 minutes. Each time a member
protocol packet is received by a candidate dynamic port (aged out port) the port becomes active again
and the aging out period is reset for 20 minutes.
NOTE
You can disable VLAN membership aging of dynamically added ports. Refer to Disabling membership
aging of dynamic VLAN ports on page 399).
To configure an IPv6 VLAN, enter commands such as the following.
device(config)# vlan 2
device(config-vlan-2)# untagged ethernet 1/1 to 1/8
device(config-vlan-2)# ipv6-proto name V6
device(config-ipv6-subnet)# static ethernet 1/1 to 1/6
device(config-ipv6-subnet)# dynamic
The first two commands configure a port-based VLAN and add ports 1/1 - 1/8 to the VLAN. The
remaining commands configure an IPv6 VLAN within the port-based VLAN. The static command adds
ports 1/1 - 1/6 as static ports, which do not age out. The dynamic command adds the remaining ports,
1/7 - 1/8, as dynamic ports. These ports are subject to aging as described above.
Syntax: [no] ipv6-proto [ name string]
Suppose you want to move routing out to each of three buildings in a network. Remember that the only
protocols present on VLAN 2 and VLAN 3 are IP and IPX. Therefore, you can eliminate tagged ports 25
and 26 from both VLAN 2 and VLAN 3 and create new tagged port-based VLANs to support separate IP
subnets and IPX networks for each backbone link.
You also need to create unique IP subnets and IPX networks within VLAN 2 and VLAN 3 at each
building. This will create a fully routed IP and IPX backbone for VLAN 2 and VLAN 3. However, VLAN 4
has no protocol restrictions across the backbone. In fact there are requirements for NetBIOS and
DecNet to be bridged among the three building locations. The IP subnet and IPX network that exists
within VLAN 4 must remain a flat Layer 2 switched STP domain. You enable routing for IP and IPX on a
virtual routing interface only on FSX-A. This will provide the flat IP and IPX segment with connectivity to
the rest of the network. Within VLAN 4 IP and IPX will follow the STP topology. All other IP subnets and
IPX networks will be fully routed and have use of all paths at all times during normal operation.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 393
53-1002967-03
Configuring Layer 3 VLANs and virtual routing interfaces on the FSX-A
To configure the Layer 3 VLANs and virtual routing interfaces on the FSX Layer 3 Switch in the above
figure, use the following procedure.
device>en
No password has been assigned yet...
device# configure terminal
device(config)# hostname FSX-A
device-A(config)# router ospf
device-A(config-ospf-router)# area 0.0.0.0 normal
Please save configuration to flash and reboot.
device-A(config-ospf-router)#
The following commands create the port-based VLAN 2. In the previous example, an external FSX
defined the router interfaces for VLAN 2. With ISR, routing for VLAN 2 is done locally within each FSX.
Therefore, there are two ways you can solve this problem. One way is to create a unique IP subnet
and IPX network VLAN, each with its own virtual routing interface and unique IP or IPX address within
VLAN 2 on each FSX. In this example, this is the configuration used for VLAN 3. The second way is to
split VLAN 2 into two separate port-based VLANs and create a virtual router interface within each port-
based VLAN. Later in this example, this second option is used to create a port-based VLAN 8 to show
that there are multiple ways to accomplish the same task with ISR.
You also need to create the Other-Protocol VLAN within port-based VLAN 2 and 8 to prevent
unwanted protocols from being Layer 2 switched within port-based VLAN 2 or 8. Note that the only
port-based VLAN that requires STP in this example is VLAN 4. You will need to configure the rest of
the network to prevent the need to run STP.
394 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLANs
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 395
53-1002967-03
Configuring Layer 3 VLANs and virtual routing interfaces for FSX-B
It is time to configure a separate port-based VLAN for each of the routed backbone ports (Ethernet 25
and 26). If you do not create a separate tagged port-based VLAN for each point-to-point backbone
link, you need to include tagged interfaces for Ethernet 25 and 26 within VLANs 2, 3, and 8. This type
of configuration makes the entire backbone a single STP domain for each VLAN 2, 3, and 8. This is
the configuration used in the example in Configuring IP subnet, IPX network and protocol-based
VLANs on page 387. In this scenario, the virtual routing interfaces within port-based VLANs 2, 3, and 8
will be accessible using only one path through the network. The path that is blocked by STP is not
available to the routing protocols until it is in the STP FORWARDING state.
device> en
No password has been assigned yet...
device# config t
device(config)# hostname FSX-B
device-B(config)# router ospf
device-B(config-ospf-router)# area 0.0.0.0 normal
device-B(config-ospf-router)# vlan 2 name IP-Subnet_10.1.6.0/24
device-B(config-vlan-2)# untagged ethernet 1 to 4
device-B(config-vlan-2)# no spanning-tree
device-B(config-vlan-2)# router-interface ve1
device-B(config-vlan-2)# other-proto name block-other-protocols
device-B(config-vlan-other-proto)# no dynamic
device-B(config-vlan-other-proto)# exclude ethernet 1 to 4
device-B(config-vlan-other-proto)# interface ve1
device-B(config-vif-1)# ip addr 10.1.6.1/24
device-B(config-vif-1)# ip ospf area 0.0.0.0
device-B(config-vif-1)# vlan 8 name IPX_Network6
device-B(config-vlan-8)# untagged ethernet 5 to 8
device-B(config-vlan-8)# no span
device-B(config-vlan-8)# router-interface ve2
396 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring Layer 3 VLANs and virtual routing interfaces for FSX-C
device> en
No password has been assigned yet...
device# config t
device(config)# hostname FSX -C
device-C(config)# router ospf
device-C(config-ospf-router)# area 0.0.0.0 normal
device-C(config-ospf-router)# vlan 2 name IP-Subnet_10.1.9.0/24
device-C(config-vlan-2)# untagged ethernet 1 to 4
device-C(config-vlan-2)# no spanning-tree
device-C(config-vlan-2)# router-interface ve1
device-C(config-vlan-2)# other-proto name block-other-protocols
device-C(config-vlan-other-proto)# no dynamic
device-C(config-vlan-other-proto)# exclude ethernet 1 to 4
device-C(config-vlan-other-proto)# interface ve1
device-C(config-vif-1)# ip addr 10.1.9.1/24
device-C(config-vif-1)# ip ospf area 0.0.0.0
device-C(config-vif-1)# vlan 8 name IPX_Network9
device-C(config-vlan-8)# untagged ethernet 5 to 8
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 397
53-1002967-03
Configuring protocol VLANs with dynamic ports
device-C(config-vlan-8)# no span
device-C(config-vlan-8)# ipx-net 9 ethernet_802.3
device-C(config-vlan-ipx-network)# exit
device-C(config-vlan-8)# router-interface ve2
device-C(config-vlan-8)# other-proto name block-other-protocols
device-C(config-vlan-other-proto)# no dynamic
device-C(config-vlan-other-proto)# exclude ethernet 5 to 8
device-C(config-vlan-other-proto)# interface ve2
device-C(config-vif-1)# ip addr 10.1.9.2/24
device-C(config-vif-1)# ip ospf area 0.0.0.0
device-C(config-vif-2)# vlan 3 name IP_Sub_&_IPX_Net_VLAN
device-C(config-vlan-3)# untagged ethernet 9 to 16
device-C(config-vlan-3)# no spanning-tree
device-C(config-vlan-3)# ip-subnet 10.1.10.0/24
device-C(config-vlan-ip-subnet)# static ethernet 9 to 12
device-C(config-vlan-ip-subnet)# router-interface ve3
device-C(config-vlan-ip-subnet)# ipx-network 10 ethernet_802.3
device-C(config-vlan-ipx-network)# static ethernet 13 to 16
device-C(config-vlan-ipx-network)# router-interface ve4
device-C(config-vlan-ipx-network)# other-proto name block-other-protocols
device-C(config-vlan-other-proto)# exclude ethernet 9 to 16
device-C(config-vlan-other-proto)# no dynamic
device-C(config-vlan-other-proto)# interface ve 3
device-C(config-vif-3)# ip addr 10.1.10.1/24
device-C(config-vif-3)# ip ospf area 0.0.0.0
device-C(config-vif-3)# interface ve4
device-C(config-vif-4)# vlan 4 name Bridged_ALL_Protocols
device-C(config-vlan-4)# untagged ethernet 17 to 24
device-C(config-vlan-4)# tagged ethernet 25 to 26
device-C(config-vlan-4)# spanning-tree
device-C(config-vlan-4)# vlan 7 name Rtr_BB_to_Bldg.2
device-C(config-vlan-7)# tagged ethernet 25
device-C(config-vlan-7)# no spanning-tree
device-C(config-vlan-7)# ipx-network 8 ethernet_802.3
device-C(config-vlan-ip-subnet)# exit
device-C(config-vlan-7)# router-interface ve5
device-C(config-vlan-7)# vlan 6 name Rtr_BB_to_Bldg.1
device-C(config-vlan-6)# tagged ethernet 26
device-C(config-vlan-6)# no spanning-tree
device-C(config-vlan-6)# router-interface ve6
device-C(config-vlan-6)# ipx network 5 ethernet_802.3
device-C(config-vlan-6)# interface ve5
device-C(config-vif-5)# ip addr 10.1.8.2/24
device-C(config-vif-5)# ip ospf area 0.0.0.0
device-C(config-vif-5)# interface ve6
device-C(config-vif-6)# ip addr 10.1.5.2/24
device-C(config-vif-6)# ip ospf area 0.0.0.0
device-C(config-vif-6)#
398 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Aging of dynamic ports
NOTE
The software does not support dynamically adding ports to AppleTalk cable VLANs. Conceptually, an
AppleTalk cable VLAN consists of a single network cable, connected to a single port. Therefore,
dynamic addition and removal of ports is not applicable.
NOTE
You cannot route to or from protocol VLANs with dynamically added ports.
NOTE
You can disable VLAN membership aging of dynamically added ports. Refer to Disabling membership
aging of dynamic VLAN ports on page 399).
Dynamic ports within any protocol VLAN age out after 10 minutes, if no member protocol traffic is
received on a port within the VLAN. The aged out port, however, remains as a candidate dynamic port
for that VLAN. The port becomes active in the VLAN again if member protocol traffic is received on that
port.
Once a port is re-activated, the aging out period for the port is reset to 20 minutes. Each time a member
protocol packet is received by a candidate dynamic port (aged out port) the port becomes active again
and the aging out period is reset for 20 minutes.
NOTE
This issue does not occur with statically assigned VLAN memberships. Thus, enable this feature only if
your configuration includes dynamically assigned VLAN memberships for protocol or subnet VLANs.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 399
53-1002967-03
Configuration guidelines for membership aging of dynamic VLAN ports
Enter the no form of the command to disable this feature after it has been enabled.
By default, VLAN membership of dynamically assigned ports will age out after a period of time if no
packets belonging to that protocol or subnet VLAN are received by the CPU.
The output of the show running-config command indicates if the no-dynamic-aging feature is
enabled for a specific protocol or subnet VLAN.
NOTE
In the Switch image, all the ports are dynamic ports by-default, so the dynamic command does not
appear in the show running-config command output. If you configure the no dynamic command, it
will appear in the output of the show running-config command. Similarly in Router image, no ports
are dynamic by-default, so the no dynamic command does not appear in the output of the show
running-config command. If you configure the dynamic command, it will appear in the output of the
show running-config command.
NOTE
Use the first untagged command for adding a range of ports. Use the second command for adding
separate ports (not in a range).
400 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring an IP subnet VLAN with dynamic ports
NOTE
Use the first untagged command for adding a range of ports. Use the second command for adding
separate ports (not in a range).
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 401
53-1002967-03
Configuring uplink ports within a port-based VLAN
NOTE
Use the first untagged command for adding a range of ports. Use the second command for adding
separate ports (not in a range).
402 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
IP subnet address on multiple port-based VLANconfiguration
In this example, 24 ports on a 10/100 module and two Gbps ports on a Gbps module are added to port-
based VLAN 10. The two Gbps ports are then configured as uplink ports.
NOTE
This feature applies only to Layer 3 Switches.
NOTE
Before using the method described in this section, refer to VLAN groups and virtual routing interface
group on page 407. You might be able to achieve the results you want using the methods in that
section instead.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 403
53-1002967-03
VLANs
404 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLANs
As shown in this example, each VLAN has a separate IP subnet address. If you need to conserve IP
subnet addresses, you can configure multiple VLANs with the same IP subnet address, as shown in the
following figure.
Each VLAN still requires a separate virtual routing interface. However, all three VLANs now use the
same IP subnet address.
In addition to conserving IP subnet addresses, this feature allows containment of Layer 2 broadcasts to
segments within an IP subnet. For ISP environments where the same IP subnet is allocated to different
customers, placing each customer in a separate VLAN allows all customers to share the IP subnet
address, while at the same time isolating them from one another Layer 2 broadcasts.
NOTE
You can provide redundancy to an IP subnet address that contains multiple VLANs using a pair of
Brocade Layer 3 Switches configured for Brocade VRRP (Virtual Router Redundancy Protocol).
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 405
53-1002967-03
VLANs
The Brocade device performs proxy Address Resolution Protocol (ARP) for hosts that want to send IP
traffic to hosts in other VLANs that are sharing the same IP subnet address. If the source and
destination hosts are in the same VLAN, the Brocade device does not need to use ARP:
• If a host attached to one VLAN sends an ARP message for the MAC address of a host in one of
the other VLANs using the same IP subnet address, the Brocade device performs a proxy ARP on
behalf of the other host. The Brocade device then replies to the ARP by sending the virtual routing
interface MAC address. The Brocade device uses the same MAC address for all virtual routing
interfaces.When the host that sent the ARP then sends a unicast packet addressed to the virtual
routing interface MAC address, the device switches the packet on Layer 3 to the destination host
on the VLAN.
NOTE
If the Brocade device ARP table does not contain the requested host, the Brocade device forwards the
ARP request on Layer 2 to the same VLAN as the one that received the ARP request. Then the device
sends an ARP for the destination to the other VLANs that are using the same IP subnet address.
• If the destination is in the same VLAN as the source, the Brocade device does not need to
perform a proxy ARP.
To configure multiple VLANs to use the same IP subnet address:
• Configure each VLAN, including adding tagged or untagged ports.
• Configure a separate virtual routing interface for each VLAN, but do not add an IP subnet address
to more than one of the virtual routing interfaces.
• Configure the virtual routing interfaces that do not have the IP subnet address to "follow" the
virtual routing interface that does have the address.
To configure the VLANs shown in Figure 85 on page 405, you could enter the following commands.
device(config-vlan-3)# interface ve 1
device(config-vif-1)# ip address 10.0.0.1/24
406 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLAN groups and virtual routing interface group
The following commands configure virtual routing interfaces 2 and 3 to "follow" the IP subnet address
configured on virtual routing interface 1.
device(config-vif-1)# interface ve 2
device(config-vif-2)# ip follow ve 1
device(config-vif-2)# interface ve 3
device(config-vif-3)# ip follow ve 1
NOTE
Because virtual routing interfaces 2 and 3 do not have their own IP subnet addresses but instead are
"following" virtual routing interface a IP address, you still can configure an IPX or AppleTalk interface on
virtual routing interfaces 2 and 3.
NOTE
VLAN groups are supported on Layer 3 Switches and Layer 2 Switches. Virtual routing interface groups
are supported only on Layer 3 Switches.
When you create a VLAN group, the VLAN parameters you configure for the group apply to all the
VLANs within the group. Additionally, you can easily associate the same IP subnet interface with all the
VLANs in a group by configuring a virtual routing interface group with the same ID as the VLAN group.
• The VLAN group feature allows you to create multiple port-based VLANs with identical port
members. Because the member ports are shared by all the VLANs within the group, you must add
the ports as tagged ports. This feature not only simplifies VLAN configuration but also allows you to
have a large number of identically configured VLANs in a startup-config file on the device flash
memory module. Normally, a startup-config file with a large number of VLANs might not fit on the
flash memory module. By grouping the identically configured VLANs, you can conserve space in
the startup-config file so that it fits on the flash memory module.
• The virtual routing interface group feature is useful when you want to configure the same IP subnet
address on all the port-based VLANs within a VLAN group. You can configure a virtual routing
interface group only after you configure a VLAN group with the same ID. The virtual routing
interface group automatically applies to the VLANs in the VLAN group that has the same ID and
cannot be applied to other VLAN groups or to individual VLANs.
You can create up to 32 VLAN groups and 32 virtual routing interface groups. A virtual routing interface
group always applies only to the VLANs in the VLAN group with the same ID.
NOTE
Depending on the size of the VLAN ID range you want to use for the VLAN group, you might need to
allocate additional memory for VLANs. On Layer 3 Switches, if you allocate additional memory for
VLANs, you also need to allocate the same amount of memory for virtual routing interfaces. This is true
regardless of whether you use the virtual routing interface groups. To allocate additional memory, refer
to Allocating memory for more VLANs or virtual routing interfaces on page 411.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 407
53-1002967-03
Configuring a VLAN group
NOTE
The device memory must be configured to contain at least the number of VLANs you specify for the
higher end of the range. For example, if you specify 2048 as the VLAN ID at the high end of the range,
you first must increase the memory allocation for VLANs to 2048 or higher. Additionally, on Layer 3
Switches, if you allocate additional memory for VLANs, you also need to allocate the same amount of
memory for virtual routing interfaces, before you configure the VLAN groups. This is true regardless of
whether you use the virtual routing interface groups. The memory allocation is required because the
VLAN groups and virtual routing interface groups have a one-to-one mapping. Refer to Allocating
memory for more VLANs or virtual routing interfaces on page 411.
If a VLAN within the range you specify is already configured, or if the range contains more than 256
VLANs, the CLI does not add the group but instead displays an error message.
408 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying information about VLAN groups
Configuration notes and feature limitations for virtual routing interface group
• When you configure a virtual routing interface group, all members of the group have the same IP
subnet address. This feature is useful in collocation environments where the device has many IP
addresses and you want to conserve the IP address space.
• The group-router-interface command creates router interfaces for each VLAN in the VLAN group
by using the VLAN IDs of each of the VLANs as the corresponding virtual interface number.
Therefore, if a VLAN group contains VLAN IDs greater than the maximum virtual interface number
allowed, the group-router-interface command will be rejected.
device(config)# vlan-group 1
device(config-vlan-group-1)# group-router-interface
device(config-vlan-group-1)# exit
device(config)# interface group-ve 1
device(config-vif-group-1)# ip address 10.10.10.1/24
These commands enable VLAN group 1 to have a group virtual routing interface, then configure virtual
routing interface group 1. The software always associates a virtual routing interface group only with the
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 409
53-1002967-03
Displaying the VLAN group and virtual routing interface group information
VLAN group that has the same ID. In this example, the VLAN group ID is 1, so the corresponding
virtual routing interface group also must have ID 1.
Syntax: group-router-interface
Syntax: interface group-ve num
Syntax: [no] ip address ip-addr ip-mask [ secondary ]
or
Syntax: [no] ip address ip-addr/mask-bits [ secondary ]
The router-interface-group command enables a VLAN group to use a virtual routing interface group.
Enter this command at the configuration level for the VLAN group. This command configures the
VLAN group to use the virtual routing interface group that has the same ID as the VLAN group. You
can enter this command when you configure the VLAN group for the first time or later, after you have
added tagged ports to the VLAN and so on.
The num parameter in the interface group-venum command specifies the ID of the VLAN group with
which you want to associate this virtual routing interface group. The VLAN group must already be
configured and enabled to use a virtual routing interface group. The software automatically associates
the virtual routing interface group with the VLAN group that has the same ID. You can associate a
virtual routing interface group only with the VLAN group that has the same ID.
NOTE
IPv6 is not supported with group-ve .
NOTE
FCX devices do not support ACLs with group-ve .
NOTE
FastIron devices support group-ve with OSPF, VRRP v2 and VRRP-E v2 protocols only.
The syntax and usage for the ip address command is the same as when you use the command at the
interface level to add an IP interface.
410 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Allocating memory for more VLANs or virtual routing interfaces
NOTE
If you have enabled display of subnet masks in CIDR notation, the IP address information is shown as
follows: 10.10.10.1/24.
NOTE
If many of your VLANs will have an identical configuration, you might want to configure VLAN groups
and virtual routing interface groups after you increase the system capacity for VLANs and virtual routing
interfaces. Refer to VLAN groups and virtual routing interface group on page 407.
NOTE
Although you can specify up to 4095 VLANs, you can configure only 4094 VLANs. VLAN ID 4094 is
reserved for use by the Single Spanning Tree feature.
To increase the maximum number of VLANs you can configure, enter commands such as the following
at the global CONFIG level of the CLI.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 411
53-1002967-03
Increasing the number of virtual routing interfaces you can configure
412 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLANs
The following figure shows a conceptual picture of the service that aggregated VLANs provide.
Aggregated VLANs provide a path for multiple client channels. The channels do not receive traffic from
other channels. Thus, each channel is a private link.
Each client connected to the edge device is in its own port-based VLAN, which is like an ATM channel.
All the clients’ VLANs are aggregated by the edge device into a single VLAN for connection to the core.
The single VLAN that aggregates the clients’ VLANs is like an ATM path.
The device that aggregates the VLANs forwards the aggregated VLAN traffic through the core. The core
can consist of multiple devices that forward the aggregated VLAN traffic. The edge device at the other
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 413
53-1002967-03
VLANs
end of the core separates the aggregated VLANs into the individual client VLANs before forwarding
the traffic. The edge devices forward the individual client traffic to the clients. For the clients’
perspective, the channel is a direct point-to-point link.
The following figure shows an example application that uses aggregated VLANs. This configuration
includes the client connections shown in Figure 86 on page 413.
In this example, a collocation service provides private channels for multiple clients. Although the same
devices are used for all the clients, the VLANs ensure that each client receives its own Layer 2
broadcast domain, separate from the broadcast domains of other clients. For example, client 1 cannot
ping client 5.
The clients at each end of a channel appear to each other to be directly connected and thus can be on
the same subnet and use network services that require connection to the same subnet. In this
example, client 1 is in subnet 192.168.1.0/24 and so is the device at the other end of client 1 channel.
Because each VLAN configured on the core devices is an aggregate of multiple client VLANs, the
aggregated VLANs greatly increase the number of clients a core device can accommodate.
This example shows a single link between the core devices. However, you can use a trunk group to
add link-level redundancy.
414 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuration notes for aggregated VLANs
device(config)# jumbo
device(config)# write memory
device(config)# end
device# reload
NOTE
Enable the VLAN aggregation option only on the core devices.
• Configure a VLAN tag type (tag ID) that is different than the tag type used on the edge devices. If
you use the default tag type (8100) on the edge devices, set the tag type on the core devices to
another value, such as 9100. The tag type must be the same on all the core devices. The edge
devices also must have the same tag type but the type must be different from the tag type on the
core devices.
NOTE
You can enable the Spanning Tree Protocol (STP) on the edge devices or the core devices, but not
both. If you enable STP on the edge devices and the core devices, STP will prevent client traffic from
travelling through the core to the other side.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 415
53-1002967-03
Configuring aggregated VLANs on a core device
416 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Complete CLI examples for aggregated VLANs
NOTE
In these examples, the configurations of the edge devices (A, B, E, and F) are identical. The
configurations of the core devices (C and D) also are identical. The aggregated VLAN configurations of
the edge and core devices on one side must be symmetrical (in fact, a mirror image) to the
configurations of the devices on the other side. For simplicity, the example in Figure 87 on page 414 is
symmetrical in terms of the port numbers. This allows the configurations for both sides of the link to be
the same. If your configuration does not use symmetrically arranged port numbers, the configurations
should not be identical but must use the correct port numbers.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 417
53-1002967-03
Commands for configuring aggregated VLANs on device C
418 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Commands for configuring aggregated VLANs on device F
NOTE
Brocade devices treat a double-tagged Ethernet frame as a Layer 2 only frame. The packets are not
inspected for Layer 3 and Layer 4 information, and operations are not performed on the packet utilizing
Layer 3 or Layer 4 information.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 419
53-1002967-03
Configuration rules for 802.1ad tagging
In the above figure, the untagged ports (to customer interfaces) accept frames that have any 802.1Q
tag other than the configured tag-type 9100. These packets are considered untagged on this incoming
port and are re-tagged when they are sent out of the uplink towards the provider. The 802.1Q tag-type
on the uplink port is 8100, so the Brocade device will switch the frames to the uplink device with an
additional 8100 tag, thereby supporting devices that only support this method of VLAN tagging.
420 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Enabling 802.1ad tagging
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 421
53-1002967-03
Example 802.1ad configuration
NOTE
802.1ad tag profiles are not supported on FastIron X Series devices.
The 802.1ad tagging feature supports a tag-profile command that allows you to add a tag profile with
a value of 0 to 0xffff in addition to the default tag-type 0x8100. This enhancement also allows you to
add a tag profile for a single port, or to direct a group of ports to a globally-configured tag profile.
422 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuration notes for 802.1ad tagging
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 423
53-1002967-03
Private VLAN configuration
This example uses a PVLAN to secure traffic between hosts and the rest of the network through a
firewall. Five ports in this example are members of a PVLAN. The first port (port 3/2) is attached to a
firewall. The next four ports (ports 3/5, 3/6, 3/9, and 3/10) are attached to hosts that rely on the firewall
to secure traffic between the hosts and the rest of the network. In this example, two of the hosts (on
ports 3/5 and 3/6) are in a community PVLAN, and thus can communicate with one another as well as
through the firewall. The other two hosts (on ports 3/9 and 3/10), are in an isolated VLAN and thus can
communicate only through the firewall. The two hosts are secured from communicating with one
another even though they are in the same VLAN.
By default, unknown-unicast, unregistered multicast, and broadcast are flooded in PVLAN.
By default, on all the FastIron platforms, the device will forward broadcast, unregistered multicast, and
unknown unicast packets from outside sources into the PVLAN.
424 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLANs
By default, in FastIron FSX platforms , the device will not forward broadcast, unregistered multicast, and
unknown unicast packets from outside sources into the PVLAN. If needed, you can override this
behavior for broadcast packets, unknown-unicast packets, or both. Refer
You can configure a combination of the following types of PVLANs:
• Primary - The primary PVLAN ports are "promiscuous". They can communicate with all the isolated
PVLAN ports and community PVLAN ports in the isolated and community VLANs that are mapped
to the promiscuous port.
• Isolated - Broadcasts and unknown unicasts received on isolated ports are sent only to the
promiscuous ports and switch - switch ports. They are not flooded to other ports in the isolated
VLAN.
NOTE
On all devices, however, private VLANs will act as a normal VLAN and will flood unknown destinations,
broadcast and multicast traffic to all ports in the VLAN if the primary VLAN does not have the PVLAN
mapping that defines the uplink port for the isolated VLAN.
• Community - Broadcasts and unknown unicasts received on community ports are sent to the
primary port and also are flooded to the other ports in the community VLAN.
Each PVLAN must have a primary VLAN. The primary VLAN is the interface between the secured ports
and the rest of the network. The PVLAN can have any combination of community and isolated VLANs.
As with regular VLANs, PVLANs can span multiple switches. The PVLAN is treated like any other VLAN
by the PVLAN-trunk ports. The PVLAN-trunk port is added to both the primary and the secondary
VLANs as a tagged member through the pvlan-trunk command. Figure 91 on page 426 shows an
example of a PVLAN network across switches:
• Broadcast, unknown unicast or unregistered multicast traffic from the primary VLAN port is
forwarded to all ports in isolated and community VLANs in both the switches.
• Broadcast, unknown unicast or unregistered multicast traffic from an isolated port in switch A is not
forwarded to an isolated port in switch A. It will not be forwarded to an isolated port in switch B
across the PVLAN-trunk port.
• Broadcast, unknown unicast or unregistered multicast traffic from a community port in switch A will
be forwarded to a community port in switch B through the PVLAN-trunk port. It is forwarded to the
promiscuous ports and switch - switch ports of the primary VLAN.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 425
53-1002967-03
VLANs
The following figure shows an example PVLAN network with tagged switch-switch link ports.
426 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuration notes for PVLANs and standard VLANs
The following table lists the differences between PVLANs and standard VLANs.
All ports within a VLAN constitute a common layer broadcast domain No Yes
Broadcasts and unknown unicasts are forwarded to all the VLAN ports No (isolated VLAN) Yes
by default
Yes (community VLAN)
Yes (Primary)
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 427
53-1002967-03
Configuring the primary VLAN
• Promiscuous and switch-switch link ports are member ports of the primary VLAN only. All switch-
switch link ports are tagged ports.
• Member ports of isolated and community VLANs cannot be member ports of any other VLAN.
• All member ports that are part of the PVLAN (isolated or secondary) will perform VLAN
classification based on the PVLAN ID (PVID) only (no VLAN classification by port, protocol, ACL
and so on, if any).
• PVST, when needed in PVLANs, should be enabled on all (primary and secondary) private
VLANs.
device(config)# vlan 7
device(config-vlan-7)# untagged ethernet 3/2
device(config-vlan-7)# pvlan type primary
device(config-vlan-7)# pvlan mapping 901 ethernet 3/2
These commands create port-based VLAN 7, add port 3/2 as an untagged port, identify the VLAN as
the primary VLAN in a PVLAN, and map the other secondary VLANs to the ports in this VLAN.
To map the secondary VLANs to the primary VLAN and to configure the tagged switch link port, enter
commands such as the following.
428 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Configuring an isolated or community PVLAN
• The vlan-id parameter specifies another PVLAN. The other PVLAN you want to specify must
already be configured.
• The ethernet portnum parameter specifies the primary VLAN port to which you are mapping all the
ports in the other PVLAN (the one specified by vlan-id ).
The pvlan pvlan-trunk command identifies the switch-switch link for the PVLAN. There can be more
than one switch-switch link for a single community VLAN.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 429
53-1002967-03
Enabling broadcast or unknown unicast traffic to the PVLAN on FSX devices
• community - Broadcasts and unknown unicasts received on community ports are sent to the
primary port and also are flooded to the other ports in the community VLAN.
• isolated - Broadcasts and unknown unicasts received on isolated ports are sent only to the
primary port. They are not flooded to other ports in the isolated VLAN.
• primary - The primary PVLAN ports are "promiscuous". They can communicate with all the
isolated PVLAN ports and community PVLAN ports in the isolated and community VLANs that are
mapped to the promiscuous port.
Changing from one PVLAN type to another (for example, from primary to community or vice versa) is
allowed but the mapping will be removed.
NOTE
On Layer 2 switches and Layer 3 switches, you also can use MAC address filters to control the traffic
forwarded into and out of the PVLAN. In addition, if you are using a Layer 2 switch, you also can use
ACLs.
430 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
CLI example for a PVLAN network with switch-switch link ports
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 431
53-1002967-03
Dual-mode VLAN ports
432 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
VLANs
For example, in the following figure, port 2/11 is a dual-mode port belonging to VLAN 20. Traffic for
VLAN 20, as well as traffic for the default VLAN, flows from a hub to this port. The dual-mode feature
allows traffic for VLAN 20 and untagged traffic to go through the port at the same time.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 433
53-1002967-03
VLANs
To enable the dual-mode feature on port 2/11 in the above figure,enter the following commands.
device(config)# vlan 20
device(config-vlan-20)# tagged ethernet 2/11
device(config-vlan-20)# tagged ethernet 2/9
device(config-vlan-20)# interface ethernet 2/11
device(config-if-e1000-2/11)# dual-mode
device(config-if-e1000-2/11)# exit
Syntax: [no] dual-mode
You can configure a dual-mode port to transmit traffic for a specified VLAN (other than the DEFAULT-
VLAN) as untagged, while transmitting traffic for other VLANs as tagged. The following figure
illustrates this enhancement.
In the above figure, tagged port 2/11 is a dual-mode port belonging to VLANs 10 and 20. The default
VLAN assigned to this dual-mode port is 10. This means that the port transmits tagged traffic on VLAN
20 (and all other VLANs to which the port belongs) and transmits untagged traffic on VLAN 10.
The dual-mode feature allows tagged traffic for VLAN 20 and untagged traffic for VLAN 10 to go
through port 2/11 at the same time. A dual-mode port transmits only untagged traffic on its default
VLAN (that is, either VLAN 1, or a user-specified VLAN ID), and only tagged traffic on all other VLANs.
The following commands configure VLANs 10 and 20 in Figure 94 on page 434. Tagged port 2/11 is
added to VLANs 10 and 20, then designated a dual-mode port whose specified default VLAN is 10. In
this configuration, port 2/11 transmits only untagged traffic on VLAN 10 and only tagged traffic on
VLAN 20.
434 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying VLAN information
You can configure multiple ports using commads such as the following.
NOTE
An error message is displayed while attempting to configure an existing dual-mode on a port range.
Example:
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 435
53-1002967-03
Displaying VLANs in alphanumeric order
NOTE
If a VLAN name begins with "GVRP_VLAN_", the VLAN was created by the GARP VLAN Registration
Protocol (GVRP). If a VLAN name begins with "STATIC_VLAN_", the VLAN was created by GVRP
and then was converted into a statically configured VLAN.
436 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying global VLAN information
Ports 7 and 8 also belong to port-based VLAN 3, but they are tagged ports only in VLAN 3 and are not
configured as dual-mode ports.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 437
53-1002967-03
Displaying a port VLAN membership
NOTE
The port up/down time is required only for physical ports and not for loopback/ ve/ tunnel ports.
438 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Displaying PVLAN information
NOTE
The show pvlan command is not supported on software forwarding platforms.
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 439
53-1002967-03
440 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
Index
802.1Q-in-Q tagging
CLI syntax 423
configuration 419, 422
configuration rules 420
configuring profiles 422
enabling 421
A
ACL-based inbound mirroring 244
ACL-based mirroring, configuring for ACLs 247
aggregated VLAN
configuring 415
verifying configuration 416
B
Bridge Protocol Data Units (BPDUs)
displaying the guard status 332
enabling protection by port 332
overview 331
re-enabling ports 332
status example 334
Brocade X series
removing buffer allocation limits 43
buffer allocation limits 58
buffer profiles
configuration 44
configuring for FCX and ICX devices 46
displaying the configuration 45, 54
for VoIP on FastIron stackable devices 59
sample configuration 46
buffer sharing
configuring 55
displaying information 58
levels 56
C
cluster client automatic configuration
setting up for MCT 170
with MCT 164
command
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 441
53-1002967-03
advertise backup 111 command output
aggregated-vlan 415, 416 show 802.1w 309
appletalk-cable-vlan 400 show default values 35
buffer-profile port-region 50 show gvrp 229
buffer-sharing-full 43, 58 show gvrp statistics 233
clear link-keepalive statistics 129 show link-keepalive 126, 127
clear mac 176 show metro 89, 90
clear mac-address 24 show mstp 349
clear mac cluster 176 show protected-link group 130
clear mac vlan 176 show qd-buffer-profile all 54
clear stp-protect-statistics 261 show reserved-vlan-map 385
client-auto-detect 171 show span 262
dead-interval 111 show span detail 265
default-vlan-d 384 show spanning-tree 802.1W 309
dual-mode 432 show span pvst-mode 328
dynamic 400, 401 show topology-group 72
errdisable recovery interval 337 show vsrp 115
fast port-span 271 show vsrp aware 118
fast uplink-span 274 commands
fast uplink-span ethernet 275 configuring mac-movement notification interval
gvrp-base-vlan-id 224 history 32
gvrp-enable 225 mac-movement notification threshold-rate 31
gvrp-max-leaveall-timer 224 configuration
hello-interval 111 buffer profiles 44
hello-time 88 MAC address filter-based mirroring 248
hold-down-interval 112 mirroring on a traditional stack 243
ip-proto 400 port mirroring and monitoring 240
ip-subnet 401 topology group 71
ipx-proto 400 VLAN group 408
link-keepalive ethernet 125
link-keepalive interval 126
link-keepalive retries 126
D
mac-age-time 21 dynamic buffer allocation 46
mac filter 30 dynamic buffer allocation for QoS priorities 41
mac-learn disable 22 dynamic port assignment 384
mac-vlan-permit 363 dynamic ports
master 86 aging 399
master-vlan 71, 321 configuring an IP, IPX, or AppleTalk protocol
member-group 71, 321 VLAN 400
member-vlan 71, 321 configuring an IP subnet VLANcommand
metro-ring 86 vlan 401
mirror-port ethernet 242 configuring an IPX network VLAN 401
monitor ethernet 242 disabling membership aging 399
mstp admin-edge-port ethernet 346
mstp admin-pt2pt-mac ethernet 346
mstp disable ethernet 346 F
mstp edge-port-auto-detect 346
FastIron X series
mstp force-migration-check ethernet 346
configuring total transmit queue depth limit 42
mstp instance 344
default queue depth limits 42, 45
mstp scope all 340
dynamic buffer allocation for QoS priorities 41
mstp start 346
port regions 19
name 86
feature support
no mstp instance 342
non-preempt-mode 113
preforwarding-time 88
442 protected-link-group 130 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
pvlan mapping 428 53-1002967-03
pvlan pvlan-trunk 428
basic layer 2 features 17
GARP VLAN Registration Protocol (GVRP) 219 I
port mirroring and monitoring 239 Integrated Switch Routing (ISR) 370
Spanning Tree Protocol (STP) 255 Interface
trunk groups and dynamic link aggregation 133 acl-mirror-port ethernet 245
Uni-Directional Link Detection (UDLD) 123 dual-mode 327, 432
vlans 355 ip vsrp auth-type no-auth | simple-text-auth 107
flow-based MAC address learning 25 link-fault-signal 63
mac-learn disable 22
G monitor ethernet 242
pvst-mode 327
GARP VLAN Registration Protocol (GVRP) spanning-tree root-protect 335
application examples 220 stp-bpdu-guard 332
configuration 224 stp-protect 261
configuration notes 222 tagged ethernet 228
displaying information 228 tag-profile 374
displaying statistics 233 tag-profile enable 423
dynamic core and dynamic edge 222 vsrp restart-port 118
dynamic core and fixed edge 221 IP subnet address
enabling 225 configuring on multiple port-based VLAN 403
fixed core and dynamic edge 222 IPv6
fixed core and fixed edge 222 protocol VLAN configuration 392
overview 219
VLAN names created by GVRP 222
global VLAN
J
displaying information 437 jumbo frame support for Layer 2 63
GVRP
changing the GVRP base VLAN ID 224
changing timers 226 L
command examples 235
converting a VLAN created by GVRP into a Layer 2
statically-configured VLAN 228 changing the MAC age time 21
default-timerscommand disabling MAC address learning 21
default-timers 227 enabling and disabling STP 20
displaying information 229 jumbo frame support 63
dynamic core and dynamic edge configuration MAC learning rate control 21
example 236 management MAC address 21
dynamic core and fixed edge configuration multicast failover with MCT 180
example 235 port loop detection with MCT 177
fixed core and dynamic edge configuration port regions 18
example 236 unicast with MCT 185
fixed core and fixed edge configuration examples Layer 3
237 behavior with MCT 183
gvrp block applicant allcommand link aggregation group (LAG)
block-applicant all 225 with MCT 174
gvrp block-learning all | ethernetcommand link fault signaling (LFS)
block-learning all 226 enabling 63
join-timer 227 for Ethernet devices 62
leave-timer 227 viewing the status 63
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 443
53-1002967-03
M ACL-based 244
configuration on a traditional stack 243
MAC address configuring ACLs bound to virtual interfaces 247
clearing entries 24 configuring for ports on different members in a
clearing flow-based entries 28 traditional stack 243
cluster types with MCT 174 configuring for ports on the same stack member in
configuration 23 a traditional stack 244
configuring flow-based learning 27 configuring MAC address (filter-based) 248
defining filters 30 VLAN-based 249
displaying flow-based learning configuration 28 mirror port
filter-based mirroring 248 defining 248
flow-based learning 25 specifying the destination for physical ports 245
MDUP with MCT 174 specifying the destination for trunk ports 246
MRP
movement from port-to-port 30
diagnostics 89
multi-port static 23
enable 86
VLAN-based static configuration 24
MAC address filter
hello-time 88
creating a filter with a mirroring clause 249 master 86
MAC address for stackable devices 21 metro-ring 86
MAC address learning, disabling 21 name 86
MAC address movement preforwarding-time 88
notification collection interval, configuring 32 ring-interface ethernet 86
statistics, viewing 33 MSTP
threshold rate, configuring 31 forcing ports to transmit a BPDU 346
viewing threshold rate configuration 31 setting the name 344
MAC address table, displaying 22 setting the revision number 344
multicast
MAC age time, changing 21
MAC Database Update (MDUP)
Layer 2 failover with MCT 180
displaying packet statistics 176 snooping configuration for MCT 210
with MCT 174 snooping with MCT 179
Multi-Chassis Trunking (MCT)
MAC learning rate control 21
cluster client automatic configuration 164
mac-movement notification interval-history command
cluster MAC types 174
32
configuration examples 197
mac-movement notification threshold-rate command
displaying information 191
31
metro ring protocol (MRP)
dynamic LAGs 174
adding a ring to a VLAN 86 failover scenarios 171
CLI example 93 feature interaction 165
configuration 86 for VRRP/VRRP-E 187
configuration notes 75 Layer 2 multicast failover 180
diagnostics 88 Layer 3 behavior 183
displaying MRP diagnostics 89 Layer 3 unicast 185
displaying topology group information 90 MDUP 174
enabling MRP diagnostics 89 multicast snooping 179
how ring breaks are detected and healed 83 multicast snooping configuration example 210
overviewMulti-Chassis Trunking (MCT)
master VLANs and customer VLANs 85
benefits 157
overview 73
port loop detection 177
phase 1--MRP rings without shared interfaces 75
protocol-based VLANs 179
phase 2--MRP rings with shared interfaces 77
setting up cluster client automatic configuration
ring initialization 79
mirroring
170
single level configuration exampleMulti-Chassis
Trunking (MCT)
444 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
single level extension configuration example port dual-mode VLAN
198 displaying membership 438
supported features 157 port mirroring and monitoring
synching router MACs 177 command syntax 242
terminology 159 configuration 240
two level configuration example 202 number of ports supported 240
uplink switch 179 overview 239
VRRP/VRRP-E configuration 188 port monitoring
Multiple Spanning Tree Protocol (MSTP) monitoring an individual trunk port 242
configuring additional parameters 343 port regions on FastIron X series 18
configuring an instance 344 port VLAN
configuring bridge priority for an instance 345 displaying membership 438
configuring mode and scope 340 private VLAN (PVLAN)
deleting a VLAN to MSTI mapping 342 configuration 424
disabling on a port 346 configuration notes 427
displaying information for a specific instance 351 configuring an isolated or community 429
difference between standard VLANprivate VLAN
displaying statistics 349
(PVLAN)
example configuration 346 configuration notes 424
overview 339
reconvergence 341
regions 339 Q
setting point-to-point link 346
setting ports to be operational edge ports 346 QoS priorities
setting the global parameters 345 dynamic buffer allocation 41
viewing the configuration digest 343 queue depth limits, default 42, 45
multi-port static MAC address, configuring 24
R
P Rapid Spanning Tree Protocol (RSTP)
Per VLAN Spanning Tree (PVST) bridge port states 281
configuration examples 328 changing bridge parameters 305
configuring support 327 changing port parameters 305
displaying support information 328 configuring parameters on a Brocade device 305
Per VLAN Spanning Tree plus (PVST+) convergence after a link failure 298
compatibility 325 convergence at link restoration 298
overview 325 convergence in a complex toplogy 299
port convergence in a simple topology 294
assigning 802.1Q tagging 29 displaying information 309
buffers and descriptors values 40, 52 edge ports and edge port roles 279
dynamic port assignment 384 overview 275
removing from a VLAN 362 point-to-point ports 281
support for 802.1Q in tagging 374 propogation of topology changeSpanning Tree Protocol
port-based VLAN (STP)
configuring uplink ports 402 compatibility of 802.1W with 802.1D 301
modifying 361 recommended path cost values 305
removing 362 remote fault notification (RFN)
port-based VLANS enabling and disabling 62
configuring 357 on fiber connections 61
port-based VLANs, enabling 28 Router
port default VLAN ID (PVID) use-vrrp-path 114
displaying 438 routing between VLANs (Layer 3 only) 383
displaying information 439 RSTP
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 445
53-1002967-03
assignment of port roles 276 defaults 319
bridges and bridge port roles 276 displaying information 320
changes to port roles and states 282 enabling 319
edge port and non-edge port states 282 overview 318
spanning tree
enabling on a VLAN 386
S spanning tree protocol (STP)
overview 375
show command Spanning Tree Protocol (STP)
show 802-1w 309 changing bridge and port parameters 259
show cluster 191 changing port parameters 260
show cluster ccp peer 192 clearing BPDU drop counters 261
show cluster client 191 compatibility of 802.1W with 802.1D 304
show configuration 45 configuration example for load sharing 323
show default values 35 configuring a fast uplink port group 274
show errdisable recovery 338 configuring fast uplink span within a VLAN 275
show gvrp 229 default bridge parameters 256
show gvrp statistics 233 default port parameters 256
show interface 130 disabling and re-enabling fast port span 271
show interface ethernet 193, 269 displaying detailed information for each interface
show ip multicast pimsm-snooping 195 265
show link-keepalive 126 displaying information 262
show mac 28 displaying information for an entire device 262
show mac-address 22, 28 displaying information for a single port in a specific
show mac cluster 175 VLAN 269
show metro 89, 90 displaying state information for an individual
show mstp 349 interface 269
show mstp config 343 displaying the root guard by VLAN 335
show notification mac-movement threshold-rate 31 displaying the root guard state 335
show pvlan 439 displaying the state of a port-based VLAN 265
show qd-buffer-profile 54 enabling or disabling 258
show qd-share-level 58 enabling or disabling globally 258
show reserved-vlan-map 385 enabling or disabling in a port-based VLAN 259
show span 194, 262, 320 enabling or disabling on an individual port 259
show span detail 265 enabling protection 261
show span detail vlan 269 enabling root guard 335
show span fast-uplink-span 274 excluding specific ports from fast port span 272
show spanning-tree root-protect 335 feature configuration 270
show span pvst-mode 328 load balancing 321
show span vlan 72, 275 overview 256
show stp-protect 262 parameters and defaults 256
show topology-group 72, 90 per VLAN group 320
show vlan 265, 432 protection enhancement 261
show vlan brief 437 reconvergence time 317
show vlan-group 409 root guard
show vlans 436 overview 334
show vsrp aware 118 standard parameter configuration 256
show vsrp vrid 115, 119 viewing protection configuration 262
show commands static MAC address
show notification mac-movement interval-history configuration 23
33 multi-port 23
Single Spanning Tree Protocol (SSTP) STP
446 FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide
53-1002967-03
bridge parameters 386 changing the keepalive interval 126
modifying bridge and port parameters 20 changing the keepalive retries 126
port parameters 386 configuration notes and feature limitations 125
STP feature creating a protected link group and assigning an
active uplink port failure 273 active port 130
fast port span 270 Uni-Directional Link Detection (UDLD)
fast uplink span 272 clearing statistics 129
fast uplink span rules for trunk groups 273 displaying information 126
switchover to the active uplink port 273 displaying information for a single port 127
STP Group enabling 125
master-vlan 321 enabling for tagged ports 125
member-group 321 for tagged ports 124
member-vlan 321 overview 123
Subnet protected link groups 129
ip-subnetcommand
ip-subnetcommand
ip-subnet 387 V
ipx-networkcommand
ipx-network 387 Virtual Router Redundancy Protocol (VRRP)
super aggregated VLAN MCT configuration 188
configuration 412 with MCT 187
super aggregated VLANs 381 Virtual Router Redundancy Protocol Extended (VRRP-E)
Syslog MCT configuration 188
STP messages 338 with MCT 187
system parameters virtual routing interface
modifying default values 40 configuring 407
system parameter settings virtual routing interface group
default settings 34 configuring 409
displaying 35 displaying 410
displaying and modifying 34 virtual routing interfaces
allocating memory 411
virtual switch redundancy protocol (VSRP)
T
topology group
configuration 71
configuration considerations 71
control ports and free ports 70
displaying information 72
master VLAN and member VLANs 70
overview 69
Topology Group
master-vlan 71
member-group 71
member-vlan 71
total transmit queue depth limit, configuring 42
trunk group
assigning ports 385
ports and VLAN membership 381
U
UDLD
FastIron Ethernet Switch Platform and Layer 2 Switching Configuration Guide 447
53-1002967-03
changing the backup priority 109 802.1Q tagging 373
changing the timer scale 107 allocating memory 411
configuration notes and feature limitations 96 and virtual routing interface groups 378
configuring authentication 107 appletalk-cable-vlan 400
configuring basic parameters 105 assigning different IDs to reserved VLANs 384
configuring fast start 118 broadcast leaks 381
configuring security features on a VSRP-aware configurable parameters 363
device 108 configuration notes for aggregated VLANs 415
disabling or re-enabling 106 configuration rules 382
displaying information 114 configuring a group 408
displaying the active interfaces for a VRID 118 configuring a multi-range 363
fast start 118 configuring an IP, IPX, or AppleTalk protocol
interval timers 101 VLAN 400
MAC address failover 100 configuring anIP subnet with dynamic ports 401
master election and failover 97 configuring an IPX network with dynamic ports 401
overview 95 configuring IP subnet address on multiple port-
parameters 102 based VLAN 403
priority calculation 97 configuring port-based 357
security features 101 configuring uplink ports within a port-based VLAN
suppressing RIP advertisement from backups 114 402
track ports 97 configuring with dynamic ports 398
used to provide redundancy 96 default 371
VSRP-aware interoperability 114 deleting a multi-range 363
VLAN disabling advertising 225
disabling learning 226
disabling membership aging of dynamic ports 399
displaying dual-mode ports 432
displaying information 435
displaying information for specific ports 437
dynamic 400, 401
dynamic port membership 378
excluded ports 381
increasing the number you can configure 411
ip-proto 400
ip-subnet 401
IP subnet, IPX network, and AppleTalk cable 370
IP subnet, IPX network, and protocol-based
configuration example 387
IP subnet, IPX network, and protocol-based
VLANs within port-based VLANs 389
ipv6-proto 392
IPv6 protocol configuration 392
ipx-network ethernet_snap 401
ipx-proto 400
Layer 2 port-based 357
Layer 3 protocol-based 368
monitor 249
multiple VLAN membership rules 382
multi-range 363
multi-range show commands 363
no-dynamic-aging 399
overview 356
protocol-based configuration 387
protocol-based for MCT 179
pvlan mapping 428
448 pvlan
FastIron Ethernet typePlatform
Switch community 428,
and Layer 429
2 Switching Configuration Guide
removing a port 362 53-1002967-03
router-interface vecommand