slx-20 1 1-L2guide
slx-20 1 1-L2guide
9036285-00 Rev AB
March 2020
Copyright © 2020 Extreme Networks, Inc. All rights reserved.
Legal Notice
Extreme Networks, Inc. reserves the right to make changes in specifications and other information
contained in this document and its website without prior notice. The reader should in all cases
consult representatives of Extreme Networks to determine whether any such changes have been
made.
The hardware, firmware, software or any specifications described or referred to in this document
are subject to change without notice.
Trademarks
Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of
Extreme Networks, Inc. in the United States and/or other countries.
All other names (including any product names) mentioned in this document are the property of
their respective owners and may be trademarks or registered trademarks of their respective
companies/owners.
For additional information on Extreme Networks trademarks, please see:
www.extremenetworks.com/company/legal/trademarks
Link Aggregation................................................................................................................15
Link aggregation overview..................................................................................................................................... 15
LAG configuration guidelines.......................................................................................................................16
LAG profile support-scope............................................................................................................................16
Basic LAG configuration..........................................................................................................................................17
Configuring a new port channel interface..............................................................................................17
Deleting a port channel interface...............................................................................................................18
Adding a member port to a port channel..............................................................................................18
Deleting a member port from a port channel......................................................................................19
Configuring the minimum number of LAG member links.............................................................20
Dynamic (LACP) configuration.......................................................................................................................... 20
Configuring LACP system priority ............................................................................................................21
Configuring the LACP port priority...........................................................................................................21
Configuring the LACP timeout period....................................................................................................22
LACP PDU forwarding.................................................................................................................................... 22
Configuring LACP default Up......................................................................................................................23
IP over port-channel.................................................................................................................................................24
Commands supported for IP over port-channel................................................................................25
IP over port-channel limitations.................................................................................................................. 31
Hash-based load balancing....................................................................................................................................31
Configuring LAG hashing............................................................................................................................... 31
Configuring header protocols for load-balancing.............................................................................32
Load balancing mechanism on different traffic types....................................................................33
MPLS transit load balancing........................................................................................................................ 34
Troubleshooting LAGs.............................................................................................................................................36
Troubleshooting static LAGs....................................................................................................................... 36
Troubleshooting dynamic (LACP) LAGs............................................................................................... 36
Show and clear LAG commands........................................................................................................................ 37
Displaying port-channel information.......................................................................................................37
Displaying LAG hashing.................................................................................................................................38
Displaying LACP system-id information................................................................................................ 38
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 iii
Table of Contents
VLANs................................................................................................................................. 40
802.1Q VLAN overview...........................................................................................................................................40
Configuring VLANs.................................................................................................................................................. 40
Configuring a VLAN........................................................................................................................................ 40
Configuring a switchport interface............................................................................................................41
Configuring the switchport interface mode......................................................................................... 41
Configuring the switchport access VLAN type................................................................................. 42
Configuring a VLAN in trunk mode......................................................................................................... 42
Configuring a native VLAN on a trunk port.........................................................................................43
Enabling VLAN tagging for native traffic............................................................................................. 43
Displaying the status of a switchport interface................................................................................. 45
Displaying the switchport interface type..............................................................................................45
Verifying a switchport interface running configuration.................................................................46
Displaying VLAN information..................................................................................................................... 46
Enabling Layer 3 routing for VLANs................................................................................................................ 47
VLAN statistics........................................................................................................................................................... 47
Enabling statistics on a VLAN.................................................................................................................... 48
Displaying statistics for VLANs..................................................................................................................48
Clearing statistics on VLANs.......................................................................................................................49
VE route-only mode.................................................................................................................................................49
Configuring VE route-only mode on a physical port...................................................................... 50
Configuring VE route-only mode on a LAG port................................................................................51
Extreme SLX-OS
iv Layer 2 Switching Configuration Guide, 20.1.1
Table of Contents
Bridge Domains.................................................................................................................117
Bridge domain overview........................................................................................................................................ 117
Bridge domain statistics................................................................................................................................117
Configuring a bridge domain.............................................................................................................................. 118
Displaying bridge-domain configuration information............................................................................. 119
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 v
Table of Contents
Extreme SLX-OS
vi Layer 2 Switching Configuration Guide, 20.1.1
Table of Contents
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 vii
Table of Contents
Extreme SLX-OS
viii Layer 2 Switching Configuration Guide, 20.1.1
Table of Contents
ETH-CSF............................................................................................................................284
ETH-CSF overview................................................................................................................................................. 284
ETH-CSF use case..........................................................................................................................................284
ETH-CSF specifications...............................................................................................................................286
ETH-CSF and port-channel....................................................................................................................... 286
CSF transmission............................................................................................................................................ 287
CSF reception...................................................................................................................................................287
ETH-CSF PDU structure..............................................................................................................................288
ETH-CSF considerations and limitations............................................................................................ 289
Configuring ETH-CSF........................................................................................................................................... 290
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 ix
Preface
This section describes the text conventions used in this document, where you can find additional
information, and how you can provide feedback to us.
Text Conventions
Unless otherwise noted, information in this document applies to all supported environments for the
products in question. Exceptions, like command keywords associated with a specific software version,
are identified in the text.
When a feature, function, or operation pertains to a specific hardware product, the product name is
used. When features, functions, and operations are the same across an entire product family, such as
ExtremeSwitching switches or SLX routers, the product is referred to as the switch or the router.
Extreme SLX-OS
10 Layer 2 Switching Configuration Guide, 20.1.1
Preface Text Conventions
Table 2: Text
Convention Description
screen displays This typeface indicates command syntax, or represents information as
it appears on the screen.
The words enter and type When you see the word enter in this guide, you must type something,
and then press the Return or Enter key. Do not press the Return or
Enter key when an instruction simply says type.
Key names Key names are written in boldface, for example Ctrl or Esc. If you must
press two or more keys simultaneously, the key names are linked with a
plus sign (+). Example: Press Ctrl+Alt+Del
Words in italicized type Italics emphasize a point or denote new terms at the place where they
are defined in the text. Italics are also used when referring to
publication titles.
New information. In a PDF, this is searchable text.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 11
Documentation and Training Preface
Extreme Networks offers product training courses, both online and in person, as well as specialized
certifications. For details, visit www.extremenetworks.com/education/.
Getting Help
If you require assistance, contact Extreme Networks using one of the following methods:
Extreme Portal
Search the GTAC (Global Technical Assistance Center) knowledge base; manage support cases and
service contracts; download software; and obtain product licensing, training, and certifications.
The Hub
A forum for Extreme Networks customers to connect with one another, answer questions, and share
ideas and feedback. This community is monitored by Extreme Networks employees, but is not
intended to replace specific guidance from GTAC.
Call GTAC
For immediate support: (800) 998 2408 (toll-free in U.S. and Canada) or 1 (408) 579 2826. For the
support phone number in your country, visit: www.extremenetworks.com/support/contact
Before contacting Extreme Networks for technical support, have the following information ready:
• Your Extreme Networks service contract number, or serial numbers for all involved Extreme
Networks products
• A description of the failure
• A description of any actions already taken to resolve the problem
• A description of your network environment (such as layout, cable type, other relevant environmental
information)
• Network load at the time of trouble (if known)
• The device history (for example, if you have returned the device before, or if this is a recurring
problem)
• Any related RMA (Return Material Authorization) numbers
1. Go to www.extremenetworks.com/support/service-notification-form.
2. Complete the form (all fields are required).
Extreme SLX-OS
12 Layer 2 Switching Configuration Guide, 20.1.1
Preface Providing Feedback
3. Select the products for which you would like to receive notifications.
Note
You can modify your product selections or unsubscribe at any time.
4. Select Submit.
Providing Feedback
The Information Development team at Extreme Networks has made every effort to ensure the accuracy
and completeness of this document. We are always striving to improve our documentation and help
you work better, so we want to hear from you. We welcome all feedback, but we especially want to
know about:
• Content errors, or confusing or conflicting information.
• Improvements that would help you find relevant information in the document.
• Broken links or usability issues.
Provide the publication title, part number, and as much detail as possible, including the topic heading
and page number if applicable, as well as your suggestions for improvement.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 13
About This Document
Supported Hardware on page 14
Regarding Ethernet interfaces and chassis devices on page 14
Supported Hardware
For instances in which a topic or part of a topic applies to some devices but not to others, the topic
specifically identifies the devices.
Note
Although many software and hardware configurations are tested and supported for this
release, documenting all possible configurations and scenarios is beyond the scope of this
document.
For information about other releases, see the documentation for those releases.
However, the Ethernet interface configuration and output slot/port examples in this document may
appear as either 0/x or n/x, where "n" and "x" are integers greater than 0.
For all currently supported devices, specify 0 for the slot number.
Extreme SLX-OS
14 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation
Link aggregation overview on page 15
Basic LAG configuration on page 17
Dynamic (LACP) configuration on page 20
IP over port-channel on page 24
Hash-based load balancing on page 31
Troubleshooting LAGs on page 36
Show and clear LAG commands on page 37
We also refer to port-channels as link-aggregation groups (LAGs). A LAG is considered a single link by
connected devices, the Spanning Tree Protocol, IEEE 802.1Q VLANs, and so on. When one physical link
in the LAG fails, the other links stay up. A small drop in traffic is experienced when one link fails.
When queuing traffic from multiple input sources to the same output port, all input sources are given
the same weight, regardless of whether the input source is a single physical link or a port-channel.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 15
LAG configuration guidelines Link Aggregation
Table 4: Port-channel scale for SLX 9540 and SLX 9640 devices
Device or series LAG profile Supported port-channel Maximum links per port-
IDs channel
Extreme SLX-OS
16 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation Basic LAG configuration
Table 5: Port-channel support for SLX 9150 and SLX 9250 devices
Note
Non-default LAG profiles are not supported for the SLX 9150 and SLX 9250 devices.
Example
The following example enables lag-profile-1.
device# configure terminal
device(config)# hardware
device(config-hardware)# profile lag lag-profile-1
%Warning: To activate the new profile config, please run 'copy running-config startup-
config' followed by 'reload system'.
device(config-hardware)#
2. Enter the interface port-channel command to create a new port channel interface.
After creating a new port channel, you can enter no shutdown or shutdown to bring up or down the
port-channel, as follows:
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 17
Deleting a port channel interface Link Aggregation
created.
device(config-Port-channel-30)#
device(config-Port-channel-30)# no shutdown
2016/10/17-20:31:26, [NSM-1019], 303, M2 | Active | DCE, INFO, SLX, Interface Port-
channel 30 is administratively up.
device(config-Port-channel-30)#
2. Enter the interface port-channel command to add a port channel interface at the global
configuration level.
5. Add a port to the port channel interface as a dynamic (using LACP), active or passive mode.
Extreme SLX-OS
18 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation Deleting a member port from a port channel
The following example is for a static LAG configuration with the mode ON.
device# configure terminal
device(config)# interface port-channel 30
device(conf-Port-channel-30)# interface ethernet 0/5
device(conf-if-eth-0/5)# channel-group 30 mode on
The following example adds a port 0/5 to the existing dynamic port channel interface 30 with the mode
active.
device# configure terminal
device(config)# interface port-channel 30
device(conf-Port-channel-30)# interface ethernet 0/5
device(conf-if-eth-0/5)# channel-group 30 mode active
Note
Run the no shutdown command to bring the above interface online.
device(conf-if-eth-0/5)# no shutdown
2016/10/18-03:47:15, [NSM-1019], 528, M2 | Active | DCE, INFO, SLX, Interface
Ethernet 0/5 is administratively up. 2016/10/18-03:47:15, [NSM-1001], 529, M2 |
Active | DCE, INFO, SLX, Interface Ethernet 0/5 is online.
The following example adds a port 0/5 to the existing dynamic port channel interface 30 with the mode
passive.
device(conf-if-eth-0/5)# no channel-group
The following example deletes a port 0/5 from the existing port channel interface 30.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 19
Configuring the minimum number of LAG member links Link Aggregation
This configuration allows a port-channel to operate at a certain minimum bandwidth at all times. If the
bandwidth of the port-channel drops below the minimum number, then the port-channel is declared
operationally DOWN even though it has operationally UP members.
3. Configure the minimum number of LAG member links at the port-channel interface configuration
mode.
device(conf-Port-channel-30)# minimum-links 5
Note
The number of links ranges from 1 to 32. The default minimum links is 1.
The following example sets min-link 5 to the existing port channel interface 30.
If LACP determines that a link can be aggregated into a LAG, LACP puts the link into the LAG. All links in
a LAG inherit the same administrative characteristics.
The LACP process collects and distributes Ethernet frames. The collection and distribution process
implements:
• Inserting and capturing control LACP protocol data units (PDUs).
• Restricting the traffic of a given conversation to a specific link.
Extreme SLX-OS
20 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation Configuring LACP system priority
• Load-balancing links.
• Handling dynamic changes in LAG membership.
LACP uses the system priority with the switch MAC address to form the system ID and also during
negotiation with other switches. The system priority value must be a number in the range of 1 through
65535. The higher the number, the lower the priority. The default priority is 32768.
2. Enter the interface port-channel command to add a port channel interface at the global
configuration level.
3. Configure the interface ethernet command and add the port to the port-channel interface.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 21
Configuring the LACP timeout period Link Aggregation
Note
The LACP port priority value ranges from 1 to 65535. The default value is 32768.
The short timeout period is 3 seconds and the long timeout period is 90 seconds. The default is
long. The short timeout period specifies that the PDU is sent every second and the port waits three
times this long (three seconds) before invalidating the information received earlier on this PDU. The
long timeout period specifies that the PDU is sent once in 30 seconds and the port waits three times
this long (90 seconds) before invalidating the information received earlier on this PDU.
To configure the LACP timeout period on an interface, perform the following steps:
Since the destination address of the PDU is a multicast MAC, the frame will be flooded on the VLAN. If
the VLAN on which the LACP PDU is received is a regular VLAN, the PDU will be flooded on the VLAN.
Extreme SLX-OS
22 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation Configuring LACP default Up
If the VLAN on which the PDU is received is a service delimiter for a bridge domain, the LACP PDU is
flooded on the bridge domain accordingly.
LACP PDU forwarding is supported only on physical interfaces and static port channel interfaces. LACP
PDUs cannot be forwarded if they are received on a LACP based dynamic port channel. LACP PDU
forwarding enabled on a static port channel applies to all the member ports. If LACP is enabled on a
port, it overrides the LACP PDU forwarding configuration and the PDUs are trapped in the CPU.
2. Specify the physical interface on which LACP PDU forwarding needs to enabled.
device(config)# interface ethernet 0/1
2. Enter the interface port-channel command to add a port channel interface at the global
configuration level.
device(config)# interface port-channel 10
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 23
IP over port-channel Link Aggregation
IP over port-channel
Port-channels support most Layer 3 protocols.
IP over port-channel:
• Provides fault tolerance for the links. Protocols associated with the IP are not forced to reconverge
unless all of the links in the port-channel go down.
• Provides for dynamic bandwidth, through the removal or addition of port-channel members. (The
upper layers do not need to know about the members, as these are device-dependent.)
Extreme SLX-OS
24 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation Commands supported for IP over port-channel
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 25
Commands supported for IP over port-channel Link Aggregation
Extreme SLX-OS
26 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation Commands supported for IP over port-channel
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 27
Commands supported for IP over port-channel Link Aggregation
Note: MPLS commands are not supported on , SLX 9150, or SLX 9250 devices.
Extreme SLX-OS
28 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation Commands supported for IP over port-channel
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 29
Commands supported for IP over port-channel Link Aggregation
Extreme SLX-OS
30 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation IP over port-channel limitations
Note
The MPLS options in this section are not supported for SLX 9150 and SLX 9250 devices.
1. Define where to start picking headers for the key generation, using the lag hash hdr-start
command.
• fwd—Start from the header that is used for the forwarding of the packet (inner header). This is
the default option.
• term—Start from the last terminated header (outer header)—the header after the forwarding
header. For switching traffic, as there is no header below the forwarding header, hashing is not
visible.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 31
Configuring header protocols for load-balancing Link Aggregation
2. Configure the number of headers to be considered for LAG hashing, using the lag hash hdr-
count command. The default value is 1. There can be a maximum of 3 headers—based on the first
header selected using the command in the previous step.
The following options provide other LAG configurations to achieve specific tasks:
• Configure hash rotate using the lag hash rotate command to provide different options for
randomness of hashing. The number can be between 0 and 15. The default value is 3.
• If there is a need to use the same hash in both directions, configure hash normalize, using the lag
hash normalize command . The normalize option is disabled by default.
• Allow the source port to be included in the hashing configuration using the lag hash srcport
command. The source port is not used for hashing by default.
• To skip the entire MPLS label stack and pick only the BOS label for hashing, use the lag hash
bos. By default, if the MPLS header is used for hashing, all labels—including BOS—are also used for
hashing.
◦ start— start from BOS. This is the default option.
◦ skip— hash from header next to BOS.
• Enter the lag hash pwctrlword command to skip the password control word in the hashing
configuration.
• The following MPLS transit node LSR hashing configuration options are available when using the
lag hash speculate-mpls command. The default option is using the MPLS labels.
◦ enable— Enables Speculative MPLS.
◦ inner-eth— Enables inner ethernet header hash for L2VPN.
◦ inner-ip-raw— Enables inner IPv4 header hash for L2VPN raw mode.
◦ inner-ip-tag— Enables inner IPv4 header hash for L2VPN tag mode.
◦ inner-ipv6-raw— Enables inner IPv6 header hash for L2VPN raw mode.
◦ inner-ipv6-tag— Enables inner IPv6 header hash for L2VPN tag mode.
Extreme SLX-OS
32 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation Load balancing mechanism on different traffic types
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 33
MPLS transit load balancing Link Aggregation
L2VPN (VPLS/ L2VPN tagged mode with This scenario is handled using the lag hash
VLL) traffic IPv4 inner payload speculate-mpls inner-ip-tag command in
• The hashing the global mode. Some sections of the IPv4 source
options are and destination address fields are also used for load-
mutually balance hashing.
exclusive. If
one option is L2VPN raw mode with IPv4 This scenario is handled using the lag hash
enabled, the inner payload speculate-mpls inner-ip-raw command.
other option Some sections of the IPv4 source and destination
will be address fields are also used for load-balance
disabled. hashing.
L2VPN tagged mode with This scenario is handled using the lag hash
IPv6 inner payload speculate-mpls inner-ipv6-tag command.
Some sections of the IPv6 source and destination
address fields are also used for load-balance
hashing.
L2VPN raw mode with IPV6 This scenario is handled using the lag hash
inner payload speculate-mpls inner-ipv6-raw command.
Some sections of the IPv6 source and destination
address fields are also used for load-balance
hashing.
Extreme SLX-OS
34 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation MPLS transit load balancing
mac address, Inner IPv4 source/destination address, Inner IPv6 source/destination address, Inner L4
port number if the inner header is IPv4.
Note
MPLS transit load balancing is not supported only on devices based on the DNX chipset
family. For a list of these devices, see Supported Hardware on page 14.
This hashing scheme is supported only with the "Layer 2 Optimized" Tcam profile and when the feature
is enabled by default in this profile. When the profile tcam layer2-optimised-1 configuration is activated,
the "Error: Operation not supported in the current hardware TCAM profile" message is displayed for the
following commands as these functionalities are already taken care of by this enhanced hashing
scheme:
Hash Settings
hdr-start:FWD, hdr-count:3, bos-start:0, bos-skip:0, skip-cw:0
normalize:0, rotate:3, include_src_port:0, Disable: L2 0, ipv4 0, ipv6 0, mpls 0
mpls_speculate: Enabled
load-balance-type hash-based
For comparison, the following displays the show port-channel load-balance command output
for a non layer 2 optimized profile:
Hash Settings
hdr-start:FWD, hdr-count:1, bos-start:0, bos-skip:0, skip-cw:0
normalize:0, rotate:3, include_src_port:0, Disable: L2 0, ipv4 0, ipv6 0, mpls 0
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 35
Troubleshooting LAGs Link Aggregation
mpls_speculate:Enabled
load-balance-type hash-based
Troubleshooting LAGs
To troubleshoot problems with static and dynamic LAG configuration, use the following troubleshooting
tips.
When a link has problem, the show port-channel command displays the following message:
Mux machine state: Deskew not OK.
Extreme SLX-OS
36 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation Show and clear LAG commands
2. Use the show port-channel detail command to display detailed information of all the port-
channels.
device# show port-channel detail
LACP Aggregator: Po 10
Aggregator type: Standard
Actor System ID - 0x8000,f4-6e-95-9f-13-e2
Admin Key: 0010 - Oper Key 0010
Receive link count: 2 - Transmit link count: 2
Individual: 0 - Ready: 1
Partner System ID - 0x8000,f4-6e-95-9f-15-a4
Partner Oper Key 0010
Flag * indicates: Primary link in port-channel
Number of Ports: 2
Minimum links: 1
Member ports:
Link: Eth 0/9 (0xC012140) sync: 1
Link: Eth 0/10 (0xC014140) sync: 1 *
3. Use the show port-channel number command to display detailed information of a specific
port-channel interface
device# show port-channel 10
Port-channel 10 is admin down, line protocol is down (admin down)
Hardware is AGGREGATE, address is 00e0.0c70.cc07
Current address is 00e0.0c70.cc07
Interface index (ifindex) is 671088650
Minimum number of links to bring Port-channel up is 1
MTU 1548 bytes
LineSpeed Actual : Nil
Allowed Member Speed : 10000 Mbit
Priority Tag disable
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 37
Displaying LAG hashing Link Aggregation
Hash Settings
hdr-start:FWD, hdr-count:1, bos-start:0, bos-skip:0, skip-cw:0
normalize:0, rotate:3, include_src_port:0, Disable: L2 0, ipv4 0, ipv6 0
load-balance-type hash-based
Extreme SLX-OS
38 Layer 2 Switching Configuration Guide, 20.1.1
Link Aggregation Clearing LACP counter statistics on a LAG
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 39
VLANs
802.1Q VLAN overview on page 40
Configuring VLANs on page 40
Enabling Layer 3 routing for VLANs on page 47
VLAN statistics on page 47
VE route-only mode on page 49
A VLAN contains end stations that have a common set of requirements that are independent of
physical location. You can group end stations in a VLAN even if they are not physically located in the
same LAN segment. VLANs are typically associated with IP subnetworks and all the end stations in a
particular IP subnet belong to the same VLAN. Traffic between VLANs must be routed. VLAN
membership is configurable on a per-interface basis.
Configuring VLANs
The following sections discuss working with VLANs on Extreme devices.
Configuring a VLAN
Follow this procedure to configure a VLAN in the Extreme device at the global configuration level.
2. Enter the vlan command to create a topology group at the global configuration level.
device(config)# vlan 5
device(config-vlan-5)#
Note
The no vlan command removes the existing VLAN instance from the device.
Extreme SLX-OS
40 Layer 2 Switching Configuration Guide, 20.1.1
VLANs Configuring a switchport interface
device(conf-if-eth-0/1)# switchport
device(conf-if-eth-0/1)# switchport
4. Enter the switchport mode command to configure the switchport interface in trunk mode.
Note
The default mode is access. Enter the switchport mode access command to set the
mode as access.
Note
Before you change the switch port mode from switchport mode access with an explicit
switchport access vlan to switchport mode trunk-no-default-native,
you must enter the no switchport command on the interface level, and then enter the
switchport command to set the interface as a switchport. Now you can configure the
switchport mode trunk-no-default-native command.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 41
Configuring the switchport access VLAN type VLANs
Ensure that reserved VLANs are not used. Use the no switchport access vlan command to set
the default VLAN as the access VLAN.
device(conf-if-eth-0/1)# switchport
4. Enter the switchport access vlan command to set the mode of the interface to access and
specify a VLAN.
device(conf-if-eth-0/1)# switchport
4. Enter the switchport trunk allowed vlan command to set the mode of the interface to
trunk and add a VLAN.
Extreme SLX-OS
42 Layer 2 Switching Configuration Guide, 20.1.1
VLANs Configuring a native VLAN on a trunk port
The example sets the mode of a port-channel interface to trunk and allows all VLANs.
device(conf-if-eth-0/1)# switchport
4. Enter the switchport trunk native-vlan command to set native VLAN characteristics to
access and specify a VLAN.
This example removes the configured native VLAN on the Ethernet interface.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 43
Enabling VLAN tagging for native traffic VLANs
The following table describes the acceptable frame types, as well as system behavior, for tagged native
VLAN, untagged native VLAN, and no native VLAN.
Table 20: Acceptable frame types and system behavior for native VLANs
Tagged native VLAN Untagged native VLAN No native VLAN
Configuration switchport trunk tag no switchport trunk tag switchport mode trunk-
native-vlan (Default) native-vlan or Global no-default-native
and Globally: vlan dot1q config: no vlan dot1q tag
tag native native
Acceptable frame type VLAN-tagged only All (tagged and VLAN-tagged only
untagged)
Receive untagged Drop Forward/flood in native Drop
VLAN
Receive tagged on Forward/flood in native Forward/flood in native Drop
native VLAN VLAN VLAN
Transmit on native Tagged with native Untagged packet Will not forward on
VLAN VLAN native VLAN
device(conf-if-eth-0/1)# switchport
4. Enter the switchport trunk tag native-vlan command to enable tagging for native
traffic data VLAN characteristics on a specific interface.
This example enables tagging for native traffic data on a specific Ethernet interface.
Extreme SLX-OS
44 Layer 2 Switching Configuration Guide, 20.1.1
VLANs Displaying the status of a switchport interface
The example displays the detailed Layer 2 information for a port-channel interface.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 45
Verifying a switchport interface running configuration VLANs
This example displays the running configuration information for a port-channel interface.
Extreme SLX-OS
46 Layer 2 Switching Configuration Guide, 20.1.1
VLANs Enabling Layer 3 routing for VLANs
2. Create a VLAN.
device(config)# vlan 200
3. Create a virtual Ethernet (VE), assign an IP address and mask, and enable the interface.
device(config)# interface ve 200
device(config-Ve-200)# ip address 10.2.2.1/24
device(config-Ve-200)# no shutdown
A VE interface can exist without a VLAN configuration, but it must be provisioned in the VLAN in
order to be used.
4. Enter the router-interface command and specify the VLAN.
VLAN statistics
Devices gather statistics for all ports and port channels on configured VLANs.
Use the statistics command in the VLAN configuration mode to enable statistics on a VLAN.
Note
Statistics has to be manually enabled for a specific VLAN, since it is not enabled by default for
VLANs.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 47
Enabling statistics on a VLAN VLANs
device(config)# vlan 5
device(config-vlan-5)#
3. Enter the statistics command to enable statistics for all ports and port channels on configured
VLANs.
device(config-vlan-5)# statistics
Note
Use the no statistics command to disable statistics on VLANs.
device(config-vlan-5)# no statistics
Enter the show statistics vlan command to view the statistics for all ports and port channels on
all configured VLANs.
Vlan 10 Statistics
Interface RxPkts RxBytes TxPkts TxBytes
eth 0/1 821729 821729 95940360 95940360
eth 0/2 884484 885855 95969584 95484555
po 1 8884 8855 9684 9955
Vlan 20 Statistics
Interface RxPkts RxBytes TxPkts TxBytes
eth 0/6 821729 821729 95940360 95940360
eth 0/21 8884 8855 9684 9955
po 2 884484 885855 95969584 95484555
Extreme SLX-OS
48 Layer 2 Switching Configuration Guide, 20.1.1
VLANs Clearing statistics on VLANs
Vlan 10 Statistics
Interface RxPkts RxBytes TxPkts TxBytes
eth 0/1 821729 821729 95940360 95940360
eth 0/2 884484 885855 95969584 95484555
po 1 8884 8855 9684 9955
Enter the clear statistics vlan command to clear the statistics for all ports and port channels
on all configured VLANs.
VE route-only mode
By default, physical ports and port-channels (LAG ports) support both Layer 2 switching and Layer 3
routing. VE route-only mode enables these ports to act exclusively as a Layer 3 virtual Ethernet (VE)
interface, dropping all ingress packets that require Layer 2 switching.
The MAC learning of dropped packets is not affected by this feature. ARP requests (broadcast), LACP,
and BPDU packet processing are also not affected. The following table lists the effects of this mode on a
variety of features.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 49
Configuring VE route-only mode on a physical port VLANs
2. Create a VLAN.
device(config)# vlan 100
7. Enter the route-only command to enable Layer 3 routing exclusively on the port.
device(conf-if-eth-0/2)# route-only
Use the no route-only command to revert to default Layer 2 and Layer 3 behavior.
8. Enable the interface and exit to global configuration mode.
device(conf-if-eth-0/2)# no shutdown
device(conf-if-eth-0/2)# exit
Extreme SLX-OS
50 Layer 2 Switching Configuration Guide, 20.1.1
VLANs Configuring VE route-only mode on a LAG port
11. Enter virtual Ethernet (VE) configuration mode and specify the VLAN.
device(config)# interface ve 100
2. Create a VLAN.
device(config)# vlan 100
8. Enter the route-only command top enable Layer 3 routing exclusively on the port.
device(config-Port-channel-1)# route-only
Use the no route-only command to revert to default Layer 2 and Layer 3 behavior.
9. Enable the interface and exit to global configuration mode.
device(config-Port-channel-1)# no shutdown
device(config-Port-channel-1)# exit
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 51
Configuring VE route-only mode on a LAG port VLANs
11. Enter virtual Ethernet (VE) configuration mode and specify the VLAN.
device(config)# interface ve 100
Extreme SLX-OS
52 Layer 2 Switching Configuration Guide, 20.1.1
VXLAN Layer 2 Gateway
VXLAN Layer 2 gateway overview on page 53
VXLAN Layer 2 gateway considerations and limitations on page 54
Configuring VXLAN Layer 2 gateway on page 55
VXLAN Layer 2 gateway support for bridge domains on page 57
VXLAN Layer 2 support for LVTEP on page 60
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 53
VXLAN Layer 2 gateway considerations and limitations VXLAN Layer 2 Gateway
VLANs on each node are extended through common Virtual Network Instance (VNI) 5000. The MAC
addresses of local hosts are learned on access points, and MAC addresses are learned on VXLAN
tunnels. A split-horizon topology is supported. All nodes participating in the VLAN must be connected
through VXLAN tunnels, because there is no tunnel-to-tunnel flooding of broadcast, unknown unicast,
and multicast (BUM) traffic.
In this topology, Devices 1, 2, and 3 are VXLAN Layer 2 gateway devices. On Device 3, tunnel 1 and
tunnel 2 are mapped to VLAN 5. VLAN 5 has two hosts, MAC 3 and MAC 4. Device 3 is connected to two
other hosts, Device 1 and Device 2, which connect to hosts MAC 1 and MAC 2, respectively, through
VXLAN tunnels 1 and 2, respectively. If MAC 3 needs to establish traffic to MAC 1, initially there will be
BUM flooding and upon a response from MAC 1, MAC 1 is learned through tunnel 1. Subsequent traffic
goes directly from MAC 3 to Device 1 on tunnel 1. Traffic in the reverse direction comes from Device 1, is
decapsulated, and goes to MAC 3.
Extreme SLX-OS
54 Layer 2 Switching Configuration Guide, 20.1.1
VXLAN Layer 2 Gateway VNI Mapping
VNI Mapping
VLAN-VNI mapping is shared by all VxLAN tunnels including the ICL. There are three methods of
configuring VNI mapping.
• Auto-Mapping
◦ This is the default configuration, and is recommended for use with the cluster. The first 32K are
reserved for the VNI range. A one-to-one mapping between the VLAN/BD and the VNI is
configured.
• Manual Mapping for a specific VLAN/BD (hybrid mode)
◦ With map vni auto configured, a specific VLAN/BD can be manually mapped. The manual
mapping VNI range starts at 32768. Other VLANs/BDs will continue to use auto mapping.
• Manual mapping of all VLANs/BDs (disable auto mapping)
◦ When auto mapping is disabled, manual VNI mapping is required for all VLANs/BDs created on
the system (even the VLANs/BDs that are not configured under EVPN). In this mode, the
complete VNI range (1-2^24) is available for manual mapping.
Note
▪ When the VNI mapping is changed, traffic on the ICL is impacted.
▪ The VNI Mapping on the two nodes must match.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 55
Configuring VXLAN Layer 2 gateway VXLAN Layer 2 Gateway
2. Enter the overlay-gateway command, specify the name of a gateway, and enter VXLAN overlay
gateway configuration mode.
device(config)# overlay-gateway GW1
4. Enter the map bridge-domain command and specify a bridge domain and VNI.
device(config-overlay-gw-GW1)# map bridge-domain 1 vni 2000
7. In global configuration mode, enable EVPN configuration mode and configure the EVPN instance.
a. Enter default EVPN configuration mode.
device(config)# evpn
c. Enable the auto-generation of a route distinguisher (RD) for the default EVPN instance.
device(config-evpn-default)# rd auto
b. Specify the autonomous system number (ASN) for the AS in which the remote neighbor resides.
device(config-bgp-router)# neighbor 7.7.100.7 remote-as 100
c. Configure the BGP device to communicate with a neighbor through a specified interface, in this
case loopback 1.
device(config-bgp-router)# neighbor 7.7.100.7 update-source loopback 1
d. Repeat the above two substeps for the other peer address, as in the following example.
neighbor 8.8.100.8 remote-as 100
neighbor 8.8.100.8 update-source loopback 1
9. Enable the L2VPN address-family configuration mode to configure a variety of BGP EVPN options.
a. Enable L2VPN address-family configuration mode and enter BGP EVPN configuration mode.
device(config-bgp-router)# address-family l2vpn evpn
Extreme SLX-OS
56 Layer 2 Switching Configuration Guide, 20.1.1
VXLAN Layer 2 Gateway VXLAN Layer 2 gateway support for bridge domains
c. Enable the exchange of information with BGP neighbors and peer groups.
device(config-bgp-evpn)# neighbor 8.8.100.8 activate
10. In privileged EXEC mode, enter the show overlay-gateway command to confirm the gateway
configuration.
device# show overlay-gateway
Overlay Gateway "GW1", ID 1,
Admin state up
IP address 3.3.3.3 (loopback 1), Vrfdefault-vrf
Number of tunnels 1
Packet count: RX 17909 TX 1247
Byte count : RX (500125) TX 356626
11. In privileged EXEC mode, enter the show tunnel command to confirm the tunnel configuration.
device# show tunnel 61441
Tunnel 61441, mode VXLAN
Ifindex 0x7c00f001, Admin state up, Operstate up
Source IP 3.3.3.3, Vrf: default-vrf
Destination IP 1.1.1.1
Active next hops on node 1:
IP: 4.4.4.5, Vrf: default-vrf
Egress L3 port: Ve45, Outer SMAC: 609c.9f5a.4415
Outer DMAC: 609c.9f5a.0015, ctag: 0
BUM forwarder: yes
12. In privileged EXEC mode, enter the show vlan command to confirm the VLAN configuration.
device# show vlan 5
VLAN Name State Ports
Classification
(R)-RSPAN (u)-Untagged
(t)-Tagged
================ =============== ========================== ===============
====================
5 VLAN05 ACTIVE Eth 2/1(t)
Eth 2/5(t)
tu61441 vni5000
13. In privileged EXEC mode, enter the show mac-address-table command to confirm the MAC
configuration.
device# show mac-address-table
VlanId/BDId Mac-address Type State Ports/LIF/PW
35 (V) 609c.9f5a.5b15 Dynamic Active Po 35
45 (V) 609c.9f5a.4415 Dynamic Active Po 45
5 (V) 0000.0400.0011 Dynamic Active tu61441
5 (V) 0000.0500.0011 Dynamic Active Eth 0/5
5 (V) 0000.0400.0011 Dynamic Active tu61441
5 (V) 0000.0500.0011 Dynamic Active Eth 0/5
Total MAC addresses : 6
device#
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 57
Configuring VXLAN Layer 2 Gateway support for bridge
domains VXLAN Layer 2 Gateway
bridge domain Virtual Network Interface (VNI) mappings along with a maximum of 4 K VLAN VNI
mappings, for a total of 8 K mappings.
Since a bridge domain supports different port and VLAN endpoints, all of its traffic can be extended to
a remote node through one VNI.
Also, VXLAN gateway support to bridge domains enables VLAN translation of traffic on both sides of
the network. The local VLANs can use different VLAN tags on either side of the network and map to the
same VNI.
Note
Only point-to-multipoint bridge domains are supported to extend over VXLAN tunnels. Point-
to-point bridge domains are not supported.
You can extend the bridge domain under a site configuration. You can configure the bridge domain to
VNI mapping automatically with auto mode where the bridge domain to the VNI is mapped implicitly.
For example, VLANs 1 through 4096 are mapped to VNI 1 through 4090, respectively, and the bridge
domain 1 is mapped to 4097. You can also configure the bridge domain to a VNI map manually, similarly
to that of a VLAN.
Note
The default tagging mode for a bridge domain is raw mode.
Follow these steps configure a VXLAN Layer 2 gateway to support bridge domains.
2. Create a VXLAN overlay gateway and access the overlay gateway configuration mode.
device(config)# overlay-gateway gateway1
device(config-overlay-gw-gateway1)#
Extreme SLX-OS
58 Layer 2 Switching Configuration Guide, 20.1.1
VXLAN Layer 2 Gateway VXLAN Layer 2 gateway payload tag processing
To configure RFC-compliant mode, configure the bridge domain in raw mode as shown in the following
example.
pw-profile test
vc-mode raw
bridge-domain 10 p2mp
pw-profile test
Then extend the bridge domain in the overlay gateway, as shown in the following example.
overlay-gateway gateway1
type layer2-extension
ip interface loopback 1
map bridge-domain 10 vni 999
site vcs1
ip address 10.67.67.1
extend bridge-domain add 10
Note
An SLX-OS device supports RFC-compliant mode with the bridge domain-based VXLAN
service only.
Note
This mode does not interoperate with RFC-compliant mode.
This mode is supported for VLAN-based VXLAN service and bridge domain-based VXLAN
service with tag mode.
To configure enhanced payload tag transport mode, configure the bridge domain in tagging mode as
shown in the following example.
pw-profile test
vc-mode tag
bridge-domain 10 p2mp
pw-profile test
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 59
VXLAN Layer 2 support for LVTEP VXLAN Layer 2 Gateway
Then extend the bridge domain in the overlay gateway, as shown in the following example.
overlay-gateway gateway1
type layer2-extension
ip interface Loopback 1
map bridge-domain 10 vni 999
site vcs1
ip address 10.67.67.1
extend bridge-domain add 10
The LVTEP control plane uses MCT Control Plane Designated Forwarder Election among the cluster
peers. BGP VXLAN tunnels that are discovered automatically are treated as cluster client end points
(CCEPs).
The following table shows Ethernet Segment Identifier (ESI) values for the VXLAN tunnels.
The ESI label is allocated globally for the LVTEP and is the same for all LVTEP tunnels. The tunnel
operational status that is used for LVTEP tunnels is the same as that used for cluster clients.
Note
LVTEP is supported with the default TCAM profile.
All the show commands that apply to MCT clients also apply to tunnel cluster clients.
Example topology
The following figure illustrates a basic LVTEP topology for the data plane, with cluster nodes supporting
remote peers and client end points (CEPs) and cluster client end points (CCEPs).
Extreme SLX-OS
60 Layer 2 Switching Configuration Guide, 20.1.1
VXLAN Layer 2 Gateway LVTEP data plane
Packet formats
The following tables describe the supporting packet formats.
The preceding packet format is used between the remote peers for both unicast and BUM traffic.
The preceding packet format is used between the cluster peers for unicast traffic.
The above packet format is used between the cluster peers for BUM traffic when the traffic is received
on the CCEP Interface. This applies to both the Layer 2 CCEP interface or the tunnel CCEP interface.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 61
Port-based VLAN bundle service VXLAN Layer 2 Gateway
The attachment circuit (AC) port is configured with a tag protocol identifier (TPID) that is different from
that of the incoming traffic; the port is also configured with an untagged VLAN. All the traffic coming in
on this port is treated as untagged traffic. The following figure illustrates this topology.
Note
This feature is not supported on the SLX 9150 or the SLX 9250.
The following example illustrates a configuration with a bridge domain (BD) logical interface (LIF) on an
Ethernet port.
device(conf-if-eth-0/1)# switchport
device(conf-if-eth-0/1)# switchport mode trunk-no-default-native
device(conf-if-eth-0/1)# logical-interface ethernet 0/1.1 untagged vlan 200
device(conf-if-eth-0/1)# tag-type 9100
Extreme SLX-OS
62 Layer 2 Switching Configuration Guide, 20.1.1
VXLAN Layer 2 Gateway Configuring VXLAN LVTEP support
1. Configure multiple loopback interfaces to support BGP neighbor address-family and the LVTEP IP
address.
a. Enter global configuration mode.
device# configure terminal
c. Configure a loopback interface with OSPF area 0 and an IP address, and enable the interface to
support BGP neighbor address-family.
device(config-Loopback-1)# ip ospf area 0
device(config-Loopback-1)# ip address 6.6.100.6/32
device(config-Loopback-1)# no shutdown
The VLAN in the LIF configuration is for VLAN tag classification. This example shows a dual-
tagged LIF being configured. The expected packet that enters through this port must be dual-
tagged, without VLAN 10 and the inner VLAN 1, in order to be classified as a packet received for
this LIF.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 63
Configuring VXLAN LVTEP support VXLAN Layer 2 Gateway
g. (Optional) By default, the administrative state of the LIF is "no shutdown." To remove the port
from participating in any data traffic without having to shut down the physical interface, enter
the no form of the shutdown (LIF) command.
device(conf-if-eth-lif-0/5.1)# no shutdown
h. Repeat Step 3e through Step 3g for the second logical interface, and specify a second inner
VLAN.
logical-interface ethernet 0/5.2
vlan 10 inner-vlan 2
Logical interfaces representing BD endpoints must be created before they can be bound to a BD.
For further information, refer to Logical Interfaces.
c. Ensure that local switching is enabled for BD 1.
device(config-bridge-domain-1)# local-switching
A default pseudowire (PW) profile is automatically configured, with the following defaults:
e. Repeat the above BD configuration for the second BD, as in the following example.
bridge-domain 2 p2mp
logical-interface ethernet 0/5.2
pw-profile default
bpdu-drop-enable
local-switching
Extreme SLX-OS
64 Layer 2 Switching Configuration Guide, 20.1.1
VXLAN Layer 2 Gateway Configuring VXLAN LVTEP support
6. In global configuration mode, enable EVPN configuration mode and configure the EVPN instance.
a. Enter default EVPN configuration mode.
device(config)# evpn
c. Enable the auto-generation of a route distinguisher (RD) for the default EVPN instance.
device(config-evpn-default)# rd auto
b. Specify a port channel interface through which to reach the MCT cluster peer.
device(config-cluster-c1)# peer-interface port-channel 1
b. Specify the autonomous system number (ASN) for the AS in which the remote neighbor resides.
device(config-bgp-router)# neighbor 7.7.100.7 remote-as 100
c. Configure the BGP device to communicate with a neighbor through a specified interface, in this
case loopback 1.
device(config-bgp-router)# neighbor 7.7.100.7 update-source loopback 1
d. Repeat the above two substeps for the other peer address, as in the following example.
neighbor 8.8.100.8 remote-as 100
neighbor 8.8.100.8 update-source loopback 1
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 65
LVTEP support for other features VXLAN Layer 2 Gateway
9. Enable the L2VPN address-family configuration mode to configure a variety of BGP EVPN options.
a. Enable L2VPN address-family configuration mode and enter BGP EVPN configuration mode.
device(config-bgp-router)# address-family l2vpn evpn
c. Enable the exchange of information with BGP neighbors and peer groups.
device(config-bgp-evpn)# neighbor 8.8.100.8 activate
10. Repeat the above steps for the other node in the cluster, with modifications as appropriate.
AC LIF
AC LIFs of type untagged, single tagged, and double tagged are supported.
Layer 2 ACLs
Layer 2 end points (leaf) support Layer 2 ACLs.
Rate limiting
Layer 2 end points (leaf) do not support rate limiting.
QoS
QoS behavior is similar to that for a single VTEP gateway. Details are listed in the following tables for
DiffServe tunneling uniform and pipe modes in an overlay network.
Extreme SLX-OS
66 Layer 2 Switching Configuration Guide, 20.1.1
VXLAN Layer 2 Gateway LVTEP support for other features
Table 25: QoS behavior for DiffServ tunneling uniform mode (continued)
Traffic type VXLAN origination VXLAN tunnel termination
BD (tagged, double tagged) Outer VLAN PCP is mapped to DSCP is remapped to PCP of
DSCP and TTL is 255 Inner VLAN outer VLAN and Inner VLAN of
header is carried with original L2 traffic.
PCP.
BD (tagged, untagged) DSCP 0 and TTL 255 are sent on NA
the tunnel header. Dummy VLAN
is added: VLAN ID is BD ID and
PCP is 0.
MTU
MTU behavior is similar to that for a single VTEP gateway.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 67
Nondefault TPID VXLAN Layer 2 Gateway
The following table summarizes this behavior for VLANs and BDs.
Table 27: Inner packet tag behavior for VLANs and BDs
VLAN/BD Configuration Inner packet tag behavior Remarks
VLAN Inner packet is always untagged.
BD raw mode Inner packet is always untagged. This is RFC-compliant behavior.
BD tagged mode Inner packet is always tagged. This mode can be used if a tag
must always be sent in the inner
packet.
Statistics
The LVTEP tunnel CCEP supports statistics. For BUM traffic, although the traffic is suppressed (through
split horizon), it is still accounted for as part of the statistics. This behavior is the same as existing single
VTEP behavior.
Nondefault TPID
The Tag Protocol Identifier (TPID) is a 16-bit field that identifies the frame as an IEEE 802.1Q-tagged
frame. The TPID is set to the default value of 0x8100, but the user can change this value.
The TPID field is located at the same position as the EtherType/length field in untagged frames, and is
thus used to distinguish the frame from untagged frames. If you require support for dual tagging or
provider backbone bridge (PBB), the outer TPID of the packet must be configured to a value different
from the default.
The raw pass-through support for an untagged LIF requires you to configure the interface TPID to a
value that allows it to treat all traffic received on that port as untagged. You can configure the TPID on
port and LAG interfaces.
Important
When the tag type is changed on interface, the interface is brought down first, causing all
learned MAC addresses to be flushed.
Extreme SLX-OS
68 Layer 2 Switching Configuration Guide, 20.1.1
VXLAN Layer 2 Gateway Nondefault TPID
(whether a router port or a LIF of a VE) can have any nondefault TPID configuration, because FRR
always assumes that the link layer has the default TPID of 0x8100.
Note
The LSP FRR limitation is for any tag-type configured in the device. You can configure either
FRR or tag-type on any interface in the device, as in the following example.
device(config-router-mpls-lsp-to-avalanche-1)# frr
%Error: Not allowed, when a non-default TPID (tag-type) is configured on any
port-channel or physical interfaces.
device(config-router-mpls-lsp-to-avalanche-1)#
By default, all interfaces in the system have default TPID value of 0x8100.
d. Enter the show interface ethernet command to confirm the configuration.
device# show interface ethernet 0/1
Ethernet 0/1 is up, line protocol is up (connected)
Hardware is Ethernet, address is 609c.9f5f.5005
Current address is 609c.9f5f.5005
Pluggable media present
Interface index (ifindex) is 203431936
MTU 1548 bytes
10G Interface
LineSpeed Actual : 1000 Mbit
LineSpeed Configured : Auto, Duplex: Full
Tag-type: 0x9100
Priority Tag disable
Forward LACP PDU: Disable
Route Only: Disabled
Last clearing of show interface counters: 23:12:47
Queueing strategy: fifo
Receive Statistics:
0 packets, 0 bytes
Unicasts: 0, Multicasts: 0, Broadcasts: 0
64-byte pkts: 0, Over 64-byte pkts: 0, Over 127-byte pkts: 0
Over 255-byte pkts: 0, Over 511-byte pkts: 0, Over 1023-byte pkts: 0
Over 1518-byte pkts(Jumbo): 0
Runts: 0, Jabbers: 0, CRC: 0, Overruns: 0
Errors: 0, Discards: 0
Transmit Statistics:
0 packets, 0 bytes
Unicasts: 0, Multicasts: 0, Broadcasts: 0
Underruns: 0
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 69
Nondefault TPID VXLAN Layer 2 Gateway
Errors: 0, Discards: 0
Rate info:
Input 0.000000 Mbits/sec, 0 packets/sec, 0.00% of line-rate
Output 0.000000 Mbits/sec, 0 packets/sec, 0.00% of line-rate
Route-Only Packets Dropped: 0
Time since last interface status change: 23:12:45
By default, all interfaces in the system have default TPID value of 0x8100.
d. Enter the show interface port-channel command to confirm the configuration.
device# show interface port-channel 20
Port-channel 20 is up, line protocol is up
Hardware is AGGREGATE, address is 609c.9f5c.ac07
Current address is 609c.9f5c.ac07
Interface index (ifindex) is 671088660 (0x28000014)
Minimum number of links to bring Port-channel up is 1
MTU 1548 bytes
LineSpeed Actual : 300000 Mbit
Allowed Member Speed : 100000 Mbit
Priority Tag disable
Forward LACP PDU: Disable
Route Only: Disabled
Tag-type: 0x88a8
Last clearing of show interface counters: 2d01h50m
Queueing strategy: fifo
Receive Statistics:
34579 packets, 4201368 bytes
Unicasts: 0, Multicasts: 34579, Broadcasts: 0
64-byte pkts: 0, Over 64-byte pkts: 17288, Over 127-byte pkts: 17291
Over 255-byte pkts: 0, Over 511-byte pkts: 0, Over 1023-byte pkts: 0
Over 1518-byte pkts(Jumbo): 0
Runts: 0, Jabbers: 0, CRC: 0, Overruns: 0
Errors: 0, Discards: 0
Transmit Statistics:
34578 packets, 4201240 bytes
Unicasts: 0, Multicasts: 34578, Broadcasts: 0
Underruns: 0
Errors: 0, Discards: 0
Rate info:
Input 0.000000 Mbits/sec, 0 packets/sec, 0.00% of line-rate
Output 0.000000 Mbits/sec, 0 packets/sec, 0.00% of line-rate
Route-Only Packets Dropped: 0
Time since last interface status change: 1d23h59m
Extreme SLX-OS
70 Layer 2 Switching Configuration Guide, 20.1.1
VXLAN Layer 2 Gateway Configuring TCAM profiles to support LVTEP
2. In hardware configuration mode, enter the profile tcam command and specify vxlan-
visibility.
device(config-hardware)# profile tcam vxlan-visibility
show cluster
device# show cluster
Cluster default
==============
Cluster State: Active/Shutdown
Bringup Delay: 10 seconds
Configured Member Vlan Range: All
Active Member Vlan Range: 1-352,456-765,783,785-795
Configured Member BD Range: All
Active Member BD Range: 3-5,26-42
No. of Clients: 4
Peer Info:
----------
Peer IP: 10.1.1.26, State: Up
Peer Interface: Ethernet 0/41, Source IP: 10.1.1.28
Keep-Alive:
==========
IP: 24.1.1.26, State: Down (Source-interface Down)
Interface: Ethernet 0/20 (default-vrf), Source IP: 22.1.1.28
Interval: 100ms
Role: Secondary
Client Info:
------------
Interface Id Description Local/Remote State Exceptions
–-------- –- –----------- –------------------ –----------
Ethernet 0/11 11 Spirent 3/3 Up / Down Remote Down
Port-channel 20 1020 Server_U27 Up / Up
Tunnel 61441 30.30.30.30 Up / Up VLAN
mismatch
PW 34816 Down / Down Client
Down
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 71
LVTEP show commands VXLAN Layer 2 Gateway
Extreme SLX-OS
72 Layer 2 Switching Configuration Guide, 20.1.1
VXLAN Layer 2 Gateway LVTEP show commands
show tunnel
device# show tunnel 61441
Tunnel 32769, mode VXLAN, node-ids 1
Ifindex 0x7c00f001, Admin state up, Oper state up
Overlay gateway "gw1", ID 1
Source IP 6.7.100.67 ( Loopback 2 ), Vrf default-vrf
Destination IP 8.8.100.8
Configuration source BGP-EVPN
MAC learning BGP-EVPN
Tunnel QOS mode UNIFORM
Active next hops on node 1:
IP: 10.6.8.8, Vrf: default-vrf
Egress L3 port: Ve 3, Outer SMAC: 609c.9f5a.3d15
Outer DMAC: 609c.9f5a.4515, ctag: 0
BUM forwarder: yes
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 73
QoS for VXLAN Layer 2 gateways
SLX-OS VXLAN Layer 2 gateways can support QoS.
A VXLAN L2 gateway can interconnect tenants in the same subnet through the VXLAN configuration.
The following figure illustrates a simple use case where a packet is sent from VM1. If it is a BUM packet,
Leaf-A floods through the packet to all the VTEPs in the same VXLAN segment, until the MAC table at
Leaf-A is populated with corresponding entries through mechanisms such as EVPN. Meanwhile, the
known unicast packet is forwarded in unicast mode to the corresponding VTEP only. At Leaf-A, the
Traffic Class/802.1p marking of the tenant frame determines the DSCP of the added IP header, and the
IP header is followed by the VXLAN header. At terminating leaf nodes, the DSCP of the IP header is
ignored and the Traffic Class/802.1p marking of the tenant frame is thereby exposed, and the original
tenant frame is used to determine the QoS policy for switching the frame to the destination VM.
Extreme SLX-OS
74 Layer 2 Switching Configuration Guide, 20.1.1
QoS for VXLAN Layer 2 gateways Configuring QoS for VXLAN Layer 2 gateways
Note
For information about QoS configuration on VXLAN L3 gateways and on VLAN L2 and L3
gateway interconnections, refer to "QoS for VXLAN Layer 3 gateways" and "QoS for VXLAN
Layer 2 and Layer 3 gateway interconnections".
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 75
Multi-Chassis Trunking (MCT)
MCT Overview on page 76
MCT configuration considerations on page 85
Configuring MCT on page 86
Configuring additional MCT cluster parameters on page 88
Displaying MCT information on page 90
VPLS and VLL MCT on the SLX 9640 and 9540 devices on page 92
Layer 3 routing over MCT on page 103
Using MCT with VRRP and VRRP-E on page 106
MCT Use Cases on page 110
MCT Overview
Multi-Chassis Trunking (MCT) is trunking that initiates at a single MCT-unaware server or switch and
terminates at two MCT-aware switches. MCT allows the links to the two MCT-aware switches to appear
to a downstream device as if they are coming from a single device on a single Link Aggregation (LAG)
trunk interface or physical port.
Note
The SLX-OS device does not support Layer 2 protocols over MCT. Spanning Tree Protocol
(STP) is disabled by default and must not be enabled with MCT. You must provide a loop-free
topology.
In a data center network environment, LAG trunks provide link level redundancy and increased capacity.
However, they do not provide switch-level redundancy. If the switch connected to the LAG trunk fails,
the entire trunk loses network connectivity.
With MCT, member links of the LAG trunk are connected to two MCT-aware devices. A configuration
between the devices enable data flow and control messages between them to establish a logical Inter-
Chassis Link (ICL). In this model, if one MCT device fails, a data path remains through the other device.
SLX-OS Layer 2 MCT cluster control protocol (CCP) synchronizes MAC, ARP, IGMP, MLD tables, and
cluster management data between the MCT peers, for node resiliency and faster convergence.
On the SLX devices, the data plane is established using a VxLAN tunnel between MCT peers.
SLX-OS MCT provides Layer 3 protocol support for ARP, IPv4 and IPv6 BGP, OSPF, PIM, IGMP, MLD,
ND6, and IS-IS through a VLAN or bridge domain VE interface. IPv4 or IPv6 Virtual Routing
Redundancy Protocol (VRRP) and VRRP Extended (VRRP-E). is also supported.
Extreme SLX-OS
76 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) MCT terminology
SLX-OS MCT is only supported in the Default or Apptelemetry Hardware TCAM Profile.
MCT terminology
Before implementing MCT in your network, the following table provides a list of MCT terminology and
their definitions.
MCT peer devices A pair of SLX-OS device configured as peers. The LAG interface is spread
across two MCT peer devices and acts as the single logical endpoint to the
MCT client.
Note: MCT is supported across the same chassis type only; for example,
SLX-9540 <---> SLX-9540.
MCT Cluster Client The MCT Cluster Client is the device that connects with the MCT peer
devices. It can be a switch or an endpoint server host in the single-level MCT
topology, or another pair of MCT switches in a multi-tier MCT topology.
MCT Cluster Control The control plane for Layer 2 MCT on the SLX-OS device.
Protocol
MCT Cluster Client Edge Ports connected to the dual-homed clients. CCEP Ports could be a LAG or a
Port (CCEP) physical port.
MCT Cluster Edge Port Orphan or edge ports connected to one of the MCT nodes.
(CEP)
Inter-Chassis Link (ICL) Inter-Chassis Link which connects two MCT nodes. For SLX-OS devices, the
ICL is a VxLAN tunnel created between the MCT peer that forms the data
path.
MCT VLANs VLANs that are shared by the MCT peers. These VLANs are explicitly
configured in the MCT configuration.
Designated Forwarder MCT node that is elected to send BUM traffic to a tunnel client for particular
(DF) VLAN or BD.
The control plane session requires a direct link btween the nodes (peer-interface) to be operational.The
control plane session is used to exchange the following information:
• MCT client discovery
• MCT client VLAN/BD configuration information
• Route exchanges – MAC, MAC/IP, IGMP
• Keep-alive peer IP in auto discovery mode
• Other required state/signaling for protocols, such as PIM, and mac-move detection
A cluster control protocol (CCP) session is used to exchange MAC, MAC/IP and IGMP routes between
the MCT peers. A cache is created within the MCT process to hold MAC, ARP and IGMP routes. For the
VLANs/BDs that are shared between the MCT nodes, all local routes received from L2, ARP and
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 77
MCT Data Plane for the SLX Devices Multi-Chassis Trunking (MCT)
multicast modules are stored in L2RIB and advertised to the MCT peer. Routes in L2RIB have the
following possible sources:
• Locally learned
• MCT Peer
A route selection algorithm is run to determine the best route and download only that route for
installation in hardware. L2RIB also generates a sequence number for the routes and passes this on to
BGP for MAC mobility and MAC dampening purposes. L2RIB does not include a dampening logic and
relies on the MAC move detection feature to detect and mitigate layer-2 loops.
Local routes from l2/arp/multicast modules are cached and advertised to mct-peer and BGP based on
vlan/bd extension. Similarly remote routes from MCT peer and BGP are cached in mct process and
advertised to L2/ARP/Multicast processes for hardware programming.
The underlay interface carrying the traffic can be any physical port or port-channel Layer 3 interface
between the MCT peers. VE's are not supported. By default, all MCT VLANs or bridge domains (BDs) are
extended to the MCT peer.
By default, VLAN-VNI mapping is automatically configured for the ICL VxLAN tunnel. Since a single
VLAN-VNI mapping domain is supported, any change to this mapping under the overlay gateway
changes the mapping for the ICL and temporarily affects its traffic.
When the client state is up on both MCT peers, one MCT node becomes DF for all odd-numbered
VLANs/BDs and the other becomes DF for all even-numbered VLANs/BDs. For a PW client, this is run
globally, whereas for VxLAN clients this is run per VxLAN tunnel.
If the VxLAN tunnel client is down on one side, the corresponding tunnel on the peer node becomes the
DF for all VLANs/BDs extended on it.
Extreme SLX-OS
78 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) MCT Data Plane for the SLX Devices
• Unicast traffic from Host A and Host B to Host 1 can be hashed to Leaf 1 and Leaf 2.
• Leaf 1 learns the MAC address of Host 1. This traffic is locally switched.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 79
MCT Data Plane for the SLX Devices Multi-Chassis Trunking (MCT)
• Leaf 2 has the remote MAC address of Host 1 against the tunnel. This traffic is sent over the ICL.
• The MAC addresses of Host A and Host B are learned as CCL and CCR pointing to the local client
port (Po10 and Po20).
For the unicast traffic from the CEP to the CCEP, refer to the following figure.
• Leaf2 learns the MAC address of Host 2 that is synchronized to Leaf 1. The Unicast traffic from Host 1
to Host 2 is sent over the ICL tunnel to Leaf2 and then is locally switched.
• Based on the learned CCL and CCR MAC addresses, Leaf1 locally switches the unicast traffic from
Host 1 to Host A and Host B.
If the local client port goes down, the client MAC address is reprogrammed in the hardware to point to
the ICL tunnel. Then the traffic is sent over the ICL to Leaf2 where the learned CCL and CCR MAC
addresses ensure the traffic is switched to the client.
Figure 8: Unicast forwarding traffic from the CEP to the CCEP (local client down)
Extreme SLX-OS
80 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) MCT Data Plane for the SLX Devices
Then Leaf 2 floods the packet to Host 2 over Ethernet 0/3, and but traffic to Host A and Host B over
Po10 and Po20 is supressed.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 81
MAC management Multi-Chassis Trunking (MCT)
MAC management
In MCT topologies, MAC addresses can be learned either on local CCEP or CEP interfaces, or from the
remote MCT node. If the same MAC is learned from both MCT nodes, then MAC entries learned locally
have higher priority than the one learned from the remote peer.
For remote MAC addresses, aging is disabled, and they can only be deleted when delete notifications
are received from the remote node that advertised it before for learning.
The MCT static MAC addresses configured on a local node are advertised to remote MCT node for
learning. While advertising the MAC using the MAC advertisement route, it uses the MAC mobility
extended-community route to identify the MAC as static using the sticky MAC field. On the remote
node, when MAC advertisement is received for a static MAC address, the sticky MAC information is
saved along with the MAC entry.
When an MCT static MAC address is deleted, a MAC withdrawal route is sent to the remote peer to
delete the MAC entry from its database.
When a CEP interface is down and if any static MAC entries are present, MAC Delete messages are sent
to the remote node to flush the entries.
Extreme SLX-OS
82 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) MAC management
When a CCEP interface is down and if any static MAC entries are associated with the client, the MAC
addresses are moved to point to the remote MCT peer. The MAC addresses are moved back to the CCEP
when the interface comes back up.
On a local MCT node, when a cluster is UP and you configure a static MAC on a CEP or CCEP interface,
the node synchronizes the MAC address to the remote MCT node. The remote node processes the MAC
address and adds it to the FDB. On the remote MCT node, you can configure the same MAC as the static
MAC address for the client 1 CCEP interface since it is configured on the same client CCEP interface. No
additional static MAC configurations on the remote node are required since the same MAC are already
part of the local MCT node.
When the cluster is down on the local and remote MCT nodes, both nodes are independent as clusters
that can be independently configured with the static MAC addresses for the CEP or CCEP interface.
However, when the cluster is brought up, the static MAC addresses are synchronized from both nodes
and the addresses on the remote node are rejected since the local configuration takes precedence. The
misconfiguration remains until corrected.
MAC learning
MAC learning over CEP interfaces is similar to Layer 2 learning where the MAC advertisement route is
sent to the cluster peer to synchronize the learned MAC address. MAC learning over CCEP interfaces is a
two-step process in which the MAC entry is added into the MDB first. The best MAC entry is chosen and
installed into the FDB and the MAC advertisement route is sent to the cluster peer for synchronization
of the learned MAC address.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 83
MAC management Multi-Chassis Trunking (MCT)
MAC movement
A MAC address is considered to be moved when the same MAC address is received on a different
interface with same VLAN. In MCT, a MAC movement is allowed on both local and remote nodes.
Extreme SLX-OS
84 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) MCT configuration considerations
General considerations
• MCT Peers need to run the same version of SLX-OS.
• MCT does not support any variant of Spanning Tree Protocol (STP) on ICL links, cluster client ports,
or any VLAN that is part of the cluster. STP is disabled by default.
Note
If you enable STP on MCT nodes, each node acts as an independent (not interconnected)
STP switch. This situation results in STP state flap at the node connected to the CCEP port,
because it receives two different Bridge Protocol Data Units (BPDU) on that CCEP port
• SLX-OS supports dynamic and static LAG between the MCT node and client.
• SLX MCT configurations (Layer 2 or Layer 3) do not require the Advance Feature license.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 85
Peer considerations Multi-Chassis Trunking (MCT)
Peer considerations
• For both MCT peers, the MCT peer IP address must match the source IP address of the peer node.
• The source IP and the peer IP should be in the same subnet.
• You must configure the same client ID on both MCT peers for the link or CCEP that is connected to
the same client.
• SLX MCT peers must be physically connected to each other.
VLAN considerations
• If you configure an MCT port channel for multiple VLAN or VE interfaces, use static routes instead of
OSPF ECMP.
◦ As a best practice, configure a static route for MCT peers through the MCT VLAN (VE 10 in this
example). A static route has a lower administrative distance than OSPF and places only one route
in the routing table.
LACP considerations
• A common system ID is used on both MCT nodes. This is a fixed value.
• The LACP fields have the following settings:
Key = MCT_LACP_KEY_BASE (3000) + client_ID
Configuring MCT
Configure the local and remote MCT cluster and cluster clients.
The peer IP address is the IP address configured on the peer switch for the peer-interface.
4. Configure the peer interface.
device(config-cluster-leaf1_2)# peer-interface port-channel 40
Extreme SLX-OS
86 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) Taking the MCT node offline for maintenance
Peer Info:
==========
Peer IP: 15.1.1.1, State: Up
Peer Interface: Port-channel 256, Source IP: 15.1.1.2
Keep-Alive:
==========
IP: 10.20.232.52, State: Up
Interface: Management 0 (mgmt-vrf), Source IP: 10.20.233.224
Client-Isolation Role: Primary
Client Info:
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 87
Configuring additional MCT cluster parameters Multi-Chassis Trunking (MCT)
============
Interface Id Description Local/Remote State
Exceptions
--------- -- ----------- ------------------
----------
Port-channel 1 1001 Up /
Up
Port-channel 2 1002 Up /
Up
Tunnel 32771 42.42.42.42 VxLAN Up /
Up
PW 34816 VPLS/VLL Down / Down
Client Down
Note
Do not write the configuration changes made in the previous steps to the startup-
configuration file.
To bring the MCT node back online, perform one of the following actions.
• If you upgraded or downgraded the device, select the coldboot option under the firmware
download menu.
• For any other reason, execute the reload system command. Since the changed configuration
was not saved, the reload reverts the configuration changes that had taken the MCT node offline.
Peer Keepalive
The peer-keepalive feature helps in distinguishing interface failure and cluster peer node failure, and
takes action accordingly. An out-of-band keep-alive session is recommended between the nodes. This
helps to distinguish peer-interface failures from peer node reboot. Different actions can then be taken
for these peer-interface failures.
Extreme SLX-OS
88 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) Configuring peer-keepalive destination
The peer-keepalive role determines the node’s behavior when the ICL goes down, but the MCT
peer remains up.
• Use auto to assign roles automatically. By default, node with lower IP is selected as primary and
higher IP is selected as secondary. This behavior can be changed by manually assigning the primary/
secondary role under the cluster.
• The primary role is responsible for forwarding all traffic when the ICL goes down. It keeps all the
cluster-client ports up and becomes the Designated Forwarder for all VLANs/BDs on the tunnels
and PWs.
• The secondary role isolates the secondary node, brings down all client interfaces and tunnels, and
isolates all client traffic. this behavior is only effective when the keep-alive session is up while CCP
session goes down. In all other cases, primary and secondary will not have an impact on
functionality.
When a keep-alive session goes down but the CCP session remains up, the cluster continues to operate
in regular mode. No traffic flow change is observed. This mode is not recommended because there is no
peer-link protection. If the CCP session were also to go down, the behavior would be same as a peer
reload; both nodes would keep the clients up and become the DF for all VLANs/BDs.
Use the peer-keepalive command to configure the peer-keepalive mode on a node, as shown in
the following example.
device(config)# cluster leaf1_2
device(config-cluster-leaf1_2)# peer-keepalive
device(config-peer-keepalive)# role primary
device(config-peer-keepalive)#
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 89
Displaying MCT information Multi-Chassis Trunking (MCT)
Cluster S1-A1
==============
Cluster State: Active
Bringup Delay: 90 seconds
Configured Member Vlan Range: All
Active Member Vlan Range: 1-4090
Configured Member BD Range: All
Active Member BD Range: 1-500
No. of Clients: 9
Peer Info:
----------
Peer IP: 12.0.0.2, State: Up
Peer Interface: Port-channel 1, Source IP: 12.0.0.1
Keep-Alive:
==========
IP: 10.20.161.158, State: Up
Interface: Management 0 (mgmt-vrf), Source IP: 10.20.161.185
Client-Isolation Role: Secondary
Client Info:
============
Interface Id Description Local/Remote State
Exceptions
--------- -- ----------- ------------------
----------
Port-channel 11 1 towards Fusion-1 1 Up /
Up
Port-channel 12 2 towards Fusion-2 1 Up /
Up
Port-channel 13 3 towards Avalanche-2 Up /
Up
Port-channel 14 4 towards Fusion-1 2 Up /
Up
Port-channel 15 5 towards Aval-2 2 Up /
Up
Port-channel 16 6 towards MLXe8 Up /
Up
Port-channel 17 7 towards MLXe4 Up /
Up
Port-channel 18 8 towards NH-9150 Down / Down
Client Down n
Port-channel 19 9 towards MLXe8 Static Up / Up
Extreme SLX-OS
90 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) Displaying member VLAN information
------------
Interface: Port-channel 20, client-id: 1020, Deployed, State: Up
Description : U27
Local Vlans : 1,61-300
Local Bridge Domains : 20,100
Remote Vlans : 1,61-300
Remote Bridge Domains : 20
DF Elected for all vlans/BDs
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 91
VPLS and VLL MCT on the SLX 9640 and 9540 devices Multi-Chassis Trunking (MCT)
The MAC Type for an MCT cluster displays the following information:
• For the client MAC behavior, MAC addresses are learned as CCL on the local MCT node and CCR on
the remote MCT node pointing to the CCEP interface.
• For static MAC addresses over client interfaces, Static-CCL and CCR are displayed.
You can also view the MAC entries for a specific client.
When the remote MCT peer receives the MAC withdrawal message, it only deletes the remote MAC
entry. To clear MAC addresses on both nodes, you must issue clear mac-address-table
commands on both MCT nodes.
VPLS and VLL MCT on the SLX 9640 and 9540 devices
On the SLX 9640 and SLX 9540 devices, VPLS and VLL MCT are used for data center interconnection in
which SLX-OS MCT acts as a data center gateway to connect to another data center through either the
VPLS or VLL WAN connection.
Note
For more information on VPLS and VLL, refer to the "VPLS and VLL Layer 2 VPN services"
chapter.
For VPLS MCT, a point-to-multipoint (p2mp) bridge domain is added to the MCT cluster. For VLL MCT, a
point-to-point (p2p) bridge domain is added to the MCT cluster. The VPLS or VLL horizon is added as a
pseudowire (PW) client.
VPLS/VLL MCT supports PW redundancy. At any point of time, one active-active PW path exists to
reach the destination. The node on which the PW is active is called the active node. The endpoint traffic
coming from the standby node traverses through the MCT ICL session to the active node for that
instance and the active MCT node takes care of the forwarding to the remote VPLS or VLL peer.
Note
For SLX-OS, the MCT cluster requires both nodes to be on SLX-OS devices. However, an SLX-
OS MCT cluster that connects to a Extreme MLX cluster through VPLS or VLL is supported.
The bridge domain is mapped to a CCP instance. For each BD, the default CCP ID is the BD ID plus
4,096. A user configured CCP ID is not supported. The CCP ID for the VLAN is the VLAN ID.
Extreme SLX-OS
92 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) PW state in VPLS or VLL MCT
For VPLS or VLL MCT, the physical and LAG CCEP operate in active/active multi-homing mode.
However, the PW operates in active/standby mode.
The designated forwarder (DF) state of the PW-Client ID represents the active PW node state for a
VPLS or VLL instance. The DF election process for the PW ESI is the same as the Layer 2 process.
However, VPLS and VLL MCT in the following dynamic cases do not change their role, and are driven
through the PW horizon client.
• If the local endpoint is down, the remote endpoint is up.
• If the active-active PW is down on the active node, the PW on the standby node will not change to
active-active.
Status TLV support is enabled through a VLL (only) instance if one of the following is true.
• VLL is configured with two remote peers.
• The VLL endpoint is a MCT client CCEP port.
To support PW redundancy, configure two VLL peers under one VLL instance. One PW is for each VLL
peer. Among these PWs, an active-active PW is selected and used for traffic flow to the remote side. An
active-active PW is selected based on the local and remote PW redundancy preferences. A remote PW
redundancy preference is received by the PW status TLV. When the bit is set, it indicates PW forwarding
standby. When the bit is cleared, it indicates PW forwarding active.
When the PW is in active operational state, the data plane objects (such as LIF or MGID, or cross-
connect for VLL) is created and be programmed into the hardware. When the PW is in standby
operational state, the data plane is programmed as if this PW is down.
Note
The SLX-OS PW state table is the same as the Extreme NetIron VPLS-MCT or VLL-MCT PW
state table to ensure compatibility when facing an MLX MCT cluster over a VPLS or VLL
connection.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 93
VLL-MCT data plane Multi-Chassis Trunking (MCT)
A topology for VLL MCT is provided in the following figure. Two MCT clusters face each other and four
PWs connect the clusters.
Note
This topology is for only one BD. Since the DF state is selected per BD, another BD can use a
different PE as the active node.
Note
VLL MCT does not use MAC learning. BUM traffic handling is not required. It uses cross-
connect instead of VSI.
Extreme SLX-OS
94 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) VPLS-MCT data plane
Note
For active-active PW link protection when the PW redundancy status changes, the device
relies on the MPLS configuration. There should not be a case where PW2 is down and PW4 is
up. The configuration ensures that both PW2 and PW4 are UP or DOWN. When PW2 is not
active-active due to a role change on PE4, PW1 will become active-active.
The main case topology for VPLS MCT is provided in the following figure. Two MCT clusters face each
other and four PWs connect the clusters.
Note
This topology is for only one BD. Since the DF state is selected per BD, another BD can use a
different PE as the active node.
When VPLS MCT is activated, only one PW is operationally active between the MCT clusters, as
represented by the solid line. The operational standby PW is represented by the dotted lines.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 95
VPLS-MCT data plane Multi-Chassis Trunking (MCT)
The following figure shows the BUM packet flow after an MCT PE switch-over event.
Extreme SLX-OS
96 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) VPLS MAC Management
Note
VPLS MCT does not support PW link protection.
For MCT remote MAC addresses, aging is disabled, and they can only be deleted when delete
notifications are received from the remote MCT node that previously advertised it for learning.
VPLS MAC addresses that are learned locally are classified as Dynamic, and the corresponding VPLS
MAC addresses that are learned remotely are classified as Cluster Remote (CR).
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 97
VPLS MAC Management Multi-Chassis Trunking (MCT)
MAC learning
MAC addresses learned from the PW on the active PE triggers CR MAC synchronization messages that
are sent to the peer. The PW ESI is used in this MAC route. VPLS CR MAC addresses point to the active
MCT node since no local forwarding path on the standby PE traffic is expected to be switched by the
active MCT node.
MAC aging
When the VPLS MAC ages on the active node, the MAC address is locally flushed and the CR MAC
withdrawal route is sent to remote MCT node to flush the MAC.
The following table describes the allowed VPLS MAC movements in MCT.
Extreme SLX-OS
98 Layer 2 Switching Configuration Guide, 20.1.1
Configuration Considerations and Limitations for VPLS
Multi-Chassis Trunking (MCT) and VLL MCT
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 99
Configuring MCT for VPLS or VLL Multi-Chassis Trunking (MCT)
For information on configuring VLL or VPLS bridge domains, refer to the "VPLS and VLL Layer 2 VPN
services" chapter.
For information on configuring the MCT cluster and client, refer to Configuring MCT on page 86. Their
full configuration is provided in the example after the steps.
Perform the following steps to configure MCT for VPLS or VLL.
Only one instance of the PW client represents all VPLS or VLL PWs over all bridge domains.
6. Configure the member bridge-domain for MCT.
device(config-cluster-leaf1_2)# member bridge-domain all
8. Set the IP address and subnet mask for the port-channel interface.
device(config-Port-channel-40)# ip address 40.1.1.1/24
The following example are the steps in the previous configuration with the additional configuration of
the MCT cluster and client.
device# configure terminal
device(config)# cluster leaf1_2
device(config-cluster-leaf1_2)# peer 40.1.1.2
device(config-cluster-leaf1_2)# peer-interface port-channel 40
device(config-cluster-leaf1_2)# client-pw
device(config-cluster-leaf1_2)# member bridge-domain all
device(config-cluster-leaf1_2)# int port-channel 40
Extreme SLX-OS
100 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) Displaying information related to VPLS and VLL MCT
Peer Info:
==========
Peer IP: 4.1.1.10, State: Up
Peer Interface: Ethernet 0/4, Source IP: 4.1.1.11
Keep-Alive:
==========
IP: 10.24.8.220, State: Up
Interface: Management 0 (mgmt-vrf), Source IP: 10.24.8.221
Client-Isolation Role: Primary
Client Info:
============
Interface Id Description Local/Remote State
Exceptions
--------- -- ----------- ------------------
----------
Port-channel 10 1010 Up /
Up
PW 34816 Up /
Up
The following example displays only PW client and its bridge-domain information on the MCT cluster.
device# show cluster client-pw
Client Info:
============
Interface: PW, client-id: 34816, Deployed, State: Up
Description:
Local Vlans:
Local Bridge Domains : 501
Remote Vlans :
Remote Bridge Domains : 501
Number of DF Vlans : 0
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 101
Displaying information related to VPLS and VLL MCT Multi-Chassis Trunking (MCT)
The following example displays the multicast and unicast labels, and forwarding state for the cluster
member bridge domain.
device# show cluster member bridge-domain
BD-ID VNI-ID Forwarding state
------- ------ -------------------
501 4597 Up
VC id: 501, Peer address: 9.9.9.9, State: Operational, uptime: 12 min 44 sec
Load-balance: False, Cos Enabled: False,
Tunnel cnt: 1
rsvp to_a9 (cos_enable:False cos_value:0)
Assigned LSPs count:0 Assigned LSPs:
Local VC lbl: 800769, Remote VC lbl: 866325,
Local VC MTU: 1500, Remote VC MTU: 1500,
Local VC-Type: 5, Remote VC-Type: 5
Local PW preferential Status: Active, Remote PW preferential Status: Active
Local Flow Label Tx: Disabled, Local Flow Label Rx: Disabled
Remote Flow Label Tx: Disabled, Remote Flow Label Rx: Disabled
Local Control Word: Disabled, Remote Control Word: Disabled
Displaying MAC address information for a VPLS bridge domain on an MCT cluster
The following example displays the MAC address table for bridge domain of an MCT cluster.
device# show mac-address-table bridge-domain
Type Code - CCL:Cluster Client Local MAC
CCR:Cluster Client Remote MAC
CR:Cluster Remote MAC
VlanId/BDId Mac-address Type State Ports/LIF/PW/T
501 (B) 0000.0500.0200 Dynamic Active 9.9.9.9
501 (B) 0000.0500.0500 Dynamic-CCL Active Po 10.501
Total MAC addresses : 2
Extreme SLX-OS
102 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) Layer 3 routing over MCT
The following example displays all the MAC addresses learned from other VPLS PE nodes over MCT
bridge domains.
device# show mac-address-table bridge-domain
Type Code - CCL:Cluster Client Local MAC
CCR:Cluster Client Remote MAC
CR:Cluster Remote MAC
BDId Mac-address Type State Ports/LIF/PW/T
501 (B) 0000.0500.0200 CR Active Tu 32769 (4.1.1.11)
501 (B) 0000.0500.0500 CCR Active Po 10.501
Total MAC addresses : 2
All devices are on the same VE and receive protocol Hello packets. Over the ICL link, the following
packets are flooded:
• Hello and multicast packets from PE1 and PE2
• ARP and ND6 packets
Configuration considerations
You must first create the VE interface for the MCT VLAN or bridge domain on the MCT pair.
For routes learned over Layer 3 protocols, the next-hop IP address is usually the peer IP address and not
necessarily the MCT router address.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 103
Layer 3 MCT VLAN configuration example Multi-Chassis Trunking (MCT)
To bind the VE interface to an MCT VLAN or bridge domain, use the router-interface ve
command under VLAN or bridge-domain configuration mode, respectively. The following example
shows how to bind VE 200 to bridge domain 2.
device# configure terminal
device(config)# bridge-domain 2
device(config-bridge-domain-2)# router-interface ve 200
Note
Where supported, MPLS cannot be enabled for a VE over an MCT VLAN interface.
PE1:
router ospf
area 0
vlan 2
router-interface Ve 200
interface Ve 200
ipv6 address 2001::1/64
ip address 10.2.2.1/24
ip ospf area 0
ipv6 ospf area 0
!
no shutdown
!
PE2:
router ospf
area 0
vlan 2
router-interface Ve 200
interface Ve 200
ipv6 address 2001::2/64
ip address 10.2.2.2/24
ip ospf area 0
ipv6 ospf area 0
!
no shutdown
!
Extreme SLX-OS
104 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) Layer 3 MCT bridge-domain configuration example
CE_A:
router ospf
area 0
vlan 2
router-interface Ve 200
interface Ve 200
ipv6 address 2001::10/64
ip address 10.2.2.10/24
ip ospf area 0
ipv6 ospf area 0
!
no shutdown
!
PE1:
router ospf
area 0
interface Ve 200
ipv6 address 2001::1/64
ip address 10.2.2.1/24
!
ip ospf area 0
ipv6 ospf area 0
!
no shutdown
bridge-domain 2 p2mp
router-interface Ve200
logical-interface ethernet 0/1.2
pw-profile default
bpdu-drop-enable
local-switching
!
PE2:
router ospf
area 0
interface Ve 200
ipv6 address 2001::2/64
ip address 10.2.2.2/24
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 105
Using MCT with VRRP and VRRP-E Multi-Chassis Trunking (MCT)
!
ip ospf area 0
ipv6 ospf area 0
!
no shutdown
bridge-domain 2 p2mp
router-interface Ve200
logical-interface ethernet 0/1.2
pw-profile default
bpdu-drop-enable
local-switching
!
CE_A:
router ospf
area 0
interface Ve 200
ipv6 address 2001::10/64
ip address 10.2.2.10/24
!
ip ospf area 0
ipv6 ospf area 0
!
no shutdown
bridge-domain 2 p2mp
router-interface Ve200
logical-interface ethernet 0/1.2
pw-profile default
bpdu-drop-enable
local-switching
The MCT device that acts as the Virtual Routing Redundancy Protocol (VRRP) and VRRP Extended
(VRRP-E) backup router performs as a Layer 2 switch to pass the packets to the VRRP or VRRP-E
master router for forwarding. Through MAC synchronization, the VRRP or VRRP-E backup router learns
the virtual MAC (VMAC) on the Inter-Chassis Link (ICL). The data traffic and control traffic both pass
through the ICL cloud from the backup router. If VRRP-E short path forwarding is enabled, the backup
router can forward the packets directly, instead of sending them to the master.
Note
Short path forwarding is only supported on VRRP-E.
In the MCT short path forwarding diagram below, when an ARP request from the S1 switch device is
sent through the direct link to the VRRP or VRRP-E backup router (PE2), that same request is flooded
through the ICL and received by the VRRP/E master router (PE1) for processing. When the ARP request
Extreme SLX-OS
106 Layer 2 Switching Configuration Guide, 20.1.1
MCT short path forwarding configuration using VRRP-E
Multi-Chassis Trunking (MCT) example
is received by the PE1 device, PE1 sends a reply through the direct link to S1. If the ARP reply was
received before the MAC address for the MCT on S1 is learned, the reply packet may be flooded to both
the Customer Client Edge Port (CCEP) ports and ICL ports.
Using VRRP or VRRP-E, data traffic received from a client device on a backup router is Layer 2 switched
to the master device. If VRRP-E short path forwarding is enabled, traffic received on the backup device
may be forwarded by the backup if the route to the destination device is shorted than through the
master device.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 107
PE1 configuration Multi-Chassis Trunking (MCT)
PE1 configuration
The following example configures the cluster for the PE1 router in the diagram. A VRRP-E priority value
of 110 (higher than the device at PE2) allows the PE1 device to assume the role of VRRP-E master.
Extreme SLX-OS
108 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) PE2 configuration
PE2 configuration
The following example configures the cluster for the PE2 router in the diagram. A VRRP-E priority value
of 80 (lower than the device at PE1) allows the PE2 device to assume the role of a VRRP-E backup
device.
interface Ethernet 0/3
ip address 10.1.8.32/24
no shutdown
!
vlan 100
!
interface Ethernet 0/7
switchport
switchport mode trunk-no-default-native
switchport trunk allow vlan add 100
no shutdown
!
cluster <optional-cluster-name>
peer 10.1.8.19
peer-interface Ethernet 0/3
peer-keepalive
auto
!
member vlan all
member bridge-domain all
!
vlan 100
router-interface Ve 100
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 109
MCT Use Cases Multi-Chassis Trunking (MCT)
!
protocol vrrp-extended
!
interface Ve 100
ip proxy-arp
ip address 10.2.3.5/24
vrrp-extended-group 1
priority 80
short-path-forwarding
virtual-ip 10.2.3.4
no shutdown
!
interface Ve 100
ipv6 address fe80::1:1 link-local
ipv6 address 3313::3/64
ipv6 vrrp-extended-group 1
virtual-ip 3313::1
Extreme SLX-OS
110 Layer 2 Switching Configuration Guide, 20.1.1
Multi-Chassis Trunking (MCT) L2 MCT in the data center core
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 111
L2 MCT in a data center with a collapsed core and
aggregation Multi-Chassis Trunking (MCT)
Extreme SLX-OS
112 Layer 2 Switching Configuration Guide, 20.1.1
L2 MCT in a data center with a collapsed core and
Multi-Chassis Trunking (MCT) aggregation
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 113
Logical Interfaces
Logical interfaces overview on page 114
Configuring a logical interface on a physical port or port-channel (LAG)
on page 115
This feature facilitates the support of future forwarding technologies without the need to modify code
design in various software components.
A forwarding interface is also known as "main interface." It can be a physical port, a port-channel (Link
Aggregation Group, or LAG), a pseudowire (PW), a tunnel, and so on. A logical interface can also be
thought of as a subinterface configuration on top of a main interface.
Note
Currently the only LIFs that require explicit user configuration are attachment circuit (AC)
LIFs.
Configuration considerations
The following are some common rules to consider in configuring logical interfaces:
• By default, when the LIF is created it is configured as "no shutdown."
• By default, when the LIF is created, it is "tagged" unless it is explicitly configured with the
"untagged" option.
• Allowed LIF service instance ID ranges are from 1 through 12288.
• An LIF service instance ID has no correlation to the VLAN ID of the LIF.
Extreme SLX-OS
114 Layer 2 Switching Configuration Guide, 20.1.1
Configuring a logical interface on a physical port or
Logical Interfaces port-channel (LAG)
• Each physical/LAG-based LIF must have an associated VLAN configured or else it will not be usable
when the user attempts to add it to a service (such as VPLS, Layer 2). Such a configuration request
to add the LIF to a service will be rejected.
• Once the LIF is associated with a Layer 2 service, its VLAN value cannot be changed or deleted
unless it is first removed from the associated service. In case the LIF is not yet associated to a
service, the user is free to remove the VLAN configuration or change the VLAN assignment.
• The no option to the logical-interface command can be applied at any time.
• The "untagged" configuration is allowed for only one LIF under the same physical port or LAG. If one
LIF is already configured as untagged, all subsequent attempts on the same physical port or LAG are
rejected.
• Once the "untagged" option is selected, it will only have one VLAN as the next classification option.
There is no dual-tag support for the untagged case.
• In order to configure an untagged LIF, the main interface must be configured as "switchport mode
trunk-no-default-native". If it is configured set to regular trunk mode, the native VLAN is already
associated with a regular Layer 2 VLAN LIF and no explicit untagged LIF can be configured on that
interface.
• Once the LIF is associated with a service (Layer 2) such as a bridge domain, its "untagged/tagged"
configuration cannot be changed. The service instance or its current VLAN classification must be
deleted by the user first and then added back with the proper "untagged/tagged" option.
• VLANs 4091 through 4095 are reserved VLANs and these should not be used as the VLAN ID for
either the inner or outer VLAN of the LIF.
• The VLAN specified under the LIF ensures that such a VLAN is not already configured under the
switchport command for a regular Layer 2 allowed VLAN.
If the interface is already configured as "switchport access," then it is not allowed to be configured with
LIF. The reverse condition is also not allowed: the interface cannot be changed to mode access if a LIF is
still configured under the main interface.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 115
Configuring a logical interface on a physical port or
port-channel (LAG) Logical Interfaces
f. Enter the logical-interface command, specify a service instance, and enter LIF
configuration mode.
device(conf-if-eth-0/6)# logical-interface ethernet 0/6.120
g. (Optional) Enter the name command to facilitate the management of the LIF.
device(conf-if-eth-lif-0/6.120)# name myLIF120
h. Enter the vlan command with the inner-vlan option to specify an interface and create dual-
tag VLANs.
device(conf-if-eth-lif-0/6.120)# vlan 120 inner-vlan 200
i. Alternatively, enter the untagged vlan command to specify that the LIF is to receive
untagged packets.
device(conf-if-eth-lif-0/6.120)# untagged vlan 120
k. (Optional) For convenience, you can also enter up to two options in a single command line, as in
the following examples.
device(conf-if-eth-0/6)# logical-interface ethernet 0/6.120 name myLIF120
2. To configure a port-channel, configure the basic LIF parameters and options as in Step 1.
a. Specify a port-channel, set its mode to "trunk-no-default-native," and specify a logical interface
service instance.
device(config)# interface port-channel 10
device(config-port-channel-10)# switchport mode trunk-no-default-native
device(config-port-channel-10)# logical-interface port-channel 10.3
device(config-if-po-lif-10.3)#
Extreme SLX-OS
116 Layer 2 Switching Configuration Guide, 20.1.1
Bridge Domains
Bridge domain overview on page 117
Configuring a bridge domain on page 118
Displaying bridge-domain configuration information on page 119
Enabling statistics on a bridge domain on page 123
Displaying statistics for logical interfaces in bridge domains on page 123
Clearing statistics on bridge domains on page 124
A bridge domain is a generic broadcast domain that is not tied to a specific transport technology.
Bridge domains support a wide range of service endpoints including regular L2 endpoints and L2
endpoints over L3 technologies.
Bridge domains switch packets between a range of different endpoint types; for example, attachment
circuit (AC) endpoints, Virtual Private LAN Service (VPLS) endpoints, Virtual Leased Line (VLL)
endpoints, and tunnel endpoints.
A bridge domain that is created for a VPLS application is also referred to as a VPLS instance.
Statistics must be manually enabled for a specific bridge domain, since statistics for bridge domains are
not enabled by default.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 117
Configuring a bridge domain Bridge Domains
Use the statistics command in bridge domain configuration mode to enable statistics on a bridge
domain.
Note
• The statistics reported are not real-time statistics since they depend upon the load on the
system.
• Enabling statistics on a bridge domain has a heavy impact on data traffic.
• For optimum utilization of the statistics resources in the hardware, statistics on a bridge
domain are not enabled by default.
There is an example at the end of this task that shows all the configuration steps in order.
By default, the bridge-domain service type is multipoint (p2mp). In this example, bridge domain 5 is
configured as a point-to-point service (p2p).
3. Note
Logical interfaces representing bridge-domain endpoints must be created before they can
be bound to a bridge domain. For further information, refer to Logical Interfaces.
Bind the logical interfaces for attachment circuit endpoints to the bridge domain.
In this example, port channel logical interface 2.200 is bound to bridge domain 5.
5. (Optional) Enable local switching for bridge domain 5.
device(config-bridge-domain-5)# local-switching
Extreme SLX-OS
118 Layer 2 Switching Configuration Guide, 20.1.1
Bridge Domains Displaying bridge-domain configuration information
6. (Optional) Enable dropping L2 bridge protocol data units (BPDUs) for bridge domain 5.
device(config-bridge-domain-5)# bpdu-drop-enable
The following example creates bridge domain 5. It binds ethernet and port-channel logical interfaces to
the bridge domain. It configures local switching, and enables dropping of L2 BPDUs.
Bridge-domain 1
-------------------------------
Bridge-domain Type: mp , VC-ID: 5
Number of configured end-points: 5 , Number of Active end-points: 4
VE if-indx: 1207959555, Local switching: TRUE, bpdu-drop-enable:TRUE
PW-profile: 1, mac-limit: 128000
Number of Mac’s learned:90000, Static-mac count: 10,
VLAN: 100, Tagged ports: 2(2 up), Un-tagged ports: 0 (0 up)
Tagged ports: Eth 0/6, eth 0/8
Un-tagged ports:
Bridge-domain 2
-------------------------------
Bridge-domain Type: mp , VC-ID: 100
Number of configured end-points: 5 , Number of Active end-points: 4
VE if-indx: NA, Local switching: FALSE, bpdu-drop-enable:FALSE
PW-profile: profile_1, mac-limit: 262144
Number of Mac’s learned:90000, Static-mac count: 10,
VLAN: 100, Tagged ports: 2(1 up), Un-tagged ports: 0 (0 up)
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 119
Displaying bridge-domain configuration information Bridge Domains
Bridge-domain 3
-------------------------------
Bridge-domain Type: mp , VC-ID: 200
Number of configured end-points: 5 , Number of Active end-points: 4
VE if-indx: 120793855, Local switching: FALSE, bpdu-drop-enable:FALSE
PW-profile: 2, mac-limit: 262144
Number of Mac’s learned:90000, Static-mac count: 10,
Local switching: TRUE,
VLAN: 500, Tagged ports: 2(2 up), Un-tagged ports: 2 (1 up)
Tagged ports: eth 0/6, eth 0/3
Un-tagged ports:
Bridge-domain 501
-------------------------------
Bridge-domain Type: MP , VC-ID: 501
Number of configured end-points: 2 , Number of Active end-points: 2
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
PW-profile: default, mac-limit: 0
VLAN: 501, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged Ports: eth 0/6.501
Un-tagged Ports:
Total VPLS peers: 1 (1 Operational):
Extreme SLX-OS
120 Layer 2 Switching Configuration Guide, 20.1.1
Bridge Domains Displaying bridge-domain configuration information
The following example shows information about a bridge domain (501) in which the load-
balance option is configured for the peer device 10.9.9.9.
show bridge-domain 501
Bridge-domain 501
-------------------------------
Bridge-domain Type: MP , VC-ID: 501
Number of configured end-points: 2 , Number of Active end-points: 2
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
PW-profile: default, mac-limit: 0
VLAN: 501, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged Ports: eth 0/6.501
Un-tagged Ports:
Total VPLS peers: 1 (1 Operational):
The following example shows information about bridge domain 501 in which the load-balance
option and four assigned label-switched paths (p101, p102, p103, and p104) are configured for the
peer device 10.9.9.9.
Bridge-domain 501
-------------------------------
Bridge-domain Type: MP , VC-ID: 501
Number of configured end-points: 2 , Number of Active end-points: 2
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
PW-profile: default, mac-limit: 0
VLAN: 501, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged Ports: eth 0/6.501
Un-tagged Ports:
Total VPLS peers: 1 (1 Operational):
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 121
Displaying bridge-domain configuration information Bridge Domains
• Enter the show bridge-domain brief command to display summary information about all
configured bridge domains.
• The following example shows how to display bridge-domain information for an Ethernet interface
(0/2).
• The following example shows how to display bridge-domain information for a port-channel interface
(10).
Extreme SLX-OS
122 Layer 2 Switching Configuration Guide, 20.1.1
Bridge Domains Enabling statistics on a bridge domain
Note
By default statistics are disabled on bridge domains. After enablement, statistics should be
disabled when no longer needed because the collection of statistical information has a heavy
impact on data traffic.
2. Enter the bridge-domain command to create a bridge domain at the global configuration level.
device(config)# bridge-domain 3
3. Enter the statistics command to enable statistics for all the logical interfaces and peers in the
bridge domain.
device(config-bridge-domain-3)# statistics
Note
When statistics are no longer needed, use the no statistics command to disable
statistics on the bridge domain.
• Enter the show statistics bridge-domain command to display statistics for all logical
interfaces and peers on all configured bridge domains.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 123
Clearing statistics on bridge domains Bridge Domains
• Enter the clear statistics bridge-domain command to clear statistics for all logical
interfaces and peers on all configured bridge domains.
Extreme SLX-OS
124 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services
VPLS overview on page 125
Configuring a PW profile on page 138
Attaching a PW profile to a bridge domain on page 139
Configuring control word for a PW profile on page 140
Configuring PW control word on a bridge domain on page 140
Configuring flow label for a PW profile on page 142
Configuring PW flow label on a bridge domain on page 142
Configuring a static MAC address over an endpoint in a VPLS instance
on page 144
Displaying MAC address information for VPLS bridge domains on page 144
Configuring a VPLS instance on page 145
Configuring a VLL instance on page 146
Configuration example for VPLS with switching between ACs and network core
on page 148
VPLS MAC withdrawal on page 149
VPLS overview
Virtual Private LAN Service (VPLS) is a Layer 2 Virtual Private Network (L2 VPN) architecture that
provides multipoint Ethernet LAN services.
Note
VPLS and VLL Layer 2 VPN services are not supported on SLX 9150 series and SLX 9250
series devices.
VPLS provides transparent LAN services across provider edge (PE) devices using Internet Protocol (IP)
or Multiprotocol Label Switching (MPLS) as the transport technology.
Because it emulates LAN switching, VPLS is considered to be a L2 service that operates over Layer 3
(L3) clouds.
VPLS provides point-to-multipoint (p2mp) functionality while VLL is a special type of VPLS deployment
that performs point-to-point (p2p) switching.
The following figure shows a VPLS topology in which switched packets traverse a network.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 125
VPLS overview VPLS and VLL Layer 2 VPN services
AC1 and AC2 represent L2 connectivity between customer edge (CE) and provider edge (PE) devices.
Pseudowire is a circuit emulation infrastructure that extends L2 connectivity from CE1 to CE2 by way of
PE1 and PE2. The tunnel is typically a L3 tunnel on which a L2 circuit is emulated.
In the case of a packet flowing from CE1 to CE2, the packet enters PE1 from CE1 after the forwarding
database (FDB) is used to determine the destination MAC address. Then, a virtual connection (VC) label
is imposed prior to encapsulation with the tunnel forwarding information, and the packet is sent out
onto the wire towards the network core.
Figure 16: VPLS topology with switching between attachment circuits (ACs) and
network core
Essentially, the topology in the preceding figure shows a L2 VPN enabling the transport of L2 traffic
between two or more native Ethernet networks through an underlying Multiprotocol Label Switching
(MPLS) provider network. Customer edge (CE) is the last mile and provider edge (PE) is the first mile
node for packets transported towards the provider network. The provider intermediary network is an
emulated switch (LAN) or wire (LINE) to the CE. The attachment circuit (AC) represents the logical link
between the CE and PE.
An AC may be a port, IEEE 802.1q or IEEE 802.1ad (QinQ)) for Ethernet VPNs. A pseudowire (PW) or
emulated wire is used as a transport mechanism to tunnel frames between PEs. A PW is characterized
by a circuit identifier, which identifies the destination PE.
MPLS tunnels and paths are established by using routing protocols. PW circuits are established by using
signaling.
The following figure shows a VPLS topology where switching occurs between two local AC endpoints.
This implementation of VPLS does not use VC labels or a pseudowire.
Extreme SLX-OS
126 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services VPLS overview
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 127
VLL VPLS and VLL Layer 2 VPN services
VLL
Virtual Leased Line (VLL) is a Layer 2 Virtual Private Network (L2 VPN) architecture that provides point-
to-point Ethernet line or Virtual Private Wire Services (VPWS).
VLL provides point-to-point (p2p) connectivity between two access networks or endpoints. Typically, a
VLL is used to connect two sites that are geographically apart.
Extreme SLX-OS
128 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services VPLS service endpoints
CE1 and CE2 are the customer edge devices in geographically separate sites.
Pseudowire (PW) is a circuit emulation infrastructure that extends L2 connectivity from CE1 to CE2 by
way of PE1 and PE2. The tunnel is typically a L3 tunnel on which a L2 circuit is emulated.
An AC endpoint is a L2 link between a PE device and a CE device. The AC endpoint can be an untagged
port, or a tagged port with one or more VLANs. AC endpoints with different VLAN tags can be
configured in a single VPLS instance.
A VLL instance interconnects two AC endpoints through a pseudowire, while a VPLS instance forms a
full mesh interconnection between multiple AC endpoints through multiple PWs.
Both regular port and port-channel interfaces can be used to form port-vlan, untagged port-vlan, and
port-vlan-vlan endpoints.
VPLS service endpoints are represented by logical interfaces (LIFs). By using LIFs, features that apply to
regular interfaces, such as QoS, can be applied to VPLS service endpoints.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 129
Pseudowires VPLS and VLL Layer 2 VPN services
Local switching
The forwarding behavior of AC endpoints in a VPLS instance is controlled by the switching-mode
configuration for local endpoints.
When local switching is enabled, traffic is switched and flooded among AC endpoints in addition to
between ACs and PWs. When local switching is disabled, the flooding between AC endpoints is
suppressed.
When an unknown unicast packet is received on an AC endpoint and local switching is enabled, the
packet is flooded to all other AC endpoints and PW endpoints in the VPLS instance. When local
switching is disabled, the unknown packet is only flooded to the PW endpoints in the domain.
Regardless of the local switching configuration, an unknown unicast packet that is received on a PW
endpoint is flooded to all AC endpoints.
In a VPLS instance that does not have a PW peer and where all endpoints are AC endpoints (Local
VPLS), local switching must be enabled.
To avoid receipt of traffic with different VLAN tags on local endpoints, it is recommended that local
switching is disabled in a bridge domain where the PW profile is configured with the VC mode option of
raw-passthrough. Raw passthorugh mode is designed to forward packets between two VPLS peer
devices and is not intended for use with local switching.
Pseudowires
A pseudowire (PW) is a virtual circuit (VC) formed between two provider edge (PE) devices that
connects peering Virtual Private LAN Services (VPLS) PE nodes.
An Ethernet pseudowire is logically viewed as an L2 nexthop (VC label) that is reachable through an L3
nexthop (LDP label).
The frames from an AC endpoint packet are sent through an ingress pseudowire interface (which
abstracts the transport path and packet encapsulations) towards the remote PE. An egress pseudowire
interface then abstracts the packet received from a remote PE and hands it over to the corresponding
AC end-point.
Extreme SLX-OS
130 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services Pseudowires
Pseudowire operation
The pseudowire setup process establishes the reachability of VPLS bridge domain endpoints across an
IP or MPLS cloud.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 131
Pseudowires VPLS and VLL Layer 2 VPN services
The VC mode is agreed by PE peer devices during the pseudowire signaling process.
A single VPLS instance can have a mixture of tagged and untagged endpoints.
When the VC mode is changed on a device, the PWs are torn down are re-established except in the
cases of a change from raw to raw-passthrough or a change from raw-passthrough to raw. The traffic
impact is minimal (because PWs are not torn down and re-established) when the VC mode is changed
from raw to raw-passthrough (or vice versa).
VC mode is configured by specifying the vc-mode option for the pw-profile command.
Note
When a pseudowire profile is attached to a bridge domain, on which routing is enabled (by
using the router-interface command), you are not allowed to change the pseudowire
profile vc-mode configuration to raw.
Extreme SLX-OS
132 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services Pseudowires
PW statistics
Pseudowire (PW) statistics are supported for both the ingress (packet going out over the PW) and
egress (packet received on the VC-Label of the PW) provider edge (PE) devices.
PW statistics are enabled or disabled per bridge domain and apply to all the PWs that are part of the
bridge domain. The logical interfaces for inbound and outbound statistics are shared resources. Hence,
the corresponding PW is operational only when these hardware resources are available.
PW statistics are configured using the statistics command in bridge domain configuration mode.
For further information about enabling statistics on a bridge domain, refer to Bridge Domains.
PW control word
To ensure that a PW operates correctly over an MPLS PSN, the PW traffic is normally transported over a
single network path, even when equal-cost multiple-paths (ECMPs) exist between the ingress and
egress PW provider edge (PE) devices. Transporting PW traffic over a single network prevents
misordered packet delivery to the egress PE device.
Because the standard MPLS label stack does not contain an explicit protocol identifier, label switching
routers (LSRs) in ECMP implementations may examine the first nibble after the MPLS label stack to
determine if a labeled packet is an IP packet. When the source MAC address of an Ethernet frame that is
carried over a PW (without a control word present) begins with 0x4 or 0x6, it could be mistaken for an
IPv4 or IPv6 packet. Depending on the configuration and topology of the MPLS network, this
misinterpretation could lead to a situation in which all packets for a specific PW do not follow the same
path and may increase out-of-order frames on the specific PW, or cause packets to follow a different
path than actual traffic.
PW control word (RFC 4385) enables all packets for a specific PW to follow the same path over an
MPLS PSN.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 133
Pseudowires VPLS and VLL Layer 2 VPN services
The first 4 bits are set to 0 to indicate PW data and distinguish a PW packet from an IP packet. The next
12 bits are reserved.
The last 16 bits carry a PW-specific sequence number that guarantees ordered frame delivery. A
sequence number value of 0 indicates that the sequence number check algorithm is not used.
Note
PW control word is a nonconfigurable, global system value.
The following figure shows the operation of PW control word in a PW over MPLS network configuration.
• The ingress device (PE1) initiates the PW setup, including the capability to transmit and receive PW
control word by using the new interface parameter TLV.
• The egress device (PE4) signals a control word-handling capability.
• When PE1 receives traffic from the customer edge device (CE1), it pushes the label stack onto the
traffic control word and forwards the packet to P2.
• P2 uses the field immediately after the bottom of the MPLS label stack to identify the payload as
non-IP, IPv4 or IPv6 and forwards the packet to PE4.
• PE4 receives the packet with two labels; the PW label, which identifies the PW, and PW control
word, which is discarded without processing.
PW flow label
Some PWs transport high volumes of traffic that comprise multiple separate traffic flows (for example,
all packets for the same source-destination pair for a Transport Control Protocol [TCP] connection is a
specific traffic flow).
Extreme SLX-OS
134 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services Pseudowires
To avoid latency and jitter, it is important that packets for a specific traffic flow are mapped to the same
links along the path to the egress device.
PWs that carry multiple traffic flows require only the preservation of packet ordering in the context of
an individual traffic flow and do not require the preservation of packet order for all traffic carried on the
PW.
In normal cases, routers use source and destination IP addresses, protocol type, and TCP or UDP port
numbers as keys in a load-balancing algorithm to find the appropriate outgoing interface. In MPLS
networks, deep packet inspection may be needed for LSRs to identify such keys.
PW flow label is a mechanism that supports load balancing in an MPLS network, without the need for
deep packet inspection by LSRs.
The PW flow label is added to the bottom of the label stack, by the ingress LSR (which has complete
information about the packet) before it pushes the label stack. Transit LSRs can use the entire label
stack (including the flow label) as a key for a load-balancing algorithm.
The PW flow label allows PWs to leverage the availability of, for example, equal-cost multiple-path
(ECMP) between LSRs in an MPLS PSN. The ingress PE device maps individual traffic flows within a PW
to the same flow label. Label Distribution Protocol (LDP) uses the PW flow label to map packets for a
specific traffic flow to the same links along the path and to ensure that packets for the specific traffic
flow follow the same path over the MPLS PSN. The PW flow label is discarded at the egress PE device.
Note
PW flow label load balancing is not supported when the incoming packet contains more than
three labels.
The following figure shows packet encapsulation when flow label is enabled for PW traffic.
PW flow label is not a reserved value (that is, in the range from 0 through 15). To prevent any processing
of flow label at the egress LSR, the TTL value of the flow label is set to 0.
Note
PW flow label is not signaled between PE routers. The flow label is generated locally and
pushed to the bottom of the stack by the ingress LSR.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 135
Supported VPLS features VPLS and VLL Layer 2 VPN services
• The ingress device (PE1) initiates the PW setup, including the capability to transmit and receive PW
flow label by using the new interface parameter TLV.
• The egress device (PE4) signals a flow label-handling capability.
• When PE1 receives traffic from the customer edge router, it uses a hash algorithm based on the keys
(destination MAC address, source MAC address, and so on) to generate a flow label. It then pushes
the label stack onto the flow label (S=1, TTL=0) and forwards the packet to P2.
• The P2 router uses the bottom label from the stack to ensure that a particular traffic flow (packets
for a specific source-destination pair) follows the same path through transit routers.
• PE4 receives the packet with two labels with the top label being the PW label, which is used to
identify the pseudowire, and the flow label, which is discarded without processing.
Note
When load balancing is based only on PW flow label, the transit device (P2) must be
configured to include the bottom-of-stack (BOS) label by using the lag hash bos start
command.
Pseudowire (PW) flow label is configured by enabling flow label for either a PW profile or PW-related
devices in a bridge domain. To enable flow label for a PW profile, use the flow-label command in
PW profile configuration mode. To enable flow label for PW-related devices in a bridge domain, use the
peer command in bridge domain configuration mode.
Extreme SLX-OS
136 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services Configuration of VPLS and VLL
To configure a VPLS or VLL instance, you must complete the following tasks:
• Configure a bridge domain.
• Configure a VC identifier.
• Configure logical interfaces for AC endpoints.
• (Optional) Configure a pseudowire (PW) profile.
• Configure peer IP addresses. Configuring peer IP addresses creates PW endpoints.
Note
VPLS (or VLL) configuration is separate from the underlying IP or MPLS configuration. MPLS
tunnels need to be brought up separately. For further information about the configuration of
MPLS tunnels, refer to the Extreme SLX-OS MPLS Configuration Guide.
On the ingress label-edge router (LER), the final EXP value for the VC label is not dependant on the CoS
value in the VC-peer configuration.
By default, for traffic flowing from a CE device to a PE device, 3 bits of the PCP field from the incoming
Ethernet frame header are extracted and mapped to an internal CoS value by way of an ingress CoS
map. This internal value is then mapped to an outgoing CoS value by way of an egress CoS map. The
outgoing CoS value is then inserted into the EXP field in the outgoing VC label. When incoming traffic
does not have VLAN tag, the default PCP value that is configured on a port is used.
In the case of traffic received from the network core side, by default the EXP field from the incoming VC
label is mapped to an internal CoS value by way of an ingress CoS map. This internal value is then
mapped to an outgoing CoS value by way of an egress CoS map. The outgoing CoS value is then
inserted into the PCP field in the Ethernet frame header going out to the CE device.
On the egress LER, the CoS value for the VC-peer configuration is not dependant on the final EXP value
for the VC label.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 137
Configuring a PW profile VPLS and VLL Layer 2 VPN services
The following table shows ingress and egress behavior for different global, tunnel and PW configuration
combinations.
Configuring a PW profile
A pseudowire (PW) emulates a point-to-point connection over a packet-switching network. PW profile
configuration defines PW attributes. After configuration, a PW profile must be attached to a bridge
domain.
A pseudowire profile can be shared across multiple bridge domains. Complete the following task to
configure a PW profile.
1. From privileged EXEC mode, enter global configuration mode.
The following example creates a PW profile named pw_example and configures attributes for the
profile.
Extreme SLX-OS
138 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services Attaching a PW profile to a bridge domain
Bridge-domain 501
-------------------------------
Bridge-domain Type: MP , VC-ID: 501
Number of configured end-points: 2 , Number of Active end-points: 2
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
PW-profile: pw_example, mac-limit: 0
VLAN: 501, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged Ports: eth1/6.501
Un-tagged Ports:
Total VPLS peers: 1 (1 Operational):
The following example shows how to attach a PW profile named pw_example to bridge domain 501.
device# configure terminal
device(config)# bridge-domain 501
device(config-bridge-domain-501)# pw-profile pw_example
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 139
Configuring control word for a PW profile VPLS and VLL Layer 2 VPN services
PW control word configuration enables all packets for a specific PW to follow the same path over the
MPLS network supporting, for example, the optimal transport of Ethernet Protocol Data Units (PDUs)
over the network.
Note
When control word is enabled for a previously configured PW, control word capabilities
between PE devices are activated only after LDP neighbors are cleared by using the
clear mpls ldp neighbor command. For further information on clearing LDP
neighbors, refer to Extreme SLX-OS MPLS Configuration Guide.
The following example shows how to configure a PW profile and enable control word for the profile. It
then shows how to attach the PW profile to a bridge domain.
device# device# configure terminal
device(config)# pw-profile pw_example
device(config-pw-pw_example)# vc-mode tag
device(config-pw-pw_example)# mtu 1300
device(config-pw-pw_example)# mtu-enforce true
device(config-pw-pw_example)# control-word
device(config-pw-pw_example)# exit
!
device(config)# bridge-domain 502
device(config-bridge-domain-502)# pw-profile pw_example
PW control word configuration enables all packets for a specific PW to follow the same path over the
MPLS network supporting, for example, the optimal transport of Ethernet Protocol Data Units (PDUs)
over the network.
Extreme SLX-OS
140 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services Configuring PW control word on a bridge domain
Perform the following task to configure PW control word for a peer device in a bridge domain.
b. Enter bridge domain configuration mode. The following example shows how to enter
configuration mode for bridge domain 502.
device(config)# bridge-domain 502
c. Enable control word for a PW-related peer device (10.9.9.9) that is configured on the bridge
domain.
device(config-bridge-domain-502)# peer 10.9.9.9 control-word
Bridge-domain 502
-------------------------------
Bridge-domain Type: MP, VC-ID: 502 MCT Enabled: FALSE
Number of configured end-points: 3, Number of Active end-points: 1
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
MAC Withdrawal: Disabled
PW-profile: default, mac-limit: 0
VLAN: 502, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged Ports: eth0/5.502
Un-tagged Ports:
Total VPLS peers: 2 (0 Operational):
VC id: 502, Peer address: 10.9.9.9, State: Wait for LSP tunnel to Peer, uptime: -
Load-balance: True, Cos Enabled: False,
Tunnel cnt: 0
Assigned LSPs count:2 Assigned LSPs:q502 q752
Local VC lbl: 0, Remote VC lbl: 0,
Local VC MTU: 1500, Remote VC MTU: 0,
Local VC-Type: 5, Remote VC-Type: 0
Local PW preferential Status: Active, Remote PW preferential Status: Active
Local Flow Label Tx: Enabled, Local Flow Label Rx: Enabled
Remote Flow Label Tx: Enabled, Remote Flow Label Rx: Enabled
Local Control Word: Enabled, Remote Control Word: Enabled
The following example shows how to configure a bridge domain on which control word is enabled for a
PW-related peer.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 141
Configuring flow label for a PW profile VPLS and VLL Layer 2 VPN services
Flow label configuration improves load balancing of PW traffic over an MPLS network, particularly in the
context of PWs that transport high volumes of traffic that are comprised of multiple individual traffic
flows (for example, the same source-destination pair for a Transport Control Protocol (TCP) connection
is an individual traffic flow).
The following example shows how to configure a PW profile and enable flow label on the profile. It then
shows how to attach the PW profile to a bridge domain.
device# device# configure terminal
device(config)# pw-profile pw_example
device(config-pw-pw_example)# vc-mode tag
device(config-pw-pw_example)# mtu 1300
device(config-pw-pw_example)# mtu-enforce true
device(config-pw-pw_example)# flow-label
device(config-pw-pw_example)# exit
device(config)# bridge-domain 5
device(config-bridge-domain-5)# pw-profile pw_example
Flow label configuration improves load balancing of PW traffic over an MPLS network, particularly in the
context of PWs that transport high volumes of traffic that are comprised of multiple individual traffic
flows (for example, the same source-destination pair for a Transport Control Protocol (TCP) connection
is an individual traffic flow).
Extreme SLX-OS
142 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services Configuring PW flow label on a bridge domain
2. Enter bridge domain configuration mode. The following example shows how to enter configuration
mode for bridge domain 502.
device(config)# bridge-domain 502
3. Enable flow label for the PW-related peer devices that are configured on the bridge domain.
device(config-bridge-domain-502)# peer 10.9.9.9 flow-label
Bridge-domain 502
-------------------------------
Bridge-domain Type: MP, VC-ID: 502 MCT Enabled: FALSE
Number of configured end-points: 3, Number of Active end-points: 1
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
MAC Withdrawal: Disabled
PW-profile: default, mac-limit: 0
VLAN: 502, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged Ports: eth0/5.502
Un-tagged Ports:
Total VPLS peers: 2 (0 Operational):
VC id: 502, Peer address: 10.9.9.9, State: Wait for LSP tunnel to Peer, uptime: -
Load-balance: True, Cos Enabled: False,
Tunnel cnt: 0
Assigned LSPs count:2 Assigned LSPs:q502 q752
Local VC lbl: 0, Remote VC lbl: 0,
Local VC MTU: 1500, Remote VC MTU: 0,
Local VC-Type: 5, Remote VC-Type: 0
Local PW preferential Status: Active, Remote PW preferential Status: Active
Local Flow Label Tx: Enabled, Local Flow Label Rx: Enabled
Remote Flow Label Tx: Enabled, Remote Flow Label Rx: Enabled
Local Control Word: Enabled, Remote Control Word: Enabled
The following example shows how to configure a bridge domain on which flow label is enabled for the
PW-related peers.
device# configure terminal
device(config)# bridge-domain 5
device(config-bridge-domain-5)# vc-id 8
device(config-bridge-domain-5)# logical-interface ethernet 0/5.15
device(config-bridge-domain-5)# logical-interface port-channel 2.200
device(config-bridge-domain-5)# peer 10.15.15.15 load-balance flow-label
device(config-bridge-domain-5)# peer 10.12.12.12 flow-label
device(config-bridge-domain-5)# peer 10.12.12.12 lsp lsp1 lsp2
device(config-bridge-domain-5)# local-switching
device(config-bridge-domain-5)# bpdu-drop-enable
device(config-bridge-domain-5)#
device(config-pw-pw_example)# exit
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 143
Configuring a static MAC address over an endpoint in a
VPLS instance VPLS and VLL Layer 2 VPN services
You can configure a MAC address for a logical interface for an endpoint in a VPLS instance by
completing the following task.
Note
Pre-configuration for the static mac is supported. Pre-configured static mac is shown as
inactive mac.
2. Create the logical-interface (LIF) entry associated to a physical or port-channel interface, associate
the LIF entry to the VPLS instance and configure the static mac associated with the LIF entry.
device(config)# exit
Extreme SLX-OS
144 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services Configuring a VPLS instance
device(config)# bridge-domain 5
By default, the bridge-domain service type is multipoint. In this example, bridge domain 5 is
configured as a multipoint service.
3. Configure a virtual connection identifier for the bridge domain.
device(config-bridge-domain-5)# vc-id 8
4. Note
Logical interfaces representing bridge-domain endpoints must be created before they can
be bound to a bridge domain.
Bind the logical interfaces for attachment circuit endpoints to the bridge domain.
In this example, port channel logical interface 2.200 is bound to bridge domain 5.
6. Configure peer IP addresses to create pseudowire (PW) endpoints.
In this example, a peer IP address of 10.15.15.15 is configured under bridge domain 5 and specifies
load balancing.
7. Repeat Step 6 to configure more peer IP addresses to create PW endpoints.
In this example, a peer IP address of 10.12.12.12 under bridge domain 5 and specifies two label-
switched paths (lsp1 and lsp2).
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 145
Configuring a VLL instance VPLS and VLL Layer 2 VPN services
device(config-bridge-domain-5)# local-switching
9. (Optional) Enable dropping L2 bridge protocol data units (BPDUs) for bridge domain 5.
device(config-bridge-domain-5)# bpdu-drop-enable
device(config-bridge-domain-5)# pw-profile 2
The following example creates bridge domain 5 and configures virtual connection identifier 8 for the
bridge domain. It binds ethernet and port-channel logical interfaces to the bridge domain and
configures peer IP addresses under the domain. It configures local switching, enables dropping of L2
BPDUs, and configures a PW profile for the domain.
In this example, bridge domain 3 is created as a point-to-point service. By default, the bridge-
domain service type is multipoint.
3. Configure a virtual connection identifier for the bridge domain.
4. Bind the logical interfaces for attachment circuit endpoints to the bridge domain.
In this example, the Ethernet logical interface 0/5.15 is bound to bridge domain 3.
Extreme SLX-OS
146 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services Configuring a VLL instance
device(config-bridge-domain-3)# end
The following example shows the creation of a logical interface and a pseudowire profile in addition to
the bridge domain and VLL instance configuration.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 147
Configuration example for VPLS with switching
between ACs and network core VPLS and VLL Layer 2 VPN services
The topology in the preceding figure shows a L2 VPN that enables transport of L2 traffic between two
or more native Ethernet networks through an underlying Multiprotocol Label Switching (MPLS) provider
network. Customer edge (CE) is the last mile and provider edge (PE) is the first mile node for packets
transported towards the provider network. The provider intermediary network is an emulated switch
(LAN) or wire (LINE) to the CE. The AC represents the logical link between the CE and PE.
Pseudowire is a circuit emulation infrastructure that extends L2 connectivity from CE1 to CE2 by way of
PE1 and PE2. The tunnel is typically a L3 tunnel on which a L2 circuit is emulated.
The following examples show how to configure the provider edge devices (PE1 and PE2) shown in this
topology.
Figure 24: VPLS configuration with switching between attachment circuits (ACs) and
network core
PE1
Extreme SLX-OS
148 Layer 2 Switching Configuration Guide, 20.1.1
VPLS and VLL Layer 2 VPN services PE2
PE2
A MAC address withdrawal message is send with a MAC list Type Length Value (TLV). 200 MAC
addresses are bulked and sent in one Mac TLV message.
Note
The MAC withdrawal support is only for explicit MAC addresses in MAC withdrawal TLV.
Empty MAC list as well as sending MAC withdrawal TLV to specific subset of peers will not be
supported.
The maximum number of MAC addresses supported is 5000 in a 5 second interval. The remaining MAC
in the AC LIF are not sent. After the 5 second interval, another LIF down event triggers MAC withdrawal
message for a new 5 second interval. MAC withdrawal is supported for both VPLS and MCT-VPLS. MPLS
signals the MAC withdraw TLV to all the peers.
The mac-address withdrawal command enables MAC withdrawal on the bridge domain. The no form of
the command disables MAC withdrawal.
Disabling MAC withdrawal on a bridge domain stops sending of MAC withdraw messages. MAC
withdraw messages are received at the receiver end and MAC flush happens even when MAC address
withdrawal is not enabled.
2. Enter bridge domain configuration mode. The following example shows how to enter configuration
mode for bridge domain 1.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 149
Enabling VPLS MAC address withdrawal VPLS and VLL Layer 2 VPN services
After it is enabled, use the no form of the command to disable MAC address withdrawal.
4. Return to privileged EXEC mode.
device(config-bridge-domain-1)# end
The following example shows how to enable VPLS MAC address withdrawal and then verify the
configuration for bridge domain 1.
device# configure terminal
device(config)# bridge domain 1
device(config-bridge-domain-1)# mac-address withdrawal
device(config-bridge-domain-1)# end
!
device# show bridge-domain
Bridge-domain 1
-------------------------------
Bridge-domain Type: MP , VC-ID: 0
Number of configured end-points: 0 , Number of Active end-points: 0
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
MAC Withdrawal: Enabled
PW-profile: default, mac-limit: 0
Total VPLS peers: 0 (0 Operational):
device#
Extreme SLX-OS
150 Layer 2 Switching Configuration Guide, 20.1.1
MAC Movement Detection and
Resolution
MAC Movement Overview on page 151
MAC Movement Detection and Resolution is a new and improved mechanism to prevent loop detection
in networks. This feature has advantages over the existing Extreme proprietary Loop Detection feature.
Note
• Repeated MAC Movement Detection and Resolution will work for switch-port.
• Loop detection using MAC Movement Detection is mutually exclusive of STP and ELD
protocol operations.
• MAC Movement Detection is not considered for a port where port-security is enabled and
a restrict violation action is triggered.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 151
MAC Movement Resolution MAC Movement Detection and Resolution
This list of recorded values is parsed automatically; if a port is determined to have a high number LIFs
that are experiencing MAC moves, then those LIFs are acted upon (RASlog is the default action, or
shutdown).
For example, MAC A is moving between port 1, vlan 10 and port 2, vlan 10. MAC B is moving between
port 1, vlan 20 and port 3, vlan 20. MAC C is moving between port 4, vlan 10 and port 5, vlan 10. All
MACs have crossed the (user-defined) threshold. The list looks like this:
• MAC A: port 1,vlan 10; and port 2, vlan 10
• MAC B: port 1, vlan 20; and port 3, vlan 20
• MAC C: port 4, vlan 10; and port 5, vlan 10
The default mac-movement action is raslog. All mac-movement information is saved to the RAS log.
When the auto-recovery time limit expires, the LIF becomes operational, and the tracking process is
started again.
Note
Logical interfaces (LIFs) that are part of a tunnel, inter-chassis link (ICL), or pseudowire (PW)
are ignored and are not subject to any resolution action.
Auto-recovery is enabled by default. The LIF will remain shut down for 5 minutes (default). This time is
configurable to a range of 3 through 30 minutes. The auto-recovery mode can be disabled from the
command line.
Shutdown can be disabled from the command line, and logging enabled as the only action when the
threshold is exceeded. The MAC movement details will be captured in the RAS log.
Extreme SLX-OS
152 Layer 2 Switching Configuration Guide, 20.1.1
MAC Movement Detection and Resolution MAC Movement Resolution
◦ 2019/12/09-02:32:12, [L2SS-1032], 16808, DCE, ERROR, SLX, Repeated MAC move detected for
MAC 0000.0500.0001 BRIDGE-DOMAIN 11, interface Ethernet 0/6 shut down
If MAC movement between C1 and C2 has crossed the threshold MAC move limit, the LIF shutdown
action is taken on the cluster node with the higher IP address. For example: Leaf1 has the higher cluster
IP configured. Leaf1 takes the decision to shut down the LIF connecting to C1 and communicates to
Leaf2 to shutdown the corresponding LIF connecting to C1.
If MAC movement between C1 and H1 has crossed the threshold MAC move limit the LIF shutdown
action is taken on the cluster node with the higher IP address. For example, Leaf1 has the higher cluster
IP configured. Leaf1 takes the decision to shut down the LIF on C1, and communicates to Leaf2 to
shutdown the corresponding LIF on C1. If the MAC movement is happening between the CCEP and CEP,
the action will always be taken on the CCEP.
If MAC movement between H1 and H2 has crossed the threshold MAC move limit, the action is taken by
each Leaf independently. Leaf1 and Leaf2 will run MAC move detection separately.
Note
In an IP fabric configuration, it may be necessary for the MAC movement detection feature to
take precedence over BGP dampening. In this situation, the BGP mac dampening count must
be set at lower value than the mac-move threshold, as shown below.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 153
MAC movement Detection and Resolution Commands MAC Movement Detection and Resolution
Auto-Recovery: Enable
Auto-Recovery-time: 3
Note
In an IP fabric configuration, this feature must be enabled on all leaf nodes.
Note
This feature is also supported on bridge domains.
Extreme SLX-OS
154 Layer 2 Switching Configuration Guide, 20.1.1
MAC Movement Detection and Resolution MAC movement Detection and Resolution Commands
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 155
802.1ag Connectivity Fault Management
Enabling or disabling CFM on page 159
Creating a Maintenance Domain on page 159
Creating and configuring a Maintenance Association on page 160
Displaying CFM configurations on page 161
Bridges are increasingly used in networks operated by multiple independent organizations, each with
restricted management access to each other’s equipment. CFM provides capabilities for detecting,
verifying and isolating connectivity failures in such networks.
There are multiple organizations involved in a Metro Ethernet Service: Customers, Service Providers and
Operators.
Customers purchase Ethernet Service from Service Providers. Service Providers may utilize their own
networks, or the networks of other Operators to provide connectivity for the requested service.
Customers themselves may be Service Providers, for example a Customer may be an Internet Service
Provider which sells Internet connectivity.
Extreme SLX-OS
156 Layer 2 Switching Configuration Guide, 20.1.1
802.1ag Connectivity Fault Management Maintenance Domain (MD)
The Maintenance Domain (MD) levels are carried on all CFM frames to identify different domains. For
example, in the following figure, some bridges belong to multiple domains. Each domain associates to
an MD level.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 157
Maintenance Association (MA) 802.1ag Connectivity Fault Management
Each MEP has a direction, down or up. Down MEPs receive CFM PDUs from the LAN and sends CFM
PDUs towards the LAN. Up MEPs receive CFM PDUs from a bridge relay entity and sends CFM PDUs
towards the bridge relay entity on a bridge. End stations support down MEPs only, as they have no
bridge relay entities.
CFM Hierarchy
MD levels create a hierarchy in which 802.1ag messages sent by customer, service provider, and
operators are processed by MIPs and MEPs at the respective level of the message. A common practice is
for the service provider to set up a MIP at the customer MD level at the edge of the network, as shown
Extreme SLX-OS
158 Layer 2 Switching Configuration Guide, 20.1.1
802.1ag Connectivity Fault Management Mechanisms of Ethernet IEEE 802.1ag OAM
in the figure above, to allow the customer to check continuity of the Ethernet service to the edge of the
network. Similarly, operators set up MIPs at the service provider level at the edge of their respective
networks, as shown in the figure above, to allow service providers to check the continuity of the
Ethernet service to the edge of the operators’ networks. Inside an operator network, all MIPs are at the
respective operator level, also shown in the figure above.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 159
Creating and configuring a Maintenance Association 802.1ag Connectivity Fault Management
An MD is fully connected internally. A Domain Service Access Point associated with an MD has
connectivity to every other Domain Service Access Point in the MD, in the absence of faults.
The domain-name command in Connectivity Fault Management (CFM) protocol configuration mode
creates a maintenance domain with a specified level, name, and ID and enters the specific MD mode
specified in the command argument.
device# configure terminal
device(config)# protocol cfm
device(config-cfm)# domain-name md1 id 1 level 4
device(config-cfm-md-md1)#
The no form of the command removes the specified domain from the CFM protocol configuration
mode.
This command changes the Maintenance Domain (MD) mode to the specific MA mode.
2. Set the time interval between two successive Continuity Check Messages (CCMs) that are sent by
Maintenance End Points (MEP) in the specified MA, use the ccm-interval command.
device# configure terminal
device(config)# protocol cfm
device(config-cfm)# domain name md1 id 1 level 4
device(config-cfm-md-md1)# ma-name ma1 id 1 vlan-id 30 priority 3
device(config-cfm-md-ma-ma1)# ccm-interval 10-second
device(config-cfm-md-ma-ma1)#
The id field specifies the short MAID format that is carried in the CCM frame. The default time
interval is 10 seconds.
3. Add local ports as MEP to a specific maintenance association using the mep command in MA mode.
device# configure terminal
device(config)# protocol cfm
device(config-cfm)# domain name md1 id 1 level 4
device(config-cfm-md-md1)# ma-name ma1 id 1 vlan-id 30 priority 3
device(config-cfm-md-ma-ma1)# mep 1 down ethernet 1/2
device(config-cfm-md-ma-mep-1)#
To configure a CFM packet to a Down MEP, you must sent it out on the port on which it was
configured. To configure a Connectivity Fault Management (CFM) packet to an Up MEP, you must
sent it to the entire VLAN for multicast traffic and the unicast traffic must be sent to a particular port
as per the MAC table.
4. Configure the remote MEPs using the remote-mep command.
device# configure terminal
device(config)# protocol cfm
Extreme SLX-OS
160 Layer 2 Switching Configuration Guide, 20.1.1
802.1ag Connectivity Fault Management Displaying CFM configurations
A MIP can be created on a port and VLAN, only when explicit or default policy is defined for them.
For a specific port and VLAN, a MIP is created at the lowest level. Additionally, the level created
should be the immediate higher level than the MEP level defined for this port and VLAN.
show cfm
Use the show cfm command to display the Connectivity Fault Management (CFM) configuration.
Note
For the show cfm command to generate output, you must first enable CFM in protocol
configuration mode.
The following commands display the received port status tlv state at RMEP.
device# show cfm connectivity
Domain: md1
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 161
show cfm brief 802.1ag Connectivity Fault Management
Index: 1
Level: 7
Maintenance association: ma5
MA Index: 5
CCM interval: 100 ms
Bridge-Domain ID: 50
Priority: 7
MAID Format: Short
MEP Id: 1
MEP Port: Eth 1/9
RMEP MAC VLAN/PEER INNER-VLAN PORT STATE
==== === ========= ========== ==== =====
2 609c.9f5e.4809 19.1.1.1 -- -- OK
Note
For the show cfm command to generate output, you must first enable CFM in protocol
configuration mode.
Extreme SLX-OS
162 Layer 2 Switching Configuration Guide, 20.1.1
802.1d Spanning Tree Protocol
Spanning Tree Protocol overview on page 163
Spanning Tree Protocol configuration notes on page 163
STP features on page 167
STP parameters on page 169
Configuring STP on page 171
The IEEE 802.1d Spanning Tree Protocol (STP) runs on bridges and switches that are 802.1d-compliant.
These variants are Rapid STP (RSTP), Multiple STP (MSTP), Per-VLAN Spanning Tree Plus (PVST+), and
Rapid-PVST+ (R-PVST+)
When the spanning tree algorithm is run, the network switches transform the real network topology
into a spanning tree topology. In an STP topology any LAN in the network can be reached from any
other LAN through a unique path. The network switches recalculate a new spanning tree topology
whenever there is a change to the network topology.
For each LAN, the switches that attach to the LAN select a designated switch that is the closest to the
root switch. The designated switch forwards all traffic to and from the LAN. The port on the designated
switch that connects to the LAN is called the designated port. The switches decide which of their ports
is part of the spanning tree. A port is included in the spanning tree if it is a root port or a designated
port.
STP runs one spanning tree instance (unaware of VLANs) and relies on long duration forward-delay
timers for port state transition between disabled, blocking, listening, learning and forwarding states.
The Extreme device supports STP as described in the IEEE 802.1d-1998 specification.
The STP is disabled by default on the Extreme device. Thus, any new VLANs you configure on the
Extreme device have STP disabled by default.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 163
Optional features 802.1d Spanning Tree Protocol
Optional features
The following STP configuration features are optional:
• Root guard
• BPDU guard
• PortFast
STP states
Each Layer 2 interface participating in a spanning tree is in one of five states.
A network topology of bridges typically contains redundant connections to provide alternate paths in
case of link failures. The redundant connections create a potential for loops in the system. As there is no
concept of time to live (TTL) in Ethernet frames, a situation may arise where there is a permanent
circulation of frames when the network contains loops. To prevent this, a spanning tree connecting all
the bridges is formed in real time.
BPDUs
To build a spanning tree for the bridge topology, the bridges must exchange control frames called
Bridge Protocol data units (BPDUs).
To construct a spanning tree requires knowledge of the all the participants. The bridges must determine
the root bridge and compute the port roles (root, designated, or blocked) with only the information that
they have. To ensure that each bridge has enough information, the bridges use BPDUs to exchange
information about bridge IDs and root path costs.
A bridge sends a BPDU frame using the unique MAC address of the port itself as a source address, and
a destination address of the STP multicast address 01:80:C2:00:00:00.
BPDUs are exchanged regularly (every 2 seconds by default) and enable switches to keep track of
network changes and to start and stop forwarding through ports as required.
Extreme SLX-OS
164 Layer 2 Switching Configuration Guide, 20.1.1
802.1d Spanning Tree Protocol TCN BPDUs
When a device is first attached to a switch port, it does not immediately forward data. It instead goes
through a number of states while it processes inbound BPDUs and determines the topology of the
network. When a host is attached, after a listening and learning delay of about 30 seconds, the port
always goes into the forwarding state. The time spent in the listening and learning states is determined
by the forward delay. However, if instead another switch is connected, the port may remain in blocking
mode if it would cause a loop in the network.
TCN BPDUs
TCN BPDUs are used to inform other switches of port changes.
TCNs are injected into the network by a non-root switch and propagated to the root. Upon receipt of
the TCN, the root switch will set a Topology Change flag in its normal BPDUs. This flag is propagated to
all other switches to instruct them to rapidly age out their forwarding table entries.
For a given link, in conjunction with the configuration rules, a TCN BPDU is sent out as follows:
• On an access port, only a standard IEEE TCN BPDU is sent out. This TCN BPDU corresponds to a
topology change in the access VLAN.
• On a trunk port, if VLAN 1 is allowed (either untagged or untagged), a standard IEEE TCN BPDU is
sent for VLAN 1.
• On a trunk port, if the native VLAN is not 1, an untagged TCN BPDU is sent to Cisco or Extreme
proprietary MAC address for that VLAN.
• On a trunk port, a tagged TCN BPDU is sent to Cisco or Extreme proprietary MAC address for a
tagged VLAN.
As part of the response to TCN BPDUs, the Topology Change and Topology Change Acknowledgment
flags are set in all configuration BPDUs corresponding to the VLAN for which the TCN was received.
When a topology change is detected on a trunk port, it is similar to detecting topology changes in each
VLAN that is allowed on that trunk port. TCN BPDUs are sent for each VLAN as per the rules.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 165
STP configuration guidelines and restrictions 802.1d Spanning Tree Protocol
• Only one form of a standing tree protocol, such as STP or RSTP, can be enabled at a time. You must
disable one form of xSTP before enabling another.
• When any form of STP is enabled globally, that form of STP is enabled by default on all switch ports.
• LAGs are treated as normal links for any form of STP.
• The STP is disabled by default on the SLX device. Thus, any new VLANs you configure on the SLX
device have STP disabled by default.
• PVST/RPVST BPDUs are flooded only if PVST/RPVST is not enabled. STP/RSTP (IEEE) BPDUs are
never flooded if STP/RSTP is not enabled.
The following table lists the switch defaults for the interface-specific configuration.
Extreme SLX-OS
166 Layer 2 Switching Configuration Guide, 20.1.1
802.1d Spanning Tree Protocol STP features
STP features
The following sections discuss root guard, BPDU guard, and PortFast.
Root guard
Root guard can be used to predetermine a root bridge location and prevent rogue or unwanted
switches from becoming the root bridge.
At times it is necessary to protect the root bridge from malicious attack or even unintentional
misconfigurations where a bridge device that is not intended to be the root bridge becomes the root
bridge, causing severe bottlenecks in the data path. These types of mistakes or attacks can be avoided
by configuring root guard on ports of the root bridge.
The root guard feature provides a way to enforce the root bridge placement in the network and allows
STP and its variants to interoperate with user network bridges while still maintaining the bridged
network topology that the administrator requires. Errors are triggered if any change from the root
bridge placement is detected.
When root guard is enabled on a port, it keeps the port in designated FORWARDING state. If the port
receives a superior BPDU, which is a root guard violation, it sets the port into a DISCARDING state and
triggers a Syslog message and an SNMP trap. No further traffic will be forwarded on this port. This
allows the bridge to prevent traffic from being forwarded on ports connected to rogue or wrongly
configured STP or RSTP bridges.
Root guard should be configured on all ports where the root bridge should not appear. In this way, the
core bridged network can be cut off from the user network by establishing a protective perimeter
around it.
Once the port stops receiving superior BPDUs, root guard automatically sets the port back to a
FORWARDING state after the timeout period has expired.
BPDU guard
In an STP environment, switches, end stations, and other Layer 2 devices use BPDUs to exchange
information that STP will use to determine the best path for data flow.
In a valid configuration, edge port-configured interfaces do not receive BPDUs. If an edge port-
configured interface receives a BPDU, an invalid configuration exists, such as the connection of an
unauthorized device. The BPDU Guard provides a secure response to invalid configurations because the
administrator must manually put the interface back in service.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 167
Error disable recovery 802.1d Spanning Tree Protocol
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain
borders and keeps the active topology predictable by not allowing any network devices behind a BPDU
guard-enabled port to participate in STP.
In some instances, it is unnecessary for a connected device, such as an end station, to initiate or
participate in an STP topology change. In this case, you can enable the STP BPDU guard feature on the
Extreme device port to which the end station is connected. The STP BPDU guard shuts down the port
and puts it into an "error disabled" state. This disables the connected device's ability to initiate or
participate in an STP topology. A log message is then generated for a BPDU guard violation, and a
message is displayed to warn the network administrator of an invalid configuration.
The BPDU Guard provides a secure response to invalid configurations because the administrator must
manually put the interface back in service with the no shutdown command if error disable recovery is
not enabled by enabling the errdisable-timeout command. The interface can also be
automatically configured to be enabled after a timeout. However, if the offending BPDUs are still being
received, the port is disabled again.
Once in an error disable state, the port remains in that state until it is re-enabled automatically or
manually.
In STP, RSTP, MSTP, PVST+, or R-PVST+ mode, you can specify the time in seconds it takes for an
interface to time out. The range is from 10 through 1000000 seconds. The default is 300 seconds. By
default, the timeout feature is disabled.
PortFast
PortFast allows an interface to transition quickly to the forwarding state.
Extreme SLX-OS
168 Layer 2 Switching Configuration Guide, 20.1.1
802.1d Spanning Tree Protocol STP parameters
• Enabling PortFast on ports can cause temporary bridging loops, in both trunking and nontrunking
mode.
• If BPDUs are received on a PortFast- enabled interface, the interface loses the edge port status
unless it receives a shutdown/no shutdown command.
• PortFast immediately puts the interface into the forwarding state without having to wait for the
standard forward time.
STP parameters
The following section discusses bridge parameters.
Bridge parameters
These parameters are set in STP, RSTP, MSTP, PVST+, and R-PVST+.
Bridge priority
Use this parameter to specify the priority of a device and to determine the root bridge.
Each device has a unique bridge identifier called the bridge ID. The bridge ID is an 8 byte value that is
composed of two fields: a 2 B bridge priority field and the 6 B MAC address field. The value for the
bridge priority ranges from 0 to 61440 in increments of 4096. The default value for the bridge priority is
32768. You use the bridge-priority command to set the appropriate values to designate a device
as the root bridge or root device. A default bridge ID may appear as 32768.768e.f805.5800. If the
bridge priorities are equal, the device with the lowest MAC address is elected the root.
After you decide what device to designate as the root, you set the appropriate device bridge priorities.
The device with the lowest bridge priority becomes the root device. When a device has a bridge priority
that is lower than that of all the other devices, it is automatically selected as the root.
The root device should be centrally located and not in a "disruptive" location. Backbone devices
typically serve as the root because they usually do not connect to end stations. All other decisions in the
network, such as which port to block and which port to put in forwarding mode, are made from the
perspective of the root device.
You may also specify the bridge priority for a specific VLAN. If the VLAN parameter is not provided, the
priority value is applied globally for all per-VLAN instances. However, for the VLANs that have been
configured explicitly, the per-VLAN configuration takes precedence over the global configuration.
Bridge Protocol data units (BPDUs) carry information between devices. All the devices in the Layer 2
network, participating in any variety of STP, gather information on other devices in the network through
an exchange of BPDUs. As the result of exchange of the BPDUs, the device with the lowest bridge ID is
elected as the root bridge
When setting the bridge forward delay, bridge maximum aging time, and the hello time parameters
keep in mind that the following relationship should be kept:
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 169
Error disable timeout parameter 802.1d Spanning Tree Protocol
Additionally, you may specify the forward delay for a specific VLAN. If the VLAN parameter is not
provided, the bridge forward delay value is applied globally for all per-VLAN instances. However, for the
VLANs that have been configured explicitly, the per-VLAN configuration takes precedence over the
global configuration.
Keeping with the inequality shown above, when configuring the maximum aging time, you must set the
value greater than the hello time. The range of values is 6 through 40 seconds while he default is
20 seconds.
You may specify the maximum aging for a specific VLAN. If the VLAN parameter is not provided, the
priority value is applied globally for all per-VLAN instances. However, for the VLANs that have been
configured explicitly, the per-VLAN configuration takes precedence over the global configuration.
Use the hello-time command to configure the bridge hello time. The range is from 1
through 10 seconds. The default is 2 seconds.
You may also specify the hello time for a specific VLAN. If the VLAN parameter is not provided, the
priority value is applied globally for all per-VLAN instances. However, for the VLANs that have been
configured explicitly, the per-VLAN configuration takes precedence over the global configuration.
These parameters are be set in STP, RSTP, MSTP, PVST+, and R-PVST+.
When the STP BPDU guard disables a port, the port remains in the disabled state unless the port is
enabled manually. The parameter specifies the time in seconds it takes for an interface to time out. The
range is from 10 through 1000000 seconds. The default is 300 seconds.
This parameter can be set in STP, RSTP, MSTP, PVST+, and R-PVST+ mode.
Extreme SLX-OS
170 Layer 2 Switching Configuration Guide, 20.1.1
802.1d Spanning Tree Protocol Configuring STP
Configuring STP
The following section discusses configuring STP.
You can enable STP or STP with one or more parameters enabled.
For detailed descriptions of the parameters and features, see the sections STP parameters and STP
features.
The bridge with the lowest priority number (highest priority) is designated the root bridge . The
range of values is 0 through 61440; values can be set only in increments of 4096. The default priority
is 32678.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 171
Enabling and configuring STP globally 802.1d Spanning Tree Protocol
device(config-stp)# forward-delay 20
The forward delay specifies how long an interface remains in the listening and learning states before
it begins forwarding all spanning tree instances. The valid range is from 4 through 30 seconds. The
default is 15 seconds.
6. Configure the maximum aging time.
device(config-stp)# max-age 25
This parameter controls the maximum length of time that passes before an interface saves its BPDU
configuration information. You must set the maximum age to be greater than the hello time. The
range is 6 through 40 seconds. The default is 20 seconds.
7. Configure the maximum hello time.
device(config-stp)# hello-time 8
The hello time determines how often the switch interface broadcasts hello BPDUs to other devices.
The default is 2 seconds while the range is from 1 through 10 seconds.
8. Enable the error disable timeout timer.
This parameter enables a timer that brings a port out of the disabled state. By default, the timeout
feature is disabled.
9. Set the error disable timeout timer.
When enabled the default is 300 seconds and the range is from 10 through 1000000 seconds.
10. Configure the port channel path cost.
Specifying custom means the path cost changes according to the port channel's bandwidth.
11. Return to privileged EXEC mode.
device(config-stp)# end
Extreme SLX-OS
172 Layer 2 Switching Configuration Guide, 20.1.1
802.1d Spanning Tree Protocol Enabling and configuring STP on an interface
Observe that the settings comply with the formula set out in the STP parameter configuration
section, as:
For detailed descriptions of the parameters and features, see the sections STP parameters and STP
features.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 173
Enabling and configuring STP on an interface 802.1d Spanning Tree Protocol
device(conf-if-eth-0/20)# no shutdown
4. Configure the path cost for spanning tree calculations on the interface.
The lower the path cost means a greater chance that the interface becomes the root port. The range
is 1 through 200000000. The default path cost is assigned as per the port speed.
5. Enable BPDU guard on the interface.
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain
borders and keeps the active topology predictable by not allowing any network devices behind a
BPDU guard-enabled port to participate in STP.
6. Configure Root Guard on the interface.
Root Guard protects the root bridge from malicious attacks and unintentional misconfigurations
where a bridge device that is not intended to be the root bridge becomes the root bridge.
7. Specify an interface link-type.
Specifying a point-to-point link enables rapid spanning tree transitions to the forwarding state.
Specifying a shared link disables spanning tree rapid transitions. The default setting is point-to-point.
8. Specify port priority to influence the selection of root or designated ports.
The range is from 0 through 240 in increments of 16. The default value is 128.
9. Verify the configuration.
Extreme SLX-OS
174 Layer 2 Switching Configuration Guide, 20.1.1
802.1d Spanning Tree Protocol Configuring basic STP parameters
Note
Observe that the settings comply with the formula set out in the STP parameters section,
as:
(2 × (forward delay - 1)) ≥ maximum age ≥ (2 × (hello time
+ 1))
or in this case: 38 ≥ 25 ≥ 18
10. Save the settings by copying the running configuration to the startup configuration.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 175
Configuring basic STP parameters 802.1d Spanning Tree Protocol
The priority values can be set only in increments of 4096. The range is 0 through 61440.
5. Specify the bridge forward delay.
device(config-stp)# forward-delay 20
device(config-stp)# max-age 25
device(config-stp)# hello-time 8
11. Specify port priorities to influence the selection of the root and designated ports.
Root guard lets the device top participate in the STP but only when the device does not attempt to
become the root.
Extreme SLX-OS
176 Layer 2 Switching Configuration Guide, 20.1.1
802.1d Spanning Tree Protocol Configuring basic STP parameters
device(conf-if-eth-0/12)# end
Observe that the settings comply with the formula set out in the STP parameter configuration
section, as:
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 177
Re-enabling an error-disabled port automatically 802.1d Spanning Tree Protocol
The interval range is from 0 to 1000000 seconds, the default is 300 seconds.
5. Return to privileged EXEC mode.
device(config-stp)# end
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
Extreme SLX-OS
178 Layer 2 Switching Configuration Guide, 20.1.1
802.1d Spanning Tree Protocol Clearing spanning tree-detected protocols
3. Restart the spanning tree migration process on a specific port channel interface.
• Shut down STP on a specific interface and return to privileged EXEC mode.
• Shut down STP on a specific VLAN and return to privileged EXEC mode.
device(config)# vlan 10
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 179
Shutting down STP 802.1d Spanning Tree Protocol
Note
Shutting down STP on a VLAN is used in this example.
Extreme SLX-OS
180 Layer 2 Switching Configuration Guide, 20.1.1
802.1w Rapid Spanning Tree Protocol
Rapid Spanning Tree Protocol overview on page 181
Configuring RSTP on page 183
The STP (802.1d) standard was designed at a time when recovering connectivity after an outage within
a minute or so was considered adequate performance. With the advent of Layer 3 switching in LAN
environments, bridging competes with routed solutions where protocols such as OSPF are able to
provide an alternate path in less time.
RSTP can be seen as evolution of the STP standard. It provides rapid convergence of connectivity
following the failure of bridge, a bridge port, or a LAN. It provides rapid convergence of edge ports, new
root ports, and ports connected through point-to-point links. The port, which qualifies for fast
convergence, is derived from the duplex mode of a port. A port operating in full-duplex will be assumed
to be point-to-point, while a half-duplex port will be considered as a shared port by default. This
automatic setting can be overridden by explicit configuration.
RSTP is designed to be compatible and interoperate with STP. However, the benefit of RSTP fast
convergence is lost when interacting with legacy STP (802.1d) bridges since RSTP downgrades itself to
STP when it detects a connection to a legacy bridge.
The states for every Layer 2 interface running the RSTP are as follows:
State Action
Learning The interface prepares to participate in frame forwarding.
Forwarding The interface forwards frames.
Discarding The interface discards frames. Ports in the discarding state do not take part in the active
topology and do not learn MAC addresses.
Note: The STP disabled, blocking, and listening states are merged into the RSTP
discarding state.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 181
RSTP Parameters 802.1w Rapid Spanning Tree Protocol
The RSTP port roles for the interface are also different. RSTP differentiates explicitly between the state
of the port and the role it plays in the topology. RSTP uses the root port and designated port roles
defined in STP, but splits the blocked port role into backup port and alternate port roles:
Backup port Provides a backup for the designated port and can only exist where two or more ports
of the switch are connected to the same LAN; the LAN where the bridge serves as a
designated switch.
Alternate port Serves as an alternate port for the root port providing a redundant path towards the
root bridge.
Only the root port and the designated ports are part of the active topology; the alternate and backup
ports do not participate. When the network is stable, the root and designated ports are in the
forwarding state, while the alternate and backup ports are in the discarding state. When there is a
topology change, the new RSTP port roles allow a faster transition of an alternate port into the
forwarding state.
For more information about spanning trees, see the introductory sections in #unique_202.
RSTP Parameters
The parameters you would normally set when configuring STP are applicable to RSTP. Before you
configure RSTP see the STP parameters sections for descriptions of the bridge parameters, the error
disable timeout parameter, and the port channel path cost parameter.
There is one parameter that can be configured in RSTP that is not available in STP; the transmit hold
count. This parameter configures the BPDU burst size by specifying the maximum number of BPDUs
transmitted per second for before pausing for 1 second. The range is 1 through 10 while the default is 6.
See Configuring RSTP on page 183 for the procedures to configure this parameter.
The edge port and auto edge features can be enabled in RSTP as well. See the section Edge port and
automatic edge detection on page 182 and the section Enabling and configuring RSTP on an interface
on page 185 for descriptions of these features and how they are configured.
From an interface, you can configure a device to automatically identify the edge port. The port can
become an edge port if no BPDU is received. By default, automatic edge detection is disabled.
Extreme SLX-OS
182 Layer 2 Switching Configuration Guide, 20.1.1
802.1w Rapid Spanning Tree Protocol Configuring RSTP
• When an edge port receives a BPDU, it becomes a normal spanning tree port and is no longer an
edge port.
• Because ports that are directly connected to end stations cannot create bridging loops in the
network, edge ports transition directly to the forwarding state and skip the listening and learning
states.
Note
If BPDUs are received on a port fast enabled interface, the interface loses the edge port status
unless it receives a shutdown or no shutdown command.
Configuring RSTP
See the section STP parameters for parameters applicable to all STP variants.
You can enable RSTP or RSTP with one or more parameters enabled. The parameters can be enabled or
changed individually by entering the commands in steps 1 and 2, running the parameter command,
verifying the result, and then saving the configuration.
2. Enable RSTP.
The range is 0 through 61440 and the priority values can be set only in increments of 4096.
You can shut down RSTP by entering the shutdown command when in RSTP configuration mode.
4. Configure the bridge forward delay value.
device(conf-rstp)# forward-delay 15
device(conf-rstp)# max-age 20
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 183
Enabling and configuring RSTP globally 802.1w Rapid Spanning Tree Protocol
device(conf-rstp)# hello-time 2
device(config-rstp)# transmit-holdcount 5
This command configures the maximum number of BPDUs transmitted per second.
10. Return to privileged exec mode.
device(conf-rstp)# end
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 28 ≥ 20 ≥ 6.
12. Save the configuration.
Extreme SLX-OS
184 Layer 2 Switching Configuration Guide, 20.1.1
802.1w Rapid Spanning Tree Protocol Enabling and configuring RSTP on an interface
You can configure the parameters individually on an interface by doing the following:
For detailed descriptions of the parameters and features, see the sections STP parameters and STP
features.
device(conf-if-eth-0/10)# no shutdown
To disable the spanning tree on the interface you use the spanning-tree shutdown command.
4. Specify the port priority on the interface.
The range is from 0 through 240 in increments of 16. The default value is 128.
5. Specify the path cost on the interface.
The lower the path cost means a greater chance that the interface becomes the root port. The range
is 1 through 200000000. The default path cost is assigned as per the port speed.
6. Enable edge port.
If BPDUs are received on a port fast enabled interface, the interface loses the edge port status unless
it receives a shutdown or no shutdown command.
7. Enable BPDU guard on the interface.
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain
borders and keeps the active topology predictable by not allowing any network devices behind a
BPDU guard-enabled port to participate in STP.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 185
Enabling and configuring RSTP on an interface 802.1w Rapid Spanning Tree Protocol
You use this command to automatically identify the edge port. A port becomes an edge port if it
receives no BPDUs. By default, automatic edge detection is disabled.
9. Enable root guard on the interface.
Root guard protects the root bridge from malicious attacks and unintentional misconfigurations
where a bridge device that is not intended to be the root bridge becomes the root bridge.
10. Specify a link type on the interface.
Note
The link type is explicitly configured as point-to-point rather than shared.
device(conf-if-eth-0/10)# end
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
Extreme SLX-OS
186 Layer 2 Switching Configuration Guide, 20.1.1
802.1w Rapid Spanning Tree Protocol Configuring basic RSTP parameters
The forward-delay, hello-time, and max-age parameters are set globally, not on the
interface.
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 28 ≥ 20 ≥ 6.
13. Save the configuration.
2. Enable RSTP.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 187
Configuring basic RSTP parameters 802.1w Rapid Spanning Tree Protocol
device(conf-if-eth-0/10)# exit
d. Repeat the above steps for all ports that connect to a workstation or PC.
7. Specify port priorities.
a. Enter interface subtype configuration mode.
device(conf-if-eth-0/11)# exit
device(conf-if-eth-0/1)# exit
Extreme SLX-OS
188 Layer 2 Switching Configuration Guide, 20.1.1
802.1w Rapid Spanning Tree Protocol Clearing spanning tree counters
Address 768e.f805.5800
Observe that the settings comply with the formula set out in the STP parameters section, as follows:
or in this case: 28 ≥ 20 ≥ 6.
10. Save the configuration.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 189
Clearing spanning tree-detected protocols 802.1w Rapid Spanning Tree Protocol
3. Restart the spanning tree migration process on a specific port channel interface.
• Shut down RSTP on a specific interface and return to privileged EXEC mode.
• Shut down RSTP on a specific VLAN and return to privileged EXEC mode.
device(config)# vlan 10
device(config-vlan-10)# spanning-tree shutdown
device(config-vlan-10)# end
Extreme SLX-OS
190 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid
Per-VLAN Spanning Tree+
PVST+ and R-PVST+ overview on page 191
Configuring PVST+ and R-PVST+ on page 198
Both the STP and the RSTP build a single logical topology. A typical network has multiple VLANs. A
single logical topology does not efficiently utilize the availability of redundant paths for multiple VLANs.
A single logical topology does not efficiently utilize the availability of redundant paths for multiple
VLANs. If a port is set to the blocked state or the discarding state for one VLAN (under the STP or the
RSTP), it is the same for all other VLANs. PVST+ builds on the STP on each VLAN, and R-PVST+ builds
on the RSTP on each VLAN.
PVST+ R-PVST+ provide interoperability with Cisco PVST and R-PVST and other vendor switches which
implement Cisco PVST or R-PVST. the PVST+ and R-PVST+ implementations are extensions to PVST
and R-PVST, which can interoperate with an STP topology, including MSTP (CIST), on Extreme and
other vendor devices sending untagged IEEE BPDUs.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 191
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
PVST+ and R-PVST+ parameters Spanning Tree+
• In PVST/+ or R-PVST+ mode, when you are connected to a Cisco or MLX switch, the Cisco
proprietary MAC address to which the BPDUs are sent/processed must be explicitly configured on a
per-port basis.
• In PVST/+ or R-PVST+ mode, when you connect to a Cisco switch using a trunk port, the Extreme
switch must have a native VLAN configured on the trunk port (same configuration as on the other
side).
• A Common Spanning Tree (CST) is the single spanning tree instance used by Extreme switches to
interoperate with 802.1q bridges. This spanning tree instance stretches across the entire network
domain (including PVST, PVST+ and 802.1q regions). It is associated with VLAN 1 on the Extreme
switch.
• In order to interact with STP and IEEE 802.1q trunk, PVST evolved to PVST+ to interoperate with STP
topology by STP BPDU on the native or default VLAN.
• A group of switches running PVST+ is called a PVST+ region.
For more information about spanning trees, see the introductory sections in the Spanning Tree Protocol
chapter.
There is one parameter that can be configured in R-PVST+ that is not available in STP or PVST+; the
transmit hold count. This parameter configures the BPDU burst size by specifying the maximum
number of BPDUs transmitted per second for before pausing for 1 second. The range is 1 through 10
while the default is 6. See the section Configuring R-PVST+ for the procedure to configure this
parameter.
Across IEEE 802.1q trunks, Extreme switches run PVST+. The goal is to interoperate with standard IEEE
STP (or RSTP or MSTP), while transparently tunneling PVST+ instance BPDUs across the MST region to
potentially connect to other Extreme switches across the MST region.
On trunk ports that allow VLAN 1, PVST+ also sends PVST+ BPDUs to a Cisco-proprietary multicast MAC
address (0100.0ccc.cccd) or Extreme-proprietary multicast MAC address (0304.0800.0700)
depending on the configuration. By default, the PVST+ BPDUs are sent to Extreme-proprietary
multicast MAC address on Extreme switches. These BPDUs are tunneled across an MST region. The
PVST+ BPDUs for VLAN 1 are only used for the purpose of consistency checks and that it is only the
IEEE BPDUs that are used for building the VLAN 1 spanning tree. So in order to connect to the CST, it is
necessary to allow VLAN 1 on all trunk ports.
Extreme SLX-OS
192 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ BPDU configuration notes
For all other VLANs, PVST+ BPDUs are sent on a per-VLAN basis on the trunk ports. These BPDUs are
tunneled across an MST region. Consequently, for all other VLANs, MST region appears as a logical hub.
The spanning tree instances for each VLAN in one PVST+ region map directly to the corresponding
instances in another PVST+ region and the spanning trees are calculated using the per-VLAN PVST+
BPDUs.
Similarly, when a PVST+ region connects to a MSTP region, from the point of view of MSTP region, the
boundary bridge thinks it is connected to a standard IEEE compliant bridge sending STP BPDUs. So it
joins the CIST of the MSTP region to the CST of the PVST+ region (corresponding to VLAN 1). The PVST
+ BPDUs are tunneled transparently through the MSTP region. So from the Extreme bridge point of
view, the MSTP region looks like a virtual hub for all VLANs except VLAN 1.
The PVST+ BPDUs are sent untagged for the native VLAN and tagged for all other VLANs on the trunk
port.
On access ports, Extreme switches run classic version of IEEE STP/RSTP protocol, where the BPDUs are
sent to the standard IEEE multicast address "0180.C200.0000". So if we connect a standard IEEE switch
to an access port on the Extreme switch, the spanning tree instance (corresponding to the access VLAN
on that port) of the Extreme switch is joined with the IEEE STP instance on the adjacent switch.
For introductory information about STP BPDUs, see the section BPDUs on page 164.
Topology Change Notification (TCN) BPDUs are used to inform other switches of port changes. TCNs
are injected into the network by a non-root switch and propagated to the root. Upon receipt of the TCN,
the root switch will set a Topology Change flag in its normal BPDUs. This flag is propagated to all other
switches to instruct them to rapidly age out their forwarding table entries.
In PVST+, three types of TCN BPDUs are sent out depending on the type of the link. See Table 38 on
page 196 and Table 39 on page 196.
• Standard IEEE TCN BPDU.
• Untagged TCN BPDU sent to the Cisco/Extreme proprietary MAC address.
• Tagged TCN BPDU sent to the Cisco/Extreme proprietary MAC address.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 193
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
BPDU configuration notes Spanning Tree+
Extreme SLX-OS
194 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ BPDU configuration notes
Sent BPDUs
On an 802.1q trunk, the PVST+ enabled switch sends the following BPDUs:
1. For all tagged VLANs on the port on which PVST+ is enabled, 802.1q tagged SSTP BPDUs are sent to
the Cisco or Extreme MAC address. The 802.1q tag contains the VLAN ID. (VLAN 1 could be tagged
on the port. In that case a tagged BPDU for VLAN 1 is sent). The IEEE compliant switches do not
consider these BPDUs as a control packet. So they forward the frame as they would forward to any
unknown multicast address on the specific VLAN.
2. If PVST+ is enabled on the untagged (native) VLAN of the port, an untagged SSTP BPDU is sent to
the Extreme or Cisco MAC address on the native VLAN of the trunk. It is possible that the native
VLAN on the Extreme or Cisco port is not VLAN 1. This BPDU is also forwarded on the native VLAN
of the IEEE 802.1q switch just like any other frame sent to an unknown multicast address.
3. In addition to the above SSTP BPDUs, a standard IEEE BPDU (802.1d) is also sent, corresponding to
the information of VLAN 1 on the Extreme or Cisco switch. This BPDU is not sent if VLAN 1 is
explicitly disabled on the trunk port.
The following table lists the types of BPDUs sent in case of different port types. The numbers in the
third column are the VLAN instance for which these BPDUs are sent/processed.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 195
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
BPDU configuration notes Spanning Tree+
Table 37: Types of BPDUs sent for different port types (continued)
Port Configuration Extreme or Cisco - PVST(+) VLAN instance
Trunk - Native VLAN 100 Standard IEEE BPDU (64B) 1
Allowed VLANs - 1, 100, 200 Extreme or Cisco untagged BPDU (68B) 100
Extreme or Cisco tagged BPDU (72B 1
Extreme or Cisco tagged BPDU (72B) 200
Trunk - Native VLAN 100 Extreme or Cisco untagged BPDU (68B) 100
Allowed VLANs - 100
Trunk - Native VLAN 100 Extreme or Cisco untagged BPDU (68B) 100
Allowed VLANs - 100, 200 Extreme or Cisco tagged BPDU (72B) 200
For introductory information about STP BPDUs, see the section TCN BPDUs on page 165.
Extreme SLX-OS
196 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ PortFast
PortFast
PortFast allows an interface to transition quickly to the forwarding state.
From an interface, you can configure a device to automatically identify the edge port. The port can
become an edge port if no BPDU is received. By default, automatic edge detection is disabled.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 197
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Configuring PVST+ and R-PVST+ Spanning Tree+
• When an edge port receives a BPDU, it becomes a normal spanning tree port and is no longer an
edge port.
• Because ports that are directly connected to end stations cannot create bridging loops in the
network, edge ports transition directly to the forwarding state and skip the listening and learning
states.
Note
If BPDUs are received on a port fast enabled interface, the interface loses the edge port status
unless it receives a shutdown or no shutdown command.
You can enable PVST+ with one or more parameters configured. The parameters can be configured or
changed individually by entering the commands in steps 1 and 2, running the parameter command,
verifying the result, and then saving the configuration.
For more information about spanning trees and spanning tree parameters, see the introductory sections
in the Spanning Tree Protocol chapter.
2. Enable PVST+.
Valid values range from 0 through 61440 in increments of 4096. Assigning a lower priority value
indicates that the bridge might become root.
You can shut down PVST+ by entering the shutdown command when in PVST configuration mode.
4. Configure the forward delay parameter.
device(config-pvst)# forward-delay 11
device(config-pvst)# hello-time 2
device(config-pvst)# max-age 7
Extreme SLX-OS
198 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ Enabling and configuring PVST+ globally
device(config-pvst)# end
VLAN 100
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 20 ≥7 ≥ 6.
9. Save the configuration.
For more information about configuring PVST+ parameters, see STP parameters on page 169. PVST+, R-
PVST+, and other types of spanning trees share many tasks with STP.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 199
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Enabling and configuring PVST+ on an interface Spanning Tree+
For detailed descriptions of the parameters and features, see the sections STP parameters and STP
features.
1. Enter global configuration mode.
2. Enable PVST+.
6. Specify the port priority to influence the selection of root or designated ports.
The range is from 0 through 240 in increments of 16. The default value is 128.
7. Configure the path cost for spanning tree calculations on the interface.
The lower the path cost means a greater chance that the interface becomes the root port. The range
is 1 through 200000000. The default path cost is assigned as per the port speed.
8. Configure the path cost for spanning tree calculations a specific VLAN.
The lower the path cost means a greater chance that the interface becomes the root port. The range
is 1 through 200000000. The default path cost is assigned as per the port speed.
9. Enable root guard on the interface.
Root guard protects the root bridge from malicious attacks and unintentional misconfigurations
where a bridge device that is not intended to be the root bridge becomes the root bridge.
Extreme SLX-OS
200 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ Enabling and configuring PVST+ on an interface
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain
borders and keeps the active topology predictable by not allowing any network devices behind a
BPDU guard-enabled port to participate in STP.
11. Enable BPDU filtering on the interface.
BPDU filtering allows you to avoid transmitting BPDUs on ports that are connected to an end
system.
12. Return to privileged EXEC mode.
device(conf-if-eth-0/3)# exit
Observe that the settings comply with the formula set out in the STP parameters section, as:
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 201
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Enabling and configuring PVST+ on a system Spanning Tree+
For detailed descriptions of the parameters and features, see the sections STP parameters and STP
features.
1. Enter global configuration mode.
2. Enable PVST+.
Valid values range from 0 through 61440 in multiples of 4096. Assigning a lower priority value
indicates that the bridge might become root.
4. Configure the forward delay parameter.
device(config-pvst)# forward-delay 15
device(config-pvst)# hello-time 2
device(config-pvst)# max-age 20
7. Add VLANs.
a. Configure VLAN 100 with a priority of 0.
Extreme SLX-OS
202 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ Enabling and configuring PVST+ on a system
device(conf-if-eth-0/3)# switchport
device(conf-if-eth-0/3)# exit
device(conf-if-eth-0/4)# switchport
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 203
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Enabling and configuring PVST+ on a system Spanning Tree+
device(conf-if-eth-0/4)# exit
10. To interoperate with switches other than VDX switches in PVST+ mode, you must configure the
interface that is connected to that switch.
a. Enter interface configuration mode for the port that interoperates with a VDX device.
device(conf-if-eth-0/12)# end
VLAN 1
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
Extreme SLX-OS
204 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ Enabling and configuring PVST+ on a system
VLAN 100
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
VLAN 201
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 205
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Enabling and configuring PVST+ on a system Spanning Tree+
VLAN 301
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
Extreme SLX-OS
206 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ Enabling and configuring R-PVST+ globally
Number of forward-transitions: 0
Version: Per-VLAN Spanning Tree Protocol - Received None - Sent STP
Portfast: off
Configured Root guard: off; Operational Root guard: off
Bpdu-guard: off
Link-type: point-to-point
Received BPDUs: 0; Sent BPDUs: 0
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 28 ≥ 20 ≥ 6.
12. Save the configuration.
2. Enable R-PVST+.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 207
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Enabling and configuring R-PVST+ globally Spanning Tree+
Valid priority values range from 0 through 61440 in multiples of 4096. Assigning a lower priority
value indicates that the bridge might become root.
4. Configure the forward delay parameter.
device(config-rpvst)# forward-delay 20
device(config-rpvst)# hello-time 22
device(config-rpvst)# max-age 8
device(config-rpvst)# transmit-holdcount 9
This command configures the maximum number of BPDUs transmitted per second before pausing
for 1 second. The range is 1 through 10. The default is 6.
8. Return to privileged exec mode.
device(config-rpvst)# end
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 20 ≥ 7 ≥ 6.
10. Save the configuration.
Extreme SLX-OS
208 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ Enabling and configuring R-PVST+ on an interface
For more information about configuring parameters, see the section STP parameter configuration.
For detailed descriptions of the parameters and features, see the sections STP parameters and STP
features.
2. Enable R-PVST+.
6. Specify the port priority to influence the selection of root or designated ports.
The range of priority values is from 0 through 240 in multiples of 16. The default value is 128.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 209
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Enabling and configuring R-PVST+ on an interface Spanning Tree+
7. Configure the path cost for spanning tree calculations on the interface.
The lower the path cost means a greater chance that the interface becomes the root port. The range
is 1 through 200000000. The default path cost is assigned as per the port speed.
8. Configure the path cost for spanning tree calculations a specific VLAN.
The lower the path cost means a greater chance that the interface becomes the root port. The range
is 1 through 200000000. The default path cost is assigned as per the port speed.
9. Enable automatic edge detection on the interface.
You use this command to automatically identify the edge port. A port becomes an edge port if it
receives no BPDUs. By default, automatic edge detection is disabled.
10. Enable root guard on the interface.
Root guard protects the root bridge from malicious attacks and unintentional misconfigurations
where a bridge device that is not intended to be the root bridge becomes the root bridge.
11. Enable the spanning tree on the edge port.
If BPDUs are received on a port fast enabled interface, the interface loses the edge port status unless
it receives a shutdown or no shutdown command.
12. Enable BPDU guard on the interface.
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain
borders and keeps the active topology predictable by not allowing any network devices behind a
BPDU guard-enabled port to participate in STP.
13. Return to privileged EXEC mode.
device(conf-if-eth-0/3)# exit
Extreme SLX-OS
210 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ Enabling and configuring R-PVST+ on a system
Observe that the settings comply with the formula set out in the STP parameters section, as:
For detailed descriptions of the parameters and features, see the sections STP parameters and STP
features.
1. Enter global configuration mode.
2. Enable R-PVST+.
You can shut down R-PVST+ by entering the shutdown command when in rpvst configuration
mode.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 211
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Enabling and configuring R-PVST+ on a system Spanning Tree+
Valid values range from 0 through 61440 in increments of 4096. Assigning a lower priority value
indicates that the bridge might become root.
4. Configure the forward delay parameter.
device(config-rpvst)# forward-delay 20
device(config-rpvst)# hello-time 8
device(config-rpvst)# max-age 22
device(config-rpvst)# transmit-holdcount 5
This command configures the maximum number of BPDUs transmitted per second. The range of
values is 1 through 10.
8. Configure VLANs.
a. Configure VLAN 100 with a priority of 0.
device(conf-if-eth-0/3)# switchport
Extreme SLX-OS
212 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ Enabling and configuring R-PVST+ on a system
device(conf-if-eth-0/3)# exit
device(conf-if-eth-0/4)# switchport
device(conf-if-eth-0/4)# exit
11. To interoperate with switches other than VDX switches in R-PVST+ mode, you must configure the
interface that is connected to that switch.
a. Enter interface configuration mode for the port that interoperates with a VDX switch.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 213
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Enabling and configuring R-PVST+ on a system Spanning Tree+
device(conf-if-eth-0/12)# end
VLAN 1
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 20; Hello Time: 8; Max Age: 22; Max-hops: 20
Tx-HoldCount 5
Number of topology change(s): 0
VLAN 100
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 20; Hello Time: 8; Max Age: 22; Max-hops: 20
Extreme SLX-OS
214 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ Enabling and configuring R-PVST+ on a system
Tx-HoldCount 5
Number of topology change(s): 0
VLAN 201
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 20; Hello Time: 8; Max Age: 22; Max-hops: 20
Tx-HoldCount 5
Number of topology change(s): 0
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 215
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Enabling and configuring R-PVST+ on a system Spanning Tree+
VLAN 301
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 20; Hello Time: 8; Max Age: 22; Max-hops: 20
Tx-HoldCount 5
Number of topology change(s): 0
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 28 ≥ 20 ≥ 6.
Extreme SLX-OS
216 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ Clearing spanning tree counters
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 217
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Clearing spanning tree-detected protocols Spanning Tree+
3. Restart the spanning tree migration process on a specific port channel interface.
• Shut down PVST+ or R-PVST+ on a specific interface and return to privileged EXEC mode.
• Shut down PVST+ or R-PVST+ on a specific VLAN. and return to privileged EXEC mode.
device(config)# vlan 10
device(config-vlan-10)# spanning-tree shutdown
device(config-vlan-10)# end
Extreme SLX-OS
218 Layer 2 Switching Configuration Guide, 20.1.1
Per-VLAN Spanning Tree+ and Rapid Per-VLAN
Spanning Tree+ Shutting down PVST+ or R-PVST+
Note
Shutting down PVST+ on a VLAN is used in this example.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 219
802.1s Multiple Spanning Tree Protocol
MSTP overview on page 220
MSTP global level parameters on page 223
MSTP interface level parameters on page 223
Configuring MSTP on page 225
MSTP overview
IEEE 802.1s Multiple STP (MSTP) helps create multiple loop-free active topologies on a single physical
topology.
MSTP uses RSTP to group VLANs into separate spanning-tree instance. Each instance has its own
spanning-tree topology independent of other spanning tree instances, which allows multiple forwarding
paths, permits load balancing, and facilitates the movement of data traffic. A failure in one instance
does not affect other instances. By enabling the MSTP, you are able to more effectively utilize the
physical resources present in the network and achieve better load balancing of VLAN traffic.
The MSTP evolved as a compromise between the two extremes of the RSTP and R-PVST+, it was
standardized as IEEE 802.1s and later incorporated into the IEEE 802.1Q-2003 standard. The MSTP
configures a meshed topology into a loop-free, tree-like topology. When the link on a bridge port goes
up, an MSTP calculation occurs on that port. The result of the calculation is the transition of the port into
either a forwarding or blocking state. The result depends on the position of the port in the network and
the MSTP parameters. All the data frames are forwarded over the spanning tree topology calculated by
the protocol.
Note
Multiple switches must be configured consistently with the same MSTP configuration to
participate in multiple spanning tree instances. A group of interconnected switches that have
the same MSTP configuration is called an MSTP region.
MSTP is backward compatible with the STP and the RSTP.
Extreme SLX-OS
220 Layer 2 Switching Configuration Guide, 20.1.1
802.1s Multiple Spanning Tree Protocol Internal Spanning Tree (IST)
The Extreme implementation supports up to 32 spanning tree instances in an MSTP enabled bridge that
can support up to 32 different Layer 2 topologies. The spanning tree algorithm used by the MSTP is the
RSTP, which provides quick convergence.
By default all configured VLANs including the default VLAN are assigned to and derive port states from
CIST until explicitly assigned to MSTIs.
MST regions
MST regions are clusters of bridges that run multiple instances of the MSTP protocol. Multiple bridges
detect that they are in the same region by exchanging their configuration (instance to VLAN mapping),
name, and revision-level. Therefore, if you need to have two bridges in the same region, the two bridges
must have identical configurations, names, and revision-levels. Also, one or more VLANs can be mapped
to one MST instance (IST or MSTI) but a VLAN cannot be mapped to multiple MSTP instances
MSTP regions
MSTP introduces a hierarchical way of managing device domains using regions. Devices that share
common MSTP configuration attributes belong to a region. The MSTP configuration determines the
MSTP region where each device resides. The common MSTP configuration attributes are as follows:
• Alphanumeric configuration name (32 bytes)
• Configuration revision number (2 bytes)
• 4096-element table that maps each of the VLANs to an MSTP instance
Region boundaries are determined by the above attributes. An MSTI is an RSTP instance that operates
inside an MSTP region and determines the active topology for the set of VLANs mapping to that
instance. Every region has a CIST that forms a single spanning tree instance which includes all the
devices in the region. The difference between the CIST instance and the MSTP instance is that the CIST
instance operates across the MSTP region and forms a loop-free topology across regions, while the
MSTP instance operates only within a region. The CIST instance can operate using the RSTP only if all
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 221
MSTP guidelines and restrictions 802.1s Multiple Spanning Tree Protocol
the devices across the regions support the RSTP. However, if any of the devices operate using the STP,
the CIST instance reverts to the STP.
Each region is viewed logically as a single STP or a single RSTP bridge to other regions.
Note
Extreme supports 32 MSTP instances and one MSTP region.
For more information about spanning trees, see the introductory sections in the Spanning Tree Protocol
chapter.
Extreme SLX-OS
222 Layer 2 Switching Configuration Guide, 20.1.1
802.1s Multiple Spanning Tree Protocol MSTP global level parameters
Each of the steps used to configure and operate MSTP are described in the following:
Note
The MSTP Region and Revision global parameters are enabled for interface level parameters
as described below.
• Set the MSTP region name — Each switch that is running MSTP is configured with a name. It applies
to the switch which can have many different VLANs that can belong to many different MSTP
regions. The default MSTP name is "NULL".
• Set the MSTP revision number — Each switch that is running MSTP is configured with a revision
number. It applies to the switch, which can have many different VLANs that can belong to many
different MSTP regions.
• Enabling and disabling Cisco interoperability — While in MSTP mode, use the cisco-
interoperability command to enable or disable the ability to interoperate with certain legacy
Cisco switches. If Cisco interoperability is required on any switch in the network, then all switches in
the network must be compatible, and therefore enabled by means of this command. By default the
Cisco interoperability is disabled.
• The parameters you would normally set when you configure STP are applicable to MSTP. Before you
configure MSTP parameters see the sections explaining bridge parameters, the error disable timeout
parameter and the port-channel path cost parameter in the STP section of this guide.
From an interface, you can configure a device to automatically identify the edge port. The port can
become an edge port if no BPDU is received. By default, automatic edge detection is disabled.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 223
BPDU guard 802.1s Multiple Spanning Tree Protocol
• When an edge port receives a BPDU, it becomes a normal spanning tree port and is no longer an
edge port.
• Because ports that are directly connected to end stations cannot create bridging loops in the
network, edge ports transition directly to the forwarding state and skip the listening and learning
states.
Note
If BPDUs are received on a port fast enabled interface, the interface loses the edge port status
unless it receives a shutdown or no shutdown command.
BPDU guard
In an STP environment, switches, end stations, and other Layer 2 devices use BPDUs to exchange
information that STP will use to determine the best path for data flow.
In a valid configuration, edge port-configured interfaces do not receive BPDUs. If an edge port-
configured interface receives a BPDU, an invalid configuration exists, such as the connection of an
unauthorized device. The BPDU Guard provides a secure response to invalid configurations because the
administrator must manually put the interface back in service.
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain
borders and keeps the active topology predictable by not allowing any network devices behind a BPDU
guard-enabled port to participate in STP.
In some instances, it is unnecessary for a connected device, such as an end station, to initiate or
participate in an STP topology change. In this case, you can enable the STP BPDU guard feature on the
Extreme device port to which the end station is connected. The STP BPDU guard shuts down the port
and puts it into an "error disabled" state. This disables the connected device's ability to initiate or
participate in an STP topology. A log message is then generated for a BPDU guard violation, and a
message is displayed to warn the network administrator of an invalid configuration.
The BPDU Guard provides a secure response to invalid configurations because the administrator must
manually put the interface back in service with the no shutdown command if error disable recovery is
not enabled by enabling the errdisable-timeout command. The interface can also be
automatically configured to be enabled after a timeout. However, if the offending BPDUs are still being
received, the port is disabled again.
Extreme SLX-OS
224 Layer 2 Switching Configuration Guide, 20.1.1
802.1s Multiple Spanning Tree Protocol Restricted role
Restricted role
Configuring restricted role on a port causes the port not to be selected as root port for the CIST or any
MSTI, even if it has the best spanning tree priority vector.
Restricted role ports are selected as an alternate port after the root port has been selected. It is
configured by a network administrator to prevent bridges external to a core region of the network
influencing the spanning tree active topology, possibly because those bridges are not under the full
control of the administrator. It will protect the root bridge from malicious attack or even unintentional
misconfigurations where a bridge device which is not intended to be root bridge, becomes root bridge
causing severe bottlenecks in data path. These types of mistakes or attacks can be avoided by
configuring 'restricted-role' feature on ports of the root bridge . This feature is similar to the "root-
guard" feature which is proprietary implementation of Cisco for STP and RSTP but had been adapted in
the 802.1Q standard as "restricted-role". The "restricted-role" feature if configured on an incorrect port
can cause lack of spanning tree connectivity.
Restricted TCN
TCN BPDUs are used to inform other switches of port changes.
Configuring "restricted TCN" on a port causes the port not to propagate received topology change
notifications and topology changes originated from a bridge external to the core network to other
ports. It is configured by a network administrator to prevent bridges external to a core region of the
network from causing MAC address flushing in that region, possibly because those bridges are not
under the full control of the administrator for the attached LANs. If configured on an incorrect port it
can cause temporary loss of connectivity after changes in a spanning trees active topology as a result of
persistent incorrectly learned station location information.
Configuring MSTP
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 225
Enabling and configuring MSTP globally 802.1s Multiple Spanning Tree Protocol
2. Enable MSTP.
This command creates a context for MSTP. MSTP is automatically enabled. All MSTP specific CLI
commands can be issued only from this context. Entering no protocol spanning-tree mstp
deletes the context and all the configurations defined within the context.
3. Specify the region name.
device(config-mstp)# revision 1
6. Specify the maximum hops for a BPDU to prevent the messages from looping indefinitely on the
interface.
device(config-mstp)# max-hops 25
Setting this parameter prevents messages from looping indefinitely on the interface. The range is 1
through 40 hops while the default is 20 .
7. Map VLANs to MSTP instances and set the instance priority.
a. Map VLANs 7 and 8 to instance 1.
This command can be used only after the VLAN is created. VLAN instance mapping is removed from
the configuration if the underlying VLANs are deleted.
8. Configure a bridge priority for the CIST bridge.
Extreme SLX-OS
226 Layer 2 Switching Configuration Guide, 20.1.1
802.1s Multiple Spanning Tree Protocol Enabling and configuring MSTP globally
device(config-mstp)# forward-delay 15
This command allows you to specify how long an interface remains in the listening and learning
states before it begins forwarding. This command affects all MSTP instances. The range of values is
from 4 to 30 seconds with a default of 15 seconds.
11. Configure hello time.
device(config-mstp)# hello-time 2
The hello time determines how often the switch interface broadcasts hello BPDUs to other devices.
The range is from 1 through 10 seconds with a default of 2 seconds.
12. Configure the maximum age.
device(config-mstp)# max-age 20
You must set the max-age so that it is greater than the hello-time. The range is 6 through 40
seconds with a default of 20 seconds.
13. Specify the port-channel path cost.
This command allows you to control the path cost of a port channel according to bandwidth.
14. Specify the transmit hold count.
device(config-mstp)# transmit-holdcount 5
The transmit hold count is used to limit the maximum number of MSTP BPDUs that the bridge can
transmit on a port before pausing for 1 second. The range is from 1 to 10 seconds with a default of 6
seconds.
15. Configure Cisco interoperability.
This command enables the ability to interoperate with certain legacy Cisco switches. The default is
Cisco interoperability is disabled.
16. Return to privileged exec mode.
device(config-mstp)# end
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 227
Enabling and configuring MSTP on an interface 802.1s Multiple Spanning Tree Protocol
Tx-HoldCount: 6
Number of topology change(s): 139; Last change occurred 00:03:36 ago on Eth 1/2
Name : kerry
Revision Level : 1
Digest : 0x9357EBB7A8D74DD5FEF4F2BAB50531AA
Instance VLAN
-------- ----
0: 1
1: 7,8
2: 21-23
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 28 ≥ 20 ≥ 6.
18. Save the configuration.
1. Entering the commands in Steps 1 through Step 3 for the target interface
2. Running the relevant parameter command
Extreme SLX-OS
228 Layer 2 Switching Configuration Guide, 20.1.1
802.1s Multiple Spanning Tree Protocol Enabling and configuring MSTP on an interface
For detailed descriptions of the parameters and features, see the sections STP parameters and STP
features.
2. Enable MSTP.
device(conf-if-eth-0/5)# no shutdown
This prevents the port from propagating received TCNs and topology changes originating from a
bridge, external to the core network, to other ports.
7. Enable auto detection of an MSTP edge port.
Enabling this feature allows the system to automatically identify the edge port. The port can become
an edge port if no BPDU is received. By default, automatic edge detection is disabled.
8.
device(conf-if-eth-0/5)# spanning-tree edgeport
Enabling edge port allows the port to quickly transition to the forwarding state. By default,
automatic edge detection is disabled.
9. Enable BPDU guard on the port
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain
borders and keeps the active topology predictable by not allowing any network devices behind a
BPDU guard-enabled port to participate in STP.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 229
Enabling and configuring MSTP on an interface 802.1s Multiple Spanning Tree Protocol
The path cost range is from 1 to 200000000. Leaving the default adjusts path cost relative to
changes in the bandwidth. A lower path cost indicates greater likelihood of becoming root port.
11. Configure the link type.
The range is from 0 to 240 in increments of 16 with a default of 32. A lower priority indicates greater
likelihood of becoming root port.
13. Return to privileged exec mode.
device(conf-if-eth-0/5)# end
Extreme SLX-OS
230 Layer 2 Switching Configuration Guide, 20.1.1
802.1s Multiple Spanning Tree Protocol Enabling MSTP on a VLAN
device(config-mstp)# end
CIST Root Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20;
Tx-HoldCount: 6
Number of topology change(s): 0
Name : NULL
Revision Level : 0
Digest : 0xD5FF4C3F6C18E2F27AF3A8300297ABAA
Instance VLAN
-------- ----
0: 1
5: 100
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 28 ≥ 20 ≥ 6.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 231
Configuring basic MSTP parameters 802.1s Multiple Spanning Tree Protocol
2. Enable MSTP.
device(config-mstp)# revision 1
The priority ranges from 0 through 61440 and the value must be in multiples of 4096.
7. Specify the maximum hops for a BPDU.
device(conf-Mstp)# max-hops 25
device(conf-Mstp)# end
Extreme SLX-OS
232 Layer 2 Switching Configuration Guide, 20.1.1
802.1s Multiple Spanning Tree Protocol Configuring basic MSTP parameters
CIST Root Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 25;
Tx-HoldCount: 6
Number of topology change(s): 0
Name : connemara
Revision Level : 1
Digest : 0xD5FF4C3F6C18E2F27AF3A8300297ABAA
Instance VLAN
-------- ----
0: 1,7,8,9
1: 2,3
2: 4-6
Note
Observe that the settings comply with the formula set out in the STP parameters section,
as:
(2 × (forward delay - 1)) ≥ maximum age ≥ (2 × (hello time + 1))
or in this case: 28 ≥ 20 ≥ 6.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 233
Clearing spanning tree counters 802.1s Multiple Spanning Tree Protocol
3. Restart the spanning tree migration process on a specific port channel interface.
Extreme SLX-OS
234 Layer 2 Switching Configuration Guide, 20.1.1
802.1s Multiple Spanning Tree Protocol Shutting down MSTP
device(config-mstp)# shutdown
device(config-mstp)# end
• Shut down MSTP on a specific interface and return to privileged EXEC mode.
• Shut down MSTP on a specific VLAN and return to privileged EXEC mode.
device(config)# vlan 10
device(config-vlan-10)# spanning-tree shutdown
device(config-vlan-10)# end
Note
Shutting down MSTP on a VLAN is used in this example.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 235
Topology Groups
Topology groups on page 236
Master VLAN, member VLANs, and bridge-domains on page 236
Control ports and free ports on page 237
Configuration considerations on page 237
Configuring a topology group on page 238
Displaying topology group information on page 240
Topology groups
A topology group is a named set of VLANs and bridge-domains that share a Layer 2 control protocol.
Topology groups simplify configuration and enhance scalability of Layer 2 protocols by allowing you to
run a single instance of a Layer 2 protocol on multiple VLANs and bridge-domains. One instance of the
Layer 2 protocol controls all the VLANs and bridge-domains.
You can use topology groups with the following Layer 2 protocols:
• Per VLAN Spanning Tree (PVST+)
• Rapid per VLAN Spanning tree (R-PVST+)
Extreme SLX-OS
236 Layer 2 Switching Configuration Guide, 20.1.1
Topology Groups Control ports and free ports
When a Layer 2 topology change occurs, resulting in a change of port state in the master VLAN, the
same port state is applied to all the member VLANs and bridge-domains belonging to the topology
group on that port. For example, if you configure a topology group whose master VLAN contains ports
1/1 and 1/2, a Layer 2 state change on port 1/1 applies to port 1/1 in all the member VLANs and bridge-
domains that contain that port. However, the state change does not affect port 1/1 in VLANs that are not
members of the topology group.
Note
Because free ports are not controlled by the master port’s Layer 2 protocol, they are always in
the forwarding state.
Configuration considerations
The configuration considerations are as follows:
• You can configure up to 128 topology groups. A VLAN or bridge-domain cannot controlled by more
than one topology group. You can configure up to 4K VLANs or bridge-domain as members of
topology group.
• The topology group must contain a master VLAN. The group can also contain individual member
VLANs and or member bridge-domains. You must configure the member VLANs or member bridge-
domains before adding them to the topology group. Bridge-domains cannot be configured as a
master VLAN.
• You cannot delete a master VLAN from the topology group when the member VLANs or bridge-
domains are in the topology group.
• The control port membership must match the master VLAN when adding a member VLAN or
member bridge-domain.
• If a VLAN enabled with the PVST+ or R-PVST+ protocol is added as a member VLAN of a topology
group, the protocol is disabled. The member VLAN is added to the topology group. If the VLAN is
removed from the topology group, the protocol is disabled, and you must enable the protocol if
required.
• Enabling STP on an interface is only allowed if both master VLAN and member VLAN or bridge-
domains are configured on the interface across all topology groups.
• You cannot remove the master VLAN or member VLAN or bridge-domains from an STP enabled
interface.
• Topology group configuration is allowed only with PVST+ and R-PVST+ spanning tree
configurations.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 237
Configuring a topology group Topology Groups
2. Enter the topology-group command to create a topology group at the global configuration level.
device(config)# topology-group 1
device(conf-topo-group-1)#
Note
The no topology-group command deletes an existing topology group.
2. Enter the topology-group command to create a topology group at the global configuration level.
device(config)# topology-group 1
device(conf-topo-group-1)#
3. Enter the master-vlan command to configure a master VLAN in the topology group.
Note
The no master-vlan command removes an existing master VLAN from the topology
group.
Extreme SLX-OS
238 Layer 2 Switching Configuration Guide, 20.1.1
Topology Groups Adding member VLANs
Before adding a member VLAN, you should have created a topology group and configured the master
VLAN for that group. The VLAN should not be part of any other topology group. All control ports of
master VLAN must also be configured for the member VLAN.
2. Enter the topology-group command to create a topology group at the global configuration level.
device(config)# topology-group 1
device(conf-topo-group-1)#
3. Enter the master-vlan command to configure a master VLAN in the topology group.
4. Enter the member-vlan command to add member VLANs to the topology group.
Note
The member-vlan remove command removes an existing member VLAN from the
topology group.
device(conf-topo-group-1)# member-vlan remove 200
Before adding a bridge domain, you should have created a topology group and configured the master
VLAN for that group. The bridge-domain should not be part of any other topology group. All control
ports of master VLAN must also be configured for the member bridge-domain.
2. Enter the topology-group command to create a topology group at the global configuration level.
device(config)# topology-group 1
device(conf-topo-group-1)#
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 239
Replacing a master VLAN Topology Groups
3. Enter the master-vlan command to configure a master VLAN in the topology group.
Note
The member-bridge-domain remove command removes an existing member
bridge-domain from the topology group.
device(conf-topo-group-1)# member-bridge-domain remove 1
To avoid temporary loops when the master VLAN is replaced by another VLAN, the following
recommendation is made:
• Control ports for both the old and the new master VLAN must match.
• The new master VLAN and the old master VLAN must have same ports in the blocking state to avoid
the possibility of temporary loops.
If the recommendation is not followed, and a new master VLAN is configured with a different
convergence, the configuration is still accepted.
Note
The master VLAN replacement is accepted if both the old and the new master VLANs are
spanning-tree disabled.
Extreme SLX-OS
240 Layer 2 Switching Configuration Guide, 20.1.1
Topology Groups Displaying topology group information
==============================
Master VLAN : 100
L2 Protocol: R-PVST
Member VLANs : 200 300
Member Bridge-domains: 10
Control Ports : eth 2/1, eth 2/2, po10
Free Ports : VLAN: 200 –eth 2/3, po11
Bridge-domain: 10 –eth 2/3.20, po11.10
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 241
Loop Detection
LD protocol overview on page 242
LD use cases on page 248
Configuring LD protocol on page 250
Loop detection for VLAN on page 253
LD protocol overview
The loop detection (LD) protocol is an Extremeproprietary protocol used to detect and break Layer 2
loops caused by misconfigurations, thereby preventing packet storms.
Layer 2 networks rely on learning and flooding to build their forwarding databases. Because of the
flooding nature of these networks, any loops can be disastrous as they cause broadcast storms.
Important
The LD feature should be used only as a tool to detect loops in the network. It should not be
used to replace other Layer 2 protocols such as STP.
LD protocol data units (PDUs) are initiated and received on the native device. Loop detection and action
on the port state is also done on the same native device. Intermediate devices in the network must be
capable of flooding unknown Layer 2 unicast PDUs on the VLAN through which they are received.
Strict mode
In what is referred to as strict mode, LD is configured on an interface. If the LD PDU is sent on an
interface and received on the same interface, that port is shut down by LD. Strict mode overcomes
specific hardware issues that cause packets to be echoed back to the input port. The following figure
illustrates strict mode.
Extreme SLX-OS
242 Layer 2 Switching Configuration Guide, 20.1.1
Loop Detection Loose mode
Loose mode
In what is referred to as loose mode, LD is configured on a VLAN. If a VLAN in the device receives an LD
PDU that originated from the same device on that VLAN, this is considered to be a loop and the
receiving port is shut down. In loose mode, LD works at the VLAN level and takes action at the logical
interface (LIF) level. The following figure illustrates loose mode, with LD on a VLAN.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 243
LD PDU format Loop Detection
LD supports 256 instances of loose mode, which means that it can be enabled on 256 VLANs.
LD PDU format
The following figure illustrates the format of the LD PDU in bytes.
Extreme SLX-OS
244 Layer 2 Switching Configuration Guide, 20.1.1
Loop Detection LD PDU transmission
Parameter Definition
Version LD protocol version (1 by default)
Magic Number 0x13EF; used to differentiate between LD
multicast PDUs and other multicast PDUs
Reserved byte For future use
If Index Index of the source port; populated only in strict
mode
Vlan Id VLAN ID
Sequence Number Reserved for future enhancements
Time Stamp Reserved for future enhancements
LD PDU transmission
Each LD-enabled interface or VLAN on a device continually transmits Layer 2 LD PDUs at a 1-second
default hello-timer interval, with the destination MAC address as the multicast address. The multicast
MAC address is derived from the system MAC address of the device with the multicast bit (8) and the
local bit (7) set.
For example, if the MAC address is 00E0.5200.1800, then the multicast MAC address is
03E0.5200.1800. In the case of a LAG port-channel, LD PDUs are sent out one of the ports of the LAG
as chosen by hardware.
LD PDU reception
When the LD PDU is received and is generated by the same device, the PDU is processed. If the PDU is
generated by another device, then the PDU is flooded.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 245
LD parameters Loop Detection
If a port is already blocked by any other Layer 2 protocol such as STP, then the LD PDUs are neither sent
for LD processing nor flooded on that port.
LD parameters
This section discusses the various global protocol-level, interface level, and VLAN-level parameters that
are used to control and process LD PDUs.
Protocol level
hello-interval
hello-interval is the rate at which the LD PDUs are transmitted by an LD-enabled interface or
VLAN, which is 1000 milliseconds by default. Lowering the hello-interval below the default increases the
PDU transmission rate, providing faster loop detection and also removing transient loops that last less
than one second. On the other hand, increasing the interval above the default (for example, to 100
milliseconds) can increase the steady-state CPU load.
shutdown-time
shutdown-time is the duration after which an interface that is shut down by LD is automatically
reenabled. The range is from 0 through 1440 minutes. The default is 0 minutes, which means that the
interface is not automatically reenabled.
Important
Changing this value can cause repeated interface flapping when a loop is persistent in the
network.
raslog-duration
raslog-duration is the interval between RASLog messages when a port is shut down by LD to
prevent flooding of these messages. The range is from 10 through 1440 minutes. The default is 10.
Interface level
In strict mode, the parameters in this section are configurable at the interface level, and the
configuration is specific to an interface. The following figure illustrates strict mode configuration.
By default, the device shuts down the interface if a loop is detected. Configuring shutdown-disable
means that the interface shutdown is disabled and LD never brings down such interface. If a loop is
Extreme SLX-OS
246 Layer 2 Switching Configuration Guide, 20.1.1
Loop Detection LD PDU processing
already detected by LD and the port is in shutdown state, then configuring shutdown-disable is not
effective until the port is back up.
vlan-association
Although user can enable LD on an interface without specifying a VLAN, the vlan-association
keyword is used to specify a VLAN associated with the interface.
VLAN level
In loose mode, the user can configure LD under a VLAN. In this case, LD PDUs are flooded on the VLAN.
The following figure illustrates loose mode configuration.
LD PDU processing
As long as LD PDUs are not received, there is no loop. If an LD PDU is received, then there is a loop that
is present in the network.
If the if-index field in the received LD PDU is valid, then it is considered to be operating in strict mode. If
the port on which the LD PDU was received is same as one encoded in the PDU (with a match for VLAN
ID if a VLAN is associated), the port is shut down. For an MCT, if a strict mode LD PDU is received on an
ICL interface, and the PDU is originated by another interface, then the ICL interface is not shut down.
Instead, the sender interface is shut down. In addition, for strict mode the required interfaces should be
configured with LD, or else the PDUs will not get processed
If the if-index field in the received LD PDU is invalid, then it is considered to be operating in loose mode.
Based on VLAN ID information present in the received LD PDU, the receiving LIF is shut down. If the
receiving interface is an MCT ICL interface, the LD PDU is dropped.
In the case of an LD-enabled LAG (port-channel) interface, if the sent LD PDU is received on the port-
channel, then the port-channel interface is shut down.
If the shutdown-disable option is configured for the particular interface, then the port drops the
received PDU without processing it.
The re-enablement of the LD shut down port depends on the shutdown-time configuration. For
manual recovery, either flap the interface, by means of the shutdown and no shutdown commands,
or clear the loop by means of the clear loop-detection command.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 247
Support for EPVN VLAN tunnels Loop Detection
Configuration considerations
On an external switch that is unaware of LD or where LD is not configured, there may be some ACL
rules applied to interfaces to permit traffic from known MAC addresses, and at the last of these rules
there is an ACL deny-any rule to block all unknown MAC addresses. If this interface is part of a loop, LD
enabled on SLX-OS will not be able to detect and break the loop.
LD use cases
In an MCT configuration, LD runs independently on both nodes. With loose mode the user must enable
loop detection for the same VLANs on both nodes in the MCT cluster. MCT strict mode and loose mode
use cases are detailed below.
Strict mode LD is enabled on the MCT 1 cluster client edge port (CCEP) interface that connects to the
Client.
Extreme SLX-OS
248 Layer 2 Switching Configuration Guide, 20.1.1
Loop Detection MCT loose mode
1. MCT 1 sends LD PDUs on VLAN x on all the interfaces that are part of the CCEP, client edge port
(CEP), and ICL interface.
2. If the Client has LD configured on the LAG interface, then it drops the PDUs and no loop exists. If
there is a misconfiguration, the Client floods the PDUs and they reach MCT 2.
3. MCT 2 floods the PDUs back to MCT 1, where the loop is detected. With loose mode no information
about the interface that transmitted the PDU is encoded in the PDU, so normally the receiving
interface is shut down. Because in this case the PDU is received on the ICL interface, that interface is
not shut down.
4. MCT 1 receives the loop detection PDUs on the CCEP interface as well, as the packets were flooded
in the VLAN in the following sequence: MCT 1 > MCT 2 > Client > MCT 1. In this case the receiving
CCEP is shut down to break the loop. For MCT 2 to forward the PDUs in this case it must be the
designated forwarder (DF) for that VLAN.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 249
Configuring LD protocol Loop Detection
1. Both MCT 1 and MCT 2 will flood the PDUs in VLAN x on all the interfaces that are part of the CCEP,
CEP, and ICL interface.
2. Assuming PDUs from MCT 1 take the path MCT 1 > MCT 2 > Node > Client > MCT 1, then the receiving
CCEP interface is shut down. For MCT 2 to forward the PDUs in this case, it must be the DF for that
VLAN.
3. Assuming PDUs from MCT 2 take the path MCT 2 > MCT 1 > Client > Node > MCT 2, then the
receiving CEP interface is shut down
4. If PDUs from MCT 2 take the path MCT 2 > Node > Client > MCT 2, then the receiving CCEP interface
is shut down.
5. Multiple interfaces can be shut down in this case, depending on the sequence in which loops are
detected.
6. In addition, to avoid CCEP interfaces from being shut down over a CEP interface, the user can
configure a CCEP port not to be shut down.
Configuring LD protocol
Follow these steps to configure loop detection (LD) protocol globally and at the interface and VLAN
level.
2. Enter the protocol loop-detection command to enable loop detection, enter Protocol Loop
Detect configuration mode, and configure a variety of global options.
device(config)# protocol loop-detection
3. (Optional) Enter the hello-interval command to change the hello interval from the default.
device(config-loop-detect)# hello-interval 2000
Extreme SLX-OS
250 Layer 2 Switching Configuration Guide, 20.1.1
Loop Detection Configuring LD protocol
4. (Optional) Enter the shutdown-time command to change from the default the interval after
which an interface that is shut down by loop detection (LD) protocol is automatically reenabled.
device(config-loop-detect)# shutdown-tiome 20
5. (Optional) Enter the raslog-duration command to change from default the interval between
RASLog messages that are sent when a port is disabled by the loop detection (LD) protocol.
device(config-loop-detect)# raslog-duration 20
b. In interface subtype configuration mode, enter the loop-detection vlan command and
specify a VLAN. (The VLAN must already be created.)
device(conf-if-eth-0/6)# loop-detection vlan 5
9. (Optional) Disable the shutting down of an interface (Ethernet or port-channel) as a result of the
loop detection (LD) protocol.
a. In global configuration mode, specify an interface (either an Ethernet interface or a port-channel
interface).
device(config)# interface ethernet 0/6
10. (Optional) Disable the shutting down of an interface (Ethernet or port-channel) as a result of the
loop detection (LD) protocol.
a. In global configuration mode, specify an interface (either an Ethernet interface or a port-channel
interface).
device(config)# interface ethernet 0/6
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 251
Configuring LD protocol Loop Detection
11. Confirm the LD configuration, using the show loop-detection command with a variety of
options.
a. To display LD information at the system level, enter the show loop-detection command as
in the following example.
device# show loop-detection
Strict Mode:
------------------------
Packet Statistics:
vlan sent rcvd disable-count
100 100 0 0
Loose Mode:
------------------------
Number of LD instances: 2
Disabled Ports: 2/7
Packet Statistics:
vlan sent rcvd disable-count
100 100 0 0
12. Use the clear loop-detection command in privileged EXEC mode with a variety of options
to reenable ports that were disabled by LD and clear the LD statistics.
a. To enable LD-disabled ports and clear LD statistics on all interfaces, enter the clear loop-
detection command.
device# clear loop-detection
b. To enable LD-disabled ports and clear LD statistics on an Ethernet interface, enter the clear
loop-detection interface ethernet command.
device# clear loop-detection interface ethernet 0/6
Extreme SLX-OS
252 Layer 2 Switching Configuration Guide, 20.1.1
Loop Detection Loop detection for VLAN
c. To enable LD-disabled ports and clear LD statistics on a port-channel interface, enter the clear
loop-detection interface port-channel command.
device# clear loop-detection interface port-channel 20
d. To enable LD-disabled ports and clear LD statistics on a VLAN, enter the clear loop-
detection interface vlan command.
device# clear loop-detection interface vlan 10
Note
Loop detection is not supported for bridge domains (BDs).
When a loop is detected on a VLAN and port, only the LIF of the VLAN on the port is shut down, but
the physical port still remains up and other VLANs on the port are not affected.
The existing LD loose mode configuration commands support loop detection for VLAN tunnels. In LD
loose mode, if the VLAN is mapped to VLAN tunnels and LD is enabled, VLAN tunnels loop detection is
supported. Up to 256 LD loose mode instances can be configured.
If a loop is detected from a VLAN tunnel, the following actions can take place:
• A RASLog is sent and the tunnel VNI LIFs on which the loop is detected is shut down.
• A RASLog is sent but the tunnel LIF is not shut down.
The following example enables loop detection on a VLAN and enters Protocol Loop Detection
configuration mode.
device# configure terminal
device(config)# vlan 5
device(config-vlan-5)# loop-detection
device(config-loop-detect)#
The following example enables ports associated with VLAN 8 and clears LD statistics for that VLAN.
device# clear loop-detection vlan 8
The following example displays LD configuration values, including logical interfaces (LIFs), for a VLAN
tunnel.
device# show loop-detection vlan 20
Number of LD instances: 1
LIF (Logical Interface) Disabled on Ports: eth2/2
Packet Statistics:
vlan sent rcvd
20 119 1
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 253
Configuring loop detection for VLAN Loop Detection
The following example displays LD configuration values for a VLAN tunnel if LD shutdown is disabled.
device# show loop-detection vlan 20
Number of LD instances: 1
LIF (Logical Interface) ShutDown is disabled for VLAN 20
Packet Statistics:
vlan sent rcvd
20 10 10
You can control the auto-enable behavior of an LD-disabled logical interface (LIF), by using the
shutdown-time command in Protocol Loopback Detection configuration mode. The following
example specifies a shutdown time of 1 minute.
device# configure terminal
device(config)# loop-detection
device(config-loop-detect)# shutdown-time 1
2017/10/20-16:04:48, [ELD-1005], 3749, M2 | Active | DCE, INFO, SLX, Loop is detected on Ethernet 2/2
VLAN 20, the LIF (logical interface) is shutdown.
2017/10/20-16:05:46, [ELD-1007], 3750, M2 | Active | DCE, INFO, SLX, Loop detection disabled LIF
(Logical interface) on Ethernet 2/2 VLAN 20 is auto-enabled.
By default the shutdown time is 0, which means that an LD-disabled LIF is never auto-enabled. If the
shutdown time is configured with a nonzero value, the LD-disabled LIF is auto-enabled following the
specified shutdown time.
To enable LD-disabled ports and clear LD statistics on all interfaces, use the clear loop-
detection command as in the following example.
device# clear loop-detection
Extreme SLX-OS
254 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol
Ethernet Ring Protection overview on page 255
Initializing a new ERN on page 259
Signal Fail on page 263
Manual Switch on page 265
Forced Switch on page 266
Dual-end blocking on page 270
Non-revertive mode on page 270
Interconnected rings on page 270
Configuring ERP on page 272
Note
Before configuring ERP, you must configure a VLAN and the ports you require for your
deployment.
This chapter describes ERP components, features, and how to configure, and manage ERP.
Configuration Considerations
• ERP is supported on the SLX-9540 and the SLX-9640 devices.
• You can have a maximum of 255 ERP instances on a device.
• Changes to a master VLAN apply to the member VLANs.
• If a Topology Group is used, then an ERP instance can be configured only for the Master VLAN.
• VLANs used for ERP must be pre-configured on the device along with interfaces in L2 mode.
• ERP cannot be configured if STP/RSTP/MSTP/PVST is running, and STP/RSTP/MSTP/PVST cannot
be configured if ERP is running.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 255
ERP components Ethernet Ring Protection Protocol
• Sub-50 msec convergence is achieved with a 4-device Ring topology on 1-RU devices. If the number
of nodes in the topology increases beyond this, there will be a small linear increase in convergence
time.
• Maintenance Domain (MD), Maintenance Association (MA), and Maintenance End Points (MEPs)
need to be configured before using dot1ag compliance for a specific ERP instance.
ERP components
An ERP deployment consists of the following components:
• Roles assigned to devices, called Ethernet Ring Nodes (ERNs)
• Interfaces
• Protocols -- ERP alone or with IEEE 802.1ag
• ERP messaging
• ERP operational states
• ERP timers
ERN roles
In an Ethernet ring topology you can assign each ERN one of three roles:
• Ring Protection Link Owner (RPL owner) -- One RPL owner must exist in each ring; its role is to
prevent loops by maintaining a break in traffic flow to one configured link while no failure condition
exists within the ring.
• Non-RPL node -- Multiple non-RPL nodes, can exist in a ring; but they have no special role and
perform only as ring members. Ring members apply and then forward the information received in R-
APS messages.
• Ring Protection Link (RPL) node -- RPL nodes block traffic to the segment that connects to the
blocking port of the RPL owner. The RPL node is used in dual-end blocking and is part of the FDB
optimization feature.
Each device can only have one role at any time. Non-ERN devices can also exist in topologies that use
IEEE 802.1ag.
ERN interfaces
In addition to a role, each ERN has two configured interfaces:
• Left interface
• Right interface
Traffic enters one interface (ingress) and exits the device using the other interface (egress). The right
and left interfaces are physically connected.
You must configure these left and right interfaces in the same pattern across all ERNs within a topology.
For example you can assign the interfaces as left/right, left/right, left/right, and so on. It is not
acceptable, however, to assign interfaces in random order, such as left/right in the configuration of one
ERN and then right/left in the configuration of the next ERN.
Protocols
You can configure standalone ERP or ERP with IEEE 802.1ag support.
Extreme SLX-OS
256 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol ERP components
When using standalone ERP, all devices have a role, and all devices participate at least as ERP members.
Ring-APS (R-APS) messages are sent at initial start-up of a configuration and periodically when link or
node failures or recoveries occur. Each ERN applies the information received in the R-APS messages
and forwards the received RAPS messages if both ports are in the forwarding state.
The sending ERN terminates the message when it receives a message originally sent from itself.
Configurable timers prevent ERNs from receiving outdated messages and decrease failure reporting
time to allow increased stability within the topology.
To properly configure and troubleshoot ERP, an understanding of the messaging, operational states,
and timers is essential. For more information about the ERP protocol, see ITU-T G.8032.
When you have other nonparticipating switches in the ring, you can use the IEEE 802.1ag support to
perform link health checks to the next ERN.
With IEEE 802.1ag configured, the ERNs within the ring send Continuity Check Messages (CCM) to
verify the integrity of their own links. If a node is not receiving CCMs or if a link goes down, a failure is
reported to the ring through R-APS messages.
The following figure shows a segment with ERNs 3 and 4 and two non-participating switches located on
the same network segment between them. When ERNs 3 and 4 stopped receiving CCMs, the following
actions occurred on ERNs 3 and 4:
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 257
ERP components Ethernet Ring Protection Protocol
ERP messaging
In ERP, ERNs send R-APS messages. For details about the packet structures, see ITU-T G.8032.
The destination MAC address (Dst Mac) is the first element in the packet and is of the form 01-19-
A7-00-00-<ERP ID>. The default value is 01. However, you can configure the ERP ID with the raps-
default-mac command. In ITU-T G.8032 Version 1 the default value is always used.
The Node ID indicates the base MAC address and can be found in the R-APS specific information part of
a R-APS message.
When an ERP topology starts up, each ERN (in Init state) transmits a R-APS (NR). After start-up, the
behavior varies by assigned role. The following table shows the initialization process for an ERN.
1. Blocks the RPL. 1. Blocks the left interface. 1. Blocks the left interface.
2. Sends a R-APS (NR). 2. Sends a R-APS (NR). 2. Sends a R-APS (NR).
3. Enters the Pending state. 3. Enters the Pending state. 3. Enters the Pending state.
4. Starts the WTR timer. After receiving the (NR, RB, DNF) After receiving the (NR, RB,
5. (After the WTR expires) stops from the RPL owner: DNF) from the RPL owner:
sending NR.
6. Sends R-APS (NR, RB, DNF). 1. Unblocks the non-failed 1. Blocks the RPL port.
7. Enters the Idle state. blocking port. 2. Unblocks the other ports.
2. Stops sending (NR). 3. Enters the Idle state.
3. Enters the Idle state.
When the ring is in the Pending state, an ERN flushes the filtering database (FDB) if it receives any of
the following state requests:
• Signal Fail (SF)
Extreme SLX-OS
258 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol Initializing a new ERN
Note
ITU-T G.8032 Version 1 does not use a Pending state, so from the Protection state ERNs enter
the Idle state.
ERP timers
ERP provides various timers to ensure stability in the ring while a recovery is in progress or to prevent
frequent triggering of the protection switching. All of the timers are operator configurable.
• Guard timer -- All ERNs use a guard timer. The guard timer prevents the possibility of forming a
closed loop and prevents ERNs from applying outdated R-APS messages. The guard timer activates
when an ERN receives information about a local switching request, such as after a switch fail (SF),
manual switch (MS), or forced switch (FS). When this timer expires, the ERN begins to apply actions
from the R-APS it receives. This timer cannot be manually stopped.
• Wait-To-Restore (WTR) timer -- The RPL owner uses the WTR timer. The WTR timer applies to the
revertive mode to prevent frequent triggering of the protection switching due to port flapping or
intermittent signal failure defects. When this timer expires, the RPL owner sends a R-APS (NR, RB)
through the ring.
• Wait-To-Block (WTB) timers -- The WTB timer is activated on the RPL owner. The RPL owner uses
WTB timers before initiating an RPL block and then reverting to the idle state after operator-initiated
commands, such as for FS or MS conditions, are entered. Because multiple FS commands are
allowed to co-exist in a ring, the WTB timer ensures that the clearing of a single FS command does
not trigger the re-blocking of the RPL. The WTB timer is defined to be 5 seconds longer than the
guard timer, which is enough time to allow a reporting ERN to transmit two R-APS messages and
allow the ring to identify the latent condition. When a MS command is cleared, the WTB timer
prevents the formation of a closed loop caused by the RPL owner node applying an outdated
remote MS request during the recovery process.
• Hold-off timer -- Each ERN uses a hold-off timer to delay reporting a port failure. When the timer
expires, the ERN checks the port status. If the issue still exists, the failure is reported. If the issue
does not exist, nothing is reported.
• Message interval -- This is an operator configurable feature for sending out R-APS messages
continuously when events occur.
The following figure shows the first step of initialization beginning from ERN 4, a non-RPL node.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 259
Initializing a new ERN Ethernet Ring Protection Protocol
The following figure shows the next sequence of events. Next, ERN 1 initializes.
Extreme SLX-OS
260 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol Initializing a new ERN
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 261
Initializing a new ERN Ethernet Ring Protection Protocol
The following figure shows the next sequence of events. Next ERN 2 initializes.
Extreme SLX-OS
262 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol Signal Fail
Lastly, ERNs 1, 2, and 3 are in the Idle state, and ERN 4 changes the blocking port to the forwarding
state. All ERNs remain in the Idle state. Refer to the following figure.
Signal Fail
Signal Fail (SF) and SF recovery provide the mechanism to repair the ring to preserve connectivity
among customer networks.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 263
Signal Fail Ethernet Ring Protection Protocol
ERP guarantees that although physically the topology is a ring, logically it is loop-free. One link, called
the Ring Protection Link (RPL), is blocked to traffic. When a non-RPL link fails in the ring, the SF
mechanism triggers and causes the RPL to become forwarding. Later, signal fail recovery can occur to
restore the ring to the original setup.
Convergence time is the total time that it takes for the RPL owner to receive the R-APS (NR) message
and block the RPL port until the ERN with the failed link receives notice and unblocks the failed link.
The following figure shows a simple Ethernet ring topology before a failure. This diagram shows dual-
end blocking enabled (thick line) between ERNs one (RPL node) and 6 (RPL owner). ERNs 3, 2, 4, and 5
are non-RPL nodes.
Extreme SLX-OS
264 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol Manual Switch
Manual Switch
In the absence of a failure, an operator-initiated Manual Switch (MS) moves the blocking role of the RPL
by blocking a different ring link and initiates the node sending a R-APS (MS) to inform the RPL owner to
unblock the RPL. This can occur if no higher priority request exists in the ring.
Consider a ring consisting of nodes ERN1, ERN2, ERN3, and ERN4. Dual-end blocking is enabled
between ERN1 and ERN2.
A node that receives the R-APS (MS) forwards it to the adjacent nodes. If the receiving node is already
in the Idle or Pending state, it unblocks the non-failed port and stops transmitting R-APS messages.
Only one MS can exist in the topology at any time. An MS condition has to be manually cleared.
Note
If any ERN is in an FS state or in a protected state through an SF event and an operator tries
to configure an MS, the ERN will reject the request.
When a manual switch is cleared by an operator on the same node on which the MS is configured, the
node keeps the port in a blocking state, sends out a R-APS (NR) to the adjacent node, and starts the
guard timer. Other nodes that receive the R-APS (NR) forward the message. When the RPL owner
receives this message, then the RPL owner starts the WTR timer. When the WTR timer expires, the RPL
owner sends out a R-APS (NR, RB), blocks the RPL, and flushes the FDB. Other nodes in the topology
that receive the R-APS (NR, RB) unblock any non-failed port and flush the FDB.
In order to clear the MS condition, the operator must enter the manual switch command from ERN3.
Refer to the following table for the event sequence.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 265
Forced Switch Ethernet Ring Protection Protocol
After the manual switch is triggered, the operator can clear it with the no command and MS recovery
will begin. Refer to the following table for the event sequence.
From the Pending state, From the Pending state, From the Pending
ERN3: ERN2: state, ERN4:
5. Receives the R-APS (NR, 4. Blocks the RPL. 4. Forwards the R-APS
RB) and unblocks the 5. Forwards the R-APS (NR, RB).
blocking port. (NR, RB). 5. Flushes the FDB.
6. Forwards the R-APS 6. Flushes the FDB. 6. Enters the Idle state.
(NR, RB). 7. Enters the Idle state.
7. Flushes the FDB.
8. Enters the Idle state.
Forced Switch
Forced Switch (FS) is an operator-initiated mechanism that moves the blocking role of the RPL to a
different ring link followed by unblocking the RPL, even if one or more failed links exist in the ring.
Extreme SLX-OS
266 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol Forced Switch
The node configured to initiate an FS blocks the port and sends out a R-APS (FS) to inform other nodes
to unblock any blocked ports (including failed ones) as long as no other local request with higher
priority exists. The RPL owner unblocks the RPL and flushes the FDB.
Any node accepting a R-APS (FS) message stops transmitting R-APS messages.
Multiple FS instances can be configured in the topology even when the topology is in the same segment
where an FS is being cleared by no command. When an operator clears an FS on the same node where
an FS is configured, this node keeps the port in the blocking state, sends out a R-APS (NR) to adjacent
nodes, and starts the guard timer. Other nodes that receive the R-APS (NR) forward the message.
When the RPL owner receives this message, the RPL owner starts the WTB timer. When the WTB timer
expires, the RPL owner sends out a R-APS (NR, RB), blocks the RPL, and flushes the FDB. Other nodes
in the topology that receive the R-APS (NR, RB) unblock any non-failed port and flush the FDB.
An FS request can be accepted no matter what state the topology is in. Since the local FS and R-APS
(FS) are higher priority than SF; an SF occur i ng later than FS will not trigger the SF process. In
addition, because the local FS and R-APS (FS) are higher priority than SF, when a node receives a R-
APS (FS) without any local higher priority event, it will unblock any blocked port. The node with the
failed link also unblocks the blocked port; but because the link has failed, the topology is broken into
segments.
Since the local FS and R-APS (FS) are higher priority than a local SF clear when the link failure is
removed without any local higher priority event, the nodes with the recovering link do not trigger SF
recovery.
After the operator clears the FS condition on the node, the node starts the guard timer and sends out a
R-APS (NR). When the RPL owner receives a R-APS(NR), it stops the WTB timer and starts the guard
timer. The RPL owner blocks the RPL and sends out a R-APS (NR, RB). Any node receiving a R-APS
(NR, RB) unblocks the non-failed blocked port. If the guard timer is still running on the node with
previous FS, this node ignores R-APS messages until the guard timer expires. The topology is again
broken into segments. After this node processes the R-APS (NR, RB), however, it unblocks the blocked
node; and the topology is in a loop free state and in one segment.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 267
Forced Switch Ethernet Ring Protection Protocol
The following table shows the sequential order of events triggered as a result of an operator-initiated
forced switch command entered from ERN 4.
Table 43: Single FS process--operator entered the forced switch command from ERN
4
RPL owner (ERN1) Non-RPL node (ERN 2) Non-RPL node (ERN 3) Non-RPL node (ERN 4)
Idle Idle Idle From the Idle state, ERN 4:
1. Processes the Forced
Switch command
2. Blocks the requested
port
3. Transmits R-APS (FS)
4. Unblocks the non-
requested port
5. Flushes the FDB
6. Enters the Forced Switch
(FS) state
From the Idle state, From the Idle state, From the Idle state,
ERN 1: ERN 2: ERN 3:
1. Unblocks the RPL 1. Unblocks the port 1. Unblocks the port
2. Flushes the FDB 2. Flushes the FDB for 2. Flushes the FDB for
for first time the first time the first time
3. Forwards R- 3. Forwards R- 3. Forwards R-
APS(FS) APS(FS) APS(FS)
4. Enters the FS state 4. Enters the FS state 4. Enters the FS state
From the FS state, From the FS state, ERN From the FS state, ERN From the FS state, ERN 4:
ERN 1 forwards R-APS 2 forwards R-APS 3 forwards R-APS 7. Transmits R-APS(FS)
8. Terminates the received
R-APS on the blocking port
9. Terminates its own R-
APS(FS)
All ERNs remain in FS state.
Extreme SLX-OS
268 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol Forced Switch
Next, the operator enters the no command to clear the forced switch. For this example, the operator
initiated the forced switch from ERN 4 and must clear it from ERN 4. The following table shows the
forced switch recovery process in sequential order.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 269
Double Forced Switch Ethernet Ring Protection Protocol
After the first FS clears, the node starts the guard timer and sends out a R-APS (NR). The adjacent
nodes of the first cleared FS node will not process or forward the R-APS (NR) because they are still
receiving R-APS (FS) from the second FS node. When the first FS node receives R-APS (FS) from the
second FS nodes, it unblocks any blocked port and stops transmitting any lower priority R-APS
messages. At this point, the topology follows the single FS process, as previously described.
Dual-end blocking
Dual-end blocking is a user configurable feature to directly conserve bandwidth of the RPL and
indirectly conserve processing power of the RPL owner. When you configure a node in a major ring
adjacent to the RPL owner to be an RPL node with dual-end blocking enabled, data traffic and R-APS
messages will not be forwarded to the blocked port of the RPL owner.
When a failure occurs in the ring and the RPL node (not the RPL owner) receives a R-APS (of type SF,
FS, or MS), the RPL node unblocks the configured dual-end blocked port. When the RPL node receives
a R-APS (NR, RB), it reblocks the originally configured dual-end blocked port. To configure dual-end
blocking you need to configure the RPL and dual-end blocking on both the RPL owner and the adjacent
peer (RPL node).
Non-revertive mode
In non-revertive mode, the traffic channel is allowed to use the RPL, if it is not failed, after a switch
condition clears. In the recovery from a Protection state, the RPL owner generates no response
regarding the reception of NR messages. When other healthy nodes receive the NR message, there is
no action in response to the message. After the operator issues a no command for non-revertive mode
at the RPL owner, the non-revertive operation is cleared, WTB or WTR timer starts, as appropriate, and
the RPL owner blocks its port to the RPL and transmits a R-APS (NR, RB) message. Upon receiving the
R-APS (NR, RB), any blocking node should unblock its non-failed port.
Interconnected rings
Interconnected rings consist of one major ring and one or more sub-rings with shared physical links. The
ring links between the interconnection nodes are controlled and protected by the ERP ring to which
they belong. A sub-ring is similar to the major ring in that each sub-ring has an RPL and an RPL owner.
The RPL owner can be configured in any node belonging to the ring.
Extreme SLX-OS
270 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol Interconnected rings
Refer to the following figure. The dotted lines show two of the many potential sub-rings that you can
configure.
Figure 48: Interconnected rings with major and sub rings shown
When a sub-ring initializes, each ERN in the non-closed ERP sends out a R-APS (NR). After the RPL
owner receives a R-APS (NR), it blocks the RPL; and the RPL owner sends out a R-APS (NR, RB). The
shared link remains blocked even if the shared link has a SF error. The blocking state in ERP means the
R-APS channel is blocked at the same port where the traffic channel is blocked, except on sub-rings
without use of R-APS virtual channel.
Note
ERP Virtual channel support is no longer supported.
A sub-ring in segments interconnecting major rings is not supported. Refer to the following figure,
which shows a major ring and two segments not supported as a sub-ring.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 271
Configuring ERP Ethernet Ring Protection Protocol
transmitted over both ring ports, and it also allows R-APS messages received at each port to be
delivered to the ERP control process.
Each ERN in a major ring terminates R-APS messages received on a blocking port and does not forward
the message if the port is in a blocking state. Each ERN in a sub-ring, however, still forwards the R-APS
messages received on a blocking port.
Configuring ERP
To configure and initialize ERP using only APS you must set up one RPL owner and one or more Non-
RPL nodes. The minimum configuration tasks are listed in this section.
Before configuring ERP, however, you must have already configured a VLAN and ports.
Note
ERP supports topology-groups if the ERP interfaces are in the same VLAN
You must perform the following minimum configuration tasks for the RPL owner:
• Configure an ERP instance.
• Set the left and right interfaces.
• Set the role as owner.
• Set the RPL.
• Enable the configuration.
You must perform the following minimum configuration tasks for each non-RPL node:
• Configure an ERP instance.
• Set the left and right interfaces.
• Enable the configuration.
Extreme SLX-OS
272 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol ERP topology and configuration
configure terminal
interface Ethernet 0/2
switchport
switchport mode trunk-no-default-native
switchport trunk allowed vlan add 222
no switchport trunk tag native-vlan
no shutdown
!
end
configure terminal
erp 1
left-interface vlan 222 ethernet 0/1
right-interface vlan 222 ethernet 0/2
rpl-owner
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 273
ERP topology and configuration Ethernet Ring Protection Protocol
Note
Optionally, you can configure the non-revertive node feature. This setting can be configured
only on the RPL owner.
configure terminal
interface Ethernet 0/1
switchport
switchport mode trunk-no-default-native
switchport trunk allowed vlan add 222
no shutdown
!
end
configure terminal
interface Ethernet 0/2
switchport
switchport mode trunk-no-default-native
switchport trunk allowed vlan add 222
no shutdown
!
end
configure terminal
erp 2
left-interface vlan 222 ethernet 0/2
right-interface vlan 222 ethernet 0/1
rpl vlan 222 ethernet 0/1
enable
!
end
configure terminal
interface Ethernet 0/1
switchport
switchport mode trunk-no-default-native
switchport trunk allowed vlan add 222
no shutdown
!
end
configure terminal
interface Ethernet 0/2
switchport
switchport mode trunk-no-default-ntive
switchport trunk allowed vlan add 222
no shutdown
!
Extreme SLX-OS
274 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol ERP topology and configuration
end
configure terminal
erp 3
left-interface vlan 222 ethernet 0/1
right-interface vlan 222 ethernet 0/2
enable
!
end
The name must be 31 alphanumeric characters or fewer, and can use the "underscore" and "dash"
special characters. For example, to assign the name "major-ring-vlan100" to an ERN with ID number
100, enter the following:
device# configure terminal
Entering configuration mode terminal
device(config)# erp 100
device(config-erp-100)#
device(config-erp-100)# name "major-ring-vlan100"
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 275
ERP topology and configuration Ethernet Ring Protection Protocol
Configuring interfaces
Each Ethernet Ring Node (ERN) in a major ring must have explicitly defined left and right interfaces so
that ERP can function correctly.
For proper operation you must configure the interfaces following the same manner on each ERN, such
as left/ right, left/ right, and so on.
The following example configures a left and right interface for a major ring.
device# configure terminal
device(config)# erp 1
device(config-erp-1)# right-interface vlan 2 ethernet 1/2
device(config-erp-1)# left-interface vlan 2 ethernet 1/1
ERNs in a sub-ring must have at least one interface (either left or right) configured as shown below so
that ERP can function correctly. The following example configures a right interface for a sub-ring.
device# configure terminal
device(config)# erp 2
device(config-erp-2)# right-interface vlan 2 ethernet 1/1
device(config-erp-2)# sub-ring parent-ring-id 1
Extreme SLX-OS
276 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol ERP topology and configuration
Within an interconnected ring topology, you must first enable ERP on the major ring configured with
two interfaces, followed by the sub-ring configured with a single interface. There can be multiple sub-
rings configured and activated per single major ring. However to deactivate or delete ERP on this
interconnected ring topology, the sub-ring(s) must be deactivated or deleted first, followed by the
major ring.
The following example illustrates assigning the RPL owner role and setting the RPL.
device# configure terminal
device(config)# erp 1
device(config-erp-1)# rpl-owner
device(config-erp-1)# rpl vlan 5 ethernet 0/1
Interconnected rings consist of one major ring and at least one sub-ring within the same VLAN. A sub-
ring is not a complete ring. Nodes within a sub-ring can be configured as a one-arm ring. Each sub-ring
must have its own RPL owner and RPL ports as appropriate.
RPL ports and the RPL owner also must be configured in a sub-ring. All ERP features are available in
both major rings and sub-rings.
R-APS PDUs flow only in the nodes with same ring ID. The R-APS PDU can be forwarded through the
port in sub-ring blocking state.
The parent-ring-id keyword is used to associate the sub-ring with its parent ring. In such a case,
use the parent-ring-id configuration to determine the ring to which the sub-ring is connected. The
parent ring can be either another sub-ring or a major ring connected to the sub-ring.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 277
ERP topology and configuration Ethernet Ring Protection Protocol
If you have six nodes you can put them in one ring. The latency time for packet transport, however,
increases in big topologies even within the same VLAN, so it is better to separate them out.
After the Ethernet Ring enters a protected state, if you do not want the topology to return to the
original state you can use the non-revertive-mode command to keep it in the new state. Enter this
command on the RPL owner only, and then enter the enable command.
The following example configures non-revertive mode and enables the configuration.
device# configure terminal
device(config)# erp 100
device(config-erp-100)# non-revertive-mode
Extreme SLX-OS
278 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol ERP topology and configuration
This timer period should always be greater than the maximum expected forwarding delay in which an
R-APS message traverses the entire ring. The longer the period of the guard timer, the longer an ERN is
unaware of new or existing relevant requests transmitted from other ERN and, therefore, unable to react
to them.
The guard timer is used in every ERN, once a guard timer is started, it expires by itself. While the guard
timer is running, any received R-APS request/state and Status information is blocked and not forwarded
to the priority logic. When the guard timer is not running, the R-APS request/state and status
information is forwarded unchanged.
Note
The ITU-T G.8032 standard defines the guard timer period as configurable in 10 ms
increments from 10 ms to 2000 ms (2 seconds) with a default value of 500 ms.
The guard timer is activated when an ERN receives an indication that a local switching request, such as
a clear signal fail, manual switch, or forced switch, is cleared.
The guard timer can be configured in 100-ms increments from 1200 ms to 4000 ms (4 seconds); the
default value is 1500 ms (1.5 seconds). The guard timer cannot be stopped manually.
Use the no guard-time command to clear the configuration, restoring it to the default value.
This WTR timer is activated on the RPL Owner Node. When the relevant delay timer expires, the RPL
owner initiates the reversion process by transmitting an R-APS (NR, RB) message. The WTR timer is
deactivated when any higher-priority request preempts this timer. The WTR timers may be started and
stopped. A request to start running the WTR timer does not restart the WTR timer. A request to stop
the WTR timer stops the WTR timer and resets its value. The clear erp wtr-time command can
be used to stop the WTR timer. While the WTR timer is running, the WTR running signal is continuously
generated. After the WTR timer expires, the WTR running signal is stopped, and the WTR Expires signal
is generated. When the WTR timer is stopped by the clear erp wtr-time command, the WTR
Expires signal is not generated.
When configured, the RPL owner waits until the timer expires before transmitting the R-APS (NR, RB)
message to initiate the reversion process. While the timer is in effect, the WTR running signal is
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 279
ERP topology and configuration Ethernet Ring Protection Protocol
continuously generated. You can configure the WTR timer in 1 minute increments from 1 to 12 minutes;
the default value is 5 minutes.
Use the no wrt-time command to clear the configuration in ERP configuration mode, restoring it to
the default value.
Use the global clear erp wtr-time command to clear the WTR timer for a specific ERP instance,
as in the following example for instance 1.
device# clear erp wtr-time 1
While it is running, the WTB running signal is continuously generated. The WTB timer is 5000 ms (5
seconds) longer than the guard timer. You can configure this timer in 100-ms increments from 5100 to
7000 ms (7 seconds); the default value is 5500 ms.
The WTB timer can be stopped by means of the clear erp wtb-time command.
Use the no wrb-time command to clear the configuration in ERP configuration mode, restoring it to
the default value.
Use the global clear erp wtb-time command to clear the WTB timer for a specific ERP instance,
as in the following example for instance 1.
device# clear erp wtb-time 1
Extreme SLX-OS
280 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol ERP topology and configuration
The hold-off timer is used in every ERN. When a new defect occurs (new SF), this event is not reported
immediately to trigger protection switching if the provisioned hold-off timer value is non-zero. Instead,
the hold-off timer is started. When the hold-off timer expires, the trail that started the timer is checked
as to whether a defect still exists. If one does exist, that defect is reported and protection switching is
triggered.
You can configure the hold-off timer in 100-ms increments from 0 to 10,000 ms (10 seconds); the
default value is 0 ms. The hold-off timer value cannot be stopped through the CLI.
Use the no holdoff-time command to clear the configuration, restoring it to the default value.
The message interval time of R-APS messages continuously sent within an ERP ring can be configured
by means of the message-interval command. You can configure the interval in 100-ms increments
from 100 to 5000 ms (5 seconds); the default value is 5000 ms.
Use the no message-interval command to clear the configuration, restoring it to the default
value.
Use the no version command to clear the configuration, restoring it to the default value.
You can view the version by entering the show erp command. The version appears on the top line
directly after the ERP ID.
The following example displays information about all ERP instances, including the version.
device# show erp
ERP 5 (Version 2) - VLAN 6
=================================================================================
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 281
ERP topology and configuration Ethernet Ring Protection Protocol
You must perform the following minimum configuration tasks for the RPL owner:
• Configure an ERP instance.
• Set the left and right interfaces.
• Set the role as owner.
• Set the RPL.
• Enable the configuration.
You must perform the following minimum configuration tasks for each non-RPL node:
• Configure an ERP instance.
• Set the left and right interfaces.
• Configure the maintenance entity group end points (MEPs) from each ERN, which can have a role of
RPL owner or non-RPL node, adjacent to switches not participating in the ERP configuration.
• Enable the configuration.
IEEE 802.1ag can be used to monitor the ERP interfaces for signal failures. The dot1ag-compliance
command allows MDs and MAs configured as part of IEEE 802.1ag to be associated with an ERP
instance. Note the following:
• With Dot1ag compliance enabled, ERP relies on signal fail or signal OK messages from the Dot1ag
module.
• Before enabling Dot1ag compliance in ERP, the user must create a CFM session between the links of
the ERP instance.
• For each ring interface, an MEP must be configured and the direction of the MEP must be down.
• Once the CFM session is configured, the user must associate an MEP with the corresponding ERP
ring interface.
• With a CCM interval of 3.3 ms, CFM can detect a link failure within 10 ms. This helps ERP to achieve
faster protection switching times, with traffic converging within 50 ms.
Extreme SLX-OS
282 Layer 2 Switching Configuration Guide, 20.1.1
Ethernet Ring Protection Protocol ERP topology and configuration
mep 4
device(config-dot1ag-compliance)# right-interface domain-name md1 ma-name ma3 mep 2
remote-mep 4
device(config-dot1ag-compliance)# enable
The ma-name parameter specifies the maintenance association name. This can be up to 21 characters
long.
Refering to the example topology above, corresponding configurations for this feature on Node 1 and
Node 2 are as follows.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 283
ETH-CSF
ETH-CSF overview on page 284
Configuring ETH-CSF on page 290
ETH-CSF overview
The Ethernet Client Signal Fail feature (ETH-CSF) is an enhancement to the existing performance-
monitoring functionality as documented in ITU-T standard G.8013/Y.1731.
Note
For text of the standard, refer to https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-
G.8013-201508-I!!PDF-E&type=items.
This feature is used by a Maintenance Entity Group End Point (MEP) to propagate the detection of a
failure or defect event in an Ethernet client signal to a peer Remote MEP (RMEP) when the client itself
does not support appropriate fault detection, defect detection, or propagation mechanisms such as
Ethernet Continuity Check (ETH-CC) or Ethernet Alarm Indication Signal (ETH-AIS). The ETH-CSF
messages propagate in the direction from the Ethernet MEP, associated with the ingress client port
detecting the failure or defect event, to the Ethernet peer RMEP.
Note
For supporting documentation, refer to "Y.1731 Performance Monitoring" in the chapter
"Operation, Administration, and Maintenance" in the Extreme SLX-OS Monitoring
Configuration Guide.
The NE device could be connected to another NE device of a core network of another ISP or its own
core network on a different geographical location through an international link on a WAN. The NE
device on the remote side would connect to the remote PE device to which the remote CE devices are
connected.
The two PE devices that form an Ethernet virtual circuit (EVC) are connected through a Down MEP link.
Now the CE devices on both local and remote sites form the client for the respective PE devices, and
the connecting ports on these PE devices to the respective CE devices on local and remote sites are the
Extreme SLX-OS
284 Layer 2 Switching Configuration Guide, 20.1.1
ETH-CSF ETH-CSF use case
designated Ethernet client ports. These client ports can be either physical interfaces or port-channel
interfaces. Only one client port can be associated with an MEP. Thus, the scale for the client ports that
can be associated to MEPs with a one-to-one mapping is limited by the number of MEPs that can be
configured (currently 8 k) on the device, a number that is large enough compared to the total number
of physical interfaces available on the device. Hence there is practically no limit to the number of ETH-
CSF client ports that can be created on a device.
Note
For a discussion of MEP and other connectivity fault management (CFM) issues, see the
chapter "802.1ag Connectivity Fault Management" in the Extreme SLX-OS Layer 2 Switching
Configuration Guide.
The purpose of the feature is to propagate the ETH-CSF indication from an MEP configured on the PE
device to the remote MEP on the peer PE device when a port on CE device connected to this PE device
goes down. Thus, the MEP on the PE device detects a link failure event on its ingress Ethernet client port
and propagates this client signal fault to the RMEP on the remote peer PE side. The following figure
illustrates an example topology.
This feature is specifically helpful when the client itself (the CE device) does not support any means of
notification to its peer (the remote CE device), such as through ETH-AIS or the RDI function of ETH-CC.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 285
ETH-CSF specifications ETH-CSF
The following are the requirements for this feature according to the MEF 30.1 standard:
• ETH-CSF transmissions SHOULD be disabled on an MEP by default.
• ETH-CSF transmissions SHOULD be enabled only on MEPs in point-to-point MEGs.
• Transmission periods of 1 second and 1 minute MUST be supported for ETH-CSF.
• The ETH-CSF default transmission period SHOULD be 1 second.
ETH-CSF specifications
This section details specifications for this feature.
ETH-CSF is applicable only to point-to-point Ethernet transport applications, which means that it can
work only with Down MEPs.
The following specific configuration information is required by an MEP to support ETH-CSF reception:
• Local MEG (or MD) level: MEG (or MD) level at which the receiving MEP operates
Note
An MIP is transparent to frames with ETH-CSF information and therefore does not require any
information to support ETH-CSF functionality.
The ETH-CSF message indicates also the type of defect. Three CSF defect types are currently defined:
• Client Loss of Signal (C-LOS)
• Client Forward Defect Indication (C-FDI)
• Client Reverse Defect Indication (C-RDI)
The PDU used to convey ETH-CSF information is referred to as the CSF PDU. Frames carrying the ETH-
CSF indications are also referred to as CSF frames.
In such a case, the port-channel interface on a PE device must be associated with the down MEP, which
when detects the port-channel link down event. That event triggers a fault indication to be propagated
to the peer RMEP, which will then bring down the port-channel interface associated with it on the
remote side.
Extreme SLX-OS
286 Layer 2 Switching Configuration Guide, 20.1.1
ETH-CSF CSF transmission
Also, the international link or the WAN between the connected NE devices could been deployed with
port-channel links. In this case, it is expected that this port-channel link carries the ETH-CSF information
towards the remote side as does a regular Ethernet link.
CSF transmission
Upon notification of an Ethernet CSF event from the corresponding ingress client port, frames with
ETH-CSF information are generated and propagated by an MEP.
As a result, the frames with ETH-CSF information are not propagated until and unless there is a fault
detected on the corresponding ingress client port. An appropriate log message is thrown to indicate the
fault detected at the Ethernet client port and the transmission of the ETH-CSF message to the RMEP.
The transmission of packets with CSF information can be enabled or disabled on an MEP through a CLI
configuration.
Upon receiving an Ethernet CSF notification from the ingress client port, the associated MEP can
immediately start the periodic transmission of frames with ETH-CSF information. This continues until
the Ethernet CSF indication is cleared by the source MEP when the local fault with the associated client
port is cleared, that is, when it witnesses the link up event in this case.
The clearance of the Ethernet CSF condition by the source MEP can be communicated to the peer
RMEP to clear its Ethernet client fault condition in one of two ways:
• It ceases sending ETH-CSF frames for the peer to timeout.
• It propagates an ETH-CSF PDU with Client Defect Clear Indication (C-DCI) information.
CSF reception
Upon receiving a CSF frame with ETH-CSF information, an RMEP declares either the beginning or end
of an Ethernet remote CSF condition, depending on the received ETH-CSF information.
This received Ethernet C-DCI information is further propagated by the RMEP to the corresponding
egress client port when the Ethernet client port is either operationally shut or enabled, respectively, so
that the Ethernet client would detect a link down or link up event, respectively.
An Ethernet MEP detects an Ethernet remote CSF condition when an ETH-CSF PDU with no C-DCI
information is received.
The clearance of the Ethernet remote CSF condition by the Ethernet client of a RMEP is detected when
either of the following occurs:
• No ETH-CSF frame is received within an interval of 3.5 times (as recommended by the standard) the
CSF transmission period on the source MEP in milliseconds.
• An ETH-CSF PDU with C-DCI information is received.
Upon clearance of the CSF condition by the RMEP, the corresponding Ethernet client port is enabled,
and the Ethernet client device would detect the link up event for the port towards the network.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 287
ETH-CSF PDU structure ETH-CSF
An appropriate log message is thrown to indicate either receiving or clearing of the fault indication (by
receiving C-DCI information or as the result of a timeout), with subsequent action on the client port by
the RMEP.
Note
In case of an RMEP failure that is due to a Continuity Check Message (CCM) not being
received, the client port at the remote side associated with such an RMEP is brought up and
made operational.
The format of the CSF PDU used to support the ETH-CSF function is shown in the following figure.
Extreme SLX-OS
288 Layer 2 Switching Configuration Guide, 20.1.1
ETH-CSF ETH-CSF considerations and limitations
The Type field uses bits 6 through 4 to indicate the CSF type, with values as shown in the following
table.
The Period field uses bits 3 through 1 to indicate the transmission period, with values as shown in the
following table.
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 289
Configuring ETH-CSF ETH-CSF
• All available physical interfaces on a device can be associated as client ports to different Down MEPs
with a one-to-one mapping.
• When a client interface is configured with a port-channel interface, the timeout before RMEP sends
C-LOS messages back to the MEP when its client interface link is down is 3.5 times the configured
tx-interval.
Note
Because 8 k MEPs can be created on the device, practically all of the available client ports can
be associated with different MEPs with a one-to-one mapping. Therefore, the scale is the
same as that for the number of MEPs that can be created.
Configuring ETH-CSF
Follow these steps to configure ETH-CSF and verify the configuration.
Note
Refer to the "802.1ag Connectivity Fault Management" chapter in the Extreme SLX-OS Layer 2
Switching Configuration Guide. For command details, see the Extreme SLX-OS Command
Reference.
b. Enter the protocol cfm command to enter Connectivity Fault Management (CFM) protocol
configuration mode.
device(config)# protocol cfm
d. Enter the ma-name command to specify an MA name, ID, VLAN, and priority.
device(config-cfm-md-md1)# ma-name ma1 id 1 vlan 10 priority 7
e. Enter the mep command to specify an MEP ID, state, and interface.
device(config-cfm-ma-ma1)# mep 1 down ethernet 1/1
f. Enter the client-interface command to specify a client interface, CSF type, and
transmission period.
device(config-cfm-ma-mep-1)# client-interface ethernet 1/1 csf-type loss-of-signal
tx-period 1-minute
Extreme SLX-OS
290 Layer 2 Switching Configuration Guide, 20.1.1
ETH-CSF Configuring ETH-CSF
3. Enter the show cfm y1731 client-signal-fail command to verify the configuration.
device# show cfm y1731 client-signal-fail
---------------------------------------------------------------------------------
Domain Name : md1
MA Name : ma1
---------------------------------------------------------------------------------
ETH-CSF Statistics :
---------------------------------------------------------------------------------
MEP RMEP MEP RMEP Client CSF Transmit Transmit Receive Transmit Receive
ID ID Status Status I/F Type Period Frames Frames C-DCI C-DCI
---------------------------------------------------------------------------------
1 2 UP UP 1/1 C-LOS 1 minute 0 0 0 0
2 1 UP DOWN 1/2 C-LOS 1 second 0 0 0 0
4. Enter the clear cfm y1731 client-signal-fail statistics command to clear the
statistics.
device# clear cfm y1731 client-signal-fail statistics
This example displays ETH-CSF configuration information and packet statistics after the clear cfm
y1731 client-signal-fail command is issued.
device# show cfm y1731 client-signal-fail
---------------------------------------------------------------------------------
Domain Name : md1
MA Name : ma1
---------------------------------------------------------------------------------
ETH-CSF Statistics :
---------------------------------------------------------------------------------
MEP RMEP MEP RMEP Client CSF Transmit Transmit Receive Transmit Receive
ID ID Status Status I/F Type Period Frames Frames C-DCI C-DCI
---------------------------------------------------------------------------------
1 2 UP UP 1/1 C-LOS 1 minute 0 0 0 0
2 1 UP DOWN 1/2 C-LOS 1 second 0 0 0 0
Extreme SLX-OS
Layer 2 Switching Configuration Guide, 20.1.1 291