Vossuserguide 8.7 Ug
Vossuserguide 8.7 Ug
9037368-00 Rev AD
September 2022
Copyright © 2022 Extreme Networks, Inc.
Legal Notice
Extreme Networks, Inc. reserves the right to make changes in specifications and other information
contained in this document and its website without prior notice. The reader should in all cases
consult representatives of Extreme Networks to determine whether any such changes have been
made.
The hardware, firmware, software or any specifications described or referred to in this document
are subject to change without notice.
Trademarks
Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of
Extreme Networks, Inc. in the United States and/or other countries.
All other names (including any product names) mentioned in this document are the property
of their respective owners and may be trademarks or registered trademarks of their respective
companies/owners.
For additional information on Extreme Networks trademarks, see: www.extremenetworks.com/
company/legal/trademarks
This section discusses the purpose of this document, ways to provide feedback, additional help, and
information regarding other Extreme Networks publications.
Purpose
This document provides information on features in VSP Operating System Software (VOSS). VOSS runs
on the following product families:
• ExtremeSwitching VSP 4450 Series
• ExtremeSwitching VSP 4900 Series
• ExtremeSwitching VSP 7200 Series
• ExtremeSwitching VSP 7400 Series
• ExtremeSwitching VSP 8200 Series
• ExtremeSwitching VSP 8400 Series
• ExtremeSwitching VSP 8600 Series
• ExtremeSwitching XA1400 Series
Note
VOSS is licensed on the XA1400 Series as a Fabric Connect VPN (FCVPN) application,
which includes a subset of VOSS features. FCVPN transparently extends Fabric Connect
services over third-party provider networks.
Conventions
To help you better understand the information presented in this guide, the following topics describe the
formatting conventions used for notes, text, and other elements.
Text Conventions
The following tables list text conventions that can be used throughout this document.
Extreme Networks offers product training courses, both online and in person, as well as specialized
certifications. For details, visit www.extremenetworks.com/education/.
Before contacting Extreme Networks for technical support, have the following information ready:
• Your Extreme Networks service contract number, or serial numbers for all involved Extreme
Networks products
• A description of the failure
• A description of any actions already taken to resolve the problem
• A description of your network environment (such as layout, cable type, other relevant environmental
information)
• Network load at the time of trouble (if known)
• The device history (for example, if you have returned the device before, or if this is a recurring
problem)
• Any related RMA (Return Material Authorization) numbers
1. Go to The Hub.
2. In the list of categories, expand the Product Announcements list.
3. Select a product for which you would like to receive notifications.
4. Select Subscribe.
5. To select additional products, return to the Product Announcements list and repeat steps 3 and 4.
Send Feedback
The Information Development team at Extreme Networks has made every effort to ensure that this
document is accurate, complete, and easy to use. We strive to improve our documentation to help you
in your work, so we want to hear from you. We welcome all feedback, but we especially want to know
about:
• Content errors, or confusing or conflicting information.
• Improvements that would help you find relevant information.
• Broken links or usability issues.
Provide the publication title, part number, and as much detail as possible, including the topic heading
and page number if applicable, as well as your suggestions for improvement.
Security ACEs were used to perform permit or deny actions on a match. QoS ACEs were used to
perform remarking actions on a match. The switch performed a parallel search on both Security and
QoS ACE lists, which resulted in distinct and non-conflicting actions.
You can use both Primary and Secondary Banks for Security and QoS ACEs. The switch performs a
parallel search on both ACE lists. If actions do not conflict, both actions apply. If actions conflict, the
action from the Primary Bank has precedence.
Note
As a best practice, apply deny actions to Primary Bank ACEs in configurations where ACEs in
Primary and Secondary Banks with deny and permit actions applied can match the same flow.
If a documented command, parameter, tab, or field does not display on your hardware, it is not
supported.
For information about physical hardware restrictions, see your hardware documentation.
Note
For bridged or routed reachability of the management servers (DHCP, RADIUS,
ExtremeCloud IQ ‑ Site Engine, or ExtremeCloud IQ) the onboarding I-SID must be manually
mapped to the management segment on at least one Backbone Edge Bridge (BEB) in the
network prior to zero touch deployments of new switches. Additionally, you must enable a
Dynamic Nickname server on at least one node. For more information, see VOSS Release
Notes.
Auto-sense
Auto-sense is a port-based functionality that supports zero touch capabilities on the switch. Auto-sense
dynamically configures the port to act as an IS-IS network-to-network interface (NNI), Fabric UNI
(Flex-UNI), Fabric Attach (FA), or voice (IP phone) interface, based on the Link Layer Discovery
Protocol (LLDP) events. Auto-sense provides global configuration options for IS-IS authentication, FA
authentication, and voice configuration for IP phones, on the switch. For more information about IP
Phone Support, see IP Phone Support on page 48.
When a switch boots in Zero Touch Fabric Configuration mode, all ports on the switch automatically
operate in Auto-sense mode, unless you manually change the port configuration. For more information
on Zero Touch Fabric Configuration, see Zero Touch Fabric Configuration on page 63.
With Auto-sense functionality, ports on a switch can detect whether they connect to a Shortest Path
Bridging (SPB) device, an FA client, FA Proxy, Voice IP devices, or an undefined host:
• If a port connects to an SPB device or an FA client, then the system establishes Fabric architecture.
• If a port connects to any undefined host, then the system moves all untagged traffic on the port to
an onboarding service network, also known as the onboarding I-SID.
• If a port operates in Auto-sense mode, Extensible Authentication Protocol (EAP) is enabled globally
with a RADIUS configuration, and the Auto-sense port does not detect an SPB or Fabric Attach
proxy neighbor, then the system automatically activates EAP and Non-EAP (NEAP) authentication
on them, for untagged traffic.
When you manually disable Auto-sense on a specific port, the switch removes the dynamic
configuration on that port unless you use an optional parameter to convert the dynamic configuration
to a manual configuration. If you do not use the optional parameter, the software removes all Auto-
sense state configuration and reverts the port to the default configuration.
If you enable Auto-sense on a port with a conflicting feature configuration, the software automatically
deletes the conflicting configuration from the port. Conflicting configurations include the following
commands or features:
• access-diffserv command
• flex-uni enable command
• mac-security limit-learning command
• qos 802.1p-override enable command
• Other feature configurations on the port:
◦ brouter port
◦ port tagging (encapsulation) - If a port has encapsulation enabled and you enable Auto-sense,
the port remains with encapsulation enabled. Disabling Auto-sense transitions the encapsulation
value to disabled. If a port has encapsulation disabled and you enable Auto-sense, port
encapsulation is enabled.
◦ Extensible Authentication Protocol over LAN (EAPoL)
◦ FA
◦ IS-IS interface
◦ Link Aggregation Control Protocol (LACP) and Virtual Link Aggregation Control Protocol
(VLACP)
◦ LLDP enable
◦ LLDP MED network policies
◦ private VLAN
◦ MLT member
◦ Switched UNI (S-UNI) or Transparent Port UNI (T-UNI) interface
◦ VLAN member
sense enabled ports and you configure an Auto-sense data I-SID on each port, the switch separates the
data traffic of device A from the data traffic of device B. A port-level data I-SID and the global data
I-SID can use the same value. The system prioritizes the I-SIDs in the following order:
The show running-config output includes the configured Auto-sense data I-SID for the port
module only if you enable Auto-sense on the port. If you disable Auto-sense on the port, the
configuration remains on the switch even though the command output does not include it. If you
disable Auto-sense on the port and use the convert-to-config parameter, the port remains in the
I-SID until you manually remove the data I-SID configuration from the port. If you re-enable Auto-sense
on the port, you must reconfigure the data I-SID on the port.
If you remove the Auto-sense data I-SID from a port, then the port uses either the global Auto-sense
data I-SID, if one exists, or the Auto-sense onboarding I-SID.
IS-IS Authentication
Auto-sense supports global configuration of IS-IS authentication key on the switch. All ports operating
in Auto-sense mode and transitioned to the NNI state, use the global IS-IS authentication key that you
configure using the auto-sense isis hello-auth type command. For more information, see
Configure Auto-sense IS-IS Authentication on page 24.
FA Configuration
Depending on the device that the Auto-sense port detects, the software can apply different FA-specific
configurations that you define:
• You can configure an I-SID for FA clients such as FA wap-type 1, FA camera, and FA open-virtual-
switch (OVS). The software prefers the FA I-SID over the onboarding I-SID.
• You can configure a specific I-SID and customer VLAN ID to use as the management I-SID when the
port is in the Auto-sense FA PROXY state. If you do not configure a management I-SID, the port uses
the onboarding I-SID for untagged traffic.
• You can disable EAPoL authentication requirements for specific FA client types (wap-type1, camera,
and ovs).
FA Authentication
Auto-sense supports FA message authentication on switches. You can enable FA message
authentication globally on a switch. All ports operating in Auto-sense mode use the global
authentication key. A preconfigured authentication key exists on the switch, by default, which you can
change. For more information, see Configure Auto-sense Fabric Attach (FA) Authentication on page
31.
Loop Prevention
Auto-sense ports between two switches that have transitioned to NNI state are not prone to loops.
Any connection can be wired and SPB establishes the shortest path connections. On Auto-sense NNI
links BVID information, as well as IS-IS area information, is exchanged enabling Zero Touch Fabric
functionality.
Auto-sense ports that connect to non-SPB switches operate in UNI mode, or FA Proxy mode in the
case of ERS, EXOS, and Switch Engine switches. In UNI mode, VOSS devices send Spanning Tree BPDU
packets emulating root bridge behavior ensuring that any potential UNI loop is broken by the attached
spanning tree enabled devices.
For more information on the port states, see Auto-sense Port States on page 18.
Running Configuration
If you view the running configuration, the global Auto-sense configuration displays under the port
module. Use the command show running-config module port.
For flowcharts that describe the system logic for Auto-sense port state detection, see Auto-sense
Logical Flowcharts on page 42.
Wait State
The port modifies outgoing LLDP packets to represent the enhanced properties of the port and
analyzes incoming LLDP packets for possible transitions to advanced states like network-to-network
interface (NNI), Fabric Attach (FA), or VOICE. If the port does not receive LLDP packets, the port
transitions to the UNI state.
UNI State
This state grants onboarding and data connectivity to the port if you configure the onboarding I-SID,
or a data I-SID in the global Auto-sense configuration or at the port level. The system also applies the
trusted and untrusted Auto-sense global configuration. As with the Wait state, the port continues to
monitor received LLDP packets for transitions to other states.
Network Access Control (NAC) support, through EAP/NEAP, is enabled by default on each Auto-sense
port, but disabled globally. If you require EAP/NEAP operation on Auto-sense ports, you must globally
enable EAP and configure a RADIUS server.
An Auto-sense port in the UNI state remains in PVLAN isolated mode when any additional untagged
I-SID is applied to the port. Auto-sense ports support multiple VLAN/I-SIDs and PVLAN/I-SIDs on the
same port at any time concurrently. Typically, this operational mode is required when you configure
NAC support with Multiple Host Multiple VLAN (MHMV). The software then assigns clients to their
VLAN/I-SIDs based on their NAC authentication results.
NNI States
The NNI states are as follows:
• NNI
• NNI onboarding
• NNI IS-IS
• NNI pending
If, while in the Wait state, the port receives a Fabric Connect LLDP packet, the port transitions to the
NNI state and adds the IS-IS SPBM instance on the interface. The system tries to establish an IS-IS
adjacency and, if successful, transitions the port to the NNI IS-IS state. The port remains in the NNI IS-IS
state until the adjacency fails, at which time it returns to the NNI state.
If the system cannot establish the adjacency, it transitions the port to the NNI onboarding state. The
system creates a Switched UNI (S-UNI) with the onboarding I-SID.
The port enters the FA state after LLDP detects an access point, an FA client that is not another switch.
If LLDP detects an FA proxy switch such as an ERS, EXOS, or Switch Engine switch that uses FA
message authentication, the port transitions to the FA PROXY state.
Note
By default, the FA PROXY state uses the onboarding I-SID as the management I-SID but you
can override this with a specific I-SID and customer VLAN ID combination.
If the FA proxy switch does not use FA message authentication, the port transitions to the FA PROXY
NOAUTH state.
Depending on the device that the Auto-sense port detects, the switch can apply different FA-specific
configurations that you define. For more information, see Auto-sense on page 15.
When a port is in the FA state, the system uses the following priority for untagged traffic:
Voice State
If the port detects an LLDP packet from a phone, the port transitions to the VOICE state. A global
Auto-sense voice configuration is not required to transition to the VOICE state except a specific voice
VLAN shall be signaled to the phone.
For more information on Auto-sense voice, see Auto-sense Voice on page 50.
Without this port type change on the Private VLAN, the other devices in the network cannot receive
an IP address through the DHCP server if they are in the Zero Touch Fabric Configuration mode unless
you disable Auto-sense on the port and manually change the port from isolated mode to promiscuous
mode.
To change the Auto-sense configuration on a port using EDM, see Configure Basic Port Parameters on
page 584.
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Note
After a switch boots without a configuration file, Auto-sense is enabled on all ports, by
default.
Procedure
1. Enter GigabitEthernet Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to disable Auto-sense on a specific port. You also have the option to disable
Auto-sense on the port but retain the configuration that the system applied dynamically.
Procedure
1. Enter GigabitEthernet Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Disable Auto-sense on port 1/2 but retain the configuration. The dynamic configuration becomes a
manual configuration and is visible in the show running-config output and can be saved to the
configuration file using the save config command.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#interface interface gigabitEthernet 1/2
Switch:1(config-if)#no auto-sense enable convert-to-config
Switch:1(config-if)#save config
Variable Definitions
The following table defines parameters for the no auto-sense enable command.
Variable Value
convert-to- Retains the Auto-sense configuration that the system applies dynamically on the
config specific port. The dynamic configuration becomes a manual configuration and is
visible in the show running-config output. If you run the "no auto-sense
enable" command without the "convert-to-config" option, then the configuration
will be removed from the port and the port returns to the default state where VLAN
1 is assigned.
Note
This procedure does not apply to VSP 8600 Series or XA1400 Series.
Perform this task to configure the time, in seconds, for Auto-sense to wait for a Link Layer Discovery
Protocol (LLDP) neighbor to be detected in the Auto-sense wait state before transitioning to the
Auto-sense onboarding state.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Configure the Auto-sense wait interval:
auto-sense wait-interval <10-120>
3. Verify the Auto-sense wait interval information:
show auto-sense wait-interval
Examples
----------------------------------------------------------------------------
0 out of 0 Total Num of AUTO-SENSE entries displayed
----------------------------------------------------------------------------
Variable Definitions
The following table defines parameters for the auto-sense wait-interval command.
Variable Value
<10-120> Specifies the wait interval, in seconds, for Auto-sense ports. The default value is 35.
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to configure a global IS-IS authentication key for ports that are operating in
Auto-sense mode.
Note
If the IS-IS authentication keys on auto-sense ports between two switches do not match, then
the auto-sense port state will be auto-sense UNI onboarding, until the keys are matching, then
an IS-IS adjacency will be established.
Procedure
configure terminal
2. Configure the authentication type for IS-IS hello packets on Auto-sense ports:
auto-sense isis hello-auth type {none|simple|hmac-md5|hmac-sha-256}
[key WORD<1-16>] [key-id <1-255>]
Example
Variable Definitions
The following table defines parameters for the auto-sense isis hello-auth type command.
Variable Value
{none|simple| Specifies the authentication type for IS-IS hello packets on Auto-sense ports:
hmac-md5| • none
hmac-sha-256} • simple - simple password authentication uses a text password in the
transmitted packet. The receiving router uses an authentication key
(password) to verify the packet.
• hmac-md5 - MD5 authentication creates an encoded checksum in the
transmitted packet. The receiving router uses an authentication key
(password) to verify the MD5 checksum of the packet.
• hmac-sha–256 - with SHA-256 authentication, the switch adds an hmac-sha–
256 digest to each Hello packet. The switch that receives the Hello packet
computes the digest of the packet and compares it with the received digest.
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to configure ports operating in Auto-sense mode to determine the Layer
3 Quality of Service (QoS) actions the switch performs. The Auto-sense access ports override the
Differentiated Services Code Point (DSCP) markings.
Procedure
configure terminal
2. Configure Auto-sense access ports:
auto-sense access-diffserv [enable]
Example
Variable Definitions
The following table defines parameters for the auto-sense access-diffserv command.
Variable Value
enable Configures the ports operating in Auto-sense
mode to determine the Layer 3 Quality of Service
(QoS) actions the switch performs. The Auto-
sense access ports override the Differentiated
Services Code Point (DSCP) markings. The default
configuration is enabled.
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to disable Dynamic Host configuration Protocol (DHCP) server detection in
Auto-sense mode.
Note
By default Auto-sense DHCP server detection is enabled. This ensures automatic detection of
the DHCP uplink ports in Zero Touch Deployment.
Procedure
configure terminal
2. Disable DHCP server detection:
no auto-sense dhcp-detection
Example
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to configure the onboarding I-SID for ports that are operating in Auto-sense
mode. The onboarding I-SID is typically used to onboard networking devices such as switches and
non FA capable access points. By default, the onboarding I-SID provides automatic reachability when
switches are booted from factory without a configuration file. For security reasons, the onboarding I-SID
forms an isolated PVLAN/ETREE to block any unwanted port to port cross talk.
Procedure
configure terminal
2. Configure the onboarding I-SID:
auto-sense onboarding i-sid <1-15999999>
Example
Variable Definitions
The following table defines parameters for the auto-sense onboarding command.
Variable Value
i-sid<1-15999999> Specifies the service instance identifier (I-SID). The default onboarding I-SID
value is 15999999.
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this task to configure Auto-sense data traffic information for ports that are operating in
Auto-sense mode.
Note
This option applies to the auto-sense UNI and voice states only, it replaces the onboarding
I-SID and places an (untagged) client device into a pre-defined global data I-SID.
Procedure
configure terminal
2. Configure the data service instance identifier (I-SID):
auto-sense data i-sid <1-15999999>
Example
Variable Definitions
The following table defines parameters for the auto-sense data command.
Variable Value
i-sid <1-15999999> Specifies the service instance identifier (I-SID).
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Note
This option applies to the Auto-sense UNI and voice states only, it replaces the onboarding
I-SID and places an (untagged) client device into a pre-defined port specific data I-SID.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Variable Definitions
The following table defines parameters for the auto-sense data command.
Variable Value
i-sid <1-15999999> Specifies the service instance identifier (I-SID).
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to override incoming 802.1p bits on ports that operate in Auto-sense UNI or
voice mode.
Procedure
configure terminal
2. Configure Auto-sense ports as Layer 2 untrusted:
auto-sense qos 802.1p-override
Example
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
You can disable EAPoL authentication for specific Fabric Attach (FA) client types.
Procedure
configure terminal
2. Configure EAPoL authentication requirements from the following choices:
• For auto-sensed cameras: auto-sense fa camera eapol status {authorized |
auto}
• For auto-sensed virtual switches: auto-sense fa ovs eapol status {authorized |
auto}
• For auto-sensed wireless access points (WAP): auto-sense fa wap-type1 eapol
status {authorized | auto}
Variable Definitions
The following table defines parameters for the auto-sense commands related to EAPoL
authentication for Fabric Attach (FA).
Variable Value
{authorized | Configures the EAPoL authentication requirement for the specific client type.
auto} Choose from the following options:
• authorized — the port skips EAPoL authentication and authorizes the
connection.
• auto — authorization depends on the result of EAPoL authentication.
By default, authentication is required before the connection is authorized.
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to configure FA authentication for ports that are operating in Auto-sense mode.
Procedure
configure terminal
2. Configure the FA authentication key:
auto-sense fa authentication-key WORD<0-32>
3. Enable FA message authentication:
auto-sense fa message-authentication
Example
Variable Definitions
Variable Value
authentication-key Specifies the authentication key value.
WORD<0-32>
message-authentication Enables Fabric Attach (FA) message authentication globally,
for ports that operate in Auto-sense mode.
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
For Zero Touch Deployment and assignments of dedicated I-SIDs for FA capable cameras, Wireless
Access Points, FA proxy switches and Open Virtual Switches (OVS), configure a specific I-SID to use
instead of the onboarding I-SID when a port is in an Auto-sense Fabric Attach (FA) state and detects an
FA client.
The FA I-SID can be the same as the voice I-SID because they are used by different Auto-sense port
states.
Procedure
configure terminal
2. Configure the FA I-SID from the following choices:
• For auto-sensed cameras: auto-sense fa camera i-sid <1-15999999>
• For auto-sensed FA client switches that do not use FA message authentication, like EXOS or
Switch Engine: auto-sense fa proxy-no-auth i-sid <1-15999999>
• For auto-sensed virtual switches: auto-sense fa ovs i-sid <1-15999999>
• For auto-sensed wireless access points (WAP): auto-sense fa wap-type1 i-sid
<1-15999999>
Variable Definitions
The following table defines parameters for the auto-sense commands related to Fabric Attach (FA)
I-SIDs.
Variable Value
i-sid <1-15999999> Specifies the service instance identifier (I-SID).
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Configure a specific I-SID and customer VLAN ID to use as the management I-SID when a port is in the
Auto-sense FA PROXY state.
The switch creates this I-SID dynamically and uses it instead of the onboarding I-SID.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Configure the management I-SID:
auto-sense fa proxy management i-sid <1-15999999> c-vid <1-4094>
Variable Definitions
The following table defines parameters for the auto-sense fa proxy management command.
Variable Value
c-vid <1-4094> Specifies the customer VLAN ID.
i-sid <1-15999999> Specifies the service instance identifier (I-SID).
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display the Auto-sense configuration:
show auto-sense [access-differv] [data] [dhcp-detection] [eapol] [fa]
[isis] [onboarding] [qos] [voice] [wait-interval]
3. Display the Auto-sense status and state on a port:
show interfaces gigabitEthernet auto-sense [{slot/port[/sub-port][-
slot/port[/sub-port]][,...]}]
Examples
==================================================================================
AUTO-SENSE FA Client specific config
==================================================================================
TYPE EAPOL STATUS I-SID VLANID C-VID MGMT I-SID MGMT C-VID
----------------------------------------------------------------------------------
camera Auto 100 100 untag - -
wap-type1 Auto 200 200 untag - -
open-virtual-switch Auto - - - - -
proxy-no-auth Auth 300 300 untag - -
proxy Auth 400 n/a 400 400 400
----------------------------------------------------------------------------------
6 out of 6 Total Num of AUTO-SENSE entries displayed
----------------------------------------------------------------------------------
----------------------------------------------------------------------------
0 out of 0 Total Num of AUTO-SENSE entries displayed
----------------------------------------------------------------------------
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to enable Link Layer Discovery Protocol (LLDP) authentication of IP phones. The
switch authenticates the phone after it receives LLDP packets from the phone.
Auto-sense LLDP authentication applies to Auto-sense ports in the VOICE state. Auto-sense LLDP
authentication does not require a global Auto-sense voice configuration.
The system removes the LLDP session for the following reasons:
• You disable EAPoL globally.
• You disable Auto-sense on the port.
• The LLDP neighbor is removed.
If the LLDP authentication configuration exists and one of the following situations occur, the LLDP
session is recreated:
• You renable EAPoL globally.
• You renable Auto-sense on the port.
• The LLDP neighbor is recreated.
Procedure
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
The switch applies the Auto-sense voice configuration on specific port(s), after it discovers IP phones on
the port through LLDP packets.
If you boot the switch with a configuration file, and not through Zero Touch Fabric Configuration, you
must manually enable Auto-sense on specific port(s).
Perform this procedure to configure Auto-sense voice information for IP phones. A global Auto-sense
voice configuration does not require LAuto-senseLDP authentication.
Procedure
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Procedure
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to configure the onboarding I-SID for ports that are operating in Auto-sense
mode.
Procedure
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this task to configure Auto-sense data traffic information for ports that are operating in
Auto-sense mode.
Note
This option applies to the Auto-sense UNI and voice states only; it replaces the onboarding
I-SID and places an (untagged) client device into a pre-defined global data I-SID.
Procedure
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to override incoming 802.1p bits on ports that operate in Auto-sense mode.
Procedure
2. Select AutoSense.
3. Select the Globals tab.
4. Select Qos8021pOverrideEnable to override incoming 802.1p bits on ports that operate in Auto-
sense mode.
5. Select Apply.
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to configure a global IS-IS authentication key for ports that are operating in
Auto-sense mode.
Procedure
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to configure ports operating in Auto-sense mode to determine the Layer 3 QoS
actions the switch performs. The Auto-sense access ports override the Differentiated Services Code
Point (DSCP) markings.
Procedure
1. In the navigation pane, expand Configuration > Fabric.
2. Select AutoSense.
3. Select the Globals tab.
4. Select AccessDiffservEnable to enable differentiated serve type as access for Auto-sense ports.
5. Select Apply.
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
The FA I-SID can be the same as the voice I-SID because they are used by different Auto-sense port
states.
Procedure
Use the data in the following table to use the Globals tab.
Name Description
AccessDiffservEnable Enables or disables the differentiated service type as access for Auto-
sense ports. The default is enabled.
DataIsid Specifies the data I-SID used by the Auto-sense ports.
EapolVoiceLldpAuthEnable Enables the EAPoL LLDP authentication for Auto-sense voice ports. The
default is disabled.
FaMsgAuthEnable Enables or disables the FA message authentication for Auto-sense ports.
The default is enabled.
FaAuthenticationKey Specifies the FA authentication key for Auto-sense ports.
IsisHelloAuthType Specifies the authentication type for IS-IS hello packets on Auto-sense
ports:
• None
• simple - simple password authentication uses a text password in the
transmitted packet. The receiving router uses an authentication key
(password) to verify the packet.
• hmac-md5 - MD5 authentication creates an encoded checksum in the
transmitted packet. The receiving router uses an authentication key
(password) to verify the MD5 checksum of the packet.
• hmac-sha256 - with SHA-256 authentication, the switch adds an
hmac-sha–256 digest to each Hello packet. The switch that receives
the Hello packet computes the digest of the packet and compares it
with the received digest.
Name Description
FaProxyMgmtCvid Specifies the FA proxy management Client-VLAN ID (c-vid) used by
auto-sense ports.
FaProxyNoAuthIsid Specifies the FA proxy no-auth I-SID used by auto-sense ports.
FaVirtualSwitchIsid Specifies the FA virtual-switch I-SID used by auto-sense ports.
FaWapType1Isid Specifies the FA WAP type-1 I-SID used by auto-sense ports.
FaCameraEapolStatus Specifies the FA EAPOL status for Camera I-SID used by auto-sense
ports.
FaEapolOVSStatus Specifies the FA EAPOL status for OVS (Open-Virtual-Switch) I-SID used
by auto-sense ports.
FaEapolWap1Status Specifies the FA EAPOL status for Wap-type-1 I-SID used by auto-sense
ports.
WaitInterval Specifies the wait interval in seconds for the 'WAIT' state of auto-sense's
finite state machine.
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
If you select more than one port, the format of the tab changes to a table-based tab.
Note
• After a switch boots without a configuration file, Auto-sense is enabled on all ports, by
default.
• Auto-sense is disabled by default for existing configurations but enabled for new Zero
Touch Fabric Configuration deployments.
Procedure
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to disable Auto-sense on one or more ports. You also have the option to disable
Auto-sense on the port but retain the configuration that the system applied dynamically. The dynamic
configuration becomes a manual configuration and is visible in the show running-config output.
If you select more than one port, the format of the tab changes to a table-based tab.
Procedure
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Procedure
The following flowcharts describe the system logic for Auto-sense port state detection, how the system
configurations change the logic path, and the Auto-sense configuration results.
Note
The vlan create CLI command examples do not apply to DvR leaf switch configurations.
DvR leaf switches create VLANs automatically.
*1
*1
*1
*2
*3
IP Phone Support
Note
This feature does not support auto-creation of voice VLAN and MultiLink Trunking (MLT) or
Split Multi-Link Trunking (SMLT).
Note
Phone traffic is tagged with the voice VLAN whereas the PC traffic is untagged. However, you
can configure the phone to send the traffic as untagged.
Auto-sense Voice
The Auto-sense voice feature is an addition to the Auto-sense module. Based on the events of the
phone discovery in the network, you can use this feature to configure phone devices without manual
intervention.
After the switch discovers a Link Layer Discovery Protocol (LLDP) packet with phone capabilities, the
port transitions to the "voice" state. The port receives a message on the voice event details.
With the Auto-sense voice feature, you can configure the voice I-SID and the voice VLAN. If you
configure the I-SID as untagged, the phone receives VLAN as zero. When you configure Auto-sense
voice, switched UNI is configured in VOICE I-SID for each port that is in "voice" state. The switch
adds the Link Layer Discovery Protocol-Media Endpoint Discovery (LLDP-MED) policies for voice and
voice-signaling Type-Length-Value (TLVs) to the LLDP packet and sends LLDP packets to the phone. It
uses the configured voice VLAN and default values for Differentiated Services Code Point (DSCP) (46)
and priority (6). After you run the auto-sense voice command, a filter is installed to prioritize the
traffic that passes through the configured I-SID. The filter applies to traffic that reaches the VOICE I-SID,
which implies the voice traffic.
Note
To change the Auto-sense voice configuration on the switch, delete the earlier configured
voice I-SID and VLAN entry.
I-SID. The traffic that passes through this I-SID is internally prioritized with level 6 and forwarded
with a dot1p value of 6, for tagged packets. For the IP packets, the DSCP value of 46 is forwarded.
Note
• To disable Auto-sense on the port but keep the dynamic configurations made by Auto-
sense, use the command no auto-sense enable convert-to-config. The voice
S-UNI loses its Auto-sense origin and has a config origin instead. The LLDP-MED policies
installed by Auto-sense are preserved.
• If you use the no auto-sense voice command, the system removes the voice S-UNI
and the LLDP-MED policies. The voice I-SID is removed if it was installed by using the
auto-sense voice command. If the I-SID existed before you used the auto-sense
voice command, the system does not remove the I-SID but the I-SID does lose its
Auto-sense origin.
• A port exits the voice state in one of the following scenarios:
◦ If the port is down
◦ If the LLDP session fails between the switch and the phone
◦ If Auto-sense is disabled on the port that connects to the IP phone
After a port exits the voice state, the Switched UNI (S-UNI), LLDP voice and voice-
signaling are deleted.
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
The switch applies the voice configuration on Auto-sense-enabled ports, after it discovers IP phones on
the port through Link Layer Discovery Protocol (LLDP) packets.
If you boot the switch with a configuration file, and not through Zero Touch Fabric Configuration, you
must manually enable Auto-sense on specific ports.
A global Auto-sense voice configuration does not require Auto-sense LLDP authentication based on the
following cases.
• In a non NAC, a phone is classified based on the phones LLDP signaling.
• In a NAC, a phone is authenticated based on EAP/NEAP radius authenticated, or if configured, it is
LLDP authenticated
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Configure the customer VLAN ID:
auto-sense voice i-sid <1-15999999> c-vid <c-vid>
3. Configure the traffic as untagged:
auto-sense voice i-sid <1-15999999> untagged
Note
The phone receives VLAN ID as 0 and the tagging is configured as "untagged".
Example
Variable Definitions
The following table defines parameters for the auto-sense voice command.
Variable Value
i-sid<1-15999999> Specifies the service instance identifier (I-SID).
c-vid<c-vid> Specifies the customer VLAN ID. Different hardware platforms support
different customer VLAN ID ranges. Use the CLI Help to see the available
range for the switch.
untagged Specifies the VLAN tagging type as untagged.
Note:
The phone receives VLAN ID as 0 and the tagging is configured as
"untagged".
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series.
Perform this procedure to enable Link Layer Discovery Protocol (LLDP) authentication of IP phones. The
switch authenticates the phone after it receives LLDP packets from the phone if EAP/NEAP is enabled.
Auto-sense LLDP authentication applies to Auto-sense ports in the VOICE state. Auto-sense LLDP
authentication does not require a global Auto-sense voice configuration.
The no auto-sense eapol voice lldp-auth command removes all Auto-sense LLDP sessions
and removes the Auto-sense LLDP authentication configuration.
The system removes the LLDP session for the following reasons:
• You disable EAPoL globally.
• You disable Auto-sense on the port.
• The LLDP neighbor is removed.
If the LLDP authentication configuration exists and one of the following situations occur, the LLDP
session is recreated:
• You renable EAPoL globally.
• You renable Auto-sense on the port.
• The LLDP neighbor is recreated.
Procedure
configure terminal
2. Enable LLDP authentication:
auto-sense eapol voice lldp-auth
Example
Variable Definitions
The following table defines parameters for the auto-sense eapol voice command.
Variable Value
lldp-auth Enables Link Layer Discovery Protocol (LLDP) authentication
of IP phones. By default, LLDP authentication of IP phones is
disabled on the switch.
Use this procedure to configure the Link Layer Discovery Protocol (LLDP) vendor-specific information
on a call server or a file server.
Note
After you configure LLDP vendor specific call server information, the SIP Proxy of the phone is
configured as transport type Transport Layer Security (TLS) port 5061. This option is available
depending on the operating system of the call server.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. To configure LLDP vendor-specific information for a call server server, enter:
lldp vendor-specific call-server <1-8> <A.B.C.D>
3. To configure LLDP vendor-specific information for a file server, enter
lldp vendor-specific file-server <1-4> <A.B.C.D>
Example
Variable Definitions
The following table defines parameters for the lldp vendor-specific command.
Variable Value
call-server <1-8> Specifies the Link Layer Discovery Protocol (LLDP) vendor specific
<A.B.C.D> information on the call server number and the IP address.
file-server <1-4> Specifies an LLDP vendor specific information on the file server
<A.B.C.D> number and the IP address.
Use this procedure to view the Link Layer Discovery Protocol (LLDP) vendor-specific information on a
call server or a file server.
Procedure
1. Enter Privileged EXEC mode:
enable
Example
Use this procedure to view the remote Link Layer Discovery Protocol (LLDP) vendor-specific
information on a call server or a file server.
Procedure
Example
Note
This procedure does not apply to VSP 4450 Series, VSP 8600 Series, or XA1400 Series.
Perform this procedure to enable Link Layer Discovery Protocol (LLDP) voice authentication of IP
phones on a port.
You cannot manually enable LLDP voice authentication on an Auto-sense-enabled port. If the system
detects a phone on an Auto-sense port, then “eapol voice lldp-auth” configuration is automatically
applied on the port that connects to the phone. This procedure applies to ports with Auto-sense
disabled.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Variable Definitions
The following table defines parameters for the eapol voice command.
Variable Value
lldp-auth Enables Link Layer Discovery Protocol (LLDP) voice
authentication of IP phones on the selected port. By default,
LLDP authentication of IP phones is disabled on the switch.
Perform this procedure to view inventory attributes for vendor-specific call server information.
Procedure
1. In the navigation pane, expand Configuration > Serviceability > Diagnostics > 802_1ab.
2. Select Vendor Specific.
3. Select the Call Server tab.
Use the data in the following table to use the Call Server tab.
Name Description
CallServerNum Specifies the call server ID.
CallServerAddressType Specifies the IP address type of the call server.
CallServerAddress Specifies the IP address of the call server.
Perform this procedure to view inventory attributes for vendor-specific file server information.
Procedure
1. In the navigation pane, expand Configuration > Serviceability > Diagnostics > 802_1ab.
2. Select Vendor Specific.
3. Select the File Server tab.
Use the data in the following table to use the File Server tab.
Name Description
FileServerNum Specifies the file server ID.
FileServerAddressType Specifies the IP address type of the file server.
FileServerAddress Specifies the IP address of the file server.
For the most current information on switches supported by ExtremeCloud™ IQ, see ExtremeCloud™ IQ
Learning What’s New.
Zero Touch Deployment enables a switch to be deployed automatically with ExtremeCloud IQ but you
still need to onboard the switch on the ExtremeCloud IQ side. When the switch powers on, the Dynamic
Host Configuration Protocol (DHCP) Client obtains the IP address and gateway from a DHCP Server,
and discovers the Domain Name Server, connecting the switch automatically to ExtremeCloud IQ ‑ Site
Engine or to ExtremeCloud IQ cloud management application.
Zero Touch Provisioning Plus (ZTP+) provides ExtremeCloud IQ ‑ Site Engine connectivity to the switch.
For more information about ExtremeCloud IQ Agent, see ExtremeCloud IQ Agent on page 841. For
more information about ZTP+, see Zero Touch Provisioning Plus on page 60 .
To use zero touch functionality, your switch must be in a Zero Touch Deployment-ready configuration
mode, which means the switch cannot have existing primary or secondary configuration files loaded.
Factory shipped switches are Zero Touch Deployment ready because they deploy without configuration
files. However, existing switches require manual preparation before Zero Touch Deployment can
function.
To prepare an existing switch for Zero Touch Deployment, the switch must boot without a configuration
file. Perform one of the following actions:
• Rename existing primary and secondary configuration files. Use the mv command to rename the
existing configuration files. For example, mv config.cfg config.cfg.backup.
This is the preferred option as it ensures that the primary and secondary files are removed while
making a backup of them at the same time. This option also ensures that the switch uses the default
config.cfg file for the final configuration after it has successfully onboarded.
• Boot from non-existent configuration files. Use the boot config choice command to configure
the primary and backup configuration files to reference files that do not exist on the switch:
This option also works, however, after the switch has successfully onboarded, it does not use the
default config.cfg file but uses the alternative configuration file name provided instead, which might
not be desired.
• Delete the existing primary and secondary configuration files. Create a backup of these files before
you delete them.
Configuration Considerations
The switch configuration depends on whether you use factory default mode or Zero Touch Deployment.
Note
Zero Touch Deployment does not run on a switch returned to factory default configuration in
this manner.
With zero touch functionality, switches are automatically discovered on the network within minutes of
when they are connected.
Zero Touch Provisioning Plus (ZTP+) enables you to deploy and configure switches in
ExtremeCloud IQ ‑ Site Engine with minimal server configuration and intervention. ZTP+ enabled
switches send information, such as the serial number, software version, MAC, management IP, and port
information to ExtremeCloud IQ ‑ Site Engine automatically.
When the switch powers on, the DHCP Client obtains the IP address and gateway from the DHCP server,
discovers the Domain Name Server, and connects the switch to ExtremeCloud IQ ‑ Site Engine.
ZTP+ uses HTTPS for communication between the switch and the ExtremeCloud IQ ‑ Site Engine
server. The switch discovers theExtremeCloud IQ ‑ Site Engine server by resolving the DNS name
extremecontrol.<domain-name>.
Important
This feature requires a Zero Touch Deployment-ready configuration. For more information,
see Zero Touch Deployment on page 58.
Connect
The Connect phase is the first phase of ZTP+ during which the switch connects to the
ExtremeCloud IQ ‑ Site Engine server on the network. The ExtremeCloud IQ ‑ Site Engine server is
discovered by resolving the DNS name extremecontrol.<domain-name>.
If the attempt is successful, the ExtremeCloud IQ ‑ Site Engine server responds with an Accept message.
When connectivity is established, the switch communicates with the ExtremeCloud IQ ‑ Site Engine
server securely and transmits information, such as its serial number, model number. The switch then
progresses to the next phase of ZTP+.
Upgrade
After a successful connect to the ExtremeCloud IQ ‑ Site Engine server, the next phase of ZTP+ is the
Upgrade phase. This phase verifies that the switch is running the image file version that is currently
selected as the reference version on the ExtremeCloud IQ ‑ Site Engine server.
Image file validation is initiated by the switch. After a successful connect, the switch sends an image
file upgrade request to the ExtremeCloud IQ ‑ Site Engine server with details on the current image file
version. If the image file versions on the switch and the ExtremeCloud IQ ‑ Site Engine server match,
no upgrade is initiated, and the switch moves to the next phase of ZTP+. If the ExtremeCloud IQ ‑ Site
Engine server detects a different image file version, ZTP+ initiates the .tgz image file download from a
specified URL location.
After a successful image upgrade, the switch reboots and reconnects to the ExtremeCloud IQ ‑ Site
Engine server. If there are errors in the image upgrade process, an event is added to the server log. The
switch then retries the image upgrade.
Configuration
The next phase after the image upgrade is ZTP+ Configuration phase. During this phase, the
switch queries the ExtremeCloud IQ ‑ Site Engine server for configuration updates, and initiates auto-
provisioning by transmitting information, such as the image version, model name, and serial number.
The switch then attempts to apply the configuration that is pushed from the ExtremeCloud IQ ‑ Site
Engine server.
If the switch can still communicate with the ExtremeCloud IQ ‑ Site Engine server after the configuration
is applied, the new configuration is automatically saved on the switch. The switch can be managed
through the ExtremeCloud IQ ‑ Site Engine using Simple Network Management Protocol (SNMP).
However, if the configuration that is pushed from the ExtremeCloud IQ ‑ Site Engine server breaks
switch connectivity to the ExtremeCloud IQ ‑ Site Engine server, the switch reboots without saving the
configuration. After the switch reboots, the ZTP+ onboarding restarts.
Any configurations pushed from the ExtremeCloud IQ ‑ Site Engine server to devices using the initial
ZTP+ configuration push are not displayed in the show log file detail command output. The
logs associated with the Cloud connector are logged internally to state_machine.txt and ztp_plus.txt
files located in /intflash/cc/cc_logs/.
Note
Based on the LLDP discovery, port templates can be used on the ExtremeCloud IQ ‑ Site
Engine server. Enabling or disabling LLDP is not supported.
• Login
• Network Time Protocol (NTP)
• Ports configuration
• SNMP
• VLANs
Note
ZTP+ cannot manage VLAN port membership. With ZTP+, new VLANs are created with
no ports. Ports cannot be removed from the onboarding VLAN. Ports cannot be added to
another VLAN. VLAN port membership is managed through Auto-sense functionality or
through manual configuration after initial onboarding is complete.
ZTP+ Considerations
The following considerations apply to Zero Touch Provisioning Plus (ZTP+) :
• Fabric configurations are not supported with ZTP+. After ZTP+ is configured, ExtremeCloud IQ ‑ Site
Engine server can use Simple Network Management Protocol (SNMP) to remotely configure Fabric-
related configurations on the switch using SNMP MIBs.
• Only the Out-of-Band (OOB) port or the Management VLAN interface are used to connect the
ExtremeCloud IQ ‑ Site Engine server.
Note
ZTP+ cannot change the Management VLAN interface. If onboarding started on the
Management onboarding VLAN, this cannot be changed while using ZTP+.
After your device is onboarded, you have access to ExtremeCloud IQ ‑ Site Engine.
Note
You must configure a Segmented Management Instance to use ZTP+. For more information,
see Segmented Management Instance Configuration using the CLI on page 87.
Use this procedure to verify the status of Zero Touch Provisioning Plus (ZTP+) on the switch.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Verify that ZTP+ is enabled:
show application auto-provision
Example
You can use Zero Touch Fabric Configuration to deploy Fabric-capable switches in a plug and play
manner with no initial configuration. The switches form a new Fabric automatically or they can connect
to an existing Fabric that is Auto-sense-capable, obtain an IP address and Domain Name System
(DNS) information from a Dynamic Host Configuration Protocol (DHCP) server using the onboarding
I-SID/VLAN, which then permits the system to automatically onboard to the management servers, such
as ExtremeCloud IQ or ExtremeCloud IQ ‑ Site Engine, to conduct actual provisioning deployment of
the switch. For more information about Auto-sense, see Auto-sense on page 15.
Zero Touch Fabric Configuration automatically configures Shortest Path Bridging MAC (SPBM) and IS-IS
without user intervention if you boot the switch in Zero Touch Deployment-ready configuration mode,
meaning you boot without a configuration file. Zero Touch Fabric Configuration uses LLDP to signal
Fabric capability and exchanges SPB backbone VLAN IDs information to ensure seamless joining to any
existing fabric deployment. The switches use the chassis MAC addresses as their system ID. To ensure
participation in the correct area, newly joining ZTF switches listen to IS-IS update packets for area
information. A unique nick-name is as assigned by a pre-configured nick-name server switch. For more
information, see Zero Touch Deployment on page 58.
Important
To add new Zero Touch Fabric Configuration devices or implement Zero Touch Fabric
Configuration on existing devices, the network requires a nickname server and reachability
to the DHCP server. How you implement this depends on if the network is a new deployment
or an existing Fabric network that you upgrade. In a new deployment, you can meet the
network requirements with one node, known as a seed node. In an existing network, functions
may already exist on different nodes. For more information, see VOSS Release Notes.
Zero Touch Fabric Configuration uses the port-based Auto-sense features, that enables all ports on the
switch, by default, and all ports operate in Auto-sense mode. With the support of Auto-sense, Zero
Touch Fabric Configuration onboards all ports on the switch to an existing network, without having to
manually enable each port. Auto-sense automatically detects neighbor capabilities and performs the
configuration on the port to reach the desired connectivity with the neighbor without user invention.
With Auto-sense functionality, ports on a switch can detect whether they connect to a Shortest Path
Bridging (SPB) device, a Fabric Attach (FA) client, FA Proxy, Voice IP devices, or an undefined host,
and then make the necessary configuration. For more information about Auto-sense, see Auto-sense on
page 15.
If you start two nodes in a network without an existing configuration file, then Zero Touch Fabric
Configuration, through Auto-sense, dynamically establishes an IS-IS adjacency between them. For more
information, see Establishing IS-IS Adjacencies on page 65.
• Assigns the Auto-sense onboarding I-SID 15999999 to private VLAN 4048 and also includes the
management VLAN.
Note
As a best practice, use the onboarding I-SID for onboarding purposes and, whenever
possible, configure a management VLAN or management CLIP on a different I-SID after
the onboarding procedures have been successfully completed.
Note:
You can change the manual area dynamically,
without disabling IS-IS, only when the area is the
Zero Touch Fabric Configuration area.
When IS-IS is enabled, you cannot delete the last
manual area.
The switch uses the Auto-sense functionality with the Zero Touch Fabric Configuration feature to
establish the adjacency between two nodes. For more information about how and when the system
tries to establish the adjacency, see Auto-sense Port States on page 18 .
• If you manually configure an SPBM instance on a node, then the system removes the SPBM instance
that is dynamically created by Zero Touch Fabric Configuration. The system uses the LLDP Fabric
Connect TLV to send user-defined B-VLANs to other nodes in the network. Only the first pair of
B-VLANs is learned. If the switch already learned the B-VLANs from neighbor_A, the switch ignores
the B-VLANs received from neighbor_B, if those are different.
• If a switch operating in Zero Touch Fabric Configuration mode in the network receives B-VLANs
from a neighboring switch, which do not match the default B-VLANs configured through Zero Touch
Fabric Configuration, then the switch will perform the following actions:
◦ Disables ISIS.
◦ Deletes its VLANs.
◦ Unassigns the B-VLANs.
◦ Assigns the values received through LLDP Fabric Connect TLV.
◦ Creates the corresponding VLANs.
◦ Re enables ISIS and log a message on the console.
Configuration Example to Create an IS-IS Adjacency between the VSP 8600 Series
and Auto-sense Switches
Link Layer Discovery Protocol (LLDP) stations that connect to a local area network (LAN) advertise the
station capabilities to each other, allowing the discovery of physical topology information for network
management. When the system enables a switch as a Fabric Attach (FA) server in the Shortest Path
Bridging (SPB) network, it receives LLDP messages from the FA Client and the FA Proxy devices using
the LLDP Fabric Connect Type-Length-Value (TLV). For more information, see LLDP Fabric Connect TLV
on page 66.
Example
Create an IS-IS adjacency:
on interface 1/3
1 YYYY-MM-DD HH:MM:SS.954Z Switch - 0x00004727 - 00000000 GlobalRouter SNMP INFO SPBM detected adj INIT on
Port1/3, neighbor f873.a201.03df
1 YYYY-MM-DD HH:MM:SS.984Z Switch - 0x00004727 - 00000000 GlobalRouter SNMP INFO SPBM detected adj UP on
Port1/3, neighbor f873.a201.03df
show isis adjacencies
================================================================================================================
ISIS Adjacencies
================================================================================================================
INTERFACE L STATE UPTIME PRI HOLDTIME SYSID HOST-NAME STATUS AREA AREA-NAME
----------------------------------------------------------------------------------------------------------------
Port1/3 1 UP 00:05:18 127 21 f873.a201.03df VSP-8608 ACTIVE HOME
----------------------------------------------------------------------------------------------------------------
Home: 1 out of 1 interfaces have formed an adjacency
----------------------------------------------------------------------------------------------------------------
Note:
VOSS 8.1.50 does not support
this feature.
Note:
VOSS 8.1.50 does not support
this feature.
With Segmented Management, the Management plane (management protocols) is separated from the
Control Plane (routing plane) from a process and data-path perspective. Segmented Management is
the only method to manage switches. One or a combination of the following management interface/
management instance types can be used:
• Out-of-Band (OOB) management IP address (IPv4 and IPv6)
Important
The Segmented Management Instance provides support for management interfaces that
transmit and receive packets directly to and from the system native Linux IP stack. Unlike
a traditional management interface, for example, a CLIP in the GRT that is part of the
OS networking IP stack, Segmented Management Instance interfaces do not route packets
through the OS networking IP stack.
Segmented Management provides better security because you cannot reach the management instance
from outside the VRF (in case of CLIP) or outside VLAN/I-SID (in case of management VLAN), and
because it has a built-in firewall for the management plane. There is also more predictability with
symmetric traffic flows for management traffic originating from and terminating on the switch, for
instance:
• Sessions originated from switch (client mode) - Source IP of packets is determined based on
Management IP stack routing table weights (configurable).
• Sessions connecting to switch (server mode) - Source IP is derived from session connection and
reply will go out on management interface packet.
Important
Management interface access to the switch can be lost if you do not perform the applicable
migration scenarios before upgrading to this release. Loss of management access after an
upgrade can result in an automatic roll-back to the previous software version.
You must perform a manual software commit after upgrading from VOSS Release 8.1.5.0 or
earlier to VOSS 8.2 or later. Management interface access is required to input the software
commit CLI command within 10 minutes after the upgrade. If the time expires the system
initiates an automatic roll-back to the previous release.
You must ensure the switch runs VOSS 8.1.x before you upgrade to VOSS 8.2 or later to support the
migrate-to-mgmt functionality.
Note
If the network environment must migrate static IPv6 routes, the switches must run VOSS
Release 8.1.2.0 or later before you upgrade to VOSS 8.2 or later.
Not all upgrade paths are validated by Extreme Networks for each new software release. To
understand the validated upgrade paths, see VOSS Release Notes.
Ensure you understand the Management Instance interface types before you begin the upgrade and
migration. For more information, see Interface Types on page 77.
You must consider the following legacy management interface migration scenarios before you upgrade
to VOSS 8.2 or later:
Note:
Leaf nodes only support the
management CLIP as part of the
Global Routing Table (GRT).
Important:
Ensure that the management CLIP
IP address does not fall into the
range of a configured VLAN IP
address range as this is not allowed.
VLAN Specify a VLAN interface for migration You can use this interface type for
to management interface before you management of Layer 2 switches or
upgrade. for Zero-Touch onboarding of newly
deployed devices. Use the CLIP
Management Instance for routed
management.
Use the migrate-to-mgmt
command in the VLAN Interface
Configuration mode of the CLI
to specify the VLAN interface for
management before starting the
software upgrade process.
Important:
Choose a VLAN that does not
have an IP interface on it.
The upgrade process removes
the IP configuration and network
connectivity can be impacted.
Automatic Migration
Out-of-Band management interface and DvR leaf configurations automatically migrate during the
upgrade process. The management port interface, and all associated applications are moved to the
Segmented Management Instance .
A DvR leaf has a single management interface that also automatically migrates during the upgrade
process to the Segmented Management Instance.
Static route migration is completed by the upgrade process and no commands are necessary to prepare
for the migration. The following logic is applied during the upgrade process to the static routes:
• Out-of-Band management interfaces
◦ All IPv4 routes in the VRF 512 / mgmtrouter context are moved to the Segmented Management
Instance.
◦ All IPv6 routes in GRT with a nexthop IP address that exists in the same subnet as the IPv6
address are moved to the Segmented Management Instance.
• In-Band VLAN management
◦ All IPv4 routes from the VRF bound to the migrated VLAN and that have a nexthop IP address in
the same subnet as the IPv4 address being migrated are moved to the Segmented Management
Instance.
◦ All IPv6 routes from the VRF bound to the migrated VLAN and that have a nexthop IP address in
the same subnet as the IPv6 address being migrated are moved to the Segmented Management
Instance.
Important
The IP interface and all routing protocols attached to the original VLAN are deleted post
migration.
Consider the following example of In-Band VLAN management. The static route configuration listed
below is in the GRT:
ip route 192.168.20.0 255.255.255.0 192.168.10.2 weight 1
ip route 192.168.30.0 255.255.0.0 192.168.10.50 weight 1
ip route 192.168.40.0 255.255.255.0 192.168.20.99 weight 1
ip route 192.168.50.0 255.255.255.0 192.168.10.2 weight 1
no ip route 192.168.50.0 255.255.255.0 192.168.10.2 enable
The GRT is associated with VLAN 10 with an IP address of 192.168.10.1. This is the VLAN to be
migrated. After the upgrade, the 192.168.20.0, 192.168.30.0, and, 192.168.50.0 routes are migrated to the
management instance because their nexthop IP address is associated with the 192.168.10.0/24 subnet.
Note
All routes with a nexthop IP address associated with the subnet are migrated. This includes
administratively disabled routes. Administratively disabled routes must be manually deleted
after the upgrade if the route is not needed.
ECMP static route migration is not supported for the Segmented Management Instance. For
an ECMP static route, only the first path in the configuration file migrates.
After upgrading to VOSS Release 8.1.60 or later, any administratively disabled static routes
that migrated to the OOB or VLAN Segmented Management Instance subnet become active.
Administratively disabled routes must be manually deleted after the upgrade if the route is
not needed.
The static route configuration in the Management VLAN configuration block will be the following after
the upgrade:
mgmt vlan 10
ip address 192.168.10.1/24
ip route 192.168.20.0/24 next-hop 192.168.10.2
ip route 192.168.30.0/16 next-hop 192.168.10.50
ip route 192.168.50.0/24 next-hop 192.168.10.2
With the convert command, you can dynamically change the attributes of a Management Instance
while you actively manage the switch over that same Management Instance without requiring the
switch to reboot. This option also has rollback functionality to recover from unwanted changes.
You can use the migrate-to-mgmt command to move a management VLAN to a different VLAN ID,
or a management CLIP to a different VRF. However, if you use this option, you must reboot your switch
after you save the configuration changes.
The following is an outline of the steps required for management migration using the migrate-to-
mgmt command:
1. Configure a new or existing VLAN or CLIP management interface using Interface Configuration
mode in the CLI (interface vlan <vlan_id> or interface loopback <clip_id>) or
EDM.
Important
The IP interface and all routing protocols attached to the original VLAN are deleted post
migration.
2. Add required routes to reach management services and subnets from the new interface.
3. Test connectivity to the new interface using ping and traceroute, and from the switch to
management stations and servers.
4. Use the migrate-to-mgmt command from the new interface CLI mode.
5. Save the configuration and reboot.
Note
During boot, the migrate-to-mgmt settings are parsed and override the existing
management interface with the new interface.
6. Access and manage the switch from the new interface.
For more information see, Migrate a VLAN or CLIP IP address to the Segmented Management Instance
on page 87 (using CLI) or Migrate an IP Address to a Segmented Management Instance on page 116
(using EDM).
Interface Types
The Management Instance supports the following interface types:
• CLIP on page 77
• OOB on page 78
• VLAN on page 78
You can configure a maximum of three Management Instance interfaces, one of each type.
You can configure the route priority for the Segmented Management Instance. The Source IP default
route priority is management CLIP (weight 100), then management VLAN (weight 200), then
management OOB interface (weight 300). You can route packets through a different management
interface than the default configuration, but you must add a specific static route or change the default
weight of the management interface.
Note
If you change the default route weight, the management interface with the lowest weight
value becomes the default route for all segmented management interface traffic.
The VSP 8600 Series Segmented Management Instance does not support ACL based filters or
use of ping with -Q option to change the internal priority of management traffic.
You can configure the default topology IP for LLDP and SONMP advertisements. Both LLDP and
SONMP advertise the same topology IP. SONMP supports only IPv4 addresses. If multiple IPv4
addresses are configured on an OOB or VLAN management interface, the advertised IP priority is
static IP address, then DHCP IP address, then link-local IP address.
CLIP
You can use this interface type for CLIP management network routing in a Fabric network or Layer 3
routing network.
Important
A CLIP Management Instance is not a management CLIP created in the GRT. You must create
the CLIP Management Instance using the Segmented Management Instance configuration.
• You must configure accept policies or configure inter-VRF route redistribution to access the CLIP
Management Instance from a different VRF. Inter-VRF access is not permitted with traditional IP
routing using OSPF, BGP, or RIP. Packets ingressing the switch from a VLAN that belongs to a
different VRF without a configured accept policy will not reach the CLIP Management Instance
IP address. For more information, see Redistribution of CLIP Segmented Management Instance
Examples on page 113.
• If you migrate the current IS-IS IP source address to the CLIP Management Instance, after the
upgrade the IS-IS source IP address moves to the CLIP Management Instance. You must configure a
new GRT CLIP using a different IP address and assign that as the new IS-IS source IP.
• Advertisement of the IPv4 or IPv6 address for the CLIP Management Instance to IS-IS in the GRT
occurs automatically. Advertisement of the IPv4 or IPv6 address in the VRF Layer 3 VSN bound
to the CLIP Management Instance occurs automatically. You must configure route redistribution
to advertise the CLIP Management Instance to different protocols. For more information, see
Redistribution of CLIP Segmented Management Instance Examples on page 113.
OOB
You can use this interface type for OOB management network routing, as an alternative to in-band
network routing management.
Note
The OOB Segmented Management Instance is not supported on VSP 4450 Series, VSP 8600
Series. or XA1400 Series.
VLAN
You can use this interface type for management of Layer 2 switches or for Zero-Touch onboarding of
newly deployed devices.
For more information on Zero-Touch onboarding, see Zero Touch Capabilities on page 14.
You can configure a Management Instance VLAN on a DvR Leaf node by specifying the I-SID. For more
information, see Management I-SID Assignment to DvR Leaf on page 702.
Note
XA1400 Series and VSP 8600 Series do not support configuring a Management Instance
VLAN on a DvR Leaf node by specifying the I-SID.
Note
The VLAN Segmented Management Instance is not supported on VSP 8600 Series.
Packets sent to the VLAN Management Instance IP address must ingress the switch from a VLAN
or network-to-network interface (NNI) port (or contain the VLAN ID) associated with the VLAN
Management Instance. The system does not route packets between the network operating system
(NOS) routing VLAN and the VLAN Management Instance.
If you configure the same VLAN ID for NOS routing and for the VLAN Management Instance, the
NOS routing stack transmits and receives all ARP, ND, and ICMP packets. In this scenario, the packets
are only counted and shown in the NOS routing KHI port statistics. The management statistics and
KHI management statistics do not count or show the packets.
• You can bind the VLAN Management Instance to an I-SID, which bridges all management traffic to
a single I-SID in a Fabric network. Also, other normal VLAN related operations such as VLAN port
member changes are valid.
• Bridged management traffic must ingress on the VLAN or I-SID.
• The VLAN Management Instance can be routed by upstream routers.
Coexistence Restrictions
IPv4 and IPv6 address coexistence for both a NOS routing VLAN and VLAN Management Instance is
supported, however you must manually match both IP address configurations between the VLANs.
If you configure the VLAN Management Instance with a manual IPv4 address and a DHCP IPv4 address
first, you cannot add a IPv4 address to a NOS routing VLAN.
If you configure the VLAN Management Instance with an IPv6 address first, you can only add one IPv6
global address to a NOS routing VLAN.
The following restrictions apply when a VLAN Management Instance coexists with a port-based VLAN
or with a brouter port:
• If you want a dual stack IPv4 and IPv6 coexistence between a NOS VLAN and VLAN Management
Instance, you must configure the same IPv4 and IPv6 addresses on the VLAN Management Instance
and on the NOS VLAN.
You cannot configure the VLAN Management Instance with both IPv4 and IPv6 and configure the
NOS VLAN with IPv4 or IPv6 only.
• If you disable NOS routing for IPv4, then you must disable routing for IPv6, and vice versa.
You can configure the NOS VLAN first, and then configure the VLAN Management Instance, or in
reverse order. You can remove or add the coexistence at any time.
Note
With the coexistence between NOS routing stack and the VLAN Management Instance,
packets sent to the VLAN Management Instance IP address must ingress the switch from a
VLAN port (or contain the VLAN ID) associated with the VLAN Management Instance. The
system does not route packets between the NOS routing VLAN and the VLAN Management
Instance.
IPv4
vlan create 10 type port-mstprstp 0
vlan members add 10 1/1
interface vlan 10
ip address 192.0.2.0/24
exit
mgmt vlan 10
ip address 192.0.2.0/24
ip route 0.0.0.0/0 next-hop 192.0.2.1
enable
IPv6
vlan create 10 type port-mstprstp 0
vlan members add 10 1/1
interface vlan 10
ipv6 interface address 2001:DB8::/32
ipv6 interface enable
exit
mgmt vlan 10
ipv6 address 2001:DB8::/32
ipv6 route 0::0/0 next-hop 2001::1
enable
You can manually configure the coexistence as in the preceding example, or you can use the
propagate-to-routing command to propagate the management VLAN IP and static routes from
the management IP stack to the NOS routing IP stack on the same VLAN ID. If you do not include the
VRF name, the system uses the existing VRF of the NOS routing VLAN.
IPv4
mgmt vlan 10
enable
exit
mgmt dhcp-client vlan
mgmt vlan
propagate-to-routing vrf vrf24
You must configure the brouter interface before you enable the VLAN Management Instance. When the
VLAN Management Instance is enabled, you must disable the VLAN Management Instance before you
disable the brouter port.
IPv4
interface GigabitEthernet 1/1
no shutdown
brouter port 1/1 vlan 10 subnet 192.0.2.0/24
mgmt vlan 10
ip address 192.0.2.0/24
enable
IPv6
interface GigabitEthernet 1/1
no shutdown
ipv6 interface vlan 10
ipv6 interface address 2001:DB8::/32
ipv6 interface enable
mgmt vlan 10
ipv6 address 2001:DB8::/32
enable
Management Applications
The Segmented Management Instance provides support for management interfaces that transmit and
receive packets directly to and from the system native Linux IP stack. Unlike a traditional management
interface, for example, a CLIP in the GRT that is part of the networking IP stack, Segmented
Management Instance interfaces do not route packets through the networking IP stack.
The following management applications use the Segmented Management Instance directly to transmit
or receive packets with segmented management interfaces and addresses.
Note
The VSP 8600 Series only supports Ping, Traceroute, and NTPv4.
The following management applications do not use the Segmented Management Instance directly to
transmit or receive packets, but can integrate with segmented management interfaces and addresses.
Note
The following management applications do not use the Segmented Management Instance
and are deprecated in VOSS.
• NTPv3
• Remote Login (rlogin)
• Remote Shell (RSH)
Note
The restrictions listed do not apply to TCP applications or if a single Management Instance is
configured.
Asymmetrical routing can occur in any of the following scenarios. For the first two scenarios you can
use the OOB or VLAN Management Instance IP address instead of the CLIP Management Instance IP
address. Also, use FTP or SCP file transfer as an alternative because those protocols are TCP based.
In the third scenario, you can configure more specific static routes for networks originating UDP client
communication to the OOB or VLAN Management Instance IP address if the CLIP Management Instance
is also configured.
1. Client communication to the CLIP Management Instance IP address is from the same subnet as the
VLAN Management Instance.
2. Client communication to the CLIP Management Instance IP address when specific static routes or
default route with higher preference back to the client network exist on OOB Management Instance
or VLAN Management Instance.
3. Client communication to the OOB Management Instance IP address or VLAN Management Instance
IP address that relies on a default route with a lower preference than the internal default route used
by the CLIP Management Instance.
4. Client communication to the CLIP Management Instance IP address is from the same subnet as the
OOB Management Instance (even if the OOB port is down).
You can also manually configure the DHCP Client to request an IPv4 address from a DHCP server for
the In-band VLAN management interface, or the OOB management interface, or to cycle requests until
an IP address is obtained on a VLAN or OOB management interface. The DHCP Client supports IPv4
addresses only, and cannot be enabled on multiple management interfaces simultaneously.
Note
If a default route is configured on an OOB or VLAN management interface, and then you
configure DHCP so that it replaces the default route, the original default route is restored if
you disable DHCP.
However, if the DHCP default route is updated or deleted after it is created by DHCP, the
default route will not be replaced by the original route when DHCP is disabled.
Note
The DHCP Client is disabled by default on previously configured or upgraded switches.
The DHCP Client is enabled by default in cycle mode when:
• The switch ships directly from manufacturing with VOSS Release 8.1.60 or later.
• The primary and secondary configuration file is not on the switch.
• The primary and secondary configuration file fail to load on the switch.
The DHCP Client is not available if RMON2 is configured on a Management Instance, and RMON2 is not
available if the DHCP Client is configured on a Management Instance.
When DHCP is enabled on a Management Instance interface, the DHCP Client initial broadcast discovery
packet and initial response from the DHCP server are not counted or shown in KHI management
statistics for the management interface. Only the packets after the DHCP IP address assignment
completes are counted and shown. After an IP address is assigned, a UDP socket opens and packets are
counted on the interface.
If you change the DHCP Client configuration between management VLAN, OOB, or cycle, the default
route provided by the DHCP server might delete and add with a different nexthop or network. DHCP
Client configuration changes can cause interruptions to existing management connections.
DHCP static routes are not saved in the configuration file or displayed in show running-config.
You can view DHCP static routes with show mgmt ip route static. If the DHCP Client adds a
default route to an interface, the previous default route is deleted. If you modify a default route created
by the DHCP Client, the route type output of show mgmt ip route static changes from DHCP
to STATIC. You can save the modified to static default route to the configuration file, but on reboot the
DHCP Client deletes the modified default route and restores the default static route the DHCP server
specifies.
DHCP Option 43
DHCP option 43 requests specific vendor options from the DHCP server. Only sub-option 226
(EXTREME.cloudiq-ip) is supported to change the value of the ExtremeCloud IQ server IP address
on the switch.
With the support of DHCP option 43, DHCP can dynamically configure the IP address of a private/
non-public ExtremeCloud IQ server for zero touch deployments when the default ExtremeCloud IQ
server (hac.extremecloudiq.com) is not desired.
For information about configuring the switch to support ExtremeCloud IQ, see ExtremeCloud IQ Agent
on page 841.
/etc/dhcp/dhcpd.conf
default-lease-time 60;
max-lease-time 7200;
option space EXTREME;
option EXTREME.cloudiq-ip code 226 = ip-address;
class "Edge-without-POE" {
match if (option vendor-class-identifier = "EXTREME");
vendor-option-space EXTREME;
option EXTREME.cloudiq-ip 10.16.231.131;
}
default-lease-time 3600;
}
Value Description
e2 04 vendor ID prefix (e2 is the hexadecimal value of the code 226 used to identify
sub-option EXTREME.cloudiq-ip and 04 the hexadecimal value of the length
of an IP address in bytes)
0a 10 e7 83 IP address 10.16.231.131 converted to hexadecimal
You can change the following attributes for the Management Instance:
• Management Instance VLAN:
◦ VLAN ID
◦ IPv4 address
◦ default gateway
◦ I-SID (on a DvR Leaf)
◦ ports-tagged
◦ ports-untagged
• Management Instance CLIP
◦ IPv4 address
◦ vrf
• Management Instance Out-of-Band (OOB)
◦ IPv4 address
◦ default gateway
Operational Considerations
The following are operational considerations when you change Management Instance attributes using
the convert command:
• IPv6 is not supported and is removed during conversion, if an IPv6 address exists.
• You cannot change parameters for more than one Management Instance operation at a time. You
must issue the mgmt convert-commit command before you use the convert command for
either the same or a different Management Instance.
• If you attempt to change attributes for an existing Management Instance VLAN, you cannot
configure ports-tagged, ports-untagged, and I-SID parameters. Make configuration changes to the
existing Management InstanceVLAN first before you use the convert command. If you change
your switch to a DvR leaf node, you can change the I-SID parameter.
• If you attempt to change attributes for a Management Instance VLAN and the VLAN does not exist,
a VLAN is automatically created in the background. You can specify ports-tagged, ports-untagged,
and I-SID parameters to be associated with this new VLAN. The new VLAN is assigned to the default
Spanning Tree Group, which is 0.
• If you attempt to change attributes for a Management Instance VLAN and the VLAN does not exist,
and you do not specify ports-tagged, ports-untagged, or I-SID parameters, then this is a special
case. If any untagged ports in the old VLAN have dynamic Address Resolution Protocol (ARP)
entries then these ports automatically move from the old VLAN to the new VLAN. For example,
VLAN 200 has port members 1/1, 1/2, and 1/3. ARP entries are configured on ports 1/1 and 1/2. VLAN
300 is created in the background and only ports 1/1 and 1/2 automatically move to this new VLAN.
If an MLT ID is associated with the old VLAN, the association is removed and re-added to the new
Management Instance VLAN ID.
• If you attempt to change the vrf attribute for a Management Instance CLIP but the vrf does not exist,
a vrf is automatically created in the background. In order for this vrf to function properly, you must
configure either SPBM Layer 3 VSN or IP interfaces and routing protocols.
The best practice is to configure and test vrf connectivity before you use the convert command.
• The following applies when you change static routes attributes on a Management Instance VLAN or
Management Instance OOB interface:
◦ If you provide the static route next-hop gateway, all next-hop gateway direct to the new gateway.
◦ If you do not provide the static route next-hop gateway and the new subnet is the same as the
old subnet, all routes are re-added as is.
◦ If you do not provide a gateway and the new subnet is different, routes are discarded.
• Dynamic routes added by DHCP convert to static routes.
Important
Choose a VLAN that does not have an IP interface on it. The upgrade process removes the IP
configuration and network connectivity will be impacted.
Note
Do not migrate interfaces used for routing purposes, for example, where you configure Layer
3 routing protocols.
This command does not apply to the OOB or mgmtEthernet interface. Releases that support this
migration procedure automatically move the IP address on the mgmtEthernet interface from the
routing stack to the Segmented Management Instance during the upgrade to this release.
Procedure
configure terminal
Example
Identify an IP address currently assigned to an inband VLAN to migrate to the Management VLAN. The
example assumes you already identified a CLIP address. The VRF column in show mgmt migration
indicates where the interface is being moved from.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#interface vlan 20
Switch:1(config-if)#migrate-to-mgmt
Switch:1(config-if)#show mgmt migration
=============================================================================
Mgmt Migration Information
=============================================================================
IFINDEX DESCR VRF IPV4 IPV6
-----------------------------------------------------------------------------
1344 CLIP-1 GlobalRouter 192.0.2.102/32 10:0:0:0:0:0:0:1/128
2068 VLAN-20 GlobalRouter 198.51.100.6/24 20:0:0:0:0:0:0:1/64
Switch:1(config-if)#save config
Note
XA1400 Series does not support the OOB Management Instance.
Note
Product Notice: quick-config-mgmt is not supported on VSP 8600 Series.
The quick-config-mgmt utility recognizes existing configuration. For the OOB Management Instance,
you can overwrite the existing configuration only. However, for the VLAN Management Instance, you
can overwrite the existing configuration, or you can migrate the existing configuration to a coexistence
of IP on both the routing VLAN and the management VLAN.
You can use this procedure to help you transition to a new Segmented Management Instance. You can
configure IPv4, static routes, and DHCP support for the Out-of-Band (OOB) Management Instance or
for the In-Band VLAN Management Instance. If configuration exists for the interface type you selected,
you are prompted to replace the configured interface or to quit the utility.
Important
If you configure DHCP, any other running DHCP instance is stopped and a new DHCP instance
is created on the interface. This might cause loss of connectivity.
The default values are given in square brackets. You can input your values at the prompt or you can
press Enter to accept the default values.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enter the following command to start the utility:
quick-config-mgmt
Important
If DHCP mode cycle is enabled, the following warning message displays to inform you that
DHCP client will be disabled, if you continue.
Continuing will disable dhcp and may affect your connectivity
to the DUT. Do you want to continue? y/n [n]:
Examples
The following examples show outputs from the quick-config-mgmt utility.
Once the basic parameters are configured, additional configuration can proceed using
other management interfaces.
Press q to abort at any time.
Management interface types:
1 - Out of band management port
3 - In-band port-based VLAN
Please enter management interface type or "q" to quit. [1]:
Please enter the Management Address IPv4 address, "d" for DHCP configuration or "q" to
quit [192.0.2.2]:
Please enter the Management Address Mask IPv4 address or "q" to quit [255.255.255.0]:
Please enter the Default Gateway Address IPv4 address, 0.0.0.0 for no default gateway,
or "q" to quit [192.0.2.5] :
Management interface created successfully
Once the basic parameters are configured, additional configuration can proceed using
other management interfaces.
Press q to abort at any time.
Management interface types:
1 - Out of band management port
3 - In-band port-based VLAN
Please enter management interface type or "q" to quit. [1]:
MGMT OOB is already configured.
Continuing may remove parts or all of current config.
Do you want to continue? y/n [y]:
Please enter management interface type or "q" to quit. [1]:
Please enter the Management Address IPv4 address, "d" for DHCP configuration or "q" to
quit [192.0.2.2]:
Please enter the Management Address Mask IPv4 address or "q" to quit [255.255.255.0]:
Please enter the Default Gateway Address IPv4 address, 0.0.0.0 for no default gateway,
or "q" to quit [192.0.2.5] :
Management interface created successfully
Configure the In-band port-based VLAN Management Instance by removing parts of or all of the
existing VLAN configuration:
Switch:1(config)#quick-config-mgmt
Welcome to the management interface setup utility.
You will be requested for information to initially configure the switch.
When finished the information will be applied and stored as a part of the
configuration.
Once the basic parameters are configured, additional configuration can proceed using
other management interfaces.
Press q to abort at any time.
Configure the In-band port-based VLAN Management Instance by reusing the existing VLAN
configuration:
Switch:1(config)#quick-config-mgmt
Welcome to the management interface setup utility.
You will be requested for information to initially configure the switch.
When finished the information will be applied and stored as a part of the
configuration.
Once the basic parameters are configured, additional configuration can proceed using
other management interfaces.
Press q to abort at any time.
Management interface types:
1 - Out of band management port
3 - In-band port-based VLAN
Please enter management interface type or "q" to quit. [1]: 3
MGMT VLAN is already configured.
Continuing may remove parts or all of current config.
Do you want to continue? y/n [n]: y
Please enter VLAN ID (2-4059) or "q" to quit [4059]: 2
VLAN 2 is already in use.
Do you want to re-use existing vlan configuration? y/n/q: [y]
Please enter port to be appended to the in-band management VLAN or leave empty
to keep currently configured ports or "q" to quit []: 1/1
Please enter the Management Address IPv4 address, "d" for DHCP configuration or "q" to
quit [192.0.2.2]:
Please enter the Management Address Mask IPv4 address or "q" to quit [255.255.255.0]:
Please enter the Default Gateway Address IPv4 address, 0.0.0.0 for no default gateway,
or "q" to quit [192.0.2.5] :
Management interface created successfully
Configure the In-band port-based VLAN Management Instance by reusing the existing VLAN
configuration when IP address is configured and coexistance of mgmt and routing on same VLAN
is desired:
Switch:1(config)#quick-config-mgmt
Welcome to the management interface setup utility.
You will be requested for information to initially configure the switch.
When finished the information will be applied and stored as a part of the
configuration.
Once the basic parameters are configured, additional configuration can proceed using
other management interfaces.
Press q to abort at any time.
Management interface types:
1 - Out of band management port
Configure the In-band port-based VLAN Management Instance by reusing the existing VLAN
configuration when IP address is configured but coexistance of mgmt and routing on same VLAN is
not desired:
Switch:1(config)#quick-config-mgmt
Welcome to the management interface setup utility.
You will be requested for information to initially configure the switch.
When finished the information will be applied and stored as a part of the
configuration.
Once the basic parameters are configured, additional configuration can proceed using
other management interfaces.
Press q to abort at any time.
Management interface types:
1 - Out of band management port
3 - In-band port-based VLAN
Please enter management interface type or "q" to quit. [1]: 3
MGMT VLAN is already configured.
Continuing may remove parts or all of current config.
Do you want to continue? y/n [n]: y
Please enter VLAN ID (2-4059) or "q" to quit [4059]: 2
VLAN 2 is already in use.
Do you want to re-use existing vlan configuration? y/n/q: [y]
Please enter port to be appended to the in-band management VLAN or leave empty
to keep currently configured ports or "q" to quit []: 1/1
IP address is already configured on VLAN 2.
Do you want to configure coexistence of mgmt and routing on the same vlan? y/n/q: [n]
Management interface created successfully
The Management Instance supports different management interface types. When you create the
Management Instance, you specify the interface type and the switch automatically creates the
appropriate instance ID for that type.
A management VLAN is used for Layer 2 deployments. In a Layer 3 routing or Fabric deployment, use a
management CLIP. For Out-of-band Management, use a management OOB.
Each Management Instance supports a IPv4 and IPv6 (global scope) management address for use by
management applications.
Procedure
configure terminal
2. Create the Management Instance required for your deployment:
a. To create a management CLIP:
mgmt clip [vrf WORD<1–16>]
Note
If you do not specify a VRF, the management CLIP uses the GRT. You cannot use
mgmtrouter as the VRF.
OR
b. To create a management OOB:
mgmt oob
OR
c. To create a management VLAN and associate it with an existing port-based VLAN:
mgmt vlan <2-4059>
3. Enable the Management Instance:
enable
Example
Switch:1(config)#mgmt vlan 20
Switch:1(mgmt:vlan)#enable
Procedure
configure terminal
2. Delete the Management Instance:
no mgmt {clip | oob | vlan}
Use this task to configure the DHCP Client to obtain an IPv4 address for the Management Instance
VLAN interface or Out-of-Band interface.
Procedure
configure terminal
2. Enable and configure the DHCP Client for a management interface:
mgmt dhcp-client {cycle | oob | vlan}
Example
The following example configures the DHCP Client to cycle IPv4 requests for the management OOB
interface, and then the In-Band management VLAN interface; priority is given to the OOB interface. The
system cycles attempts until one management interface receives an IP address from the DHCP server:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#mgmt dhcp-client cycle
Variable Definitions
The following table defines parameters for the mgmt dhcp-client command.
Variable Value
cycle DHCP Client cycles IP requests for in-band VLAN and Out-
of-Band management interfaces.
oob DHCP Client requests an IP address for the Out-of-Band
management interface.
vlan DHCP Client requests an IP address for the VLAN
management interface.
Procedure
configure terminal
2. Enter the configuration mode for the Management Instance:
mgmt {clip | oob | vlan}
3. Add an IPv4 address:
ip address {A.B.C.D [A.B.C.D] | A.B.C.D/X}
4. Add an IPv6 address:
ipv6 address WORD<0–255>
Example
Use this task to configure a Management Instance with a default topology IP.
Note
You can only configure one Management Instance interface as the default topology IP.
Procedure
configure terminal
2. Enter the configuration mode for the Management Instance:
mgmt {clip | oob | vlan}
3. Configure the Management Instance as the default topology IP.
force-topology-ip
Example
The following example configures the Segmented Management Instance VLAN as the default topology
IP:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#mgmt vlan
Switch:1(mgmt:vlan)#force-topology-ip
For the Management Instance CLIP, you do not need to configure a default or static route. This interface
type uses all routing information learned by protocols attached to the VRF. For more information about
how to associate a VRF with the CLIP interface, see Create a Segmented Management Instance on page
92.
For the Management Instance OOB and VLAN, you must configure a default or static route to reach the
next-hop gateway; no routing protocol information is used to access off-link networks.
Procedure
configure terminal
2. Enter the configuration mode for the Management Instance:
mgmt {clip | oob | vlan}
3. Configure a static route:
ip route <A.B.C.D A.B.C.D | A.B.C.D/X> next-hop <A.B.C.D> [weight <1–
65535>]
OR
Example
Variable definitions
The following table defines parameters for the ip route and ipv6 route commands.
Variable Value
<A.B.C.D A.B.C.D | Specifies the IP address and mask in one of the following formats:
A.B.C.D/X> • A.B.C.D A.B.C.D
• A.B.C.D/X
next-hop <A.B.C.D> Specifies the next hop address for the static route.
or next-hop Use an IP in the same subnet as the management VLAN IP address.
WORD<0-255>
Variable Value
weight <1–65535> Specifies the static route cost. The default is 100 for CLIP, 200 for VLAN,
and 300 for OOB.
The management CLIP uses an internal static route with a weight of 100.
If you use both CLIP and VLAN and need to force all default traffic out
the management VLAN interface, configure a default static route with a
weight lower than 100.
WORD<0-255> Specifies the IPv6 address.
Use this task to enable fragmented ICMP packet filtering on a Segmented Management Instance.
Procedure
configure terminal
2. Enter the configuration mode for the Management Instance:
mgmt {clip | oob | vlan}
3. Enable fragmented ICMP packet filtering:
• For IPv4:
ip icmp drop-fragments
• For IPv6:
Note
The ipv6 icmp drop-fragments command does not apply to XA1400 Series.
Use this task to view Fragmented ICMP packet filtering details on a Management Instance.
Procedure
Note
This command does not apply to XA1400 Series.
Variable Definitions
The following table defines parameters for the show mgmt ip icmp command.
Variable Value
clip Displays the IPv4 or IPv6 ICMP information specific to the
management CLIP.
oob Displays the IPv4 or IPv6 ICMP information specific to the
management OOB.
vlan Displays the IPv4 or IPv6 ICMP information specific to the
management VLAN.
Procedure
configure terminal
2. Enter the MAC-offset for a Management VLAN instance:
mgmt vlan mac-offset <MAC-offset>
Note
Different hardware platforms support different ranges.
Example
Switch:1(config)#mgmt vlan
Switch:1(mgmt:vlan)#mac-offset <0-511>
Variable Definitions
The following table defines parameters for the mgmt vlan interface.
Variable Value
mac-offset Specifies a number by which to offset the MAC address from the chassis MAC
<MAC-offset> address. This ensures that each IP address has a different MAC address. If you omit
this variable, a unique MAC offset is automatically generated. Different hardware
platforms support different ranges. To see which range is available on the switch,
use the CLI command completion Help.
For XA1400 Series branch deployments, the VOSS routing IP stack requires the VLAN Management
Instance to work in coexistence mode where both the management IP stack and the routing IP stack
share the same IP address and default routes. This is required for an IPsec source address.
You can manually configure the coexistence or you can use the propagate-to-routing command
to propagate the management VLAN IP and static routes from the management IP stack to the VOSS
routing IP stack on the same VLAN ID. If you do not include the VRF name, the system uses the existing
VRF of the VOSS routing VLAN.
Procedure
configure terminal
2. Enter the configuration mode for the Management Instance VLAN:
mgmt vlan
3. Configure the coexistence:
propagate-to-routing [vrf WORD<0-16>]
Use this task to change the IP address, VLAN, VRF, or default gateway for a Management Instance while
you actively manage the switch over the same instance.
Important
Change the parameters in the following order:
1. VLAN or VRF
2. ports-tagged, ports-untagged-, or I-SID
3. IP address or default gateway
You cannot change parameters for more than one Management Instance operation at a time.
Procedure
configure terminal
2. Enter the configuration mode for the Management Instance:
mgmt {clip | oob | vlan}
3. Use one of the following Management Instances interfaces to configure the new values:
a. Configure new Management Instance VLAN parameters:
convert [vlan <1-4059>] [i-sid <1-16777215>] [ports-tagged {slot/
port[/sub-port][-slot/port[/sub-port]][,...]}] [ports-untagged{slot/
port[/sub-port][-slot/port[/sub-port]][,...]}] [ip {<A.B.C.D/X>|
<A.B.C.D> <A.B.C.D>}] [gateway <A.B.C.D>] [rollback <0-3600>]
Important
After you configure the new values, the existing Management Instance VLAN is deleted
and connectivity to the switch can be lost. You must reconnect to the switch before
you can issue the mgmt convert-commit command.
Note
If the VRF does not exist before you issue the convert command, the VRF is
automatically created in the background. For this VRF to function properly, you must
configure either SPBM Layer 3 VSN or IP interfaces and routing protocols.
Note
Commit the change within 120 seconds (default) of issuing the mgmt convert-commit
command. Otherwise, the configuration changes automatically roll back to the previous
configuration.
Examples
The following examples show the change options attributes for a Management Instance VLAN:
.
<reconnect to switch…>
Login: rwa
Password: ***
Mgmt convert: Please issue 'mgmt convert commit' before 120 seconds rollback timer
expires otherwise mgmt vlan
config change will be reverted
Convert a management VLAN to new IP address in the same subnet and in the same VLAN:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#mgmt vlan
Switch:1(mgmt:vlan)#convert ip 10.10.10.30/24
Convert a management VLAN to new VLAN ID with a new IP address and default Gateway:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#mgmt vlan
Switch:1(mgmt:vlan)#convert vlan 300 ip 11.11.11.30/24 gateway 11.11.11.1
Convert a management VLAN with a faster rollback option (default is 120 seconds):
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#mgmt vlan
Switch:1(mgmt:vlan)#convert vlan 300 rollback 60
The following examples show the change options attributes for Management Instance CLIP.
Convert a management CLIP from one VRF to another VRF. The IP address is the same:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#mgmt clip
Switch:1(mgmt:clip)#convert vrf blue
WARNING: the specified vrf does not exist - connectivity to the mgmt clip will be lost
until l3vsn or
ip interfaces for the given vrf are provisioned.
Continue with this operation (y/n) ? n
Note
If the VRF does not exist before you issue the convert command, the VRF is automatically
created in the background. In order for this VRF to function properly, you must configure
either SPBM Layer 3 VSN or IP interfaces and routing protocols.
The following examples show the change options attributes for Management Instance Out-Of-Band
(OOB):
Variable Definitions
The following table defines parameters for the convert command.
Variable Value
<A.B.C.D A.B.C.D | A.B.C.D/X> Specifies the IP address and subnet mask.
This parameter applies to the following
Management Instance interface types:
• CLIP
• OOB
• VLAN
Procedure
1. To enter User EXEC mode, log on to the switch.
2. View general configuration information:
show mgmt interface [clip | oob | vlan]
3. View operational routes for the Management Instance:
show mgmt ip route [clip | oob | vlan]
OR
Note
Routes with a type of LOCAL have a metric equal to 1.
OR
Note
Routes with a type of LOCAL have a metric equal to 256.
5. View the ARP or Neighbor Discovery cache information for the Management Instance:
show mgmt ip arp [clip | oob | vlan]
OR
Example
Switch:1>show mgmt interface vlan
=======================================================================================
Mgmt Interface Information
=======================================================================================
INST DESCR TYPE ADMIN VLAN PORT VRF PHYSICAL
---------------------------------------------------------------------------------------
4 Mgmt-vlan VLAN enable 2 - 192.0.2.188
Procedure
1. To enter User EXEC mode, log on to the switch.
2. View Segmented Management Instance IP address information:
show mgmt ip [<clip | oob | vlan>]
OR
Example
Switch:1>#show mgmt ip vlan
==========================================================================================
Mgmt IP Information
==========================================================================================
INST DESCR IPV4 IPV6 GLOBAL/PREFIX LENGTH IPV6 LINKLOCAL
------------------------------------------------------------------------------------------
4 Mgmt-vlan 192.0.2.12/24 0:0:0:0:0:0:0:0/0 0:0:0:0:0:0:0:0
==========================================================================================
Mgmt Topology IP Information
==========================================================================================
IPv4:
Address: 192.0.2.10
Instance: 1
Description: oob1
IPv6:
No address to display
Procedure
Note
This step does not apply to VSP 8600 Series.
OR
Note
This step does not apply to VSP 8600 Series.
OR
Note
This step does not apply to VSP 8600 Series.
OR
Note
This step does not apply to VSP 8600 Series.
OR
Note
This step does not apply to VSP 8600 Series.
OR
Note
This step does not apply to VSP 8600 Series.
OR
Examples
Switch:1>show mgmt statistics
==================================================================================================================================
Mgmt Interface Stats Information
==================================================================================================================================
INST DESCR RX-PKTS RX-ERROR RX-DROP TX-PKTS TX-ERROR TX-DROP
----------------------------------------------------------------------------------------------------------------------------------
1 Mgmt-oob1 111667 0 0 21412 0 0
================================================================================
Mgmt ICMP Statistics Information
================================================================================
InMsgs : 44
InErrors : 0
InCsumErrors : 0
InDestUnreachs : 44
InTimeExcds : 0
InParmProbs : 0
InSrcQuenchs : 0
InRedirects : 0
InEchos : 0
InEchoReps : 0
InTimestamps : 0
InTimestampReps : 0
InAddrMask : 0
InAddrMaskReps : 0
OutMsgs : 53
OutErrors : 0
Switch:1>show mgmt ipv6 icmp-statistics
================================================================================
Mgmt ICMPv6 Statistics Information
================================================================================
InMsgs : 58
InErrors : 0
InCsumErrors : 0
InDestUnreachs : 0
InTimeExcds : 0
InParmProbs : 0
InPktTooBigs : 0
InRedirects : 0
InEchos : 0
InEchoReps : 0
InGroupMembQueries : 0
InGroupMembReductions : 0
InRouterSolicits : 0
InRouterAdvertisements : 55
InNeighborSolicits : 0
InNeighborAdvertisements : 3
InMLDv2Reports : 0
InType134 : 55
InType136 : 3
OutMsgs : 69
OutErrors : 0
OutDestUnreachs : 0
OutTimeExcds : 0
OutParmProbs : 0
OutPktTooBigs : 0
OutRedirects : 0
OutEchos : 0
OutEchoReps : 0
OutGroupMembQueries : 0
OutGroupMembResponses : 0
OutGroupMembReductions : 0
OutRouterSolicits : 0
OutRouterAdvertisements : 0
OutNeighborSolicits : 13
OutNeighborAdvertisements : 0
OutMLDv2Reports : 56
OutType133 : 56
OutType135 : 13
OutType143 : 0
--------------------------------------------------------------------------------
Switch:1>show mgmt ip ip-statistics
================================================================================
Mgmt IP Statistics Information
================================================================================
InReceives : 1231729
InHdrErrors : 0
InAddrErrors : 489
InUnknownProtos : 0
InDiscards : 0
InDelivers : 1221886
OutRequests : 1212585
OutDiscards : 20
OutNoRoutes : 0
ForwDatagrams : 0
ReasmTimeout : 0
ReasmReqds : 0
ReasmOKs : 0
ReasmFails : 0
FragOKs : 0
FragFails : 0
FragCreates : 0
--------------------------------------------------------------------------------
Switch:1>show mgmt ipv6 ip-statistics
================================================================================
Mgmt IPv6 Statistics Information
================================================================================
InReceives : 226
InHdrErrors : 0
InAddrErrors : 0
InUnknownProtos : 0
InDiscards : 0
InDelivers : 62
InTooBigErrors : 0
InNoRoutes : 0
InTruncatedPkts : 0
InMcastPkts : 224
InOctets : 20556
InMcastOctets : 20416
InBcastOctets : 0
InNoECTPkts : 226
InECT1Pkts : 0
InECT0Pkts : 0
InCEPkts : 0
OutRequests : 71
OutDiscards : 0
OutNoRoutes : 0
OutForwDatagrams : 0
OutMcastPkts : 69
OutOctets : 5412
OutMcastOctets : 5272
OutBcastOctets : 0
ReasmTimeout : 0
ReasmReqds : 0
ReasmOKs : 0
ReasmFails : 0
FragOKs : 0
FragFails : 0
FragCreates : 0
--------------------------------------------------------------------------------
Switch:1>show mgmt ip tcp-connections
==================================================================================================================================
Mgmt IP TCP connections
==================================================================================================================================
STATE RECV-Q SEND-Q Local Address:Port Peer Address:Port
----------------------------------------------------------------------------------------------------------------------------------
LISTEN 0 5 0.0.0.0:ftp 0.0.0.0:*
LISTEN 0 5 0.0.0.0:telnet 0.0.0.0:*
LISTEN 0 40 0.0.0.0:https 0.0.0.0:*
LISTEN 0 1 0.0.0.0:login 0.0.0.0:*
ESTAB 0 0 192.0.2.10:https 198.51.100.1:50694
ESTAB 0 3 192.0.2.10:telnet 198.51.100.1:58862
ESTAB 0 0 192.0.2.10:https 198.51.100.1:59774
----------------------------------------------------------------------------------------------------------------------------------
Switch:1>show mgmt ipv6 tcp-connections
==================================================================================================================================
Mgmt IPv6 TCP connections
==================================================================================================================================
STATE RECV-Q SEND-Q Local Address:Port Peer Address:Port
----------------------------------------------------------------------------------------------------------------------------------
LISTEN 0 5 *:ftp *:*
LISTEN 0 5 *:telnet *:*
LISTEN 0 40 *:https *:*
LISTEN 0 1 *:login *:*
----------------------------------------------------------------------------------------------------------------------------------
================================================================================
Mgmt Combined IPv4/v6 TCP Statistics Information
================================================================================
TcpActiveOpens : 9571
TcpPassiveOpens : 9658
TcpAttemptFails : 17
TcpEstabResets : 86
TcpInSegs : 1207867
TcpOutSegs : 1199088
TcpRetransSegs : 42
TcpInErrs : 0
TcpOutRsts : 89
TcpInCsumErrors : 0
--------------------------------------------------------------------------------
Switch:1>show mgmt ipv6 tcp-statistics
================================================================================
Mgmt Combined IPv4/v6 TCP Statistics Information
================================================================================
TcpActiveOpens : 9626
TcpPassiveOpens : 9713
TcpAttemptFails : 17
TcpEstabResets : 86
TcpInSegs : 1212159
TcpOutSegs : 1203293
TcpRetransSegs : 42
TcpInErrs : 0
TcpOutRsts : 89
--------------------------------------------------------------------------------
Switch:1>show mgmt ip udp-endpoints
==================================================================================================================================
Mgmt IP UDP endpoints
==================================================================================================================================
STATE RECV-Q SEND-Q Local Address:Port Peer Address:Port
----------------------------------------------------------------------------------------------------------------------------------
==================================================================================================================================
Mgmt IPv6 UDP endpoints
==================================================================================================================================
STATE RECV-Q SEND-Q Local Address:Port Peer Address:Port
----------------------------------------------------------------------------------------------------------------------------------
UNCONN 0 0 [0:0:0:0:0:0:0:1]:domain *:*
UNCONN 0 0 *:tftp *:*
UNCONN 0 0 [fe80:0:0:0:f66e:95ff:fe9f:81]:ntp *:*
UNCONN 0 0 [fe80:0:0:0:f66e:95ff:fe9f:a5]:ntp *:*
UNCONN 0 0 [fe80:0:0:0:a8bb:ccff:fedd:ee01]:ntp *:*
UNCONN 0 0 [fe80:0:0:0:fce7:79ff:fe04:999c]:ntp *:*
UNCONN 0 0 [fe80:0:0:0:609a:4aff:fe4e:cf04]:ntp *:*
UNCONN 0 0 [fe80:0:0:0:c482:2aff:fe75:2e66]:ntp *:*
UNCONN 0 0 [fe80:0:0:0:c80a:73ff:fe00:364e]:ntp *:*
UNCONN 0 0 [fe80:0:0:0:80cc:e9ff:fec7:b9e2]:ntp *:*
UNCONN 0 0 [fe80:0:0:0:64da:41ff:fec5:489e]:ntp *:*
UNCONN 0 0 [fe80:0:0:0:f8d7:d6ff:feda:62bc]:ntp *:*
UNCONN 0 0 [fe80:0:0:0:f66e:95ff:fe9f:0]:ntp *:*
UNCONN 0 0 [0:0:0:0:0:0:0:1]:ntp *:*
UNCONN 0 0 *:ntp *:*
UNCONN 0 0 *:snmp *:*
----------------------------------------------------------------------------------------------------------------------------------
================================================================================
Mgmt UDP Statistics Information
================================================================================
UdpInDatagrams : 63622
UdpNoPorts : 44
UdpInErrors : 0
UdpOutDatagrams : 63666
UdpIgnoredMulti : 0
UdpRcvbufErrors : 0
UdpSndbufErrors : 0
UdpInCsumErrors : 0
--------------------------------------------------------------------------------
Switch:1>show mgmt ipv6 udp-statistics
================================================================================
Mgmt UDP6 Statistics Information
================================================================================
Udp6InDatagrams : 0
Udp6NoPorts : 0
Udp6InErrors : 0
Udp6OutDatagrams : 0
Udp6IgnoredMulti : 0
Udp6RcvbufErrors : 0
Udp6SndbufErrors : 0
Udp6InCsumErrors : 0
--------------------------------------------------------------------------------
Accept Policy for IPv4 CLIP Management Instance in GRT to VRF Red (I-SID 200)
#grt-->vrf
router vrf red
isis accept i-sid 0
isis accept i-sid 0 enable
isis redistribute direct
isis redistribute direct enable
exit
isis apply accept vrf red
isis apply redistribute direct vrf red
#vrf-->grt
router isis
accept i-sid 200
accept i-sid 200 enable
exit
isis apply accept
Accept Policy for IPv6 CLIP Management Instance in GRT to VRF Red (I-SID 200)
#grt-->vrf
router vrf red
ipv6 isis accept i-sid 0
ipv6 isis accept i-sid 0 enable
ipv6 isis redistribute direct
ipv6 isis redistribute direct enable
exit
ipv6 isis apply accept vrf red
ipv6 isis apply redistribute direct vrf red
#vrf-->grt
router isis
ipv6 accept i-sid 200
ipv6 accept i-sid 200 enable
exit
ipv6 isis apply accept
Accept Policy for IPv4 CLIP Management Instance in VRF Blue (I-SID 300) to GRT
#vrf --> grt
router isis
accept i-sid 300
accept i-sid 300 enable
redistribute direct
redistribute direct enable
exit
isis apply accept
isis apply redistribute direct
Accept Policy for IPv6 CLIP Management Instance in VRF Blue (I-SID 300) to GRT
#vrf --> grt
router isis
ipv6 accept i-sid 300
ipv6 accept i-sid 300 enable
This section provides procedures to configure segmented management instance using the EDM.
In releases prior to VOSS release 8.1.60, perform this procedure to identify a pre-existing VLAN or
loopback management interface to migrate to the Segmented Management Instance after you upgrade.
This action moves the IP interface from the routing stack to the management stack to use with
management applications. In releases later than VOSS 8.1.60, you can perform this procedure to migrate
a new routing VLAN with a new IP address or a new loopback IP address under a different VRF to the
Segmented Management Instance. Alternatively, you can also use the convert command.
Important
Choose a VLAN that does not have an IP interface on it. The upgrade process removes the IP
configuration and network connectivity will be impacted.
You cannot migrate interfaces used for routing purposes, for example, where you configure Layer 3
routing protocols.
This command does not apply to the OOB or mgmtEthernet interface. Releases that support this
migration procedure automatically move the IP address on the mgmtEthernet interface from the
routing stack to the Segmented Management Instance.
Procedure
5. Select Insert.
6. Select the instance type, either clip or vlan.
7. Specify the existing VLAN or loopback ID.
8. Select Insert.
Name Description
InstanceId Specifies the interface instance to migrate.
InterfaceIndex Shows the interface index of the identified
interface.
InterfaceType Shows the interface type.
Description Shows the interface description.
VlanId Specifies the VLAN ID for a port-based VLAN.
LoopbackId Specifies the loopback ID.
VrfName Shows the VRF associated with the loopback
interface.
IpAddress Shows the IPv4 address to migrate.
IpMask Shows the subnet mask for the IPv4 address.
Ipv6Address Shows the IPv6 address to migrate.
Ipv6PrefixLength Shows the prefix length for the IPv6 address.
You must create a Management Instance to gain access to specific management applications.
The Management Instance supports different management interface types. When you create the
Management Instance, you specify the interface type and the switch automatically creates the
appropriate instance ID for that type.
In a Layer 2 routing deployment, use a management VLAN. In a Layer 3 routing or Fabric deployment,
use a management CLIP. To separate management network from Layer 2 and Layer 3, use a
management OOB.
Each Management Instance supports a IPv4 and IPv6 (global scope) management address for use by
management applications.
Procedure
Note
If you want to associate the GRT with the CLIP instance, type GlobalRouter in the
VrfName field. You cannot use mgmtrouter as the VRF.
8. For a VLAN Management Instance, in the VlanId field, type the VLAN ID to associate the
management VLAN with an existing port-based VLAN.
9. For an OOB Management Instance, in the OOBIfindex field, select the interface port number to
associate for Out-of-Band management.
10. Select the State check box to enable the instance.
11. To specify the interface as the default topology IP for LLDP advertisements, select
InterfaceTopologyIpFlag.
12. To administratively enable RMON for the interface, select RmonAdminEnable.
13. For a DvR Leaf node, in the Isid field, type the I-SID value to associate with the Management
Instance VLAN.
14. Select Insert.
Name Description
InstanceId Indicates the Management Instance type associated with
this entry.
InterfaceType Indicates the interface type.
VlanId Specifies the VLAN ID to associate with the management
VLAN.
OOBIfindex Specifies the interface ID to associate with the management
OOB.
VrfName Specifies the VRF name to associate with the management
CLIP .
State Indicates if the interface is enabled for this instance. The
default is disabled.
InterfaceMacAddr Indicates the MAC address for the interface.
InterfaceName Indicates the interface name.
InterfaceTopologyIpFlag Specifies if the interface is the default topology source IP.
Name Description
ZtpOn Identifies the Zero Touch Provisioning status for the
interface.
RmonAdminEnable Specifies if RMON is administrative enabled for the interface.
RmonOperEnable Indicates the RMON operational status for the interface.
RmonIpAddress Indicates the RMON IP address for the interface.
MacOffset Translates the IP address into a MAC address.
DropIcmpFragEnable Enables IPv4 Fragmented ICMP packet filtering on the
Management Instance. The default is disabled.
Note: Exception: Not supported on VSP
8600 Series and XA1400 Series.
Procedure
1. In the navigation pane, expand Configuration > Edit > Mgmt Instance.
2. Select Mgmt.
3. Select the Dhcp tab.
4. In the Client field, select an option to configure the DHCP Client.
5. Select Apply.
Name Description
Client Specifies the DHCP client configuration:
• oob - DHCP Client on the Out-of-Band
management interface.
• vlan - DHCP Client on the VLAN management
interface.
• cycle - DHCP Client cycles between in-band
and Out-of-Band management interfaces until
an IP address is obtained on one management
interface.
• disable - DHCP Client is disabled.
Use this task to view IPv4 Address Resolution Protocol (ARP) information.
Procedure
Name Description
Address Shows the IPv4 address of the ARP entry.
Instance Shows the Management Instance ID.
IntfName Shows the Management Instance interface name
for the ARP entry.
MacAddr Shows the MAC address for the ARP entry.
State Shows the state of the ARP entry. The state can be
one of the following:
• reachable
• stale
• permanent
• failed
• delay
Procedure
Name Description
Addr Shows the IPv6 address of the neighbor entry.
Instance Shows the Management Instance ID.
IntfName Shows the Management Instance interface name
for the neighbor entry.
MacAddr Shows the MAC address for the neighbor entry.
State Shows the state of the neighbor entry. The state
can be one of the following:
• reachable
• stale
• permanent
• failed
• delay
Use this task to configure IPv4 static routes for Management Instances.
For the Management Instance CLIP, you do not need to configure a default or static route. This interface
type uses all routing information learned by protocols attached to the VRF. For more information about
how to associate a VRF with the CLIP interface, see Configure a Segmented Management Instance on
page 117.
For the Management Instance OOB and VLAN, you must configure a default or static route to reach the
next-hop gateway; no routing protocol information is used to access off-link networks.
Procedure
Name Description
Instance Specifies the Management Instance.
DestAddr Specifies the destination IP address.
DestMask Specifies the destination mask.
NextHop Specifies the next hop address for the static route.
Use an IP address in the same subnet as the
management VLAN IP address.
IntfName Specifies the Management Instance interface
name for the route entry.
Metric Specifies the static route cost. The default is 200.
The management CLIP uses an internal static
route with a weight of 100. If you use both CLIP
and VLAN and need to force all default traffic
out the management VLAN interface, configure a
default static route with a weight lower than 100.
State Shows if the route is active or inactive.
Use this task to configure IPv6 static routes for Management Instances.
For the Management Instance CLIP, you do not need to configure a default or static route. This interface
type uses all routing information learned by protocols attached to the VRF. For more information about
how to associate a VRF with the CLIP interface, see Configure a Segmented Management Instance on
page 117.
For the Management Instance OOB and VLAN, you must configure a default or static route to reach the
next-hop gateway; no routing protocol information is used to access off-link networks.
Procedure
Name Description
Instance Specifies the Management Instance.
DestAddr Specifies the destination IP address.
DestPrefixLen Specifies the destination prefix length.
NextHop Specifies the next hop address for the static route.
Use an IP address in the same subnet as the
management VLAN IP address.
IntfName Specifies the Management Instance interface
name for the route entry.
Metric Specifies the static route cost. The default is 200.
The management CLIP uses an internal static
route with a weight of 100. If you use both CLIP
and VLAN and need to force all default traffic
out the management VLAN interface, configure a
default static route with a weight lower than 100.
State Shows if the route is active or inactive.
Procedure
Name Description
DestAddr Shows the destination address of the route entry.
DestMask Shows the destination mask of the route entry.
Metric Shows the metric, or cost, assigned to the
route entry. If multiple entries exist to the same
destination, the metric determines which route is
used.
Routes with a type of LOCAL have a metric equal
to 1.
Instance Shows the Management Instance ID.
NextHop Shows the next hop for the route entry.
IntfName Shows the Management Instance interface name
for the route entry.
Type Shows the type of route entry.
Procedure
Name Description
DestAddr Shows the destination address of the route entry.
PrefixLen Shows the destination prefix length of the route
entry.
Metric Shows the metric, or cost, assigned to the
route entry. If multiple entries exist to the same
destination, the metric determines which route is
used.
Routes with a type of LOCAL have a metric equal
to 256.
Instance Shows the Management Instance ID.
NextHop Shows the next hop for the route entry.
IntfName Shows the Management Instance interface name
for the route entry.
Type Shows the type of route entry.
Use this task to view the default topology IP address for a Segmented Management Instance.
Procedure
Name Description
AddrType Shows the IP address type for the topology IP.
Addr Shows the IP address for the topology IP.
InterfaceName Shows the interface name of the identified
interface for the topology IP.
InstanceId Specifies the interface instance for the topology IP.
Use this task to configure and view IPv4 address information for a Segmented Management Instance.
Procedure
Name Description
InstanceId Specifies the interface instance.
Address Specifies IPv4 address for the interface instance.
Ensure that the management CLIP IP address
does not fall into the range of a configured VLAN
IP address range as this is not allowed.
Mask Specifies the subnet mask of the IP address.
AddrOrigin Shows the IP address origin.
IntfName Shows the interface name.
Use this task to configure or view IPv6 address information for a Segmented Management Instance.
Procedure
Name Description
InstanceId Specifies the interface instance.
Address Specifies the IPv6 address for the interface
instance.
Ensure that the management CLIP IP address
does not fall into the range of a configured VLAN
IP address range as this is not allowed.
PrefixLength Specifies the prefix length for the IPv6 address.
AddrOrigin Shows the IPv6 address origin.
IntfName Shows the interface name.
DadStatus Shows the IPv6 DAD status of the address.
Procedure
Name Description
RxPkts Counts the packets received on the Segmented
Management Instance.
RxError Counts the packets received with errors on the
Segmented Management Instance.
RxDrop Counts the packets received and dropped on the
Segmented Management Instance.
TxPkts Counts the packets transmitted on the Segmented
Management Instance.
TxError Counts the packets transmitted with errors on the
Segmented Management Instance.
TxDrop Counts the packets dropped before transmission
on the Segmented Management Instance.
Use this task to view IP address statistics for a Segmented Management Instance.
Procedure
IP Field Descriptions
Use the data in the following table to use the IP tab.
Name Description
InReceives Shows the inbound packet statistics.
InHdrErrors Shows the inbound packets with header errors
statistics.
InAddrErrors Shows the inbound packets with address errors
statistics.
InUnknownProtos Shows the inbound packets with unknown
protocols statistics.
Name Description
InDiscards Shows the inbound packets discarded statistics.
InDelivers Shows the inbound packets delivered statistics.
OutRequests Shows the outbound packet requests statistics.
OutDiscards Shows the outbound packets discarded statistics.
OutNotRoutes Shows the outbound packets with no routes
statistics.
ForwDatagrams Shows the forwarded datagram packets statistics.
ReasmTimeout Shows the packet reassembly timeouts statistics.
ReasmReqds Shows the packet reassembly requests statistics.
ReasmOKs Shows the successfully reassembled packets
statistics.
ReasmFails Shows the failed reassembled packets statistics.
FragOKs Shows the successfully fragmented packets
statistics.
FragFails Shows the failed fragmented packets statistics.
FragCreates Shows the fragments created statistics.
Use this task to view IPv6 address statistics for a Segmented Management Instance.
Procedure
Name Description
InReceives Shows the inbound packet statistics.
InHdrErrors Shows the inbound packets with header errors
statistics.
Name Description
InAddrErrors Shows the inbound packets with address errors
statistics.
InUnknownProtos Shows the inbound packets with unknown
protocols statistics.
InDiscards Shows the inbound packets discarded statistics.
InDelivers Shows the inbound packets delivered statistics.
InTooBigErrors Shows the inboud packets too big errors statistics.
InNoRoutes Shows the inbound packets with no routes
statistics.
InTruncatedPkts Shows the inbound packets truncated statistics.
InMcastPkts Shows the inbound multicast packets statistics.
InOctets Shows the inbound octets statistics.
InMcastOctets Shows the inbound multicast octets statistics.
InBcastOctets Shows the inbound broadcast octets statistics
InNoECTPkts Shows the inbound packets with no Explicit
Congestion Notification (ECN) statistics.
InECT1Pkts Shows the inbound packets with ECT(1) statistics.
InECT0Pkts Shows the inbound packets with ECT(0) statistics.
InCEPkts Shows the inbound packets with Congestion
Ecountered (CE) statistics.
OutRequests Shows the outbound packet requests statistics.
OutDiscards Shows the outbound packets discarded statistics.
OutNoRoutes Shows the outbound packets with no routes
statistics.
OutForwDatagrams Shows the forwarded datagram packets statistics.
OutMcastPkts Shows the outbound multicast packets statistics.
OutOctets Shows the outbound octets statistics.
OutMcastOctets Shows the outbound multicast octets statistics.
OutBcastOctets Shows the outpound broadcast octets statistics.
ReasmTimeout Shows the packet reassembly timeouts statistics.
ReasmReqds Shows the packet reassembly requests statistics.
ReasmOKs Shows the successfully reassembled packets
statistics.
ReasmFails Shows the failed reassembled packets statistics.
FragOKs Shows the successfully fragmented packets
statistics.
FragFails Shows the failed fragmented packets statistics.
FragCreates Shows the fragments created statistics.
Use this task to view IP ICMP statistics for a Segmented Management Instance.
Procedure
Name Description
InMsgs Shows the inbound messages statistics.
InErrors Shows the inbound errors statistics.
InCsumErrors Shows the inbound checksum errors statistics.
InDestUnreachs Shows the inbound destination unreachable
statistics.
InTimeExcds Shows the inbound time exceeded statistics.
InParmProbs Shows the inbound parameter problems statistics.
InSrcQuenchs Shows the inbound source quenchs statistics.
InRedirects Shows the inbound redirects statistics.
InEchos Shows the inbound echos statistics.
InEchoReps Shows the inbound echo replies statistics.
InTimestamps Shows the inbound timestamps statistics.
InTimestampsReps Shows the inbound timestamp replies statistics.
InAddrMasks Shows the inbound address masks statistics.
InAddrMaskReps Shows the inbound address mask replies statistics.
OutMsgs Shows the outbound messages statistics.
OutErrors Shows the outbound errors statistics.
OutDestUnreachs Shows the outbound destination unreachable
statistics.
OutTimeExcds Shows the outbound time exceeded statistics.
OutParmProbs Shows the outbound parameter problems
statistics.
Name Description
OutSrcQuenchs Shows the outbound source quenchs statistics.
OutRedirects Shows the outbound redirects statistics.
OutEchos Shows the outbound echos statistics.
OutEchoReps Shows the outbound echo replies statistics.
OutTimestamps Shows the outbound timestamps statistics.
OutTimestampReps Shows the outbound timestamps replies statistics.
OutAddrMasks Shows the outbound address masks statistics.
MsgInType0 Shows the inbound Type0 messages statistics.
MsgOutType8 Shows the outbound Type8 messages statistics.
Use this task to view IPv6 ICMP statistics for a Segmented Management Instance.
Procedure
Name Description
InMsgs Shows the inbound messages statistics.
InErrors Shows the inbound errors statistics.
InCsumErrors Shows the inbound checksum errors statistics.
InDestUnreachs Shows the inbound destination unreachable
statistics.
InTimeExcds Shows the inbound time exceeded statistics.
InParmProbs Shows the inbound parameter problems statistics.
InPktTooBigs Shows the inbound packets too big statistics.
InRedirects Shows the inbound redirects statistics.
InEchos Shows the inbound echos statistics.
Name Description
InEchoReplies Shows the inbound echo replies statistics.
InGroupMembQueries Shows the inbound group member queries
statistics.
InGroupMembResponses Shows the inbound group member responses
statistics.
InGroupMembReductions Shows the inbound group member reductions
statistics.
InRouterSolicits Shows the inbound router solicits statistics.
InRouterAdvertisements Shows the inbound router advertisements
statistics.
InNeighborSolicits Shows the inbound neighbor solicits statistics.
InNeighborAdvertisements SHows the inbound neighbor advertisements
statistics.
InMLDv2Reports Shows the inbound MLDv2 reports statistics.
InType134 Shows the inbound type134 statistics.
InType136 Shows the inbound type136 statistics.
OutMsgs Shows the outbound messages statistics.
OutErrors Shows the outbound errors statistics.
OutDestUnreachs Shows the outbound destination unreachable
statistics.
OutTimeExcds Shows the outbound time exceeded statistics.
OutParmProbs Shows the outbound parameter problems
statistics.
OutPktTooBigs Shows the outbound packets too big statistics.
OutRedirects Shows the outbound redirects statistics.
OutEchos Shows the outbound echos statistics.
OutEchoReps Shows the outbound echo replies statistics.
OutGroupMembQueries Shows the outbound group member queries
statistics.
OutGroupMembResponses Shows the outbound group member responses
statistics.
OutGroupMembReductions Shows the outbound group member reductions
statistics.
OutRouterStatistics Shows the outbound router statistics
OutRouterAdvertisements Shows the outbound router advertisements
statistics.
OutNeighborSolicits Shows the outbound neighbor solicits statistics.
OutNeighborAdvertisements Shows the outbound neighbor advertisements
statistics.
OutMLDv2Reports Shows the outbound MLDv2 reports statistics.
Name Description
OutType133 Shows the outbound Type133 statistics.
OutType135 Shows the outbound Type135 statistics.
OutType143 Shows the outbound Type143 statistics.
Use this task to view UDP statistics for a Segmented Management Instance.
Procedure
Name Description
IPVersion Shows the IP address version as ipv4 or ipv6.
InDatagrams Shows the input datagram statistics.
NoPorts Shows the number of ports statistics.
InErrors Shows the input errors statistics.
OutDatagrams Shows the output datagram statistics.
IgnoredMulti Show the ignored multiport statistics.
RcvbufErrors Shows the received buffer errors statistics.
SndbufErrors Shows the send buffer errors statistics.
InCsumErrors Shows the input checksum errors statistics.
Clear Specifies to clear the statistics. Default is false.
Use this task to view TCP statistics for a Segmented Management Instance.
Procedure
Name Description
IPVersion Shows the IP address version as ipv4 or ipv6.
ActiveOpens Shows the active open TCP connections statistics.
PassiveOpens Shows the passive open TCP connections
statistics.
AttemptFails Shows the TCP connection attempt failures
statistics.
EstabResets Shows the TCP connection esablished resets
statistics.
InSegs Shows the input segments statistics.
OutSegs Shows the output segments statistics.
RetransSegs Shows the retransmit segments statistics.
InErrs Shows the input checksum errors statistics.
OutRsts Shows the output resets statistics.
InCsumErrors Shows the input checksum errors statistics.
Clear Specifies to clear the statistics. Default is false.
View TCP Connections and UDP Endpoints Statistics for a Segmented Management
Instance
Note
This procedure does not apply to VSP 8600 Series.
Use this task to view TCP connections and UDP endpoints statistics for a Segmented Management
Instance.
Procedure
Name Description
IPVersion Shows the IP address version as ipv4 or ipv6.
Type Shows the connection type as tcp or udp.
Index Shows the index ID for the connection.
State Shows the link state for the connection.
RecvQ Shows the connection received quanitity.
SendQ Shows the connection sent quantity.
LocalAddressAndPort Shows the local IP address and port.
PeerAddressAndPort Shows the peer IP address and port.
Segmented Management Instance Configuration for VSP 8600 Series using EDM
Note
This section only applies to VSP 8600 Series.
This section provides procedures to configure segmented management instance using the EDM.
You must create a Management Instance to gain access to specific management applications.
The Management Instance supports different management interface types. When you create the
Management Instance, you specify the interface type and the switch automatically creates the
appropriate instance ID for that type.
Each Management Instance supports a single IPv4 and IPv6 (global scope) management address for
use by management applications.
Procedure
6. (Optional) For a CLIP Management Instance, in the VrfName field, type the VRF name to associate
with the CLIP instance.
Note
If you want to associate the GRT with the CLIP instance, type GlobalRouter in the
VrfName field. You cannot use mgmtrouter as the VRF.
If you specify a non-default VRF, you must enable Layer 3 VSN to achieve IPv6 CLIP
connectivity.
Name Description
InstanceId Shows a value that identifies the Management Instance type associated with this
entry.
InterfaceType Indicates the interface type.
VlanId Specifies the ID of a port based VLAN to associate with a particular management
IP instance, if the management VLAN interface is supported.
OOBIfIndex Specifies the interface index of the OOB port to associate with a particular
management IP instance, if the management OOB interface is supported.
VrfName Specifies the VRF name to associate with the management CLIP .
State Indicates if the interface is enabled for this instance. The default is disabled.
InterfaceMacAddr Shows the MAC address for the interface.
InterfaceName Shows the interface name.
After you create the Management Instance, you can add an IP address to it, and then configure route
redistribution to advertise reachability of the Management Instance to the rest of the network.
Procedure
Tip
If you create the interface and assign an IP address during the same EDM session, you
may need to select Refresh on the MgmtAddress tab before you see the new interface to
configure.
Name Description
InstanceId Shows a value that identifies the Management Instance type associated with this
entry.
IpAddress Specifies the IPv4 management address.
IpMask Specifies the subnet mask of the IPv4 management address.
Ipv6Address Specifies the IPv6 management address. Each Management Instance supports a
single IPv6 management address for use by management applications.
Ipv6PrefixLength Specifies the prefix length of the IPv6 management address. It is /128 for a
loopback interface.
Ipv6LinkLocalAddr Shows the automatically generated link local address.
InterfaceName Shows the interface name.
Procedure
Name Description
DestAddr Shows the destination address of the route entry.
DestMask Shows the destination mask of the route entry.
Metric Shows the metric, or cost, assigned to the
route entry. If multiple entries exist to the same
destination, the metric determines which route is
used.
Routes with a type of LOCAL have a metric equal
to 256.
Instance Shows the Management Instance ID.
NextHop Shows the next hop for the route entry.
IntfName Shows the Management Instance interface name
for the route entry.
Type Shows the type of route entry.
Procedure
Name Description
DestAddr Shows the destination address of the route entry.
PrefixLen Shows the destination prefix length of the route
entry.
Metric Shows the metric, or cost, assigned to the
route entry. If multiple entries exist to the same
destination, the metric determines which route is
used.
Routes with a type of LOCAL have a metric equal
to 256.
Instance Shows the Management Instance ID.
NextHop Shows the next hop for the route entry.
Name Description
IntfName Shows the Management Instance interface name
for the route entry.
Type Shows the type of route entry.
Use this procedure to designate an existing VLAN or loopback IP address as a Segmented Management
Instance. This action moves the IP interface from the VOSS routing stack to the management stack to
use with management applications.
You cannot migrate interfaces used for routing purposes, for example, where you configure Layer 3
routing protocols.
This command does not apply to the OOB or mgmtEthernet interface. Releases that support this
migration procedure automatically move the IP address on the mgmtEthernet interface from the
routing stack to the Segmented Management Instance.
Procedure
Name Description
InstanceId Specifies the interface instance to migrate.
InterfaceIndex Shows the interface index of the identified
interface.
InterfaceType Shows the interface type.
Description Shows the interface description.
VlanId Specifies the VLAN ID for a port-based VLAN.
LoopbackId Specifies the loopback ID.
Name Description
VrfName Shows the VRF associated with the loopback
interface.
IpAddress Shows the IPv4 address to migrate.
IpMask Shows the subnet mask for the IPv4 address.
Ipv6Address Shows the IPv6 address to migrate.
Ipv6PrefixLength Shows the prefix length for the IPv6 address.
Procedure
Name Description
RxPkts Counts the packets received on the Segmented
Management Instance.
RxError Counts the packets received with errors on the
Segmented Management Instance.
RxDrop Counts the packets received and dropped on the
Segmented Management Instance.
TxPkts Counts the packets transmitted on the Segmented
Management Instance.
TxError Counts the packets transmitted with errors on the
Segmented Management Instance.
TxDrop Counts the packets dropped before transmission
on the Segmented Management Instance.
The following topics provide instructions to perform basic configuration of, and administrative tasks for,
the switch and software.
Examples and network illustrations may illustrate only one of the supported platforms. Unless otherwise
noted, the concept illustrated applies to all supported platforms.
Fundamentals
This section includes the minimum, but essential, configuration steps to:
• provide a default, starting point configuration
• establish basic security on the node
For more information about hardware specifications and installation procedures, see the following
documents:
• Installing the Virtual Services Platform 4450GSX-PWR+
• Installing the Virtual Services Platform 4450GTX-HT-PWR+
• VSP 4900 Series Switches: Hardware Installation Guide
• Installing the Virtual Services Platform 7200 Series
• VSP 7400 Series Switches: Hardware Installation Guide
• Installing the Virtual Services Platform 8000 Series
• Installing the Virtual Services Platform 8600
• XA1400 Series Switches: Hardware Installation Guide
Important
If you change the configuration, you must save the configuration, and then reboot the switch
for the change to take effect.
If you disable this feature and save the configuration, any configuration for advanced features
remains saved in the configuration file but is not used.
When disabled, you can use all ports for Layer 2 or Layer 3 forwarding of standard unicast and
multicast features. Use this mode if you are not configuring advanced features. The syntax for disabling
this boot configuration flag is no boot config flags advanced-feature-bandwidth-
reservation.
When enabled, also known as Full Feature mode, the switch supports advanced features by reassigning
some of the front panel ports to be loopback ports. The following advanced features require loopback
ports:
• Fabric Extend
• SPB
• SMLT
• vIST
• VXLAN Gateway
• Fabric RSPAN (Mirror to I-SID)
• Application Telemetry
• IS-IS Accept Policies
• Segmented Management Instance CLIP interface
Note
Full Feature mode does not support PIM.
The syntax for enabling the boot flag for this mode is: boot config flags advanced-feature-
bandwidth-reservation [low | high ].
The high level parameter means that the switch reserves the maximum bandwidth for the advanced
features.
The low level parameter means that the switch reserves less bandwidth to support minimum
functionality for advanced features.
After the switch reserves the appropriate ports to become loopback ports, the ports are no longer
visible in the output when you enter show interfaces gigabitEthernet.
Important
If you change the configuration, you must save the configuration, and then reboot the switch
for the change to take effect.
If you disable this feature and save the configuration, any configuration for advanced features
remains saved in the configuration file but is not used.
Important
You must ensure your configuration does not include reserved ports before you enable this
feature. If the configuration includes reserved ports after you enable this feature and restart
the switch, the switch stops loading the configuration.
XA1400 Series
Note
Product Notice: This feature is available in demo mode only on XA1480 and supports low level
parameter configuration automatically, which cannot be modified.
When disabled, all I-SID bindings are removed and the switch can only operate as a Backbone Core
Bridge (BCB). The syntax for disabling this boot configuration flag is: no boot config flags
advanced-feature-bandwidth-reservation.
When enabled, the switch reserves CPU cores for Backbone Edge Bridge (BEB) functionality. The
syntax for enabling the boot flag for this mode is: boot config flags advanced-feature-
bandwidth-reservation low.
Shortest Path Bridging (SPB) and Protocol Independent Multicast (PIM) cannot interoperate with each
other on the switch at the same time. To ensure that SPB and PIM stay mutually exclusive, the software
uses a boot flag called boot config flags spbm-config-mode.
• The boot config flags spbm-config-mode flag is enabled by default. This enables you to
configure SPB and IS-IS, but you cannot configure PIM and IGMP either globally or on an interface.
• If you disable the boot flag, save the configuration, and then reboot with the saved configuration.
When the flag is disabled, you can configure PIM and IGMP Snooping, but you cannot configure SPB
or IS-IS.
Important
After you change the boot config flags spbm-config-mode flag, you must save the
configuration, and then reboot the switch for the change to take effect.
For more information about this boot flag and Simplified vIST, see IP Multicast on page 1457.
The nni-mstp boot flag changes the default behavior of the MSTP on SPBM network-to-network
interface (NNI) ports. The Common and Internal Spanning Tree (CIST) is disabled automatically on the
NNI, and the NNI ports can only be members of backbone VLANs (B-VLAN).
• During startup, if you have non-B-VLAN on SPBM NNI ports in your configuration file, the system
sets the nni-mstp flag to true (if it was not already set to true) and enables MTSP on SPBM NNI
ports, and all other configurations remain the same. Save your configuration file. If you do not save
your configuration, you continue to see the following message on reboot:
Warning
Detected brouter and/or vlans other than BVLANs on NNI ports. Setting the boot config
flag nni-mstp to true. Saving configuration avoids repetition of this warning on
reboot.
Note
When the nni-mstp flag is set to true, only MSTI 62 is disabled on the SPBM NNI ports. You
can add the SPBM NNI ports to any VLAN.
• If you configure the nni-mstp boot configuration flag to false (default), the system checks to make
sure that the SPBM NNI ports do not have brouter (IPv4 or IPv6) or non-SPBM VLANs configured.
The nni-mstp flag is then set to false. Save your configuration file, and reboot the switch for the
configuration change to take effect.
Note
Ensure that all SPBM NNI ports in non-B-VLAN are removed prior to setting the nni-mstp
flag to false.
System Connections
Connect the serial console interface (an RJ–45 jack) to a PC or terminal to monitor and configure
the switch. The port uses a RJ–45 connector that operates as data terminal equipment (DTE). Some
switches also provide a USB port or micro USB port for serial console interface connectivity. See your
hardware documentation for available ports.
The default communication protocol settings for the console port are:
• Baud rate:
◦ VSP 4450 Series — 9600
◦ VSP 4900 Series — 115200
◦ VSP 7200 Series — 9600
◦ VSP 7400 Series — 115200
◦ VSP 8200 Series — 9600
◦ VSP 8400 Series — 9600
◦ VSP 8600 Series — 115200
◦ XA1400 Series — 115200
• 8 data bits
• 1 stop bit
• No parity
• No flow control.
To use the console port, you need a terminal or teletypewriter (TTY)-compatible terminal, or a portable
computer with a serial port and terminal-emulation software.
Depending on the hardware platform, the console port can display as console port or 10101.
Boot Sequence
The switch goes through a boot sequence before it becomes fully operational. After you turn on power
to the switch, the system starts.
Loading Linux
Depending on the Linux kernel used, the boot image is stored either in a boot flash partition, Secure
Digital (SD), or Solid State Drive (SSD) flash card. The boot image includes the boot loader, and the
Linux kernel and applications.
The boot location contains two versions of the boot image: a committed version (the primary release)
and a backup version. A committed version is one that is marked as good (if you can start the system
using that version). The system automatically uses the backup version if the system fails the first time
you start with a new version.
After loading the primary release, the CPU and basic system devices, such as the console port,
initializes. Depending on the hardware platform, the console port displays as console or 10101. At this
stage, the I/O ports are not available; the system does not initialize the I/O ports until the port sends
configuration data.
Important
Zero Touch Deployment does not function if primary or secondary configuration files exist.
After the system loads the primary release and the switch is in a Zero Touch Deployment-ready
configuration mode, the switch automatically deploys without intervention.
If the primary configuration file does not exist, the system looks for the backup configuration file, as
identified by version.cfg. If this file does not exist, the system initiates Zero Touch functionality on
the switch that enables Zero Touch Fabric Configuration. For more information, see Zero Touch Fabric
Configuration on page 63.
Note
Exception: for VSP 8600 Series and XA1400 Series, if the configuration file does not exist,
the system loads the factory-default configuration, which is the equivalent of using the boot
config flags factorydefaults command.
The default switch configuration in Zero Touch Fabric Configuration mode includes the following:
• Shortest Path Bridging MAC (SPBM) instance is created.
• Intermediate System-to-Intermediate System (IS-IS) is enabled.
• All ports are enabled and operating in Auto-sense mode.
• The switch issues DHCP requests on the out-of-band (OOB) management port and the
management VLAN.
The default switch configuration in factory default mode includes the following:
• A single, port-based default VLAN with a VLAN identification number of 1
• No interface assigned IP addresses
• Traffic priority for all ports configured to normal priority
• All ports as untagged ports
• Default communication protocol settings for the console port. For more information about these
protocol settings, see System Connections on page 147.
The factorydefaults boot flag removes the runtime, primary, and backup configuration files, resets
all local default user account passwords, and removes all digital certificates. The Radsec, IPsec, IKE,
OSPF, SNMP, SSL, SSH, OVSDB, and NTP files are also removed. The CLI displays a warning that the
configurations, passwords, and files will be reset, and the system logs an informational message. The
configuration and file removals occur during the next boot sequence when the factorydefaults boot
flag is enabled. After the switch reboots, the security mode setting is retained. To enable Zero Touch
Onboarding after a factorydefaults boot, reboot the switch again without saving a configuration.
• Start the system in Zero Touch Deployment mode, which includes Zero Touch Fabric Configuration.
For more information, see Zero Touch Deployment on page 58.
Runtime
After the switch is operational, you can use the runtime commands to perform configuration and
management functions necessary to manage the system. These functions include the following
• Resetting or restarting the switch
• Adding, deleting, and displaying address resolution protocol (ARP) table entries
• Pinging another network device
• Viewing and configuring variables for the entire system and for individual ports
• Configuring and displaying MultiLink Trunking (MLT) parameters
• Creating and managing port-based VLANs or policy-based VLANs
To access the runtime environment you need a connection from a PC or terminal to the switch. You can
use a direct connection to the switch through the console port or remotely through Telnet, rlogin, or
Secure Shell (SSH) sessions.
Note
rlogin is only supported on VSP 8600 Series.
Important
Before you attempt to access the switch using one of the preceding methods, ensure you first
enable the corresponding daemon flags.
System logon
After the platform boot sequence is complete, the system opens the logon prompt. The following table
shows the default values for logon and password for console and Telnet sessions.
Note
With enhanced secure mode enabled, the person in the role-based authentication level
of administrator configures the login and password values for the other role-based
authentication levels. The administrator initially logs on to the switch using the default login
of admin and the default password of admin. After the initial login, the switch prompts the
administrator to create a new password.
System flags
After you enable or disable certain modes and functions, you need to save the configuration and restart
the switch for your change to take effect. This section lists parameters and indicates if they require a
switch restart.
The following table lists parameters you configure in the CLI using the boot config flags
command. For information on system flags and their configuration, see Configure Boot Flags on page
214.
Note
Flag support can vary across hardware models.
Note:
Exception: Only supported on VSP 7400 Series and XA1480.
block-snmp No
debug-config Yes
debugmode Yes
dvr-leaf-mode No
Note:
The switch does not require a restart when you enable the dvr-leaf-mode
flag, as long as there is no unsupported configuration on the switch.
enhancedsecure-mode Yes
factorydefaults Yes
flow-control-mode Yes
Note:
Exception: Not supported on VSP 8600 Series.
ftpd No
ha-cpu Yes, the standby CPU
restarts automatically.
Note: Modifying this flag does
Exception: Only supported on VSP 8600 Series. not require a system
restart.
hsecure Yes
linerate-directed-broadcast Yes
Note:
Exception: Only supported on VSP 4450 Series.
ipv6-egress-filter Yes
Note:
Exception: Not supported on VSP 8600 Series or XA1400 Series.
Note:
Exception: Not supported on VSP 4450 Series, VSP 8600 Series, or XA1400
Series.
logging No
nni-mstp Yes
Note:
Exception: Not supported on VSP 8600 Series or XA1400 Series.
reboot No
rlogind No
Note:
Exception: Only supported on VSP 8600 Series.
savetostandby No
Exception: Only supported on VSP 8600 Series.
spanning-tree-mode Yes
spbm-config-mode Yes
sshd No
telnetd No
tftpd No
trace-logging No
urpf-mode Yes
Note:
Exception: Not supported on VSP 8600 Series or XA1400 Series.
verify-config Yes
vrf-scaling Yes
vxlan-gw-full-interworking-mode Yes
Exception: Only supported on VSP 7200 Series, VSP 7400 Series , VSP 8200
Series, and VSP 8400 Series.
Table 21: Secure and nonsecure protocols for IPv4 and IPv6
Nonsecure protocols Default Equivalent secure protocols Default status
status
FTP and Trivial FTP Disabled Secure Copy (SCP) and Secure File Disabled
Transfer Protocol (SFTP)
Note:
File Transfer Protocol (FTP) and Trivial File Transfer Protocol (TFTP) support both IPv4 and IPv6
addresses, with no difference in functionality or configuration.
Note:
Exception: only supported
only on VSP 8600 Series.
Important:
Take the appropriate security precautions
within the network if you use HTTP.
The client-server model partitions tasks between servers that provide a service and clients that request
a service.
For active CLI clients, users initiate a client connection from the switch to another device.
Note
Both FTP and TFTP clients are supported by the switch. The switch does not launch FTP
and TFTP clients explicitly as a separate command; you can launch them through the CLI
copy command. If you have configured the username through the boot config host
command, the FTP client is used to transfer files to and from the switch using the CLI copy
command; If you have not configured the username, the TFTP client is used to transfer files to
and from the switch using the CLI copy command.
Configuring the boot config flags ftpd or boot config flags tftpd enables
the FTP or TFTP Servers on the switch.
For non-active clients, the client exists on the switch and the switch console initiates the request, with
no intervention from users after the initial setup. For instance, Network Time Protocol (NTP) is a non
active client. The switch initiates the client request to the central server to obtain the up-to-date time.
Password encryption
The platform stores passwords in encrypted format and not in the configuration file.
Important
For security reasons, configure the passwords to values other than the factory defaults.
For more information about EDM, see Enterprise Device Manager on page 263.
Ensure you use a supported browser version. For more information about supported browsers, see
Supported Browsers on page 264.
Important
• You must enable the web server from CLI to enable HTTP access to the EDM. If you want
HTTP access to the device, you must also disable the web server secure-only option. The
web server secure-only option, allowing for HTTPS access to the device, is enabled by
default. Take the appropriate security precautions within the network if you use HTTP.
• EDM access is available to read-write users only.
If you experience any issues while connecting to the EDM, check the proxy settings. Proxy settings may
affect EDM connectivity to the switch. Clear the browser cache and do not use proxy when connecting
to the device. This should resolve the issue.
Important
The default passwords and community strings are documented and well known. As a best
practice, change the default passwords and community strings immediately after you first log
on. For more information about changing user names and passwords, see Change Passwords
on page 3062.
This feature enhances communications security by implementing Mocana NanoSSL to secure HTTPS
server using Transport Layer Security (TLS) cryptographic protocol.
The following are the key properties of Secure web server with TLS:
• This feature can be implemented on a maximum of only 10 concurrent client connections.
• The switch supports version TLS 1.2 and above by default. You can explicitly configure TLS 1.0 and
TLS 1.1 version support using CLI or EDM.
• This feature replaces SSL 3.0 with TLS. SSL 3.0 is not supported.
• TLS server does not support RC4, DES, TDES, and MD5 based cipher suites.
• The minimum password length for the web server is 8 characters, by default. You can change this
using CLI or EDM.
For information about the certificate order priority when the Transport Layer Security (TLS) server and
switch connect, see Certificate Order Priority on page 3009.
You can configure an IP address for the management port if one is not in the configuration file. For more
information, see Configure an IP Address for the Management Port on page 551. This procedure only
applies to VSP 8600 Series. For other products, see Segmented Management on page 69.
Basic Configuration
Connect a Terminal
Before You Begin
• To use the console port, you need the following equipment:
◦ A terminal or Teletypewriter (TTY)-compatible terminal, or a portable computer with a serial port
and terminal-emulation software.
◦ A specific cable with an RJ–45 or USB connector for the console port on the switch. The other
end of the cable must use a connector appropriate to the serial port on the computer or terminal.
• To comply with emissions regulations and requirements, you must shield the cable that connects to
the console port.
Note
If you are using the VSP 4900 Series USB console port with a terminal running Windows 10,
you must install the CP210x USB to UART Bridge Virtual COM Port (VCP) driver from Silicon
Labs before you connect to the terminal.
Connect a terminal to the serial console interface to monitor and configure the system directly.
Procedure
2. Connect the RJ–45 or USB cable to the console port on the switch.
3. Connect the other end of the cable to the terminal or computer serial port.
4. Turn on the terminal.
5. Log on to the switch.
Changing passwords
Configure new passwords for each access level, or change the logon or password for the different
access levels of the switch. After you receive the switch, use default passwords to initially access CLI.
If you use Simple Network Management Protocol version 3 (SNMPv3), you can change encrypted
passwords.
If you enable the hsecure flag, after the aging time expires, the system prompts you to change your
password. If you do not configure the aging time, the default is 90 days.
If you enable enhanced secure mode with the boot config flags enhancedsecure-mode
command, you enable new access levels, along with stronger password complexity, length, and
minimum change intervals. For more information on system access fundamentals and configuration,
see System access fundamentals on page 3313.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Change a password:
cli password WORD<1–20> {layer1|layer2|layer3|read-only|read-write|
read-write-all}
3. Enter the old password.
4. Enter the new password.
5. Re-enter the new password.
6. Configure password options:
password [access-level WORD<2–8>] [aging-time day <1-365>] [default-
lockout-time <60-65000>] [lockout WORD<0–46> time <60-65000>] [min-
passwd-len <10-20>] [password-history <3-32>]
Example
Switch:1> enable
Change a password:
Set password to an access level of read-write-all and the expiration period for the password to 60 days:
Variable Definitions
Use the data in the following table to use the cli password command.
Variable Value
layer1|layer2|layer3|read-only| Changes the password for the specific access
read-write|read-write-all level.
WORD<1–20> Specifies the user logon name.
Use the data in the following table to use the password command.
Variable Value
access-level WORD<2–8> Permits or blocks this access level. The available
access level values are as follows:
• layer1
• layer2
• layer3
• read-only
• read-write
• read-write-all
Variable Value
min-passwd-len <10-20> Configures the minimum length for passwords in
high-secure mode. The default is 10 characters.
To configure this option to the default value, use
the default operator with the command.
password-history <3-32> Specifies the number of previous passwords the
switch stores. You cannot reuse a password that is
stored in the password history. The default is 3.
To configure this option to the default value, use
the default operator with the command.
Procedure
1. Log on as rwa.
2. Enter Global Configuration mode:
enable
configure terminal
3. Change the system name:
sys name WORD<0–255>
4. Configure the system contact:
snmp-server contact WORD<0–255>
5. Configure the system location:
snmp-server location WORD<0–255>
Example
Change the system name, configure the system contact, and configure the system location:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#sys name Floor3Lab2
Floor3Lab2:1(config)#snmp-server contact http://companyname.com
Floor3Lab2:1(config)#snmp-server location "12 Street, City, State, Zip"
Variable Definitions
Use the data in the following table to use the system-level commands.
Variable Value
contact WORD<0–255> Identifies the contact person who manages the node.
To include blank spaces in the contact, use quotation
marks (") around the text.
location WORD<0–255> Identifies the physical location of the node. To include
blank spaces in the location, use quotation marks (")
around the text.
name WORD<0–255> Configures the system or root level prompt name for
the switch. WORD<0–255> is an ASCII string from 1–255
characters (for example, LabSC7 or Closet4).
You can use the custom logon banner to display company information, such as company name and
contact information. For security, you can change the default logon banner of the switch, which
contains specific system information, including platform type and software release.
Use the custom message-of-the-day to update users on a configuration change, a system update or
maintenance schedule. For security purposes, you can also create a message-of-the-day with a warning
message to users that, “Unauthorized access to the system is forbidden.”
Procedure
configure terminal
2. Configure the switch to use a custom banner or use the default banner:
banner <custom|static>
3. Create a custom banner:
banner WORD<1–80>
Note
To enter multiple lines for a message, use the banner command before each new line of
the message. To provide a string with spaces, include the text in quotation marks.
Note
To enter multiple lines for a message, use the banner motd command before each new
line of the message. To provide a string with spaces, include the text in quotation marks.
Example
Configure the custom banner to “Company, www.Companyname.com.” and configure the message of
the day to “Unauthorized access to this system is forbidden. Please logout now.”
Switch:1> enable
Switch:1#configure terminal
Switch:1(config)# banner custom
Switch:1(config)# banner Company
Switch:1(config)# banner www.Companyname.com
Switch:1(config)# banner motd "Unauthorized access to this system is forbidden"
Switch:1(config)# banner motd "Please logout now"
Switch:1(config)#banner displaymotd
Switch:1(config)#show banner
Company
www.company.com
defaultbanner : false
custom banner :
displaymotd : true
custom motd :
Unauthorized access to this system is forbidden
Please logout now
Variable definitions
Use the data in the following table to use the banner command.
Variable Value
custom Disables the use of the default banner.
static Activates the use of the default banner.
WORD <1–80> Adds lines of text to the CLI logon banner.
motd WORD<1–1516> Create the message of the day. To provide a string with spaces, include the
text in quotation marks (“).
displaymotd Enable the custom message of the day.
Procedure
Example
Configure the date and time, and then verify the configuration.
Switch:1>enable
Switch:1#clock set 19042014063030
Switch:1#show clock
Wed Mar 19 06:30:32 2014 EDT
Variable Definitions
Use the data in the following table to use the clock set command.
Variable Value
MMddyyyyhhmmss Specifies the date and time in the format month,
day, year, hour, minute, and second.
Note
Rlogin is only supported on VSP 8600 Series.
Enable the remote access service to provide multiple methods of remote access.
File Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP) and Telnet server support both IPv4
and IPv6 addresses, with no difference in functionality or configuration.
Procedure
configure terminal
Example
Variable Definitions
The following table defines parameters for the boot config flags command.
Variable Value
advanced-feature-bandwidth- Enables the switch to support advanced features
reservation [low | high ] by reserving ports as loopback ports. When
disabled, you can use all ports on the switch, but
Note: advanced features do not work.
Exception: only supported on VSP 7400 Series The default is enabled with low level.
and XA1480. • The high level means that the switch reserves
the maximum bandwidth for the advanced
features.
• The low level means that the switch
reserves less bandwidth to support minimum
functionality for advanced features.
If you change this parameter, you must restart the
switch.
block-snmp Activates or disables Simple Network
Management Protocol management. The default
value is false (disabled), which permits SNMP
access.
Variable Value
debug-config [console] | [file] Enables you to debug the configuration file during
loading configuration at system boot up. The
default is disabled. You do not have to restart
the switch after you enable debug-config, unless
you want to immediately debug the configuration.
After you enable debug-config and save the
configuration, the debug output either displays on
the console or logs to an output file the next time
the switch reboots.
The options are:
• debug-config [console]—Displays the line-by-
line configuration file processing and result of
the execution on the console while the device
loads the configuration file.
• debug-config [file]— Logs the line-by-line
configuration file processing and result of
the execution to the debug file while
the device loads the configuration file.
The system logs the debug config output
to /intflash/debugconfig_primary.txt for the
primary configuration file. The system
logs the debug config output to /intflash/
debugconfig_backup.txt for the backup
configuration, if the backup configuration file
loads.
Important:
Do not change this parameter unless directed by
technical support.
Variable Value
enhancedsecure-mode {jitc | non- Enables enhanced secure mode in either the Joint
jitc} Interoperability Test Command (JITC) or non-JITC
sub-modes.
Note:
As a best practice, enable the enhanced secure
mode in the non-JITC sub-mode, because the
JITC sub-mode is more restrictive and prevents
the use of some CLI commands that are
commonly used for troubleshooting.
Note:
The factorydefaults flag deletes the runtime,
primary and backup configuration files, local
password files, authentication keys, and
certificates. After a factory default, you must
change the password on first login.
Variable Value
hsecure Activates or disables High Secure mode.
The hsecure command provides the following
password behavior:
• 10 character enforcement
• The password must contain a minimum of 2
uppercase characters, 2 lowercase characters,
2 numbers, and 2 special characters.
• Aging time
• Failed login attempt limitation
The default value is disabled. If you enable High
Secure mode, you must restart the switch to
enforce secure passwords. If you operate the
switch in High Secure mode, the switch prompts
a password change if you enter invalid-length
passwords.
ipv6-egress-filter Enables IPv6 egress filters. The default is disabled.
If you change this parameter, you must restart the
Note: switch.
Exception: not supported on VSP 8600 Series and
XA1400 Series.
Note:
Exception: not supported on VSP 4450 Series, VSP
8600 Series, and XA1400 Series.
Important:
The software cannot be upgraded or downgraded
to a software release that does not contain this
directed broadcast hardware assist functionality
without first disabling this feature and saving the
configuration.
Variable Value
logging Activates or disable system logging. The default
value is enabled. The system names log files
according to the following:
• The system displays the file names in 8.3
(log.xxxxxxxx.sss) format.
• The first 6 characters of the file name contain
the last three bytes of the chassis base MAC
address.
• The next two characters in the file name
specify the slot number of the CPU that
generated the logs.
• The last three characters in the file name are
the sequence number of the log file.
The system generates multiple sequence numbers
for the same chassis and same slot if the system
reaches the maximum log file size.
nni-mstp Enables MSTP and VLAN configuration on
network-to-network interface (NNI) ports. The
Note: default is disabled.
Exception: not supported on VSP 8600 Series and
XA1400 Series. Note:
Spanning Tree is disabled on all NNIs.
Important:
Do not change this parameter unless directed by
technical support.
Variable Value
spbm-config-mode Enables you to configure SPB and IS-IS, but you
cannot configure PIM and IGMP either globally or
on an interface.
Use the no operator so that you can configure
PIM and IGMP.
The boot flag is enabled by default. To set this flag
to the default value, use the default operator
with the command.
sshd Activates or disables the SSHv2 server service.
The default value is disabled.
syslog-rfc5424-format Controls the format of the syslog output and
logging. By default, the switch uses the RFC5424
format. If the RFC based format is disabled, the
older format is used.
telnetd Activates or disables the Telnet server service. The
default is disabled.
tftpd Activates or disables Trivial File Transfer Protocol
server service. The default value is disabled.
trace-logging Activates or disables the creation of trace logs.
The default value is disabled.
Important:
Do not change this parameter unless directed by
technical support.
Variable Value
verify-config Activates syntax checking of the configuration file.
The default is enabled.
• Primary config behavior: When the
verifyconfig flag is enabled, the primary config
file is pre-checked for syntax errors. If the
system finds an error, the primary config file
is not loaded, instead the system loads the
backup config file.
Important:
If you enable both this flag and the spbmconfig-
mode flag, the switch reduces the number of
configurable VLANs. For more information about
maximum scaling numbers, see VOSS Release
Notes.
Use Telnet to log on to the device and remotely manage the switch.
Procedure
1. From a PC or terminal, start a Telnet session:
telnet <ipv4 or ipv6 address>
2. Enter the logon and password when prompted.
Example
C:\Users\jsmith>telnet 192.0.2.40
Connecting to 192.0.2.40.....
Login:rwa
Password:rwa
Note
DEMO FEATURE - Read Only User for EDM is a demonstration feature on some products.
Demonstration features are provided for testing purposes. Demonstration features are for lab
use only and are not for use in a production environment. For more information, see VOSS
Feature Support Matrix.
Enable the web management interface to provide management access to the switch using a web
browser.
HTTP and HTTPS, and FTP support both IPv4 and IPv6 addresses, with no difference in functionality or
configuration.
Important
To enable HTTP access to the device, you must disable the web server secure-only option. To
enable HTTPS access to the device, the web server secure-only option is enabled by default.
The TFTP server supports both IPv4 and IPv6 TFTP clients.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable the web server:
web-server enable
3. To enable the secure-only option (for HTTPS access), enter:
web-server secure-only
4. (Optional) To disable the secure-only option (for HTTP access), enter:
no web-server secure-only
Important
The default passwords and community strings are documented and well known. Change
the default passwords and community strings immediately after you first log on.
Example
Enable the secure-only web-server.
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#web-server enable
Switch:1(config)#web-server secure-only
Switch:1(config)#web-server read-only-user enable
Switch:1(config)#web-server password rwa smith2
Enter the New password : ********
Re-enter the New password : ********
Password changed.
Switch:1(config)#web-server password ro jones6
Enter the New password : ********
Re-enter the New password : ********
Password changed.
Switch:1(config)#show web-server
Web Server Info :
Status : off
Secure-only : enabled
TLS-minimum-version : tlsv12
RO Username Status : disabled
RO Username : user
RO Password : ********
RWA Username : admin
RWA Password : ********
Def-display-rows : 30
Inactivity timeout : 900 sec
Html help tftp source-dir :
HttpPort : 80
HttpsPort : 443
NumHits : 0
NumAccessChecks : 0
NumAccessBlocks : 0
NumRxErrors : 0
NumTxErrors : 0
NumSetRequest : 0
Minimum password length : 8
Last Host Access Blocked : 0.0.0.0
Ciphers-Tls : TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
Variable Definitions
Use the data in the following table to use the web-server command.
Variable Value
def-display-rows <10-100> Configures the number of rows each page
displays, between 10 and 100.
enable Enables the web interface. To disable the web
server, use the no form of this command:
no web-server [enable]
help-tftp <WORD/0-256> Configures the TFTP or FTP directory for Help
files, in one of the following formats: a.b.c.d:/|
peer:/ [<dir>]. The path can use 0–256 characters.
The following example paths illustrate the correct
format:
• 192.0.2.1:/help
• 192.0.2.1:/
http-port <80-49151> Configures the web server HTTP port. The default
port is 80.
https-port <443-49151> Configure the web server HTTPS port. The default
port is 443.
inactivity-timeout<30–65535> Configures the web-server session inactivity
timeout. The default is 900 seconds (15 minutes).
password {ro | rwa} WORD<1-20> Configures the logon and password for the web
interface.
password min-passwd-len<1–32> Configures the minimum password length. By
default, the minimum password length is 8
characters.
read-only-user Enables read-only user for the web server.
Note:
read-only-user enable is available for
demonstration purposes on some products. For
more information, see VOSS Feature Support
Matrix.
Variable Value
secure-only Enables secure-only access for the web server.
tls-min-ver<tlsv10|tlsv11|tlsv12> Configures the minimum version of the TLS
protocol supported by the web-server. You can
select among the following:
• tlsv10 – Configures the version to TLS 1.0.
Note:
tlsv10 is not supported in enhanced secure
mode.
• tlsv11 – Configures the version to TLS 1.1.
• tlsv12 – Configures the version to TLS 1.2
The default is tlsv12.
Note
DEMO FEATURE - Read Only User for EDM is a demonstration feature on some products.
Demonstration features are provided for testing purposes. Demonstration features are for lab
use only and are not for use in a production environment. For more information, see VOSS
Feature Support Matrix.
Perform this procedure to enable the web server RO user, which is disabled by default after a software
upgrade.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable the read-only user:
web-server read-only-user enable
Example
Switch:1>enable
Switch:1#configure terminal
Display the output of the show web-server command with the ro username enabled:
Switch:1(config)#show web-server
Web Server Info :
Status : on
Secure-only : enabled
TLS-minimum-version : tlsv12
Disable the web server before changing the TLS version. By disabling the web server, other existing
users with a connection to the web server are not affected from changing to a different version after
you run the tls-min-ver command.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Disable the web server:
no web-server enable
3. Set the TLS protocol version:
web-server tls-min-ver [tlsv10 | tlsv11 | tlsv12]
4. Enable the web server:
web-server enable
5. Verify the protocol version:
show web-server
Example
Switch> enable
Switch# configure terminal
Switch(config)# web-server tls-min-ver tlsv12
Switch:1(config)#show web-server
Status : off
Secure-only : enabled
TLS-minimum-version : tlsv12
RO Username Status : disabled
RO Username : user
RO Password : ********
RWA Username : admin
RWA Password : ********
Def-display-rows : 30
Inactivity timeout : 900 sec
Html help tftp source-dir :
HttpPort : 80
HttpsPort : 443
NumHits : 0
NumAccessChecks : 0
NumAccessBlocks : 0
NumRxErrors : 0
NumTxErrors : 0
NumSetRequest : 0
Minimum password length : 8
Last Host Access Blocked : 0.0.0.0
In use certificate : Self signed
Certificate Truspoint CA Name :
Certificate with Subject Name : 823
Ciphers-Tls : TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
Variable Definitions
Use the data in the following table to use the web-server command.
Variable Value
def-display-rows <10-100> Configures the number of rows each page
displays, between 10 and 100.
enable Enables the web interface. To disable the web
server, use the no form of this command:
no web-server [enable]
help-tftp <WORD/0-256> Configures the TFTP or FTP directory for Help
files, in one of the following formats: a.b.c.d:/|
peer:/ [<dir>]. The path can use 0–256 characters.
The following example paths illustrate the correct
format:
• 192.0.2.1:/help
• 192.0.2.1:/
Variable Value
http-port <80-49151> Configures the web server HTTP port. The default
port is 80.
https-port <443-49151> Configure the web server HTTPS port. The default
port is 443.
inactivity-timeout<30–65535> Configures the web-server session inactivity
timeout. The default is 900 seconds (15 minutes).
password {ro | rwa} WORD<1-20> Configures the logon and password for the web
interface.
password min-passwd-len<1–32> Configures the minimum password length. By
default, the minimum password length is 8
characters.
read-only-user Enables read-only user for the web server.
Note:
read-only-user enable is available for
demonstration purposes on some products. For
more information, see VOSS Feature Support
Matrix.
Note:
tlsv10 is not supported in enhanced secure
mode.
• tlsv11 – Configures the version to TLS 1.1.
• tlsv12 – Configures the version to TLS 1.2
The default is tlsv12.
Monitor the switch through a web browser from anywhere on the network. The web interface uses
a 15-minute timeout period. If no activity occurs for 15 minutes, the system logs off the switch web
interface, and you must re-enter the password information.
Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS) support both IPv4
and IPv6 addresses, with no difference in functionality or configuration.
Note
By default the web server is configured with the secure-only option, which requires you to
use HTTPS to access EDM. To access EDM using HTTP, you must disable the secure-only
option. For more information about configuring the secure-only option, see Enable the Web
Management Interface on page 178.
Procedure
Earlier releases used a self-signed certificate generated using the OpenSSL API, and this self-signed
certificate was installed in /inflash/.ssh. The self-signed certificate is now generated with the
Mocana API.
Disable the web server before changing the TLS version. By disabling the web server, other existing
users with a connection to the web server are not affected by changing to a different version.
The switch by default supports version TLS 1.2 and above. You can explicitly configure TLS 1.0 and TLS
1.1 version support.
Procedure
1. In the navigation tree, open the following folders: Configuration > Security > Control Path.
2. Select General and then select Web tab.
3. In the TlsMinimumVersion field, select the TLS version you want to configure as the minimum on the
system.
Name Description
WebRWAUserName Specifies the RWA username from 1–20
characters. The default is admin.
WebRWAUserPassword Specifies the password from 1–32 characters. The
default is 12345678.
Name Description
WebROEnable Enables the web server read-only (RO) user, which
is disabled by default after a software upgrade.
Note:
Exception: not supported on VSP 8600 Series.
Note:
Product Notice: For VSP 8600 Series the web
server RO username must be enabled in CLI.
Name Description
HelpTftp/Ftp_SourceDir Configures the TFTP or FTP directory for Help
files, in one of the following formats: a.b.c.d:/|
peer:/ [<dir>]. The path can use 0–256 characters.
The following example paths illustrate the correct
format:
• 192.0.2.1:/Help
• 192.0.2.1:/
File Transfer Protocol (FTP) and Trivial File Transfer Protocol (TFTP) support both IPv4 and IPv6
addresses, with no difference in functionality or configuration.
Note
If you use File Transfer Protocol (FTP) or Trivial File Transfer Protocol (TFTP), ensure that you
enable the FTP or TFTP server.
Procedure
1. Enter Privileged EXEC mode:
enable
2. Save the running configuration:
save config [backup WORD<1–99>] [file WORD<1–99>] [verbose]
Example
Switch:1> enable
Variable Definitions
Use the data in the following table to use the save config command.
Variable Value
backup WORD<1–99> Saves the specified file name and identifies the file
as a backup file.
WORD
uses one of the following formats:
• a.b.c.d:<file>
• /intflash/<file>
The file name, including the directory structure,
can include up to 99 characters.
file WORD<1–99> Specifies the file name in one of the following
formats:
• a.b.c.d:<file>
• /intflash/<file>
The file name, including the directory structure,
can include up to 99 characters.
verbose Saves the default and current configuration. If
you omit this parameter, the command saves only
parameters you change.
Procedure
Example
Determine the configuration file names, save the configuration files, and copy the files to a safe place.
Switch:1>enable
Switch:1#show boot config choice
choice primary config-file "/intflash/config.cfg"
choice primary backup-config-file "/intflash/config.cfg"
Switch:1#save config
Switch:1#copy /intflash/config.cfg 00:11:f9:5b:10:42/dir/config_backup.cfg
Do you want to continue? (y/n)
y
Reset the platform to reload system parameters from the most recently saved configuration file.
Procedure
Example
Variable Definitions
Use the data in the following table to use the reset command.
Variable Value
-y Suppresses the confirmation message before the
switch resets. If you omit this parameter, you must
confirm the action before the system resets.
Note
A maximum of 6 software releases can be installed on the switch. When the limit is reached,
you are prompted to remove one release before you can proceed with adding and activating a
new software release.
Procedure
1. Enter Privileged EXEC mode:
enable
2. Remove the software build:
software remove WORD<1-99>
Example
Verification
Procedure
1. Enter Privileged EXEC mode:
enable
2. Verify the flags:
show boot config flags
Example
Note
Flag support can vary across hardware models.
Use CLI to verify your installed software. It is important to verify your software version before you place
a device into a production environment.
Procedure
Example
The following is an example of the output of the show software detail command.
Switch:1#show software detail
================================================================================
software releases in /intflash/release/
================================================================================
VSPSwitch.X.X.X.X_GA
MP
UBOOT int009
KERNEL 2.6.32_int29
ROOTFS 2.6.32_int29
APPFS VSPSwitch.X.X.X.X_GA
AVAILABLE ENCRYPTION MODULES
No Modules Added
APPFS VSPSwitch.X.X.X.X_GA
AVAILABLE ENCRYPTION MODULES
No Modules Added
--------------------------------------------------------------------------------
Auto Commit : enabled
Commit Timeout : 10 minutes
Procedure
Example
The following is an example of the output of the show software slot command.
Switch:1#show software slot
==========================================================================================
Software running on chassis
==========================================================================================
Slot Release
---- -------
1 VOSS8600.voss_4.5.0.0int011
2 VOSS8600.voss_4.5.0.0int011
4 VOSS8600.voss_4.5.0.0int011
SF 1 VOSS8600.voss_4.5.0.0int011
SF 2 VOSS8600.voss_4.5.0.0int011
Local alarms are raised and cleared by applications running on the switch. Local alarms are an
automatic mechanism run by the system that do not require any additional user configuration. The
raising and clearing of local alarms also creates a log entry for each event. Check alarms occasionally to
ensure no alarms require additional operator attention.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display local alarms:
show alarm database
Example
Note
The switches that support SF cards display warning messages when SFIs are down.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display log files:
show logging file
Example
--More-- (q = quit)
Note
Unless otherwise stated, to perform the procedures in this section, you must log on to the
Privileged EXEC mode in the CLI. For more information about how to use CLI, see CLI
Procedures on page 253.
Note
The command mode is key for this command. If you are logged on to a different command
mode, such as Global Configuration mode, rather than Privileged EXEC mode, the system
displays different options for this command.
Restart the switch to implement configuration changes or recover from a system failure. When you
restart the system, you can specify the boot config file name. If you do not specify a boot source and
file, the boot command uses the configuration files on the primary boot device defined by the boot
config choice command.
After the switch restarts normally, it sends a cold trap within 45 seconds after the restart.
Procedure
Important
If you enter the boot command with no arguments, you cause the switch to start using
the current boot choices defined by the boot config choice command.
If you enter a boot command and the configuration file name without the directory, the
device uses the configuration file from /intflash/.
Example
Switch:1> enable
Variable Definitions
The following table defines parameters for the boot command.
Variable Value
config WORD<1–99> Specifies the software configuration device and
file name in one of the following formats:
• /intflash/ <file>
The file name, including the directory structure,
can include up to 99 characters.
-y Suppresses the confirmation message before
the switch restarts. If you omit this parameter,
you must confirm the action before the system
restarts.
Reset the platform to reload system parameters from the most recently saved configuration file.
Procedure
Example
Switch:1> enable
Switch:1# reset
Variable Definitions
The following table defines parameters for the reset command.
Variable Value
-y Suppresses the confirmation message before the
switch resets. If you omit this parameter, you must
confirm the action before the system resets.
Caution
Before you unplug the AC power cord, always perform the following shutdown procedure.
This procedure:
• Flushes any pending data to ensure data integrity.
• Ensures the completion of recent configuration save actions, thus preventing the system
from inadvertently booting up with incorrect configuration.
Procedure
3. Before you unplug the power cord, wait until you see the following message:
System Halted, OK to turn off power
Example
Ping commands and traceroute commands execute in Global Router (GRT) context by default. You can
configure ping commands and traceroute commands to execute in management (mgmt) context or in
Virtual Router Forwarding (vrf) context.
Note
This procedure is not supported on VSP 8600 Series.
Procedure
configure terminal
2. Configure the default ping command and traceroute command context:
sys default-ping-context {grt | mgmt | vrf}
Variable Definitions
The following table defines parameters for the sys default-ping-context command.
Variable Value
grt Specifies Global Routing Table (grt) context as the default context for ping
commands and traceroute commands. The default configuration is grt as the
default context.
mgmt Specifies management (mgmt) context as the default context for ping
commands and traceroute commands. The default configuration is grt as
the default context.
vrf Specifies Virtual Router Forwarding (VRF) context as the default context for
ping commands and traceroute commands. The default configuration is grt
as the default context.
Calculate and Verify the MD5 Checksum for a File on the Switch
Perform this procedure to verify that the software files are downloaded properly to the switch. The MD5
checksum for each release is available on the Extreme Networks Support website.
Calculate and verify the MD5 checksum after you download software files.
Procedure
Example
a63a1d911450ef2f034d3d55e576eca0 VSP8200.4.0.0.0.zip
62b457d69cedd44c21c395505dcf4a80 VSP8200v400_HELP_EDM_gzip.zip
Variable Definitions
The following table defines parameters for the file-checksum md5 command:
Variable Value
WORD<1-99> Specifies the file name.
Calculate and Verify the MD5 Checksum for a File on a Client Workstation
Perform this procedure on a Unix or Linux machine to verify that the software files downloaded
properly. The MD5 checksum for each release is available on the Extreme Networks Support website.
Calculate and verify the MD5 checksum after you download software files.
Procedure
1. Calculate the MD5 checksum of the downloaded file:
$ /usr/bin/md5sum <downloaded software-filename>
Typically, downloaded software files are in the form of compressed Unix file archives (.tgz files).
2. Verify the MD5 checksum of the software suite:
$ more <md5–checksum output file>
3. Compare the output that displays on the screen. Ensure that the MD5 checksum of the software
suite matches the system output generated from calculating the MD5 checksum from the
downloaded file.
Example
02c7ee0570a414becf8ebb928b398f51 VSP4K.4.0.40.0.tgz
a04e7c7cef660bb412598574516c548f VSP4000v4040_HELP_EDM_gzip.zip
ac3d9cef0ac2e334cf94799ff0bdd13b VSP4K.4.0.40.0_edoc.tar
29fa2aa4b985b39843d980bb9d242110 VSP4K.4.0.40.0_mib_sup.txt
c5f84beaf2927d937fcbe9dd4d4c7795 VSP4K.4.0.40.0_mib.txt
ce460168411f21abf7ccd8722866574c VSP4K.4.0.40.0_mib.zip
1ed7d4cda8b6f0aaf2cc6d3588395e88 VSP4K.4.0.40.0_modules.tgz
1464f23c99298b80734f8e7fa32e65aa VSP4K.4.0.40.0_OpenSource.zip
945f84cb213f84a33920bf31c091c09f VSP4K.4.0.40.0_oss-notice.html
02c7ee0570a414becf8ebb928b398f51 VSP4K.4.0.40.0.tgz
Perform the following procedure to calculate or comapre the MD5 or SHA512 digest for a specific file.
The file-checksum command calculates the MD5 or SHA512 digest for files on the internal flash and
either shows the output on screen or stores the output in a file that you specify. The file-checksum
command compares the calculated MD5 or SHA512 digest with that in a checksum file on flash, and the
compared output displays on the screen. By verifying the MD5 or SHA512 checksum, you can verify that
the file is transferred properly to the switch.
Important
• If the MD5 key file parameters change, you must remove the old file and create a new file.
• Use the file-checksum command with reserved files (for example, a password file)
only if you possess sufficient permissions to access these files.
Procedure
Example
Variable Definitions
The following table defines parameters for the file-checksum command.
Variable Value
md5 Calculates or compares the MD5 digest for a
specific file.
sha512 Calculates or compares the SHA512 digest for a
specific file.
-a Adds data to the output file instead of overwriting
it.
You cannot use the -a option with the -c option.
Variable Value
-c Compares the checksum of the specified file
with the MD5 checksum present in the checksum
file name. You can specify the checksum file
name using the -f option. If the checksum
filename is not specified, the file /intflash/
checksum.md5 is used for comparison.
If the supplied checksum filename and the default
file are not available on flash, the system displays
the following error message on the switch:
Error: Checksum file <filename> not present.
The -c option also
• calculates the checksum of the specified files
• compares the checksum with all keys in the
checksum file, even if filenames do not match
• displays the output of comparison
Reset system functions to reset all statistics counters on the console port. Depending on your hardware
platform, the console port displays as console or 10101.
Procedure
Example
Switch:1> enable
Variable Definitions
The following table defines parameters for the sys action command.
Variable Value
reset {console|counters} Reinitializes the hardware universal asynchronous receiver
transmitter (UART) drivers. Use this command only if the console
connection does not respond. Resets all the statistics counters in
the switch to zero. Resets the console port.
Sourcing a Configuration
Source a configuration to merge a script file into the running configuration or verify the syntax of a
configuration file.
The source cli command is intended for use with a switch that is running with a factory default
configuration to quick load a pre-existing configuration from a file. If you source a configuration file to
merge that configuration into a running configuration, it can result in operational configuration loss if
the sourced configuration file contains any configuration that has dependencies on or conflicts with the
running configuration. Use the source command to merge smaller portions of a configuration into the
existing configuration.
Not all CLI commands are included in configuration files. Typical examples include, but are not limited
to some operational and security-related commands. Ensure that you understand what configuration
options are included or not included in a configuration file, when you use that file to build new
configurations.
The operational modes in the boot configuration file must be configured for some features (for
example, spbm-config-mode true/false). Before sourcing a configuration file, you need to
configure the boot config flag, save the configuration, and reboot the system. After the reboot,
you can source the configuration file without fail.
Important
Do not source a verbose configuration (verbose.cfg) with the debug stop option. The
sourcing process cannot complete if you use these two options with a verbose configuration.
Procedure
Example
Switch:1> enable
Variable Definitions
The following table defines parameters for the source command.
Variable Value
debug Debugs the script by outputting the configuration
commands to the screen.
stop Stops the sourcing of a configuration if an error
occurs.
syntax Checks the syntax of the configuration file. This
parameter does not load the configuration file;
only verifies the syntax.
If you use this parameter with the stop
parameter (source WORD<1-99> stop
syntax), the output displays on screen and
verification stops if it encounters an error.
If you use this parameter with the debug
parameter (source WORD<1-99> debug
syntax), the output does not stop if it
encounters an error; you must review the on-
screen output to verify if an error exists.
If you use this parameter by itself, it does not
output to the screen or stop on error; it shows an
error message, syntax errors in script,
to indicate if errors exist in the configuration file.
WORD<1–99> Specifies a filename and location in one of the
following format:
• a.b.c.d:<file>
• /intflash/<file>
<file> is a string.
Caution
Always use the usb-stop command to safely unplug the USB drive from the USB slot.
Procedure
Example
Switch:1#save config file /usb/test.cfg
CP-1: Save config to file /usb/test.cfg successful.
WARNING: Choice Primary Node Config file is "/intflash/soak.cfg".
Switch:1#
Switch:1#save log file /usb/test.log
Variable definitions
Variable Value
config file Specifies the software configuration device and configuration file name in one of
WORD<1–99> the following formats:
• a.b.c.d:<file>
• /intflash/<file>
• /usb/<file>
The file name, including the directory structure, can include up to 99 characters.
log file Specifies the software configuration device and log file name in one of the
WORD<1–99> following formats:
• a.b.c.d:<file>
• /intflash/<file>
• /usb/<file>
The file name, including the directory structure, can include up to 99 characters.
Caution
Always use the usb-stop command to safely unplug the USB drive from the USB slot.
• You must have a USB storage device ready to use that is at least 2 GB. The switch supports USB 1
and 2.
The system verifies that the USB flash device has enough available space to perform the backup
operation. If the USB flash device does not have enough available space, the system displays an
error message. The backup command uses the following filepath on the USB flash device: /usb/
intflash/intflashbackup_yyyymmddhhmmss.tgz.
Procedure
1. Enter Privileged EXEC mode:
enable
2. Backup the internal flash to USB:
backup intflash
3. Restore the data to the internal flash:
restore intflash
Example
Switch:1#backup intflash
Warning: Command will backup all data from /intflash to /usb/intflash.
It will take a few minutes and may cause high CPU utilization.
Procedure
Example
Switch:1#enable
Variable Definitions
Variable Value
<destfile> Specifies the name of the configuration or log file when copied to the internal Flash
memory. The destination file name must be lower case and have a file extension of .cfg
or .log. For example, test.cfg or test.log.
The file name, including the directory structure, can include up to 255 characters.
<srcfile> Specifies the name of the configuration or log file on the USB device. For example, test.cfg
or test.log.
The file name, including the directory structure, can include up to 255 characters.
Caution
Always use the usb-stop command to safely unplug the USB drive from the USB slot.
Procedure
Example
Switch:1#enable
Switch:1#more /usb/test.cfg
Variable definitions
Variable Value
WORD<1–99> Specifies the file name in the following format:
• /usb/<file>
The file name, including the directory structure, can include up to 99 characters.
Caution
Always use the usb-stop command to safely unplug the USB drive from the USB slot.
Procedure
Example
Switch:1#enable
Switch:1#mv /intflash/test.cfg /usb/test.cfg
Switch:1#enable
Switch:1#mv /usb/test.cfg /intflash/test.cfg
Variable Definitions
Variable Value
<destfile> Specifies the name of the configuration or log file when moved to the USB device. The
destination file name must be lower case and have a file extension of .cfg or .log. For
example, test.cfg or test.log.
The file name, including the directory structure, can include up to 255 characters.
<srcfile> Specifies the name of the configuration or log file on the internal flash memory. For
example, test.cfg or test.log.
The file name, including the directory structure, can include up to 255 characters.
Caution
Always use the usb-stop command to safely unplug the USB drive from the USB slot.
Procedure
Example
Switch:1#enable
Switch:1#delete /usb/test.cfg
Are you sure (y/n) ? y
Variable Definitions
Variable Value
WORD<1–255> Specifies the file name in the following format:
• /usb/<file>
Table 26: ExtremeCloud IQ ‑ Site Engine backup configuration ZIP file product support
Feature Product Release introduced
ExtremeCloud IQ ‑ Site Engine VSP 4450 Series VOSS 6.1.2
backup configuration ZIP file
For more information, see VSP 4900 Series VOSS 8.1
ExtremeCloud IQ ‑ Site Engine VSP 7200 Series VOSS 6.1.2
documentation.
VSP 7400 Series VOSS 8.0
VSP 8200 Series VOSS 6.1.2
VSP 8400 Series VOSS 6.1.2
VSP 8600 Series VSP 8600 6.1
XA1400 Series VOSS 8.0.50
ExtremeCloud IQ ‑ Site Engine has a configuration backup feature with a requirement to be able to
backup configuration related files.
Note
License files are not backed up.
Important
Only the RWA user can use the backup command.
Procedure
Example
Switch:1>enable
Switch:1#backup configure /intflash/backup02072018
Important
This must be done after the original unit has been completely removed or isolated from
the SPBM topology.
Procedure
Example
Switch:1>enable
Switch:1#restore configure /intflash/backup02072018.tgz
Warning: Command will restore your backup setup and access files
The current files will be overwritten.
Procedure
Perform this procedure to show the MTU configured for the system.
Procedure
After you change the configuration, you must save the changes on the device. Save the configuration to
a file to retain the configuration settings.
Note
When you logout of the EDM interface, a dialog box automatically prompts if you want to
save the configuration. If you want to save the configuration, click OK. If you want to close
without saving the configuration, click Cancel. If you no longer see the prompt, clear your
browser cache, restart your browser and reconnect.
Procedure
Modify the boot sequence to prevent the switch from using the factory default settings or, conversely,
to prevent loading a saved configuration file.
Procedure
configure terminal
2. Bypass the loading of the switch configuration file and load the factory defaults:
boot config flags factorydefaults
3. Use a configuration file and not the factory defaults:
no boot config flags factorydefaults
Important
If the switch fails to read and load a saved configuration file after it starts, check the log
file to see if the log file indicates that the factorydefaults setting was enabled, before you
investigate other options.
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#boot config flags factorydefaults
Configure the remote host logon to modify parameters for FTP and TFTP access. The defaults enable
TFTP transfers. If you want to use FTP as the transfer mechanism, you need to change the password to
a non-null value.
Important
tftp-debug should be used exclusively to transfer small files less than 1MB in size. Using it for
larger files might cause unwanted behavior, such as transfer failure.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Define conditions for the remote host logon:
boot config host {ftp-debug|password WORD<0–16>|tftp-debug|tftp-hash|
tftp-rexmit <1–120>|tftp-timeout <1–120>|user WORD<0–16>}
3. Save the changed configuration.
Example
Switch:1> enable
Change the primary or secondary boot configuration file to specify which configuration file the system
uses to start.
You have a primary configuration file that specifies the full directory path and a secondary configuration
file that also contains the full directory path.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Change the primary boot choice:
boot config choice primary {backup-config-file|config-file} WORD<0–
255>
3. Save the changed configuration.
4. Restart the switch.
Example
Switch:1> enable
Specify the configuration file in internal flash memory as the primary boot source:
Switch:1(config)# reset
Variable Definitions
The following table defines parameters for the boot config command.
Variable Value
{backup-config-file| Specifies that the boot source uses either the configuration file or
config-file} a backup configuration file.
WORD<0–255> Identifies the configuration file. WORD<0–255> is the device and
file name, up to 255 characters including the path, in one of the
following format:
• a.b.c.d:<file>
• /usb/<file>
• /intflash/<file>
To set this option to the default value, use the default operator
with the command.
Important
After you change certain configuration parameters using the boot config flags
command, you must save the changes to the configuration file.
Configure the boot flags to enable specific services and functions for the chassis.
Note
Flag support can vary across hardware models.
Procedure
configure terminal
2. Enable boot config flag(s) on the switch using the boot config flags command.
Enable the following flags, as needed:
• advanced-feature-bandwidth-reservation [low | high]
• block-snmp
• debug-config [file
• debugmode
• dvr-leaf-mode
• enhancedsecure-mode <jitc|non-jitc>
• factorydefaults
• flow-control-mode
• ftpd
• ha-cpu
• hsecure
• ipv6-egress-filter
• ipv6–mode
• linerate-directed-broadcast
• logging
• nni-mstp
• reboot
• rlogind
• savetostandby
• spanning-tree-mode <mstp|rstp>
• spbm-config-mode
• sshd
• syslog-rfc5424-format
• telnetd
• tftpd
• trace-logging
• urpf-mode
• verify-config
• vrf-scaling
• vxlan-gw-full-interworking-mode
3. Save the changed configuration.
4. Restart the switch.
Example
Switch:1(config)#save config
Switch:1(config)#reset
Variable Definitions
The following table defines parameters for the boot config flags command.
Variable Value
advanced-feature-bandwidth- Enables the switch to support advanced features
reservation [low | high ] by reserving ports as loopback ports. When
disabled, you can use all ports on the switch, but
Note: advanced features do not work.
Exception: only supported on VSP 7400 Series The default is enabled with low level.
and XA1480. • The high level means that the switch reserves
the maximum bandwidth for the advanced
features.
• The low level means that the switch
reserves less bandwidth to support minimum
functionality for advanced features.
If you change this parameter, you must restart the
switch.
block-snmp Activates or disables Simple Network
Management Protocol management. The default
value is false (disabled), which permits SNMP
access.
debug-config [console] | [file] Enables you to debug the configuration file during
loading configuration at system boot up. The
default is disabled. You do not have to restart
the switch after you enable debug-config, unless
you want to immediately debug the configuration.
After you enable debug-config and save the
configuration, the debug output either displays on
the console or logs to an output file the next time
the switch reboots.
The options are:
• debug-config [console]—Displays the line-by-
line configuration file processing and result of
the execution on the console while the device
loads the configuration file.
• debug-config [file]— Logs the line-by-line
configuration file processing and result of
the execution to the debug file while
the device loads the configuration file.
The system logs the debug config output
to /intflash/debugconfig_primary.txt for the
primary configuration file. The system
logs the debug config output to /intflash/
debugconfig_backup.txt for the backup
configuration, if the backup configuration file
loads.
Variable Value
debugmode Enables a TRACE on any port by prompting the
selection on the console during boot up. This
allows the user start trace for debugging earlier
on specified port. Works on console connection
only. The default is disabled.
Important:
Do not change this parameter unless directed by
technical support.
Note:
As a best practice, enable the enhanced secure
mode in the non-JITC sub-mode, because the
JITC sub-mode is more restrictive and prevents
the use of some CLI commands that are
commonly used for troubleshooting.
Note:
The factorydefaults flag deletes the runtime,
primary and backup configuration files, local
password files, authentication keys, and
certificates. After a factory default, you must
change the password on first login.
Variable Value
flow-control-mode Enables or disables flow control globally. When
disabled, the system does not generate nor
Note: configure the transmission of flow control
Exception: not supported on VSP 8600 Series. messages. The system always honors received
flow control messages regardless of the flow
control mode status. You must enable this mode
before you configure an interface to send pause
frames.
The default is disabled.
ftpd Activates or disables the FTP server on the switch.
The default value is disabled. To enable FTP,
ensure that the tftpd flag is disabled.
ha-cpu Activates or disables High Availability-CPU (HA-
CPU) mode. Switches with two CPUs use HA
Note: mode to recover quickly from a failure of one of
Exception: only supported on VSP 8600 Series. the CPUs.
If you enable or disable HA mode, the secondary
CPU resets automatically to load settings from the
saved configuration file.
hsecure Activates or disables High Secure mode.
The hsecure command provides the following
password behavior:
• 10 character enforcement
• The password must contain a minimum of 2
uppercase characters, 2 lowercase characters,
2 numbers, and 2 special characters.
• Aging time
• Failed login attempt limitation
The default value is disabled. If you enable High
Secure mode, you must restart the switch to
enforce secure passwords. If you operate the
switch in High Secure mode, the switch prompts
a password change if you enter invalid-length
passwords.
ipv6-egress-filter Enables IPv6 egress filters. The default is disabled.
If you change this parameter, you must restart the
Note: switch.
Exception: not supported on VSP 8600 Series and
XA1400 Series.
Note:
Exception: not supported on VSP 4450 Series, VSP
8600 Series, and XA1400 Series.
Variable Value
linerate-directed-broadcast {true | Enables or disables support for IP Directed
false} Broadcast in hardware without requiring CPU
intervention. Setting this boot flag will put port
Note: 1/46 into loopback mode, making it unusable
Exception: only supported on VSP 4450 Series. for external connections, so you need to move
any existing connections on this port first. After
setting this boot flag, save the configuration, and
then restart the switch.
The default value is disabled.
Important:
The software cannot be upgraded or downgraded
to a software release that does not contain this
directed broadcast hardware assist functionality
without first disabling this feature and saving the
configuration.
Important:
Do not change this parameter unless directed by
technical support.
Variable Value
rlogind Activates or disables the rlogin and rsh server. The
default value is disabled.
Note:
Exception: rlogin and rsh are only supported on
VSP 8600 Series.
Important:
Do not change this parameter unless directed by
technical support.
Variable Value
verify-config Activates syntax checking of the configuration file.
The default is enabled.
• Primary config behavior: When the
verifyconfig flag is enabled, the primary config
file is pre-checked for syntax errors. If the
system finds an error, the primary config file
is not loaded, instead the system loads the
backup config file.
Important:
If you enable both this flag and the spbmconfig-
mode flag, the switch reduces the number of
configurable VLANs. For more information about
maximum scaling numbers, see VOSS Release
Notes.
Specify the primary CPU to designate which CPU becomes the primary after the switch performs a full
power cycle. This procedure applies only to hardware with two CPUs.
Configure the standby delay to set the number of seconds a standby CPU waits before trying to
become the primary CPU. The standby delay applies when two CP modules boot at the same time. The
designated standby CP waits for the configured number of seconds before attempting to assert itself as
the primary. Only one CP can be the primary in a chassis.
Caution
If you configure the standby delay to too short a value, the configured standby CP can
become a primary. If you configure the standby delay to too long, it can delay the standby CP
asserting itself and continue booting when the designated CP is inserted, but fails booting.
Procedure
configure terminal
2. View the current configuration for the primary CPU:
show boot config master
3. Specify the slot of the primary CPU:
boot config master <1–2>
4. Save the changed configuration.
5. Configure the number of seconds a standby CPU waits before trying to become the primary CPU:
boot config delay <0–255>
6. Save the changed configuration.
7. Restart the switch.
Example
Switch:1>enable
Switch:1#configure terminal
Specify the number of seconds a standby CPU waits before trying to become the primary CPU:
Switch:1(config)# boot config delay 30
Switch:1(config)# save config
Switch:1(config)# reset
Variable Definitions
The following table defines parameters for the boot config master command.
Variable Value
<1–2> Specifies the slot number, either 1 or 2, for the
primary CPU. The default value is slot 1.
Product Notice: For VSP 7400 Series, you must ensure your configuration does not include reserved
ports before you enable this feature. If the configuration includes reserved ports after you enable this
feature and restart the switch, the switch stops loading the configuration.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable the boot flag:
boot config flags advanced-feature-bandwidth-reservation [low | high]
3. Save the configuration, and then reboot the switch.
Important
A change to the advanced-feature-bandwidth-reservation boot flag requires a reboot for
the change to take effect.
Note
This step only applies to VSP 7400 Series.
Example
Procedure
Example
Switch#show sys-info
General Info :
Display the configuration to view current or changed settings for the boot parameters.
Procedure
Example
Show the current boot configuration. (If you omit verbose, the system only displays the values that you
changed from their default value.):
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Variable Definitions
The following table defines parameters for the show boot config command.
Variable Value
choice Shows the current boot configuration choices.
flags Shows the current flag settings.
general Shows system information.
host Shows the current host configuration.
master Shows the master information.
running-config Shows the current boot configuration.
[verbose] If you use verbose, the system displays all possible information. If you
omit verbose, the system displays only the values that you changed
from their default value.
sio Specifies the current configuration of the serial ports.
Procedure
configure terminal
Example
Switch:1>enable
Switch:1#config terminal
Switch:1(config)#show boot config sio
sio console baud 115200 2
sio console baud 115200 5
sio console baud 115200 8
sio console baud 115200 SF1
sio console baud 115200 SF3
Configure the baud rate to 9600 for the console port in IOC module slot 2:
Switch:1(config)#boot config sio console baud 9600 2
Switch:1(config)#show boot config sio
sio console baud 9600 2
sio console baud 115200 5
sio console baud 115200 8
sio console baud 115200 SF1
sio console baud 115200 SF3
Variable Definitions
The following table defines parameters for the boot config sio console command.
Variable Value
baud <9600–115200> Configures the baud rate for the port from one of the following:
• 9600
• 19200
• 38400
• 57600
• 115200
The default value differs depending on hardware platform:
• VSP 4450 Series — 9600
• VSP 4900 Series — 115200
• VSP 7200 Series — 9600
• VSP 7400 Series — 115200
• VSP 8200 Series — 9600
• VSP 8400 Series — 9600
• VSP 8600 Series — 115200
• XA1400 Series — 115200
<1–8> | <SF1–SF3> Configures the individual console baud rate for the IOC modules in
slots 1 through 8 or the switch fabric (SF) modules in slots SF1 through
Note: SF3.
Exception: only supported on
VSP 8600 Series.
Configure the time zone to use an internal system clock to maintain accurate time. The time zone data
in Linux includes daylight changes for all time zones up to the year 2038. You do not need to configure
daylight savings.
Important
In October 2014, the government of Russia moved Moscow from UTC+4 into the UTC+3 time
zone with no daylight savings.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Configure the time zone by using the following command:
clock time-zone WORD<1–10> WORD<1–20> WORD<1–20>
Example
Configure the system to use the time zone data file for Vevay:
Variable Definitions
The following table defines parameters for the clock time-zone command.
Variable Value
WORD<1–10> Specifies a directory name or a time zone name in /usr/share/zoneinfo,
for example, Africa, Australia, Antarctica, or US. To see a list of options,
enter
clock time-zone
at the command prompt without variables.
WORD<1–20> WORD<1– The first instance of WORD<1–20> is the area within the timezone. The
20> value represents a time zone data file in /usr/share/zoneinfo/
WORD<1–10>/, for example, Shanghai in Asia.
The second instance of WORD<1–20>is the subarea. The value
represents a time zone data file in /usr/share/zoneinfo/
WORD<1–10>/WORD<1–20>/, for example, Vevay in America/Indiana.
To see a list of options, enter clock time-zone at the command
prompt without variables.
Configure the run-time environment to define generic configuration settings for CLI sessions.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Change the login prompt:
login-message WORD<1-1513>
3. Change the password prompt:
passwordprompt WORD<1-1510>
4. Configure the number of supported rlogin sessions:
max-logins <0-8>
Note
This step only applies to VSP 8600 Series.
6. Configure the idle timeout period before automatic logoff for CLI and Telnet sessions:
cli timeout <30-65535>
7. Configure the number of lines in the output display:
terminal length <8–64>
8. Configure scrolling for the output display:
terminal more <disable|enable>
Example
Switch:1>enable
Switch:#configure terminal
Use the default option to enable use of the default logon string:
Switch:(config)#default login-message
Use the default option before this parameter to enable use of the default string:
Switch:(config)#default passwordprompt
Switch:(config)#max-logins 5
Switch:(config)#telnet-access sessions 8
Configure the timeout value, in seconds, to wait for a Telnet or CLI login session before terminating the
connection:
Switch:(config)#cli timeout 900
Configure the number of lines in the output display for the current session:
Switch:(config)#terminal length 30
Variable Definitions
The following table defines parameters for the login-message command.
Variable Value
WORD<1-1513> Changes the CLI logon prompt.
• WORD<1-1513> is an American Standard Code for
Information Interchange (ASCII) string from 1–1513
characters.
• Use the default option before this parameter,
default login-message, to enable use of the
default logon string.
• Use the no operator before this parameter, no
login-message, to disable the default logon
banner and display the new banner.
Use the data in the following table to use the passwordprompt command.
Variable Value
WORD<1-1510> Changes the CLI password prompt.
• WORD<1-1510> is an ASCII string from 1–1510
characters.
• Use the default option before this parameter,
default passwordprompt, to enable using the
default string.
• Use the no operator before this parameter, no
passwordprompt, to disable the default string.
Use the data in the following table to use the max-logins command.
Variable Value
<0-8> Configures the allowable number of inbound remote
CLI logon sessions. The default value is 8.
Note:
Exception: only supported on VSP 8600
Series.
Use the data in the following table to use the telnet-access sessions command.
Variable Value
<0-8> Configures the allowable number of inbound Telnet
sessions. The default value is 8.
Use the data in the following table to use the cli time-out command.
Variable Value
<30-65535> Configures the timeout value, in seconds, to wait for
a Telnet or CLI login session before terminating the
connection.
Use the data in the following table to use the terminal command.
Variable Value
<8–64> Configures the number of lines in the output display
for the current session. To configure this option to
the default value, use thedefault operator with the
command. The default is value 23.
disable|enable Configures scrolling for the output display. The default
is enabled. Use the no operator to remove this
configuration. To configure this option to the default
value, use the default operator with the command.
no
Use CLI logging to track all CLI commands executed and for fault management purposes. The CLI
commands are logged to the system log file as CLILOG module.
Note
The platform logs CLILOG and SNMPLOG as INFO. Normally, if you configure the logging
level to WARNING, the system skips all INFO messages. However, if you enable CLILOG and
SNMPLOG the system logs CLI Log and SNMP Log information regardless of the logging level
you set. This is not the case for other INFO messages.
Procedure
configure terminal
2. Enable CLI logging:
clilog enable
3. Disable CLI logging:
no clilog enable
4. Ensure that the configuration is correct:
show clilog
5. View the CLI log:
show logging file module clilog
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#clilog enable
Variable Definitions
The following table defines parameters for the clilog commands.
Variable Value
enable Activates CLI logging. To disable, use the no clilog
enable command.
Configure individual system-level switch parameters to configure global options for the switch.
Procedure
configure terminal
2. Change the system name:
sys name WORD<0–255>
3. Enable support for Jumbo frames:
sys mtu <1522-9600>
4. Enable the User Datagram Protocol (UDP) checksum calculation:
udp checksum
Example
Switch:1> enable
Configure the system, or root level, prompt name for the switch:
Variable Definitions
The following table defines parameters for the sys command.
Variable Value
clipId-topology-ip Configures the topology ip from the available CLIP.
WORD<1-256>specifies the Circuitless IP interface id.
Note:
Exception: Only supported on VSP 8600
Series
Configure system message control to suppress duplicate error messages on the console, and to
determine the action to take if they occur.
Procedure
configure terminal
2. Configure system message control action:
sys msg-control action <both|send-trap|suppress-msg>
3. Configure the maximum number of messages:
sys msg-control max-msg-num <2-500>
Example
Switch:1> enable
Configure system message control to suppress duplicate error messages on the console and send a trap
notification:
Configure the number of occurrences of a message after which the control action occurs:
Variable Definitions
The following table defines parameters for the sys msg-control command.
Variable Value
action <both|send-trap| Configures the message control action. You can either
suppress-msg> suppress the message or send a trap notification, or both.
The default is suppress.
control-interval <1-30> Configures the message control interval in minutes. The valid
options are 1–30. The default is 5.
max-msg-num <2-500> Configures the number of occurrences of a message after
which the control action occurs. To configure the maximum
number of occurrences, enter a value from 2–500. The
default is 5.
Use the force message control option to extend the message control feature functionality to the
software and hardware log messages.
To enable the message control feature, you must specify an action, control interval, and maximum
message number. After you enable the feature, the log messages, which get repeated and cross the
maximum message number in the control interval, trigger the force message feature. You can either
suppress the message or send a trap notification, or both.
Procedure
configure terminal
2. Configure the force message control option:
sys force-msg WORD<4-4>
Example
Switch:1> enable
Configure the force message control option. (If you specify the wildcard pattern (****), then all
messages undergo message control:
Variable Definitions
The following table defines parameters for the sys force-msg command.
Variable Value
WORD<4-4> Adds a forced message control pattern, where
WORD<4-4> is a string of 4 characters. You can add a
four-byte pattern into the force-msg table. The software
and the hardware log messages that use the first four
bytes that match one of the patterns in the force-msg
table undergo the configured message control action.
You can specify up to 32 different patterns in the force-
msg table, including a wildcard pattern (****) as well. If
you specify the wildcard pattern, all messages undergo
message control.
Enable and configure polling intervals to determine how frequently EDM polls for port and LED status
changes or detects the hot swap of installed ports.
Procedure
Name Description
Enable Enables polling for port and LED status changes.
The default is disabled.
Poll Interval Specifies the polling interval, if enabled. The
default is 60 seconds.
Enable Detects the hot swap of installed ports. The
default is disabled.
Detection per Status Poll Intervals Specifies the number of poll intervals for
detection, if enabled. The default is 2 intervals.
This command is not available for hardware platforms with fixed configurations. It is only available for
platforms where the user can install modules in slots.
Procedure
Name Description
CardType Displays the model number of the module.
CardDescription Shows a description of the installed module.
SerialNum Shows the serial number for the installed module.
PartNumber Shows the part number.
CardAssemblyDate Shows the date the module was assembled.
Name Description
CardHWConfig Shows the hardware revision.
AdminStatus Changes the administrative status for the module.
OperStatus Shows the operational status for the module.
PowerManagementPriority Specifies the slot priority for power management as either
high or low.
You cannot perform this procedure on hardware platforms with fixed configurations. It is only available
for platforms where you can install modules in slots.
Procedure
Name Description
IntflashBytesUsed Specifies the number of bytes used in internal flash memory.
IntflashBytesFree Specifies the number of bytes available for use in internal flash
memory.
IntflashNumFiles Specifies the number of files in internal flash memory.
UsbBytesUsed Specifies the number of bytes used in USB device.
UsbBytesFree Specifies the number of bytes available for use in USB device.
UsbNumFiles Specifies the number of files in USB device.
Procedure
Name Description
Id Specifies the ID number.
This field is not supported on all hardware platforms.
Type Describes the type of power used.
Description Provides a description of the power supply.
SerialNumber Specifies the power supply serial number.
HardwareRevision Specifies the hardware revision number.
PartNumber Specifies the power supply part number.
PowerSupplyOperStatus Specifies the status of the power supply as one of the
following:
• on (up)
• off (down)
Perform this procedure to view information about the operating status of the power supplies.
Procedure
Name Description
Id Specifies the ID number.
This field is not supported on all hardware platforms.
Type Describes the type of power used.
Description Provides a description of the power supply.
SerialNumber Specifies the power supply serial number.
HardwareRevision Specifies the hardware revision number.
PartNumber Specifies the power supply part number.
PowerSupplyOperStatus Specifies the status of the power supply as one of the
following:
• on (up)
• off (down)
The system triggers an alarm when one of the zones exceeds the threshold temperature value.
Note
This procedure is not supported on XA1400 Series.
Procedure
Name Description
SensorIndex Specifies the range of sensors on the device.
SensorDescription Specifies the name of the sensor.
Temperature (degrees celsius) Specifies the sensor temperature measured in
Celsius degrees.
WarningThreshold Specifies the temperature value of the warning
threshold for the sensor. When the temperature
crosses the warning threshold a warning message
is generated.
CriticalThreshold Species the temperature value of the critical
threshold for the sensor. When the temperature
crosses the critical threshold, a critical message is
generated or the system shuts down, depending
on hardware capability.
Status Specifies the current temperature status based on
the warning and critical thresholds.
Note
This procedure only applies to the VSP 8600 Series.
The system triggers an alarm when one of the zones exceeds the threshold temperature value, and
clears the alarm after the zone temperature falls below the threshold value.
When an elevated temperature triggers a temperature alarm, the fan speed increases, and the LED
color changes on the front panel of the switch.
Procedure
Name Description
CpuTemperature Current CPU temperature in Celsius.
MacTemperature Current MAC component temperature in Celsius.
Phy1Temperature Current PHY 1 component temperature in Celsius.
This field does not apply on all hardware
platforms.
Phy2Temperature Current PHY 2 component temperature in Celsius.
This field does not apply on all hardware
platforms.
For information about specific commands, see VOSS CLI Commands Reference.
CLI is an industry standard command line interface that you can use for single-device management.
There are two categories of CLI commands: show commands and configuration commands. You can
use show commands from multiple command modes with the same results; they show the same
configuration information regardless of the command mode. Configuration command results, however,
might be dependent on the command mode from which a configuration command is used. For
example, an enable command used in Global Configuration mode will enable a feature globally for all
devices, and the same command used from one of the interface command modes will enable a feature
for a specific interface only.
The following figure illustrates the navigation paths for the various command modes:
User EXEC
Privileged EXEC
Global
Configuration
MKA Profile
Configuration
To navigate from higher-level modes to lower-level modes, use the following commands:
• exit to navigate from a higher-level mode to a lower-level mode, down to Privileged EXEC mode
• end to navigate from any command mode directly to Privileged EXEC mode
• disable to navigate from Privileged EXEC mode to User EXEC mode
• logout to terminate the CLI session from any command mode
The following table describes the various command modes, including the CLI command to access each
mode, the command prompt that displays in each mode, and a description of the purpose of the mode.
Note
Some command modes are hardware dependent. If any of the following commands modes
do not display on your hardware, they are not supported or applicable.
Note:
Depending on feature configuration, you can be prompted to enter a
username and password to access Privileged EXEC mode. For more
information, see Authentication for Privileged EXEC Command Mode on
page 253.
Note
Special CLI command modes are hardware dependent. If they do not display on your
hardware, they are not supported or applicable.
You can create up to a maximum of 10 CLI users for each role. For more information, see Multiple CLI
Users for Each Role on page 3318.
If you enable enhanced secure mode, the user names and passwords are different than the default
values documented in the preceding table. For more information on enhanced secure mode, see
Enhanced Secure Mode on page 3319.
Important
The default passwords and community strings are documented and well known. As a best
practice, change the default passwords and community strings immediately after you first log
on. For more information about how to change user names and passwords, see Security on
page 2993.
Command completion
The CLI provides potential command completions to the command string. Completions are provided by
using a question mark (?) or by using the CLI autocompletion feature.
? command completion
The ? command completion is available for any valid command. By typing a command and using a ? as
the last argument in the command, the system returns a list of possible command completions from the
point of the ?. A short description is provided with each possible completion.
You must use one of the available completions, and if necessary, use the command completion help
again to find the next completion.
Switch:1(config-isis)#redistribute direct ?
enable Enable isis redistribute direct command
metric Isis route redistribute metric
metric-type Set isis redistribute metric type
route-map Set isis redistribute direct route-policy
subnets Set isis redistribute subnets
<cr>
When you see <cr> (Carriage Return/Enter Key) in the list with the additional choices, this means that
no additional parameters are required to execute the CLI command. However, the additional choices
listed could be peer commands or sub-context commands.
For example, the parameters listed under redistribute direct ? are peer commands. You can
enter these peer commands on the same line as the root command, for example redistribute
direct enable. However, the <cr> indicates that you can also enter the redistribute direct
command only and this command does not require any additional parameters at this level.
CLI autocompletion
CLI autocompletion is a feature that you can use to automatically fill in the unique parts of a command
string rather than typing the entire command. Autcompletion makes the CLI experience easier and
prevents mistakes in spelling that force you to re-enter the command.
The Tab key autocompletes the command without executing the command, and places the cursor
immediately after the last character. The Enter key autocompletes the command and executes it.
When you use redistribute ?, you see four possible sub-context commands.
direct
static
ospf
rip
and press the Tab key, the system completes the command to the following point:
redistribute direct metric
Two possible completions exist. You can type -t, and then press Tab to finish the command:
Switch:1(config-isis)#redistribute direct metric-type
Use the ? command completion along with the default keyword in each configuration mode, to view the
list of commands that support the default operator. For more information, see Command completion on
page 248.
Examples
Configure csnp-interval to its default value. The default value of csnp-interval is 10 seconds.
Switch:1>show isis
========================================================================================
ISIS General Info
========================================================================================
AdminState : disabled
RouterType : Level 1
System ID : e45d.523c.6484
Max LSP Gen Interval : 900
Metric : wide
Overload-on-startup : 20
Overload : false
Csnp Interval : 200
PSNP Interval : 2
Rxmt LSP Interval : 5
spf-delay : 100
Router Name :
ip source-address :
ipv6 source-address :
ip tunnel source-address :
Tunnel vrf :
ip tunnel mtu :
Num of Interfaces : 1
Num of Area Addresses : 0
Inband Mgmt Clip Ip :
backbone : disabled
Dynamically Learned Area : 00.0000.0000
Hello Padding : enabled
FAN Member : Yes
Multi-Area OperState : disabled
Multi-Area Flags :
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#router isis
Switch:1(config-isis)#default csnp-interval
Switch:1(config-isis)#show isis
========================================================================================
ISIS General Info
========================================================================================
AdminState : disabled
RouterType : Level 1
System ID : e45d.523c.6484
Max LSP Gen Interval : 900
Metric : wide
Overload-on-startup : 20
Overload : false
Csnp Interval : 10
PSNP Interval : 2
Rxmt LSP Interval : 5
spf-delay : 100
Router Name :
ip source-address :
ipv6 source-address :
ip tunnel source-address :
Tunnel vrf :
ip tunnel mtu :
Num of Interfaces : 1
Num of Area Addresses : 0
Inband Mgmt Clip Ip :
backbone : disabled
Dynamically Learned Area : 00.0000.0000
Hello Padding : enabled
FAN Member : Yes
Multi-Area OperState : disabled
Multi-Area Flags :
View the IP configuration commands for an MLT interface that support the default operator.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#interface mlt 1
Switch:1(config-mlt)#default ?
Default settings
fa Set Fabric Attach configuration to default on mlt
flex-uni Set flex-uni to default on mlt interface
ip Default IP configurations on MTL interface
isis Set interface level isis parameters to default value
lacp Set lacp for specific mlt to default
smlt Create default smlt on a specific mlt
svlan-prototype Set vlan port type to default
virtual-ist Create virtual-ist on MLT with default value
Switch:1(config-mlt)#default ip ?
Default IP configurations on MLT interface
arp-inspection Default arp inspection configuration
dhcp-snooping Default dhcp snooping configuration
Switch:1(config-mlt)#default ip arp-inspection ?
<cr>
no command operator
You can use the no operator in a command to negate a configuration. Based on the functionality
of the command, you can perform negations, such as disable, delete, remove, or reset to the
default configuration. For more information about the no operator for each command, see VOSS CLI
Commands Reference.
Use the ? command completion along with the no keyword to view the list of commands that support
the no operator in each configuration mode. For more information, see Command completion on page
248.
Negate the automatic virtual link that provides automatic dynamic backup link for OSPF traffic.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#router ospf
Switch:1(config-ospf)#no auto-vlink
View the commands that can negate a configuration in RIP router configuration mode.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#router rip
Switch:1(config-rip)#no ?
Negate a command or set its defaults
ipv6 Disable ipv6 configurations
network Disable rip on an ip network
redistribute To disable/delete redistribute golbally
Switch:1(config-rip)#no network ?
{A.B.C.D} Network ip address
Switch:1(config-rip)#no network 192.0.2.4 ?
<cr>
Enter the show command followed by the pipe (|) character, followed by the GREP filter command. The
show command output contains only the lines that match the GREP filter pattern.
Note
The show fulltech command does not support GREP filters.
====================================================================================
ALARM STATISTICS
====================================================================================
PERSISTENT PERSISTENT PERSISTENT PERSISTENT DYNAMIC DYNAMIC DYNAMIC DYNAMIC
ALARM ACTIVE CLEARED WRPRD ALARM ACTIVE CLEARED WRPRD
0 0 0 0 11 8 3 0
For enhanced security, you can request user authentication to enter Privileged EXEC command mode.
When you configure password authentication, the switch prompts you to enter a username and
password to access Privileged EXEC command mode from User EXEC command mode. You use the
same username and password used to Telnet or SSH to the switch.
For more information about configuring Privileged EXEC authentication, see Authentication for
Privileged EXEC Command Mode on page 3000.
CLI Procedures
This section contains information about common CLI tasks. You can access CLI during runtime to
manage the switch.
After you first connect to CLI you can log on to the software using the default user name and password.
For more information about the default user names and passwords, see Default User Names and
Passwords for CLI on page 247.
Procedure
1. At the login prompt, enter the user name.
2. At the password prompt, enter the password.
Procedure
1. Enter Privileged EXEC mode:
enable
2. View the running configuration:
show running-config
Example
VSP-8284XSQ:1#show running-config
Preparing to Display Configuration...
#
# Sat Mar 13 14:35:01 2021 UTC
# box type : VSP-8284XSQ
# software version : 8.4.0.0
# cli mode : ECLI
#
#Card Info :
# Slot 1 :
# CardType : 8242XSQ
# CardDescription : 8242XSQ
# CardSerial# : 14JP455C1029
# CardPart# : EC8200A01-E6
# CardAssemblyDate : 20141106
# CardHWRevision : 1
# CardHWConfig :
# AdminStatus : up
# OperStatus : up
# Slot 2 :
# CardType : 8242XSQ
# CardDescription : 8242XSQ
# CardSerial# : 14JP455C1029
# CardPart# : EC8200A01-E6
# CardAssemblyDate : 20141106
# CardHWRevision : 1
# CardHWConfig :
# AdminStatus : up
# OperStatus : up
#
#!end
#
config terminal
#
# BOOT CONFIGURATION
#
File Transfer Protocol (FTP) and Trivial File Transfer Protocol (TFTP) support both IPv4 and IPv6
addresses, with no difference in functionality or configuration.
Procedure
Example
Identify the file as a backup file and designate a location to save the file:
Switch:1#save config backup 198.51.100.1/configs/backup.cfg
Variable definitions
Use the data in the following table to use the save config command.
Variable Value
backup WORD<1–99> Saves the specified file name and identifies the file
as a backup file.
WORD<1–99> uses one of the following formats:
• a.b.c.d:<file>
• /intflash/<file>
The file name, including the directory structure, up
to 1 to 99 characters.
file WORD<1–99> Specifies the file name in one of the following
formats:
• /intflash/<file>
• a.b.c.d:<file>
The file name, including the directory structure, up
to 1 to 99 characters.
verbose Saves the default and current configuration. If
you omit this parameter, the command saves only
parameters you change.
standby WORD<1-99> Specifies the standby file name in the following
format:
• /intflash/<file>
The file name, including the directory structure, up
to 1 to 99 characters.
Perform this procedure to enable and manage the web server using the Command Line Interface (CLI).
After you enable the web server, you can connect to EDM.
HTTP and FTP support both IPv4 and IPv6 addresses, with no difference in functionality or
configuration. The TFTP server supports both IPv4 and IPv6 addresses. The TFTP client is not
supported, only the server.
This procedure assumes that you use the default port assignments. You can change the port number
used for HTTP and HTTPS.
Important
To enable HTTP access to the device, you must disable the web server secure-only option. To
enable HTTPS access to the device, the web server secure-only option is enabled by default.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable the web server:
web-server enable
3. Disable the secure-only option (for HTTP access) :
no web-server secure-only
4. Enable the secure-only option (for HTTPs access) :
web-server secure-only
5. Enable read-only user:
web-server read-only-user enable
6. Display the web server status:
show web-server
Example
Switch:1(config)#show web-server
Web Server Info :
Status : off
Secure-only : enabled
TLS-minimum-version : tlsv12
RO Username Status : disabled
RO Username : user
RO Password : ********
RWA Username : admin
RWA Password : ********
Def-display-rows : 30
Inactivity timeout : 900 sec
Html help tftp source-dir :
HttpPort : 80
HttpsPort : 443
NumHits : 0
NumAccessChecks : 0
NumAccessBlocks : 0
NumRxErrors : 0
NumTxErrors : 0
NumSetRequest : 0
Minimum password length : 8
Last Host Access Blocked : 0.0.0.0
In use certificate : Self signed
Certificate Truspoint CA Name :
Ciphers-Tls : TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
Variable Definitions
Use the data in the following table to use the web-server command.
Variable Value
def-display-rows <10-100> Configures the number of rows each page
displays, between 10 and 100.
enable Enables the web interface. To disable the web
server, use the no form of this command:
no web-server [enable]
help-tftp <WORD/0-256> Configures the TFTP or FTP directory for Help
files, in one of the following formats: a.b.c.d:/|
peer:/ [<dir>]. The path can use 0–256 characters.
The following example paths illustrate the correct
format:
• 192.0.2.1:/help
• 192.0.2.1:/
http-port <80-49151> Configures the web server HTTP port. The default
port is 80.
https-port <443-49151> Configure the web server HTTPS port. The default
port is 443.
inactivity-timeout<30–65535> Configures the web-server session inactivity
timeout. The default is 900 seconds (15 minutes).
password {ro | rwa} WORD<1-20> Configures the logon and password for the web
interface.
password min-passwd-len<1–32> Configures the minimum password length. By
default, the minimum password length is 8
characters.
read-only-user Enables read-only user for the web server.
Note:
read-only-user enable is available for
demonstration purposes on some products. For
more information, see VOSS Feature Support
Matrix.
Variable Value
secure-only Enables secure-only access for the web server.
tls-min-ver<tlsv10|tlsv11|tlsv12> Configures the minimum version of the TLS
protocol supported by the web-server. You can
select among the following:
• tlsv10 – Configures the version to TLS 1.0.
Note:
tlsv10 is not supported in enhanced secure
mode.
• tlsv11 – Configures the version to TLS 1.1.
• tlsv12 – Configures the version to TLS 1.2
The default is tlsv12.
Procedure
1. Count the number of lines in the output:
<CLI command> | count
2. Display the output of a command starting from the first line that matches the given pattern:
<CLI command> | begin WORD<0–255> [field <number>] [ignore-case]
[header <number>]
3. Display only the output lines that match the given pattern:
<CLI command> | include <pattern> [field <number>] [ignore-case]
[header <number>]
4. Display only the output lines that do not match the given pattern:
<CLI command> | exclude <pattern> [field <number>] [ignore-case]
[header <number>]
5. Temporarily disable pagination for the output of a CLI command:
<CLI command> | no-more
There is no prompt to continue or to quit when the lines of output exceed the terminal length.
6. Limit the output of a command to the first few lines:
<CLI command> | head [<number>]
Example
Switch:1>enable
Siwtch:1#configure terminal
Display only the output lines that match the given pattern:
Switch:1(config)#show vlan basic | include byPort field 3 header 6
================================================================================================
Vlan Basic
================================================================================================
VLAN MSTP
ID NAME TYPE INST_ID PROTOCOLID SUBNETADDR SUBNETMASK VRFID
------------------------------------------------------------------------------------------------
1 Default byPort 0 none N/A N/A 0
3 VLAN3 byPort 3 none N/A N/A 0
4 VLAN4 byPort 4 none N/A N/A 0
5 VLAN5 byPort 5 none N/A N/A 0
8 VLAN-8 byPort 8 none N/A N/A 0
9 VLAN-9 byPort 9 none N/A N/A 0
11 VLAN-11 byPort 11 none N/A N/A 0
12 VLAN-12 byPort 12 none N/A N/A 0
20 VLAN-20 byPort 0 none N/A N/A 0
================================================================================================
Vlan Basic
================================================================================================
VLAN MSTP
ID NAME TYPE INST_ID PROTOCOLID SUBNETADDR SUBNETMASK VRFID
6 VLAN6 private 40 none N/A N/A 0
7 VLAN7 private 41 none N/A N/A 0
Display only the output lines that do not match the given pattern:
Switch:1(config)#show vlan basic | exclude private field 3 header 6
================================================================================================
Vlan Basic
================================================================================================
VLAN MSTP
ID NAME TYPE INST_ID PROTOCOLID SUBNETADDR SUBNETMASK VRFID
------------------------------------------------------------------------------------------------
1 Default byPort 0 none N/A N/A 0
3 VLAN3 byPort 3 none N/A N/A 0
4 VLAN4 byPort 4 none N/A N/A 0
5 VLAN5 byPort 5 none N/A N/A 0
8 VLAN-8 byPort 8 none N/A N/A 0
9 VLAN-9 byPort 9 none N/A N/A 0
11 VLAN-11 byPort 11 none N/A N/A 0
12 VLAN-12 byPort 12 none N/A N/A 0
20 VLAN-20 byPort 0 none N/A N/A 0
================================================================================================
Vlan Basic
================================================================================================
VLAN MSTP
ID NAME TYPE INST_ID PROTOCOLID SUBNETADDR SUBNETMASK VRFID
------------------------------------------------------------------------------------------------
6 VLAN6 private 40 none N/A N/A 0
7 VLAN7 private 41 none N/A N/A 0
Display the output of a command starting from the first line that matches the given pattern:
Switch:1(config)#show vlan basic | begin 8 header 6
================================================================================================
Vlan Basic
================================================================================================
VLAN MSTP
ID NAME TYPE INST_ID PROTOCOLID SUBNETADDR SUBNETMASK VRFID
8 VLAN-8 byPort 8 none N/A N/A 0
9 VLAN-9 byPort 9 none N/A N/A 0
11 VLAN-11 byPort 11 none N/A N/A 0
12 VLAN-12 byPort 12 none N/A N/A 0
20 VLAN-20 byPort 0 none N/A N/A 0
================================================================================================
Vlan Basic
================================================================================================
VLAN MSTP
ID NAME TYPE INST_ID PROTOCOLID SUBNETADDR SUBNETMASK VRFID
------------------------------------------------------------------------------------------------
1 Default byPort 0 none N/A N/A 0
3 VLAN3 byPort 3 none N/A N/A 0
4 VLAN4 byPort 4 none N/A N/A 0
5 VLAN5 byPort 5 none N/A N/A 0
6 VLAN6 private 40 none N/A N/A 0
7 VLAN7 private 41 none N/A N/A 0
8 VLAN-8 byPort 8 none N/A N/A 0
9 VLAN-9 byPort 9 none N/A N/A 0
11 VLAN-11 byPort 11 none N/A N/A 0
12 VLAN-12 byPort 12 none N/A N/A 0
20 VLAN-20 byPort 0 none N/A N/A 0
================================================================================================
Vlan Basic
================================================================================================
VLAN MSTP
ID NAME TYPE INST_ID PROTOCOLID SUBNETADDR SUBNETMASK VRFID
------------------------------------------------------------------------------------------------
1 Default byPort 0 none N/A N/A 0
3 VLAN3 byPort 3 none N/A N/A 0
================================================================================================
Vlan Basic
================================================================================================
VLAN MSTP
ID NAME TYPE INST_ID PROTOCOLID SUBNETADDR SUBNETMASK VRFID
8 VLAN-8 byPort 8 none N/A N/A 0
9 VLAN-9 byPort 9 none N/A N/A 0
11 VLAN-11 byPort 11 none N/A N/A 0
================================================================================================
Vlan Basic
================================================================================================
VLAN MSTP
ID NAME TYPE INST_ID PROTOCOLID SUBNETADDR SUBNETMASK VRFID
9 VLAN-9 byPort 9 none N/A N/A 0
11 VLAN-11 byPort 11 none N/A N/A 0
12 VLAN-12 byPort 12 none N/A N/A 0
20 VLAN-20 byPort 0 none N/A N/A 0
Variable definitions
The GREP filters use the following parameters:
Parameter Description
field<number> Specifies the field in each line to match against the pattern. Fields are
separated by white spaces and are counted starting with 1 for the left-most
field.
If the output is formatted as a table, whitespaces are not counted as fields.
from-line <number> Specifies the remaining output starting with a given line.
head<number> Specifies the number of lines to keep from the beginning of the output.
header<number> Specifies a number of lines from the start of the output to display
unchanged before trying to match the pattern. This parameter is useful to
keep the header of a table intact. This filter skips the header lines.
ignore-case Specifies letters to match in the pattern regardless of case.
<number> Specifies the number of lines of output to keep, either from the beginning of
the output or from the end of the output.
<pattern> Specifies the regular expression to match against each line of output. Use
quotations if the parameter contains spaces.
EDM is a web-based graphical user interface (GUI) you can use to configure a single switch. EDM runs
from the switch and you can access it from a web browser. You do not need to install additional client
software, and you can access it with all operating systems.
Supported Browsers
Use the following browser versions to access Enterprise Device Manager (EDM):
• Microsoft Edge 97
• Mozilla Firefox 96
• Google Chrome 97
• Safari 15.3
Important
For optimal performance, use Mozilla Firefox or Google Chrome.
Important
You must enable the web server from CLI (see Configure the Web Server on page 256) to
enable HTTP access to EDM. For HTTP access to the device, you must also disable the web
server secure-only option. The web server secure-only option, allowing for HTTPS access to
the device, is enabled by default. As a best practice, take the appropriate security precautions
within the network if you use HTTP
If you experience issues while connecting to EDM, check the proxy settings. Proxy settings can affect
EDM connectivity to the switch. Clear the browser cache and do not use proxy when connecting to the
device.
For information about creating CLI accounts for each user role on the switch, see Multiple CLI Users for
Each Role on page 3318.
Important
The default passwords and community strings are documented and well known. Change
the default passwords and community strings immediately after you first log on. For more
information about changing user names and passwords, see Security on page 2993.
You can use the device view to determine the operating status of the various ports in your hardware
configuration. You can also use the device view to perform management tasks on specific objects. In the
device view, you can select a port or the entire chassis. EDM outlines the selected object in yellow.
The conventions on the device view are similar to the actual device appearance. The port LEDs and
the ports are color-coded to provide status. Green indicates the module or port is up and running, red
indicates the module or port is disabled, dark pink indicates a protocol is down, and amber indicates an
enabled port that is not connected to anything. For information about LED behavior, see your hardware
documentation.
EDM Window
The following list identifies the different sections of the EDM window:
• Navigation pane—Located on the left side of the window, the navigation pane displays all the
available command tabs in a tree format. A row of buttons at the top of the navigation pane
provides a quick method to perform common functions.
• Content pane—Located on the right side of the window, the content pane displays the tabs and
dialog boxes where you can view or configure parameters on the switch.
• Menu bar—Located at the top of the content pane, the menu bar shows the most recently accessed
primary tabs and their respective secondary tabs.
• Toolbar—Located just below the menu bar, the toolbar provides quick access to the most common
operational commands such as Apply, Refresh, and Help.
The following figure shows an example of two tabs open in the content pane of the EDM window.
Navigation Pane
You can use the navigation pane to see what commands are available and to quickly browse through
the command hierarchy. A row of buttons at the top of the navigation pane provides a quick method to
perform common functions.
Note
For module-based chassis, menu options related to a specific module are activated only after
you install and select the required module.
The following table describes the buttons that display at the top of the navigation pane.
Graph Opens the graph options for the selected item in the Device Physical View.
Help Setup Guide Opens instructions about how to install the Help files and configure EDM to
use the Help files.
Expand a folder by selecting the directional arrow next to the folder name. Some folders have sub-
folders such as the Edit folder, which has the Port, NTP, and other sub-folders.
Within each folder and sub-folder, there are numerous options, which provide access to tabs. To open
an option, select it. The selected tab displays in the menu bar and opens in the content pane. The
following table describes the top-level folders in the navigation pane.
VRF Context view Use the VRF Context view to switch to another
VRF context when you use the embedded EDM.
GlobalRouter is the default view at log in. You can
configure both Global Router (GRT) and Virtual
Routing and Forwarding (VRF) instances when
you launch a VRF context view. You can open only
five tabs for each EDM session.
Edit Use the Edit menu to view and configure
parameters for the chassis hardware or for the
currently selected hardware component, including
one or more ports. You can also use the Edit menu
to perform the following tasks:
• check and configure ports, including the
internal Extreme Integrated Application
Hosting ports, on the device
• change the configuration of many features,
including but not limited to, the file system,
NTP, OVSDB, SMTP, Link-state tracking, VTEP,
Management Instance, Endpoint Tracking, and
SNMPv3
Menu Bar
The menu bar is above the content pane and consists of two rows of tabs.
• The top row displays the tabs you can open through the navigation pane. The system displays these
primary tabs in the sequence in which you open them.
• After you click a primary tab, the secondary tabs associated with it display in the bottom row. Click a
secondary tab to display it in the content pane.
In both the top and bottom rows of the menu bar, if the number of tabs exceeds the viewable space, the
system displays left- and right-pointing arrows. Click an arrow to scroll to the required tab.
To reduce the number of tabs on the top row, you can click the X on the right corner of a tab to remove
it from the row. The following figure shows a sample menu bar.
Toolbar
The toolbar buttons provide quick access to commonly used operational commands. The system
displays the buttons that vary depending on the tab you select. However, the Apply, Refresh, and Help
buttons are on almost every screen. Other common buttons are Insert and Delete. The following list
detail the common toolbar buttons.
• Apply—Use this button to execute all edits that you make.
• Refresh—Use this button to refresh all data on the screen.
• Help—Use this button to display online help that is context sensitive to the current dialog box.
• Insert—Use this button to display a secondary dialog box related to the selected tab. After you edit
the configurable parameters, click the Insert button in the dialog box. This causes a new entry to
display in the dialog box of the selected tab.
• Delete—Use this button to delete a selected entry.
Content Pane
The content pane is the main area on the right side of the window that displays the configuration tabs
and dialog boxes. Use the content pane to view or configure parameters on the switch.
Note
You can view valid ranges for all configurable parameters on EDM tabs.
The following figure is a sample that shows the content pane for the Port 1/3 General, Interface tab.
If you want to compare the information in two tabs, you can undock one, then open another tab. For
more information about undocking a tab, see Undocking and docking tabs on page 277.
Your session will expire in about 5 minute(s). Would you like to extend
the session?
If you do not respond, EDM automatically ends the session with the following message: Your
session has expired.
Connect to EDM
Before You Begin
• Ensure that the switch is running.
• Note the IP address of the switch.
• Ensure that you use a supported browser version.
• Ensure that you enable the web server using CLI.
Perform this procedure to connect to EDM to configure and maintain your network through a graphical
user interface.
Procedure
1. In the address field, enter the IP address of the system using the following formats: https://
<IP_address> (default) or http://<IP_address>.
Note
By default the web server is configured with the secure-only option, which requires you to
use HTTPS to access EDM. To access EDM using HTTP, you must disable the secure-only
option.
Configure the web management interface to change the user names and passwords for management
access to the switch using a web browser.
HTTP, FTP, and TFTP server supports both IPv4 and IPv6 addresses, with no difference in functionality
or configuration.
You can also use the CLI interface for creating users.
Procedure
1. In the navigation pane, expand Configuration > Security > Control Path.
2. Select General.
3. Select the Web tab.
4. Complete the WebRWAUserName and WebRWAUserPassword fields to specify the user name and
password for access to the web interface.
This user will have full permission.
5. To enable the RO user for the web server, select WebROEnable.
Note
This step does not apply to VSP 8600 Series.
6. Complete the WebROUserName and WebROUserPassword fields to specify the user name and
password for access to the web interface.
This user will have read only permission.
7. Select Apply.
Name Description
WebRWAUserName Specifies the RWA username from 1–20
characters. The default is admin.
WebRWAUserPassword Specifies the password from 1–32 characters. The
default is 12345678.
WebROEnable Enables the web server read-only (RO) user, which
is disabled by default after a software upgrade.
Note:
Exception: not supported on VSP 8600 Series.
Name Description
WebCertSubjectName Specifies the digital certificate subject Name used
as identity certificate in the web server.
WebCertCAName Specifies the digital certificate CA trustpoint name
used for the certificate in the web server.
WebROUserName Specifies the RO username. The default is user.
Note:
Product Notice: For VSP 8600 Series the web
server RO username must be enabled in CLI.
Name Description
DefaultDisplayRows Configures the web server display row width
between 10–100. The default is 30.
LastChange Shows the last web-browser initiated
configuration change.
NumHits Shows the number of hits to the web server.
NumAccessChecks Shows the number of access checks performed by
the web server.
NumAccessBlocks Shows the number of access attempts blocked by
the web server.
LastHostAccessBlockedAddressType Shows the address type, either IPv4 or IPv6, of the
last host access blocked by the web server.
LastHostAccessBlockedAddress Shows the IP address of the last host access
blocked by the web server.
NumRxErrors Shows the number of receive errors the web
server encounters.
NumTxErrors Shows the number of transmit errors the web
server encounters.
NumSetRequest Shows the number of set-requests sent to the web
server.
Procedure
Name Description
Edit Edits chassis parameters.
Graph Graphs chassis statistics.
Refresh Status Refreshes the status of the chassis and MDAs.
Refresh Port Tooltips Refreshes the port tooltip data of the system. The
port tooltip data contains the following variables:
Slot/Port, PortName, and PortOperSpeed.
Procedure
Name Description
Edit General Configures the general options for the port.
Edit IP Configures the IP options for the port.
Edit IPv6 Configures the IPv6 options for the port.
Channelization Enable Enables channelization for the port.
Channelization Disable Disables channelization for the port.
Graph Displays the statistics for the port.
Enable Enables the port.
Disable Disables the port.
Change an existing configuration using a table-based tab. You cannot edit grey-shaded fields in the
table. The following procedure is an illustration on how to use a table-based tab.
Note
You can expand the appropriate folders for any feature you configure and select a table-
based tab.
Procedure
6. Click the arrow in the list field to view the options, and then select the appropriate value.
You can monitor or apply the same configuration changes to more than one port by using the multiple
port selection function. You can use the standard menu or the shortcut menu to edit the configuration
settings for multiple ports.
Tip
A selected port shows a yellow outline around the port.
Procedure
1. Select the Device Physical View tab.
2. To select multiple ports, press Ctrl (Control), and then select the required ports.
Procedure
Perform this procedure to undock a tab. You can undock tabs to have more than one tab visible at a
time.
Procedure
5. To reposition the tab anywhere on the screen, Select and drag the title bar.
6. To manipulate the tab, Select on the buttons in the top-right of the dialog box.
7. Select the up arrowhead to minimize the tab as shown in the following figure.
8. Select the down arrowhead to restore the tab to its original size.
9. Select the pages to dock the tab back into the menu bar.
10. Select the X to close the tab.
Use the following procedure to install the EDM help files on a TFTP or FTP server, and configure EDM to
use the help files
If you use an FTP server to store the help files, ensure that you configure the switch with the host user
name and password.
Procedure
Tip
You can name the directory anything that will help you remember its purpose.
3. Unzip the EDM help zip file into the directory created in the preceding step.
4. In the EDM navigation pane, expand the Configuration > Security > Control Path folders.
5. Click General.
6. Click Web.
7. In the HelpTftp/Ftp_SourceDir field, enter the IP address of the file server and the path to the help
files, for example, 192.0.2.15:/home/Help/.
• Verify the name, size, and storage date of each file present in the internal flash memory.
• Display USB file information.
Copy a File
About This Task
Procedure
Name Description
Source Identifies the device and file name to copy. You must specify the
full path and filename, for example, <deviceip-ftp server>:/
<filename>
Note:
For certain switches in enhanced secure mode, sensitive files and paths
are protected.
Destination Identifies the location to which to copy the source file with the
filename, for example, /intflash/<filename>.
Note:
For certain switches in enhanced secure mode, sensitive files and paths
are protected.
Display the amount of memory used, memory available, and the number of files for internal flash
memory.
Procedure
Name Description
IntflashBytesUsed Specifies the number of bytes used in internal flash memory.
IntflashBytesFree Specifies the number of bytes available for use in internal flash
memory.
IntflashNumFiles Specifies the number of files in internal flash memory.
UsbBytesUsed Specifies the number of bytes used in USB device.
UsbBytesFree Specifies the number of bytes available for use in USB device.
UsbNumFiles Specifies the number of files in USB device.
Display information about the files in internal flash memory on this device.
Procedure
Name Description
Slot Specifies the slot number.
Name Specifies the directory name of the file.
Date Specifies the creation or modification date of the file.
Size Specifies the size of the file.
Display information about the files on a USB device to view general file information.
Procedure
Name Description
Slot Specifies the slot number of the device.
Name Specifies the directory name of the file.
Date Specifies the creation or modification date of the file.
Size Specifies the size of the file.
This section details what you must know to manage the software image on the switch.
Image Upgrades
Install new software upgrades to add functionality to the switch. Major and minor upgrades are released
depending on how many features the upgrade adds or modifies.
You must keep a copy of the previous configuration file (config.cfg), in case you need to return to
the previous version. The upgrade process automatically converts, but does not save, the existing
configuration file to a format that is compatible with the new software release. The new configuration
file may not be backward compatible.
Software Images
Software image names use the following number format to identify release and maintenance values:
For example, the image file name VOSS4K.4.2.1.0.tgz denotes a software image for the VSP
4450 Series product with a major release version of 4, a minor release version of 2, a maintenance
release version of 1 and a maintenance release update version of 0. Similarly, the image file name
VSP4K.3.0.1.0.tgz denotes a software image for the VSP 4450 Series product with a major
release version of 3, a minor release version of 0, a maintenance release version of 1 and a maintenance
release update version of 0. TGZ is the file extension.
The show software command displays information about the software image:
Switch:1#show software
==================================================================================
software releases in /intflash/release/
==================================================================================
4900_mux_64 (Backup Release) (Signed Release)
VOSS4900.8.5.0.0int020 (Primary Release) (Signed Release)
Operational Considerations
The following section describes operational considerations:
• You not required to provide additional input.
• You can use unsigned images; however, this is not recommended. To use an unsigned image,
downgrade to a pre-VOSS 8.5 software image then load a debug image.
• You cannot enter Enhanced Secure Mode with an unsigned image. Enhanced Secure Mode requires
a signed image.
Interfaces
You can apply upgrades to the switch using the Command Line Interface (CLI).
For more information about CLI, see Command Line Interface on page 242.
Internal flash
The switch has two internal flash memory devices: the boot flash memory and the system flash
memory. The system flash memory size is 2 gigabytes (GB).
Boot flash memory is split into two banks that each contain a different copy of the boot image files.
Only the Image Management feature can make changes to the boot flash.
The system flash memory stores configuration files, runtime images, the system log, and other files. You
can access files on the internal flash through the /intflash/ folder.
USB device
The switch can use a USB device for additional storage or configuration files, release images, and other
files. The USB device provides a convenient, removable mechanical to copy files between a computer
and a switch, or between switches. In cases where network connectivity has not yet been established,
or network file transfer is not feasible, you can use a USB device to upgrade the configuration and
image files on the switch.
The switch can act as an FTP server or client. If you enable the FTP daemon (ftpd), you can use a
standards-based FTP client to connect to the switch by using the CLI log on parameters. Copy the files
from the client to either the internal flash memory or USB device.
If performing a named boot (e.g. boot config.cfg), the configuration loading fails and the switch
remains in a default configuration. You can manually source the configuration file (e.g. source
config.cfg) to retrieve/reapply the configuration (minus the IPv6 neighbor configuration with the
invalid port value).
If you boot the switch without a specified configuration (e.g.reset -y), the primary configuration fails
to load and the backup configuration file is loaded instead.
Caution
You should never configure an IPv6 static neighbor on a port belonging to an MLT or SMLT.
If the configuration file has redistribution commands that set the metric-type to external, after you
upgrade to a release that supports the external metric type, the routes will be advertised into IS-IS as
external routes. This constitutes a change in how the routes are advertised into IS-IS after the upgrade
as compared to before the upgrade. This configuration can cause unintended traffic issues if the other
switches in the network are not yet upgraded to a release that recognizes external routes in IS-IS.
To know which release supports the external metric type on your platform, see VOSS Release Notes for
interoperability considerations.
To avoid unintentionally impacting traffic immediately following an upgrade, as a best practice, check
the existing IS-IS redistribution configuration of a switch to determine if the metric-type is set to
external in the redistribution commands. If metric-type external is not used in the redistribution, the
switch can be upgraded using the normal upgrade procedures. If the metric-type external is used with
any redistribution command, change it to internal, and then save the configuration. After this the switch
can be upgraded using the normal upgrade procedures.
The protocol above could be one of the following: direct, ospf, static, rip or bgp.
The protocol above could be one of the following: direct, ospf, static, rip or bgp.
changes based on the new public key maximum length and you will be unable to restore the
CertInfoTable from this file.
If you upgrade to VOSS 8.1 or later from an earlier release, you must reconfigure the certificates because
you cannot restore the old certificate configuration after reboot.
The switch displays the following log message after you upgrade to VOSS 8.1, or later,
and reboot: GlobalRouter DIGITALCERT ERROR Unable to restore info from /
intflash/.cert/cert_info.cfg due to different/wrong format
When you upgrade from VOSS 8.1.X to VOSS 8.1.5, the POE Controller undergoes a firmware update,
which reverts previously configured Fast PoE and Perpetual PoE settings back to the default values. The
system displays a message to inform you about this change.
After you change the configuration, you must save the changes on the device. Save the configuration to
a file to retain the configuration settings.
Note that not all CLI commands are included in configuration files. Typical examples include, but are not
limited to some operational and security-related commands.
Note
When loading large configuration files or large sections of a configuration file, avoid copying
and pasting of the files into the console or terminal window as it can lead to the loss of
configuration. You must either source the file or boot to the intended configuration file.
Sourcing and booting allow for the debug and verification of the configuration file using
the boot config flags. For more information about booting, sourcing, and debugging or
verification using boot flags, see VOSS CLI Commands Reference.
File Transfer Protocol (FTP) and Trivial File Transfer Protocol (TFTP) support IPv4 and IPv6 addresses.
Procedure
Example
Switch:1> enable
Identify the file as a backup file and designate a location to save the file:
Variable Definitions
The following table defines parameters for the save config command.
Variable Value
backup WORD<1–99> Saves the specified file name and identifies the file
as a backup file.
WORD<1–99> uses one of the following format:
• a.b.c.d:<file>
• /intflash/<file>
• /usb/<file>
The file name, including the directory structure,
can include up to 99 characters.
file WORD<1–99> Specifies the file name in one of the following
format:
• a.b.c.d:<file>
• /intflash/<file>
• /usb/<file>
The file name, including the directory structure,
can include up to 99 characters.
verbose Saves the default and current configuration. If
you omit this parameter, the command saves only
parameters you change.
Perform this procedure to upgrade the software on the switch. This procedure shows how to upgrade
the software using the internal flash memory as the file storage location.
Use one of the following options to upload the file with the new software to the switch:
• Use FTP or SFTP to transfer the file.
• Download the image file to your computer. Copy the file to a USB device and insert the USB device
into the USB port on the switch.
You can store up to six software releases on the switch. If you have six releases already stored on the
switch, you are prompted to remove one release before you can proceed to add and activate a new
software release.
For information about how to remove a software release, see Remove a Software Build on page 190.
Caution
Only VLAN range 2 to 4059 is supported. All configuration on a higher numbered VLAN
from earlier releases will be lost after the upgrade.
Note
Software upgrade configurations are case-sensitive.
Procedure
configure terminal
2. If you are using the USB port to transfer files, go to the next step. If you are using FTP or SFTP to
download the files, start the FTP daemon on the switch and enable the ftpd flag for FTP or sshd flag
for SFTP:
Note
Start an FTP session from your computer to the switch using the same username and
password used to Telnet or SSH to the switch. Upload or copy the image to the switch.
end
3. Download the files to the switch through FTP or SFTP, or transfer them to the switch through the
USB port.
4. Enter Privileged EXEC configuration mode by exiting the Global Configuration mode.
exit
5. Extract the release distribution files to the /intflash/release/ directory:
software add WORD<1-99>
Important
After you restart the system, you have the amount of time configured for the commit
timer to verify the upgrade and commit the software to gold. If you do not commit the
software to gold and auto-commit is not enabled, the system restarts with the last known
working version after the commit timer has expired. This feature ensures you can regain
control of the system if an upgrade fails. By default, auto-commit is enabled.
8. After you restart the switch, enter Privileged EXEC configuration mode:
rwa
enable
9. Confirm the software is upgraded:
show software
10. Commit the software:
software commit
Important
If you disable the auto-commit feature, you must run the software commit command
manually before the commit timer expires to commit the new software version, otherwise
the system restarts automatically to the previous (committed) version. By default, auto-
commit is enabled.
Example
Note
The image file name is switch dependent. See VOSS Release Notes for information about file
names.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#boot config flags ftpd
Switch:1#end
Switch:1#copy /usb/VOSS8200.8.5.0.0.tgz /intflash/VOSS8200.8.5.0.0.tgz
Switch:1#software add VOSS8200.8.5.0.0.tgz
Switch:1#software activate VOSS8200.8.5.0.0.GA
Switch:1#reset -y
Switch:1#show software
================================================================================
software releases in /intflash/release/
================================================================================
VOSS8200.8.5.0.0.GA (Primary Release)(Signed Release)
VOSS8200.8.4.2.0.GA (Backup Release) (Unsigned Release)
--------------------------------------------------------------------------------
Auto Commit : enabled
Commit Timeout : 10 minutes
APP_FS VOSS8200.8.4.2.0.GA
AVAILABLE ENCRYPTION MODULES
No Modules Added
----------------------------------------------------------------------------------
Auto Commit : enabled
Commit Timeout : 10 minutes
Switch:1#software commit
Executing software commit for version VOSS8200.8.5.0.0.GA.
Software commit successful
Variable Definitions
The following table defines parameters for the software command.
Variable Value
activate WORD<1-99> Copies the software version to the boot flash file.
When you use the software activate command,
the system checks for hardware dependencies and
prevents a downgrade if it detects a dependency.
For example, if a hardware component has
a minimum software version dependency, you
cannot downgrade to an incompatible software
version or install the hardware component in
a chassis that runs an incompatible software
version.
add WORD<1-99> Unpacks a software release <version>.
Procedure
Commit an upgrade
Perform the following procedure to commit an upgrade.
The software commit functionality for software upgrades allows maximum time set by the commit
timer (the default is 10 minutes) to ensure that the upgrade is successful. If you enable the auto-commit
option, the system automatically commits to the new software version after the commit timer expires.
Procedure
configure terminal
2. (Optional) Configure the timer to activate the software:
sys software commit-time <10-60>
Note
VSP 8600 Series default is 15 minutes.
Important
If you disable the auto-commit feature, you must run the software commit command
manually before the commit timer expires to commit the new software version, otherwise
the system restarts automatically to the previous (committed) version. By default, auto-
commit is enabled.
Important
MACsec connectivity association (CA) configurations fail during downgrade. If you plan
to downgrade MACsec to an earlier version, delete the MACsec CA entries, perform the
downgrade, and then reconfigure the MACsec CA entries. This applies to both 2AN and 4AN
modes.
Note
The image file name is switch dependent. See VOSS Release Notes for information about file
names.
Procedure
Important
After you restart the system, you have the amount of time configured for the commit
timer to verify the software change and commit the software to gold. If you do not
commit the software to gold and auto-commit is not enabled, the system restarts with the
last known working version after the commit timer expires. This feature ensures you can
regain control of the system if an upgrade fails. By default, auto-commit is enabled.
Important
If you disable the auto-commit feature, you must run the software commit command
manually before the commit timer expires to commit the new software version, otherwise
the system restarts automatically to the previous (committed) version. By default, auto-
commit is enabled.
Variable Definitions
The following table defines parameters for the software command.
Variable Value
activate WORD<1-99> Specifies the name of the software release image.
add WORD<1-99> Specifies the path and version of the compressed
software release archive file.
remove WORD<1-99> Specifies the path and version of the compressed
software release archive file.
Note
A maximum of 6 software releases can be installed on the switch. When the limit is reached,
you are prompted to remove one release before you can proceed with adding and activating a
new software release.
Procedure
Example
During the device bootup, if an older version of a CPLD module is detected, the system displays a log
message to upgrade the CPLD module image.
You can also use show sys-info cpld command to check the current version of the CPLD module
on the device.
The cpld-install command compares the image version of the modules with the current version
on the device:
• If the versions are the same, the command exits.
• If the current version is an earlier version, you must update the image version of the specific module.
The device automatically restarts after sucessful installation of the specific module.
Procedure
Example
WARNING: DO NOT TURN POWER OFF OR MAKE ANY HARDWARE CHANGES ONCE YOU START THIS OPERATION.
Variable Definitions
The following table defines parameters for the cpld-install command.
Variable Value
cpu Updates the CPU module.
fpga Updates the FPGA module.
port Updates the Port module.
Variable Value
vim Updates the VIM module.
WORD<1-99> Specifies the image filename.
Warning
This command is an advanced-level command that upgrades the device uboot image. Only
use this command if specifically advised to do so by Technical Support. Improper use of this
command can result in permanent damage to the device and render it unusable.
If the need to use this command arises, instructions on usage will be provided by technical support.
Procedure
Example
Switch:1#>show sys-info uboot
U-Boot Info :
------------------------------------------------------------------------------------------
Variable Definitions
The following table defines parameters for the uboot-install command.
Variable Value
WORD<1-99> Specifies the full path and filename that contains the uboot image.
The network station uses ARP to determine the host physical address as follows:
• The network station broadcasts a special packet, called an ARP request, that asks the host at the
specified IP address to respond with its physical address.
• All network hosts receive the broadcast request.
• Only the specified host responds with its hardware address.
• The network station then maps the host IP address to its physical address and saves the results in an
address-resolution cache for future use.
• The network station ARP table displays the associations of the known MAC address to IP address.
You can create ARP entries, and you can delete individual ARP entries.
You do not need to make configuration changes for the BPDU and Topology Discovery Protocol
packets.
Only one user-defined protocol-based VLAN for ARP is allowed for each Spanning Tree Group (STG).
If the ports with the default port action of drop are in different STGs, you must create additional
user-defined protocol-based VLANs.
Proxy ARP
A network station uses proxy ARP to respond to an ARP request from a locally attached host or end
station for a remote destination. The network station sends an ARP response back to the local host with
its own MAC address of the network station interface for the subnet on which the ARP request was
received. The reply is generated only if the device has an active route to the destination network.
The following figure shows an example of proxy ARP operation. In this example, the system displays
host C with mask 24 to be locally attached to host B with mask 16, so host B sends an ARP request for
host C. However, the switch is between the two hosts. To enable communication between the two hosts,
the switch responds to the ARP request with the IP address of host C but with its own MAC address.
Loop detection
To prevent cases of ARP looping, configure the ARP loop detection flag to detect this situation. When a
loop is detected, the port is shut down.
RARP has the format of an ARP frame but its own Ethernet type (8035). You can remove RARP
from the IP protocol-based VLAN definition and treat it as a separate protocol, thus creating a RARP
protocol-based VLAN.
A typical network topology provides desktop switches in wiring closets with one or more trunk ports
that extend to one or more data center switches where attached servers provide file, print, and other
services. Use RARP functionality to define all ports in a network that require access to a RARP server
as potential members of a RARP protocol-based VLAN. You must define all tagged ports and data
center RARP servers as static or permanent members of the RARP VLAN. Therefore, a desktop host
broadcasts an RARP request to all other members of the RARP VLAN. In normal operation, these
members include only the requesting port, tagged ports, and data center RARP server ports. Because
all other ports are potential members of this VLAN and RARP is only transmitted at startup, all other
port VLAN memberships expire. With this feature, one or more centrally located RARP servers extend
RARP services across traditional VLAN boundaries to reach desktops globally.
A network station can use ARP across a single network only, and the network hardware must support
physical broadcasts. If a network station wants to send a packet to a host but knows only the host IP
address, the network station uses ARP to determine the host physical address.
You can enable or disable ARP responses on the device. You can also enable ARP proxy, which lets a
router answer a local ARP request for a remote destination.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#interface vlan 200
Switch:1(config-if)#ip arp-response
Configure an ARP proxy to allow the platform to answer a local ARP request for a remote destination.
ARP proxy is disabled by default.
Procedure
1. Enter Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display ARP information for a specified port or for all ports:
show ip arp interface gigabitethernet [slot/port[/sub-port][-slot/
port[/sub-port]][,...]]
3. Display ARP information for a VLAN:
show ip arp interface vlan <1-4059>
Example
================================================================================
Port Arp
================================================================================
PORT_NUM DOPROXY DORESP
--------------------------------------------------------------------------------
1/1 false true
1/2 false true
1/3 false true
1/4 false true
1/5 false true
1/6 false true
1/7 false true
1/8 false true
1/9 false true
1/10 false true
1/11 false true
1/12 false true
1/13 false true
1/14 false true
1/15 false true
1/16 false true
1/17 false true
--More-- (q = quit)
Variable definitions
Use the data in the following table to use the show ip arp command.
Variable Value
A.B.C.D Specifies the IP address of a network.
{slot/port[/sub-port][-slot/port[/ Identifies the slot and port in one of the following
sub-port]][,...]} formats: a single slot and port (slot/port), a range
of slots and ports (slot/port-slot/port), or a series
of slots and ports (slot/port,slot/port,slot/port). If
the platform supports channelization and the port
is channelized, you must also specify the sub-port
in the format slot/port/sub-port.
interface Displays ARP interface configuration information.
spbm-tunnel-as-mac Displays the remote host name in the TUNNEL
column for the SPBM ARP entry.
-s Specifies a subnet.
You must indicate the IP address followed by the
subnet mask expressed as <A.B.C.D> <A.B.C.D>.
vlan <1-4059> Displays ARP entries for a particular VLAN ID.
Specifies the VLAN ID in the range of 1 to 4059.
By default, VLAN IDs 1 to 4059 are configurable
and the system reserves VLAN IDs 4060 to 4094
for internal use. On switches that support the
vrf-scaling and spbm-config-mode boot
configuration flags, if you enable these flags, the
system also reserves VLAN IDs 3500 to 3998.
VLAN ID 1 is the default VLAN and you cannot
create or delete VLAN ID 1.
Variable Value
vrf WORD<1–16> Specifies a VRF name expressed as text from 1 to
16 characters in length.
The total number of ARPs listed in the summary
line of the show ip arp output represents the
total number of ARPs on the chassis, including
all VRFs (which includes the Management Router
VRF).
vrfids WORD<0–512> Specifies a range of VRFIDs as text from 0 to 512
characters in length.
The total number of ARPs listed in the summary
line of the show ip arp output represents the
total number of ARPs on the chassis, including
all VRFs (which includes the Management Router
VRF).
Use the data in the following table to help you understand the show ip arp interface command
output.
Variable Value
PORT_NUM Indicates the port number.
DOPROXY Indicates if ARP proxy responses are enabled or disabled on the specified
interface.
DORESP Indicates if the sending of ARP responses is enabled or disabled on the
specified interface.
Use the data in the following table to help you understand the show ip arp interface vlan
command output.
Variable Value
VLAN_ID Indicates the VLAN ID.
DOPROXY Indicates if ARP proxy responses are enabled or disabled on the specified
interface.
DORESP Indicates if the sending of ARP responses is enabled or disabled on the
specified interface.
Configure ARP static entries to modify the ARP parameters on the device. The only way to change a
static ARP is to delete the static ARP entry and create a new entry with new information.
Note
Static multicast ARP entries are not supported for NLB Unicast or NLB Multicast operations.
Procedure
1. Enter either Global Configuration mode or VRF Router Configuration mode for a specific VRF
context:
enable
configure terminal
Example
Variable Definitions
Use the data in the following table to use the ip arp command.
Variable Value
request-threshold Configures the maximum number of outstanding ARP requests
<50-1000> that a device can generate. The range is 50–1000. The default
value is 500.
To configure this option to the default value, use the default
operator with this command.
timeout <1-32767> Configures the length of time in seconds an entry remains in the
ARP table before timeout. The range is 1–32767.
To configure this option to the default value, use the default
operator with this command.
Note:
The aging of ARP records is tied to the aging of MAC records.
The ARP record for a given IP address is not removed unless the
associated MAC record ages out and the router stops receiving
a response to ARP requests for that IP address. In cases where
the ARP aging time is set to less than the MAC aging time, the
switch waits until the MAC ages out before deleting the ARP for
an inactive host.
Procedure
Example
Variable definitions
Use the data in the following table to use the clear ip arp interface command.
Variable Value
<1-4059> Specifies the VLAN ID in the range of 1 to 4059.
By default, VLAN IDs 1 to 4059 are configurable
and the system reserves VLAN IDs 4060 to 4094
for internal use. On switches that support the
vrf-scaling and spbm-config-mode boot
configuration flags, if you enable these flags, the
system also reserves VLAN IDs 3500 to 3998.
VLAN ID 1 is the default VLAN and you cannot
create or delete VLAN ID 1.
gigabitethernet|vlan Specifies the interface type.
{slot/port[/sub-port][-slot/port[/ Identifies the slot and port in one of the following
sub-port]][,...]} formats: a single slot and port (slot/port), a range
of slots and ports (slot/port-slot/port), or a series
of slots and ports (slot/port,slot/port,slot/port). If
the platform supports channelization and the port
is channelized, you must also specify the sub-port
in the format slot/port/sub-port.
When you use the interface parameter with the show ip arp command you can display ARP
configuration information only for a specific switch.
The show ip arp command displays all of the configured and dynamically learned ARP entries in
the ARP table.
Procedure
Example
Switch:1#show ip arp
=========================================================================================
IP Arp - GlobalRouter
=========================================================================================
IP_ADDRESS MAC_ADDRESS VLAN PORT TYPE TTL(10 Sec) TUNNEL
-----------------------------------------------------------------------------------------
192.0.2.1 00:09:0f:09:00:08 20 1/3 DYNAMIC
2159
192.0.2.12 b4:a9:5a:ff:f8:40 20 1/3 DYNAMIC
458
192.0.2.25 e4:5d:52:3c:65:00 20 - LOCAL
2160
192.0.2.154 d4:ea:0e:c2:08:00 20 1/3 DYNAMIC
2131
192.0.2.157 00:1c:17:b1:ec:80 20 1/3 DYNAMIC
2131
192.0.2.161 fc:a8:41:fb:40:00 20 1/3 DYNAMIC
2131
192.0.2.253 e0:db:55:d4:e5:7c 20 1/3 DYNAMIC
2041
192.0.2.255 ff:ff:ff:ff:ff:ff 20 - LOCAL
2160
===========================================================================================
IP Arp Extn - GlobalRouter
===========================================================================================
MULTICAST-MAC-FLOODING AGING(Minutes) ARP-THRESHOLD
-------------------------------------------------------------------------------------------
disable 360 500
Variable definitions
Use the data in the following table to help you use the show ip arp command.
Variable Value
-s Specifies the subnet for the table.
gigabitEthernet Displays the entries for a particular brouter port.
Variable Value
interface Displays ARP interface configuration information.
Use the following parameters to display ARP table
information specifically for:
• gigabitethernet {slot/port[–slot/port][,...]}
displays IP ARP gigabitethernet interface
information
• VLAN <1-4059> displays IP ARP VLAN
interface information
Example: show ip arp interface vlan 1
nlb Displays the Network Load Balancing (NLB) ARP
entries on the switch.
spbm-tunnel-as-mac Displays the remote host name in the TUNNEL
column for the SPBM ARP entry.
vlan Specifies the VLAN ID in the range of 1 to 4059.
By default, VLAN IDs 1 to 4059 are configurable
and the system reserves VLAN IDs 4060 to 4094
for internal use. On switches that support the
vrf-scaling and spbm-config-mode boot
configuration flags, if you enable these flags, the
system also reserves VLAN IDs 3500 to 3998.
VLAN ID 1 is the default VLAN and you cannot
create or delete VLAN ID 1.
Use these parameters to display ARP table
information specifically for:
• vrf WORD<1–16>—the VLAN VRF name in a
range from 1 to 16 characters
• vrfids WORD<0–512>—the VLAN VRF ID in a
range from 0 to 512
Example: show ip arp vlan 1 vrf 1
vrf WORD <1-16> Specifies the name of the VRF.
The total number of ARPs listed in the summary
line of the "show ip arp" display represents the
total number of ARPs on the chassis including all
VRFs.
vrfids WORD <0-512> Specifies the VRF ID.
The total number of ARPs listed in the summary
line of the "show ip arp" display represents the
total number of ARPs on the chassis including all
VRFs.
<A.B.C.D> Specifies the network IP address for the table.
Use the data in the following table to help you understand the output of the show ip arp
command.
Parameter Description
IP_ADDRESS Indicates the IP address where ARP is configured.
MAC_ADDRESS Indicates the MAC address where ARP is configured.
Parameter Description
VLAN Indicates the VLAN address where ARP is configured.
PORT Indicates the port where ARP is configured.
TYPE Indicates the type of learning (dynamic or local) where ARP is configured.
TTL<10 secs> Indicates the time to live as tenths of a second where ARP is configured.
TUNNEL Displays the remote host name in the TUNNEL column for the SPBM ARP
entry.
MULTICAST-MAC- Displays whether IP ARP multicast MAC flooding is enabled or disabled.
FLOODING When enabled, the ARP entries for multicast MAC addresses are associated
with the VLAN or port interface on which they were learned.
AGING (Minutes) Displays when the ARP aging timer expires.
ARP-THRESHOLD Displays the maximum number of outstanding ARP requests that a device
can generate.
If you disable Gratuitous ARP, the switch only allows Gratuitous ARP packets associated with Routed
Split Multi-Link Trunking (RSMLT) or Virtual Router Redundancy Protocol (VRRP), and the switch
discards all other Gratuitous ARP request packets.
ARP translates network layer (layer 3) IP addresses into link layer (layer 2) MAC addresses. A host sends
a Gratuitous ARP request packet to inform other hosts of the existence of an interface on the network,
so other local hosts can update their ARP tables. If the IP or MAC address changes, or in the event of a
failover, a host sends a Gratuitous ARP request packet to inform other hosts to update their ARP tables.
VRRP and RSMLT use gratuitous ARP to update the MAC address tables on switches.
Procedure
configure terminal
2. Enable Gratuitous ARP:
ip gratuitous-arp
3. (Optional) Disable Gratuitous ARP:
no ip gratuitous-arp
4. (Optional) Configure Gratuitous ARP to the default value:
default ip gratuitous-arp
5. Save the changed configuration.
save config [backup WORD<1–99>][file WORD<1–99>][verbose]
To perform this procedure on a non-default VRF, you must first change the VRF instance. For
information about how to use EDM for a non-default VRF, see Select and Launch a VRF Context View
on page 3856. All parameters might not be available in non-default VRFs.
Procedure
Name Description
DoProxy Configures the system to respond to an ARP request from a locally attached host or
end station for a remote destination. The default value is disable.
DoResp Configures the system to send ARP responses for this IP interface address. The default
value is enable.
Procedure
2. Select VLANs.
3. Select the Basic tab.
4. Select a VLAN.
5. Select IP.
6. Select the ARP tab.
7. In DoProxy, select enable to enable the Proxy ARP function.
8. In DoResp, select enable to configure the system to respond to an ARP. The default is enable.
9. Select Apply.
The ARP dialog box is available only if the port or VLAN is routed; that is, it is assigned an IP address.
Name Description
DoProxy Configures the system to respond to an ARP request from a locally attached host or
end station for a remote destination. The default value is disable.
DoResp Configures the system to send ARP responses for this IP interface address. The default
value is enable.
To perform this procedure on a non-default VRF, you must first change the VRF instance. For
information about how to use EDM for a non-default VRF, see Select and Launch a VRF Context View
on page 3856. All parameters might not be available in non-default VRFs.
Procedure
Name Description
NetAddress Specifies the IP address corresponding to the media-dependent physical address.
IfIndex Identifies the router interface for this ARP entry:
• Brouter interfaces are identified by the slot/port number of the brouter port.
• VLAN interfaces are identified by the vlan name.
Name Description
PhysAddress Specifies the media-dependent physical address (that is, the Ethernet address).
Type Specifies the type of ARP entry:
• local—a locally configured ARP entry
• static—a statically configured ARP entry
• dynamic—a learned ARP entry
To perform this procedure on a non-default VRF, you must first change the VRF instance. For
information about how to use EDM for a non-default VRF, see Select and Launch a VRF Context View
on page 3856. All parameters might not be available in non-default VRFs.
Note
Static multicast ARP entries are not supported for NLB Unicast or NLB Multicast operations.
Procedure
Procedure
To avoid traffic interruption, you can globally enable the alternative routes feature so the router can use
the next-best route, also known as an alternative route, if the best route becomes unavailable.
Routers learn routes to a destination through routing protocols. Routers maintain a routing table of the
learned alternative routes sorted in order by route preference, route costs, and route sources. The first
route on the list is the best route and the route that the router prefers to use.
The alternative route concept also applies between routing protocols. For example, if an OSPFv3 route
becomes unavailable and an alternative RIPng route is available, the system activates the RIPng route
without waiting for the update interval to expire.
Route Preference
On the switch, all standard routing protocols have default preference values that determine the routing
priority of the protocol. The router uses default preferences to select the best route when a clash exists
in preference between the protocols.
You can modify the global preference for a protocol to give the protocol a higher or lower priority
than other protocols. If you change the global preference for a static route and all best routes remain
best routes, only the local route tables change. However, if the protocol preference change causes best
routes to no longer be best routes, the change affects neighboring route tables.
Important
Changing route preferences is a process-intensive operation that can affect system
performance and network reach while you perform route preference procedures. As a best
practice, if you want to change preferences for static routes or routing protocols, do so when
you configure routes or during a maintenance window.
If a router learns a route with the same network mask and cost values from multiple sources, the router
uses the route preferences to select the best route to add to the forwarding database.
Note
To modify the preference for a route, you do not need to disable a route before you edit the
configuration.
The following table shows the default preferences for routing protocols and route types. Use this table
to help you modify the global preference value.
The default value is enabled. If you disable the alternative-route parameter, all existing alternative routes
are removed. After you enable the parameter, all alternative routes are readded.
Procedure
1. Enter either Global Configuration mode or VRF Router Configuration mode for a specific VRF
context:
enable
configure terminal
Procedure
1. Enter either Global Configuration mode or VRF Router Configuration mode for a specific VRF
context:
enable
configure terminal
Note
IPv6 alternative routes are enabled by default.
Example:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router vrf globalRouter
Switch:1(router-vrf)#ipv6 alternative-route
=======================================================================================================================
=
IPv6 Routing Table Information - GlobalRouter
=======================================================================================================================
=
Destination Address/PrefixLen NEXT HOP NH VRF/ISID VID/BID/TID PROTO COST AGE TYPE
PREF
-----------------------------------------------------------------------------------------------------------------------
-
2910:0:0:1:0:0:0:0/64 fe80:0:0:0:b2ad:aaff:fe42:dd00 V-3 OSPF 2 0 B 20
2912:0:0:1:0:0:0:0/64 0:0:0:0:0:0:0:0 V-1001 LOCAL 1 0 B 0
2912:0:0:1:0:0:0:0/64 0:0:0:0:0:0:0:0 T-10 BGP 1 0 A 45
3000:0:0:1:0:0:0:0/64 0:0:0:0:0:0:0:0 V-3 LOCAL 1 0 B 0
TYPE Legend:
A=Alternative Route, B=Best Route, E=Ecmp Route
Procedure
To perform this procedure on a non-default VRF, you must first change the VRF instance. For
information about how to use EDM for a non-default VRF, see Select and Launch a VRF Context View
on page 3856. All parameters might not be available in non-default VRFs.
Procedure
5. Select Apply.
The concept of alternative route applies between routing protocols. For example, if an OSPFv3 route
becomes unavailable and an alternative RIPng route is available, the system activates the RIPng route
immediately without waiting for an update interval to expire.
In this example, you configure OSPFv3 and RIPng routes on two switches Switch-1 and Switch-2, as
shown in the following figure.
Configuration on Switch-1
VLAN configuration:
=======================================================================================
Vlan Basic
=======================================================================================
VLAN MSTP
ID NAME TYPE INST_ID PROTOCOLID SUBNETADDR SUBNETMASK VRFID
---------------------------------------------------------------------------------------
1 Default byPort 0 none N/A N/A 0
2 VLAN-2 byPort 0 none N/A N/A 0
==========================================================================
VLAN PORT ACTIVE STATIC NOT_ALLOW
ID MEMBER MEMBER MEMBER MEMBER
--------------------------------------------------------------------------
1 1/1-1/16,1/17/1- 1/1-1/16,1/17/1-
1/17/4,1/18/1- 1/17/4,1/18/1-
1/18/4,2/1-2/16, 1/18/4,2/1-2/16,
2/17/1-2/17/4, 2/17/1-2/17/4,
2/18/1-2/18/4,3/1- 2/18/1-2/18/4,3/1-
3/6,4/1-4/4,4/6 3/6,4/1-4/4,4/6
2 4/5 4/5
=================================================================================================================
Vlan Ipv6 Interface
=================================================================================================================
IFINDX VLAN PHYSICAL ADMIN OPER TYPE MTU HOP REACHABLE RETRANSMIT MCAST IPSEC RPC RPCMODE
INDX ADDRESS STATE STATE LMT TIME TIME STATUS
-----------------------------------------------------------------------------------------------------------------
2050 2 b0:ad:aa:4e:59:00 enable up ETHER 1500 64 30000 1000 disable disable disable existonly
=================================================================================================================
Vlan Ipv6 Address
=================================================================================================================
IPV6 ADDRESS VLAN-ID TYPE ORIGIN STATUS
-----------------------------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:1/64 V-2 UNICAST MANUAL PREFERRED
fe80:0:0:0:b2ad:aaff:fe4e:5900/64 V-2 UNICAST LINKLAYER PREFERRED
Port configuration:
Switch1:1(config)#interface gigabitEthernet 4/5
Switch1:1(config-if)#encapsulation dot1q
Switch1:1(config-if)#no shutdown
Switch1:1(config-if)#exit
==================================================================================
OSPFv3 Global Information - GlobalRouter
==================================================================================
router-id : 170.78.88.0
admin-state : ENABLED
version : 3
area-bdr-rtr-state : FALSE
as-bdr-rtr-state : FALSE
helper-mode : ENABLED
as-scope-lsa-count : 0
lsa-checksum : 0
originate-new-lsas : 22
rx-new-lsas : 11
ext-lsa-count : 0
Switch1:1(config)#show ipv6 ospf neighbor
=======================================================================================
OSPF Neighbor - GlobalRouter
=======================================================================================
IFINDX(VID/BRT) NBRROUTERID NBRIPADDR STATE TTL
---------------------------------------------------------------------------------------
2050 (2) 170.78.84.0 fe80:0:0:0:b2ad:aaff:fe4e:5500 Full 31
=======================================================================================
OSPF Virtual Neighbor - GlobalRouter
=======================================================================================
NBRAREAID NBRROUTERID VIRTINTFID NBRIPV6ADDR STATE
---------------------------------------------------------------------------------------
=======================================================================================
OSPF NBMA Neighbor - GlobalRouter
=======================================================================================
---------------------------------------------------------------------------------------
Switch1:1(config-if)#exit
================================================================================
RIPng Interface - GlobalRouter
================================================================================
IFINDX COST POISON SEND ADMIN OPER
STATUS DEFAULT STATUS STATUS
--------------------------------------------------------------------------------
2050 (2 ) 1 disable disable enable enable
==========================================================================
RIPng Global - GlobalRouter
===========================================================================
Rip : Enabled
HoldDown Time : 120
Timeout Interval : 180
Update Time : 30
Default Info Metric : 1
Default Info State : Disabled
Default Import Metric : 1
Configuration on Switch–2
On Switch-2, configure VLAN 2 and VLAN 3 with the IPv6 interfaces 2000:0:0:0:0:0:0:2/64 and
3000:0:0:0:0:0:0:2/64 respectively.
VLAN configuration:
Switch2:1>enable
Switch2:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
===================================================================================
Vlan Basic
===================================================================================
VLAN MSTP
ID NAME TYPE INST_ID PROTOCOLID SUBNETADDR SUBNETMASK VRFID
-----------------------------------------------------------------------------------
1 Default byPort 0 none N/A N/A 0
2 VLAN-2 byPort 0 none N/A N/A 0
3 VLAN-3 byPort 0 none N/A N/A 0
=======================================================================
Vlan Port
========================================================================
VLAN PORT ACTIVE STATIC NOT_ALLOW
ID MEMBER MEMBER MEMBER MEMBER
------------------------------------------------------------------------
1 1/1-1/16,1/17/1- 1/1-1/16,1/17/1-
1/17/4,1/18/1- 1/17/4,1/18/1-
1/18/4,2/1-2/16, 1/18/4,2/1-2/16,
2/17/1-2/17/4, 2/17/1-2/17/4,
2/18/1-2/18/4,3/1- 2/18/1-2/18/4,3/1-
3/6,4/1-4/4 3/6,4/1-4/4
2 4/5 4/5
3 4/6 4/6
==================================================================================================================
Vlan Ipv6 Interface
==================================================================================================================
IFINDX VLAN PHYSICAL ADMIN OPER TYPE MTU HOP REACHABLE RETRANSMIT MCAST IPSEC RPC RPCMODE
===================================================================================================================
Vlan Ipv6 Address
===================================================================================================================
IPV6 ADDRESS VLAN-ID TYPE ORIGIN STATUS
-------------------------------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:2/64 V-2 UNICAST MANUAL PREFERRED
fe80:0:0:0:b2ad:aaff:fe4e:5500/64 V-2 UNICAST LINKLAYER PREFERRED
3000:0:0:0:0:0:0:2/64 V-3 UNICAST MANUAL PREFERRED
fe80:0:0:0:b2ad:aaff:fe4e:5501/64 V-3 UNICAST LINKLAYER PREFERRED
Port configuration:
Switch2:1(config)#interface GigabitEthernet 4/5
Switch2:1(config)#encapsulation dot1q
Switch2:1(config)#no shutdown
Switch2:1(config)#interface vlan 3
Switch2:1(config-if)#ipv6 ospf area 0.0.0.0
Switch2:1(config-if)#ipv6 ospf enable
Switch2:1(config-if)#show ipv6 ospf
=================================================================================
OSPFv3 Global Information - GlobalRouter
=================================================================================
router-id : 170.78.84.0
admin-state : ENABLED
version : 3
area-bdr-rtr-state : FALSE
as-bdr-rtr-state : FALSE
helper-mode : ENABLED
as-scope-lsa-count : 0
lsa-checksum : 0
originate-new-lsas : 56
rx-new-lsas : 62
ext-lsa-count : 0
Switch2:1(config-if)#show ipv6 ospf interface
==================================================================================
OSPF Interface - GlobalRouter
==================================================================================
IFINDX(VID/BRT) AREAID ADM IFSTATE METRIC PRI DR/BDR IFTYPE
----------------------------------------------------------------------------------
2050 (2 ) 0.0.0.0 ena BDR 1 1 170.78.88.0 BROADCAST
170.78.84.0
2051 (3 ) 0.0.0.0 ena DR 1 1 170.78.84.0 BROADCAST
0.0.0.0
==================================================================================
OSPF Virtual Interface - GlobalRouter
==================================================================================
----------------------------------------------------------------------------------
==================================================================================
OSPF Neighbor - GlobalRouter
==================================================================================
IFINDX(VID/BRT) NBRROUTERID NBRIPADDR STATE TTL
----------------------------------------------------------------------------------
2050 (2) 170.78.88.0 fe80:0:0:0:b2ad:aaff:fe4e:5900 Full 30
===================================================================================
OSPF Virtual Neighbor - GlobalRouter
===================================================================================
NBRAREAID NBRROUTERID VIRTINTFID NBRIPV6ADDR STATE
-----------------------------------------------------------------------------------
===================================================================================
OSPF NBMA Neighbor - GlobalRouter
===================================================================================
------------------------------------------------------------------------------------
=====================================================================================
OSPFv3 Global Information - GlobalRouter
=====================================================================================
router-id : 170.78.88.0
admin-state : ENABLED
version : 3
area-bdr-rtr-state : FALSE
as-bdr-rtr-state : FALSE
helper-mode : ENABLED
as-scope-lsa-count : 0
lsa-checksum : 0
originate-new-lsas : 22
rx-new-lsas : 11
ext-lsa-count : 0
Switch2:1(config)#interface vlan 3
Switch2:1(config-if)#ipv6 rip
Switch2:1(config-if)#ipv6 rip enable
Switch2:1(config-if)#exit
Switch2:1(config)#
Switch2:1(config)#show ipv6 rip interface
========================================================================
RIPng Interface - GlobalRouter
========================================================================
IFINDX COST POISON SEND ADMIN OPER
STATUS DEFAULT STATUS STATUS
-------------------------------------------------------------------------
2050 (2 ) 1 disable disable enable enable
2051 (3 ) 1 disable disable enable enable
=============================================================
RIPng Global - GlobalRouter
==============================================================
Rip : Enabled
HoldDown Time : 120
Timeout Interval : 180
Update Time : 30
Default Info Metric : 1
Default Info State : Disabled
Default Import Metric : 1
====================================================================================================
IPv6 Routing Table Information - GlobalRouter
====================================================================================================
Destination Address/PrefixLen NEXT HOP VID/BID/TID PROTO COST AGE TYPE PREF
----------------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:1/64 0:0:0:0:0:0:0:0 V-2 LOCAL 1 0 B 0
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 OSPF 2 0 B 20
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 RIP 2 0 A 100
----------------------------------------------------------------------------------------------------
===================================================================================================
IPv6 Routing Table Information - GlobalRouter
===================================================================================================
Destination Address/PrefixLen NEXT HOP VID/BID/TID PROTO COST AGE TYPE PREF
---------------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:1/64 0:0:0:0:0:0:0:0 V-2 LOCAL 1 0 B 0
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 OSPF 2 0 B 20
---------------------------------------------------------------------------------------------------
======================================================================================================
IPv6 Routing Table Information - GlobalRouter
======================================================================================================
Destination Address/PrefixLen NEXT HOP VID/BID/TID PROTO COST AGE TYPE PREF
------------------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:2/64 0:0:0:0:0:0:0:0 V-2 LOCAL 1 0 B 0
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 LOCAL 2 0 B 20
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 LOCAL 2 0 A 100
------------------------------------------------------------------------------------------------------
==========================================================================================
IPv6 Routing Table Information - GlobalRouter
==========================================================================================
Destination Address/PrefixLen NEXT HOP VID/BID/TID PROTO COST AGE TYPE PREF
------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:2/64 0:0:0:0:0:0:0:0 V-2 LOCAL 1 0 B 0
3000:0:0:0:0:0:0:2/64 0:0:0:0:0:0:0:0 V-3 LOCAL 1 0 B 20
------------------------------------------------------------------------------------------
In the following example scenario, you configure a different routing preference for the RIPng protocol
on Switch-1 and observe the learning of best and alternative routes. The existing route preference for
RIPng is 100.
Switch1:1#show ipv6 route alternative
========================================================================================================
IPv6 Routing Table Information - GlobalRouter
========================================================================================================
Destination Address/PrefixLen NEXT HOP VID/BID/TID PROTO COST AGE TYPE PREF
--------------------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:1/64 0:0:0:0:0:0:0:0 V-2 LOCAL 1 0 B 0
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 OSPF 2 0 B 20
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 RIP 2 0 A 100
--------------------------------------------------------------------------------------------------------
===================================================================================================
IPv6 Routing Table Information - GlobalRouter
===================================================================================================
Destination Address/PrefixLen NEXT HOP VID/BID/TID PROTO COST AGE TYPE PREF
---------------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:1/64 0:0:0:0:0:0:0:0 V-2 LOCAL 1 0 B 0
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 OSPF 2 0 B 20
---------------------------------------------------------------------------------------------------
Configure a different route preference for the RIPng protocol, for example, 19:
Switch1:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch1:1(config)#ipv6 route preference protocol ripng 19
Switch1:1(config)#exit
========================================================================================
IPv6 Route Preference - GlobalRouter
========================================================================================
PROTOCOL DEFAULT CONFIG
----------------------------------------------------------------------------------------
LOCAL 0 0
STATIC 5 5
SPBM_L1 7 7
OSPFv3_INTRA 20 20
OSPFv3_INTER 25 25
EBGP 45 45
RIPNG 100 19
OSPFv3_E1 120 120
OSPFv3_E2 125 125
IBGP 175 175
View the updated route preference (for RIPng) on Switch-1. The RIPng route is now learnt as the best
route as it has lesser value of route preference (19) than that of OSPFv3 (20), as shown below.
Switch1:1(config)#show ipv6 route
===================================================================================================
IPv6 Routing Table Information - GlobalRouter
===================================================================================================
Destination Address/PrefixLen NEXT HOP VID/BID/TID PROTO COST AGE TYPE PREF
---------------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:1/64 0:0:0:0:0:0:0:0 V-2 LOCAL 1 0 B 0
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 RIP 2 0 B 19
---------------------------------------------------------------------------------------------------
===========================================================================================================
IPv6 Routing Table Information - GlobalRouter
===========================================================================================================
Destination Address/PrefixLen NEXT HOP VID/BID/TID PROTO COST AGE TYPE PREF
-----------------------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:1/64 0:0:0:0:0:0:0:0 V-2 LOCAL 1 0 B 0
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 RIP 2 0 B 19
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 OSPF 2 0 A 20
-----------------------------------------------------------------------------------------------------------
=======================================================================================================
IPv6 Routing Table Information - GlobalRouter
=======================================================================================================
Destination Address/PrefixLen NEXT HOP VID/BID/TID PROTO COST AGE TYPE PREF
-------------------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:1/64 0:0:0:0:0:0:0:0 V-2 LOCAL 1 0 B 0
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 OSPF 2 0 B 20
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 RIP 2 0 A 100
-------------------------------------------------------------------------------------------------------
===================================================================================================
IPv6 Routing Table Information - GlobalRouter
===================================================================================================
Destination Address/PrefixLen NEXT HOP VID/BID/TID PROTO COST AGE TYPE PREF
---------------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:1/64 0:0:0:0:0:0:0:0 V-2 LOCAL 1 0 B 0
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 OSPF 2 0 B 20
---------------------------------------------------------------------------------------------------
======================================================================================================
IPv6 Routing Table Information - GlobalRouter
======================================================================================================
Destination Address/PrefixLen NEXT HOP VID/BID/TID PROTO COST AGE TYPE PREF
------------------------------------------------------------------------------------------------------
2000:0:0:0:0:0:0:1/64 0:0:0:0:0:0:0:0 V-2 LOCAL 1 0 B 0
3000:0:0:0:0:0:0:2/64 fe80:0:0:0:b2ad:aaff:fe4e:5500 V-2 OSPF 2 0 B 20
------------------------------------------------------------------------------------------------------
Extreme Networks offers two Analytics solutions that monitor traffic on your network:
• sFlow
• Application Telemetry
Important
You can use either sFlow, or sFlow with Application Telemetry or both at the same time as
they can coexist on a switch. Note that to enable Application Telemetry, you must enable
sFlow first.
In both solutions, the switch collects flow information and sends it to a central server that processes the
information and provides statistical data in the form of reports. Then you can use Extreme Management
Center or ExtremeCloud IQ - Site Engine to analyze the reports to give you a full understanding of
the applications on your network and learn who is using those applications. Extreme Management
Center or ExtremeCloud IQ - Site Engine also provides information such as DoS tracking, security
monitoring, and statistics for protocols, ports, and applications.
This section describes how Application Telemetry works and how to configure it. Because there is some
commonality between the two features, this section also describes some sFlow features.
For further information about sFlow, see sFlow Fundamentals on page 3089.
For more information about Extreme Management Center or ExtremeCloud IQ - Site Engine, see
the documentation on the Extreme Networks Documentation portal (www.extremenetworks.com/
documentation/) with special attention to the Application Analytics User Guide.
The policy rules that Application Telemetry uses are ACL and ACE filters that are pre-configured in a
policy configuration file called sflow.pol. This policy file is not user configurable. These rules enable
the switch to recognize several signatures that represent a combination of the following:
• IP protocol type (TCP/UDP)
• TCP flags
• Layer 4 port numbers
• data patterns (defined as offset/data/mask triplets)
Pattern matching enables Application Telemetry to target very specific, well-defined packets in each
flow and not full streams of traffic. Thus, the switch mirrors only a relatively few packets to the Analytics
Engine. It is the Analytics Engine that performs deep packet inspection to create reports of statistical
data.
Important
When you enable Application Telemetry, the switch loads the filter rules based on the logic
below:
• Application Telemetry uses the apptelemetry.pol or the sflow.pol file because the
filter rules can exist in either file. The sflow.pol file is the default file and is included
with the image that is loaded on the switch. This file contains the default filter rules.
The apptelemetry.pol file is the user-defined file, which can be updated by the
ExtremeCloud IQ ‑ Site Engine. To use this file, configure Application Telemetry using the
ExtremeCloud IQ ‑ Site Engine. When you run the Application Telemetry LiveUpdate script
from ExtremeCloud IQ ‑ Site Engine, the updated apptelemetry.pol file is placed
in /intflash/.
• When you enable Application Telemetry, the feature uses the files in the following order:
◦ If the user-defined file (apptelemetry.pol) exists, then the switch loads the rules
from this file.
◦ If the apptelemetry.pol file does not exist or if there is a problem reading this file,
then the switch uses the default sflow.pol file.
Both sFlow and Application Telemetry use an agent to package either the sFlow streams or the
Application Telemetry packets. To configure the agent, they both use the sflow agent-ip
command.
Note
The switch sends only one mirrored copy, even if the packet matches two or more policies.
For information on which mirrored copies take precedence, see Configuration considerations.
The tunnel destination for the mirrored traffic is a server where software performs a deep packet
inspection of the mirrored traffic.
• sFlow sends flow and counter samples as datagrams to the sFlow Collector.
• Application Telemetry sends packets that match the policy rules over a GRE tunnel to the Analytics
Engine.
To configure the tunnel destination, they both use the sflow collector <1–2> command.
Important
You can configure two Collectors, but Application Telemetry uses Collector 1 only. You must
configure Collector 1 before you enable Application Telemetry.
General Considerations
The following list describes general Application Telemetry operational considerations:
• When you enable Application Telemetry, it is globally enabled on all ports. You cannot disable the
feature on a per-port basis.
• Application Telemetry supports IPv4 and IPv6 packets, although host monitoring is available for
IPv4 hosts only.
• Application Telemetry filter rules are not user configurable. However, an updated app-
telemetry.pol file can be installed through the ExtremeCloud IQ ‑ Site Engine.
• If a user-created filter rule (ACL) conflicts with an Application Telemetry defined filter, the user-
created rule always takes precedence.
• There are two configurable sFlow collectors (Collector 1 and Collector 2). However, Application
Telemetry uses Collector 1 only and you must configure it before enabling Application Telemetry.
• In a Fabric Extend deployment on VSP 4450 Series, VSP 7200 Series, VSP 8200 Series, VSP 8400
Series, or VSP 8400 Series, Application Telemetry does not mirror ingressing NNI to UNI IP Shortcut
traffic.
Platform-Specific Considerations
This section provides a summary of operational considerations for different switches.
Configuration Overview
After the optional step of uploading the apptelemetry.pol file to flash memory using Extreme
Management Center or ExtremeCloud IQ - Site Engine, activate Application Telemetry by configuring
the following:
1. Configure the IP address of the egress interface for the GRE tunnel with the sFlow agent-ip
command.
2. Enable sFlow with the sflow enable command.
3. Configure the IP address of the Analytics Engine with the sFlow collector 1 command.
4. Enable Application Telemetry with the app-telemetry enable command.
The following figure shows the Application Telemetry agent on various routers and switches with
packets being sent to the Analytics Engine.
Host Monitoring
You can use Application Telemetry to get better visibility for a selected host by performing a timed
packet capture for both incoming and outgoing traffic specific to that host. Initiate the packet capture
(PCAP) from ExtremeCloud IQ ‑ Site Engine and specify a source or destination IP address to match.
ExtremeCloud IQ ‑ Site Engine pushes an additional rule to the Application Telemetry agent on the
switch, which captures packets that match this rule and uses the existing ERSPAN GRE session to mirror
these packets to Analytics Engine for analysis.
To use this feature, all configuration occurs in ExtremeCloud IQ ‑ Site Engine. The following prerequisites
for configuration must be met:
• Application Telemetry is active.
• The Analytics Engine records application flows.
In ExtremeCloud IQ ‑ Site Engine, select a flow and configure packet capture. You can specify the
host, either the originating or destination host for the flow, and a monitoring interval. For more
information about how to configure packet capture in ExtremeCloud IQ ‑ Site Engine, see the
ExtremeCloud IQ ‑ Site Engine documentation.
Although you use ExtremeCloud IQ ‑ Site Engine to configure the packet capture, the switch logs a
message when this feature is activated or deactivated. Configuration of host monitoring is not saved;
the monitoring is time-based.
Note
Host monitoring is supported beginning with ExtremeCloud IQ ‑ Site Engine version 8.2.4.
Procedure
configure terminal
2. Enable the agent IPv4 address:
sflow agent–ip {A.B.C.D}
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#sflow agent-ip 192.0.2.27
Variable Definitions
Use the data in the following table to use the sflow agent-ip command.
Variable Definition
{A.B.C.D.} Specifies the agent-ip address (IPv4).
sFlow supports up to two collectors for each interface slot in the chassis. However, Application
Telemetry supports Collector 1 only.
Note
• You can configure two Collectors, but Application Telemetry uses Collector 1 only. You
must configure Collector 1 before you enable Application Telemetry.
• Before you change or remove Collector 1, you must disable Application Telemetry.
• By default, Application Telemetry is globally disabled.
Procedure
configure terminal
2. Configure the Analytics Engine information using Collector 1:
sflow collector 1 address {A.B.C.D} [owner WORD<1-20>] [vrf
WORD<1-16>]
3. Verify the Analytics Engine configuration:
show sflow collector 1
4. Enable Application Telemetry:
app-telemetry enable
5. Verify the global configuration:
show app-telemetry status
Note
The output of this command shows whether Application Telemetry is enabled or not and if
the collector is reachable.
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#sflow collector 1 address 192.0.2.26 owner sflow1 port 6343 timeout 497
Switch:1(config)#show sflow collector 1
==========================================================================================
sFlow Collector Configuration Info
==========================================================================================
Id Owner Collector-IP Port Timeout(secs) Reachable via
------------------------------------------------------------------------------------------
1 sflow1 192.0.2.26 6343 497 192.0.2.15
------------------------------------------------------------------------------------------
Variable Definitions
Use the data in the following table to use the sflow collector command.
Variable Value
<1–2> Specifies the ID of the collector where you want to send packets for
analysis. Application Telemetry uses Collector 1 only.
owner WORD<1–20> Specifies the name of the collector.
Collector-IP Specifies the IP address of the collector.
{A.B.C.D.}
port <1–65535> Specifies the destination port. The default port is 6343.
Note:
Application Telemetry does not use this parameter.
timeout <1–65535> Specifies the time remaining (in seconds) before the collector is released.
The default timeout is 0, which means the timeout is not used and the
switch sends data forever.
Note:
Application Telemetry does not use this parameter.
vrf WORD<1–16> Specifies the name of the VRF used to reach the collector.
Note:
This parameter is not supported on all hardware platforms.
Procedure
Example
Switch:1>show app—telemetry counter
=================================================================
Application Telemetry Counters
=================================================================
EntryId Name Packets Bytes
-----------------------------------------------------------------
1 ssh 1258 72145
2 sslclient 457 27000
-----------------------------------------------------------------
Procedure
Example
=================================================================
Application Telemetry Counters
=================================================================
EntryId Name Packets Bytes
-----------------------------------------------------------------
1 ssh 0 0
2 sslclient 0 0
-----------------------------------------------------------------
sFlow and Application Telemetry send mirrored packets from a common source to a common
destination. sFlow sends samples directly to the destination, while Application Telemetry sends
mirrored packets through a GRE tunnel, to the same destination.
Both sFlow and Application Telemetry use an agent to package either the sFlow streams or the
Application Telemetry packets. To configure the agent, they both use the Serviceability > Sflow >
Globals and Serviceability > Sflow > Collector tabs. For more information, see sFlow Configuration
Using EDM on page 3100.
Procedure
Name Description
AdminEnable Shows whether Application Telemetry is enabled.
By default, the check box is not enabled.
ClearCounterStats Clears the Application Telemetry status counters.
Procedure
Name Description
CounterId Shows the Application Telemetry rule ID.
CounterName Shows the rule name.
CounterPkts Shows the number of packets transmitted to
the Analytics Engine that matched the specified
pattern in the rule.
CounterBytes Shows the total number of bytes in the packets.
Procedure
Use this procedure to view the status of the Application Telemetry collector.
Procedure
Name Description
Collector IP Address Shows the address of the Application Telemetry
collector.
IsReachable Shows whether the Application Telemetry
collector is reachable.
NextHop If the collector is reachable, shows the name
or address of the next hop through which the
collector is reachable.
Use Bidirectional Forwarding Detection (BFD) to provide a failure detection mechanism between two
systems.
BFD Fundamentals
The following sections provide fundamentals information about Bidirectional Forwarding Detection
(BFD).
BFD Overview
Bidirectional Forwarding Detection (BFD) is a simple Hello protocol used between two peers. In BFD,
peer systems periodically transmit BFD packets to each other. If one of the systems does not receive
a BFD packet after a certain period of time, the system assumes that the link or other system is not
operating.
BFD provides low-overhead, short-duration failure detection between two systems. BFD also provides a
single mechanism for connectivity detection over any media, at any protocol layer.
Because BFD sends rapid failure-detection notifications to the routing protocols that run on the local
system, which initiates routing table recalculations, BFD helps reduce network convergence time.
BFD supports IPv4/IPv6 single hop detection for static routes, OSPFv2, OSPFv3, iBGP, iBGPv6.
Forwarding path failure detection for Fabric Extend tunnels is supported over an IPv4 network only.
Note
BFD for IPv6 interfaces is a demonstration feature on some products. For more information
about feature support, see VOSS Feature Support Matrix.
Note
iBGPv6 is not supported in VRF.
BFD Operation
The switch uses one BFD session for all protocols with the same destination. For example, if a network
runs OSPFv2 and BGP across the same link with the same peer, only one BFD session is established, and
BFD shares session information with both routing protocols.
You can enable BFD over data paths with specified OSPFv2 and OSPFv3 neighbors, BGP neighbors,
static routing next-hop addresses, and Fabric Extend tunnels.
The switch supports BFD asynchronous mode, which sends BFD control packets between two systems
to activate and maintain BFD neighbor sessions. To reach an agreement with its neighbor about
how rapidly failure detection occurs, each system estimates how quickly it can send and receive BFD
packets.
A session begins with the periodic, slow transmission of BFD control packets. When bidirectional
communication is achieved, the BFD session comes up.
After the session is up, the transmission rate of Control packets can increase to achieve detection time
requirements. If Control packets are not received within the calculated detection time, the session is
declared down. After a session is down, Control packet transmission returns to the slow rate.
If a session is declared down, it cannot come back up until the remote end signals that it is down (three-
way handshake). A session can be kept administratively down by configuring the state of AdminDown.
In asynchronous mode, detection time is equal to the value of DetectMult received from the
remote system multiplied by the agreed transmit interval of the remote system (the greater of
RequiredMinRxInterval and DesiredMinTxInterval.) DetectMult is approximately equal to the number
of sequential packets that must be missed to declare a session down.
BFD States
A session normally proceeds through three states; two states are used to establish a session (Init and
Up) and one state is used to tear down a session (Down). This allows a three-way handshake for both
session establishment and session teardown, assuring that both systems are aware of all session state
changes. There is a fourth state (AdminDown) that you can use to administratively put a session down
indefinitely.
• Down state: Indicates the session is down or has just been created. The session will remain in Down
state until the remote system sends a BFD control packet indicating anything other than Up state. If
the control packet signals Down state, the session advances to Init state. If the control packet signals
Init state, the session advances to Up state.
• Init state: In this state, the host system establishes communications with the remote system and
sends a request to move the session to the Up state, but the remote system has not yet recognized
the request. A session remains in Init state until it receives a BFD control packet signaling Init or Up
state, or until the connectivity timer expires, indicating communication with the remote system is
lost.
• Up state: Indicates the BFD session is established and connectivity is working. A session remains in
Up state until connectivity fails or until the session is taken down administratively.
• AdminDown state: Indicates the BFD session is being held down administratively. This causes the
remote system to enter Down state and remain there until the local system exits AdminDown state.
BFD Configuration
The following sections provide conceptual information about BFD configuration. For detailed
procedural information about BFD configuration, see BFD Configuration using CLI on page 353 and
BFD Configuration using EDM on page 367.
Enable BFD
To enable Bidirectional Forwarding Detection (BFD) between 2 peers:
• Configure BFD globally.
• Configure BFD on the required interfaces of both peer systems.
Note
To successfully delete a BFD session, you must execute the commands in the following order:
If you change the above order of operations, the BFD session is not deleted.
BFD Considerations
The following considerations apply to Bidirectional Forwarding Detection (BFD):
• BFD is supported only in asynchronous mode. Demand mode and echo functionalities are not
supported.
• You configure BFD parameters on a per session basis, not on a per next-hop basis.
• BFD creates multiple sessions even though a neighbor shares an IP address.
• The granularity of the fault detection interval in BFD is 100 ms, and the minimum multiplier is 2.
The minimum value for the transmit interval or the receive interval is 100 ms. If you configure the
transmit interval or the receive interval as 100 ms, you must configure a value of 4 or greater for the
multiplier.
You can configure a total of 16 BFD sessions. Of the 16 possible BFD sessions, you can configure a
maximum of 4 BFD sessions with the minimum value for transmit interval or receive interval. You
can configure the remaining BFD sessions with a transmit interval or a receive interval that is greater
than or equal to the 200 ms default value.
• BFD is not supported over RSMLT links. This applies to BFD sessions over IPv4 interfaces and IPv6
interfaces.
• Inter-tunnel routing with 6in4 tunnels is not supported. This means that incoming IPv6 packets over
a tunnel cannot be forwarded over another tunnel configured on the same switch.
• BFD for Interior Border Gateway Protocol (iBGP) and BGPv6 in VRF is not supported.
• BFD for eBGPv6 in VRF is not supported.
• Session dampening is not supported for BFD.
• The switch supports BFD multihop only at the eBGP application level. For other applications, the
switch does not support BFD multihop, as defined by RFC 5883. However, there is no requirement
for source and destination IP addresses to be in the same subnet.
• BFD over IPv6 Fabric Extend (FE) tunnels is not supported.
• The minimum value for the transmit interval or the receive interval is 1 second with a fault detection
time of 3 seconds for BFD over IPv4 FE tunnels.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
enable BFD globally.
Note
Enabling BFD globally does not establish a BFD session. To establish a BFD session, you must
also configure BFD at the interface level and at the application level.
Procedure
configure terminal
router bfd
2. Enable BFD:
router bfd enable
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#router bfd
Switch:1(router-bfd)#router bfd enable
Use the following procedure to enable and to configure Bidirectional Forwarding Detection (BFD) on an
IPv4 interface. All interface configuration is performed at the VLAN, GigabitEthernet, or Loopback level.
Note
Enabling BFD on an interface does not establish a BFD session. To establish a BFD session,
you must enable BFD globally and at the application level.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Variable Definitions
The following table defines parameters for the ip bfd command.
Variable Value
{slot/port[/sub- Identifies the slot and port in one of the following formats: a single slot
port] [-slot/port[/ and port (slot/port), a range of slots and ports (slot/port-slot/port), or
sub-port]] [,...]} a series of slots and ports (slot/port,slot/port,slot/port). If the platform
supports channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
enable Enable BFD on a port, VLAN, or loopback.
interval <100-65335> Specifies the transmit interval in milliseconds. The default is 200 ms.
Note:
For XA1400 Series, the default is 1000 ms.
Note:
The minimum value you can configure for the transmit interval is 100 ms.
You can configure a maximum of 4 BFD sessions with the minimum value
for the transmit interval. You can configure any remaining BFD sessions
with a transmit interval that is greater than or equal to the 200 ms default
value.
min-rx <100-65535> Specifies the receive interval in milliseconds. The default is 200 ms.
Note:
For XA1400 Series, the default is 1000 ms.
Note:
The minimum value you can configure for the receive interval is 100 ms.
You can configure a maximum of 4 BFD sessions with the minimum value
for the receive interval. You can configure any remaining BFD sessions
with a receive interval that is greater than or equal to the 200 ms default
value.
multiplier <1-20> Specifies the multiplier used to calculate the amount of time BFD waits
before declaring a receive timeout. The default is 3.
Note:
If you configure the transmit interval or the receive interval as 100 ms, you
must configure a value of 4 or greater for the multiplier.
port {slot/port[/ Identifies the slot and port in one of the following formats: a single slot
sub-port] [-slot/ and port (slot/port), a range of slots and ports (slot/port-slot/port), or
port[/sub-port]] a series of slots and ports (slot/port,slot/port,slot/port). If the platform
[,...]} supports channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
vlan <1-4094> Specifies the VLAN ID.
loopback <1-256> Specifies the Loopback ID.
Use the following procedure to enable and to configure BFD on an IPv6 interface. All interface
configuration is performed at the VLAN or GigabitEthernet level.
Note
Enabling BFD on an interface does not establish a BFD session. To establish a BFD session,
you must enable BFD globally and at the application level.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Variable Definitions
The following table defines parameters for the ip bfd command.
Variable Value
{slot/port[/sub- Identifies the slot and port in one of the following formats: a single slot
port] [-slot/port[/ and port (slot/port), a range of slots and ports (slot/port-slot/port), or
sub-port]] [,...]} a series of slots and ports (slot/port,slot/port,slot/port). If the platform
supports channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
enable Enable BFD on a port, VLAN, or loopback.
interval <100-65335> Specifies the transmit interval in milliseconds. The default is 200 ms.
Note:
For XA1400 Series, the default is 1000 ms.
Note:
The minimum value you can configure for the transmit interval is 100 ms.
You can configure a maximum of 4 BFD sessions with the minimum value
for the transmit interval. You can configure any remaining BFD sessions
with a transmit interval that is greater than or equal to the 200 ms default
value.
min-rx <100-65535> Specifies the receive interval in milliseconds. The default is 200 ms.
Note:
For XA1400 Series, the default is 1000 ms.
Note:
The minimum value you can configure for the receive interval is 100 ms.
You can configure a maximum of 4 BFD sessions with the minimum value
for the receive interval. You can configure any remaining BFD sessions
with a receive interval that is greater than or equal to the 200 ms default
value.
multiplier <1-20> Specifies the multiplier used to calculate the amount of time BFD waits
before declaring a receive timeout. The default is 3.
Note:
If you configure the transmit interval or the receive interval as 100 ms, you
must configure a value of 4 or greater for the multiplier.
port {slot/port[/ Identifies the slot and port in one of the following formats: a single slot
sub-port] [-slot/ and port (slot/port), a range of slots and ports (slot/port-slot/port), or
port[/sub-port]] a series of slots and ports (slot/port,slot/port,slot/port). If the platform
[,...]} supports channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
vlan <1-4094> Specifies the VLAN ID.
loopback <1-256> Specifies the Loopback ID.
BFD supports internal Border Gateway Protocol (iBGP) and external Border Gateway Protocol (eBGP)
on IPv4 interfaces. You configure BFD on a VRF instance the same way you configure the GlobalRouter,
except that you must use VRF Router Configuration mode and the prefix ip bgp. BFD does not
support BGPv6 for VRF on IPv6 interfaces.
Note
Enabling BFD at the BGP application level does not establish a BFD session. To establish a
BFD session, you must enable BFD globally and at the interface level.
Procedure
configure terminal
router bgp
2. Enable BFD for the BGP protocol:
neighbor WORD<0-1536> fall-over bfd
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#router bgp
Switch:1(router-bgp)#neighbor 192.0.2.15 fall-over bfd
Variable Definitions
The following table defines parameters for the neighbor command.
Variable Value
WORD<0-1536> Specifies the peer IP address or the peer group name.
BFD supports Open Shortest Path First (OSPF) for IPv4 interfaces and OSPFv3 for IPv6 interfaces.
Use the following procedure to enable BFD at the OSPF application level.
Note
Enabling BFD at the OSPF application level does not establish a BFD session. To establish a
BFD session, you must enable BFD globally and at the interface level.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#interface gigabitethernet 1/3
Switch:1(config-if)#ip ospf bfd
Variable Definitions
The following table defines parameters for the ip ospf bfd command.
Variable Value
{slot/port[/sub-port] Identifies the slot and port in one of the following formats: a single slot
[-slot/port[/sub- and port (slot/port), a range of slots and ports (slot/port-slot/port), or
port]][,...]} a series of slots and ports (slot/port,slot/port,slot/port). If the platform
supports channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN
IDs 1 to 4059 are configurable and the system reserves VLAN IDs
4060 to 4094 for internal use. On switches that support the vrf-
scaling and spbm-config-mode boot configuration flags, if you
enable these flags, the system also reserves VLAN IDs 3500 to 3998.
VLAN ID 1 is the default VLAN and you cannot create or delete VLAN
ID 1.
Procedure
configure terminal
2. Configure BFD on an IPv4 static route:
ip route bfd {A.B.C.D}
Variable Definitions
The following table defines parameters for the ip route bfd command.
Variable Value
{A.B.C.D} Specifies the BFD static route IPv4 address.
Procedure
configure terminal
2. Configure BFD on an IPv6 static route:
ipv6 route bfd WORD<0-128>
3. (Optional) Configure an IPv6 static route for a port:
ipv6 route bfd WORD<0-128> port {slot/port[/sub-port] [-slot/port[/
sub-port]] [,...]}
4. (Optional) Configure an IPv6 static route for a VLAN:
ipv6 route bfd WORD<0-128> vlan <1-4094>
Variable Definitions
The following table defines parameters for the ipv6 route bfd command.
Variable Value
WORD<0-128> Specifies the BFD static route IPv6 address.
port {slot/port[/sub- Specifies the port number for the BFD IPv6 static route.
port] [-slot/port[/
sub-port]] [,...]}
vlan <1-4094> Specifies the VLAN ID for the BFD IPv6 static route.
Use the following procedure to clear local and remote Bidirectional Forwarding Detection (BFD) session
statistics for IPv4 or IPv6 interfaces.
Procedure
Variable Definitions
The following table defines parameters for the clear ip bfd stats command.
Variable Value
vrf WORD<1-16> Specifies a VRF instance by VRF name.
vrfids WORD<0-512> Specifies a VRF or range of VRFs by ID.
Procedure
Example
The following example displays global configuration information for BFD on an IPv4 interface.
Switch:1>show ip bfd
================================================================================
BFD information - GlobalRouter
================================================================================
BFD Version : 1
Admin Status : TRUE
Trap Enable : FALSE
--------------------------------------------------------------------------------
Total session number : 1
Variable Definitions
The following table defines parameters for the show ip bfd command.
Variable Value
vrf WORD<1-16> Specifies a VRF instance by VRF name.
vrfids WORD<0-512> Specifies a VRF or range of VRFs by ID.
Procedure
Examples
The following example displays VLAN interface configuration information for BFD.
Switch:1>show ip bfd interfaces vlan 11
==========================================================================================
Vlan Bfd
==========================================================================================
VLAN STATUS MIN_RX INTERVAL MULTIPLIER VRF-ID
------------------------------------------------------------------------------------------
11 enable 200 200 3 0
The following example displays Loopback interface configuration information for BFD:
Switch:1>enable
Switch:1#show ip bfd interfaces loopback
================================================================================
Circuitless IP Interface Bfd
================================================================================
INTF ID STATUS MIN_RX INTERVAL MULTIPLIER VRF-ID
--------------------------------------------------------------------------------
1 enable 200 200 3 0
2 enable 200 200 3 2
Variable Definitions
The following table defines parameters for the show ip bfd interfaces command.
Variable Value
{slot/port[/sub- Identifies the slot and port in one of the following formats: a single slot
port][-slot/port[/ and port (slot/port), a range of slots and ports (slot/port-slot/port), or a
sub-port]][,...]} series of slots and ports (slot/port,slot/port,slot/port). If the platform
supports channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN IDs
1 to 4059 are configurable and the system reserves VLAN IDs 4060 to
4094 for internal use. On switches that support the vrf-scaling and
spbm-config-mode boot configuration flags, if you enable these flags,
the system also reserves VLAN IDs 3500 to 3998. VLAN ID 1 is the default
VLAN and you cannot create or delete VLAN ID 1.
vrf WORD<1-16> Specifies a VRF instance by VRF name.
vrfids WORD<0-512> Specifies a VRF or range of VRFs by ID.
Procedure
Example
The following example displays port configuration information for BFD.
Switch:1>show ipv6 bfd interfaces gigabitethernet 1/3
==========================================================================================
Port Bfd
==========================================================================================
PORT STATUS MIN_RX INTERVAL MULTIPLIER VRF-ID
------------------------------------------------------------------------------------------
1/3 enable 200 200 3 0
Variable Definitions
The following table defines parameters for the show ip bfd interfaces command.
Variable Value
{slot/port[/sub- Identifies the slot and port in one of the following formats: a single slot
port][-slot/port[/ and port (slot/port), a range of slots and ports (slot/port-slot/port), or a
sub-port]][,...]} series of slots and ports (slot/port,slot/port,slot/port). If the platform
supports channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN IDs
1 to 4059 are configurable and the system reserves VLAN IDs 4060 to
4094 for internal use. On switches that support the vrf-scaling and
spbm-config-mode boot configuration flags, if you enable these flags,
the system also reserves VLAN IDs 3500 to 3998. VLAN ID 1 is the default
VLAN and you cannot create or delete VLAN ID 1.
vrf WORD<1-16> Specifies a VRF instance by VRF name.
vrfids WORD<0-512> Specifies a VRF or range of VRFs by ID.
Use this procedure to display BFD session information for IPv4 neighbors.
Procedure
5. (Optional) Display BFD neighbor information for a VRF ID or a range of VRF IDs:
show ip bfd neighbors vrfids WORD<0-512>
Example
The following example displays BFD session information for an IPv4 neighbor.
Switch:1>show ip bfd neighbors
========================================================================================================================
BFD Session - GlobalRouter
========================================================================================================================
MY_DISC YOUR_DISC NEXT_HOP STATE MULTI MIN_TX MIN_RX ACT_TX DETECT_TIME REMOTE_STATE APP RUN
Variable Definitions
The following table defines parameters for the show ip bfd neighbors command.
Variable Value
{A.B.C.D} Specifies the next-hop IP address in the format a.b.c.d.
vrf WORD<1-16> Specifies a VRF instance by name (the string length ranges from 1–16
characters).
vrfids WORD<0-512> Specifies a range of VRFs by ID number (the ID ranges from 0–512).
Procedure
Example
The following example displays BFD session information for an IPv6 neighbor.
Switch:1>show ipv6 bfd neighbors
=========================================================================================================================================
BFD Session - GlobalRouter
=========================================================================================================================================
MY_DISC YOUR_DISC NEXT_HOP STATE MULTI MIN_TX MIN_RX ACT_TX DETECT_TIME REMOTE_STATE APP RUN
1 0 2001:DB8:0:0:25AB:0:0:1 Down 3 200 200 1000 0 Down O
-----------------------------------------------------------------------------------------------------------------------------------------
1 out of 1 BFD session displayed
-----------------------------------------------------------------------------------------------------------------------------------------
APP and RUN Legend:
B=BGP_IPv6, O=OSPFv3, S=IPv6 Static Route
-----------------------------------------------------------------------------------------------------------------------------------------
Variable Definitions
The following table defines parameters for the show ipv6 bfd neighbors command.
Variable Value
WORD<0-128> Specifies the next-hop IPv6 address in the format a:b:c:d:e:f:g:h.
vrf WORD<1-16> Specifies a VRF instance by name (the string length ranges from 1–16
characters).
vrfids WORD<0-512> Specifies a range of VRFs by ID number (the ID ranges from 0–512).
Use the following procedure to display BFD statistics for IPv4 or IPv6 interfaces.
Procedure
Example
1 0 192.0.2.10 4661750 4620630 Mon Sep 6 15:31:15 2021 Mon Sep 6 15:28:08 2021
----------------------------------------------------------------------------------------------------------------
1 0 2001:DB8:0:0:0:0:0:ffff 4661750 4620630 Mon Sep 6 15:31:15 2021 Mon Sep 6 15:28:08 2021
------------------------------------------------------------------------------------------------------------------------
Variable Definitions
The following table defines parameters for the show ip bfd stats command.
Variable Value
vrf Specifies a VRF instance by VRF name.
vrfids Specifies a VRF or range of VRFs by ID.
To perform this procedure on a non-default VRF, you must first change the VRF instance. For
information about how to use EDM for a non-default VRF, see Select and Launch a VRF Context View
on page 3856. All parameters might not be available in non-default VRFs.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
enable BFD globally.
Note
Enabling BFD globally does not establish a BFD session. To establish a BFD session, you must
enable BFD at the interface level and at the application level.
Procedure
Name Description
AdminStatus Specifies whether BFD is enabled.
VersionNumber Specifies the current version number of the BFD protocol.
TrapEnabled Specifies whether BFD traps are sent.
To perform this procedure on a non-default VRF, you must first change the VRF instance. For
information about how to use EDM for a non-default VRF, see Select and Launch a VRF Context View
on page 3856. All parameters might not be available in non-default VRFs.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
display information about BFD sessions. You can optionally display BFD session information for IPv4 or
IPv6 interfaces.
Procedure
Name Description
Discriminator Specifies the local discriminator that uniquely identifies the BFD session.
RemoteDiscr Specifies the discriminator of the remote system in the BFD session.
UdpPort Specifies the UDP Port for the BFD session. The default value is the well-known
value for the port.
State Specifies the state of the BFD session. Possible values are Down, Up, Init, and
AdminDown.
Name Description
Addr Specifies the IP address of the interface associated with the BFD session.
A value of unknown (0) indicates the BFD session is not associated with a
specific interface.
DesiredMinTxInterval Specifies the preferred minimum interval for transmitting BFD control packets
by the local system.
ReqMinTxInterval Specifies the minimum interval for transmitting BFD control packets that the
local system can support.
DestAddr Specifies the destination IP address of the interface associated with the BFD
session.
OldState Specifies the old state of the BFD session.
App Specifies the applications configured on the BFD session.
AppRun Specifies the applications running on the BFD session.
AddrType Specifies the IP address type of the interface associated with this BFD session.
Possible values are ipv4 and ipv6.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
enable and configure BFD for an IPv4 interface on a port.
Procedure
Use the data in the following table to use the BFD tab.
Name Description
Enable Enable BFD on the port.
MinRxInterval Specifies the minimum interval, in milliseconds, between received BFD control packets
that the local system is capable of supporting. The default is 200 ms.
Note:
The minimum value you can configure for the receive interval is 100 ms. You can
configure a maximum of 4 BFD sessions with the minimum value for the receive
interval. You can configure any remaining BFD sessions with a receive interval that is
greater than or equal to the 200 ms default value.
TxInterval Specifies the transmit interval in milliseconds. The default is 200 ms.
Note:
The minimum value you can configure for the transmit interval is 100 ms. You can
configure a maximum of 4 BFD sessions with the minimum value for the transmit
interval. You can configure any remaining BFD sessions with a transmit interval that is
greater than or equal to the 200 ms default value.
Multiplier Specifies a value for the multiplier used to calculate a receive timeout. The default is 3.
Note:
If you configure the transmit interval or the receive interval as 100 ms, you must
configure a value of 4 or greater for the multiplier.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
enable and configure BFD for an IPv6 interface on a port.
Procedure
Use the data in the following table to use the BFD tab.
Name Description
Interface Specifies the BFD interface.
MinRxInterval Specifies the minimum interval, in milliseconds, between received BFD control packets
that the local system is capable of supporting. The default is 200 ms.
Note:
The minimum value you can configure for the receive interval is 100 ms. You can
configure a maximum of 4 BFD sessions with the minimum value for the receive
interval. You can configure any remaining BFD sessions with a receive interval that is
greater than or equal to the 200 ms default value.
TxInterval Specifies the transmit interval in milliseconds. The default is 200 ms.
Note:
The minimum value you can configure for the transmit interval is 100 ms. You can
configure a maximum of 4 BFD sessions with the minimum value for the transmit
interval. You can configure any remaining BFD sessions with a transmit interval that is
greater than or equal to the 200 ms default value.
Multiplier Specifies a value for the multiplier used to calculate a receive timeout. The default is 3.
Note:
If you configure the transmit interval or the receive interval as 100 ms, you must
configure a value of 4 or greater for the multiplier.
BFD provides a failure detection-mechanism between two systems. Use the following procedure to
enable and configure BFD for an IPv4 interface on a VLAN.
Procedure
10. (Optional) In the Multiplier field, specify a value for the multiplier used to calculate a receive
timeout.
Use the data in the following table to use the BFD tab.
Name Description
Enable Enable BFD on the VLAN.
MinRxInterval Specifies the minimum interval, in milliseconds, between received BFD control packets
that the local system is capable of supporting. The default is 200 ms.
Note:
The minimum value you can configure for the receive interval is 100 ms. You can
configure a maximum of 4 BFD sessions with the minimum value for the receive
interval. You can configure any remaining BFD sessions with a receive interval that is
greater than or equal to the 200 ms default value.
TxInterval Specifies the transmit interval in milliseconds. The default is 200 ms.
Note:
The minimum value you can configure for the transmit interval is 100 ms. You can
configure a maximum of 4 BFD sessions with the minimum value for the transmit
interval. You can configure any remaining BFD sessions with a transmit interval that is
greater than or equal to the 200 ms default value.
Multiplier Specifies a value for the multiplier used to calculate a receive timeout. The default is 3.
Note:
If you configure the transmit interval or the receive interval as 100 ms, you must
configure a value of 4 or greater for the multiplier.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
enable and configure BFD for an IPv6 interface on a VLAN.
Procedure
7. (Optional) In the MinRxInterval column, double-click the field and type a value for MinRxInterval.
8. (Optional) In the TxInterval column, double-click the field and type a value for TxInterval.
9. (Optional) In the Multiplier column, double-click the field and type a value for Multiplier.
Use the data in the following table to use the IPv6 BFD Interface tab.
Name Description
Interface Specifies an index value that uniquely identifies the interface.
Enable Enable BFD on the VLAN.
MinRxInterval Specifies the minimum interval, in milliseconds, between received BFD control packets
that the local system is capable of supporting. The default is 200 ms.
Note:
The minimum value you can configure for the receive interval is 100 ms. You can
configure a maximum of 4 BFD sessions with the minimum value for the receive
interval. You can configure any remaining BFD sessions with a receive interval that is
greater than or equal to the 200 ms default value.
TxInterval Specifies the transmit interval in milliseconds. The default is 200 ms.
Note:
The minimum value you can configure for the transmit interval is 100 ms. You can
configure a maximum of 4 BFD sessions with the minimum value for the transmit
interval. You can configure any remaining BFD sessions with a transmit interval that is
greater than or equal to the 200 ms default value.
Multiplier Specifies a value for the multiplier used to calculate a receive timeout. The default is 3.
Note:
If you configure the transmit interval or the receive interval as 100 ms, you must
configure a value of 4 or greater for the multiplier.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
enable BFD for Border Gateway Protocol (BGP) peers.
Note
Enabling BFD at the application level does not establish a BFD session. To establish a BFD
session, you must enable BFD globally and at the interface level.
Procedure
Name Description
Instance Specifies the BGP peer instance.
LocalAddrType Specifies the local IP address type of the entered BGP peer.
LocalAddr Specifies the local IP address of the entered BGP peer.
RemoteAddrType Specifies the remote IP address type of the entered BGP peer.
RemoteAddr Specifies the remote IP address of the entered BGP peer.
AdminStatus Specifies the administrative status of the BGP peer.
GroupName Specifies the peer group name to which the peer belongs
(optional).
PeerState Specifies the BGP peer connection state.
RemoteAs Configures a remote AS number for the peer or peer-group in the
range 0–65535.
Enable Controls whether the peer connection is enabled or disabled. The
default is disabled.
EbgpMultiHop Enables or disables a connection to a BGP peer that is more than
one hop away from the local router. The default value is disable.
RoutePolicyIn Specifies the policy (by name) that applies to all network routes
learned from this peer.
RoutePolicyOut Specifies the policy (by name) that applies to all outgoing route
updates.
RemovePrivateAs Strips (when enabled) private AS numbers when the switch sends
an update. The default is enable.
UpdateSourceInterface Specifies the source IP address to use when the switch sends
eBGP packets to this peer or peer group.
Name Description
ConnectRetryInterval Specifies the time interval, in seconds, for the connect retry timer.
The suggested value for this timer is 120 seconds. The range is 1 to
65535.
HoldTimeConfigured Specifies the time interval, in seconds, for the hold time for this
BGP speaker with this peer. This value is in an open message sent
to this peer by this BGP speaker. To determine the hold time with
the peer, the switch compares this value with the HoldTime value
in an open message received from the peer. The HoldTime must
be at least three seconds. If the value is zero, the hold time does
not establish with the peer. The suggested value for this timer is
180 seconds. The range is 0 to 65535.
KeepAliveConfigured Specifies the time interval, in seconds, for the KeepAlive
timer configured for this BGP speaker with this peer.
KeepAliveConfigured determines the keep alive message
frequency relative to HoldTimeConfigured; KeepAlive indicates
the actual time interval for the keep alive messages. The
maximum value for this timer is one-third of HoldTimeConfigured.
If KeepAliveConfigured is zero, no periodic keep alive messages
are sent to the peer after the peers establish a BGP connection.
Configure a value of 60 seconds. The range is 0 to 21845.
MD5Authentication Enables and disables MD5 authentication.
AdvertisementInterval Specifies the time interval, in seconds, that elapses between
each transmission of an advertisement from a BGP neighbor. The
default value is 30 seconds and the range is 5–120 seconds.
The route advertisement interval feature is implemented using the
time stamp that indicates when each route is advertised. The time
stamp is marked to each route so that the route advertisement
interval is compared to the time stamp and BGP is then able
to make a decision about whether the route advertisement can
be sent or should be delayed when a better route is received.
This feature does not work for a withdraw route because the
route entry is already removed when the processing route
advertisement is sent and the time stamp marked in the route
entry cannot be obtained.
DefaultOriginate When enabled, specifies that the current route originated from
the BGP peer. This parameter enables or disables sending the
default route information to the specified neighbor or peer. The
default value is false.
DefaultOriginateIpv6 When enabled, specifies that the current IPv6 route originated
from the BGP peer. This parameter enables or disables sending
the default IPv6 route information to the specified neighbor or
peer. The default value is false.
Weight Specifies the peer or peer group weight, or the priority of updates
the system can receive from this BGP peer. The default value is
100 and the range is 0–65535.
MaxPrefix Configures a limit on the number of routes accepted from a
neighbor. The default value is 12000 routes and the range is 0–
2147483647.
A value of 0 means no limit exists.
Name Description
NextHopSelf Specifies that the next-hop attribute in an iBGP update is the
address of the local router or the router that generates the iBGP
update. The default is disable.
RouteReflectorClient Specifies that this peer is a route reflector client.
Note:
This parameter only applies to VRF 0.
SoftReconfigurationIn When enabled, the router relearns routes from the specified
neighbor or group of neighbors without restarting the connection
after the policy changes in the inbound direction. The default
value is disable.
Enabling SoftReconfigurationIn stores all BGP routes in local
memory (even non-best routes).
DebugMask Displays the specified debug information for the BGP peer. The
default value is none.
• None disables all debug messages.
• Event enables the display of debug event messages.
• State enables display of debug state transition messages.
• Update enables display of debug messages related to updates
transmission and reception.
• Error enables the display of debug error messages.
• Trace enables the display of debug trace messages.
• Init enables the display of debug initialization messages.
• All enables all debug messages.
• Packet enables the display of debug packet messages.
• Warning enables the display of debug warning messages.
• Filter enables the display of debug messages related to
filtering.
Name Description
AsOverride Specifies that the AS Override parameter can be enabled or
disabled for the BGP peer. The default is disable.
Note:
This field does not apply on all
hardware platforms.
AllowAsIn Specifies the number of AS-in allowed for the BGP peer. The
range is 1–10.
Note:
This field does not apply on all
hardware platforms.
Ipv6RoutePolicyIn Specifies the policy (by name) that applies to all network IPv6
routes learned from this peer.
Ipv6RoutePolicyOut Specifies the policy (by name) that applies to all outgoing IPv6
route updates.
Ipv6MaxPrefix Configures a limit on the number of IPv6 routes accepted from a
neighbor.
A value of 0 means no limit exists.
BfdEnable Enables Bidirectional Forwarding Detection (BFD) for this BGP
peer.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
enable BFD for Border Gateway Protocol (BGP) peer groups.
Note
Enabling BFD at the application level does not establish a BFD session. To establish a BFD
session, you must enable BFD globally and at the interface level.
Procedure
5. Select BfdEnable.
6. Select Insert.
Name Description
Index Specifies the index of this peer group.
GroupName Specifies the peer group to which this neighbor belongs
(optional).
Enable Enables or disables the peer group.
RemoteAs Configures a remote AS number for the peer-group in the range
0–65535.
DefaultOriginate When enabled, the BGP speaker (the local router) sends the
default route 0.0.0.0 to a group of neighbors for use as a default
route. The default is disabled.
DefaultOriginateIpv6 When enabled, the BGP speaker (the local router) sends the
default route to a group of neighbors for use as a default route.
The default is disabled.
EbgpMultiHop When enabled, the switch accepts and attempts BGP connections
to external peers that reside on networks that do not directly
connect. The default is disabled.
AdvertisementInterval Specifies the time interval, in seconds, that elapses between BGP
routing updates. The default value is 30 seconds.
KeepAlive Specifies the time interval, in seconds, between sent BGP keep
alive messages to remote peers. The default value is 60.
HoldTime Configures the hold time for the group of peers in seconds. Use
a value that is three times the value of the KeepAlive time. The
default value is 180.
Weight Assigns an absolute weight to a BGP network. The default value is
100.
MaxPrefix Limits the number of routes accepted from this group of
neighbors. A value of zero indicates no limit The default value
is 12,000 routes.
NextHopSelf Specifies that the switch must set the NextHop attribute to the
local router address before sending updates to remote peers.
RoutePolicyIn Specifies the route policy that applies to all networks learned from
this group of peers.
RoutePolicyOut Specifies the route policy that applies to all outgoing updates to
this group of peers.
RouteReflectorClient Specifies that this peer group is a route reflector client.
Note:
This parameter only applies to VRF 0.
Name Description
SoftReconfigurationIn When enabled, the router relearns routes from the specified
neighbor or group of neighbors without restarting the connection
after the policy changes in the inbound direction. The default
value is enable.
Enabling SoftReconfigurationIn stores all BGP routes in local
memory (even non-best routes).
MD5Authentication Enables and disables MD5 authentication. The default is disable.
RemovePrivateAs Strips (when enabled) private AS numbers when the switch sends
an update. The default is enable.
SendCommunity Enables or disables sending the community attribute of the
update message to the specified peer group. The default value
is disable.
AfUpdateSourceInterfaceType Specifies the interface type.
AfUpdateSourceInterface Specifies the IP address used for circuitless IP (CLIP) for this peer
group.
Vpnv4Address Enables BGP address families for IPv4 (BGP) and Layer 3 VPN
(MP-BGP) support. Enable this parameter for VPN/VRF Lite
routes.
IpvpnLiteCap Specifies (when enabled) that IP VPN Lite capability can be
enabled or disabled on the BGP neighbor peer. The default is
disable.
RouteRefresh Enables or disables route refresh. If enabled, a route refresh
request received by a BGP speaker causes the speaker to resend
all route updates in the database that are eligible for the peer that
issues the request. This parameter only applies to VRF 0.
AsOverride Specifies that the AS Override parameter can be enabled or
disabled for the BGP peer group. The default is disable.
AllowedAsIn Specifies the number of AS-in allowed for the BGP peer group.
The range is 1–10.
IPv6Cap Enable or disable the IPv6 capability on the BGP neighbor peer.
The default value is disable.
Ipv6RoutePolicyIn Specifies the policy (by name) that applies to all network IPv6
routes learned from this peer.
Ipv6RoutePolicyOut Specifies the policy (by name) that applies to all outgoing IPv6
route updates.
Ipv6MaxPrefix Configures a limit on the number of IPv6 routes accepted from a
neighbor.
A value of 0 means no limit exists.
BfdEnable Enables Bidirectional Forwarding Detection (BFD) for the BGP
peer group.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
enable BFD for BGPv6 peers.
Note
Enabling BFD at the application level does not establish a BFD session. To establish a BFD
session, you must enable BFD globally and at the interface level.
Note
BFD for IPv6 interfaces is a demonstration feature on some products. For more information
about feature support, see VOSS Feature Support Matrix.
Procedure
Name Description
RemoteAddr Specifies the remote IPv6 address of the entered BGP+ peer.
GroupName Specifies the peer group name to which the peer belongs
(optional).
PeerState Specifies the BGPv6 peer connection state.
RemoteAs Configures a remote AS number for the peer or peer-group in the
range 0 to 65535.
Enable Controls whether the peer connection is enabled or disabled. The
default is disabled.
EbgpMultiHop Enables or disables a connection to a BGPv6 peer that is more
than one hop away from the local router. The default value is
disable.
RoutePolicyIn Specifies the policy (by name) that applies to all network routes
learned from this peer.
RoutePolicyOut Specifies the policy (by name) that applies to all outgoing route
updates.
RemovePrivateAs Strips (when enabled) private AS numbers when the switch sends
an update. The default is enable.
UpdateSourceInterface Specifies the source IP address to use when the switch sends
eBGP packets to this peer or peer group.
Name Description
ConnectRetryInterval Specifies the time interval, in seconds, for the connect retry timer.
The suggested value for this timer is 120 seconds. The range is 1 to
65535.
HoldTimeConfigured Specifies the time interval, in seconds, for the hold time for this
BGP speaker with this peer. This value is in an open message sent
to this peer by this BGP speaker. To determine the hold time with
the peer, the switch compares this value with the HoldTime value
in an open message received from the peer. The HoldTime must
be at least three seconds. If the value is zero, the hold time does
not establish with the peer. The suggested value for this timer is
180 seconds. The range is 0 to 65535.
KeepAliveConfigured Specifies the time interval, in seconds, for the KeepAlive
timer configured for this BGP speaker with this peer.
KeepAliveConfigured determines the keep alive message
frequency relative to HoldTimeConfigured; KeepAlive indicates
the actual time interval for the keep alive messages. The
maximum value for this timer is one-third of HoldTimeConfigured.
If KeepAliveConfigured is zero, no periodic keep alive messages
are sent to the peer after the peers establish a BGP connection.
Configure a value of 60 seconds. The range is 0 to 21845.
MD5Authentication Enables and disables MD5 authentication.
AdvertisementInterval Specifies the time interval, in seconds, that elapses between each
transmission of an advertisement from a BGPv6 neighbor. The
default value is 30 seconds and the range is 5 to 120 seconds.
The route advertisement interval feature is implemented using the
time stamp that indicates when each route is advertised. The time
stamp is marked to each route so that the route advertisement
interval is compared to the time stamp and BGP is then able
to make a decision about whether the route advertisement can
be sent or should be delayed when a better route is received.
This feature does not work for a withdraw route because the
route entry is already removed when the processing route
advertisement is sent and the time stamp marked in the route
entry cannot be obtained.
DefaultOriginateIpv6 When enabled, specifies that the current IPv6 route originated
from the BGP peer. This parameter enables or disables sending
the default IPv6 route information to the specified neighbor or
peer. The default value is false.
Weight Specifies the peer or peer group weight, or the priority of updates
the system can receive from this BGP peer. The default value is
100 and the range is 0 to 65535.
MaxPrefix Configures a limit on the number of routes accepted from a
neighbor. The default value is 12000 routes and the range is 0
to 2147483647.
A value of 0 means no limit exists.
NextHopSelf Specifies that the next-hop attribute in an iBGP update is the
address of the local router or the router that generates the iBGP
update. The default is disable.
Name Description
RouteReflectorClient Specifies that this peer is a route reflector client.
Note:
This parameter only applies to VRF 0.
SoftReconfigurationIn When enabled, the router relearns routes from the specified
neighbor or group of neighbors without restarting the connection
after the policy changes in the inbound direction. The default
value is disable.
Enabling SoftReconfigurationIn stores all BGP routes in local
memory (even non-best routes).
DebugMask Displays the specified debug information for the BGP peer. The
default value is none.
• None disables all debug messages.
• Event enables the display of debug event messages.
• State enables display of debug state transition messages.
• Update enables display of debug messages related to updates
transmission and reception.
• Error enables the display of debug error messages.
• Trace enables the display of debug trace messages.
• Init enables the display of debug initialization messages.
• All enables all debug messages.
• Packet enables the display of debug packet messages.
• Warning enables the display of debug warning messages.
• Filter enables the display of debug messages related to
filtering.
AllowAsIn Specifies the number of AS-in allowed for the BGP peer. The
range is 1–10.
Note:
This field does not apply on all
hardware platforms.
Name Description
Ipv6RoutePolicyIn Specifies the policy (by name) that applies to all network IPv6
routes learned from this peer.
Ipv6RoutePolicyOut Specifies the policy (by name) that applies to all outgoing IPv6
route updates.
Ipv6MaxPrefix Configures a limit on the number of IPv6 routes accepted from a
neighbor.
A value of 0 means no limit exists.
BfdEnable Enables Bidirectional Forwarding Detection (BFD) for this peer.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
enable BFD for the OSPF protocol on an IPv4 port interface.
Note
Enabling BFD at the application level does not establish a BFD session. To establish a BFD
session, you must enable BFD globally and at the interface level.
Procedure
Name Description
Enable Enables or disables OSPF routing on the specified port. The
default is false.
HelloInterval Specifies the length of time, in seconds, between the transmission
of hello packets. This value must be the same for all routers
attached to a common network. The default is 10 seconds.
After you change the hello interval values, you must save the
configuration file, and then restart the switch. After the switch
restarts, it restores the values and checks for consistency.
Name Description
RtrDeadInterval Specifies the interval used by adjacent routers to determine if
the router was removed from the network. This interval must
be identical on all routers on the subnet, and a minimum of
four times the hello interval. To avoid interoperability issues, the
RtrDeadInterval value for the OSPF interface needs to match
with the RtrDeadInterval value for the OSPF virtual interface. The
default is 40 seconds.
DesigRtrPriority Specifies the priority of this port in multiaccess networks to use
in the designated router election algorithm. The value 0 indicates
the router is not eligible to become the designated router on this
particular network. If a tie occurs, routers use their router ID as a
tie breaker. The default is 1.
Metric Specifies the metric for the type of service (TOS) on this port. The
value of the TOS metric is (10^9 / interface speed). The default is 1.
• FFFF—No route exists for this TOS.
• IPCP links—Defaults to 0.
• 0—Use the interface speed as the metric value when the state
of the interface is up.
Note:
sha-2, an update of SHA-1, can offer six hash functions that
include SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224,
SHA 512/256, with hash values that are 224, 256, 384, or 512
bits. However, the current release supports only SHA-256.
AuthKey Specifies the key (up to 8 characters) when you specify simple
password authentication in the port AuthType variable.
AreaId Specifies the OSPF area name in dotted-decimal format.
The area name is not related to an IP address. You can use a
suitable value for the OSPF area name (for example, 1.1.1.1 or
200.200.200.200).
Name Description
AdvertiseWhenDown Advertises the network on this port as up, even if the port is down.
The default is false.
After you configure a port with no link and enable
AdvertiseWhenDown, it does not advertise the route until the
port is active. Then, OSPF advertises the route even if the link
is down. To disable advertising based on link-states, disable
AdvertiseWhenDown.
IfType Specifies the type of OSPF interface (broadcast, NBMA, passive, or
p2p).
Before you change an OSPF interface type, you must first disable
the interface. If the interface is an NBMA interface, you must also
delete all configured neighbors.
Note:
Exception: p2p interface does not apply to VSP 8600 Series.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
enable OSPF BFD on an IPv4 VLAN interface.
Note
Enabling BFD at the application level does not establish a BFD session. To establish a BFD
session, you must enable BFD globally and at the interface level.
Procedure
Name Description
Enable Enables or disables OSPF routing on the specified VLAN. The
default is false.
HelloInterval Specifies the length of time, in seconds, between the transmission
of hello packets. This value must be the same for all routers
attached to a common network. The default is 10 seconds.
After you change the hello interval values, you must save the
configuration file, and then restart the switch. After the switch
restarts, it restores the values and checks for consistency.
RtrDeadInterval Specifies the interval used by adjacent routers to determine if
the router was removed from the network. This interval must
be identical on all routers on the subnet and a minimum of
four times the hello interval. To avoid interoperability issues, the
RtrDeadInterval value for the OSPF interface needs to match
with the RtrDeadInterval value for the OSPF virtual interface. The
default is 40 seconds.
DesigRtrPriority Specifies the priority of this VLAN in multiaccess networks to use
in the designated router election algorithm. The value 0 indicates
the router is not eligible to become the designated router on this
particular network. If a tie occurs, routers use their router ID as a
tie breaker. The default is 1.
Metric Specifies the metric for this TOS on this VLAN. The value of the
TOS metric is (10^9 / interface speed). The default is 1.
• FFFF—No route exists for this TOS.
• IPCP links—Defaults to 0.
• 0—Use the interface speed as the metric value when the state
of the interface is up.
Note:
sha-2, an update of SHA-1, can offer six hash functions that
include SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224,
SHA 512/256, with hash values that are 224, 256, 384, or 512
bits. However, the current release supports only SHA-256.
Name Description
AuthKey Specifies the key (up to eight characters) when you specify simple
password authentication in the VLAN AuthType variable.
AreaId Specifies the OSPF area name in dotted-decimal format.
The area name is not related to an IP address. You can use a
suitable value for the OSPF area name (for example, 1.1.1.1 or
200.200.200.200).
AdvertiseWhenDown Advertises the network even if the port is down. If true, OSPF
advertises the network on this VLAN as up, even if the port is
down. The default is false.
After you configure a port without a link and enable
AdvertiseWhenDown, it does not advertise the route until the
port is active. Then, OSPF advertises the route even when the
link is down. To disable advertising based on link states, disable
AdvertiseWhenDown.
IfType Specifies the type of OSPF interface (broadcast, NBMA, passive, or
p2p).
Before you change an OSPF interface type, you must first disable
the interface. If the interface is an NBMA interface, you must also
delete all configured neighbors.
Note:
Exception: p2p interface does not apply to VSP 8600 Series.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
enable BFD for the OSPF protocol on an IPv6 port interface.
Note
Enabling BFD at the application level does not establish a BFD session. To establish a BFD
session, you must enable BFD globally and at the interface level.
Procedure
3. Select IPv6.
4. Select the IPv6 OSPF Interface tab.
5. Select Insert.
6. Select BfdEnable.
Name Description
Index Specifies the interface index for the IPv6 interface
on which OSPFv3 is configured.
AreaId Specifies the area ID to which the IPv6 interface
connects. Use 0.0.0.0 for the OSPFv3 backbone.
Type Specifies the OSPFv3 interface type as one of the
following:
Note: • broadcast
Value is not configurable for OSPFv3 CLIP • NBMA
interfaces. • point-to-point
• point-to-multipoint
• passive
Name Description
HelloInterval Specifies the number of seconds between the
hello packets that the router sends on this
Note: interface. You must configure this field to the
Value is not configurable for OSPFv3 CLIP same value for all routers attached to a common
interfaces. network. The default is 10.
BFD provides a failure-detection mechanism between two systems. Use the following procedure to
enable OSPF BFD on an IPv6 VLAN interface.
Note
Enabling BFD at the application level does not establish a BFD session. To establish a BFD
session, you must enable BFD globally and at the interface level.
Procedure
Name Description
Index Shows the interface index for the IPv6 interface on
which OSPFv3 is configured.
AreaId Specifies the area ID to which the IPv6 interface
connects. Use 0.0.0.0 for the OSPFv3 backbone.
Type Specifies the OSPFv3 interface type as one of the
following:
• broadcast
• NBMA
• point-to-point
• point-to-multipoint
• passive
Name Description
RtrPriority Specifies the priority of this interface. Multiaccess
networks use the priority in the designated router
election.
A higher priority value increases the chance the
router becomes the designated router. A value of
zero (0) indicates the router cannot become the
designated router for the network. If more than
one router uses the same priority value, the router
ID determines the designated router.
The default is 1.
TransitDelay Specifies the estimated number of seconds to
transmit a link-state-update packet over this
interface. The default is 1.
RetransInterval Specifies the number of seconds between
retransmission of link-state advertisements for the
adjacencies that belong to this interface, and
for database description and link-state request
packets. The default is 5.
HelloInterval Specifies the number of seconds between the
hello packets that the router sends on this
interface. You must configure this field to the
same value for all routers attached to a common
network. The default is 10.
RtrDeadInterval Specifies the number of seconds after which to
declare a router down if no hello packets are
received. You must configure this field to the
same value for all routers attached to a common
network. The default is 40.
PollInterval Specifies the number of seconds between hello
packets sent to an inactive NBMA neighbor. The
default is 120.
State Shows the state of the OSPFv3 interface as one of
the following:
• down
• loopback
• waiting
• pointToPoint
• designatedRouter
• backupDesginatedRouter
• otherDesignatedRouter
Name Description
MetricValue Specifies the cost for the interface. The default
value for a brouter port or VLAN is 1. The default
value for a tunnel is 100.
Note:
If you do not specify a cost for the interface,
the switch dynamically updates the interface cost
with the configured global OSPF default cost. The
global OSPF default cost depends on the speed of
the interface.
Procedure
Use the data in the following table to use the Static Route tab.
Name Description
NextHop Specifies the IPv4 address of the next hop of the BFD session.
VrfId Specifies the ID of the VRF associated with the BFD session.
VrfName Specifies the name of the VRF associated with the BFD session.
Procedure
5. In the NextHop field, type the IPv6 address of the next hop of the BFD session.
6. (Optional) In the VrfId field, type the ID of the VRF associated with the BFD session.
Use the data in the following table to use the Static Route tab.
Name Description
Interface Specifies either a port or VLAN interface.
NextHop Specifies the IPv4 address of the next hop of the BFD session.
VrfId Specifies the ID of the VRF associated with the BFD session.
VrfName Specifies the name of the VRF associated with the BFD session.
Procedure
Use the data in the following table to use the Performance counters tab.
Name Description
PktIn Specifies the total number of BFD messages received for this BFD session.
PktOut Specifies the total number of BFD messages sent for this BFD session.
The following sections provide conceptual information and procedures that you can use to configure
Border Gateway Protocol (BGP) services. The following operations are supported by BGP:
• IPv4
• 4-byte AS
• Peer groups
• Redistribution
Examples and network illustrations in these sections illustrate only one of the supported platforms.
Unless otherwise noted, the concept illustrated applies to all supported platforms.
BGP fundamentals
Border Gateway Protocol (BGP) is an inter-domain routing protocol that provides loop-free routing
between autonomous systems (AS) or within an AS. This section describes the major BGP features.
Autonomous Systems
An Autonomous system (AS) is a group of routers and hosts run by a single technical administrator
that has a single, clearly defined routing policy. Each AS uses a unique AS number assigned by the
appropriate Internet Registry entity. LANs and WANs that interconnect by IP routers form a group
of networks called an internetwork. For administrative purposes, internetworks divide into boundaries
known as autonomous systems.
The following figure shows a sample internetwork segmented into three autonomous systems.
BGP speakers in different autonomous systems use eBGP communicate routing information.
BGP speaker
BGP routers employ an entity within the router, referred to as a BGP speaker, which transmits and
receives BGP messages and acts upon them. BGP speakers establish a peer-to-peer session with other
BGP speakers to communicate.
All BGP speakers within an AS must be fully meshed. The following figure shows a BGP network with
fully-meshed BGP speakers.
Transit AS
An AS with more than one BGP speaker can use iBGP to provide a transit service for networks located
outside the AS. An AS that provides this service is a transit AS. As shown in the preceding figure, BGP
networks , AS 40 is the transit AS. AS 40 provides information about the internal networks, as well as
transit networks, to the remaining autonomous systems. The iBGP connections between routers D, E,
and F provide consistent routing information to the autonomous systems.
A stub AS has a single BGP speaker that establishes a peer-to-peer session with one external BGP
speaker. In this case, the BGP speaker provides external route information only for the networks within
its own AS.
Peers
BGP uses Transmission Control Protocol (TCP) as a transport protocol. When two routers open a TCP
connection to each other for the purpose of exchanging routing information, they form a peer-to-peer
relationship. In the preceding figure, BGP networks, Routers A and D are BGP peers, as are Routers B
and E, C and E, F and G, and Routers D, E, and F.
Although Routers A and D run eBGP, Routers D, E, and F within AS 40 run iBGP. The eBGP peers
directly connect to each other, while the iBGP peers do not. As long as an IGP operates and allows two
neighbors to logically communicate, the iBGP peers do not require a direct connection.
Note
You cannot create the same iBGP peers on two different VRFs, or the same eBGP peers on
two different chassis. Only one local autonomous system (AS) can exist for each chassis or
VRF.
Because all BGP speakers within an AS must be fully meshed logically, the iBGP mesh can grow to
large proportions and become difficult to manage. You can reduce the number of peers within an AS by
creating confederations and route reflectors.
BGP peers exchange complete routing information only after the peers establish a connection.
Thereafter, BGP peers exchange routing updates. An update message consists of a network number,
a list of autonomous systems that the routing information passed through (the AS path), and other
path attributes that describe the route to a set of destination networks. When multiple paths exist, BGP
compares the path attributes to choose the preferred path. Even if you disable BGP, the system logs
all BGP peer connection requests. For more information about update messages, see BGP Updates on
page 414.
Supernet advertisements
BGP has no concept of address classes. Each network listed in the network layer reachability
information (NLRI) portion of an update message contains a prefix length field, which describes the
length of the mask associated with the network. The prefix length field allows for both supernet and
subnet advertisement. The supernet advertisement is what makes classless interdomain routing (CIDR)
possible (see CIDR and aggregate addresses on page 403).
Note
Confederations and route reflectors are not supported on iBGP for non-default VRFs.
For information on confederations and route reflectors, see Routing information consolidation on page
403.
The switch supports the following three types of peer relationships as a result of 4 byte AS support:
• Old peer to old peer
• Old peer to new peer
• New peer to new peer
An old peer is the one that supports 2–byte AS numbers only and new peer is the one that supports
both 2–byte AS numbers and 4–byte AS numbers.
Router B is a 2-byte BGP speaker. Router A substitutes AS_PATH with the AS_TRANS, a 2-octet AS
number defined by RFC4893 for backward compatibility, and encodes the 4-byte AS into AS4_PATH in
BGP updates it sends to router B.
Router B does not understand the AS4_PATH but does preserve the information and sends it to router
C.
Router C is a 4-byte BGP speaker. Router C merges the information received in AS_PATH and
AS4_PATH, and encodes the 4-byte AS when it sends the AS_PATH information to router D.
When the peer relationship between an old peer and another old peer is established, 4 byte AS
numbers contained in the AS4_PATH and AS4_AGGREGATOR are transited to other peers.
Important
Do not assign 23456 as an AS number. The Internet Assigned Numbers Authority (IANA)
reserved this number for the AS_TRANS attribute and BGP uses it to facilitate communication
between peer modes. AS_TRANS uses a 2-byte AS format to represent a 4-byte AS number.
The switch interprets the AS_TRANS attribute and propagates it to other peers.
The new BGP speaker establishes its 4 byte AS support through BGP capability advertisement. A
BGP speaker that announces such capability and receives it from its peer, uses 4 byte AS numbers
in AS_PATH and AGGREGATOR attributes and assumes these attributes received from its peer are
encoded in 4 byte AS numbers.
The new BGP attributes AS4_PATH and AS4_AGGREGATOR received from the new BGP speaker
between the new BGP peers in the update message is discarded.
An old BGP speaker and a new BGP speaker can form peering relationship only if the new BGP
speaker is assigned a 2 byte AS number. This 2 byte number can be any global unique AS number or
AS_TRANS.
New BGP speaker sends AS path information to the old BGP speaker in AS_PATH attribute as well
as AS4_PATH attribute. If the entire AS_PATH consists of only 2 byte AS numbers then the new BGP
speaker does not send AS4_PATH information.
The 4-byte AS number feature does not in any way restrict the use or change the way you configure
2-byte AS numbers. You can also configure 2-byte AS or 4 byte AS numbers in AS path lists, community
lists, and route policies.
BGP 4–byte AS numbers are represented in two ways: AS Plain and AS dot. The default form of
representing the AS numbers is AS Plain while you have an option to configure AS dot. AS Plain form
of representation is preferred over AS dot representation as a large amount of network providers find
the AS dot notation incompatible with the regular expressions used by them. In case of any issues,
troubleshooting and analyzing also gets difficult with AS dot notation.
For more information on configuring 4 byte AS numbers, see Configure 4-byte AS numbers on page
435.
Network 195.215.0.0, an illegal Class C network number, becomes a legal supernet when represented in
CIDR notation as 195.215.0.0/16. The /16 is the prefix length and expresses the explicit mask that CIDR
requires. In this case, the addition of the prefix /16 indicates that the subnet mask consists of 16 bits
(counting from the left).
Using this method, supernet 195.215.0.0/16 represents 195.215.0.0 255.255.0.0. The following table
shows the conversion of prefix length to subnet mask.
Use CIDR to assign network prefixes of arbitrary lengths, as opposed to the obsolete class system,
which assigned prefixes as even multiples of an octet.
For example, you can assign a single routing table supernet entry of 195.215.16/21 to represent 8
separate Class C network numbers: 195.215.16.0 through 195.215.23.0.
Supernet addressing
You can create a supernet address that covers an address range.
For example, to create a supernet address that covers an address range of 192.32.0.0 to 192.32.9.255,
perform the following steps:
1. Convert the starting and ending address range from dotted-decimal notation to binary notation (see
the following figure).
2. Locate the common bits in both ranges. Ensure that the remaining bits in the start range are zeros,
and the remaining bits in the end range are all ones. In this example, the remaining bits in the end
range are not all ones.
3. If the remaining bits in the end range are not all ones, you must recalculate to find the IP prefix that
has only ones in the remaining bits in the end range.
4. Recalculate to find a network prefix that has all ones in the remaining end range bits (see the
following figure). In this example, 192.32.7.255 is the closest IP prefix that matches the common bits
for the start range.
5. The 21 bits that match the common bits form the prefix length. The prefix length is the number of
binary bits that form the explicit mask (in dotted-decimal notation) for this IP prefix.
6. The remaining aggregate is formed from 192.32.8.0 to the end range, 192.32.9.255.
As shown in Figure 21, the resulting first aggregate 192.32.0.0/21 represents all of the IP prefixes from
192.32.0.0 to 192.32.7.255.
The following figure shows the results after forming the remaining aggregate from 192.32.9.0 to the end
range, 192.32.9.255.
The resulting aggregate 192.32.8.0/23 represents all of the IP prefixes from 192.32.8.0 to 192.32.9.255.
Aggregate routes
Eliminating the idea of network classes provides an easy method to aggregate routes. Rather than
advertise a separate route for each destination network in a supernet, BGP uses a supernet address
to advertise a single route (called an aggregate route) that represents all the destinations. CIDR also
reduces the size of the routing tables used to store advertised IP routes.
The following figure shows an example of route aggregation using CIDR. In this example, a single
supernet address 195.215.0.0/16 advertises 256 separate Class C network numbers 195.215.0.0 through
195.215.255.0.
Confederations
A BGP router configured for iBGP establishes a peer-to-peer session with every other iBGP speaker
in the AS. In an AS with a large number of iBGP speakers, this full-mesh topology can result in high
bandwidth and maintenance costs.
Note
Confederations are not supported on iBGP for non-default VRFs.
As shown in the following example, a full-mesh topology for an AS with 50 iBGP speakers requires 1225
internal peer-to-peer connections:
Example:
where:
You can reduce the high bandwidth and maintenance costs associated with a large full-mesh topology
by dividing the AS into multiple smaller autonomous systems (sub-autonomous systems), and then
group them into a single confederation (see the following figure).
Although the peers in different autonomous systems have eBGP sessions with the various sub-AS
peers, they preserve the next-hop, Multi-Exit Discriminator (MED), and local preference information
and exchange routing updates as if they were iBGP peers. All of the autonomous systems retain a
single interior gateway protocol (IGP). When the confederation uses its own confederation identifier, the
system displays the group of sub-autonomous systems as a single AS (with the confederation identifier
as the AS number).
Route reflectors
Another way to reduce the iBGP mesh inherent in an AS with a large number of iBGP speakers is to
configure a route reflector. Using this method, when an iBGP speaker needs to communicate with other
BGP speakers in the AS, the speaker establishes a single peer-to-peer route reflector client session with
the iBGP route reflector.
Note
Route reflectors are not supported on iBGP for non-default VRFs.
In an AS, more than one route reflector cluster can exist and more than one route reflector in a cluster.
When more than one reflector exists in a cluster, take care to prevent route loops.
The following figure shows a simple iBGP configuration with three iBGP speakers (routers A, B, and C).
Without route reflectors, after Router A receives an advertised route from an external neighbor, it must
advertise the route to Routers B and C.
As shown in the following figure, when you configure an internal BGP peer (Router B) as a route
reflector, all of the iBGP speakers do not need to be fully meshed. In this case, the assigned route
reflector passes iBGP learned routes to a set of iBGP neighbors.
Route reflectors separate internal peers into two groups: client peers and nonclient peers. The route
reflector and its clients form a cluster. The client peers in the cluster do not need to be fully meshed, and
do not communicate with iBGP speakers outside their cluster. Nonclient peers must be fully meshed
with each other.
The following figure shows a cluster, where Router A is the route reflector in a cluster with client routers
B, C, and D. Routers E, F, and G are fully meshed, nonclient routers.
BGP Communities
You can group destinations into communities to simplify policy administration. A community is a group
of destinations that share a common administrative property.
Use community control routing policies with respect to destinations. Create communities when you
have more than one destination and want to share a common attribute.
You can use a community to control which routing information to accept, prefer, or distribute to other
BGP neighbors. If you specify the append option in the route policy, the router adds the specified
community value to the existing value of the community attribute. Otherwise, the specified community
value replaces a previous community value.
Border routers that utilize built-in algorithms or manually configured polices to select paths use path
attributes. BGP uses the following path attributes to control the path a BGP router chooses:
• origin (well-known mandatory)
• AS_path (well-known mandatory)
• next hop (well-known mandatory)
• MED attribute (optional non-transitive)
• local preference (well-known discretionary)
• atomic aggregate (well-known discretionary)
• aggregator (optional transitive)
• community (optional transitive)
For more information about path attributes in BGP updates, see Path Attributes on page 415.
Weight is a locally significant parameter associated with each BGP peer. You can use the weight to
influence which peer paths the router uses.
• highest local preference
The local preference has global significance within an AS. You can manipulate the preference using
route policies to influence path selection.
• prefer locally originated paths
The router prefers a path locally originated using the network, redistribution, or aggregate command
over a path learned through a BGP update. The router prefers local paths sourced by network or
redistribute commands over local aggregates sourced by the aggregate address command.
• shortest AS path
The AS path parameter specifies the autonomous systems that the network prefix traversed. The
AS path commonly determines the best path. For example, a router can choose a path based on
whether the network passed through a specific AS. You can configure a route policy to match the
AS, and then modify the local preference. Also, you can pad the AS path before the AS advertises it
to a peer AS, so that downstream routers are less likely to prefer the advertised network path.
The AS_CONFED_SEQUENCE length will also be considered while picking the best path inside the
confederation.
• lowest origin type
The MED parameter influences the preferred path from a remote AS to the advertising AS. This
parameter applies when there are multiple exit points from the remote AS to the advertising AS. A
lower MED value indicates a stronger path preference than a higher MED value. By default, the MED
attribute is ignored as specified by the BGP global parameter Always Compare MED except when
the routes come from the same AS. This parameter must be enabled for MEDs to be compared (and
for this step of the best path algorithm to execute).
The router compares MEDs regardless of what the first (neighboring) AS specified in the AS_PATH.
Deterministic MED, when enabled, means that the first AS of the multiple paths must be the same.
Paths received with no MED are assigned a MED of 0, unless the global BGP parameter Missing Is
Worst is enabled. If so, received paths are assigned a MED of 4 294 967 294. Missing is Worst is
enabled by default. The "no-med-path-is-worst" flag has an impact only when the “First AS” or the
"Most Left AS" is the same for multiple routes received. The router changes paths received with a
MED of 4 294 967 295 to 4 294 967 294 before insertion into the BGP table.
Note
You cannot enable or disable the MED selection process. BGP aggregation does not occur
when routes have different MEDs or next hops.
When MED value is set in route-map configuration, the configured MED value is not applicable if it is
already set in the associated Path Attribute.
1. When router A sets MED value of 100 by route-map, it will send Path Attribute with MED=100 to
EBGP peer B.
2. Router B sends Path Attribute with MED=100 to IBGP peer C.
3. If the route-map is configured with "set MED 200", then router C does not apply MED=200 to the
Path Attribute as it is already set to 100 when it is received from router B.
4. Router D will get Path Attribute with MED=100 so that router C does not influence router D when
it selects the best route.
Set: Set:
MED100 MED100 MED:100 MED200 MED:100
A------------------B-------------------------C-----------------------------D
EBGP IBGP EBGP
Example: If Prefix: X is set as MED=100 from router A, it will be received at B with MED=100, and will
carry same MED=100 value to router C, as it is an IBGP peer. Router C will not propagate MED=100
value to D as MED is a non-transitive attribute, so MED can travel maximum of 1 AS.
• lowest IGP metric to the BGP next-hop
If multiple paths exist whose BGP next-hop is reachable through an IGP, the path with the lowest IGP
metric to the BGP next-hop is chosen.
• prefer external paths (learned by eBGP) over internal paths (iBGP)
If you enable ECMP, multiple BGP learned routes that use the same metric to different IP next-hops
are installed in the IP forwarding table for traffic load-balancing purposes.
• lowest router ID
Route flap dampening suppresses the advertisement of the unstable route until the route becomes
stable. For information about how to enable flap-dampening, see Configure BGP on page 430.
For information about viewing flap dampening configurations, see Viewing global flap-dampening
configurations on page 461.
Dampening applies only to routes that are learned through an eBGP. Route flap dampening prevents
routing loops and protects iBGP peers from having higher penalties for routes external to the AS.
The following paragraph describes the algorithm that controls route flaps.
If the route does not flap again, the router uses this timer to delete the history entry after the 180
seconds expires.
If the penalty is greater than the cut-off value (1536), the route is suppressed and the reuse time is
calculated based on the reuse time function.
• The reuse timer starts.
After the reuse time expires, the suppressed route is announced again (the reuse time is recalculated
if the route flaps again). The penalty decays slower for withdrawn routes than for update routes. The
route history entry is kept longer if the route is withdrawn. For update history, the delete time is 90
seconds and the withdrawn history delete time is 180 seconds.
BGP Updates
BGP uses update messages to communicate information between two BGP speakers. The update
message can advertise a single feasible route to a peer, or withdraw multiple unfeasible routes from
service.
Withdrawn Routes
The withdrawn routes parameter is a variable-length parameter that contains a list of IP prefixes for
routes that are withdrawn from service. The following figure shows the format of an IP prefix.
For example, 192.0.2.0/24 is equivalent to 192.0.2.0 255.255.255.0 (the /24 indicates the number of bits
in the length parameter to represent the network mask 255.255.255.0).
The prefix parameter contains the IP address prefix itself, followed by enough trailing bits to make the
length of the whole field an integer multiple of 8 bits (1 octet).
The total path attributes length calculates the length of the NLRI parameter. For example, a value of 0
indicates that no NLRI field is present in this update message.
Path Attributes
The path attributes parameter is a variable-length sequence of path attributes that exists in every BGP
update. The path attributes contain BGP attributes associated with the prefixes in the NLRI parameter.
For example, the attribute values allow you to specify the prefixes that the BGP session can exchange,
or which of the multiple paths of a specified prefix to use.
The attributes carry the following information about the associated prefixes:
• the path origin
• the AS paths through which the prefix is advertised
• the metrics that display degrees of preference for this prefix
The following figure shows the encoding used with the path attribute parameter.
Attribute Type
As shown in the following figure, the attribute type is a two-octet field that comprises two sub-fields:
attribute flags and attribute type code.
The attribute type code parameter contains the attribute type code, as defined by the Internet Assigned
Numbers Authority (IANA). The attribute type code uniquely identifies the attribute from all others. The
remaining octets of the path attribute represent the attribute value and are interpreted according to the
attribute flags and the attribute type code parameters.
Next hop 3 Specifies the IP address of the border router to use as a next
hop for the advertised destinations (destinations listed in the
NLRI field of the update message).
Multiexit discriminator 4 Discriminates among multiple exit or entry points to the
same neighboring AS on external (internal-AS) links.
Local preference 5 Indicates the preference that AS border routers assign to a
chosen route when they advertise it to iBGP peers
Atomic aggregate 6 Ensures that certain NLRI is not deaggregated
Aggregator 7 Identifies which AS performed the most recent route
aggregation. This attribute contains the last AS number that
formed the aggregate route followed by the IP address of
the BGP speaker that formed the aggregate route.
Attribute Length
The attribute length can be one or two octets in length, depending on the value of the extended length
parameter in the attributes flag field.
Attribute Value
The attribute value contains the actual value of the specific attribute. The system implements the
attribute value according to the values in the attribute flags and the attribute type code parameters.
NLRI
The NLRI parameter is a variable length field that contains a list of prefixes. The packet size that BGP
speakers can exchange limits the number of prefixes in the list.
For more information about ECMP, see Equal Cost Multipath on page 1844.
After you enable BGPv4 TCP MD5 authentication, the router computes an MD5 signature for each TCP
packet based on the TCP packet and an individual peer secret key. The router adds this MD5 signature
to the TCP packet that contains a BGP message and sends it with the packet, but it does not send the
secret key.
The receiver of the TCP packet also knows the secret key and can verify the MD5 signature. A third
party that tries to masquerade as the sender, however, cannot generate an authentic signature because
it does not know the secret key.
In commands, the term password refers to the secret key. The secret keys provide security. If the keys
are compromised, then the authentication itself is compromised. To prevent this, the switch stores the
secret keys in encrypted form.
If TCP receives an MD5 authentication key, it reduces its maximum segment size by 18 octets, which is
the length of the TCP MD5 option. TCP adds an MD5 signature to each transmitted packet. The peer
inserts the resulting 16-byte MD5 signature into the following TCP options: kind=19, length=18.
If a packet passes a test, it proceeds to the next test. After a packet passes all three tests, TCP accepts
the packet and sends it to BGP.
If a packet fails a test, the switch logs an event, increments the count of TCP connection errors
(wfTcpConnMd5Errors), and discards the packet. The TCP connection remains open.
Configure interface-based redistribution by configuring a route policy and apply it to the interface.
Configure the match parameter to the protocol from which to learn the routes.
You can redistribute routes on a global basis, rather than on an interface basis. Use the ip bgp
redistribute command to accomplish the (intraVRF) redistribution of routes through BGP, so that
BGP redistribution occurs globally on all BGP-enabled interfaces. This redistribution does not require a
route policy, but you can use one for more control.
If you configure redistribution globally and on an interface, redistribution through the route policy takes
precedence.
You can redistribute routes from a protocol in one VRF to BGP in another VRF. You can use a route
policy for redistribution control. If you enable route redistribution between VRF instances, ensure that IP
addresses do not overlap.
Use caution when you configure redistribution. An improperly configured parameter can cause the
router to advertise learned eBGP routes out of your local AS. If this happens, the local AS can route
other networks.
Do not use redistribution if you peer to an Internet Service Provider (ISP) and do not want traffic to
transit your local AS.
When you redistribute OSPF routes into BGP, route priorities can create routing loops. Because BGP has
a higher route preference than OSPF external type 1 and 2 routes, if you redistribute OSPF external type
1 and 2 routes into BGP, the router uses the BGP routes, which can cause a routing loop.
In BGP RIB, the OSPF routes redistributed into BGP are considered as Internal (Local) and are matched
by route-type only when the keyword is set to local. When match route-type is set to external, the
route-maps applied on BGP neighbors are ignored and the set operation is not performed.
Note
This is applied only on the route-maps applied to BGP neighbors in BGP RIB, and not
considered when applying a route-map to the redistribute command.
BGP+
The switch extends the BGPv4 process to support the exchange of IPv6 routes using BGPv4 peering.
BGP+ is an extension of BGPv4 for IPv6, which is indicated using the Address Family Identifier (AFI) in
the BGP header.
The switch supports capabilities for AFI with the following values: 1 (IPv4) and 2 (IPv6). If the switch
receives an OPEN message advertising an AFI with a different value, the connection is closed and a BGP
notification message is sent to the peer mentioning unsupported capability.
Note
Ensure you configure IPv6 forwarding for BGP+ to work.
Note that the BGP+ support on the switch is not an implementation of BGPv6. Native BGPv6 peering
uses the IPv6 Transport layer (TCPv6 ) for establishing the BGPv6 peering, route exchanges, and data
traffic.
The switch supports the exchange of IPv6 reachability information over IPv4 transport. To support
BGP+, the switch supports two BGP protocol extensions, standards RFC 4760 (multi-protocol
extensions to BGP) and RFC 2545 (MP-BGP for IPv6). These extensions allow BGPv4 peering to be
enabled with IPv6 address family capabilities.
The implementation of BGP+ on the switch uses an existing TCPv4 stack to establish a BGPv4
connection. Optionally, nontransitive BGP properties are used to transfer IPv6 routes over the BGPv4
connection. Any BGP+ speaker has to maintain at least one IPv4 address to establish a BGPv4
connection.
Different from IPv4, IPv6 introduces scoped unicast addresses, identifying whether the address is global
or link-local. When BGP+ is used to convey IPv6 reachability information for interdomain routing, it is
sometimes necessary to announce a next hop attribute that consists of a global address and a link-local
address. For BGP+, no distinction is made between global and site-local addresses.
The BGP+ implementation includes support for BGPv6 policies, including redistributing BGPv6 into
OSPFv3, ISIS, RIPng, and advertising OSPFv3, ISIS, RIPng, IPv6 static and local routes into BGPv6
(through BGP+). It also supports the aggregation of global unicast IPv6 addresses.
When configuring BGP+ on the router that is enabled only for IPv6 (the router does not have an IPv4
address), then BGP router ID must be manually configured for the router.
BGP+ does not support confederations. You can configure confederations for IPv4 routes only.
The basic configuration of BGP+ is the same as BGPv4 with one additional parameter added and
some existing commands altered to support IPv6 capabilities. You can enable and disable IPv6 route
exchange by specifying the address family attribute as IPv6. Note that an IPv6 tunnel is required for the
flow of IPv6 data traffic.
BGP+ tunnel
When you use BGP+ you must configure an IPv6 tunnel and static routes at BGP+ peers.
When BGP+ peers advertise route information, they use Update messages to advertise route
information.
These RTM routes contain next-hop addresses from the BGP peer that the route was learned from.
The static routes correlate the next-hop addresses represented by the IPv4–mapped IPv6 address to a
specific outgoing interface.
Following is one way to express a static route in an IPv6–configured tunnel for BGP+:
The number of equal-cost-paths supported can differ by hardware platform. For more information, see
VOSS Release Notes.
You can use multiple paths for load sharing of traffic. These multiple paths allow faster convergence
to other active paths in case of network failure. By maximizing load sharing among equal-cost paths,
you can use your links between routers more efficiently when sending IP and IPv6 traffic. Equal Cost
Multipath is formed using routes from the same protocol.
Note
To add BGP+ equal cost paths in the routing table, you must enable the following:
• IPv6 ECMP feature globally
• BGP multiple-paths attribute
BGPv6
BGP peering over IPv6 transport uses a BGPv6 peer to exchange IPv6 routes over an IPv6 transport
layer. This is different than BGP+, which enables exchange of IPv6 routes over a BGPv4 peer. Also
with BGP+, you must use an IPv6 tunnel to install and configure IPv6 routes in an IPv6 Routing Table
Manager (RTM). BGP+ uses an IPv4 mapped IPv6 address for the next hop address and requires you
to configure IPv6 static routes and install IPv6 routes in an IPv6 RTM where the next hop for the static
route is an IPv6 tunnel interface.
Note
BGP+ also supports the preceding features.
RFC
The switch supports the BGP mulitprotocol extension, as described in RFC 4760. Also supports RFC
2545 (MP-BGP for IPv6).
The BGP protocol extensions ensure peering can be enabled with IPv6 address family capabilities.
Route exchange
BGPv6 does not exchange any IPv4 routes. BGPv6 advertises or learns only IPv6 routes.
The following table shows the differences between BGPv4 and BGPv6 for route exchange.
Note:
IPv6 over IPv4 tunnels is not yet virtualized.
Specify the address family attribute as IPv6 to enable IPv6 route exchange.
You can enable IPv6 route exchange by specifying the address family attribute as IPv6. Optionally,
you can use non-transitive BGP properties to exchange IPv6 routes between the BGPv6 peering. Any
BGPv6 speaker must maintain at least one IPv6 address to establish a BGPv6 connection. The IPv6
scoped unicast addresses can identify the address as global or link-local. If you use BGPv6 to convey
IPv6 reachability information for interdomain routing, you can also announce a next hop attribute that
consists of a global address and a link-local address.
Note
BGPv6 does not support adjacency on link-local.
Authentication
BGPv6 uses IPsec for security. MD-5 authentication is supported for BGPv4 and is not supported for
BGPv6.
The following table shows the differences between BGPv4 and BGPv6 for authentication.
Note:
IP Sec is not virtualized, hence BGPv6 is supported only in
Global Router mode, and not supported in VRF mode.
MD5 authentication
MD5 authentication is not supported in BGPv6 so it is not necessary to enable MD5 authentication.
IPsec
Only IPsec is supported. Therefore, MD5 authentication cannot be configured.
Consistency checking
Includes consistency checking for MD5 authentication. BGP peer and BGP peer group configuration
for IPv6 addresses include a rule to block MD5 authentication. If you attempt to configure MD5
authentication, you will receive an error message.
IPv6 tunneling
With BGPv6, IPv6 tunneling is not required for IPv6 data traffic flow. An IPv6 tunnel is required for
BGP+.
Circuitless IP
Circuitless IP (CLIP) is a virtual (or loopback) interface that you do not associate with a physical port.
You can use a CLIP interface to provide uninterrupted connectivity to your switch as long as an actual
path exists to reach the device. For example, as shown in the following figure, a physical point-to-point
link exists between R1 and R2 along with the associated addresses (195.39.1.1/30 and 195.39.1.2/30).
Note also that an iBGP session exists between two additional addresses 195.39.128.1/32 (CLIP 1) and
195.39.128.2/32 (CLIP 2).
The router advertises routes to other routers in the domain either as external routes using the route-
redistribution process or after you enable OSPF in a passive mode to advertise an OSPF internal route.
You can configure only the OSPF protocol on the CLIP interface. After you create a CLIP interface,
the system software programs a local route with the CPU as the destination ID. The CPU processes
all packets destined to the CLIP interface address. The system treats other packets with destination
addresses associated with this network (but not to the interface address) as if they are from an
unknown host.
A circuitless IP or CLIP address is a logical IP address for network management, as well as other
purposes. The CLIP is typically a host address (with a 32 bit subnet mask). Configure the OSPF router
ID to the configured CLIP address. By default, the BGP router ID is automatically equivalent to the OSPF
router ID.
For information about how to configure CLIP interfaces, see Configure a CLIP Interface on page 1872 and
Configure a Circuitless IPv4 Interface on page 1897.
Minimum Requirements
You must configure the following minimum parameters:
• router ID
• local AS number
• enable BGP globally
• BGP neighbor peer session: remote IP addresses
• enable BGP peers
• When you use both BGP and OSPF, the OSPF and BGP router ID must be the same.
The router ID must be a valid IP address of an IP interface on the router or a CLIP address. BGP update
messages use this IP address. By default, the BGP router ID automatically uses the OSPF router ID.
You cannot configure the BGP router ID if you configure BGP before you configured the OSPF router ID.
You must first disable BGP, configure the OSPF route ID, and then enable BGP globally.
You can add BGP policies to the BGP peer configuration to influence route decisions. BGP policies apply
to the peer through the soft-reconfiguration commands.
After you configure the switch for BGP, some parameter changes can require you to enable or disable
the BGP global state or the neighbor admin-state.
You can dynamically modify BGP policies. On the global level, the BGP redistribution command has an
apply parameter that causes the policy to take effect after you issue the command.
The maximum prefix parameter prevents large numbers of BGP routes from flooding the network if you
implement an incorrect configuration. You can assign a value to the maximum prefix limit, including
0 (0 means unlimited routes). When you configure the maximum prefix value, consider the maximum
number of active routes that your equipment configuration can support.
Interaction between BGPv4 and OSPF can advertise supernets to support CIDR. BGPv4 supports
interdomain supernet advertisements; OSPF can carry supernet advertisements within a routing
domain.
infrastructure, thus providing additional time to plan the IGP merger. Such a scenario is particularly
effective when you need to merge two OSPF area 0.0.0.0s, as shown in the following figure.
You can divide the AS into multiple regions that each run different IGPs. Interconnect regions logically
by using a full iBGP mesh. Each region then injects its IGP routes into iBGP and also injects a default
route inside the region. For destinations that do not belong to the region, each region defaults to the
BGP border router.
Use the community parameter to differentiate between regions. To provide Internet connectivity, this
scenario requires you to make your Internet connections part of the central iBGP mesh (see the
following figure).
To configure multiple policies between regions, represent each region as a separate AS. Implement
eBGP between autonomous systems, and implement iBGP within each AS. In such instances, each AS
injects its IGP routes into BGP, where they are propagated to all other regions and the Internet.
The following figure shows the use of eBGP to join several autonomous systems.
The following figure illustrates a design scenario in which you use multiple OSPF regions to enable
peering with the Internet.
BGP Peers
The following list provides rules related to BGP peers:
• Only metric (=MED) attribute is applied to the output policy if its BGP peer is IBGP
• metric (=MED) and community attributes are applied to output policy if its BGP peer is EBGP
• To influence EBGP and IBGP peers with all applicable BGP attributes, configure route-map as
an option to neighbor command, for example, neighbor 192.0.2.2 out-route-map
policy1
For information about how to configure route policies for BGP, see Configure IP Route Policies on page
2913.
Configure BGP
Configure BGP globally to enable BGP on the switch and determine how BGP operates.
Note
Route refresh is not currently supported on non-default VRFs.
Procedure
configure terminal
Note
• This command applies only on VRF 0. To enable BGP globally on other VRFs, use the
ip bgp enable command. You must configure BGP locally before you configure it
globally.
• You can also confiure AS number on non-default VRFs. For more information, see
Configure an AS Number for a Non-default VRF on page 456.
Example
Switch(config)#router bgp
Switch(router-bgp)#
Variable Definitions
The following table defines parameters for the router bgp command.
Variable Value
WORD <0-11> Specifies the AS number. You cannot enable BGP until you
change the local AS to a value other than 0.
enable Enables BGP on the router.
Use the data in the following table to use the BGP variables in BGP and VRF Router Configuration
mode.
Variable Value
aggregate-address Specifies an IP address and its length in the form {a.b.c.d/
WORD<1-256> len}, or an IPv6 address and its length in the form
{ipv6addr/len}.
auto-peer-restart enable Enables the process that automatically restarts a connection
to a BGP neighbor. The default value is enable.
auto-summary When enabled, BGP summarizes networks based on class
limits, for example, Class A, B, and C networks. The default
value is enable.
Variable Value
bgp always-compare-med Enables the comparison of the multi-exit discriminator
(MED) parameter for paths from neighbors in different
autonomous systems. The system prefers a path with a
lower MED over a path with a higher MED. The default value
is disable.
bgp aggregation Enables the aggregation feature on the interface.
bgp client-to-client Enables or disables route reflection between two route
reflection reflector clients. This variable applies only if the route
reflection value is enable. The default value is disable. You
can enable route reflection even when clients are fully
meshed.
This variable only applies to VRF 0.
Example: Switch(router-bgp)# bgp client-to-
client reflection System Response: Restart
or soft-restart BGP for the change to take
effect.
bgp cluster-id {A.B.C.D} Configures a cluster ID. This variable applies only if the route
reflection value is enable, and if multiple route reflectors are
in a cluster. {A.B.C.D} is the IP address of the reflector
router.
This variable only applies to VRF 0.
Example: Switch(router-bgp)# bgp cluster-id
0.0.0.0
bgp confederation identifier Configures a BGP confederation.
<0-4294967295> [peers identifier<0-4294967295> specifies the
WORD<0-255>] confederation identifier. Use 0–65535 for 2-byte AS and
<0-4294967295> for 4-byte AS.
peers WORD<0-255> lists adjoining autonomous systems
that are part of the confederation in the format
(5500,65535,0,10,...,...). Use quotation marks (") around the
list of autonomous systems.
Note:
Use this command only on VRF 0.
Variable Value
bgp multiple-paths <1-8> Configures the maximum number of equal-cost-paths that
are available to a BGP router by limiting the number of
equal-cost-paths the routing table can store. The default
value is 1.
Example: Switch(router-bgp)# bgp multiple-
paths 4
Note:
Configuring the bgp multiple-paths variable does not
affect existing routes. The routing table does not show
ECMP routes; instead only one route is shown in the routing
table.
To view Equal-Cost Multipath (ECMP) routes, receive
the routes after executing the bgp multiple-paths
variable, or toggle the BGP state.
The number of equal-cost-paths supported can differ by
hardware platform. For more information, see VOSS Release
Notes.
Variable Value
global-debug mask Displays specified debug information for BGP global
WORD<1-100> configurations. The default value is none.
• <WORD 1-100> is a list of mask choices separated by
commas with no space between choices.
Mask choices are:
• none disables all debug messages.
• all enables all debug messages.
• error enables display of debug error messages.
• packet enables display of debug packet messages.
• event enables display of debug event messages.
• trace enables display of debug trace messages.
• warning enables display of debug warning messages.
• state enables display of debug state transition
messages.
• init enables display of debug initialization messages.
• filter enables display of debug messages related to
filtering.
• update enables display of debug messages related to
sending and receiving updates.
Example: Switch(router-bgp)# global-debug
mask event, trace, warning, state
ibgp-report-import-rt enable Configures BGP to advertise imported routes to an
interior BGP (iBGP) peer. This variable enables or disables
advertisement of nonBGP imported routes to other iBGP
neighbors. The default value is enable.
ignore-illegal-rtrid enable When enabled, BGP overlooks an illegal router ID. For
example, you can configure this variable to enable or disable
the acceptance of a connection from a peer that sends an
open message using a router ID of 0 (zero). The default
value is enable.
neighbor-debug-all mask Displays specified debug information for BGP neighbors.
WORD<1-100> The default value is none. For mask options, see the
global-debug mask WORD<1-100> variable.
Example: Switch(router-bgp)# neighbor-debug-
all mask error, packet, event.trace,
state, filter
no-med-path-is-worst enable Enables BGP to treat an update without a MED attribute as
the worst path. The default value is disable.
quick-start enable Enables the quick-start flag for exponential backoff.
route-reflector enable Enables the reflection of routes from iBGP neighbors. The
default value is disable.
This variable only applies to VRF 0.
route-refresh Enables or disables route refresh. If enabled, a route refresh
request received by a BGP speaker causes the speaker to
resend all route updates it contains in its database that are
eligible for the peer that issues the request.
This variable only applies to VRF 0.
Variable Value
router-id {A.B.C.D} Specifies the BGP router ID in IP address format. This
variable only applies to VRF 0.
synchronization Enables the router to accept routes from BGP peers without
waiting for an update from the IGP. The default value is
enable.
traps enable Enables BGP traps.
vrf-as WORD<0-11> Configures an AS number on a specific VRF instance. Use
0–65535 for a 2-byte AS and <0-4294967295> for a 4-byte
AS.
The default value of 0, or configuring the local-as in the
VRF to 0, is equivalent to deleting the local-as configured
on user-defined VRFs, and in both cases the local-as on the
VRF becomes the local-as on the GlobalRouter.
Job Aid
Use debug command values to control debug messages for global BGP message types, and for
message types associated with a specified BGP peer or peer group.
Tip
The following tips can help you use the debug commands:
• Display debug commands for multiple mask choices by entering the mask choices
separated by commas, with no space between choices.
• To end (disable) the display of debug messages, use the mask choice of none.
• You can save debug messages in a log file, or you can display the messages on your
console using the debug-screen command.
For more information about the logged debug messages, see VOSS Alarms and Logs Reference.
Use BGP 4-byte AS numbers to ensure the continuity of loop-free inter-domain routing information
between autonomous systems and to control the flow of BGP updates as 2-byte AS numbers will
deplete soon. AS Plain notation format is the default and the preferred form of representing 4-byte AS
numbers over the AS dot notation format.
You have an option to configure AS dot notation format as well. With AS dot notation, analyzing
and troubleshooting any issues encountered becomes difficult as it is incompatible with the regular
expressions used by most of the network providers.
If you enable 4-byte AS numbers, or the dotted octet notation, for the Global Router (VRF0), the
configuration is inherited by user-defined VRFs. You cannot enable 4-byte AS numbers on individual
user-defined VRFs.
Procedure
configure terminal
2. Disable BGP to change the AS number format.
no router bgp enable
3. Enable the 4-byte AS numbering format.
router bgp as–4–byte enable
4. To use the dotted octet notation, enable as-dot.
router bgp as-dot enable
5. Configure the 4-byte AS number and enable BGP. If you have enabled as-dot, enter the AS number
in octet.
router bgp WORD<0–11> enable
6. Access Router BGP Configuration mode:
router bgp
7. (Optional) Configure BGP confederation identifier.
bgp confederation identifier <0–4294967295>
8. (Optional) Configure BGP confederation peers.
bgp confederation peers WORD<0–255>
Example
Variable Definitions
The following table defines parameters for the router bgp command.
Variable Value
as-4-byte Enables the switch for using 4 byte numbers for an autonomous system (AS).
<enable> The default value is disable.
as-dot <enable> Enables or disables representing AS numbers in octets. The default is disable
so the switch uses the plain notation format. If you enable the 4-byte-as and
as-dot parameters, enter numbers in the range of 1.0 to 65535.65535.
The default value is disable.
Note:
This parameter is not supported with BGP+.
Note:
If as-4-byte is set to false, the range for AS number is 0–65535 and if as-4-byte
is set to true, the range is 0–4294967295.
If you enable as-dot, enter the AS number in octets in the range of 1.0 to
65535.65535.
Note:
This parameter is not supported with BGP+.
Note
Route refresh is not currently supported on non-default VRFs.
Procedure
configure terminal
router bgp
2. Enable BGP aggregation:
bgp aggregation enable
3. Add an aggregate route to the routing table:
aggregate-address WORD<1–256> {advertise-map WORD<0–1536>] [as-set]
[attribute-map WORD<0–1536>] [summary-only] [suppress-map WORD<0–
1536>]
4. Exit to Global Configuration mode:
exit
5. Enable BGP:
router bgp [<0-65535>] [enable]
Example
Enable BGP:
Variable Definitions
The following table defines parameters for the aggregate-address command.
Variable Value
advertise-map WORD<0-1536> Specifies the route map name for route
advertisements.
as-set Enables autonomous system information. The
default value is disable.
attribute-map WORD<0-1536> Specifies the route map name.
WORD <1–256> Specifies an IP address and its length in the
appropriate form. The value must be entered in
the format a.b.c.d/len or ipv6addr/len.
Variable Value
summary-only Enables the summarization of routes not included
in routing updates. This variable creates the
aggregate route and suppresses advertisements
of more specific routes to all neighbors. The
default value is disable.
suppress-map WORD<0-1536> Specifies the route map name for the suppressed
route list.
The following table defines parameters for the router bgp command.
Variable Value
<0-65535> Specifies the AS number. You cannot enable BGP until you
change the local AS to a value other than 0.
enable Enables BGP on the router.
Procedure
configure terminal
router bgp
2. Specify IGP network prefixes for BGP to advertise:
network <WORD 1–256> [metric <0-65535>]
Example
Variable Definitions
The following table defines parameters for the network command.
Variable Value
WORD <1–256> Specifies an IP address and its length in the
appropriate form.
metric <0-65535> Specifies the metric to use when the system sends
an update for the routes in the network table.
The metric configures the MED for the routes
advertised to eBGP peers. The range is 0–65535.
BGP speakers can have many neighbors configured with similar update policies. For example, many
neighbors use the same distribute lists, filter lists, outbound route maps, and update source. Group the
neighbors that use the same update policies into peer groups and peer associations.
Note
• If required, route policies exist.
• You configure BGPv4 on a VRF instance the same way you configure the GlobalRouter,
except that you must use VRF Router Configuration mode and the prefix ip bgp. The
VRF must have an RP Trigger of BGP.
• Route refresh is not currently supported on non-default VRFs.
• Not all parameters are supported on non-default VRFs.
Many of the command variables in this procedure use default values. You can accept the default values
or change them to customize the configuration.
Procedure
configure terminal
router bgp
2. Create a peer or peer group:
neighbor WORD<0–1536>
3. Apply a route policy to all incoming routes:
For BGPv4: neighbor WORD<0–1536> in-route-map WORD<0-256>
Example
Variable Definitions
The following table defines parameters for the neighbor command.
Variable Value
address-family <ipv6> Enables the IPv6 address family on BGP neighbor.
Switch(router-bgp)# neighbor peergroupa
address-family ipv6
advertisement-interval Specifies the time interval, in seconds, that transpires between
<5-120> each transmission of an advertisement from a BGP neighbor.
The default value is 5 seconds.
Switch(router-bgp)# neighbor peergroupa
advertisement-interval 26 enable
The route advertisement interval feature is implemented using
the time stamp that indicates when each route is advertised.
The time stamp is marked to each route so that the route
advertisement interval is compared to the time stamp and
BGP is then able to make a decision about whether the route
advertisement can be sent or it should be delayed when a
better route is received. This feature does not work for a
withdraw route because the route entry is already removed
when the processing route advertisement is sent and the time
stamp marked in the route entry cannot be obtained.
allow-as-in Allows BGP to inject updates.
default-ipv6–originate Enables IPv6 BGP neighbor default originate.
Switch(router-bgp)# neighbor peergroupa
default-ipv6–originate
default-originate Enables the switch to send a default route advertisement to
the specified neighbor. A default route does not need to be in
the routing table. The default value is disable.
Do not use this command if default-information
originate is globally enabled.
Switch(router-bgp)# neighbor peergroupa
default-originate enable peer-group test
ebgp-multihop Enables a connection to a BGP peer that is more than one hop
away from the local router. The default value is disable.
Switch(router-bgp)# neighbor peergroupa
ebgp-multihop retry-interval 3 timers 4 5
enable Enables the BGP neighbor.
fall-over bfd Enable fall-over Bidirectional Forwarding Detection (BFD).
in-route-map WORD<0-256> Applies a route policy rule to all incoming routes that are
learned from, or sent to, the peers or peer groups of the local
router. The local BGP router is the BGP router that allows
or disallows routes and configures attributes in incoming or
outgoing updates.
WORD<0-256> is an alphanumeric string length (0–256
characters) that indicates the name of the route map or policy.
Switch(router-bgp)# neighbor peergroupa in-
route-map map1 address-family ipv6
Variable Value
ipv6-in-route-map WORD <0– Creates IPv6 in route map. WORD <0–256> specifies the
256> route map name in the range of 0 to 256 characters.
Switch(router-bgp)# neighbor peergroupa
ipv6– in-route-map map1
ipv6-max-prefix Configures a limit on the number of routes that the router can
<0-2147483647> accept from a neighbor. The default value is 12000 routes. A
value of 0 (zero) indicates that no limit exists.
ipv6–out-route-map WORD Creates IPv6 out route map. WORD <0–256> specifies the
<0–256> route map name in the range of 0 to 256 characters.
Switch(router-bgp)# neighbor peergroupa
ipv6–out-route-map map2
max-prefix <0-2147483647> Configures a limit on the number of routes that the router can
accept from a neighbor. The default value is 12000 routes. A
value of 0 (zero) indicates that no limit exists.
Switch(router-bgp)# neighbor peergroupa max-
prefix 158 in-route-map map1 out-route-map
map2
MD5-authentication enable Enables TCP MD5 authentication between two peers. The
default value is disable.
neighbor-debug mask Displays specified debug information for a BGP peer. The
WORD<1-100> default value is none.
<WORD 1-100> is a list of mask choices separated by
commas with no space between choices. For example:
{<mask>,<mask>,<mask>...}.
Mask choices are:
• none disables all debug messages.
• all enables all debug messages.
• error enables display of debug error messages.
• packet enables display of debug packet messages.
• event enables display of debug event messages.
• trace enables display of debug trace messages.
• warning enables display of debug warning messages.
• state enables display of debug state transition messages.
• init enables display of debug initialization messages.
• filter enables display of debug messages related to
filtering.
• update enables display of debug messages related to
sending and receiving updates.
Switch(router-bgp)# neighbor
peergroupa neighbor-debug-mask
event,trace,warning,state
next-hop-self When enabled, specifies that the next-hop attribute in an iBGP
update is the address of the local router or the router that
generates the iBGP update. The default value is disable.
You can only configure this variable if the neighbor is disabled.
Switch(router-bgp)# neighbor peergroupa
next-hop-self out-route-map map2 peer-group
peergroupb
Variable Value
out-route-map WORD<0-256> Applies a route policy rule to all outgoing routes that are
learned from, or sent to, the peers or peer groups of the local
router. The local BGP router is the BGP router that allows
or disallows routes and configures attributes in incoming or
outgoing updates.
WORD<0-256> is an alphanumeric string length (0–256
characters) that indicates the name of the route map or policy.
peer-group <WORD 0-1536> Adds a BGP peer to the specified subscriber group. You must
create the specified subscriber group before you use this
command.
remote-as <WORD 0-11> Configures the remote AS number of a BGP peer or a peer-
group. You must disable the admin-state before you can
configure this variable.
Switch(router-bgp)# neighbor peergroupa
remote-as As-number
<WORD 0-11> is an alphanumeric string length (0–11
characters) that indicates the AS number.
remove-private-as enable Strips private AS numbers when an update is sent.
The default value is enable.
retry-interval <1-65535> Configures the time interval, in seconds, for the ConnectRetry
timer. The default value is 120 seconds.
Switch(router-bgp)# neighbor 198.51.100.2
retry-interval 34
You can configure the retry interval for BGP neighbors only;
you cannot configure the retry interval for BGP peer groups.
route-reflector-client Configures the specified neighbor or group of neighbors
as a route reflector client. The default value is disable. All
configured neighbors become members of the client group
and the remaining iBGP peers become members of the
nonclient group for the local route reflector.
Note:
This variable only applies to VRF 0.
Switch(router-bgp)# neighbor
route-refresh Enables route refresh for the BGP peer. If enabled, a route
refresh request received by a BGP speaker causes the speaker
to resend all route updates it contains in its database that are
eligible for the peer that issues the request.
Note:
This variable only applies to VRF 0.
Variable Value
soft-reconfiguration-in Enables the router to relearn routes from the specified
enable neighbor or group of neighbors without restarting the
connection after the policy changes in the inbound direction.
The default value is disable.
timers <0-21845> <0-65535> Configures timers, in seconds, for the BGP speaker for this
peer.
<0-21845> is the keepalive time. The default is 60. As a best
practice, configure a value of 30 seconds.
<0-65535> is the hold time. The default is 180.
Switch(router-bgp)# neighbor peergroupa
timers 4 6
update-source WORD<1–256> Specifies the source IPv4 address {A.B.C.D.} or IPv6 address
to use when the system sends BGP packets to this peer or
peer group. You must disable the admin-state before you can
configure this variable.
Switch(router-bgp)# neighbor peergroupa
update-source 192.0.2.2 weight 560
weight <0-65535> Specifies the weight of a BGP peer or peer group, or the
priority of updates the router can receive from that BGP peer.
The default value is 0. If you have particular neighbors that you
want to use for most of your traffic, you can assign a higher
weight to all routes learned from that neighbor.
WORD<0-1536> Specifies the peer IP address or the peer group name.
Note
You configure BGP peer on a VRF instance the same way you configure the GlobalRouter,
except that you must use VRF Router Configuration mode and the prefix ip bgp. The VRF
must have an RP Trigger of BGP. Route refresh is not currently supported on non-default
VRFs.
Procedure
configure terminal
router bgp
2. Assign a BGP peer or peer group password:
neighbor password <nbr_ipaddr|peer-group=name> WORD <0–1536>
Example
Variable Definitions
The following table defines parameters for the neighbor password <nbr_ipaddr|peer-
group-name> command.
Variable Value
password <nbr_ipaddr|peer- Specifies a password for TCP MD5 authentication
group-name> WORD <0–1536> between two peers.
WORD <0–1536> is an alphanumeric string length
from 0 to 1536 characters.
To disable this option, use no operator with the
command.
To configure this option to the default value, use
default operator with the command.
Note
When a route map with attributes set to origin and local-pref is applied to the BGP
redistribute command, the attributes are not applied to the redistributed routes.
Note
Route refresh is not currently supported on non-default VRFs.
• Before you redistribute DvR host routes to BGP, you must disable BGP aggregation and BGP
auto-summarization of networks, using the commands no ip bgp aggregation enable and
no ip bgp auto-summary respectively.
Disabling these settings ensures that all the DvR host routes are correctly advertised into BGP and
are not summarized.
Note
When applying a route map to an inter-vrf redistribution, the route map and any associated
IP prefix lists must be configured first on the source VRF before configuring the redistribute
policy on the destination VRF.
Inter-vrf redistribution is not supported on IPv6 routes.
Procedure
configure terminal
router bgp
2. Create a redistribution instance:
redistribute <direct|dvr|ipv6-direct|ipv6-isis|ipv6-static|isis|ospf|
ospfv3|rip|ripng|static>
Note
Redistribution of ripng routes into BGP is supported only on VRF 0.
10. View all routes (including DvR host routes) that are redistributed into BGP:
View routes redistributed from GRT to BGP:
Examples
Redistribute direct routes from the VRF instance source1 into BGP, in the GRT context.
View the host routes (including DvR host routes) that are redistributed from the GRT to BGP:
Switch:1(config)#show ip bgp imported-routes vrf vrf1
=================================================================================
BGP Imported Routes - VRF vrf1
=================================================================================
ROUTE METRIC COMMUNITY LOCALPREF NEXTHOP ORIGIN
---------------------------------------------------------------------------------
192.0.2.1/255.255.255.0 0 0 100 198.51.100.1 INC
192.0.2.2/255.255.255.0 0 0 100 198.51.100.1 INC
192.0.2.3/255.255.255.0 0 0 100 198.51.100.1 INC
...
...
...
3 out of 763 Total Num of imported routes displayed
Redistribute DvR routes to BGP for the specific VRF instance vrf1:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#router vrf vrf1
Switch:1(router-vrf)#ip bgp redistribute dvr
Switch:1(router-vrf)#ip bgp redistribute dvr enable
Switch:1(router-vrf)#exit
Switch:1(config)#ip bgp apply redistribute dvr vrf vrf1
View the DvR host routes that are redistributed to BGP for vrf vrf1:
Switch:1(config)#show ip bgp imported-routes vrf vrf1
=================================================================================
BGP Imported Routes - VRF vrf1
=================================================================================
ROUTE METRIC COMMUNITY LOCALPREF NEXTHOP ORIGIN
---------------------------------------------------------------------------------
192.0.2.4/255.255.255.0 0 0 100 203.0.113.1 INC
192.0.2.5/255.255.255.0 0 0 100 203.0.113.1 INC
192.0.2.6/255.255.255.0 0 0 100 203.0.113.1 INC
192.0.2.7/255.255.255.0 0 0 100 203.0.113.1 INC
192.0.2.8/255.255.255.0 0 0 100 203.0.113.1 INC
...
...
...
5 out of 675 Total Num of imported routes displayed
This example demonstrates redistribution of inter-VRF routes (both direct and DvR routes) to BGP, with
a route policy configured.
Redistribute inter-VRF DvR routes between VRFs (with VRF IDs 10 and 30), to BGP.
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router vrf 10
Switch:1(router-vrf)#ip prefix-list "test10" 192.0.2.0/24 ge 25 le 32
Switch:1(router-vrf)#route-map "test10" 1
Switch:1(router-vrf)#permit
Switch:1(router-vrf)#enable
Switch:1(router-vrf)#match network "test10"
Switch:1(router-vrf)#set metric 99
Switch:1(router-vrf)#exit
Switch:1(config)#router vrf 30
Switch:1(router-vrf)#ip bgp redistribute direct vrf-src 10
Switch:1(router-vrf)#ip bgp redistribute direct enable vrf-src 10
Switch:1(router-vrf)#ip bgp redistribute dvr vrf-src 10
Switch:1(router-vrf)#ip bgp redistribute dvr route-map "test10" vrf-src 10
Switch:1(router-vrf)#ip bgp redistribute dvr enable vrf-src 10
Switch:1(router-vrf)#exit
Variable Definitions
The following table defines parameters for the redistribute and ip bgp apply
redistribute commands.
Variable Value
<direct | dvr | ipv6-direct Specifies the type of routes to redistribute (the protocol
| ipv6-isis | ipv6-static | source).
isis | ospf | ospfv3 | rip
| ripng| static >
enable Enables the BGP route redistribution instance.
metric <0-65535> Configures the metric to apply to redistributed routes.
metric-type live-metric Configures the metric type to apply to redistributed routes.
When you enable the live-metric option, when BGP
redistributes static, RIP, OSPF, IS-IS, or DvR routes, the metric
value is taken from the routing table and is set to the Path
attributes as a MED value.
By default, this option is disabled, which means the BGP MED
value is not derived from the metric in the routing table.
route-map WORD<0-64> Configures the route policy to apply to redistributed routes.
vrf WORD<1–16> Specifies the name of a VRF instance.
vrf-src WORD<1-16> Specifies the source VRF instance by name for route
redistribution.
Note
When a route map with attributes set to origin and local-pref is applied to the BGP
redistribute command, the attributes are not applied to the redistributed routes.
Procedure
configure terminal
router bgp
2. Create a redistribution instance:
redistribute <direct|dvr|ipv6-direct|ipv6-isis|ipv6-static|isis|ospf|
ospfv3|rip|ripng|static>
3. If required, specify a route policy to govern redistribution:
redistribute <direct|dvr|ipv6-direct|ipv6-isis|ipv6-static|isis|ospf|
ospfv3|rip|ripng|static> route-map WORD <0–64>
4. If required, configure a route metric:
redistribute <direct|dvr|ipv6-direct|ipv6-isis|ipv6-static|isis|ospf|
ospfv3|rip|ripng|static> metric <0–65535>
5. Enable the instance:
redistribute <direct|dvr|ipv6-direct|ipv6-isis|ipv6-static|isis|ospf|
ospfv3|rip|ripng|static> enable
Unlike IPv4 redistribution, you do not need to manually apply the IPv6 redistribution instance. Once
you enable the IPv6 redistribution instance, it is automatically applied.
Example
Variable Definitions
The following table defines parameters for the redistribute <ipv6-direct|ipv6-static|
ospfv3|ipv6–isis|ripng> command.
Variable Value
enable Enables the BGP route redistribution instance. The
default value is none.
To configure this option to the default value, use
default operator with the command.
To disable this option, use no operator with the
command.
metric<0–65535> Configures the metric to apply to redistributed routes.
The default value is 0.
To configure this option to the default value, use
default operator with the command.
route-map <Word 0-64> Configures the route policy to apply to redistributed
routes. The default value is none.
To configure this option to the default value, use
default operator with the command.
Job Aid
Use the data in the following table to know how route policies are used for BGP from IPv6 perspective.
Note
Route refresh is not currently supported on non-default VRFs.
Procedure
configure terminal
router bgp
2. Create the path list:
ip as-list <1-1024> memberid <0–65535> <permit|deny> as-path WORD<0–
1536>
Use this command for each member by specifying different member IDs.
Example
Variable Definitions
The following table defines parameters for the ip as-list command.
Variable Value
<0-65535> Specifies an integer value between 0–65535 that represents
the regular expression entry in the AS path list.
<1-1024> Specifies an integer value from 1–1024 that represents the
AS-path list ID you want to create or modify.
<permit|deny> Permits or denies access for matching conditions.
WORD<0–1536> Specifies the AS number as an integer value between 0–
1536. Place multiple AS numbers within quotation marks (").
Note
Route refresh is not currently supported on non-default VRFs.
Procedure
configure terminal
router bgp
2. Create a community list:
ip community-list <1-1024> memberid <0-65535> <permit|deny> community-
string WORD<0-256>
Example
Variable Definitions
The following table defines parameters for the ip community-list command.
Variable Value
<0-65535> Specifies an integer value from 0–65535 that represents the
member ID in the community list.
<1-1024> Specifies an integer value from 1–1024 that represents the
community list ID.
<permit|deny> Configures the access mode, which permits or denies access
for matching conditions.
WORD<0-256> Specifies the community as an alphanumeric string value with
a string length from 0–256 characters. Enter this value in one
of the following formats:
• (AS num:community-value)
• (well-known community string)
Note
Route refresh is not currently supported on non-default VRFs.
Procedure
configure terminal
router bgp
2. Create an extended community list based on the route target attribute:
ip extcommunity-list <1-1024> memberId <0-65535> rt {<0–65535>
<0-2147483647>|<A.B.C.D> <0–65535>} [soo {<0-65535> <0-2147483647>|
<A.B.C.D> <0-65535>}]
You can optionally configure the SOO attributes at the end of the same command or you can
configure the SOO separately using the syntax in the following step.
Example
Variable Definitions
The following table defines parameters for the ip extcommunity-list command.
Variable Value
<1-1024> Specifies an integer value from 1–1024 that represents the
community list ID you want to create or modify.
memberId <0-65535> Specifies an integer value from 0–65535 that represents the
member ID in the community list.
rt <0-65536> <0-2147483647> Specifies the route target in the format {AS number:assigned
rt <A.B.C.D> <0-65535> number} (that is, {0–65535}:{0–2147483647}) or
{ipaddress:assigned number} (that is, {a.b.c.d}:{0–65535}).
soo <0-65535> <0-2147483647> Specifies the site of origin in the format
soo <A.B.C.D> <0-65535> {AS number:assigned number} (that is, {0–65535}:{0–
2147483647}) or {ipaddress:assigned number} (that is,
{a.b.c.d}:{0–65535}).
Procedure
1. Enter VRF Router Configuration mode for a specific VRF context:
enable
configure terminal
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router vrf vrfred
Switch:1(router-vrf)#ip bgp vrf-as 3
Variable Definitions
The following table defines parameters for the ip bgp vrf-as command.
Variable Value
WORD<0-11> Configures the local autonomous system (AS) number for the
specific VRF instance. You cannot change local-as when BGP is
set to enable.
• To configure a 2-byte local AS number, enter a local-as
number in the range of 0 to 65535.
• To configure a 4-byte local-as number, enable the 4-byte
as variable and enter a number in the range of 0 to
4294967295.
Note:
If as-4-byte is configured to false, the range for AS number is
0–65535 and if as-4-byte is configured to true, the range is
0–4294967295.
Note
If the next hop of a BGP route is resolved using an IS-IS route, show commands can display
the IS-IS internal next hop from the 127.1.x.y class rather than the IS-IS sys name.
Procedure
Variable Definitions
The following table defines parameters for the show ip bgp aggregates command.
Variable Value
<prefix/len> Specifies the IP address and the mask length.
vrf WORD<1–16> Specifies a VRF instance by name.
vrfids WORD<0–255> Specifies a range of VRFs by ID number.
Use BGP 4 byte AS numbers to ensure the continuity of loop-free inter-domain routing information
between ASs and to control the flow of BGP updates as 2 byte AS numbers will deplete soon.
Procedure
Variable Definitions
The following table defines parameters for the show bgp ipv6 aggregates command.
Variable Value
WORD <1–256> Specifies the IPv6 prefix and the prefix length (the length
can be 0 to 128).
vrf WORD <1-16> Specifies a VRF instance by name (the string length
ranges from 1–16 characters).
vrfids <0–255> Specifies a range of VRFs by ID number (the ID ranges
from 0–255).
Procedure
Variable Definitions
The following table defines parameters for the show ip bgp cidr-only command.
Variable Value
<prefix/len> Specifies an exact match of the prefix. This variable is an
IP address and an integer value from 0–32 in the format
a.b.c.d/xx.
vrf WORD<1–16> Specifies a VRF instance by name (the string length ranges
from 1–16 characters).
Procedure
Example
================================================================================
BGP Configuration - VRF vrf1
================================================================================
BGP version - 4
local-as - 22610
Identifier - 27.82.217.1
BGP on/off - ON
as-4-byte - disable
as-dot - disable
aggregation - enable
always-cmp-med - disable
auto-peer-restart - enable
auto-summary - enable
comp-bestpath-med-confed - disable
default-local-preference - 100
default-metric - -1
deterministic-med - disable
flap-dampening - disable
debug-screen - Off
global-debug - none
ibgp-report-import-rt - enable
ignore-illegal-rtrid - enable
max-equalcost-routes - 1
no-med-path-is-worst - enable
route-refresh - disable
orig-def-route - disable
orig-v6-def-route - disable
quick-start - disable
synchronization - enable
--More-- (q = quit)
Variable Definitions
The following table defines parameters for the show ip bgp conf command.
Variable Value
vrf WORD<1–16> Specifies a VRF instance by name (the string length ranges
from 1–16 characters).
Procedure
Example
Switch(config)#show ip bgp confederation
confederation identifier 0
confederation peer as
Procedure
Variable Definitions
The following table defines parameters for the show ip bgp dampened-paths command.
Variable Value
{A.B.C.D} Specifies the source IP address in the format a.b.c.d.
longer-prefixes Shows long prefixes. The longer-prefixes indicate the mask
length from a specified prefix to 32 (for example, show from
prefix a.b.c.d/len to a.b.c./32).
<prefix/len> Shows paths with this prefix. The prefix is the IP address and
exact mask length (must be an integer value from 0–32).
Variable Value
vrf WORD<1–16> Specifies a VRF instance by name (the string length ranges
from 1–16 characters).
vrfids WORD<0–512> Specifies a range of VRFs by ID number (the ID ranges from
0–512).
Procedure
Example
Switch(config)# show ip bgp flap-damp-config vrf vrf1
===================================================================
BGP Flap Dampening - VRF vrf1
===================================================================
Status - enable
PolicyName - N/A
CutoffThreshold - 1536
ReuseThreshold - 512
Decay - 2
MaxHoldDown - 180
Variable Definitions
The following table defines parameters for the show ip bgp flap-damp-config command.
Variable Value
<prefix/len> Shows paths with this prefix. The prefix is the IP address and
exact mask length (must be an integer value from 0–32).
vrf WORD<1–16> Specifies a VRF instance by name (the string length ranges
from 1–16 characters).
vrfids WORD<0–512> Specifies a range of VRFs by ID number (the ID ranges from
0–512).
Procedure
Variable Definitions
The following table defines parameters for the show ip bgp imported-routes command.
Variable Value
longer-prefixes Shows long prefixes. The longer-prefixes indicate the mask
length from a specified prefix to 32 (for example, show from
prefix a.b.c.d/len to a.b.c./32).
<prefix/len> Shows paths with this prefix. The prefix is the IP address and
exact mask length (must be an integer value from 0–32).
vrf WORD<1–16> Specifies a VRF instance by name (the string length ranges
from 1–16 characters).
vrfids WORD<0–512> Specifies a range of VRFs by ID number (the ID ranges from
0–512).
Procedure
Variable Definitions
The following table defines parameters for the show bgp ipv6 imported-routes command.
Variable Value
longer-prefixes Shows long prefixes. The longer-prefixes indicate the mask
length from a specified prefix to 32 (for example, show from
prefix a.b.c.d/len to a.b.c./32).
<prefix/len> Shows paths with this prefix. The prefix is the IP address and
exact mask length (must be an integer value from 0–32).
vrf WORD<1–16> Specifies a VRF instance by name (the string length ranges
from 1–16 characters).
vrfids WORD<0–255> Specifies a range of VRFs by ID number (the ID ranges from
0–255).
Procedure
Example
Switch:#show ip bgp neighbors vrf vrf1
=========================================================================
BGP neighbor is 200.200.200.63 remote AS 63, Internal Peer, MP-BGP-capable, BGP state
[Established] UP Time 0 day(s), 07:27:24 remote router ID 63.1.1.1
vrf instance - 0
admin-state - BGP ON
connect-retry-interval - 120
ebgp-multihop - disable
hold-time - 30
keepalive-time - 10
hold-time-configured - 180
keepalive-time-configured - 60
max-prefix - 12000
nexthop-self - disable
originate-def-route - disable
MD5-authentication - disable
neighbor-debug - all
remove-private-as - disable
route-advertisement-interval - 5
route-reflector-client - disable
send-community - disable
soft-reconfiguration-in - disable
updt-source-interface - 0.0.0.0
weight - 100
Route Policy In -
Route Policy Out -
address-family vpnv4 - disable
route-refresh - disable
Total bgp neighbors -
1
Variable Definitions
The following table defines parameters for the show ip bgp neighbors command.
Variable Value
{A.B.C.D} Specifies the IP address.
community <enable|disable> Enables or disables the display of community attributes.
longer-prefixes Shows long prefixes. The longer-prefixes indicate the mask
length from a specified prefix to 32 (for example, show from
prefix a.b.c.d/len to a.b.c./32).
prefix/len Shows paths with this prefix. The prefix is the IP address and
exact mask length (must be an integer value from 0–32).
vrf WORD<1–16> Specifies a VRF instance by name.
vrfids WORD<0–512> Specifies a range of VRFs by ID number.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. View information about BGPv6 neighbors:
show bgp ipv6 neighbors [WORD<1–256>] [vrf <WORD 1-16>] [vrfids
<0-255>]
3. View information about BGPv6 peer advertised routes:
show bgp ipv6 neighbors WORD<1–256> advertised-routes [WORD<1–256>]
[longer-prefixes] [vrf <WORD 1-16>] [vrfids <0-255>]
4. View information about BGPv6 peer routes:
show bgp ipv6 neighbors WORD<1–256> routes [WORD<1–256>] [community
<enable|disable>] [vrf <WORD 1-16>] [vrfids <0-255>]
Example
The following examples shows the summary output for bgp ipv6 neighbors command, and the
advertised-routes and routes variable options.
Switch:1>show bgp ipv6 neighbors vrf vrf1
=====================================================================================
BGPv6 Neighbor Info - VRF vrf1
=====================================================================================
BGPv6 neighbor is 2015:cdba:0:0:0:0:3257:9652 remote AS 200, External Peer,
BGP state [Established] UP Time 0 day(s), 00:50:30
remote router ID 0.0.0.6
vrf instance - 0
admin-state - BGP ON
connect-retry-interval - 120
ebgp-multihop - disable
hold-time - 180
keepalive-time - 60
hold-time-configured - 180
keepalive-time-configured - 60
ipv6-max-prefix - 8000
nexthop-self - disable
originate-defv6-route - disable
neighbor-debug - all
remove-private-as - disable
route-advertisement-interval - 5
route-reflector-client - disable
send-community - disable
soft-reconfiguration-in - enable
updt-source-interface - 0:0:0:0:0:0:0:0
weight - 100
IPv6Route Policy In -
IPv6Route Policy Out -
address-family ipv6 - enable
route-refresh - enable
-------------------------------------------------------------------------------------------------
1100:0:0:0:0:0:0:0/64 2015:cdba:0:0:0:0:3257:9655 2015:cdba:0:0:0:0:3257:9655 INC 100 Used AS_PATH:(150)
2015:cdba:0:0:0:0:0:0/64 2015:cdba:0:0:0:0:3257:9655 2015:cdba:0:0:0:0:3257:9655 INC 100 Best AS_PATH:(150)
-------------------------------------------------------------------------------------------------
Variable Definitions
The following table defines parameters for the show bgp ipv6 neighbors command.
Variable Value
WORD<1–256> Specifies the IPv6 address.
advertised-routes Specifies an IPv6 neighbors advertised routes.
routes Specifies an IPv6 neighbors routes.
WORD<1–256> Specifies an IPv6 address/length.
Shows long prefixes. The longer-prefixes indicate the mask
longer-prefixes length from any specified prefix to 128. For example, show
from prefix :X::X:X/len to X:X::X:X/ 128.
Variable Value
community <enable|disable> Enables or disables the display of community attributes.
vrf Specifies a VRF instance by name (the string length ranges
from 1–16 characters).
vrfids Specifies a range of VRFs by ID number (the ID ranges from
0–255).
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display information about BGP network configurations:
show ip bgp networks [<prefix/len>] [vrf WORD<1–16>] [vrfids WORD<0–
512>]
Variable Definitions
The following table defines parameters for the show ip bgp networks command.
Variable Value
<prefix/len> Shows paths with this prefix. The prefix is the IP address and
exact mask length (must be an integer value from 0–32).
vrf WORD<1–16> Specifies a VRF instance by name (the string length ranges
from 1–16 characters).
vrfids WORD<0–512> Specifies a range of VRFs by ID number (the ID ranges from
0–512).
Procedure
Variable Definitions
The following table defines parameters for the show bgp ipv6 networks command.
Variable Value
<WORD 1–256> Specifies the IPv6 prefix and the prefix length (must be
an integer value between 0 and 128).
vrf Specifies a VRF instance by name (the string length
ranges from 1–16 characters).
vrfids Specifies a range of VRFs by ID number (the ID ranges
from 0–255).
Procedure
Variable Definitions
The following table defines parameters for the show ip bgp peer-group command.
Variable Value
vrf WORD<1–16> Specifies a VRF instance by name (the string length ranges
from 1–16 characters).
Procedure
Variable Definitions
The following table defines parameters for the show ip bgp redistributed-routes command.
Variable Value
<prefix/len> Shows paths with this prefix. The prefix is the IP address and
exact mask length (must be an integer value from 0–32).
vrf WORD<1–16> Specifies a VRF instance by name (the string length ranges
from 1–16 characters).
vrfids WORD<0–255> Specifies a range of VRFs by ID number (the ID ranges from
0–255).
Procedure
Variable Definitions
The following table defines parameters for the show bgp ipv6 redistributed-routes
command.
Variable Value
vrf Specifies a VRF instance by name (the string
length ranges from 1–16 characters).
vrfids Specifies a range of VRFs by ID number (the ID
ranges from 0–255).
Procedure
Example
The following example shows partial output for the show ip bgp summary command.
Switch:1>show ip bgp summary vrf vrf1
====================================================================================================
BGP Summary - VRF vrf1
====================================================================================================
BGP version - 4
local-as - 22610
Identifier - 27.82.217.1
Decision state - Idle
The total number of routes is 0
NEIGHBOR RMTAS STATE HLDTM KPALV HLDCFG KPCFG WGHT CONRTY ADVINT UPTime
----------------------------------------------------------------------------------------------------
192.0.2.1 22620 Active 0 0 180 60 100 120 5 0 day(s), 07:25:09
Total bgp neighbors: 1
--More-- (q = quit)
Variable Definitions
The following table defines parameters for the show ip bgp summary command.
Variable Value
vrf WORD<1–16> Specifies a VRF instance by name.
vrfids WORD<0–512> Specifies a range of VRFs by ID number.
Procedure
Example
The following example shows partial output for the show bgp ipv6 summary command.
Switch:1>show bgp ipv6 summary vrf vrf1
=============================================================================
BGP ipv6 Summary - VRF vrf1
=============================================================================
BGP version - 4
local-as - 200
Identifier - 0.0.0.6
Decision state - Idle
The total number of routes is 1
NEIGHBOR RMTAS STATE HLDTM KPALV HLDCFG KPCFG WGHT CONRTY ADVINT
------------------------------------------------------------------------------------------------
2001:DB8:0:0:0:0:0:ffff 50 Established 180 60 180 60 100 120
5
=====================================================================
BGPv6 Networks - VRF vrf1
=====================================================================
)
Variable Definitions
The following table defines parameters for the show bgp ipv6 summary command.
Variable Value
vrf Specifies a VRF instance by name (the string
length ranges from 1–16 characters).
vrfids Specifies a range of VRFs by ID number (the ID
ranges from 0–255).
Note
BGP stores route information on the AVL tree and this command retrieves that information.
Information in the AVL tree is not sorted. The information returned by this command will not
be displayed in any particular order.
Procedure
Variable Definitions
The following table defines parameters for the show ip bgp route command.
Variable Value
community <enable|disable> Enables or disables the display of community attributes.
ip {A.B.C.D} Specifies an IP address.
longer-prefixes Shows long prefixes. Longer-prefixes indicates the mask length
from a specified prefix to 32 (for example, show from prefix
a.b.c.d/len to a.b.c./32).
<prefix/len> Shows paths with this prefix. The prefix is the IP address and
exact mask length (must be an integer value from 0–32).
vrf WORD<1–16> Specifies a VRF instance by name.
vrfids WORD<0–512> Specifies a range of VRFs by ID number.
Procedure
Variable Definitions
The following table defines parameters for the show bgp ipv6 route command.
Variable Value
[<WORD 1-256>] Specifies the IPv6 prefix and the prefix length (must be
an integer value between 0 and 128).
community <enable|disable> Enables or disables the display of community attributes.
ipv6 <WORD 1-256>] Specifies an IPv6 address.
longer-prefixes Shows long prefixes. The longer-prefixes indicate the
mask length from any specified prefix to 128 (for
example, show from prefix X:X::X:X/len to X:X::X:X/ 128).
vrf Specifies a VRF instance by name (the string length
ranges from 1–16 characters).
vrfids Specifies a range of VRFs by ID number (the ID ranges
from 0–255).
For information about how to configure route policies, see Configure a Route Policy on page 2925.
Configure BGP
Enable BGP so that BGP runs on the router. Configure general BGP parameters to define how BGP
operates on the system.
Procedure
Name Description
bgpVersion Specifies the version of BGP that operates on the router.
Note:
This parameter only applies to VRF 0.
Name Description
4ByteAs Enables or disables 4–byte AS numbers. The default is
disable.
Note:
This parameter only applies to VRF 0.
Note:
If the inserted LocalAs is 0, then the LocalAs in that
VRFcontext loses its significance and it becomes the
LocalAs configured in GlobalRouter (the equivalence to CLI
commands ip bgp vrf-as 0 and no ip bgp vrf-as
or default ip bgp vrf-as).
Note:
This parameter only applies to VRF 0.
Name Description
AutoSummary Enables or disables automatic summarization. If you enable
this varialble, BGP summarizes networks based on class limits
(for example, Class A, B, or C networks). The default is
enable.
NoMedPathIsWorst Enables or disables NoMedPathIsWorst. If you enable this
variable, BGP treats an update without a MED attribute as
the worst path. The default is enabled.
BestPathMedConfed Enables or disables the comparison of MED attributes within
a confederation. The default is disable.
DebugMask Displays the specified debug information for BGP global
configurations. The default value is none. Other options are
• none disables all debug messages.
• event enables the display of debug event messages.
• state enables display of debug state transition messages.
• update enables display of debug messages related to
updates transmission and reception.
• error enables the display of debug error messages.
• trace enables the display of debug trace messages.
• init enables the display of debug initialization messages.
• all enables all debug messages.
• packet enables the display of debug packet messages.
• warning enables the display of debug warning messages.
• filter enables the display of debug messages related to
filtering.
Name Description
ConfederationASIdentifier Specifies a BGP confederation identifier in the range of 0–
65535.
Note:
This parameter applies only to VRF 0.
Note:
This parameter applies only to VRF 0.
Note:
This parameter applies only to VRF 0.
Note:
This parameter applies only to VRF 0.
Note:
This parameter applies only to VRF 0.
Note:
This parameter only applies to VRF 0.
Use BGP 4–byte AS numbers to ensure the continuity of loop-free inter-domain routing information
between autonomous systems and to control the flow of BGP updates as 2 byte AS numbers will
deplete soon. AS Plain notation format is the default and the preferred form of representing 4–byte AS
numbers over the AS dot notation format.
You have an option to configure AS dot notation format as well. With AS dot notation, analyzing
and troubleshooting any issues encountered becomes difficult as it is incompatible with the regular
expressions used by most of the network providers.
If you enable 4-byte AS numbers, or the dotted octet notation, for the Global Router (VRF0), the
configuration is inherited by user-defined VRFs. You cannot enable 4-byte AS numbers on individual
user-defined VRFs.
Procedure
Name Description
bgpVersion Specifies the version of BGP that operates on the router.
Note:
This parameter only applies to VRF 0.
Note:
This parameter only applies to VRF 0.
Name Description
LocalAs Configures the local AS number. You cannot change the
LocalAs value if AdminStatus is enable.
The switch does not support this parameter with BGP +.
Note:
If the inserted LocalAs is 0, then the LocalAs in that
VRFcontext loses its significance and it becomes the
LocalAs configured in GlobalRouter (the equivalence to CLI
commands ip bgp vrf-as 0 and no ip bgp vrf-as
or default ip bgp vrf-as).
Note:
This parameter only applies to VRF 0.
Name Description
BestPathMedConfed Enables or disables the comparison of MED attributes within
a confederation. The default is disable.
DebugMask Displays the specified debug information for BGP global
configurations. The default value is none. Other options are
• none disables all debug messages.
• event enables the display of debug event messages.
• state enables display of debug state transition messages.
• update enables display of debug messages related to
updates transmission and reception.
• error enables the display of debug error messages.
• trace enables the display of debug trace messages.
• init enables the display of debug initialization messages.
• all enables all debug messages.
• packet enables the display of debug packet messages.
• warning enables the display of debug warning messages.
• filter enables the display of debug messages related to
filtering.
Note:
This parameter applies only to VRF 0.
Name Description
ConfederationPeers Lists adjoining autonomous systems that are part of the
confederation in the format (5500,65535,0,10,...,...).. This
value can use 0–255 characters.
Note:
This parameter applies only to VRF 0.
Note:
This parameter applies only to VRF 0.
Note:
This parameter applies only to VRF 0.
Note:
This parameter applies only to VRF 0.
Note:
This parameter only applies to VRF 0.
Procedure
Name Description
AbsoluteValue Displays the counter value.
Cumulative Displays the total value since you opened the Stats tab.
Average/sec Displays the average value for each second.
Minimum/sec Displays the minimum value for each second.
Maximum/sec Displays the maximum value for each second.
LastVal/sec Displays the last value for each second.
Starts Displays the number of times the BGP connection started.
Stops Displays the number of times the BGP connection stopped.
Opens Displays the number of times BGP opens TCP.
Closes Displays the number of times BGP closes TCP.
Fails Displays the number of times TCP attempts failed.
Fatals Displays the number of times TCP crashes due to fatal error.
ConnExps Displays the number of times the TCP retry timer expired.
HoldExps Displays the number of times the hold timer expired.
KeepExps Displays the number of times the keepalive timer expired.
RxOpens Displays the number of open instances BGP receives.
RxKeeps Displays the number of keepalive instances BGP receives.
RxUpdates Displays the number of update instances BGP receives.
RxNotifys Displays the number of notification instances BGP receives.
TxOpens Displays the number of open instances BGP transmitted.
TxKeeps Displays the number of keepalive instances BGP transmitted.
TxUpdates Displays the number of updates instances BGP transmits.
TxNotifys Displays the number of notification instances BGP transmits.
BadEvents Displays the number of invalid events FSM received.
SyncFails Displays the number of times FDB sync failed.
TrEvent Displays the trace event.
RxECodeHeader Displays the total header errors received.
RxECodeOpen Displays the total open errors received.
RxECodeUpdate Displays the total update errors received.
RxECodeHoldtimer Displays the total hold timer errors received.
RxECodeFSM Displays the total FSM errors received.
RxECodeCease Displays the total cease errors received.
RxHdrCodeNoSync Displays the header not synchronized errors received.
Name Description
RxHdrCodeInvalidMsgLen Displays the header invalid message length errors received.
RxHdrCodeInvalidMsgType Displays the header invalid message type errors received.
RxOpCodeBadVer Displays the open errors received for Bad Version.
RxOpCodeBadAs Displays the open errors received for le Bad AS Number.
RxOpCodeBadRtID Displays the open errors received for Bad BGP Rtr ID.
RxOpCodeUnsuppOption Displays the open errors received for Unsupported Option.
RxOpCodeAuthFail Displays the open errors received for Auth Failures.
RxOpCodeBadHold Displays the open errors received for Bad Hold Value.
RxUpdCodeMalformedAttrList Displays the update errors received for Malformed Attr List.
RxUpdCodeWelKnownAttrUnrecog Displays the update errors received for Welknown Attr Unrecog.
RxUpdCodeWelknownAttrMiss Displays the update errors received for Welknown Attr Missing.
RxUpdCodeAttrFlagError Displays the update errors received for Attr Flag Error.
RxUpdCodeAttrLenError Displays the update errors received for Attr Len Error.
RxUpdCodeBadORIGINAttr Displays the update errors received for Bad ORIGIN Attr.
RxUpdCodeASRoutingLoop Displays the update errors received for AS Routing Loop.
RxUpdCodeBadNHAttr Displays the update errors received for Bad NEXT-HOP Attr.
RxUpdCodeOptionalAttrError Displays the update errors received for Optional Attr Error.
RxUpdCodeBadNetworkField Displays the update errors received for Bad Network Field.
RxUpdCodeMalformedASPath Displays the update errors received for Malformed AS Path.
TxECodeHeader Displays the total Header errors transmitted.
TxECodeOpen Displays the total Open errors transmitted.
TxECodeUpdate Displays the total Update errors transmitted.
TxECodeHoldtimer Displays the total Hold timer errors transmitted.
TxECodeFSM Displays the total FSM errors transmitted.
TxECodeCease Displays the total Cease errors transmitted.
TxHdrCodeNoSync Displays the header Not Synchronized errors transmitted.
TxHdrCodeInvalidMsgLen Displays the header Invalid msg len errors transmitted.
TxHdrCodeInvalidMsgType Displays the header Invalid msg type errors transmitted.
TxOpCodeBadVer Displays the open errors transmitted for Bad Version.
TxOpCodeBadAs Displays the open errors transmitted for Bad AS Number.
TxOpCodeBadRtID Displays the open errors transmitted for Bad BGP Rtr ID.
TxOpCodeUnsuppOption Displays the open errors transmitted for Unsupported Option.
TxOpCodeAuthFail Displays the open errors transmitted for Auth Failures.
TxOpCodeBadHold Displays the open errors transmitted for Bad Hold Value.
TxUpdCodeMalformedAttrList Displays the update errors transmitted for Malformed Attr List.
Name Description
TxUpdCodeWelknownAttrUnrecog Displays the update errors transmitted for Welknown Attr
Unrecog.
TxUpdCodeWelknownAttrMiss Displays the update errors transmitted for Welknown Attr
Missing.
TxUpdCodeAttrFlagError Displays the update errors transmitted for Attr Flag Error.
TxUpdCodeAttrLenError Displays the update errors transmitted for Attr Len Error.
TxUpdCodeBadORIGINAttr Displays the update errors transmitted for Bad ORIGIN Attr.
TxUpdCodeASRoutingLoop Displays the update errors transmitted for AS Routing Loop
TxUpdCodeBadNHAttr Displays the update errors transmitted for Bad NEXT-HOP Attr
TxUpdCodeOptionalAttrError Displays the update errors transmitted for Optional Attr Error.
TxUpdCodeBadNetworkField Displays the update errors transmitted for Bad Network Field.
TxUpdCodeMalformedASPath Displays the update errors transmitted for Malformed AS Path.
Procedure
Name Description
Address Specifies the aggregate IP address.
PrefixLen Specifies the aggregate PrefixLen.
AsSetGenerate Enables or disables AS-set path information generation. The
default is disable.
SummaryOnly Enables or disables the summarization of routes in routing
updates. Enable this parameter to create the aggregate route
and suppress advertisements of more-specific routes to all
neighbors. The default is disable.
SuppressPolicy Specifies the route policy (by name) used for the suppressed
route list. Enable this parameter to create the aggregate route
and suppress advertisements of the specified routes.
AdvertisePolicy Specifies the route policy (by name) used for route
advertisements. The route policy selects the routes that create
AS-set origin communities.
AttributePolicy Specifies the route policy (by name) used to determine
aggregate route attributes.
To configure aggregate routes for IPv4, see Configure Aggregate Routes on page 482.
Procedure
8. Select Insert.
Name Description
Address Specifies the aggregate address. The default is
none.
PrefixLen Specifies the length of the prefix (in bits).
AsSetGenerate Enables or disables AS-set path information
generation. The default is disable.
SummaryOnly Enables or disables the summarization of routes in
routing updates. Enable this parameter to create
the aggregate route and suppress advertisements
of more-specific routes to all neighbors. The
default is disable.
SuppressPolicy Specifies the route policy (by name) used for
the suppressed route list. Enable this parameter
to create the aggregate route and suppress
advertisements of the specified routes.
AdvertisePolicy Specifies the route policy (by name) used for
route advertisements. The route policy selects the
routes that create AS-set origin communities.
AttributePolicy Specifies the route policy (by name) used to
determine aggregate route attributes.
Procedure
Name Description
NetworkAfAddr Specifies the network prefix that BGP advertises.
NetworkAfPrefixLen Specifies the prefix length of the network address.
NetworkAfMetric Specifies the metric to use when the system sends an update for the
routes in the network table. The metric configures the MED for the
routes advertised to eBGP peers. The range is 0–65535.
To configure allowed IPv4 networks, see Configure Allowed Networks on page 484.
Procedure
Name Description
NetworkAfAddr Specifies the network prefix that BGP advertises.
The default is none.
NetworkAfPrefixLen Specifies the network prefix length. The default is
none.
NetworkAfMetric Specifies the metric used when an update is sent
for the routes in the network table. The metric
configures the MED for the routes advertised to
EBGP peers. The range is 0 to 65535. The default
is 0.
Procedure
Name Description
Instance Specifies the BGP peer instance.
LocalAddrType Specifies the local IP address type of the entered BGP peer.
LocalAddr Specifies the local IP address of the entered BGP peer.
RemoteAddrType Specifies the remote IP address type of the entered BGP peer.
RemoteAddr Specifies the remote IP address of the entered BGP peer.
AdminStatus Specifies the administrative status of the BGP peer.
GroupName Specifies the peer group name to which the peer belongs
(optional).
PeerState Specifies the BGP peer connection state.
RemoteAs Configures a remote AS number for the peer or peer-group in the
range 0–65535.
Enable Controls whether the peer connection is enabled or disabled. The
default is disabled.
EbgpMultiHop Enables or disables a connection to a BGP peer that is more than
one hop away from the local router. The default value is disable.
Name Description
RoutePolicyIn Specifies the policy (by name) that applies to all network routes
learned from this peer.
RoutePolicyOut Specifies the policy (by name) that applies to all outgoing route
updates.
RemovePrivateAs Strips (when enabled) private AS numbers when the switch sends
an update. The default is enable.
UpdateSourceInterface Specifies the source IP address to use when the switch sends
eBGP packets to this peer or peer group.
ConnectRetryInterval Specifies the time interval, in seconds, for the connect retry timer.
The suggested value for this timer is 120 seconds. The range is 1 to
65535.
HoldTimeConfigured Specifies the time interval, in seconds, for the hold time for this
BGP speaker with this peer. This value is in an open message sent
to this peer by this BGP speaker. To determine the hold time with
the peer, the switch compares this value with the HoldTime value
in an open message received from the peer. The HoldTime must
be at least three seconds. If the value is zero, the hold time does
not establish with the peer. The suggested value for this timer is
180 seconds. The range is 0 to 65535.
KeepAliveConfigured Specifies the time interval, in seconds, for the KeepAlive
timer configured for this BGP speaker with this peer.
KeepAliveConfigured determines the keep alive message
frequency relative to HoldTimeConfigured; KeepAlive indicates
the actual time interval for the keep alive messages. The
maximum value for this timer is one-third of HoldTimeConfigured.
If KeepAliveConfigured is zero, no periodic keep alive messages
are sent to the peer after the peers establish a BGP connection.
Configure a value of 60 seconds. The range is 0 to 21845.
MD5Authentication Enables and disables MD5 authentication.
AdvertisementInterval Specifies the time interval, in seconds, that elapses between
each transmission of an advertisement from a BGP neighbor. The
default value is 30 seconds and the range is 5–120 seconds.
The route advertisement interval feature is implemented using the
time stamp that indicates when each route is advertised. The time
stamp is marked to each route so that the route advertisement
interval is compared to the time stamp and BGP is then able
to make a decision about whether the route advertisement can
be sent or should be delayed when a better route is received.
This feature does not work for a withdraw route because the
route entry is already removed when the processing route
advertisement is sent and the time stamp marked in the route
entry cannot be obtained.
DefaultOriginate When enabled, specifies that the current route originated from
the BGP peer. This parameter enables or disables sending the
default route information to the specified neighbor or peer. The
default value is false.
DefaultOriginateIpv6 When enabled, specifies that the current IPv6 route originated
from the BGP peer. This parameter enables or disables sending
the default IPv6 route information to the specified neighbor or
peer. The default value is false.
Name Description
Weight Specifies the peer or peer group weight, or the priority of updates
the system can receive from this BGP peer. The default value is
100 and the range is 0–65535.
MaxPrefix Configures a limit on the number of routes accepted from a
neighbor. The default value is 12000 routes and the range is 0–
2147483647.
A value of 0 means no limit exists.
NextHopSelf Specifies that the next-hop attribute in an iBGP update is the
address of the local router or the router that generates the iBGP
update. The default is disable.
RouteReflectorClient Specifies that this peer is a route reflector client.
Note:
This parameter only applies to VRF 0.
SoftReconfigurationIn When enabled, the router relearns routes from the specified
neighbor or group of neighbors without restarting the connection
after the policy changes in the inbound direction. The default
value is disable.
Enabling SoftReconfigurationIn stores all BGP routes in local
memory (even non-best routes).
DebugMask Displays the specified debug information for the BGP peer. The
default value is none.
• None disables all debug messages.
• Event enables the display of debug event messages.
• State enables display of debug state transition messages.
• Update enables display of debug messages related to updates
transmission and reception.
• Error enables the display of debug error messages.
• Trace enables the display of debug trace messages.
• Init enables the display of debug initialization messages.
• All enables all debug messages.
• Packet enables the display of debug packet messages.
• Warning enables the display of debug warning messages.
• Filter enables the display of debug messages related to
filtering.
Name Description
SooAssignedNum Specifies the site-of-origin (SoO) assigned number of the BGP
peer.
SooType Specifies the site-of-origin (SoO) type of the BGP peer.
RouteRefresh Enables or disables route refresh. If enabled, a route refresh
request received by a BGP speaker causes the speaker to resend
all route updates in the database that are eligible for the peer that
issues the request. This parameter only applies to VRF 0.
AsOverride Specifies that the AS Override parameter can be enabled or
disabled for the BGP peer. The default is disable.
Note:
This field does not apply on all
hardware platforms.
AllowAsIn Specifies the number of AS-in allowed for the BGP peer. The
range is 1–10.
Note:
This field does not apply on all
hardware platforms.
Ipv6RoutePolicyIn Specifies the policy (by name) that applies to all network IPv6
routes learned from this peer.
Ipv6RoutePolicyOut Specifies the policy (by name) that applies to all outgoing IPv6
route updates.
Ipv6MaxPrefix Configures a limit on the number of IPv6 routes accepted from a
neighbor.
A value of 0 means no limit exists.
BfdEnable Enables Bidirectional Forwarding Detection (BFD) for this BGP
peer.
Procedure
Name Description
RemoteAddr Specifies the remote IPv6 address of the entered BGP+ peer.
GroupName Specifies the peer group name to which the peer belongs
(optional).
PeerState Specifies the BGPv6 peer connection state.
RemoteAs Configures a remote AS number for the peer or peer-group in the
range 0 to 65535.
Enable Controls whether the peer connection is enabled or disabled. The
default is disabled.
EbgpMultiHop Enables or disables a connection to a BGPv6 peer that is more
than one hop away from the local router. The default value is
disable.
RoutePolicyIn Specifies the policy (by name) that applies to all network routes
learned from this peer.
RoutePolicyOut Specifies the policy (by name) that applies to all outgoing route
updates.
RemovePrivateAs Strips (when enabled) private AS numbers when the switch sends
an update. The default is enable.
UpdateSourceInterface Specifies the source IP address to use when the switch sends
eBGP packets to this peer or peer group.
ConnectRetryInterval Specifies the time interval, in seconds, for the connect retry timer.
The suggested value for this timer is 120 seconds. The range is 1 to
65535.
HoldTimeConfigured Specifies the time interval, in seconds, for the hold time for this
BGP speaker with this peer. This value is in an open message sent
to this peer by this BGP speaker. To determine the hold time with
the peer, the switch compares this value with the HoldTime value
in an open message received from the peer. The HoldTime must
be at least three seconds. If the value is zero, the hold time does
not establish with the peer. The suggested value for this timer is
180 seconds. The range is 0 to 65535.
Name Description
KeepAliveConfigured Specifies the time interval, in seconds, for the KeepAlive
timer configured for this BGP speaker with this peer.
KeepAliveConfigured determines the keep alive message
frequency relative to HoldTimeConfigured; KeepAlive indicates
the actual time interval for the keep alive messages. The
maximum value for this timer is one-third of HoldTimeConfigured.
If KeepAliveConfigured is zero, no periodic keep alive messages
are sent to the peer after the peers establish a BGP connection.
Configure a value of 60 seconds. The range is 0 to 21845.
MD5Authentication Enables and disables MD5 authentication.
AdvertisementInterval Specifies the time interval, in seconds, that elapses between each
transmission of an advertisement from a BGPv6 neighbor. The
default value is 30 seconds and the range is 5 to 120 seconds.
The route advertisement interval feature is implemented using the
time stamp that indicates when each route is advertised. The time
stamp is marked to each route so that the route advertisement
interval is compared to the time stamp and BGP is then able
to make a decision about whether the route advertisement can
be sent or should be delayed when a better route is received.
This feature does not work for a withdraw route because the
route entry is already removed when the processing route
advertisement is sent and the time stamp marked in the route
entry cannot be obtained.
DefaultOriginateIpv6 When enabled, specifies that the current IPv6 route originated
from the BGP peer. This parameter enables or disables sending
the default IPv6 route information to the specified neighbor or
peer. The default value is false.
Weight Specifies the peer or peer group weight, or the priority of updates
the system can receive from this BGP peer. The default value is
100 and the range is 0 to 65535.
MaxPrefix Configures a limit on the number of routes accepted from a
neighbor. The default value is 12000 routes and the range is 0
to 2147483647.
A value of 0 means no limit exists.
NextHopSelf Specifies that the next-hop attribute in an iBGP update is the
address of the local router or the router that generates the iBGP
update. The default is disable.
RouteReflectorClient Specifies that this peer is a route reflector client.
Note:
This parameter only applies to VRF 0.
SoftReconfigurationIn When enabled, the router relearns routes from the specified
neighbor or group of neighbors without restarting the connection
after the policy changes in the inbound direction. The default
value is disable.
Enabling SoftReconfigurationIn stores all BGP routes in local
memory (even non-best routes).
Name Description
DebugMask Displays the specified debug information for the BGP peer. The
default value is none.
• None disables all debug messages.
• Event enables the display of debug event messages.
• State enables display of debug state transition messages.
• Update enables display of debug messages related to updates
transmission and reception.
• Error enables the display of debug error messages.
• Trace enables the display of debug trace messages.
• Init enables the display of debug initialization messages.
• All enables all debug messages.
• Packet enables the display of debug packet messages.
• Warning enables the display of debug warning messages.
• Filter enables the display of debug messages related to
filtering.
AllowAsIn Specifies the number of AS-in allowed for the BGP peer. The
range is 1–10.
Note:
This field does not apply on all
hardware platforms.
Ipv6RoutePolicyIn Specifies the policy (by name) that applies to all network IPv6
routes learned from this peer.
Ipv6RoutePolicyOut Specifies the policy (by name) that applies to all outgoing IPv6
route updates.
Ipv6MaxPrefix Configures a limit on the number of IPv6 routes accepted from a
neighbor.
A value of 0 means no limit exists.
BfdEnable Enables Bidirectional Forwarding Detection (BFD) for this peer.
Procedure
1. In the navigation pane, expand Configuration > IP.
2. Select BGP.
3. Select the Peer Groups tab.
You can modify an existing parameter by double-clicking the value.
4. Select Insert.
5. Configure the peer group as required.
6. Select Apply.
Name Description
Index Specifies the index of this peer group.
GroupName Specifies the peer group to which this neighbor belongs
(optional).
Enable Enables or disables the peer group.
RemoteAs Configures a remote AS number for the peer-group in the range
0–65535.
DefaultOriginate When enabled, the BGP speaker (the local router) sends the
default route 0.0.0.0 to a group of neighbors for use as a default
route. The default is disabled.
DefaultOriginateIpv6 When enabled, the BGP speaker (the local router) sends the
default route to a group of neighbors for use as a default route.
The default is disabled.
EbgpMultiHop When enabled, the switch accepts and attempts BGP connections
to external peers that reside on networks that do not directly
connect. The default is disabled.
AdvertisementInterval Specifies the time interval, in seconds, that elapses between BGP
routing updates. The default value is 30 seconds.
KeepAlive Specifies the time interval, in seconds, between sent BGP keep
alive messages to remote peers. The default value is 60.
HoldTime Configures the hold time for the group of peers in seconds. Use
a value that is three times the value of the KeepAlive time. The
default value is 180.
Name Description
Weight Assigns an absolute weight to a BGP network. The default value is
100.
MaxPrefix Limits the number of routes accepted from this group of
neighbors. A value of zero indicates no limit The default value
is 12,000 routes.
NextHopSelf Specifies that the switch must set the NextHop attribute to the
local router address before sending updates to remote peers.
RoutePolicyIn Specifies the route policy that applies to all networks learned from
this group of peers.
RoutePolicyOut Specifies the route policy that applies to all outgoing updates to
this group of peers.
RouteReflectorClient Specifies that this peer group is a route reflector client.
Note:
This parameter only applies to VRF 0.
SoftReconfigurationIn When enabled, the router relearns routes from the specified
neighbor or group of neighbors without restarting the connection
after the policy changes in the inbound direction. The default
value is enable.
Enabling SoftReconfigurationIn stores all BGP routes in local
memory (even non-best routes).
MD5Authentication Enables and disables MD5 authentication. The default is disable.
RemovePrivateAs Strips (when enabled) private AS numbers when the switch sends
an update. The default is enable.
SendCommunity Enables or disables sending the community attribute of the
update message to the specified peer group. The default value
is disable.
AfUpdateSourceInterfaceType Specifies the interface type.
AfUpdateSourceInterface Specifies the IP address used for circuitless IP (CLIP) for this peer
group.
Vpnv4Address Enables BGP address families for IPv4 (BGP) and Layer 3 VPN
(MP-BGP) support. Enable this parameter for VPN/VRF Lite
routes.
IpvpnLiteCap Specifies (when enabled) that IP VPN Lite capability can be
enabled or disabled on the BGP neighbor peer. The default is
disable.
RouteRefresh Enables or disables route refresh. If enabled, a route refresh
request received by a BGP speaker causes the speaker to resend
all route updates in the database that are eligible for the peer that
issues the request. This parameter only applies to VRF 0.
AsOverride Specifies that the AS Override parameter can be enabled or
disabled for the BGP peer group. The default is disable.
AllowedAsIn Specifies the number of AS-in allowed for the BGP peer group.
The range is 1–10.
Name Description
IPv6Cap Enable or disable the IPv6 capability on the BGP neighbor peer.
The default value is disable.
Ipv6RoutePolicyIn Specifies the policy (by name) that applies to all network IPv6
routes learned from this peer.
Ipv6RoutePolicyOut Specifies the policy (by name) that applies to all outgoing IPv6
route updates.
Ipv6MaxPrefix Configures a limit on the number of IPv6 routes accepted from a
neighbor.
A value of 0 means no limit exists.
BfdEnable Enables Bidirectional Forwarding Detection (BFD) for the BGP
peer group.
Procedure
Name Description
Origin Specifies the ultimate origin of the path information.
NextHopAddr Specifies the address of the border router that is used to
access the destination network. This address is the nexthop
address received in the UPDATE packet associated with this
prefix.
Name Description
Med This metric is used to discriminate between multiple exit
points to an adjacent autonomous system. When the MED
value is absent but has a calculated default value, this object
will contain the calculated value.
LocalPref Specifies the value used during route decision process in the
BGP protocol. Applicable to BGP only.
AggregatorAS Specifies the AS number of the last BGP4 speaker that
performed route aggregation. If the AGGREGATOR path
attribute is absent, this object will not be present in the
conceptual row.
AggregatorAddr Specifies the IP address of the last BGP4 speaker that
performed route aggregation. If the AGGREGATOR path
attribute is absent, this object will not be present in the
conceptual row.
String This is a string representing the autonomous system path
to the network which was received from the peer which
advertised it. The format of the string is implementation-
dependent, and is designed for operator readability.
Note:
SnmpAdminString is only capable of representing a
maximum of 255 characters. This may lead to the string
being truncated in the presence of a large AS Path.
Procedure
Name Description
IpAddrPrefix Specifies the IP address prefix in the NLRI field. This variable
is an IP address that contains the prefix with a length
specified by IpAddrPrefixLen. Bits beyond the length specified by
IpAddrPrefixLen are set to zero.
IpAddrPrefixLen Specifies the length, in bits, of the IP address prefix in the NLRI field.
Peer Specifies the IP address of the peer from which the router learns the
path information.
FlapPenalty Specifies the penalty based on number of route flaps.
FlapCount Specifies the number of times a route flapped (went down and up)
since the last time the penalty was reset to zero.
RouteDampened Indicates whether this route is suppressed or announced.
ReuseTime Specifies the system-configured time for route reuse.
Procedure
Name Description
DstVrfId Specifies the destination VRF instance (read-only).
Protocol Specifies the protocols that receive the redistributed routes.
SrcVrfId Specifies the source VRF instance (read-only).
RouteSource Specifies the source protocol for the route redistribution entry.
Enable Enables (or disables) a BGP redistribute entry for a specified source type.
RoutePolicy Configures the route policy to use for the detailed redistribution of external
routes from a specified source into the BGP domain.
Metric Configures the metric for the redistributed route. The value can be a range
between 0–65535. The default value is 0. Use a value that is consistent with
the destination protocol.
Procedure
Name Description
DstVrfId Specifies the destination VRF instance (read-only).
Protocol Specifies the protocols that receive the redistributed routes.
Note:
This field does not
apply on all hardware
platforms.
Procedure
Name Description
Prefix Specifies the IP address prefix in the Network
Layer Reachability Information (NLRI) field. This
is an IP address that contains the prefix with
a length specified by IpAddrPrefixLen. Any bits
beyond the length specified by IpAddrPrefixLen
are set to zero.
PrefixLen Specifies the length, in bits, of the IP address
prefix in the NLRI field.
LocalAddr The local address of this entry's BGP connection.
RemoteAddr Specifies the IP address of the peer from which
path information was learned.
Procedure
Name Description
Prefix Configures the IP address of the route.
PrefixLen Specifies the IP address and the mask length (the length can be 0–32).
LocalAddr Specifies the local IP address of the entered BGP route.
RemoteAddr Specifies the remote IP address of the entered BGP route.
Procedure
Name Description
Id Specifies the AS path list.
MemberId Specifies the AS path access list member ID.
Mode Specifies the action to take if the system selects a policy
for a specific route. Select permit (allow the route) or deny
(ignore the route).
AsRegularExpression Specifies the expression to use for the AS path.
Procedure
Name Description
Id Specifies the community list. The range is 0–1024.
MemberId Specifies the community list member ID. The range is 0–
65535.
Mode Specifies the action to take if the system selects a policy
for a specific route. Select permit (allow the route) or deny
(ignore the route).
Community Specifies the community access list community string.
When BGP+ peers advertise route information, they use Update messages to advertise route
information. And, when route information is encapsulated in Update messages, BGP+ peers convert
their own IPv4 peer addresses to IPv4-mapped IPv6 addresses and insert them into the next-hop field
in the Update message.
When the BGP+ software module receives Update messages, it adds route information to the IPv6
Routing Manager (RTM). These RTM routes contain next-hop addresses from the BGP peer that the
route was learned from. The next-hop addresses are represented as IPv4-mapped IPv6 addresses.
But, because the IPv6 RTM cannot correlate the IPv4-mapped IPv6 address to a specific outgoing
interface, you must create a manually-configured static route to make the link between the BGP peer
and the IPv6 tunnel interface so that traffic can reach networks advertised by the peer.
Following is one way to express a static route in an IPv6–configured tunnel for BGP+:
ipv6 route 0:0:0:0:0:ffff:192.0.2.0/24 cost 1 tunnel 10
Configure the IPv6 tunnel endpoint and the BGP peer to reside on the same switch.
If the IPv6 tunnel endpoint and the BGP peer must reside on different switches you can terminate the
tunnel on a different switch, but you must consider the following:
• Because the IPv6 tunnel endpoint does not reside on the same switch as the BGP peer, the BGP
device cannot use the tunnel as the outgoing interface. That is, to reach the IPv6-configured tunnel
endpoint, if the BGP peer resides on a different switch from the IPv6 tunnel endpoint, the next-hop
for the manually-configured IPv4-mapped IPv6 static route is the native IPv6 interface next-hop
address.
• The node where the tunnel terminates must contain all of the information needed to route the
packets between the remote IPv6 network clouds.
Note
In order for the tunnel endpoint switch to be aware of all of the necessary IPv6 routes, you
may need to redistribute the BGP routes into OSPFv3.
The system uses these IPv4-mapped IPv6 addresses for devices that are only IPv4-capable.
These IPv4-mapped address have the first 80 bits set to zeros, followed by the next 16 bits set to ones,
and the last 32 bits have IPv4 addresses.
When converted to an IPv4-mapped IPv6 address, an IPv4 device address of 192.0.2.1 would be
represented as one of the following:
• 0:0:0:0:0:FFFF:192.0.2.1
• ::FFFF:192.0.2.1
When you configure the static route for the BGP+ tunnel, you must designate the BGP peer IP address
as the next hop in most cases.
You can configure multiple static routes, using the same tunnel, but you must ensure reachability when
you create the static routes.
R1 configuration
interface GigabitEthernet 3/2
brouter port 3/2 vlan 2090 subnet 192.0.2.1/255.255.255.0 mac-offset 2
exit
# BGP CONFIGURATION - GlobalRouter
#
ipv6 forwarding
#
# IPV6 STATIC ROUTE CONFIGURATION
#
R2 configuration
interface GigabitEthernet 4/32
brouter port 4/32 vlan 2090 subnet 192.0.2.2/255.255.255.0 mac-offset
2
exit
# BGP CONFIGURATION - GlobalRouter
#
ipv6 forwarding
#
# IPV6 STATIC ROUTE CONFIGURATION
If you cannot enable OSPF, you must configure static routes to provide reachability to the BGP+ peer.
The static route must point to the next hop for the routes to be installed in the IPv6 RTM.
The IPv4 interfaces do not need to connect directly, but the routing table on each switch must include
the IPv4 interface of the other switch.
iBGP between the CLIP interfaces needs to run OSPF as a routing protocol so that the BGP neighbor
can remain reachable.
R1 configuration
interface GigabitEthernet 3/2
brouter port 3/2 vlan 2090 subnet 192.0.2.1/255.255.255.0 mac-offset
2
exit
# OSPF CONFIGURATION - GlobalRouter
#
interface loopback 1
ip address 1 1.1.1.1/255.255.255.255
ip ospf 1
router bgp
no synchronization
exit
router bgp as-dot enable
router bgp 65000 enable
router bgp
neighbor "2.2.2.2"
neighbor 2.2.2.2 remote-as 65000
neighbor 2.2.2.2 next-hop-self
neighbor 2.2.2.2 update-source 1.1.1.1
neighbor 2.2.2.2 address-family ipv6
neighbor 2.2.2.2 enable
exit
# IPV6 CONFIGURATION
#
ipv6 forwarding
#
# IPV6 STATIC ROUTE CONFIGURATION
#
R2 configuration
interface GigabitEthernet 4/32
brouter port 4/32 vlan 2090 subnet 192.0.2.2/255.255.255.0 mac-offset
2
exit
# OSPF CONFIGURATION - GlobalRouter
#
interface loopback 1
ip address 1 2.2.2.2/255.255.255.255
ip ospf 1
router bgp
no synchronization
exit
router bgp as-dot enable
router bgp 65000 enable
router bgp
neighbor "1.1.1.1"
neighbor 1.1.1.1 remote-as 65000
neighbor 1.1.1.1 next-hop-self
neighbor 1.1.1.1 update-source 2.2.2.2
neighbor 1.1.1.1 address-family ipv6
neighbor 1.1.1.1 enable
exit
# IPV6 CONFIGURATION
#
ipv6 forwarding
#
# IPV6 STATIC ROUTE CONFIGURATION
#
You must configure the address-family ipv6 option for IPv6 peers, otherwise, peer-ship is
formed, but no routing updates between them will take place.
You must configure the ebgp-multihop option for the given eBGP peer that is not on one of local
subnets (remote peers), otherwise, peer-ship will not be formed.
Note
The switch does not accept any configuration command for BGP in router-vrf configuration
mode unless a BGP instance associated to the VRF context is created. You can use ip bgp
command in router-vrf configuration mode to create a BGP instance on VRF.
R1 configuration
#
# VRF CONFIGURATION
#
#
# VLAN CONFIGURATION
#
exit
#
# PORT CONFIGURATION - PHASE II
#
#
# CIRCUITLESS IPV6 INTERFACE CONFIGURATION - GlobalRouter
#
interface loopback 1
ipv6 interface address 1:1:1:1:0:0:0:1/128
exit #
# CIRCUITLESS IPV6 INTERFACE CONFIGURATION - VRF
#
interface loopback 2
ipv6 interface address 11:1:1:1:0:0:0:1/128 vrf vrf1
exit
interface loopback 3
ipv6 interface address 12:1:1:1:0:0:0:1/128 vrf vrf2
exit
#
# BGP CONFIGURATION - GlobalRouter
#
router bgp
no synchronization
exit
router bgp 1000 enable
router bgp
network 1:1:1:1:0:0:0:1/128 metric 100000
neighbor "2001:0:100:0:0:0:0:2"
neighbor 2001:0:100:0:0:0:0:2 remote-as 10000
neighbor 2001:0:100:0:0:0:0:2 next-hop-self
neighbor 2001:0:100:0:0:0:0:2 ebgp-multihop
neighbor 2001:0:100:0:0:0:0:2 address-family ipv6
neighbor 2001:0:100:0:0:0:0:2 update-source 2001:0:100:0:0:0:0:1
neighbor 2001:0:100:0:0:0:0:2 enable
exit#
# BGP CONFIGURATION - VRF
#
router vrf vrf1
ip bgp
no ip bgp synchronization
ip bgp enable
ip bgp network 11:1:1:1:0:0:0:1/128 metric 100000
ip bgp neighbor "2001:0:101:0:0:0:0:2"
ip bgp neighbor 2001:0:101:0:0:0:0:2 remote-as 10000
ip bgp neighbor 2001:0:101:0:0:0:0:2 next-hop-self
ip bgp neighbor 2001:0:101:0:0:0:0:2 ebgp-multihop
ip bgp neighbor 2001:0:101:0:0:0:0:2 address-family ipv6
ip bgp neighbor 2001:0:101:0:0:0:0:2 update-source 2001:0:101:0:0:0:0:1
ip bgp neighbor 2001:0:101:0:0:0:0:2 enable
exit
router vrf vrf2
ip bgp
no ip bgp synchronization
ip bgp enable
ip bgp network 12:1:1:1:0:0:0:1/128 metric 100000
ip bgp neighbor "2001:0:102:0:0:0:0:2"
ip bgp neighbor 2001:0:102:0:0:0:0:2 remote-as 10000
ip bgp neighbor 2001:0:102:0:0:0:0:2 next-hop-self
ip bgp neighbor 2001:0:102:0:0:0:0:2 ebgp-multihop
ip bgp neighbor 2001:0:101:0:0:0:0:2 address-family ipv6
ip bgp neighbor 2001:0:102:0:0:0:0:2 update-source 2001:0:102:0:0:0:0:1
ip bgp neighbor 2001:0:102:0:0:0:0:2 enable
exit
R2 configuration
#
# VRF CONFIGURATION
#
#
# PORT CONFIGURATION - PHASE I
#
exit
#
# VLAN CONFIGURATION
#
exit
vlan create 101 type port-mstprstp 0
vlan members 101 1/1 portmember
interface Vlan 101
vrf vrf1
ip address 101.1.1.2 255.255.255.0 2
ipv6 interface mac-offset 2
ipv6 interface enable
ipv6 interface address 2001:0:101:0:0:0:0:2/64
ipv6 forwarding
exit
vlan create 102 type port-mstprstp 0
vlan members 102 1/1 portmember
exit
#
# PORT CONFIGURATION - PHASE II
#
#
# CIRCUITLESS IPV6 INTERFACE CONFIGURATION - GlobalRouter
#
interface loopback 1
ipv6 interface address 2:2:2:2:0:0:0:2/128
exit
#
# CIRCUITLESS IPV6 INTERFACE CONFIGURATION - VRF
#
interface loopback 2
ipv6 interface address 21:2:2:2:0:0:0:2/128 vrf vrf1
exit
interface loopback 3
ipv6 interface address 22:2:2:2:0:0:0:2/128 vrf vrf2
exit
#
# BGP CONFIGURATION - GlobalRouter
#
router bgp
no synchronization
exit
router bgp 10000 enable
router bgp
neighbor "2001:0:100:0:0:0:0:1"
neighbor 2001:0:100:0:0:0:0:1 remote-as 1000
neighbor 2001:0:100:0:0:0:0:1 next-hop-self
neighbor 2001:0:100:0:0:0:0:1 ebgp-multihop
neighbor 2001:0:100:0:0:0:0:1 address-family ipv6
neighbor 2001:0:100:0:0:0:0:1 update-source 2001:0:100:0:0:0:0:2
neighbor 2001:0:100:0:0:0:0:1 enableexit
#
# BGP CONFIGURATION - VRF
#
ip bgp enable
ip bgp neighbor "2001:0:101:0:0:0:0:1"
ip bgp neighbor 2001:0:101:0:0:0:0:1 remote-as 1000
ip bgp neighbor 2001:0:101:0:0:0:0:1 next-hop-self
ip bgp neighbor 2001:0:101:0:0:0:0:1 ebgp-multihop
ip bgp neighbor 2001:0:101:0:0:0:0:1 address-family ipv6
ip bgp neighbor 2001:0:101:0:0:0:0:1 update-source 2001:0:101:0:0:0:0:2
ip bgp neighbor 2001:0:101:0:0:0:0:1 enable
exit
router vrf vrf2
ip bgp
no ip bgp synchronization
ip bgp enable
ip bgp neighbor "2001:0:102:0:0:0:0:1"
ip bgp neighbor 2001:0:102:0:0:0:0:1 remote-as 1000
ip bgp neighbor 2001:0:102:0:0:0:0:1 next-hop-self
ip bgp neighbor 2001:0:102:0:0:0:0:1 ebgp-multihop
ip bgp neighbor 2001:0:102:0:0:0:0:1 address-family ipv6
ip bgp neighbor 2001:0:102:0:0:0:0:1 update-source 2001:0:102:0:0:0:0:2
ip bgp neighbor 2001:0:102:0:0:0:0:1 enable
exit
Note
The Autonomous System (AS) number configured on the global VRF is inherited by all
user-created VRFs, however, you can override the AS number for a specific user-created VRF.
For more information, see Configure an AS Number for a Non-default VRF on page 456.
ip bgp
no ip bgp synchronization
ip bgp enable
ip bgp network 12.1.1.12/32 metric 100000
ip bgp neighbor "12.10.10.2"
ip bgp neighbor 12.10.10.2 remote-as 1000
ip bgp neighbor 12.10.10.2 next-hop-self
ip bgp neighbor 12.10.10.2 update-source 12.10.10.1
ip bgp neighbor 12.10.10.2 enable
exit
Configuration on switch 2:
#
# VRF CONFIGURATION
#
ip vrf vrf1 vrfid 1
router vrf vrf1
exit
ip vrf vrf2 vrfid 2
router vrf vrf2
exit
#
# PORT CONFIGURATION - PHASE I
#
interface GigabitEthernet 1/1
encapsulation dot1q
exit
#
# VLAN CONFIGURATION
#
vlan members remove 1 1/1,1/46
vlan create 100 type port-mstprstp 0
vlan members 100 1/1 portmember
interface Vlan 100
ip address 10.10.10.2 255.255.255.0 1
exit
vlan create 101 type port-mstprstp 0
vlan members 101 1/1 portmember
interface Vlan 101
vrf vrf1
ip address 11.10.10.2 255.255.255.0 2
exit
vlan create 102 type port-mstprstp 0
vlan members 102 1/1 portmember
interface Vlan 102
vrf vrf2
ip address 12.10.10.2 255.255.255.0 3
exit
#
# PORT CONFIGURATION - PHASE II
#
interface GigabitEthernet 1/1
default-vlan-id 100
no shutdown
exit
#
# BGP CONFIGURATION - GlobalRouter
#
router bgp
no synchronization
exit
router bgp 1000 enable
router bgp
neighbor "10.10.10.1"
neighbor 10.10.10.1 remote-as 1000
neighbor 10.10.10.1 next-hop-self
neighbor 10.10.10.1 update-source 10.10.10.2
neighbor 10.10.10.1 enable
exit
#
# BGP CONFIGURATION - VRF
#
router vrf vrf1
ip bgp
no ip bgp synchronization
ip bgp enable
ip bgp neighbor "11.10.10.1"
ip bgp neighbor 11.10.10.1 remote-as 1000
ip bgp neighbor 11.10.10.1 next-hop-self
ip bgp neighbor 11.10.10.1 update-source 11.10.10.2
ip bgp neighbor 11.10.10.1 enable
exit
router vrf vrf2
ip bgp
no ip bgp synchronization
ip bgp enable
ip bgp neighbor "12.10.10.1"
ip bgp neighbor 12.10.10.1 remote-as 1000
ip bgp neighbor 12.10.10.1 next-hop-self
ip bgp neighbor 12.10.10.1 update-source 12.10.10.2
ip bgp neighbor 12.10.10.1 enable
exit
exit
router vrf vrf2
ip bgp
no ip bgp synchronization
ip bgp enable
ip bgp network 2001:DB8:2002::1/128 metric 100000
ip bgp neighbor "2001:DB8:2::2"
ip bgp neighbor 2001:DB8:2::2 remote-as 1000
ip bgp neighbor 2001:DB8:2::2 next-hop-self
ip bgp neighbor 2001:DB8:2::2 update-source 2001:DB8:2::1
ip bgp neighbor 2001:DB8:2::2 address-family ipv6
ip bgp neighbor 2001:DB8:2::2 enable
exit
Configuration on switch 2:
#
# VRF CONFIGURATION
#
ip vrf vrf1 vrfid 1
router vrf vrf1
exit
ip vrf vrf2 vrfid 2
router vrf vrf2
exit
#
# PORT CONFIGURATION - PHASE I
#
interface GigabitEthernet 1/1
encapsulation dot1q
exit
#
# VLAN CONFIGURATION
#
vlan members remove 1 1/1,1/46
vlan create 100 type port-mstprstp 0
vlan members 100 1/1 portmember
interface Vlan 100
ipv6 interface mac-offset 1
ipv6 interface enable
ipv6 interface address 2001:DB8:0::2/64
exit
vlan create 101 type port-mstprstp 0
vlan members 101 1/1 portmember
interface Vlan 101
vrf vrf1
ipv6 interface mac-offset 2
ipv6 interface enable
ipv6 interface address 2001:DB8:1::2/64
exit
vlan create 102 type port-mstprstp 0
vlan members 102 1/1 portmember
interface Vlan 102
vrf vrf2
ipv6 interface mac-offset 3
ipv6 interface enable
ipv6 interface address 2001:DB8:2::2/64
exit
#
# PORT CONFIGURATION - PHASE II
#
interface GigabitEthernet 1/1
default-vlan-id 100
no shutdown
exit
#
# BGP CONFIGURATION - GlobalRouter
#
router bgp
no synchronization
exit
router bgp 1000 enable
router bgp
neighbor "2001:DB8:0::1"
neighbor 2001:DB8:0::1 remote-as 1000
neighbor 2001:DB8:0::1 next-hop-self
neighbor 2001:DB8:0::1 address-family ipv6
neighbor 2001:DB8:0::1 update-source 2001:DB8:0::2
neighbor 2001:DB8:0::1 enable
exit
#
# BGP CONFIGURATION - VRF
#
router vrf vrf1
ip bgp
no ip bgp synchronization
ip bgp enable
ip bgp neighbor "2001:DB8:1::1"
ip bgp neighbor 2001:DB8:1::1 remote-as 1000
ip bgp neighbor 2001:DB8:1::1 next-hop-self
ip bgp neighbor 2001:DB8:1::1 update-source 2001:DB8:1::2
ip bgp neighbor 2001:DB8:1::1 address-family ipv6
ip bgp neighbor 2001:DB8:1::1 enable
exit
router vrf vrf2
ip bgp
no ip bgp synchronization
ip bgp enable
ip bgp neighbor "2001:DB8:2::1"
ip bgp neighbor 2001:DB8:2::1 remote-as 1000
ip bgp neighbor 2001:DB8:2::1 next-hop-self
ip bgp neighbor 2001:DB8:2::1 update-source 2001:DB8:2::2
ip bgp neighbor 2001:DB8:2::1 address-family ipv6
ip bgp neighbor 2001:DB8:2::1 enable
exit
The following sections provide information for chassis operations such as hardware and software
compatibility.
Management Port
Note
The Management Router for management port configuration is only supported on VSP 8600
Series. For all other platforms, see Segmented Management on page 69.
The management port is a 10/100/1000 Mbps Ethernet port that you can use for an Out-of-Band (OOB)
management connection to the switch. To remotely access the switch using the management port, you
must configure an IP address for the OOB management port.
The switch never switches or routes transit packets between the Management Router VRF port and the
Global Router VRF, or between the Management Router VRF and other VRF ports.
The switch honors the VRF of the ingress packet; however, in no circumstance does the switch enable
routing between the Management VRF and Global Router VRF. The switch does not support the
configuration if you have an out-of-band management network with access to the same networks
present in the GRT routing table.
Note
IPv6 is not supported on MgmtRouter.
If you want out-of-band management, define a specific static route in the Management Router VRF
to the IP subnet where your management application resides. When you specify a static route in the
Management Router VRF, it enables the client management applications originating from the switch
to perform out-of-band management without affecting in-band management. This enables in-band
management applications to operate in the Global Router VRF.
Non-virtualized client management applications originating from the switch, such as Telnet, SSH, and
FTP, follow the behavior listed below:
For management applications that originate outside the switch, the initial incoming packets establish a
VRF context that limits the return path to the same VRF context.
defaults to the Global Router VRF. For example, if you want to ping a device through the out-of-band
management port you must select the Management Router VRF.
Note
IPv6 is not supported on MgmtRouter.
The Entity MIB – Physical Table assists in the discovery of functional components on the switch. The
Entity MIB – Physical Table supports a physical interface table that includes information about the
chassis, power supply, fan, I/O cards, console, and management port.
Some hardware platforms support removable interface modules while others offer a fixed configuration.
The names used for these modules can vary depending on the hardware platform.
The following table identifies the entity index range for the switch components.
For more information about Entity MIB – Physical Table, see View Physical Entities on page 578.
The High Availability-CPU (HA-CPU) framework supports redundancy at the hardware and application
levels. The CP software runs on an Input/Output control (IOC) module in both slots 1 and 2, and the
HA-CPU feature activates two CPUs simultaneously in primary or standby role. These CPUs exchange
topology data so that, if a failure occurs, one of the CPUs can take over the operations of the other.
You can configure the CPUs to operate in either HA mode or non-HA mode. In HA mode, the two
CPUs synchronize configuration, protocol states, and tables. In non-HA mode, the two CPUs do not
synchronize.
The default mode is HA disabled. To activate HA-CPU mode, use the boot config flags ha-cpu
command. To deactivate HA-CPU mode, use the no boot config flags ha-cpu command.
If you switch from one mode to the other, the standby CP restarts in the specified HA mode (hot
standby) or non-HA mode (warm standby). This does not impact the Input/Output process and there is
no traffic loss on the physical slot of the card.
If a failure occurs and the chassis is configured for either HA mode (hot standby) or non-HA mode
(warm standby), the CP software restarts and runs as standby. The system generates a trap to indicate
the change from hot-standby mode to warm-standby mode.
Note
• The HA-CPU feature provides node-level redundancy. Hot standby mode is not supported
with fabric functionality, which provides network-level redundancy.
• If your switch is in hot standby mode (ha-cpu boot flag is set to true), you must disable
boot config flag to configure SPBM or vIST on the switch. When the switch is in warm
standby mode (ha-cpu boot flag is set to false), you must disable SPBM and vIST to move
to hot standby mode.
• When you try to switch-over from warm standby mode to hot standby mode using EDM,
the system displays the following error message when you enable the boot config flag for
ha-cpu:
Hot-standby mode cannot be enabled while SPB/VIST features are still
configured.
HA mode
In HA mode, also called hot standby, the platform synchronizes the primary CPU information to the
standby secondary CPU. The platform adds any configuration changes or application table changes to
the primary CPU by using bulk synchronization or incremental synchronization. After synchronization
is complete, both the CPUs contain the same configuration and application tables information.
Application in HA mode support either full HA implementation or partial HA implementation. In full
HA implementation, both the configuration and runtime application data tables exist on the primary
CPU and the standby CPU.
If the primary CPU fails, the standby CPU takes over the primary responsibility quickly and you do
not see an impact on your network. Also, the IOC and SF modules as well as the full HA applications
continue to operate and the full HA applications run consistency checks to verify the tables.
Feature Supported
Layer 1
Port configuration parameters Yes
Layer 2
Media Access Control security (MACsec) Yes
Multiple Spanning Tree Protocol parameters Yes
Quality of Service (QoS) parameters Yes
Rapid Spanning Tree Protocol parameters Yes
VLAN parameters Yes
Feature Supported
Layer 3
ARP entries Yes
Border Gateway Protocol (BGP) Partial (configuration only)
Dynamic Host Configuration Protocol (DHCP) Relay Partial (configuration only)
Internet Group Management Protocol (IGMP) Yes
IPv6 Partial (configuration only)
Access Control Lists Yes
Open Shortest Path First (OSPF) Yes
Protocol Independent Multicast (PIM) Partial (configuration only)
Prefix lists and route policies Yes
Routing Information Protocol Yes
Router Discovery Yes
Static and default routes Yes
Virtual IP (VLANs) Yes
Virtual Router Redundancy Protocol Yes
Transport Layer
Network Load Balancing (NLB) Yes
Remote Access Dial-In User Services (RADIUS) Yes
Terminal Access Controller Access-Control System plus (TACACS+) Partial (configuration only)
UDP forwarding Yes
Partial HA
A few applications in HA mode have partial HA implementation, where the system synchronizes user
configuration data (including interfaces, IPv6 addresses and static routes) from the primary CPU to the
standby CPU. However, for partial HA implementation, the platform does not synchronize dynamic data
learned by protocols. After failure, those applications restart and rebuild their tables, which causes an
interruption to traffic that is dependent on a protocol or application with partial HA support.
• Transport Layer
◦ Terminal Access Controller Access Control System plus (TACACS+)
Non-HA mode
In non-HA mode, also called warm standby, the platform does not synchronize the configuration
between the primary CPU and the standby CPU. When failover happens, the standby CPU switches to
primary role, and all the IOCs (except the new primary CPU) are restarted. The new primary CPU loads
the configuration when all the cards are ready. These operations cause an interruption to traffic on all
ports on the chassis.
Note
• When there is a switch-over to warm standby mode, only the RWA access level user can
log in to the new primary CPU console screen.
The remaining users can log in to the CPU console screen only after the primary CP
module reloads the configuration and displays the new login prompt.
• When the platform switches from standby CPU to primary CPU in warm standby mode,
the platform always uses the previously-saved primary configuration file to boot the
chassis on the switch.
• The runtime config file must be present on the flash drive during the boot-up of both the
primary CPU and the standby CPU. If the config file that is used by the primary CPU for
booting is not available on the standby CPU, the standby CPU loads the default config
file. You can run the save config command to synchronize the configuration settings
or copy the boot config file from the primary CPU to the standby CPU. The standby CPU
must be rebooted to load the desired config file.
When the primary CPU is physically removed in warm-standby mode, all cards are
rebooted and the standby CPU switches to the primary role and loads the saved
configuration. If the old primary CPU is physically not plugged in during this time, the
respective slot configuration is not loaded to memory even though the configuration exists
in the config file. When the old primary CPU is re-inserted later, the system considers this
as a first time insertion and loads the default configuration on the inserted CP card. This
is expected behavior in warm-standby mode. To load the configuration for the re-inserted
standby CPU, ensure that the savetostandby boot-flag is set to true after re-inserting
the removed CPU, and run the CLI command source <config-file> on the active
CPU.
Power Manager
Power Manager identifies the available power in the chassis (called the power budget), and determines
if enough power is available to operate the installed components. Power Manager also gives you control
over which module slots to supply power to and enables you to prioritize the slots that should shut
down first if there isn’t enough power available.
If the power usage exceeds the power budget, the system powers off the module with the lowest
priority. After a power over-usage occurs, the system uses a Simple Network Management Protocol
(SNMP) trap to send a message to the network administrator configured to receive the trap.
The system compares the total chassis power consumed against the total chassis power available,
and verifies that if one power supply fails, enough power still remains to operate the chassis and
components. If enough power is available to keep all modules powered on in the case of a single failed
power supply, then the system is considered to have redundant power.
Note
In a redundant power supply configuration, that is, a +1 configuration where the system
has one or more power supplies above the actual requirement, the power management
logic automatically employs load-sharing across all active power supplies. This load-sharing
ensures that the switch draws power equally from all available power supplies to support the
system requirements in a fully active model.
If the system does not have redundant power, then the system sends an SNMP trap to the receiver and a
message to CLI to inform you that the device no longer operates in redundant power mode.
The software lock-up detect feature monitors processes to ensure that the software functions within
expected time limit.
The CPU logs detail about suspended tasks in the log file.
Jumbo frames
Jumbo packets and large packets are particularly useful in server and storage over Ethernet
applications. If the payload to header relation increases in a packet, the bandwidth can be used more
efficiently. For this reason, increasing Ethernet frame size is a logical option. The switch supports
Ethernet frames as large as 9600 bytes, compared to the standard 1518 bytes, to transmit large amounts
of data efficiently and minimize the task load on a server CPU.
Multi-speed Ports
If a port supports multiple speeds, the software configures the speed automatically based on the optic
type it detects in the port; you do not need to configure the port speed. For multi-speed copper ports,
Auto-Negotiation detects the speed.
Note
Some VIMs must operate with all ports at the same speed, while others can operate with
ports at different speeds. For more information, see VOSS Release Notes. The sys vim-
speed command is supported only on VIMs that must operate with all ports at the same
speed. An error message displays if you run the command on an unsupported VIM.
In addition to the documented maximum port speed, and in cases where the hardware supports it:
• SFP ports are for 1 Gbps but can also support 100 Mbps.
• SFP+ ports are for 10 Gbps but can also support 1 Gbps or 100 Mbps.
• SFP28 ports are for 25 Gbps but can also support 10 Gbps or 1 Gbps.
• QSFP+ ports are for 40 Gbps but can also support 4x10 Gbps if channelization is supported and
enabled.
• QSFP28 ports are for 100 Gbps but also can support 40 Gbps, or 4x25 Gbps or 4x10 Gbps if
channelization is supported and enabled.
Note
A 100 Gbps DAC in a 100 Gbps port can negotiate down to 40 Gbps depending on the
hardware and peer connection.
SFP28, SFP+ and SFP ports have the same physical size.
To know if a port supports multiple speeds or channelization, see the applicable hardware
documentation.
Auto-Negotiation
The Auto-Negotiation feature enables the device to switch between the various operational modes in
an ordered fashion and lets you select a specific operational mode. The Auto-Negotiation feature also
provides a parallel detection (called autosensing) function to recognize compatible devices, even if they
do not support Auto-Negotiation and helps the device sense the link speed only; not the duplex mode.
You can use the show interfaces gigabitEthernet l1-config command to see the Auto-
Negotiation operational state on a port. The operational state uses the configuration and transceiver
type present in the port. If you enable Auto-Negotiation for the port but the transceiver type does not
support Auto-Negotiation, the operational state is disabled (false).
Important
The software requires the same Auto-Negotiation configuration on link partners to avoid
incorrect declaration of link status. Mismatched configuration can cause the links to stay down
as well as unpredictable behavior. Ensure the Auto-Negotiation configuration between local
ports and their remote link partners match before upgrading software releases.
Important
Product-specific considerations for Auto-Negotiation include:
• If Auto-Negotiation is disabled, the following hardware does not support half-duplex:
◦ 8424GT ESM
◦ 8424XT ESM
◦ VSP 7254XTQ
Configure Auto-Negotiation as shown in the following table, where A and B are two Ethernet devices.
Auto-Negotiation cannot detect the identities of neighbors and cannot shut down misconnected ports.
Upper-layer protocols perform these functions.
Note
10 GigabitEthernet (GbE) fiber-based I/O module ports can operate at either 1 Gigabit per
second (Gbps) or 10 Gbps, depending upon the capabilities of the optical transceiver that you
install.
This situation presents an ambiguity with respect to the Auto-Negotiation configuration of
the port, while 1 GbE ports require Auto-Negotiation; Auto-Negotiation is not defined and is
non-existent for 10 GbE ports.
For a 10-GbE fiber-based I/O module, you can swap between 1 GbE and 10 GbE operation
by simply swapping transceivers. To help with the swap, you can configure Auto-Negotiation
when you install a 10 GbE transceiver, even though Auto-Negotiation is not defined for 10
GbE.
You can do this in anticipation of a port changeover from 10 GbE to 1 GbE. In this manner, you
can pre-configure a port in 1 GbE mode while the 10 GbE transceiver is still installed. The port
is ready to go upon the changeover to the 1 GbE transceiver.
You can use a saved configuration file with Auto-Negotiation enabled, to boot a system with
either 10 GbE or 1 GbE transceivers installed. If you install a 1 GbE transceiver, the system
applies Auto-Negotiation. If you install a 10 GbE transceiver, the system does not remove
the Auto-Negotiation settings from the configuration, but the system simply ignores the
configuration because Auto-Negotiation settings are irrelevant to a 10 GbE transceiver. The
system preserves the saved configuration for Auto-Negotiation when re-saved no matter
which speed of transceiver you install.
The following table provides a summary of Auto-Negotiation support for 25 Gbps ports.
Note:
Exception: VIM5-2Y and VIM5-4Y do not support
Auto-Negotiation at 25 Gbps.
Forward Error Correction (FEC) is a negotiated port attribute for 25 GbE connections that support
Auto-Negotiation. For more information, see Forward Error Correction on page 538.
Although Auto-Negotiation is mandatory as per the 100GbCR4 standard, and this is the default
software configuration, you can disable Auto-Negotiation to connect with older systems that do not
support it. The system does not support FEC on 100GbCR4 links with Auto-Negotiation disabled.
For more information about FEC, see Forward Error Correction on page 538.
Auto-Negotiation Advertisements
Auto-Negotiation advertisements use Custom Auto-Negotiation Advertisement (CANA) to control the
speed and duplex settings that the interface modules advertise during Auto-Negotiation sessions
between Ethernet devices. Modules can only establish links using these advertised settings, rather than
at the highest common supported operating mode and data rate.
Use CANA to provide smooth migration from 10 Mbps to 10000 Mbps on host and server connections.
Using Auto-Negotiation only, the switch always uses the fastest possible data rates. In limited-uplink-
bandwidth scenarios, CANA provides control over negotiated access speeds, and improves control over
traffic load patterns.
Important
If a port belongs to a MultiLink Trunking (MLT) group and you configure CANA on the port
(that is, you configure an advertisement other than the default), you must apply the same
configuration to all other ports of the MLT group if they support CANA.
The following platforms support full duplex and half duplex modes for CANA:
The switch supports an auto-discovery protocol known as the SynOptics Network Management
Protocol (SONMP). SONMP allows a network management station (NMS) to formulate a map that
shows the interconnections between Layer 2 devices in a network. SONMP is also called Topology
Discovery Protocol (TDP).
All devices in a network that are SONMP-enabled send hello packets to their immediate neighbors, that
is, to interconnecting Layer 2 devices. A hello packet advertises the existence of the sending device and
provides basic information about the device, such as the IP address and MAC address. The hello packets
allow each device to construct a topology table of its immediate neighbors. A network management
station periodically polls devices in its network for these topology tables, and then uses the data to
formulate a topology map.
If you disable SONMP, the system stops transmitting and acknowledging SONMP hello packets. In
addition, the system removes all entries in the topology table except its own entry. If you enable
SONMP, the system transmits a hello packet every 12 seconds. The default status is enabled.
Channelization
Use the channelization feature to configure a single port to operate as four individual ports.
Channelization can apply to the following port speeds:
• 40 Gbps (Quad Small Form-factor Pluggable) (QSFP+) — when channelized, operates as four 10
Gbps ports
• 100 Gbps (QSFP28) — when channelized, operates as four 25 Gbps ports
Note
In cases where the hardware supports it, you can insert a 40 Gbps QSFP+ transceiver in a
100 Gbps port, and use the 100 Gbps port as a 40 Gbps port. If you enable channelization
on a 100 Gbps port and the switch detects a 40 Gbps QSFP+ transceiver in the port, the
port operates as four individual 10 Gbps ports.
If the switch detects a 100 Gbps QSFP28 transceiver and you enable channelization, the
port operates as four 25 Gbps ports.
To know if you can use a 100 Gbps port as a 40 Gbps port and support the channelization
of that port, see the applicable hardware documentation.
You can use breakout direct attach cables (DAC) or transceivers with fiber breakout cables to connect
the channelized ports to other servers, storage, and switches.
By default, the ports are not channelized, which means that the ports operate as one single port at the
fully supported speed. You can enable or disable channelization on a port.
For the number of ports on the switch that support channelization, see the applicable hardware
documentation.
If the product supports channelization and you enable or disable channelization on a port, the port
QoS configuration resets to default values. For information about configuring QoS values, see Quality of
Service on page 2649.
Note
When you use channelized ports in an Split Multi-Link Trunking (SMLT) configuration, the
system does not display the channelized ports properly when you show MLT information
for the remote port member if the remote switch runs a release that does not support
channelization.
When a port is channelized, use only break out cables (copper or active optical DAC) in it. Using other
cables in either a channelized port or a non-channelized port results in mismatched link status between
link partners, which can lead to network issues.
If a feature operates on channel 1/1/1 and 1/1/2, and the circuit is dechannelized, the 1/1/1 configuration is
saved and the commands are configured on 1/1. The configuration on 1/1/2 is deleted.
Forward Error Correction (FEC) is a method of obtaining error control in data transmission over an
unreliable or noisy channel in which the source (transmitter) encodes the data in a redundant way
by using an error correcting code (ECC). This redundancy enables a destination (receiver) to detect a
limited number of errors and correct them without requiring a re-transmission.
FEC is useful where re-transmitting data is either expensive or impossible, for example, when
transmitting to multiple receivers in multicast. However, although FEC provides more error control,
it introduces a latency in data transmission.
Important
• On ports that support FEC configuration, ensure that you configure the same option at
both end-points. Otherwise, the link does not come up.
• You must enable FEC to achieve proper functionality when using interconnects such as the
25Gb SR, 25 Gb SR-lite, 25 Gb ESR optics or the 25 Gb AOC and 25 Gb DAC.
• FEC is not required on 100 Gb or 25 Gb long-range optics because these optics do error
checking internally.
Clause 91 RS-FEC
This option supports both the 25 Gbps and 100 Gbps speeds. You can configure this option on
ports with either the 100GbSR4 or 100GbCR4 modules plugged in, or on 100 GbE channelized ports
operating at 25Gbps speed.
Note
Ensure that you enable Auto-Negotiation for ports with the 100GbCR4 modules plugged in; it
is mandatory.
Auto
This option automatically configures FEC based on port speed and pluggable module type.
• For 25 Gbps speeds, FEC CL108 is enabled for all transceiver types.
The following table lists the 25 Gb end-point advertisements and the resulting FEC operational state:
The following table lists the 100 Gb end-point advertisements and the resulting FEC operational state:
Note:
Even when both peers advertise
no FEC, negotiation results in
clause 91 FEC per IEEE standard
mandatory setting.
You can use the show interfaces gigabitEthernet config command to see the FEC
operational state for a port.
For additional details about support, see Default Auto-Negotiation Behavior on page 531.
The switch uses MAC pause frames to provide congestion relief on full-duplex interfaces.
Overview
When congestion occurs on a port, the system can send or receive pause frames, also known as flow
control, to temporarily pause the packet flow. The system uses flow control if the rate at which one
or more ports receives or sends packets is greater than the rate the switch can process or accept the
packets.
The switch can generate pause frames to tell the sending device to stop sending additional packets for
a specified time period. After the time period expires, the sending device can resume sending packets.
During the specified time period, if the switch determines the congestion is reduced, it can send pause
frames to the sending device to instruct it to begin sending packets immediately.
Configure an interface to send pause frames when congestion occurs to alleviate packet drops due to
flow control mode.
Auto-Negotiation
Interfaces that support auto-negotiation advertise and exchange their flow control capability to agree
on a pause frame configuration. IEEE 802.3 annex 28b defines the auto-negotiation ability fields and the
pause resolution. The switch advertises only two capabilities. The following table shows the software bit
settings based on the flow control configuration.
Note
Not all interfaces support Auto-Negotiation. For more information, see your hardware
documentation.
The following list identifies the type of interfaces that support auto-negotiated flow control:
• 10 Mbps/100 Mbps/1 Gbps copper
• 100 Mbps/1 Gbps/10 Gbps copper
• 1 Gbps fiber (in both SFP and SFP+ ports)
Auto MDIX
Automatic medium-dependent interface crossover (Auto-MDIX) automatically detects the need for
a straight-through or crossover cable connection and configures the connection appropriately. This
removes the need for crossover cables to interconnect switches and ensures either type of cable can
be used. The speed and duplex setting of an interface must be set to Auto for Auto-MDIX to operate
correctly.
Auto MDIX is supported on all platforms with fixed copper ports. All fixed copper ports are supported.
Using IOC Module Pre-Configuration, you can configure a slot for an IOC Module before you insert the
module in the chassis. By specifying the slot and module type, all configuration at the slot or port level
become available for that slot. You can issue configuration commands for a specific slot before you
insert an IOC Module in that slot.
When you insert the IOC Module that matches the pre-configured module type in the specified
slot, all configuration related to that slot is applied, and pre-configuration loads on the IOC Module
automatically. However, if the module type of the inserted IOC Module does not match the module type
of the IOC Module Pre-Configuration, then the IOC module functionality depends on the following card
lock configurations:
• If the card lock option is enabled, the inserted IOC Module is rejected and does not boot up. Only
modules that are of same type as the IOC Module Pre-Configuration type for the slot are able to
boot up on that slot. The output of the show-sys-info command displays the operational status
of the inserted module as down-Mismatch.
• If the card lock option is disabled, existing configuration is removed on that slot and a new IOC
Module is accepted and boots up with default configuration.
When you remove an IOC Module from the chassis, all configuration on that slot is still available
because the module was automatically pre-configured on that slot. You can view the configuration for
the module by using the show sys-info card command. You can also change the configuration
for an IOC Module that has been removed from the chassis. When you save the configuration, the
configuration for all slots is saved regardless of which modules are plugged into the chassis.
Important
Removing the preconfigured IOC Module type from the configuration also removes the
configuration for the slot.
When a new IOC Module is inserted in the slot, the module boots with default configuration. If a
module is inserted into a running system and the module type is not configured for the slot, the system
automatically creates a preconfiguration with the module type of the IOC Module that was inserted.
Then the module boots with default configuration.
Enable High Availability-CPU (HA-CPU) mode to enable devices with two CPUs to recover quickly from
a failure of the master CPU.
Procedure
configure terminal
2. Configure the following boot flag:
boot config flags ha-cpu
The configuration file is saved on both the CPUs. After you disable HA mode on the master CPU,
the secondary CPU software automatically resets and loads the settings from the previously-saved
configuration file.
3. Type y after displaying the following prompt:
Do you want to continue (y/n) ?
Responding to the user prompt with a y causes the secondary CPU to reset itself automatically, and
that secondary CPU restarts with HA mode enabled.
4. Save the configuration.
Example
Switch:1>enable
Switch:1#configure terminal
Enable HA mode:
Switch:1(config)#boot config flags ha-cpu
The config files on the Master and Slave will be overwritten with the current active
configuration.
-Layer 2/3 features will be enabled in L2/L3 redundancy mode.
Do you want to continue (y/n)?y
Boot configuration is being saved.
CP-1: Save config to file /intflash/config.cfg successful.
CP-2: Save /intflash/config.cfg to standby successful.
Runtime configuration is being saved.
Resetting Slave CPU from Master CPU.
CP1 [01/07/17 15:21:50.605:UTC] 0x000045e3 00000000 GlobalRouter SNMP INFO Save config
successful.
CP2 [01/07/17 15:22:16.890:UTC] 0x000105e3 00000000 GlobalRouter HW INFO HA-CPU: Table
Sync is complete (Standby CPU)
CP1 [01/07/17 15:22:17.407:UTC] 0x000105c8 00000000 GlobalRouter HW INFO HA-CPU: Table
Sync Completed on Secondary CPU
Card Info :
Slot# CardType Oper Admin Power
Status Status State
1 8624XS up-Master up on
2 8624XS up-Warmstandby up on
What to Do Next
Note
In HA-CPU mode, whenever there is a mismatch of boot config flags between the master CPU
and the standby CPU, the standby CPU follows the master CPU. The mismatch could be due
to different runtime config files or primary config files at standby CPU. Once the chassis boots
up successfully on the switch, ensure that both the CPUs run the same primary config file and
the running config file.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
The configuration file is saved on both the CPUs. After you enable HA mode on the master CPU, the
secondary CPU software automatically synchronizes the configuration from the master CPU.
Example
Switch:1>enable
Switch:1#configure terminal
Disable HA mode:
Switch:1(config)#no boot config flags ha-cpu
The config files on the Master and Slave will be overwritten with the current active
configuration.
-No longer Layer 2/3 features run in L2/L3 redundancy mode.
Do you want to continue (y/n) ? y
Boot configuration is being saved.
CP-1: Save config to file /intflash/config.cfg successful.
CP-2: Save /intflash/config.cfg to standby successful.
Resetting Slave CPU from Master CPU.
Card Info :
Slot# CardType Oper Admin Power
Status Status State
1 8624XS up-Master up on
2 8624XS up-Warmstandby up on
Perform this procedure to properly remove the IOC module that is in the master CP slot, when the
system operates in HA mode.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Use the sys action cpu-switch-over command to fail over to another CP.
3. Remove the IOC module.
Important
Do not reinsert an IOC module until at least 15 seconds has elapsed, which is long enough
for another CP slot to become master.
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#sys action cpu-switch-over
Enable jumbo frames to increase the size of Ethernet frames the chassis supports.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable jumbo frames:
sys mtu <1522-9600>
Example
Switch:1> enable
Variable Definitions
The following table defines parameters for the sys mtu command.
Variable Value
<1522-9600> Configures the frame size support for the data
path.
Possible sizes are 1522, 1950, or 9600 bytes.
The default is 1950 bytes.
Configure port lock to administratively lock a port or ports to prevent other users from changing port
parameters or modifying port action. You cannot modify a locked port until you unlock the port.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
Example
Switch:1> enable
Variable Definitions
The following table defines parameters for the interface gigabitethernet and lock port
commands.
Variable Value
{slot/port[/sub-port] [-slot/port[/ Identifies the slot and port in one of the following
sub-port]] [,...]} formats: a single slot and port (slot/port), a range
of slots and ports (slot/port-slot/port), or a series
of slots and ports (slot/port,slot/port,slot/port). If
the platform supports channelization and the port
is channelized, you must also specify the sub-port
in the format slot/port/sub-port.
For the lock port command, use the no
form of this command to unlock a port:
no lock port {slot/port[/sub-port]
[-slot/port[/sub-port]][,...]}
Configuring SONMP
About This Task
Configure the SynOptics Network Management Protocol (SONMP) to allow a network management
station (NMS) formulate a map that shows the interconnections between Layer 2 devices in a network.
The default status is enabled.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Disable SONMP:
no autotopology
3. Enable SONMP:
autotopology
Example
Switch:1> enable
Disable SONMP:
Switch:1(config)# no autotopology
View topology message status to view the interconnections between Layer 2 devices in a network.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Show the contents of the topology table:
show autotopology nmm-table
Unless the witch is physically connected to other devices in the network, this topology will be blank.
Example
Note
In the following example, the column “ChassisType” uses a generic name. When you use the
show autotopology nmm-table, your switch displays the actual chassis type.
Note
When a peer switch is running an older software version that does not include support for
SONMP hello messages with channelization information, it can only show the slot/port. It
cannot show the sub-port.
You can assign a VRF instance to a port after you configure the VRF. The system assigns ports to the
Global Router, VRF 0, by default.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Switch:1> enable
Configure an IP address for the management port so that you can remotely access the device using the
out-of-band (OOB) management port. The management port runs on a dedicated VRF.
The configured IP subnet has to be globally unique because the management protocols can go through
in-band (Global Router) or out-of-band ports (Management VRF).
Procedure
configure terminal
Example
Variable Definitions
The following table defines parameters for the ip address command.
Variable Value
{<A.B.C.D/X> | <A.B.C.D> <A.B.C.D>} Specifies the IP address followed by the subnet
mask.
The following table defines parameters for the ipv6 interface address command.
Variable Value
WORD<0-255> Specifies the IPv6 address and prefix length.
When you use 1 Gigabit Ethernet SFP transceivers, the software disables Auto-Negotiation on the port.
If you use 1 Gbps SFP transceivers, the remote end must also have Auto-Negotiation disabled.
All ports that belong to the same MLT or Link Aggregation Control Protocol (LACP) group must use the
same port speed. In the case of MLTs, the software does not enforce this.
The software requires the same Auto-Negotiation settings on link partners to avoid incorrect
declaration of link status. Mismatched settings can cause the links to stay down. Ensure the Auto-
Negotiation settings between local ports and their remote link partners match before you upgrade the
software.
Procedure
1. Enter GigabitEthernet Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
2. Enable Auto-Negotiation:
auto-negotiate [port {slot/port[/sub-port][-slot/port[/sub-port]]
[,...]}] enable
3. Verify the configuration:
show interfaces gigabitEthernet l1-config [{slot/port[/sub-port][-
slot/port[/sub-port]][,...]}]
Example
Switch:>enable
Switch:1#configure terminal
Switch:1(config)#interface gigabitethernet 1/8
Switch:1(config-if)#auto-negotiate enable
Switch:1(config-if)#show interfaces gigabitEthernet l1-config 1/8
====================================================================================================
Port Config L1
====================================================================================================
PORT AUTO OPERATE CUSTOM AUTO NEGOTIATION CANA ADMIN OPERATE ADMIN OPERATE
NUM NEG. AUTO-NEG ADVERTISEMENTS ORIGIN DPLX SPD DPLX SPD TX-FLW-CTRL TX-FLW-CTRL
----------------------------------------------------------------------------------------------------
1/8 true true Not Configured RADIUS full 10000 0 enable enable
Variable Definitions
The following table defines parameters for the auto-negotiate command.
Variable Value
{slot/port[/sub-port] [-slot/port[/ Specifies the port or ports that you want to
sub-port]] [,...]} configure.
enable Enables auto-negotiation for the port or other
ports of the module.
The default Auto-Negotation behavior depends
on the switch model and transceiver type.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Variable Definitions
The following table defines parameters for the auto-negotiation-advertisements command.
Variable Value
{slot/port[/sub-port] [-slot/port[/ Specifies the port or ports that you want to
sub-port]] [,...]} configure.
25000-full Advertises 25 Gbps full-duplex.
10000-full Advertises 10 Gbps full-duplex.
5000-full Advertises 5 Gbps full-duplex.
2500-full Advertises 2.5 Gbps full-duplex.
1000-full Advertises 1 Gbps full-duplex.
100-full Advertises 100 Mbps full-duplex.
100-half Advertises 100 Mbps half-duplex.
10-full Advertises 10 Mbps full-duplex.
10-half Advertises 10 Mbps half-duplex.
none Configures the Auto-Negotiate value to none.
By default, flow control mode is disabled. When disabled, the system does not generate nor configure
the transmission of flow control messages. The system always honors received flow control messages
regardless of the flow control mode status. You must enable this mode before you configure an
interface to send pause frames.
Note
If you enable MACsec on an interface and you send small packet size traffic near line
rate, the In FlowCtrl frame might increment in the output of the show interface
gigabitEthernet statistics command because of the processing overhead caused
by adding the MACsec header of 32 bytes. This is part of the expected over-subscription
footprint.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable flow control mode:
boot config flags flow-control-mode
3. Save the configuration.
4. Exit Privileged EXEC mode:
exit
5. Reboot the chassis.
boot
6. Enter GigabitEthernet Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Enable flow control on the system and configure slot 1, port 10 to send pause frames. Verify the
configuration.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#boot config flags flow-control-mode
Warning: Please save the configuration and reboot the switch
for this configuration to take effect.
Switch:1<config>#save config
CP-1: Save config to file /intflash/config.cfg successful.
CP-1: Save license to file /intflash/license.xml successful.
Switch:1<config>#exit
Switch:1#boot
Are you sure you want to re-boot the switch (y/n) ?y
Note
Flag support can vary across hardware models.
Variable Definitions
The following table defines parameters for the tx-flow-control command.
Variable Value
enable Configures the interface to send pause frames. By default, flow control is
disabled.
Note:
tx-flow-control is enabled by default on XA1400 Series.
port Identifies the slot and port in one of the following formats: a single slot and port
{slot/port[/ (slot/port), a range of slots and ports (slot/port-slot/port), or a series of slots
sub-port] and ports (slot/port,slot/port,slot/port). If the platform supports channelization
[-slot/port[/ and the port is channelized, you must also specify the sub-port in the format
sub-port]] slot/port/sub-port.
[,...]}
Use the data in the following table to use the show interfaces gigabitEthernet l1-config
and show interfaces gigabitEthernet statistics commands.
Variable Value
{slot/port[/ Identifies the slot and port in one of the following formats: a single slot
sub-port] [- and port (slot/port), a range of slots and ports (slot/port-slot/port), or a
slot/port[/sub- series of slots and ports (slot/port,slot/port,slot/port). If the platform supports
port]] [,...]} channelization and the port is channelized, you must also specify the sub-port
in the format slot/port/sub-port.
Enable Channelization
Enable channelization on a port to configure it to operate as four channels, or ports.
Important
Enabling or disabling channelization resets the port QoS configuration to default values.
Procedure
1. Enter GigabitEthernet Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Switch:1> enable
Switch:1# configure terminal
Switch:1(config)# interface gigabitethernet 2/1
Switch:1(config-if)# channelize enable
Enabling channelization on port 2/1. Subport 2/1/1 will inherit port 2/1 configuration.
Subports 2,3,4 will use default config. QSFP will be reset as removal and re-insert.
NOTE: Modify QOS configurations on all subports as required.
Do you wish to continue (y/n) ? y
================================================================================
Port Channelization
================================================================================
--------------------------------------------------------------------------------
PORT ADMIN MODE CHANNEL TYPE
--------------------------------------------------------------------------------
2/2 true 40G
2/3 false 40G
2/4 false 40G
Variable Definitions
The following table defines parameters for the channelization command.
Variable Value
{slot/port[/sub-port][-slot/port[/ Identifies the slot and port in one of the following
sub-port]][,...]} formats: a single slot and port (slot/port), a range
of slots and ports (slot/port-slot/port), or a series
of slots and ports (slot/port,slot/port,slot/port). If
the platform supports channelization and the port
is channelized, you must also specify the sub-port
in the format slot/port/sub-port.
Use this procedure to configure Forward Error Correction (FEC) on supported ports.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Examples
Configure Clause 108 FEC on a 25 Gbps port 1/1:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#interface gigabitethernet 1/1
Switch:1(config-if)#fec cl108
PORT ADMIN OPERATE AUTO ACCESS-SERV RMON FLEX-UNI ADMIN APPLICABLE OPERATE
NUM ROUTING ROUTING RECOVER EN FEC FEC FEC
------------------------------------------------------------------------------------------
1/1 Enable Disable Disable false Disable Disable Auto CL108 CL108
PORT ADMIN OPERATE AUTO ACCESS-SERV RMON FLEX-UNI ADMIN APPLICABLE OPERATE
NUM ROUTING ROUTING RECOVER EN FEC FEC FEC
------------------------------------------------------------------------------------------------
1/1 Enable Disable Disable false Disable Disable Auto Not Applicable Off
Variable Definitions
The following table defines parameters for the fec command.
Variable Value
port {slot/port[/sub-port] [-slot/ Identifies the slot and port in one of the following
port[/sub-port]] [,...]} formats: a single slot and port (slot/port), a range
of slots and ports (slot/port-slot/port), or a series
of slots and ports (slot/port,slot/port,slot/port). If
the platform supports channelization and the port
is channelized, you must also specify the sub-port in
the format slot/port/sub-port.
{auto | cl108 | cl74 | cl91} Configures one of the following options for FEC on
the port:
• auto
• Clause 91
• Clause 108
• Clause 74
Note:
On a 100 GbE port, only the Clause 91 and Clause 108
options are supported. On 100 GbE channelized ports
(operating at 25 Gbps speed), you can configure
Clause 108 for extra latency or Clause 74 for reduced
latency.
Configuration of FEC is not supported on a
management port or on 100 GbE ports operating at
40 Gbps speed.
Important:
On ports that support FEC, always configure the
same option on both end-points. Otherwise, the link
does not come up.
Serial ports interrupted due to link disconnection, power failure, or other reasons force out the user and
end the user session. Ending the user session ensures a maintenance port is not available with an active
session that can allow unauthorized use by someone other than the authenticated user, and prevents
the physical hijacking of an active session by unplugging the connected cable and plugging in another.
By default, the feature is disabled with enhanced secure mode disabled. If enhanced secure mode is
enabled, the default is enabled.
For more information on enhanced secure mode, see Enabling enhanced secure mode on page 3339.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Configure the serial port to drop if a connection is interrupted:
sys security-console
Example
Use this procedure to control whether or not to supply power to specific slots that contain either switch
fabric modules or input/output modules. By default, power is available to all slots.
After enabling power to specific input/output module slots, you can also configure the priority in which
they are powered on. For more information, see Configuring Slot Priority on page 563.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable power to one or more slots:
sys power slot <1–4 | 1–8 | SF1–SF3>
3. Disable power to one or more slots:
no sys power slot <1–4 | 1–8 | SF1–SF3>
Example
Switch:1>enable
Switch:1#configure terminal
Variable Definitions
The following table defines parameters for the sys power slot command.
Variable Value
<1–4 | 1–8 | Identifies the slot to provide power in one of the following formats: a single slot (1),
SF1–SF3> a range of slots (1–3), or a series of slots (1,2,4). The default is to provide power to
all slots.
Use the no operator to disable power to a slot.
Use the default operator to enable power to a slot.
Different hardware platforms support different slot ranges. Use the CLI Help to see
the available range.
Configure slot priority to specify which slots you want to shut down if there is insufficient power
available in the chassis. By default, power is available to all slots, and the slots have the following
priority:
• Slots 1, 2, SF1, SF2, and SF3 must always be Critical so you cannot configure them.
• Slots 3-8 are High by default, but you can configure any of them to Low.
Note
Power is always supplied to critical slots first which are the CP modules, SF modules, and fan
trays.
The slot with the lowest priority shuts down first. Slots with the same priority shut down in descending
order (highest slot number first) and interface slots shut down before CP, SF modules, and fan tray
slots.
For example, if slot 3 has a low priority and slots 4 and 5 have a high priority, the slot shutdown
priority is as follows: 4, 5, 3. Slot 3 has the lowest priority because it was configured as low so it would
be shut down first. Slots 4 and 5 have the same priority, but slot 5 shuts down before slot 4 because slot
4 has a higher slot number.
Procedure
configure terminal
2. Configure slot priority:
sys power slot-priority <3–8> {high|low}
Example
Switch:1>enable
Switch:1#configure terminal
Configure slot priority to determine that slot 3 has a low priority if insufficient power is available for all
modules:
Variable Definitions
The following table defines parameters for the sys power slot-priority command.
Variable Value
<3–8> Identifies the module slot.
high | low Specifies whether the module should have a high or low priority setting if there is
insufficient power available for all modules. The default is high.
Perform this procedure to turn the system Locator LED on to provide a visual identification of a specific
switch.
Procedure
configure terminal
2. Enable the system Locator LED:
sys locator-led
3. Display the system Locator LED status:
show sys locator-led
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Disable the USB port:
sys usb disable
3. Enable a previously disabled USB port:
no sys usb disable
Note
This procedure does not apply to XA1400 Series or VSP 8600 Series.
View fan information to monitor the alarm status of the cooling ports in the chassis.
Procedure
Example
Important
If Auto-Negotiation is disabled and you change the speed on a port that results in a
configuration mismatch in speed between two ports, VSP 4450 Series and VSP 4900 Series
switches may show an incorrect operational status of "up" for the mismatched ports.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
or
speed port {slot/port[/sub-port][-slot/port[/sub-port]][,...]}] {10|
100|1000|10000|2500|25000|5000}
Variable Definitions
The following table defines parameters for the speed command.
Variable Value
{slot/port[/sub-port] [-slot/port[/ Specifies the port or ports that you want to
sub-port]] [,...]} configure.
10 Configures the port speed to 10 Mbps.
100 Configures the port speed to 100 Mbps.
1000 Configures the port speed to 1 Gbps.
10000 Configures the port speed to 10 Gbps.
2500 Configures the port speed to 2.5 Gbps.
25000 Configures the port speed to 25 Gbps.
5000 Configures the port speed to 5 Gbps.
Configure all of the ports on an installed Versatile Interface Module (VIM) to operate at the same speed.
Note
Some VIMs must operate with all ports at the same speed, while others can operate with
ports at different speeds. For more information, see VOSS Release Notes. The sys vim-
speed command is supported only on VIMs that must operate with all ports at the same
speed. An error message displays if you run the command on an unsupported VIM.
Use this procedure to configure the speed of all ports in a multi-port VIM to operate at either 1 Gbps, 10
Gbps, or 25 Gbps.
Procedure
configure terminal
2. Configure the speed for all of the VIM ports:
sys vim-speed {1000 | 10000 | 25000}
3. Configure all VIM ports into two speed setting groups:
sys vim-speed group <1-2> {1000 | 10000 | 25000}
Variable Definitions
The following table defines parameters for the sys vim-speed command.
Variable Value
10000 | 25000 Configures all ports in a multi-port VIM to operate
at either 10 Gbps, or 25 Gbps.
The default is 25 Gbps.
Note
Some VIMs must operate with all ports at the same speed, while others can operate with
ports at different speeds. For more information, see VOSS Release Notes. The show sys
vim-speed command is supported only on VIMs that must operate with all ports at the
same speed. An error message displays if you run the command with an unsupported VIM
installed.
Use this procedure to display the configured speed of all ports in a multi-port VIM.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display the speed for all of the VIM ports:
show sys vim-speed
Use this procedure to designate a slot in the switch for IOC module preconfiguration. You can designate
a slot for only one module type at a time.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Enter Global Configuration mode:
enable
configure terminal
3. Designate a slot for IOC module preconfiguration:
preconfig slot <1-8> WORD<1-20> [lock]
4. Verify IOC module preconfiguration:
show sys-info card
Example
Prepare a slot for IOC module preconfiguration, with card lock enabled on the slot.
Switch:1>en
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Card Info :
Slot 5 :
CardType : 8624XT
CardDescription : 8624XT
CardSerial# : SDNI86XSD282
CardPart# : EC8604002-E6
CardAssemblyDate : 20161125
CardHWRevision : D2
CardHWConfig : 0
AdminStatus : up
OperStatus : up
PowerStatus : on
Preconfigured : yes
Preconfig CardType: 8624XT
Preconfig Lock : yes
If card lock is enabled on the slot, and the module type of the inserted IOC module does not match
the preconfigured IOC module type (for example, if the inserted module is type 8624XT but the
preconfigured module type is 8624XS), then the operational status of the inserted IOC module displays
as down-Mismatch.
Card Info :
Slot 5 :
CardType : 8624XS
CardDescription : 8624XS
CardSerial# : SDNI86XSD282
CardPart# : EC8604002-E6
CardAssemblyDate : 20161125
CardHWRevision : D2
CardHWConfig : 0
AdminStatus : down
OperStatus : down-Mismatch
PowerStatus : down
Preconfigured : yes
Preconfig CardType: 8624XT
Preconfig Lock : yes
Prepare another slot for IOC module preconfiguration, with no card lock enabled on the slot.
Switch:1>en
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Card Info :
Slot 6 :
CardType : 8624XS
CardDescription : 8624XS
CardSerial# : SDNI86XSD282
CardPart# : EC8604002-E6
CardAssemblyDate : 20161125
CardHWRevision : D2
CardHWConfig : 0
AdminStatus : up
OperStatus : up
PowerStatus : on
Preconfigured : yes
Preconfig CardType: 8624XS
Preconfig Lock : no
If card lock is disabled on the slot, and the IOC module type of the inserted card does not match
the preconfigured module type, the existing configuration is deleted and the slot is automatically
preconfigured with the module type of the inserted IOC module. The inserted module then boots up
with default configuration.
In the following example, when the 8624XT module is inserted in a slot preconfigured for the 8624XS,
the pre-configuration for the 8624XS is deleted because it is not locked. The slot is then automatically
preconfigured for 8624XT when the IOC module is physically inserted in that slot.
Card Info :
Slot 6 :
CardType : 8624XT
CardDescription : 8624XT
CardSerial# : SDNI86XSD282
CardPart# : EC8604002-E6
CardAssemblyDate : 20161125
CardHWRevision : D2
CardHWConfig : 0
AdminStatus : up
OperStatus : up
PowerStatus : on
Preconfigured : yes
Preconfig CardType: 8624XT
Preconfig Lock : no
Variable Definitions
The following table defines parameters for the preconfig slot command.
Variable Value
<1-8> Specifies the slot number designated for pre-configuration.
WORD <1-20> Specifies the card type that can be assigned to the pre-configured slot.
lock Specifies that the IO card will be locked to the pre-configured slot. Only
the IO card that matches the card type assigned to the pre-configured
slot will operate.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. View the management port statistics:
show interfaces mgmtethernet statistics
Example
Note
This command is not available on all hardware platforms.
Procedure
View port routing statistics:
show routing statistics interface [gigabitethernet] [{slot/port[-slot/
port][,...]}]
Example
Switch:1#show routing statistics interface gigabitethernet 1/7-1/9
================================================================================
Port Stats Routing
================================================================================
PORT IN_FRAME IN_FRAME IN OUT_FRAME OUT_FRAME
NUM UNICAST MULTICAST DISCARD UNICAST MULTICAST
--------------------------------------------------------------------------------
1/7 1386 0 0 1344 0
1/8 1302 0 0 1344 0
1/9 0 0 0 0 0
Variable Definitions
Use the data in the following table to use the show routing statistics interface command.
Variable Value
gigabitethernet Specifies the interface type.
{slot/port[/sub-port][-slot/port[/ Identifies the slot and port in one of the following
sub-port]][,...]} formats: a single slot and port (slot/port), a range
of slots and ports (slot/port-slot/port), or a series
of slots and ports (slot/port,slot/port,slot/port). If
the platform supports channelization and the port
is channelized, you must also specify the sub-port
in the format slot/port/sub-port.
Display individual bridging statistics for specific ports to manage network performance.
Note
This command is only available on XA1400 Series.
Procedure
1. Enter Privileged EXEC mode:
enable
2. View bridging statistics for a specific port:
show interfaces GigabitEthernet statistics bridging [{slot/port[-slot/
port][,...]}}
Example
1/16 0 0 0 0 0 0 0
--More-- (q = quit)
Variable Definitions
Use the data in the following table to use the show interfaces GigabitEthernet
statistics bridging command.
Variable Value
{slot/port[/sub-port][-slot/port[/ Identifies the slot and port in one of the following
sub-port]][,...]} formats: a single slot and port (slot/port), a range
of slots and ports (slot/port-slot/port), or a series
of slots and ports (slot/port,slot/port,slot/port). If
the platform supports channelization and the port
is channelized, you must also specify the sub-port
in the format slot/port/sub-port.
Note
Slot and port information can differ depending on hardware platform.
Procedure
1. Enter Privileged EXEC mode:
enable
2. View statistics for specific ports:
show interfaces GigabitEthernet statistics verbose {slot/port[/sub-
port][-slot/port[/sub-port]][,...]}
Example
===========================================================================================
2/1 0 0 0 0 0 0 0 0
2/2 0 0 0 0 0 0 0 0
2/3 0 0 0 0 0 0 0 0
2/4 0 0 0 0 0 0 0 0
2/5 0 0 0 0 0 0 0 0
2/6 0 0 0 0 0 0 0 0
3/1 0 0 0 0 0 0 0 0
3/2 0 0 0 0 0 0 0 0
3/3 0 0 8702 34805 0 0 0 0
3/4 0 0 0 0 0 0 0 0
3/5 0 0 0 0 0 0 0 0
3/6 0 0 0 0 0 0 0 0
3/7 0 0 0 0 0 0 0 0
3/8 0 0 0 0 0 0 0 0
3/9 0 0 0 0 0 0 0 0
--More-- (q = quit)
Variable Definitions
Use the data in the following table to use the show interfaces GigabitEthernet
statistics verbose command.
Variable Value
{slot/port[/sub-port][-slot/port[/ Identifies the slot and port in one of the following
sub-port]][,...]} formats: a single slot and port (slot/port), a range
of slots and ports (slot/port-slot/port), or a series
of slots and ports (slot/port,slot/port,slot/port). If
the platform supports channelization and the port
is channelized, you must also specify the sub-port
in the format slot/port/sub-port.
Edit system identification information, configuration file information, and perform system actions.
Procedure
Name Description
sysDescr Shows the system assigned name and the
software version.
sysUpTime Shows the elapsed time since the system last
started.
sysContact Configures the contact information.
sysName Configures the name of this device.
sysLocation Configures the physical location of this device.
VirtualIpAddr Configures the virtual IP address that the
primary CPU advertises and stores in the switch
configuration file.
VirtualNetMask Configures the net mask of the virtual
management IP address.
VirtualIpv6Addr Specifies the virtual IPv6 address.
VirtualIpv6PrefixLength Specifies the length of the virtual IPv6 address
prefix (in bits).
DnsDomainName Configures the default domain for querying the
DNS server.
LastChange Displays the time since the last configuration
change.
LastVlanChange Displays the time since the last VLAN change.
LastStatisticsReset Displays the time since the statistics counters
were last reset.
LastRunTimeConfigSave Displays the last run-time configuration saved.
DefaultRuntimeConfigFileName Displays the default Run-time configuration file
directory name.
ConfigFileName Specifies the name of a new configuration file.
ActionGroup1 Performs one of the following actions:
• resetCounters— Resets all statistic counters.
• saveRuntimeConfig— Saves the current run-
time configuration.
• loadLicense— Loads a software license file to
enable features.
Name Description
ActionGroup3 Can be the following action:
• flushIpRouteTbl—flushes IP routes from the
routing table
Procedure
Name Description
Type Specifies the chassis type.
ModelName Specifies the chassis model name.
This parameter does not apply on all
platforms.
BrandName Specifies the chassis brand name.
This parameter does not apply on all
platforms.
PartNumber Specifies the device part number.
SerialNumber Specifies a unique chassis serial number.
Name Description
HardwareRevision Specifies the current hardware revision of the device chassis.
NumSlots Specifies the number of slots available in the chassis.
NumPorts Specifies the number of ports currently installed in the
chassis.
BaseMacAddr Specifies the starting point of the block of MAC addresses
used by the switch for logical and physical interfaces.
MacAddrCapacity Specifies the number of routable MAC addresses based on
the BaseMacAddr.
Temperature Specifies the temperature of the device measured in degrees
This parameter does not apply for all Celsius.
platforms.
MacFlapLimitTime Configures the time limit for the loop-detect feature, in
This parameter does not apply for all milliseconds, for MAC flapping. The value ranges from 10–
platforms. 5000. The default value is 500.
AutoRecoverDelay Specifies the time interval, in seconds, after which auto-
recovery runs on ports to clear actions taken by CP Limit
or link flap. The default is 30.
MTUSize Configures the maximum transmission unit size.
The default is 1950 bytes.
MgidUsageVlanCurrent Number of MGIDs for VLANs currently in use.
MgidUsageVlanRemaining Number of remaining MGIDs for VLANs.
MgidUsageMulticastCurrent Number of MGIDs for multicast currently in use.
MgidUsageMulticastRemaining Number of remaining MGIDs for multicast.
DdmMonitor Enables or disables the monitoring of the DDM. When
enabled, the user gets the internal performance condition
(temperature, voltage, bias, Tx power and Rx power) of the
SFP/XFP. The default is disable.
DdmMonitorInterval Configures the DDM monitor interval in the range of 5 to
60 in seconds. If any alarm occurs, the user gets the log
message before the specific interval configured by the user.
The default value is 5 seconds.
DdmTrapSend Enables or disables the sending of trap messages. When
enabled, the trap message is sent to the Device manager,
any time the alarm occurs. The default is enable.
DdmAlarmPortdown Sets the port down when an alarm occurs. When enabled,
the port goes down when any alarm occurs. The default is
disable.
PowerUsage Specifies the amount of power the CPU uses.
This parameter does not apply on all
platforms.
PowerAvailable Specifies the amount of power available to the CPU.
This parameter does not apply on all
platforms.
Procedure
Name Description
Index Indicates the index of the entry.
Descr Indicates the name of the manufacturer for the
physical entity.
VendorType Indicates the vendor-specific hardware type for
the physical entity. Because there is no vendor-
specifier registration for this device, the value is 0.
ContainedIn Indicates the index value for the physical entity
which contains this physical entity. A value of zero
indicates that this physical entity is not contained
in any other physical entity.
Class Indicates the general hardware type of the
physical entity. The value is configured to the
standard enumeration value that indicates the
general class of the physical entity.
ParentRelPos Indicates the relative position of the child
component among the sibling components.
Name Indicates the name of the component, as assigned
by the local device, and that is suitable to use in
commands you enter on the console of the device.
Depending on the physical component naming
syntax of the device, the name can be a text name
such as console, or a component number such as
port or module number.
If there is no local name, there is no value.
HardwareRev Indicates the vendor-specific hardware revision
string for the physical entity.
If no specific hardware revision string is associated
with the physical component, or if this information
is unknown, then this object contains a zero-
length string, or there is no value.
If there is no information available, there is no
value.
Name Description
FirmwareRev Indicates the vendor-specific firmware revision
string for the physical entity.
If no specific firmware programs are associated
with the physical component, or if this information
is unknown, then this object contains a zero-
length string, or there is no value.
If there is no information available, there is no
value.
SoftwareRev Indicates the vendor-specific software revision
string for the physical entity.
If no specific software programs are associated
with the physical component, or if this information
is unknown, then this object contains a zero-
length string, or there is no value.
If there is no information available, there is no
value.
SerialNum Indicates the vendor-specific serial number string
for the physical entity. The value is the serial
number string printed on the component, if
present.
If there is no information available, there is no
value.
MfgName Indicates the name of the manufacturer of
the physical component. The value is the
manufacturer name string printed on the
component, if present.
If the manufacturer name string associated with
the physical component is unknown, then this
object contains a zero-length string.
If there is no information available, there is no
value.
ModelName Indicates the vendor-specific model name
identifier string associated with the physical
component. The value is the part number which
is printed on the component.
If the model name string associated with the
physical component is unknown, then this object
contains a zero-length string.
Alias Indicates an alias name for the physical entity that
is specified by a network manager, and provides a
nonvolatile handle for the physical entity.
The software supports read-only and provides
values for the port interface only.
AssetID Indicates a user-assigned asset tracking identifier
for the physical entity. This value is specified
by a network manager, and provides nonvolatile
storage of this information.
Because this object is not supported, there is no
value.
Name Description
IsFRU Indicates whether or not the physical entity is
considered a field replaceable unit.
• If the value is true(1), then the component is
a field replaceable unit.
• If the value is false(2), then the component
is permanently contained within a field
replaceable unit.
Procedure
Name Description
Index The index of the entry
LogicalIndexOrZero The index of the entry. The value of this object
identifies the logical entity that defines the
naming scope for the associated instance of the
Mapping Identifier object.
This is always 0.
MappingIdentifier The value of this object identifies a particular
conceptual row associated with the indicated
Physical Index and Logical Index pair.
Because only physical ports are modeled in this
table, only entries that represent interfaces or
ports are allowed. If an ifEntry exists on behalf of
a particular physical port, then this object should
identify the associated ifEntry.
This is the OID of ifIndex.Port.
Procedure
Name Description
Index Indicates the index of the entry.
ChildIndex The index of the entry. The value of Physical Index
for the contained physical entity.
Configure the system flags to enable or disable flags for specific configuration settings.
Procedure
Important
After you change certain configuration parameters, you must save the changes to the
configuration file.
Name Description
EnableAccessPolicy Activates access policies. The default is disabled.
ForceTrapSender Configures circuitless IP as a trap originator. The default is
disabled.
ForceIpHdrSender If you enable Force IP Header Sender, the system matches
the IP header source address with SNMP header sender
networks. The default is disabled.
Name Description
AuthSuccessTrapEnable Enables the system to send the authentication success trap,
rcnAuthenticationSuccess. The default is disabled.
MrouteStrLimit Enable or disable Mroute stream limit in system. The default
is disabled.
DataPathFaultShutdownEnable Enable or disable data path fault shutdown. The default is
enabled.
PingTracerouteContextType Configures the default context for executing ping commands
and traceroute commands. The default is grt.
Note:
Exception: not supported on VSP 8600
Series.
Name Description
HaCpuState Indicates the CPU High Availability state.
• initialization—Indicates the CPU is in this state.
• oneWayActive—Specifies modules that need to
synchronize register with the framework (either locally
or a message received from a remote CPU).
• twoWayActive—Specifies modules that need to
synchronize register with the framework (either locally
or a message received from a remote CPU).
• synchronized—Specifies table-based synchronization is
complete on the current CPU.
• remoteIncompatible—Specifies CPU framework version is
incompatible with the remote CPU.
• error—Specifies if an invalid event is generated in a
specific state the CPU enters Error state.
• disabled—Specifies High Availability is not activated.
• peerNotConnected—Specifies no established peer
connection.
• peerConnected—Specifies peer connection is established.
• lostPeerConnection—Specifies a lost connection to peer
or standby CPU.
• notSynchronized—Specifies table-based synchronization
is not complete.
Configure Channelization
Use this procedure to enable or disable channelization on a port. Channelization configures the port to
operate as four channels, or ports.
Important
Enabling or disabling channelization resets the port QoS configuration to default values.
Procedure
1. In the Device Physical View tab, select a port that supports channelization.
2. In the navigation pane, expand Configuration > Edit > Port.
3. Select General.
4. Select the Channelization tab.
Name Description
Channelization This field determines whether channelization is enabled or disabled on
the selected port. The two options are enable and disable. The default
is disable.
If you select more than one port, the format of the tab changes to a table-based tab.
When you use 1 Gigabit Ethernet SFP transceivers, the software disables Auto-Negotiation on the port.
If you use 1 Gbps SFP transceivers, the remote end must also have Auto-Negotiation disabled.
Procedure
Check the Extreme Networks website for the latest compatibility information.
6. Select Apply.
Name Description
Index Displays the index of the port, written in the slot/
port[/sub-port] format.
Name Configures the name of the port.
Descr Displays the description of the port. A textual
string containing information about the interface.
Type Displays the type of connector plugged in the
port.
Mtu Displays the Maximum Transmission Unit (MTU)
for the port. The size of the largest datagram
which can be sent or received on the interface,
specified in octets. For interfaces that are used for
transmitting network datagrams, this is the size of
the largest network datagram that can be sent on
the interface.
PhysAddress Displays the physical address of the port. The
address of the interface at the protocol layer
immediately `below' the network layer in the
protocol stack. For interfaces which do not have
such an address, for example, a serial line, this
object should contain an octet string of zero
length.
VendorDescr Displays the vendor of the connector plugged in
the port.
DisplayFormat Identifies the slot and port numbers (slot/port). If
the port is channelized, the format also includes
the sub-port in the format slot/port/sub-port
AdminStatus Configures the port as enabled (up) or disabled
(down) or testing. The testing state indicates that
no operational packets can be passed.
OperStatus Displays the current status of the port. The
status includes enabled (up) or disabled (down)
or testing. The testing state indicates that no
operational packets can be passed.
LicenseControlStatus Shows the port license status.
Note:
Exception: only supported on VSP 7200 Series.
Name Description
AutoNegAd Specifies the port speed and duplex abilities to
advertise during link negotiation.
Supported speeds and duplex modes vary,
depending on your hardware.
The abilities specified in this object are only
used when auto-negotiation is enabled on the
port. If all bits in this object are disabled, and
auto-negotiation is enabled on the port, then the
physical link process on the port will be disabled
(if hardware supports this ability).
Any change to this configuration restarts the auto-
negotiation process, which has the same effect as
physically unplugging and reattaching the cable
attached to the port.
If you select default, all capabilities supported by
the hardware are advertised.
AdminDuplex Configures the administrative duplex setting for
the port.
OperDuplex Indicates the operational duplex setting for the
port.
AdminSpeed Configures the administrative speed for the port.
Important:
If Auto-Negotiation is disabled and you change
the administrative speed on a port that results
in a configuration mismatch in speed between
two ports, VSP 4450 Series and VSP 4900 Series
switches can show an incorrect operational status
of "up" for the mismatched ports.
Name Description
UnknownMacDiscard Discards packets that have an unknown source
MAC address, and prevents other ports from
sending packets with that same MAC address
as the destination MAC address. The default is
disabled.
DirectBroadcastEnable Specifies if this interface forwards direct broadcast
traffic.
OperRouting Shows the routing status of the port.
HighSecureEnable Enables or disables the high secure feature for this
port.
RmonEnable Enables or disables Remote Monitoring (RMON)
on the interface. The default is disabled.
FlexUniEnable Enables Flex UNI on the port. The default is
disabled.
IngressRateLimit Limits the traffic rate that the specific ingress port
accepts.
Note:
Exception: not supported on VSP 4450 Series,
VSP 7400 Series, or VSP 8600 Series.
Name Description
BpduGuardTimeout Specifies the value to use for port-state recovery.
After a BPDU guard disables a port, the port
remains in the disabled state until this timer
expires.
You can configure a value of 0 or to 65535. The
default is 120 seconds. If you configure the value
to 0, the expiry is infinity.
BpduGuardAdminEnabled Enables BPDU Guard on the port. The default is
disabled.
ForwardErrorCorrection Configures one of the following options for
Forward Error Correction (FEC) on the port:
• CL 91
• CL 108
• CL 74
• disable
• auto
The disable option disables this configuration on
the port.
ForwardErrorCorrectionApplicability Displays whether FEC is applicable on the
interface.
OperAutoNegotiate Shows the operational state of Auto-Negotiation.
OperForwardErrorCorrection Shows the negotiated operational FEC clause.
If the value is off, the port supports FEC and is
up but not configured for FEC. If the value is
notApplicable, the port does not support FEC. If
the value is unknown, the port supports FEC but is
down.
IsPortShared Indicates whether the port is combo or not.
• portShared—Combo port.
• portNotShared—Not a combo port.
Name Description
AutoSense Enables or disables Auto-sense on the specific
port. The default value is disabled for existing
Note: configurations but enabled for new Zero Touch
Exception: not supported on VSP 8600 Series and Fabric Configuration deployments.
XA1400 Series.
Note:
Exception: not supported on VSP 8600 Series and
XA1400 Series.
Perform this procedure to configure basic parameters on Extreme Integrated Application Hosting (IAH)
ports, for example, auto negotiation, QoS level, and remote monitoring.
Procedure
1. In the navigation pane, expand Configuration > Edit > Insight Port.
2. Select the IAH port you want to configure.
3. Select the Interface tab.
4. In the Name field, type a name for the IAH port.
5. Configure the fields as required.
6. Select Apply.
Name Description
Index Specifies the index of the Extreme Integrated
Application Hosting (IAH) port, written in the slot/
port[/sub-port] format.
Name Specifies the name of the IAH port.
Descr Specifies the information about the interface.
Type Specifies the type of connector plugged in the IAH
port.
Mtu Specifies the Maximum Transmission Unit (MTU)
for the port. The size of the largest datagram
which can be sent or received on the interface,
specified in octets. For interfaces that are used for
transmitting network datagrams, this is the size of
the largest network datagram that can be sent on
the interface.
PhysAddress Specifies the physical address of the IAH port.
The address of the interface at the protocol
layer immediately below the network layer in the
protocol stack. For interfaces which do not have
such an address (like a serial line), this object
should contain an octet string of zero length.
VendorDescr Specifies the vendor of the connector plugged in
the IAH port.
DisplayFormat Specifies the slot and port numbers (slot/port).
AdminStatus Specifies the operational status of the IAH port.
The testing state indicates that no operational
packets can be passed.
OperStatus Specifies the current status of the IAH port. The
testing state indicates that no operational packets
can be passed.
LicenseControlStatus Specifies the IAH port license status.
Name Description
ShutdownReason Specifies the reason for the IAH port state change.
LastChange Specifies the timestamp of the last change.
LinkTrap Enables or disables link trapping. The default is
enabled.
AutoNegotiate Enables or disables auto-negotiation for the IAH
port. The default is true (enabled).
AutoNegAd Specifies the port speed and duplex abilities to be
advertised during link negotiation.
The abilities specified in this object are only used
when auto-negotiation is enabled on the IAH
port. If all bits in this object are disabled, and
auto-negotiation is enabled on the IAH port, then
the physical link process on the IAH port will be
disabled (if hardware supports this ability).
Any change in the value of this bit map will force
the switch to restart the auto-negotiation process.
The capabilities being advertised are either all
the capabilities supported by the hardware or the
user-configured capabilities, which is a subset of
all the capability supported by hardware.
By default, all capabilities supported by the
hardware are enabled.
AdminDuplex Specifies the administrative duplex setting for the
IAH port.
OperDuplex Specifies the operational duplex setting for the
IAH port.
AdminSpeed Specifies the administrative speed for the IAH
port.
OperSpeed Specifies the operational speed for the IAH port.
QoSLevel Specifies the Quality of Service (QoS) level for the
IAH port. The default is level1.
DiffServ Enables the Differentiated Service feature for the
IAH port. The default is enabled.
Layer3Trust Specifies if the system should trust Layer 3
packets coming from access links or core links
only. The default is core.
Layer2Override8021p Specifies whether Layer 2 802.1p override is
enabled or disabled. The default is disabled.
MltId Specifies the MLT ID associated with the IAH port.
The default is 0.
Locked Specifies if the IAH port is locked. The default is
false.
UnknownMacDiscard Enables the functionality to discard packets with
an unknown source MAC address, and prevents
the other IAH port from sending packets with
the same MAC address as the destination MAC
address. The default is disabled.
Name Description
DirectBroadcastEnable Specifies if the IAH port forwards direct broadcast
traffic.
OperRouting Specifies the routing status of the IAH port. The
default is disabled.
HighSecureEnable Enables or disables the high secure feature for the
IAH port. The default is disabled.
RmonEnable Enables or disables Remote Monitoring (RMON)
on the IAH port. The default is disabled.
FlexUniEnable Enables or disables Flex UNI on the IAH port. The
default is disabled.
EgressRateLimitState Enables or disables egress port-based shaping to
bind the maximum rate at which traffic leaves the
IAH port. The default is disabled.
EgressRateLimit Specifies the egress rate limit in Kbps. Different
hardware platforms provide different port speeds.
The default is 0.
TxFlowControl Specifies if the IAH port is sending pause frames.
The default is disabled.
Note:
You must enable the flow control feature globally.
Name Description
OperAutoNegotiate Shows the operational state of Auto-Negotiation.
OperForwardErrorCorrection Shows the negotiated operational FEC clause.
If the value is off, the port supports FEC and is
up but not configured for FEC. If the value is
notApplicable, the port does not support FEC. If
the value is unknown, the port supports FEC but is
down.
Action Specifies the following actions on the IAH port:
• none - no action.
• flushMacFdb - flush the MAC forwarding table.
• flushArp - flush the ARP table.
• flushIp - flush the IP route table.
• flushAll - flush all tables.
• triggerRipUpdate - manually triggers a RIP
update.
• clearLoopDetectAlarm - clears the loop
detection alarm on the IAH port.
The default is none.
Result Specifies the result of the selected action. The
default is none.
AutoSense Enables or disables Auto-sense on the specific
port. The default value is disabled for existing
configurations but enabled for new Zero Touch
Fabric Configuration deployments.
AutoSenseKeepAutoConfig Retains the Auto-sense configuration if you
disable Auto-sense on the port. The dynamic
configuration becomes a manual configuration
and is visible in the show running-config
output.
AutoSenseState Displays the Auto-sense port state.
CustomAutoNegAdOrigin Specifies the origin of Custom Auto Negotiation
Advertisements (CANA) configuration on the port.
The supported values are:
• config - Set by the user.
• radius - Set by the Remote Authentication
Dail-In User Service (RADIUS) attribute.
By default, flow control mode is disabled. When disabled, the system does not generate nor configure
the transmission of flow control messages. The system always honors received flow control messages
regardless of the flow control mode status. You must enable this mode before you configure an
interface to send pause frames.
Procedure
View the boot configuration to determine the software version, as well as view the source from which
the switch last started.
Procedure
Name Description
SwVersion Specifies the software version that currently runs
on the chassis.
LastRuntimeConfigSource Specifies the last source for the run-time image.
PrimaryConfigSource Specifies the primary configuration source.
Name Description
PrimaryBackupConfigSource Specifies the backup configuration source to use if
the primary does not exist.
EnableFactoryDefaultsMode Specifies whether the switch uses the factory
default settings at startup.
• false: The node does not use factory default
settings at startup.
• fabric: This mode is not supported.
• noFabric: The node uses the factory default
mode settings at startup.
The default value is false. This flag is automatically
reset to the default setting after the switch
restarts. If you change this parameter, you must
restart the switch for the change to take effect.
Note:
The factorydefaults flag deletes the runtime,
primary and backup configuration files, local
password files, authentication keys, and
certificates. After a factory default, you must
change the password on first login.
Important:
Do not change this parameter.
Important:
Do not change this parameter.
Name Description
EnableSshServer Activates or disables the SSH server service. The
default value is disabled.
EnableSpbmConfigMode Enables you to configure SPB and IS-IS, but you
cannot configure PIM and IGMP either globally or
on an interface.
The boot flag is enabled by default.
EnableIpv6Mode Enable this flag to support IPv6 routes with prefix-
lengths greater than 64 bits. This flag is disabled
Note: by default.
Exception: not supported on VSP 4450 Series or
XA1400 Series .
Note:
As a best practice, enable the enhanced secure
mode in the non-JITC sub-mode because the JITC
sub-mode is more restrictive and prevents the use
of some troubleshooting utilities.
Name Description
AdvancedFeatureBwReservation Enables the switch to support advanced features
by reserving ports as loopback ports. When
Note: disabled, you can use all ports on the switch, but
Exception: only supported on VSP 7400 Series advanced features do not work.
and XA1480. • The high level means that the switch reserves
the maximum bandwidth for the advanced
features.
• The low level means that the switch
reserves less bandwidth to support minimum
functionality for advanced features.
The default is enabled with low level.
If you change this parameter, you must restart the
switch.
EnableDvrLeafMode Enables the switch to be configured as a DvR Leaf.
When enabled, you cannot configure the switch to
operate as a DvR Controller.
EnablevrfScaling Changes the maximum number of VRFs and Layer
3 VSNs that the switch supports. If you select this
check box, the maximum number increases. The
default is disabled.
Important:
If you select both this check box and the
EnableSpbmConfigMode check box, the switch
reduces the number of configurable VLANs.
For more information about maximum scaling
numbers, see VOSS Release Notes.
Note:
Spanning Tree is disabled on all SPBM NNIs.
Name Description
EnableHaCpu Enables or disables the CPU High Availability
feature.
Note: If you enable or disable HA mode, the secondary
Exception: only supported on VSP 8600 Series. CPU automatically resets to load settings from the
previously-saved configuration file. The default is
enabled.
EnableSavetoStandby Enables or disables automatic save of the
configuration file to the standby CPU. The default
Note: value is enabled.
Exception: only supported on VSP 8600 Series.
Change the boot configuration to determine the services available after the system starts.
Procedure
Name Description
SwVersion Specifies the software version that currently runs
on the chassis.
LastRuntimeConfigSource Specifies the last source for the run-time image.
PrimaryConfigSource Specifies the primary configuration source.
PrimaryBackupConfigSource Specifies the backup configuration source to use if
the primary does not exist.
Name Description
EnableFactoryDefaultsMode Specifies whether the switch uses the factory
default settings at startup.
• false: The node does not use factory default
settings at startup.
• fabric: This mode is not supported.
• noFabric: The node uses the factory default
mode settings at startup.
The default value is false. This flag is automatically
reset to the default setting after the switch
restarts. If you change this parameter, you must
restart the switch for the change to take effect.
Note:
The factorydefaults flag deletes the runtime,
primary and backup configuration files, local
password files, authentication keys, and
certificates. After a factory default, you must
change the password on first login.
Important:
Do not change this parameter.
Important:
Do not change this parameter.
Name Description
EnableSpbmConfigMode Enables you to configure SPB and IS-IS, but you
cannot configure PIM and IGMP either globally or
on an interface.
The boot flag is enabled by default.
EnableIpv6Mode Enable this flag to support IPv6 routes with prefix-
lengths greater than 64 bits. This flag is disabled
Note: by default.
Exception: not supported on VSP 4450 Series or
XA1400 Series .
Note:
As a best practice, enable the enhanced secure
mode in the non-JITC sub-mode because the JITC
sub-mode is more restrictive and prevents the use
of some troubleshooting utilities.
Name Description
AdvancedFeatureBwReservation Enables the switch to support advanced features
by reserving ports as loopback ports. When
Note: disabled, you can use all ports on the switch, but
Exception: only supported on VSP 7400 Series advanced features do not work.
and XA1480. • The high level means that the switch reserves
the maximum bandwidth for the advanced
features.
• The low level means that the switch
reserves less bandwidth to support minimum
functionality for advanced features.
The default is enabled with low level.
If you change this parameter, you must restart the
switch.
EnableDvrLeafMode Enables the switch to be configured as a DvR Leaf.
When enabled, you cannot configure the switch to
operate as a DvR Controller.
EnablevrfScaling Changes the maximum number of VRFs and Layer
3 VSNs that the switch supports. If you select this
check box, the maximum number increases. The
default is disabled.
Important:
If you select both this check box and the
EnableSpbmConfigMode check box, the switch
reduces the number of configurable VLANs.
For more information about maximum scaling
numbers, see VOSS Release Notes.
Note:
Spanning Tree is disabled on all SPBM NNIs.
Name Description
EnableHaCpu Enables or disables the CPU High Availability
feature.
Note: If you enable or disable HA mode, the secondary
Exception: only supported on VSP 8600 Series. CPU automatically resets to load settings from the
previously-saved configuration file. The default is
enabled.
EnableSavetoStandby Enables or disables automatic save of the
configuration file to the standby CPU. The default
Note: value is enabled.
Exception: only supported on VSP 8600 Series.
Note
This procedure only applies to VSP 7400 Series and XA1480.
Product Notice: For VSP 7400 Series, you must ensure your configuration does not include reserved
ports before you enable this feature. If the configuration includes reserved ports after you enable this
feature and restart the switch, the switch stops loading the configuration.
Procedure
Enable Jumbo frames to increase the size of Ethernet frames supported on the chassis.
Procedure
Note
According to a bill passed by the government of Russia, from October 2014 Moscow has
moved from UTC+4 into UTC+3 time zone with no daylight savings. The software includes this
change.
Procedure
Name Description
Configures the year (integer 1998–2097). The
Year
default is 1998.
Month Configures the month. The default is 1.
Date Configures the day (integer 1–31). The default is 1.
Hour Configures the hour (12am–11pm). The default is 0.
Configures the minute (integer 0–59). The default
Minute
is 0.
Name Description
Configures the second (integer 0–59). The default
Second
is 0.
Time Zone Configures the time zone.
Configure CP Limit
Configure CP Limit functionality to protect the switch from becoming congested by an excess of data
flowing through one or more ports.
Procedure
Name Description
AutoRecoverPort Activates or disables auto recovery of the port
from action taken by CP Limit or link flap features.
The default value is disabled.
Perform this procedure to configure CP Limit functionality to protect the switch from becoming
congested by excess data flow through Extreme Integrated Application Hosting (IAH) ports.
Procedure
1. In the navigation pane, expand Configuration > Edit > Insight Port.
2. Select the IAH port you want to configure.
3. Select the CP Limit tab.
4. Select AutoRecoverPort.
5. Select Apply.
Name Description
AutoRecoverPort Enables or disables auto recovery of the Extreme
Integrated Application Hosting port from action
taken by CP Limit or the link flap features. The
default is disabled.
Configure an IP address for the management port so that you can remotely access the device using the
out-of-band (OOB) management port. The management port runs on a dedicated VRF.
The configured IP subnet must be globally unique because the management protocols can go through
in-band (Global Router) or out-of-band ports (Management VRF).
This procedure only applies to hardware with a dedicated, physical management interface.
Configure an IP address for the management port so that you can remotely access the device using
the out-of-band (OOB) management port. The management port runs on a dedicated VRF. Redirect all
commands that are run on the management port to its VRF.
The configured IP subnet has to be globally unique because the management protocols can go through
in-band or out-of-band ports.
Note
Do not configure a default route in the Management VRF and instead use a static route.
Inbound FTP does not work when a default route is configured at the Management VRF.
When you initiate FTP, you should also set FTP to passive mode.
Procedure
Name Description
Interface Specifies the slot and port for the management
port.
Ip Address Specifies the IP address for the management port.
Net Mask Specifies the subnet mask for the IP address.
BcastAddrFormat Specifies the broadcast address format for the
management port.
ReasmMaxSize Specifies the size of the largest IP datagram
that can be reassembled from IP fragmented
datagrams received on the management port.
Name Description
VlanId Specifies the VLAN ID to which the management
port belongs.
Specifies the VLAN ID in the range of 1 to 4059.
By default, VLAN IDs 1 to 4059 are configurable
and the system reserves VLAN IDs 4060 to 4094
for internal use. On switches that support the
vrf-scaling and spbm-config-mode boot
configuration flags, if you enable these flags, the
system also reserves VLAN IDs 3500 to 3998.
VLAN ID 1 is the default VLAN and you cannot
create or delete VLAN ID 1.
BrouterPort Specifies if the management port is a brouter port
rather than a routeable VLAN. You cannot change
this value after the row is created.
MacOffset Translates the IP address into a MAC address.
Note
This procedure only applies to hardware with a dedicated physical management interface.
The management port on the switch is a 10/100/1000 Mb/s Ethernet port that you can use for an
out-of-band management connection to the switch.
If you use EDM to configure the static routes of the management port, you do not receive a warning if
you configure a non-natural mask. After you save the changes, the system deletes those static routes
after the next restart, possibly causing the loss of IP connectivity to the management port.
If you are uncertain whether the mask you configure is non-natural, use the CLI to configure static
routes.
Procedure
Name Description
Index Specifies the slot and port number of the management port.
AdminStatus Configures the administrative status of the device as up (ready to
pass packets) or down. The testing state indicates that no operational
packets can be passed.
OperStatus Specifies the operational status of the device.
LicenseControlStatus Shows the license status of the port:
• Locked means the port requires a Port License but one is not
present on the switch.
• Unlocked means the port requires a Port License and one is present
on the switch.
• notApplicable means the port does not require a Port License.
Mtu Shows the configuration for the maximum transmission unit. The size
of the largest packet which can be sent/received on the interface,
specified in octets. For interfaces that are used for transmitting
network datagrams, this is the size of the largest network datagram
that can be sent on the interface.
LinkTrap Enables or disables traps for the link status.
IpsecEnable Enables IPsec on the management port. The default is disabled.
PhysAddress Shows the MAC address.
AutoNegotiate Enables or disables Auto-Negotiation for the mangement port. The
default varies depending on the platform:
• VSP 4900 Series - enabled
• VSP 7200 Series - disabled
• VSP 7400 Series - enabled
• VSP 8200 Series - enabled
• VSP 8400 Series - enabled
• VSP 8600 Series - enabled
AdminDuplex Specifies the administrative duplex mode for the management port.
The default is full.
OperDuplex Specifies the operational duplex configuration for this port.
AdminSpeed Specifies the administrative speed for this port. The default is 100 Mb/s.
OperSpeed Shows the current operating data rate of the port.
Configure IPv6 management port parameters to use IPv6 routing on the port.
This procedure only applies to hardware with a dedicated, physical management interface.
Procedure
Name Description
Interface Identifies the unique IPv6 interface.
Descr Specifies a textual string containing information about the
interface. The network management system also configures the
Descr string.
Type Specifies the type of interface.
ReasmMaxSize(MTU) Configures the MTU for this IPv6 interface. This value must be
the same for all the IP addresses defined on this interface. The
default value is 1500.
PhysAddress Specifies the physical address for the interface. For example, for
an IPv6 interface attached to an 802.x link, this value is a MAC
address.
AdminStatus Configures the indication of whether IPv6 is activated (up) or
disabled (down) on this interface. This object does not affect
the state of the interface, only the interface connection to an
IPv6 stack. The default is false (cleared).
ReachableTime Configures the time, in milliseconds, that the system considers a
neighbor reachable after it receives a reachability confirmation.
The value is in a range from 0–3600000. The default value is
30000.
Name Description
RetransmitTimer Configures the time between retransmissions of neighbor
solicitation messages to a neighbor; during address resolution
or neighbor reachability discovery. The value is expressed in
milliseconds in a range from 0–3600000. The default value is
1000.
CurHopLimit Specifies the current hop limit field sent in router
advertisements from this interface. The value must be the
current diameter of the Internet. A value of zero indicates that
the advertisement does not specify a value for the current hop
limit. The default is 64.
Configure management port IPv6 addresses to add or remove IPv6 addresses from the port.
The switch supports IPv6 addressing with Ping, Telnet, and SNMP.
Procedure
Name Description
Interface Specifies an index value that uniquely identifies the interface.
Addr Specifies the IPv6 address to which this entry addressing information
pertains.
If the IPv6 address exceeds 116 octets, the object identifiers (OIDS) of
instances of columns in this row is more than 128 subidentifiers and you
cannot use SNMPv1, SNMPv2c, or SNMPv3 to access them.
Name Description
AddrLen Specifies the prefix length value for this address. You cannot change
the address length after creation. You must provide this field to create
an entry in this table.
Type Specifies unicast, the only supported type.
Origin Specifies the origin of the address. The origin of the address can be one
of the following: other, manual, dhcp, linklayer, or random.
Status Specifies the status of the address, describing if the address can be
used for communication. The status can be one of the following:
preferred, deprecated, invalid, inaccessible, unknown, tentative, or
duplicate.
Created Specifies the time this entry was created. If this entry was created prior
to the last initialization of the local network management subsystem,
then this option contains a zero value.
LastChanged Specifies the time this entry was last updated. If this entry was
updated prior to the last initialization of the local network management
subsystem, then this option contains a zero value.
Use the following procedure to automatically reactivate the port that is shut down by the SLPP.
Procedure
Perform this procedure to specify serial port communication settings. The serial port on the device is
the console port. Depending on the hardware platform, the console port displays as console or 10101.
Procedure
1. In the Device Physical View tab, select the console port on the device.
2. In the navigation pane, expand Configuration > Edit.
3. Click Serial Port.
4. Edit the port parameters as required.
5. Click Apply.
Name Description
IfIndex Identifies the port as a serial port.
BaudRate Specifies the baud rate of this port.
Different hardware platforms support different baud rates, which also
impacts the default value for each hardware platform:
• VSP 4450 Series — 9600
• VSP 4900 Series — 115200
• VSP 7200 Series — 9600
• VSP 7400 Series — 115200
• VSP 8200 Series — 9600
• VSP 8400 Series — 9600
• VSP 8600 Series — 115200
• XA1400 Series — 115200
DataBits Specifies the number of data bits, for each byte of data, this port sends
and receives. The default is eight.
Use the port lock feature to administratively lock a port or ports to prevent other users from changing
port parameters or modifying port action. You cannot modify locked ports until you first unlock the
port.
Procedure
1. In the navigation pane, expand Configuration > Security > Control Path.
2. Click General.
3. Click the Port Lock tab.
4. To enable port lock, select the Enable check box.
5. Click Apply.
Name Description
Enable Activates the port lock feature. Clear this check box to
unlock ports. The default is disabled.
LockedPorts Lists the locked ports. Click the ellipsis (...) button to select
the ports you want to lock or unlock.
Lock a Port
Before You Begin
• You must enable port lock before you lock or unlock a port.
Use the port lock feature to administratively lock a port or ports to prevent other users from changing
port parameters or modifying port action. You cannot modify locked ports until you first unlock the
port.
Procedure
1. In the navigation pane, expand Configuration > Security > Control Path.
2. Click General.
3. Click the Port Lock tab.
4. In the LockedPorts box, click the ellipsis (...) button.
5. Click the desired port or ports.
6. Click Ok.
7. In the Port Lock tab, click Apply.
Name Description
Enable Activates the port lock feature. Clear this check box to
unlock ports. The default is disabled.
LockedPorts Lists the locked ports. Click the ellipsis (...) button to select
the ports you want to lock or unlock.
Use this procedure to control whether or not to supply power to specific slots that contain either switch
fabric modules or input/output modules. By default, power is available to all slots.
After enabling power to specific input/output module slots, you can also configure the priority in which
they are powered on. For more information, see Configure Slot Priority on page 614.
Note
This feature is not available for hardware platforms with fixed configurations. It is only
available for platforms where the user can install modules in slots.
Procedure
Configure slot priority to specify which slots you want to shut down if there is insufficient power
available in the chassis. By default, power is available to all slots, and the slots have the following
priority:
• Slots 1, 2, SF1, SF2, and SF3 must always be Critical so you cannot configure them.
• Slots 3-8 are High by default, but you can configure any of them to Low.
Note
Power is always supplied to critical slots first which are the CP modules, SF modules, and fan
trays.
The slot with the lowest priority shuts down first. Slots with the same priority shut down in descending
order (highest slot number first) and interface slots shut down before CP, SF modules, and fan tray
slots.
For example, if slot 3 has a low priority and slots 4 and 5 have a high priority, the slot shutdown
priority is as follows: 4, 5, 3. Slot 3 has the lowest priority because it was configured as low so it would
be shut down first. Slots 4 and 5 have the same priority, but slot 5 shuts down before slot 4 because slot
4 has a higher slot number.
Procedure
View power information to see the amount of power available and used by the chassis and all
components.
Procedure
Name Description
TotalPower Shows the total power for the chassis.
RedundantPower Shows the redundant power for the chassis.
PowerUsage Shows the power currently used by the complete
chassis.
PowerAvailable Shows the unused power.
Perform the following procedure to view the power consumption of the modules in the chassis.
Procedure
Name Description
Index Displays an index value that identifies the component.
PowerStatus Displays the power status: on or off.
BasePower Displays the base power required for the slot.
ConsumedPower Displays the actual consumed power for the slot. This value is 0 if the
power status is off.
PowerPriority Displays the priority of the slot for power management.
Name Description
SlotDescription Displays the slot number.
CardDescription Identifies the type of module in the slot.
Note
This procedure does not apply to XA1400 Series.
Procedure
Name Description
TrayId Specifies the fan tray ID.
Perform this procedure to view information about the USB port on the switch.
Note
This procedure does not apply to VSP 8600 Series and XA1400 Series. For more information
about your model features, see your hardware documentation.
Procedure
Note
On VSP 4450 Series, you cannot select the USB port in the Device Physical View. You must
double-click the port to display the General tab.
Name Description
UsbStatus Displays the current status of USB storage: either
present or notPresent.
UsbDescription Displays a description of the USB storage.
View topology status information (which includes MIB status information) to view the configuration
status of the SynOptics Network Management Protocol (SONMP) on the system.
Procedure
Name Description
IpAddr Specifies the IP address of the device.
Status Indicates whether topology (SONMP) is on or off for the device.
NmmLstChg Specifies the value of sysUpTime, the last time an entry in the
network management MIB (NMM) topology table was added, deleted,
or modified, if the table did not change since the last cold or warm
start of the agent.
NmmMaxNum Specifies the maximum number of entries in the NMM topology table.
NmmCurNum Specifies the current number of entries in the NMM topology table.
View topology message status to view the interconnections between Layer 2 devices in a network.
Procedure
Name Description
Slot Specifies the slot number in the chassis that received the topology
message.
Port Specifies the port that received the topology message.
SubPort Specifies the channel of a channelized 40 Gbps port that received the
topology message.
IpAddr Specifies the IP address of the sender of the topology message.
SegId (RemPort) Specifies the segment identifier of the segment from which the remote
agent sent the topology message. This value is extracted from the
message.
MacAddr Specifies the MAC address of the sender of the topology message.
ChassisType Specifies the chassis type of the device that sent the topology
message.
BkplType Specifies the backplane type of the device that sent the topology
message.
Name Description
LocalSeg Indicates if the sender of the topology message is on the same
Ethernet segment as the reporting agent.
CurState Specifies the current state of the sender of the topology message. The
choices are
• topChanged—Topology information recently changed.
• heartbeat—Topology information is unchanged.
• new—The sending agent is in a new state.
Configure a forced message control pattern to enforce configured message control actions.
Procedure
Name Description
PatternId Specifies a pattern identification number in the
range 1–32.
Pattern Specifies a forced message control pattern of 4
characters. The software and the hardware log
messages that use the first four bytes matching
one of the patterns in the force-msg table
undergo the configured message control action.
You can specify up to 32 different patterns in
the force-msg table, including a wildcard pattern
(****). If you specify the wildcard pattern, all
messages undergo message control.
Note
This tab does not apply on the VSP 8600 Series switch.
For platforms that support both back-to-front and front-to-back airflow, the airflow direction must be
the same for both the power supply fans and the chassis fan.
Procedure
Name Description
Description Specifies a description of the fan location.
OperStatus Specifies the operation status of the fan.
OperSpeed Specifies the actual fan speed.
OperSpeedRPM Specifies the current operational speed of the fan in
RPM.
Note:
Exception: only supported on VSP 4900
Series and VSP 7400 Series.
Configure all of the ports on an installed Versatile Interface Module (VIM) to operate at the same speed.
Note
Some VIMs must operate with all ports at the same speed, or a group of ports at the same
speed, while others can operate with ports at different speeds. For more information, see
VOSS Release Notes. You can configure VIM ports speed only on VIMs that must operate with
all ports at the same speed.
Use this procedure to configure the speed of all ports in a multi-port VIM to operate at either 10 Gbps or
25 Gbps.
Procedure
Name Description
AdminSpeed • mbps10000: Configures all ports in a multi-port VIM to operate at 10 Gbps.
• mbps25000: Configures all ports in a multi-port VIM to operate at 25 Gbps.
The default is 25 Gbps.
Perform this procedure to display information about an installed Solid State Drive (SSD) on a switch.
Procedure
Name Description
ProductName Specifies Solid State Drive (SSD) product name.
VendorName Specifies the SSD vendor.
ManufactureDate Specifies the date on which the SSD was manufactured.
SerialNum Specifies the SSD serial number.
PartNum Specifies the SSD part number.
DeviceVersion Specifies the version of the SSD.
TotalSize Specifies the total memory size of the SSD.
Use this procedure to designate a slot in the switch for IOC Module Preconfiguration. A slot can be
designated for only one module type at a time.
Procedure
1. In the navigation pane, expand Configuration > Edit > Card Preconfig.
2. Click Insert.
3. Enter the slot number in the Slot field.
4. Select the IOC Module type in the CardType field.
5. Select the Lock field to lock the slot to the specified IOC Module type.
6. Click Insert.
Field Description
Slot Specifies the slot number designated for pre-
configuration.
CardType Specifies the type of the IOC Module designated
for the slot.
Lock If selected, the slot is locked to only accept the
type of IOC Module designated.
Procedure
• TCP
•UDP
5. Select the statistic you want to graph.
6. Select the graph type:
• line chart
• area chart
• bar chart
• pie chart
Procedure
1. In the Device Physical View, select the port or ports for which you want to create a graph.
2. In the navigation pane, expand the Configuration > Graph folders, and then click Port.
OR, use the following shortcut:
Right-click the selected port or ports from Step 1, and choose Graph.
3. On the Graph Port tab for the selected port or ports, select the item you want to graph.
4. Click an icon to select the type of graph you require. The following list provides the graph types
available:
• Line Chart
• Area Chart
• Bar Chart
• Pie Chart
Procedure
Name Description
MemUsed The percentage of memory space used.
Only the AbsoluteValue column is valid in the System tab. All
other columns display as N/A because they are percentages and
not actual memory counters.
MemFree The amount in kilobytes of free memory.
CpuUtil Percentage of CPU utilization.
Procedure
Name Description
InPkts The number of messages delivered to the SNMP entity from the
transport service.
OutPkts The number of SNMP messages passed from the SNMP protocol
entity to the transport service.
InTotalReqVars The number of MIB objects retrieved successfully by the SNMP
protocol entity as the result of receiving valid SNMP Get-Request and
Get-Next PDUs.
InTotalSetVars The number of MIB objects altered successfully by the SNMP protocol
entity as the result of receiving valid SNMP Set-Request PDUs.
InGetRequests The number of SNMP Get-Request PDUs the SNMP protocol accepts
and processes.
OutGetRequests The number of SNMP Get-Request PDUs that are generated by the
SNMP protocol entity.
InGetNexts The number of SNMP Get-Next PDUs the SNMP protocol accepts and
processes.
OutGetNexts The number of SNMP Get-Next PDUs that are generated by the SNMP
protocol entity.
InSetRequests The number of SNMP Set-Request PDUs the SNMP protocol accepts
and processes.
Name Description
OutSetRequests The number of SNMP Set-Request PDUs that are generated by the
SNMP protocol entity.
InGetResponses The number of SNMP Get-Response PDUs the SNMP protocol accepts
and processes.
OutGetResponses The number of SNMP Get-Response PDUs that are generated by the
SNMP protocol entity.
InTraps The number of SNMP Trap PDUs the SNMP protocol accepts.
OutTraps The number of SNMP Trap PDUs the SNMP protocol generates.
OutTooBigs The number of SNMP PDUs the SNMP protocol generates for which
the value of the error-status field is tooBig.
OutNoSuchNames The number of SNMP PDUs the SNMP protocol generates for which
the value of the error-status field is noSuchName.
OutBadValues The number of SNMP PDUs the SNMP protocol generates for which
the value of the error-status field is badValue.
OutGenErrs The number of SNMP PDUs the SNMP protocol generates for which
the value of the error-status field is genErr.
InBadVersions The number of SNMP messages delivered to the SNMP protocol
entity for an unsupported SNMP version.
InBadCommunityNames The number of SNMP messages delivered to the SNMP protocol
entity that used an SNMP community name not known to said entity.
InBadCommunityUses The number of SNMP messages delivered to the SNMP protocol
entity that represented an SNMP operation not allowed by the SNMP
community named in the message.
InASNParseErrs The number of ASN.1 or BER errors the SNMP protocol encountered
when decoding received SNMP messages.
InTooBigs The number of SNMP PDUs delivered to the SNMP protocol entity for
which the value of the error-status field is tooBig.
InNoSuchNames The number of SNMP PDUs delivered to the SNMP protocol entity for
which the value of the error-status field is noSuchName.
InBadValues The number of SNMP PDUs delivered to the SNMP protocol entity for
which the value of the error-status field is badValue.
InReadOnlys The number of SNMP PDUs delivered to the SNMP protocol entity for
which the value of the error-status field is readOnly. It is a protocol
error to generate an SNMP PDU containing the value "readOnly"
in the error-status field. This object is provided to detect incorrect
implementations of the SNMP.
InGenErrs The number of SNMP PDUs delivered to the SNMP protocol entity for
which the value of the error-status field is genErr.
Procedure
IP Field Descriptions
The following table describes parameters on the IP tab.
Name Description
InReceives The number of input datagrams received from interfaces, including
those received in error.
InHdrErrors The number of input datagrams discarded due to errors in the IP
headers, including bad checksums, version number mismatch, other
format errors, time-to-live exceeded, errors discovered in processing
their IP options.
InAddrErrors The number of input datagrams discarded because the IP address in
the IP header destination field was not a valid address to be received
at this entity. This count includes invalid addresses (for example,
0.0.0.0) and addresses of unsupported Classes (for example, Class E).
For entities that are not IP Gateways and therefore do not forward
datagrams, this counter includes datagrams discarded because the
destination address was not a local address.
ForwDatagrams The number of input datagrams for which this entity was not their final
IP destination, as a result of which an attempt was made to find a
route to forward them to that final destination. In entities that do not
act as IP Gateways, this counter includes only those packets that were
Source-Routed by way of this entity and had successful Source-Route
option processing.
InUnknownProtos The number of locally addressed datagrams received successfully but
discarded because of an unknown or unsupported protocol.
InDiscards The number of input IP datagrams for which no problems were
encountered to prevent their continued processing but that were
discarded (for example, for lack of buffer space). This counter does
not include any datagrams discarded while awaiting reassembly.
InDelivers The number of input datagrams successfully delivered to IP user-
protocols (including ICMP).
OutRequests The number of IP datagrams that local IP user-protocols (including
ICMP) supplied to IP in requests for transmission. This counter does not
include any datagrams counted in ipForwDatagrams.
OutDiscards The number of output IP datagrams for which no problem was
encountered to prevent their transmission to their destination, but that
were discarded (for example, for lack of buffer space). This counter
includes datagrams counted in ipForwDatagrams if any such packets
met this (discretionary) discard criterion.
Name Description
OutNoRoutes The number of IP datagrams discarded because no route was found to
transmit them to their destination. This counter includes any packets
counted in ipForwDatagrams that meet this no-route criterion. This
counter includes any datagrams a host cannot route because all default
gateways are down.
FragOKs The number of IP datagrams that were successfully fragmented at this
entity.
FragFails The number of IP datagrams that were discarded because they needed
to be fragmented at this entity but can not be, for example, because
the Don't Fragment flags were set.
FragCreates The number of IP datagram fragments that were generated as a result
of fragmentation at this entity.
ReasmReqds The number of IP fragments received that needed to be reassembled at
this entity.
ReasmOKs The number of IP datagrams successfully reassembled.
ReasmFails The number of failures detected by the IP reassembly algorithm
(for whatever reason: timed out, errors, and so on). This number
is not necessarily a count of discarded IP fragments because some
algorithms (notably the algorithm in RFC 815) can lose track of the
number of fragments by combining them as they are received.
Procedure
Name Description
SrcQuenchs The number of ICMP Source Quench messages received.
Redirects The number of ICMP Redirect messages received.
Echos The number of ICMP Echo (request) messages received.
EchoReps The number of ICMP Echo Reply messages received.
Timestamps The number of ICMP Timestamp (request) messages received.
TimestampReps The number of ICMP Timestamp Reply messages received.
AddrMasks The number of ICMP Address Mask Request messages received.
AddrMaskReps The number of ICMP Address Mask Reply messages received.
Name Description
ParmProbs The number of ICMP Parameter Problem messages received.
DestUnreachs The number of ICMP Destination Unreachable messages received.
TimeExcds The number of ICMP Time Exceeded messages received.
Procedure
Name Description
SrcQuenchs The number of ICMP Source Quench messages sent.
Redirects The number of ICMP Redirect messages received. For a host, this
object is always zero, because hosts do not send redirects.
Echos The number of ICMP Echo (request) messages sent.
EchoReps The number of ICMP Echo Reply messages sent.
Timestamps The number of ICMP Timestamp (request) messages sent.
TimestampReps The number of ICMP Timestamp Reply messages sent.
AddrMasks The number of ICMP Address Mask Request messages sent.
AddrMaskReps The number of ICMP Address Mask Reply messages sent.
ParmProbs The number of ICMP Parameter Problem messages sent.
DestUnreachs The number of ICMP Destination Unreachable messages sent.
TimeExcds The number of ICMP Time Exceeded messages sent.
Procedure
Name Description
ActiveOpens The number of times TCP connections made a direct transition to the
SYN-SENT state from the CLOSED state.
PassiveOpens The number of times TCP connections made a direct transition to the
SYN-RCVD state from the LISTEN state.
AttemptFails The number of times TCP connections made a direct transition to the
CLOSED state from either the SYN-SENT state or the SYN-RCVD state,
plus the number of times TCP connections made a direct transition to
the LISTEN state from the SYN-RCVD state.
EstabResets The number of times TCP connections made a direct transition to the
CLOSED state from either the ESTABLISHED state or the CLOSE-WAIT
state.
CurrEstab The number of TCP connections for which the current state is either
ESTABLISHED or CLOSE-WAIT.
InSegs The number of segments received, including those received in error.
This count includes segments received on currently established
connections.
OutSegs The number of segments sent, including those on current connections,
but excluding those containing only retransmitted octets.
RetransSegs The number of segments retransmitted that is, the number of TCP
segments transmitted containing one or more previously transmitted
octets.
InErrs The number of segments received in error (for example, bad TCP
checksums).
OutRsts The number of TCP segments sent containing the RST flag.
HCInSegs The number of segments received, including those received in error.
This count includes segments received on currently established
connections. This object is the 64-bit equivalent of InSegs.
HCOutSegs The number of segments sent, including those on current connections,
but excluding those containing only retransmitted octets. This object is
the 64-bit equivalent of OutSegs.
Procedure
Name Description
NoPorts The number of received UDP datagrams with no application at the
destination port.
Discontinuities in the value of this counter can occur at reinitialization
of the management system, and at other times as indicated by
discontinuities in the value of sysUpTime.
InErrors The number of received UDP datagrams that were not delivered for
reasons other than the lack of an application at the destination port.
Discontinuities in the value of this counter can occur at reinitialization
of the management system and at other times as indicated by
discontinuities in the value of sysUpTime.
InDatagrams The number of UDP datagrams delivered to UDP users, for devices that
can receive more than 1 000 000 UDP datagrams for each second.
Discontinuities in the value of this counter can occur at reinitialization
of the management system, and at other times as indicated by
discontinuities in the value of sysUpTime.
OutDatagrams The number of UDP datagrams sent from this entity.
Discontinuities in the value of this counter can occur at reinitialization
of the management system, and at other times as indicated by
discontinuities in the value of sysUpTime.
HCInDatagrams The number of TCP connections for which the current state is either
ESTABLISHED or CLOSE-WAIT.
HCOutDatagrams The number of UDP datagrams sent from this entity, for devices that
can transmit more than 1 million UDP datagrams for each second.
Discontinuities in the value of this counter can occur at reinitialization
of the management system, and at other times as indicated by
discontinuities in the value of sysUpTime.
Procedure
Name Description
InOctets Specifies the number of octets received on the interface, including
framing characters.
OutOctets Specifies the number of octets transmitted from the interface,
including framing characters.
InUcastPkts Specifies the number of packets delivered by this sublayer to
a higher sublayer that were not addressed to a multicast or
broadcast address at this sublayer.
OutUcastPkts Specifies the number of packets that higher-level protocols
requested be transmitted that were not addressed to a multicast
address at this sublayer. The total number includes those packets
discarded or not sent.
InMulticastPkts Specifies the number of packets delivered by this sublayer to a
higher sublayer that were addressed to a multicast address at
this sublayer. For a MAC layer protocol, this number includes both
group and functional addresses.
OutMulticastPkts Specifies the number of packets that higher-level protocols
requested be transmitted, and that are addressed to a multicast
address at this sublayer, including those that were discarded or not
sent. For a MAC layer protocol, this number includes both group
and functional addresses.
InBroadcastPkts Specifies the number of packets delivered by this sublayer to a
higher sublayer that are addressed to a broadcast address at this
sublayer.
OutBroadcastPkts Specifies the number of packets that higher-level protocols
requested be transmitted, and that were addressed to a broadcast
address at this sublayer, including those that were discarded or not
sent.
InDiscards Specifies the number of inbound packets that are discarded
because of frames with errors or invalid frames or, in some cases,
to fill up buffer space.
InErrors For packet-oriented interfaces, specifies the number of inbound
packets that contained errors preventing them from being
deliverable to a higher-layer protocol. For character-oriented or
fixed-length interfaces, the number of inbound transmission units
that contained errors preventing them from being deliverable to a
higher-layer protocol.
InUnknownProtos For packet-oriented interfaces, specifies the number of packets
received through the interface that are discarded because of an
unknown or unsupported protocol. For character-oriented or fixed-
length interfaces that support protocol multiplexing, the number
of transmission units received through the interface that were
discarded because of an unknown or unsupported protocol. For
any interface that does not support protocol multiplexing, this
counter is always 0.
Name Description
HCInPfcPkts Specifies the total number of Priority Flow Control (PFC) packets
received by this interface. This number does not increment for
port-level flow control.
HCOutPfcPkts Specifies the total number of PFC packets transmitted by this
interface. This number does not increment for port-level flow
control.
InFlowCtrlPkts Specifies the number of port-level flow control packets received by
this interface.
OutFlowCtrlPkts Specifies the number of port-level flow control packets transmitted
by this interface.
InPfcPkts Specifies the total number of port-level flow control packets
received by this interface.
OutPfcPkts Specifies the total number of port-level flow control packets
transmitted by this interface.
NumStateTransition Specifies the number of times the port went in and out of service;
the number of state transitions from up to down.
Procedure
Name Description
AlignmentErrors Specifies acount of frames received on a particular interface that
are not an integral number of octets in length and do not pass
the FCS check. The count represented by an instance of this
object increments when the alignmentError status is returned
by the MAC service to the LLC (or other MAC user). Received
frames for which multiple error conditions obtain are, according
to the conventions of IEEE 802.3 Layer Management, counted
exclusively according to the error status presented to the LLC.
FCSErrors Specifies a count of frames received on a particular interface
that are an integral number of octets in length but do not pass
the FCS check. The count represented by an instance of this
object increments when the frameCheckError status is returned
by the MAC service to the LLC (or other MAC user). Received
frames for which multiple error conditions obtained are, according
to the conventions of IEEE 802.3 Layer Management, counted
exclusively according to the error status presented to the LLC.
InternalMacTransmitErrors Specifies a count of frames for which transmission on a particular
interface fails due to an internal MAC sublayer transmit error.
A frame is only counted by an instance of this object if
it is not counted by the corresponding instance of either
the LateCollisions object, the ExcessiveCollisions object, or the
CarrierSenseErrors object. The precise meaning of the count
represented by an instance of this object is implementation-
specific. In particular, an instance of this object can represent a
count of transmission errors on a particular interface that are not
otherwise counted.
InternalMacReceiveErrors Specifies a count of frames for which reception on a particular
interface fails due to an internal MAC sublayer receive error.
A frame is only counted by an instance of this object if
it is not counted by the corresponding instance of either
the FrameTooLongs object, the AlignmentErrors object, or the
FCSErrors object. The precise meaning of the count represented
by an instance of this object is implementation-specific. In
particular, an instance of this object can represent a count of
receive errors on a particular interface that are not otherwise
counted.
CarrierSenseErrors Specifies the number of times that the carrier sense condition is
lost or not asserted when the switch attempts to transmit a frame
on a particular interface. The count represented by an instance
of this object increments at most once for each transmission
attempt, even if the carrier sense condition fluctuates during a
transmission attempt.
Name Description
FrameTooLongs Specifies a count of frames received on a particular interface
that exceed the maximum permitted frame size. The count
represented by an instance of this object increments when the
frameTooLong status is returned by the MAC service to the LLC
(or other MAC user). Received frames for which multiple error
conditions obtained are, according to the conventions of IEEE
802.3 Layer Management, counted exclusively according to the
error status presented to the LLC.
SQETestErrors Specifies a count of times that the SQE TEST ERROR message is
generated by the PLS sublayer for a particular interface. The SQE
TEST ERROR message is defined in section 7.2.2.2.4 of ANSI/IEEE
802.3-1985 and its generation described in section 7.2.4.6 of the
same document.
DeferredTransmissions Specifies a count of frames for which the first transmission
attempt on a particular interface is delayed because the medium
is busy. The count represented by an instance of this object does
not include frames involved in collisions.
SingleCollisionFrames Specifies a count of successfully transmitted frames on a
particular interface for which transmission is inhibited by exactly
one collision. A frame that is counted by an instance of
this object is also counted by the corresponding instance of
either the UcastPkts, MulticastPkts, or BroadcastPkts objects
and is not counted by the corresponding instance of the
MultipleCollisionFrames object.
MultipleCollisionFrames Specifies a count of successfully transmitted frames on a
particular interface for which transmission is inhibited by more
than one collision. A frame that is counted by an instance of
this object is also counted by the corresponding instance of
either the UcastPkts, MulticastPkts, or BroadcastPkts objects
and is not counted by the corresponding instance of the
SingleCollisionFrames object.
LateCollisions Specifies the number of times that a collision is detected on a
particular interface later than 512 bit-times into the transmission
of a packet; 512 corresponds to 51.2 microseconds on a 10 Mb/s
system. A (late) collision included in a count represented by an
instance of this object is also considered as a (generic) collision
for purposes of other collision-related statistics.
ExcessiveCollisions Specifies a count of frames for which transmission on a particular
interface fails due to excessive collisions.
FrameTooShorts Specifies the number of frames, encountered on this interface,
that are too short.
LinkFailures Specifies the number of link failures encountered on this interface.
PacketErrors Specifies the number of packet errors encountered on this
interface.
CarrierErrors Specifies the number of carrier errors encountered on this
interface.
LinkInactiveErrors Specifies the number of link inactive errors encountered on this
interface.
Procedure
Name Description
InUnicastFrames The number of incoming unicast frames bridged.
InMulticastFrames The number of incoming multicast frames bridged.
InBroadcastFrames The number of incoming broadcast frames bridged.
InDiscards The number of frames discarded by the bridging entity.
OutFrames The number of outgoing frames bridged.
Procedure
Name Description
InUnicastFrames The number of incoming unicast frames routed.
InMulticastFrames The number of incoming multicast frames routed.
InDiscards The number of frames discarded by the routing entity.
Name Description
OutUnicastFrames The number of outgoing unicast frames routed.
OutMulticastFrames The number of outgoing multicast frames routed.
Table 75: Dynamic Host Configuration Protocol Relay for IPv6 product support
Feature Product Release introduced
IPv6 DHCP Relay VSP 4450 Series VOSS 4.1
VSP 4900 Series VOSS 8.1
VSP 7200 Series VOSS 4.2.1
VSP 7400 Series VOSS 8.0
VSP 8200 Series VOSS 4.1
VSP 8400 Series VOSS 4.2
VSP 8600 Series VSP 8600 6.2
XA1400 Series Not Supported
DHCP option 82
The DHCP option 82 is the DHCP Relay Agent Information option. The DHCP relay agent inserts
option 82 when it forwards the client-originated DHCP packets to a DHCP server. The Relay Agent
Information option is organized as a single DHCP option that contains one or more sub-options that
convey information known by the relay agent. The DHCP server echoes the option back to the relay
agent in server-to-client replies, and the relay agent removes the option before forwarding the reply to
the client.
The DHCP option 82 is added at the DHCP relay level as shown in the following image.
DHCP Suboptions
The suboptions are Agent Circuit ID and Agent Remote ID.
The DHCP relay agents can add the Agent Circuit ID to terminate switched or permanent circuits. The
Agent Circuit ID encodes an agent-local identifier of the circuit from which a DHCP client-to-server
packet was received. Agents can use the Circuit ID to relay DHCP responses back to the proper circuit.
In the switch, the Agent Circuit ID field contains the ifIndex of the interface on which the packet is
received.
DHCP relay agents can add the Agent Remote ID to terminate switched or permanent circuits, and can
identify the remote host end of the circuit. The switch uses the Agent Remote ID field to encode the
MAC address of the interface on which the packet is received. The Agent Remote ID must be globally
unique.
Agent Operations
A DHCP relay agent adds a Relay Agent Information field as the last option in the DHCP options field of
any recognized BOOTP or DHCP packet forwarded from a client to a server. However, if the End Option
255 is present, then the DHCP relay agent adds a Relay Agent information field before the End Option
255 field.
Relay agents can receive a DHCP packet from an untrusted circuit with the gateway IP address
(GIADDR) set to zero to indicate that the relay agent is the first-hop router from the gateway. If a Relay
Agent Information option is present in the packet, the relay agent discards the packet and increments
an error counter. A trusted circuit can contain a trusted downstream network element, for example,
a bridge, between the relay agent and the client. The bridge can add a relay agent option but does
not set the GIADDR field. In this case, the relay agent forwards the DHCP packet per normal DHCP
relay agent operations, and sets the GIADDR field to the relay address. The relay agent does not add a
second relay agent option.
You can distinguish between a trusted circuit and an untrusted circuit based on the type of circuit
termination equipment you use. To make a circuit trusted, set the trusted flag under DHCP for each
interface.
After packets append the Relay Agent Information option, the packets that exceed the MTU or the
vendor size buffer of 64 bits, are forwarded without adding the Agent Information option, and an error
counter is incremented.
The relay agent or the trusted downstream network element removes the Relay Agent Information
option echoed by a server that is added when forwarding a server-to-client response back to the client.
The following list outlines the operations that the relay agent does not perform:
• The relay agent does not add an Option Overload option to the packet or use the file or sname
fields to add the Relay Agent Information option. The agent does not parse or remove Relay Agent
Information options , the system can display it in the sname or file fields of a server-to-client packet
forwarded through the agent.
• The relay agent does not monitor or modify client-originated DHCP packets addressed to a server
unicast address; this includes the DHCP-REQUEST sent when entering the RENEWING state.
• The relay agent does not modify DHCP packets that use the IPSEC Authentication Header or IPSEC
Encapsulating Security Payload.
A DHCP relay agent can receive a client DHCP packet forwarded from a BOOTP/DHCP relay agent
closer to the client. This packet has a GIADDR as non-zero, and may or may not already have a DHCP
Relay Agent option in it.
Relay agents configured to add a Relay Agent option which receive a client DHCP packet with a
nonzero GIADDR, discards the packet if the GIADDR spoofs a GIADDR address implemented by the
local agent itself. Otherwise, the relay agent forwards any received DHCP packet with a valid non-zero
GIADDR without adding any relay agent options. The GIADDR value does not change.
To request the assignment of one or more IPv6 addresses, a client first locates a DHCP server, and then
requests the assignment of addresses and other configuration information from the server:
If a DHCP client does not need a DHCP server to assign it an IPv6 address, the client can obtain
configuration information such as a list of available DNS servers or NTP servers through a single
message and reply exchanged with a DHCP server.
IPv6 DHCP clients use link-local addresses to send and receive DHCP messages. To permit a DHCP
client to send a message to a DHCP server that is not attached to the same link, you must configure a
DHCP relay agent on the client link to relay messages between the client and server. The operation of
the relay agent is transparent to the client.
A relay agent relays messages from clients and messages from other relay agents. The switch supports
DHCP Relay for IPv6. Configure at least one relay agent when the client and server are in different
networks.
You must configure the relay agent to use a list of destination addresses for available DHCP servers. The
software does not support IPv6 multicast for site-local and global addresses.
The DHCP relay can be a Virtual Router Redundancy Protocol (VRRP) Address. The relay forwards the
DHCP messages only if VRRP is in the Master state, otherwise the relay discards the messages.
Note
DHCP cannot work on the backup VRRP if the master fails. To achieve optimum results and to
leverage redundancy, you must configure DHCP on the backup VRRP.
Clients listen for DHCP messages on UDP port 546. Servers and relay agents listen for DHCP messages
on UDP port 547.
Remote ID
IPv6 DHCP Relay supports the remote ID parameter (RFC4649). After you enable remote ID on the
switch, the relay agent adds information about the relay to DHCPv6 messages before relaying the
messages to the DHCP server. The server can use the supplied information in the process of assigning
the addresses, delegated prefixes, and configuration parameters that the client is to receive.
Limitations
The following list identifies configuration limitations:
• You can configure only one relay for a VLAN, regardless of how many addresses are configured on
that VLAN. The default address is the smallest address configured. If the relay is a VRRP address, the
default value is the first VRRP address configured.
• The maximum number of servers to which a relay can send a message from one client, is 10.
• You can configure the number of forwarding paths per system. For information on the maximum
limit, see VOSS Release Notes.
Note
There should be at least one relay agent when client and server are located in different
networks.
• A DHCP Relay IPv6 is established only between agents within the context of each VRF and when no
cross VRF interaction is present.
Note
All_DHCP_Servers multicast address option is not implemented for IPv6, as there is no
IPv6 MCAST support for site-local and global address.
UDP broadcast forwarding is a general mechanism for selectively forwarding limited UDP broadcasts
received on an IP interface out to other router IP interfaces as a rebroadcast or to a configured IP
address. If the address is that of a server, the packet is sent as a unicast packet to this address. If the
address is that of an interface on the router, the frame is rebroadcast.
After a UDP broadcast is received on a router interface, it must meet the following criteria to be eligible
for forwarding:
• It must be a MAC-level broadcast.
• It must be an IP limited broadcast.
• It must be for the specified UDP protocol.
• It must have a time-to-live (TTL) value of at least 2.
For each ingress interface and protocol, the policy specifies how the UDP broadcast is retransmitted: to
a unicast host address or to a broadcast address.
This section describes CLI commands for DHCP and User Datagram Protocol (UDP) configuration.
Procedure
configure terminal
2. Create the forwarding path from the client to the server:
ip dhcp-relay fwd-path <A.B.C.D> <A.B.C.D>
Note
If the agent IP address (the first <A.B.C.D> variable) is a VLAN or port IP address, you
must enable DHCP Relay on that VLAN or port by running ip dhcp-relay within the
VLAN context. However, if the first <A.B.C.D> variable is a VRRP address, you do not
need to enable DHCP Relay on the VLAN or port in which the VRRP address resides.
4. Modify DHCP mode to forward BOOTP messages only, DHCP messages only, or both:
ip dhcp-relay fwd-path <A.B.C.D> <A.B.C.D> mode <bootp|bootp_dhcp|
dhcp>
5. (Optional) Configure the forwarding path with source port 67 from client to the server.
ip dhcp-relay fwd-path {A.B.C.D} {A.B.C.D} src-port-67
Note
This step does not apply to VSP 8600 Series.
Example
Create the forwarding path from the client to the server. Enable the forwarding path from the client the
server. Modify DHCP mode to forward both BOOTP and DHCP messages. Configure the forwarding path
with source port 67 for BOOTP request.
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#ip dhcp-relay fwd-path 192.0.2.120 192.0.2.50
Switch:1(config)#ip dhcp-relay fwd-path 192.0.2.128 192.0.2.50 enable
Switch:1(config)#ip dhcp-relay fwd-path 192.0.2.128 192.0.2.50 mode bootp_dhcp
Switch:1(config)#ip dhcp-relay fwd-path 192.0.2.128 192.0.2.50 src-port-67
Variable Definitions
The following table defines parameters for the ip dhcp-relay fwd-path command.
Variable Value
{A.B.C.D} The {A.B.C.D} variable is the agent IP address configured
on an interface (a locally configured IP address).
{A.B.C.D} The {A.B.C.D} variable is the IP address of the DHCP server
in the network.
disable Disables DHCP Relay globally.
enable Enables DHCP Relay globally.
mode {bootp|bootp_dhcp| Modifies DHCP mode to forward BOOTP messages only, DHCP
dhcp> messages only, or both. The default is both.
src-port-67 Configures the UDP source port to 67 for BOOTP request. The
default is 68.
Note: Exception: not supported on
VSP 8600 Series.
For scaling information on DHCP Relay forwarding (IPv4 or IPv6), see VOSS Release Notes.
Procedure
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1#show ip dhcp-relay interface
================================================================================
Port Dhcp
================================================================================
PORT VRF MAX MIN ALWAYS CIRCUIT REMOTE TRUST
NUM NAME ENABLE HOP SEC MODE BCAST ID ID CIRC
--------------------------------------------------------------------------------
================================================================================
Vlan Dhcp
================================================================================
VLAN VRF MAX MIN ALWAYS CIRCUIT REMOTE TRUST
ID NAME ENABLE HOP SEC MODE BCAST ID ID CIRC
--------------------------------------------------------------------------------
Variable definitions
Use the data in the following table to use the show ip dhcp-relay command.
Variable Value
vrf WORD<1-16> The name of the VRF.
vrfids WORD<0-512> The ID of the VRF. The value is an integer in the
range of 0–512.
Use the data in the following table to use the show ip dhcp-relay interface command.
Variable Value
{slot/port[/ Identifies the slot and port in one of the following formats: a single slot and
sub-port][-slot/ port (slot/port), a range of slots and ports (slot/port-slot/port), or a series
port[/sub-port]] of slots and ports (slot/port,slot/port,slot/port). If the platform supports
[,...]} channelization and the port is channelized, you must also specify the sub-
port in the format slot/port/sub-port.
[vlan <1-4059>] Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN IDs
1 to 4059 are configurable and the system reserves VLAN IDs 4060 to
4094 for internal use. On switches that support the vrf-scaling and
spbm-config-mode boot configuration flags, if you enable these flags,
the system also reserves VLAN IDs 3500 to 3998. VLAN ID 1 is the default
VLAN and you cannot create or delete VLAN ID 1.
[vrf WORD<1-16>] Specifies the name of the VRF.
[vrfids Specifies the ID of the VRF. The value is an integer from 0– 512.
WORD<0-512>]
To configure the DHCP option 82 on a VLAN, you must enter the VLAN Interface Configuration mode.
To configure the DHCP option 82 on a brouter port, you must enter the GigabitEthernet Interface
Configuration mode.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Switch:1> enable
Switch:1# configure terminal
Switch:1(config)# interface gigabitethernet 1/10
Show statistics for option 82, which is the relay agent information option:
Switch:1(config-if)# show ip dhcp-relay counters option82
Variable Definitions
Use the data in the following table to configure the DHCP option 82.
Variable Value
circuitID Enables the Circuit ID.
remoteID Enables the Remote ID.
trusted Sets the circuit as trusted.
Use the data in the following table to use the show ip dhcp-relay counters option82 [vrf
WORD<1–16>] [vrfids WORD <0–512>] command.
Variable Value
vrf WORD<1–16> Displays DHCP counters for a particular VRF. WORD<1–16> specifies the
VRF name.
vrfids WORD <0–512> Displays a DHCP forward path for a particular VRF. WORD <0–512>
specifies the VRF ID.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Switch:1> enable
Switch:1# configure terminal
Switch:1(config)# interface gigabitethernet 1/10
Variable definitions
Use the data in the following table to use the ip dhcp-relay command.
Note
The no ip dhcp-relay command disables DHCP Relay, it does not delete the DHCP entry.
To configure this option to the default value, use the default operator with this command.
Variable Value
broadcast Enables the device to send the server reply as a broadcast
to the end station. After you disable this variable, the device
sends the server reply as a unicast to the end station. Use
the no operator to disable broadcast: no ip dhcp-relay
broadcast.
To configure this option to the default value, use the
default operator with this command.
circuitId Enables Option 82 circuit ID on the interface.
clear-counters Clears DHCP Relay counters for the interface.
fwd-path <A.B.C.D> [vrid Creates a forward path server with a virtual router ID (or
<1-255>] VRRP ID), a mode, and a state.
A.B.C.D is the IP address.
vrid <1-255> is the ID of the virtual router and is an
integer from 1 to 255.
Use the no operator to delete a forward path server with
a specific value and virtual router ID: no ip dhcp-relay
fwd-path <A.B.C.D> [vrid <1-255>]
To configure this option to the default value, use the
default operator with this command.
fwd-path <A.B.C.D> disable Disables a forward path server with a specific value and
[vrid <1-255>] virtual router ID.
A.B.C.D is the IP address.
vrid <1-255> is the ID of the virtual router (or VRRP ID)
and is an integer from 1 to 255.
fwd-path <A.B.C.D> enable Enables a forward path server with a specific value and
[vrid <1-255>] virtual router ID (or VRRP ID).
A.B.C.D is the IP address in the form a.b.c.d.
vrid <1-255> is the ID of the virtual router and is an
integer from 1 to 255.
fwd-path <A.B.C.D> Configures the forward path mode for a VLAN. This
mode <bootp|bootp_dhcp|dhcp> command string is available only in VLAN Interface
[vrid <1-255>] Configuration mode.
A.B.C.D is the IP address in the form a.b.c.d.
mode is a choice of bootp, dhcp, or bootp_dhcp.
vrid <1-255> is the ID of the virtual router (or VRRP ID)
and is an integer from 1 to 255.
To configure this option to the default value, use the
default operator with this command.
max-hop <1-16> Configures the maximum number of hops before a BootP/
DHCP packet is discarded (1 to 16). The default is 4.
To configure this option to the default value, use the
default operator with this command.
min-sec <0-65535> Configures the minimum seconds count for DHCP. If the secs
field in the BootP/DHCP packet header is greater than this
value, the device relays or forwards the packet; otherwise,
the packet is dropped (0 to 65535). The default is 0 seconds.
To configure this option to the default value, use the
default operator with this command.
Variable Value
mode <bootp|bootp_dhcp|dhcp> Configures DHCP mode to forward BootP messages only,
DHCP messages only, or both. The default is both.
To configure this option to the default value, use the
default operator with this command.
remoteId Enables Option82 remote ID on the interface.
trusted Configures the DHCP circuit as trusted.
Note
Slot and port information can differ depending on hardware platform.
Procedure
Example
================================================================================
Port Stats Dhcp
================================================================================
PORT_NUM VRF NAME NUMREQUEST NUMREPLY
--------------------------------------------------------------------------------
1/12 GlobalRouter 0 2
1/13 GlobalRouter 3 2
2/3 GlobalRouter 0 2
--------------------------------------------------------------------------------
Variable Definitions
Use the data in the following table to use the show interfaces GigabitEthernet
statistics dhcp-relay command.
Variable Value
vrf WORD<1-16> Specifies a VRF instance by VRF name.
vrfids WORD<0-255> Specifies the ID of the VRF.
{slot/port[/sub-port][-slot/port[/ Identifies the slot and port in one of the following
sub-port]][,...]} formats: a single slot and port (1/1).
Identifies the slot and port in one of the following
formats: a single slot and port (slot/port), a range
of slots and ports (slot/port-slot/port), or a series
of slots and ports (slot/port,slot/port,slot/port). If
the platform supports channelization and the port
is channelized, you must also specify the sub-port
in the format slot/port/sub-port.
Note
Slot and port information can differ depending on hardware platform.
Procedure
Example
Switch:1>show ip dhcp-relay counters option82
==========================================================================================
=====
DHCP Counters Option82 - GlobalRouter
==========================================================================================
=====
IP FOUND DROP CIRC ADD DEL REMOTE ADD DEL
INTERFACE ADDR OP82 PKT ID CIRC CIRC ID REMID REMID
------------------------------------------------------------------------------------------
-----
Port 1/12 0 0 395 0 0 00:24:7f:9d:0a:00 0 0
Vlan40 0 0 2088 0 0 00:24:7f:9d:0a:01 0 0
Variable Definitions
Use the data in the following table to use the show ip dhcp-relay counters command.
Variable Value
vrf WORD<1-16> Specifies a VRF instance by the VRF name.
vrfids WORD<0-512> Specifies the ID of the VRF.
By default, routers do not forward broadcasts. UDP broadcast forwarding is a generalized mechanism
for the router to selectively forward UDP broadcasts. You must set up UDP broadcast forwarding on the
system. Configure UDP broadcast forwarding to forward the UDP broadcasts of network applications to
the required server through physical or virtual router interfaces.
Procedure
Procedure
1. Enter either Global Configuration mode or VRF Router Configuration mode for a specific VRF
context:
enable
configure terminal
Example
================================================================================
Udp Protocol Tbl - GlobalRouter
================================================================================
UDP_PORT PROTOCOL_NAME
--------------------------------------------------------------------------------
37 Time Service
49 TACACS Service
53 DNS
69 TFTP
137 NetBIOS NameSrv
138 NetBIOS DataSrv
Variable definitions
Use the data in the following table to use the ip forward-protocol udp command.
Variable Value
<1-65535> WORD<1-15> Creates a new UDP protocol.
<1-65535> WORD<1-15> is the UDP protocol name as a string.
Use the no operator to delete a UDP protocol no ip forward-
protocol udp <1-65535>.
portfwd Displays portfwd information.
portfwdlist Displays port forward list information.
vrf WORD<1-16> Specifies the name of the VRF.
vrfids WORD<0-512> Specifies the ID of the VRF.
Procedure
1. Enter either Global Configuration mode or VRF Router Configuration mode for a specific VRF
context:
enable
configure terminal
Example
Variable definitions
Use the data in the following table to use the ip forward-protocol udp portfwd command.
Variable Value
<1-65535> {A.B.C.D} Adds a UDP protocol port to the specified port forwarding list.
1-65535 is a UDP protocol port in the range of 1–65535.
A.B.C.D is an IP address in a.b.c.d format.
Use the no operator to remove a protocol port forwarding entry
and IP address from the list: no ip forward-protocol udp
portfwd <1-65535> <A.B.C.D>.
To configure this option to the default value, use the default
operator with this command.
vrf WORD<1-16> Specifies the name of the VRF.
vrfids WORD<0-512> Specifies the ID of the VRF.
You can perform this procedure in Global Configuration mode, VLAN Interface Configuration mode, or
VRF Router Configuration mode.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Configure the UDP port forwarding list:
ip forward-protocol udp portfwdlist <1-1000>
Important
The following two steps are not available in the Global Configuration or VRF Router
Configuration mode. The following two commands are available in VLAN Interface
Configuration mode only.
Example
Switch:1> enable
Switch:1# configure terminal
Variable definitions
Use the data in the following table to use the ip forward-protocol udp portfwdlist
command.
Variable Value
<1-1000> Creates a UDP port forwarding list in the range of
1–1000.
<1–65535> {A.B.C.D} Adds a UDP protocol port to the specified port
forwarding list.
1-65535 is a UDP protocol port in the range of
1–65535.
A.B.C.D is an IP address in a.b.c.d format.
Use the no operator to remove or delete a port
forwarding list ID,
no ip forward-protocol udp
portfwdlist <1-1000> <1-65535>
<A.B.C.D>.
To configure this option to use the default value,
use the default operator with this command.
name WORD<0–15> Changes the name of the port forwarding list.
Use the data in the following table to use the ip forward-protocol udp command.
Variable Value
broadcastmask {A.B.C.D} Configures the interface broadcast mask (the interface broadcast
mask can be different from the interface mask).
A.B.C.D is an IP address in a.b.c.d format.
Use the no operator to delete the broadcast mask:
no ip forward-protocol udp broadcastmask
{A.B.C.D}
To configure this option to the default value, use the default
operator with this command.
maxttl <1-16> Configures the maximum time-to-live value (TTL) for the UDP
broadcast forwarded by the interface. The range is 1–16.
portfwdlist <1–1000> Assigns the list to the VLAN.
vlan <1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN
[portfwdlist <1–1000>] IDs 1 to 4059 are configurable and the system reserves VLAN IDs
4060 to 4094 for internal use. On switches that support the vrf-
scaling and spbm-config-mode boot configuration flags, if
you enable these flags, the system also reserves VLAN IDs 3500
to 3998. VLAN ID 1 is the default VLAN and you cannot create or
delete VLAN ID 1.
If you use the portfwdlist variable with the VLAN variable, it
assigns the list to the specified VLAN, regardless of which VLAN
context you currently configure.
Procedure
4. Display the UDP port forwarding list table for the specified list or all lists on the device:
show ip forward-protocol udp portfwdlist [vrf WORD<1-16>] [vrfids
WORD<0-512>]
5. Display the UDP protocol table with the UDP port numbers for each supported or designated
protocol:
show ip forward-protocol udp [vrf WORD<1-16>] [vrfids WORD<0-512>]
Example
Display the UDP protocol table with the UDP port numbers for each supported or designated protocol:
Switch:1>enable
Switch:1#show ip forward-protocol udp
================================================================================
Udp Protocol Tbl - GlobalRouter
================================================================================
UDP_PORT PROTOCOL_NAME
--------------------------------------------------------------------------------
37 Time Service
49 TACACS Service
53 DNS
69 TFTP
137 NetBIOS NameSrv
138 NetBIOS DataSrv
Variable Definitions
Use the data in the following table to use the show ip forward-protocol udp interface
command.
Variable Value
<A.B.C.D> Specifies the IP address for the interface in a.b.c.d format.
vrf WORD<1–16> Specifies the name of the VRF.
vrfids WORD<0–512> Specifies the ID of the VRF and is an integer in the range of 0
to 512.
To use DHCP Relay for IPv6, you must configure at least one forwarding path and enable the relay on
one interface.
For a VRF other than GlobalRouter, the interface must be first associated to that VRF.
The relay agent can use the IPv6 address of the interface or the VRRP global address linked to that
interface. The relay forwards the DHCP messages only if VRRP is in the master state, otherwise the relay
discards the messages.
You can configure only one relay agent on an interface. If you need to change the relay agent, you must
delete all the forwarding paths with the old relay agent, and then configure the new relay agent.
For scaling information on DHCP Relay forwarding paths, see VOSS Release Notes.
Procedure
1. Enter either Global Configuration mode or VRF Router Configuration mode for a specific VRF
context:
enable
configure terminal
If you configure the forwarding path globally, the relay agent address can be any configured IP
address of the relay interface or the VRRP global address linked to the relay interface.
3. To configure a forwarding path on an interface, enter Interface Configuration mode:
interface GigabitEthernet {slot/port[/sub-port] [-slot/port[/sub-
port]] [,...]}
OR
If you configure the forwarding path on an interface, the relay agent address is either the smallest
IP configured on the interface or the first VRRP global address configured, if the relay is the VRRP
master. You do not specify the relay agent address as part of the command.
Note
IPv6 DHCP Relay is established only between agents within the context of each VRF.
Examples
Configure a forwarding path globally:
Switch:1(config)#ipv6 dhcp-relay fwd-path 1111::1111 1234::1234 enable
Variable Definitions
Use the data in the following table to use the ipv6 dhcp-relay fwd-path command.
Variable Value
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN IDs 1
to 4059 are configurable and the system reserves VLAN IDs 4060 to 4094
for internal use. On switches that support the vrf-scaling and spbm-
config-mode boot configuration flags, if you enable these flags, the system
also reserves VLAN IDs 3500 to 3998. VLAN ID 1 is the default VLAN and you
cannot create or delete VLAN ID 1.
enable Enables the forwarding path. The default is disabled.
{slot/port[/ Identifies the slot and port in one of the following formats: a single slot and
sub-port][-slot/ port (slot/port), a range of slots and ports (slot/port-slot/port), or a series
port[/sub-port]] of slots and ports (slot/port,slot/port,slot/port). If the platform supports
[,...]} channelization and the port is channelized, you must also specify the sub-port
in the format slot/port/sub-port.
vrid WORD<1-255> Specifies the VRRP ID to use the VRRP master as the relay agent interface.
WORD<0-255> Specifies the IPv6 address of the DHCP server for the interface configuration.
WORD<0-255> Specifies the IPv6 address of the relay agent interface and the IPv6 address of
WORD<0-255> the DHCP server for the global configuration.
You can configure only one relay for a VLAN, regardless of how many addresses are configured on that
VLAN. The default address is the smallest address configured. If the relay is a VRRP address, the default
value is the first VRRP address configured.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Variable Definitions
Use the data in the following table to use the ipv6 dhcp-relay command.
Variable Value
max-hop <1–32> Specifies the maximum number of hops a DHCP packet can take from the DHCP
client to the DHCP server. The default is 32.
remote-id Enables the relay agent to add information about the relay to DHCPv6 messages
before relaying the messages to the DHCP server. The default is disabled
Use the data in the following table to use the interface command.
Variable Value
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN IDs 1 to 4059
are configurable and the system reserves VLAN IDs 4060 to 4094 for internal
use. On switches that support the vrf-scaling and spbm-config-mode boot
configuration flags, if you enable these flags, the system also reserves VLAN IDs
3500 to 3998. VLAN ID 1 is the default VLAN and you cannot create or delete
VLAN ID 1.
{slot/port[/ Identifies the slot and port in one of the following formats: a single slot and port
sub-port][- (slot/port), a range of slots and ports (slot/port-slot/port), or a series of slots and
slot/port[/ ports (slot/port,slot/port,slot/port). If the platform supports channelization and
sub-port]] the port is channelized, you must also specify the sub-port in the format slot/port/
[,...]} sub-port.
Procedure
Note
The no ipv6 dhcp-relay command disables DHCP on the interface but does not
delete the entry.
Example
Switch:1(config-if)#show ipv6 dhcp-relay fwd-path
================================================================================
DHCPv6 Fwd-path - GlobalRouter
================================================================================
INTERFACE SERVER ENABLE
--------------------------------------------------------------------------------
1111:0:0:0:0:0:0:1111 1234:0:0:0:0:0:0:1234 enable
Variable Definitions
Use the information in the following table to help you use the show ipv6 dhcp-relay command.
Variable Value
{slot/port[/sub- Identifies the slot and port in one of the following formats: a single slot
port][-slot/port[/ and port (slot/port), a range of slots and ports (slot/port-slot/port), or
sub-port]][,...]} a series of slots and ports (slot/port,slot/port,slot/port). If the platform
supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
vlan<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN IDs
1 to 4059 are configurable and the system reserves VLAN IDs 4060 to
4094 for internal use. On switches that support the vrf-scaling and
spbm-config-mode boot configuration flags, if you enable these flags,
the system also reserves VLAN IDs 3500 to 3998. VLAN ID 1 is the default
VLAN and you cannot create or delete VLAN ID 1.
vrf WORD<1–16> Specifies the VRF name.
vrfids WORD<0–512> Specifies the VRF ID.
Procedure
Note
Use the sys action reset counters command to clear DHCP Relay statistics.
Example
Switch:1#show ipv6 dhcp-relay counters
================================================================================
DHCPv6 Counters
================================================================================
INTERFACE REQUESTS REPLIES
--------------------------------------------------------------------------------
1111:0:0:0:0:0:0:1111 1 1
User datagram protocol (UDP) is a connectionless protocol that adds reliability and multiplexing to IP.
It describes how messages reach application programs within a destination computer. Some network
applications, such as the NetBIOS name service, rely on a UDP broadcast to request a service or to
locate a service. By default, broadcasts are not forwarded by a router. UDP broadcast forwarding is a
generalized mechanism for the router to selectively forward UDP broadcasts.
Important
BootP/DHCP relays are supported only on IP routed port-based VLANs and protocol-based
VLANs.
You must enable DHCP relay on the path for port or VLAN configuration to take effect.
Use the DHCP tab to configure the DHCP behavior on a brouter port or a VRF instance. The DHCP tab is
available only if the port is routed (that is, assigned an IP address).
Procedure
Name Description
Enable Lets you use BootP/DHCP on the port. The default is disable.
MaxHop Sets the maximum number of hops before a BootP/DHCP packet is
discarded (1 to 16). The default is 4.
MinSec The secs field in the BootP/DHCP packet header represents the elapsed time
since the client first sent the message. If the secs field in the packet header is
greater than this value, the system relays or forwards the packet; otherwise,
the packet is dropped. The default is 0 seconds.
Mode Sets the interface to process only BootP, only DHCP, or both types of
packets. The default is both.
AlwaysBroadcast When enabled, the server reply is sent as a broadcast back to the end
station. The default is disable.
CircuitId Indicates whether DHCP Relay inserted the option 82 circuit ID information
into the DHCP packets before sending the DHCP packets to the DHCP server.
The default is disable.
RemoteId Indicates whether DHCP Relay inserted the option 82 remote ID information
into the DHCP packets before sending the DHCP packets to the DHCP server.
The default is disable.
Trusted Indicates if DHCP packets come through a trusted DHCP circuit. Only
packets with GIADDR configured to 0 and containing option 82 are
forwarded if the circuit is trusted. The default value is false.
Use the DHCP Relay tab to configure the DHCP behavior on a VLAN. The DHCP Relay tab is available
only if the VLAN is routed and is assigned an IP address.
Procedure
1. In the navigation tree, expand the following folders: Configuration > VLAN.
2. Click VLANs > Basic.
3. Select a VLAN.
4. Click IP.
5. Click the DHCP Relay tab.
6. Select Enable.
7. Configure the parameters as required.
8. Click Apply.
Variable Value
Enable Lets you use BootP/DHCP on the port. The default
is disable.
MaxHop Sets the maximum number of hops a BootP/DHCP
packet can take from the DHCP client to the DHCP
server. The maximum number of hops is 16. The
default is 4.
MinSec Represents the minimum number of seconds
to wait between receiving a DHCP packet and
forwarding the DHCP packet to the DHCP server.
A value of 0 indicates that forwarding is done
immediately. The default value is 0.
Mode Indicates the type of DHCP packet required. The
options are:
• bootp
• dhcp
• both
The default is both.
AlwaysBroadcast When enabled, the DHCP Reply packets are sent
as a broadcast to the DHCP client. The default is
disable.
CircuitId Indicates whether DHCP Relay inserted the option
82 circuit ID information into the DHCP packets
before sending the DHCP packets to the DHCP
server. The default is disable.
Variable Value
RemoteId Indicates whether DHCP Relay inserted the option
82 remote ID information into the DHCP packets
before sending the DHCP packets to the DHCP
server. The default is disable.
Trusted Indicates if DHCP packets come through a
trusted DHCP circuit. Only packets with GIADDR
configured to 0 and containing option 82 are
forwarded if the circuit is trusted. The default
value is false.
After you configure the BOOTP/DHCP relay on an IP interface, you can configure forwarding paths to
indicate where packets are forwarded. The forwarding paths are based on the type of packet and where
the packet is received.
Procedure
Note
This step does not apply to VSP 8600 Series.
Name Description
AgentAddr The IP address of the input interface (agent)
on which the BOOTP/DHCP request packets are
received for forwarding. This address is the IP
address of either a brouter port or a VLAN for
which forwarding is enabled.
ServerAddr This parameter is either the IP address of the
BOOTP/DHCP server or the address of another
local interface.
• If it is the address of the BOOTP/DHCP server,
the request is unicast to the server address.
• If the address is one of the IP addresses
of an interface on the system, the BOOTP/
DHCP requests are broadcast out of that local
interface.
Use the DHCP Relay Interfaces tab to view configuration information about the DHCP relay. To change
the configuration information, double-click the value in the field under the required interface, and enter
a new value.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IP.
2. Click DHCP Relay.
3. Click the Interfaces tab.
Variable Value
IfIndex A read-only interface number that represents a
physical interface, or the VLAN logical interface.
MaxHop Sets the maximum number of hops a DHCP
packet can take from the DHCP client to the DHCP
server. The maximum number of hops is 16. The
default is 4.
MinSec Represents the minimum number of seconds
to wait between receiving a DHCP packet and
forwarding the DHCP packet to the DHCP server.
A value of 0 indicates that forwarding is done
immediately. The default value is 0.
Mode Indicates the type of DHCP packet required. The
options are:
• bootp
• dhcp
• both
The default is both.
AlwaysBroadcast Indicates if DHCP Reply packets can be sent as a
broadcast to the DHCP client. The default is false.
CircuitId Indicates whether DHCP Relay inserted the option
82 circuit ID information into the DHCP packets
before sending the DHCP packets to the DHCP
server. The default is disable.
RemoteId Indicates whether DHCP Relay inserted the option
82 remote ID information into the DHCP packets
before sending the DHCP packets to the DHCP
server. The default is disable.
Trusted Indicates if DHCP packets come through a
trusted DHCP circuit. Only packets with GIADDR
configured to 0 and containing option 82 are
forwarded if the circuit is trusted. The default
value is false.
Procedure
Name Description
IfIndex Identifies the physical interface.
AgentAddr Shows the IP address configured as the relay on this interface. This
address is either the IP of the physical interface or the IP of the VRRP
address.
NumRequests Shows the number of DHCP and BootP requests on this interface.
NumReplies Shows the number of DHCP and BootP replies on this interface.
Procedure
Name Description
NumRequests The number of DHCP and/or BootP requests on this interface.
NumReplies The number of DHCP and/or BootP replies on this interface.
Procedure
Name Description
NumRequests The number of DHCP and BootP requests on this interface.
NumReplies The number of DHCP and BootP replies on this interface.
Procedure
1. In the navigation pane, expand the Configuration > IP folders.
2. Click DHCP-Relay.
3. Click the Option 82 Stats tab.
Name Description
IfIndex Shows the name of the interface on which you
enabled option 82. Shows the port number if the
interface is a brouter port or the VLAN number if
the interface is a VLAN.
AgentAddr Shows the IP address configured as the relay on
this interface. This address is either the IP of the
physical interface or the IP of the VRRP address.
FoundOp82 Shows the number of packets that the interface
received that already had option82 in them.
Dropped Shows the number of packets the interface
dropped because of option 82–related issues.
These reasons could be that the packet was
received from an untrusted source or spoofing
was detected. To determine the cause of the drop,
you must enable trace on level 170.
CircuitId Shows the value inserted in the packets as the
circuit ID. The value is the index of the interface.
AddedCircuitId Shows how many packets (requests from client
to server) the circuit ID was inserted for that
interface.
If you expect this value to increase but it does
not, and the interface does not drop a packet, it is
possible the packet does not have enough space
to insert the option. You must enable trace on
level 170 to determine the cause.
Name Description
RemovedCircuitId Shows how many packets (replies from server
to client) the circuit id was removed for that
interface.
RemoteId Shows the value inserted in the packets as the
remote ID. The value is the MAC address of the
interface.
AddedRemoteId Shows how many packets (requests from client
to server) the remote ID was inserted for that
interface.
If you expect this value to increase but it does
not, and the interface does not drop a packet, it is
possible the packet does not have enough space
to insert the option. You must enable trace on
level 170 to determine the cause.
RemovedRemoteId Shows how many packets (replies from server
to client) the remote ID was removed for that
interface.
Procedure
Name Description
NumRequests The number of DHCP and BootP requests on this interface.
NumReplies The number of DHCP and BootP replies on this interface.
You can use these protocols to create forwarding entries and lists but you cannot delete them; you can
add or remove other protocols to the list of protocols.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IP.
2. Click UDP Forwarding.
3. Click Insert.
4. In the PortNumber field, type a UDP port number.
This number defines the UDP port used by the server process as its contact port. The range is from 1
to 65535 and cannot be one of the UDP port numbers or a number previously assigned.
5. In the Name field, type a name for the protocol.
6. Click Insert.
The protocol is added to the Protocol table. After you create a protocol, you cannot change its name
or number.
Name Description
PortNumber Defines the UDP port (1 to 65535).
Specifies an administratively assigned name for this list (0 to
Name
15 characters).
You manage UDP forwarding by defining the destination addresses for the UDP protocol.
Procedure
4. Click Insert.
5. In the Insert Forwardings dialog box, select a destination UDP port from the defined protocols in the
DestPort box.
6. Enter a destination IP address in the DestAddr box.
The destination address can be any IP server address for the protocol application or the IP address
of an interface on the router.
7. Click Insert. The information is added to the Forwarding tab.
Name Description
DestPort Specifies the port number defined for UDP, depending
upon the protocol type.
DestAddr Specifies the destination address can be any IP server
address for the protocol application or the IP address of
an interface on the router:
• If the address is that of a server, the packet is sent as
a unicast packet to this address.
• If the address is that of an interface on the router, the
frame is rebroadcast.
A forwarding profile is a collection of port and destination pairs. When you configure UDP forwarding
list entries, be sure to first configure the UDP forwarding list. Then, configure your UDP forwarding list
entries and assign them to a UDP forwarding list. If you do not assign a UDP forwarding list entry to at
least one UDP forwarding list, the UDP forwarding list is lost after a restart.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IP.
2. Click UDP Forwarding.
3. Click the Forwarding Lists tab.
4. Click Insert.
5. In the Id field, type the forwarding list ID.
6. In the Name field, type the name of the forwarding list if required.
The system displays the forwarding list in the FwdIdList box.
7. Click Insert.
Name Description
Id Specifies a value that uniquely identifies this list of entries (1 to 1000).
Name Specifies an administratively assigned name for this list (0 to 15 characters).
FwdIdList Specifies the zero or more port forwarding entries associated with this list.
Each list identifier is stored as 2 bytes in this array, starting from 0 bytes
(size=64). Clicking on the ellipsis (...) button in this field displays the ID list.
Manage the broadcast interface by specifying and displaying which router interfaces can receive UDP
broadcasts to forward.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IP.
2. Click UDP Forwarding.
3. Click the Broadcast Interfaces tab.
4. Click Insert.
5. In the LocalIfAddr field, click the ellipsis (...) to select a local interface IP address from the list, and
then click OK.
6. In the UdpPortFwdListId field, click the ellipsis (...) to select a forwarding list ID from the list, and
then click OK.
7. In the MaxTtl field, type the maximum number of hops an IP broadcast can take from the source
device to the destination device (the default is 4; the range is 1 to 16).
8. In the BroadCastMask field, enter the subnet mask of the local interface that broadcasts the UDP
broadcast packets.
When you configure the UDP forwarding broadcast mask, the broadcast mask must be less specific
(shorter in length) or equally specific (equal in length) to the subnet mask of the IP interface on
which it is configured. If the UDP forwarding broadcast mask is more specific than the subnet mask
of the corresponding IP interface, UDP forwarding does not function properly.
9. Click Insert.
Name Description
LocalIfAddr Specifies the IP address of the local router interface that
receives forwarded UDP broadcast packets.
UdpPortFwdListId Specifies the number of the UDP lists or profiles that this
interface is configured to forward (0 to100). A value of
0 indicates that the interface cannot forward any UDP
broadcast packets.
MaxTtl Specifies the maximum number of hops an IP broadcast
packet can take from the source device to the destination
device (the default is 4; the range is 1 to 16).
NumRxPkts Specifies the total number of UDP broadcast packets
received by this local interface.
NumFwdPkts Specifies the total number of UDP broadcast packets
forwarded by this local interface.
NumDropPktsMaxTtlExpired Specifies the total number of UDP broadcast packets
dropped because the time-to-live (TTL) value expired.
NumDropPktsDestUnreach Specifies the total number of UDP broadcast packets
dropped because the destination was unreachable.
NumDropPktsUnknownPort Specifies the total number of UDP broadcast packets
dropped because the destination port or protocol specified
has no matching forwarding policy.
BroadCastMask Specifies the subnet mask of the local interface that
broadcasts the UDP broadcast packets.
You can use UDP endpoint information to display local and remote UDP activity.
Since UDP is a protocol used to establish connectionless network sessions, you need to monitor local
and remote UDP activity and to know which applications are running over UDP.
You can determine which applications are active by checking the port number.
Processes are further identified with a UDP session to allow for the multiplexing of a port mapping for
UDP.
Procedure
Name Description
LocalAddressType Displays the local address type (IPv6 or IPv4).
LocalAddress Displays the local IPv6 address.
LocalPort Displays the local port number.
RemoteAddressType Displays the remote address type (IPv6 or IPv4).
RemoteAddress Displays the remote IPv6 address.
RemotePort Displays the remote port number.
Instance Distinguishes between multiple processes
connected to the UDP endpoint.
Process Displays the ID for the UDP process.
To use DHCP Relay for IPv6, you must configure at least one forwarding path and enable the relay on
one interface.
Change the VRF instance as required to configure a DHCP Relay forwarding path on a specific VRF
instance. Not all parameters are configurable on non-default VRFs.
The relay agent can use the IPv6 address of the interface or the VRRP global address linked to that
interface. The relay forwards the DHCP messages only if VRRP is in the Master state, otherwise the relay
discards the messages.
You can configure only one relay agent on an interface. If you need to change the relay agent, you must
delete all the forwarding paths with the old relay agent, and then configure the new relay agent.
For scaling information on DHCP Relay forwarding paths, see VOSS Release Notes.
Procedure
5. In the AgentAddr field, type the address of the input interface that forwards the packets.
6. In the ServerAddr field, type the address of the DHCP server.
7. Select Enabled.
8. Select Insert.
Name Description
AgentAddr Specifies the IP address of the input interface
(relay agent) on which the DHCP request packets
are received for forwarding. This address is the
IPv6 or VRRP global address of either a brouter
port or a VLAN for which forwarding is enabled.
ServerAddr Specifies the IP address of the DHCP server. The
request is unicast to the server address.
Enabled Enables DHCP Relay for the system. The default is
disabled (clear).
Change the VRF instance as required to configure DHCP Relay for an interface on a specific VRF
instance. Not all parameters are configurable on non-default VRFs.
You can configure only one relay for a VLAN, regardless of how many addresses are configured on that
VLAN. The default address is the smallest address configured. If the relay is a VRRP address, the default
value is the first VRRP address configured.
You can modify the DHCP Relay configuration for a brouter port through the Edit > Port > IPv6
navigation path, and for a VLAN through the VLAN > VLANs > Basic > IPv6 navigation path. This
procedure uses the main IPv6 navigation path where you can configure both types of interfaces.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IPv6.
2. Click DHCP Relay.
3. Click the Interface tab.
4. Click Insert.
5. Beside the IfIndex field, click Port or Vlan.
6. Select a port or VLAN, and then click OK.
7. Click Insert.
Name Description
IfIndex Shows the unique value to identify an IPv6
interface. For the brouter port, the value is the
ifindex of the port and, in the case of the VLAN,
the value is the ifindex of the VLAN.
MaxHop Specifies the maximum number of hops a DHCP
packet can take from the DHCP client to the DHCP
server. The default is 32.
RemoteIdEnabled Enables the relay agent to add information about
the relay to DHCPv6 messages before relaying
the messages to the DHCP server. The default is
disabled (clear or false).
You can configure only one relay for a VLAN, regardless of how many addresses are configured on that
VLAN. The default address is the smallest address configured. If the relay is a VRRP address, the default
value is the first VRRP address configured.
Procedure
1. In the navigation tree, expand the following folders: Configuration > VLAN.
2. Click VLANs.
3. Click the Basic tab.
4. Select a VLAN.
5. Click IPv6.
6. Click the DHCP Relay tab.
7. Double-click a cell to change the value.
8. Click Apply.
Name Description
IfIndex Shows the unique value to identify an IPv6
interface.
MaxHop Specifies the maximum number of hops a DHCP
packet can take from the DHCP client to the DHCP
server. The default is 32.
Name Description
RemoteIdEnabled Enables the relay agent to add information about
the relay to DHCPv6 messages before relaying
the messages to the DHCP server. The default is
disabled (clear or false).
DhcpEnabled Enables (true) or disables (false) DHCP Relay
for an interface with an existing DHCP Relay
configuration.
The default address is the smallest address configured. If the relay is a VRRP address, the default value
is the first VRRP address configured.
Procedure
Name Description
IfIndex Shows the unique value to identify an IPv6
interface. For the brouter port, the value is the
ifindex of the port and, in the case of the VLAN,
the value is the ifindex of the VLAN.
MaxHop Specifies the maximum number of hops a DHCP
packet can take from the DHCP client to the DHCP
server. The default is 32.
Name Description
RemoteIdEnabled Enables the relay agent to add information about
the relay to DHCPv6 messages before relaying
the messages to the DHCP server. The default is
disabled (clear or false).
DhcpEnabled Enables (true) or disables (false) DHCP Relay
for an interface with an existing DHCP Relay
configuration.
The system displays this field on the DHCP
Relay tab for a brouter port only if you modify
an existing configuration. The system does not
display this field if you create a new DHCP Relay
port configuration.
Procedure
Name Description
IfIndex Identifies the physical interface.
NumRequests Shows the number of DHCP and BootP requests on this interface.
NumReplies Shows the number of DHCP and BootP replies on this interface.
Procedure
Name Description
NumRequests Shows the number of DHCP and BootP requests
on this interface.
NumReplies Shows the number of DHCP and BootP replies on
this interface.
The following sections provide information on the Domain Name Service (DNS) implementation for the
switch.
DNS fundamentals
This section provides conceptual material on the Domain Name Service (DNS) implementation for the
switch. Review this content before you make changes to the configurable DNS options.
DNS client
Every equipment interface connected to a Transmission Control Protocol over IP (TCP/IP) network is
identified with a unique IPv4 or IPv6 address. You can assign a name to every machine that uses an
IPv4 or IPv6 address. The TCP/IP does not require the usage of names, but these names make the task
easier for network managers in the following ways:
• An IP client can contact a machine with its name, which is converted to an IP address, based on
a mapping table. All applications that use this specific machine do not depend on the addressing
scheme.
• It is easier to remember a name than a full IP address.
To establish the mapping between an IP name and an IPv4 or an IPv6 address you use the Domain
Name Service (DNS). DNS is a hierarchical database that you can distribute on several servers for
backup and load sharing. After you add a new hostname, update this database. The information is sent
to all the different hosts. An IP client that resolves the mapping between the hostname and the IP
address sends a request to one of the database servers to resolve the name.
After you establish the mapping of IP name and IP address, the application is modified to use a
hostname instead of an IP address. The switch converts the hostname to an IP address.
If the entry to translate the hostname to IP address is not in the host file, the switch queries the
configured DNS server for the mapping from hostname to IP address. You can configure connections for
up to three different DNS servers—primary, secondary and tertiary. First the primary server is queried,
and then the secondary, and finally the tertiary.
The DNS client tracks any server addresses or domain names provided from a DHCP server. If a DHCP
server provides info to the DNS client, the DNS configuration is classified as dynamic. You can manually
delete dynamic DNS entries, but cannot manually add dynamic DNS entries. You can view the Dynamic
DNS entries with show ip dns or show sys dns. Dynamic DNS entries are not saved in the
configuration file. The status monitoring of DNS occurs every 60 seconds.
DNS modifies Ping, Telnet, and copy applications. You can enter a hostname or an IP address to invoke
Ping, Telnet, and copy applications.
A log/debug report is generated for all the DNS requests sent to DNS servers and all successful DNS
responses received from the DNS servers.
IPv6 Support
The Domain Name Service (DNS) used by the switch supports both IPv4 and IPv6 addresses with no
difference in functionality or configuration.
Configure the Domain Name Service to establish the mapping between an IP name and an IPv4 or IPv6
address. DNS supports IPv4 and IPv6 addresses with no difference in
You can configure connection for up to three different DNS servers—primary, secondary and tertiary.
First the primary server is queried, and then the secondary, and finally the tertiary.
Procedure
configure terminal
2. Configure the DNS client:
ip domain-name WORD<0–255>
3. (Optional) Add addresses for primary, secondary, or tertiary DNS servers:
ip name-server <primary|secondary|tertiary> WORD<0–46>
4. (Optional) Delete addresses for primary, secondary, or tertiary DNS servers:
no ip name-server <primary|primary-dynamic|secondary|secondary-
dynamic|tertiary|tertiary-dynamic> WORD<0–46>
5. View the DNS client system status:
show ip dns
Example
Switch:1> enable
Variable Definitions
The following table defines parameters for the ip domain-name command.
Variable Value
WORD<0–255> Configures the default domain name.
WORD<0–255> is a string 0–255 characters.
Variable Value
primary|secondary|tertiary WORD<0– Configures the primary, secondary, or tertiary
46> DNS server address. Enter the IP address in
a.b.c.d format for IPv4 or hexadecimal format
(string length 0–46) for IPv6. You can specify
the IP address for only one server at a time; you
cannot specify all three servers in one command.
Use the no operator before this parameter, no
ip name-server <primary|secondary|
tertiatry>
You can enter either a hostname, an IPv4 or IPv6 address. If you enter the hostname, this command
shows the IP address that corresponds to the hostname and if you enter an IP address, this command
shows the hostname for the IP address. DNS supports IPv4 and IPv6 addresses with no difference in
functionality or configuration using CLI.
Procedure
Example
Switch:1> enable
Variable Definitions
The following table defines parameters for the show hosts command.
Variable Value
WORD<0–256> Specifies one of the following:
• the name of the host DNS server as a string of
0–256 characters.
• the IP address of the host DNS server in a.b.c.d
format.
• The IPv6 address of the host DNS server in
hexadecimal format (string length 0–46).
DNS supports IPv4 and IPv6 addresses with no difference in functionality or configuration except for
the following. Under the DNS Servers tab, in the DnsServerListAddressType box, you must select ipv4
or ipv6.
You can configure connections for up to three different DNS servers—primary, secondary and tertiary.
First the primary server is queried, and then the secondary, and finally the tertiary.
DNS supports IPv4 and IPv6 addresses. Under the DNS Servers tab, in the DnsServerListAddressType
box, you must select ipv4 or ipv6.
Procedure
Name Description
DnsServerListType Configures the DNS server as primary, secondary, or
tertiary.
OR
Removes a DNS server as primary, primaryDynamic,
secondary, secondaryDynamic, tertiary, or tertiaryDynamic.
DnsServerListAddressType Configures the DNS server address type as IPv4 or IPv6.
DnsServerListAddress Specifies the DNS server address.
DnsServerListStatus Specifies the status of the DNS server.
DnsServerListRequestCount Specifies the number of requests sent to the DNS server.
DnsServerListSuccessCount Specifies the number of successful requests sent to the
DNS server.
You can enter either a hostname or an IPv4 or IPv6 address. If you enter the hostname, this command
shows the IP address that corresponds to the hostname and if you enter an IP address, this command
shows the hostname for the IP address. DNS supports IPv4 addresses with no difference in functionality
or configuration in this procedure.
Procedure
Name Description
HostData Enter hostname or host IPv4 or IPv6 address to be identified.
HostName Identifies the host name. This variable is a read-only field.
HostAddressType Identifies the address type of the host.
HostAddress Identifies the host IP address. This variable is a read-only field.
HostSource Identifies the DNS server IP or host file. This variable is a read-only
field.
Distributed Virtual Routing (DvR) is a technology for router redundancy in a Fabric deployment where
IP subnets are stretched across multiple switches. DvR provides Default Gateway Redundancy and
optimizes traffic flows to avoid traffic tromboning due to inefficient routing, thereby increasing the total
routing throughput.
The topics in this section provide DvR concepts and configuration procedures.
For typical Campus DvR deployments, configure aggregation layer switches as DvR Controllers. Wiring
closet access switches are then typically dual-homed to a pair of DvR Controllers.
IP subnets, which stretch between aggregation layer switches and multiple wiring closets, enable
seamless IP roaming for wireless users while at the same time ensure optimal traffic forwarding.
To optimize automation, Fabric Attach is typically deployed between wiring closet and aggregation
switches. In this construct, there would likely be no DvR Leaf configured.
In Fabric deployments, DvR replaces VRRP (with VRRP-BackupMaster or RSMLT). The operator can
chose for each I-SID/IP subnet what router redundancy method to use.
To migrate to a DvR-enabled I-SID/IP subnet, all member Fabric switches of this I-SID must be either
DvR Controllers or DvR Leafs. You can connect non Fabric switches to DvR Leafs and DvR Controllers
with manual configuration or Fabric Attach configuration. Until all Fabric switches that are members of
the I-SID/IP subnet are DvR-enabled, use VRRP or RSMLT as the router redundancy protocol.
DvR Domain
To enable multi-site DvR deployments, a DvR domain concept has been introduced. Within a DvR
domain, a set of up to eight DvR Controllers control the DvR domain Leaf switches. A domain can also
include just DvR controllers without DvR Leafs. Typically, a DvR domain is restricted to one physical
location. Traffic leaving this physical location always passes through DVR Controllers.
A DvR domain is a logical group of switches or nodes that are DvR enabled. These nodes are not
physically connected but are connected over the SPB Fabric such that each node is aware of the BMAC
addresses of all other nodes within the domain. A DvR domain does not contain nodes that are not DvR
enabled. However, those nodes can coexist with other DvR enabled nodes within the same SPB Fabric
network.
You configure a common DvR domain ID for all nodes belonging to a DvR domain. This domain ID
translates internally to a Domain Data Distribution (DDD) I-SID. All switch nodes that share the same
DvR domain ID or DDD I-SID receive the Layer 3 information that is distributed from all other nodes
belonging to that DvR domain.
A DvR domain can contain multiple Layer 3 VSNs and Layer 2 VSNs. Layer 2 and Layer 3 VSNs can span
multiple DvR domains.
1. DvR Controller(s)
2. DvR Leaf nodes
For scaling information on the number of Controllers and Leaf nodes to configure in a DvR domain, see
VOSS Release Notes.
DvR Controller
In a DvR domain, the Controller nodes are the central nodes on which Layer 3 is configured. They own
all the Layer 3 configuration and push the configuration information to the Leaf nodes within the SPB
network.
A DvR domain can have one or more controllers for redundancy and you must configure every Layer 2
VSN (VLAN) and Layer 3 VSN within the domain, on the Controller(s). A node that you configure as a
DvR Controller is considered the controller for all the Layer 2 and Layer 3 VSNs configured on that node.
A Controller is configured with its own subnet IP address for every DvR enabled Layer 2 VSN within the
domain.
All Layer 2 VSNs on a DvR Controller need not be DvR enabled. A controller can be configured with
individual Layer 2 VSNs that are DvR disabled.
The Layer 3 configuration data that is pushed to the Leaf nodes include the Layer 3 IP subnet
information for all Layer 2 VSNs within the DvR domain. It also includes the IP routes learned
or redistributed by the Controllers from networks outside the SPB network, into the DvR Domain.
Controllers also send information on whether Multicast is enabled on a specific DvR enabled Layer 2
VSN, and the version of IGMP. DvR Controllers inject a default route into the DvR domain for external
route reachability. Use route policies to inject specific routes into a DvR domain or inject host routes into
OSPF or BGP.
Note
When sFlow operates in a DvR domain and DvR Leaf nodes use the management CLIP
address as the sFlow agent IP, DvR Leaf nodes always report the sFlow collector as reachable
because DvR Controllers inject a default route into the DvR domain. You can use the dvr
controller inject-default-route-disable command to withdraw the route and
force DvR Leaf nodes to use either a DvR host route, a direct, or a static route that the DvR
Controller can redistribute. The best practice is to perform appropriate analysis before you use
this setting.
A Controller can only belong to one DvR domain, based on the domain ID that you configure on the
node.
DvR Controllers include all DvR Leaf functions, thus a Leaf node free deployment is a valid network
deployment. Especially if you use DvR in Campus deployments to replace VRRP or RSMLT, a Controller-
only deployment, as Fabric Attach server nodes, is a valid deployment option.
A DvR Leaf node also monitors local host attachments and communicates updates about the current
state of those host attachments to the DvR domain. All DvR nodes exchange host attachment
information using the DvR host distribution protocol, which leverages a DvR domain I-SID.
DvR leaf nodes are managed in-band through a local loopback address, which is exchanged using the IP
Shortcut protocol.
DvR backbone
The DvR backbone is automatically established among the DvR Controllers from all DvR domains. Every
Controller node has an edge gateway to its DvR domain, to the DvR backbone and all other non-DvR
domains within the network.
Controllers exchange host route information such that any host can be reached in a shortcut switched
manner, irrespective of its location. For these host route information exchanges, controllers use an
automatically assigned backbone I-SID. Local subnets to the Controllers are automatically injected into
the DvR host route exchanges.
To redistribute DvR host routes into OSPF or BGP, you can configure route policies. These host routes
are not injected into IS-IS.
DvR operation
In a DvR domain, DvR enabled Controller(s) handle the learning and distribution of Layer 3
configuration and route data to the DvR enabled Leaf nodes. The Leaf nodes in turn, use this data
to automatically create distributed Layer 3 datapaths on themselves. In this way, Layer 3 configuration
and learning remains only with the Controller(s) and there are distributed Layer 3 datapaths at the
edges of the fabric network. This allows for destination lookups at the edge to happen quickly, and
traffic is sent directly to their destinations without multiple lookups.
An important benefit of DvR is that only minimal configuration is required on the Leaf node. Based on
the Layer 2 VSN that the Leaf node is a part of, all Layer 3 configuration information (IPv4 Unicast and
Multicast configuration) is pushed from the Controllers in the domain. Thus the leaf nodes, although
basically Layer 2 configured switches, become fully layer 3 capable devices.
Figure 46: SPB Fabric network with central Layer 3 Controller and distributed Layer 3 datapath at
the edges
ARP Learning
When DvR is enabled on a Controller, it initiates ARP requests for traffic to be routed to unknown
destination hosts.
Controllers only distribute ARP entries that are locally learned on its own UNI ports, to other DvR
enabled nodes in the domain.
When you enable the dvr-leaf-mode boot flag, you can configure the node as a DvR leaf node
without rebooting, as long as there is no unsupported configuration discovered on the switch.
• After you enable or disable the boot flag, you must save the configuration.
Important
A node on which the dvr-leaf-mode boot flag is enabled cannot be configured as a DvR
Controller.
In-band management
Use in-band management to manage a DvR enabled Leaf node that does not have an out-of-band
management port or a console port.
For in-band management of the node within the management subnet (for example, from a Controller
node), you must configure a unique IPv4 address to be used as the in-band management IP address, on
that node. This IPv4 address functions like a CLIP address.
All switches that belong to the DvR domain are configured with the same DvR domain ID and
communicate with each other over a predefined I-SID.
The Controller nodes control the Leaf nodes and also build the gateway between the DvR domain and
the rest of the Fabric infrastructure. So traffic is either routed between the Leaf nodes, or through the
Controllers, to the rest of the fabric infrastructure.
Two IP subnets (Layer 2 VSNs), yellow and green, span the Leaf nodes. Each subnet is configured with
a virtual IP address that is a shared among all Controller and Leaf nodes that belong to the subnet. The
Controller and Leaf nodes are configured with routing interfaces to the subnets, as shown in the figure.
DvR works by enabling each Leaf node or Top of Rack (TOR) switch to bi-directionally route traffic
for each IP subnet of which it is a member. This is done by distributing the Layer 3 configuration
information (IP Unicast, IP Multicast and virtual IP configuration) needed to handle Layer 3 routing, from
the Controllers to the Leaf nodes. Configuration information is pushed over the DvR Domain I-SID, as
indicated by the blue arrows in the above figure.
Routing between the two IP subnets is achieved directly at the Leaf nodes when the Layer 3 distributed
datapath is programmed at the Leaf Nodes, based on the Layer 3 configuration data that is pushed.
Thus traffic within and between IP subnets is shortcut switched without having to traverse the central
routing nodes, as shown in the figure below, if there are direct physical connections between them.
Thus, in a DvR deployment, all virtual IP and Layer 3 configuration is performed on the Controller nodes
and pushed to the Leaf nodes, so that the Leaf nodes though basically Layer 2 configured switches,
become fully layer 3 capable devices.
All nodes in data center Campus 1 belong to DvR domain shown in green, and the nodes in the data
center Campus 3 belong to the DvR domain shown in orange. The two DvR domains are individually
managed, so in this scenario, the controllers colored orange manage the orange Leaf nodes and the
controllers colored green manage the green Leaf nodes. However, subnets can still be stretched across
the DvR domains (and possibly between buildings), as shown in the figure.
Each DvR domain learns its own Layer 3 data and distributes this information to its own Leaf nodes.
Layer 3 host information that is redistributed from other DvR Domains is learned by the Controllers only
(through inter-DvR domain redistribution) and is programmed on the Leaf nodes in the same domain,
but not in the other Domain. For example, Layer 3 information redistributed from domain 2 is learned
by all controllers including the domain 1 controllers, but this information is not distributed to the Leaf
nodes in domain 1.Hosts in one DvR domain can reach the hosts in the other DvR domain only through
the Controllers.
Figure 47: Shortest path routing between servers in different data centers
All controllers in all domains are always part of the DvR backbone by default, as they are connected by
the SPB Fabric. The DvR backbone connects many DvR domains.
Thus DvR can scale to multiple campuses, allowing a simplified way to deploy a large scale fully-routed
infrastructure.
Note
For every VRF instance and the Global Router, the Controller automatically injects a default
route to the Leaf node, with a next hop as the advertising Controller. However, if you require
only local or static routes to be advertised to the Leaf nodes, you can manually disable the
injection of default routes on the Controller.
On a DvR Controller, you can configure (enable or disable) the redistribution of direct or static routes.
Direct routes are redistributed with the route type as internal. Static routes are redistributed with
the route type as external. You can apply route policies on the Controller to selectively permit the
redistribution of these routes and also configure a metric value for the route that is redistributed. The
default metric for imported local routes is 1. For static routes, the configured route metric or cost is
honored.
You can configure redistribution of static and direct routes from the Global Router, or within a VRF
instance. For redistributed routes, the Controller configures the Layer 3 VSN as that of the VRF
redistributing the route, and the next hop BEB as the system ID of the Controller injecting the route into
the DvR domain.
The following example demonstrates how a DvR Leaf node benefits from the redistribution of local and
static routes.
By default, if the injection of default routes is enabled on a DvR Controller, the DvR Leaf node can only
route traffic to other nodes within the DvR enabled subnet. For the Leaf node to reach networks outside
of the DvR enabled subnet, the Controllers must redistribute local and static routes from non-DvR
subnets into the DvR domain. In the following figure, the DvR Leaf L1 can route traffic only to nodes in
the DvR enabled subnet 10.10.10.0/24. To be able to reach hosts in VLAN 20 (20.20.20.0/24) or VLAN
30 (30.30.30.0/24), redistribution of local routes into DvR is required at each of the Controllers C1 and
C2. For the Leaf node to reach hosts in remote networks 40.40.40.0/24 or 50.50.50.0/24, redistribution
of static routes to the DvR domain is required.
You can apply route policies to control which local or static routes are to be redistributed into the DvR
domain.
A DvR Controller can redistribute host routes for all hosts from a DvR domain into OSPF or BGP.
You can also apply route policies on the Controller to select the routes to be redistributed. The
Controller supports redistribution of routes from the Global Router or within a VRF instance. You can
also configure the metric of the route before redistribution.
Consider a 10.1.0.0/16 network with a stretched Layer 2 VSN spanning two data centers. On the campus
side of the network, BGP peering is configured between a non-Extreme router and one or more routers
in the data center. BGP advertises the network route 10.1.0.0/16 to the campus BGP routers. Depending
on which edge router the traffic is delivered to, it is possible that traffic from a host on the campus
traverses the WAN a second time to reach the server that is physically connected to one segment of the
data center, as shown in the following figure.
The following figure shows two DvR domains (show in green and orange) configured at each data
center. Each campus edge router establishes a BGP peering session with one or more Controllers in
each data center (DvR domain). This enables BGP to advertise more specific routes to the campus BGP
router so that the optimal routing path is always taken. So, there is no need for traffic to traverse the
WAN multiple times. Also, in the case of server movement within or between data centers, the updated
DvR host routes are propagated to BGP, thus ensuring that traffic flowing into the data center continues
along the most optimal path.
For example, in the following figure, only the Controller attached to the Leaf node where the 10.1.0.111
server exists, advertises its accessibility over the 10.1.0.111/32 route. Similarly, the DvR Controller
associated with the Leaf node connected to the 10.1.0.222 server advertises the 10.1.0.222/32 host route.
For more information about accept policies, see IS-IS Accept Policies on page 1357.
You can configure a Management Instance VLAN on a DvR Leaf node by specifying the I-SID. When you
specify the I-SID, an internal VLAN is created and associated with the I-SID.
Operational Considerations
The following section describes operational considerations for assigning a Management I-SID to DvR
Leaf node.
• If the specified I-SID is not associated with a VLAN, the Management Instance VLAN interface is
created with the specified I-SID and an internal VLAN.
Note
The internal VLAN is not configurable.
• You cannot create a Management Instance VLAN interface if the I-SID is already associated with a
VLAN. However, you can configure a Management Instance VLAN interface if the I-SID is associated
with the onboarding VLAN.
• The I-SID cannot be learned dynamically. You cannot create a Management Instance VLAN interface
if the I-SID sent from the DvR Controller is the same as the Management Instance VLAN I-SID.
• When you delete the Management Instance VLAN interface, the internal VLAN is deleted. You
cannot delete the onboarding VLAN.
• You can migrate from a previous configuration or to a DvR Leaf only if an I-SID is associated with the
Management Instance VLAN. If you disable DvR on a DvR Leaf by disabling the dvr-leaf-mode
boot flag, the Management Instance VLAN is deleted. You can either restart the onboarding process
or configure a Management Instance CLIP or Management Instance OOB interface.
• In DvR Leaf, you can create a Management Instance VLAN interface using the quick-config-mgmt
utility script with the Management I-SID but not with port number or VLAN ID. This I-SID cannot be
used if the Management Instance interface is already created. You can issue the convert command
to use this I-SID.
• Migration from DvR leaf to non-DvR leaf deletes the Management Instance VLAN configuration.
If the CLIPs do not exist, pinging hosts in the DvR-One-IP subnet is not possible from DvR Controllers.
The ping attempt times out and the switch displays the following warning message: Warning: For
DVR one IP a loopback IP must be configured on the VRF. If you provide a source
IP address with the ping command, the switch does not display the warning message but the ping
attempt fails.
DvR Restrictions
Review the following limitations and behavioral characteristics associated with DvR.
• The DvR feature does not affect out-of-band management on a switch chassis, if the chassis
supports it.
• The DvR feature does not support a non-DvR BEB in a DvR enabled Layer 2 VSN.
• The number of host route records that can be stored in the datapath of a Leaf node is limited to the
scaling capacity of the switch node. Different switch platforms have different scaling capacities.
For information on the scaling capacities of different platforms, see VOSS Release Notes.
• You must first disable DvR on a Controller or Leaf node, before you attempt to change the domain
ID of the node.
• You cannot configure IGMP snooping on DvR enabled nodes.
• DvR is only supported in warm standby High Availability mode on the VSP 8600 Series.
If you use same IP address for VLAN interface and DvR GW IP, you can use the command ip
address {A.B.C.D/X} dvr-one-ip.
For more information, see Enable DvR on a Layer 2 VSN (VLAN) on page 3802 and Configure a
Single IP Address for All DvR Controllers on a VLAN Subnet on page 3803.
• You cannot configure IPv4 VRRP on a DvR-enabled VLAN.
Note
This restriction does not apply to VSP 8600 Series.
Note
IPv6 OSPFv3, IPv6 RIPng, IPv6 MLD, and IPv6 PIM-GW do not apply to VSP 8600 Series.
• You can configure DvR on a VLAN that has configured IPv6 interface. You must first delete the IPv6
interface, configure DvR, and then reconfigure IPv6 interface.
Note
This restriction does not apply to VSP 8600 Series.
A DvR VLAN is a VLAN configured on a DvR Controller with a VLAN IP address, a VLAN/I-SID, the
DvR gateway IP address, and DvR enabled. This Layer 3 configuration for the DvR VLAN (the DvR
gateway IP address and this DvR subnet) is pushed to the DvR Leaf nodes. The DvR gateway IP
address must be the same address across all DvR Controllers for that DvR VLAN.
• You cannot configure an IPv6 interface on a DvR-enabled VLAN from a subnet that is used as
next-hop in a IPv6 static route.
• You cannot configure an IPv6 address on a DvR-enabled VLAN from a subnet used as an IPv6 BGP
Peer.
Note
This restriction does not apply to VSP 8600 Series.
• DvR-enabled VLAN/I-SIDs are for host connectivity only; you cannot connect a router to a DvR-
enabled VLAN/I-SID and use dynamic or static routing. Use a non-DvR VLAN/I-SID instead to
connect an external router.
address configuration, CLIP configuration, routing protocol configuration and VRF configuration. The
gateway IPv4 address, if configured, is also removed.
• You cannot configure SPB-PIM GW on a Leaf node. The configuration is supported only on a DvR
Controller.
• You cannot perform Layer 3 configuration (for example, IP interfaces, IP routing, and VRFs). You can
only perform Layer 2 configuration.
If you have a VRRP network with a mix of existing routers that do not support DvR and devices that do
support DvR, you can migrate your VRRP network to DvR using this high-level process. This migration
process assumes the following design:
• Existing routers are the VRRP masters.
• Existing routers are the default gateways for all subnets.
• Fabric Connect network with DvR-capable nodes where DvR is configured globally, but not on
I-SIDs, on the VOSS devices; and VOSS devices operate in Layer 2 mode for the VRRP VLANs that
need to be migrated.
Important
When you configure DvR on Controllers with existing VRRP VLANs, ensure there is no VRRP
VLAN with VRID 37 or VRID 38. VRID 37 conflicts with the DvR gateway MAC used by all DvR
nodes. The DvR gateway MAC is a constant value 00:00:5e:00:01:25; VRRP VRID 37 translates
to the same MAC. Similarly, VRRP VRID 38 translates to 00:00:5e:00:01:26, and is used within
DvR. If you have a VRRP VLAN with either of these VRIDs, change the VRID to a different
value.
Procedure
1. Enable VRRP interfaces on the DvR Controllers but keep VRRP mastership on the existing routers.
2. Change VRRP mastership on the VLAN or IP Subnet in question on the DvR Controller by applying a
higher priority than the current master.
Note
You can easily fall back to the original VRRP master to change VRRP priorities back.
Example
Configuration Examples
The following example shows how you can configure an IPv6 interface and IPv6 VRRP on a DvR-
enabled VLAN:
vlan create 10 name vlan_test10 type port-mstprstp 0
vlan i-sid 10 111010
interface vlan 10
dvr gw-ipv4 192.0.2.1
dvr enable
ip address 192.0.2.2 255.255.255.0
ipv6 interface enable
ipv6 interface address 2001:DB8:0::1/64
ipv6 vrrp address 1 link-local fe80::1234
ipv6 vrrp address 1 global 2001:DB8:0::1234/64
ipv6 vrrp 1 enable
exit
You cannot enable DvR on a VLAN interface that has IPv6 VRRP configuration. You must first delete
IPv6 interface from the VLAN, configure DvR and then reconfigure IPv6 interface.
interface vlan 10
no ipv6 vrrp 1
no ipv6 interface
dvr gw-ipv4 192.0.2.1
dvr enable
ip address 192.0.2.2 255.255.255.0
ipv6 interface enable
ipv6 interface address 2001:DB8:0::1/64
ipv6 vrrp address 12 link-local fe80::1234
ipv6 vrrp address 1 global 2001:DB8:0::1234/64
ipv6 vrrp 1 enable
exit
Perform this procedure to create a DvR domain with the domain ID that you specify, and configure the
role of the node as the Controller of that domain. A Controller can belong to only one DvR domain.
Note
For a node to perform the role of both a Controller and a Leaf within a DvR domain, you must
configure it as a Controller.
To verify the setting, enter show boot config flags in Privileged EXEC mode.
Procedure
configure terminal
2. Configure a DvR Controller.
dvr controller <1-255>
Caution
Disabling DvR on a DvR Controller destroys the domain ID and all dynamic content
learned within the DvR domain.
However the switch retains the VLAN specific configuration and you can view the
information using the command show running-config.
Example
==================================================================
DVR Summary Info
==================================================================
Domain ID : 5
Domain ISID : 16678219
Backbone ISID : 16678216
Role : Controller
My SYS ID : 00:bb:00:00:81:21
Operational State : Up
GW MAC : 00:00:5e:00:01:25
InjectDefaultRouteDisable(GRT) : Disabled
Variable definitions
Use the data in the following table to use the dvr controller command.
Variable Value
<1-255> Specifies the domain ID of the DvR domain that the
controller belongs.
By default, a DvR Controller injects default routes into the DvR domain and all the Leaf nodes in that
domain learn these routes with the next hop as the Controller that advertised them.
You can however disable default route injection for the GRT or a specific VRF on a Controller, to override
this behavior.
Procedure
1. Enter either Global Configuration mode or VRF Router Configuration mode for a specific VRF
context:
enable
configure terminal
The default or the no operator enables injection of default routes for the GRT into the domain.
On a VRF instance:
dvr inject-default-route-disable
The default or the no operator enables injection of default routes for a specific VRF into the
domain.
3. Verify the configuration.
On the GRT:
show dvr
On a VRF instance:
Example
==================================================================
DVR Summary Info
==================================================================
Domain ID : 5
Domain ISID : 16678219
Backbone ISID : 16678216
Role : Controller
My SYS ID : 00:bb:00:00:81:21
Operational State : Up
GW MAC : 00:00:5e:00:01:25
InjectDefaultRouteDisable(GRT) : Enabled
======================================================================================
DVR L3VSN
======================================================================================
VRF ID L3VSN ISID VRF NAME INJECT-DEFAULT-ROUTE-DISABLE
--------------------------------------------------------------------------------------
1 50 green Disabled
7 1000003 vrf3 Enabled
Configure redistribution of direct or static routes into the DvR domain, on the Global Router or for a
specific VRF instance.
Procedure
1. Enter either Global Configuration mode or VRF Router Configuration mode for a specific VRF
context:
enable
configure terminal
4. Verify the route redistribution configuration. You can also verify it on a specific VRF instance.
show dvr redistribute [vrf WORD<1-16>]
Example
Configure route redistribution of direct and static routes on the Global Router. Ensure that you apply the
configuration.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Configure redistribution of direct and static routes on the specific VRF instance vrf1. Ensure that you
apply the configuration.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
----------------------------------------------------------------------------
STAT 20000 External TRUE -
LOC 10000 Internal TRUE -
Variable definitions
Use the data in the following table to use the dvr redistribute direct or the dvr
redistribute static commands.
Variable Value
enable Enables DvR route redistribution on the VRF instance.
Route redistribution is enabled by default.
metric <0-65535> Specifies the DvR route redistribution metric.
route-map WORD<1-64> Specifies the route policy for DvR route redistribution.
Use the data in the following table to use the show dvr redistribute command.
Variable Value
vrf WORD<1-16> Specifies the VRF name.
Clear DvR host entries (IPv4 remote host routes) on a Controller. The host entries are learned on the
switch, either locally on its UNI port or dynamically from other nodes in the DvR domain.
Note
You can clear DvR host entries only on a DvR Controller.
An error message displays if you attempt clearing of host entries on a DvR Leaf node.
Procedure
configure terminal
2. Clear the DvR host entries.
clear dvr host-entries [ipv4 {A.B.C.D}} | [l2isid <0-16777215>] |
[l3isid <0-16777215>]
Example
In this example, you clear host entries for IP address 50.0.1.0 to clear host entries for IP addresses
50.0.1.2 and 50.0.1.3.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#clear dvr host-entries 50.0.1.0
Variable definitions
Use the data in the following table to use the clear dvr host-entries command.
Variable Value
ipv4 Specifies the IP address (IPv4) of the DvR host entries to
clear.
l2isid Specifies the Layer 2 VSN I-SID of the DvR host entries to
clear
The range is 1 to 16777215.
l3isid Specifies the Layer 3 VSN I-SID of the DvR host entries to
clear.
The range is 0 to 16777215.
Perform this procedure to create a DvR domain with the domain ID that you specify, and configure the
role of the node as a Leaf node. Configuring a node as a DvR Leaf automatically enables DvR globally
on the node.
Note
For a node to perform the role of both a Controller and a Leaf within the domain, you must
configure it as a Controller.
Note
You must enable the VRF-scaling boot configuration flag on a DvR Leaf node, if more than 24
VRFs are required in the DvR domain.
For additional scaling information, see VOSS Release Notes.
Note
When you enable the dvr-leaf-mode boot flag, you can configure the node as a DvR
leaf node without rebooting, as long as there is no unsupported configuration discovered
on the switch.
To verify the setting, enter show boot config flags in Privileged EXEC mode.
Caution
Ensure that you save the current configuration on the switch, before you enable the flag.
Enabling the flag removes all existing non-DvR configuration on the switch, such as
platform VLANs and their IP address configuration, circuitless IP (CLIP) configuration,
routing protocol configuration and VRF configuration. The gateway IPv4 address, if
configured, is also removed.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Configure a node as a DvR Leaf.
dvr leaf <1-255>
3. (Optional) Disable DvR on a DvR Leaf.
no dvr Leaf
Caution
Disabling DvR on a Leaf node removes its membership with the DvR domain and all the
dynamic content learned from the Controllers of that domain.
Example
Switch2:1(config)#show dvr
===========================================================================
DVR Summary Info
===========================================================================
Domain ID : 5
Domain ISID : 16678219
Role : Leaf
My SYS ID : 00:00:72:54:44:00
Operational State : Up
GW MAC : 00:00:5e:00:01:25
Inband Mgmt Clip IP :
Virtual Ist local address :
Virtual Ist local subnet mask :
Virtual Ist peer address :
Variable definitions
Use the data in the following table to use the dvr leaf command.
Variable Value
<1-255> Specifies the domain ID of the DvR domain to which the
Leaf node belongs.
Ensure that the nodes are configured as DvR Leaf nodes, before you configure vIST.
When you configure vIST on a DvR Leaf node pair, the switch generates an I-SID from the configured
cluster ID. This I-SID is unique across the SPB network as long as the cluster ID is unique across the SPB
network, for the vIST pair. You can configure only one instance of vIST on the Leaf node pair.
To configure vIST, both nodes must be Leaf nodes. You cannot configure vIST, for example, on a
Controller-Leaf node pair.
Also both the nodes must belong to the same DvR domain. vIST configuration over Leaf nodes in
different domains is not supported.
Procedure
configure terminal
2. Configure vIST on the Leaf nodes:
dvr leaf virtual-ist {<A.B.C.D/X|<A.B.C.D> <A.B.C.D>} peer-ip
{A.B.C.D} cluster-id <1–1000>
3. (Optional) Disable vIST on the DvR Leaf node pair.
no dvr leaf virtual-ist
Caution
Disabling DvR on a Leaf node in a vIST pair removes all vIST configuration on that node,
but not on the pair. The node on which DvR is disabled also loses its membership with the
DvR domain and all the dynamic content learned from the Controllers in that domain.
If DvR is re-enabled on the node, you must manually configure vIST on that node again.
Example
Configure vIST on DvR Leaf nodes, with IP addresses 51.51.51.1 and 51.51.51.2 respectively:
Switch2:1>enable
Switch2:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch2:1(config)#dvr leaf virtual-ist 51.51.51.1 peer-ip 51.51.51.2 cluster-id 255
Switch2:1#show dvr
======================================================================
DVR Summary Info
======================================================================
Domain ID : 5
Domain ISID : 16678219
Role : Leaf
My SYS ID : 00:bb:00:00:71:23
Operational State : Up
GW MAC : 00:00:5e:00:01:25
Inband Mgmt Clip IP :
Virtual Ist local address : 51.51.51.1
Virtual Ist local subnet mask : 255.255.255.0
Virtual Ist peer address : 51.51.51.2
Virtual Ist cluster-id : 255
Virtual Ist ISID : 16677226
Variable definitions
Use the data in the following table to use the dvr leaf virtual-ist command.
Variable Value
{<A.B.C.D/X|<A.B.C.D> Specifies the local IP (IPv4) address and subnet mask of
<A.B.C.D>} the node.
{<A.B.C.D>} Specifies the IP address (IPv4) of the vIST peer.
<1–1000> Specifies the cluster ID of vIST.
It is set to 0 if vIST is not configured.
On a DvR leaf node, you can configure a Management Instance VLAN by specifying the I-SID. Use the
following procedure to configure a Management Instance VLAN on a DvR leaf node.
Procedure
configure terminal
Variable Definitions
The following table defines parameters for the mgmt vlan i-sid command.
Variable Value
1-16777215 Specifies the VLAN I-SID to associate with the management VLAN.
Perform this procedure to delete a Management Instance VLAN on a DvR leaf node.
Procedure
configure terminal
2. Delete the management VLAN:
no mgmt vlan
Use this procedure to move a vIST Leaf node pair from one DvR domain to another.
For vIST to work properly, both Leaf nodes must be in the same domain.
Procedure
1. Disable IS-IS on each vIST peer Leaf node, to remove the node from the SPB network.
no router isis enable
Caution
Disabling DvR on a Leaf node in a vIST pair automatically removes all vIST configuration
on that node, but not on the pair. The node on which DvR is disabled also loses
its membership with the DvR domain and all the dynamic content learned from the
Controllers in that domain.
When you re-enable DvR on the node, you must manually configure vIST on that node
again.
3. Configure each node as a DvR Leaf node, with the new domain ID.
Ensure that you configure both nodes as Leaf nodes and with the same domain ID.
Example
Consider two vIST peer Leaf nodes Switch1 (IP address 51.51.51.1) and Switch2
(51.51.51.2) that belong to a DvR domain (with domain ID 4), that you need to move to another
domain (with domain ID 5).
===========================================================================
DVR Summary Info
===========================================================================
Domain ID : 4
Domain ISID : 16678220
Role : Leaf
My SYS ID : 00:00:72:54:44:00
Operational State : Up
GW MAC : 00:00:5e:00:01:25
Inband Mgmt Clip IP :
Virtual Ist local address : 51.51.51.1
Virtual Ist local subnet mask : 255.255.255.0
Virtual Ist peer address : 51.51.51.2
Virtual Ist cluster-id : 255
Virtual Ist ISID : 16677226
Switch2:1(config)#show dvr
===========================================================================
DVR Summary Info
===========================================================================
Domain ID : 4
Domain ISID : 16678220
Role : Leaf
My SYS ID : 00:00:72:55:45:00
Operational State : Up
GW MAC : 00:00:5e:00:01:25
Inband Mgmt Clip IP :
Virtual Ist local address : 51.51.51.1
Virtual Ist local subnet mask : 255.255.255.0
Virtual Ist peer address : 51.51.51.2
Virtual Ist cluster-id : 255
Virtual Ist ISID : 16677226
Disable DvR on each node. This automatically removes all vIST configuration on the node, but not on
the vIST pair. The node also loses its membership with the DvR domain and all the dynamic content
learned from the Controllers in that domain.
Switch1:1(config)#no dvr leaf
Switch2:1(config)#no dvr leaf
===========================================================================
DVR Summary Info
===========================================================================
Domain ID : 5
===========================================================================
DVR Summary Info
===========================================================================
Domain ID : 5
Domain ISID : 16678221
Role : Leaf
My SYS ID : 00:00:72:55:45:00
Operational State : Up
GW MAC : 00:00:5e:00:01:25
Inband Mgmt Clip IP :
Virtual Ist local address : 51.51.51.1
Virtual Ist local subnet mask : 255.255.255.0
Virtual Ist peer address : 51.51.51.2
Virtual Ist cluster-id : 255
Virtual Ist ISID : 16677226
Use this procedure to move a vIST Controller node pair from one DvR domain to another.
For vIST to work properly, both Controller nodes must be in the same domain.
Procedure
1. Disable IS-IS on each vIST peer Controller node, to remove the node from the SPB network.
no router isis enable
2. Disable DvR on each Controller node:
no dvr controller
Caution
Disabling DvR on a DvR Controller destroys the domain ID and all dynamic content
learned within the DvR domain. However, the switch retains the VLAN specific
configuration which you can view using the command show running-config.
3. Configure each node as a DvR Controller node, with the new domain ID. Ensure that you configure
both nodes as Controller nodes and with the same domain ID.
dvr controller <1–255>
4. Enable IS-IS on each vIST peer Controller node, to add back the node to the SPB network.
router isis enable
Example
Consider two vIST peer Controller nodes Switch1 (IP address 51.51.51.3) and Switch2
(51.51.51.4) that belong to a DvR domain (with domain ID 4), that you need to move to another
domain (with domain ID 5).
==================================================================
DVR Summary Info
==================================================================
Domain ID : 4
Domain ISID : 16678220
Backbone ISID : 16678216
Role : Controller
My SYS ID : 00:bb:00:00:81:21
Operational State : Up
GW MAC : 00:00:5e:00:01:25
InjectDefaultRouteDisable(GRT) : Disabled
Switch2:1(config)#show dvr
==================================================================
DVR Summary Info
==================================================================
Domain ID : 4
Domain ISID : 16678220
Backbone ISID : 16678216
Role : Controller
My SYS ID : 00:bb:00:00:82:22
Operational State : Up
GW MAC : 00:00:5e:00:01:25
InjectDefaultRouteDisable(GRT) : Disabled
==================================================================
DVR Summary Info
==================================================================
Domain ID : 5
Domain ISID : 16678221
Backbone ISID : 16678216
Role : Controller
My SYS ID : 00:bb:00:00:81:21
Operational State : Up
GW MAC : 00:00:5e:00:01:25
InjectDefaultRouteDisable(GRT) : Disabled
Switch2:1(config)#show dvr
==================================================================
DVR Summary Info
==================================================================
Domain ID : 5
Domain ISID : 16678221
Backbone ISID : 16678216
Role : Controller
My SYS ID : 00:bb:00:00:82:22
Operational State : Up
GW MAC : 00:00:5e:00:01:25
InjectDefaultRouteDisable(GRT) : Disabled
===============================================================================
IST Info
===============================================================================
PEER-IP VLAN ENABLE IST
ADDRESS ID IST STATUS
-------------------------------------------------------------------------------
51.51.51.2 4002 true up
NEGOTIATED MASTER/
DIALECT IST STATE SLAVE
-------------------------------------------------------------------------------
NONE up Master
Switch2:1>show virtual-ist
===============================================================================
IST Info
===============================================================================
NEGOTIATED MASTER/
DIALECT IST STATE SLAVE
--------------------------------------------------------------------------------
NONE up Slave
Configure a non-DvR backbone edge bridge (BEB) to join the DvR backbone so that it can receive
redistributed DvR host routes from all DvR Controllers in the SPB network.
Note
On a non-DvR BEB, the redistributed host routes from the DvR backbone are not
automatically installed in the IP routing table. To utilize the backbone host routes to optimize
traffic forwarding (forwarding in the data plane), you must explicitly configure an IS-IS accept
policy with a backbone route policy using the command accept backbone-route-map
<route-map-name>, and specifying a suitable route-map to select the list or range of DvR
backbone host routes to be installed in the routing table.
For more information on configuring an IS-IS accept policy with a backbone route policy, see
Configuring IS-IS Accept Policies on page 1374.
Procedure
1. Enter IS-IS Router Configuration mode:
enable
configure terminal
router isis
2. Configure a non-DvR BEB to join the DvR backbone.
backbone enable
3. Verify the configuration using the following commands.
• show dvr backbone-members
• show dvr backbone-members non-dvr-beb
• show dvr backbone-entries
• show isis
Examples
Switch3:1>enable
Switch3:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch3:1(config)#router isis
Switch3:1(config-isis)#show dvr
=====================================================================
NON DVR BEB Summary Info
=====================================================================
Domain ID : 0
Domain ISID : 0
Backbone ISID : 16678216
Role : NON DVR BEB
My SYS ID : 00:00:82:84:40:00
Operational State : Up
=============================================================================================================
DVR BB Members
=============================================================================================================
System Name Nick-Name Nodal MAC Role Domain Id Area Area-Name
-------------------------------------------------------------------------------------------------------------
DVR-8284-D2-C1-40 0.82.40 00:00:82:84:40:00 NON-DVR-BEB 9999 HOME area-0.00.20
============================================================================================================
DVR BB Members
============================================================================================================
System Name Nick-Name Nodal MAC Role Domain Id Area Area-Name
------------------------------------------------------------------------------------------------------------
DVR-8284-D2-C1-40 0.82.40 00:00:82:84:40:00 NON-DVR-BEB 9999 HOME area-0.00.20
View the backbone DvR host routes that the non-DvR BEB receives from other Controllers in the SPB
network.
=============================================================================================================================
DVR Backbone-Entries
=============================================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID ID ADV-CONTROLLER NEXT HOP AREA AREA-NAME
-----------------------------------------------------------------------------------------------------------------------------
39.1.1.4 10:cd:ae:70:5d:01 401 10390 200 DVR-8284-D2-C2-41 DVR-8284-D2-C2-41 REMOTE area-0.00.30
39.2.1.4 10:cd:ae:70:5d:01 401 10391 200 DVR-8284-D2-C2-41 DVR-8284-D2-C2-41 REMOTE area-0.00.30
39.3.1.4 10:cd:ae:70:5d:01 401 10392 200 DVR-8284-D2-C2-41 DVR-8284-D2-C2-41 REMOTE area-0.00.30
39.4.1.4 10:cd:ae:70:5d:01 401 10393 200 DVR-8284-D2-C2-41 DVR-8284-D2-C2-41 REMOTE area-0.00.30
39.5.1.4 10:cd:ae:70:5d:01 401 10394 200 DVR-8284-D2-C2-41 DVR-8284-D2-C2-41 REMOTE area-0.00.30
39.6.1.4 10:cd:ae:70:5d:01 401 10395 200 DVR-8284-D2-C2-41 DVR-8284-D2-C2-41 REMOTE area-0.00.30
====================================================================================
ISIS General Info
====================================================================================
AdminState : enabled
RouterType : Level 1
System ID : 00bb.0000.8121
Max LSP Gen Interval : 900
Metric : wide
Overload-on-startup : 20
Overload : false
Csnp Interval : 10
PSNP Interval : 2
Rxmt LSP Interval : 5
spf-delay : 100
Router Name : router_r1
ip source-address :
ipv6 source-address :
ip tunnel source-address :
Tunnel vrf :
ONA Port :
ip tunnel mtu :
Num of Interfaces : 3
Num of Area Addresses : 1
Inband Mgmt Clip IP :72.54.44.1
backbone :enabled
Dynamically Learned Area : 00.0000.0000
FAN Member : No
Multi-Area OperState : disabled
Hello Padding : enabled
Multi-Area Flags : home-always-up
Procedure
1. Enter Privileged EXEC mode:
enable
2. View a summary of DvR configuration:
show dvr
Example
==================================================================
DVR Summary Info
==================================================================
Domain ID : 5
Domain ISID : 16678219
======================================================================
DVR Summary Info
======================================================================
Domain ID : 5
Domain ISID : 16678219
Role : Leaf
My SYS ID : 00:bb:00:00:71:23
Operational State : Up
GW MAC : 00:00:5e:00:01:25
Inband Mgmt Clip IP : 72.54.44.1
Virtual Ist local address : 51.51.51.1
Virtual Ist local subnet mask : 255.255.255.0
Virtual Ist peer address : 51.51.51.2
Virtual Ist cluster-id : 255
Virtual Ist ISID : 16677226
View the members of all DvR domains, namely the Controllers and Leaf nodes.
You can view this information on either a Controller or a Leaf node. Both the Controller and the Leaf
node displays those members of the DvR domain to which it belongs.
Procedure
1. Enter Privileged EXEC mode:
enable
2. show dvr members [controller|leaf]
Example
================================================================================================
DVR Members (Domain ID: 255)
================================================================================================
System Name Nick-Name Nodal MAC Role
------------------------------------------------------------------------------------------------
Leaf-4:110 0.41.10 00:bb:00:00:41:10 Leaf
Leaf-1:Q:123 0.71.23 00:bb:00:00:71:23 Leaf
Leaf-2:K:124 0.71.24 00:bb:00:00:71:24 Leaf
Leaf-3:K:125 0.71.25 00:bb:00:00:71:25 Leaf
===============================================================================================
DVR Members (Domain ID: 255)
================================================================================================
System Name Nick-Name Nodal MAC Role
------------------------------------------------------------------------------------------------
Ctrl-1:Q:121 0.81.21 00:bb:00:00:81:21 Controller
Ctrl-2:Q:122 0.81.22 00:bb:00:00:81:22 Controller
==============================================================================================
DVR Members (Domain ID: 255)
==============================================================================================
System Name Nick-Name Nodal MAC Role
----------------------------------------------------------------------------------------------
Leaf-4:110 0.41.10 00:bb:00:00:41:10 Leaf
Leaf-1:Q:123 0.71.23 00:bb:00:00:71:23 Leaf
Leaf-2:K:124 0.71.24 00:bb:00:00:71:24 Leaf
Leaf-3:K:125 0.71.25 00:bb:00:00:71:25 Leaf
On Controllers, DvR interfaces are created when you configure IP on a DvR enabled Layer 2 VSN (VLAN,
I-SID). Only Controllers display the administrative state of the interfaces because this is where you
enable or disable the interfaces. The Leaf nodes display DvR interface information that is pushed from
the Controllers, for example, subnet routes or gateway IP addresses for the Layer 2 VSNs.
Procedure
On a Leaf node:
Viewing the DvR interface information for a specific VRF or VRF ID is not supported on a DvR Leaf
node.
Example
You can view DvR interface information on all interfaces or for a specific Layer 3 I-SID, VRF, or VRF ID.
Switch:1#show dvr interfaces
==================================================================================================
DVR Interfaces
==================================================================================================
Admin SPBMC IGMP
Interface Mask L3ISID VRFID L2ISID VLAN GW IPv4 State State Version
--------------------------------------------------------------------------------------------------
50.0.1.2 255.255.0.0 55500 1 50500 500 50.0.1.1 enable disable 2
You can view DvR interface information on all interfaces or for a specific Layer 3 I-SID. Viewing the
interface information for a specific VRF or VRF ID is not supported on a DvR Leaf node.
Switch:1#show dvr interfaces l3isid 401
================================================================================
DVR Interfaces
================================================================================
Variable definitions
Use the data in the following table to use the show dvr interfaces command.
Variable Value
l3isid Specifies the Layer 3 I-SID of the DvR interface.
The range is 0 to 16777215.
vrf Specifies the VRF name.
vrfids Specifies the VRF ID.
The range is 0 to 512.
View DvR host entries (IPv4 remote host routes) on either a Controller or a Leaf node. The node
displays the host entries learned either locally on its Switched UNI port or dynamically from other nodes
within the DvR domain.
Procedure
1. Enter Privileged EXEC mode:
enable
2. View the DvR host entries.
On a Controller:
On a Leaf node:
Viewing the DvR host entries for a specific VRF or VRF ID is not supported on a DvR Leaf node.
Example
Viewing the DvR host entries for a specific VRF or VRF ID is not supported on a DvR Leaf node.
Switch:1#show dvr host-entries domain-id 255 l3isid 55500
==================================================================================================================
DVR Host-Entries
==================================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID VRFID PORT ID TYPE NEXT HOP
------------------------------------------------------------------------------------------------------------------
In this example, you enter IP address 50.0.1.0 to display host entries for IP addresses 50.0.1.2 and
50.0.1.3.
Switch:1#show dvr host-entries ipv4 50.0.1.0
==================================================================================================================
DVR Host-Entries
==================================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID VRFID PORT ID TYPE NEXT HOP
------------------------------------------------------------------------------------------------------------------
50.0.1.2 b0:ad:aa:42:ed:04 55500 50500 0 2/23 2 DYNAMIC Cont-1:121
50.0.1.3 b0:ad:aa:4c:3d:01 55500 50005 0 cpp 2 LOCAL Cont-2:122
View DvR host entries where the next hop displays the MAC address instead of the system name.
Switch:1#show dvr host-entries nh-as-mac
==================================================================================================================
DVR Host-Entries
==================================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID VRFID PORT ID TYPE NEXT HOP
------------------------------------------------------------------------------------------------------------------
50.0.1.2 b0:ad:aa:42:ed:04 55500 50500 0 2/23 2 DYNAMIC 00:bb:00:00:01:01
50.0.1.3 b0:ad:aa:4c:3d:01 55500 50500 0 cpp 2 LOCAL 00:bb:00:00:01:02
View DvR host entries based on the host type. Type 1 indicates local hosts and type 2 dynamic hosts.
Switch:1#show dvr host-entries type 2
==================================================================================================================
DVR Host-Entries
==================================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID VRFID PORT ID TYPE NEXT HOP
------------------------------------------------------------------------------------------------------------------
50.0.1.2 b0:ad:aa:42:ed:04 55500 50500 0 2/23 2 DYNAMIC 00:bb:00:00:01:01
Variable definitions
Use the data in the following table to use the show dvr host-entries command.
Variable Value
domain-id Specifies the domain ID of the DvR host entry.
The range is 1 to 255.
ipv4 Specifies the IP address (IPv4) of the DvR host entry.
l2isid Specifies the Layer 2 VSN I-SID of the DvR host entry.
The range is 1 to 16777215.
l3isid Specifies the Layer 3 VSN I-SID of the DvR host entry.
The range is 0 to 16777215.
nh-as-mac Specifies the MAC address of the next hop node instead
of the system name.
type Specifies the host type of the DvR host entry.
A value of 1 indicates local hosts and a value of 2 indicates
dynamic hosts.
vrf Specifies the VRF name of the DvR host entry.
vrfids Specifies the VRF ID of the DvR host entry.
The range is 0 to 512.
View the DvR routes (IPv4 network routes) on a DvR Controller or a Leaf node.
Controllers display all the IP subnet routes configured for that DvR domain. The Leaf nodes display
the IP subnet routes that are learned from the Controller(s) for the Layer 2 VSNs in the DvR Domain.
Leaf nodes also display routes that are redistributed by Controllers (direct routes, static routes and the
default route), into the DvR domain.
Procedure
1. Enter Privileged EXEC mode:
enable
2. View the DvR routes.
On a Controller:
On a Leaf node:
Viewing the DvR routes for a specific VRF or VRF ID is not supported on a DvR Leaf node.
Example
Viewing the DvR routes for a specific VRF or VRF ID is not supported on a DvR Leaf node.
Switch:1#show dvr routes
========================================================================================================================
DVR Routes
========================================================================================================================
NEXT L3VSN L2VSN
DEST MASK HOP VRFID ISID ISID TYPE COST
------------------------------------------------------------------------------------------------------------------------
50.0.0.0 255.255.0.0 Ctrl-1:8400:121 0 55500 50500 - 1
View DvR routes where the next hop MAC address is displayed instead of the system name:
Switch:1#show dvr routes nh-as-mac
========================================================================================================================
DVR Routes
========================================================================================================================
NEXT L3VSN L2VSN
DEST MASK HOP VRFID ISID ISID TYPE COST
------------------------------------------------------------------------------------------------------------------------
50.0.0.0 255.255.0.0 00:bb:00:00:01:02 0 55500 50500 - 1
Variable definitions
Use the data in the following table to use the show dvr routes command.
Variable Value
ipv4 {A.B.C.D} Specifies the IP address (IPv4) of the DvR route.
l3isid <0-16777215> Specifies the Layer 3 I-SID of the DvR route.
The range is 0 to 16777215.
nh-as-mac Specifies the MAC address of the next hop node instead
of the system name.
vrf Specifies the VRF name of the DvR route.
vrfids Specifies the VRF ID of the DvR route.
The range is 0 to 512.
The Controller node displays all the IP subnet routes configured for that DvR domain. A Leaf node
displays all IP subnet routes learned from the Controller(s) for the Layer 2 VSNs in the DvR Domain. It
also displays the Host Routes (ARPs) learned from other DvR enabled nodes.
Procedure
1. Enter Privileged EXEC mode:
enable
2. View the DvR database.
On a Controller:
On a Leaf node:
Viewing the DvR database for a specific VRF or VRF ID is not supported on a DvR Leaf node.
Example
Viewing the DvR database for a specific VRF or VRF ID is not supported on a DvR Leaf node.
Switch:1#show dvr database
==================================================================================================================================
DVR DATABASE
==================================================================================================================================
DEST MASK HOP VRFID ISID ISID INTERFACE COST COST AGE
----------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------------------
==================================================================================================================================
DVR DATABASE
==================================================================================================================================
DEST MASK HOP VRFID ISID ISID INTERFACE COST COST AGE
----------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------------------
==================================================================================================================================
DVR DATABASE
==================================================================================================================================
DEST MASK HOP VRFID ISID ISID INTERFACE COST COST AGE
----------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------------------
View DvR database entries with next hop MAC address displayed instead of the system name:
Switch:1#show dvr database l3isid 0
====================================================================================================================================
DVR DATABASE
====================================================================================================================================
DEST MASK HOP VRFID ISID ISID INTERFACE COST COST AGE
------------------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------------------------
Variable definitions
Use the data in the following table to use the show dvr database command.
Variable Value
home Specifies the DvR database information for home
instance.
ipv4 {A.B.C.D} Specifies the IP address (IPv4) of the DvR database entry.
l3isid <0-16777215> Specifies the Layer 3 I-SID of the DvR database entry.
The range is 0 to 16777215.
nh-as-mac Specifies the MAC address of the next hop node instead
of the system name.
remote Specifies the DvR database information for remote
instance.
vrf Specifies the VRF name of the DvR database entry.
vrfids Specifies the VRF ID of the DvR database entry.
The range is 0 to 512.
View the DvR backbone entries (redistributed host routes) learned from all Controllers in all DvR
domains.
Note
DvR backbone entries can be viewed only on a Controller. Viewing backbone entries is not
applicable on a Leaf node.
Procedure
1. Enter Privileged EXEC mode:
enable
2. View DvR backbone entries:
show dvr backbone-entries [adv-controller WORD<1-255>]|[domain-
id <1-255>]|[home]|[host-mac-address 0x00:0x00:0x00:0x00:0x00:0x00]|
[ipv4 {A.B.C.D}]|[l2isid <1-16777215>]|[l3isid <0-16777215>]|[next-hop
WORD<1-255>]|[nh-as-mac]|[remote]
Example
=================================================================================================================================
DVR Backbone-Entries
=================================================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID ID ADV-CONTROLLER NEXT HOP AREA AREA-NAME
---------------------------------------------------------------------------------------------------------------------------------
40.0.1.2 b0:ad:aa:4c:55:00 0 40400 255 Ctrl-2:8200:122 Ctrl-1:8400:121 HOME area-0.00.20
40.1.1.3 b0:ad:aa:43:31:00 0 40401 255 Ctrl-2:8200:122 Ctrl-2:8200:122 HOME area-0.00.20
=================================================================================================================================
DVR Backbone-Entries
=================================================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID ID ADV-CONTROLLER NEXT HOP AREA AREA-NAME
---------------------------------------------------------------------------------------------------------------------------------
40.0.1.2 b0:ad:aa:4c:55:00 0 40400 255 Ctrl-2:8200:122 Ctrl-1:8400:121 HOME area-0.00.20
40.0.1.2 b0:ad:aa:4c:55:00 0 40400 255 Ctrl-1:8400:121 Ctrl-1:8400:121 HOME area-0.00.20
In this example, you enter IP address 40.0.1.0 to display backbone entries for IP addresses
40.0.1.2 and 40.0.1.3.
Switch:1#show dvr backbone-entries ipv4 40.0.1.0
==============================================================================================================================
DVR Backbone-Entries
==============================================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID ID ADV-CONTROLLER NEXT HOP AREA AREA-NAME
------------------------------------------------------------------------------------------------------------------------------
40.0.1.2 b0:ad:aa:4c:55:00 0 40400 255 Ctrl-2:8200:122 Ctrl-1:8400:121 HOME area-0.00.20
40.0.1.2 b0:ad:aa:4c:55:00 0 40400 255 Ctrl-1:8400:121 Ctrl-1:8400:121 HOME area-0.00.20
40.1.1.3 b0:ad:aa:43:31:00 0 40401 255 Ctrl-2:8200:122 Ctrl-2:8200:122 HOME area-0.00.20
40.1.1.3 b0:ad:aa:43:31:00 0 40401 255 Ctrl-2:8200:121 Ctrl-2:8200:122 HOME area-0.00.20
Home: 4 out of 4 Total Num of DVR Backbone Routes displayed
------------------------------------------------------------------------------------------------------------------------------
===============================================================================================================================
DVR Backbone-Entries
===============================================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID ID ADV-CONTROLLER NEXT HOP AREA AREA-NAME
-------------------------------------------------------------------------------------------------------------------------------
40.0.1.2 b0:ad:aa:4c:55:00 0 40400 255 Ctrl-2:8200:122 Ctrl-1:8400:121 HOME area-0.00.20
40.0.1.2 b0:ad:aa:4c:55:00 0 40400 255 Ctrl-1:8400:121 Ctrl-1:8400:121 HOME area-0.00.20
40.0.1.3 b0:ad:aa:43:31:00 0 40400 255 Ctrl-1:8400:121 Ctrl-2:8200:122 HOME area-0.00.20
40.0.1.3 b0:ad:aa:43:31:00 0 40400 255 Ctrl-2:8200:122 Ctrl-2:8200:122 HOME area-0.00.20
==============================================================================================================================
DVR Backbone-Entries
==============================================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID ID ADV-CONTROLLER NEXT HOP AREA AREA-NAME
------------------------------------------------------------------------------------------------------------------------------
40.0.1.2 b0:ad:aa:4c:55:00 0 40400 255 Ctrl-2:8200:122 Ctrl-1:8400:121 HOME area-0.00.20
40.0.1.2 b0:ad:aa:4c:55:00 0 40400 255 Ctrl-1:8400:121 Ctrl-1:8400:121 HOME area-0.00.20
View DvR backbone entries where the next hop nodes are displayed as MAC addresses:
Switch:1#show dvr backbone-entries nh-as-mac
===============================================================================================================================
DVR Backbone-Entries
===============================================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID ID ADV-CONTROLLER NEXT HOP AREA AREA-NAME
-------------------------------------------------------------------------------------------------------------------------------
40.0.1.2 b0:ad:aa:4c:55:00 0 40400 255 Ctrl-2:8200:122 00:bb:00:00:81:21 HOME area-0.00.20
40.0.1.2 b0:ad:aa:4c:55:00 0 40400 255 Ctrl-1:8400:121 00:bb:00:00:81:21 HOME area-0.00.20
Variable definitions
Use the data in the following table to use the show dvr backbone entries command.
Variable Value
adv-controller WORD<1-255> Specifies the system name of the advertising Controller.
domain-id <1-255> Specifies the domain ID of the DvR backbone entry.
The range is 1 to 255.
home Display the DvR backbone entries for the home instance.
host-mac-address Specifies the host MAC address of the DvR backbone
0x00:0x00:0x00:0x00:0x00:0x00 entry.
ipv4 {A.B.C.D} Specifies the IP address (IPv4) of the DvR backbone
entry.
l2isid <1-16777215> Specifies the Layer 2 I-SID of the DvR backbone entry.
The range is 1 to 16777215.
l3isid <0-16777215> Specifies the Layer 3 I-SID of the DvR backbone entry.
The range is 0 to 16777215.
next-hop WORD<1-255> Specifies the system name of the next hop node.
nh-as-mac Specifies the MAC address of the next hop node instead
of the system name.
remote Display the DvR backbone entries for the remote
instance.
DvR backbone members are either DvR Controllers or non-DvR BEBs that receive redistributed host
routes from all other DvR Controllers in the SPB network.
Procedure
Example
==============================================================================================================
DVR BB Members
==============================================================================================================
System Name Nick-Name Nodal MAC Role Domain Id Area Area-Name
--------------------------------------------------------------------------------------------------------------
DVR-D2-C1-40 0.82.40 00:00:82:84:40:00 NON-DVR-BEB 2 HOME area-0.00.20
Ctrl-2:8200:122 0.81.22 00:bb:00:00:81:22 Controller 2 HOME area-0.00.20
==============================================================================================================
DVR BB Members (Domain ID: 255)
==============================================================================================================
System Name Nick-Name Nodal MAC Role Domain Id Area Area-Name
--------------------------------------------------------------------------------------------------------------
Ctrl-2:8200:122 0.81.22 00:bb:00:00:81:22 Controller 2 HOME area-0.00.20
==============================================================================================================
DVR BB Members
==============================================================================================================
System Name Nick-Name Nodal MAC Role Domain Id Area Area-Name
--------------------------------------------------------------------------------------------------------------
DVR-D2-C1-40 0.82.40 00:00:82:84:40:00 NON-DVR-BEB 2 HOME area-0.00.20
Variable definitions
Use the data in the following table to use the show dvr backbone-members command.
Variable Value
controller Specifies backbone members that are DvR Controllers.
home Specifies DvR backbone members information for the
home instance.
non-dvr-beb Specifies backbone members that are non-DvR BEBs.
remote Specifies DvR backbone members information for the
remote instance.
View VRFs corresponding to Layer 3 (routed) VSN I-SIDs on either a Controller or a Leaf node.
Procedure
Example
====================================================================
DVR L3VSN
====================================================================
VRF ID L3VSN ISID VRF NAME INJECT-DEFAULT-ROUTE-DISABLE
--------------------------------------------------------------------
1 55500 vrf600 Disabled
2 55501 vrf601 Disabled
3 55502 vrf602 Disabled
4 55503 vrf603 Disabled
====================================================================
DVR L3VSN
====================================================================
VRF ID L3VSN ISID VRF NAME
--------------------------------------------------------------------
1 55500 vrf600
2 55501 vrf601
3 55502 vrf602
Variable definitions
Use the data in the following table to use the show dvr l3vsn command.
Variable Value
l3isid <0-16777215> Specifies the Layer 3 VSN I-SID.
The range is 0 to 16777215.
vrf WORD<1-16> Specifies the VRF name of the VRF corresponding to the
Layer 3 VSN I-SID.
vrfids WORD<0-512> Specifies the VRF ID of the VRF.
Note
You can view DvR domain redistribution information only on a DvR Controller.
An error message displays if you attempt to view this information on a DvR Leaf node.
Procedure
1. Enter Privileged EXEC mode:
enable
2. View DvR domain redistribution information:
show dvr redistribute [vrf WORD<1-16>] | [vrfids WORD<0-512>]
Example
Variable definitions
Use the data in the following table to use the show dvr redistribute command.
Variable Definitions
vrf WORD<1-16> Specifies the VRF name.
vrfids WORD<0-512> Specifies the VRF ID of the VRF.
In this example, you configure two DvR Controllers (with IP addresses 10.133.226.101
and 10.133.226.102) and two DvR Leaf nodes (with IP addresses 10.133.226.103 and
10.133.226.104), in a single DvR domain with domain ID 9. Hosts connect to the DvR nodes
as shown in the figure.
• Verify that the dvr-leaf-mode boot flag is disabled on the node. To verify the setting, enter show
boot config flags in Privileged EXEC mode.
Procedure
DvR Controller configuration — Controller 1 and Controller 2:
1. Verify configuration of Fabric Connect on each of the switches to be configured as the DvR
Controllers.
The following examples show verification on one of the switches. Perform this verification on both
switches.
a. Verify the SPB configuration:
Switch1:1>en
Switch1:1#show spbm
spbm : enable
ethertype : 0x8100
nick-name server : enable
nick-name allocation : static
nick-name server range : B.00.00-B.FF.FF
Switch1:1#show isis spbm
=============================================================================================================
ISIS SPBM Info
=============================================================================================================
SPBM B-VID PRIMARY NICK LSDB IP IPV6 MULTICAST SPB-PIM-GW STP-MULTI ORIGIN
INSTANCE VLAN NAME TRAP HOMING
-------------------------------------------------------------------------------------------------------------
1 4051-4052 4051 0.10.01 disable enable disable enable disable disable dynamic
=============================================================================================================
ISIS SPBM SMLT Info
=============================================================================================================
SPBM SMLT-SPLIT-BEB SMLT-VIRTUAL-BMAC SMLT-PEER-SYSTEM-ID
INSTANCE
-------------------------------------------------------------------------------------------
1 primary 00:00:00:00:00:00
--------------------------------------------------------------------------------
Total Num of SPBM instances: 1
--------------------------------------------------------------------------------
==============================================================================
ISIS General Info
==============================================================================
AdminState : enabled
RouterType : Level 1
System ID : 00bb.0000.0101
Max LSP Gen Interval : 900
Metric : wide
Overload-on-startup : 20
Overload : false
Csnp Interval : 10
PSNP Interval : 2
Rxmt LSP Interval : 5
spf-delay : 100
Router Name : Cont-1
ip source-address : 10.0.0.101
ipv6 source-address :
ip tunnel source-address :
Tunnel vrf :
ip tunnel mtu :
Num of Interfaces : 4
Num of Area Addresses : 1
Inband Mgmt Clip IP :
backbone : disabled
Dynamically Learned Area : 00.0000.0000
FAN Member : No
Multi-Area OperState : disabled
Hello Padding : enabled
Multi-Area OperState : disabled
Multi-Area Flags :
==================================================================
DVR Summary Info
==================================================================
Domain ID : 9
Domain ISID : 16678219
Backbone ISID :
Role : Controller
My SYS ID : 00:bb:00:00:81:21
Operational State : Up
GW MAC : 00:00:5e:00:01:25
InjectDefaultRouteDisable(GRT) : Disabled
==================================================================
DVR Summary Info
==================================================================
Domain ID : 9
Domain ISID : 16678219
Backbone ISID : 16678216
Role : Controller
My SYS ID : 00:bb:00:00:81:21
Operational State : Up
GW MAC : 00:00:5e:00:01:25
InjectDefaultRouteDisable(GRT) : Disabled
============================================================================================
b. Configure the platform VLANs on Controller 2. Ensure that you configure the same gateway IPv4
addresses on the corresponding VLANs, as on Controller 1.
Switch2:1(config)#vlan create 200 type port-mstprstp 0
Switch2:1(config)#vlan i-sid 200 20200
Switch2:1(config)#interface vlan 200
Switch2:1(config)#dvr gw-ipv4 20.0.1.1
Switch2:1(config)#dvr enable
Switch2:1(config)#ip address 20.0.1.3 255.255.0.0
Switch2:1(config)#vlan create 202 type port-mstprstp 0
Switch2:1(config)#vlan i-sid 202 20202
Switch2:1(config)#interface vlan 202
Switch2:1(config)#dvr gw-ipv4 20.2.1.1
Switch2:1(config)#dvr enable
Switch2:1(config)#ip address 20.2.1.3 255.255.0.0
Switch2:1(config)#exit
Switch2:1#
c. Verify Layer 2 VSN (VLAN) configuration on the Controllers. The following example shows the
verification on Controller 1. Perform this verification on both Controllers.
View the DvR interfaces.
On Controllers, DvR interfaces are created when you configure IP on a DvR enabled Layer 2 VSN
(VLAN, I-SID). You can also view the administrative state of these interfaces on the Controller.
Switch1:1#show dvr interfaces
========================================================================================================================
DVR Interfaces
========================================================================================================================
Interface Mask L3ISID VRFID L2ISID VLAN GW IPv4 State State Version
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
View the DvR host entries learned locally on the S-UNI port.
Switch1:1#show dvr host-entries
=======================================================================================================
DVR Host-Entries
=======================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID PORT ID TYPE NEXT HOP
-------------------------------------------------------------------------------------------------------
20.0.1.2 b0:ad:aa:42:ed:04 0 20200 cpp 9 LOCAL Cont-1
20.2.1.2 b0:ad:aa:42:ed:04 0 20202 cpp 9 LOCAL Cont-1
2 out of 2 Total Num of DVR Host Entries displayed
--------------------------------------------------------------------------------------------------------
View the DvR database. All IP subnet routes configured on the Controller, for the DvR domain,
are displayed.
Switch1:1#show dvr database
===============================================================================================================================
DVR DATABASE
===============================================================================================================================
-------------------------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------------------
View the DvR routes for the subnets 20.0.0.0 and 20.2.0.0.
Switch1:1#show dvr routes
=====================================================================================================
DVR Routes
=====================================================================================================
NEXT L3VSN L2VSN
DEST MASK HOP ISID ISID TYPE COST
------------------------------------------------------------------------------------------------------
20.0.0.0 255.255.0.0 Cont-1 0 20200 - 1
20.2.0.0 255.255.0.0 Cont-1 0 20202 - 1
c. Verify Layer 3 configuration. The following example shows verification on Controller 1. Perform
this verification on both Controllers.
View the DvR host entries.
Switch2:1(config)#show dvr host-entries l3isid 55501
=======================================================================================================
DVR Host-Entries
=======================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID PORT ID TYPE NEXT HOP
-------------------------------------------------------------------------------------------------------
50.1.1.2 b0:ad:aa:42:ed:08 55501 50501 cpp 9 LOCAL Cont-1
50.1.1.3 b0:ad:aa:4c:3d:02 55501 50501 1/23 9 DYNAMIC Cont-2
========================================================================================================================
DVR Interfaces
========================================================================================================================
Interface Mask L3ISID VRFID L2ISID VLAN GW IPv4 State State Version
------------------------------------------------------------------------------------------------------------------------
=====================================================================================================================
DVR DATABASE
=====================================================================================================================
---------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
Caution
Ensure that you save the current configuration on the switch, before you enable the flag.
Enabling the flag removes all existing non-DvR configuration on the switch, such as
platform VLANs and their IP address configuration, CLIP configuration, routing protocol
configuration and VRF configuration. The gateway IPv4 address, if configured, is also
removed.
On switch with IP address 10.133.226.104, configure the boot flag and reboot the switch.
Switch3:1>en
Switch3:1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch3:1(config)#boot config flags dvr-leaf-mode
Switch3:1(config)#save config
Switch3:1(config)#reset
On switch with IP address 10.133.226.105, configure the boot flag and reboot the switch.
Switch4:1>en
Switch4:1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch4:1(config)#boot config flags dvr-leaf-mode
Switch4:1(config)#save config
Switch4:1(config)#reset
6. After the switches come back up, configure the nodes as DvR Leaf nodes.
Configure switch with IP address 10.133.226.104 as DvR Leaf 1; verify the configuration.
Switch3:1(config)#dvr Leaf 9
Switch3:1(config)#show dvr
=========================================================================
DVR Summary Info
=========================================================================
Domain ID : 9
Domain ISID : 16678219
Role : Leaf
My SYS ID : 00:bb:00:00:80:05
Operational State : Up
GW MAC : 00:00:5e:00:01:25
Inband Mgmt Clip IP :
Virtual Ist local address :
Virtual Ist local subnet mask :
Virtual Ist peer address :
Virtual Ist cluster-id :
Virtual Ist ISID :
Configure switch with IP address 10.133.226.105 as DvR Leaf 2; verify the configuration.
Switch4:1(config)#dvr Leaf 9
Switch4:1(config)#show dvr
=========================================================================
DVR Summary Info
=========================================================================
Domain ID : 9
Domain ISID : 16678219
Role : Leaf
My SYS ID : 00:bb:00:00:80:05
Operational State : Up
GW MAC : 00:00:5e:00:01:25
Inband Mgmt Clip IP :
Virtual Ist local address :
Virtual Ist local subnet mask :
Virtual Ist peer address :
Virtual Ist cluster-id :
Virtual Ist ISID :
7. Associate the I-SIDs on the DvR Leaf nodes to the DvR VLANs configured on the Controller.
On Leaf node 1 (IP address 10.133.226.105):
Switch3:1(config)#i-sid 20200 elan
Switch3:1(elan:20200)#c-vid 200 port 1/2
Switch3:1(config)#exit
==============================================================================================================
DVR Host-Entries
==============================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID PORT ID TYPE NEXT HOP
--------------------------------------------------------------------------------------------------------------
20.0.1.67 00:00:00:00:00:67 0 20200 1/4 9 DYNAMIC 00:bb:00:00:81:21
20.0.1.68 00:00:00:00:00:68 0 20200 1/2 9 DYNAMIC 00:bb:00:00:81:21
2 out of 2 Total Num of DVR Host Entries displayed
--------------------------------------------------------------------------------------------------------------
==============================================================================================================
DVR Host-Entries
==============================================================================================================
HOST L3VSN L2VSN DOMAIN
IP-ADDRESS MAC-ADDRESS ISID ISID PORT ID TYPE NEXT HOP
--------------------------------------------------------------------------------------------------------------
20.0.1.67 00:00:00:00:00:67 0 20200 1/4 9 DYNAMIC 00:bb:00:00:81:21
20.0.1.68 00:00:00:00:00:68 0 20200 1/2 9 DYNAMIC 00:bb:00:00:81:21
2 out of 2 Total Num of DVR Host Entries displayed
--------------------------------------------------------------------------------------------------------------
8. View all members of the DvR domain. You can view this information on either a Leaf node or a
Controller node.
Switch1:1#show dvr members
================================================================================================
DVR Members (Domain ID: 2)
================================================================================================
System Name Nick-Name Nodal MAC Role
------------------------------------------------------------------------------------------------
Cont-1 0.10.01 00:bb:00:00:01:01 Controller
Cont-2 0.10.02 00:bb:00:00:01:02 Controller
Leaf1 0.10.04 00:bb:00:00:80:04 Leaf
Leaf2 0.10.05 00:bb:00:00:80:05 Leaf
Configure a node to perform the role of either a Controller or a Leaf, within the DvR domain.
Important
For DvR Leaf Configuration only:
You must enable the dvr-leaf-mode boot flag before you configure a node as a DvR
Leaf node. Navigate to Configuration > Edit > Chassis. On the Boot Config tab, select
EnableDvrLeafMode.
Ensure that you save the current configuration on the switch, before you enable the flag.
Enabling the flag removes all non-DvR configuration on the switch.
Procedure
Note
A Controller or a Leaf node can belong to only one DvR domain.
6. (Optional) On a Controller node, disable injection of default routes into the DvR domain. Select
InjectDefaultRouteDisable.
Note
This field applies only to Controllers. Attempting to select this field on a Leaf node displays
an error message.
7. Update the fields as necessary, and then click Apply to save your configuration.
Field Descriptions
DomainId Uniquely identifies the domain that the node
belongs to.
The range for a Controller or a Leaf is 1 to 255. Set
to 0 if is not configured.
Role Specifies the role of the node in the domain, that
is, either a Controller or a Leaf.
Enable Specifies whether DvR is enabled on the node.
Configuring a Controller or Leaf sets this
parameter to true.
DomainIsid Uniquely identifies the domain I-SID that the node
belongs to.
0 indicates that is not configured.
BackboneIsid Uniquely identifies the backbone I-SID that the
node belongs to.
The valid backbone I-SID is 16678216. It is set to 0
if is not configured.
GatewayMac Specifies the Gateway MAC address used by all
Domains.
InbandMgmtIp Specifies the In-band Management IP address
configured under IS-IS.
Note: You can use this IP address to manage the node,
Exception: not supported on VSP 8600 Series or irrespective of whether DvR is enabled on it.
XA1400 Series.
Field Descriptions
VirtualIstPeerAddr Specifies the peer IP address of vIST, if vIST is
configured on a Leaf.
vIST cannot be configured on a Controller.
VirtualIstClusterId Specifies the cluster ID of vIST, if vIST is
configured on a Leaf.
vIST cannot be configured on a Controller.
Set to 0 if vIST is not configured.
VirtuaIIstIsid Specifies the I-SID if vIST is configured.
OperState Specifies the operational state of the node.
View the DvR routes (host routes and the IPv4 network routes) that are learned on a DvR Controller or a
Leaf node.
Controllers display all the IP subnet routes configured for that DvR domain. Leaf nodes display the
IP subnet routes learned from the Controller(s) for the Layer 2 VSNs in the DvR Domain. Leaf nodes
also display any redistributed routes into the DvR Domain that are learned from the Controllers (direct
routes, static routes and the default route).
Procedure
Name Description
DestIpAddrType Specifies the IPv4 destination address type of the
DvR route.
DestIpAddr Specifies the IPv4 destination address of the DvR
route.
DestMask Specifies the destination mask of the DvR route.
L3Isid Specifies the Layer 3 I-SID of the DvR route.
EcmpIndex Specifies the ECMP index for the ECMP routes of
the DvR route.
Name Description
NextHopMac Specifies the MAC address of the next hop BEB in
the DvR route.
L2Isid Specifies the Layer 2 I-SID of the DvR route.
VrfId Specifies the VRF ID.
Cost Specifies the SPB cost of the DvR route.
NextHopName Specifies the host name of the next hop BEB, in
the DvR route.
Type Specifies the route type of the DvR route.
View the members of all DvR domains namely the Controllers and Leaf nodes.
You can view this information on either a Controller or a Leaf node. Both the Controller and the Leaf
node displays the members of the DvR domain to which it belongs.
Procedure
Name Description
MacAddress Specifies the system ID or the nodal MAC address
of this DvR member.
SysName Specifies the system name of this DvR member.
NickName Specifies the nick name of this DvR member.
Role Specifies the DvR role (Controller or Leaf) of this
DvR member.
DomainId Specifies the domain ID of the DvR domain that
this member belongs to.
DvR backbone members are either DvR Controllers or non-DvR BEBs that receive redistributed host
routes from all other DvR Controllers in the SPB network.
Procedure
Name Description
MacAddress Specifies the system ID or the nodal MAC address
of this DvR backbone member.
SysName Specifies the system name of this DvR backbone
member.
NickName Specifies the nick name of this DvR backbone
member.
Role Specifies the role of this DvR backbone member.
It is either a DvR Controller or a non-DvR BEB.
DomainId Specifies the domain ID of the DvR domain that
this backbone member belongs to.
The domain ID is 0 for a non-DvR BEB.
Perform this procedure to view the remote DvR backbone members. DvR backbone members are either
DvR Controllers or non-DvR BEBs that receive redistributed host routes from all other DvR Controllers
in the SPB network.
Procedure
Name Description
MacAddress Specifies the system ID or the nodal MAC address
of this DvR backbone member.
SysName Specifies the system name of this DvR backbone
member.
NickName Specifies the nick name of this DvR backbone
member.
Role Specifies the role of this DvR backbone member.
It is either a DvR Controller or a non-DvR BEB.
DomainId Specifies the domain ID of the DvR domain that
this backbone member belongs to.
The domain ID is 0 for a non-DvR BEB.
On Controllers, DvR interfaces are created when you configure IP on a DvR enabled Layer 2 VSN (VLAN,
I-SID). Only Controllers display the administrative state of the interfaces because this is where you
enable or disable the interfaces. On a Leaf node, the DvR interface information that the Controllers
push, for example, subnet routes and the gateway IP addresses for the Layer 2 VSNs, are displayed.
Procedure
Name Description
VlanIpAddrType Specifies the VLAN IP address type of the DvR
interface.
VlanIpAddr Specifies the VLAN IP address (IPv4) of the DvR
interface.
L3Isid Specifies the Layer 3 I-SID of the DvR interface.
The range is 1 to 16777215.
L2Isid Specifies the Layer 2 I-SID of the DvR interface.
The range is 1 to 16777215.
VlanIpMask Specifies the VLAN IP address mask of the DvR
interface.
VrfId Specifies the VRF ID of the DvR interface.
The VRF ID is 0 for the GRT.
VlanId Specifies the VLAN ID of the DvR interface.
GwIpAddrType Specifies the address type of the DvR gateway IP
address (IPv4).
GwIpAddr Specifies the DvR gateway IP address (IPv4).
AdminState Specifies the administrative state of the DvR
interface.
SpbmcState Specifies the state of IP Multicast over Fabric
Connect, on the DvR interface.
IgmpVersion Specifies the version of IGMP that runs on the DvR
interface.
View DvR host entries (IPv4 remote ARPs) on either a Controller or a Leaf node. The node displays the
host entries learned either locally on its UNI port or dynamically from other nodes in the DvR domain.
Procedure
Name Description
IpAddrType Specifies the address type of the DvR host entry
(IPv4 remote ARP).
IpAddr Specifies the IPv4 address of the DvR host entry.
Mask Specifies the subnet mask of the DvR host entry.
L3Isid Specifies the Layer 3 I-SID of the DvR host entry.
MacAddr Specifies the MAC address of the DvR host entry.
L2Isid Specifies the Layer 2 I-SID of the DvR host entry.
VrfId Specifies the VRF ID associated with the DvR host
entry.
Port Specifies the port of the DvR host entry.
DomainId Specifies the DvR domain ID of the DvR host
entry.
Type Specifies the host type of the DvR host entry.
NextHopName Specifies the next hop system name of the DvR
host entry.
NextHopMac Specifies the next hop system MAC address of the
DvR host entry.
ClearEntry Clears the entry if the configured value is true.
Perform this procedure to view the remote DvR host entries (IPv4 remote ARPs) on either a Controller
or a Leaf node. The node displays the host entries learned either locally on its UNI port or dynamically
from other nodes in the DvR domain.
Procedure
Name Description
IpAddrType Specifies the address type of the DvR host entry
(IPv4 remote ARP).
IpAddr Specifies the IPv4 address of the DvR host entry.
Mask Specifies the subnet mask of the DvR host entry.
L3Isid Specifies the Layer 3 I-SID of the DvR host entry.
MacAddr Specifies the MAC address of the DvR host entry.
L2Isid Specifies the Layer 2 I-SID of the DvR host entry.
VrfId Specifies the VRF ID associated with the DvR host
entry.
Port Specifies the port of the DvR host entry.
DomainId Specifies the DvR domain ID of the DvR host
entry.
Type Specifies the host type of the DvR host entry.
NextHopName Specifies the next hop system name of the DvR
host entry.
NextHopMac Specifies the next hop system MAC address of the
DvR host entry.
ClearEntry Clears the entry if the configured value is true.
Clear DvR host entries (IPv4 remote host routes) on a Controller. The host entries are learned on the
switch either locally on its UNI port or dynamically from other nodes in the DvR domain.
Note
You can clear DvR host entries only on a DvR Controller.
An error message displays if you attempt clearing of host entries on a DvR Leaf node.
Procedure
Name Description
ClearAll Select to clear all DvR host entries.
ClearIpv4 Specifies the IPv4 address of the DvR host entries
to clear.
The IPv4 address must not be the VLAN IP
address on any Controller within the DvR domain.
ClearL2Isid Specifies the Layer 2 VSN I-SID of the DvR host
entries to clear.
The range is 0 to 16777215.
ClearL3Isid Specifies the Layer 3 VSN I-SID of the DvR host
entries to clear.
The range is 0 to 16777215.
View VRFs corresponding to Layer 3 (routed) VSN I-SIDs on either a Controller or a Leaf node.
Procedure
Name Description
VrfId Specifies the VRF ID of the VRF corresponding to
the Layer 3 VSN I-SID.
Isid Specifies the Layer 3 VSN I-SID.
VrfName Specifies the VRF name of the VRF corresponding
to the Layer 3 VSN I-SID.
InjectDefaultRouteDisable Specifies whether injection of default routes is
disabled.
The Controller node displays all the IP subnet routes configured for that DvR domain. A Leaf node
displays all IP subnet routes learned from the Controller(s) for the Layer 2 VSNs in the DvR Domain. It
also displays the Host Routes (ARPs) learned from other DvR enabled nodes.
Procedure
Name Description
DestIpAddrType Specifies the address type of the IPv4 destination
address of the DvR database entry.
DestIpAddr Specifies the IPv4 destination address of the DvR
database entry.
DestMask Specifies the destination mask of the DvR
database entry.
L3Isid Specifies the Layer 3 I-SID of the DvR database
entry.
EcmpIndex Specifies the ECMP index for the DvR database
entry.
NextHop Specifies the MAC address of the next hop BEB, in
the DvR database entry.
L2Isid Specifies the Layer 2 I-SID of the DvR database
entry.
VrfId Specifies the VRF ID for the DvR database entry.
OutgoingInterface Specifies the outgoing interface (port or MLT) of
the DvR database entry.
SpbCost Specifies the SPB cost of the DvR database entry.
PrefixCost Specifies the prefix cost of the DvR database
entry.
NextHopName Specifies the host name of the next hop BEB, in
the DvR database table entry.
Age Specifies the uptime since creation of the DvR
database table entry.
Perform this procedure to view all remote DvR routes on a Controller or a Leaf node.
The Controller node displays all the IP subnet routes configured for that DvR domain. A Leaf node
displays all IP subnet routes learned from the Controller(s) for the Layer 2 VSNs in the DvR Domain. It
also displays the Host Routes (ARPs) learned from other DvR enabled nodes.
Procedure
Name Description
DestIpAddrType Specifies the address type of the IPv4 destination
address of the DvR database entry.
DestIpAddr Specifies the IPv4 destination address of the DvR
database entry.
DestMask Specifies the destination mask of the DvR
database entry.
L3Isid Specifies the Layer 3 I-SID of the DvR database
entry.
EcmpIndex Specifies the ECMP index for the DvR database
entry.
NextHop Specifies the MAC address of the next hop BEB, in
the DvR database entry.
L2Isid Specifies the Layer 2 I-SID of the DvR database
entry.
VrfId Specifies the VRF ID for the DvR database entry.
OutgoingInterface Specifies the outgoing interface (port or MLT) of
the DvR database entry.
SpbCost Specifies the SPB cost of the DvR database entry.
Name Description
PrefixCost Specifies the prefix cost of the DvR database
entry.
NextHopName Specifies the host name of the next hop BEB, in
the DvR database table entry.
Age Specifies the uptime since creation of the DvR
database table entry.
View the DvR backbone entries (redistributed host routes) learned from all Controllers in all DvR
domains.
Note
You can view DvR backbone entries only on a Controller. Viewing backbone entries does not
apply to a Leaf node.
Procedure
Name Description
IpAddrType Specifies the address type of the DvR backbone
host (IPv4 remote ARP).
IpAddr Specifies the IPv4 address of the DvR backbone
host.
L3Isid Specifies the Layer 3 I-SID of the DvR backbone
host.
DomainId Specifies the domain ID of the DvR backbone
host.
EcmpIndex Specifies the ECMP index of the DvR backbone
host.
HostMacAddr Specifies the MAC address of DvR backbone host.
Name Description
L2Isid Specifies the Layer 2 I-SID of the DvR backbone
host.
AdvControllerName Specifies the host name of the advertising
Controller.
AdvController Specifies the host MAC address of the advertising
Controller.
NextHopName Specifies the host name of the next hop Backbone
host in the DvR route.
NextHopMac Specifies the MAC address of the next hop
Backbone host in the DvR route.
Perform this procedure to view the remote DvR backbone entries (redistributed host routes) learned
from all Controllers in all DvR domains.
Note
You can view DvR backbone entries only on a Controller. Viewing backbone entries does not
apply to a Leaf node.
Procedure
Name Description
IpAddrType Specifies the address type of the DvRbackbone
host (IPv4 remote ARP).
IpAddr Specifies the IPv4 address of the DvR backbone
host.
Name Description
L3Isid Specifies the Layer 3 I-SID of the DvR backbone
host.
DomainId Specifies the domain ID of the DvR backbone
host.
EcmpIndex Specifies the ECMP index of the DvR backbone
host.
HostMacAddr Specifies the MAC address of DvR backbone host.
L2Isid Specifies the Layer 2 I-SID of the DvR backbone
host.
AdvControllerName Specifies the host name of the advertising
Controller.
AdvController Specifies the host MAC address of the advertising
Controller.
NextHopName Specifies the host name of the next hop Backbone
host in the DvR route.
NextHopMac Specifies the MAC address of the next hop
Backbone host in the DvR route.
Perform this procedure to view the DvR Multi-area SPB backbone entries that the system learns from all
Controllers in all DvR domains.
Note
You can view the backbone entries only on a DvR Controller. Viewing backbone entries does
not apply to a DvR Leaf node.
Procedure
Name Description
IpAddrType Specifies the address type of the DvR backbone
host (IPv4 remote ARP).
IpAddr Specifies the IPv4 address of the DvR backbone
host.
L3Isid Specifies the Layer 3 I-SID of the DvR backbone
host.
DomainId Specifies the domain ID of the DvR backbone
host.
EcmpIndex Specifies the ECMP index of the DvR backbone
host.
HostMacAddr Specifies the MAC address of DvR backbone host.
L2Isid Specifies the Layer 2 I-SID of the DvR backbone
host.
AdvControllerName Specifies the host name of the advertising
Controller.
AdvController Specifies the host MAC address of the advertising
Controller.
NextHopName Specifies the host name of the next hop Backbone
host in the DvR route.
NextHopMac Specifies the MAC address of the next hop
Backbone host in the DvR route.
Area Specifies the type of area as home or remote.
Perform this procedure to view the remote DvR Multi-area SPB backbone entries that the system learns
from all Controllers in all DvR domains.
Note
You can view the backbone entries only on a DvR Controller. Viewing backbone entries does
not apply to a DvR Leaf node.
Procedure
Name Description
IpAddrType Specifies the address type of the DvR backbone
host (IPv4 remote ARP).
IpAddr Specifies the IPv4 address of the DvR backbone
host.
L3Isid Specifies the Layer 3 I-SID of the DvR backbone
host.
DomainId Specifies the domain ID of the DvR backbone
host.
EcmpIndex Specifies the ECMP index of the DvR backbone
host.
HostMacAddr Specifies the MAC address of DvR backbone host.
L2Isid Specifies the Layer 2 I-SID of the DvR backbone
host.
AdvControllerName Specifies the host name of the advertising
Controller.
AdvController Specifies the host MAC address of the advertising
Controller.
NextHopName Specifies the host name of the next hop Backbone
host in the DvR route.
NextHopMac Specifies the MAC address of the next hop
Backbone host in the DvR route.
Area Specifies the type of area as home or remote.
Table 79: Extensible Authentication Protocol over LAN product support (continued)
Feature Product Release introduced
EAP enhancements: EAP on Flex VSP 4450 Series Not Supported
UNI ports, Auto-sense ports,
auto-isid-offset VSP 4900 Series VOSS 8.3
VSP 7200 Series VOSS 8.3
VSP 7400 Series VOSS 8.3
VSP 8200 Series VOSS 8.3
VSP 8400 Series VOSS 8.3
VSP 8600 Series Not Supported
XA1400 Series Not Supported
EAP enhancements: Wake on VSP 4450 Series VOSS 8.3
LAN, Guest I-SID, Fail Open I-SID
VSP 4900 Series VOSS 8.3
VSP 7200 Series VOSS 8.3
VSP 7400 Series VOSS 8.3
VSP 8200 Series VOSS 8.3
VSP 8400 Series VOSS 8.3
VSP 8600 Series Not Supported
XA1400 Series Not Supported
Non EAPoL MAC RADIUS VSP 4450 Series VOSS 4.2.1
authentication
VSP 4900 Series VOSS 8.1
VSP 7200 Series VOSS 4.2.1
VSP 7400 Series VOSS 8.0
VSP 8200 Series VOSS 4.2.1
VSP 8400 Series VOSS 4.2.1
VSP 8600 Series Not Supported
XA1400 Series Not Supported
QoS Priority Assignment VSP 4450 Series VOSS 7.0
VSP 4900 Series VOSS 8.1
VSP 7200 Series VOSS 7.0
VSP 7400 Series VOSS 8.0
VSP 8200 Series VOSS 7.0
VSP 8400 Series VOSS 7.0
VSP 8600 Series Not Supported
XA1400 Series Not Supported
Table 79: Extensible Authentication Protocol over LAN product support (continued)
Feature Product Release introduced
RADIUS Dynamic User-Based VSP 4450 Series Not Supported
Policies
VSP 4900 Series VOSS 8.3
VSP 7200 Series VOSS 8.3
VSP 7400 Series VOSS 8.3
VSP 8200 Series VOSS 8.3
VSP 8400 Series VOSS 8.3
VSP 8600 Series Not Supported
XA1400 Series Not Supported
RADIUS Port and VLAN based VSP 4450 Series VOSS 8.4
Attributes
VSP 4900 Series VOSS 8.4
VSP 7200 Series VOSS 8.4
VSP 7400 Series VOSS 8.4
VSP 8200 Series VOSS 8.4
VSP 8400 Series VOSS 8.4
VSP 8600 Series Not Supported
XA1400 Series Not Supported
Continuity Mode for Fail Open VSP 4450 Series VOSS 8.6
VLAN and Fail Open I-SID
VSP 4900 Series VOSS 8.6
VSP 7200 Series VOSS 8.6
VSP 7400 Series VOSS 8.6
VSP 8200 Series VOSS 8.6
VSP 8400 Series VOSS 8.6
VSP 8600 Series Not Supported
XA1400 Series Not Supported
EAPoL
Extensible Authentication Protocol over LAN (EAPoL or EAP) is a port-based network access control
protocol. EAP provides security by preventing users from accessing network resources before they are
authenticated. The EAP authentication feature prevents users from accessing a network to assume a
valid identity and access confidential material or launch denial-of-service attacks.
You can use EAP to set up network access control on internal LANs and to exchange authentication
information between an end station or server that connects to a switch and an authentication server
(such as a RADIUS server). This security feature extends the benefits of remote authentication to
internal LAN clients. For example, if a new client PC fails the authentication process, EAP prevents the
new client PC from accessing the network.
EAP terminology
This section lists some components and terms used with EAP-based security.
• Supplicant—a device, such as a PC, that applies for access to the network.
• Authenticator—software on a switch that authorizes or rejects a Supplicant attached to the other
end of a LAN segment.
◦ Port Access Entity (PAE)—software that controls each port on the device. The PAE, which resides
on the switch, supports the Authenticator functionality.
◦ Controlled Port—any port on the device with EAP enabled.
• Authentication Server—a RADIUS server that provides AAA services to the authenticator.
Configuration Process
The Authenticator facilitates the authentication exchanges that occur between the Supplicant and the
Authentication Server. The Authenticator PORT ACCESS ENTITY (PAE) encapsulates the EAP message
into a RADIUS packet, and then sends the packet to the Authentication Server.
The Authenticator manages the access to controlled port. At system initialization, or when a Supplicant
initially connects to one of the controlled ports on the device, the system blocks data traffic of the
Supplicant until gets authenticated. After the Authentication Server notifies the Authenticator PAE
about the success or failure of the authentication, the Authenticator decides whether to permit/deny
the traffic of client on controlled port.
The following figure illustrates how the switch, configured with EAP, reacts to a new network
connection.
1. The switch detects a new connection on one of its EAP-enabled ports and requests a user ID from
the new client PC.
2. The new client sends its user ID to the switch.
3. The switch uses RADIUS to forward the user ID to the RADIUS server.
4. The RADIUS server responds with a request for the password of the user.
5. The switch forwards the request from the RADIUS server to the new client.
6. The new client sends an encrypted password to the switch, within the EAP packet.
7. The switch forwards the EAP packet to the RADIUS server.
8. The RADIUS server authenticates the password.
9. The switch grants the new client access to the network.
10. The new client accesses the network.
If the RADIUS server cannot authenticate the new client, it denies the new client access to the network.
The following figure shows the Ethernet frames and the corresponding codes for EAP as specified by
802.1x.
You must specify the RADIUS server that supports EAP as the primary RADIUS server for the switch.
You must configure your switch for VLANs and EAP security.
• You can configure a total of 32 MAC clients, EAP and NEAP hosts, on an EAP-enabled port. Two
MAC clients per port is a typical configuration.
• You cannot configure EAP on MLT/LACP interfaces.
• You cannot add EAP-enabled ports to an MLT/LACP group.
• You cannot enable VLACP on EAP enabled ports.
• Manual VLAN changes on a EAP enabled port is restricted.
• You cannot change the VLAN port tagging on EAP enabled ports.
• You cannot configure the default VLAN ID. Use the Guest VLAN configuration to access
unauthenticated devices.
• You cannot enable MACsec on EAP enabled ports.
• You cannot enable EAP on network-to-network interface (NNI).
• You cannot egress mirror an EAP PDU.
• Do not use EAP with a brouter port.
• Ping to and from services between nodes over the NNI will work even when it contains only EAP
enabled ports with no authenticated clients on it.
• MHSA and Fail Open VLAN are mutually exclusive.
• Fail-Open I-SID is not supported in MHSA mode.
• You cannot change the EAP operation mode on EAP enabled ports.
• You cannot configure private VLANs as Fail Open VLAN or Guest VLAN.
• You cannot configure SPBM B-VLAN as Fail Open VLAN or Guest VLAN.
• You cannot delete a VLAN if the VLAN is configured as Fail Open VLAN or Guest VLAN.
If you configure a RADIUS server to send a VLAN ID in the Access-Accept response, the EAP feature
dynamically changes the VLAN configuration of the port by adding the port to the specified VLAN.
EAP dynamic VLAN assignment affects the following VLAN configuration values:
• Port membership
• Port priority
• Default VLAN ID
When you disable EAP on a port that was previously authorized, VLAN configuration values for that
port are restored directly from the nonvolatile random access memory (NVRAM) of the device.
You can set up your Authentication Server (RADIUS server) for EAP dynamic VLAN assignments. You
can use the Authentication Server to configure user-specific settings for VLAN memberships and port
priority.
When you log on to a system that is configured for EAP authentication, the Authentication Server
recognizes your user ID and notifies the device to assign preconfigured (user-specific) VLAN
membership and port priorities to the device. The configuration settings are based on configuration
parameters that were customized for your user ID and previously stored on the Authentication Server.
Note
Static entries like IGMP, ARP, FDB configured on a port of an VLAN interface, will not
be retained if the port is assigned a same VLAN by the RADIUS server and the client
authenticated on the port gets disconnected or unauthenticated.
In MHMV mode, the port-priority assigned by the RADIUS server is configured by MAC address for each
authenticated client. After configuration, the QoS level on the port does not change.
Use MHMV to assign multiple authenticated devices to different VLANs on the same port. Clients can
access different VLANs access using the MAC address of the devices. Different clients with different
level of access (unauthorized to authorized) in different VLANs and with different QoS priorities, can
exist on the same port.
With MHMV, EAP Multihost VLAN supports tagged and untagged ports. A port can be a member of
multiple tagged and untagged VLANs.
In MHMV mode, MAC based VLANs support traffic separation between different authenticated MAC
clients. MAC based VLAN traffic separation applies only to untagged VLAN traffic. If the data traffic is
tagged and if VLAN is configured on the port, then the traffic is forwarded to the VLAN associated with
the tag.
The following figure represents the functionality when clients are not authenticated.
Note
The clients cannot access the network as they are not authenticated.
• Client PC1 can access all initial VLANs using tagged frames.
• The remaining clients stay unauthenticated and cannot access any VLANs.
The following figure represents the functionality when client PC1 authenticates.
Note
PC1 is authenticated with RADIUS VLAN 1. The other clients cannot access the network as
they are unauthenticated.
traffic. The binding is not between the MAC and the VLAN. Untagged S-UNIs generated from the
RADIUS server for a MAC or MACs are considered as MAC-based S-UNIs.
The RADIUS server also provides the VLAN:ISID binding for the MAC, which results in the addition of an
untagged Switched UNI (S-UNI) for that particular I-SID. Only the MAC or MACs that receive the I-SID
from the RADIUS server can transmit traffic to Extensible Authentication Protocol (EAP)-enabled Flex
UNI ports.
The switch uses MAC-based S-UNIs with EAP-enabled Flex UNI ports in MHMV mode only.
The MAC-based S-UNI model does not apply to MHSA mode. In Multiple Host Single Authentication
(MHSA) mode used in the untagged S-UNI model that exists on VOSS switches. S-UNIs generated from
the information obtained from the RADIUS server are considered as classic or default untagged S-UNIs.
Note
EAP is not supported on MLT/SMLTs. Only the EAP I-SIDs are synchronized between one vIST
peer and another vIST peer. S-UNIs are not synchronzied with the vIST peer.
EAP with Flex UNI is supported on Distributed Virtual Routing (DvR) Leafs. An untagged S-UNI (where
the system learns MACs based on the I-SID to MAC binding) must have a platform VLAN associated
with it. If a default untagged S-UNI is used, the corresponding S-UNI must be received from the DvR
Controllers.
You must configure the desired bindings for EAP/NEAP clients on the RADIUS server. When confirming
the authentication request, the RADIUS server also sends the corresponding binding for the EAP/NEAP
client.
The FA Proxy sends to the FA Server the binding received from the RADIUS server. If the FA Server
rejects all the bindings, the client is disconnected. EAP clients are moved from AUTHENTICATED state
to HELD state.
On an FA Server, when an EAP/NEAP device is authenticated and an FA binding is received from the
RADIUS server, a Switched UNI (S-UNI) is created.
After an EAP/NEAP client is disconnected, the switch cleans-up the binding associated with the client, if
no other EAP/NEAP client on that port uses it.
EAP and FA can be enabled in any order; however, EAP must have Flex UNI enabled in order to function
on an FA-enabled port.
FA clients that generate S-UNI bindings must be used with EAP MHSA mode, while FA clients that do
not generate S-UNI bindings should be used with EAP MHMV mode.
When a MAC address migrates from one port to another port, the new EAPoL-enabled port triggers a
new RADIUS authentication. New bindings are applied on the new EAPoL-enabled port. The old port
detects the MAC is moved and automatically deletes the old binding or bindings.
The Mac moves mechanism works between vIST peers when a MAC address on one peer migrates to
the other peer but only if the I-SID in which the MAC address is learned exists on the new and the old
peer.
Auto-sense Ports
EAP and NEAP is integrated with Auto-sense infrastructure. If a RADIUS server is configured on the
switch, Auto-sense-enabled ports activate EAP and NEAP authentication automatically.
For more information about Auto-sense functionality, see Auto-sense on page 15.
Use VLAN attributes for RADIUS assignments in VLAN mode. This mode applies when the EAP-enabled
port does not have Flex-UNI enabled.
Use VLAN:ISID attributes for RADIUS assignments in I-SID mode. This mode applies when the EAP-
enabled port does have Flex-UNI enabled.
The following table summarizes the accounting events and information logged.
The following table describes the mapping of the causes of 802.1x session terminations to the
corresponding RADIUS accounting attributes.
The system clears the rules when the following events occur:
• You disable EAPoL globally on the switch.
• EAP and NEAP sessions are cleared.
• You shutdown the port.
Note
• You must enable RADIUS and EAP over LAN (EAPoL) on the switch. For more information,
see Enabling RADIUS authentication on page 2736 and Globally enabling EAP on the
device on page 794.
• You must configure an EAP-enabled RADIUS server. For more information, see Configure
an EAP-enabled RADIUS Server on page 797.
RADIUS Dynamic User-Based Policies support one time configuration of policy attributes on the
RADIUS server and dynamically creates the policies on multiple switches within the network. This
process of automatically creating policies enhances the speed of network access for authenticated
users and also facilitates faster network synchronization in the event of network-wide policy changes.
Extreme Vendor ID 1916 supports the following RADIUS Vendor Specific Attribute (VSA) for RADIUS
Dynamic User-Based Policies:
• Extreme-Dynamic-ACL (ID 251)
The RADIUS server contains the RADIUS VSAs in a configuration file for each EAP or NEAP client that
the switch authenticates. Following is an example of a RADIUS VSA configured on the RADIUS server:
00000000000a Cleartext-Password :="00000000000a"
Service-Type = Framed-User,
Framed-Protocol = PPP,
Auth-Type := Accept,
Fabric-Attach-ISID = 10:100,
Extreme-Dynamic-ACL = CLIENT RadiusGuest
Extreme-Dynamic-ACL = acl inPort
Extreme-Dynamic-ACL = ace 1 sec name ACE-A1 ethernet ether-type eq 0x800 & action deny count & ip
ipprotocol-type eq 17 & protocol dst-port eq 4000
Extreme-Dynamic-ACL = ace 2 sec name ACE-A2 ethernet ether-type eq ip & ip dst-ip eq 10.10.10.1 &
action deny
Extreme-Dynamic-ACL = acl set default-action deny
When the switch receives a new VSA with ACL and Access Control Entries (ACE) rules from the RADIUS
server, the switch dynamically creates the ACL infrastructure based on the following:
• Dynamic ACLs - the switch allocates one dynamic ACL for each EAP enabled port. You cannot
manually configure the dynamic ACL. The dynamic behavior of the ACL depends on the EAP port
state (MHMV or MHSA). RADIUS Dynamic User-Based Policies support the inPort and outPort ACL
types. You can display the filter ACL configuration on the switch using the show filter acl
command, to identify the source of ACL configuration (static or dynamic).
• Dynamic ACEs - after the switch configures an ACL as dynamic, the system automatically considers
the ACEs in that ACL as dynamic. You cannot manually configure the ACEs in a dynamic ACL. When
the switch receives an ACE rule from the RADIUS server, the system allocates an ACE ID to it. Each
ACE rule carries a relative order that helps the switch to set priority for the ACE rules that the switch
receives. For handling of Radius ACL rules, the switch parses the rules first. Based on the actions,
the system classifies the rules as security ACEs or QoS ACEs. If the switch is unable to recognize the
qualifiers or actions in a rule, then the switch ignores that rule.
• Multiple Host Multiple VLAN (MHMV) operating mode - the system authenticates each MAC that the
switch receives on the EAP-enabled port and assigns the MAC to a specific VLAN or VLAN to I-SID
binding. The system uses the VLAN to I-SID binding when Flex UNI is enabled on a port. The system
processes the ACE rules that the switch receives from the RADIUS server on a per MAC basis, the
system translates the default-action into an ACE rule with actions, deny or permit. When the switch
processes the RADIUS VSAs, the system adds the MAC as a qualifier for each ACE rule.
• Multiple Host Single Authentication (MHSA) operating mode - the system processes the ACE rules
that it receives from the RADIUS server on a per port basis.
NEAP host
The following section provides information about NEAP hosts on EAP-enabled ports and RADIUS
authentication.
Support for NEAP hosts on EAP-enabled ports is primarily intended to accommodate printers and other
passive devices sharing a hub with EAP clients.
Support for NEAP hosts on EAP-enabled ports includes the following features:
• Authenticated NEAP clients are hosts that satisfy one of the following criteria:
◦ Host MAC address is authenticated by RADIUS.
• NEAP hosts are allowed even if no authenticated EAP hosts exist on the port.
• When a new host is seen on the port, NEAP authentication is performed as follows:
◦ The switch generates a <username, password> pair, which it forwards to the network RADIUS
server for authentication.
Important
Follow these Global Configuration examples to select a password format that combines one
or more of these three elements:
• Padding enabled , password = 010010011253..05. (when the switch IP address and port are
used).
• Padding enabled, password = 010010011253… (when only the switch IP address is used).
• No padding (default option). Password = 000011220001 (when only the user’s MAC
address is used).
The following example illustrates the <username, password> pair format with no padding enabled and
using the IP address, MAC address, and key-string as the password.
switch IP address = 192.0.2.5
non-EAP host MAC address = 00 C0 C1 C2 C3 C4
port = 25
Key-String = abcdef
• username = 00C0C1C2C3C4
• password = 010010011253.00C0C1C2C3C4.25.abcdef
==========================================================================================
Eapol System
==========================================================================================
eap : enabled
Eapol Version : 3
non-eap-pwd-fmt : mac-addr
non-eap-pwd-fmt key : ******
non-eap-pwd-fmt padding : disabled
auto-isid-offset status : disabled
auto-isid-offset value : 15980000
NEAP client
The following section provides information for NEAP client.
When you enable NEAP client re-authentication, an authenticated NEAP client is only removed from
the authenticated client list if you remove the client account from the RADIUS server, or if you clear the
NEAP authenticated client from the switch.
If an authenticated NEAP client does not generate traffic on the network, the system removes the
MAC address for that client from the MAC address table when MAC ages out. Although the system
does not display the client MAC address in the MAC Address table and it can display the client as an
authenticated client.
If you enable NEAP client re-authentication and the RADIUS server that the switch connects to
becomes unavailable, the system clears all authenticated NEAP and removes those clients from the
switch NEAP client list.
You cannot authenticate one NEAP client on more than one switch port simultaneously. If you connect
NEAP clients to a switch port through a hub, those clients are authenticated on that switch port. If
you disconnect a NEAP client from the hub and connect it directly to another switch port, the client
is authenticated on the new port and its authentication is removed from the port to which the hub is
connected.
Important
If the default untagged S-UNI is used, you must have a platform VLAN associated with it. This
is required to properly transmit traffic and to generate MAC learning events for traffic sent to
MAC-based S-UNIs.
When an untagged S-UNI is present on the port, the untagged MAC is initially learned on that S-UNI.
When an untagged S-UNI does not exist on the port, the untagged MAC is learned on a special
(internal) VLAN. The RADIUS server provides the VLAN:I-SID assignment.
MAC learning for tagged traffic occurs only if there is a tagged S-UNI with the corresponding C-VID on
that port. The RADIUS server reconfirms the S-UNI that performed MAC learning.
Note
Do not connect more than 100 EAP and 100 NEAP devices on the switch.
Note
EAP-MAC-MAX is overwritten by MAC-MAX. Even if EAP-MAC-MAX is set to a higher limit,
then MAC-MAX must not exceed and you must not authenticate more than MAC-MAX clients.
Note
NON-EAP-MAC-MAX is overwritten by MAC-MAX. Even if NON-EAP-MAC-MAX is set to a
higher limit, then MAC-MAX must not exceed and you must not authenticate more than
MAC-MAX clients.
Example Scenarios
1. Scenario 1:
• EAP-MAC-MAX 32
• NON-EAP-MAC-MAX 32
• MAC-MAX 10
In this scenario, there are ten EAP and NEAP authenticated clients, in the order of authentication.
2. Scenario 2:
• EAP-MAC-MAX 1
• NON-EAP-MAC-MAX 1
• MAC-MAX 1
In this scenario, only one EAP or one NEAP client is authenticated, in the order of authentication.
3. Scenario 3:
• EAP-MAC-MAX 5
• NON-EAP-MAC-MAX 10
• MAC-MAX 32
In this scenario, up to five EAP clients and ten NEAP clients are allowed.
4. Scenario 4:
• EAP-MAC-MAX 5
• NON-EAP-MAC-MAX 8
• MAC-MAX 7
In this scenario, up to five EAP clients and seven NEAP clients are allowed. The total number of EAP
or NEAP clients is limited to seven.
MHSA is primarily intended to accommodate printers and other passive devices sharing a hub with EAP
and NEAP clients.
Guest VLAN
Guest VLAN support provides limited network access until the client is authenticated. Guest VLAN
is configured irrespective of the number of authenticated clients present on the port. Guest VLAN is
available for each port. Only port based VLANs are used as Guest VLANs. When the Guest VLAN is
active, port is added to the VLAN ID, and port default VLAN ID changes to Guest VLAN ID.
The following figure represents the functionality when clients are not authenticated.
Note
The clients cannot access the network as they are not authenticated and Guest VLAN is not
configured.
• All Clients behind the port can access the Guest VLAN.
The following figure represents the functionality when Guest VLAN is activated.
Note
All clients have Guest VLAN access.
• A client behind the MHMV port gets authenticated. For this usage scenario let us consider PC1 as the
authenticated client.
• The port default VLAN ID is equal to the Guest VLAN ID and remains unchanged.
• The port is copied into the RADIUS assigned VLAN (if any).
• The untagged traffic that originates from PC1 (identified by MAC address) can access only the
RADIUS assigned VLAN or the initial port default VLAN ID, if the RADIUS VLAN attribute is missing.
• The remaining clients that send untagged traffic are unauthenticated devices. The unauthenticated
devices can access only the Guest VLAN because the port VLAN ID is equal to the Guest VLAN ID.
• The initial VLANs are accessed by the following devices:
◦ Authenticated devices that are missing RADIUS VLAN attributes.
◦ Authenticated devices that send corresponding tagged packets.
• When another client gets authenticated, the authenticated client undergoes the same process as
PC1.
The following figure represents the functionality when a client gets authenticated:
Note
PC1 is authenticated with RADIUS VLAN 1. The remain clients have guest VLAN access.
• If the RADIUS assigned VLAN is present, then the VLAN membership and the default port VLAN ID
is changed according to its value.
• Guest VLAN loses its purpose because all MACs are allowed automatically without authentication
In MHSA mode, the Guest VLAN applies only when no authenticated client is present on the port.
Guest I-SID
Guest I-SID support provides limited network access until the client is authenticated. The switches uses
the Guest I-SID to forward traffic until the client authenticates and receives other VLAN:ISID bindings
from the RADIUS server.
Guest I-SID is a per-port option. You must configure an I-SID either as a C-VLAN or as an ELAN with an
associated platform VLAN before you can configure it as the Guest I-SID. After you configure the Guest
I-SID and you enable EAP, an untagged S-UNI is created based on the supplied I-SID. When you change
the Guest I-SID while EAP is enabled, the untagged S-UNI is replaced on the port.
In MHSA mode, only one untagged S-UNI can exist on a port at one time. Consider the following:
• If there is a manually configured untagged S-UNI on the port, the untagged S-UNI, which uses the
Guest I-SID replaces it.
• If the RADIUS server provides an untagged S-UNI after the client is authenticated, it replaces the
untagged S-UNI, which was created based on the Guest I-SID.
• If the Guest I-SID is removed, the previous manually configured untagged S-UNI is automatically
restored.
• If the RADIUS-assigned untagged S-UNI is no longer present, EAP recreates the untagged S-UNI
created base on the Guest I-SID.
In MHMV mode, the untagged S-UNIs provided by the RADIUS server are treated as MAC-based
untagged S-UNIs, which are different from the untagged S-UNI on the port. Consider the following
factors:
• If there is a manually configured untagged S-UNI on the port, the untagged S-UNI, which uses the
Guest I-SID, replaces it.
• If the Fail-Open I-SID and the Guest I-SID are both configured, the Guest I-SID is applied, as long as a
RADIUS server is reachable.
• If the RADIUS server becomes unreachable, the untagged S-UNI based on the Fail-Open I-SID is
removed and the untagged S-UNI is created based on the Guest I-SID.
Note
Prior to releases that support Continuity Mode, transition to the Fail Open VLAN is based
on interval-based RADIUS server reachability checks. If the RADIUS server is reachable, the
switch continues to check the reachability at a default interval of three minutes. This interval-
based check can lead to a transition delay of up to three minutes, from the moment when the
RADIUS Server becomes unreachable until the port moves to the Fail Open VLAN.
If the switch cannot connect to the primary and secondary RADIUS servers, then after a specified
number of attempts to restore connectivity, the switch declares the RADIUS servers unreachable.
When you configure Fail Open VLAN on a port and the RADIUS servers are not reachable, then the Fail
Open VLAN provides the following functionality:
• The port is removed from Guest VLAN, if configured, but all other VLAN membership is kept and the
port is added to the Fail Open VLAN.
• The default VLAN ID is changed to the Fail Open VLAN ID.
• Traffic from the authenticated EAP and NEAP clients are forwarded as before.
• If re-authentication is enabled in Fail Open VLAN mode, then EAP and NEAP clients stop performing
re-authentication.
• All new MACs seen on the port are considered as potential EAP and NEAP clients and are granted
Fail Open VLAN access.
When at least one RADIUS server recovers, all EAP-enabled ports are removed from the Fail Open
VLAN. All unauthenticated MACs are flushed to give the MACs an opportunity to authenticate.
Note
Prior to releases that support Continuity Mode, transition to the Fail Open I-SID is based
on interval-based RADIUS server reachability checks. If the RADIUS server is reachable, the
switch continues to check the reachability at a default interval of three minutes. This interval-
based check can lead to a transition delay of up to three minutes, from the moment when the
RADIUS Server becomes unreachable until the port moves to the Fail Open I-SID.
Note
EAP and NEAP clients are not affected when the RADIUS servers are unreachable.
Note
Fail Open I-SID is not supported in MHSA mode.
In MHMV mode, the untagged S-UNIs provided by the RADIUS server are treated as MAC-based
untagged S-UNIs, which are different from the untagged S-UNIs on the port. Consider the following
factors:
• If there is a manually configured untagged S-UNI on the port, the untagged S-UNI, which uses the
Fail Open I-SID, replaces it.
• Caution is advised when both Fail-Open I-SID and Guest I-SID are configured. In this scenario, if
a RADIUS server becomes reachable, the untagged S-UNI created based on the Fail-Open I-SID is
removed and another untagged S-UNI based on the Guest I-SID is created.
EAP Auto-ISID-Offset
EAP auto-isid-offset functionality is used for MACs that do not receive an I-SID attribute from the
RADIUS server. The configured I-SID offset value is used to calculate an I-SID value for a Switched
UNI (S-UNI) when the switch receives only the VLAN attribute from the RADIUS server (not the FA
VLAN:I-SID binding). In that case, the I-SID value is calculated as follows: I-SID = VLAN ID + configured
I-SID offset value.
Wake On LAN
Wake On LAN (WoL) networking standard enables remotely powering-up a shutdown computer from a
sleeping state. In this process, the computer is shutdown with power reserved for the network card. A
packet known as Magic Packet is broadcast on the local LAN or subnet. The network card on, receiving
the Magic Packet, verifies the information. If the information is valid, the network card powers-up the
shutdown computer.
The WoL Magic Packet is a broadcast frame sent over a variety of connectionless protocols, such as
UDP. The most commonly used connectionless protocol is UDP. The Magic Packet contains data that is
a defined constant represented in hexadecimal as FF:FF:FF:FF:FF:FF, followed by 16 repetitions of the
target computer MAC address and possibly by a four or six byte password.
If you implement enhanced network security using 802.1X, the transmission of Magic Packets to
sleeping or unauthorized network devices is blocked. You can use an interface specific 802.1X feature
known as traffic-control to address this requirement of supporting both WoL and 802.1X Authentication
simultaneously. The default mode is in-out. This mode blocks both ingress and egress unauthenticated
traffic on an 802.1X port. Configuring the traffic control mode to in enables the transmission of Magic
Packets to sleeping or unauthenticated devices. This mode allows any network control traffic, such as a
WoL Magic Packet, to be sent to a workstation irrespective of the authentication or sleep status.
Important
If a PC client is assigned to a VLAN based on a previous RADIUS Assigned VLAN, when the
client goes into sleep or hibernation mode it reverts to either the default port-based VLAN or
Guest VLAN configured for that port. Therefore, the WoL Magic Packet must be sent to the
default VLAN or Guest VLAN.
EAPoL (EAP) uses RADIUS protocol for EAP-authorized logons. RADIUS supports IPv4 and IPv6
addresses, with no difference in functionality or configuration.
Before configuring your device, you must configure at least one EAP RADIUS server and shared secret
fields.
You cannot configure EAP on ports that are currently configured for:
• Shared segments
• MultiLink Trunking (MLT)
Change the status of each port that you want to be controlled to auto. The auto setting automatically
authenticates the port according to the results of the RADIUS server. The default authentication setting
for each port is authorized.
Procedure
configure terminal
2. Globally configure EAP:
eapol enable
Example
Switch:1> enable
Switch:1#config t
Switch:1(config)#eapol enable
When you configure a port with the EAP status of auto (Authorization depends on result of EAP
authentication), only one supplicant is allowed on this port. Multiple EAP supplicants are not allowed on
the same physical switch port.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Examples
Enable EAP on an interface:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#interface GigabitEthernet 1/2
Switch:1(config-if)# eapol status auto
Variable Definitions
The following table defines parameters for the eapol status command.
Variable Value
authorized Specifies that the port is always authorized. The default value is
authorized.
auto Specifies that port authorization depends on the results of the EAP
authentication by the RADIUS server. The default value is authorized.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
2. Configure the maximum EAP requests sent to the supplicant before timing out the session:
eapol port {slot/port[/sub-port] [-slot/port[/sub-port]] [,...]} max-
request <1-10>
3. Configure the time interval between authentication failure and the start of a new authentication:
eapol port {slot/port[/sub-port] [-slot/port[/sub-port]] [,...]}
quiet-interval <1-65535>
4. Enable reauthentication:
eapol port {slot/port[/sub-port] [-slot/port[/sub-port]] [,...]} re-
authentication enable
5. Configure the time interval between successive authentications:
eapol port {slot/port[/sub-port] [-slot/port[/sub-port]] [,...]} re-
authentication-period <1-65535>
6. Configure the EAP authentication status:
eapol port {slot/port[/sub-port] [-slot/port[/sub-port]] [,...]}
status {authorized|auto}
Example
Configure the maximum EAP requests sent to the supplicant before timing out the session:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#interface GigabitEthernet 1/2
Switch:1(config-if)#eapol max-request 10
Switch:1(config-if)#eapol port 1/2 quiet-interval 500
Variable Definitions
The following table defines parameters for the eapol port command.
Variable Value
{slot/port[/sub-port] [- Specifies the port or list of ports used by EAP.
slot/port[/sub-port]] Identifies the slot and port in one of the following formats: a
[,...]} single slot and port (slot/port), a range of slots and ports (slot/
port-slot/port), or a series of slots and ports (slot/port,slot/
port,slot/port). If the platform supports channelization and the
port is channelized, you must also specify the sub-port in the
format slot/port/sub-port.
max-request <1-10> Specifies the maximum EAP requests sent to the supplicant
before timing out the session. The default is 2.
quiet-interval <1-65535> Specifies the time interval in seconds between the
authentication failure and start of a new authentication. The
default is 60.
re-authentication enable Enables reauthentication of an existing supplicant at a specified
time interval.
re-authentication-period Specifies the time interval in seconds between successive
<60-65535> reauthentications. The default is 3600 (1 hour).
status {authorized|auto} Specifies the desired EAP authentication status for this port.
RADIUS supports IPv4 and IPv6 addresses, with no difference in functionality or configuration.
Procedure
configure terminal
radius server host WORD <0–46> used-by eapol source-ip WORD <0–46>
By default, the switch uses RADIUS UDP port 1812 for authentication, and port 1813 for accounting.
You can change the port numbers or other RADIUS server options.
Example
Variable Definitions
The following table defines parameters to configure an EAP-enabled RADIUS server with the radius
server host command.
Variable Value
host WORD<0–46> Specifies the IP address of the selected server. RADIUS supports
IPv4 and IPv6 addresses, with no difference in functionality or
configuration.
WORD<0-20> Specifies the secret key, which is a string of up to 20 characters.
The following table defines parameters to use optional arguments of the radius server host
command.
Variable Value
port <1-65535> Specifies the port ID number.
priority <1-10> Specifies the priority number. The lowest number is the
highest priority.
retry <0-6> Specifies the retry count of the account.
timeout <1-180> Specifies the timeout of the server. The default is 30.
enable Enables the functions used by the RADIUS server host.
acct-port <1-65536> Specifies the port account.
acct-enable Enables the account.
secure-enable Enable secure mode on the server.
secure-log-level Specifies the RADIUS secure server log severity level.
Possible values are:
• critical
• debug
• error
• info
• warning
You must configure the switch, through which user-based-policy (UBP) users connect to communicate
with the RADIUS server to exchange EAP authentication information, as well as user role information.
You must specify the IP address of the RADIUS server, as well as the shared secret (a password
that authenticates the device with the RADIUS server as an EAP access point). You must enable EAP
globally on each device, and you must configure EAP authentication on each device port, through
which EAP/UBP users connect.
RADIUS supports IPv4 and IPv6 addresses, with no difference in functionality or configuration.
For more information about EPM and UBP, see the user documentation for your Enterprise Policy
Manager (EPM) application.
Procedure
configure terminal
2. Create a RADIUS server that is used by EAP:
radius server host WORD <0–46> key WORD<0-20> used-by eapol
3. Log on to the Interface Configuration mode:
interface vlan <1-4059>
4. Enable the device to communicate through EAP:
eapol enable
5. Exit from VLAN interface mode:
exit
6. Enter Interface Configuration mode:
interface GigabitEthernet {slot/port[/sub-port][-slot/port[/sub-port]]
[,...]}
7. Enable device ports for EAP authentication:
eapol port {slot/port[/sub-port][-slot/port[/sub-port]][,...]} status
auto
8. Enable periodic supplicant re-authenticating:
eapol port {slot/port[/sub-port][-slot/port[/sub-port]][,...]} re-
authentication enable
9. Save your changes:
save config
Example
Switch:1> enable
Variable Definitions
The following table defines parameters for the radius server host WORD<0–46> usedby
eapol command.
Variable Value
host WORD<0–46> Specifies the IP address of the selected server.
This address tells the device where to find the RADIUS server, from
which it obtains EAP authentication and user role information.
RADIUS supports IPv4 and IPv6 addresses, with no difference in
functionality or configuration.
key WORD<0-20> Specifies the shared secret key that you use for RADIUS authentication.
The shared secret is held in common by the RADIUS server and all
EAP-enabled devices in your network. It authenticates each device with
the RADIUS server as an EAP access point. When you configure your
RADIUS server, you must configure the same shared secret value as you
specify here.
You can also make the ports controlled so that they are dependent on being authorized by the Radius
Server when you globally enable EAP (auto).
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Variable Definitions
The following table defines parameters for the eapol status command.
Variable Value
authorized Specifies that the port is always authorized. The default value is
authorized.
auto Specifies that port authorization depends on the results of the EAP
authentication by the RADIUS server. The default value is authorized.
RADIUS supports IPv4 and IPv6 addresses, with no difference in functionality or configuration.
Procedure
configure terminal
2. Delete an EAP-enabled RADIUS server:
no radius server host WORD<0–46> used-by eapol
Example
Switch:1> enable
Variable Definitions
The following table defines parameters for the radius server host WORD<0–46> usedby
eapol command.
Variable Value
host WORD<0–46> Specifies the IP address of the selected server.
This address tells the device where to find the RADIUS server, from
which it obtains EAP authentication and user role information.
RADIUS supports IPv4 and IPv6 addresses, with no difference in
functionality or configuration.
key WORD<0-20> Specifies the shared secret key that you use for RADIUS authentication.
The shared secret is held in common by the RADIUS server and all
EAP-enabled devices in your network. It authenticates each device with
the RADIUS server as an EAP access point. When you configure your
RADIUS server, you must configure the same shared secret value as you
specify here.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Variable Definitions
The following table defines parameters for the eapol fail-open-vlan command.
Variable Value
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By
default, VLAN IDs 1 to 4059 are configurable and the
system reserves VLAN IDs 4060 to 4094 for internal use.
On switches that support the vrf-scaling and spbm-
config-mode boot configuration flags, if you enable
these flags, the system also reserves VLAN IDs 3500 to
3998. VLAN ID 1 is the default VLAN and you cannot
create or delete VLAN ID 1.
Procedure
Examples
Switch:>enable
Switch:1#config terminal
Switch:1(config)#interface gigabitEthernet 1/2
Switch:1(config-if)#show eapol port 1/2
===========================================================================================================================================
======================================
Eapol Configuration
===========================================================================================================================================
======================================
PORT STATUS OPER DYN Flex-UNI MAX QUIET REAUTH REAUTH NON-EAP LLDP-AUTH MAX MAX MAX GST GST FAIL FAIL
COA ADMIN OPER TRAFFIC ORIGIN
NUM MODE MHSA ENABLE REQ INTVL PERIOD ENABLE ENABLE ENABLE MAC EAP NEAP VLAN I-SID VLAN I-SID
ENABLE TRAFFIC TRAFFIC CONTROL
Switch:>enable
Switch:1#config terminal
Switch:1(config)#show eapol sessions eap verbose
=================================================================================================
Eap Oper Status Verbose
=================================================================================================
PORT MAC PAE VLAN PRI Flex-UNI I-SID VLAN:I-SID ACL ACEs RADIUS DYNAMIC
NUM STATUS ID Enable SOURCE SETTINGS
-------------------------------------------------------------------------------------------------
1/13 00:00:11:11:16:02 authenticated 111 1 false n/a DHCPSNOOP, DAI
1/13 00:00:11:11:16:03 authenticated 111 1 false n/a DHCPSNOOP
Switch:>enable
Switch:1#config terminal
Switch:1(config)#show eapol sessions neap verbose
=================================================================================================
Non-Eap Oper Status Verbose
=================================================================================================
PORT MAC STATE VLAN PRI Flex-UNI I-SID NON-EAP VLAN:I-SID ACL ACEs RADIUS DYNAMIC
NUM ID Enable SOURCE AUTH SETTINGS
-------------------------------------------------------------------------------------------------
1/15 00:00:00:00:00:15 authenticated 1 0 false n/a radius IPSG, DHCPSNOOP, DAI, IGMPSNOOP
1/15 00:00:00:00:00:16 authenticated 1 0 false n/a radius BPDU, SLPPGUARD, WOL, AN-ADVERTISEMENTS:100F
-------------------------------------------------------------------------------------------------
Total Number of NEAP Sessions: 2
Note
Product Notice: auto-isid-offset functionality is not available on VSP 4450 Series, VSP 8600
Series, or XA1400 Series.
Variable Definitions
The following table defines parameters for the show eapol command.
Variable Value
auth-stats Displays the authentication statistics interface.
[gigabitEthernet {slot/
port[/sub-port] [-slot/ Note:
port[/sub-port]] [,...]}] auth-stats [gigabitEthernet {slot/port[/sub-
port] [-slot/port[/sub-port]] [,...]}] is useful
only for EAP supplicants. The command output changes only
when the EAP supplicant tries to access the network.
Note:
Exception: This parameter applies to
VSP 8600 Series only.
port {interface Specifies the ports to display. If no port is entered, all ports are
[gigabitEthernet {slot/ displayed.
port[/sub-port] [-slot/
port[/sub-port]] [,...]}]
| {slot/port[/sub-port]
[-slot/port[/sub-port]]
[,...]}}
session-stats interface Displays the authentication session statistics interface.
[gigabitEthernet {slot/
port[/sub-port] [-slot/
port[/sub-port]] [,...]}]
sessions {eap | Displays EAP and non-EAP authentication sessions on the port.
neap} [vlan<1-4059>]
[{slot/port[/sub-port]
[-slot/port[/sub-port]]
[,...]}] [verbose]
Note:
Exception: This parameter does
not apply to VSP 8600 Series or
XA1400 Series.
Variable Value
status interface [vlan Displays the port EAP operation statistics.
<1-4059>] [gigabitEthernet
{slot/port[/sub-port] [-
slot/port[/sub-port]]
[,...]}]
Note:
Exception: This parameter applies to
VSP 8600 Series only.
Procedure
Example
Switch:#enable
Switch:1#show interfaces gigabitethernet vlan
=====================================================================================
Port Vlans
=====================================================================================
PORT DISCARD DISCARD DEFAULT VLAN PORT UNTAG DYNAMIC UNTAG
NUM TAGGING TAGFRAM UNTAGFRAM VLANID IDS TYPE DEFVLAN VLANS VLANS
-------------------------------------------------------------------------------------
1/1 disable false false 1 1 normal disable P 1
1/2 enable false false 1 1,3,10 normal disable P 1,10
1/3 enable false false 1 1,10,20 normal disable P
Variable Definitions
The following table defines parameters for the show interfaces command.
Variable Value
{slot/port[/sub-port] [-slot/ Identifies the slot and port in one of the following formats:
port[/sub-port]] [,...]} a single slot and port (slot/port), a range of slots and
ports (slot/port-slot/port), or a series of slots and ports
(slot/port,slot/port,slot/port). If the platform supports
channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By
default, VLAN IDs 1 to 4059 are configurable and the
system reserves VLAN IDs 4060 to 4094 for internal use.
On switches that support the vrf-scaling and spbm-
config-mode boot configuration flags, if you enable
these flags, the system also reserves VLAN IDs 3500 to
3998. VLAN ID 1 is the default VLAN and you cannot
create or delete VLAN ID 1.
Procedure
configure terminal
2. Configure the RADUIS password format:
eapol multihost non-eap-pwd-fmt {[ip-addr] [key WORD<1-32>] [mac-addr]
[padding] [port-number]}
Variable Definitions
The following table defines parameters for the eapol multihost non-eap-pwd-fmt command.
Variable Value
ip-addr Management ip-address of the switch.
key WORD<1-32> Key value used for non-eap password format.
mac-addr Mac-Address of the client.
Variable Value
padding Includes a dot in the RADIUS password for every missing
parameter.
port-number Index of the port on which MAC is received.
Note
To derive the port number for an interface, use the command show interfaces gigabit
[{slot/port[/sub-port][-slot/port[/sub-port]][,...]}] .
If you configure interface 1/6 on the product, to derive the port-number for this interface, use the
command show interfaces gigabitEthernet 1/6. From this command, you can ascertain
that port number used in the NEAP password is 197.
Switch:1(config)# show interfaces gigabitEthernet 1/6
==========================================================================================
Port Interface
==========================================================================================
PORT LINK PORT PHYSICAL STATUS
NUM INDEX DESCRIPTION TRAP LOCK MTU ADDRESS ADMIN OPERATE
------------------------------------------------------------------------------------------
1/6 197 1000BaseTX true false 1950 f8:15:47:e1:dd:05 up up
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
2. Set the maximum limit of allowed EAP and NEAP MAC clients supported on the port:
eapol multihost mac-max <1-8192>
Example
Switch:1> enable
Switch:1# configure terminal
Switch:1(config)# interface GigabitEthernet 1/16
Switch:1(config-if)# eapol multihost mac-max <1-8192>
Variable Definitions
The following table defines parameters for the eapol multihost mac-max command.
Variable Value
mac-max <1-8192> Specifies the maximum number of EAP and NEAP MAC
addresses allowed on the port. The maximum limit is 8192 MAC
addresses.
Use this procedure to configure the maximum EAP clients allowed on the port at one time.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Note
eap-mac-max is also used to provide EAP and NEAP separation functionality. By default
the EAP clients are enabled per port and eap-mac-max limit is 2. If eap-mac-max is set
to 0 then EAP client authentication is disabled.
Example
Configure the maximum EAP clients allowed on the port at one time.
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#interface gigabitEthernet 1/1
Switch:1(config)#eapol multihost eap-mac-max 10
Variable Definitions
The following table defines parameters for the eapol multihost eap-mac-max command.
Variable Value
<0–32> Specifies the maximum EAP clients allowed on the port at
one time. The default is 2.
Use this procedure to configure the maximum NEAP clients allowed on the port at one time.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Note
non-eap-mac-max is also used to provide EAP and NEAP separation functionality. By
default the NEAP clients are enabled per port and non-eap-mac-max limit is 2. If
non-eap-mac-max is set to 0 then NEAP client authentication is disabled.
Example
Configure the maximum NEAP clients allowed on the port at one time.
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#interface gigabitEthernet 1/1
Switch:1(config)#eapol multihost non-eap-mac-max 10
Variable Definitions
The following table defines parameters for the eapol multihost non-eap-mac-max command.
Variable Value
<0–8192> Specifies the maximum NEAP clients allowed on the port
at one time. The default is 2.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Variable Definitions
The following table defines parameters for the eapol guest-vlan command.
Variable Value
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By
default, VLAN IDs 1 to 4059 are configurable and the
system reserves VLAN IDs 4060 to 4094 for internal use.
On switches that support the vrf-scaling and spbm-
config-mode boot configuration flags, if you enable
these flags, the system also reserves VLAN IDs 3500 to
3998. VLAN ID 1 is the default VLAN and you cannot
create or delete VLAN ID 1.
Procedure
configure terminal
2. Clear the NEAP session:
clear eapol non-eap
[<0x00:0x00:0x00:0x00:0x00:0x00>] [{slot/port[/sub-port][-slot/port[/
sub-port]][,...]} <0x00:0x00:0x00:0x00:0x00:0x00>]
Example
Switch:1> enable
Switch:1# configure terminal
Switch:1(config)# clear 1/16 00:1b:63:84:45:e6
Variable Definitions
The following table defines parameters for the clear eapol non-eap command.
Variable Value
{slot/port[/sub-port] Specifies the port list on which the NEAP MAC is learnt.
[-slot/port[/sub-port]]
[,...]}
0x00:0x00:0x00:0x00:0x00: Specifies the MAC-Address on the NEAP session.
0x00
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Note
The default EAP operational mode is MHMV.
Example
Variable Definitions
The following table defines parameters for the eapol multihost eap-oper-mode command.
Variable Value
mhmv Specifies the EAP operational mode as Mutiple Host
Multiple VLAN.
mhsa Specifies the EAP operational mode as Mutiple Host Single
Authentication.
Configure a port to allow dynamic changes to EAP sessions. The default is enable.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Switch:1>enable
Switch:1#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#interface gigabitEthernet 1/4
Switch:1(config-if)#eapol radius-dynamic-server enable
Procedure
configure terminal
2. Configure an I-SID offset value:
eapol auto-isid-offset <0-15995903>
3. Enable EAP globally:
eapol enable
4. Confirm that your configuration is correct:
show eapol system
Examples
Configure an I-SID offset value and enable I-SID offset globally on the switch:
Switch:1> enable
Switch:1#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#eapol auto-isid-offset 1000
Switch:1(config)#eapol enable
Variable Definitions
The following table defines parameters for the eapol auto-isid-offset command.
Variable Value
<0-15995903> Specifies the auto I-SID offset value.
The default is 15995903.
enable Enables auto I-SID offset.
The default is disabled.
Configure a platform VLAN and associate the Guest I-SID. 0 indicates that Guest I-SID is not enabled for
this port.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Variable Definitions
The following table defines parameters for the eapol guest-isid command.
Variable Value
<0-16000000> Specifies the Guest I-SID value.
0 indicates that Guest I-SID is not enabled for this port.
Use this procedure to configure Fail Open I-SID. If the switch declares the RADIUS servers unreachable,
then all new devices gain access into the configured Fail Open I-SID. 0 indicates that Fail Open I-SID is
not enabled for this port.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Variable Definitions
The following table defines parameters for the eapol fail-open-isid command.
Variable Value
<0-16000000> Specifies the Fail Open I-SID value.
0 indicates that Fail Open I-SID is not enabled for this port.
Configure Wake-On-LAN
Use the following procedure to configure Wake-On-LAN functionality.
Note
This procedure does not apply to VSP 8600 Series or XA1400 Series.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
2. Configure Wake-On-LAN:
eapol traffic-control <in | in-out>
Variable Definitions
The following table defines parameters for the eapol traffic-control command.
Variable Value
in Specifies incoming traffic is blocked when there is no authenticated
device.
in-out Specifies incoming and outgoing traffic is blocked when there is no
authenticated device.
The default value is in-out.
Note
Use the clear-stats command to clear EAP or NEAP statistics.
Procedure
Example
Note
Product Notice: auto-isid-offset functionality is not available on VSP 4450 Series, VSP 8600
Series, or XA1400 Series.
Note
Use the clear-stats command to clear EAP or NEAP statistics.
Procedure
Example
Switch:1#show eapol auth-stats interface
================================================================================
Eap Authenticator Statistics
================================================================================
PORT EAP AUTH-EAP START LOGOFF INVALID LENGTH LAST-RX LAST-RX
RCVD TX RCVD RCVD FRAMES ERROR VER SRC
--------------------------------------------------------------------------------
1/1 716 1074 0 0 0 0 1 18:a9:05:b1:04:ce
1/2 0 0 0 0 0 0 0 00:00:00:00:00:00
1/3 0 0 0 0 0 0 0 00:00:00:00:00:00
1/4 0 5 0 0 0 0 0 00:00:00:00:00:00
1/5 0 0 0 0 0 0 0 00:00:00:00:00:00
1/6 0 0 0 0 0 0 0 00:00:00:00:00:00
1/7 0 0 0 0 0 0 0 00:00:00:00:00:00
1/8 0 0 0 0 0 0 0 00:00:00:00:00:00
1/9 0 0 0 0 0 0 0 00:00:00:00:00:00
1/10 0 0 0 0 0 0 0 00:00:00:00:00:00
--More-- (q = quit)
Variable Definitions
Use the data in the following table to use the show eapol auth-stats interface command.
Variable Value
{slot/port[/sub- Identifies the slot and port in one of the following formats: a single slot
port][-slot/port[/ and port (slot/port), a range of slots and ports (slot/port-slot/port), or a
sub-port]][,...]} series of slots and ports (slot/port,slot/port,slot/port). If the platform
supports channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
Note
Use the clear-stats command to clear EAP/NEAP statistics.
Procedure
Example
Switch:1#show eapol session-stats interface
=======================================================================================================
Eap Authenticator Session Statistics
=======================================================================================================
PORT MAC SESSION AUTHENTIC SESSION TERMINATE USER
NUM ID METHOD TIME CAUSE NAME
-------------------------------------------------------------------------------------------------------
1/1 18:a9:05:b1:04:ce cb000000 remote-server 0 day(s), 05:58:16 not-terminated sachin
1/4 00:00:00:00:00:01 cb000002 remote-server 0 day(s), 05:48:01 not-terminated 000000000001
-------------------------------------------------------------------------------------------------------
Variable Definitions
Use the data in the following table to use the show eapol session-stats interface
command.
Variable Value
{slot/port[/sub- Identifies the slot and port in one of the following formats: a single slot
port][-slot/port[/ and port (slot/port), a range of slots and ports (slot/port-slot/port), or a
sub-port]][,...]} series of slots and ports (slot/port,slot/port,slot/port). If the platform
supports channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
Note
Use the clear-stats command to clear EAP and NEAP statistics.
Procedure
Example
Note
Not all fields are supported on all hardware platforms.
========================================================================================
Eap Oper Status
========================================================================================
PORT MAC STATE VLAN PRI Flex-UNI I-SID NON-EAP VLAN:I-SID
NUM ID Enable SOURCE AUTH AUTH
----------------------------------------------------------------------------------------
1/10 00:00:00:00:00:0e authenticated 10 2 true autoconfig radius 0:1015
----------------------------------------------------------------------------------------
Total Number of EAP Sessions: 1
Switch(config-if)#show eapol multihost non-eap-mac status verbose
=============================================================================================================
Non-Eap Oper Status Verbose
=============================================================================================================
PORT MAC STATE VLAN PRI Flex-UNI I-SID NON-EAP VLAN:I-SID ACL ACEs
NUM ID Enable SOURCE AUTH
-------------------------------------------------------------------------------------------------------------
2/11 00:00:00:00:01:02 authenticated N/A 0 true radius radius 0:10555
-------------------------------------------------------------------------------------------------------------
Total Number of NEAP Sessions: 1
Variable Definitions
Use the data in the following table to use the show eapol multihost non-eap-mac status
command.
Variable Value
{slot/port[/sub- Identifies the slot and port in one of the following formats: a single slot
port][-slot/port[/ and port (slot/port), a range of slots and ports (slot/port-slot/port), or a
sub-port]][,...]} series of slots and ports (slot/port,slot/port,slot/port). If the platform
supports channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN IDs
1 to 4059 are configurable and the system reserves VLAN IDs 4060
to 4094 for internal use. On switches that support the vrf-scaling
and spbm-config-mode boot configuration flags, if you enable these
flags, the system also reserves VLAN IDs 3500 to 3998. VLAN ID 1 is the
default VLAN and you cannot create or delete VLAN ID 1.
verbose Displays non-EAPoL client MAC information.
Note
Use the clear-stats command to clear EAP/NEAP statistics.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display the port EAPoL operation statistics information:
show eapol status interface [gigabitEthernet [{slot/port[/sub-port][-
slot/port[/sub-port]][,...]}] [vlan <1-4059>] [verbose]
Examples
Switch:1(config)#show eapol status interface
=============================================================================
Eap Oper Status
=============================================================================
PORT MAC STATE VLAN PRI Flex-UNI I-SID VLAN:I-SID
NUM ID Enable SOURCE AUTH
-----------------------------------------------------------------------------
1/1 18:a9:05:b1:04:ce authenticated 10 2 true radius 0:1015
-----------------------------------------------------------------------------
Total Number of EAP Sessions: 1
Switch:1(config-if)#show eapol status interface gigabitEthernet 2/1,2/11 verbose
=====================================================================================================
Eap Oper Status Verbose
=====================================================================================================
PORT MAC PAE VLAN PRI Flex-UNI I-SID VLAN:I-SID ACL ACEs
NUM STATUS ID Enable SOURCE
-----------------------------------------------------------------------------------------------------
2/1 00:00:02:eb:34:e9 authenticated N/A 0 true radius 111:10111 2 2,3
2/1 00:00:02:eb:34:eb authenticated N/A 0 true radius 111:10111 2 1
2/1 00:00:02:eb:34:ed authenticated 333 0 true n/a 2 4
2/1 00:00:02:eb:34:ef authenticated 444 0 true n/a 2 5
Variable Definitions
Use the data in the following table to use the show eapol status command.
Variable Value
{slot/port[/sub- Identifies the slot and port in one of the following formats: a single slot
port][-slot/port[/ and port (slot/port), a range of slots and ports (slot/port-slot/port), or a
sub-port]][,...]} series of slots and ports (slot/port,slot/port,slot/port). If the platform
supports channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
<1-4059> Specifies the VLAN ID for which to show the statistics.
verbose Displays detailed statistics information.
Procedure
1. In the navigation pane, expand Configuration > Security > Data Path.
2. Select 802.1X - EAPOL.
3. Select the Global tab.
4. From the AccessControl options, select enable.
5. (Optional) Select the appropriate NonEapRadiusPwdAttrFmt check boxes to configure the format
of the RADIUS password when authenticating non-EAP MAC addresses using RADIUS.
6. (Optional) Enter the key string in the NonNonEapRadiusPwdAttkeystring field.
7. (Optional) Check the ClearNonEap check box to clear the NEAP session that is learned on the
switch.
8. (Optional) Type an I-SID offset number in the AutoIsidOffset field.
This step does not apply to VSP 4450 Series, VSP 8600 Series, or XA1400 Series.
9. (Optional) Select the AutoIsidOffsetEnable check box to enable Auto I-SID offset on the switch.
This step does not apply to VSP 4450 Series, VSP 8600 Series, or XA1400 Series.
10. Select Apply.
Name Description
EapolVersion Displays the EAP version on the switch.
AccessControl Enables system authentication control. EAP is
disabled by default.
NonEapRadiusPwdAttrFmt Specifies the password attribute format for non
EAP RADIUS authentication.
• ipAdd: Specifies IP address.
• macAddr: Specifies MAC address.
• portNumber: Specifies port number
• padding: Specifies padding.
Ports are force-authorized by default. Force-authorized ports are always authorized and are not
authenticated by the RADIUS server. You can change this setting so that the ports are always
unauthorized.
Procedure
1. In the Device Physical View tab, select the port you need to configure.
2. In the navigation pane, expand Configuration > Edit > Port.
3. Select General.
4. Select the EAPOL tab.
5. (Optional) Select the AllowNonEapHost check box to enable hosts that do not participate in 802.1X
authentication to get network access.
6. Select the Status option as auto or forceAuthorized.
7. In the MultiHostMaxClients field, type the maximum limit of allowed EAP and NEAP clients
supported on this port.
8. In the GuestVlanId field, type the VLAN ID to be used as a Guest VLAN ID.
This step does not apply to VSP 8600 Series or XA1400 Series.
9. In the FailOpenVlanId field, type the Fail Open VLAN ID.
This step does not apply to VSP 8600 Series or XA1400 Series.
10. In the NonEapMaxClients field, type the maximum number NEAP authentication MAC addresses
allowed on this port.
11. In the EapMaxClients field, type the maximum number of EAP authentication MAC addresses
allowed on this port.
12. Select the MultiHostSingleAuthEnabled check box to automatically authenticate NEAP MAC
addresses on this port.
13. In the PortGuestIsid field, type the I-SID to be used as a Guest I-SID.
This step does not apply to VSP 8600 Series or XA1400 Series.
14. In the FailOpenIsid field, type the Fail Open I-SID.
This step does not apply to VSP 8600 Series or XA1400 Series.
15. Select the AdminTrafficControl option as inOut or in.
16. (Optional) Select the LldpAuthEnabled check box to enable LLDP authentication for network
access.
This step does not apply to VSP 4450 Series, VSP 8600 Series, or XA1400 Series.
17. Select the ReAuthEnabled field.
18. In the QuietPeriod field, type the time interval.
19. In the ReauthPeriod field, type the time between reauthentication.
20.In the RetryMax field, type the number of times.
21. Select Apply.
Name Description
PortCapabilities Displays the capabilities of the Port Access Entity (PAE)
associated with the port. This parameter indicates whether
Authenticator functionality, supplicant functionality, both, or
neither, is supported by the PAE of the port.
The following capabilities are supported by the PAE of the
port:
• authImplemented: A Port Access Controller Protocol
(PACP) Extensible Authentication Protocol (EAP)
authenticator functions are implemented.
• virtualPortsImplemented: Virtual Port functions are
implemented.
PortVirtualPortsEnable Displays the status of the Virtual Ports function for the real
port as True or False.
PortCurrentVirtualPorts Displays the current number of virtual ports running in the
port
PortAuthenticatorEnable Displays the status of the Authenticator function in the Port
Access Entity (PAE) as True or False.
PortSupplicantEnable Displays the Supplicant function in the Port Access Entity
(PAE) as True or False.
AllowNonEapHost Enables network access to hosts that do not participate in
802.1X authentication. The default is disabled.
Status Configures the authentication status for this port. The default
is forceAuthorized.
• auto: enables the EAP authentication process by sending
the EAP request messages to the RADIUS server.
• forceAuthorized: disables the EAP authentication and puts
the port into force-full authorized mode.
Name Description
MultiHostSingleAuthEnabled Indicates that the unauthenticated devices can access the
network only after an EAP or NEAP client is successfully
authenticated on the port. The VLAN to which the devices are
allowed access is the authenticated client's VLAN. The default
is false.
PortGuestIsid Specifies the I-SID to be used as a Guest I-SID. Access to
unauthenticated hosts connected to this port is provided
Note: Exception: Not supported on through this I-SID. 0 indicates that Guest I-SID is not enabled
VSP 8600 Series or XA1400 Series. for this port.
FailOpenIsid Specifies the Fail Open I-SID for this port. If the switch
declares the RADIUS servers unreachable, then all new
Note: Exception: Not supported on devices are allowed access into the configured Fail Open
VSP 8600 Series or XA1400 Series. I-SID. 0 indicates that Fail Open I-SID is not enabled for this
port.
FlexUniStatus Displays the current Flex-UNI status for this port.
Name Description
ReauthOrigin Specifies the origin of EAPOL reauthentication configuration
on the port, either manually configured through CLI or
Note: dynamically configured through RADIUS.
Exception: not supported on VSP 8600
Series and XA1400 Series.
Authenticator configuration Displays the current Authenticator Port Access Entity (PAE)
state.
The states are:
• authenticate
• authenticated
• Failed
Perform this procedure to configure EAP or change the authentication status on Extreme Integrated
Application Hosting (IAH) ports. IAH ports are force-authorized by default and are not authenticated by
the RADIUS server. You can change this setting so that the IAH ports stay unauthorized.
Procedure
1. In the navigation pane, expand Configuration > Edit > Insight Port.
2. Select the IAH port you want to configure.
3. Select the EAPOL tab.
4. (Optional) Select AllowNonEapHost.
5. In the Status field, select the required option.
6. In the MultiHostMaxClients field, enter a value.
7. In the GuestVlanId field, enter a VLAN ID.
8. In the FailOpenVlanId field, enter a VLAN ID.
9. In the NonEapMaxClients field, enter a value.
10. In the EapMaxClients field, enter a value.
11. Select MultiHostSingleAuthEnabled.
12. In the PortGuestIsid field, type the I-SID to be used as a Guest I-SID.
13. In the FailOpenIsid field, type the Fail Open I-SID.
14. Select the AdminTrafficControl option as inOut or in.
15. Select the LldpAuthEnabled check box to enable LLDP authentication for network access.
16. Select ReAuthEnabled.
17. In the QuietPeriod field, enter a time interval.
18. In the ReAuthPeriod field, enter a time interval.
19. In the RetryMax field, type a value.
20.Select Apply.
Name Description
PortCapabilities Shows the capabilities of the Port Access Entity
(PAE) associated with the Extreme Integrated
Application Hosting (IAH) port. This parameter
indicates whether Authenticator functionality,
supplicant functionality, both, or neither, is
supported by the PAE of the IAH port.
The following capabilities are supported by the
PAE of the IAH port:
• authImplemented: A Port Access Controller
Protocol (PACP) Extensible Authentication
Protocol (EAP) authenticator functions are
implemented.
• virtualPortsImplemented: Virtual Port
functions are implemented.
Name Description
PortSupplicantEnable Shows the Supplicant function in the PAE.
AllowNonEapHost Enables network access to hosts that do not
participate in 802.1X authentication. The default is
disabled.
Status Specifies the authentication status for the IAH
port.
• auto - enables EAP authentication process
by sending the EAP request messages to the
RADIUS server.
• forceAuthorized - disables EAP authentication
and puts the IAH port into force-full authorized
mode.
The default is forceAuthorized.
MultiHostMaxClients Specifies the maximum number of supplicants
authenticated on the IAH port.
GuestVlanId Specifies the VLAN ID to be used as a Guest.
Access to unauthenticated hosts connected to
the IAH port is provided through this VLAN. 0
indicates that Guest VLAN is not enabled.
FailOpenVlanId Specifies the Fail Open VLAN ID for the specific
IAH port. If RADIUS server is not reachable on the
switch, then all new devices are allowed access to
the configured Fail Open VLAN ID. 0 indicates that
Fail Open VLAN ID is not enabled.
NonEapMaxClients Specifies the maximum number of NEAP
authentication MAC addresses allowed on the
specific IAH port. 0 indicates that NEAP
authentication is disabled.
EAPMaxClients Specifies the maximum number of EAP
authentication MAC addresses allowed on
the specific IAH port. 0 indicates that EAP
authentication is disabled.
MultiHostSingleAuthEnabled Enables the functionality for network access to
the unauthenticated devices only after an EAP or
NEAP client is successfully authenticated on the
IAH port. The VLAN ID to which the devices are
allowed access is the authenticated client's VLAN.
The default is disabled.
PortGuestIsid Specifies the I-SID to be used as a Guest I-SID.
Access to unauthenticated hosts connected to the
IAH port is provided through this I-SID. 0 indicates
that Guest I-SID is not enabled for this port.
FailOpenIsid Specifies the Fail Open I-SID for the IAH port.
If the switch declares the RADIUS servers
unreachable, then all new devices are allowed
access into the configured Fail Open I-SID. 0
indicates that Fail Open I-SID is not enabled for
this port.
Name Description
FlexUniStatus Displays the current Flex-UNI status for this IAH
port.
AdminTrafficControl Configures the Administrative Traffic Control. The
default is inOut.
• inOut: enables the Admin Traffic Control for
input and output traffic.
• in: enables the Admin Traffic Control for input
traffic only.
Use the Port Access Entity (PAE) Port Table to display system-level information for each port the PAE
supports. An entry display in this table for each port of this system.
Procedure
1. In the navigation pane, expand Configuration > Security > Data Path.
2. Select 802.1X - EAPOL.
3. Select the EAP Security tab.
Name Description
PortNumber Indicates the port number associated with this port.
PortCapabilties Indicates the capabilities of this PAE port.
• authImplemented—PACP EAP authenticator functions
are implemented in this PAE.
• virtualPortsImplemented—Virtual Port functions are
implemented in this PAE.
PortVirtualPortsEnable Displays the status of the Virtual Ports function for the real
port as True or False.
PortCurrentVirtualPorts Displays the current number of virtual ports running in the
port
PortAuthenticatorEnable Displays the status of the Authenticator function in the Port
Access Entity (PAE) as True or False.
PortSupplicantEnable Displays the Supplicant function in the Port Access Entity
(PAE) as True or False.
AllowNonEapHost Displays the status if the system is enabled to allow hosts
that do not participate in 802.1X authentication to get
network access.
Status Displays the authentication status for this port. The default is
forceAuthorized.
MultiHostMaxClients Indicates the value representing the maximum number of
supplicants allowed to get authenticated on the port.
GuestVlanId Specifies the VLAN to be used as a Guest VLAN. Access
to unauthenticated hosts connected to this port is provided
through this VLAN. 0 indicates that Guest VLAN is not
enabled for this port.
FailOpenVlanId Specifies the Fail Open VLAN ID for the port. If the switch
declares the RADIUS servers unreachable, then all new
devices are allowed access into the configured Fail Open
VLAN. 0 indicates that Fail Open VLAN is not enabled for
this port.
Name Description
NonEapMaxClients Indicates the maximum number of non-EAPoL
authentication MAC addresses allowed on this port. Zero
indicates that non-EAPol authentication is disabled for this
port.
EapMaxClients Indicates the maximum number of EAPoL authentication
MAC addresses allowed on this port. Zero indicates that
EAPol authentication is disabled for this port.
MultiHostSingleAuthEnabled Indicates that the unauthenticated devices can access the
network only after an EAP or NEAP client is successfully
authenticated on the port. The VLAN to which the
devices are allowed access is the authenticated client's
VLAN. The default is false.
ProcessRadiusCOAPackets Specifies whether to process any RADIUS requests-server
packets that are received on this port.
PortGuestIsid Specifies the I-SID to be used as a Guest I-SID. Access to
unauthenticated hosts connected to this port is provided
Note: Exception: Not supported on VSP through this I-SID. 0 indicates that Guest I-SID is not enabled
8600 Series or XA1400 Series. for this port.
FailOpenIsid Specifies the Fail Open I-SID for the port. If the switch
declares the RADIUS servers unreachable, then all new
Note: Exception: Not supported on VSP devices are allowed access into the configured Fail Open
8600 Series or XA1400 Series. I-SID. 0 indicates that Fail Open I-SID is not enabled for this
port.
FlexUniStatus Displays the Flex-UNI status for the port.
AdminTrafficControl Specifies the Administrative Traffic Control for the port. The
default is inOut.
Note: Exception: Not supported on VSP
8600 Series or XA1400 Series.
PortOrigin Displays the Port Origin configuration status for the port.
Name Description
DynamicMHSAEnabled Displays the Dynamic MHSA status for the port.
Use the Authenticator Configuration table to display configuration objects for the Authenticator PAE
associated with each port.
Procedure
1. In the navigation pane, expand Configuration > Security > Data Path.
2. Click 802.1X - EAPOL.
3. Click the Authentication tab.
Name Description
PortNumber Indicates the number associated with this port.
Authenticate Indicates the status of the Port Access Entity
(PAE) authenticator requesting authentication.
Authenticated Indicates the current authentication status of the
Port Access Entity (PAE) authenticator.
Name Description
Failed Indicates the authentication status for failed or
terminated state .
ReAuthEnabled Indicates the re-authentication status of an
existing supplicant at the time interval specified
in ReAuthPeriod. The default is false.
QuietPeriod Indicates the time interval (in seconds) between
authentication failure and the start of a new
authentication.
The default is 60.
ReAuthPeriod Indicates the time interval in seconds between
successive re-authentications. The default is 3600
(1 hour ).
RetryMax Indicates the maximum Extensible Authentication
Protocol (EAP) requests sent to the supplicant
before timing out the session. The default is 2.
RetryCount Indicates the count of the number of
authentication attempts.
Procedure
1. In the navigation pane, expand Configuration > Security > Data Path.
2. Select 802.1X – EAPOL.
3. Select the MultiHost Status tab.
Name Description
PortNumber Indicates the port number associated with this
port.
ClientMACAddr Indicates the MAC address of the client.
PaeState Indicates the current state of the authenticator
PAE state machine.
VlanId Indicates the VLAN assigned to the client.
Priority Specifies the priority associated with this client
MAC. This priority could be the Radius assigned
priority or the port QOS level.
SwUniBindings Indicates the Extensible Authentication Protocol
(EAP) VLAN:ISID bindings that the switch
Note: Exception: Not supported on VSP 4450 represents as an hexadecimal value.
Series, VSP 8600 Series, or XA1400 Series.
Name Description
IsidSource Indicates the origin of I-SID value:
• radius - received from the RADIUS server.
Note: Exception: Not supported on VSP 4450 • autoconfig - calculated using the auto-
Series, VSP 8600 Series, or XA1400 Series.
isid-offset command, that the user
configures on the switch.
• config - configured statically.
• notAvaliable - does not use EAP with FlexUNI,
hence there is no I-SID to use.
Procedure
1. In the navigation pane, expand Configuration --> Security --> Data Path.
2. Click 802.1X – EAPOL.
3. Click the MultiHost Session tab.
Name Description
StatsPortNumber Indicates the port number associated with this
port.
StatsClientMACAddr Indicates the MAC address of the client.
Id Indicates the unique identifier for the session.
AuthenticMethod Indicates the authentication method used to
establish the session.
Time Indicates the elapsed time of the session.
TerminateCause Indicates the cause of the session termination.
UserName Indicates the user name that represents the
identity of the supplicant PAE.
Procedure
1. On the Device Physical View, select the port you want to graph.
The system displays a yellow outline around the selected ports
If you want to select multiple ports, press Ctrl and hold down the key while you click the ports you
want to configure. The system displays a yellow outline around the selected ports.
2. In the navigation pane, expand the Configuration > Graph folders.
3. Click Port.
4. Click EAPOL Stats.
5. If you selected multiple ports, from the Graph port EAPoL Stats tab Show list, select: Absolute Value,
Cumulative, Average/sec, Minimum/sec, Maximum/sec, or LastVal/sec.
Name Description
InvalidFramesRx Displays the number of EAPoL frames received by this
Authenticator in which the frame type is not recognized.
EapLengthErrorFramesRx Displays the number of EAPoL frames received by this
Authenticator in which the Packet Body Length field is
invalid.
StartFramesRx Displays the number of EAPoL start frames received by this
Authenticator.
EapFramesRx Displays the number of EAPoL-EAP frames received by this
Authenticator.
LogoffFramesRx Displays the number of EAPoL Logoff frames received by
this Authenticator.
LastRxFrameVersion Displays the last received version of the EAPoL frame by this
Authenticator.
LastRxFrameSource Displays the source MAC address of the last received EAPoL
frame by this Authenticator.
AuthEapFramesTx Displays the number of EAPoL-EAP frames transmitted by
the Authenticator.
Procedure
1. In the navigation pane, expand Configuration --> Security --> Data Path.
2. Select 802.1X – EAPOL.
Name Description
MacPort Indicates the port number associated with this
port.
MacAddr Indicates the MAC address of the client.
MacStatus Indicates the authentication status of the NEAP
host that is authenticated using the RADIUS
server.
VlanId Indicates the VLAN assigned to the client.
MacClear Clears the non EAP MAC entry associated with a
specific index.
MacPriority Indicates the priority associated with this Non-
EAP client MAC. This priority could be the Radius
assigned priority or the port QOS level.
SwUniBindings Indicates the VLAN and I-SID bindings. VLAN is
represented with 2 bytes and I-SID is represented
Note: Exception: Not supported on VSP 4450 with 4 bytes. The output is a continuous
Series, VSP 8600 Series, or XA1400 Series. hexadecimal representation of the VLAN that is
followed by the corresponding I-SID.
IsidSource Indicates the source of the I-SID value. An I-SID
value is generated in one of the following ways:
Note: Exception: Not supported on VSP 4450 • radius—Indicates that that I-SID value is
Series, VSP 8600 Series, or XA1400 Series. learned from the RADIUS server.
• autoconfig—Indicates that I-SID value is
calculated by using the auto-isid-offset that
you configured.
• config—Indicates that the I-SID value is
statically configured.
• notAvailable—Indicates that no I-SID value is
available because EAP with FlexUNI is not
used.
Name Description
AceIdList Indicates the list of dynamic Access Control
Entries (ACE) on the specific port.
Note: Exception: Not supported on VSP 4450
Series, VSP 8600 Series, or XA1400 Series.
For the most current information on switches supported by ExtremeCloud™ IQ, see ExtremeCloud™ IQ
Learning What’s New.
The switch supports a zero touch connection to ExtremeCloud IQ. Zero touch deployment is used to
deploy and configure a switch using ExtremeCloud IQ.
The switch integrates with ExtremeCloud IQ using ExtremeCloud IQ Agent. When you enable IQAgent,
you can configure and monitor VOSS devices using ExtremeCloud IQ.
You can configure the following features using the ExtremeCloud IQ interface:
• Hostname configuration
• SNMP location
• Device-level MTU
• Flow control
• Port state, usage type, and settings
• VLAN configuration
• DNS, NTP, SNMP, and Syslog servers
boot config flag ssh is enabled when ExtremeCloud IQ Agent is enabled. boot config
flag ssh cannot be disabled while ExtremeCloud IQ Agent is enabled.
• SNMP is required.
boot config flag block-snmp is disabled when ExtremeCloud IQ Agent is enabled. boot
config flag block-snmp cannot be enabled while ExtremeCloud IQ Agent is enabled.
• High Secure mode disables ExtremeCloud IQ Agent automatically. ExtremeCloud IQ Agent must be
enabled manually when this mode is enabled.
• ExtremeCloud IQ Agent is not supported in Enhanced Secure mode.
• An IP address that corresponds to the ExtremeCloud IQ pool and can display it in the NTP list.
The IP does not try to synchronize if NTP is globally disabled on the switch. If NTP is enabled, you
can see synchronization failure messages if the IP for the pool is blocked or is unreachable. As a
best practice, if you have issues connecting to the cloud, check the clock on the switch and if it is
incorrect, resolve this by either configuring an NTP server or manually configuring the correct time.
Note
You must configure a Segmented Management Instance to use ExtremeCloud IQ Agent. For
more information, see Segmented Management on page 69.
To use zero touch functionality, your switch must be in a Zero Touch Deployment-ready configuration
mode, which means the switch cannot have existing primary or secondary configuration files loaded.
Factory shipped switches are Zero Touch Deployment ready because they deploy without configuration
files. However, existing switches require manual preparation before Zero Touch Deployment can
function.
For more information about preparing your switch for Zero Touch Deployment, see Zero Touch
Deployment on page 58.
To use this functionality, DHCP Client must be enabled. For information about DHCP Client for a
Segmented Management Instance, see DHCP Client for Segmented Management Instance on page 84.
Considerations
The following considerations apply with DHCP option 43:
• A dynamic IP address overwrites the default value (hac.extremecloudiq.com) or 0.0.0.0.
• A static server IP address overwrites a dynamic server IP address.
• A dynamic server IP address does not overwrite an existing static server IP address.
If a static server IP address is already configured and a new value is received from the DHCP
server, the following warning displays on the console: WARNING Dynamic Cloud IQ Server
Address x.x.x.x provided by DHCP option 43 could not be set. Static
configured server address y.y.y.y cannot be overwritten by a dynamic
address.
• The default value (hac.extremecloudiq.com) replaces the dynamic server IP address if the DHCP
Client is disabled on the switch.
• The dynamic server IP address is not saved in the running configuration.
Note
You must configure a Segmented Management Instance to use ExtremeCloud IQ Agent. For
more information, see Segmented Management Instance Configuration using the CLI on page
87.
Procedure
configure terminal
application
2. Disable IQ Agent:
no iqagent enable
3. Configure the ExtremeCloud IQ IPv4 address or DNS name:
iqagent server address WORD<1-255>
4. Enable IQ Agent:
iqagent enable
Example
Configure IQ Agent:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#application
Switch:1(config-app)#no iqagent enable
Switch:1(config-app)#iqagent server address hac.extremecloudiq.com
Switch:1(config-app)#iqagent enable
================================================================================
IQAgent Info
================================================================================
Agent Admin State : true
Agent Version : 0.4.3
Agent Oper State : disconnected
Server Address : hac.extremecloudiq.com
Server Address Origin : None
Proxy Address : 0.0.0.0
Proxy TCP Port : 0
Proxy Username :
You must onboard the device and configure any optional IQ Agent parameters on the supported device
before you enable IQ Agent.
You can configure the IQ Agent parameters on the supported devices first, and then onboard the
devices (that is, add the serial numbers for the devices in the ExtremeCloud IQ GUI) or vice versa.
Procedure
configure terminal
application
2. Configure the ExtremeCloud IQ IPv4 address or DNS name:
iqagent server address WORD<1-255>
Examples
Configure access to ExtremeCloud IQ using an IPv4 address:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#application
Switch:1(config-app)#iqagent server address 192.0.2.1
Variable Definitions
The following table defines parameters for the iqagent server command.
Variable Value
address <WORD 1-255> Specifies the ExtremeCloud IQ IPv4 address or DNS name.
Use this task to configure the proxy parameters for ExtremeCloud IQ on the IQ Agent.
Note
You must onboard the device and configure any optional IQ Agent parameters on the
supported device before you enable IQAgent.
You can configure the IQ Agent parameters on the supported devices first, and then onboard
the devices (that is, add the serial numbers for the devices in the ExtremeCloud IQ GUI) or
vice versa.
For information about onboarding switches, see https://www.extremenetworks.com/support.
Procedure
1. Enter Application Configuration mode:
enable
configure terminal
application
2. Configure the proxy IPv4 address or DNS name:
iqagent proxy address <WORD 1-255> tcp-port <1-49151>
3. Configure the proxy username and password for the ExtremeCloud IQ account:
iqagent proxy username <WORD 1-64> password <WORD 1-128>
Examples
Configure proxy parameters using an IPv4 address:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#application
Switch:1(config-app)#iqagent proxy address 192.0.2.254 tcp-port 21
Switch:1(config-app)#iqagent proxy username admin password ****
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#application
Switch:1(config-app)#iqagent proxy address hac.extremecouldiq.com tcp-port 21
Switch:1(config-app)#iqagent proxy username admin password ****
Variable Definitions
The following table defines parameters for the iqagent proxy command.
Variable Value
address <WORD 1-255> Specifies the proxy IPv4 address or DNS name.
tcp-port <1-49151> Specifies the TCP port.
username <WORD 1-64> Specifies the proxy server username.
password <WORD 1-128> Specifies the proxy server password.
Use this task to display ExtremeCloud IQ Agent configuration information and status.
Procedure
Example
Display IQ Agent configuration information and status when IQ Agent is enabled using the default
ExtremeCloud IQ server:
Switch:1>show application iqagent
================================================================================
IQAgent Info
================================================================================
Agent Admin State : true
Agent Version : 0.2.7
Agent Oper State : connected
Server Address : hac.extremecloudiq.com
Server Address Origin : None
Proxy Address : extremeiq.com
Proxy TCP Port : 21
Proxy Username : admin
================================================================================
IQAgent Info
================================================================================
Agent Admin State : false
Agent Version : 0.2.7
Agent Oper State : disconnected
Server Address : 0.0.0.0
Server Address Origin : None
Proxy Address : 0.0.0.0
Proxy TCP Port : 0
Proxy Username :
Display IQ Agent configuration information and status when DHCP provides a dynamic server IP
address:
Switch:1>show application iqagent
================================================================================
IQAgent Info
================================================================================
Agent Admin State : true
Agent Version : 0.2.7
Agent Oper State : disconnected
Server Address : 192.0.2.1
Server Address Origin : DHCP
Proxy Address : 0.0.0.0
Proxy TCP Port : 0
Proxy Username :
Display IQ Agent configuration information and status when DHCP Client is disabled on the switch:
Switch:1>show application iqagent
================================================================================
IQAgent Info
================================================================================
Agent Admin State : false
Agent Version : 0.2.7
Agent Oper State : disconnected
Server Address : hac.extremecloudiq.com
Server Address Origin : None
Proxy Address : 0.0.0.0
Proxy TCP Port : 0
Proxy Username :
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display IQ Agent status information:
show application iqagent status
Example
Procedure
configure terminal
application
2. Disable ExtremeCloud IQ Agent:
no iqagent enable
3. Reinstall the ExtremeCloud IQ Agent firmware:
software iqagent reinstall
4. Enable ExtremeCloud IQ Agent:
iqagent enable
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#application
Switch:1(config-app)#no iqagent enable
Switch:1(config-app)#software iqagent reinstall
You must first onboard the device and configure any optional IQ Agent parameters before you enable
IQ Agent.
Procedure
Name Description
Enable Specifies whether IQ Agent is enabled. The default
is enabled.
Version Displays the ExtremeCloud IQ Agent firmware
version running on the switch.
OperStatus Displays the operational status of ExtremeCloud
IQ Agent on the switch.
ServerAddressType Specifies the address type of the ExtremeCloud IQ
server address.
Server/Address Specifies the ExtremeCloud IQ IPv4 address or
DNS name.
The default is hac.extremcloudiq.com.
ServerAddressOrigin Specifies the origin for the ExtremeCloud IQ
server address:
• none–not configured
• configured–manual configuration
• dhcp–obtained through DHCP
Name Description
LastMonitorTime Displays the last monitor time for a successful
attempt.
LastHealthStatus Displays the last health status of ExtremeCloud IQ.
LastHealthTime Displays the last health time for a successful
attempt.
The QEMU KVM environment supports several pretested and well-known packet capture applications
in a Linux virtual machine, including Wireshark and tcpdump. There are a wide variety of additional
applications, tools, and utilities that organizations are able to run in this environment, such as data
analytics applications, packet generators, monitoring tools, troubleshooting utilities, and many others.
While the QEMU KVM environment is open and can host any application, it is designed and ideally
suited for networking applications, tools, and utilities.
IAH architecture supports the creation and use of virtualization domains, such as virtual machines, and
Docker containers. This design creates a common-use host, which coordinates and automates multiple
guest-networking functions into chains. The hardware boots into the virtual Linux OS, providing the
ability to run additional applications or services within a specific virtual machine or a Docker container,
and simultaneously supporting the regular functionality of the switch.
Yet Another Next Generation (YANG) model is used to manage configuration and retrieve operational
data. You access the YANG model through Representational State Transfer Configuration Protocol
(RESTCONF) using a northbound interface, namely ExtremeCloud IQ ‑ Site Engine, that provides
an additional way to configure and monitor the switch. For more information on RESTCONF, see
Representational State Transfer Configuration Protocol (RESTCONF) Fundamentals on page 2793.
The resources available for all virtual services on VSP 7400 Series switches are as follows:
• ◦ Six Central Processing Unit (CPU) cores
◦ 12 GB Random Access Memory (RAM)
◦ 100 GB Solid State Drive (SSD) flash memory
The resources available for all virtual services on VSP 4900 Series switches are as follows:
Note
You must install a modular SSD unit to use virtual services on VSP 4900 Series switches.
The switch OS uses the following resources on VSP 7400 Series and VSP 4900 Series:
• Two CPU cores
• 4 GB RAM
• 8 GB internal flash memory storage
Note
Network-to-network interface (NNI) support is not available for IAH ports. IS-IS adjacencies
cannot be established on IAH ports.
For information about how to configure IAH ports, see the following tasks:
• Configure a Virtual Service on page 862
• Configure Virtual Ports on page 878
Connection Types
The VM and Docker virtual ports map to a physical Extreme Integrated Application Hosting port using
the following connection types:
• Open vSwitch (OVS)
Note
You must enable trunking on the Extreme Integrated Application Hosting port when you
use SR-IOV and OVS connection types. For more information about enabling trunking, see
MultiLink Trunking and Split MultiLink Trunking on page 2357.
You can configure Extreme Integrated Application Hosting ports 1/s1 and 1/s2 to
accommodate different connect types. Extreme Integrated Application Hosting ports 1/s1
and 1/s2 can accommodate virtual ports of SR-IOV, OVS, or VT-d connect types as shown in
the table below. Using the virtual-service command, you can specify which Extreme
Integrated Application Hosting port is associated with the configured connect type. You can
also configure the Network Interface Card (NIC) type of the virtual port using the virtual-
service command.
The following table lists the compatible Extreme Integrated Application Hosting port connect type
configurations.
Extreme Integrated Application Hosting port 1/s1 Extreme Integrated Application Hosting port 1/s2
SR-IOV OVS
SR-IOV SR-IOV
SR-IOV VT-d
OVS SR-IOV
OVS OVS
OVS VT-d
VT-d VT-d
VT-d SR-IOV
VT-d OVS
Link Flapping
When the switch initializes, the Extreme Integrated Application Hosting ports connect to the underlying
Linux hypervisor. When a virtual port of connection type OVS or SR-IOV is configured on the switch, the
Linux hypervisor saves this connection, and the link state of the Extreme Integrated Application Hosting
port does not change. However, when a virtual port of connection type VT-d is configured on the
switch, control of the Extreme Integrated Application Hosting port is passed from the Linux hypervisor
to the configured Virtual Machine (VM). The Extreme Integrated Application Hosting port flaps due to
this transition, and the switch reports it in the system log. The Extreme Integrated Application Hosting
port flaps twice during the transition:
1. when the Extreme Integrated Application Hosting port is removed from the Linux hypervisor.
2. when the Extreme Integrated Application Hosting port is added to the VM.
A similar link flap sequence takes place on the Extreme Integrated Application Hosting port when the
associated VM is disabled on the switch, and the control of the Extreme Integrated Application Hosting
port is passed from the VM back to the Linux hypervisor.
Configuration Requirements
• To use an Extreme Integrated Application Hosting port as an analyzer port on a monitoring BEB
for Fabric RSPAN (Mirror to I-SID), you must associate outer-tag 4091 to egress port 1/s1 or 1/s2
if the connect type is OVS or SR-IOV. Use the monitor-by-isid <1–1000> map-to-vid
<1–4093> command to configure VLAN 4091for Fabric RSPAN.
• To use an Extreme Integrated Application Hosting port with a connect type as OVS or SR-IOV for
Port Mirroring, associate VLAN 4091 to the virtual machine (VM) vport to send the mirrored packets
to the VM.
• To enable Flex UNI on an Extreme Integrated Application Hosting port with a connect type of
VT-d, enable dot1q encapsulation on the VM interfaces. Flex UNI enables tagging on these ports by
default; you must tag the VM ports with the VLANs that these ports use.
Note
The Third Party Virtual Machine (TPVM) version is based on Ubuntu 20.04.04 LTS.
You can use the show virtual-service config command to view the information about
the pre-installed virtual machine on the switch. For more information, see Display Virtual Service
Configuration on page 868.
Important
You must upgrade virtual services independently of switch software upgrade; separate
images for virtual services are available. For more information, see Upgrade a Virtual Service
on page 873.
For more information about how to configure virtual services, see Virtual Services Configuration using
CLI on page 860 and Virtual Services Configuration using EDM on page 874.
Third Party Virtual Machine (TPVM) provides a set of troubleshooting tools on the switch. The following
installed packages are available on TPVM:
• build-essential
• checkinstall
• iperf
• mtools
• netperf
• qemu-guest-agent
• tshark
• valgrind
• vim-gnome
• wireshark
• xterm
• isc-dhcp-client
• isc-dhcp-server
• iperf3
• libpcap
• rpcapd
• resolvconf
Important
TPVM includes an administrator account with a default username and password. To ensure
security, you must change the default password when you access TPVM for the first
time, before enabling the IAH ports using the no shutdown command. The software
automatically prompts you to change this password at first boot; no action can be taken
with the VM until you change the password.
Note
If you start the console for TPVM without network connectivity to a DHCP server, the VM
remains in a retry loop for approximately 5 minutes while it tries to obtain a DHCP address.
The system displays the following message: [FAILED] Failed to start Raise
network interfaces, and then the VM continues to boot. The VM does start but with the
virtual port, eth0, in the administratively down state.
Note
To use this feature on the applicable models of VSP 4900 Series, you must install an SSD
module in the switch.
Important
The minimum configuration requirements for the Fabric IPsec Gateway VM are as follows:
• Two Central Processing Unit (CPU) cores
• 4 GB Random Access Memory (RAM)
• One Virtualization Technology for Directed I/O (VT-d) vport (eth0)
• Minimum 10 GB SSD
Note
To use this feature on the applicable models of VSP 4900 Series, you must install an SSD
module in the switch.
To configure IPsec on a switch through the Fabric IPsec Gateway VM, see Fabric IPsec Gateway
Configuration using CLI on page 882.
Fabric IPsec Gateway supports the following services through the VM:
• IPsec with fragmentation and reassembly - for the VXLAN traffic that needs IPsec, the network
routes the packets through the Fabric IPsec Gateway VM that provides IPsec encryption and
decryption for VXLAN packets. The system also supports fragmentation and reassembly for IPsec
tunnels that you configure on the VM, and a minimum of 1300 bytes of Maximum Transmission Unit
(MTU) value. You can configure fragmentation to occur before the packets are encrypted.
• Fragmentation and reassembly - the Fabric IPsec Gateway VM performs fragmentation and
reassembly for VXLAN and IPsec tunnels, for which the network routes the packets through the
VM. The system supports a minimum of 750 bytes of Maximum Transmission Unit (MTU) value.
The XA1400 Series devices, which use VOSS for Fabric Extend over IPsec, support both IPsec
decoupled and coupled modes. The VSP 4900 Series and VSP 7400 Series devices, which use Fabric
IPsec Gateway for Fabric Extend over IPsec, support IPsec in decoupled mode only. You must configure
the IPsec tunnel in decoupled mode to enable IPsec termination in the Fabric IPsec Gateway VM. For
more information about how to configure IPsec tunnels on the VM, see Configure IPsec Tunnels on
Fabric IPsec Gateway VM on page 891.
If you are not familiar with digital certificates, see Digital Certificate/PKI on page 3005 for additional
background information like digital certificate terminology.
Note
Extreme validated the Fabric IPsec Gateway SCEP implementation with EJBCA CA Server
only. Fabric IPsec Gateway SCEP cannot currently use Win CA like digital certificate support in
VOSS.
Use trustpoints to manage and track CAs and certificates. The switch can enroll with a trustpoint to
obtain an identity certificate. You must configure the CA URL, the CA common name, and select the
HTTP request type to configure the CA server trustpoint.
Configure the certificate subject parameters to provide the device distinguished name (DN) and key
name for the generated key pair (the private key). If you do not configure a private key, the switch
generates one. The switch validates the returned certificate against the trustpoint's CA certificate.
You can remove subject certificates from the CA trustpoint or clean the CA trustpoint only if the
subject-label is not configured on an IPsec tunnel.
The switch generates the certificate signing request (CSR) using the subject DN and the private key that
you configure in the CLI. If you do not configure a private key, the switch generates one.
Transfer the CSR to the offline CA to be signed. Retrieve the signed certificate to validate against the
original CSR. You must manually transfer all certificates in the certificate chain to the switch. The signed
certificate must include the subject-label to map it to a locally-generated CSR for validation.
You must manually download Certificate Revocation List (CRL) files. You can remove offline subject
certificates only if the subject-label is not configured on an IPsec tunnel.
Considerations
Consider the following when you configure the egress shaper rate:
• If the ingress data traffic receives excessive packets with the following DSCP or 802.1p values (high
priority control packets) and egress shaping is configured, a IS-IS flap can be seen.
Perform this procedure to access the virtual service console port for the specific VM.
Procedure
Note
Type CTRL+Y to exit the console.
Example
Switch:1>enable
Switch:1#virtual-service tpvm console
Variable Definitions
The following table defines parameters for the virtual-service command.
Variable Value
WORD<1-128> Specifies the virtual service name.
console Accesses the console for the specific virtual service.
Use FTP, SFTP, or SCP to transfer the OVA image to the /var/lib/insight/packages/ directory
on the switch.
Note
The Fabric IPsec Gateway image includes no integrity check. Use SCP to copy the file to the
switch and confirm the file size before installation.
Perform this procedure to install a package file to a specific location indicated by a virtual service
name. This procedure also verifies if the package is in OVA format, and if a certificate is provided in the
package.
Procedure
Variable Definitions
The following table defines parameters for the virtual-service command.
Variable Value
WORD<1-128> Specifies the virtual service name.
install Installs the virtual service package.
package WORD<1-512> Specifies the package name and path.
Note
• Following procedure lists the general sequence to configure a virtual service.
• The names of Ethernet ports appearing in a specific Virtual Machine (VM) are not
correlated to the configured virtual port names. Each VM renames the Ethernet ports
as per its requirements, after they are discovered during the VM initialization.
• By default, the system displays all virtual ports of OVS connection type first in the
alphabetical order of their configured names, followed by the virtual ports of SR-IOV and
VT-d connection types.
Procedure
configure terminal
2. Create a VLAN:
Note
Virtual service configuration supports port-based VLANs only.
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Note
Ensure the connection type you configure for the virtual port matches the connection type
supported by the IAH port.
12. Configure the IAH port to associate with the connection type:
virtual-service WORD<1-128> vport WORD<1-32> port WORD<1-32>
Important
You cannot configure two virtual services with conflicting connect types on the same IAH
port. You cannot configure two virtual services with VT-d connect type on the same IAH
port.
Example
Configuring the TPVM virtual service using IAH port 1/s1 with an SR-IOV connection type:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#interface GigabitEthernet 1/s1
Switch:1(config-if)#encapsulation dot1q
Switch:1(config-if)#exit
Switch:1(config)#vlan create 10 name tpvm-lan-vlan type port-mstprstp 0
Switch:1(config)#vlan members add 10 1/s1,1/6/2
Switch:1(config)#interface GigabitEthernet 1/s1,1/6/2
Switch:1(config-if)#no shutdown
Switch:1(config-if)#exit
Switch:1(config)#virtual-service tpvm vport eth0 connect-type sriov
Switch:1(config)#virtual-service tpvm vport eth0 vlan 10
Switch:1(config)#virtual-service tpvm enable
Configuring the TPVM virtual service on IAH port 1/s2 with a VT-d connection type:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#vlan create 10 type port-mstprstp 0
Switch:1(config)#vlan member add 10 1/1,1/s2
Switch:1(config)#interface GigabitEthernet 1/s2,1/1
Switch:1(config-if)#no shutdown
Switch:1(config-if)#exit
Switch:1(config-if)virtual-service tpvm vport eth0 port 1/s2
Switch:1(config)#virtual-service tpvm enable
Variable Definitions
The following table defines parameters for the vlan create command.
Variable Value
<2-4059> Specifies the VLAN ID in the range of 2 to 4059. VLAN ID 1 is
the default VLAN and you cannot create or delete VLAN ID 1.
By default, the system reserves VLAN IDs 4060 to 4094 for
internal use. On switches that support the vrf-scaling
and spbm-config-mode boot configuration flags, if you
enable these flags, the system also reserves VLAN IDs 3500
to 3998.
color<0–32> Specifies the color of the VLAN.
nameWORD<0-64> Specifies a name for the VLAN to be created.
type {port-mstprstp<0-63>} Creates a VLAN by port, with the STP instance ID ranging
from 0 to 63.
Note:
MSTI instance 62 is reserved for SPBM if SPBM is enabled on
the switch.
The following table defines parameters for the vlan members command.
Variable Value
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default,
VLAN IDs 1 to 4059 are configurable and the system reserves
VLAN IDs 4060 to 4094 for internal use. On switches that
support the vrf-scaling and spbm-config-mode boot
configuration flags, if you enable these flags, the system also
reserves VLAN IDs 3500 to 3998. VLAN ID 1 is the default
VLAN and you cannot create or delete VLAN ID 1.
{slot/port[/sub-port][-slot/ Identifies the slot and port in one of the following
port[/sub-port]][,...]} formats: a single slot and port (slot/port), a range of slots
and ports (slot/port-slot/port), or a series of slots and
ports (slot/port,slot/port,slot/port). If the platform supports
channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
add Adds ports to a specified VLAN ID.
Variable Value
WORD<1-128> Specifies a name for virtual service.
connect-type {ovs | sriov | Specifies the connection type for the virtual port created.
vtd} The default is VT-d. The switch supports the following
maximums for virtual ports:
• OVS - 16
• SR-IOV - 16
• VT-d - 2
Note:
Configure this value only when the connect-type parameter
is ovs.
Note:
VSP 4900 Series supports <1-2> cores.
VSP 7400 Series supports <1-6> cores.
Procedure
configure terminal
2. Disable the virtual service:
no virtual-service WORD<1-128> enable
Example
Note
If a corresponding virtual machine is running, it is stopped, and then the virtual service
configuration is deleted.
Procedure
configure terminal
2. Delete the virtual service resource allocation:
no virtual-service WORD<1-128> [disk WORD<1-32>] [vport WORD<1-32>]
Example
Note
If a virtual machine is running, it is stopped, and then the service directory is uninstalled.
You must disable the virtual service before you uninstall it.
Procedure
1. Enter Privileged EXEC mode:
enable
2. Uninstall a specific virtual service:
virtual-service WORD<1-128> uninstall
Example
Switch:1>enable
Switch:1#virtual-service tpvm uninstall
Variable Definitions
Use data in the following table to use the virtual-service command.
Variable Value
WORD<1-128> Specifies the virtual service name.
uninstall Uninstalls the specified virtual service name.
Perform this procedure to display the virtual service configuration on the switch.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display the virtual-service configuration:
show virtual-service config [WORD<1-128>]
Example
==========
Package: FIGW-SHAPE
Package App Name: FabricIPSecGW_VM_5.0.0.0_20.04
Package Version: 5.0.0.0
Package Name: FabricIPSecGW_VM_5.0.0.0_20.04.ova
==========================================================================================
==========
VPort Information:
Name Vlan Connect Type Insight Port NIC Type
eth0 vtd 1/s1
Perform this procedure to display the installation status for the specific virtual service. This procedure
indicates if the installation finished successfully or failed to complete.
Procedure
Example
Perform the following procedure to display the number of remaining virtual services resources on the
switch.
Procedure
2. Display statistics for all virtual services configured on the switch or a specific virtual service:
show virtual-service statistics [WORD<1-128>]
Example
Switch:1>show virtual-service statistics
==========================================================================
Virtual Services
==========================================================================
Virtual Service : figw
Package App Name : FabricIPSecGW_VM_master.0.22_20.04
Package Name : FabricIPSecGW_VM_master.0.22_20.04.ova
Package Version : 0.22
CPU Utilization
Allocated(# cores) CPU Utilization (Total %)
6 12
Disk Utilization
Primary Disk Size : 10G
VPort Information:
Name Vlan Connect Type Insight Port NIC Type
eth0 vtd 1/s1
Guest Intf Name : eth0
MAC Address : 42:fd:46:00:00:01
IPv4 Address : 0.0.0.0
IPv6 Address : fe80:0:0:0:40fd:46ff:fe00:1
==========================================================================================
Hypervisor Remaining Resources
==========================================================================================
Number of Cores Remaining: 0
Total Memory Remaining(M): 147
Total Disk Remaining(GB): 79
Perform this task to run a virtual machine (VM) command from the NOS CLI.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Run the ls command for the VM configs directory from the CLI:
virtual-service WORD<1-128> exec-command WORD<1-256>
Examples
From NOS, list the contents of the home/rwa/configs directory in the Fabric IPsec Gateway VM:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#virtual-service figw exec-command "ls /home/rwa/configs"
config.cfg
figw_cli.log
shadov.txt
From NOS, configure the source VLAN ID for the IPsec tunnel in the Fabric IPsec Gateway VM:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#virtual-service figw figw-cli "set global ipsec-tunnel-src-vlan 71"
Variable Definitions
Variable Value
WORD<1-128> Specifies the virtual service name.
WORD<1-256> Specifies the VM command to run. To include
spaces in the syntax, include the text string in
quotation marks (").
Copy VM Files
About This Task
Perform this task to copy files between the Network Operating System (NOS) and a VM, or between
VMs.
Procedure
Examples
Copy a file from the NOS to a VM:
Switch:1>enable
Switch:1#virtual-service copy-file /intflash/config_figw.cfg figw:/home/rwa/configs/
config.cfg
Variable Definitions
The following table defines parameters for the virtual-service copy-file command.
Variable Value
WORD<1-256> Specifies the source and destination file to copy.
To specify a VM location, use the format
<VM_name>:<VM_file_path/filename>.
To specify a NOS location, use the format </
file_path/filename> where the valid path
can be one of the following:
• /intflash
• /extflash
• /usb
• /var/lib/insight/packages
Perform this task to change the password for a VM user. The password must be greater than, or equal
to, 8 characters.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Change the password:
virtual-service WORD<1-128> change-user-pass WORD<1-20>
3. Enter the new password.
4. Enter the new password a second time.
Example
Change the password for the rwa user account in the Fabric IPsec Gateway VM:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Variable Definitions
The following table defines parameters for the virtual-service WORD<1-128> change-user-
pass command.
Variable Value
WORD<1-20> Specifies the username.
WORD<1-128> Specifies the virtual service name.
Important
You can perform an upgrade of Linux inside the virtual service by standard Linux upgrade
procedures. For example, TPVM is Ubuntu based, so you can use sudo apt-get update
and sudo apt-get upgrade. If you complete such an upgrade, Extreme Networks is
not responsible for the behavior of the VM; it has not been tested with every version of the
network operating system (NOS).
Note
The Fabric IPsec Gateway image includes no integrity check. Use SCP to copy the file to
the switch and confirm the file size before installation.
When you uninstall the original virtual service, the system removes the complete virtual service
configuration from the configuration file.
Procedure
configure terminal
2. Disable the virtual service:
no virtual-service WORD<1-128> enable
3. Return to Privileged EXEC mode:
end
4. Uninstall the virtual service:
virtual-service WORD<1-128> uninstall
5. Install the virtual service package using the new OVA image:
virtual-service WORD<1-128> install package WORD<1-512>
6. Reconfigure the virtual service; for more information, see Configure a Virtual Service on page 862.
7. Remove the original OVA image from the /var/lib/insight/packages/ directory on the
switch:
remove WORD<1-255>
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#no virtual-service tpvm enable
Switch:1(config)#end
Switch:1#virtual-service tpvm uninstall
Switch:1#virtual service tpvm install package var/lib/insight/packages/
TPVM_4900_8.2.0.0.img
Switch:1#configure terminal
Switch:1(config)#virtual-service tpvm vport eth0 connect-type sriov
Switch:1(config)#virtual-service tpvm vport eth0 vlan 10
Switch:1(config)#virtual-service tpvm enable
Switch:1(config)#remove /intflash/var/lib/insight/packages/TPVM_4900_8.1.5.0.img
Perform the following procedure to view the number of remaining virtual services resources on the
switch.
Procedure
Name Description
DiskRemain Shows the remaining disk space available, in
Gigabytes (GB).
NumCoresRemain Shows the remaining number of CPU cores
available.
MemSizeRemain Shows the remaining amount of memory size
available, in Megabytes (MB).
CopySourceFile Specifies the source file to copy. To specify
a location, use the format: {VM_NAME_SRC}:
{VM_FILE_PATH} or {NOS_FILE_PATH}.
For example, figw:/home/rwa/configs/
ipsec1.cfg identifies a file located in the VM. /
intflash/ipsec1.cfg identifies a file located
in the NOS. The valid path for a NOS location can
be one of the following:
• /intflash
• /extflash
• /usb
• /var/lib/insight/packages
Name Description
ExecuteCommand Specifies the Virtual Machine (VM) command to
run. To include spaces in the syntax, include the
text string in quotation marks (").
User Specifies the virtual service user name. The range
is 0-20 characters.
Password Specifies the virtual service password.
FigwCli Specifies the command to send to the Fabric
IPsec Gateway VM. For more information about
Fabric IPsec Gateway commands, see VOSS CLI
Commands Reference.
You must configure at least one virtual port to enable the virtual service. For more information, see
Configure Virtual Ports on page 878.
Procedure
Name Description
Name Specifies the name of the virtual service. Every
virtual service must have a unique name.
NumCores Specifies the number of CPU cores assigned to the
virtual service. The default is 1.
MemSize Specifies the memory size (in Megabytes)
assigned to the virtual service. The default value
is 1024 Megabytes.
Name Description
Enable Enables the virtual service.
Note:
You must configure at least one virtual port to
enable the virtual service.
Perform the following procedure to configure the number of disks to be used by the virtual service
configured on the switch.
Procedure
Name Description
ServName Specifies the virtual service name.
Note:
The specified name must match the virtual service
name configured on the switch.
Perform the following procedure to configure virtual ports to be used by the virtual service configured
on the switch.
Note
The names of Ethernet ports appearing in a specific Virtual Machine (VM) are not correlated
to the configured virtual port names. Each VM renames the Ethernet ports as per its
requirements, after they are discovered during the VM initialization.
By default, the system displays all virtual ports of OVS connection type first in the
alphabetical order of their configured names, followed by the virtual ports of SR-IOV and
VT-d connection types.
Procedure
5. In the Virtual Service Name field, enter the virtual service name.
6. In the Interface Name field, enter a name for the virtual port.
7. (Optional) In the VlanIdList field, enter a VLAN ID.
8. (Optional) In the ConnectType field, select a connection type.
Note
Ensure the connection type you configure for the virtual port matches the connection type
supported by the IAH port.
9. Select Insert.
Name Description
Virtual Service Name Specifies the virtual service name.
Note:
The specified name must match the virtual service
name configured on the switch.
Note:
Configure this value only when the ConnectType
field is OVS.
Perform the following procedure to configure the package information to be used by the virtual service.
Procedure
1. In the navigation pane, expand Configuration > Serviceability.
2. Select Virtual Service.
3. Select the Application tab.
4. Select Insert.
5. In the Name field, enter the virtual service name.
6. Next to the PackageName field, select the ellipsis, select the package to install, and then select Ok.
7. Select Insert.
Name Description
Name Specifies the name of the virtual service.
PackageName Specifies the name and location of the package.
InstallResult Shows the status of the virtual service installation.
InstallStage Shows the stages of a package installation.
PackageAppName Shows the application name used by the virtual
service.
PackageAppVersion Shows the application version used by the virtual
service.
Perform this task to run a VM command from EDM. To include spaces in the syntax, include the text
string in quotation marks (").
Procedure
5. In the ExecuteCommand field, type the ls command for the VM configs directory. For example,
"ls /home/rwa/configs".
6. In the FigwCli field, type a command to send it to the Fabric IPsec Gateway. For more information
about Fabric IPsec Gateway commands, see VOSS CLI Commands Reference.
7. Select Apply.
Copy VM Files
About This Task
Perform this task to copy files between the Network Operating System (NOS) and a VM or between
VMs. The valid path for a NOS location can be one of the following:
• /intflash
• /extflash
• /usb
• /var/lib/insight/packages
Procedure
Procedure
7. Select Apply.
Perform the following procedure to view information about the package files available in
the /var/lib/insight/packages directory, which you can use to install a new virtual service.
Procedure
Name Description
Name Shows the name and absolute path information
for package files available in the /var/lib/
insight/packages directory.
Date Shows the date and time when the package file
was added to the directory.
Size Shows the size (in bytes) of the package file.
Steps in this procedure include examples or links to background procedures if you are unfamiliar with
how to complete a particular step.
Procedure
1. Within the VM, save the configuration. For more information, see Save Running Configuration to a
File on page 904.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#virtual-service figwOld console
Connected to domain figw5.2 Escape character is ^Y
FIGW> save config
File already exists, do you want to overwrite [y/n]: y
FIGW>
2. Copy the configuration files (*.cfg), the shadov.txt file, which is an encrypted file that contains
the authentication keys for the IPsec tunnels, and the default-config-file.txt file from
the VM to intflash within the NOS. For more information, see Run a VM command from Network
Operating System (NOS) CLI on page 870 and Copy VM Files on page 871.
Switch:1(config)#mkdir figw
Switch:1(config)#virtual-service figwOld exec-command "ls /home/rwa/configs/"
config.cfg
figw.cfg
figw_cli.log
new.cfg
shadov.txt
Switch:1(config)#exit
Switch:1#virtual-service copy-file figwOld:/home/rwa/configs/config.cfg /intflash/figw/
config.cfg
Switch:1#virtual-service copy-file figwOld:/home/rwa/configs/new.cfg /intflash/figw/
new.cfg
Switch:1#virtual-service copy-file figwOld:/home/rwa/configs/figw.cfg /intflash/figw/
figw.cfg
Switch:1#virtual-service copy-file figwOld:/home/rwa/default-config-file.txt /intflash/
figw/default-config-file.txt
Switch:1#virtual-service copy-file figwOld:/home/rwa/configs/shadov.txt /intflash/figw/
shadov.txt
configure terminal
Note
If you instead uninstall the original virtual service, the system removes the complete virtual
service configuration from the configuration file.
11. Reboot the Fabric IPsec Gateway VM. For more information, see Reboot Fabric IPsec Gateway VM
on page 910.
Tip
As an alternative, you can disable and reenable the Fabric IPsec Gateway virtual service.
12. Verify the running configuration of the new VM matches the configuration of the old VM:
Switch:1(config)#virtual-service figwNew figw-cli "show running-config"
set global ipsec-tunnel-src-vlan 30
set global ipsec-tunnel-src-ip 30.30.30.2/24
set global lan-intf-vlan 100
set global lan-intf-ip 100.100.100.2/24
set global lan-intf-gw-ip 100.100.100.102
set global fe-tunnel-src-ip 102.102.102.102
set global wan-intf-gw-ip 30.30.30.102
set global mtu 1950
set global services sshd enable
set ipsec 104 auth-key ******
set ipsec 104 responder-only true
set ipsec 104 fe-tunnel-dest-ip 104.104.104.104
set ipsec 104 fragment-before-encrypt enable
13. Remove the original image from the /var/lib/insight/packages/ directory on the switch:
remove WORD<1-255>
Procedure
Note
Type CTRL+Y to exit the console.
Example
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> ftp 192.0.2.50
Variable Definitions
The following table defines the variable for ftp command.
Variable Value
{A.B.C.D} Specifies the IP Address to establish the FTP connection with.
Perform this procedure to display content in the default directory on the Fabric IPsec Gateway Virtual
Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
Displaying the configured directory on the VM.
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> ls
coupled.cfg
Perform this procedure to load a configuration file to the Fabric IPsec Gateway Virtual Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> load coupled.cfg
Variable Definitions
The following table defines the variable for load command.
Variable Value
WORD <1-255> Specifies the configuration file name.
Perform this procedure to ping an IP Address on the Fabric IPsec Gateway Virtual Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
2. Ping an IP Address:
ping {A.B.C.D}
Example
Pinging an IP Address on the VM.
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> ping 192.0.2.35
Variable Definitions
The following table defines parameters for the ping command.
Variable Value
{A.B.C.D} Specifies the IP address.
Perform this procedure to configure IPsec source IP address, Local Area Network (LAN ) interface IP
and gateway IP address, maximum transmission unit (MTU) value, and so on globally, on the Fabric
IPsec Gateway Virtual Machine (VM).
Note
You must perform this procedure only after the VM boots up.
Procedure
Note
Type CTRL+Y to exit the console.
2. Configure IPsec source IP address for a Fabric Extend (FE) tunnel for IPsec in decoupled mode:
set global ipsec-tunnel-src-ip {A.B.C.D/X}
3. Assign VLAN ID to the configured IPsec source IP address:
set global ipsec-tunnel-src-vlan <2-4059>
4. Configure the LAN interface IP address on the first Ethernet interface (eth0) of Fabric IPsec Gateway
VM:
set global lan-intf-ip {A.B.C.D/X}
5. Assign VLAN ID to the configured LAN interface IP address:
set global lan-intf-vlan <2-4059>
6. Configure the LAN interface gateway IP address on the VOSS switch:
set global lan-intf-gw-ip {A.B.C.D}
7. Configure the logical interface gateway IP address, to add routes for FE tunnels that need
Fragmentation:
set global fe-tunnel-gw-ip {A.B.C.D}
Note
The logical interface source IP address must be same as the source IP address configured
on the VOSS switch.
Note
• The switch applies the global MTU value, if you do not configure MTU during the IPsec
tunnel configuration.
• If an IPsec tunnel is not using the fragmentation and reassembly capabilities, the
default MTU value is 1950.
10. Configure the Wide Area Network (WAN) interface gateway IP address, which is the next hop for
IPsec tunnels.
set global wan-intf-gw-ip {A.B.C.D}
11. Configure the virtual reassembly interface IP address:
set global virtual-reassembly-intf-ip {A.B.C.D/X}
Note
You must configure the virtual reassembly interface IP address to use the fragmentation
and reassembly service.
Example
Configuring global parameters on Fabric IPsec Gateway VM to configure an IPsec tunnel between two
switches:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> set global ipsec-tunnel-src-ip 192.0.2.10/24
FIGW> set global ipsec-tunnel-src-vlan 101
FIGW> set global lan-intf-ip 192.0.2.20/24
FIGW> set global lan-intf-vlan 30
FIGW> set global lan-intf-gw-ip 192.0.2.30
FIGW> set global fe-tunnel-src-ip 192.0.2.40
Variable Definitions
The following table defines parameters for the set global command.
Variable Value
ipsec-tunnel-src-ip Specifies the source IP address and subnet mask for IPsec tunnel.
{A.B.C.D/X}
ipsec-tunnel-src- Specifies the VLAN ID in the range of 2 to 4059. VLAN ID 1 is the
vlan <2-4059> default VLAN and you cannot create or delete VLAN ID 1. By default,
the system reserves VLAN IDs 4060 to 4094 for internal use. On
switches that support the vrf-scaling and spbm-config-mode
boot configuration flags, if you enable these flags, the system also
reserves VLAN IDs 3500 to 3998.
lan-intf-ip Specifies the IP address and subnet mask for Local Area Network (LAN)
{A.B.C.D/X} interface.
lan-intf-vlan Specifies the VLAN ID in the range of 2 to 4059. VLAN ID 1 is the
<2-4059> default VLAN and you cannot create or delete VLAN ID 1. By default,
the system reserves VLAN IDs 4060 to 4094 for internal use. On
switches that support the vrf-scaling and spbm-config-mode
boot configuration flags, if you enable these flags, the system also
reserves VLAN IDs 3500 to 3998.
lan-intf-gw-ip Specifies the gateway IP address for LAN interface.
{A.B.C.D}
fe-tunnel-gw-ip Specifies the gateway IP address for Fabric Extend (FE) tunnel.
{A.B.C.D}
fe-tunnel-src-ip Specifies the source IP address for FE tunnel.
{A.B.C.D}
mtu <750-9000> Specifies the Maximum Transmission Unit (MTU) value.
Note:
If an IPsec tunnel is not using the fragmentation and reassembly
capabilities, the default MTU value is 1950.
wan-intf-gw-ip Specifies the Wide Area Network (WAN) interface gateway IP address.
{A.B.C.D}
virtual-reassembly- Specifies the virtual-reassembly interface IP address and subnet mask on
intf-ip {A.B.C.D/X} the Fabric IPsec Gateway (VM).
Note:
You must configure the virtual reassembly interface IP address to use the
fragmentation and reassembly service.
Variable Value
ipsec-disable Disables IPsec operationally on all tunnels in the Fabric IPsec Gateway
VM.
ipsec-log-level Specifies the IPsec log levels on Fabric IPsec Gateway VM. Following are
<-1-5> the three levels:
• -1: Absolutely Silent
• 0-4: Log levels
• 5: Clear Logs
Perform this procedure to configure IPsec tunnels on Fabric IPsec Gateway Virtual Machine (VM).
Procedure
1. Enter Fabric IPsec Gateway Configuration mode:
enable
Note
Type CTRL+Y to exit the console.
2. Configure the Maximum Transmission Unit (MTU) value for the specific IPsec tunnel:
set ipsec <1-255> mtu <1300 - 9000>
Note
The MTU range <1300-9000> is applicable for FE tunnels with IPsec and fragmentation
and reassembly capabilities.
Note
Do not use special characters ?, \, &, <, >, #.
Note
The VXLAN destination IP address for IPsec tunnel must be the same as the VXLAN
destination IP address for FE tunnel.
6. Configure the IPsec destination IP address for the specific tunnel deployed in decoupled mode:
set ipsec <1-255> ipsec-dest-ip {A.B.C.D}
7. Configure a name for the IPsec tunnel:
set ipsec <1-255> tunnel-name WORD <1-64>
8. Identify if the specific tunnel is a responder or initiator in Network Address Translation (NAT) cases:
set ipsec <1-255> responder-only <true | False>
9. Enable the IPsec on a specific tunnel:
set ipsec <1-255> admin-state enable
Example
<cr>
FIGW> set ipsec 1 ipsec-dest-ip 192.0.2.5
FIGW> set ipsec 1 mtu 1950
FIGW> set ipsec 1 auth-key abcd
FIGW> set ipsec 1 tunnel-name Tunnel-to-BEB2
FIGW> set ipsec 1 fe-tunnel-dest-ip 192.0.2.15
FIGW> set ipsec 1 esp aes256gcm16-sha256
FIGW> set ipsec 1 admin-state enable
Variable Definitions
The following table defines parameters for the set ipsec command.
Variable Value
<1-255> Specifies the unique ID for the IPsec tunnel.
admin-state <enable | Enables or disables IPsec on the specific IPsec tunnel.
disable>
auth-key WORD Specifies the pre-shared authentication key.
<1-32>
Note:
Do not use special characters ?, \, &, <, >, #.
encryption-key- Specifies the encryption key length for the IPsec tunnel. The default
length <128 | 256> encryption key length is 128. As a best practice, use the newer esp
parameter instead; the encryption-key-length parameter remains
for backward compatibility.
esp <aes128gcm16- Specifies the ESP cipher suites for the IPsec tunnel. The default is
sha256 | aes256- aes128gcm16-sha256. aes256-sha256 is not supported in the current
sha256 | release.
aes256gcm16-sha256>
fe-tunnel-dest-ip Specifies the destination IP address for Fabric Extend (FE) tunnel.
{A.B.C.D}
Variable Value
ipsec-dest-ip Specifies the destination IP address for IPsec tunnel.
{A.B.C.D}
mtu <1300-9000 Specifies the Maximum Transmission Unit (MTU) value for the FE tunnel
with both IPsec and fragmentation and assembly capabilities.
responder-only Specifies if the IPsec session in the FE tunnel will be in responder only
<true | false> mode or initiator mode. When in responder mode the FE tunnel will only
respond to the incoming request and not initiate the IPsec connection. By
default both sides of IPSec connection will be initiators in the FE tunnel.
Configure the IPsec tunnel to be in responder only mode when there is
Network Address Translation (NAT) between the IPsec connection.
For more information about NAT, see IPsec NAT-T on page 1776.
tunnel-name WORD Specifies a name for the IPsec tunnel.
<1-64>
egress-shaping-rate Specifies the egress shaper rate for the IPsec tunnel.
<1-1000>
Perform this procedure to enable IPsec compression on Fabric IPsec Gateway Virtual Machine (VM).
Note
By default, IPsec compression is disabled. You must enable IPsec compression on both ends
of the adjacency.
Procedure
Note
Type CTRL+Y to exit the console.
Procedure
1. Enter Fabric IPsec Gateway Configuration mode:
enable
Note
Type CTRL+Y to exit the console.
Use this procedure to configure the subject parameters to identify the device.
Procedure
1. Enter Fabric IPsec Gateway Configuration mode:
enable
Note
Type CTRL+Y to exit the console.
Example
Switch:1>enable
Switch:1#virtual-service FIGW console
FIGW>set certificate subject ExtremeLab DN "CN=subca5, OU=Test, O=Extreme, L=Town,
ST=State, [email protected]"
FIGW>set certificate subject ExtremeLab key-label key1
Variable Definitions
The following table defines parameters for the set certificate subject command.
Variable Value
DN <name> Specifies the distinguished name. You can create a comma-separated list.
key-label <key- Specifies the key name of the generated key pair. This parameter is
label> optional. If you do not configure one, the switch generates one the same as
the subject-label.
<subject-label> Specifies the subject identity. You cannot use the following special
characters:
• question mark (?)
• backslash (\)
• ampersand (&)
• less than (<)
• greater than (>)
• pound (#)
Use the following procedure to generate the private and public key pair. By default, VOSS generates a
2,048 RSA key when the system starts. You can use this procedure to generate a new key.
Procedure
Note
Type CTRL+Y to exit the console.
Example
Switch:1>enable
Switch:1#virtual-service FIGW console
FIGW>certificate generate key rsa 2048 key_rsa
fingerprint: 09ac0c64b9bf3ad04dc67f20942c674e
Variable Definitions
The following table defines parameters for the certificate generate key command.
Variable Value
key-label Specifies the key name of the generated key pair.
size Specifies the size of key-pair to be generated. The
switch supports 2048.
type Specifies the type of cryptography algorithm used
to generate the key-pair. The switch uses only rsa
as the cryptography algorithm type.
Use this procedure to configure the certificate authority (CA) to use Simple Certificate Enrollment
Protocol (SCEP) with a CA server for online certificate provisioning.
Procedure
Note
Type CTRL+Y to exit the console.
Note
You can clean the CA trustpoint only if the subject-label is not configured on an IPsec
tunnel.
Example
Switch:1>enable
Switch:1#virtual-service FIGW console
FIGW>set certificate ca-trustpoint caExtremeEJBCA ca-url http://192.0.2.9:8080/ejbca/
publicweb/apply/scep/test/pkiclient.exe
FIGW>set certificate ca-trustpoint caExtremeEJBCA caname subca5
FIGW>set certificate ca-trustpoint caExtremeEJBCA get-method post
Variable Definitions
The following table defines parameters for the set certificate ca-trustpoint command.
Variable Value
<ca-label> Specifies the name of the certificate authority (CA). The name can use
alphanumeric characters and is case-sensitive. The maximum length is 45
characters.
ca-url <ca-url> Specifies the trusted CA URL.
caname <caname> Specifies the name of the owner of the device or user.
get-method <post | Specifies the HTTP request style. You can use post for EJBCA or get for
get> Win2012 CA. The default value is post.
Variable Value
<ca-trustpoint> Specifies the name of the certificate authority. The
name can be alphanumeric and is case-sensitive.
The maximum length is 45 characters.
<subject-label> Specifies the subject identity.
The following table defines parameters for the certificate get command.
Variable Value
cacert-from <A.B.C.D> <user> <file- Specifies where to obtain the CA certificate.
path> Specify the IP address, username, and remote file
path.
crl-from <A.B.C.D> <user> <file- Specifies where to obtain the Certificate
path> <cacert-filename> Revocation List. Specify the IP address, username,
remote file path, and the CA certificate file to
verify the CRL.
signedcert-from <A.B.C.D> <user> Specifies where to obtain the subject certificate.
<file-path> <subject-label> Specify the IP address, username, remote file path,
and subject label.
Use this procedure to generate a certificate signing request (CSR) and store it into a file. This CSR is
required to obtain the offline subject certificate.
Procedure
Note
Type CTRL+Y to exit the console.
Variable Definitions
The following table defines parameters for the certificate generate csr command.
Variable Value
<subject-label> Specifies the subject identity.
The following table defines parameters for the certificate send-csr-to command.
Variable Value
<A.B.C.D> Specifies the IP address for the certificate authority.
<remote-path> Specifies the file path on the certificate authority.
<subject-label> Specifies the subject identity.
<user> Specifies the username for the certificate authority.
You can remove subject certificates from the certificate authority (CA) trustpoint only if the subject-
label is not configured on an IPsec tunnel.
Use this procedure to remove keys or certificates from the certificate store.
Procedure
Note
Type CTRL+Y to exit the console.
2. Remove a key:
certificate remove key <key-label>
3. Remove a specific certificate from the store:
certificate remove offline-cacert <filename>
4. Remove a Certificate Revocation List (CRL) certificate from the store:
certificate remove offline-crl <filename>
5. Remove signed certificates for a specific subject label:
certificate remove offline-subject-certs <subject-label>
6. Remove a specific identity certificate from the CA trustpoint:
certificate ca <ca-trustpoint> remove <subject-label>
7. Remove all certificates from the CA trustPoint:
certificate ca <ca-trustpoint> clean
Variable Definitions
The following table defines parameters for the certificate remove command.
Variable Value
key <key-label> Specifies the key name to remove.
offline-cacert Specifies the certificate filename to remove.
<filename>
offline-crl Specifies the Certificate Revocation List (CRL) certificate filename to
<filename> remove.
offline-subject- Specifies the subject label for which to remove signed certificates.
certs <subject-
label>
Variable Value
<ca-trustpoint> Specifies the name of the certificate authority. The
name can be alphanumeric and is case-sensitive.
The maximum length is 45 characters.
<subject-label> Specifies the subject identity.
Procedure
Note
Type CTRL+Y to exit the console.
Example
Switch:1>enable
Switch:1#virtual-service FIGW console
FIGW>show certificates keys key_rsa
Key Label: key_rsa
private key with:
pubkey: RSA 2048 bits
keyid: ef:4c:1d:a7:cc:84:6f:87:da:e4:de:99:07:3d:96:fc:9a:d1:c9:f4
subjkey: cb:d1:67:a0:da:9c:05:ce:c0:0d:a3:5c:1b:ba:ce:3f:ff:af:8f:77
Variable Definitions
The following table defines parameters for the show certificates command.
Variable Value
ca <ca-label> Specifies the name of the certificate authority (CA).
If you do not specify the name, the command displays the details of all configured CAs.
Use this procedure to view the certificate configuration for the VM.
Procedure
Note
Type CTRL+Y to exit the console.
Examples
Switch:1>enable
Switch:1#virtual-service FIGW console
FIGW>show certificate-config ca-trustpoint
certificate {
ca-trustpoint {
ca-label a;
caname subCaVpn;
ca-url http://10.2.38.35:8080/ejbca/publicweb/apply/scep/test/pkiclient.exe;
get-method post;
}
Switch:1>enable
Switch:1#virtual-service FIGW console
FIGW>show certificate-config subject
certificate {
subject {
subject-label fig;
DN CN=FIGW;
key-label gigi;
}
subject {
subject-label figv;
DN CN=figvpn;
}
Configure Egress Shaping Rate for IPsec Tunnels on Fabric IPsec Gateway VM
Before You Begin
Before you can configure the egress shaping rate for the IPsec tunnel on the VM, you must first disable
the IPsec tunnel.
Perform this procedure to configure the egress shaping rate for IPsec tunnels on Fabric IPsec Gateway
Virtual Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
Configuring egress-shaping-rate for the IPsec tunnel on the Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> delete ipsec 1 admin-state enable
FIGW> set ipsec 1 egress-shaping-rate 200
FIGW> set ipsec 1 admin-state enable
Variable Definitions
The following table defines parameters for the set ipsec command.
Variable Value
<1-255> Specifies the unique ID for the IPsec tunnel.
admin-state <enable | Enables or disables IPsec on the specific IPsec tunnel.
disable>
egress-shaping-rate Specifies the egress shaping rate for the IPsec tunnel.
<1-1000>
Perform this procedure to configure a Fabric Extend (FE) tunnel with only fragmentation and
reassembly capabilities, on the Fabric IPsec Gateway Virtual Machine (VM).
Procedure
1. Enter Fabric IPsec Gateway Configuration mode:
enable
Note
Type CTRL+Y to exit the console.
2. Configure the logical interface destination IP address for the specific tunnel:
set logical-intf-tunnel <1-255> fe-tunnel-dest-ip {A.B.C.D}
3. Configure the Maximum Transmission Unit (MTU) value for the specific tunnel:
set logical-intf-tunnel <1-255> mtu <750-9000>
Note
The MTU range <750-9000> is applicable for FE tunnels with only fragmentation and
reassembly capabilities.
Example
Configuring logical interface tunnel on Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> set logical-intf-tunnel 2 fe-tunnel-dest-ip 192.0.2.50
FIGW> set logical-intf-tunnel 2 mtu 1300
FIGW> set logical-intf-tunnel 2 egress-shaping-rate 5
FIGW> set logical-intf-tunnel 2 tunnel-name Tunnel-to-BEB2
Variable Definitions
The following table defines parameters for the set logical-intf-tunnel command.
Variable Value
<1-255> Specifies the unique ID for the logical interface tunnel.
fe-tunnel-dest-ip Specifies the FE tunnel destination IP address for the logical interface.
{A.B.C.D}
mtu <750-9000> Specifies the Maximum Transmission Unit (MTU) value for the FE tunnel
with only fragmentation and assembly capabilities.
tunnel-name WORD Specifies a name for the the logical interface tunnel.
<1-64>
egress-shaping- Specifies the egress shaping rate for the logical interface tunnel.
rate<1-1000>
Perform this procedure to save the current configuration on Fabric IPsec Gateway Virtual Machine (VM)
to a specific file.
Procedure
Note
Type CTRL+Y to exit the console.
Example
<cr>
FIGW>save config file test.txt
File already exists, do you want to overwrite [y/n]: y
Save the Fabric IPsec Gateway configuration to file "test", forcing the switch to overwrite the file
without confirmation:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> save config file test.txt -y
Variable Definitions
The following table defines parameters for the save config command.
Variable Value
file WORD <1-255> Specifies the name of file to save the configuration of the Fabric IPsec
Gateway VM.
-y Forces the switch to overwrite the configuration file without confirmation.
Perform this procedure to remove a specific configuration file from Fabric IPsec Gateway Virtual
Machine (VM).
Procedure
1. Enter Fabric IPsec Gateway Configuration mode:
enable
Note
Type CTRL+Y to exit the console.
Example
Remove configuration file "test" from Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> remove test
Variable Definitions
The following table defines parameters for the remove command.
Variable Value
WORD <1-255> Specifies the configuration file name that the system removes from Fabric
IPsec Gateway VM.
Perform this procedure to delete the global parameters that you configure on Fabric IPsec Gateway
Virtual Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
Deleting the global Maximum Transmission Unit (MTU) configuration on Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> delete global mtu
Variable Definitions
The following table defines parameters for the delete global command.
Variable Value
fe-tunnel-gw-ip Deletes the global gateway IP address for Fabric Extend (FE) tunnel.
fe-tunnel-src-ip Deletes the global source IP address for FE tunnel.
ipsec-disable Deletes the global IPsec configuration.
ipsec-tunnel-src-ip Deletes the global source IP address and subnet mask for IPsec tunnel.
ipsec-tunnel-src- Deletes the global source VLAN configuration for IPsec tunnel.
vlan
lan-intf-gw-ip Deletes the global gateway IP address on the Local Area Network (LAN)
interface.
lan-intf-ip Deletes the global IP address and subnet mask on LAN interface.
lan-intf-vlan Deletes the global VLAN configuration on LAN interface.
mtu Resets the Maximum Transmission Unit (MTU) value to its default, that is
1950 bytes.
virtual-reassembly- Deletes the global virtual-reassembly interface IP address and subnet
intf-ip mask.
virtual-reassembly- Deletes the global virtual-reassembly interface VLAN configuration.
intf-vlan
wan-intf-gw-ip Deletes the global gateway IP address on the Wide Area Network (WAN)
interface.
You must disable the IPsec administrative state on the tunnel before you can remove IPsec
configuration.
Perform this procedure to delete the configuration of a specific IPsec tunnel on Fabric IPsec Gateway
Virtual Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
<cr>
FIGW>delete ipsec 2 admin-state enable
FIGW>delete ipsec 2 auth-key
FIGW>delete ipsec 2 tunnel-name
FIGW>delete ipsec 2 fragment-before-encrypt enable
Variable Definitions
The following table defines parameters for the delete ipsec command.
Variable Value
<1-255> Specifies the unique ID of the configured IPsec tunnel.
admin-state enable Disables the IPsec status on the specific IPsec tunnel.
auth-key Deletes the authentication key that you configure on the specific IPsec
tunnel.
encryption-key- Resets the encryption key length for the specific IPsec tunnel to its
length default value, that is 128 bit.
fe-tunnel-dest-ip Deletes the destination IP address that you configure on the Fabric
Extend (FE) tunnel.
fragment-before- Disables the fragmentation of packets before IPsec encryption on the
encrypt enable tunnel. By default, fragmentation before encryption is disabled.
ipsec-dest-ip Deletes the destination IP address that you configure on the IPsec tunnel.
mtu Resets the Maximum Transmission Unit (MTU) value for the specific IPsec
tunnel to the MTU value configured globally.
responder-only Deletes the mode that you configure for the IPsec session in FE tunnel.
tunnel-name Deletes the name that you configure for the IPsec tunnel.
egress-shaping-rate Deletes the egress shaping rate for the IPsec tunnel.
Perform this procedure to delete configuration of a specific logical interface tunnel on Fabric IPsec
Gateway Virtual Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
Deleting the destination IP address for Fabric Extend (FE) tunnel configured on the logical interface
tunnel with ID 3.
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> delete logical-intf-tunnel 3 fe-tunnel-dest-ip
Variable Definitions
The following table defines parameters for the delete logical-intf-tunnel command.
Variable Value
<1-255> Specifies the unique ID of the logical interface tunnel.
fe-tunnel-dest-ip Deletes the destination IP address that you configure on the logical
interface tunnel.
mtu Resets the Maximum Transmission Unit (MTU) value for the specific
logical interface tunnel to the MTU value configured globally.
egress-shaping-rate Deletes the egress shaping rate on the logical interface tunnel.
Perform this procedure to display the data in a specific file on Fabric IPsec Gateway Virtual Machine
(VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
Display the data from coupled.cfg file:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> more coupled.cfg
set global ipsec-tunnel-src-vlan 125
set global ipsec-tunnel-src-ip 192.0.2.10/24
set global lan-intf-vlan 30
set global lan-intf-ip 192.0.2.20/24
set global lan-intf-gw-ip 192.0.2.25
set global fe-tunnel-src-ip 192.0.2.45
set global wan-intf-gw-ip 192.0.2.11
set global mtu 1950
set ipsec 1 auth-key ******
set ipsec 1 fe-tunnel-dest-ip 192.0.2.50
set ipsec 1 encryption-key-length 128
set ipsec 1 admin-state enable
Perform this procedure to reboot the Fabric IPsec Gateway Virtual Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
Rebooting Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> reboot
Perform this procedure to reset the current configuration on Fabric IPsec Gateway Virtual Machine
(VM).
Procedure
Note
Type CTRL+Y to exit the console.
Note
Reboot the Fabric IPsec Gateway VM after you reset the configuration.
Example
Resetting current configuration on Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> reset-config
Perform this procedure to traceroute to an IP address on Fabric IPsec Gateway Virtual Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
2. Traceroute to an IP address:
traceroute {A.B.C.D}
Example
Traceroute to IP address.
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> traceroute 192.0.2.100
Variable Definitions
The following table defines parameters for the traceroute command.
Variable Value
{A.B.C.D} Specifies the IP address to initiate traceroute to.
Perform this procedure to display the default configuration file on the Fabric IPsec Gateway Virtual
Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
Displaying default configuration file on Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> show default-config-file
coupled.cfg
Perform this procedure to display IPsec session logs on the Fabric IPsec Gateway Virtual Machine (VM).
Procedure
1. Enter Fabric IPsec Gateway Configuration mode:
enable
Note
Type CTRL+Y to exit the console.
Example
Displaying IPsec session logs on Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> show ipsec-logs
<<Month dd>> <<hh:mm:ss>> 15[IKE] <ipsec0-192.0.2.10|29> sending DPD request
<<Month dd>> <<hh:mm:ss>> 15[ENC] <ipsec0-192.0.2.10|29> generating INFORMATIONAL request
11832 [ ]
<<Month dd>> <<hh:mm:ss>> 15[NET] <ipsec0-192.0.2.10|29> sending packet: from
192.0.2.30[500] to 192.0.2.10[500] (76 bytes)
<<Month dd>> <<hh:mm:ss>> 13[NET] <ipsec0-192.0.2.10|29> received packet: from
192.0.2.10[500] to 192.0.2.30[500] (76 bytes)
<<Month dd>> <<hh:mm:ss>> 13[ENC] <ipsec0-192.0.2.10|29> parsed INFORMATIONAL response
11832 [ ]
<<Month dd>> <<hh:mm:ss>> 11[NET] <ipsec0-192.0.2.10|29> received packet: from
192.0.2.10[500] to 192.0.2.30[500] (76 bytes)
<<Month dd>> <<hh:mm:ss>> 11[ENC] <ipsec0-192.0.2.10|29> parsed INFORMATIONAL request
12924 [ ]
<<Month dd>> <<hh:mm:ss>> 11[ENC] <ipsec0-192.0.2.10|29> generating INFORMATIONAL
response 12924 [ ]
<<Month dd>> <<hh:mm:ss>> 11[NET] <ipsec0-192.0.2.10|29> sending packet: from
192.0.2.30[500] to 192.0.2.10[500] (76 bytes)
Perform this procedure to display the IPsec routes configured on the Fabric IPsec Gateway Virtual
Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
Displaying the IPsec routes configured on Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> show ipsec-routes
192.0.2.30 via 192.0.2.20 dev eth0.125 mtu lock 1950
192.0.2.1/24 dev eth0.30 proto kernel scope link src 192.0.2.2
192.0.2.10 via 192.0.2.45 dev eth0.30
192.0.2.100/24 dev eth0.125 proto kernel scope link src 192.0.2.60
192.0.2.11/16 dev docker0 proto kernel scope link src 192.0.2.12 linkdown
Perform this procedure to display the IPsec encryption statistics on the Fabric IPsec Gateway Virtual
Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
Displaying IPsec encryption statistics on Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> show ipsec-stats
src 192.0.2.30 dst 192.0.2.40
proto esp spi 0xc0c2d9cd(3233995213) reqid 1(0x00000001) mode tunnel
replay-window 32 seq 0x00000000 flag af-unspec (0x00100000)
aead rfc4106(gcm(aes)) 0xa9c1923a4b4c5618ea2f3596de821261218bdea2 (160 bits) 128
anti-replay context: seq 0x0, oseq 0x138, bitmap 0x00000000
lifetime config:
limit: soft (INF)(bytes), hard (INF)(bytes)
limit: soft (INF)(packets), hard (INF)(packets)
expire add: soft 3268(sec), hard 3600(sec)
expire use: soft 0(sec), hard 0(sec)
lifetime current:
475650(bytes), 312(packets)
add <<yyyy-mm-dd>> <<hh:mm:ss>> use <<yyyy-mm-dd>> <<hh:mm:ss>>
stats:
replay-window 0 replay 0 failed 0
src 192.0.2.40 dst 192.0.2.30
proto esp spi 0xc92b08e5(3375040741) reqid 1(0x00000001) mode tunnel
replay-window 32 seq 0x00000000 flag af-unspec (0x00100000)
aead rfc4106(gcm(aes)) 0x9ca3568095298cefaaa709b9b932eb5141bd252c (160 bits) 128
anti-replay context: seq 0x135, oseq 0x0, bitmap 0xffffffff
lifetime config:
limit: soft (INF)(bytes), hard (INF)(bytes)
limit: soft (INF)(packets), hard (INF)(packets)
expire add: soft 3341(sec), hard 3600(sec)
expire use: soft 0(sec), hard 0(sec)
lifetime current:
470953(bytes), 309(packets)
add <<yyyy-mm-dd>> <<hh:mm:ss>> use <<yyyy-mm-dd>> <<hh:mm:ss>>
stats:
replay-window 0 replay 0 failed 0
Perform this procedure to display the status of configured IPsec tunnel on the Fabric IPsec Gateway
Virtual Machine (VM):
Procedure
Note
Type CTRL+Y to exit the console.
Example
Displaying the status of configured IPsec tunnel on Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> show ipsec-status
Status of IKE charon daemon (strongSwan 5.3.5, Linux 4.4.0-128-generic, x86_64):
uptime: 13 days, since <<month, day hh:mm:ss year>>
malloc: sbrk 2433024, mmap 0, used 369408, free 2063616
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 3
loaded plugins: charon test-vectors aes rc2 sha1 sha2 md4 md5 random nonce x509
revocation constraints
pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc
hmac gcm attr
kernel-netlink resolve socket-default connmark stroke updown
Listening IP addresses:
192.0.2.40
192.0.2.20
Connections:
ipsec0-192.0.2.5: 192.0.2.40...192.0.2.5 IKEv2, dpddelay=3s
ipsec0-192.0.2.5: local: [192.0.2.60] uses pre-shared key authentication
ipsec0-192.0.2.5: remote: [192.0.2.5] uses pre-shared key authentication
ipsec0-192.0.2.5: child: 192.0.2.60/32 === 192.0.2.5/32 TUNNEL, dpdaction=restart
Security Associations (1 up, 0 connecting):
ipsec0-192.0.2.5[29]: ESTABLISHED 21 hours ago,
192.0.2.40[192.0.2.60]...192.0.2.5[192.0.2.5]
ipsec0-192.0.2.5[29]: IKEv2 SPIs: dcf0a2d545d40679_i 55006e07252b9934_r*, pre-shared key
reauthentication in 2 hours
ipsec0-192.0.2.5[29]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
ipsec0-192.0.2.5{377}: INSTALLED, TUNNEL, reqid 1, ESP SPIs: c92b08e5_i c0c2d9cd_o
ipsec0-192.0.2.5{377}: AES_GCM_16_128, 291247 bytes_i (190 pkts, 6s ago), 297523 bytes_o
(194 pkts, 1s ago), rekeying in 30 minutes
ipsec0-192.0.2.5{377}: 192.0.2.60/32 === 192.0.2.5/32
Perform this procedure to display the IPsec configuration on the Fabric IPsec Gateway Virtual Machine
(VM):
Procedure
Note
Type CTRL+Y to exit the console.
Example
Display the Logical Interface IPsec Configurations on the Fabric IPsec Gateway VM
About This Task
Perform this procedure to display the logical interface IPsec configurations on the Fabric IPsec Gateway
Virtual Machine (VM):
Procedure
Note
Type CTRL+Y to exit the console.
Example
Displaying the logical interface IPsec configurations on the on Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW>
FIGW> show logical-intf-config 1
logical-intf-tunnel {
tunnel_id 1;
tunnel-name ----;
fe-tunnel-dest-ip 20.20.20.20;
mtu 1950;
egress-shaping-rate 110;
Perform this procedure to display the parameters configured currently on the Fabric IPsec Gateway
Virtual Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
Displaying the parameters configured on Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> show running-config
set global ipsec-tunnel-src-vlan 125
set global ipsec-tunnel-src-ip 192.0.2.1/24
set global lan-intf-vlan 30
set global lan-intf-ip 192.0.2.10/24
set global lan-intf-gw-ip 192.0.2.25
set global fe-tunnel-src-ip 192.0.2.55
set global wan-intf-gw-ip 192.0.2.11
set global mtu 1950
set ipsec 1 auth-key ******
set ipsec 1 fe-tunnel-dest-ip 192.0.2.70
set ipsec 1 encryption-key-length 128
set ipsec 1 admin-state enable
Display current version of the Fabric IPsec Gateway Virtual Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
<cr>
FIGW>show version
FabricIPSecGW_VM_4.0.0.0
Perform this procedure to log out of the Fabric IPsec Gateway Virtual Machine (VM).
Procedure
Note
Type CTRL+Y to exit the console.
Example
Logging out of the Fabric IPsec Gateway VM:
Switch:1> enable
Switch:1# virtual-service figw console
Connected to domain figw
Escape character is ^Y
<cr>
FIGW> exit
Note
This section is an overview. For further details on the SPBM and IS-IS infrastructure and
configuration, see the sections described in the Documentation Sources section that follows.
1. Infrastructure configuration
As a first step, you must configure your basic infrastructure for Shortest Path Bridging MAC (SPBM).
2. Services configuration
After you complete the infrastructure configuration, you configure the appropriate services for your
network to run on top of your base architecture. This includes:
• Layer 2 and Layer 3 VSNs
• IP Shortcuts
• Inter-VSN routing
3. Fabric interoperations
You can also configure Fabric gateway functionality like SPB-PIM Gateway and VXLAN Gateway.
4. Operations and Management
To debug connectivity issues and isolate network faults in the SPBM network, you can use
Connectivity Fault Management (CFM).
Documentation Sources
See the following documentation sources:
• For information on basic SPBM infrastructure and IS-IS configuration and Layer 2 services, see Fabric
Basics and Layer 2 Services on page 923.
This section also contains information on configuring Fabric Extend, which enables your enterprise
to extend Fabric Connect technology over Layer 2 or Layer 3 core networks.
• For information on Fabric Layer 3 services configuration, see Fabric Layer 3 Services on page 1341.
• For information on IP Multicast over Fabric Connect configuration and services, see IP Multicast over
Fabric Connect on page 1682. SPB-PIM Gateway configuration on page 3187 also contains information
about configuring the SPB-PIM Gateway (SPB-PIM GW), which provides multicast inter-domain
communication between an SPB network and a PIM network. The SPB-PIM GW can also connect
two independent SPB domains.
SPBM eliminates the need for multiple overlay protocols in the core of the network by reducing the core
to a single Ethernet based link-state protocol that provides all virtualization services in an integrated
model. In addition, by relying on endpoint service provisioning only, the idea of building your network
once and not touching it again becomes a true reality. This technology provides all the features and
benefits required by carrier-grade, enterprise and service provider deployments without the complexity
of alternative technologies, for example, Multiprotocol Label Switching (MPLS).
SPBM simplifies deployments by eliminating the need to configure multiple points throughout the
network. When you add new connectivity services to an SPBM network you do not need intrusive core
provisioning. The simple endpoint provisioning is done where the application meets the network, with
all points in between automatically provisioned through the robust link-state protocol, Intermediate-
System-to-Intermediate-System (IS-IS).
Most Ethernet based networks use 802.1Q tagged interfaces between the routing switches. SPBM uses
two Backbone VLANs (B-VLANs) that are used as the transport instance. A B-VLAN is not a traditional
VLAN in the sense that it does not flood unknown, broadcast or multicast traffic, but only forwards
based on IS-IS provisioned backbone MAC (B-MAC) tables. After you configure the B-VLANs and the
IS-IS protocol is operational, you can map the services to service instances.
SPBM uses IS-IS to discover and advertise the network topology, which enables it to compute the
shortest path to all nodes in the SPBM network. SPBM uses IS-IS shortest path trees to populate
forwarding tables for the individual B-MAC addresses of each participating node.
To forward customer traffic across the core network backbone, SPBM uses IEEE 802.1ah Provider
Backbone Bridging (PBB) MAC-in-MAC encapsulation, which hides the customer MAC (C-MAC)
addresses in a backbone MAC (B-MAC) address pair. MAC-in-MAC encapsulation defines a B-MAC
destination address (BMAC-DA) and a B-MAC source address (BMAC-SA). Encapsulating customer
MAC addresses in B-MAC addresses improves network scalability (no end-user C-MAC learning is
required in the core) and also significantly improves network robustness (loops have no effect on the
backbone infrastructure.)
The SPBM B-MAC header includes a Service Instance Identifier (I-SID) with a length of 32 bits with a
24-bit ID. I-SIDs identify and transmit virtualized traffic in an encapsulated SPBM frame. You can use
I-SIDs in a Virtual Services Network (VSN) for VLANs or VRFs across the MAC-in-MAC backbone:
• Unicast
◦ For a Layer 2 VSN, the device associates the I-SID with a customer VLAN, which the device then
virtualizes across the backbone. Layer 2 VSNs associate one VLAN per I-SID.
◦ With Layer 3 VSN, the device associates the I-SID with a customer VRF, which the device
virtualizes across the backbone. Layer 3 VSNs associate one VRF per I-SID.
◦ With Inter-VSN routing, Layer 3 devices, routers, or hosts connect to the SPBM cloud using the
SPBM Layer 2 VSN service. The Backbone Core Bridge can transmit traffic between different
VLANs with different I-SIDs.
◦ With IP shortcuts, no I-SID is required, forwarding for the Global Routing Table (GRT) is done
using IS-IS based shortest path BMAC reachability.
For more information on Fabric Layer 3 services, see Fabric Layer 3 Services on page 1341.
• Multicast
◦ With Layer 2 VSN with IP multicast over Fabric Connect, the BEB associates a data I-SID with the
multicast stream and the scope I-SID is based on the Layer 2 VSN I-SID.
◦ With Layer 3 VSN with IP multicast over Fabric Connect, the BEB associates a data I-SID with the
multicast stream and the scope I-SID is based on the Layer 3 VSN I-SID.
◦ With IP Shortcuts with IP multicast over Fabric Connect, the BEB associates a data I-SID with the
multicast stream, but there is no I-SID for the scope, which is the Global Routing Table (GRT).
For more information on IP multicast over Fabric Connect, see IP Multicast over Fabric Connect on
page 1682.
Note
Inter-VSN routing for IP multicast over Fabric Connect is not supported.
The switch supports the IEEE 802.1aq standard of SPBM, which allows for larger Layer 2 topologies and
permits faster convergence.
Important
• Any change to the spbm-config-mode boot flag requires a reboot for the change to
take effect.
• If you disable the boot flag, save the configuration and reboot with the saved
configuration. After you disable the flag, you can configure PIM and IGMP Snooping, but
you cannot configure SPB or IS-IS.
Note
Changing the mode requires a reboot for the change to take effect.
MAC-in-MAC encapsulation
To forward customer traffic across the core network backbone, SPBM uses IEEE 802.1ah Provider
Backbone Bridging (PBB) MAC-in-MAC encapsulation, which hides the customer MAC (C-MAC)
addresses in a backbone MAC (B-MAC) address pair. MAC-in-MAC encapsulation defines a B-MAC
source address (BMAC-SA) and a B-MAC destination address (BMAC-DA) to identify the backbone
source and destination addresses.
The originating node creates a MAC header that is used for delivery from end to end. As the MAC
header stays the same across the network, there is no need to swap a label or do a route lookup at each
node, allowing the frame to follow the most efficient forwarding path end to end.
Encapsulating customer MAC addresses in B-MAC addresses improves network scalability (no end-user
C-MAC learning is required in the core) and also significantly improves network robustness (loops in
access networks do not impact forwarding results in the backbone infrastructure.)
I-SID
SPBM introduces a service instance identifier called I-SID. SPBM uses I-SIDs to separate services from
the infrastructure. After you create an SPBM infrastructure, you can add additional services (such
as VLAN extensions or VRF extensions) by provisioning the endpoints only. The SPBM endpoints
are Backbone Edge Bridges (BEBs), which mark the boundary between the core MAC-in-MAC SPBM
domain and the edge customer 802.1Q domain. I-SIDs are provisioned on the BEBs to be associated
with a particular service instance. In the SPBM core, the bridges are Backbone Core Bridges (BCBs).
BCBs forward encapsulated traffic based on the BMAC-DA.
The SPBM B-MAC header includes a Service Instance Identifier (I-SID) with a length of 32 bits with
a 24-bit ID. I-SIDs identify a service instance for virtualized traffic in an encapsulated SPBM frame.
You can use I-SIDs in a Virtual Services Network (VSN) for VLANs or VRFs across the MAC-in-MAC
backbone:
• For a Layer 2 VSN, the I-SID is associated with a customer VLAN, which is then virtualized across the
backbone. Layer 2 VSNs offer an any-any LAN service type. Layer 2 VSNs associate one VLAN per
I-SID.
• For a Layer 2 VSN with IP multicast over Fabric Connect, the BEB associates a data I-SID with the
multicast stream and a scope I-SID that defines the scope as Layer 2 VSN. A multicast stream with a
scope of Layer 2 VSN can only transmit a multicast stream for the same Layer 2 VSN.
• For a Transparent Port UNI, the I-SID is associated with a port or MLT, which is then virtualized across
the backbone. Transparent Port UNI associates multiple ports or MLT to an I-SID.
• For a Layer 3 VSN, the I-SID is associated with a customer VRF, which is also virtualized across the
backbone. Layer 3 VSNs are always full-mesh topologies. Layer 3 VSNs associate one VRF per I-SID.
• For a Layer 3 VSN with IP multicast over Fabric Connect, the BEB associates a data I-SID with the
multicast stream and a scope I-SID that defines the scope as Layer 3 VSN. A multicast stream with a
scope of Layer 3 VSN can only transmit a multicast stream for the same Layer 3 VSN.
• For IP Shortcuts with IP multicast over Fabric Connect, the BEB associates a data I-SID with the
multicast stream and defines the scope as Layer 3 GRT. A multicast stream with a scope of Layer 3
GRT can only transmit a multicast stream for a Layer 3 GRT.
Note
I-SID configuration is required only for virtual services such as Layer 2 VSN and Layer 3 VSN.
With IP Shortcuts with unicast, no I-SID is required, forwarding for the Global Routing table is
done using IS-IS based shortest path B-MAC reachability.
Note
I-SID to VLAN binding is used to automatically determine the path between client and server
in order to attach network devices to FA Zero touch services.
The boundary between the core MAC-in-MAC SPBM domain and the edge customer 802.1Q domain is
handled by Backbone Edge Bridges (BEBs). I-SIDs are provisioned on the BEBs to be associated with a
particular service instance.
In the SPBM core, the bridges are referred to as Backbone Core Bridges (BCBs). BCBs forward
encapsulated traffic based on the BMAC-DA.
Important
SPBM separates the payload from the transport over the SPBM infrastructure. Configure all
virtualization services on the BEBs at the edge of the network. There is no provisioning
required on the core SPBM switches. This provides a robust carrier grade architecture where
configuration on the core switches never needs to be touched when adding new services.
A BEB performs the same functionality as a BCB, but it also terminates one or more Virtual Service
Networks (VSN). A BCB does not terminate any VSNs and is unaware of the VSN traffic it transports. A
BCB simply knows how to reach any other BEB in the SPBM backbone.
When the VLAN is operationally up, the IP address of the VLAN will be in the routing table.
• If no matching instance of the I-SID exists in the SPBM network, then that VLAN has no reachable
members and does not act as a network-to-network interface (NNI).
The VLAN does not act as a UNI interface because it does not have a member port.
Therefore, the device does not designate the VLAN as operationally up because the VLAN does not
act as a UNI or an NNI.
If the device acts as a BCB with two VLANs configured and two I-SIDs, there must be a UNI side with
the corresponding I-SID existing in the network.
If the device acts as both BEB and BCB, then there must be a member port in that VLAN to push out
the UNI traffic.
The BEBs provide the boundary between the SPBM domain and the virtualized services domain. For a
Layer 2 VSN service, the BEBs map a C-VLAN to an I-SID based on local service provisioning. Any BEB
in the network that has the same I-SID configured can participate in the same Layer 2 VSN.
In this example, BEB A and BEB D are provisioned to associate C-VLAN 20 with I-SID 100. When BEB
A receives traffic from C-VLAN 20 that must be forwarded to the far-end location, it performs a lookup
and determines that C-VLAN 20 is associated with I-SID 100 and that BEB D is the destination for I-SID
100. BEB A then encapsulates the data and C-MAC header into a new B-MAC header, using its own
nodal B-MAC: A as the source address and B-MAC: D as the destination address. BEB A then forwards
the encapsulated traffic to BCB B.
To forward traffic in the core toward the destination node D, BCB B and BCB C perform Ethernet
switching using the B-MAC information only.
At BEB D, the node strips off the B-MAC encapsulation, and performs a lookup to determine the
destination for traffic with I-SID 100. BEB D identifies the destination on the C-VLAN header as C-VLAN
20 and forwards the packet to the appropriate destination VLAN and port.
Ethernet Private Tree (E-Tree) extends Shortest Path Bridging MAC (SPBM) to Private VLANs (PVLAN).
Transport within the SPBM network is achieved by associating the private VLAN with an I-SID. Flooded
traffic from both promiscuous and isolated devices is transported over the same I-SID multicast tree
and suppression for spoke-to-spoke traffic is done on the egress SPB Backbone Edge Bridge (BEB).
This means the Private VLAN IDs are globally significant and must be the same on all BEBs
The following list provides details for E-Tree and Private VLAN topology:
• E-Tree associates a Private VLAN with an I-SID.
Note
The same I-SID could be attached to a regular VLAN. In that case, all ports on the regular
VLAN behave like Promiscuous ports on the PVLAN.
• Other SPB BEBs can associate a regular CVLAN to the same I-SID that E-Tree uses.
Note
The CVLAN ID must match the primary PVLAN ID.
• CVLAN devices assigned to the same I-SID that E-Tree uses have Promiscuous connectivity within
the segment.
The following figure shows a basic E-Tree network topology consisting of groups of private VLANs
connected by the SPBM core network.
The private VLAN port type is isolated, promiscuous, or trunk. If the port is a member of an MLT, then
the port inherits the private VLAN type of the MLT.
In terms of network topology, the isolated port is considered a spoke. The isolated port, or spoke, does
not communicate with any other isolated port in the network. The isolated port only communicates with
the promiscuous ports, or hubs.
IS-IS
SPBM eliminates the need for multiple overlay protocols in the core of the network by reducing the core
to a single Ethernet-based, link-state protocol (IS-IS). IS-IS provides virtualization services using a pure
Ethernet technology base. SPBM also uses IS-IS to discover and advertise the network topology, which
enables it to compute the shortest path to all nodes in the SPBM network.
IS-IS is a link-state, interior gateway protocol that was developed for the International Organization for
Standardization (ISO). ISO terminology refers to routers as Intermediate Systems (IS), hence the name
Intermediate System-to-Intermediate System (IS-IS).
To provide a loop-free network and to learn and distribute network information, SPBM uses the
Intermediate-System-to-Intermediate-System (IS-IS) link state routing protocol. IS-IS is designed to find
the shortest path from any one destination to any other in a dynamic fashion. IS-IS creates any-to-any
connectivity in a network in an optimized, loop-free manner, without the long convergence delay
experienced with the Spanning Tree Protocol. IS-IS does not block ports from use, but rather employs a
specific path. As such, all links are available for use.
IS-IS dynamically learns the topology of a network and constructs unicast and multicast mesh
connectivity. IS-IS parallel adjacency support allows you to configure multiple IS-IS links between the
two nodes. Each node in the network calculates a shortest-path tree to every other network node based
on System-IDs (B-MAC addresses). Only one adjacency with the shortest path is selected as an active
adjacency.
Note
Only an active interface with an active adjacency is added into local SPF calculations. This
mechanism ensures the local node selects the shortest path and has the same view as the rest
of the SPB network.
In the SPBM environment for Layer 2 VSNs, IS-IS carries only pure Layer 2 information with no
requirement for an underlying IP control plane or forwarding path. IS-IS runs directly over Layer 2.
Note
SPBM carries Layer 3 information for Layer 3 VSNs.
SPBM can distribute I-SID service information to all SPBM nodes, as the I-SIDs are created. SPBM
includes I-SID information in the IS-IS Link State protocol data units (PDUs). When a new service
instance is provisioned on a node, its membership is flooded throughout the topology using an IS-IS
advertisement.
Standard TLVs
IS-IS uses Type-Length-Value (TLV) encoding. SPBM employs IS-IS as the interior gateway protocol and
implements additional TLVs to support additional functionality. The switch also supports Sub-TLVs. TLVs
exist inside IS-IS packets and Sub-TLVs exist as additional information in TLVs.
The switch supports and is in full compliance with standard 802.1 aq TLVs. The IEEE ratified the 802.1aq
standard that defines SPBM and the Type-Length-Value (TLV) encoding that IS-IS uses to support
SPBM services. The following table lists all the TLVs that the switch supports.
For more information on IP multicast over Fabric Connect, see IP Multicast over Fabric Connect on page
1682.
IS-IS hierarchies
IS-IS is a dynamic routing protocol that operates within an autonomous system (or domain). IS-IS
provides support for hierarchical routing, which enables you to partition large routing domains into
smaller areas. When used separately from SPBM, IS-IS uses a two-level hierarchy, dividing the domain
into multiple Level 1 areas and one Level 2 area. When used separately from SPBM, the Level 2 area
serves as backbone of the domain, connecting to all the Level 1 areas. SPBM currently uses only Level 1
areas.
Important
The IEEE 802.1aq standard currently only defines the use of one hierarchy, Level 1. Level 2
function is disabled.
IS-IS PDUs
Intermediate System to Intermediate System Hello (IIH) packets discover IS-IS neighbors and establish
and maintain IS-IS adjacencies. An IIH is sent in every Hello-interval to maintain the established
adjacency. If a node has not heard IIHs from its neighbor for (hello-interval x hello-multiple) seconds,
the node tears down the adjacency. IIH carries TLV 143 and SPB B-VLAN Sub-TLV (among other
sub-TLVs). For two nodes to form an adjacency the B-VLAN pairs for primary B-VLAN and secondary
B-VLAN must match.
Link State Packets (LSP) advertise link state information. The system uses the link state information to
compute the shortest path. LSP also advertises MT-capability TLV 144 and SPB instance Sub-TLV, and
SPB I-SIDs Sub-TLV.
Complete Sequence Number Packets (CSNP) contain the most recent sequence numbers of all LSPs
in the database. CSNP notifies neighbors about the local LSDB. After a neighbor receives a CSNP, it
compares the LSPs in the CSNP with the LSP in the local LSDB. If the neighbor is missing LSPs, it sends
a Partial Sequence Number Packets (PSNP) to request the missing LSPs. This process synchronizes the
LSDBs among neighbors. A synchronized LSDB among all nodes in the network is crucial to producing a
loop-free shortest path.
The Network Entity Title (NET) is the combination of all three global parameters.
All routers have at least one manual area. Typically, a Level 1 router does not participate in more than
one area.
PSNP interval
You can change the PSNP interval rate. A longer interval reduces overhead, while a shorter interval
speeds up convergence.
You can configure the CSNP periodic and interval rate. A longer interval reduces overhead, while a
shorter interval speeds up convergence.
Link state packets (LSPs) contain vital information about the state of adjacencies, which must be
exchanged with neighboring IS-IS systems. Routers periodically flood LSPs throughout an area to
maintain synchronization. You can configure the LSP to reduce overhead or speed up convergence.
Point-to-point mode
All SPBM links are point-to-point links. The switch does not support broadcast links.
Configure IS-IS interface authentication to improve security and to guarantee that only trusted routers
are included in the IS-IS network. Interface level authentication only checks the IIH PDUs. If the
authentication type or key in a received IIH does not match the locally-configured type and key, the IIH
is rejected. By default, authentication is disabled.
Important
If the .isis_md5key.txt and .isis_simplekey.txt are missing, IS-IS adjacencies cannot be
established.
Password considerations
To reset the authentication password type, you must set the type to none.
The switch software supports only interface level authentication. The switch software does not support
area level or domain level authentication.
SHA-256 considerations
IS-IS Hello packets are sent periodically to discover IS-IS neighbors, and to establish and maintain IS-IS
adjacencies. If you enable SHA-256 authentication, the switch adds an HMAC-SHA256 digest to each
Hello packet.
Note
The interfaces used to make the adjacencies must have SPBM configured.
The switch that receives the Hello packet computes the digest of the packet and compares it with the
received digest. If the digests match, the packet is accepted. If the digests do not match, the receiving
switch discards the packet.
Directly connected switches must share the same key (secret), which can have a maximum length of 16
characters.
Hellos
IS-IS uses level 1 Hello packets to initialize and maintain adjacencies between neighboring routers.
You can configure the IS-IS interface level 1 Hello interval to change how often Hello packets are sent
out from an interface level.
You can configure the IS-IS interface level 1 Hello multiplier to specify how many Hellos the switch must
miss before it considers the adjacency with a neighboring switch down. By default, the hold (wait) time
is the Hello interval multiplied by the Hello multiplier. By default, if the Hello interval is 9 and the Hello
multiplier is 3, the hold time is 27. If the Hello multiplier is increased to 10, the hold time is increased to
90.
You can configure the IS-IS interface level 1 link metric to overwrite the default metric value. By
configuring the metric, you can specify a preferred path. Low cost reflects high-speed media, and high
cost reflects slower media. For the wide metric, the value ranges from 1 to 16,777,215.
• The switch only supports the wide metric.
• The total cost of a path equals the sum of the cost of each link.
Note
When multiple paths exist to reach a node, the path with the lowest sum of metrics of the
individual links is chosen. If the sum of the paths are the same, the one with the lowest
number of hops is chosen. If the number of hops is the same as well, then the tie-breaking is
done by the system ID.
For the primary B-VLAN, the path that has a node with the lowest system ID is chosen.
Whereas, for the secondary B-VLAN, the path that has a node with the highest system ID is
chosen.
Disabling IS-IS
You can disable IS-IS globally or at the interface level. If IS-IS is globally disabled, then all IS-IS functions
stop. If IS-IS is enabled at the global level and disabled at one of the interface levels, then IS-IS
continues on all other interfaces.
Overload Bit
A node sends the overload bit in LSP updates to inform other devices whether to use that node to pass
transit traffic. For example, when a device receives an LSP with an overload bit, the device ignores that
LSP in its Shortest Path First (SPF) calculation to avoid sending transit traffic through the overloaded
node; however, the overloaded node can still receive traffic destined to itself.
The system activates the overload bit on bootup and clears it after 20 seconds. You can use the
overload-on-startup parameter to control the time before the overload bit is cleared after
bootup.
You can permanently configure the overload bit using the overload parameter. If you use this
parameter, the system does not clear the overload bit after bootup and sends it in all LSP updates. If
the overload bit is configured, other devices do not include this node for use as a transit node in IS-IS
computations. By default, the overload parameter is set to false.
The overload and overload-on-startup parameters are configured under the router isis
configuration mode in the CLI.
When IS-IS is enabled on a switch, the switch delays a reset by two seconds so that LSPs with the
overload bit can be sent to all Backbone Edge Bridges (BEB) and Backbone Core Bridges (BCB) in the
SPB domain.
SPBM B-VLAN
Each SPBM network instance is associated with at least one backbone VLAN (B-VLAN) in the core
SPBM network.
Note
SPB internally uses spanning tree group (STG) 63 or Multiple Spanning Tree Instance (MSTI)
62. STG 63 or MSTI 62 cannot be used by another VLAN or MSTI. For non-SPB customer
networks, if you use STG 63 or MSTI 62 in the configuration, you must delete STG 63 or MSTI
62 before you can configure SPBM.
This VLAN is used for both control plane traffic and dataplane traffic.
Note
Always configure two B-VLANs in the core to allow load distribution over both B-VLANs.
SPBM alters the behavior of the VLAN. When a B-VLAN is associated with an SPBM network the
following VLAN attributes and behaviors are modified for the B-VLAN:
• Flooding is disabled
• Broadcasting is disabled
• Source address learning is disabled
• Unknown MAC discard is disabled
You cannot add ports to a B-VLAN manually, IS-IS enabled ports are automatically added to the
B-VLAN.
Essentially the B-MAC addresses are programmed into the B-VLAN Forwarding Information Bases
(FIBs) by IS-IS instead of the traditional VLANs flooding and learning approach.
Modification of the VLAN behavior is necessary to ensure proper control over the SPBM traffic.
Pre-populated FIB
An Ethernet network usually learns MAC addresses as frames are sent through the switch. This process
is called reverse learning and is accomplished through broadcast.
SPBM does not allow any broadcast flooding of traffic on the B-VLAN in order to prevent looping
accomplished through flooding packets with unknown destinations (although multicast traffic is
supported). As such, MAC addresses must be distributed within SPBM. This is accomplished by carrying
the necessary B-MAC addresses inside the IS-IS link state database. To that end, SPBM supports an IS-IS
TLV that advertises the I-SID and B-MAC information across the network. This functionality enables the
powerful end-point-provisioning of SPBM.
These Backbone MAC addresses are populated into the SPBM VLAN Forwarding Information Base (FIB)
to maximize efficiency and to allow Reverse Path Forwarding Check (RPFC) to operate properly.
RPFC
A loop prevention mechanism is required at Layer 2 to stop wayward traffic from crippling the network.
Reverse Path Forwarding Check (RPFC) is the chosen method of suppressing loop traffic with SPBM.
RPFC was originally designed for IP traffic at Layer 3 where it checks the source address of the packet
against the routing entry in the routing table. The source address must match the route for the port it
came in on otherwise the packet is illegitimate and therefore dropped.
With SPBM, the node matches the source B-MAC address against the ingress port to establish validity.
If the frame is not supposed to come in that port, it is immediately suppressed imposing a guaranteed
loop control. If there is no VLAN FDB entry to the source MAC address with the outgoing port as the
ingress port, the frame will be dropped.
Unicast FIB
The unicast computation runs a single Dijkstra (unlike all pair Dijkstras for multicast). SPBM produces
only one Shortest Path First (SPF) tree and the tree is rooted on the computing node.
The unicast computation generates an entry for each node in the network. The Destination Address
(DA) for that entry is the system-id of the node. In addition, if a node advertises MAC addresses other
than the system-id, each MAC address has an entry in the unicast FIB table, and the shortest path to
that MAC should be exactly the same as the path to the node.
--------------------------------------------------------------------------------------------------
Home: Total number of SPBM UNICAST FIB entries 5
Remote: Total number of SPBM UNICAST FIB entries 0
--------------------------------------------------------------------------------------------------
SPBM Restrictions
The following list identifies restrictions and limitations associated with RSTP and MSTP:
• RSTP mode does not support SPBM.
• A C-VLAN-level loop across SPBM network-to-network interface (NNI) ports cannot be detected
and needs to be resolved at the provisional level.
• SPBM NNI ports are not part of the Layer 2 VSN C-VLAN, and BPDUs are not transmitted over the
SPBM tunnel. SPBM can only guarantee loop-free topologies consisting of the NNI ports. You should
always use Simple Loop Prevention Protocol (SLPP) in an SMLT environment.
Note
Deploy SLPP on C-VLANs to detect loops created by customers in their access networks.
However, SLPP is not required on B-VLANs, and it is not supported. The B-VLAN active
topology is controlled by IS-IS that has loop mitigation and prevention capabilities built
into the protocol.
• SPB internally uses spanning tree group (STG) 63 or Multiple Spanning Tree Instance (MSTI) 62. STG
63 or MSTI 62 cannot be used by another VLAN or MSTI. For non-SPB customer networks, if you use
STG 63 or MSTI 62 in the configuration, you must delete STG 63 or MSTI 62 before you can configure
SPBM.
• You must configure SPBM B-VLANs on all devices in the same MSTP region. MSTP requires this
configuration to generate the correct digest.
• Configure the SPBM B-VLANs to use matching VLAN IDs.
Use NNI ports exclusively to transport traffic for SPB-based services and not be configured as members
of any VLANs other than SPB B-VLANs. In releases that do not support nni-mstp, when an SPBM
IS-IS interface is created on an NNI port or an MLT, MSTP is automatically disabled for MSTI-62 on the
port/MLT. However, MSTP is not automatically disabled on NNI ports for the CIST (default MSTI). In
releases that support the boot config flags nni-mstp command, the default behavior of the
MSTP NNI ports is that CIST is disabled automatically on the NNI and the NNI ports cannot be members
of any VLANs other than B-VLANs. The default boot config flags nni-mstp must be set to false (which is
the default). The following example shows the command to disable the MSTP on the NNI ports.
Switch:1(config)#interface gigabitEthernet 1/8
Switch:1(config-if)#no spanning-tree mstp
In releases that do not support nni-mstp boot configuration, you can support the coexistence of
non-SPB based services on the NNI ports, by adding NNI ports as members of VLANs, except for
B-VLANs. These other VLANs rely on the use of MSTP for Loop prevention. The network operator
must carefully consider the implications of keeping MSTP enabled on the NNI ports because any MSTP
topology changes detected on the NNI ports impacts all services and causes most dynamically learned
information on the UNI side to be flushed and relearned. This includes, but is not limited to, all customer
MAC and ARP records. This can also cause all the UNI ports on a BEB to be temporarily put into a
spanning-tree blocking state before transitioning to a forwarding state again. The net result is that
MSTP topology changes on the NNI ports adversely impact traffic for SPB-based services. Therefore,
the NNI ports be used exclusively for SPB traffic.
SPBM IS-IS
The following list identifies restrictions and limitations associated with SPBM IS-IS:
• The switch does not support IP over IS-IS as defined by RFC 1195. IS-IS protocol is only to facilitate
SPBM.
• The switch uses level 1 IS-IS. The switch does not support level 2 IS-IS. The CLI command show
isis int-l2-contl-pkts is not supported because the IEEE 802.1aq standard currently only
defines the use of one hierarchy, Level 1.
• The IS-IS standard defines wide (32bit ) metrics and narrow (8 bits) metrics. The switch supports the
wide metric.
• To run IS-IS on an MLT, add the ports to the MLT, and then enable IS-IS on the MLT.
VLACP
VLACP is generally used when a repeater or switch exists between connected switches to detect when
a connection is down even when the link LED is lit. You can enable VLACP on Ethernet ports that are
NNI, as well as Ethernet ports that are part of a NNI MLT.
SNMP Traps
On each SPBM peer, if you configure the SPBM B-VLANs to use different VLAN IDs, for example, VLAN
10 and 20 on one switch, and VLAN 30 and 40 on the second, the system does not generate a trap
message to alert of the mismatch because the two switches cannot receive control packets from one
another. Configure the SPBM B-VLANs to use matching VLAN IDs.
System MTU
Do not change the system MTU to less than the default value of 1950 bytes. The system MTU must be
1950 or jumbo because of the header size increase when transmitting packets over the SPBM cloud.
IP multicast over Fabric Connect cannot connect to existing Protocol Independent Multicast (PIM)
networks that connect to SPB originated streams or that add PIM network streams into the SPB
network. SPB-PIM Gateway (SPB-PIM GW), however, provides multicast interdomain communication
between an SPB network and a PIM network. SPB-PIM GW accomplishes this interdomain
communication across a special Gateway VLAN. The Gateway VLAN communicates with the PIM
network through the PIM protocol messaging and translates the PIM network requirements into SPB
language, and vice versa. For more information about SPB-PIM GW, see SPB-PIM Gateway configuration
on page 3187.
Other
SPBM supports Network Load Balancing (NLB) Unicast and Multicast modes.
NLB is a clustering technology available with Microsoft Windows 2000, Microsoft Windows 2003,
Microsoft Windows 2008, and Microsoft Windows 2012 server family of operating systems. You can
use NLB to share the workload among multiple clustering servers. NLB uses a distributed algorithm to
load balance TCP/IP network traffic across a number of hosts, enhancing the scalability and availability
of mission critical, IP based services, such as web, VPN, streaming media, and firewalls. NLB also
provides high availability by detecting host failures and automatically redistributing traffic to remaining
operational hosts.
SPBM Script
You can use a CLI script to quickly configure the SPB and IS-IS infrastructure to enable Fabric Connect
on a switch. You can use the SPB script, rather than manually configure the minimum SPBM and IS-IS
parameters.
You can use the command run spbm to quickly configure the following:
• Configure the SPB Ethertype.
• Create an SPB instance.
• Create an SPBM backbone VLAN and associate it to the SPB instance.
• Create an SPBM secondary backbone VLAN and associate it to the SPB instance.
• Add an SPB nickname.
• Create a manual area.
• Enable IS-IS on one of the switch interfaces.
• Enable IS-IS globally.
• Configure the IS-IS system name.
• Configure the IS-IS system ID.
• Configure SPBM port and MLT interfaces.
• Clean up any SPBM configuration.
The following table displays the default values applied if you use the run spbm command. The SPB
script creates some of the default values based on the MAC address of the switch, including the
nickname and System ID value.
Note
The SPB script only creates the SPBM instance, VLAN, or other parameters if they do not
already exist. For example, if the SPBM instance and VLAN already exist, the SPB script does
not create them. If the SPB script cannot create one of the parameters because the parameter
is already configured, the script stops and an error message displays.
The Layer 2 Video Surveillance install script pre-configures configuration parameters for video
surveillance solutions. With this script, a technician can quickly and easily deploy a typical video
surveillance network that supports up to 2000 IP cameras, a recording solution, systems management,
and viewing stations.
The install script uses best practices for converged solutions and provides redundant paths for all video
traffic. The script configures the basic deployment of Shortest Path Bridging (SPB) and uses Layer 2
VSNs to enable full multicast capabilities between all IP subnets and VLANs.
Configuration Parameters
The syntax of the install script command is run vms layer-2 switch <5-99> where the switch
value (between 5 and 99) is a user-defined variable. The install script uses this switch value to configure
the camera IP zone for the switch and to specify a unique SPB nickname, system-id, and IP source value.
The install script configures the following major parameters and populates the xx with the user-defined
variable for the switch value:
• IP Loopback Interface Address: 192.168.0.xx (Management IP address on the switch.)
• IP-Source Address: 192.168.0.xx (IS-IS source IP address for the switch.)
• VLAN ID: 200 (On hardware platforms that only have NNI links, there is no need to create a
surveillance VLAN.)
• System ID: 0011.0011.07xx (SPB system-id of switch)
• Nickname: 0.07.xx (SPB Nickname for switch)
• SPB Manual Area ID: 49.0001
• Backbone VLAN IDs: 4051 and 4052 (with 4051 as Primary)
• SPB Mulitcast: enabled
• SFP and SFP+ ports: (Define all ports as NNI links.)
Note
The install script does not configure DHCP Relay parameters.
The install script requires that the switch be in the factory default state. The script prompts you to
confirm this, but it does not check if you did so. The script continues running commands even if some
of the commands in the script fail, and the failure of script commands is not evident by the script
completion message.
The syntax of the install script command is: run vms layer-2 switch <5-99> [syntax]. The
optional syntax parameter prints out all the commands run by the script onto the console. If you do
not use the syntax parameter, you will not see an error message when a command fails to run.
Important
Use the syntax parameter to display all the commands run by the script and show any
errors that the script encounters. This is the only way to ensure that all configurations are
configured without error.
Configuration Filename
Upon successful completion of the install script, the switch configuration is saved with a filename based
on the switch value used when the script was run. The switch primary boot config file flags are updated
with the new filename.
For example, if you use 6 as the switch value, the command run vms layer–2 switch 6 results in
a switch configuration filename of vms-layer2–switch-6.cfg.
If you run the install script with the syntax parameter, you will see the pre-install command output:
• save config file pre_vms_layer2_install.cfg
• Save config to file /intflash/pre_vms_layer2_install.cfg successful.
The IS-IS metric type can also be set using the base redistribute command without using the route-
map.
SPB Ethertype
The switch aligns the SPB ethertype to BCB's locally configured SPB ethertype. The BCBs mark the
BTAG Ethertype of a transit MAC-in-MAC packet to match its locally configured value when it exits on a
different network-to-network interface (NNI) port, even if the BTAG Ethertype on the incoming packet
(CFM or SPB) does not match its configured value.
Note
ISIS Hello packets are always marked with 0x8100 ethertype, and do not change according to
the BCB's locally configured values.
If you use Equal Cost Multipath (ECMP) in a Shortest Path Bridging (SPB) scenario, the Intermediate
System-to-Intermediate System (IS-IS) protocol sends multiple routes with the same destination to the
routing manager. IS-IS can add up to eight equal cost routes with the same destination to the routing
table and the router uses one route for traffic forwarding based on load management. Use the ECMP
Pathlist feature to control how many equal-cost paths to add to the routing manager for the same
destination.
Note
Different hardware platforms can support a different number of ECMP paths. For more
information about the maximum number of ECMP paths supported on the switch, see the
scaling information in VOSS Release Notes.
For information about how to configure ECMP Pathlist, see Configure ECMP on page 1859 and
Configure ECMP on page 1886.
FAN Transit
Fabric Area Network (FAN) transit refers to the ability of a switch to forward traffic between SPB nodes
participating in a FAN. The switch is neither a part of the FAN nor does it originate or sink FAN traffic. It
only forwards the traffic between the FAN end-points.
For information on how to verify the functioning of a transit switch within a FAN, see Troubleshooting
FAN Transit on page 3694.
Dynamic Nickname Assignment is a service that provides unique nicknames to compatible switches
across a Fabric Area Network (FAN).
You can configure a node in a FAN as a nickname server. The nickname server cannot be started until
you configure it with a static nickname. As a best practice, configure at least two nickname servers in a
FAN to provide redundancy.
Note
Configure the nickname server with a static nickname that is outside any configured dynamic
nickname server range in the network, or you can configure the nickname server with a static
nickname from the first 10 values of the configured dynamic nickname server range in the
network.
The nickname server interrogates FAN nodes that have been assigned a dynamic nickname to avoid
nickname duplication.
A client joining the dynamic FAN in factory default mode initially does not have a nickname, and issues
a broadcast soliciting a valid nickname assignment. The nickname server receives the request and
responds with a nickname assignment offer. The client then explicitly requests the particular nickname
offered and the nickname server sends an acknowledgment.
The client maintains the nickname in persistent memory regardless of whether the active nickname
server is the same server that originally provided the nickname. The client generates a trap and notifies
the user if it is unable to receive a nickname from the server. When IS-IS starts, it issues a trap if a client
does not have a nickname and clears the trap when the client receives a nickname from the nickname
server.
A client rebooting or reconnecting to the FAN requests the same nickname assignment it had before
reboot. If the requested nickname is within the nickname server’s configured range of nicknames and
is still available, the server acknowledges the nickname. If the requested nickname is outside of the
nickname server’s configured range or if the nickname has been assigned to another client, the request
is denied by the nickname server and the client must request a new nickname.
You can use static nickname assignment and Dynamic Nickname Assignment in the same FAN.
You can configure Dynamic Nickname Assignment using a range prefix that can use a range from
0.00.00 to F.FF.FF. This method provides 256 groups that cover the range of 0.00.00 to F.FF.FF.
Note
You can configure the nickname server with a static nickname from the first 10 values of the
configured dynamic nickname server range in the network.
Do not use nicknames from the dynamic nickname range when you assign nicknames statically to
non-server nodes. However, if there are existing nodes in the network with static nicknames in the
dynamic nickname range, it is not a requirement to change their nickname assignment. If a node is
assigned a dynamic nickname that is being used in the network, duplicate nickname protection is
initiated. If the node that has the dynamic nickname loses the nickname election, it requests a different
nickname from the nickname server. If a node with a static nickname loses the nickname election, IS-IS
is disabled on that node and you must manually re-assign the nickname and re-enable IS-IS.
You can configure nicknames from a dynamic range if the nickname server is not started.
Note
You must disable Dynamic Nickname Assignment before you can change the nickname prefix.
Debugging
A node must be a member of a FAN to host Dynamic Nickname Assignment applications. FAN
connectivity enables the exchange of information between nickname clients and servers, such as
nickname requests or nickname assignments. You can use Connectivity Fault Management (CFM) to
debug connectivity issues or isolate faults. For more information about CFM, see Connectivity Fault
Management on page 3506.
The MSTP-Fabric Connect Multi Homing feature allows MSTP or RSTP network to be multi-homed into a
Fabric Connect network, providing a loop-free topology. MSTP-Fabric Connect Multi Homing enables an
MSTP network to be multihomed into the SPB Fabric network through single node-to-multiple nodes or
multiple nodes-to-multiple nodes.
Important
You must enable MSTP-Fabric Connect Multi Homing before you establish multihoming with
an MSTP network.
MSTP-Fabric Connect Multi Homing uses I-SID 16777003. The switch creates this I-SID automatically
and it cannot be modified.
Fabric Extend
Some hardware platforms support Fabric Extend natively. You can use these switches in a main office of
a hub and spoke deployment or to connect one Data Center to another Data Center.
The VSP 4450 Series also supports Fabric Extend, but the switch must be connected to an Open
Networking Adapter (ONA) because the VSP 4450 Series does not support Fabric Extend natively. The
ONA enables the VSP 4450 Series to support Fabric Extend. The VSP 4450 Series uses the ONA to
encapsulate Fabric Connect traffic. For example, you can use the VSP 4450 Series in a branch office of a
hub and spoke deployment.
Note
In a Layer 2 core Fabric Extend solution, the VSP 4450 Series does not require an
ONA because the tunnels are point-to-point VLAN connections, not VXLAN connections.
Therefore, there is no need for an ONA to encapsulate a VXLAN header to SPB packets.
Fabric Extend enables Enterprises to extend the Fabric Connect technology over Layer 2 or Layer 3 core
networks. The logical IS-IS interface is the mechanism that enables Fabric Extend to connect SPB fabric
nodes. Logical IS-IS interfaces create virtual tunnels and encapsulate SPB traffic by adding a VXLAN
header to SPB packets.
The following figure illustrates two Fabric Connect “islands” separated by a third-party core IP network.
The IP network could be third-party equipment in an enterprise or a service provider’s infrastructure
such as an MPLS VPN service.
Figure 60: Single Fabric Connect Domain realized using Fabric Extend
The following figure shows a Layer 2 core network where Fabric Extend can transport SPBM packets
over a Layer 2 MPLS VPLS or PBB E-LINE service by creating layer 3 tunnels over a Layer 2 third party
network.
The Fabric Extend feature enables you to extend the Fabric Connect model over Layer 2 and Layer 3
core networks. The interconnection of Fabric Connect deployments can be over any IP-based network
whether it’s a campus backbone, Data Center, or a MAN/WAN IP MPLS network.
Note
In a Layer 2 core Fabric Extend solution, the VSP 4450 Series does not require an ONA
because the tunnels are point-to-point VLAN connections, not VXLAN. Therefore, there is no
need for an ONA to encapsulate a VXLAN header to SPB packets.
The VSP 4450 Series manages the ONA in the following ways:
• Controls and provisions the ONA.
• If PoE capable, the VSP 4450 Series supplies power to the ONA. (The ONA also supports an optional
wall unit power adapter.)
• Transports traffic to and from the ONA over 1 GbE ports and sets QoS appropriately to the ONA’s.
◦ The ONA 1101GT can support basic Fabric Extend at line rate 1G traffic from the VSP 4450 Series
at 1500 byte packet sizes.
◦ Oversubscription of the ONA’s packet engine may result if packets are smaller than 1500 bytes
or if you enable enhanced features such as fragmentation and reassembly of packets. This results
in packet drop starting with lower QoS queued packets consistent with PCP and DSCP markings
on packets received from the VSP 4450 Series. For more details on the ONA 1101GT forwarding
performance, see ONA Considerations on page 973.
The ONA can operate in different modes. Fabric Extend is Operational Mode 1. To enable Fabric Extend,
use the ONA’s Manual Configuration menu to change the Operational Mode parameter to 1. For more
information, refer to the manual that ships with the ONA.
In the following figure, the VSP 8200 Series is in a Fabric Connect network and is configured with Fabric
Extend (FE). The VSP 4450 Series is also in a Fabric Connect network and is configured with SPB. The
VSP 8200 Series and the VSP 4450 Series use industry-standard VXLAN tunnels to create a flow for FE
traffic between the VSP 8200 Series and the ONA attached to the VSP 4450 Series.
Note
To interoperate with the VSP 8200 Series, you must set the MTU on the VSP 4450
Series/ONA combination to 1950 bytes.
• The VSP 8200 Series decapsulates the packet by removing the VXLAN header and the MAC-in-MAC
header, and then forwards it to User A.
Note
Connect the ONA as shown with two ports to the VSP 4450 Series. You cannot connect
the ONA directly to the IP core infrastructure.
Logical IS-IS interfaces perform the following functions depending on the type of core network:
• In a Layer 3 core network, logical IS-IS interfaces create virtual IP tunnels and encapsulate SPB traffic
by adding a Virtual Extensible LAN (VXLAN) header to SPB packets.
• In a Layer 2 core network, logical IS-IS interfaces do not use VXLAN. The tunnels are point-to-point
VLAN connections so there is no need to encapsulate a VXLAN header to SPB packets. The logical
IS-IS interfaces translate the Backbone VLAN IDs (B-VIDs) and maps them to each of the branch
provider VIDs.
Fabric Extend uses virtual tunnels in Layer 3 core solutions to connect SPB fabric nodes. These nodes
can stretch over IP routed campus networks, service provider Layer 2 core networks, or service provider
Layer 3 core networks such as IP MPLS VPNs.
Note
VLACP cannot be used on logical IS-IS interface connections.
If the service provider has a Layer 2 core network, note the following points:
• The syntax for configuring a logical interface is:
If the service provider has a Layer 3 core network, note the following points:
• The syntax for configuring a logical interface is:
• Port and VlanId are not needed to create a logical IS-IS interface, instead they can be retrieved from
the next hop of destination IP address.
• IS-IS control packets (IS-IS hello, LSDB, CSNP, PSNP) are encapsulated with a VXLAN header and
sent over a logical IS-IS interface.
IPsec Compression
IPsec compression reduces the size of the IP datagram to improve the communication performance
between hosts connected behind Backbone Edge Bridges (BEB).
Note
This feature is supported on XA1400 Series, VSP 4900 Series, and VSP 7400 Series. VSP
4900 Series and VSP 7400 Series switches provide that support using Fabric IPsec Gateway.
Tip
As a best practice, use IPsec compression only for Fabric Extend tunnels where latency is
greater than 70ms.
The following list identifies how you can implement IPsec compression:
• You can configure IPsec compression for each logical-interface.
• You can configure multiple IPsec Fabric Extend (FE) adjacencies with or without compression
simultaneously.
• You must enable IPsec compression on both BEBs to use IPsec compression for an FE adjacency.
• You cannot configure IPsec compression if fragmentation before encryption is already enabled.
• You can change the IPsec compression configuration only if IPsec is disabled.
Note
If you downgrade to a release that does not support this feature, you must disable the feature
and save the configuration before you downgrade. You must have a compatible configuration
file if you downgrade to an earlier release.
The best practice is to enable fragmentation before encryption only for an IPsec adjacency over a WAN.
Configure IPsec fragmentation of the packets to occur before encryption and IPsec encapsulation.
Packets are fragmented based on the tunnel maximum transmission unit (MTU) without the IPsec
header so that the final packet does not exceed the tunnel MTU. The MTU value is a per tunnel
configuration, which means packet fragmentation occurs per tunnel. For a tunnel with this functionality
enabled, packets that egress the specific NNI port are encapsulating security payload (ESP) packets
only.
The following list identifies how you can implement IPsec fragmentation before encryption:
• You can configure IPsec fragmentation before encryption for each logical-interface.
• You must configure IPsec over Fabric Extend in IPsec decoupled mode, which means the IPsec
source and destination IP addresses are different than the Fabric Extend addresses.
• You cannot configure IPsec compression if fragmentation before encryption is already enabled on
the logical interface.
A device is in IPsec decoupled mode when IPsec and Fabric Extend (FE) termination takes place on
two different IP addresses. A device is in IPsec coupled mode when IPsec and Fabric Extend (FE)
termination takes place on the same IP address.
The XA1400 Series devices, which use VOSS for Fabric Extend over IPsec, support both IPsec
decoupled and coupled modes. The VSP 4900 Series and VSP 7400 Series devices, which use Fabric
IPsec Gateway for Fabric Extend over IPsec, support IPsec in decoupled mode only. You must configure
the IPsec tunnel in decoupled mode to enable IPsec termination in the Fabric IPsec Gateway VM. For
more information about how to configure IPsec tunnels on the VM, see Configure IPsec Tunnels on
Fabric IPsec Gateway VM on page 891.
When a client initiates a connection with a server, it uses TCP SYN packets to negotiate the MSS to
avoid fragmentation. The client and server use the outgoing maximum transmission unit (MTU) to
advertise the MSS.
If a tunnel exists between the client and server, the encapsulation consumes more room in the outer IP
header. As a result, the router that performs the tunnel encapsulation fragments the packet to fit over
the tunnel. Adjust the MSS to modify the value in the TCP SYN packet so the client and server negotiate
a lower number and leave headroom for tunnel encapsulation.
Important
If you enable this functionality and port mirroring simultaneously, the switch does not mirror
CP-generated packets.
TCP MSS adjustment applies unidirectionally when a packet is forwarded from a UNI interface to any
other interface. To use this functionality, you must enable TCP MSS adjustment on both sides of the FE
tunnel.
TCP MSS adjustment applies unidirectionally when a packet is forwarded into an FE tunnel. To use this
functionality, you must enable TCP MSS adjustment on both sides of the FE tunnel.
The MSS adjustment functionality only activates when at least one Fabric Extend (FE) tunnel with a
MTU less than or equal to 1500 is configured. The functionality is inactive if no FE tunnels with MTU
less than or equal to 1500 are configured. Deleting the last tunnel with MTU less than or equal to 1500
results in the functionality becoming inactive.
The switch can auto-derive the MSS value based of the tunnel MTUs or you can manually configure the
MSS value. The formula for the auto-derived value is
min(Tunnels MTUs) - 200B (size for VXLAN + MIM + IPSEC + IP+TCP headers)
If you configure multiple FE tunnels with MTU less than or equal to 1500, then the switch uses
the lowest of all tunnel MTUs to auto-derive the TCP MSS adjust value. The same value applies
bidirectionally, to all TCP syn packets that transmit NNI to UNI and UNI to NNI.
Tip
As a best practice, disable this enhancement on the head-end side and enable only at the
branch side.
The switch does not support different TCP adjust MSS values if you configure different FE tunnel MTUs
on different tunnels.
If you configure FE tunnels and regular NNIs on the same adjacency, then the TCP adjust MSS value
applies to all TCP packets traversing across regular NNIs and FE tunnels.
The most common Fabric Extend deployment is a hub and spoke topology that connects the Main
office over a service provider’s MPLS IP VPN to multiple Branch offices. The following figure illustrates
how the hub device on the main site establishes virtual tunnels with all of the spoke devices in the same
domain. In this scenario, the traffic flows are bidirectional: from hub-to-spoke and spoke-to-hub.
Branch Sites
XA1440
Site 1
Fabric Connect
192.168.1.1/24
XA1480
Main/Hub Site
192.168.2.1/24
MPLS Router
192.168.0.1/24
Site 2
WAN MPLS Router
MPLS Router
VSP 4900
192.168.4.1/24
Site 4
Note
If Fabric Extend with IPsec or fragmentation and reassembly is a requirement, depending on
your requirements, you can use a mix of VSP 7400 Series, VSP 4900 Series, or 5720 Series
with Fabric IPsec Gateway and XA1400 Series at the main and branch sites.
Where the preceding hub and spoke deployment is over a Layer 3 MPLS IP-VPN, the following VPLS
deployment is over a Layer 2 segment. This type of hub and spoke deployment extends the fabric
over an MPLS Virtual Private LAN Service (VPLS) or Provider Backbone Bridging (PBB) Ethernet LAN
(E-LINE) network. In this scenario, the SPB nodes are connected with a point-to-point Ethernet link.
Branch Sites
XA1440
Site 1
Fabric Connect
192.168.1.1/24
XA1480
Main/Hub Site
192.168.2.1/24
MPLS Router
192.168.0.1/24
Site 2
MPLS VPLS MPLS Router
VSP 7400 or
PBB E-LAN 192.168.3.1/24 5720
MPLS Router
MPLS Router
VSP 4900
192.168.4.1/24
Site 4
Some customers do not want to migrate their infrastructures to SPB immediately. They want to keep
their existing IP core network and deploy SPB on the edge. In this scenario, Fabric Extend supports a
fabric overlay on top of the existing campus infrastructure.
The following figure illustrates how this deployment supports any-to-any traffic with full-mesh tunnels
between fabric nodes. The fabric nodes serve as campus switches, support routing into the IP
infrastructure, and provide an overlay fabric that enables all fabric benefits.
The following hub and spoke deployment over an MPLS Pseudowire or Ethernet Virtual Private Line
(E-Line) uses service provider VLAN tunnels. Because you can map many (VID, port/mlt list) sets to an
I-SID, this gives Service Providers the flexibility to let more than one customer use the same VLAN with
different I-SIDs.
Note
The VSP 4450 Series switches in this type of deployment do not require an ONA because the
tunnels are point-to-point VLAN connections, not VXLAN. Therefore, there is no need for an
ONA to encapsulate a VXLAN header to SPB packets.
The following figure illustrates how two dedicated Backbone VLAN IDs (B-VIDs) are mapped from
the hub to spoke sites. Logical IS-IS interfaces translate the B-VIDs and maps them to each of the
branch provider VIDs.
For a detailed configuration example showing logical interfaces using B-VID translation to two different
logical VLAN IDs, see Shortest Path Bridging (802.1aq) Technical Configuration Guide.
The Fabric Extend over IPsec hub and remote deployment uses service provider VLAN tunnels and
IPsec to provide permanent connections between locations. It is best used for site-to-site connections,
such as connecting remote sites to the core network. Because IPsec works at the network layer, this
type of configuration is not limited or dedicated to a particular application.
Note
FE over IPsec connectivity requires an XA1400 Series device on each end of the FE tunnel.
The following figure illustrates how the FE over IPsec deployment supports the site-to-site connections.
It shows a Layer 3 core network where Fabric Extend uses IP tunneling by adding a VXLAN header to
the SPBM packets. This can be over a third party IPv4 transport network such as MPLS IP-VPN or in a
Campus IP backbone.
You can configure each ISIS logical interface with a unique MTU value for each FE tunnel in the
VXLAN interface to improve fragmentation and reassembly in WAN connectivity over MPLS IP VPN and
internet-based connections through a NAT router.
Fragmentation and reassembly is based on the MTU value configured for each FE tunnel. You can
change the MTU configuration at any time for each FE tunnel. The supported MTU range is 750 to
9000, and the default MTU value is 1950.
Note
FE Tunnel MTU is an optional configuration.
For example, if you configure an FE tunnel with an MTU of 900, and a packet size of 1950 is received
on UNI with the destination on the FE tunnel, the system fragments the original 1950-sized packet into
the three packets (900, 900, 150) with a packet size equal to or less than 900. The system transmits the
three fragmented packets over the ISIS logical interface of the FE tunnel. After the packets are received
at the destination, the system performs the packet reassembly (900, 900, 150) into the 1950-sized
packet.
Consider the following interactions between route MTU and FE Tunnel MTU configurations:
• If route MTU is not configured, the MTU value for each FE tunnel is applicable to ingress and egress
traffic on the tunnel.
• If route MTU is configured, the MTU value for each FE tunnel is applicable for ingress traffic on the
tunnel. The route MTU value applies to all egress traffic.
Note
System MTU maximum is a separate configuration. You can configure a system maximum
MTU size of 1522, 1950, or 9022. The default value is 1950.
To deploy the XA1400 Series in an environment that includes more than one provider connection with
IPsec, you require a source IP address for each IPsec tunnel.
When you connect to a broadband provider such as cable modem, DSL, or LTE, the only routable IP
interface is the one that is assigned by the provider (either through DHCP or statically). As a result, the
Internet can only route the assigned subnet. You cannot deploy a routing protocol between the branch
device and the provider modem.
When you connect two different providers to a branch device, each provider uses a different subnet.
The XA1400 Series must apply a different source IP address for each IPsec tunnel.
The following options are available to configure a specific source IP address for each IPsec tunnel:
• Statically configure a source IP address for each IPsec tunnel:
◦ You must configure a VLAN, brouter, or CLIP IP address for the IPsec tunnel to use; this address
must be in the same VRF as the tunnel.
◦ You cannot delete the VLAN, brouter, or CLIP IP address if it is used as the static IPsec source IP.
◦ You must disable IPsec on the logical interface before you configure an IPsec source IP.
◦ The specified IP must be different than the global IPsec IP source address.
◦ The specified IP can be the same as the management IP if you do not configure other logical
IPsec interfaces with a source IP type of DHCP.
◦ Multiple logical interfaces can use the same statically configured IPsec source IP.
• Dynamically obtain the source IP address for each IPsec tunnel from the management VLAN IP
address assigned through DHCP:
◦ You must enable DHCP on the management VLAN.
◦ The coexistence mode, where both the management IP stack and the routing IP stack share the
same IP address and default routes, must be present. For more information, see VLAN on page
78.
◦ After you run the ipsec tunnel-source-address type dhcp command, the system
imports the IP and VRF used by the management VLAN as the IPsec source IP on the logical
interface.
◦ The VRF can be different than the tunnel VRF.
◦ You cannot delete the VLAN or modify its IP address if the IP address is used as the IPsec source
IP.
◦ The IPsec source IP type DHCP cannot be the same as the global IPsec source IP address or
statically configured IP address.
◦ After the system imports the DHCP IP address for use by IPsec, you can modify the management
VLAN. For example, you can disable DHCP on the management VLAN, change the management
VLAN ID, or delete the management VLAN.
◦ After you save the configuration, the IP and VRF that the system imported for use by
IPsec is saved to the configuration file using ipsec tunnel-source-ip type dhcp
<IP_address> vrf <vrf_name>. After you reboot the switch, it loads the information
from the configuration file and the IPsec tunnel IP address is no longer imported from the
management VLAN.
Note
If your Fabric Extend configuration includes a VSP 4450 Series/ONA combination, see ONA
Considerations on page 973 for more information.
Tunnel Source IP
Fabric Extend supports the tunnel source IP address using a brouter port interface, a CLIP IP, or a VLAN
IP.
• Configure route-maps to not permit redistribution of the local route used as the tunnel source
address (ip-tunnel-source-address command).
• Configure an accept policy to deny IS-IS routes that overlap with the destination tunnel IP address.
With IS-IS interface default values, tunnel failure detection can take up to 27 seconds. You can reduce
the IS-IS interface hello timers to speed up logical link failure detection, but be careful to avoid link
flapping due to values that are too low.
Note
If the number of IS-IS interfaces on a node is greater than 100, it is a good practice to set the
hello timer not lower than 5 seconds.
IP filters configured to match IP header fields in the headers of VXLAN encapsulated packets, work
only when the switch acts as a transit router and does not participate in the initiation or termination of
VXLAN traffic.
VLACP
CFM CCM
CFM Continuity Check Messages are not supported over logical IS-IS interfaces.
If CFM packets transit over a layer 3 tunnel (that is the CFM packets ingress a Fabric Extend layer 3
core tunnel and egress through another layer 3 core tunnel), the transit SPBM nodes do not display as
intermediate hops in the output for CFM l2 traceroute and l2 tracemroute.
This is because the CFM packets are encapsulated in the outer layer 3 header as part of VXLAN
encapsulation, and the transit SPBM nodes cannot look into the payload of the VXLAN packet and send
a copy of the CFM packet to local CPU for processing.
CFM L2 Ping
CFM Layer 2 ping to MCoSPB source mac is not supported and can fail if they are reachable via Fabric
Extend tunnel.
MACsec
Switch-based MAC Security (MACsec) encryption is Layer 2 so it cannot be used with Fabric Extend IP,
which is Layer 3.
Service provider Layer 2 connections must be at least 1544 bytes. In this type of deployment the tunnels
are point-to-point VLAN connections that do not require VXLAN encapsulation. The default MTU value
is 1950.
Layer 2 core and Layer 3 core logical IS-IS interfaces are not supported on the same switch at the same
time.
If a tunnel was initially UP between a VSP 4450 Series and another switch with MTU 1950 and then the
VSP 4450 Series was later configured for fragmentation, the following behavior occurs:
• If the ONA MTU is less than 1594, the tunnel to the other switch will go DOWN.
• If the ONA MTU is 1594 and above, the tunnel will stay UP, but any fragmented packets received
from the VSP 4450 Series will be lost at the other switch site.
The ONA 1101GT provides for the IP MTU of the Network port to be reduced from the default setting
of 1950 bytes to 1500 bytes or lower. The MTU reduction feature with Fabric Extend is provided to
facilitate the connection of two Fabric Connect networks over an IP network with any MTU without
requiring end stations on the networks to reduce their MTU. The ONA 1101GT with the IP MTU of the
network port set to 1500 bytes will fragment Fabric Extend VXLAN tunnel packets exceeding 1500
bytes. The ONA 1101GT will also reassemble fragmented Fabric Extend VXLAN tunnel packets at the
tunnel termination point. The IP fragmentation and reassembly RFC 791 describes the procedure for
IP fragmentation, and transmission and reassembly of datagrams and RFC4963 and RFC4459 detail
limitations and network design considerations when using fragmentation to avoid out of order packets
and performance degradation.
• ECMP and link aggregation algorithms in the IP core should be configured not to use UDP port
hashing that could send IP fragments after the first fragment on different paths causing out of order
packets. This is due to the fact that subsequent fragments do not have UDP port information.
Important
Different MTU sizes on each end can result in traffic drops.
Layer 2 logical IS-IS interfaces are created using VLANs. Different Layer 2 network Service Providers can
share the same VLAN as long as they use different ports or MLT IDs.
Note
Exception: Layer 2 logical IS-IS interfaces are not supported on XA1400 Series.
Service provider IP connections must be at least 1594 bytes to establish IS-IS adjacency over FE tunnels.
The 1594 bytes includes the actual maximum frame size with MAC-in-MAC and VXLAN headers. If this
required MTU size is not available, a log message reports that the IS-IS adjacency was not established.
MTU cannot be auto-discovered over an IP tunnel so the tunnel MTU will not be automatically set. The
default MTU value is 1950.
If the maximum MTU size has to be fewer than 1594 bytes, then you require fragmentation
and reassembly of packets. The XA1400 Series and VSP 4450 Series/ONA combination supports
fragmentation and reassembly, but you must have either an XA1400 Series or VSP 4450 Series with
ONAs at BOTH ends of the IP WAN connection.
IP Shortcuts
Important
If you enable IP Shortcuts and you are using the GRT as the tunnel source VRF, you must
configure an IS-IS accept policy or exclude route-map to ensure that tunnel destination IP
addresses are not learned through IS-IS.
If you enable IP Shortcuts and you are using a VRF as the tunnel source VRF, this is not an
issue.
• The switch requires a single next hop (default gateway) for all tunnels.
◦ Over a Layer 3 core network, on a given outgoing port or MLT, there is no issue as the one router
next hop can support multiple VXLAN tunnels to one or more remote sites.
◦ For Layer 3 tunneling over a Layer 2 core, the switch without any specific configuration supports
only one Fabric Extend tunnel to one remote site. The workaround for this single next hop issue is
to create an additional VRF, VLAN, and loopback interface.
Note
This limitation does not apply to VSP 4450 Series.
• You cannot establish a Virtual IST (vIST) session over a logical IS-IS interface. IST hellos cannot be
processed or sent over a logical IS-IS interface if that is the only interface to reach BEBs in vIST pairs.
Assume that vIST is established over a regular network-to-network interface (NNI) and the NNI goes
down. If the vIST pairs are reachable through a logical IS-IS interface, then the vIST session goes
down in up to 240 seconds (based on the IST hold down timer). During this time, the error message
IST packets cannot be sent over Fabric Extend tunnels, vist session
may go down is logged.
Caution
Expect traffic loss when the vIST session is down or when the error message is being
logged.
Port mirroring resources are limited to four ports simultaneously (where each mirroring direction counts
as one). For example, if two mirroring ports are designated to mirror both ingress and egress traffic
then all four mirroring ports are consumed.
Port mirroring shares these four resources with other applications such as port mirroring RSPAN,
Fabric Extend, Application Telemetry, IPFIX, and ACL with mirror action. Each one of these applications
consumes at least one port mirroring resource. (port mirroring RSPAN consumes two if you configure
both Ingress and Egress modes.)
Important
To enable any one of the preceding applications, you must have at least one free mirroring
resource. If all four port mirroring resources are already in use, the switch displays a
Resource not available error message when you try to enable the application.
The VSP 8600 Series uses the four reserved resources for port mirroring and ACLs that have
a mirroring action. For the other applications, this restriction does not apply because the
VSP 8600 Series uses mirroring resources that do not come out of the four reserved port
mirroring resources.
• Fabric Extend over IPsec is only supported on XA1400 Series devices or on VSP 4900 Series and
VSP 7400 Series using Fabric IPsec Gateway.
• Only pre-shared authentication key IPsec parameters are user configurable. Other, third-party
solutions are not configurable.
• IKEv2 protocol key exchange only.
• IPsec support is only added for Fabric Extend tunnels.
• IPsec is not supported for regular Layer 3 routed packets.
ONA Considerations
Review the following restrictions, limitations, and behavioral characteristics that are associated with the
ONA.
The following are Network port mandatory requirements for configuring Fabric Extend on the VSP
4450 Series:
• The ONA Network port should not be part of any static/LACP MLT configurations.
• The ONA Network port should be part of a VLAN that belongs to the GRT.
• The ONA Network port that is configured on the switch cannot be tagged. It must be an Access
port.
The following are Device port mandatory requirements for configuring Fabric Extend on the VSP 4450
Series:
• The ONA Device port should not be part of any static/LACP MLT, VLAN, or brouter configurations.
• The ONA Device port should not be configured as an access port. It is automatically configured as a
trunk port when the ip-tunnel-source-address command is configured.
• The ONA Device port has to be connected directly to the VSP 4450 Series node where the FE
tunnels originate.
An ONA is required for Fabric Extend Layer 3 core solutions. An ONA is not required in Layer 2 core
solutions because the tunnels are point-to-point VLAN connections, not VXLAN. Therefore, there is no
need for an ONA to encapsulate a VXLAN header to SPB packets.
DHCP server
ONAs require access to a local DHCP server to automatically configure IP addresses. Configure an
untagged ONA management VLAN to where the ONA is connected with its network side interface. If
DHCP is used, a DHCP relay configuration needs to be added to the ONA network side port in order for
the ONA to get an IP address assigned from a DHCP server. Alternatively, you can manually configure its
IP address and other required settings with the ONA Manual Configuration menu.
Before the ONA can get an IP tunnel source address from the VSP 4450 Series, the following steps must
be taken:
• Connect the Device and Network ports on the ONA to the VSP 4450 Series.
• Make sure that the ONA is connected to a DHCP server. If a DHCP server is unavailable, statically
configure an IP tunnel source address on the ONA.
• Create a Management VLAN on the ONA that includes the Network port.
• Designate the Device port for the IP tunnel source address in the configuration file.
The syntax for the IP tunnel source address is: ip-tunnel-source-address <A.B.C.D> port
<slot/port> [mtu <mtu_value>] [vrf WORD<1–16>].
If you configure an IP tunnel source address in a VRF instead of a GRT, then the VSP 4450 Series
automatically routes VXLAN packets from the ONA network port into the VRF configured as part of the
IP tunnel source. Although the ONA network port is a part of the management VLAN that is in the GRT,
for VXLAN encapsulated packets, the VSP 4450 Series automatically routes the packets into the VRF
in which the tunnel source IP address is configured. This is done using a filter rule that the VSP 4450
Series software automatically sets up that filters based on whether the incoming port is equal to the
ONA network port and the packet has a VXLAN header.
The Management VLAN on the VSP 4450 Series that is used to communicate with the ONA must
always be in a GRT and must not be a part of the IP tunnel source VRF.
ONA Gateway
The ONA gateway has to be a local IP address on the ONA Management VLAN. The ONA gateway IP
address must be the same as the local IP address of the VSP 4000 connected to the ONA.
Note
Extreme does not support ONA gateway IP addresses that are not local to the VSP 4450
Series. For example, you cannot use a VRRP IP address configured in a switch cluster for the
ONA gateway.
Maximum MTU
The ONA supports a maximum transmission unit (MTU) size of 1950 bytes. For the VSP 4450 Series to
work with a switch that supports Fabric Extend natively, the MTU size must be left at the default setting
of 1950. If the core network does not support jumbo frames, the VSP 4450 Series with ONA must be
used on all sites.
If the maximum MTU size has to be fewer than 1594 bytes, then you require fragmentation and
reassembly of packets. The VSP 4450 Series with ONAs support fragmentation and reassembly, but you
must have VSP 4450 Series switches with ONAs at BOTH ends of the IP WAN connection.
The ONA 1101GT implements both Layer 2 and Layer 3 QoS. Specifically, it implements IEEE 802.1Q
VLAN TCI PCP (Priority Code Point) and IETF IPv4 DSCP (Differentiated Services Code Point).
These are implemented in hardware with the limitation that there are four Weighted Random Early
Detection (WRED) priority queues, numbered 4 (highest) to 7 (lowest). The following tables show the
mappings from the PCP and DSCP values in the packet to the priority queue.
The hardware puts each packet in 1 of the 4 HW queues in the following order:
1. If a packet is a tagged VLAN packet, the PCP field determines the priority queue. (Ethertypes
0x8100 and 0x88a8 identify tagged VLAN packets.)
2. If the packet is an IPv4 packet, the DSCP field determines the priority queue.
3. Use the highest priority queue (4).
The HW QoS is always enabled, and the CP to priority queue mappings are static.
The following table defines the 3 bit VLAN PCP value to queue number mapping. The queues are
numbered 4..7 with 4 being the highest priority and 7 the lowest priority.
The following table defines the 6 bit IPv4 DSCP value to queue number mapping. The queues are
numbered 4..7 with 4 being the highest priority and 7 the lowest.
Fabric Attach
With Fabric Attach, network edge devices that do not support Shortest Path Bridging (SPB), MAC-in-
MAC encapsulation (802.1ah) or service identifiers (I-SIDs) can take advantage of SPB infrastructure.
To attach to an SPB network, edge devices signal an SPB-aware FA Server to automatically configure
the I-SIDs. The edge devices can then utilize existing SPB features across the fabric and leverage SPB
infrastructure capabilities without manual configuration. Fabric Attach uses the IEEE 802.1AB Logical
Link Discovery Protocol (LLDP) to signal a desire to join the SPB network.
FA uses the client-server model. An initial handshake occurs between the FA Server and the FA
Client. After the discovery phase is complete, the FA Server accepts requests (from FA Clients) to add
the C-VID (VLAN ID) and I-SID elements in the SPB network, and also automatically configures the
necessary C-VID and I-SID. The FA Server then responds with an acknowledgement of whether the
request succeeded. FA Clients can also be aggregated into a proxy device that handles the handshakes
and requests on behalf of many clients, to the server. All of the discovery handshakes and I-SID
mapping requests are then transferred using LLDP Type, Length, Value (TLV) fields.
FA leverages LLDP to discover directly connected FA peers and to exchange information associated
with FA between those peers. Based on the LLDP standard, FA information is transmitted using
organizational TLVs within LLDP Protocol Data Units (PDU).
Table 99: Fabric Attach Zero Touch Client Attachment product support
Feature Product Release introduced
Fabric Attach Zero Touch Client VSP 4450 Series VOSS 6.0
Attachment
VSP 4900 Series VOSS 8.1
VSP 7200 Series VOSS 6.0
VSP 7400 Series VOSS 8.0
VSP 8200 Series VOSS 6.0
VSP 8400 Series VOSS 6.0
VSP 8600 Series VSP 8600 6.3
XA1400 Series Not Supported
FA Zero Touch Client Attachment eases the configuration process on FA-capable devices by automating
specific configuration tasks required for FA functionality.
Note
Only the base functionality of Zero Touch Client Attachment is supported.
After you initially configure Zero Touch Client Attachment on the FA Server, the settings are exported to
receiving FA devices, where the required configuration tasks are automatically performed.
Base Zero Touch Client Attachment operation is tightly coupled with FA operation. Although you can
enable or disable Zero Touch Client Attachment separately from FA, the feature is dependant on data
that is only available during exchanges between the FA Server and FA Proxies, after a primary FA Server
has been selected. By default, base Zero Touch Client Attachment support is enabled.
Base Zero Touch Client Attachment operation, when enabled, extracts management VLAN data from
the primary FA Server advertisements and uses this data to update the in-use management VLAN
if applicable. An FA Client can also utilize FA-provided management VLAN data after the FA Proxy or
Server is discovered.
The switch supports configurable VLANs in the range of 1 to 4059. VLAN 0 is invalid. VLAN ID 1 is the
default VLAN and you cannot create or delete VLAN ID 1. VLAN IDs on the switch range from 2 to 4094
but, by default, the system reserves VLAN IDs 4060 to 4094 for internal use. On switches that support
the vrf-scaling and spbm-config-mode boot configuration flags, if you enable these flags, the
system also reserves VLAN IDs 3500 to 3998.
Note
You must enable Base Zero Touch auto-client attach and define the target Fabric Attach
client in order to initiate Zero Touch Client Attachment processing.
FA Signaling generated by an FA Proxy or Server contains management VLAN data. If the management
VLAN advertised by the primary FA Server differs from the management VLAN currently configured on
the FA Proxy, Zero Touch Client Attachment initiates the following:
• VLAN creation — If the FA Server-specified management VLAN does not exist on the FA Proxy, Zero
Touch Client Attachment creates a port-based VLAN.
• Management VLAN update — The created port-based VLAN becomes the designated management
VLAN for the FA Proxy. No operations related to the previous management VLAN, such as port
membership updates or VLAN deletion, are performed.
• Port VLAN membership update (FA Proxy/Server) — If required, Zero Touch Client Attachment
updates the port VLAN membership to ensure that the uplink port through which the primary FA
Server is accessed is a member of the management VLAN, for network accessibility.
• Port Default VLAN (PVID) update — The port-based PVID is automatically updated based on the
VLAN ID value.
• Port Default Priority update — The default 802.1p user priority for the port is updated based on the
specified port priority value of the Zero Touch client (range is 0–7).
• Zero Touch Client Specification removal — All Zero Touch client-related settings are updated based
on the FA client discovery. Deleting a Zero Touch client specification or disabling any related Zero
Touch option does not result in the immediate removal of any previously applied settings.
Note
The FA Proxy does not update the acquired management VLAN if the primary FA Server is
lost. This data is updated if the management VLAN advertised by the current primary FA
Server changes or if another primary FA Server is selected and new management VLAN data
is advertised by the server.
Management VLAN and port membership updates performed by Zero Touch are maintained
in non-volatile storage and are restored following a system reset. You must remove or update
these configuration settings if they are deemed unnecessary at a later time.
• IP Address Source Mode Update — Updates the IP address source mode of the receiving device to
DHCP-When-Needed, to initiate DHCP-based IP address acquisition if necessary.
• Automation of the FA Client Port Mode — Automates the configuration of EAP port modes based
on the type of discovered FA Clients. Applies to FA Proxy and FA Server devices. Automated
configuration is applied only to FA-enabled ports.
• ZTC Installation — Initiates ZTC installation on applicable ports on the receiving device. Applies to
FA Proxy and, in a limited manner, to FA Server devices. Automated configuration is applied only to
FA-enabled ports.
• Auto Trusted FA Client Port Mode — Initiates automatic QoS interface class update based on the
type of discovered FA clients. Applies to FA Proxy and FA Server devices. Automated configuration
is applied only to FA-enabled ports.
• Auto PVID FA Client Port Mode — Initiates automatic port PVID, port management VLAN
membership and post tagging mode based on the type of discovered FA device. Applies to FA
Proxy and FA Server devices. Automated configuration is applied only to FA-enabled ports. This
configuration is incompatible with the automatic FA Client Port Mode and ZTC Automatic attach
options.
FA Signaling
FA has defined organizational specific TLVs within the standard LLDP protocol, to exchange
messages and data amongst components of an FA solution. The FA TLVs facilitate handshaking
and authentication, processing of requests for the creation of services, and providing responses on
whether the requests succeeded. In addition, these services are deleted when the service requests are
terminated, or when the authentication criteria are no longer valid. All components that participate in
FA must be able to send, receive, and interpret the FA TLVs.
FA Components
An FA Server receives requests from FA Clients or FA Proxies to create services with specific
I-SID-to-VLAN bindings. The FA Server completes the association between conventional networks
and fabric-based virtual service networks. For more details on the operation of an FA Server, see
Fabric Attach Server on page 982.
• FA Proxy:
A network switch that supports the definition of I-SID-to-VLAN assignments and has the ability to
advertise these assignments for possible use by an FA Server. FA Proxy switches also support the
client mode for directly attached users or end devices. Typically, FA Proxies support downstream FA
Client devices, while being directly connected to an upstream FA Server device.
• FA Client:
A network attached end-point device that advertises I-SID-to-VLAN binding requests for service
creation, to an FA Proxy or an FA Server. FA Clients use FA signaling to automatically attach to fabric
services.
FA Server operation
In an FA solution, the FA Server performs the role of connecting FA Clients and FA Proxies to the SPB
fabric, with minimal configuration. As part of the discovery handshake between the FA Server and client
or proxy devices, LLDP PDUs are exchanged. Using standard LLDP, the FA Server learns neighbors,
that include the proxy and client devices. In addition, the FA Server transmits organizational-specific
element-discovery TLVs that are used by the client or proxy device to recognize its attachment to the
FA Server.
Figure 69: Fabric Attach Server connecting client or proxy devices to the Fabric network
After the initial discovery handshake is complete, the client or proxy device transmits I-SID-to-VLAN
assignment mapping requests to the FA Server to join the SPB fabric. These requests include the C-VID
(VLAN ID) and the I-SID that the client or proxy device needs to join. The FA Server then creates the
requested C-VID and I-SID on its device. It then responds with a PDU (containing the FA-specific TLV) to
indicate whether the request succeeded. The I-SID thus created is a ELAN I-SID with endpoints of type
Switched UNI. After I-SID creation, the I-SID is also advertised to the SPB network by IS-IS.
The traffic that is sent to or received from the SPB cloud is MAC-in-MAC (MiM) encapsulated. The FA
Server, being SPB-capable, decapsulates the MiM traffic. If the I-SID matches the I-SID created on behalf
of the client or proxy, the FA Server sends the traffic to that client or proxy and passes it on the C-VID
that it expects.
FA Server configuration
Configuration at the global level enables or disables FA on the entire switch. However, for attachment
of clients or proxy devices, you must also configure FA at the interface level. Interfaces can be ports
(including channelized ports), MLTs, SMLT or LACP MLTs. Enabling FA on an interface also enables
transmission of LLDP packets that contain the FA-specific TLVs.
When you disable FA on an interface, LLDP transmission automatically stops on that interface.
Caution
Disabling FA or IS-IS triggers a flush of FA information on the switch. Disabling FA at the
global level flushes all FA element-discovery information and mappings. Disabling at the
interface level flushes element-discovery information and mappings associated with that
interface.
Important
The only provisioning mode supported on the FA Server is SPB.
FA TLVs
FA leverages LLDP to discover directly connected FA peers and to exchange information associated
with FA amongst those peers. FA information is transmitted using company-specific proprietary
organizational Type, Length, Value (TLV) fields within LLDP Protocol Data Units (PDU). The following
section describes the TLVs for FA.
FA Element TLV
The FA Element TLV is used by FA elements to advertise Fabric Attach capabilities. This data forms the
basis for FA element discovery and is used in the initial handshake between the FA Server and a client
or proxy device.
Caution:
If FA communication occurs between non-secure systems, the HMAC-SHA256
Digest data must always be zero. If one system operates in secure mode and the
other operates in non-secure mode, the FA Element TLV is discarded before it is
processed by the system operating in secure mode.
Element Type Indicates the supported element type. The primary element types are the FA
Server, FA Proxy and FA Client.
An FA Server is an SPB capable device that accepts externally generated I-SID-
to-VLAN assignments. An FA Proxy is a non-SPBM device that supports I-SID-
to-VLAN assignment definitions and advertises these assignments for possible
use by an FA Server. An FA Client, also a non-SPBM device, advertises I-SID-to-
VLAN assignments to a directly connected FA Proxy or an FA Server. Both
tagged and untagged FA Client connections are supported.
The list of supported element types and their values are:
• FA Element Type - Other (1)
• FA Server (2)
• FA Proxy (3)
• FA Server No Authentication (4)
• FA Proxy No Authentication (5)
• FA Client - Wireless Access Point Type 1, which directly attaches to the SPBM
network.
• FA Client - Wireless Access Point Type 2, which is tunneled to a controller.
• FA Client - Switch (8)
• FA Client - Router (9)
• FA Client - IP Phone (10)
• FA Client - IP Camera (11)
• FA Client - IP Video (12)
• FA Client - Security Device (13)
• FA Client – Virtual Switch (14)
• FA Client – Server/Endpoint (15)
Limitations
• The FA Element TLV exists only once in an LLDP PDU and is included in all PDUs when the FA
service is enabled.
• The maximum length of the FA Element TLV is 56 bytes.
Some fields are common to both the FA Element and FA Assignment TLVs. The following fields are
specific only to the FA Assignment TLV.
Caution:
If FA communication occurs between non-secure systems, the HMAC-SHA256
Digest data must always be zero. If one system operates in secure mode and
the other operates in non-secure mode, the FA I-SID-toVLAN Assignment TLV is
discarded before it is processed by the system operating in secure mode.
Assignment status Indicates whether the FA Server accepted or rejected the I-SID-to-VLAN
mapping request from a client or proxy device.
VLAN Indicates the C-VID value advertised by the client or proxy device in the FA
I-SID-to-VLAN mapping request.
I-SID Indicates the I-SID that is advertised by a client or proxy device in the FA
I-SID-to-VLAN mapping request. This I-SID is used to create a Switched UNI
(ELAN) I-SID.
Note:
This I-SID cannot be used by IPVPN, MVPN, SPBM dynamic multicast range, or
Transparent Port UNI.
Limitations
• The FA I-SID-to-VLAN Assignment TLV is included in an LLDP PDU only if the FA Server and proxy
or client devices are directly connected to each other.
• This TLV can exist only once in an LLDP PDU.
• The size limit of this TLV is 511 bytes. This limits the maximum number of I-SID-to-VLAN assignments
supported in an LLDP PDU to 94.
• For an FA I-SID-to-VLAN Assignment TLV to be processed, the FA Element TLV must also be
present in the LLDP PDU.
FA Element Discovery
On an FA Server, FA is enabled globally by default. However, you must explicitly enable FA on a desired
port or MLT interface. After FA is enabled, the FA Server begins transmitting LLDP PDUs that contain
the element discovery TLVs. This information is received by FA Client and FA Proxy devices which in
turn also transmit their FA capabilities and settings. After the element handshake completes, the FA
Server receives I-SID-to-VLAN assignment mappings from the connected client or proxy devices.
An FA Server can communicate with multiple different FA Client and FA Proxy devices.
FA data processing
In the following FA deployment, a client device (Client 1) attaches to the FA Server (FA Server 1) using a
proxy device. Another client device (Client 2) attaches to the FA Server (FA Server 2) at the other edge
of the network. The following section describes how data is processed when data traffic is transmitted
from Client 1 to Client 2.
When Client 1 successfully attaches to FA Server 1, FA Server 1 creates a unique I-SID-to-VLAN mapping
for Client 1 on its device. This mapping contains the I-SID and C-VID advertised by Client 1, using the FA
Assignment TLV. For example, assume that Client 1 advertises I-SID 200 and C-VID 250.
Similarly, when Client 2 attaches to FA Server 2, FA Server 2 creates an I-SID-to-VLAN mapping for
Client 2 on its device with, for example, I-SID 200 and C-VID 100. This is depicted in the following figure.
The following figure depicts VLAN encapsulation of data traffic from the FA Client to the FA Server (at
either end of the SPB cloud) and its MiM encapsulation as it traverses the SPB cloud.
At FA Server 2, the MiM traffic is decapsulated. Since the I-SID in the data packet matches the I-SID
created on its device on behalf of Client 2, FA Server 2 prepares to send traffic to Client 2. At this stage,
to successfully transmit the data traffic to Client 2, FA Server 2 must additionally know the C-VID that
Client 2 expects traffic on. This information is obtained from the I-SID-to-VLAN mapping on FA Server
2 created on behalf of Client 2, which is C–VID 100. Thus FA Server 2 translates the C-VID in its data
packets to this VLAN ID, and then passes it on to Client 2.
The following figure depicts the typical MiM encapsulation of a data packet. The B-DA and B-SA
components indicated the system ID of the FA Server running SPB.
Note
For Fabric Attach to operate properly and for the FA Server to accept I-SID-to-VLAN
assignment requests, IS-IS must be enabled.
The following error message is logged immediately after IS-IS is disabled, and displays
the error message only once in the log file. The system does not display it again when an
assignment request is made from the FA Proxy.
CP1 [12/04/15 00:33:49.733:UTC] 0x00374589 00000000
GlobalRouter FA INFO Fabric Attach Assignments will be rejected
since ISIS is disabled.
• The C-VID and I-SID are not within the supported range.
Different hardware platforms support different customer C-VID ranges. The value 4095 is not
supported. The value 4096 indicates that the port is untagged. An I-SID value of 0 is not supported
on the FA Server.
• The I-SID is already assigned to an IP VPN.
The system displays the error message I-SID is already assigned to an IPVPN.
• The I-SID is already in use for SPB multicast.
The system displays the error message SPB Multicast is enabled, ISID 16000000
and greater reserved for dynamic data-isid's used to carry Multicast
traffic over SPB.
• The I-SID has a value that is reserved for internal use.
• The I-SID cannot be used in an IS-IS accept policy.
• The I-SID is associated with a platform VLAN and that VLAN is used as a private VLAN (that is, has a
secondary VLAN specified).
• The I-SID is already in use for Transparent Port UNI.
• The port that receives the I-SID-to-VLAN assignment is a member of an MLT, but FA is not
successfully enabled on that MLT interface.
• There is a resource error on the FA Server system, such as lack of memory.
• The number of I-SID-to-VLAN assignments on a port exceeds the maximum limit which is 94.
• The number of I-SIDs on the switch exceeds the maximum limit.
• The same endpoint is configured on more than one I-SID.
• The port or MLT is associated with more than one C-VID in the same I-SID.
When the FA Server rejects I-SID-to-VLAN assignments, aside from viewing the log file, you can use
trace to troubleshoot the cause of rejection.
For an example on troubleshooting rejection of I-SID-to-VLAN assignments on the FA Server and for
more information on using trace, see Troubleshooting Fabric Attach on page 3684.
FA management
You can configure a management I-SID on an FA-enabled port or MLT. This I-SID includes an optional
C-VID parameter, which is a VLAN ID that is locally significant to the port or MLT and does not represent
a platform VLAN.
If you do not configure a management I-SID, the FA Server transmits a management VLAN ID value of 0
in the FA Element TLV. A client/proxy that receives the FA Element TLV retains the initial management
configuration (if any) on its device.
Limitations of FA management I-SIDs
• A management I-SID value of 0 is not supported on the FA Server.
• You cannot enable BPDU on a management I-SID.
A Switched UNI I-SID that is created when an FA assignment is learned on a port or MLT, is uniquely
identified by a tuple comprising of one of the combinations of (port, I-SID and C-VID) or (MLT ID,
I-SID and C-VID). When you configure FA management, similar tuples are used. You can configure FA
management on an FA-enabled port or MLT on which FA assignment mappings are learned, as long as
the FA management tuple exactly matches the tuple created by the learned FA mapping.
The following scenarios describe the behavior when you configure FA management on a port or MLT
that also receives learned FA mappings, but the tuples do not match.
• Scenario 1: You attempt to configure FA management on a port or MLT where an FA assignment
mapping is already learned.
For example, consider an FA-enabled port 1/1 on which an assignment mapping is learned, with
I-SID 100 and C-VID 20. You can configure FA management on port 1/1 as long as the I-SID and
C-VID values exactly match that of the learned FA mapping. However, if you attempt to configure FA
management on the port with a different I-SID and C-VID value, the configuration is not successful
and an error message displays.
• Scenario 2: An FA assignment mapping is learned on a port or MLT that already has FA
management configured.
For example, consider that FA management is configured on port 1/1. If an FA assignment mapping
is learned on the port with the same I-SID and C-VID values as that of the FA management
configuration, then the mapping is accepted. Otherwise the mapping is rejected.
For the security of FA communication in terms of data integrity and authenticity, a keyed-hash message
authentication code can be transmitted within every FA TLV.
It protects the I-SID-to-VLAN assignment exchanges between the FA Server and FA Proxy. The
standard HMAC-SHA256 algorithm calculates the message authentication code (digest) involving a
cryptographic hash function (SHA-256) in combination with a shared secret key. The key is symmetric,
that is, it is known by both the source and destination parties.
By default, on the FA Server, message authentication is enabled at the interface level and a default key
is defined to provide secure communication.
You can configure a different authentication key on an interface (port or MLT) on the FA Server, to
authenticate a client on that interface. The authentication key is stored in encrypted form when you
save configuration on the FA Server. For an FA Client to authenticate and attach to the FA Server, the
authentication key must match on both the client and the server. In general, the FA authentication key
must match between two FA components exchanging FA TLVs through LLDP.
When you enable FA message authentication, the message authentication key (default or configured)
generates a Hash-based Message Authentication Code (HMAC) digest that is included in FA I-SID-to-
VLAN Assignment TLV. Upon receipt, the HMAC digest is recomputed for the TLV data and compared
against the digest included in the TLV. If the digests are the same, the data is valid. If the digests are not
the same, the data is considered invalid and is ignored.
The FA secure communication setting (enabled/disabled) and the symmetric key data are maintained
across resets and restored during FA initialization.
With the Switched UNI feature, you can associate many different C-VID/port or C-VID/MLT list
combinations to a single I-SID.
FA brings the capability of automatically creating Switched UNI I-SIDs on a switch, without manual
intervention. The I-SIDs thus created are ELAN I-SIDs with endpoints of type Switched UNI, and are
by default for Layer 2. MAC learning takes place and there is an any-to-any relationship. For Layer 3
participation, you must configure a platform VLAN with the same I-SID value as that of the I-SID in a
learned FA mapping.
Note
The number of Switched UNI I-SIDs created are different for different product families. For
more information, see VOSS Release Notes.
• The ELAN I-SIDs created are by default for Layer 2. For Layer 3 participation, you must manually
configure a platform VLAN with the same I-SID value as that of the I-SID in a learned FA mapping.
You can configure the platform VLAN with the same VLAN ID as that of the C-VID, or use a different
value.
• The Switched UNI (ELAN) I-SID cannot be used by IPVPN, MVPN, SPBM dynamic multicast range, or
a T-UNI.
• You cannot change from one UNI type to another dynamically. The I-SID must be deleted and
created with the new UNI type (Customer VLAN (C-VLAN), Transparent Port user-network-interface
(T-UNI), ELAN).
• If the port is a member of an MLT, you must add the entire MLT to the C-VID.
• The port is always in the forwarding state.
• You cannot associate a port or MLT with more than one C-VID in the same I-SID.
• The same C-VID, port or MLT cannot be a member of more than one I-SID. Different hardware
platforms support different customer C-VID ranges. The value 4095 is not supported and cannot be
configured. The value 4096 indicates that the port is untagged.
• An I-SID value of 0 is not supported on the FA Server.
Fabric Attach, when used with a Fabric Connect solution, provides the same capabilities at the access
layer, but those services and policies are now mapped across the entire network end-to-end. FA makes
user and end device attachment simple and creates network configuration and sets up resources only
when needed.
An FA Server can be connected to FA Client or FA Proxy devices on three types of interfaces, namely, a
port, MLT or an SMLT. The following sections discuss FA in SMLT and non-SMLT deployments.
The following deployment shows an SPBM network in which one edge has manually configured
Switched UNI I-SIDs and the other edge has Fabric Attach (FA). At the FA edge, the I-SIDs are learned
using FA TLVs and are automatically created on the FA Server as ELAN I-SIDs with Switched UNI
endpoints.
This deployment demonstrates that the FA-created I-SIDs can communicate with any other I-SID
(manually created Switched UNI or a C-VLAN with an I-SID), on the local switch or across the SPBM
fabric, as long as the I-SID values are the same.
BEB-B is a switch acting as the FA Server with a network-to-network interface (NNI) to the SPBM
cloud. FA Client and FA Proxy devices send I-SID-to-VLAN mapping requests to the FA Server on the
respective FA-enabled ports, using LLDP TLVs. This enables the I-SID endpoints to communicate with
the SPB cloud.
If several clients are aggregated in an MLT, at least one of the ports must send the mapping requests
for the FA Server to create the I-SID endpoints for that MLT. For example, let Client 2 be a wireless FA
Client (such as an WLAN 9100 AP device) on port 1/21, that sends an FA mapping request for I-SID 100
and C-VID (VLAN ID) 100. The FA Server (BEB-B) creates the requested I-SID 100 on its device, and
advertises it to the SPB cloud.
BEB-A has manually configured Switched UNI endpoints, one of which is Client 1 (connected at port 1/1)
using the same I-SID value 100.
With this setup, data traffic can freely flow between Client 1 and Client 2 through the two BEBs and the
BCB.
Thus the Switched UNI I-SIDs learned using FA TLVs on one edge of the Fabric Connect (SPBM)
network can communicate with the manually created I-SIDs on the other edge, as long as they both
have the same value.
The following section describes FA in a dual-homed SMLT deployment. A pair of switches that operate
as IST peers act as the FA Server. An FA Proxy (typically a wiring closet switch or an access switch)
is connected to FA Clients and in turn to end devices. The FA Clients or FA Proxies advertise I-SID-to-
VLAN mappings namely the interface C-VID and the I-SID to the FA Server switches. Both switches
receive the mapping information using LLDP TLVs. The switch that learns the mapping first from the
LLDP TLV considers the I-SID endpoint to be discovered locally, and creates the I-SID on its device. It
then sends the mapping information to its peer switch. When the peer switch receives the mapping
across IST in a new SMLT message, it too creates the I-SID and endpoint on its device. This I-SID
however, is considered to be discovered remotely, because the data was synchronized from its peer.
Note
• For the peer switches acting as the FA Server to transmit the same FA System ID (based
on the virtual MAC), SMLT configuration must be the same on both peers.
• For successful FA operation, configuration of FA message authentication and the
authentication key must be the same on both peers.
• For successful operation in Layer 3, a platform VLAN must be configured on both peers.
This is necessary for proper MAC learning.
Irrespective of whether the I-SID creation on the FA peers is triggered by a local TLV event or
by messaging from the IST peer, they can both receive data traffic. Thus in a dual-homed SMLT
deployment, any I-SID can be learned irrespective of whether it is discovered locally, discovered
remotely or both.
Note
On the IST peers, if an FA TLV is learned on a port or normal MLT (instead of the admin SMLT),
only the I-SID is sent to the peer switch.
In the single-homed SMLT, as shown in the following deployment, the FA Server creates either a locally
discovered I-SID (if received from a client using FA TLVs) or a remotely discovered I-SID (if synchronized
from its IST peer), but not both.
For example, if VLACP is enabled on the FA Server side of the link but not on the proxy or the client
side, the FA Server learns the I-SID-to-VLAN assignment mappings and creates the required I-SIDs
on its device. However, data traffic is not forwarded on the port until VLACP is operationally up.
• On VSP 4450 Series, you cannot use a port designated as a Fabric Extend tunnel source, configured
using the command ip-tunnel-source-address, for Fabric Attach.
• FA uses the virtual MAC to create the FA system ID when the FA is on an SMLT. If you delete the
SPBM instance, then this information is no longer available. Therefore, you must delete the FA on
SMLT before deleting the SPBM instance.
• You cannot enable FA and Endpoint Tracking simultaneously on the same interface.
• On VSP 8600 Series, dynamically learned Fabric Attach announced VLAN:ISID bindings and
manually configured Switched-UNI end-points are not supported on the same interface.
Endpoint Tracking
Extreme Management Center or ExtremeCloud IQ - Site Engine is integral to the Endpoint Tracking
solution. Extreme Management Center or ExtremeCloud IQ - Site Engine delivers automation; there is
no need to manually configure server VLANs on data center access switches. Additionally, Extreme
Management Center or ExtremeCloud IQ - Site Engine) provides the ability to see what VM MACs exist,
and where they are located.
When the switch detects a new VM on a port, it sends a RADIUS request to Extreme Management
Center or ExtremeCloud IQ - Site Engine. ExtremeConnect checks with VCenter for the Port Group,
VLAN ID, and I-SID information that corresponds with the VM, communicates with the ExtremeControl
module for the RADIUS authentication, and sends the RADIUS response back to the switch with the
VLAN:ISID binding information. Based on the binding, the switch then automatically creates a dynamic
Switched UNI (S-UNI). Dynamic S-UNIs are not saved into the configuration file.
1. The RADIUS server authenticates VM1, and the switch automatically creates a Switched UNI with
VLAN 10 and I-SID 10 binding, (using the outbound attributes received from the RADIUS server).
Subsequently, the server authenticates VM2, which uses the same Switched UNI.
2. Similarly, on the other side of the SPB cloud, the RADIUS server authenticates VM5 and the switch
automatically creates a Switched UNI with VLAN 30 and I-SID 10 binding, (using the outbound
attributes received from the RADIUS server). Subsequently, the server authenticates VM6, which
uses the same Switched UNI.
3. The same sequence occurs for VMs 3 and 4, and PCs 7 and 8, with the first authentication in each
VLAN providing the outbound RADIUS attributes needed for the creation of a Switched UNI for that
VLAN.
4. The final result is that VMs 1, 2, 5, and 6 can access each other on I-SID 10, and VMs 3, 4, 7, and 8 can
access each other on I-SID 20.
the MACs learned on a static S-UNI are not learned at the Endpoint Tracking level. Endpoint Tracking
Visibility Mode allows tracking of MACs that are learned on static S-UNIs. This implies that a binding is
created for these MACs, but these bindings do not create dynamic S-UNIs, they are used for tracking
purposes only.
Interface Support
Endpoint Tracking is supported on Ethernet ports, MLTs, and SMLTs.
If the switch is a Virtual IST (vIST) peer, the dynamic Switched UNI is synchronized to its vIST peer as
follows:
• If the MAC is learned on an SMLT UNI interface, all Switched UNI information is synchronized to the
vIST peer.
• If the MAC is learned on a non-SMLT UNI interface, only the I-SID is synchronized to the vIST peer.
However, if a VM remains attached to the same (previously authenticated) switch, but the VLAN
segment is changed, you must push a reauthentication request from Extreme Management Center or
ExtremeCloud IQ - Site Engine to force the required binding updates. For more information about
managing binding updates using RADIUS Change-of-Authorization (CoA) functionality, see Extreme
Management Center or ExtremeCloud IQ - Site Engine Integration on page 999.
Operational Considerations
Consider the following when implementing Endpoint Tracking:
• A RADIUS server used for Endpoint Tracking provides authorization only; no accounting processes
are supported. Although accounting is enabled by default for all RADIUS servers, it is not currently
supported for use with Endpoint Tracking, even if left enabled.
• Fabric Attach is not supported on ports or MLT/SMLTs that have Endpoint Tracking enabled.
The following diagram illustrates an example of Extreme Management Center or ExtremeCloud IQ - Site
Engine interaction with a switch for Endpoint Tracking:
Figure 78: Extreme Management Center or ExtremeCloud IQ - Site Engine Endpoint Tracking
Interaction Example
The RADIUS attributes to configure in either standard or custom Extreme Management Center or
ExtremeCloud IQ - Site Engine RADIUS profiles for Endpoint Tracking depend on your deployment and
traffic type:
• For tagged traffic, if the RADIUS server provides both the VLAN ID and I-SID value, use only the
FA-VLAN-ISID attribute.
• For tagged traffic, if the RADIUS server provides only the VLAN ID (and you are therefore using an
I-SID offset value), use only the Tunnel-Private-Group-ID attribute.
• For untagged traffic, if the RADIUS server provides both the VLAN ID and I-SID value, use the
FA-VLAN-ISID and Egress-VLANID or Egress-VLAN-name attributes.
• For untagged traffic, if the RADIUS server provides only the VLAN ID (and you are therefore using
an I-SID offset value), use the Tunnel-Private-Group-ID and Egress-VLANID or Egress-
VLAN-name attributes.
• Use the Session-Timeout attribute to override the default timeout period of 24 hours, which is
amount of time, in seconds, between a MAC address authentication and the deletion of that MAC
address from the Endpoint Tracking binding table.
Endpoint Tracking uses RADIUS RFC 5176 Change-of-Authorization (CoA) functionality to enable
forced VLAN:ISID binding updates.
For example, when a VLAN segment is changed on a VM that resides on a previously authenticated
switch, that VM requires a new VLAN:ISID binding to reflect the new VLAN segment. Because the
switch has previously been authenticated, you must force a new authentication request to update the
binding information.
Using ExtremeControl, you can manually push a reauthentication request for the VM MAC. This action
sends a disconnect-request from the RADIUS server to the switch, which deletes the old binding. When
the switch detects the VM again, a new RADIUS authentication request is sent from the switch to the
RADIUS server, resulting in updated binding information upon sucessful authentication.
For more information about RADIUS Dynamic Session Change Support (RFC 5176), see RFC 5176 —
Dynamic Session Change on page 2729.
Deployment Examples
Endpoint Tracking deployment scenarios include Distributed Virtual Routing (DvR) deployments, or
regular SPBM deployments.
Configuration Fundamentals
For information about configuring Extreme Management Center or ExtremeCloud IQ - Site Engine,
see the Extreme Management Center or ExtremeCloud IQ - Site Engine documentation at https://
www.extremenetworks.com/support/documentation/.
Switch Configuration
and enable the RADIUS dynamic-server client. For information about adding a RADIUS server host
and a RADIUS dynamic-server client to the switch, see RADIUS on page 2721.
• Optionally configure a global I-SID offset value.
When you provision the Endpoint Tracking RADIUS server in Extreme Management Center or
ExtremeCloud IQ - Site Engine, you choose which outbound attributes the RADIUS server includes in
each authentication response. If you always include an I-SID value in those outbound attributes, you
do not need to configure an I-SID offset value on the switch.
For MACs that do not receive an I-SID attribute from the RADIUS server, use Auto-ISID-Offset
functionality. The configured I-SID offset value is used to calculate an I-SID value for a switched UNI
when no I-SID value is provided by the RADIUS server in the outbound attributes. In that case, the
I-SID value is calculated as follows:
CLI commands provide the functionality to separate the creation, deletion, enabling, and disabling of
Endpoint Tracking on interfaces. For example, if you want to flush all VLAN:ISID bindings on a port,
you can disable (but not delete) Endpoint Tracking on that port, keeping the port distinct from other
ports where Endpoint Tracking is not yet created.
Multi-area SPB
The Multi-area SPB feature enables building a scalable Shortest Path Bridging (SPB) network, consisting
of multiple Intermediate System-to-Intermediate System (IS-IS) areas that connect to each other
through the boundary nodes. The Multi-area SPB feature provides flexible network design through
which you can group the nodes in the areas on a need basis.
Each area in the Multi-area SPB network contains the interior nodes and the boundary nodes.
Note
The boundary nodes do not support Auto-sense, you must manually configure all NNI on the
boundary nodes.
The multiple areas in the Multi-area SPB network connect in various patterns, for example, the hub and
spoke topology and the daisy chain topology.
The functions of the boundary nodes in the Multi-area SPB network are:
• Designated boundary node:
◦ Creates the area virtual node LSPs on each IS-IS instance.
◦ Configures the virtual node's adjacency with the other boundary node on basis of the
reachability of the node.
◦ Advertises the services on the area virtual node on basis of the redistribution policies that you
configure.
For more information about the area virtual node, see Area Virtual Node on page 1005.
Minimum Requirements
The minimum requirements for the Multi-area SPB to function are:
• Two boundary nodes to provide redundancy.
• Multi-area SPB redistribution policies between areas, like layer 2 redistribution, layer 3 unicast
redistribution, multicast redistribution, Distributed Virtual Routing (DvR) backbone redistribution
and so on. For more information, see Multi-area SPB Redistribution and Policies on page 1006.
The boundary nodes in the Multi-area SPB network exposes one virtual node in each of two connected
areas, to represent a collection of nodes from the other area. On the basis of the policies that you
configure on the boundary nodes, you can control the services that the system exports from a home
area to the remote area as the system includes the configuration in the Link State Packets (LSP) of the
corresponding area virtual node.
You can configure the area virtual node parameters on both home and remote IS-IS instances. For more
information about configuring the area virtual node, see Configure IS-IS Multi-area SPB Virtual Node on
page 1112.
For more information, see Enable Remote IS-IS Router Configuration Globally on page 1119.
Layer 2 Redistribution
In the Multi-area SPB network the layer 2 redistribution identifies the services that the system
transports from the home area to the remote area and the I-SIDs that the system extends across
the boundary nodes in an area. The destination area permits or denies the services on basis of the layer
2 redistribution policies that you configure.
You can configure the layer 2 I-SID redistribution on the switch globally. The layer 2 redistribution
policies are bidirectional, which means only one redistribution filter applies to both the home area and
the remote area.
Note
Any changes in the layer 2 I-SIDs in the home area will trigger updates to the I-SIDs in the
remote area or vice versa.
For more information about configuring Multi-area SPB layer 2 redistribution, see:
• Configure Multi-area SPB Layer 2 I-SID Redistribution on page 1121
• Configure Multi-area SPB Layer 2 I-SID List on page 1120
The layer 3 VSN functionality within the Multi-area SPB network is same as the layer 3 VSN functionality
in the flat SPB network. In the Multi-area SPB network, for the layer 3 services to pass the area
boundary, you must explicitly configure them on the boundary nodes. Inter-VRF routes on the
boundary node will not be redistributed across area boundaries. You can configure redistribution
unidirectionally on the boundary nodes. You can also apply different policies from home to remote and
remote to home.
The configuration guidelines for the layer 3 Multi-area SPB redistribution are:
• To redistribute inter-area routes in GRT, configure IPSC on the boundary nodes.
• To redistribute inter-area routes in a specific VRF, configure IPSC and layer 3 VSN for that VRF.
Note
The system does not redistribute inter-vrf routes on the boundary nodes across the area
boundaries.
Multicast over Shortest Path Bridging (SPB) redistribution manages filtering of the IP multicast streams
that the system transports from one area to another. The IP multicast services pass through to the
other area on the boundary node depending on the policy that you configure specific to the sender IP
address, the multicast group IP address and the Virtual Router Forwarding (VRF) ID.
Multicast over SPB policy is a unidirectional solution, the system filters the IP multicast streams from the
area that they originate to the other area or vice versa, independently. Each IP multicast stream that
the system advertises in one area will also be advertised on the corresponding area virtual node after it
passes the multicast over SPB policy.
Following are the configuration guidelines for the multicast over SPB redistribution:
• Enable multicast on the boundary nodes.
• For layer 3 VSNs, configure Multiprotocol Label Switching Virtual Private Network (MVPN) on the
boundary nodes.
• For layer 2 multicast, the scope I-SID must pass the layer 2 VSN policy.
• Configure the same policies as the boundary node on the peer boundary nodes.
The Distributed Virtual Routing (DvR) functionality within the Multi-area SPB network is same as
the DvR functionality in the flat SPB network. For more information, see Distributed Virtual Routing
Fundamentals on page 690. To configure Multi-area SPB DvR backbone redistribution, the boundary
node must be a functional DvR controller in a domain in the home area or a non-DvR Backbone Edge
Bridge.
Note
DvR domains can only be a part of one area, you must not configure the same DvR domain in
multiple areas.
When you enable the Multi-area SPB DvR backbone redistribution the system extends the DvR
backbone across the area boundaries. The boundary node in the Multi-area SPB network performs
the DvR controller functions to receive and propagate the hosts in the DvR domain. Since the interior
nodes in one area of the Multi-area SPB network are not visible to the interior nodes in other areas, the
system sends the area virtual nodes representing the specific area as a gateway in the DvR route TLV.
When the system sends the DvR traffic to another DvR domain in a specific destination area, the system
sends the traffic to the destination area’s boundary nodes and the boundary nodes perform the route
lookup and forward the traffic to the correct DvR domain in the destination area.
For information about configuring Multi-area SPB DvR backbone redistribution, see Configure Multi-
area SPB DvR Backbone Redistribution on page 1128.
• If the system forms an IS-IS adjacency in both the home and remote areas on a boundary node, of
the same port then the remote adjacency stays up only with another boundary node that also has
IS-IS configured on both the home and remote areas of the same port.
• If a boundary node connects to a Backbone Edge Bridge (BEB) in the remote area and if you
configure IS-IS in the home area on the same interface, then the remote adjacency goes down.
• On the boundary node, to install a route from a remote area in the routing table manager (RTM), the
route must pass the accept policy and the Multi-area SPB redistribution policy that you configure on
the specific Virtual Router Forwarding (VRF) instance.
• On the boundary node, to install an inter-VRF route from a remote area in the routing table manager
(RTM), the inter-VRF route must pass the accept policy and the Multi-area SPB redistribution policy
that you configure on both the source and destination VRF instances.
• Nickname for the physical node and virtual node must be different.
• When enabling Remote IS-IS Instance, make sure that the physical node nickname, virtual node
nickname and system ID are different.
If a duplicate system ID exists between adjacent areas, the boundary node logs an event like the
following:
To recover from this event and ensure the information on the boundary node is correctly updated, you
must perform the following tasks:
Delete errors can display on the boundary node but they have no functional impact.
Important
The spbm-config-mode boot flag must be enabled (default) before you can configure
SPBM or IS-IS. To verify the setting, enter show boot config flags in Privileged EXEC
mode.
You can use this procedure to quickly configure the minimum SPBM and IS-IS parameters. However,
a manual procedure is available instead of using this script. The default values are given in square
brackets. You may input your values at the prompt or if you wish to accept the default values, press
Enter. This command first accepts all values and then removes existing SPBM configurations before
configuring the entered values.
Note
This process causes the SPBM traffic to flap temporarily.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Run the SPBM script:
run spbm
Note
If the script causes a configuration conflict or cannot execute a command, an error
message displays and the script stops.
Example
****CONFIGURATION IN PROGRESS****
*SPBM enabled globally*
*SPBM instance 1 configured*
*SPBM BVLANS configured*
*SPBM SMLT configured*
*SPBM multicast enabled globally*
*IP shortcuts configured*
*SPBM SMLT configured*
*IS-IS enabled*
*IS-IS on port 1/5 configured*
*IS-IS on port 1/6 configured*
*IS-IS on MLT 1 configured*
*CFM SPBM configured*
****SCRIPT EXECUTION COMPLETE****
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Run the script:
run spbm clean
Note
If the script causes a configuration conflict or cannot run a command, an error message
displays and the script stops.
3. To ensure proper cleanup of MAC tables, save the configuration, and then reboot the switch.
Example
You can use this procedure to quickly configure the minimum SPBM and IS-IS parameters. However, a
manual procedure is available instead of using this script.
Note
You must enable SPBM before running the SPBM script.
Procedure
configure terminal
Note
If the script causes a configuration conflict or cannot execute a command, an error
message displays and the script stops.
Example
This procedure removes existing IS-IS ports and MLT interfaces. You can choose which port and MLT
interfaces need to be removed. This command does not alter the other SPBM or IS-IS configurations.
Note
You must enable SPBM before running the SPBM script.
Procedure
configure terminal
Note
If the script causes a configuration conflict or cannot execute a command, an error
message displays and the script stops.
Example
Procedure
configure terminal
2. Enable SPBM globally:
spbm
3. Enter IS-IS Router Configuration mode:
router isis
4. Create the SPBM instance (only one SPBM instance is supported):
spbm <1–100>
5. Add the SPBM B-VLAN to the SPBM instance:
spbm <1–100> b-vid {<vlan-id [-vlan-id][,...]} [primary <1-4059>]
Note
Although it is not strictly required for SPBM operation, you should change the IS-IS system
ID from the default B-MAC value to a recognizable address to easily identify a switch (Log
on to IS-IS Router configuration mode and use the system-id <xxxx.xxxx.xxxx>
command). This helps to recognize source and destination addresses for troubleshooting
purposes.
7. Configure an IS-IS manual area (1-13 bytes in the format <xx.xxxx.xxxx...xxxx>, only one manual area
is supported.):
manual-area <xx.xxxx.xxxx...xxxx>
8. Exit IS-IS Router Configuration mode to Global Configuration mode:
exit
9. Create the SPBM backbone VLAN (B-VLAN):
vlan create <2-4059> type spbm-bvlan
10. Enter Interface Configuration mode, by specifying the ports or MLTs that are going to link to the
SPBM network:
interface {GigabitEthernet {slot/port[/sub-port][-slot/port[/sub-
port]][,...]}| mlt <1–512> }
11. Configure an IS-IS interface on the selected ports or MLTs:
Examples
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#spbm
Switch:1(config)#router isis
Switch:1(config-isis)#spbm 1
Switch:1(config-isis)#spbm 1 b–vid 4051,4052 primary 10
Switch:1(config-isis)#spbm 1 nick-name 1.11.16
Switch:1(config-isis)#manual-area c0.2000.000.00
Switch:1(config-isis)#exit
Switch:1(config)#interface GigabitEthernet 1/21
Switch:1(config-if)#isis
Switch:1(config-if)#isis spbm 1
Switch:1(config-if)#isis enable
Switch:1(config-if)#exit
Switch:1(config)#vlan create 4051 type spbm-vlan
Switch:1(config)#vlan create 4052 type spbm-vlan
Switch:1(config)#router isis enable
Switch:1(config)#show isis spbm
========================================================================================================================
ISIS SPBM Info
========================================================================================================================
SPBM B-VID PRIMARY NICK LSDB IP IPV6 MULTICAST SPB-PIM-GW STP-MULTI ORIGIN
INSTANCE VLAN NAME TRAP HOMING
------------------------------------------------------------------------------------------------------------------------
1 4051-4052 4051 disable disable disable disable disable disable dynamic
========================================================================================================================
ISIS SPBM SMLT Info
========================================================================================================================
SPBM SMLT-SPLIT-BEB SMLT-VIRTUAL-BMAC SMLT-PEER-SYSTEM-ID
INSTANCE
------------------------------------------------------------------------------------------------------------------------
1 primary 00:00:00:00:00:00
--------------------------------------------------------------------------------
Total Num of SPBM instances: 1
--------------------------------------------------------------------------------
Switch:1>show isis
================================================================================
ISIS General Info
================================================================================
AdminState : enabled
RouterType : Level 1
System ID : 0014.c7e1.33df
Max LSP Gen Interval : 900
Metric : wide
Overload-on-startup : 20
Overload : false
Csnp Interval : 10
PSNP Interval : 2
Rxmt LSP Interval : 5
spf-delay : 100
Router Name : Switch1
ip source-address : 41.41.41.100
ipv6 source-address : 41:0:0:0:0:0:0:100
ip tunnel source-address : 11.11.12.11
Tunnel vrf : spboip
ip tunnel mtu : 1950
Num of Interfaces : 2
Num of Area Addresses : 1
inband-mgmt-ip :
backbone : disabled
Dynamically Learned Area : 00.0000.0000
FAN Member : No
Hello Padding : enabled
Multi-Area OperState : disabled
Multi-Area Flags : home-always-up
Variable definitions
Variable Value
enable Enables or disables the IS-IS circuit/interface on the specified port or MLT.
The default is disabled. Use the no option to disable IS-IS on the specified interface.
spbm <1–100> Enable the SPBM instance on the IS-IS interfaces.
Variable Value
<xx.xxx.xxx...xxx> Specifies the IS-IS manual-area (1–13 bytes in the format <xx.xxx.xxx...xxx>). Only
one manual area is supported. For IS-IS to operate, you must configure at least one
area.
Use the no option to delete the manual area.
Variable Value
<1–100> Creates the SPBM instance. Only one SPBM instance is supported.
b-vid {<vlan-id [- Sets the IS-IS SPBM instance data VLANs.
vlan-id] [,...]} Use the no option to remove the specified B-VLAN from the SPBM
instance.
nick-name <x.xx.xx> Specifies a nickname for the SPBM instance globally.
The value is 2.5 bytes in the format <x.xx.xx>. Use the no or default
options to delete the configured nickname.
primary <1-4059> Sets the IS-IS instance primary data B-VLAN.
The following table defines parameters for the vlan create command.
Variable Value
<2-4059> Specifies the VLAN ID. Creates an SPBM Backbone VLAN (B-VLAN). You
can optionally specify a name for the SPBM B-VLAN.
type Specifies the type of VLAN created.
{port-mstprstp| • port-mstprstp — Create a VLAN by port.
protocol- • protocol-mstprstp — Create a VLAN by protocol.
mstprstp|spbm-
bvlan} • spbm-bvlan — Create an SPBM B-VLAN.
Job aid
Important
After you have configured the SPBM nickname and enabled IS-IS. To maintain the same
nickname with a different system ID, perform the following steps:
1. Disable IS-IS.
2. Change the system ID.
3. Change the nickname to a temporary one.
4. Enable IS-IS.
5. Wait up to 20 minutes for the LSPs with the original system ID to age out.
Note
To check the age out time, use the show isis lsdb sysid <original-
sys-id> command on any of the other SPB nodes in the network. When there
is no output from this command, proceed to the next step. The time left (in
seconds) for the LSPs to age out is shown under the column LIFETIME.
6. Disable IS-IS.
7. Change the nickname to the original nickname.
8. Enable IS-IS.
This procedure is only for the port interface. The auto-nni command is not supported on the MLT
interface and the Fabric Extend Logical Interface.
The auto-nni command provides a quick and simple way to configure the IS-IS interface. You can
use the auto-nni command instead of the following existing IS-IS commands on the physical (port)
interface:
• isis
• isis spbm instance
• isis enable
The existing commands are still available and you have the option to use the new command or the three
existing commands. If you need to modify any of the default parameters under isis or isis spbm
instance , use isis and isis spbm instance constructs even if you created the interface with
the auto-nni command.
Procedure
configure terminal
2. Enable SPBM globally:
spbm
3. Enter IS-IS Router Configuration mode:
router isis
4. Create the SPBM instance (only one SPBM instance is supported):
spbm <1–100>
5. Add the SPBM B-VLAN to the SPBM instance:
spbm <1–100> b-vid {<vlan-id [-vlan-id][,...]} [primary <1-4059>]
6. Configure the system nickname (2.5 bytes in the format <x.xx.xx>):
spbm <1–100> nick-name <x.xx.xx>
Note
Although it is not strictly required for SPBM operation, you should change the IS-IS system
ID from the default B-MAC value to a recognizable address to easily identify a switch (Log
on to IS-IS Router configuration mode and use the system-id <xxxx.xxxx.xxxx>
command). This helps to recognize source and destination addresses for troubleshooting
purposes.
7. Configure an IS-IS manual area (1-13 bytes in the format <xx.xxxx.xxxx...xxxx>. Only one manual area
is supported.):
manual-area <xx.xxxx.xxxx...xxxx>
8. Exit IS-IS Router Configuration mode to Global Configuration mode:
exit
9. Create the SPBM backbone VLAN (B-VLAN):
vlan create <2-4059> type spbm-bvlan
10. Enter Interface Configuration mode, by specifying the ports or MLTs that are going to link to the
SPBM network:
interface {GigabitEthernet {slot/port[/sub-port][-slot/port[/sub-
port]][,...]}| mlt <1–512> }
11. Configure an IS-IS interface on the selected ports.
auto-nni
12. Enable interface.
Examples
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#spbm
Switch:1(config)#router isis
Switch:1(config-isis)#spbm 1
Switch:1(config-isis)#spbm 1 b-vid 10,20 primary 10
Switch:1(config-isis)#spbm 1 nick-name 1.11.16
Switch:1(config-isis)#manual-area c0.2000.000.00
Switch:1(config-isis)#exit
Switch:1(config)#interface gigabitethernet 1/21
Switch:1(config-if)#auto-nni
Switch:1(config-if)#exit
Switch:1(config)#vlan create 10 type spbm-vlan
Switch:1(config)#vlan create 20 type spbm-vlan
Switch:1(config)#router isis enable
Switch:1(config)#show isis spbm
Switch:1(config)#show isis spbm
==============================================================================================================
ISIS SPBM Info
==============================================================================================================
SPBM B-VID PRIMARY NICK LSDB IP IPV6 MULTICAST SPB-PIM-GW STP-MULTI
INSTANCE VLAN NAME TRAP HOMING
--------------------------------------------------------------------------------------------------------------
1 4051-4052 4051 disable disable disable enable disable enable
==============================================================================================================
ISIS SPBM SMLT Info
==============================================================================================================
SPBM SMLT-SPLIT-BEB SMLT-VIRTUAL-BMAC SMLT-PEER-SYSTEM-ID
INSTANCE
--------------------------------------------------------------------------------------------------------------
1 primary 00:00:00:00:00:00
--------------------------------------------------------------------------------
Total Num of SPBM instances: 1
--------------------------------------------------------------------------------
Switch:1>show isis
================================================================================
ISIS General Info
================================================================================
AdminState : enabled
RouterType : Level 1
System ID : 0014.c7e1.33df
• A private VLAN must be created. For more information about creating private VLANs, see Create a
Private VLAN on page 3775.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Assign the I-SID to the primary and secondary VLAN.
vlan i—sid <1-4059> <0-16777215> [force]
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#vlan i-sid 5 75
Variable Definitions
The following table defines parameters for the vlan i-sid command.
Variable Value
<1-4059> Specifies the VLAN ID.
Specifies the VLAN ID in the range of 1 to 4059. By default,
VLAN IDs 1 to 4059 are configurable and the system reserves
VLAN IDs 4060 to 4094 for internal use. On switches that
support the vrf-scaling and spbm-config-mode boot
configuration flags, if you enable these flags, the system also
reserves VLAN IDs 3500 to 3998. VLAN ID 1 is the default
VLAN and you cannot create or delete VLAN ID 1.
<0-16777215> Specifies the service instance identifier (I-SID). You cannot
use I-SID 0x00ffffff. The system reserves this I-SID to
advertise the virtual BMAC in an SMLT dual-homing
environment.
This value is the same for the primary and secondary VLANs.
force Specifies the software must replace the existing VLAN-to-I-
SID mapping, if one exists.
Procedure
1. Display the SPBM configuration:
show isis spbm
2. You can also use the following command to identify SPBM VLANs. For spbm-bvlan, the attribute
TYPE displays spbm-bvlan instead of byport. For private VLANs,. the attribute TYPE displays
private instead of byport.
show vlan basic
Example
Switch# show isis spbm
==============================================================================================================
ISIS SPBM Info
==============================================================================================================
SPBM B-VID PRIMARY NICK LSDB IP IPV6 MULTICAST SPB-PIM-GW STP-MULTI
INSTANCE VLAN NAME TRAP HOMING
--------------------------------------------------------------------------------------------------------------
1 4051-4052 4051 disable disable disable enable disable enable
==============================================================================================================
ISIS SPBM SMLT Info
==============================================================================================================
SPBM SMLT-SPLIT-BEB SMLT-VIRTUAL-BMAC SMLT-PEER-SYSTEM-ID
INSTANCE
--------------------------------------------------------------------------------------------------------------
1 primary 00:00:00:00:00:00
--------------------------------------------------------------------------------
Total Num of SPBM instances: 1
--------------------------------------------------------------------------------
Procedure
Example
Switch:1>show isis
================================================================================
ISIS General Info
================================================================================
AdminState : enabled
RouterType : Level 1
System ID : 0014.c7e1.33df
Max LSP Gen Interval : 900
Metric : wide
Overload-on-startup : 20
Overload : false
Csnp Interval : 10
PSNP Interval : 2
Rxmt LSP Interval : 5
spf-delay : 100
Router Name : Switch1
ip source-address : 41.41.41.100
ipv6 source-address : 41:0:0:0:0:0:0:100
ip tunnel source-address : 11.11.12.11
Tunnel vrf : spboip
ip tunnel mtu : 1950
Num of Interfaces : 2
Num of Area Addresses : 1
inband-mgmt-ip :
backbone : disabled
Dynamically Learned Area : 00.0000.0000
FAN Member : No
Hello Padding : enabled
Multi-Area OperState : disabled
Multi-Area Flags : home-always-up
Procedure
Use the following procedure to display IS-IS areas.
show isis manual-area
Example
Switch# show isis manual-area
================================================================================
ISIS Manual Area Address
================================================================================
--------------------------------------------------------------------------------
c0.2000.0000.00 HOME
Note
• The assignment of primary and secondary roles to the vIST peers is automatic. The switch
with the lower system ID (between the two vIST peers) is primary, and the switch with the
higher system ID is secondary when default system-id values are being used.
• SMLT peer system ID is part of the required configuration. You must configure the SMLT
peer system ID as the nodal MAC of the peer device. In the IS-IS network, the nodal MAC
of devices should be eight apart from each other.
• When using the default hardware assigned system-id value, the SMLT Virtual BMAC is
automatically derived by comparing the system-id values of the two vIST peers. A value of
0x01 plus the lower of the two system-id values is used as the SMLT Virtual BMAC.
When using a manually configured system-id value, the SMLT Virtual BMAC must also be
manually configured.
• An I-SID must be assigned to every VLAN that is a member of a Layer 2 VSN. Also, if a
Layer 2 VSN is created on one vIST Peer, it must also be created on the other vIST peer.
Procedure
configure terminal
2. Disable IS-IS on the switch:
no router isis enable
3. Enter IS-IS Router Configuration mode:
enable
configure terminal
router isis
4. Specify the system ID of the vIST peer, so that if it goes down, the local peer can take over
forwarding for the failed peer:
spbm <1–100> smlt-peer—system—id <xxxx.xxxx.xxxx>
5. Configure the virtual B-MAC, which is shared and advertised by both peers:
spbm <1–100> smlt-virtual-bmac <0x00:0x00:0x00:0x00:0x00:0x00>
6. Exit to Global Configuration mode:
exit
7. Enable IS-IS on the switch:
router isis enable
8. Display the SPBM SMLT configuration:
show isis spbm
Example
Switch:1>enable
Switch:1#configure terminal
==============================================================================================================
ISIS SPBM SMLT Info
==============================================================================================================
SPBM SMLT-SPLIT-BEB SMLT-VIRTUAL-BMAC SMLT-PEER-SYSTEM-ID
INSTANCE
--------------------------------------------------------------------------------------------------------------
1 primary 00:00:00:00:00:00
--------------------------------------------------------------------------------
Total Num of SPBM instances: 1
--------------------------------------------------------------------------------
Variable definitions
Variable Value
smlt-peer-system-id Specifies the IS-IS SPBM peer system ID.
<xxxx.xxxx.xxxx> SMLT peer system ID is part of the required configuration.
You must configure the SMLT peer system ID as the nodal
MAC of the peer device. In the IS-IS network, the nodal MAC
of devices should be eight apart from each other.
smlt-virtual-bmac Specifies a virtual MAC address that can be used by both
<0x00:0x00:0x00:0x00:0x00:0 peers.
x00> SMLT virtual B-MAC is an optional configuration.
Note:
• If SMLT virtual B-MAC is not configured, the system
derives SMLT virtual B-MAC from the configured SMLT
peer system ID and the nodal MAC of the device (IS-IS
system ID). The system compares the nodal MAC of the
device with the SMLT peer system ID configured and
takes the small one, plus 0x01, as the SMLT virtual B-MAC.
• The system also derives SMLT split BEB from the SMLT
peer system ID and nodal MAC of the device. The device
with the lower system ID is primary, the device with the
higher system ID is secondary.
Procedure
configure terminal
2. Configure the SPBM ethertype:
spbm ethertype {0x8100 | 0x88a8}
3. Configure the optional link-state database (LSDB) trap global parameter. To configure this
parameter, you must globally disable IS-IS on the switch:
a. Disable IS-IS on the switch:
no router isis enable
b. Enter IS-IS Router Configuration mode:
router isis
c. Enable a trap when the SPBM LSDB changes:
spbm <1–100> lsdb-trap enable
d. Enable IS-IS on the switch:
router isis enable
e. Exit IS-IS Router Configuration mode:
exit
4. Configure the optional SPBM interface parameters. To configure these parameters, you must disable
IS-IS on the interface:
a. Specify an SPBM interface to configure:
interface {GigabitEthernet {slot/port[/sub-port][-slot/port[/sub-
port]][,...]} | mlt <mltid> }
b. Disable IS-IS on the interface:
no isis enable
c. Configure SPBM instance interface-type on IS-IS interface. SPBM supports only pt-pt:
isis spbm <1–100> interface-type {broadcast|pt-pt}
d. Configure the IS-IS Interface level 1 metric:
isis spbm <1–100> l1-metric <1–16777215>
e. Enable IS-IS on the switch:
isis enable
Example
Switch> enable
Switch(config-isis)# exit
Variable definitions
Variable Value
ethertype {0x8100 | Configures the SPBM ethertype. The default value is 0x8100.
0x88a8}
<1–100> lsdb-trap Configures whether to enable or disable a trap when the SPBM
enable LSDB changes.
The default is disabled. Use the no or default options to disable
LSDB traps.
The following table defines parameters for the isis spbm command.
Variable Value
<1–100> interface- Configures the SPBM instance interface-type on the IS-IS interface
type {broadcast|pt- located on the specified port or MLT. SPBM only supports the point-to-
pt} point (pt-pt) interface type.
The default is pt-pt. Use the no or default options to set this
parameter to the default value of pt-pt.
<1–100> l1–metric <1– Configures the IS-IS interface level 1 metric on the specified port or MLT.
16777215> The default value is 10.
Use the no or default options to set this parameter to the default.
Procedure
configure terminal
router isis
2. Configure optional IS-IS global parameters:
a. Specify the Complete Sequence Number Packet (CSNP) interval in seconds:
csnp-interval <1–600>
b. Configure the router type globally:
is-type {l1|l12}
c. Configure the maximum level, in seconds, between generated LSPs by this Intermediate System:
max-lsp-gen-interval <30–900>
d. Configure the IS-IS metric type:
metric {narrow|wide}
e. Set or clear the overload condition:
overload
f. Configure the overload-on-startup value in seconds:
overload-on-startup <15–3600>
Example
Switch> enable
Switch(config-isis)# csnp-interval 10
Switch(config-isis)# is-type l1
Switch(config-isis)# overload
Switch(config-isis)# overload-on-startup 30
Switch(config-isis)# psnp-interval 10
Switch(config-isis)# retransmit-lsp-interval 10
Variable definitions
Variable Value
<1–600> Specifies the CSNP interval in seconds. This is a system level parameter that applies for
level 1 CSNP generation on all interfaces. A longer interval reduces overhead, while a
shorter interval speeds up convergence.
The default value is 10. Use the no or default options to set this parameter to the default
value of 10.
Variable Value
{l1|l12} Sets the router type globally:
• l1: Level-1 router type
• l12: Not valid.
The default value is l1. Use the no or default options to set this parameter to the default
value of l1.
Variable Value
<30–900> Specifies the maximum interval, in seconds, between generated LSPs by this Intermediate
System.
The default value is 900 seconds. Use the no or default options to set this parameter
to the default value of 900.
Variable Value
{narrow|wide} Specifies the IS-IS metric type. Only wide is supported.
The default value is wide. Use the no or default options to set this parameter to
the default value of wide.
Variable Value
overload Sets or clears the overload condition.
The default value is disabled. Use the no or default options to set this parameter to the
default value of disabled.
Variable Value
<15–3600> Specifies the IS-IS overload-on-startup value in seconds. The overload-on-startup value
is used as a timer to control when to send out LSPs with the overload bit cleared after
IS-IS startup.
The default value is 20. Use the no or default options to set this parameter to the
default value of 20.
Variable Value
<1–120> Specifies the PSNP interval in seconds. This is a system level parameter that applies for
level 1 PSNP generation on all interfaces. A longer interval reduces overhead, while a
shorter interval speeds up convergence.
The default value is 2. Use the no or default options to set this parameter to the default
value of 2.
Variable Value
<1–300> Specifies the minimum time between retransmission of an LSP. This defines how fast the
switch resends the same LSP. This is a system level parameter that applies for Level1
retransmission of LSPs.
The default value is 5 seconds. Use the no or default options to set this parameter to the
default value of 5.
Variable Value
<0–5000> Configures the delay, in milliseconds, to pace successive Shortest Path First (SPF) runs.
The timer prevents more than two SPF runs from being scheduled back-to-back. The
mechanism for pacing SPF allows two back-to-back SPF runs.
The default value is 100 milliseconds. Use the no or default options to set this
parameter to the default value of 100 milliseconds.
Variable Value
WORD<0– Specifies a name for the system. This may be used as the host name for dynamic host
255> name exchange in accordance with RFC 2763.
By default, the system name comes from the host name configured at the system
level.
Use the no or default options to set this parameter to the default value (host
name).
Note:
The system does not display any consistency checks when you edit sys-name.
Variable Value
<xxxx.xxxx.xxxx> Specifies the IS-IS system ID for the switch.
Use the no or default options to set this parameter to the default value
(node BMAC).
Job aid
Important
After you have configured the SPBM nickname and enabled IS-IS. To maintain the same
nickname with a different system ID, perform the following steps:
1. Disable IS-IS.
2. Change the system ID.
3. Change the nickname to a temporary one.
4. Enable IS-IS.
5. Wait up to 20 minutes for the LSPs with the original system ID to age out.
Note
To check the age out time, use the show isis lsdb sysid <original-
sys-id> command on any of the other SPB nodes in the network. When there
is no output from this command, proceed to the next step. The time left (in
seconds) for the LSPs to age out is shown under the column LIFETIME.
6. Disable IS-IS.
7. Change the nickname to the original nickname.
8. Enable IS-IS.
Important
Save your configuration using save config for the updates to be available after reboot.
Saving the configuration also ensures that any authentication keys (passwords) specified
during the configuration are properly encrypted.
Procedure
1. Enter Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Note
This parameter is not used for SPBM because SPBM only runs on point-to-point
interfaces. This parameter is for designated router election on a broadcast LAN
segment, which is not supported.
Example
Switch:1> enable
Switch(config-if):1# isis
Variable Definitions
Variable Value
hello-auth Specifies the authentication type used for IS-IS hello packets
type {none|simple|hmac-md5| on the interface. type can be one of the following:
hmac-sha-256}][key [key • none
WORD<1–16> ] [key-id <1– • simple: If selected, you must also specify a key value but
255> ] the key id is optional. Simple password authentication
uses a text password in the transmitted packet. The
receiving router uses an authentication key (password)
to verify the packet.
• hmac-md5: If selected, you must also specify a key value
but the key-id is optional. MD5 authentication creates
an encoded checksum in the transmitted packet. The
receiving router uses an authentication key (password)
to verify the MD5 checksum of the packet. There is an
optional key ID.
• hmac-sha–256: If selected, you must also specify a
key value but the key-id is optional. With SHA-256
authentication, the switch adds an hmac-sha–256 digest
to each Hello packet. The switch that receives the Hello
packet computes the digest of the packet and compares
it with the received digest. If the digests match, the
packet is accepted. If the digests do not match, the
receiving switch discards the packet. There is an optional
key ID.
Note:
Secure Hashing Algorithm 256 bits (SHA-256) is a
cipher and a cryptographic hash function of SHA2
authentication. You can use SHA-256 to authenticate IS-
IS Hello messages. This authentication method uses the
SHA-256 hash function and a secret key to establish a
secure connection between switches that share the same
key.
This feature is in full compliance with RFC 5310.
Note:
This parameter is not used for SPBM because SPBM only runs
on point-to-point interfaces. This parameter is for designated
router election on a broadcast LAN segment, which is not
supported.
Variable Value
l1-hello-interval <1–600> Configures the IS-IS interface level 1 hello interval. The default
value is 9 seconds.
Use the no or default options to set this parameter to the
default value of 9 seconds.
l1-hello-multiplier <1–600> Configures the IS-IS interface level 1 hello multiplier. The
default value is 3 seconds.
Use the no or default options to set this parameter to the
default value of 3 seconds.
Procedure
Example
Switch:1# show isis interface
===================================================================================================================
ISIS Interfaces
===================================================================================================================
IFIDX TYPE LEVEL OP-STATE ADM-STATE ADJ UP-ADJ SPBM-L1 OP-SPBM- ORIGIN AREA AREA-NAME
-METRIC L1-METRIC
--------------------------------------------------------------------------------------------------------------------
Mlt2 pt-pt Level 1 UP UP 1 1 10 10 CONFIG HOME area-9.00.02
Port1/21 pt-pt Level 1 UP UP 1 1 10 10 CONFIG HOME area-9.00.02
Variable Definitions
The following table defines parameters for the show isis interface command.
Variable Value
home Displays the IS-IS interface information that the system
configures in the home area.
l1 Displays the interface information for Level 1.
l2 Displays the interface information for Level 2.
l12 Displays the interface information for Level 1 and Level 2.
remote Displays the IS-IS interface information that the system
configures in the remote area.
The following table defines parameters for the show isis ini-auth command.
Variable Value
home Displays the IS-IS interface authentication information
that the system configures in the home area.
remote Displays the IS-IS interface authentication information
that the system configures in the remote area.
The following table defines parameters for the show isis ini-timer command.
Variable Value
home Displays the IS-IS interface timer information that the
system configures in the home area.
remote Displays the IS-IS interface timer information that the
system configures in the remote area.
The following table defines parameters for the show isis ini-ckt-level command.
Variable Value
home Displays the IS-IS interface circuit level parameters that
the system configures in the home area.
remote Displays the IS-IS interface circuit level parameters that
the system configures in the remote area.
In SPBM, Backbone MAC (B-MAC) addresses are carried within the IS-IS link-state database. To do this,
SPBM supports an IS-IS Type-Length-Value (TLV) that advertises the Service Instance Identifier (I-SID)
and B-MAC information across the network. Each node has a System ID, which also serves as B-MAC of
the switch. These B-MAC addresses are populated into the SPBM Forwarding Information Base (FIB).
When the network topology is discovered and stored in the IS-IS link-state database, each node
calculates shortest path trees for each source node, so that a unicast path now exists from every node
to every other node. With this information, each node populates unicast information received from
SPBM into the FIB for forwarding purposes.
I-SIDs are only used for virtual services (Layer 2 VSNs and Layer 3 VSNs). If you only enable IP Shortcuts
on the Backbone Edge Bridges, I-SIDs are never exchanged in the network as IP Shortcuts allow Global
Routing Table (GRT) IP networks to be transported across IS-IS.
The show isis spbm ip-unicast-fib or show isis spbm ipv6-unicast-fib command
displays all of the IS-IS routes in the IS-IS LSDB. The IP ROUTE PREFERENCE column in the show output
displays the IP route preference.
Routes within the same VSN are added to the LSDB with a default preference of 7. Inter-VSN routes are
added to the LSDB with a route preference of 200. IS-IS accept policies enable you to change the route
preference for incoming routes. If the same route is learned from multiple sources with different route
preferences, then the routes are not considered equal cost multipath (ECMP) routes. The route with the
lowest route preference is the preferred route. In Layer 2, in the event of a tie-break between routes
from multiple sources, the tie-breaking is based on cost and hop count.
Procedure
Examples
Switch# show isis spbm ip-unicast-fib
================================================================================================================
SPBM IP-UNICAST FIB ENTRY INFO
================================================================================================================
VRF DEST OUTGOING SPBM PREFIX PREFIX IP ROUTE
VRF ISID ISID Destination NH BEB VLAN INTERFACE COST COST TYPE PREFERENCE AREA AREA-NAME
----------------------------------------------------------------------------------------------------------------
GRT - - 10.133.136.0/24 4K3(*) 4058 1/3 10 1 Internal 7 HOME area-9.00.02
GRT - - 10.133.136.0/24 4K3(*) 4059 1/3 10 1 Internal 7 HOME area-9.00.02
GRT - - 10.133.136.0/24 4K4(*) 4058 to_4k4 10000 1 Internal 7 HOME area-9.00.02
GRT - - 10.133.136.0/24 4K4(*) 4059 to_4k4 10000 1 Internal 7 HOME area-9.00.02
----------------------------------------------------------------------------------------------------------------
Home : Total number of SPBM IP-UNICAST FIB entries 4
Remote: Total number of SPBM IP-UNICAST FIB entries 0
----------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------
Home: Total number of SPBM UNICAST FIB entries 5
Remote: Total number of SPBM UNICAST FIB entries 0
--------------------------------------------------------------------------------------------------
Variable Definitions
The following table defines parameters for the show isis spbm ip-unicast-fib command.
Variable Value
all Displays entries for the Global Routing Table (GRT) and all Virtual Routing and
Forwarding (VRF) instances.
Note:
If you use the command show isis spbm ip-unicast-fib the device
displays only GRT entries. The command shows IP routes from remote Backbone
Edge Bridges (BEBs).
home Displays the IS-IS SPBM IP unicast Forwarding Information Base (FIB)
information that the system configures in the home area.
id <1–16777215> Displays IS-IS SPBM IP unicast FIB information by Service Instance Identifier
(I-SID) ID.
Variable Value
remote Displays the IS-IS SPBM IP unicast FIB information that the system configures in
the remote area.
spbm-nh-as-mac Displays the next hop B-MAC of the IP unicast FIB entry.
The following table defines parameters for the show isis spbm ipv6-unicast-fib command.
Variable Value
all Displays entries for the Global Routing Table (GRT) and all Virtual Routing and
Forwarding (VRF) instances.
Note:
If you use the command show isis spbm ipv6-unicast-fib the device
displays only GRT entries. The command shows IPv6 routes from remote
Backbone Edge Bridges (BEBs).
home Displays the IS-IS SPBM IPv6 unicast Forwarding Information Base (FIB)
information that the system configures in the home area.
id <1–16777215> Displays IS-IS SPBM IPv6 unicast FIB information by Service Instance Identifier
(I-SID) ID.
remote Displays the IS-IS SPBM IPv6 unicast FIB information that the system configures
in the remote area.
spbm-nh-as-mac Displays the next hop as MAC of the IPv6 unicast FIB entry.
The following table defines parameters for the show isis spbm unicast-fib command.
Variable Value
b-mac Displays the FIB for the specified BMAC.
<0x00:0x00:0x00:0x00:0x00:0x00>
home Displays the IS-IS SPBM unicast Forwarding
Information Base (FIB) information that the system
configures in the home area.
remote Displays the IS-IS SPBM unicast FIB information that
the system configures in the remote area.
vlan <1-4059> Displays the FIB for the specified SPBM VLAN.
summary Displays a summary of the FIB.
The following table defines parameters for the show isis spbm unicast-tree command.
Variable Value
<1-4059> Specifies the SPBM B-VLAN ID.
destination <xxxx.xxxx.xxxx> Displays the unicast tree for the specified destination.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display the IS-IS LSDB:
show isis lsdb [level {l1|l2|l12}] [sysid <xxxx.xxxx.xxxx>] [lspid
<xxxx.xxxx.xxxx.xx-xx>] [tlv <1–236>] [detail] [home|remote]
3. Display IS-IS adjacencies:
show isis adjacencies [home|remote]
4. Clear IS-IS LSDB:
clear isis lsdb
Example
Switch:1# show isis lsdb
================================================================================
ISIS LSDB
================================================================================
LSP ID LEVEL LIFETIME SEQNUM CHKSUM HOST-NAME AREA
--------------------------------------------------------------------------------
0014.c7e1.33df.00-00 1 545 0xb1 0xed28 NewYork HOME
0016.ca23.73df.00-00 1 1119 0x9f 0x9c9d Switch-Lab2 HOME
0018.b0bb.b3df.00-00 1 708 0xb9 0xcb1a Switch-Lab1 HOME
--------------------------------------------------------------------------------
Level-1 HOME AREA: 3 out of 3 Total Num of LSP Entries
Level-1 REMOTE AREA: 0 out of 3 Total Num of LSP Entries
Level-2 HOME AREA: 0 out of 0 Total Num of LSP Entries
Level-2 REMOTE AREA: 0 out of 3 Total Num of LSP Entries
----------------------------------------------------------------------------------------------------
Home: 3 out of 3 interfaces have formed an adjacency
Remote: 0 out of 0 interfaces have formed an adjacency
----------------------------------------------------------------------------------------------------
================================================================================
ISIS LSDB (DETAIL)
================================================================================
--------------------------------------------------------------------------------
Metric: 10
Metric: 10
Metric: 10
Metric: 10
Metric: 10
Metric: 10
num of trees: 2
vid tuple : u-bit 1 m-bit 1 ect-alg 0x80c201 base vid 1000
vid tuple : u-bit 1 m-bit 1 ect-alg 0x80c202 base vid 1001
TLV:144 SUB-TLV 3 ISID:
Instance: 0
Metric: 0
B-MAC: 00-00-bc-b1-00-03
BVID:1000
Number of ISID's:8
3001(Both),3002(Rx),3003(Both),3004(Rx),4001(Both),4002(
Rx),4003(Both),4004(Rx)
Instance: 0
Metric: 0
B-MAC: 00-00-bc-b1-00-03
--More-- (q = quit)
Variable Definitions
The following table defines parameters for the show isis lsdb command.
Variable Value
detail Displays detailed information.
home Displays the IS-IS LSDB information that the system
configures in the home area.
level {l1|l2|l12}] Displays the LSDB for the specified level: l1, l2, or l12.
local Displays IS-IS local LSDB information.
remote Displays the IS-IS LSDB information that the system
configures in the remote area.
sysid <xxxx.xxxx.xxxx> Displays the LSDB for the specified system ID.
lspid <xxxx.xxxx.xxxx.xx- Displays the LSDB for the specified LSP ID.
xx>
tlv <1–236> Displays the LSDB by TLV type.
The following table defines parameters for the show isis adjacencies command.
Variable Value
home Displays the IS-IS adjacencies that the system configures
in the home area.
remote Displays the IS-IS adjacencies that the system configures
in the remote area.
The following table defines parameters for the clear isis command.
Variable Value
lsdb Clears the IS-IS Link State Database (LSDB). The command clears learned LSPs only. The
command does not clear local generated LSPs. As soon as the platform clears the LSDB
the LSP synchronization process starts immediately and the LSDB synchronizes with its
neighbors.
Procedure
1. Display IS-IS system statistics:
show isis statistics
2. Display IS-IS interface counters:
show isis int-counters [home|remote]
3. Display IS-IS level 1 control packet counters:
show isis int-l1-cntl-pkts [home|remote]
Note
The switch uses level 1 IS-IS. The switch does not support level 2 IS-IS. The command show
isis int-l2-contl-pkts is not supported because the IEEE 802.1aq standard
currently only defines the use of one hierarchy, Level 1.
Example
Switch:1# show isis statistics
======================================================================================================
ISIS System Stats
======================================================================================================
LEVEL CORR AUTH AREA MAX SEQ SEQ NUM OWN LSP BAD ID PART LSP DB AREA AREA-NAME
LSPs FAILS DROP EXCEEDED SKIPS PURGE LEN CHANGES OLOAD
------------------------------------------------------------------------------------------------------
Level-1 0 0 0 0 1 0 0 0 0 HOME area-9.00.02
Level-1 0 0 0 0 1 0 0 0 0 REMOTE area-9.00.02
Variable Definitions
The following table defines parameters for the show isis int-counters command.
Variable Value
home Displays the IS-IS interface counters that the system
configures in the home area.
remote Displays the IS-IS interface counters that the system
configures in the remote area.
The following table defines parameters for the show isis int-l1-cntl-pkts command.
Variable Value
home Displays the IS-IS L1 control packet counters that the system
configures in the home area.
remote Displays the IS-IS L1 control packet counters that the system
configures in the remote area.
The following table defines parameters for the clear isis stats command.
Variable Value
error-counters Clears IS-IS stats error-counters.
packet-counters Clears IS-IS stats packet-counters.
The switch must be in the factory default state. When you start the install script, the switch displays a
prompt to remind you to do this.
Procedure
configure terminal
2. Run the install script:
run vms layer-2 switch <5–99> [syntax]
The script uses the value that you assign to the switch number (between 5 and 99) to seed unique
values in the configuration script.
Examples
The following example shows the complete output of the install script without the syntax parameter.
As you can see, there is no indication that the script encountered any errors.
Switch:1>enable
Switch:1#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Do you want to execute the run vms layer-2 script? Device needs to be in factory default
state. (y/n) ? y
The following example displays the output of the script using the syntax parameter. This example is
only a small sample of the output, but it shows how the script reports warnings and errors it encounters.
Switch:1>enable
Switch:1#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Do you want to execute the run vms layer-2 script? Device needs to be in factory default
state. (y/n) ? y
Switch:1(config)# spbm
Switch:1(config)# spbm ethertype 0x8100
Switch:1(config)# router isis
Switch:1(config-isis)# spbm 1
Switch:1(config)# exit
Variable Definitions
The following table defines parameters for the run vms layer-2 switch command.
Variable Value
<5-99> Specifies a switch value, which is then used as a common
element to configure switch parameters such as nickname,
VLAN ID, SPB and IP parameters.
This switch value is also used in the name of the saved
configuration file. For example, 6 is the switch value in vms-
layer2-switch-6.cfg
syntax Species that the switch displays all the commands run by the
script on the console. Use this parameter to see errors that
the script encounters.
Note:
The script does not stop if it encounters errors. To verify that
the script runs without errors, use the syntax parameter to
display errors or conflicting configurations on the switch.
To temporarily disable duplicate detection on the replacement switch, perform the following steps:
Procedure
1. Copy the configuration file of the original switch to the replacement switch.
2. Power up the replacement switch while it is not connected to the SPB network, that is, network-to-
network interface (NNI) ports are not connected.
3. Disable IS-IS on the original switch, or remove the switch from the network.
4. On the replacement switch, enter the following Global Configuration command to suspend duplicate
detection for up to 21 minutes:
isis dup-detection-temp-disable
5. To check the remaining time, use the show isis dup-detection-temp-disable
remaining time command.
6. Remove the original switch from the network.
7. Connect the replacement switch to the network.
Use this procedure to specify a nickname prefix for Dynamic Nickname Assignment.
Note
You must disable Dynamic Nickname Assignment before you can change the nickname prefix.
Procedure
configure terminal
2. Configure the Dynamic Nickname Assignment nickname allocation:
spbm nick-name server prefix x.xx.xx
3. Enable Dynamic Nickname Assignment:
spbm nick-name server
4. Verify the configuration:
show spbm
Examples
Dynamic Nickname Assignment configuration values and their associated behavior are shown in the
following output from the show spbm command:
Switch:1>show spbm
spbm : enable
ethertype : 0x8100
nick-name server : enable
nick-name allocation : static
nick-name server range : C.30.00-C.3F.FF
Variable Definitions
The following table defines parameters for the spbm nick-name server command.
Variable Value
prefix x.xx.xx Specifies the nickname server allocation prefix. x.xx.xx uses the form
X.X0.00 from 0.00.00 to F.F0.00. A group, X.X0.00 to X.XF.FF, can
provide up to 4,096 nicknames. The default nickname allocation
range is A.00.00-A.0F.FF.
Use this procedure to display the current status and values for Dynamic Nickname Assignment.
Procedure
Example
Switch:1>show spbm
spbm : enable
ethertype : 0x8100
nick-name server : disable
nick-name allocation : static
nick-name server range : A.00.00-A.0F.FF
Note
This procedure does not apply to VSP 8600 Series or XA1400 Series.
You must configure a nickname for the specific SPBM instance on which you enable MSTP-Fabric
Connect Multi Homing.
Perform this procedure to enable MSTP-Fabric Connect Multi Homing for a specific SPBM instance.
Procedure
configure terminal
router isis
2. Enable MSTP-Fabric Connect Multi Homing on a specified SPBM instance:
spbm <1-100> stp-multi-homing enable
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis
Switch:1(config-isis)#spbm 1 stp-multi-homing enable
Variable definitions
Variable Value
<1–100> Specifies the IS-IS SPBM instance ID to create an SPBM instance.
stp-multi-homing Enables MSTP-Fabric Connect Multi Homing on the specific SPBM
enable instance. The default is disabled.
When you enable MSTP-Fabric Connect Multi Homing, you can use the following two commands to
determine which BEB is the root bridge:
• show spanning-tree mstp status
• show i-sid mac-address-entry 16777003
Procedure
Example
In the following example, bold text identifies the relevant information in the command output. In the
output of the second command, the DEST-MAC shows 10:cd:ae:6e:d8:84, which is the system ID of the
CIST regional root BEB, and the system name is BEB-1000.
Switch:1>show spanning-tree mstp status
==========================================================================================
MSTP Status
==========================================================================================
------------------------------------------------------------------------------------------
Bridge Address : b0:ad:aa:4d:b8:00
Cist Root : 80:00:10:cd:ae:6e:d8:00
Cist Regional Root : 80:00:10:cd:ae:6e:d8:00
Cist Root Port : fabric
Cist Root Cost : 0
Cist Regional Root Cost : 2000000
Cist Instance Vlan Mapped : 1-1024
Cist Instance Vlan Mapped2k : 1025-2048
Cist Instance Vlan Mapped3k : 2049-3072
Cist Instance Vlan Mapped4k : 3073-4050,4053-4059
Cist Max Age : 20 seconds
Cist Forward Delay : 15 seconds
Switch:1>show i-sid mac-address-entry 16777003
===========================================================================================================================================
I-SID Fdb Table
===========================================================================================================================================
I-SID STATUS MAC-ADDRESS INTERFACE TYPE DEST-MAC BVLAN DEST-SYSNAME AREA-ROLE AREA-NAME
-------------------------------------------------------------------------------------------------------------------------------------------
16777003 learned 10:cd:ae:6e:d8:82 Port-1/9 NON-LOCAL 10:cd:ae:6e:d8:84 4051 BEB-1000 HOME
area-20.0020
16777003 learned 10:cd:ae:db:a4:83 Port-1/40 NON-LOCAL 10:cd:ae:db:a4:84 4051 7208 HOME area-20.0020
16777003 learned b0:ad:aa:40:14:82 Port-1/40 NON-LOCAL b0:ad:aa:40:14:84 4051 6222 REMOTE area-20.0020
The tunnel source IP address can be a brouter port IP, a CLIP IP, or a VLAN IP.
Note
Product Notice: Except VSP 8600 Series, all product series support a VLAN IP as the Fabric
Extend tunnel source IP address.
For information about product support, see Fabric Extend Considerations on page 969.
If using the tunnel originating address on the GRT, Fabric Extend has the following requirements:
• The tunnel source IP address must be on the GRT, not on a VRF.
Note
A best practice is to use separate IP addresses for the SPBM IP Shortcuts ip-source-
address command and the Fabric Extend ip-tunnel-source-address command.
However, if you want these IP addresses to be the same, you MUST exclude the ip-
source-address address with an IS-IS accept policy. You cannot use the redistribute
command with a route map exclusion.
Specify a CLIP interface to use as the source address for SPBM IP shortcuts.
• If IP Shortcuts is enabled, you must configure an IS-IS accept policy or exclude route-map to ensure
that tunnel destination IP addresses are not learned through IS-IS.
If you are using the tunnel originating address on a VRF, Fabric Extend has the following requirements:
• Configure a CLIP and tunnel source IP address on the VRF.
• Remote management of the VSP 4450 Series is only possible after establishing IP Shortcut over
IS-IS. (Alternatively, you can enable GRT-VRF redistribution locally.)
Configuring Fabric Extend consists of two primary tasks: configuring the tunnel source address and
configuring the logical interface. These tasks must be completed on both ends of the tunnel.
The VSP 4450 Series source address command is different from other platforms. Also note that the
logical interface commands are different between Layer 2 and Layer 3 networks.
Note
VRF is an optional parameter. If a VRF is not configured, then FE uses the GRT.
Procedure
configure terminal
router isis
2. Configure the IP tunnel source address:
ip-tunnel-source-address <A.B.C.D> [vrf WORD<1–16>] [overlay]
3. Enter Global Configuration mode:
exit
4. Use one of the following commands to create a logical IS-IS interface:
• In a network with a Layer 3 Core, enter logical-intf isis <1–255> dest-ip
<A.B.C.D> [name WORD<1–64>] [mtu <750-9000>]
• In a network with a Layer 2 Core, enter logical-intf isis <1–255> vid <list
of vids> primary-vid <2–4059> port <slot/port> mlt <mltId> [name
WORD<1–64>] [mtu <750-9000>]
Note
The primary VLAN ID (primary-vid must be one of the VIDs in the vid <list of
vids>.
The following steps are for platforms that require an ONA to support FE:
Note
The interface VLAN connecting to the ONA network port is always in the GRT and the
member port that the VLAN is part of is always an access port.
configure terminal
router isis
6. Configure the IP tunnel source address on the port that connects to the Device side of the ONA:
ip-tunnel-source-address <A.B.C.D> port <slot/port> [mtu <mtu_value>]
[vrf WORD<1–16>]
7. Exit back into Global Configuration mode:
exit
Note
The primary VLAN ID (primary-vid) must be one of the VIDs in the vid <list
of vids>.
Variable Definitions
Variable Value
<A.B.C.D> Specifies the IS-IS IPv4 tunnel source address, which can be a
brouter interface IP, a CLIP IP, or a VLAN IP.
overlay Permits the configuration of the tunnel source address even though
it belongs to a VRF with an attached I-SID.
port <slot/port> Specifies the port that is connected to the ONA device port.
Note:
Exception: only supported on
VSP 4450 Series.
vrf WORD<1–16> Specifies the VRF name associated with the IP tunnel.
mtu <mtu_value> Specifies the Maximum Transmission Unit (MTU) size for each
packet. Different hardware platforms support different MTU ranges.
Note: Use the CLI Help to see the available range for the switch.
Exception: only supported on This parameter only applies to an ONA configuration.
VSP 4450 Series.
The following tables define parameters for the logical-intf isis command, depending on
whether you have a Layer 2 or Layer 3 core.
Note
This procedure only applies to XA1400 Series.
Use the following procedure to configure Fabric Extend (FE) over IPsec.
The tunnel source IP address can be a brouter port IP, a CLIP IP, or a VLAN IP.
Configuring Fabric Extend over IPsec consists of two primary tasks: configuring the tunnel source
address and configuring the logical interface. These tasks must be completed on both ends of the
tunnel.
For information about how to configure an IPsec NAT-T Responder, see IPsec configuration using CLI on
page 1780.
Procedure
Switch A Steps
1. Enter IS-IS Router Configuration mode:
enable
configure terminal
router isis
2. Configure the IP tunnel source address:
ip-tunnel-source-address <A.B.C.D> [vrf WORD<1–16>]
3. Enter Global Configuration mode:
exit
4. Use one of the following commands to create a logical IS-IS interface:
• In a network with a Layer 3 Core, enter logical-intf isis <1–255> dest-ip
<A.B.C.D> [name WORD<1–64>] [mtu <750-9000>]
5. Configure an IS-IS interface on the selected ports or MLTs:
Note
• You cannot change the encryption key length when IPsec is enabled on the FE tunnel.
By default, IPsec compression is disabled. If you enable it, you must enable it on both ends of the
adjacency.
10. Enable IPsec on the logical interface:
ipsec
11. Exit interface configuration mode:
exit
Switch B Steps
12. Enter IS-IS Router Configuration mode:
enable
configure terminal
router isis
13. Configure the IP tunnel source address:
ip-tunnel-source-address <A.B.C.D> [vrf WORD<1–16>]
14. Enter Global Configuration mode:
exit
15. Use one of the following commands to create a logical IS-IS interface:
• In a network with a Layer 3 Core, enter logical-intf isis <1–255> dest-ip
<A.B.C.D> [name WORD<1–64>] [mtu <750-9000>]
16. Configure an IS-IS interface on the selected ports or MLTs:
Note
• You cannot change the encryption key length when IPsec is enabled on the FE tunnel.
By default, IPsec compression is disabled. If you enable it, you must enable it on both ends of the
adjacency.
21. Enable IPsec on the logical interface:
ipsec
22. Exit interface configuration mode:
exit
Variable Definitions
The following table defines parameters to configure Fabric Extend (FE) over IPsec on a device.
Variable Value
<A.B.C.D> Specifies the IS-IS IPv4 tunnel source address,
which can be a brouter IP, a CLIP IP, or a VLAN
IP.
vrf WORD<1–16> Specifies the VRF name associated with the IP
tunnel.
Variable Value
enable Enables or disables the IS-IS circuit/interface on the specified port or MLT.
The default is disabled. Use the no option to disable IS-IS on the specified interface.
spbm <1–100> Enable the SPBM instance on the IS-IS interfaces.
Variable Value
WORD<1–32> Specifies the authentication key on the assigned logical interface if using a pre-shared
key.
Use the no option to disable the authentication key on the specified interface.
Variable Value
auth-method <pre-share Configures the authentication method for IPsec. The default is a
| rsa-sig> pre-shared key. Use rsa-sig to use an installed digital certificate
instead.
encryption-key-length Specifies the IPsec encryption key length for FE tunnel, which is 128
<128 | 256> bit or 256 bit.
The default IPsec encryption key length value is 128 bit.
Note
This procedure only applies to XA1400 Series.
Perform this procedure to configure a specific source IP address for the IPsec tunnel when you deploy
the XA1400 Series in an environment that requires more than one provider connection with IPsec.
The static source IP address for the IPsec tunnel cannot be the same as the global or dynamically
configured source IP address.
Procedure
configure terminal
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#logical-intf isis 3
Switch:1(config-isis-3-198.51.100.1)#ipsec tunnel-source-address type static 20.20.20.20
Switch:1(config-isis-3-198.51.100.1)#ipsec
Variable Definitions
The following table defines parameters for the ipsec tunnel-source-address type static
command.
Variable Value
{A.B.C.D} Specifies the manually configured source IP address for the IPsec tunnel.
The source IP address must be on the same VRF as the source IP address
for the IP tunnel.
Note
This procedure only applies to XA1400 Series.
Perform this procedure to dynamically obtain the source IP address for the IPsec tunnel from DHCP
when you deploy the XA1400 Series in an environment that requires more than one provider connection
with IPsec.
The static source IP address for the IPsec tunnel cannot be the same as the global or dynamically
configured source IP address.
Procedure
1. Enter Logical IS-IS Interface Configuration mode:
enable
configure terminal
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#logical-intf isis 3
Switch:1(config-isis-3-198.51.100.1)#ipsec tunnel-source-address type dhcp
Switch:1(config-isis-3-198.51.100.1)#ipsec
Note
This procedure only applies to XA1400 Series.
Configure the Encapsulating Security Payload (ESP) cipher suite for IPsec.
Procedure
configure terminal
Variable Definitions
The following table defines parameters for the ipsec esp command.
Variable Value
<aes128gcm16- Specifies the AES cipher with a 128-bit encryption key and GCM block
sha256> mode.
<aes256-sha256> Specifies the AES cipher with a 256-bit encryption key and CBC block
mode (for QAT performance mode).
<aes256gcm16- Specifies the AES cipher with a 256-bit encryption key and GCM block
sha256> mode.
Note
If you downgrade to an earlier release that does not support this feature, you must disable
the feature and save the configuration. Downgrading to an earlier release will require a
compatible configuration file.
Procedure
configure terminal
Example
Switch:1(config-isis-2-192.0.2.10)# no ipsec
Switch:1(config-isis-2-192.0.2.10)# no ipsec compression
Switch:1(config-isis-2-192.0.2.10)# ipsec
Switch:1(config-isis-2-192.0.2.10)#show isis logical-interface ipsec
=================================================================================
ISIS Logical Interface IPSec
=================================================================================
ID Authentication-Key Responder-Only Remote NAT IP Compression
---------------------------------------------------------------------------------
2 ****** False - False
---------------------------------------------------------------------------------
1 out of 2 Total Num of Logical ISIS interfaces
---------------------------------------------------------------------------------
Note
This procedure does not apply to VSP 8600 Series.
Perform this procedure to dynamically configure IS-IS hello padding on all IS-IS network-to-network
interface (NNI) links. IS-IS hello padding is enabled by default.
Disable hello padding if the WAN-line MTU is less than 1596 bytes and fragmentation and reassembly
functionality is enabled.
Procedure
configure terminal
router isis
2. Perform one of the following actions:
• Disable hello padding: no hello-padding
• Enable hello padding, if previously disabled: hello-padding
3. Verify the configuration:
show isis
Example
Note
This procedure only applies to XA1400 Series.
Configure IPsec fragmentation before encryption to avoid possible throughput penalty for sending
fragmented packets over the Internet.
Procedure
1. Enter Logical IS-IS Interface Configuration mode:
enable
configure terminal
Example
---------------------------------------------------------------------------------------------------------------------------------------
1 out of 1 Total Num of Logical ISIS interfaces
---------------------------------------------------------------------------------------------------------------------------------------
======================================================================================================================
IPSec Tunnel General Info
======================================================================================================================
IPSec tunnel global source-ip-address : 203.0.113.1
======================================================================================================================
ISIS IPSec Tunnels
======================================================================================================================
Note
This procedure only applies to XA1400 Series.
If you downgrade to an earlier release that does not support this feature, you must disable the feature
and save the configuration. You must have a compatible configuration file if you downgrade to an earlier
release.
Procedure
1. Enter Logical IS-IS Interface Configuration mode:
enable
configure terminal
Example
Disable IPsec and IPsec fragementation before encryption and verify the configuration:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#logical-intf isis 2
Switch:1(config-isis-2-192.168.20.1)#no ipsec
Switch:1(config-isis-2-192.168.20.1)#no ipsec fragment-before-encrypt
Switch:1(config-isis-2-192.168.20.1)#ipsec
Switch:1(config-isis-2-192.168.20.1)#show isis logical-interface ipsec
========================================================================================================================================
ISIS Logical Interface IPSec
========================================================================================================================================
ID Status Auth-Method Auth-Key ESP Responder-Only Remote NAT IP Auth-Key-Len Compression Frag-before-encrypt
-----------------------------------------------------------------------------------------------------------------------------------------
1 Enable RSA-SIG ****** aes128gcm16-sha256 False - 128 False False
-----------------------------------------------------------------------------------------------------------------------------------------
1 out of 1 Total Num of Logical ISIS interfaces
-----------------------------------------------------------------------------------------------------------------------------------------
======================================================================================================================
IPSec Tunnel General Info
======================================================================================================================
IPSec tunnel global source-ip-address : 203.0.113.1
======================================================================================================================
ISIS IPSec Tunnels
======================================================================================================================
----------------------------------------------------------------------------------------------------------------------
1 out of 1 Total Num of Logical ISIS interfaces
Note
This procedure only applies to VSP 4900 Series, VSP 7400 Series, and XA1400 Series.
Adjust the TCP maximum segment size (MSS) to improve the throughput for the TCP session over a
Fabric Extend (FE) adjacency.
Note
If you downgrade to an earlier release that does not support this feature, you must disable the
feature and save the configuration. Downgrading to an earlier release requires a compatible
configuration file.
Procedure
configure terminal
2. Use one of the following commands to configure the MSS adjustment functionality as required:
a. Configure an explicit MSS adjust value:
ip tcp adjust-mss <max-segment-size> [enable]
b. Disable MSS adjustment explicitly:
no ip tcp adjust-mss enable
c. Disable a configured MSS adjustment value and return to the auto-derived value:
Note
An auto-derived value is only supported on XA1400 Series.
Examples
Disable the configured MSS adjustment value on XA1400 Series and verify the configuration:
.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#no ip tcp adjust-mss enable
Switch:1(config)#show ip tcp adjust-mss
============================================================================
IP TCP Adjust MSS
============================================================================
ENABLE STATUS TCP MSS TCP MSS
TYPE VALUE
----------------------------------------------------------------------------
TRUE ACTIVE AUTO-DERIVED 1300
Procedure
Procedure
configure terminal
2. Enable BFD:
router bfd enable
3. In the VLAN Interface Configuration mode, you can enable BFD:
ip bfd enable
4. In the Loopback Interface Configuration mode, you can enable BFD:
ip bfd enable
5. Enable BFD on an IS-IS Logical Interface:
logical-intf isis <1–255> bfd enable
Example
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display the IS-IS logical interfaces:
show isis logical-interface [name | ipsec | shaper | mtu]
Examples
Example showing the status of BFD configurations on the IS-IS Logical interface
Switch:1> show isis logical-interface
==============================================================================================
ISIS Logical Interfaces
==============================================================================================
IFIDX NAME ENCAP L2_INFO TUNNEL L3_TUNNEL_NEXT_HOP_INFO BFD
TYPE PORT/MLT VIDS(PRIMARY) DEST-IP PORT/MLT VLAN VRF STATUS
-----------------------------------------------------------------------------------------------
1 tunnel01 IP -- -- 198.51.100.1 Port1/2 123 vrf30 disabled
2 tunnel102 IP -- -- 198.51.100.2 Port1/3 345 vrf20 disabled
-----------------------------------------------------------------------------------------------
2 out of 2 Total Num of Logical ISIS interfaces
-----------------------------------------------------------------------------------------------
The command show isis logical-interface truncates the IS-IS logical interface name to the
first 16 characters. To view the entire name (up to a maximum of 64 characters), use the command
show isis logical-interface name.
Switch:1> show isis logical-interface name
========================================================================================
ISIS Logical Interface name
========================================================================================
ID NAME
----------------------------------------------------------------------------------------
1 SPBoIP_T1
2 SPBoIP_T2
3 SPBoIP_4K5
6 This_Is_A_50_Character_ISIS_Logical_Interface_Name
----------------------------------------------------------------------------------------
4 out of 4 Total Num of Logical ISIS interfaces
----------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------
1 out of 1 Total Num of Logical ISIS interfaces
---------------------------------------------------------------------------------------------------------------------------------------
======================================================================================================================
IPSec Tunnel General Info
======================================================================================================================
IPSec tunnel global source-ip-address : 203.0.113.1
======================================================================================================================
ISIS IPSec Tunnels
======================================================================================================================
Display the IS-IS logical interface egress shaping rate values. This command displays interfaces with
egress shaping rates configured.
Switch:1>show isis logical-interface shaper
========================================================================================
ISIS Logical Interface Egress Shaping Rate
========================================================================================
ID NAME service-rate(Mbps)
----------------------------------------------------------------------------------------
1 remote1 135
2 remote2 120
3 remote3 178
----------------------------------------------------------------------------------------
3 out of 3 Total Num of Logical ISIS interfaces
----------------------------------------------------------------------------------------
This command displays the Maximum Transmission Unit (MTU) size for each logical interface.
Switch:1>show isis logical-interface mtu
========================================================================================
ISIS Logical Interface Mtu
========================================================================================
ID NAME MTU
----------------------------------------------------------------------------------------
1 SPBoIP_T1 751
2 SPBoIP_T2 1000
3 SPBoIP_4K5 1950
----------------------------------------------------------------------------------------
3 out of 3 Total Num of Logical ISIS interfaces
----------------------------------------------------------------------------------------
Variable Definitions
The following table defines parameters for the show isis logical-interface command.
Variable Value
name Displays the full name of the IS-IS logical interface (up to a
maximum of 64 characters).
ipsec Displays the IS-IS logical interface ID and IPsec
authentication key.
shaper Displays the IS-IS logical interface egress shaping rate
values. Only interfaces that have egress shaping rates
configured display.
Procedure
Example
Switch:1>show ip bfd neighbors vrf vrf30
========================================================================================================================
BFD Session - VRF vrf30
========================================================================================================================
MY_DISC YOUR_DISC NEXT_HOP STATE MULTI MIN_TX MIN_RX ACT_TX DETECT_TIME REMOTE_STATE APP RUN
Perform this procedure to configure the global source IP address for IPsec tunnel on the switch.
Note
Product Notice: This procedure only applies to XA1400 Series switches.
Procedure
configure terminal
router isis
2. Configure the source IP address for IPsec tunnel:
ipsec tunnel-source-address {A.B.C.D}
Note
You must configure the source IP address for IPsec tunnel on the same VRF as the source
address for IP tunnel.
Example
Configuring source IP address for IPsec tunnel.
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis
Switch:1(config-isis)#ipsec tunnel-source-address 192.0.2.10
Variable Definitions
The following table defines the variable for ipsec tunnel-source-address command.
Variable Value
{A.B.C.D} Specifies the global IP address for IPsec tunnel, which is configured on the
same VRF as the source address for IP tunnel.
Perform this procedure to configure the destination IP address for the IPsec tunnel on a specific IS-IS
logical interface on the switch.
Note
Product Notice: This procedure only applies to XA1400 Series switches.
Procedure
configure terminal
Example
Configuring destination IP address for IPsec tunnel.
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#logical-intf isis 1
Switch:1(config-isis-1-192.0.2.25)ipsec tunnel-dest-ip 192.0.2.30
Variable Definitions
The following table defines the variable for ipsec tunnel-dest-ip command.
Variable Value
{A.B.C.D} Specifies destination IP address for the IPsec tunnel on a specific IS-IS
logical interface.
Note:
When you configure the destination IP address for the IPsec tunnel, IKE
protocol uses UDP port 500. However, if IPsec NAT-T is detected, IKE
protocol uses UDP port 4500 instead.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable FA:
fa enable
3. (Optional) Disable FA:
no fa enable
Caution
Disabling FA flushes all FA element discovery and mappings.
Example
Switch:1>en
Switch:1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#fa enable
Switch:1>show fa
================================================================================
Fabric Attach Configuration
================================================================================
FA Service : enabled
FA Element Type : server
FA Assignment Timeout : 240
FA Discovery Timeout : 240
FA Provision Mode : spbm
Switch:1>show fa agent
================================================================================
Fabric Attach Configuration
================================================================================
FA Service : enabled
FA Element Type : server
Procedure
configure terminal
2. Configure the FA discovery time-out in seconds:
fa discovery-timeout <45–480>
Note
The discovery time-out must be greater than or equal to the assignment time-out.
Example
=======================================================================
Fabric Attach Configuration
=======================================================================
FA Service : enabled
FA Element Type : server
FA Assignment Timeout : 45
FA Discovery Timeout : 50
FA Provision Mode : spbm
Variable definitions
Variable Value
<45–480> Specifies the Fabric Attach discovery time-out in seconds.
The default value is 240 seconds.
Procedure
configure terminal
2. Configure the FA assignment time-out in seconds:
fa assignment-timeout <45–480>
Note
The assignment time-out must be less than or equal to the discovery time-out.
Example
======================================================================
Fabric Attach Configuration
======================================================================
FA Service : enabled
FA Element Type : server
FA Assignment Timeout : 50
FA Discovery Timeout : 240
FA Provision Mode : spbm
Variable definitions
Variable Value
<45–480> Specifies the Fabric Attach assignment time-out in seconds.
The default value is 240 seconds.
On the FA Server, FA is enabled globally by default. However, you must explicitly enable FA on the
desired port or MLT interface. FA is successfully enabled on an MLT only if all ports of the MLT have FA
successfully enabled. Enabling FA automatically configures LLDP on all ports. Tagging is configured and
spanning tree is disabled.
Procedure
1. Enter Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Caution
Disabling FA flushes all FA element discovery and I-SID-to-VLAN mappings associated
with the interface.
Example
Enable FA on a port:
Switch:1>en
Switch:1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#interface gigabitethernet 1/2
Switch:1(config-if)#fa enable
Switch:1(config-if)#exit
Switch:1(config)#
Enable FA on an MLT:
Switch:1>en
Switch:1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#interface mlt 10
Switch:1(config-mlt)#fa enable
Switch:1(config-mlt)#exit
Switch:1(config)#
Note
When FA is enabled, message authentication is enabled by default. The authentication key is
set to the default value and displays encrypted on the output.
Switch:1>show fa interface
=====================================================================
Fabric Attach Interfaces
=====================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
---------------------------------------------------------------------
Port2/10 enabled 0 0 enabled ****
Port4/6 enabled 0 0 enabled ****
Port4/11 enabled 0 0 enabled ****
Mlt2 enabled 0 0 enabled ****
---------------------------------------------------------------------
4 out of 4 Total Num of fabric attach interfaces displayed
---------------------------------------------------------------------
===================================================================
Fabric Attach Interfaces
===================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
-------------------------------------------------------------------
Port1/1 disabled 0 0 enabled ****
Port1/2 enabled 0 0 enabled ****
Mlt1 disabled 0 0 enabled ****
Mlt10 enabled 0 0 enabled ****
-------------------------------------------------------------------
4 out of 4 Total Num of fabric attach interfaces displayed
-------------------------------------------------------------------
======================================================================
Fabric Attach Interfaces
======================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH
ORIGIN
STATUS ISID CVID STATUS KEY
----------------------------------------------------------------------
Port1/2 enabled 0 0 enabled ****
Mlt10 enabled 0 0 enabled ****
----------------------------------------------------------------------
2 out of 2 Total Num of fabric attach interfaces displayed
----------------------------------------------------------------------
Verify that both FA and FA message authentication are disabled on 1/1 and Mlt1, as indicated by the
SERVER STATUS and MSG AUTH STATUS fields respectively.
Switch:1(config)#show fa interface
===================================================================
Fabric Attach Interfaces
===================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
-------------------------------------------------------------------
Port1/1 disabled 0 0 disabled ****
Port1/2 enabled 0 0 enabled ****
Mlt1 disabled 0 0 disabled ****
Mlt10 enabled 0 0 enabled ****
-------------------------------------------------------------------
4 out of 4 Total Num of fabric attach interfaces displayed
-------------------------------------------------------------------
=======================================================================
Fabric Attach Interfaces
=======================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
-----------------------------------------------------------------------
Port1/1 disabled 0 0 disabled ****
Mlt1 disabled 0 0 disabled ****
-----------------------------------------------------------------------
2 out of 2 Total Num of fabric attach interfaces displayed
-----------------------------------------------------------------------
Variable definitions
The following table defines parameters for the show fa interface command.
Variable Value
disabled-auth Displays the FA interfaces (port or MLT) that have
authentication disabled.
enabled-auth Displays the FA interfaces (port or MLT) that have
authentication enabled.
<1–512> The valid range for MLT ID.
Displays FA configuration on the specified MLT interface.
port {slot/port[/sub-port] [- Identifies the slot and port in one of the following formats:
slot/port[/sub-port]] [,...]} a single slot and port (slot/port), a range of slots and
ports (slot/port-slot/port), or a series of slots and ports
(slot/port,slot/port,slot/port). If the platform supports
channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
Displays FA configuration on the specified port.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Note
When FA is enabled, message authentication is enabled by default. The authentication key
is set to the default value and displays encrypted on the output.
Example
Switch:1>en
Switch:1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#
Switch:1(config-if)#fa message-authentication
Switch:1(config-if)#show fa interface port 1/2
==================================================================
Fabric Attach Interfaces
==================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
------------------------------------------------------------------
Port1/2 enabled 0 0 enabled ****
------------------------------------------------------------------
1 out of 1 Total Num of fabric attach interfaces displayed
------------------------------------------------------------------
Switch:1(config-if)#exit
Switch:1(config)#
===================================================================
Fabric Attach Interfaces
===================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
-------------------------------------------------------------------
Mlt10 enabled 0 0 enabled ****
-------------------------------------------------------------------
1 out of 1 Total Num of fabric attach interfaces displayed
-------------------------------------------------------------------
Switch:1(config-mlt)#exit
Switch:1(config)#
Switch:1(config-mlt)#show fa interface
===================================================================
Fabric Attach Interfaces
===================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
-------------------------------------------------------------------
Port1/2 enabled 0 0 disabled ****
Mlt10 enabled 0 0 disabled ****
-------------------------------------------------------------------
2 out of 2 Total Num of fabric attach interfaces displayed
-------------------------------------------------------------------
Ensure that:
• On the FA Server, FA is enabled globally and also on the interface.
• FA message authentication is enabled on the interface.
Note
By default, enabling FA enables message authentication. The authentication key is set to
the default value and the system displays the encrypted authentication key on the output.
Use this procedure to configure an FA authentication key on a specified port or on all ports of an MLT,
on the switch. If you do not configure an authentication key, the default value is used. If you specify a
key, the default value is overridden and is stored in encrypted format in a separate file other than the
configuration file, when you execute the save config command.
Caution
For an FA Client or an FA Proxy device to successfully authenticate and attach to the
FA Server, the authentication key must match on both the client and the server. If the
authentication key is changed on the FA Server switch, it must correspondingly be changed
on the FA Client or Proxy attached to it, for FA to operate properly.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Switch:1>en
Switch:1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Enable FA and message authentication on a port. Configure the authentication key phone-network
on the port.
Switch:1(config)#interface gigabitEthernet 1/2
Switch:1(config-if)#fa enable
Switch:1(config-if)#fa message-authentication
Switch:1(config-mlt)#fa authentication-key phone-network
Switch:1(config-if)#exit
Switch:1(config)#
Enable FA and message authentication on an MLT. Configure the authentication key client-network
on the MLT.
Switch:1(config)#interface mlt 10
Switch:1(config-mlt)#fa enable
Switch:1(config-mlt)#fa message-authentication
Switch:1(config-mlt)#fa authentication-key client-network
Verify configuration of the FA authentication key. The system displays the encrypted authentication key
on the output.
Switch:1(config-if)#show fa interface
===================================================================
Fabric Attach Interfaces
===================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
-------------------------------------------------------------------
Port1/2 enabled 0 0 enabled ****
MLT10 enabled 0 0 enabled ****
-------------------------------------------------------------------
2 out of 2 Total Num of fabric attach interfaces displayed
-------------------------------------------------------------------
Variable Definitions
Variable Value
WORD<0–32> Specifies the authentication key on the port or MLT.
This command applies to all traffic sent or received on a port or MLT, carrying the VLAN ID specified
using the c-vid parameter. This parameter is optional.
Depending on whether the c-vid parameter is specified or not, the behavior is as follows:
• If you specify the c-vid parameter, the FA Server transmits this VLAN ID as the management
VLAN in the FA Element TLV. A client or proxy receiving this TLV uses this VLAN-ID for management
traffic on the FA Server uplink.
• If you do not specify the c-vid parameter, the FA Server transmits a management VLAN with a
VLAN ID value of 4095 in the FA Element TLV. A client or proxy receiving this TLV uses untagged
traffic for network management on the FA Server uplink.
An FA management I-SID can have a platform VLAN associated with it. For Layer 3 support on the
management I-SID, you must create a platform VLAN by port and associate the platform VLAN with the
management I-SID. The C-VID can be of the same value or of a different value than that of the platform
VLAN.
If the management I-SID matches one of the FA Switched UNI (ELAN) I-SIDs (as displayed by the
command show i-sid elan), then the platform VLAN is automatically associated with the FA-
enabled interface (port or MLT).
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Important
If you do not specify a C-VID value, the port or MLT is untagged.
3. Verify configuration of FA management on the port or MLT, using the following commands:
• show i—sid <i-sid>
• show interfaces gigabitEthernet i-sid [{slot/port[/sub-port] [-slot/
port[/sub-port]] [,...]}]
• show mlt i-sid [<1–512>]
Examples
Verify configuration of FA management on the MLT. Because the C-VID is not specified, the MLT
displays as untagged.
Switch:1(config-mlt)#show i-sid 101
========================================================================================
Isid Info
========================================================================================
ISID ISID PORT MLT ORIGIN ISID
ID TYPE VLANID INTERFACES INTERFACES NAME
----------------------------------------------------------------------------------------
101 ELAN 3 - u:10 CONFIG EXTRSERVER_101
In the following example, for Layer 3 support, create a platform VLAN 3 and associate it with the
management I-SID 101.
Switch:1(config-if)#vlan create 3 type port-mstprstp 0
Switch:1(config-if)#vlan i-sid 3 101
Switch:1(config)#show i-sid
====================================================================================================
Isid Info
====================================================================================================
ISID ISID PORT MLT ORIGIN ISID
ID TYPE VLANID INTERFACES INTERFACES NAME
----------------------------------------------------------------------------------------------------
15999999 ELAN 4048 - - C --- - --- - - Onboarding I-SID
16777001 ELAN N/A - - C --- - --- - - FAN-ISID
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense; R: multi-area redist
l: discover by local switch r: discover by remote VIST switch
Switch:1(config-if)#show vlan i-sid
====================================================================
Vlan I-SID
====================================================================
VLAN_ID I-SID I-SID NAME
--------------------------------------------------------------------
1
2
3 101 EXTRSERVER_101
33
999
Because the management I-SID matches one of the FA Switched UNI (ELAN) I-SIDs, the platform VLAN
is automatically associated with the FA-enabled port 1/2.
Switch:1(config-if)#show interfaces gigabitEthernet i-sid
==================================================================================
PORT Isid Info
==================================================================================
ISID ISID ISID MAC
PORTNUM IFINDEX ID VLANID C-VID TYPE ORIGIN NAME BPDU SUNI
----------------------------------------------------------------------------------
1/2 193 101 3 101 ELAN MANAGEMENT EXTRSERVER_101
----------------------------------------------------------------------------------
Variable Definitions
Variable Value
i-sid <i-sid> Specifies the management I-SID. Different hardware
platforms support different customer I-SID ranges. To see
the available range for the switch, use the CLI Help.
<c-vid> Specifies the customer VLAN ID. Different hardware
platforms support different customer VLAN ID ranges. Use
the CLI Help to see the available range for the switch.
Important:
If you do not specify a C-VID value, the port or MLT is
untagged.
Procedure
Example
================================================================================
Fabric Attach Configuration
================================================================================
FA Service : enabled
FA Element Type : server
FA Assignment Timeout : 240
FA Discovery Timeout : 240
FA Provision Mode : spbm
================================================================================
Fabric Attach Configuration
================================================================================
FA Service : enabled
FA Element Type : server
FA Assignment Timeout : 240
FA Discovery Timeout : 240
FA Provision Mode : spbm
Procedure
1. To enter User EXEC mode, log on to the switch.
2. View all FA interfaces (ports and MLTs):
show fa interface
3. To view FA interface configuration on ports, use one of the following commands:
• View FA configuration on all ports:
Example
The following example displays sample outputs for the show fa interface command.
Switch:1>show fa interface
=====================================================================
Fabric Attach Interfaces
=====================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
---------------------------------------------------------------------
Port2/10 enabled 0 0 enabled ****
Port4/6 enabled 0 0 enabled ****
Port4/11 enabled 0 0 enabled ****
Mlt2 enabled 0 0 enabled ****
---------------------------------------------------------------------
4 out of 4 Total Num of fabric attach interfaces displayed
---------------------------------------------------------------------
The following is a sample output for the show fa interface command for the port 2/10.
Switch:1>show fa interface port 2/10
==================================================================
Fabric Attach Interfaces
==================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
------------------------------------------------------------------
Port2/10 enabled 0 0 enabled ****
------------------------------------------------------------------
1 out of 4 Total Num of fabric attach interfaces displayed
------------------------------------------------------------------
The following is a sample output for the show fa interface command for the MLT 2.
Switch:1>show fa interface mlt 2
===================================================================
Fabric Attach Interfaces
===================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
-------------------------------------------------------------------
Mlt2 enabled 0 0 enabled ****
-------------------------------------------------------------------
1 out of 4 Total Num of fabric attach interfaces displayed
-------------------------------------------------------------------
Variable definitions
The following table defines parameters for the show fa interface port command.
Variable Value
{slot/port[/sub-port] [- Identifies the slot and port in one of the following
slot/port[/sub-port]] formats: a single slot and port (slot/port), a range of slots
[,...]} and ports (slot/port-slot/port), or a series of slots and
ports (slot/port,slot/port,slot/port). If the platform supports
channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
The following table defines parameters for the show fa interface mlt command.
Variable Value
<1–512> The valid range for MLT ID.
When FA is enabled on an FA Server switch, LLDP PDUs are exchanged between the FA Server and FA
Clients or FA Proxies. Standard LLDPs allow neighbors to be learned. With the help of organizational-
specific element discovery TLVs, the client or proxy recognizes that it has attached to the FA Server.
Only after the discovery handshake is complete, an FA Client or FA Proxy can transmit I-SID-to-VLAN
assignments to join the SPB Fabric network through the FA Server.
Procedure
Example
The following example displays the sample output for the show fa elements command.
Switch:1#show fa elements
================================================================================
Fabric Attach Discovery Elements
================================================================================
MGMT ELEM ASGN
PORT TYPE VLAN STATE SYSTEM ID AUTH AUTH
--------------------------------------------------------------------------------
1/5 proxy 710 T / S 50:61:84:ee:8c:00:20:00:00:01 AP AP
1/6 proxy 710 T / S 50:61:84:ee:8c:00:20:00:00:01 AP AP
================================================================================
Fabric Attach Authentication Detail
================================================================================
ELEM OPER ASGN OPER
PORT AUTH STATUS AUTH STATUS
--------------------------------------------------------------------------------
1/5 successAuth successAuth
1/6 successAuth successAuth
Auth Legend:
AP= Authentication Pass, AF= Authentication Fail,
NA= Not Authenticated, N= None
--------------------------------------------------------------------------------
Variable definitions
The following table defines parameters for the show fa elements command.
Variable Value
{slot/port[/sub-port] [- Identifies the slot and port in one of the following
slot/port[/sub-port]] formats: a single slot and port (slot/port), a range of slots
[,...]} and ports (slot/port-slot/port), or a series of slots and
ports (slot/port,slot/port,slot/port). If the platform supports
channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
assignment that is successfully accepted by the FA Server results in the creation of a Switched UNI I-SID
on the interface.
Verify that IS-IS and SPBM are properly configured on the FA Server switch.
• Verify SPBM configuration using the command show running-config module spbm.
• Verify IS-IS configuration using one of the following commands:
◦ show isis
◦ show isis interface
◦ show isis adjacency
◦ show isis lsdb
Procedure
Example
The following example displays a sample output for the show fa assignment command.
Note
The state of I-SID-to-VLAN assignments on a client or proxy device is pending until it is
changed by the FA Server to active or reject.
Switch:>en
Switch:1#show fa assignment
=======================================================================
Fabric Attach Assignment Map
=======================================================================
Interface I-SID Vlan State Origin
-----------------------------------------------------------------------
1/1 2 2 active proxy
1/2 3 3 active proxy
1/2 4 4 active proxy
1/3 5 5 reject proxy
-----------------------------------------------------------------------
-----------------------------------------------------------------------
Variable definitions
The following table defines parameters for the show fa assignment command.
Variable Value
{slot/port[/sub-port] [- Identifies the slot and port in one of the following
slot/port[/sub-port]] formats: a single slot and port (slot/port), a range of slots
[,...]} and ports (slot/port-slot/port), or a series of slots and
ports (slot/port,slot/port,slot/port). If the platform supports
channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
You can view the statistics at either the global level or at the port (interface) level.
Procedure
1. Enter Privileged EXEC mode:
enable
2. View global level FA statistics:
show fa statistics [summary]
3. View FA statistics at the slot/port level:
show fa statistics [{slot/port[/sub-port] [-slot/port[/sub-port]]
[,...]}]
Note
If a slot is removed from the switch chassis, the FA statistics are not displayed on the slot
ports. When the slot is inserted back again, the statistics counters are reset.
Examples
==========================================================================
Fabric Attach STATISTICS
==========================================================================
Port DiscElem DiscElem DiscElem DiscAuth
Received Expired Deleted Failed
--------------------------------------------------------------------------
1/1 3057 0 1 0
1/2 2000 0 1 0
===========================================================================
==========================================================================
Fabric Attach STATISTICS SUMMARY
==========================================================================
Port DiscElem DiscElem DiscElem DiscAuth
Received Expired Deleted Failed
--------------------------------------------------------------------------
1/1 3057 0 1 0
1/2 2000 0 1 0
===========================================================================
Fabric Attach ASSIGNMENTS STATISTICS SUMMARY
===========================================================================
Port Asgn Asgn Asgn Asgn Asgn AsgnAuth
Received Accepted Rejected Expired Deleted Failed
---------------------------------------------------------------------------
1/1 3149 3 1 3 0 0
1/2 1500 0 1 2 0 0
==========================================================================
Fabric Attach STATISTICS
==========================================================================
Port DiscElem DiscElem DiscElem DiscAuth
Received Expired Deleted Failed
--------------------------------------------------------------------------
1/1 3057 0 1 0
==========================================================================
Fabric Attach ASSIGNMENTS STATISTICS
==========================================================================
Port Asgn Asgn Asgn Asgn Asgn AsgnAuth
Received Accepted Rejected Expired Deleted Failed
--------------------------------------------------------------------------
1/1 3149 3 1 3 0 0
Optionally, clear FA statistics and verify that the statistics are cleared.
Switch:1#clear fa statistics
Switch:1#show fa statistics
==========================================================================
Fabric Attach STATISTICS
==========================================================================
Port DiscElem DiscElem DiscElem DiscAuth
Received Expired Deleted Failed
--------------------------------------------------------------------------
1/1 0 0 0 0
1/2 0 0 0 0
==========================================================================
Fabric Attach ASSIGNMENTS STATISTICS
==========================================================================
Port Asgn Asgn Asgn Asgn Asgn AsgnAuth
Received Accepted Rejected Expired Deleted Failed
--------------------------------------------------------------------------
1/1 0 0 0 0 0 0
1/2 0 0 0 0 0 0
Variable Definitions
The following table defines parameters for the show fa statistics command.
Variable Value
summary Displays a summary of Fabric Attach element discovery and
assignment statistics at the global level.
{slot/port[/sub-port] [- Identifies the slot and port in one of the following
slot/port[/sub-port]] formats: a single slot and port (slot/port), a range of slots
[,...]} and ports (slot/port-slot/port), or a series of slots and
ports (slot/port,slot/port,slot/port). If the platform supports
channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
Procedure
1. Enter Privileged EXEC mode:
enable
2. Verify details of LLDP neighbors learned:
show lldp neighbor
3. Verify details of LLDP neighbors learned on a specific port:
show lldp neighbor port {slot/port[/sub-port] [-slot/port[/sub-port]]
[,...]}
Example
The following example shows how two switches—an FA Server and an FA Proxy discover each other as
LLDP neighbors.
Switch A, which is the FA Server is a VSP 7200 Series switch (model 7254XSQ) and switch B which is
the proxy device is an ERS 4826GTS switch.
On the non-channelized port 1/1 on the FA Server, verify neighbor discovery of the proxy switch.
Switch:1>enable
Switch:1#show lldp neighbor
==========================================================================================
LLDP Neighbor
==========================================================================================
------------------------------------------------------------------------------------------
Total Neighbors : 1
------------------------------------------------------------------------------------------
Capabilities Legend: (Supported/Enabled)
B= Bridge, D= DOCSIS, O= Other, R= Repeater,
S= Station, T= Telephone, W= WLAN, r= Router
Switch:1(config)#
The following examples show neighbor discovery on channelized ports (if your platform supports
channelization).
On the channelized port 1/1/1 on the FA Server switch, verify discovery of the proxy switch.
Switch:1>enable
Switch:1#show lldp neighbor
==========================================================================================
LLDP Neighbor
==========================================================================================
------------------------------------------------------------------------------------------
Total Neighbors : 1
------------------------------------------------------------------------------------------
Capabilities Legend: (Supported/Enabled)
B= Bridge, D= DOCSIS, O= Other, R= Repeater,
S= Station, T= Telephone, W= WLAN, r= Router
Switch:1(config)#
Variable Definitions
The following table defines parameters for the show lldp neighbor command.
Variable Value
port {slot/port[/ Identifies the slot and port in one of the following formats: a single slot
sub-port] [- and port (slot/port), a range of slots and ports (slot/port-slot/port), or a
slot/port[/sub- series of slots and ports (slot/port,slot/port,slot/port). If the platform supports
port]] [,...]} channelization and the port is channelized, you must also specify the sub-port
in the format slot/port/sub-port.
Displays LLDP neighbor information on the specified port.
Procedure
Note
Viewing ELAN I-SID information on an MLT is useful to understand the origin of the
I-SID when multiple client or proxy devices connecting to the FA Server using SMLT MLT
advertise the same I-SID-to-VLAN mappings. In the event of a link failure on an MLT, the
origin of the I-SID helps determine on which MLT, and thereby from which proxy or client
device, the mappings were successfully learnt.
Examples
The following sample output displays, for example, the I-SID information on one of the peer switches of
the FA Server, in a dual-homed SMLT configuration.
Switch:1>enable
Switch:1#show i-sid elan
==========================================================================================
Isid Info
==========================================================================================
ISID ISID PORT MLT ORIGIN ISID
ID TYPE VLANID INTERFACES INTERFACES NAME
------------------------------------------------------------------------------------------
2002 ELAN N/A c2002:1/10 - - --- - -l- - EXTRSERVER_1
4000 ELAN N/A - c4000:1 - --- - --r - EXTRSERVER_12
4001 ELAN N/A - c4001:1 - --- - -l- - EXTRSERVER_101
4030 ELAN N/A - c4030:1 - --- - --r - EXTRSERVER_102
4051 ELAN N/A - c4051:1 - --- - -l- - EXTRSERVER_103
10200 ELAN N/A - c200:1 - --- - --r - EXTRSERVER_2
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
Note
The I-SID TYPE field displays once for each I-SID. The I-SID TYPE of an I-SID that is
either learned through FA mapping assignments or configured as an FA management I-SID,
is always ELAN. If a platform VLAN has the same I-SID value as that of the I-SID in an FA
mapping assignment or in an FA management I-SID configuration, then the platform VLAN is
associated with the I-SID endpoint and displays in the VLANID column.
In this sample output, the ORIGIN field indicates the origin of the I-SID endpoint.
Switch:1>show mlt i-sid
=====================================================================================
MLT Isid Info
=====================================================================================
ISID ISID ISID
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
In this sample output, the ORIGIN field indicates the origin of the I-SID endpoint.
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
Variable Definitions
The following table defines parameters for the show i-sid command.
Variable Value
elan Displays all ELAN I-SIDs.
The following table defines parameters for the show mlt i-sid command.
Variable Value
<1–512> The valid range for MLT ID.
The following table defines parameters for the show interfaces gigabitEthernet i-sid
command.
Variable Value
{slot/port[/sub-port] Identifies the slot and port in one of the following formats: a single
[-slot/port[/sub-port]] slot and port (slot/port), a range of slots and ports (slot/port-slot/
[,...]} port), or a series of slots and ports (slot/port,slot/port,slot/port). If
the platform supports channelization and the port is channelized,
you must also specify the sub-port in the format slot/port/sub-port.
Procedure
configure terminal
2. Enable an FA Zero Touch client:
fa zero-touch-client
standard <camera|ona-sdn|ona-spb-over-ip|phone|router|security-device|
srvr-endpt|switch|video|virtual-switch|wap-type1|wap-type2> i-sid <1–
15999999>
3. Disable an FA Zero Touch client:
no fa zero-touch-client
standard <camera|ona-sdn|ona-spb-over-ip|phone|router|security-device|
srvr-endpt|switch|video|virtual-switch|wap-type1|wap-type2>
Example
Switch:1(config)# fa zero-touch-client standard camera i-sid 1003
Switch:1(config)# no fa zero-touch-client standard camera
Variable definitions
The following table defines parameters for the fa zero-touch-client standard command.
Variable Value
camera Specify element type to match camera.
ona-sdn Specify element type to match ona-sdn.
ona-spb-over-ip Specify element type to match ona-spb-over-ip.
phone Specify element type to match phone.
router Specify element type to match router.
security-device Specify element type to match security-device.
srvr-endpt Specify element type to match srvr-endpt.
Variable Value
switch Specify element type to match switch.
video Specify element type to match video.
virtual-switch Specify element type to match virtual-switch.
wap-type1 Specify element type to match wap-type1.
wap-type2 Specify element type to match wap-type2.
Procedure
Example
The following example displays sample output for the show fa zero-touch-client command.
Switch:1#show fa zero-touch-client
================================================================================
3 out of 3 Total Num of Fabric Attach Zero Touch Client entries displayed
--------------------------------------------------------------------------------
ExtremeCloud IQ ‑ Site Engine, see the ExtremeCloud IQ ‑ Site Engine documentation at https://
www.extremenetworks.com/support/documentation/.
• On the switch, add and configure the RADIUS server as configured in ExtremeCloud IQ ‑ Site Engine.
Configure ports and MLT/SMLT interfaces to function as Switched UNI interfaces, and then create and
enable Endpoint Tracking on those interfaces.
Procedure
1. Enter Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
endpoint-tracking
• Create and enable Endpoint Tracking on the interface:
endpoint-tracking enable
What to Do Next
Optionally, if the RADIUS outbound attributes do not include an I-SID value, configure an I-SID offset
value, and globally enable I-SID offset for Endpoint Tracking. The I-SID offset value is used to calculate
an I-SID value for a switched UNI if no I-SID value is provided by the RADIUS server. In that case, the
I-SID value is calculated as follows: I-SID = VLAN ID + configured I-SID offset value.
After optionally configuring an I-SID offset value, enable Endpoint Tracking globally on the switch.
Note
If you have previously enabled Endpoint Tracking globally and want to change the currently
configured I-SID offset value, you must disable Endpoint Tracking globally, change the I-SID
value, and then re-enable Endpoint Tracking globally.
Procedure
configure terminal
2. (Optional) Configure an I-SID offset value, and enable I-SID offset globally on the switch:
endpoint-tracking auto-isid-offset <0-15995903>
endpoint-tracking auto-isid-offset enable
3. Enable Endpoint Tracking globally on the switch:
endpoint-tracking enable
Variable Definitions
Variable Value
<0-15995903> The I-SID offset value. The default is 15990000.
enable Enables or disables I-SID offset value globally on the switch.
The default is disabled.
Enable visibility mode to allow MAC learning on static S-UNIs for Endpoint Tracking.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable Endpoint Tracking visibility mode on the switch:
endpoint-tracking visibility-mode
Perform this procedure to display global, interface and binding information for Endpoint Tracking.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display the global status of Endpoint Tracking on the switch, and the configured I-SID offset value, if
applicable:
show endpoint-tracking
3. Display the status of all interfaces that have Endpoint Tracking created:
show endpoint-tracking interfaces [gigabitEthernet {slot/port[/sub-
port][-slot/port[/sub-port]][,...]}] | [mlt <1-512>]]
4. Display a summary of the VLAN:ISID binding information for all ports, or MLT/SMLT interfaces:
show endpoint-tracking bindings summary
5. Display the VLAN:ISID binding information for the switch, for ports, or for MLT/SMLT interfaces:
show endpoint-tracking bindings [gigabitEthernet {slot/port[/sub-port]
[-slot/port[/sub-port]][,...]}] | [mlt <1-512>]]
Example
The following example displays all of the Endpoint Tracking configuration information for a switch.
Switch:1>show endpoint-tracking
=======================================================================================
Endpoint Tracking Configuration
=======================================================================================
Variable Definitions
The following table defines parameters for the show endpoint-tracking bindings command.
Variable Value
gigabitEthernet {slot/ Identifies the slot and port in one of the following formats: a single slot
port[/sub-port] [- and port (slot/port), a range of slots and ports (slot/port-slot/port), or
slot/port[/sub-port]] a series of slots and ports (slot/port,slot/port,slot/port). If the platform
[,...]} supports channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
MLT <1-512> Specifies the MLT ID.
summary Provides a summary of the total number and status of bindings for all
interfaces.
Use this procedure to match the external metric-type by using a route-map for any of the following
cases:
• accepting a remote IS-IS route with the help of IS-IS accept policies.
• redistributing IS-IS routes into other protocols.
Procedure
configure terminal
Example
Switch:1(route-map)# enable
Switch:1(route-map)# exit
Switch:1(config)# router bgp
Switch:1(router-bgp)# redistribute isis route-map ro1
Switch:1(router-bgp)# exit
Switch:1(config)# ip bgp apply redistribute
Variable Definitions
The following table defines parameters for the match metric-type-isis command.
Variable Value
metric-type-isis {any|internal|external} Specifies the IS-IS metric type:
• internal – permits or denies routes that are
internal to the IS-IS domain.
• external – permits or denies routes that
originate from an external routing protocol
domain.
• any – permits or denies both internal routes as
well as external routes.
Use this procedure to set the IS-IS external metric-type by using a route-map for any of the following
cases:
• accepting a remote IS-IS route with the help of IS-IS accept policies.
• redistributing routes from other protocols into IS-IS.
Procedure
configure terminal
Example
Variable Definitions
The following table defines parameters for the set metric-type-isis command.
Variable Value
metric-type-isis {any|internal|external} Specifies the IS-IS metric type:
• internal – permits or denies routes that are
internal to the IS-IS domain.
• external – permits or denies routes that
originate from an external routing protocol
domain.
• any – permits or denies both internal routes as
well as external routes.
Setting metric type for IS-IS routes using global redistribute command
Use this procedure to set the IS-IS external metric-type using the global redistribute command for the
following cases redistributing routes from other protocols into IS-IS.
Procedure
configure terminal
router isis
2. Set IS-IS metric type using global redistribute command:
redistribute direct metric-type {internal|external}
3. Enable the route policy
redistribute direct enable
Example
Set metric type for IS-IS routes using global redistribute command:
Switch:1> enable
Switch:1# configure terminal
Switch:1(config)# router isis
Switch:1(config-isis)# redistribute direct metric-type internal
Switch:1(config-isis)# redistribute direct enable
Variable Definitions
The following table defines parameters for the redistribute direct metric-type command.
Variable Value
metric-type {internal|external} Specifies the IS-IS metric type:
• internal – permits or denies routes that are
internal to the IS-IS domain.
• external – permits or denies routes that
originate from an external routing protocol
domain.
Note
This procedure only applies to the VSP 7400 Series.
Perform the following procedures in sequence to configure the Multi-area SPB feature on the switch.
Procedure
1. Configure Remote IS-IS Multi-area SPB Nickname for an SPBM Instance on page 1108.
2. Display the Remote IS-IS SPBM Nickname Configuration on page 1135.
3. Configure Remote IS-IS Manual Area on page 1109.
4. Configure Remote IS-IS System ID on page 1110.
5. Configure an IS-IS Area Name on page 1111
6. Display IS-IS Remote Area Configuration on page 1135.
7. Display IS-IS Area Configuration on page 1136.
8. Configure IS-IS Multi-area SPB Virtual Node on page 1112.
9. Display IS-IS Area Virtual Node Configuration on page 1136.
10. Configure Remote IS-IS Hello Authentication on a Port on page 1113.
11. Configure Remote IS-IS Layer 1 Designated Router Priority on a Port on page 1114.
12. Configure Remote IS-IS Hello Interval on a Port on page 1115.
13. Configure Remote IS-IS Hello Multiplier on a Port on page 1116.
14. Configure Remote IS-IS SPBM Parameters on a Port on page 1117.
15. Enable Remote IS-IS on a Port on page 1118.
16. Enable Remote IS-IS Router Configuration Globally on page 1119.
17. Display IS-IS Remote Area Configuration on page 1135.
18. Configure Multi-area SPB Layer 2 I-SID List on page 1120.
19. Display IS-IS Multi-area SPB Layer 2 I-SID List Information on page 1137.
20.Configure Multi-area SPB Layer 2 I-SID Redistribution on page 1121.
21. Configure IS-IS Multi-area SPB IPv4 Unicast Redistribution on page 1122.
22. Configure IS-IS Multi-area SPB IPv6 Unicast Redistribution on page 1123.
23. Configure IS-IS Multi-area SPB IPv4 Unicast Redistribution on a VRF Instance on page 1125.
24. Configure IS-IS Multi-area SPB IPv6 Unicast Redistribution on a VRF Instance on page 1127.
25. Configure Multi-area SPB DvR Backbone Redistribution on page 1128.
26. Display IS-IS Multi-area SPB DvR Configuration on page 1140.
27. Configure Multi-area SPB Layer 2 Multicast Snooping Redistribution on page 1129.
28. Configure Multi-area SPB IPv4 Routed Multicast Redistribution on page 1131.
29. Configure IS-IS Multi-area SPB IPv4 Routed Multicast Redistribution on a VRF Instance on page
1133.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure remote IS-IS Multi-area SPB nickname for a specific SPBM instance
on the switch.
Procedure
configure terminal
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis remote
Switch:1(config-remote)spbm 4 nick-name 1.11.16
What to Do Next
To verify the configuration, see Display the Remote IS-IS SPBM Nickname Configuration on page 1135.
Variable Definitions
Variable Value
<1-100> Specifies the SPBM instance on the remote IS-IS interface.
nick-name<x.xx.xx> Specifies a nickname for the remote IS-IS SPBM Multi-area SPB instance.
The value is 2.5 bytes in the format <x.xx.xx>.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the remote Intermediate System-to-Intermediate System (IS-IS)
manual area.
Procedure
configure terminal
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis remote
Switch:1(config-isis-remote)manual-area c1.1000.000.00
What to Do Next
To verify the configuration, see Display IS-IS Remote Area Configuration on page 1135 and Display IS-IS
Area Configuration on page 1136.
Variable Definitions
Variable Value
<xx.xxxx.xxxx...xxx Specifies the remote IS-IS manual-area in the range of 1 to 13 bytes.
x>
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the remote Intermediate System-to-Intermediate System (IS-IS)
system ID on the switch.
Procedure
configure terminal
Example
Switch:1>enable
Switch:1#configure terminal
What to Do Next
To verify the configuration, see Display IS-IS Remote Area Configuration on page 1135 and Display IS-IS
Area Configuration on page 1136.
Variable Definitions
Variable Value
xxxx.xxxx.xxxx Specifies the remote IS-IS system ID for the switch.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the area name for home and remote areas.
Procedure
1. Enter either IS-IS Router Configuration or IS-IS Router Remote Configuration mode:
enable
configure terminal
Example
Variable Definitions
Variable Value
WORD<0-255> Specifies the area name. The default value is area-manual-area, where
manual-area represents the IS-IS or remote IS-IS manual-area value that
you configure.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the IS-IS Multi-area SPB virtual node parameters like nick-name,
system ID, and system name in the home or remote area.
Procedure
1. Enter either IS-IS Router Configuration or IS-IS Router Remote Configuration mode:
enable
configure terminal
Example
Configuring the IS-IS Multi-area SPB virtual node in the home area:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis
Switch:1(config-isis)#area-vnode nick-name 0.82.40
Switch:1(config-isis)#area-vnode sys-name SwitchC
Switch:1(config-isis)#area-vnode system-id 1222.3300.0000
Configuring the IS-IS Multi-area SPB virtual node in the remote area:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis remote
Switch:1(config-isis)#area-vnode nick-name 0.82.60
Switch:1(config-isis)#area-vnode sys-name SwitchA
Switch:1(config-isis)#area-vnode system-id 1222.3311.2222
What to Do Next
To verify the configuration, see Display IS-IS Area Virtual Node Configuration on page 1136.
Variable Definitions
Variable Value
nick-name x.xx.xx Specifies a nickname for the IS-IS SPBM Multi-area SPB instance. The
value is 2.5 bytes in the format x.xx.xx.
sys-name Specifies the name of the system.
WORD<0-255>
system-id Specifies the IS-IS Multi-area SPB virtual node system ID.
xxxx.xxxx.xxxx
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure authentication type used for remote Intermediate-System-to-
Intermediate-System (IS-IS) hello packets on the interface. The type can be one of the following: none,
simple, hmac-md5, or hmac-sha-256.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Configuring the simple authentication type for remote IS-IS hello packets on port 1/2:
Switch:1>enable
Switch:1#configure terminal
Variable Definitions
The following table defines parameters for the isis remote hello-auth command.
Variable Value
key WORD<1-16> Specifies the authentication key (password) that the receiving router uses
to verify the packet.
key-id <1-255> Specifies the optional key ID.
type {none | simple Specifies the authentication type used for remote IS-IS hello packets on
| hmac-md5 | hmac- the interface. The type can be one of the following:
sha-256} • Simple - Simple password authentication uses a text password in the
transmitted packet. The receiving router uses an authentication key
(password) to verify the packet. You can also specify a key value.
• hmac-md5 - MD5 authentication creates an encoded checksum in the
transmitted packet. The receiving router uses an authentication key
(password) to verify the MD5 checksum of the packet. You can also
specify a key value and key-id.
• hmac-sha-256 - With SHA-256 authentication, the switch adds an
HMAC-SHA256 digest to each Hello packet. The switch that receives
the Hello packet computes the digest of the packet and compares it
with the received digest. If the digests match, the packet is accepted.
If the digests do not match, the receiving switch discards the packet.
You can also specify a key value and key-id.
The default type is none.
Note
This procedure only applies to the VSP 7400 Series.
Procedure
1. Enter GigabitEthernet Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Configuring the remote IS-IS designated router priority for port 1/4:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#interface gigabitEthernet 1/2
Switch:1(config-if)#isis remote l1-dr-priority 1
Variable Definitions
The following table defines parameters for the isis remote l1-dr-priority command.
Variable Value
<0-127> Specifies the level 1 remote Intermediate-System-to-Intermediate-System
(IS-IS) designated router priority value. The default value is 64.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the remote hello interval to change how often hello packets are
sent out from an interface level.
Procedure
1. Enter GigabitEthernet Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#interface gigabitEthernet 1/3
Switch:1(config-if)#isis remote l1-hello-interval 1
Variable Definitions
The following table defines parameters for the isis remote l1-hello-interval command.
Variable Value
<1-600> Configures the Level 1 remote hello interval. The default value is 9
seconds.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the remote hello multiplier to specify how many hellos the switch
must miss before it considers the adjacency with a neighboring switch down.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#interface gigabitEthernet 1/2
Switch:1(config-if)#isis remote l1-hello-multiplier 1
Variable Definitions
The following table defines parameters for the isis remote l1-hello-multiplier command.
Variable Value
<1-600> Configures the Level 1 hello multiplier. The default value is 3 seconds.
Note
This procedure only applies to the VSP 7400 Series.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Configuring the remote IS-IS SPBM interface type and layer 1 metric on port 1/2:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#interface gigabitEthernet 1/2
Switch:1(config-if)#isis remote spbm 2 interface-type broadcast
Switch:1(config-if)#isis remote spbm 2 l1-metric 2
Variable Definitions
The following table defines parameters for the isis remote spbm command.
Variable Value
<1-100> Specifies the SPBM instance.
interface-type Specifies the IS-IS SPBM interface type as broadcast or point-to-point
{broadcast | pt-pt} (pt-pt).
l1-metric Specifies the SPBM instance layer 1 metric on the IS-IS interface located
<1-16777215> on a specific port.
Note
This procedure only applies to the VSP 7400 Series.
Note
When the switch receives a Fabric Connect TLV through LLDP on a port that has remote IS-IS
enabled on it, the port transitions to the Auto-sense NNI pending state. For more information,
see Auto-sense Port States on page 18.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Switch:1>enable
Switch:1#confiure terminal
Switch:1(config)#interface gigabitEthernet 1/2
Switch:1(config-if)isis remote enable
Variable Definitions
The following table defines parameters for the isis remote command.
Variable Value
enable Enables a remote IS-IS interface on the selected ports.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to enable remote IS-IS router configuration on the switch, globally.
Procedure
configure terminal
2. Enable IS-IS router remote configuration:
router isis remote [enable]
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis remote enable
What to Do Next
To verify the configuration, see Display IS-IS Remote Area Configuration on page 1135.
Variable Definitions
The following table defines parameters for the router isis remote command.
Variable Value
enable Enables router IS-IS remote configuration globally on the switch.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the Multi-area SPB layer 2 I-SID list.
Procedure
configure terminal
router isis
2. Configure the Multi-area SPB layer 2 I-SID list:
multi-area l2 isid-list WORD<1-32> WORD<1-1024>
Example
Configuring the Multi-area SPB layer 2 I-SID list that includes specific I-SID values:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis
Switch:1(config-isis)#multi-area l2 isid-list testlist 1,3,5,100-200
What to Do Next
To verify the configuration, see Display IS-IS Multi-area SPB Layer 2 I-SID List Information on page 1137.
Variable Definitions
The following table defines parameters for the multi-area l2 isid-list command.
Variable Value
WORD<1-32> Specifies the name of the I-SID list.
WORD<1-1024> Specifies the list of I-SID values.
Note
This procedure only applies to the VSP 7400 Series.
Procedure
configure terminal
router isis
2. Configure the Multi-area SPB layer2 I-SID redistribution:
multi-area l2 redistribute i-sid {deny-all | permit-all} [except-isid-
list WORD<1-32>]
3. Verify the Multi-area SPB layer2 I-SID redistribution configuration:
show isis multi-area l2 redistribute i-sid
4. Apply the layer 2 I-SID redistribution:
isis multi-area l2 apply redistribute i-sid
Example
Configuring Multi-area SPB layer 2 I-SID redistribution and exclude the I-SID values specified in the I-SID
list:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis
Switch:1(config-isis)#multi-area l2 redistribute i-sid permit-all except-isid-list
testlist
Switch:1(config-isis)#show isis multi-area l2 redistribute i-sid
=========================================================================
MULTI AREA L2 ISID REDIST POLICY
=========================================================================
Permit Except List Name
-------------------------------------------------------------------------
permit-all testlist
-------------------------------------------------------------------------
Switch:1(config-isis)#isis multi-area l2 apply redistribute i-sid
Variable Definitions
The following table defines parameters for the multi-area l2 redistribute i-sid command.
Variable Value
deny-all Denies the Multi-area SPB IPv6 unicast redistribution configuration for the
specified I-SID list name.
except-isid-list Specifies the name of the I-SID list.
WORD<1-32>
permit-all Permits the Multi-area SPB IPv6 unicast redistribution configuration for
the specified I-SID list name.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure Multi-area SPB IPv4 unicast redistribution on the switch.
Procedure
configure terminal
router isis
2. Create the Multi-area SPB IPv4 unicast redistribution instance:
multi-area ip redistribute unicast [home-to-remote | remote-to-home]
Note
If you do not specify the direction for redistribution then the system applies the
redistribution in both directions by default.
Example
Configuring Multi-area SPB IPv4 unicast redistribution for home to remote direction:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis
Switch:1(config-isis)#multi-area ip redistribute unicast home-to-remote
Switch:1(config-isis)#multi-area ip redistribute unicast home-to-remote route-map test
Switch:1(config-isis)#multi-area ip redistribute unicast home-to-remote enable
Switch:1(config-isis)#show isis multi-area ip redistribute home-to-remote
================================================================================
ISIS Multiarea Redistribute List for ip unicast - GlobalRouter
================================================================================
DIRECTION ENABLE RPOLICY
--------------------------------------------------------------------------------
home-to-remote TRUE test
--------------------------------------------------------------------------------
Switch:1(config-isis)#isis multi-area ip apply redistribute unicast home-to-remote
Variable Definitions
The following table defines parameters for the multi-area ip redistribute unicast and the
isis multi-area ip apply redistribute unicast commands.
Variable Value
enable Enables Multi-area SPB IPv4 unicast redistribution.
home-to-remote Specifies the IPv4 unicast redistribution configuration for home to remote
direction.
remote-to-home Specifies the IPv4 unicast redistribution configuration for remote to home
direction.
route-map Specifies the name of the route policy.
WORD<1-64>
vrf WORD<1-16> Specifies the unicast redistribution configuration for specific VRF
instance.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure Multi-area SPB IPv6 unicast redistribution on the switch.
Procedure
configure terminal
router isis
2. Create the Multi-area SPB IPv6 unicast redistribution:
multi-area ipv6 redistribute unicast [home-to-remote | remote-to-home]
Note
If you do not specify the direction for redistribution then the system applies the
redistribution in both directions by default.
Example
Configuring Multi-area SPB IPv6 unicast redistribution for home to remote direction:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis
Switch:1(config-isis)#multi-area ipv6 redistribute unicast home-to-remote
Switch:1(config-isis)#multi-area ipv6 redistribute unicast home-to-remote route-map test
Switch:1(config-isis)#multi-area ipv6 redistribute unicast home-to-remote enable
Switch:1(config-isis)#show isis multi-area ipv6 redistribute home-to-remote
======================================================================================
ISIS Multiarea Redistribute List for ipv6 unicast - GlobalRouter
======================================================================================
DIRECTION ENABLE RPOLICY
--------------------------------------------------------------------------------------
home-to-remote TRUE test
--------------------------------------------------------------------------------------
Switch:1(config-isis)#isis multi-area ipv6 apply redistribute unicast home-to-remote
Variable Definitions
The following table defines parameters for the multi-area ipv6 redistribute unicast and
the isis multi-area ipv6 apply redistribute unicast commands.
Variable Value
enable Enables Multi-area SPB IPv6 unicast redistribution on the switch.
home-to-remote Specifies the IPv6 unicast redistribution configuration for home to remote
direction.
remote-to-home Specifies the IPv6 unicast redistribution configuration for remote to home
direction.
route-map Specifies the name of the route policy.
WORD<1-64>
vrf WORD<1-16> Specifies the IPv6 unicast redistribution configuration for a specific VRF
instance.
Note
This procedure only applies to the VSP 7400 Series.
Configure IP Shortcuts and layer 3 VSN on the Virtual Router Forwarding (VRF) instance.
Perform this procedure to configure IS-IS Multi-area SPB IPv4 unicast redistribution on a specific VRF
instance on the switch.
Procedure
configure terminal
Note
If you do not specify the direction for redistribution then the system applies the
redistribution in both directions by default.
4. Enable the Multi-area SPB IPv4 unicast redistribution instance on the VRF:
isis multi-area ip redistribute unicast [home-to-remote | remote-to-
home] enable
5. Verify the Multi-area SPB IPv4 unicast redistribution configuration on the VRF:
show isis multi-area ip redistribute unicast [home-to-remote | remote-
to-home] vrf WORD<1-16>
6. Exit to Global Configuration mode:
exit
7. Apply the Multi-area SPB IPv4 unicast redistribution on the VRF:
isis multi-area ip apply redistribute unicast [home-to-remote |
[remote-to-home] vrf WORD<1-16>
Example
Configuring IS-IS Multi-area SPB IPv4 unicast redistribution for home to remote direction:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router vrf VRF1
Switch:1(router-vrf)#isis multi-area ip redistribute unicast home-to-remote
Switch:1(router-vrf)#isis multi-area ip redistribute unicast home-to-remote route-map test
Switch:1(router-vrf)#isis multi-area ip redistribute unicast home-to-remote enable
Switch:1(router-vrf)#show isis multi-area ip redistribute unicast home-to-remote vrf VRF1
==================================================================================
ISIS Multiarea Redistribute List for ip unicast - VRF VRF1
==================================================================================
DIRECTION ENABLE RPOLICY
----------------------------------------------------------------------------------
home-to-remote TRUE test
----------------------------------------------------------------------------------
Switch:1(router-vrf)#exit
Switch:1(config)#isis multi-area ip apply redistribute unicast home-to-remote vrf VRF1
Variable Definitions
The following table defines parameters for the isis multi-area ip redistribute unicast
and the isis multi-area ip apply redistribute unicast commands.
Variable Value
enable Enables IPv4 unicast redistribution on the VRF instance.
home-to-remote Specifies the IPv4 unicast redistribution configuration for home to remote
direction.
remote-to-home Specifies the IPv4 unicast redistribution configuration for remote to home
direction.
route-map Specifies the name of the route policy.
WORD<1-64>
vrf WORD<1-16> Specifies the IPv4 unicast redistribution configuration for specific VRF
instance.
Note
This procedure only applies to the VSP 7400 Series.
Configure IP Shortcuts and layer 3 VSN on the Virtual Router Forwarding (VRF) instance.
Perform this procedure to configure IS-IS Multi-area SPB IPv6 unicast redistribution on a specific Virtual
Router Forwarding (VRF) instance on the switch.
Procedure
1. Enter VRF Router Configuration mode for a specific VRF context:
enable
configure terminal
Note
If you do not specify the direction for redistribution then the system applies the
redistribution in both directions by default.
Example
Configuring IS-IS Multi-area SPB IPv6 unicast redistribution for home to remote direction:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router vrf VRF1
Switch:1(router-vrf)#isis multi-area ipv6 redistribute unicast home-to-remote
Switch:1(router-vrf)#isis multi-area ipv6 redistribute unicast home-to-remote route-map
test
Switch:1(router-vrf)#isis multi-area ipv6 redistribute unicast home-to-remote enable
Switch:1(router-vrf)#show isis multi-area ipv6 redistribute unicast home-to-remote vrf
VRF1
====================================================================================
ISIS Multiarea Redistribute List for ipv6 unicast - VRF VRF1
====================================================================================
DIRECTION ENABLE RPOLICY
------------------------------------------------------------------------------------
home-to-remote TRUE test
------------------------------------------------------------------------------------
Switch:1(router-vrf)#exit
Switch:1(config)#isis multi-area ipv6 apply redistribute unicast home-to-remote vrf VRF1
Variable Definitions
The following table defines parameters for the isis multi-area ipv6 redistribute
unicast and the isis multi-area ipv6 apply redistribute unicast commands.
Variable Value
enable Enables IPv6 unicast redistribution on the VRF instance.
home-to-remote Specifies the IPv6 unicast redistribution configuration for home to remote
direction.
remote-to-home Specifies the IPv6 unicast redistribution configuration for remote to home
direction.
route-map Specifies the name of the route policy.
WORD<1-64>
vrf WORD<1-16> Specifies the IPv6 unicast redistribution configuration for a specific VRF
instance.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure Multi-area SPB Distributed Virtual Routing (DvR) backbone
redistribution on the switch.
Procedure
configure terminal
router isis
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis
Switch:1(config-isis)multi-area dvr redistribute backbone
What to Do Next
To verify the configuration, see Display IS-IS Multi-area SPB DvR Configuration on page 1140.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure Multi-area SPB layer 2 multicast snooping redistribution for specific
I-SID values or a specific I-SID list.
Procedure
configure terminal
router isis
2. Create the Multi-area SPB layer 2 snooping multicast redistribution for a specific I-SID or I-SID list:
multi-area l2 redistribute snoop-multicast {home-to-remote | remote-
to-home} {i-sid <1-16777215> | isid-list WORD<1-32>}
3. (Optional) Configure a route policy to govern the redistribution:
multi-area l2 redistribute snoop-multicast {home-to-remote | remote-
to-home} {i-sid <1-16777215> | isid-list WORD<1-32>} route-map
WORD<1-64>
4. Enable the Multi-area SPB layer 2 snooping multicast redistribution instance:
multi-area l2 redistribute snoop-multicast {home-to-remote | remote-
to-home} {i-sid <1-16777215> | isid-list WORD<1-32>} enable
5. Verify the Multi-area SPB layer 2 snooping multicast redistribution configuration:
show isis multi-area l2 redistribute snoop-multicast
6. Apply the Multi-area SPB layer 2 snooping multicast redistribution:
isis multi-area l2 apply redistribute snoop-multicast [home-to-remote
| remote-to-home]
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis
Configuring Multi-area SPB layer 2 home to remote multicast snooping redistribution for I-SID 1100:
Configuring Multi-area SPB layer 2 home to remote multicast snooping redistribution for I-SID list List1:
Verifying the Multi-area SPB layer 2 home to remote multicast snooping redistribution configuration:
--------------------------------------------------------------------------------
Applying the Multi-area SPB layer 2 home to remote multicast snooping redistribution:
Variable Definitions
The following table defines parameters for the multi-area l2 redistribute snoop-
multicast and the isis multi-area l2 apply redistribute snoop-multicast
commands.
Variable Value
enable Enables Multi-area SPB layer 2 multicast snooping redistribution.
i-sid <1-16777215> Specifies the I-SID value.
isid-list Specifies the name of the I-SID list.
WORD<1-32>
home-to-remote Specifies the layer 2 multicast snooping redistribution configuration for
home to remote direction.
remote-to-home Specifies the layer 2 multicast snooping redistribution configuration for
remote to home direction.
route-map Specifies the name of the route policy.
WORD<1-64>
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure Multi-area SPB IPv4 routed multicast redistribution on the switch.
Procedure
1. Enter IS-IS Router Configuration mode:
enable
configure terminal
router isis
2. Create the Multi-area SPB IPv4 routed multicast redistribution instance:
multi-area ip redistribute routed-multicast [home-to-remote | remote-
to-home]
Note
If you do not specify the direction for redistribution then the system applies the
redistribution in both directions by default.
Example
Configuring Multi-area SPB IPv4 routed multicast redistribution for home to remote direction:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router isis
Switch:1(config-isis)#multi-area ip redistribute routed-multicast home-to-remote
Switch:1(config-isis)#multi-area ip redistribute routed-multicast home-to-remote route-
map test
Switch:1(config-isis)#multi-area ip redistribute routed-multicast home-to-remote enable
Switch:1(config-isis)#show isis multi-area ip redistribute routed-multicast home-to-remote
====================================================================================
ISIS Multiarea Redistribute List for routed multicast - GlobalRouter
====================================================================================
DIRECTION ENABLE RPOLICY
------------------------------------------------------------------------------------
home-to-remote TRUE test
------------------------------------------------------------------------------------
Switch:1(config-isis)#isis multi-area ip apply redistribute routed-multicast home-to-
remote
Variable Definitions
The following table defines parameters for the multi-area ip redistribute routed-
multicast and the isis multi-area ip apply redistribute routed-multicast
command.
Variable Value
enable Enables Multi-area SPB IPv4 routed multicast redistribution.
home-to-remote Specifies the IPv4 routed multicast redistribution configuration for home
to remote direction.
remote-to-home Specifies the IPv4 routed multicast redistribution configuration for remote
to home direction.
route-map Specifies the name of the route policy.
WORD<1-64>
vrf WORD<1-16> Specifies the multicast routing redistribution configuration for specific
VRF instance.
Configure IS-IS Multi-area SPB IPv4 Routed Multicast Redistribution on a VRF Instance
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure IS-IS Multi-area SPB IPv4 routed multicast redistribution on a
specific Virtual Router Forwarding (VRF) instance on the switch.
Procedure
configure terminal
Note
If you do not specify the direction for redistribution then the system applies the
redistribution in both directions by default.
Example
Configuring IS-IS Multi-area SPB IPv4 routed multicast redistribution for home to remote direction on
VRF VRF1:
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router vrf VRF1
Switch:1(router-vrf)#isis multi-area ip redistribute routed-multicast home-to-remote
Switch:1(router-vrf)#isis multi-area ip redistribute routed-multicast home-to-remote
route-map test
Switch:1(router-vrf)#isis multi-area ip redistribute routed-multicast home-to-remote
enable
Switch:1(router-vrf)#show isis multi-area ip redistribute routed-multicast home-to-remote
vrf VRF1
=======================================================================================
ISIS Multiarea Redistribute List for routed multicast - VRF VRF1
=======================================================================================
DIRECTION ENABLE RPOLICY
---------------------------------------------------------------------------------------
home-to-remote TRUE test
---------------------------------------------------------------------------------------
Switch:1(router-vrf)#exit
Switch:1(config)#isis multi-area ip apply redistribute routed-multicast home-to-remote
vrf VRF1
Variable Definitions
The following table defines parameters for the isis multi-area ip redistribute routed-
multicast and the isis multi-area ip apply redistribute routed-multicast
commands.
Variable Value
enable Enables IPv4 routed multicast redistribution on the VRF instance.
home-to-remote Specifies the IPv4 routed multicast redistribution configuration for home
to remote direction.
remote-to-home Specifies the IPv4 routed multicast redistribution configuration for remote
to home direction.
route-map Specifies the name of the route policy.
WORD<1-64>
vrf WORD<1-16> Specifies the multicast routing redistribution configuration for specific
VRF instance.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the Multi-area SPB node as a boundary node to forward traffic
from the UNIs to the remote-area and from the remote-area to the UNIs without requiring an
established adjacency in the home area.
Procedure
configure terminal
router isis
2. Configure the multi-area flags functionality:
multi-area flags home-always-up
Note
This procedure only applies to the VSP 7400 Series.
Procedure
Example
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to display the IS-IS remote area configuration on the switch.
Procedure
Example
Perform this procedure to display the IS-IS area configuration on the switch.
Procedure
Example
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to display the IS-IS area virtual node configuration on the switch.
Procedure
Example
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to display the IS-IS Multi-area SPB layer 2 I-SID list information.
Procedure
Example
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to display the IS-IS Multi-area SPB layer 2 I-SID redistribution configuration on
the switch.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display the IS-IS Multi-area SPB layer 2 I-SID redistribution configuration:
show isis multi-area l2 redistribute i-sid
Example
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to display the IS-IS Multi-area SPB IPv4 redistribution configuration for home to
remote, remote to home, unicast, routed multicast, specific Virtual Router Forwarding (VRF) instance,
and VRF IDs on the switch.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display the IS-IS Multi-area SPB IPv4 home to remote redistribution configuration:
show isis multi-area ip redistribute [home-to-remote [vrf WORD<1-16> |
vrfids WORD<0-512>]]
3. Display the IS-IS Multi-area SPB IPv4 remote to home redistribution configuration:
show isis multi-area ip redistribute [remote-to-home [vrf WORD<1-16> |
vrfids WORD<0-512>]]
4. Display the IS-IS Multi-area SPB IPv4 routed multicast redistribution configuration:
show isis multi-area ip redistribute routed-multicast [home-to-remote
[vrf WORD<1-16> | vrfids WORD<0-512>] | remote-to-home [vrf WORD<1-16>
| vrfids WORD<0-512>] | vrf WORD<1-16> | vrfids WORD<0-512>]]
Example
Displaying the IS-IS Multi-area SPB IPv4 unicast redistribution configuration on the switch:
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to display the IS-IS Multi-area SPB IPv6 redistribution configuration for home to
remote, remote to home, unicast, specific Virtual Router Forwarding (VRF) instance, and VRF IDs on the
switch.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display the IS-IS Multi-area SPB IPv6 home to remote redistribution configuration:
show isis multi-area ipv6 redistribute [home-to-remote [vrf WORD<1-16>
| vrfids WORD<0-512>]]
3. Display the IS-IS Multi-area SPB IPv6 remote to home redistribution configuration:
show isis multi-area ipv6 redistribute [remote-to-home [vrf WORD<1-16>
| vrfids WORD<0-512>]]
4. Display the IS-IS Multi-area SPB IPv6 unicast redistribution configuration:
show isis multi-area ipv6 redistribute unicast [home-to-remote [vrf
WORD<1-16> | vrfids WORD<0-512>] | remote-to-home [vrf WORD<1-16> |
vrfids WORD<0-512>] | vrf WORD<1-16> | vrfids WORD<0-512>]]
5. Display the IS-IS Multi-area SPB IPv6 redistribution configuration for VRF instance:
show isis multi-area ipv6 redistribute [vrf WORD<1-16>]
6. Display the IS-IS Multi-area SPB IPv6 redistribution configuration for VRF ID:
show isis multi-area ipv6 redistribute [vrfids WORD<0-512>]
Example
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to display the IS-IS Multi-area SPB Distributed Virtual Routing (DvR)
redistribution configuration on the switch.
Procedure
Example
Displaying the IS-IS Multi-area SPB DvR redistribution configuration on the switch:
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to display the IS-IS Multi-area SPB layer 2 multicast snooping redistribution
configuration on the switch.
Procedure
Example
Displaying the IS-IS Multi-area SPB layer 2 multicast snooping redistribution configuration on the
switch:
---------------------------------------------------------------------------------
Important
The EnableSpbmConfigMode boot flag must be enabled (default) before you can configure
SPBM or IS-IS. To verify the setting, navigate to Configuration > Edit > Chassis and click on
the Boot Config tab.
Use the following procedure to configure the minimum required SPBM and IS-IS parameters to enable
SPBM to operate on the switch. SPBM uses the Intermediate-System-to-Intermediate-System (IS-IS)
link state routing protocol to provide a loop free Ethernet topology that creates a shortest path
topology from every node to every other node in the network based on node MAC addresses.
Procedure
Note
Always configure two B-VLANs in the core to enable load distribution over both B-VLANs.
Note
Only one SBPM instance is supported.
Note
Only one manual area is supported.
d. In the SystemId field, update the default B-MAC value to a recognizable address.
Note
Although it is not strictly required for SPBM operation, you must change the IS-
IS system ID from the default B-MAC value to a recognizable address to easily
identify a switch. This helps to recognize the source and destination addresses for
troubleshooting purposes.
Note
The following tables list the minimum required SPBM and IS-IS parameters to allow SPBM
to operate on the switch. For more detailed information on all of the parameters see
the procedures that follow. For more information on how to configure VLANs, see VLAN
Configuration using EDM on page 3804.
Use the data in the following table to use the VLANs Basic tab.
Name Description
Type Specifies the type of VLAN:
• byPort
• byProtocolId
• spbm-bvlan
• private
Use the data in the following table to use the SPBM Globals tab.
Name Description
GlobalEnable Enables or disables SPBM globally. The default is
disabled.
To ensure proper cleanup of MAC tables after you
disable SPBM, save the configuration, and then
reboot the switch.
GlobalEtherType Specifies the global ethertype value as 0x8100 or
0x88a8. The default value is 0x8100.
NicknameServerEnable Enables or disables the nickname server. The
default is disabled.
Note:
Exception: not supported on VSP 8600 Series or
XA1400 Series.
Use the data in the following table to use the SPBM tab.
Name Description
Id Specifies the SPBM instance ID. Only one SPBM
instance is supported.
NodeNickName Specifies a nickname for the SPBM instance
globally. Valid value is 2.5 bytes in the format
<x.xx.xx>.
PrimaryVlan Specifies the primary SPBM B-VLANs to add to
the SPBM instance.
Vlans Specifies the SPBM B-VLANs to add to the SPBM
instance.
LsdbTrap Configures whether to enable or disable a trap
when the SPBM LSDB changes. The default is
disable.
IpShortcut Enables or disables SPBM IP shortcut state. The
default is disable.
SmltSplitBEB Specifies whether the switch is the primary or
secondary vIST peer. The default is primary.
Name Description
SmltVirtualBmac Specifies a virtual MAC address that can be used
by both peers.
SmltPeerSysId Specifies the system ID of the SPBM SMLT for this
SPBM instance.
Mcast Specifies if IP multicast over SPBM is enabled. The
default is disabled.
McastFwdCacheTimeout Specifies the global forward cache timeout in
seconds. The default is 210 seconds.
Ipv6Shortcut Enables or disables SPBM IPv6 shortcut state. The
default is disable.
McastSpbPimGwControllerEnable Enables or disables ISIS PLSB Multicast SPB PIM
Gateway controller. Disabled by default.
McastSpbPimGwGatewayEnable Enables or disables ISIS PLSB Multicast SPB PIM
Gateway. Disabled by default.
StpMultiHoming Enables or disables MSTP-Fabric Connect Multi
Homing.
The default is disabled (false).
BVlanOrigin Shows how the B-VLAN was created. The values
can be config for manual configuration using
Note: CLI or SNMP, or dynamic through Zero Touch
Exception: not supported on XA1400 Series and Fabric Configuration and Auto-sense. The default
VSP 8600 Series. is dynamic.
Use the data in the following table to use the IS-IS Manual Area tab.
Name Description
AreaAddr Specifies the IS-IS manual area. Valid value is 1-13
bytes in the format <xx.xxxx.xxxx...xxxx>. Only
one manual area is supported. Use the same
manual area across the entire SPBM cloud. For
IS-IS to operate, you must configure at least one
manual area.
Use the data in the following table to use the IS-IS Globals tab.
Name Description
AdminState Specifies the global status of IS-IS on the switch:
on or off. The default is off.
SystemId Specifies the IS-IS system ID for the switch.
Valid value is a 6–byte value in the format
<xxxx.xxxx.xxxx>.
Important:
After you have configured the SPBM nickname
and enabled IS-IS, if you require a change of the
system ID, you must also change the nickname.
However, for naming convention purposes or
configuration purposes, you may not want to
change the nickname. To maintain the same
nickname with a different system ID, see Job aid
on page 1018.
Use the data in the following table to use the IS-IS Interfaces tab.
Name Description
Index The identifier of this circuit, unique within the
Intermediate System. This value is for SNMP
Indexing purposes only and need not have any
relation to any protocol value.
AdminState Specifies the administrative state of the circuit: on
or off.
Use the data in the following table to use the IS-IS Interfaces SPBM tab.
Name Description
State Specifies whether the SPBM interface is enabled
or disabled.
Job aid
Important
After you have configured the SPBM nickname and enabled IS-IS. To maintain the same
nickname with a different system ID, perform the following steps:
1. Disable IS-IS.
2. Change the system ID.
3. Change the nickname to a temporary one.
4. Enable IS-IS.
5. Wait up to 20 minutes for the LSPs with the original system ID to age out.
Note
To check the age out time, use the show isis lsdb sysid <original-
sys-id> command on any of the other SPB nodes in the network. When there
is no output from this command, proceed to the next step. The time left (in
seconds) for the LSPs to age out is shown under the column LIFETIME.
6. Disable IS-IS.
7. Change the nickname to the original nickname.
8. Enable IS-IS.
Procedure
Use the data in the following table to use the Protocol Summary tab.
Name Description
Globals ISIS
AdminState Indicates the global status of IS-IS on the switch.
SystemId Indicates the IS-IS system ID for the switch. Valid value is a
6–byte value in the format <xxxx.xxxx.xxxx>
HostName Indicates a name for the system. This may be used as the
host name for dynamic host name exchange in accordance
with RFC 2763.
By default, the system name comes from the host name
configured at the system level.
Globals SPBM
GlobalEnable Indicates whether SPBM is enabled or disabled at the global
level.
Name Description
NodeNickName Indicates the nickname for the SPBM instance globally. Valid
value is 2.5 bytes in the format <x.xx.xx>.
PrimaryVlan Indicates the primary VLAN ID for this SPBM instance.
SmltSplitBEB Indicates whether the switch is the primary or secondary IST
peer.
ISIS Interfaces
Circuit Index Displays the identifier of this IS-IS circuit, unique within the
Intermediate System. This is for SNMP Indexing purposes
only and need not have any relation to any protocol value.
IfIndex Indicates the interface to which this circuit corresponds.
AdminState Indicates the administrative state of the circuit: on or off.
OperState Indicates the operational state of the circuit: up or down.
ISIS Adjacency View
Circuit Index Displays the identifier of this IS-IS circuit, unique within
the Intermediate System. This value is for SNMP Indexing
purposes only and need not have any relation to any protocol
value.
AdjIndex Displays a unique value identifying the IS adjacency from
all other such adjacencies on this circuit. This value is
automatically assigned by the system when the adjacency
is created
AdjIfIndex Indicates the interface to which this circuit corresponds.
AdjState Indicates the state of the adjacency:
• down
• initializing
• up
• failed
Procedure
Use the data in the following table to use the I-SID tab.
Name Description
SysId Indicates the system identifier.
Vlan Indicates the B-VLAN where this I-SID was configured or
discovered.
Isid Indicates the IS-IS SPBM I-SID identifier.
NickName Indicates the nickname of the node where this I-SID was
configured or discovered.
HostName Indicates the host name listed in the LSP, or the system name
if the host name is not configured.
Type Indicates the SPBM I-SID type; either configured or
discovered.
Important
The IEEE 802.1aq standard currently only defines the use of one hierarchy, Level 1. Level 2
function is disabled.
Procedure
Use the data in the following table to use the L1 Area tab.
Table 106:
Name Description
AreaAddr Specifies an area address reported in a Level 1
link-state packets (LSP) generated or received by
this Intermediate System.
Note
• The assignment of primary and secondary roles to the vIST peers is automatic. The switch
with the lower system ID (between the two vIST peers) is primary, and the switch with the
higher system ID is secondary when default system-id values are being used.
• SMLT peer system ID is part of the required configuration. You must configure the SMLT
peer system ID as the nodal MAC of the peer device. In the IS-IS network, the nodal MAC
of devices should be eight apart from each other.
• When using the default hardware assigned system-id value, the SMLT Virtual BMAC is
automatically derived by comparing the system-id values of the two vIST peers. A value of
0x01 plus the lower of the two system-id values is used as the SMLT Virtual BMAC.
When using a manually configured system-id value, the SMLT Virtual BMAC must also be
manually configured.
• An I-SID must be assigned to every VLAN that is a member of an Layer 2 VSN. Also if an
Layer 2 VSN is created on one vIST Peer, it must also be created on the other vIST peer.
Procedure
Procedure
Use the data in the following table to use the Globals tab.
Name Description
GlobalEnable Enables or disables SPBM globally. The default is
disabled.
To ensure proper cleanup of MAC tables after you
disable SPBM, save the configuration, and then
reboot the switch.
GlobalEtherType Specifies the global ethertype value as 0x8100 or
0x88a8. The default value is 0x8100.
NicknameServerEnable Enables or disables the nickname server. The
default is disabled.
Note:
Exception: not supported on VSP 8600 Series or
XA1400 Series.
Procedure
Use the data in the following table to use the SPBM tab.
Name Description
Id Specifies the SPBM instance ID. Only one SPBM
instance is supported.
NodeNickName Specifies a nickname for the SPBM instance
globally. Valid value is 2.5 bytes in the format
<x.xx.xx>.
PrimaryVlan Specifies the primary SPBM B-VLANs to add to
the SPBM instance.
Vlans Specifies the SPBM B-VLANs to add to the SPBM
instance.
LsdbTrap Configures whether to enable or disable a trap
when the SPBM LSDB changes. The default is
disable.
IpShortcut Enables or disables SPBM IP shortcut state. The
default is disable.
SmltSplitBEB Specifies whether the switch is the primary or
secondary vIST peer. The default is primary.
SmltVirtualBmac Specifies a virtual MAC address that can be used
by both peers.
SmltPeerSysId Specifies the system ID of the SPBM SMLT for this
SPBM instance.
Mcast Specifies if IP multicast over SPBM is enabled. The
default is disabled.
McastFwdCacheTimeout Specifies the global forward cache timeout in
seconds. The default is 210 seconds.
Ipv6Shortcut Enables or disables SPBM IPv6 shortcut state. The
default is disable.
McastSpbPimGwControllerEnable Enables or disables ISIS PLSB Multicast SPB PIM
Gateway controller. Disabled by default.
McastSpbPimGwGatewayEnable Enables or disables ISIS PLSB Multicast SPB PIM
Gateway. Disabled by default.
StpMultiHoming Enables or disables MSTP-Fabric Connect Multi
Homing.
The default is disabled (false).
BVlanOrigin Shows how the B-VLAN was created. The values
can be config for manual configuration using
Note: CLI or SNMP, or dynamic through Zero Touch
Exception: not supported on XA1400 Series and Fabric Configuration and Auto-sense. The default
VSP 8600 Series. is dynamic.
Procedure
2. Select SPBM.
3. Select the Nick Names tab.
Use the data in the following table to use the NickName tab.
Name Description
Level Indicates the level at which the system displays this LSP.
ID Indicates the 8 byte LSP ID, consisting of the SystemID,
Circuit ID, and Fragment Number.
LifetimeRemain Indicates the remaining lifetime in seconds for the LSP.
NickName Indicates the nickname for the SPBM node.
HostName Indicates the hostname listed in the LSP, or the system name
if the host name is not configured.
Procedure
Use the data in the following table to use the Interfaces SPBM tab.
Name Description
Index Specifies an Index value for the SPBM interface.
SpbmId Specifies the SPBM ID.
State Specifies whether the SPBM interface is enabled
or disabled.
Type Configures the SPBM instance interface-type on
the IS-IS interface located on the specified port or
MLT: ptpt or bcast. Only the point-to-point (ptpt)
interface type is supported.
L1Metric Configures the IS-IS Interface level 1 metric on the
specified port or MLT. The default value is 10.
Origin Specifies the source of the SPBM instance
configuration, either manually configured through
Note: CLI or EDM, or dynamically configured through
Exception: not supported on VSP 8600 Series or Auto-sense.
XA1400 Series.
Procedure
Use the data in the following table to use the Interfaces SPBM tab.
Name Description
Index Specifies an Index value for the SPBM interface.
SpbmId Specifies the SPBM ID.
State Specifies whether the SPBM interface is enabled
or disabled.
Type Configures the SPBM instance interface-type on
the IS-IS interface located on the specified port or
MLT: ptpt or bcast. Only the point-to-point (ptpt)
interface type is supported.
L1Metric Configures the IS-IS Interface level 1 metric on the
specified port or MLT. The default value is 10.
Origin Specifies the source of the SPBM instance
configuration, either manually configured through
Note: CLI or EDM, or dynamically configured through
Exception: not supported on VSP 8600 Series or Auto-sense.
XA1400 Series.
In SPBM, each node has a System ID, which also serves as Backbone MAC address (B-MAC) of the
switch. These Backbone MAC addresses are populated into the SPBM VLAN Forwarding Information
Base (FIB). When the network topology is discovered and stored in the IS-IS link-state database, each
node calculates shortest path trees for each source node, so that a unicast path now exists from every
node to every other node. With this information, each node populates unicast information received from
SPBM into the FIB for forwarding purposes.
I-SIDs are only used for virtual services (Layer 2 VSNs and Layer 3 VSNs). If you only enable IP Shortcuts
on the Backbone Edge Bridges, I-SIDs are never exchanged in the network as IP Shortcuts allows for
Global Routing Table (GRT) IP networks to be transported across IS-IS.
The IP Unicast FIB tab displays all of the IS-IS routes in the IS-IS LSDB. The Preference column in the IP
Unicast FIB tab displays the IP route preference.
Routes within the same VSN are added to the LSDB with a default preference of 7. Inter-VSN routes are
added to the LSDB with a route preference of 200. IS-IS accept policies allow you to change the route
preference for incoming routes. If the same route is learned from multiple sources with different route
preferences, then the routes are not considered equal cost multipath (ECMP) routes. The route with the
lowest route preference is the preferred route. In Layer 2, in the event of a tie-break between routes
from multiple sources, the tie-breaking is based on cost and hop count.
Procedure
Use the data in the following table to use the IP Unicast FIB tab.
Name Description
VrfId Specifies the VRF ID of the IP unicast FIB entry, 0 indicates
NRE.
DestinationIpAddrType Specifies the address type of the destination IP address.
DestinationIpAddr Specifies the destination IP Address of the IP unicast FIB
entry.
DestinationMask Specifies the destination IP mask of the IP unicast FIB entry
NextHopBmac Specifies the nexthop B-MAC of the IP unicast FIB entry.
DestId Specifies the destination I-SID of the IP unicast FIB entry.
Vlan Specifies the VLAN of the IP unicast FIB entry.
Isid Specifies the I-SID of the IP unicast FIB entry.
NextHopName Specifies the nexthop hostname of the IP unicast FIB entry.
OutgoingPort Specifies the outgoing port of the IP unicast FIB entry.
PrefixCost Specifies the prefix cost of the IP unicast FIB entry.
SpbmCost Specifies the B-MAC cost of the IP unicast FIB entry.
Preference Specifies the IP Route preference of the IP unicast FIB entry
MetricType Specifies the IP Metric Type of the IP unicast FIB entry.
In SPBM, each node has a System ID, which also serves as Backbone MAC address (B-MAC) of the
switch. These Backbone MAC addresses are populated into the SPBM VLAN Forwarding Information
Base (FIB). When the network topology is discovered and stored in the IS-IS link-state database, each
node calculates shortest path trees for each source node, so that a unicast path now exists from every
node to every other node. With this information, each node populates unicast information received from
SPBM into the FIB for forwarding purposes.
I-SIDs are only used for virtual services (Layer 2 VSNs and Layer 3 VSNs). If you only enable IP Shortcuts
on the Backbone Edge Bridges, I-SIDs are never exchanged in the network as IP Shortcuts allows for
Global Routing Table (GRT) IP networks to be transported across IS-IS.
Procedure
Use the data in the following table to use the IPv6 Unicast FIB tab.
Name Description
VrfId Specifies the VRF ID of the IPv6 unicast FIB entry, 0 indicates
NRE.
DestinationIpAddrType Specifies the address type of the destination IPv6 address.
DestinationIpAddr Specifies the destination IPv6 Address of the IPv6 unicast FIB
entry.
DestinationMask Specifies the destination IPv6 mask of the IPv6 unicast FIB
entry
NextHopBmac Specifies the nexthop B-MAC of the IPv6 unicast FIB entry.
DestIsid Specifies the destination I-SID of the IPv6 unicast FIB entry.
Vlan Specifies the VLAN of the IPv6 unicast FIB entry.
Isid Specifies the I-SID of the IPv6 unicast FIB entry.
NextHopName Specifies the nexthop hostname of the IPv6 unicast FIB entry.
OutgoingPort Specifies the outgoing port of the IPv6 unicast FIB entry.
PrefixCost Specifies the prefix cost of the IPv6 unicast FIB entry.
SpbmCost Specifies the B-MAC cost of the IPv6 unicast FIB entry.
MetricType Specifies the Metric Type of the IPv6 unicast FIB entry.
In SPBM, B-MAC addresses are carried within the IS-IS link-state database. To do this, SPBM supports an
IS-IS TLV that advertises the I-SID and B-MAC information across the network. Each node has a System
ID, which also serves as Backbone MAC address (B-MAC) of the switch. These Backbone MAC addresses
are populated into the SPBM VLAN Forwarding Information Base (FIB).
When the network topology is discovered and stored in the IS-IS link-state database, each node
calculates shortest path trees for each source node, so that a unicast path now exists from every node
to every other node. With this information, each node populates unicast information received from
SPBM into the FIB for forwarding purposes.
Procedure
Use the data in the following table to use the Unicast FIB tab.
Name Description
SysId Specifies the system ID of the node where the unicast FIB
entry originated.
Vlan Specifies the VLAN of the unicast FIB entry.
DestinationMacAddr Specifies the destination MAC Address of the unicast FIB
entry.
OutgoingPort Specifies the outgoing port of the unicast FIB entry.
HostName Specifies the host name of the node where unicast FIB entry
originated.
Cost Specifies the cost of the unicast FIB entry.
Procedure
Use the data in the following table to use the LSP Summary tab.
Table 107:
Procedure
Use the data in the following table to use the Adjacency tab.
Name Description
Interface Specifies the IS-IS interface on which the
adjacency is found.
Level Indicates the level of the IS-IS interface (Level 1
[default] or Level 2).
State Specifies the state of the adjacency:
• down
• initializing
• up
• failed
Name Description
AdjHostName Specifies the host name listed in the LSP, or the
system name if host name is not configured.
ParallelActive Specifies if the current adjacency among all the
parallel adjacencies between two nodes is active.
• true
• false
Procedure
Use the data in the following table to use the Globals tab.
Name Description
AdminState Specifies the global status of IS-IS on the switch:
on or off. The default is off.
LevelType Sets the router type globally:
• level1: Level-1 router type
• level1and2: Level–1/2 router type is not
supported.
The default value is level1.
SystemId Specifies the IS-IS system ID for the switch.
Valid value is a 6–byte value in the format
<xxxx.xxxx.xxxx>.
Important:
After you have configured the SPBM nickname
and enabled IS-IS, if you require a change of the
system ID, you must also change the nickname.
However, for naming convention purposes or
configuration purposes, you may not want to
change the nickname. To maintain the same
nickname with a different system ID, see Job aid
on page 1018.
Name Description
MaxLspGenInt Specifies the maximum interval, in seconds,
between generated LSPs by this Intermediate
system. The value must be greater than any value
configured for RxmtLspInt.
The default value is 900 seconds.
CsnpInt Specifies the Complete Sequence Number Packet
(CSNP) interval in seconds. This is a system level
parameter that applies for L1 CSNP generation on
all interfaces.
The default value is 10.
RxmtLspInt Specifies the minimum time between
retransmission of an LSP. This defines how fast
the switch resends the same LSP. This is a system
level parameter that applies for L1 retransmission
of LSPs.
The default value is 5 seconds.
PSNPInterval Specifies the Partial Sequence Number Packet
(PSNP) interval in seconds. This is a system level
parameter that applies for L1 PSNP generation on
all interfaces.
The default value is 2.
SpfDelay Specifies the SPF delay in milliseconds. This value
is used to pace successive SPF runs. The timer
prevents two SPF runs from being scheduled very
closely.
The default value is 100 milliseconds.
HostName Specifies a name for the system. This can be
used as the host name for dynamic host name
exchange in accordance with RFC 2763.
By default, the system name comes from the host
name configured at the system level.
IpSourceAddress Specifies IP source address for SPBM IP shortcuts.
Ipv6SourceAddress Specifies IPv6 source address for SPBM IP
shortcuts.
IpTunnelSourceAddress Specifies the IS-IS IPv4 tunnel source address.
Note:
Exception: Not supported on VSP 8600 Series.
Name Description
IpTunnelOverlay Permits the configuration of the tunnel source
address even though it belongs to a VRF with an
attached I-SID. The default is disabled.
IpTunnelMtu Specifies the size of the maximum transmission
unit (MTU). The default is 1950.
Note: This parameter applies to an ONA configuration
Exception: only supported on VSP 4450 Series. only.
Procedure
Use the data in the following table to use the System Level tab.
Name Description
Index Specifies the level: l1 or l2.
Only l1 is supported.
State Specifies the state of the database at this level. The value 'off'
indicates that IS-IS is not active at this level. The value 'on'
indicates that IS-IS is active at this level, and not overloaded.
The value 'waiting' indicates a database that is low on
an essential resources, such as memory. The administrator
may force the state to 'overloaded' by setting the object
SetOverload. If the state is 'waiting' or 'overloaded', you
originate LSPs with the Overload bit set.
SetOverload Sets or clears the overload condition. The possible values are
true or false.
The default value is false.
SetOverloadUntil Sets the IS-IS overload-on-startup value in seconds. The
overload-on-startup value is used as a timer to control when
to send out LSPs with the overload bit cleared after IS-IS
startup.
Note:
If you configure SetOverloadUntil to a number other than
zero, then the overload bit is set at this level when
the AdminState variable goes to the state 'on' for this
Intermediate System.
After the SetOverloadUntil seconds elapse, the overload flag
remains set if the implementation runs out of memory or if
you configured it manually using SetOverload to true.
If SetOverload is false, the system clears the overload bit
after SetOverloadUntil seconds elapse, if the system has not
run out of memory.
Procedure
Use the data in the following table to use the System Stats tab.
Name Description
CorrLSPs Indicates the number of corrupted in-memory link-state
packets (LSPs) detected. LSPs received from the wire with
a bad checksum are silently dropped and not counted.
AuthFails Indicates the number of authentication key failures
recognized by this Intermediate System.
LSPDbaseOloads Indicates the number of times the LSP database has become
overloaded.
ManAddrDropFromAreas Indicates the number of times a manual address has been
dropped from the area.
AttmptToExMaxSeqNums Indicates the number of times the IS has attempted to
exceed the maximum sequence number.
SeqNumSkips Indicates the number of times a sequence number skip has
occurred.
OwnLSPPurges Indicates the number of times a zero-aged copy of the
system's own LSP is received from some other node.
IDFieldLenMismatches Indicates the number of times a PDU is received with a
different value for ID field length to that of the receiving
system.
PartChanges Indicates partition changes.
AbsoluteValue Displays the counter value.
Cumulative Displays the total value since you opened the Stats tab.
Average/sec Displays the average value for each second.
Minimum/sec Displays the minimum value for each second.
Maximum/sec Displays the maximum value for each second.
LastVal/sec Displays the last value for each second.
Procedure
Use the data in the following table to use the Interfaces tab.
Name Description
Index The identifier of this circuit, unique within the
Intermediate System. This value is for SNMP
Indexing purposes only and need not have any
relation to any protocol value.
IfIndex Specifies the interface on which the circuit is
configured (port or MLT).
Type Specifies the IS-IS circuit type. Only the point-to-
point (PtToPt) interface type is supported.
AdminState Specifies the administrative state of the circuit: on
or off.
OperState Specifies the operational state of the circuit.
AuthType Specifies the authentication type:
• none
• simple: If selected, you must also specify a
key value but the key id is optional. Simple
password authentication uses a text password
in the transmitted packet. The receiving router
uses an authentication key (password) to verify
the packet.
• hmac-md5: If selected, you must also specify
a key value, but the key-id is optional. MD5
authentication creates an encoded checksum
in the transmitted packet. The receiving router
uses an authentication key (password) to verify
the MD5 checksum of the packet. There is an
optional key ID.
• hmac-sha–256: If selected, you must also
specify a key value, but the key-id is optional.
With SHA-256 authentication, the switch adds
an hmac-sha–256 digest to each Hello packet.
The switch that receives the Hello packet
computes the digest of the packet and
compares it with the received digest. If the
digests match, the packet is accepted. If the
digests do not match, the receiving switch
discards the packet. There is an optional key
ID.
Note:
Secure Hashing Algorithm 256 bits (SHA-256)
is a cipher and a cryptographic hash function
of SHA2 authentication. You can use SHA-256
to authenticate IS-IS Hello messages. This
authentication method uses the SHA-256 hash
function and a secret key to establish a secure
connection between switches that share the
same key.
This feature is in full compliance with RFC 5310.
Name Description
KeyId Specifies the authentication key ID.
LevelType Specifies the router type globally:
• level1: Level-1 router type
• level 1and2: Level–1/2 router type. This type is
not supported.
The default value is level1.
NumAdj Specifies the number of adjacencies on this circuit.
NumUpAdj Specifies the number of adjacencies that are up.
AutoNniEnable Enable to have the node create an IS-IS interface,
attach the interface to an SPBM instance, and then
enable IS-IS on the port interface.
This field displays on the Insert Interfaces dialog
box and applies to port interfaces only.
Origin Specifies the origin of the IS-IS circuit
configuration on the port, either manually
Note: configured through CLI or EDM or dynamically
Exception: not supported on VSP 8600 Series and configured through Auto-sense.
XA1400 Series.
Procedure
Note
This step only applies to the VSP 7400 Series.
6. Select Apply.
Use the data in the following table to use the Interfaces Level tab.
Name Description
Index The identifier of this circuit, unique within the Intermediate
System. This value is for SNMP Indexing purposes only and
need not have any relation to any protocol value.
Level Specifies the router type globally:
• l1: Level1 router type
• l12: Level1/Level2 router type. This type is not supported.
The default value is l1.
ISPriority Specifies an integer sub-range for IS-IS priority. The default is
64.
HelloTimer Configures the level 1 hello interval.
Specifies the maximum period, in milliseconds, between IS-IS
Hello Packets (IIH) PDUs on multiaccess networks at this level
for LANs. The value at Level1 is used as the period between
Hellos on Level1/Level2 point to point circuits. Setting this
value at Level 2 on an Level1/Level2 point-to-point circuit
results in an error of InconsistentValue.
The default value is 9000 milliseconds or 9 seconds.
HelloMultiplier Configures the level 1 hello multiplier. The default value is 3
seconds.
DRHelloTimer Indicates the period, in milliseconds, between Hello PDUs on
multiaccess networks when this Intermediate System is the
Designated Intermediate System. The default is 3.
Procedure
Use the data in the following table to use the Interface Counters tab.
Name Description
Index Shows a unique value identifying the IS-IS interface.
Level Shows the type of circuit that discovered the interface
counters. The point to point Hello PDU includes both Layer
1 and Layer 2, and IS from a single adjacency on point to
point links, therefore combining counts on point to point links
into one group.
AdjChanges Shows the number of times an adjacency state change has
occurred on this circuit.
Name Description
InitFails Shows the number of times initialization of this circuit has
failed. This counts events such as PPP NCP failures. Failures
to form an adjacency are counted by isisCircRejAdjs.
RejAdjs Shows the number of times an adjacency has been rejected
on this circuit.
IDFieldLenMismatches Shows the number of times an IS-IS control PDU with an
ID field length different to that for this system has been
received.
MaxAreaAddrMismatches Shows the number of times an IS-IS control PDU with a max
area address field different to that for this system has been
received.
AuthFails Shows the number of times an IS-IS control PDU with the
correct auth type has failed to pass authentication validation.
LANDesISChanges Shows the number of times the Designated IS has changed
on this circuit at this level. If the circuit is point to point, this
count is zero.
Procedure
Use the data in the following table to use the Interface Control Packets tab.
Name Description
Index Shows a unique value identifying the Intermediate-System-
to-Intermediate-System (IS-IS) interface.
Direction Indicates whether the switch is sending or receiving the
PDUs.
Hello Indicates the number of IS-IS Hello frames seen in this
direction at this level.
LSP Indicates the number of IS-IS LSP frames seen in this
direction at this level.
CSNP Indicates the number of IS-IS Complete Sequence Number
Packets (CSNP) frames seen in this direction at this level.
PSNP Indicates the number of IS-IS Partial Sequence Number
Packets (PSNP) frames seen in this direction at this level.
Procedure
The following table describes the fields in the Interface Counters tab.
Name Description
InitFails Indicates the number of times initialization of this circuit has
failed. This counts events such as PPP NCP failures.
RejAdjs Indicates the number of times an adjacency has been
rejected on this circuit.
IDFieldLenMismatches Indicates the number of times an Intermediate-System-to-
Intermediate-System (IS-IS) control PDU with an ID field
length different from that for this system has been received.
MaxAreaAddrMismatches Indicates the number of times an IS-IS control PDU with a
max area address field different from that for this system has
been received.
AuthFails Indicates the number of times an IS-IS control PDU with the
correct auth type has failed to pass authentication validation.
LANDesISChanges Indicates the number of times the Designated IS has changed
on this circuit at this level. If the circuit is point to point, this
count is zero.
AbsoluteValue Displays the counter value.
Cumulative Displays the total value since you opened the Stats tab.
Average/Sec Displays the average value for each second.
Minimum/Sec Displays the minimum value for each second.
Maximum/Sec Displays the maximum value for each second.
Last Val/Sec Displays the last value for each second.
Procedure
The following table describes the fields in the Interface Sending Control Packets tab.
Name Description
Hello Indicates the number of IS-IS Hello (IIH) PDUs seen in this
direction at this level. Point-to-Point IIH PDUs are counted at
the lowest enabled level: at L1 on Layer 1 or L1L2 circuits, and
at Layer 2 otherwise.
LSP Indicates the number of IS-IS LSP frames seen in this
direction at this level.
CSNP Indicates the number of IS-IS Complete Sequence Number
Packet (CSNP) frames seen in this direction at this level.
PSNP Indicates the number of IS-IS Partial Sequence Number
Packets (PSNPs) seen in this direction at this level.
AbsoluteValue Displays the counter value.
Cumulative Displays the total value since you opened the Stats tab.
Average/Sec Displays the average value for each second.
Minimum/Sec Displays the minimum value for each second.
Maximum/Sec Displays the maximum value for each second.
Last Val/Sec Displays the last value for each second.
Procedure
The following table describes the fields in the Interface Receiving Control Packets tab.
Name Description
Hello Indicates the number of IS-IS Hello PDUs seen in this
direction at this level. Point-to-Point IIH PDUs are counted
at the lowest enabled level: at L1 on Layer 1 or L1L2 circuits,
and at Layer 2 otherwise.
LSP Indicates the number of IS-IS link-state packet (LSP) frames
seen in this direction at this level.
CSNP Indicates the number of IS-IS Complete Sequence Number
Packet (CSNP) frames seen in this direction at this level.
PSNP Indicates the number of IS-IS Partial Sequence Number
Packets (PSNPs) seen in this direction at this level.
AbsoluteValue Displays the counter value.
Cumulative Displays the total value since you opened the Stats tab.
Average/Sec Displays the average value for each second.
Minimum/Sec Displays the minimum value for each second.
Maximum/Sec Displays the maximum value for each second.
Last Val/Sec Displays the last value for each second.
Procedure
Use the data in the following table to use the Manual Area or Manual Area Remote tab.
Name Description
AreaAddr Specifies the IS-IS manual area. Valid value is 1-13
bytes in the format <xx.xxxx.xxxx...xxxx>. Only
one manual area is supported. Use the same
manual area across the entire SPBM cloud. For
IS-IS to operate, you must configure at least one
manual area.
Use this procedure to enable Dynamic Nickname Assignment and specify a nickname allocation range.
Note
You must disable Dynamic Nickname Assignment before you can change the nickname
allocation range.
Procedure
Use the data in the following table to use the Globals tab.
Name Description
GlobalEnable Enables or disables SPBM globally. The default is
disabled.
To ensure proper cleanup of MAC tables after you
disable SPBM, save the configuration, and then
reboot the switch.
GlobalEtherType Specifies the global ethertype value as 0x8100 or
0x88a8. The default value is 0x8100.
NicknameServerEnable Enables or disables the nickname server. The
default is disabled.
Note:
Exception: not supported on VSP 8600 Series or
XA1400 Series.
For information about how to configure an IPsec NAT-T Responder, see IPsec configuration using EDM
on page 1803.
The tunnel source IP address can be either a brouter port IP, a CLIP IP, or a VLAN IP.
Note
Product Notice: Except VSP 8600 Series, all product series support a VLAN IP as the Fabric
Extend tunnel source IP address.
If using the tunnel originating address on the GRT, Fabric Extend has the following requirements:
• The tunnel source IP address must be on the GRT, not on a VRF.
Note
A best practice is to use separate IP addresses for the SPBM IP Shortcuts ip-source-
address command and the Fabric Extend ip-tunnel-source-address command.
However, if you want these IP addresses to be the same, you MUST exclude the ip-
source-address address with an IS-IS accept policy. You cannot use the redistribute
command with a route map exclusion.
Specify a CLIP interface to use as the source address for SPBM IP shortcuts.
• If IP Shortcuts is enabled, you must configure an IS-IS accept policy or exclude route-map to ensure
that tunnel destination IP addresses are not learned through IS-IS.
If you are using the tunnel originating address on a VRF, Fabric Extend has the following requirements:
• Configure a CLIP and tunnel source IP address on the VRF.
• Remote management of the VSP 4450 Series is possible after establishing IP Shortcut over IS-IS.
(Alternatively, you can enable GRT-VRF redistribution locally.)
Configuring Fabric Extend consists of two primary tasks: configuring the tunnel source address and
configuring the logical interface. These tasks must be completed on both ends of the tunnel.
The VSP 4450 Series source address command is different from other platforms. Also note that the
logical interface commands are different between Layer 2 and Layer 3 networks.
Note
VRF is an optional parameter. If a VRF is not configured, then FE uses the GRT.
Procedure
Note
The interface VLAN connecting to the ONA network port is always in the GRT and the
member port that the VLAN is part of is always an access port.
Use the data in the following table to use the Globals tab.
Name Description
AdminState Specifies the global status of IS-IS on the switch:
on or off. The default is off.
LevelType Sets the router type globally:
• level1: Level-1 router type
• level1and2: Level–1/2 router type is not
supported.
The default value is level1.
Name Description
SystemId Specifies the IS-IS system ID for the switch.
Valid value is a 6–byte value in the format
<xxxx.xxxx.xxxx>.
Important:
After you have configured the SPBM nickname
and enabled IS-IS, if you require a change of the
system ID, you must also change the nickname.
However, for naming convention purposes or
configuration purposes, you may not want to
change the nickname. To maintain the same
nickname with a different system ID, see Job aid
on page 1018.
Name Description
IpTunnelSourceAddress Specifies the IS-IS IPv4 tunnel source address.
Note:
Exception: Not supported on VSP 8600 Series.
Name Description
MAOperState Specifies the Multi-area SPB operational state. The
default is disabled.
Note:
Exception: Only supported on VSP 7400 Series.
VSP 4450 Series supports FE, but the switch must connect to an Open Networking Adapter (ONA)
because the VSP 4450 Series does not support FE natively:
• Configure Fabric Extend Logical Interfaces for Native Support on page 1176
• Configure Fabric Extend Logical Interfaces for ONA Support on page 1177
Configuring Fabric Extend consists of two primary tasks: configuring the tunnel source address and
configuring the logical interface. These tasks must be completed on both ends of the tunnel.
VRF is an optional parameter. If a VRF is not configured, then FE uses the GRT.
Procedure
Note
Different fields will be available depending on the type of core network you select.
Note
This step does not apply to XA1400 Series.
a. For DestIfIndex, select the physical port that the logical interface connects to or enter the name
of the MLT.
b. In Vids, type the list of VLANs for this logical interface.
c. In PrimaryVid, type the primary tunnel VLAN ID.
Note
The primary VLAN ID must be one of the VIDs listed in the Vids field.
Note
You cannot change the ESP cipher suite when IPsec is enabled on the FE tunnel.
Configuring Fabric Extend consists of two primary tasks: configuring the tunnel source address and
configuring the logical interface. These tasks must be completed on both ends of the tunnel.
The VSP 4450 Series source address command is different than other platforms. The logical interface
commands are different between Layer 2 and Layer 3 networks.
Note
The interface VLAN that connects to the ONA network port is always in the GRT, and the
member port that the VLAN is part of is always an access port.
VRF is an optional parameter. If a VRF is not configured, then FE uses the GRT.
Procedure
Note
Different fields will be available depending on the type of core network you select.
Note
The primary VLAN ID must be one of the VIDs listed in the Vids field.
Use the data in the following table to use the Logical Interfaces tab and the Insert Logical Interfaces
dialog. The available fields in the dialog differ depending on the type of core you select: layer 2 or ip.
Name Description
Id Specifies the index number that uniquely identifies this logical
interface.
This field displays on the Insert Logical Interfaces dialog only.
IfIndex Specifies the index number that uniquely identifies this logical
interface. This field is read-only.
This field displays on the Logical Interfaces tab only.
Name Specifies the administratively assigned name of this logical
interface, which can be up to 64 characters.
Type Specifies the type of logical interface to create:
• Specify layer 2 for a Layer 2 core network that the tunnel
Note: will traverse.
Exception: Type Layer 2 is not • Specify ip for a Layer 3 core network that the tunnel will
supported on XA1400 Series. traverse.
Vids Specifies the list of VLANs that are associated with this logical
interface.
Note:
Exception: Not supported on XA1400
Series.
CircIndex Identifies the IS-IS circuit created under the logical interface.
This field displays on the Logical Interfaces tab only.
NextHopVrf Identifies the next-hop VRF name to reach the logical tunnel
destination IP.
Note: This field displays on the Logical Interfaces tab only.
Exception: Not supported on XA1400
Series.
Note:
Exception: Only supported on XA1400
Series.
Name Description
AuthenticationKey Specifies the authentication key of this logical interface, which
can be up to 32 characters.
Note:
Exception: Only supported on XA1400
Series.
Mtu Specifies the Maximum Transmission Unit (MTU) size for each
logical interface. The default MTU value is 1950.
Note:
Exception: Only supported on XA1400
Series.
Note: Note:
Exception: Only supported on XA1400 When you configure the destination IP address for the IPsec
Series. tunnel, IKE protocol uses UDP port 500. However, if IPsec
NAT-T is detected, IKE protocol uses UDP port 4500 instead.
Name Description
CertSubjectName Specifies the digital certificate subject name used as the
identity certificate.
Note:
Exception: Only supported on XA1400
Series.
TunnelSourceType Specifies the type of source IP address for the IPsec tunnel.
• global specifies the tunnel source address configured in
Note: the IpTunnelSourceAddress field of the ISIS Globals tab.
Exception: Only supported on XA1400 • static specifies the manually configured source IP address
Series. for the IPsec tunnel.
• dhcp specifies the source IP address automatically
obtained from the management IP assigned through DHCP.
The default is global.
TunnelSourceAddress Specifies the source IP address for the IPsec tunnel.
Note:
Exception: Only supported on XA1400
Series.
TunnelVrf Specifies the VRF name associated with the IPsec tunnel.
Note:
Exception: Only supported on XA1400
Series.
Note
This procedure only applies to VSP 4900 Series, VSP 7400 Series, and XA1400 Series.
Adjust the TCP maximum segment size (MSS) to improve the throughput for the TCP session over a
Fabric Extend (FE) adjacency.
Note
If you downgrade to an earlier release that does not support this feature, you must disable the
feature and save the configuration. Downgrading to an earlier release requires a compatible
configuration file.
Procedure
Use the data in the following table to use the Globals tab.
Name Description
Forwarding Configures the system for forwarding
(routing) or for dropping. The default value
is forwarding.
DefaultTTL Configures the default time-to-live (TTL)
value for a routed packet. TTL indicates
the maximum number of seconds elapsed
before a packet is discarded. Enter an integer
from 1 to 255. The default value of 255
is used if a value is not supplied in the
datagram header.
ReasmTimeout Specifies the maximum number of seconds
that received fragments are held while they
wait for reassembly. The default value is 30
seconds.
Name Description
ICMPUnreachableMsgEnable Enables the generation of Internet
Control Message Protocol (ICMP) network
unreachable messages if the destination
network is not reachable from this system.
These messages help determine if the
system is reachable over the network. The
default is disabled.
Important:
As a best pactice, enable icmp-unreach-
msg only if it is absolutely required. If
icmp-unreach-msg is enabled and a packet
is received for which there is no route
in the routing table, CPU utilization can
dramatically increase.
Name Description
SourceRouteEnable Enables or disables IP Source Routing
globally. It is disabled by default.
ARPLifeTime Specifies the lifetime of an ARP entry within
the system, global to the switch. The default
value is 360 minutes.
EcmpEnable Globally enables or disables the Equal Cost
Multipath (ECMP) feature. The default is
disabled.
After ECMP is disabled, the EcmpMaxPath is
reset to the default value of 1.
EcmpMaxPath Globally configures the maximum number of
ECMP paths.
You cannot configure this feature unless
ECMP is enabled globally.
Different hardware platforms can support a
different number of ECMP paths. For more
information, see VOSS Release Notes.
Ecmp1PathList Selects a preconfigured ECMP path.
Ecmp2PathList Selects a preconfigured ECMP path.
Ecmp3PathList Selects a preconfigured ECMP path.
Ecmp4PathList Selects a preconfigured ECMP path.
Ecmp5PathList Selects a preconfigured ECMP path.
Ecmp6PathList Selects a preconfigured ECMP path.
Ecmp7PathList Selects a preconfigured ECMP path.
Ecmp8PathList Selects a preconfigured ECMP path.
EcmpPathListApply Applies changes in the ECMP pathlist
configuration, or in the prefix lists configured
as the pathlists.
TcpAdjustMssEnable Adjusts the TCP maximum segment size
(MSS) to improve the throughput for the TCP
Note: session over a Fabric Extend (FE) adjacency.
Exception: Only supported on VSP 4900 Series, VSP The default varies depending on hardware
7400 Series, and XA1400 Series. platform:
• For XA1400 Series, the default value is
enabled when at least one Fabric Extend
(FE) tunnel with a MTU less than or equal
to 1500 is configured.
• For VSP 4900 Series and VSP 7400
Series, the default is disabled.
Name Description
TcpAdjustMssType Displays if the MSS adjustment value is
manually configured or auto-derived.
Note:
Exception: Only supported on VSP 4900 Series, VSP
7400 Series, and XA1400 Series.
Procedure
Use the data in the following table to use the Logical Interfaces NextHop tab.
Name Description
Id Shows a unique value that identifies the logical
interface tunnel.
Ip Shows a unique value that identifies the next hop
IP address of the logical interface tunnel.
DestIfIndex Shows the next hop destination interface index
to reach the next hop IP of the logical interface
tunnel.
DestVid Shows the next hop destination VLAN ID to reach
the next hop IP of the logical interface tunnel.
The following sections provide procedural information you can use to configure Fabric Attach (FA) and
Logical Link Discovery Protocol (LLDP) using Enterprise Device Manager (EDM). For information about
LLDP related to FA, see Link Layer Discovery Protocol configuration using EDM on page 2226.
Procedure
Caution
Disabling FA flushes all FA element discovery and mappings.
Note
The only supported element type is faServer (FA Server).
6. To specify the assignment time-out, enter a time-out value in seconds in the AsgnTimeout field.
7. View the provision mode in the ProvisionMode field.
Note
The supported provision mode is spbm.
8. To specify the discovery time-out, enter a time-out value in seconds in the DiscTimeout field.
9. To clear the FA statistics, select the Clear FA Statistics checkbox.
10. To clear the error counters, select the check boxes ClearErrorCounters and/or
ClearGlobalErrorCounters.
11. Click Apply.
Use the data in the following table to use the Fabric Attach Globals tab.
Name Description
Service Enables or disables Fabric Attach service globally.
The default is enable.
ElementType Specifies the Fabric Attach element type.
The supported element type is Fabric Attach Server.
AsgnTimeout Specifies the Fabric Attach assignment time-out in seconds.
The range is 45 to 480 seconds. The default is 240 seconds.
ProvisionMode Specifies the Fabric Attach provision mode.
The supported provision mode is SPB.
DiscTimeout Specifies the Fabric Attach discovery time-out in seconds.
The range is 45 to 480 seconds. The default is 240 seconds.
Clear FA Statistics Clears Fabric Attach statistics.
ClearGlobalErrorCounters Clears Fabric Attach global error counters. Disabled by default.
Procedure
Use the data in the following table to use the Assignments tab.
Name Description
IfIndex Specifies the interface identifier of the I-SID-to-VLAN assignment.
Isid Specifies the I-SID value of the I-SID-to-VLAN assignment.
Vlan Specifies the VLAN ID component of the I-SID-to-VLAN assignment.
State Specifies the current state of the I-SID-to-VLAN assignment.
It can be one of the following values:
• Other
• Pending
• Active
• Rejected
You can enable Fabric Attach on a port, static MLT or an LACP MLT. Enabling FA on a port not only
enables tagging but also disables spanning tree on that port. Enabling FA on an MLT enables FA on all
ports of the MLT. When FA is enabled on ports in an MLT or LACP MLT, tagging is enabled and spanning
tree is disabled on all those ports.
Enabling FA on a port or MLT is necessary for element discovery. On the FA Server, FA is enabled
globally by default. However, you must explicitly enable FA on a desired port or MLT interface, following
which the FA Server can begin transmitting LLDP PDUs that contain the element discovery TLVs.
This information is received by FA Client and FA Proxy devices which in turn also transmit their FA
capabilities and settings. After the element handshake completes, the FA Server receives I-SID-to-VLAN
assignment mappings from the connected client or proxy devices, on that port or MLT.
Procedure
Note
FA is successfully enabled on the MLT, only if all ports of the MLT have FA successfully
enabled. Enabling FA enables LLDP on all ports. Tagging is enabled and spanning tree
is disabled.
Caution
Removing FA on an interface flushes all FA element discovery and I-SID-to-VLAN
mappings associated with that interface.
Use the data in the following table to use the Ports tab.
Name Description
IfIndex Specifies the interface (port or MLT) on which Fabric Attach is
configured.
State Specifies the current state of the Fabric Attach port. It is either
enabled or disabled.
This field indicates whether LLDP PDUs (that include FA TLVs) are
generated on the port (enabled) or not (disabled).
MsgAuthStatus Specifies the Fabric Attach message authentication status on the
port. It is either enabled or disabled.
MsgAuthKey Specifies the Fabric Attach message authentication key for the
associated port.
The maximum length of this key is 32 characters.
MgmtIsid Specifies the Fabric Attach management I-SID for the associated
port. The range is 0 to 16777215.
A zero value indicates that the management I-SID is not specified
for the interface.
Name Description
MgmtCvid Specifies the Fabric Attach management customer VLAN ID (C-
VID) for the interface.
A zero value indicates that no C-VID is specified for the interface.
Using the maximum configuration value for your switch indicates
the port is untagged. Platform support determines the C-VID
range.
Origin Specifies the origin of Fabric Attach port, either manually
configured through CLI or EDM, or dynamically configured through
Note: Auto-sense.
Exception: not supported on VSP
8600 Series or XA1400 Series.
When FA is enabled on an FA Server switch, LLDP PDUs are exchanged between the FA Server and
FA Clients or Proxies. Standard LLDPs allow neighbors to be learned. In addition, organizational specific
element discovery TLVs allow the Client or Proxy to recognize that it has attached to an FA Server.
Only after the discovery handshake is complete, an FA Client or Proxy can transmit I-SID-to-VLAN
assignments to join the SPB Fabric through the FA Server.
Procedure
Use the data in the following table to use the Elements tab.
Name Description
IfIndex Specifies the interface (port or MLT) at which the Fabric Attach element
was discovered.
ElementType Specifies the element type of the discovered Fabric Attach element, as
advertised using LLDP.
The supported element type is the Fabric Attach Server.
ElementVlan Specifies the VLAN ID of the discovered Fabric Attach element, as
advertised using LLDP.
ElementId Specifies the system ID of the discovered Fabric Attach element, as
advertised using LLDP.
ElementState Specifies the state flag data associated with the discovered Fabric
Attach element, as advertised using LLDP.
ElementOperAuthStatus Specifies the authentication status of the discovered Fabric Attach
element.
Name Description
ElementAsgnsOperAuthStat Specifies the authentication status of remote assignments.
us
ElementAuth Specifies the discovered element authentication status.
AsgnsAuth Specifies the assignment authentication status.
Viewing FA statistics
Use this procedure to view FA statistics.
Procedure
Use the data in the following table to use the Stats tab.
Name Description
PortIndex Specifies the port for which the FA statistics are displayed.
DiscElemReceived Specifies the number of element discoveries received on the port.
AsgnReceived Specifies the number of remote assignments received on the port.
AsgnAccepted Specifies the number of remote assignments accepted on the port.
AsgnRejected Specifies the number of remote assignments rejected on the port.
AsgnExpired Specifies the number of remote assignments that have expired, on the
port.
AuthFailed Specifies the number of authentications that have failed on the port.
DiscElemExpired Specifies the number of discovery elements that have expired on the
port.
DiscElemDeleted Specifies the number of discovery elements that are deleted on the
port.
AsgnDeleted Specifies the number of remote assignments deleted on the port.
AsgnAuthFailed Specifies the number of remote assignment authentications that failed
on the port.
Procedure
4. To view a graphical representation of the statistics, select a row and click the appropriate icon on the
top left-hand-side of the menu bar to draw a line chart, area chart, bar chart or a pie chart.
5. Click Clear Counters to clear the existing counters, and fix a reference point in time to restart the
counters.
6. Click Export, to export the statistical data to a file.
7. To fix a poll interval, select an appropriate value from the Poll Interval drop-down list.
Use the data in the following table to use the Fabric Attach tab.
Name Description
DiscElemReceived Specifies the number of discovery elements
received globally.
AsgnReceived Specifies the number of remote I-SID-to-VLAN
assignments received globally.
AsgnAccepted Specifies the number of remote I-SID-to-VLAN
assignments accepted globally.
AsgnRejected Specifies the number of remote I-SID-to-VLAN
assignments rejected globally.
AsgnExpired Specifies the number of remote I-SID-to-VLAN
assignments that expired globally.
AuthFailed Specifies the number of authentications that failed
globally.
DiscAuthFailed Specifies the number of discovery authentications
that failed globally.
DiscElemExpired Specifies the number of discovery elements that
expired globally.
DiscElemDeleted Specifies the number of discovery elements that
were deleted globally.
AsgnDeleted Specifies the number of remote assignments that
were deleted globally.
Ensure that a switch port is selected in the Device Physical View tab.
Procedure
4. Click Clear Counters to clear the existing counters, and fix a reference point in time to restart the
counters.
5. Click Export, to export the statistical data to a file.
6. To fix a poll interval, select an appropriate value from the Poll Interval drop-down list.
Use the data in the following table to use the Fabric Attach tab.
Name Description
DiscElemReceived Specifies the number of discovery elements received on a given port.
AsgnReceived Specifies the number of remote I-SID-to-VLAN assignments received
on a given port.
AsgnAccepted Specifies the number of remote I-SID-to-VLAN assignments accepted
on a given port.
AsgnRejected Specifies the number of remote I-SID-to-VLAN assignments rejected on
a given port.
AsgnExpired Specifies the number of remote I-SID-to-VLAN assignments that
expired on a given port.
AuthFailed Indicates the number of received TLVs for which authentication was
attempted and failed on the identified port.
DiscElemExpired Specifies the number of discovery elements that expired on a given
port.
DiscElemDeleted Specifies the number of discovery elements that were deleted on a
given port.
AsgnDeleted Specifies the number of remote assignments that were deleted on a
given port.
AsgnAuthFailed Specifies the number of remote assignment authentications that failed
on a given port.
Procedure
Procedure
Use the data in the following table to use the Zero Touch Client Auto Attach tab
Field Description
Type This column describes the type of client assigned to auto attach. Available FA client types are:
• Wireless AP (Type 1)
• Wireless AP (Type 2)
• Switch
• Router
• IP Phone
• IP Camera
• IP Video
• Security Device
• Virtual Switch
• Server Endpoint
• ONA (SDN)
• ONA (spb0IP)
Procedure
What to Do Next
Use the data in the following table to use the Interfaces tab.
Name Description
InterfaceIndex Specifies the interface index of the selected port or MLT.
InterfaceEnable Enables Endpoint Tracking on the selected port or MLT.
Optionally, if the RADIUS outbound attributes do not include an I-SID value, configure an I-SID offset
value, and globally enable I-SID offset for Endpoint Tracking. The I-SID offset value is used to calculate
an I-SID value for a switched UNI if no I-SID value is provided by the RADIUS server. In that case, the
I-SID value is calculated as follows: I-SID = VLAN ID + configured I-SID offset value.
After optionally configuring an I-SID offset value, enable Endpoint Tracking globally on the switch.
Note
If you have previously enabled Endpoint Tracking globally and want to change the currently
configured I-SID offset value, you must disable Endpoint Tracking globally, change the I-SID
value, and then re-enable Endpoint Tracking globally.
Procedure
Use the data in the following table to use the Globals tab.
Name Description
AutoIsidOffset The I-SID offset value. The default is 15990000.
AutoIsidOffsetEnable Enables or disables I-SID offset value globally on the switch. The default is
disabled.
Name Description
GlobalEnable Enables or disables Endpoint Tracking globally on the switch. The default is
disabled.
VisibilityEnable Enables or disables visibility mode for Endpoint Tracking. The default is
disabled.
Display all VLAN:ISID binding information on the switch for Endpoint Tracking.
Procedure
Use the data in the following table to use the Binding tab.
Name Description
IfIndex Specifies the interface index of the selected port or MLT.
MacAddress Specifies the MAC address that corresponds to the VLAN:ISID binding.
Status Specifies the Endpoint Tracking data binding status as follows:
• pending: indicates that a request has been sent to the RADIUS server
• accept: indicates that the RADIUS server has successfully returned the request
• reject: indicates that the RADIUS server has rejected the request
• timeout: indicates that the RADIUS server request has timed out. The entry is
deleted if it remains in this state for 15 minutes.
• serverNotConfigured: indicates that the RADIUS server is not configured for
Endpoint Tracking. The entry is deleted if it remains in this state for 15 minutes.
Note
This procedure only applies to the VSP 7400 Series.
Procedure
Use data in the following table to use the L2 I-SID List tab.
Name Description
Name Specifies the name of the layer 2 I-SID list.
RangeStart Specifies the I-SID value as the starting range for the layer 2 I-SID list.
RangeEnd Specifies the I-SID value as the ending range for the layer 2 I-SID list.
Note
This procedure only applies to the VSP 7400 Series.
Procedure
6. Select Insert.
Use the data in the following table to use the L2 Redistribute tab.
Name Description
Type Specifies the layer 2 Redistribution type.
Permit Configures the Multi-area SPB layer 2 I-SID redistribution policy as permit or deny.
ExceptListName Configures the name of layer 2 I-SID list. The system does not apply the Multi-area
SPB layer 2 I-SID redistribution policy to I-SID values or the range of I-SID values in
the layer 2 I-SID list.
Configure Multi-area SPB Layer 2 Multicast I-SID Redistribution for Home Area
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the Multi-area SPB layer 2 multicast redistribution for specific I-SID
value(s) in the home area.
Procedure
Use the data in the following table to use the L2 MC Redist Home ISID tab.
Name Description
I-sid Specifies the I-SID value.
Enable Enables layer 2 multicast redistribution for specific I-SID value in the home area.
PolicyName Specifies the name of the redistribution policy.
Configure Multi-area SPB L2 Multicast I-SID List Redistribution for Home Area
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the Multi-area SPB layer 2 multicast I-SID list redistribution for the
home area.
Procedure
Use the data in the following table to use the L2 MC Redist Home ISID List tab.
Name Description
ISID List Name Specifies the name of the I-SID list.
Enable Enables Multi-area SPB layer 2 multicast redistribution for the specific I-SID list in the
home area.
PolicyName Specifies the name of the redistribution policy.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to apply the Multi-area SPB layer 2 multicast redistribution that you configure in
the home area.
Procedure
Use data in the following table to use the L2 MC Apply Home tab.
Name Description
McastApply Applies or disables the Multi-area SPB layer 2 multicast redistribution in the home area.
• noAction
• apply
Configure Multi-area SPB Layer 2 Multicast I-SID Redistribution for Remote Area
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the Multi-area SPB layer 2 multicast redistribution for specific I-SID
value(s) in the remote area.
Procedure
Use the data in the following table to use the L2 MC Redist Remote ISID tab.
Name Description
I-sid Specifies the I-SID value.
Enable Enables layer 2 multicast redistribution for specific I-SID value in the remote area.
PolicyName Specifies the name of the redistribution policy.
Configure Multi-area SPB L2 Multicast I-SID List Redistribution for Remote Area
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the Multi-area SPB layer 2 multicast I-SID list redistribution for the
remote area.
Procedure
2. Select MultiArea.
3. Select the L2 MC Redist Remote ISID List tab.
4. Select Insert.
5. In the ISID List Name field, type the name of the I-SID list.
6. Select Enable.
7. (Optional) In the PolicyName field, type the policy name.
8. Select Insert.
Use the data in the following table to use the L2 MC Redist Remote ISID List tab.
6
Name Description
ISID List Name Specifies the name of the I-SID list.
Enable Enables Multi-area SPB layer 2 multicast redistribution for the specific I-SID list in the
remote area.
PolicyName Specifies the name of the redistribution policy.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to apply the Multi-area SPB layer 2 multicast redistribution that you configure in
the remote area.
Procedure
Use data in the following table to use the L2 MC Apply Remote tab.
Name Description
McastApply Applies or disables the Multi-area SPB layer 2 multicast redistribution in the remote area.
• noAction
• apply
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure Multi-area SPB layer 3 redistribution in the home area.
Procedure
Use the data in the following table to use the L3 Redist Home tab.
Name Description
VrfId Specifies the Virtual Router Forwarding ID.
Type Specifies the layer 3 redistribution type. The options are:
• ip-ucast - IPv4 unicast
• ip-mcast - IPv4 multicast
• ipv6-ucast - IPv6 unicast
RoutePolicy Associates a route policy to a specific layer 3 redistribution entry in the home area.
Enable Enables layer 3 redistribution in the home area. The default value is disabled.
Apply Applies the Multi-area SPB layer 3 redistribution filters in the home area. The default
value is noAction.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure Multi-area SPB layer 3 redistribution in the remote area.
Procedure
Use the data in the following table to use the L3 Redist Remote tab.
Name Description
VrfId Specifies the Virtual Router Forwarding ID.
Type Specifies the layer 3 redistribution type. The options are:
• ip-ucast - IPv4 unicast
• ip-mcast - IPv4 multicast
• ipv6-ucast - IPv6 unicast
RoutePolicy Associates a route policy to a specific layer 3 redistribution entry in the remote area.
Enable Enables layer 3 redistribution in the remote area. The default value is disabled.
Apply Applies the Multi-area SPB layer 3 redistribution filters in the remote area. The default
value is noAction.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the Multi-area SPB Distributed Virtual Routing (DvR) backbone
redistribtuion on the switch.
Procedure
Use data in the following table to use the DVR Redistribute tab.
Name Description
DvrBbRedistribute Configures the Multi-area SPB DvR redistribution on the switch. The default is
disabled.
Note
This procedure only applies to the VSP 7400 Series.
Procedure
Use data in the following table to use the Protocol Summary tab.
Name Description
AdminState Indicates the global status of remote IS-IS on the
switch.
SystemId Indicates the remote IS-IS system ID of the switch.
NodeNickName Indicates the nickname for the remote SPBM
instance globally.
Circuit Index Indicates the identifier of the IS-IS circuit. This
value is for SNMP indexing purposes only and
does not have any relation to any protocol value.
IfIndex Indicates the interface to which the circuit
corresponds.
AdminState Indicates the administrative state of the circuit.
• on
• off
Name Description
Circuit Index Indicates the unique identifier of the remote IS-IS
circuit. This value is for SNMP Indexing purposes
only and does not have any relation to any
protocol value.
AdjIndex Indicates value identifying the IS-IS adjacency
from all other such adjacencies on the circuit.
The system dynamically assigns this value when
it forms an adjacency.
Interface Indicates the remote IS-IS interface.
AdjState Indicates the state of the adjacency:
• down
• initializing
• up
• failed
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure remote IS-IS global parameters. SPBM uses IS-IS to discover
network topology, build shortest path trees between network nodes, and communicate network
information in the control plane.
Procedure
Use the data in the following table to use the Globals tab.
Name Description
AdminState Specifies the global status of remote IS-IS on the
switch. The default is off.
SystemId Specifies the IS-IS system ID for the switch.
Valid value is a 6–byte value in the format
<xxxx.xxxx.xxxx>.
Important:
After you configure the SPBM nickname and
enable remote IS-IS, if you change the system
ID, you must also change the nickname. However,
changing the nickname could impact the naming
convention or configuration. To maintain the same
nickname with a different system ID, see Job aid
on page 1018.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the remote IS-IS interfaces. SPBM uses IS-IS to discover network
topology, build shortest path trees between network nodes, and communicate network information in
the control plane.
Procedure
Name Description
Index Specifies the identifier of the circuit, unique within
the Intermediate System. This value is for SNMP
Indexing purposes only and need not have any
relation to any protocol value.
IfIndex Specifies the interface on which the circuit is
configured (port or MLT).
Type Specifies the IS-IS circuit type. Only the point-to-
point (PtToPt) interface type is supported.
AdminState Specifies the administrative state of the circuit: on
or off.
OperState Specifies the operational state of the circuit.
Name Description
AuthType Specifies the authentication type:
• none
• simple: If selected, you must also specify a
key value but the key id is optional. Simple
password authentication uses a text password
in the transmitted packet. The receiving router
uses an authentication key (password) to verify
the packet.
• hmac-md5: If selected, you must also specify
a key value, but the key-id is optional. MD5
authentication creates an encoded checksum
in the transmitted packet. The receiving router
uses an authentication key (password) to verify
the MD5 checksum of the packet. There is an
optional key ID.
• hmac-sha–256: If selected, you must also
specify a key value, but the key-id is optional.
With SHA-256 authentication, the switch adds
an hmac-sha–256 digest to each Hello packet.
The switch that receives the Hello packet
computes the digest of the packet and
compares it with the received digest. If the
digests match, the packet is accepted. If the
digests do not match, the receiving switch
discards the packet. There is an optional key
ID.
Note:
Secure Hashing Algorithm 256 bits (SHA-256)
is a cipher and a cryptographic hash function
of SHA2 authentication. You can use SHA-256
to authenticate IS-IS Hello messages. This
authentication method uses the SHA-256 hash
function and a secret key to establish a secure
connection between switches that share the
same key.
This feature is in full compliance with RFC 5310.
Name Description
AutoNniEnable Enable to have the node create an IS-IS interface,
attach the interface to an SPBM instance, and then
enable IS-IS on the port interface.
This field displays on the Insert Interfaces dialog
box and applies to port interfaces only.
Origin Specifies the origin of the IS-IS circuit
configuration on the port, either manually
configured through CLI or EDM or dynamically
configured through Auto-sense.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure remote IS-IS interface level parameters. SPBM uses IS-IS to discover
network topology, build shortest path trees between network nodes, and communicate network
information in the control plane.
Procedure
Use the data in the following table to use the Interfaces Level tab.
Name Description
Index Specifies the identifier of the circuit, the value is unique
within the remote IS-IS. The value is for SNMP Indexing
purposes only and does not relate to any protocol value.
Level Specifies the router type globally:
• l1: Level1 router type
• l12: Level1/Level2 router type. This type is not supported.
The default value is l1.
ISPriority Specifies an integer sub-range for remote IS-IS priority. The
default is 64.
Name Description
HelloTimer Configures the level 1 hello interval.
Specifies the maximum period, in milliseconds, between IS-IS
Hello Packets (IIH) PDUs on multiaccess networks at this level
for LANs. The value at Level1 is used as the period between
Hellos on Level1/Level2 point to point circuits. Setting this
value at Level 2 on an Level1/Level2 point-to-point circuit
results in an error of InconsistentValue.
The default value is 9000 milliseconds or 9 seconds.
HelloMultiplier Configures the level 1 hello multiplier. The default value is 3
seconds.
DRHelloTimer Indicates the period, in milliseconds, between Hello PDUs on
multiaccess networks when this Intermediate System is the
Designated Intermediate System. The default is 3.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure remote Shortest Path Bridging MAC (SPBM) on an interface.
Procedure
Use data in the following table to use the Interfaces SPBM tab.
Name Description
Index Specifies an Index value for the remote SPBM
interface.
SpbmId Specifies the remote SPBM ID.
State Specifies whether the remote SPBM interface is
enabled or disabled.
Type Configures the remote SPBM instance interface-
type on the IS-IS interface on the specific port
or MLT, the values are point-to-point (ptpt) or
broadcast (bcast). The system supports the ptpt
interface type only.
Name Description
L1Metric Configures the remote SPBM instance l1-metric on
the IS-IS interface on the specific port or MLT. The
default value is 10.
Origin Specifies the source of the remote SPBM instance
configuration.
• config - configure manually through CLI or
EDM.
• dynamic - configure dynamically through
Auto-sense.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to view statistical graph of the remote IS-IS interface counters.
Procedure
The following table describes the fields in the Interface Counters tab.
Name Description
InitFails Indicates the number of times initialization of this circuit has
failed. This counts events such as PPP NCP failures.
RejAdjs Indicates the number of times an adjacency has been
rejected on this circuit.
IDFieldLenMismatches Indicates the number of times an Intermediate-System-to-
Intermediate-System (IS-IS) control PDU with an ID field
length different from that for this system has been received.
MaxAreaAddrMismatches Indicates the number of times an IS-IS control PDU with a
max area address field different from that for this system has
been received.
AuthFails Indicates the number of times an IS-IS control PDU with the
correct auth type has failed to pass authentication validation.
LANDesISChanges Indicates the number of times the Designated IS has changed
on this circuit at this level. If the circuit is point to point, this
count is zero.
Name Description
AbsoluteValue Displays the counter value.
Cumulative Displays the total value since you opened the Stats tab.
Average/Sec Displays the average value for each second.
Minimum/Sec Displays the minimum value for each second.
Maximum/Sec Displays the maximum value for each second.
Last Val/Sec Displays the last value for each second.
Note
This procedure applies only to the VSP 7400 Series.
Perform this procedure to view statistical graph of the remote IS-IS interface sending control packets.
Procedure
Use data in the following table to use the Interface Sending Control Packets tab.
Name Description
Hello Indicates the number of IS-IS Hello (IIH) PDUs seen in this
direction at this level. Point-to-Point IIH PDUs are counted at
the lowest enabled level: at L1 on Layer 1 or L1L2 circuits, and
at Layer 2 otherwise.
LSP Indicates the number of IS-IS LSP frames seen in this
direction at this level.
CSNP Indicates the number of IS-IS Complete Sequence Number
Packet (CSNP) frames seen in this direction at this level.
PSNP Indicates the number of IS-IS Partial Sequence Number
Packets (PSNPs) seen in this direction at this level.
AbsoluteValue Displays the counter value.
Cumulative Displays the total value since you opened the Stats tab.
Average/Sec Displays the average value for each second.
Minimum/Sec Displays the minimum value for each second.
Name Description
Maximum/Sec Displays the maximum value for each second.
Last Val/Sec Displays the last value for each second.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to view statistical graph of the remote IS-IS interface receiving control packets.
Procedure
Use data in the following table to use the Interface Receiving Control Packets tab.
Name Description
Hello Indicates the number of IS-IS Hello PDUs seen in this
direction at this level. Point-to-Point IIH PDUs are counted
at the lowest enabled level: at L1 on L1 or L1L2 circuits, and at
L2 otherwise.
LSP Indicates the number of IS-IS link-state packet (LSP) frames
seen in this direction at this level.
CSNP Indicates the number of IS-IS Complete Sequence Number
Packet (CSNP) frames seen in this direction at this level.
PSNP Indicates the number of IS-IS Partial Sequence Number
Packets (PSNPs) seen in this direction at this level.
AbsoluteValue Displays the counter value.
Cumulative Displays the total value since you opened the Stats tab.
Average/Sec Displays the average value for each second.
Minimum/Sec Displays the minimum value for each second.
Maximum/Sec Displays the maximum value for each second.
Last Val/Sec Displays the last value for each second.
Note
This procedure only applies to the VSP 7400 Series.
Procedure
Use the data in the following table to use the Manual Area tab.
Name Description
AreaAddr Specifies the remote IS-IS manual-area in the
range of 1 to 13 bytes.
Note
This procedure applies only to the VSP 7400 Series.
Perform this procedure to display Level 1 remote area information. Remote Intermediate-System-to-
Intermediate-System (IS-IS) provides support for hierarchical routing, which enables the system to
partition large routing domains into smaller areas. Remote IS-IS uses a two-level hierarchy, dividing the
domain into multiple Level 1 areas and one Level 2 area. The Level 2 area serves as backbone of the
domain, connecting to all the Level 1 areas.
Important
The IEEE 802.1aq standard currently only defines the use of one hierarchy, Level 1. Level 2
function is disabled.
Procedure
Use the data in the following table to use the L1 Area Remote tab.
Name Description
AreaAddr Specifies an area address reported in a Level 1 link-state
packets (LSP) that the system generates or receives through
the Intermediate System.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to view the remote link-state packet (LSP) summary information. Link
State Packets (LSP) contain information about the state of adjacencies or defined and distributed
static routes. Intermediate-System-to-Intermediate-System (IS-IS) exchanges this information with
neighboring IS-IS routers at periodic intervals.
Procedure
Use the data in the following table to use the LSP Summary tab.
Name Description
Level Specifies the level at which the system displays the remote
LSP.
ID Specifies the 8-byte LSP ID, consisting of the system ID,
circuit ID, and Fragment Number.
Seq Specifies the sequence number for the LSP.
Checksum Specifies the 16-bit Fletcher Checksum for the LSP.
LifetimeRemain Specifies the remaining lifetime in seconds for the LSP.
HostName Specifies the host name.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to view remote IS-IS adjacency information. The platform sends IS-IS Hello
(IIH) packets to discover IS-IS neighbors and establish and maintain the IS-IS adjacency. The platform
continues to send IIH packets to maintain the adjacencies that the system establishes. For two nodes to
form an adjacency the B-VLAN pairs for the primary B-VLAN and secondary B-VLAN must match.
Procedure
Use the data in the following table to use the Adjacency tab.
Name Description
Interface Specifies the remote IS-IS interface on which the adjacency is
found.
Level Indicates the level of the remote IS-IS interface (Level 1
[default] or Level 2).
State Specifies the state of the adjacency:
• down
• initializing
• up
• failed
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the area virtual node parameters like system name, system ID, and
nickname on the Intermediate-System-to-Intermediate-System (IS-IS) instance.
Procedure
Use the data in the following table to use the Area VNode tab.
Name Description
VNodeNickName Specifies the nickname of the virtual node on the IS-IS instance.
VNodeSysId Specifies the system ID of the virtual node on the IS-IS instance.
VNodeSysName Specifies the system name of the virtual node on the IS-IS instance.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure the area virtual node parameters like system name, system ID, and
nickname on the remote Intermediate-to-Intermediate-System (IS-IS) instance.
Procedure
Use the data in the following table to use the Area VNode tab.
Name Description
VNodeNickName Specifies the nickname of the virtual node on remote IS-IS instance.
VNodeSysId Specifies the system ID of the virtual node on remote IS-IS instance.
VNodeSysName Specifies the system name of the virtual node on remote IS-IS instance.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to configure remote SPBM global parameters. SPBM uses the remote
Intermediate-System-to-Intermediate-System (IS-IS) link state routing protocol to provide a loop free
Ethernet topology that creates a shortest path topology from every node to every other node in the
network based on node MAC addresses.
Procedure
Name Description
Id Specifies the remote SPBM instance ID.
NodeNickName Specifies a nickname for the remote SPBM
instance globally. The value is 2.5 bytes in the
format <x.xx.xx>.
PrimaryVlan Specifies the primary SPBM B-VLANs to add to
the remote SPBM instance.
Vlans Specifies the SPBM B-VLANs to add to the remote
SPBM instance.
LsdbTrap Enables or disables a trap when the SPBM LSDB
changes. The default is disable.
IpShortcut Enables or disables SPBM IP shortcut state. The
default is disable.
SmltSplitBEB Specifies whether the switch is the primary or
secondary vIST peer. The default is primary.
SmltVirtualBmac Specifies a virtual MAC address that can be used
by both peers.
SmltPeerSysId Specifies the system ID of the SPBM SMLT for this
remote SPBM instance.
Mcast Specifies if IP multicast over remote SPBM is
enabled. The default is disabled.
McastFwdCacheTimeout Specifies the global forward cache timeout in
seconds. The default is 210 seconds.
Name Description
Ipv6Shortcut Enables or disables SPBM IPv6 shortcut state. The
default is disable.
McastSpbPimGwControllerEnable Enables or disables ISIS PLSB Multicast SPB PIM
Gateway controller. Disabled by default.
McastSpbPimGwGatewayEnable Enables or disables ISIS PLSB Multicast SPB PIM
Gateway. Disabled by default.
StpMultiHoming Enables or disables MSTP-Fabric Connect Multi
Homing.
The default is disabled (false).
BVlanOrigin Specifies the origin of the B-VLAN. The values are:
• config - manual configuration using CLI or
SNMP.
• dynamic - through Zero Touch Fabric
Configuration and Auto-sense.
The default is dynamic.
Note
This procedure only applies to the VSP 7400 Series.
Procedure
Use the data in the following table to use the Interfaces SPBM tab.
Name Description
Index Specifies an Index value for the remote SPBM
interface.
SpbmId Specifies the remote SPBM ID.
State Specifies whether the remote SPBM interface is
enabled or disabled.
Name Description
Type Configures the remote SPBM instance interface-
type on the IS-IS interface on the specific port
or MLT, the values are point-to-point (ptpt) or
broadcast (bcast). The system supports the ptpt
interface type only.
L1Metric Configures the remote SPBM instance l1-metric on
the IS-IS interface on the specific port or MLT. The
default value is 10.
Origin Specifies the source of the remote SPBM instance
configuration.
• config - configure manually through CLI or
EDM.
• dynamic - configure dynamically through
Auto-sense.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to view the SPBM Service Instance Identifier (I-SID) information. The SPBM
B-MAC header includes an I-SID with a length of 24 bits. This I-SID can be used to identify and transmit
any virtualized traffic in an encapsulated SPBM frame.
Procedure
Name Description
SysId Indicates the system identifier.
Vlan Indicates the B-VLAN where the remote I-SID is configured
or discovered.
Isid Indicates the remote IS-IS SPBM I-SID identifier.
NickName Indicates the nickname of the node where the remote I-SID is
configured or discovered.
Name Description
HostName Indicates the host name listed in the LSP, or the system
name, if you do not configure the host name.
Type Indicates the remote SPBM I-SID type. The values are
discover or configure.
Note
This procedure only applies to the VSP 7400 Series.
Procedure
Use the data in the following table to use the Nick Names tab.
Name Description
Level Indicates the level at which the system displays this LSP.
ID Indicates the 8 byte LSP ID, consisting of the System ID,
Circuit ID, and Fragment Number.
LifetimeRemain Indicates the remaining lifetime in seconds for the LSP.
NickName Indicates the nickname for the remote SPBM node.
HostName Indicates the hostname that the system displays in the LSP,
or the system name if the host name is not configured.
Note
This procedure only applies to the VSP 7400 Series.
In SPBM, each node has a System ID, which also serves as Backbone MAC address (B-MAC) of
the switch. The system populates these Backbone MAC addresses into the SPBM VLAN Forwarding
Information Base (FIB). When the system discovers a network topology and stores it in the IS-IS
link-state database, each node calculates shortest path trees for each source node, so that a unicast
path now exists from every node to every other node. With this information, each node populates
unicast information that it receives from SPBM into the FIB for forwarding purposes.
I-SIDs are only used for virtual services (Layer 2 VSNs and Layer 3 VSNs). If you only enable IP Shortcuts
on the Backbone Edge Bridges, I-SIDs are never exchanged in the network as IP Shortcuts allows for
Global Routing Table (GRT) IP networks to be transported across IS-IS.
The system adds the routes within the same VSN to the LSDB with a default preference of 7 and the
inter-VSN routes with a route preference of 200. With IS-IS accept policies you can change the route
preference for incoming routes. If the system learns the same route from multiple sources with different
route preferences, then the routes are not equal cost multipath (ECMP) routes. The system prefers the
route with the lowest route preference. In Layer 2, if there is a tie-break between routes from multiple
sources, the tie-breaking is based on cost and hop count.
Perform this procedure to display the remote IP unicast FIB. You can view the IP routes from remote
Backbone Edge Bridges (BEBs)
Procedure
Use the data in the following table to use the IP Unicast FIB tab.
Name Description
VrfId Specifies the VRF ID of the remote IP unicast FIB entry, 0
indicates NRE.
DestinationIpAddrType Specifies the address type of the destination IP address.
DestinationIpAddr Specifies the destination IP Address of the remote IP unicast
FIB entry.
DestinationMask Specifies the destination IP mask of the remote IP unicast FIB
entry
NextHopBmac Specifies the nexthop B-MAC of the remote IP unicast FIB
entry.
DestIsid Specifies the destination I-SID of the remote IP unicast FIB
entry.
Vlan Specifies the VLAN of the remote IP unicast FIB entry.
Isid Specifies the I-SID of the remote IP unicast FIB entry.
NextHopName Specifies the nexthop hostname of the remote IP unicast FIB
entry.
OutgoingPort Specifies the outgoing port of the remote IP unicast FIB
entry.
PrefixCost Specifies the prefix cost of the remote IP unicast FIB entry.
SpbmCost Specifies the B-MAC cost of the remote IP unicast FIB entry.
Name Description
Preference Specifies the IP Route preference of the remote IP unicast FIB
entry
MetricType Specifies the IP Metric Type of the remote IP unicast FIB
entry.
Note
This procedure only applies to the VSP 7400 Series.
In SPBM, each node has a System ID, which also serves as Backbone MAC address (B-MAC) of
the switch. The system populates these Backbone MAC addresses into the SPBM VLAN Forwarding
Information Base (FIB). When the system discovers a network topology and stores it in the IS-IS
link-state database, each node calculates shortest path trees for each source node, so that a unicast
path now exists from every node to every other node. With this information, each node populates
unicast information that it receives from SPBM into the FIB for forwarding purposes.
I-SIDs are only used for virtual services (Layer 2 VSNs and Layer 3 VSNs). If you only enable IP Shortcuts
on the Backbone Edge Bridges, I-SIDs are not exchanged in the network as IP Shortcuts allows for
Global Routing Table (GRT) IP networks to be transported across IS-IS.
Perform this procedure to display the remote IPv6 unicast FIB. You can view the IPv6 routes from
remote Backbone Edge Bridges (BEBs).
Procedure
Use the data in the following table to use the IPv6 Unicast FIB tab.
Name Description
VrfId Specifies the VRF ID of the remote IPv6 unicast FIB entry, 0
indicates NRE.
DestinationIpAddrType Specifies the address type of the destination IPv6 address.
DestinationIpAddr Specifies the destination IPv6 Address of the remote IPv6
unicast FIB entry.
DestinationMask Specifies the destination IPv6 mask of the remote IPv6
unicast FIB entry
NextHopBmac Specifies the nexthop B-MAC of the remote IPv6 unicast FIB
entry.
Name Description
DestIsid Specifies the destination I-SID of the remote IPv6 unicast FIB
entry.
Vlan Specifies the VLAN of the remote IPv6 unicast FIB entry.
Isid Specifies the I-SID of the IPv6 unicast FIB entry.
NextHopName Specifies the nexthop hostname of the remote IPv6 unicast
FIB entry.
OutgoingPort Specifies the outgoing port of the remote IPv6 unicast FIB
entry.
PrefixCost Specifies the prefix cost of the remote IPv6 unicast FIB entry.
SpbmCost Specifies the B-MAC cost of the remote IPv6 unicast FIB
entry.
MetricType Specifies the Metric Type of the remote IPv6 unicast FIB
entry.
Note
This procedure only applies to the VSP 7400 Series.
In SPBM, the IS-IS link-state database carries the B-MAC addresses. To do this, SPBM supports an IS-IS
TLV that advertises the I-SID and B-MAC information across the network. Each node has a System ID,
which also serves as Backbone MAC address (B-MAC) of the switch. These Backbone MAC addresses
are populated into the SPBM VLAN Forwarding Information Base (FIB).
When the system discovers a network topology and stores it in the IS-IS link-state database, each node
calculates shortest path trees for each source node, so that a unicast path now exists from every node
to every other node. With this information, each node populates unicast information that it receives
from SPBM into the FIB for forwarding purposes.
Procedure
Use the data in the following table to use the Unicast FIB Remote tab.
Name Description
SysId Specifies the system ID of the node where the remote unicast
FIB entry originates.
Vlan Specifies the VLAN of the remote unicast FIB entry.
DestinationMacAddr Specifies the destination MAC Address of the remote unicast
FIB entry.
OutgoingPort Specifies the outgoing port of the remote unicast FIB entry.
HostName Specifies the host name of the node where the remote
unicast FIB entry originates.
Cost Specifies the cost of the remote unicast FIB entry.
Note
This procedure only applies to the VSP 7400 Series.
In SPBM, the IS-IS link-state database carries the B-MAC addresses. To do this, SPBM supports an IS-IS
TLV that advertises the I-SID and B-MAC information across the network. Each node has a System
ID, which also serves as Backbone MAC address (B-MAC) of the switch. The system populates these
Backbone MAC addresses into the SPBM VLAN Forwarding Information Base (FIB).
When the system discovers a network topology and stores it in the IS-IS link-state database, each node
calculates shortest path trees for each source node, so that a unicast path now exists from every node
to every other node. With this information, each node populates unicast information that it receives
from SPBM into the FIB for forwarding purposes.
The system produces the remote multicast FIB only after you configure the virtual services and the
system learns them.
Procedure
Use the data in the following table to use the Multicast FIB tab.
Name Description
SysId Specifies the system ID of the node where the remote
multicast FIB entry originates.
Vlan Specifies the VLAN ID of the remote multicast FIB entry.
Name Description
McastDestMacAddr Specifies the multicast destination MAC Address of the
remote multicast FIB entry.
Isid Specifies the I-SID value in the remote multicast FIB entry.
Isid Name Specifies the name that the system assigns to the I-SID.
HostName Specifies the host name of the node where the multicast FIB
entry originates.
OutgoingInterfaces Specifies the switched UNI port outgoing interface of the
remote multicast FIB entry.
IncomingInterface Specifies the incoming interface (port or MLT) of the remote
multicast FIB entry.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to view the remote IP Multicast over Fabric Connect routes.
Procedure
Use the data in the following table to use the IpMcastRoutes tab.
Name Description
VsnIsid Specifies the VSN I-SID. Layer 2 VSN and Layer 3
VSN each require a VSN I-SID.
Group Specifies the group IP address for the IP Multicast
over Fabric Connect route.
Source Specifies the IP address where the IP Multicast
over Fabric Connect route originated.
SourceBeb Specifies the source BEB for the IP multicast route.
VlanId Specifies the ID for the C-VLAN.
VrfName Specifies the VRF name.
Name Description
DataIsid Specifies the data I-SID for the IP Multicast
over Fabric Connect route. A a BEB receives IP
multicast data from a sender, a BEB allocates
a data I-SID in the range of 16,000,000 to
16,512,000 for the stream. The stream is identified
by the source IP address, group IP address, and
the local VLAN the stream is received on. The data
I-SID is a child of the scope or VSN I-SID.
Type Specifies the type for the IP Multicast over Fabric
Connect route.
Bvlan Specifies the B-VLAN for the IP Multicast over
Fabric Connect route.
NniInterfaces Specifies the NNI ports for the IP multicast route.
SPBM runs in the core on the ports that connect to
the core. These ports are NNI ports. Ports that face
a customer VLAN are user-to-network interface
(UNI) ports.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to view the UNI ports associated with particular remote IP multicast routes.
Procedure
Use data in the following table to use the IpMcastRoutes-Uni Ports tab.
Name Description
VsnIsid Specifies the VSN I-SID. Layer 2 VSN and Layer 3
VSN each require a VSN I-SID.
Group Specifies the group IP address for the IP Multicast
over Fabric Connect route.
Source Specifies the IP address where the IP Multicast
over Fabric Connect route originates.
NickName Specifies the nickname.
Name Description
EgressVlan Specifies the egress VLAN of the IP multicast
route.
EgressActivePorts Specifies the egress active ports.
Note
This procedure only applies to the VSP 7400 Series.
Procedure
Use the data in the following table to use the System Stats tab.
Name Description
CorrLSPs Indicates the number of corrupted in-memory link-state
packets (LSPs) detected. LSPs received from the wire with
a bad checksum are silently dropped and not counted.
AuthFails Indicates the number of authentication key failures
recognized by this Intermediate System.
LSPDbaseOloads Indicates the number of times the LSP database has become
overloaded.
ManAddrDropFromAreas Indicates the number of times a manual address has been
dropped from the area.
AttmptToExMaxSeqNums Indicates the number of times the IS has attempted to
exceed the maximum sequence number.
SeqNumSkips Indicates the number of times a sequence number skip has
occurred.
OwnLSPPurges Indicates the number of times a zero-aged copy of the
system's own LSP is received from some other node.
IDFieldLenMismatches Indicates the number of times a PDU is received with a
different value for ID field length to that of the receiving
system.
PartChanges Indicates partition changes.
AbsoluteValue Displays the counter value.
Cumulative Displays the total value since you opened the Stats tab.
Name Description
Average/sec Displays the average value for each second.
Minimum/sec Displays the minimum value for each second.
Maximum/sec Displays the maximum value for each second.
LastVal/sec Displays the last value for each second.
Note
This procedure only applies to the VSP 7400 Series.
Procedure
Use the data in the following table to use the Interface Counters tab.
Name Description
Index Shows a unique value identifying the IS-IS interface.
Level Shows the type of circuit that discovered the interface
counters. The point to point Hello PDU includes both Layer
1 and Layer 2, and IS from a single adjacency on point to
point links, therefore combining counts on point to point links
into one group.
AdjChanges Shows the number of times an adjacency state change has
occurred on this circuit.
InitFails Shows the number of times initialization of this circuit has
failed. This counts events such as PPP NCP failures. Failures
to form an adjacency are counted by isisCircRejAdjs.
RejAdjs Shows the number of times an adjacency has been rejected
on this circuit.
IDFieldLenMismatches Shows the number of times an IS-IS control PDU with an
ID field length different to that for this system has been
received.
MaxAreaAddrMismatches Shows the number of times an IS-IS control PDU with a max
area address field different to that for this system has been
received.
Name Description
AuthFails Shows the number of times an IS-IS control PDU with the
correct auth type has failed to pass authentication validation.
LANDesISChanges Shows the number of times the Designated IS has changed
on this circuit at this level. If the circuit is point to point, this
count is zero.
Note
This procedure only applies to the VSP 7400 Series.
Procedure
Use the data in the following table to use the Interface Control Packets tab.
Name Description
Index Shows a unique value identifying the Intermediate-System-
to-Intermediate-System (IS-IS) interface.
Level Specifies the level.
Direction Indicates whether the switch is sending or receiving the
PDUs.
Hello Indicates the number of IS-IS Hello frames seen in this
direction at this level.
LSP Indicates the number of IS-IS LSP frames seen in this
direction at this level.
CSNP Indicates the number of IS-IS Complete Sequence Number
Packets (CSNP) frames seen in this direction at this level.
PSNP Indicates the number of IS-IS Partial Sequence Number
Packets (PSNP) frames seen in this direction at this level.
Note
This procedure only applies to the VSP 7400 Series.
Perform this procedure to view the remote I-SID forwarding database (FDB) on the switch.
Note
To view the T-UNI I-SID FDB entries filtered on a port that is part of an MLT, you must mention
the MLT ID in the option for the port.
Procedure
Name Description
IsidId Specifies the service interface identifier (I-SID).
Address Specifies the MAC address of the port assigned to the specific I-SID or
C-MAC learned on the particular I-SID.
Status Specifies the learning status of the associated MAC.
Port Specifies the port on which the MAC is learned for the specific I-SID.
PortType Specifies if the MAC address is learned locally or on an NNI port from a
remote destination.
RemoteMacDestAddr Specifies the virtual BMAC address or system-ID of the remote destination.
RemoteMacBVlanId Specifies the B-VLAN ID on which the remote destination was discovered.
RemoteMacDestSysName Specifies the remote destination system name.
Cvid Specifies the customer VLAN ID of the associated Switched UNI port.
Examples and network illustrations in this document may illustrate only one of the supported platforms.
Unless otherwise noted, the concept illustrated applies to all supported platforms.
Note
For migration purposes, SPBM can coexist with existing SMLT configurations.
SwitchC
PORT CONFIGURATION - PHASE 1
SwitchG
PORT CONFIGURATION - PHASE 1
MLT CONFIGURATION
mlt 1 enable
mlt 1 member 1/21-1/22
mlt 1 encapsulation dot1q
SwitchD
MLT CONFIGURATION
mlt 1 enable
mlt 1 member 1/20,1/30
mlt 1 encapsulation dot1q
SwitchC
enable
configure terminal
prompt SwitchC
BOOT CONFIGURATION
spbm
spbm ethertype 0x8100
router isis
spbm 1
spbm 1 nick-name f.30.13
spbm 1 b-vid 20
ISIS CONFIGURATION
is-type l1
manual-area 30.0000
sys-name SwitchC
exit
router isis enable
VLAN CONFIGURATION
SwitchG
enable
configure terminal
prompt SwitchG
BOOT CONFIGURATION
spbm
spbm ethertype 0x8100
router isis
spbm 1
spbm 1 nick-name f.30.10
spbm 1 b-vid 20
ISIS CONFIGURATION
is-type l1
manual-area 30.0000
sys-name SwitchG
exit
router isis enable
VLAN CONFIGURATION
SwitchD
enable
configure terminal
prompt SwitchD
BOOT CONFIGURATION
spbm
spbm ethertype 0x8100
router isis
spbm 1
spbm 1 nick-name f.30.14
spbm 1 b-vid 20
ISIS CONFIGURATION
is-type l1
manual-area 30.0000
sys-name SwitchD
exit
router isis enable
VLAN CONFIGURATION
The following sections show the steps required to configure the IS-IS SPBM interfaces in this example.
SwitchC
PORT CONFIGURATION - PHASE II
SwitchG
PORT CONFIGURATION - PHASE II
interface mlt 1
isis
isis spbm 1
isis enable
exit
SwitchD
MLT INTERFACE CONFIGURATION
interface mlt 1
isis
isis spbm 1
isis enable
exit
IFIDX TYPE LEVEL OP-STATE ADM-STATE ADJ UP-ADJSPBM-L1 OP-SPBM- ORIGIN AREA AREA-NAME
-METRIC L1-METRIC
--------------------------------------------------------------------------------------------------------------------
Port1/30 pt-pt Level 1 UP UP 1 1 10 10 CONFIG HOME area-9.00.02
----------------------------------------------------------------------------------------------------
Home: 1 out of 1 interfaces have formed an adjacency
Remote: 0 out of 0 interfaces have formed an adjacency
----------------------------------------------------------------------------------------------------
SwitchC:1# show isis spbm unicast-fib
==================================================================================================
SPBM UNICAST FIB ENTRY INFO
==================================================================================================
DESTINATION BVLAN SYSID HOST-NAME OUTGOING COST AREA AREA-NAME
ADDRESS INTERFACE
--------------------------------------------------------------------------------------------------
00:0e:62:25:a3:df 4000 0016.ca23.73df SwitchG 1/30 10 HOME area-9.00.02
00:14:0d:a0:13:df 4000 0014.0da0.13df SwitchD 1/30 10 HOME area-9.00.02
--------------------------------------------------------------------------------------------------
Home: Total number of SPBM UNICAST FIB entries 2
Remote: Total number of SPBM UNICAST FIB entries 0
--------------------------------------------------------------------------------------------------
SwitchC:1# show isis spbm unicast-tree 4000
Node:000e.6225.a3df.00 (SwitchG) -> ROOT
Node:0014.0da0.13df.00 (SwitchD) -> Node:000e.6225.a3df.00 (SwitchG) -> ROOT
----------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------
Home: Total number of SPBM UNICAST FIB entries 2
Remote: Total number of SPBM UNICAST FIB entries 0
--------------------------------------------------------------------------------------------------
SwitchG:1# show isis spbm unicast-tree 4000
Node:0015.e89f.e3df.00 (SwitchC) -> ROOT
Node:0014.0da0.13df.00 (SwitchD) -> ROOT
-----------------------------------------------------------------------------------------------------
SwitchD:1# show isis spbm unicast-fib
==================================================================================================
SPBM UNICAST FIB ENTRY INFO
==================================================================================================
DESTINATION BVLAN SYSID HOST-NAME OUTGOING COST AREA AREA-NAME
ADDRESS INTERFACE
--------------------------------------------------------------------------------------------------
00:0e:62:25:a3:df 4000 000e.6225.a3df SwitchG MLT-1 10 HOME area-9.00.02
00:15:e8:9f:e3:df 4000 0015.e89f.e3df SwitchC MLT-1 10 HOME area-9.00.02
--------------------------------------------------------------------------------------------------
Home: Total number of SPBM UNICAST FIB entries 2
Remote: Total number of SPBM UNICAST FIB entries 0
--------------------------------------------------------------------------------------------------
SwitchD:1# show isis spbm unicast-tree 4000
Node:000e.6225.a3df.00 (SwitchG) -> ROOT
Node:0015.e89f.e3df.00 (SwitchC) -> Node:000e.6225.a3df.00 (SwitchG) -> ROOT
This section provides configuration examples to configure Fabric Extend in the following deployment
scenarios:
• Fabric Extend over IP using the GRT on page 1238
• Fabric Extend over IP using a VRF on page 1241
• Fabric Extend over VPLS on page 1243
• Fabric Extend over Layer 2 Pseudowire on page 1246
• Fabric Extend with ONAs in the Core and Branches on page 1248
• Fabric Extend Over IPsec on page 1251
For more configuration examples, see Shortest Path Bridging (802.1aq) Technical Configuration Guide.
Note
• This deployment uses the GRT so the tunnel source IP address must be on the GRT, not on
a VRF.
• If IP Shortcuts is enabled, you must configure an IS-IS accept policy or exclude route-map
to ensure that tunnel destination IP addresses are not learned through IS-IS.
• Add any IP address used for setting up the logical tunnel (such as local network and
loopback IP addresses) to the IS-IS accept policy or exclude route-map to prevent these
addresses from being advertised into IS-IS.
The following figure shows a sample Fabric Extend deployment over IP using the GRT.
(The tunnel source address is a CLIP address on the GRT. This address is configured on the 1 Gbps
switch and then automatically assigned to the ONA.)
Switch(config)# interface loopback 256
Switch(config-if)# ip address 256 197.1.6.2/255.255.255.0
Switch(config-if)# ip ospf 256
Switch(config-if)# exit
Intermediate routers are typically configured by an Internet service provider (ISP). The following
configurations are for reference only.
Switch(config)# interface GigabitEthernet 8/19
Switch(config-if)# default-vlan-id 0
Switch(config-if)# name "ospf-intf-from-Headoffice"
Switch(config-if)# no shutdown
Switch(config-if)# brouter port 8/19 vlan 3036 subnet 197.1.1.3/255.255.255.0 mac-offset 2
Switch(config-if)# ip ospf enable
Switch(config-if)# exit
The following figure shows a sample Fabric Extend deployment over IP using a VRF.
(The tunnel source address is a CLIP address on the VRF. This address is configured on the 1 Gbps
switch and then automatically assigned to the ONA.)
Switch(config)# ip vrf vrf24
Intermediate routers are typically configured by an Internet service provider (ISP). The following
configurations are for reference only.
Note
On the Core side, the 10/40/100 Gbps switches require a single next hop IP address as a
default gateway for all tunnels. To ensure the single next hop, VPLS uses a loopback IP
address and an additional VRF.
The following figure shows a sample Fabric Extend deployment over VPLS.
(The tunnel source address is a CLIP address on the VRF. This address is configured on the 1 Gbps
switch and then automatically assigned to the ONA.)
Switch(config)# ip vrf vrf24
Intermediate routers are typically configured by an Internet service provider (ISP). The following
configurations are for reference only.
Because the tunnels are point-to-point VLAN connections, not VXLAN, there is no need to encapsulate
a VXLAN header to SPB packets. Therefore, the 1 Gbps switches in this type of deployment do not
require ONAs.
Important
10/40/100 Gbps switch — — — — — — Core — — — — — — 1 Gbps switch
• You cannot have IS-IS in the Core.
• Do not create the two VLANs represented in the logical interface connection on the BEBs.
If you do, you will not be able add any Fabric Extend ports to be members of those
VLANs. One links the port that is facing the core and those VLANs in the logical interface
connection.
The following figure shows a sample Fabric Extend deployment over Pseudowire.
Note
Logical interface VLANs cannot be the same as the SPBM B-VLANs and you cannot create
these VLANs locally. Use these VLANs for configuring the logical interface only. Once a port is
being used for a logical interface it cannot be added to any platform VLAN and spanning tree
is automatically disabled on the port.
Switch(config)# logical-intf isis 255 vid 200,300 primary-vid 200 port 2/14 name
fe_to_Switch
Switch(config-isis-255)# isis
Switch(config-isis-255)# isis spbm 1
Switch(config-isis-255)# isis enable
Switch(config-isis-255)# exit
Note
Logical interface VLANs cannot be the same as the SPBM B-VLANs and you cannot create
these VLANs locally. Use these VLANs for configuring the logical interface only. Once a port is
being used for a logical interface it cannot be added to any platform VLAN and spanning tree
is automatically disabled on the port.
Switch(config)# mlt 11
Switch(config)# mlt 11 encapsulation dot1q
Switch(config)# mlt 11 mem 1/49-1/50
Switch(config)# router isis enable
Switch(config)# logical-intf isis 255 vid 200,300 primary-vid 200 mlt 11 name fe_to_Switch
Switch(config-isis-255)# isis
Switch(config-isis-255)# isis spbm 1
Switch(config-isis-255)# isis enable
Switch(config-isis-255)# exit
Intermediate routers are typically configured by an Internet service provider (ISP). The following
configurations are for reference only.
Switch(config)# vlan create 200 type port-mstprstp 1
Switch(config)# vlan create 300 type port-mstprstp 1
Switch(config)# vlan member add 200 8/1,8/19
Switch(config)# vlan member add 300 8/1,8/19
MTU sizes less than 1594 bytes require fragmentation and reassembly of packets and the 1 Gbps switch
with ONA supports fragmentation and reassembly. However, you must have 1 Gbps switches with ONAs
at BOTH ends of the IP WAN connection.
Important
There is no fragmentation/reassembly support in Layer 2 core solutions.
The following figure shows a sample Fabric Extend deployment using VRFs with both switches.
(The tunnel source address is a CLIP address on the VRF. This address is configured on the switch and
then automatically assigned to the ONA.)
Switch(config)# ip vrf vrf24
Switch(config)# router vrf vrf24
Switch(router-vrf)# ip ospf
Switch(router-vrf)# ip ospf admin-state
Switch(router-vrf)# exit
(The tunnel source address is a CLIP address on the VRF. This address is configured on the switch and
then automatically assigned to the ONA.)
Switch(config)# ip vrf vrf24
Intermediate routers are typically configured by an Internet service provider (ISP). The following
configurations are for reference only.
The following example shows a Fabric Extend deployment using service provider VLAN tunnels and
IPsec.
Note
Fabric Extend over IPsec limitations:
• Only pre-shared authentication key IPsec parameters are user configurable. Other, third-
party solutions are not configurable.
• The key exchange only uses the Internet Key Exchange (IKE) v2 protocol.
• IPsec support is only added for Fabric Extend tunnels.
• IPsec is not supported for regular layer 3 routed packets.
The global SPBM parameters must be configured before you can configure the Fabric Extend over IPsec
tunnel.
Note
The ipsec command is only available after the auth-key command is configured.
Switch> enable
Switch# configure terminal
Switch(config)# spbm
Switch(config-isis)# router isis
Switch(config-isis)# spbm 1
Switch(config-isis)# spbm 1 nick-name 1.11.40
Switch(config-isis)# spbm 1 b-vid 2,3 primary 2
Switch(config-isis)# is-type l1
Switch(config-isis)# manual-area c0.2000.0000.00
Switch(config-isis)# sys-name SwitchB
Switch(config-isis)# exit
Configuring Fabric Extend over IPsec consists of two primary tasks: configuring the tunnel source
address and configuring the logical interface. These tasks must be completed on both ends of the
tunnel.
Switch> enable
Switch# configure terminal
Note
Product Notice: 256-bit IPsec Encryption for Fabric Extend Tunnels is only supported on
XA1400 Series devices.
Configuring FA primarily consists of configuring the FA Server. The FA Server in turn discovers
neighboring FA component devices (like the FA Proxies and FA Clients) using FA TLVs within the
LLDP PDUs.
In the following deployment, the switch at the edge of the Fabric Connect cloud is configured as the
FA Server. On this switch, FA is enabled globally and at the interface (port) level. Another switch,
functioning as the FA Proxy connects to the FA enabled port (1/3) on the FA Server. User A is an end
user device that needs to send and receive data traffic from User B (another end user device) across the
network.
Configure SPBM and IS-IS on the edge and core switches. For more information, see Configure
Minimum SPBM and IS-IS Parameters on page 1014.
Procedure
configure terminal
2. Enable FA globally:
fa enable
3. Enter port interface configuration mode:
interface GigabitEthernet {slot/port[/sub-port] [-slot/port[/sub-
port]] [,...]}
4. Enable FA on the port:
fa enable
Note
Enabling FA automatically enables message authentication. Also, the authentication key is
set to the default value and the system displays the encrypted authentication key on the
output.
Note
Enabling FA on a port not only enables tagging but also disables spanning tree on that
port.
Example
SPBM configuration:
Switch:1>en
Switch:1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#spbm
Switch:1(config)#spbm ethertype 0x8100
Enable FA globally.
Switch:1(config)#fa enable
Switch:1(config)#show fa
=========================================================
Fabric Attach Configuration
=========================================================
FA Service : enabled
FA Element Type : server
FA Assignment Timeout : 240
FA Discovery Timeout : 240
FA Provision Mode : spbm
Enabling FA automatically enables message authentication. The authentication key is configured with
the default value, which the system displays in encrypted format in the output.
Switch:1(config)#int gigabitEthernet 1/3
Switch:1(config-if)#fa enable
Switch:1(config-if)#show fa interface port 1/3
===================================================================
Fabric Attach Interfaces
===================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
-------------------------------------------------------------------
Port1/3 enabled 0 0 enabled ****
-------------------------------------------------------------------
1 out of 1 Total Num of fabric attach interfaces displayed
-------------------------------------------------------------------
Switch:1(config-if)#exit
Switch:1(config)#exit
================================================================================
Fabric Attach Discovery Elements
================================================================================
MGMT ELEM ASGN
PORT TYPE VLAN STATE SYSTEM ID AUTH AUTH
--------------------------------------------------------------------------------
1/3 proxy 2 T / S 10:cd:ae:09:40:00:20:00:00:01 AP AP
================================================================================
Fabric Attach Authentication Detail
================================================================================
ELEM OPER ASGN OPER
PORT AUTH STATUS AUTH STATUS
--------------------------------------------------------------------------------
1/3 successAuth successAuth
Auth Legend:
AP= Authentication Pass, AF= Authentication Fail,
NA= Not Authenticated, N= None
--------------------------------------------------------------------------------
Verify the FA I-SID-to-VLAN assignment. An active state indicates that the FA (ELAN) I-SID is
successfully created with endpoint of type Switched UNI. By default, this I-SID is created for Layer 2.
Switch:1#show fa assignment
========================================================================
Fabric Attach Assignment Map
========================================================================
Interface I-SID Vlan State Origin
------------------------------------------------------------------------
1/3 44 2 active proxy
------------------------------------------------------------------------
1 out of 1 Total Num of fabric attach assignment mappings displayed
------------------------------------------------------------------------
For Layer 3 support, you must configure a platform VLAN. The platform VLAN can have the same value
as that of the C-VID or it can have a different value.
In this example, the platform VLAN has the same value as the C-VID.
Switch:1(config)#vlan create 2 type port-mstprstp 0
Switch:1(config)#vlan i-sid 2 44
Switch:1#show i-sid elan
======================================================================
Isid Info
======================================================================
ISID ISID PORT MLT ORIGIN
ISID
ID TYPE VLANID INTERFACES INTERFACES
NAME
----------------------------------------------------------------------
44 ELAN 2 c2:1/3 DISC_LOCAL ISID-44
Note that the edge switch (BEB) is discovered as the FA Server by the FA Proxy.
Switch:2(config)#show fa agent
The following figure shows a simple FA solution in a dual-homed SMLT deployment. In this deployment,
a pair of BEB switches (BEB A and BEB B) operating as IST peers are configured as the FA Server.
An access switch or a wiring closet switch configured as an FA Proxy connects to the FA Server.
The FA Proxy advertises I-SID-to-VLAN assignment mappings to the FA Server. Both BEB switches
receive the mapping information using LLDP PDUs containing assignment TLVs. The switch that learns
the mapping first considers the I-SID to be discovered locally and creates the I-SID on its device.
The mapping information is then shared with its IST peer switch. When the peer switch receives
the mapping across IST in a new SMLT message, it too creates the I-SID on its device. This I-SID
however, is considered to be discovered remotely because it is learnt from synchronization with the
peer switch. The mappings can also be learned on the FA Server from both LLDP PDUs and from IST
synchronization.
Ensure that the proxy device (for example, an access switch) is properly configured for FA. See the
corresponding product documentation for information on how to configure FA on the switch.
Procedure
Caution
For the IST peer switches acting as the FA Server to transmit the same FA System ID
(based on the virtual MAC), SMLT configuration on both the switches must be the same.
For detailed information on configuring SMLT and vIST, see MultiLink Trunking and Split MultiLink
Trunking on page 2357.
Configure BEB A and BEB B as the FA Server
configure terminal
3. Enable FA globally:
fa enable
4. Enter MLT interface configuration mode:
interface mlt <1–512>
5. Enable FA on the MLT:
fa enable
Note
Enabling FA automatically enables message authentication. Also, the authentication key is
set to the default value and the system displays the encrypted authentication key on the
output.
6. (Optional) Configure an FA authentication key with a value different from that of the default value:
fa authentication-key [WORD<0-32>]
Caution
When you configure the FA authentication key, you must configure the same value on
both BEB switches in the SMLT.
Note
Viewing ELAN I-SID information on an MLT is very useful to understand the origin of
the I-SID, when multiple client or proxy devices connecting to the FA Server using
SMLT MLT advertise the same I-SID-to-VLAN mappings. In the event of a link failure on
an MLT, the origin of the I-SID helps determine on which MLT, and thereby from which
proxy or client device, the mappings were successfully learnt.
Examples
On BEB A:
Switch:1>en
Switch:1#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#interface mlt 1
Switch:1(config)#smlt
On BEB B:
Switch:2>en
Switch:2#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch:2(config)#interface mlt 1
Switch:2(config)#smlt
On BEB A:
Switch:1(config)#vlan create 2261 type port-mstprstp 0
Switch:1(config)#vlan i-sid 2261 1502261
Switch:1(config)#interface vlan 2261
Switch:1(config)#ip address 192.0.2.0 255.255.255.0 2
On BEB B:
Switch:2(config)#vlan create 2261 type port-mstprstp 0
Switch:2(config)#vlan i-sid 2261 1502261
Switch:2(config)#interface vlan 2261
Switch:2(config)#ip address 192.0.2.1 255.255.255.0 2
FA configuration on BEB A:
================================================================================
Fabric Attach Configuration
================================================================================
FA Service : enabled
FA Element Type : server
FA Assignment Timeout : 240
FA Discovery Timeout : 240
FA Provision Mode : spbm
Optionally, configure an FA authentication key with the value dual-homed-smlt. Ensure that you
configure the same value on both switches BEB A and BEB B.
Switch:1(config)#interface mlt 1
Switch:1(config-mlt)#fa authentication-key dual-homed-smlt
====================================================================
Fabric Attach Interfaces
====================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
--------------------------------------------------------------------
Mlt1 enabled 0 0 enabled ****
--------------------------------------------------------------------
1 out of 1 Total Num of fabric attach interfaces displayed
--------------------------------------------------------------------
================================================================================
Fabric Attach Discovery Elements
================================================================================
MGMT ELEM ASGN
PORT TYPE VLAN STATE SYSTEM ID AUTH AUTH
--------------------------------------------------------------------------------
3/21 proxy 2 T / S 10:cd:ae:09:40:00:20:00:00:01 AP AP
3/22 proxy 2 T / S 10:cd:ae:09:40:00:20:00:00:01 AP AP
3/23 proxy 2 T / S 10:cd:ae:09:40:00:20:00:00:01 AP AP
================================================================================
Fabric Attach Authentication Detail
================================================================================
ELEM OPER ASGN OPER
PORT AUTH STATUS AUTH STATUS
--------------------------------------------------------------------------------
3/21 successAuth successAuth
3/22 successAuth successAuth
3/23 successAuth successAuth
Auth Legend:
AP= Authentication Pass, AF= Authentication Fail,
NA= Not Authenticated, N= None
--------------------------------------------------------------------------------
The FA Proxy advertises I-SID-to-VLAN assignment mappings to BEB A, on MLT ports 3/21 to 3/23.
View the FA I-SID-to-VLAN assignments on BEB-A:
All ports in the MLT receive the FA assignment mappings, as shown in the following output.
Switch:1(config)#show fa assignment
===================================================
Fabric Attach Assignment Map
==================================================
Interface I-SID Vlan State Origin
---------------------------------------------------
3/21 2 2 active proxy
3/21 3 3 active proxy
3/21 4 4 active proxy
3/22 2 2 active proxy
3/22 3 3 active proxy
3/22 4 4 active proxy
3/23 2 2 active proxy
3/23 3 3 active proxy
3/23 4 4 active proxy
FA configuration on BEB B:
Configure the FA authentication key dual-homed-smlt. Ensure that you configure the same value as
on BEB A.
Switch:2(config)#interface mlt 1
Switch:2(config-mlt)#fa authentication-key dual-homed-smlt
Switch:2(config)#show fa interface
====================================================================
Fabric Attach Interfaces
====================================================================
INTERFACE SERVER MGMT MGMT MSG AUTH MSG AUTH ORIGIN
STATUS ISID CVID STATUS KEY
--------------------------------------------------------------------
Mlt1 enabled 0 0 enabled ****
--------------------------------------------------------------------
1 out of 1 Total Num of fabric attach interfaces displayed
--------------------------------------------------------------------
================================================================================
Fabric Attach Discovery Elements
================================================================================
MGMT ELEM ASGN
PORT TYPE VLAN STATE SYSTEM ID AUTH AUTH
--------------------------------------------------------------------------------
3/17 proxy 2 T / S 10:cd:ae:09:40:00:20:00:00:01 AP AP
3/18 proxy 2 T / S 10:cd:ae:09:40:00:20:00:00:01 AP AP
3/19 proxy 2 T / S 10:cd:ae:09:40:00:20:00:00:01 AP AP
3/20 proxy 2 T / S 10:cd:ae:09:40:00:20:00:00:01 AP AP
================================================================================
Fabric Attach Authentication Detail
================================================================================
ELEM OPER ASGN OPER
PORT AUTH STATUS AUTH STATUS
--------------------------------------------------------------------------------
3/17 successAuth successAuth
3/18 successAuth successAuth
3/19 successAuth successAuth
3/20 successAuth successAuth
Auth Legend:
AP= Authentication Pass, AF= Authentication Fail,
NA= Not Authenticated, N= None
--------------------------------------------------------------------------------
The FA Proxy device advertises I-SID-to-VLAN assignment mapping requests to BEB B on MLT ports
3/17 to 3/20.
===================================================
Fabric Attach Assignment Map
==================================================
Verify the creation of FA Switched UNI (ELAN) I-SIDs on BEB A and BEB B.
On BEB A:
Switch:1(config)#show i-sid elan
===================================================================================
Isid Info
===================================================================================
ISID ISID PORT MLT ORIGIN ISID
ID TYPE VLANID INTERFACES INTERFACES NAME
-----------------------------------------------------------------------------------
2 ELAN N/A - c2:1 - --- - -lr - ISID-2
3 ELAN N/A - c3:1 - --- - -lr - ISID-3
4 ELAN N/A - c4:1 - --- - -lr - ISID-4
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
8k_fanout:1(config-if)#shlw mlt i-sid
================================================================================
MLT Isid Info
================================================================================
ISID ISID
MLTID IFINDEX ID VLANID C-VID TYPE ORIGIN ISID BPDU
NAME
--------------------------------------------------------------------------------
1 6144 2 N/A 2 ELAN - --- - -lr - ISID-2
1 6144 3 N/A 3 ELAN - --- - -lr - ISID-3
1 6144 4 N/A 4 ELAN - --- - -lr - ISID-4
--------------------------------------------------------------------------------
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
8k_fanout:1(config-if)#shlw mlt i-sid
On BEB B:
Switch:2(config)#show i-sid elan
===================================================================================
Isid Info
===================================================================================
ISID ISID PORT MLT ORIGIN ISID
ID TYPE VLANID INTERFACES INTERFACES NAME
------------------------------------------------------------------------------------
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
8k_fanout:1(config-if)#shlw mlt i-sid
================================================================================
MLT Isid Info
================================================================================
ISID ISID
MLTID IFINDEX ID VLANID C-VID TYPE ORIGIN ISID BPDU
NAME
--------------------------------------------------------------------------------
1 6144 2 N/A 2 ELAN - --- - -lr - ISID-2
1 6144 3 N/A 3 ELAN - --- - -lr - ISID-3
1 6144 4 N/A 4 ELAN - --- - -lr - ISID-4
--------------------------------------------------------------------------------
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
8k_fanout:1(config-if)#shlw mlt i-sid
The following section describes the behavior if, for example, a link failure occurs between the FA Proxy
and BEB B, as shown in the following figure.
===================================================
Fabric Attach Assignment Map
==================================================
Interface I-SID Vlan State Origin
---------------------------------------------------
3/21 2 2 active proxy
3/21 3 3 active proxy
3/21 4 4 active proxy
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
================================================================================
MLT Isid Info
================================================================================
ISID ISID
MLTID IFINDEX ID VLANID C-VID TYPE ORIGIN ISID BPDU
NAME
--------------------------------------------------------------------------------
1 6144 2 N/A 2 ELAN - --- - -l- - ISID-2
1 6144 3 N/A 3 ELAN - --- - -l- - ISID-3
1 6144 4 N/A 4 ELAN - --- - -l- - ISID-4
--------------------------------------------------------------------------------
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
8k_fanout:1(config-if)#shlw mlt i-sid
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
8k_fanout:1(config-if)#shlw mlt i-sid
================================================================================
MLT Isid Info
================================================================================
ISID ISID
MLTID IFINDEX ID VLANID C-VID TYPE ORIGIN ISID BPDU
NAME
--------------------------------------------------------------------------------
1 6144 2 N/A 2 ELAN - --- - --r - ISID-2
1 6144 3 N/A 3 ELAN - --- - --r - ISID-3
1 6144 4 N/A 4 ELAN - --- - --r - ISID-4
--------------------------------------------------------------------------------
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
8k_fanout:1(config-if)#shlw mlt i-sid
Note
You must first configure basic SPBM and IS-IS infrastructure. For more information, see SPBM
configuration examples on page 1231.
enable
configure terminal
router isis remote
manual-area 49.0050
spbm 1 nick-name 1.21.15
exit
router isis remote enable
show isis area-vnode
=================================================================================================
ISIS SPBM Multi-Area VNode Info
=================================================================================================
VNODE VNODE VNODE REPRESENTED REPRESENTED VNODE
SYSTEM-ID NICK-NAME HOST-NAME AREA-ADDRESS AREA USED-IN-AREA
-------------------------------------------------------------------------------------------------
9200.30ff.fff0 9.00.30 vn-30 49.0030 HOME REMOTE
9200.50ff.fff0 9.00.50 vn-50 49.0050 REMOTE HOME
-------------------------------------------------------------------------------------------------
show isis remote
======================================================================================
ISIS Remote Area Info
======================================================================================
AdminState : enabled
System ID : d887.66f6.e486
Num of Interfaces : 0
Num of Area Addresses : 1
router isis
multi-area l2 redistribute i-sid permit-all
exit
isis multi-area l2 apply redistribute i-sid
show isis multi-area l2 redistribute i-sid
========================================================================================
MULTI AREA L2 ISID REDIST POLICY
========================================================================================
Permit Except List Name
----------------------------------------------------------------------------------------
permit-all -
----------------------------------------------------------------------------------------
router isis
multi-area ip redistribute unicast
exit
isis multi-area ip apply redistribute unicast
show isis multi-area ip redistribute unicast
========================================================================================
ISIS Multiarea Redistribute List for ip unicast - GlobalRouter
========================================================================================
DIRECTION ENABLE RPOLICY
----------------------------------------------------------------------------------------
home-to-remote TRUE
remote-to-home TRUE
----------------------------------------------------------------------------------------
enable
configure terminal
router isis remote
manual-area 49.0050
spbm 1 nick-name 1.21.16
exit
router isis remote enable
show isis area-vnode
=================================================================================================
ISIS SPBM Multi-Area VNode Info
=================================================================================================
VNODE VNODE VNODE REPRESENTED REPRESENTED VNODE
SYSTEM-ID NICK-NAME HOST-NAME AREA-ADDRESS AREA USED-IN-AREA
-------------------------------------------------------------------------------------------------
9200.02ff.fff0 0.00.10 vn-area-0.00.10 10.0010 HOME REMOTE
9200.01ff.fff0 0.00.20 vn-area-0.00.20 20.0020 REMOTE HOME
-------------------------------------------------------------------------------------------------
show isis remote
=========================================================================================
ISIS Remote Area Info
=========================================================================================
AdminState : enabled
System ID : d884.66f6.e486
Num of Interfaces : 0
Num of Area Addresses : 1
Dynamically Learned Area :
Multi-Area OperState : disabled
isis remote
isis remote spbm 1
isis remote enable
exit
show isis adjacencies
====================================================================================================================
ISIS Adjacencies
====================================================================================================================
INTERFACE L STATE UPTIME PRI HOLDTIME SYSID HOST-NAME STATUS AREA AREA-NAME
--------------------------------------------------------------------------------------------------------------------
Port1/3 1 UP 20:33:27 127 19 b0ad.aa4d.b884 2118-50 ACTIVE HOME area-9.00.30
PortVirtual 1 UP 20:33:27 127 0 9200.50ff.fff0 area-9.00.50 ACTIVE HOME area-9.00.30
Port1/9 1 UP 00:01:16 127 27 d887.66f6.e484 BN2117 ACTIVE HOME area-9.00.30
Port1/4 1 UP 20:33:27 127 20 b0ad.aa40.1484 2119-50 ACTIVE REMOTE area-9.00.50
PortVirtual 1 UP 20:33:27 127 0 9200.30ff.fff0 area-9.00.30 ACTIVE REMOTE area-9.00.50
Port1/9 1 UP 00:01:00 127 21 d887.66f6.e486 BN2117 ACTIVE REMOTE area-9.00.50
--------------------------------------------------------------------------------------------------------------------
Home: 3 out of 3 interfaces have formed an adjacency
Remote: 3 out of 3 interfaces have formed an adjacency
--------------------------------------------------------------------------------------------------------------------
router isis
multi-area l2 redistribute i-sid permit-all
exit
isis multi-area l2 apply redistribute i-sid
show isis multi-area l2 redistribute i-sid
======================================================================================
MULTI AREA L2 ISID REDIST POLICY
======================================================================================
Permit Except List Name
--------------------------------------------------------------------------------------
permit-all -
--------------------------------------------------------------------------------------
At the Backbone Edge Bridges (BEBs), customer VLANs (C-VLAN) are mapped to I-SIDs based on
the local service provisioning. Outgoing frames are encapsulated in a MAC-in-MAC header, and then
forwarded across the core to the far-end BEB, which strips off the encapsulation and forwards the
frame to the destination network based on the I-SID-to-C-VLAN provisioning.
In the backbone VLAN (B-VLAN), Backbone Core Bridges (BCBs) forward the encapsulated traffic
based on the BMAC-DA, using the shortest path topology learned using IS-IS.
The following figure shows a sample campus SPBM Layer 2 VSN network.
Based on its I-SID scalability, this solution can scale much higher than any 802.1Q tagging based
solution. Also, due to the fact that there is no need for Spanning Tree in the core, this solution does not
need any core link provisioning for normal operation.
Redundant connectivity between the C-VLAN domain and the SPBM infrastructure can be achieved by
operating two SPBM switches in switch clustering (SMLT) mode. This allows the dual homing of any
traditional link aggregation capable device into an SPBM network.
One major difference between this switch and the ERS 8800 is how they connect to two SMLT devices.
The ERS 8800 uses an interswitch trunk (IST). The IST connects directly to two SMLT devices with a
dedicated MLT and runs IS-IS over it. The dedicated MLT carries the IST control traffic and data traffic
during an SMLT failover. This feature dramatically improves resiliency over other methods. However, if
the dedicated MLT breaks, then there is no way to communicate between the IST peers, which causes
traffic loss.
This switch uses a virtual IST (vIST) that eliminates this single point of failure. The vIST feature creates
a virtualized IST channel in the SPBM cloud. With vIST, the IST tunnel is always up as long as there
is SPBM connectivity between the vIST peers. vIST also interoperates between any two devices that
support vIST, and the devices do not have to be the same type of device.
Important
• An I-SID must be assigned to every VLAN that is a member of an Layer 2 VSN.
• For proper traffic flow, if an Layer 2 VSN is created on one vIST peer, it must also be
created on the other vIST peer.
• For Simplified vIST deployment, if a VLAN is part of an SMLT it must be configured on
both the IST peers.
For information about vIST, see MultiLink Trunking and Split MultiLink Trunking on page 2357.
The Fabric Connect technology delivers Layer 2 and Layer 3 virtualization. These virtualized Layer 2 and
Layer 3 instances are referred to as Virtual Service Networks (VSNs). A Service Identifier (I-SID) is used
to uniquely distinguish these service instances network-wide, and a User Network Interface (UNI) is the
boundary or demarcation point between the “service layer” of traditional networks, that is VLANs and
VRFs, and the Fabric Connect “service layer”, that is Layer 2 & Layer 3 VSNs.
• Layer 2 VSNs are virtual broadcast domains interconnecting UNI members that share the same
Layer 2 VSN I-SID. MAC learning/aging is applied to all Layer 2 VSNs.
• Layer 3 VSNs are virtual routed Layer 3 networks (Layer 3 VPN) leveraging IS-IS as the routing
protocol between VRFs that share the same Layer 3 VSN I-SID.
Fabric Connect uses the User-Network-Interface (UNI) to denote the capabilities and attributes of the
service interfaces. Fabric connect devices support the following UNI types:
• VLAN UNI (C-VLAN) — a device-specific VLAN-ID maps to a Layer 2 VSN I-SID – all device physical
ports that are associated with the VLAN are therefore associated with the UNI.
• Flex UNI — it has the following sub-types:
◦ Switched UNI — a VLAN-ID and a given port (VID, port) maps to a Layer 2 VSN I-SID. With this
UNI type, VLAN-IDs can be reused on other ports and therefore mapped to different I-SIDs.
◦ Transparent Port UNI — a physical port maps to a Layer 2 VSN I-SID (all traffic through that port,
802.1Q tagged or untagged, ingress and egress is mapped to the I-SID). Note: All VLANs on a
Transparent Port UNI interface now share the same single MAC learning table of the Transparent
Port UNI I-SID.
• E-Tree UNI — it extends Private VLANs beyond one Switch to form a network-wide E-Tree service
infrastructure. An E-Tree UNI is a Layer 2 VSN where broadcast traffic flows from Hub sites to Spokes
sites, and from Spokes to Hubs, but not between Spoke sites. E-Tree Hubs can be formed with any
VLAN UNI, while E-Tree Spokes must be configured as Private VLAN UNIs.
• Layer 3 VSN UNI — a device-specific VRF maps to an I-SID, and the control plane exchanges the
Layer 3 routes belonging to the same I-SID. All VRFs in a network sharing the same Layer 3 I-SID
effectively form an Layer 3 VPN. Layer 3 VSNs can be configured to simultaneously support both IP
Unicast and IP Multicast.
Use a Transparent Port User-Network-Interface (Transparent Port UNI or T-UNI) to map an entire port or
an MLT to an I-SID. CMAC learning is done against the I-SID. T-UNI configures a transparent port where
all traffic is MAC switched on an internal virtual port using the assigned I-SID. No VLAN is involved in
this process. Devices switch tagged and untagged traffic in the assigned I-SID regardless of the VLAN
ID. The T-UNI port or MLT can be either static or LACP and is not a member of any VLAN or Spanning
Tree Group (STG). The T-UNI port or MLT is always in the forwarding state.
You can map multiple ports to a T-UNI I-SID. Multiple ports on the same switch and on other BEBs can
use the common I-SID to switch traffic.
T-UNI is a point to point service and all traffic that ingress the UNI egress from the remote UNI
end-point
For information about QoS re-marking, see QoS re-marking on a Transparent Port UNI on page 2675.
Transparent
T-UNI is transparent because the MAC learning occurs within the I-SID, and packets that ingress from
any CVLAN are processed in an identical manner. Devices switch tagged and untagged traffic in the
assigned I-SID. Devices switch control protocols, such as BPDU, LACP, LLDP, and others, in the assigned
I-SID, rather than forwarding to the CP.
The service classification of packets that are received on a T-UNI port, is independent of the VLAN ID
values present in those packets. All data packets received on a T-UNI port are classified into the same
service. When data packets enter and exit the T-UNI service, no VLAN tag modifications are performed
on the data packets.
T-UNI based MAC learning
When a packet ingresses a port or MLT associated with a T-UNI I-SID, the system performs MAC lookup
based on the I-SID. A packet that ingresses a T-UNI port on a BEB can transfer through the SPB
network, or can egress out another T-UNI port configured to the same I-SID.
When a packet ingresses a network-to-network interface (NNI) port, before egressing a T-UNI port, the
system performs a MAC Destination Address (DA) lookup based on the I-SID. If the DA lookup fails, the
packet floods to all T-UNI ports.
Considerations
Note
MAC learning limit for T-UNI service is not supported on all hardware platforms.
All the Layer 2 and Layer 3 control packets are transparently bridged over the T-UNI port or MLT with
the exception of LACP, VLACP and LLDP PDUs. LACP PDUs, VLACP PDUs and LLDP PDUs are not
transparently bridged over the T-UNI port or MLT if LACP, VLACP or LLDP is enabled on the port or MLT.
• If an LACP MLT is associated with a T-UNI I-SID, LACP PDUs are extracted to CP and processed
locally.
• If LACP is not enabled globally and LACP MLT is not associated with the T-UNI I-SID, LACP PDUs are
transparently bridged across the T-UNI port or MLT.
• If a VLACP enabled port is added to a T-UNI I-SID, VLACP PDUs are extracted to the CP for local
processing. If a port that is not VLACP enabled is added to the T-UNI I-SID, VLACP PDUs are
transparently bridged across T-UNI port.
• If a LLDP enabled port is added to a T-UNI I-SID, LLDP PDUs are extracted to the CP for local
processing.
• If LLDP is not enabled on the port or MLT interface associated to TUNI I-SID , LLDP PDUs are
transparently bridged across the T-UNI port or MLT.
The following list of control packet types are transparently bridged across the T-UNI I-SID:
• SLPP
• VRRP
• OSPF
• RIP
• BGP
• ISIS
• CFM
• STP
• SONMP
An example of an application for T-UNI is a typical Ethernet provider deployment with port-based
classification and transparent forwarding.
Virtual IST (vIST) provides the ability to dual-home hosts, servers and other network devices to a pair
of Multi-Chassis Link Aggregation (MC-LAG) enabled devices. The system displays the MC-LAG nodes
to the connected devices as one link-aggregated group. So, although the physical connection is spread
between two individual network nodes, logically the system displays them as a single connection.
Transparent Port UNI (T-UNI) over vIST peers extends the capability of dual-home hosts on the SPB
cloud to achieve higher network resiliency. The MACs learnt on the T-UNI interface of any one vIST peer
is synchronized with the other peer through MAC synchronization.
In the following figure, the T-UNI access switch ACCESS-1 is dual-homed into vIST peer hosts VIST-PEER
1 and VIST-PEER 2. At ACCESS-1, a link aggregation is created to connect to the SPBM cluster. On the
VIST peers, an SMLT is created towards ACCESS-1. Depending on the link aggregation hashing logic,
traffic is hashed on to VIST-PEER 1 and VIST-PEER 2. The MACs learnt on the T-UNI interfaces of either
host is synchronized with the other host.
If you configure a T-UNI service as a single-homed service on a vIST-enabled node, you must configure
the same I-SID service without port/MLT being mapped to I-SID, on the other vIST peer node. Failure
to perform this configuration on the vIST peer node can result in the loss of traffic to the single-homed
T-UNI service in various scenarios.
Switched UNI
Switched User Network Interface (S-UNI) allows the association of local endpoints to I-SIDs based on
local port and VLAN together. With Switched UNI, the same VLAN can be used on one port to create an
endpoint to one I-SID, and on another port to create an endpoint to another I-SID.
An example of an application for Switched UNI is a typical host and provider deployment, with a port
and VID-based classification.
Switched UNI based MAC learning
MAC learning is done on I-SID MAC. When a packet ingresses on a port or MLT which is associated
with Switched UNI I-SID, the system performs MAC look up based on the I-SID. Switched UNI operates
on Any-To-Any (ELAN) mode, there can be one or more ports associated to a Switched UNI I-SID. A
packet that ingresses to a Switched UNI port on a BEB can transfer through the SPBM cloud, or can
egress out another Switched UNI port configured to the same I-SID.
When a packet ingresses an network-to-network interface (NNI) port, before egressing a Switched UNI
port, the system performs a MAC Destination Address (DA) lookup based on the I-SID. If the DA lookup
fails, the packet floods to all Switched UNI ports in the I-SID.
Considerations
Limitations
• You cannot change from one UNI type to another dynamically. The I-SID has to be deleted and
created with new UNI type (Customer VLAN (C-VLAN), Transparent port user-network-interface
(T-UNI), ELAN).
• I-SID cannot be used by IPVPN, MVPN, SPBM dynamic multicast range, or Transparent Port UNI.
• If the port is a member of MLT, the entire MLT has to be added to the VID.
• The port is always in the forwarding state.
• The same VID, port, or MLT cannot be member of more than one I-SID.
• Static MAC, Static ARP and static IGMP group are not supported on Switched UNI enabled ports.
• For a Switched UNI endpoint without a platform VLAN on the VSP 7400 Series, when MAC-in-MAC
terminated traffic is sent out to the UNI endpoint the packet is re-marked based on existing QoS
rules.
• On VSP 8600 Series, dynamically learned Fabric Attach announced VLAN:ISID bindings and
manually configured Switched-UNI end-points are not supported on the same interface.
The switch handles Bridge Protocol Data Units (BPDUs) according to whether or not you configure a
platform VLAN.
• When you configure a platform VLAN:
◦ BPDUs are forwarded to the CPU by default.
◦ For both the ingress and egress ports, BPDUs are not flooded in the S-UNI I-SID associated with
the platform VLAN.
Note
If the platform VLAN is configured for the S-UNI port, you cannot enable BDPU
forwarding.
IS-IS runs on all nodes of the SPBM domain. Since IS-IS is the basis of SPBM, the IS-IS adjacency
must be formed first. After the neighboring nodes see hellos from each other they look for the
same Level (Level 1) and the same area (for example, Area 2f.8700.0000.00). After the hellos are
confirmed both nodes send Link State Protocol Data Units, which contain connectivity information
for the SPBM node. These nodes also send copies of all other LSPs they have in their databases. This
establishes a network of connectivity providing the necessary information for each node to find the
best and proper path to all destinations in the network.
Each node has a system ID, which is used in the topology announcement. This same System ID also
serves as the switch Backbone MAC address (B-MAC), which is used as the source and destination
MAC address in the SPBM network.
2. Each IS-IS node automatically builds trees from itself to all other nodes
When the network topology is discovered and stored in the IS-IS link state database (LSDB), each
node calculates shortest path trees for each source node. A unicast path now exists from every node
to every other node
With this information, each node populates unicast information received from SPBM into the FIB for
forwarding purposes. Multicast FIB is not produced until Layer 2 VSN services are configured and
learned.
3. IS-IS advertises new service communities of interest
When a new service is provisioned, its membership is flooded throughout the topology with an IS-IS
advertisement.
BMAC and I-SID information is flooded throughout the network to announce new I-SID
memberships. In this case, VLAN 20 is mapped to I-SID 100.
Note
I-SIDs are only used for virtual services (Layer 2 and Layer 3 VSNs). If IP Shortcuts only is
enabled on the BEBs, I-SIDs are never exchanged in the network as IP Shortcuts allow for
IP networks to be transported across IS-IS.
Each node populates its FDB with the BMAC information derived from the IS-IS shortest path tree
calculations. Thus there is no traditional flooding and learning mechanism in place for the B-VLAN,
but FDBs are programmed by the IS-IS protocol.
4. When a node receives notice of a new service AND is on the shortest path, it updates the FDB
In this scenario, where there are three source nodes having a membership on I-SID 100, there are
three shortest path trees calculated (not counting the Equal Cost Trees (ECTs).
VLAN traffic arriving on switch A and VLAN 20 is forwarded following the blue path, traffic arriving
on switch B and VLAN 20 the orange path and on switch C VLAN 20 traffic is following the green
path.
If the destination CMAC is unknown at the SPBM ingress node or the traffic is of type broadcast or
multicast, then it is flooded to all members of the topology which spans VLAN 20. If the destination
CMAC is already known, then the traffic is only forwarded as a unicast to the appropriate destination.
In the SPBM domain, the traffic is switched on the BMAC header only. The bridge filtering database
(FDB) at the VLAN to I-SID boundary (backbone edge bridge BEB), maintains a mapping between
CMACs and corresponding BMACs.
For example, Switch B learns all CMACs which are on VLAN 20 connected to switch A with the
BMAC of A in its FDB and the CMACs which are behind C are learned with the BMAC of C.
At the BEBs, customer VLANs (C-VLAN) are mapped to I-SIDs based on the local service provisioning.
Outgoing frames are encapsulated in a MAC-in-MAC header, and then forwarded across the core to
the far-end BEB, which strips off the encapsulation and forwards the frame to the destination network
based on the I-SID-to-C-VLAN provisioning.
• You must configure the required SPBM and IS-IS infrastructure, which includes the creation of SPBM
B-VLANs.
• You must create the customer VLANs (C-VLANs) and add slots/ports.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Map a customer VLAN (C-VLAN) to a Service Instance Identifier (I-SID):
vlan i-sid <1-4059> <0–16777215> [force]
Important
When a protocol VLAN is created, all ports are added to the VLAN including SPBM
ports. To configure a protocol-based VLAN as a C-VLAN, you must first remove the SPBM-
enabled ports from the protocol based VLAN, and then configure the protocol-based
VLAN as a C-VLAN.
The switch reserves I-SID 0x00ffffff. The switch uses this I-SID to advertise the virtual
B-MAC in an SMLT dual-homing environment. The platform clears the receive and transmit
bit of this I-SID, therefore I-SID 0x00ffffff cannot be used for any other service.
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#vlan i-sid 10 100
Switch:1(config)#show vlan i-sid
Switch:1>show vlan i-sid
===============================================================================
Vlan I-SID
===============================================================================
VLAN_ID I-SID I-SID NAME
-------------------------------------------------------------------------------
1
10 100 Hospital-Server-10
90 1000 ISID-1000
Variable Definitions
The following table defines parameters for the vlan i-sid command.
Variable Value
<1-4059> Specifies the primary VLAN ID.
Specifies the VLAN ID in the range of 1 to 4059. By default,
VLAN IDs 1 to 4059 are configurable and the system reserves
VLAN IDs 4060 to 4094 for internal use. On switches that
support the vrf-scaling and spbm-config-mode boot
configuration flags, if you enable these flags, the system also
reserves VLAN IDs 3500 to 3998. VLAN ID 1 is the default
VLAN and you cannot create or delete VLAN ID 1.
<0-16777215> Specifies the service instance identifier (I-SID).
Note:
The switch reserves I-SID 0x00ffffff. The switch uses this
I-SID to advertise the virtual B-MAC in an SMLT dual-homing
environment. The platform clears the receive and transmit bit
of this I-SID, therefore I-SID 0x00ffffff cannot be used for any
other service.
This value is the same for the primary and secondary VLANs.
force Specifies the software must replace the existing VLAN-to-I-
SID mapping, if one exists.
Note
Product Notice: This procedure does not apply to VSP 8600 Series.
You can configure a service name for I-SIDs, loopback interfaces, and static routes. You can configure
the service name can before or after you create the I-SID for the following services:
• Layer 2 VSN
• Layer 3 VSN
• ELAN I-SID or Switched UNI I-SID
• ELAN transparent I-SID or Transparent UNI I-SID
• IPv4 and IPv6 static routes
• IPv4 and IPv6 loopback CLIP interface
Note
The service name for I-SIDs does not support the following special characters: “ ” # $ % ‘ / [ \ ]
^ { | } ~ @.
By default, the service name is ISID-x, where x correlates to the I-SID number of the service.
Note
Product Notice: For XA1400 Series, you can configure a service name for IPv4 static routes
and IPv4 loopback CLIP interfaces only.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enter a name for the global I-SID.
i-sid name <1-6777215> WORD<1-64>
3. Display I-SID names for all configured I-SIDs.
show i-sid name
4. Display I-SID name by I-SID.
show i-sid name <1-6777215>
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#i-sid name 1 ExtremeServer1
Switch:1(config)#i-sid name 20 ExtremeServer7
=======================================================================
I-SID I-SID NAME TYPE
-----------------------------------------------------------------------
20 ExtremeServer7 adminName
Variable Definitions
Use the data in the following table to use the i-sid name command.
Variable Value
<1-6777215> Specifies the I-SID number.
WORD<1-64> Specifies the name of the I-SID. The I-SID can be named before or
after the I-SID is created.
Note: By default, for an I-SID in use, the service is named ISID-x, where x
This parameter does not apply to correlates to the I-SID number of the service.
all hardware platforms.
Procedure
1. Display the C-VLAN to I-SID associations:
show vlan i-sid <1-4059>
2. Display the IS-IS SPBM multicast-FIB calculation results by I-SID:
show isis spbm i-sid {all|config|discover} [vlan <1-4059>] [id <1–
16777215>] [nick-name <x.xx.xx>]
3. Discover where entries are learned:
show vlan mac-address-entry [spbm-tunnel-as-mac]
4. Display the VLAN remote MAC table for a C-VLAN:
show vlan remote-mac-table <1-4059>
Example
Switch:1>show vlan i-sid
===============================================================================
Vlan I-SID
===============================================================================
VLAN_ID I-SID I-SID NAME
-------------------------------------------------------------------------------
1
10 100 Hospital-Server-10
90 1000 ISID-1000
-----------------------------------------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries configed: 0
-----------------------------------------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries discovered: 6
-----------------------------------------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries: 6
-----------------------------------------------------------------------------------------------------------------------------------
Variable definitions
The following table defines parameters for the show vlan commands.
Variable Value
i-sid <1-4059> Displays I-SID information for the specified C-VLAN.
mac-address-entry [spbm- Displays the bridging forwarding database.
tunnel-as-mac] Use the optional parameter, spbm-tunnel-as-mac to
display the BMAC in the TUNNEL column. If you do not use
this optional parameter, the TUNNEL column displays the
host name. If an entry is not learned in the SPBM network,
the TUNNEL column will be empty (–).
remote-mac-table <1-4059> Displays C-VLAN remote-mac-table information.
The following table defines parameters for the show isis commands.
Variable Value
spbm i-sid {all|config| • all: displays all I-SID entries
discover} • config: displays configured I-SID entries
• discover: displayes discovered I-SID entries
vlan <1-4059> Displays I-SID information for the specified SPBM VLAN.
Variable Value
id <1–16777215> Displays I-SID information for the specified I-SID.
nick-name <x.xx.xx> Displays I-SID information for the specified nickname.
Note
If you are configuring a T-UNI to terminate on a port or MLT on a switch in a vIST switch
cluster, you must also configure the T-UNI I-SID on the other switch of the vIST switch cluster.
You must configure the T-UNI I-SID on both switches of a vIST pair. It is not necessary to
assign an actual port or MLT to the T-UNI on the second switch.
Caution
In the case of T-UNI LACP SMLT, before you configure SMLT on switch peers, ensure that
the T-UNI LACP MLT on each peer is always associated with a VLAN, even if it is the
default VLAN, and that it is added to a T-UNI I-SID. Otherwise, traffic is not forwarded on
the T-UNI LACP MLT.
You can configure Transparent Port UNI when either of the following apply:
• You want all tagged and untagged traffic on a port to be classified into the same broadcast domain.
• You want to offer a transparent provider solution.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Configure a Transparent Port UNI (Elan-Transparent based service). Enter:
i-sid <1-16777215> elan-transparent
This command automatically takes you to the Elan-Transparent I-SID Configuration mode.
3. Add ports to the Elan-Transparent based service. Enter:
port {slot/port[/sub-port][-slot/port[/sub-port]][,...]}
A warning message displays indicating that adding a port to a T-UNI I-SID removes the port from all
VLANs. Click y when prompted, to continue.
A warning message displays indicating that adding an MLT to a Transparent Port UNI I-SID removes
the MLT from all VLANs. Click y when prompted, to continue.
5. To verify the Transparent Port UNI configuration, enter:
show i-sid <1–16777215>
6. To remove ports or MLT from the Elan-Transparent based service, enter one of the following
commands:
no port {slot/port[/sub-port][-slot/port[/sub-port]][,...]}
OR
no mlt <1–512>
7. To delete the Elan-Transparent based service, enter:
no i-sid <1-16777215>
Example
Switch:1(elan-tp:3)#port 1/25
Adding Ports to Transparent UNI i-sid removes it from all VLANS.
Do you wish to continue (y/n) ? y
Switch:1(elan-tp:3)#
Switch:1(elan-tp:3)#mlt 1
Adding MLTs to Transparent UNI i-sid removes it from all VLANS.
Do you wish to continue (y/n) ? y
Switch:1(elan-tp:3)#
Variable definitions
Note
When SPB is enabled, I-SID IDs 16000000 (0xF42400) and greater, up to 16,777,215
(0xFFFFFF), are reserved for dynamic i-sid allocation and used to support IP Multicast traffic
over SPB and other advanced Fabric services.
Variable Value
i-sid <1–16777215> elan- Creates an Elan-Transparent based service. The service
transparent interface identifier (I-SID) range is 1 to 16777215.
port {slot/port[/sub-port][- Add ports to the Elan-Transparent based service.
slot/port[/sub-port]][,...]}
mlt<1–512> Add MLTs to the Elan-Transparent based service. The MLT
range is 1 to 512.
View all configured I-SIDs (both CVLAN and T-UNI). View also the I-SID types and the ports or MLTs that
are assigned to each I-SID.
Procedure
1. Enter Privileged EXEC mode:
enable
2. View all configured I-SIDs. This command displays both CVLAN and T-UNI based I-SIDs.
show i-sid
3. View all T-UNI (Elan-Transparent) I-SIDs.
show i-sid [elan-transparent]
4. View information for a particular T-UNI I-SID.
show i-sid [<1–16777215>]
5. View all IS-IS SPBM I-SID information by I-SID ID:
show isis spbm i-sid {all|config|discover} [vlan <2-4059>] [id <1–
16777215>] [nick-name <x.xx.xx>]
Example
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense; R: multi-area redist
l: discover by local switch r: discover by remote VIST switch
================================================================================
Isid Info
================================================================================
-----------------------------------------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries configed: 0
-----------------------------------------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries discovered: 6
-----------------------------------------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries: 6
-----------------------------------------------------------------------------------------------------------------------------------
==================================================================================================
SPBM ISID INFO
==================================================================================================
ISID SOURCE NAME VLAN SYSID TYPE HOST_NAME ISID NAME AREA AREA NAME
--------------------------------------------------------------------------------------------------
300 7.15.16 20 a425.1b51.9484 config Switch1 ISID-300 HOME area-0.00.20
300 4.01.18 10 b4a9.5a2a.d065 discover Switch2 ISID-300 HOME area-0.00.20
--------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries configured: 1
--------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries discovered: 1
--------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries: 2
--------------------------------------------------------------------------------------------------
Variable Definitions
Note
When SPB is enabled, I-SID IDs 16777216 and greater are reserved for internal I-SID and SPB
multicast.
The following table defines parameters for the show i-sid command.
Variable Value
<1–16777215> Specifies the service interface identifier (I-SID).
elan-transparent Displays only all the Elan-Transparent (T-UNI based) I-SIDs.
The following table defines parameters for the show isis spbm i-sid command.
Variable Value
{all|config|discover} • all: displays all I-SID entries
• config: displays configured I-SID entries
• discover: displayes discovered I-SID entries
vlan <2-4059> Displays I-SID information for the specified SPBM VLAN.
id <1–16777215> Displays I-SID information for the specified I-SID.
nick-name <x.xx.xx> Displays I-SID information for the specified nickname.
The show i-sid mac-address-entry command displays the C-MACs learned on T-UNI I-SIDs. It
also displays the C-MACs learned on T-UNI I-SIDs for a specific I-SID, MAC address, port or port list or
remote MAC address.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. View C-MACs learned on the T-UNI I-SIDs:
show i-sid mac-address-entry [<1-16777215>] [home] [mac
<0x00:0x00:0x00:0x00:0x00:0x00>] [non-local] [port {slot/port[/sub-
port] [-slot/port[/sub-port]] [,...]}] [remote]
Example
========================================================================================================================================
I-SID Fdb Table
========================================================================================================================================
I-SID STATUS MAC-ADDRESS INTERFACE TYPE DEST-MAC BVLAN DEST-SYSNAME AREA-ROLE AREA-NAME
----------------------------------------------------------------------------------------------------------------------------------------
100 learned cc:f9:54:ae:28:81 Port-1/16 LOCAL 00:00:00:00:00:00 0 HOME area-20.0020
4 learned cc:f9:54:ae:2c:18 mlt-6 LOCAL 00:00:00:00:00:00 0 HOME area-20.0020
252 learned cc:f9:54:ae:38:64 Port-1/15 NON-LOCAL 00:13:0a:0c:d3:e0 128 DIST-1B REMOTE area-30.0030
========================================================================================================================================
I-SID Fdb Table
========================================================================================================================================
I-SID STATUS MAC-ADDRESS INTERFACE TYPE DEST-MAC BVLAN DEST-SYSNAME AREA-ROLE AREA-NAME
----------------------------------------------------------------------------------------------------------------------------------------
100 learned cc:f9:54:ae:28:81 Port-1/16 LOCAL 00:00:00:00:00:00 0 HOME area-20.0020
=======================================================================================================================
I-SID Fdb Table
=======================================================================================================================
I-SID STATUS MAC-ADDRESS INTERFACE TYPE DEST-MAC BVLAN DEST-SYSNAME AREA-ROLE AREA-NAME
-----------------------------------------------------------------------------------------------------------------------
252 learned cc:f9:54:ae:38:64 Port-1/15 NON-LOCAL 00:13:0a:0c:d3:e0 128 DIST-1B REMOTE area-30.0030
=======================================================================================================================
I-SID Fdb Table
=======================================================================================================================
I-SID STATUS MAC-ADDRESS INTERFACE TYPE DEST-MAC BVLAN DEST-SYSNAME AREA-ROLE AREA-NAME
-----------------------------------------------------------------------------------------------------------------------
252 learned cc:f9:54:ae:38:64 Port-1/15 NON-LOCAL 00:13:0a:0c:d3:e0 128 DIST-1B REMOTE area-30.0030
========================================================================================================================
I-SID Fdb Table
========================================================================================================================
I-SID STATUS MAC-ADDRESS INTERFACE TYPE DEST-MAC BVLAN DEST-SYSNAME AREA-ROLE AREA-NAME
------------------------------------------------------------------------------------------------------------------------
252 learned cc:f9:54:ae:38:64 Port-1/15 NON-LOCAL 00:13:0a:0c:d3:e0 128 DIST-1B REMOTE area-30.0030
========================================================================================================================
I-SID Fdb Table
========================================================================================================================
I-SID STATUS MAC-ADDRESS INTERFACE TYPE DEST-MAC BVLAN DEST-SYSNAME AREA-ROLE AREA-NAME
------------------------------------------------------------------------------------------------------------------------
252 learned cc:f9:54:ae:38:64 Port-1/15 NON-LOCAL 00:13:0a:0c:d3:e0 128 DIST-1B REMOTE area-30.0030
I-SID STATUS MAC-ADDRESS INTERFACE TYPE DEST-MAC BVLAN DEST-SYSNAME AREA-ROLE AREA-NAME
--------------------------------------------------------------------------------------------------------------------------
252 learned cc:f9:54:ae:38:64 Port-1/15 NON-LOCAL 00:13:0a:0c:d3:e0 128 DIST-1B REMOTE area-30.0030
Variable Definitions
The following table defines parameters for the show i-sid mac-address-entry command.
Variable Value
<1-16777215> Displays the MAC address learned on the
service interface identifier (I-SID).
home Filters the command output to show only
MAC addresses learned in the home area.
mac <0x00:0x00:0x00:0x00:0x00:0x00> Displays the I-SID FDB details for the
specified MAC address.
non-local Filters the command output to show only
MAC addresses learned from other nodes; not
local nodes.
port {slot/port[/sub-port] [-slot/ Displays the MAC address learned on the
port[/sub-port]] [,...]} specified port or port list.
remote Filters the command output to show only
MAC addresses learned in the remote area.
Important
The command show i-sid limit-fdb-learning is supported only on the VSP 4450
Series.
The total MAC learning limit per switch is 32000. MAC learning on I-SID stops when the maximum limit
is reached.
Procedure
View the maximum MAC learning limit configured for an I-SID:
show i-sid limit-fdb-learning <1-16777215>
Example
=========================================
Isid MAC-Limit Info
=========================================
ISID MAC-LIMIT MAXMAC
ID STATUS COUNT
-----------------------------------------
10 disabled 32000
11 disabled 32000
12 disabled 32000
15 disabled 32000
101 disabled 32000
=========================================
Isid MAC-Limit Info
=========================================
ISID MAC-LIMIT MAXMAC
ID STATUS COUNT
-----------------------------------------
10 disabled 32000
Variable definitions
The following table defines parameters for the show i-sid limit-fdb-learning command.
Important
The command show i-sid limit-fdb-learning is supported only on the VSP 4450
Series.
Variable Value
limit-fdb-learning Displays the I-SID-based maximum MAC limit information.
<1–6777215> Displays the service interface identifier (I-SID). The I-SID range is 1 to
16777215.
Switched User Network Interface (S-UNI) allows the association of local endpoints to I-SIDs based on
local port and VLAN together. With Switched UNI, the same VLAN can be used on one port to create an
endpoint to one I-SID, and on another port to create an endpoint to another I-SID.
To configure a Switched UNI on an MLT, you must create a Switched UNI I-SID, and map an MLT to the
Switched UNI I-SID.
Note
When you configure Switched UNI, Spanning tree is disabled on all the Switched UNI ports.
Procedure
configure terminal
Note
You cannot enable Switched UNI on EAPoL enabled interface.
This command automatically takes you to the Elan I-SID Configuration mode.
4. Add an MLT to a Switched UNI I-SID:
c-vid <c-vid> mlt <1–512>
Note
You can run this command again to map a Switched UNI MLT to multiple I-SIDs.
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#mlt 10
Switch:1(config)#interface mlt 10
Switch:1(config-mlt)#flex-uni enable
Switch:1(config-mlt)#i-sid 100
Switch:1(elan:100)#c-vid 20 mlt 10
================================================================================
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
Variable definitions
The following table defines parameters for the i-sid command to configure a Switched UNI.
Variable Value
i-sid <1–16777215> elan Creates an Elan based service. The service interface identifier
(I-SID) range is 1 to 16777215.
c-vid <c-vid> mlt <mlt-id> Specifies the customer VLAN ID. Different hardware
platforms support different customer VLAN ID ranges. Use
the CLI Help to see the available range for the switch.
untagged-traffic mlt <mlt-id> [bpdu Add untagged traffic to the Elan-based service.
enable]
Note
EAP and FA can coexist on the same port. EAP and FA can be enabled in any order; however,
EAP must have Flex UNI enabled in order to function on an FA-enabled port. If EAP is
currently enabled, FA can only be enabled if the port is a Flex UNI-enabled port.
VSP 4450 Series, VSP 8600 Series, and XA1400 Series do not support EAP and FA on the
same port.
To configure a Switched UNI on a port, you must create a Switched UNI I-SID, and map the port to the
Switched UNI I-SID.
Note
When you configure Switched UNI, Spanning tree is disabled on all the Switched UNI ports.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Note
You cannot enable enable EAP on a Switched UNI (S-UNI) on the VSP 4450 Series, VSP
8600 Series, or XA1400 Series.
This command automatically takes you to the Elan I-SID Configuration mode.
4. Add ports to a Switched UNI I-SID:
c-vid <c-vid> port {slot/port[/sub-port][-slot/port[/sub-port]][,...]}
5. Add untagged traffic to a Switched UNI I-SID:
untagged—traffic port {slot/port[/sub-port][-slot/port[/sub-port]]
[,...]} [bpdu enable]
6. Display the Switched UNI information:
show interface gigabitethernet i-sid {slot/port[/sub-port][-slot/
port[/sub-port]][,...]}
Examples
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#interface gigabitethernet 1/1,1/2
Switch:1(config-if)#flex-uni enable
Switch:1(config-if)#i-sid 100
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
Variable definitions
The following table defines parameters for the i-sid command to configure a Switched UNI.
Variable Value
i-sid <1–16777215> elan Creates an Elan based service. The service interface identifier
(I-SID) range is 1 to 16777215.
c-vid <c-vid> port {slot/port[/ Specifies the customer VLAN ID. Different hardware
sub-port] [-slot/port[/sub- platforms support different customer VLAN ID ranges. Use
port]] [,...]} the CLI Help to see the available range for the switch.
untagged-traffic < port {slot/ Add untagged traffic to the Elan-based service.
port[/sub-port] [-slot/
port[/sub-port]] [,...]}>
[bpdu enable]
Procedure
1. Enter Privileged EXEC mode:
enable
2. View all configured CVLAN, T-UNI, and S-UNI based I-SIDs:
show i-sid
Examples
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense; R: multi-area redist
l: discover by local switch r: discover by remote VIST switch
==============================================================================================
Isid Info
==============================================================================================
ISID ISID PORT MLT ORIGIN ISID
ID TYPE VLANID INTERFACES INTERFACES NAME
----------------------------------------------------------------------------------------------
27 ELAN N/A c4000:1/1,2/11 - C --- - --- - ISID-27
38 ELAN N/A c4000:1/2,2/22 - C --- - --- - ISID-38
270 ELAN N/A c4001:1/1,2/11 - C --- - --- - ISID-270
307 ELAN N/A c307:1/5,2/5 - C --- - --- - ISID-307
308 ELAN N/A c308:1/6,2/6 - C --- - --- - ISID-308
309 ELAN N/A c309:1/1,2/1 - C --- - --- - ISID-309
310 ELAN N/A c310:1/2,2/2 - C --- - --- - ISID-310
311 ELAN N/A c311:1/3,2/3 - C --- - --- - ISID-311
312 ELAN N/A c312:1/4,2/4 - C --- - --- - ISID-312
317 ELAN N/A c317:1/7,2/7 - C --- - --- - ISID-317
318 ELAN N/A c318:1/8,2/8 - C --- - --- - ISID-318
319 ELAN N/A c319:1/9,2/9 - C --- - --- - ISID-319
320 ELAN N/A c320:1/10,2/10 - C --- - --- - ISID-320
--More-- (q = quit)
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
c32:MLT-2
03:77:77:00:0f:a0 4000 1001 0000.beb0.0007 BEB-07 c40:1/3 1/2 400
c41:MLT-1
c42:MLT-2
03:77:77:00:13:92 5010 1001 0000.beb0.0007 BEB-07 c50:1/3 1/2 500
c51:MLT-1
c52:MLT-2
03:88:88:00:0b:b8 3000 1001 0000.beb0.0008 BEB-08 MLT-1 1/2 0
c30:1/3
c31:MLT-1
c32:MLT-2
03:88:88:00:0f:a0 4000 1001 0000.beb0.0008 BEB-08 c40:1/3 1/2 400
c41:MLT-1
-----------------------------------------------------------------------------------------------
Total number of SPBM MULTICAST FIB entries 157
------------------------------------------------------------------------------------------------
Variable Definitions
Variable Value
elan Displays only all the Elan (S-UNI based) I-SIDs.
MLT ID <1–512> Specifies the MLT associated with the Switched UNI I-SID.
{slot/port[/sub-port][-slot/port[/sub- Specifies the ports associated with the Switched UNI I-SID.
port]][,...]}
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display the C-VLAN to I-SID associations:
show vlan i-sid <1-4059>
3. Display I-SID information and Switched UNI to I-SID associations:
show i-sid <1–16777215>
4. Display the IS-IS SPBM multicast-FIB calculation results by I-SID:
show isis spbm i-sid {all|config|discover} [vlan <1-4059>] [id <1–
16777215>] [nick-name <x.xx.xx>]
5. Display all elan I-SID:
• show i-sid elan
6. Display I-SID configured on MLT:
• show mlt i-sid
7. Display I-SID configured on port:
• show interfaces gigabitethernet i-sid
Examples
Switch# show isis spbm i-sid all
====================================================================================================================================
-----------------------------------------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries configed: 0
-----------------------------------------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries discovered: 6
-----------------------------------------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries: 6
-----------------------------------------------------------------------------------------------------------------------------------
==============================================================================================
Isid Info
==============================================================================================
ISID ISID PORT MLT ORIGIN ISID
ID TYPE VLANID INTERFACES INTERFACES NAME
----------------------------------------------------------------------------------------------
27 ELAN N/A c4000:1/1,2/11 - C --- - --- - ISID-27
38 ELAN N/A c4000:1/2,2/22 - C --- - --- - ISID-38
270 ELAN N/A c4001:1/1,2/11 - C --- - --- - ISID-270
307 ELAN N/A c307:1/5,2/5 - C --- - --- - ISID-307
308 ELAN N/A c308:1/6,2/6 - C --- - --- - ISID-308
309 ELAN N/A c309:1/1,2/1 - C --- - --- - ISID-309
310 ELAN N/A c310:1/2,2/2 - C --- - --- - ISID-310
311 ELAN N/A c311:1/3,2/3 - C --- - --- - ISID-311
312 ELAN N/A c312:1/4,2/4 - C --- - --- - ISID-312
317 ELAN N/A c317:1/7,2/7 - C --- - --- - ISID-317
318 ELAN N/A c318:1/8,2/8 - C --- - --- - ISID-318
319 ELAN N/A c319:1/9,2/9 - C --- - --- - ISID-319
320 ELAN N/A c320:1/10,2/10 - C --- - --- - ISID-320
--More-- (q = quit)
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
Switch:1>show mlt i-sid
=====================================================================================
MLT Isid Info
=====================================================================================
ISID ISID ISID
MLTID IFINDEX ID VLANID C-VID TYPE ORIGIN NAME BPDU
-------------------------------------------------------------------------------------
3 6146 3 N/A 33 ELAN C --- - --- - ISID-3
-------------------------------------------------------------------------------------
1 out of 1 Total Num of i-sid endpoints displayed
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
=======================================================================================
PORT Isid Info
=======================================================================================
ISID ISID ISID MAC
PORTNUM IFINDEX ID VLANID C-VID TYPE ORIGIN NAME BPDU SUNI
----------------------------------------------------------------------------------------
1/1 192 27 N/A 4000 ELAN C --- - --- - ISID-27 FALSE
1/1 192 270 N/A 4001 ELAN C --- - --- - ISID-270 FALSE
1/1 192 309 N/A 309 ELAN C --- - --- - ISID-309 FALSE
1/1 192 401 N/A 401 ELAN C --- - --- - ISID-401 FALSE
1/1 192 1001 N/A 1001 ELAN C --- - --- - ISID-1001 FALSE
1/1 192 1111 N/A 1111 ELAN C --- - --- - ISID-1111 FALSE
1/1 192 1121 N/A 1121 ELAN C --- - --- - ISID-1121 FALSE
1/1 192 1201 N/A 1201 ELAN C --- - --- - ISID-1201 FALSE
1/1 192 2001 N/A 2001 ELAN C --- - --- - ISID-2001 FALSE
1/2 193 38 N/A 4000 ELAN C --- - --- - ISID-38 FALSE
1/2 193 310 N/A 310 ELAN C --- - --- - ISID-310 FALSE
1/2 193 380 N/A 4001 ELAN C --- - --- - ISID-380 FALSE
1/2 193 402 N/A 402 ELAN C --- - --- - ISID-402 FALSE
ORIGIN Legend:
C: manually configured; D: discovered by FA or EPT
M: FA management; E: discovered by EAP; A: auto-sense
l: discover by local switch r: discover by remote VIST switch
Variable Definitions
The following table defines parameters for the show vlan i-sid commands.
Variable Value
<1-4059> Displays I-SID information for the specified C-VLAN. You can
specify the VLAN ID.
The following table defines parameters for the show i-sid commands.
Variable Value
<1–16777215> Displays I-SID information. You can specify the I-SID ID.
The following table defines parameters for the show isis commands.
Variable Value
spbm i-sid {all|config| • all: displays all I-SID entries
discover} • config: displays configured I-SID entries
• discover: displays discovered I-SID entries
SPBM supports Layer 2 VSN functionality where customer VLANs (C-VLANs) are bridged over the
SPBM core infrastructure.
At the BEBs, customer VLANs (C-VLAN) are mapped to I-SIDs based on the local service provisioning.
Outgoing frames are encapsulated in a MAC-in-MAC header, and then forwarded across the core to
the far-end BEB, which strips off the encapsulation and forwards the frame to the destination network
based on the I-SID-to-C-VLAN provisioning.
• You must configure the required SPBM and IS-IS infrastructure, which includes the creation of SPBM
B-VLANs.
• You must create the customer VLANs (C-VLANs) and add slots/ports.
Procedure
Important
• When a protocol VLAN is created, all ports are added to the VLAN including SPBM
ports. To configure a protocol-based VLAN as a C-VLAN, you must first remove the
SPBM-enabled ports from the protocol based VLAN, and then configure the protocol-
based VLAN as a C-VLAN.
• The switch reserves I-SID 0x00ffffff. The switch uses this I-SID to advertise the virtual
B-MAC in an SMLT dual-homing environment. The platform clears the receive and
transmit bit of this I-SID, therefore I-SID 0x00ffffff cannot be used for any other
service.
Procedure
Use the data in the following table to use the Remote MAC tab.
Name Description
VlanId Indicates the VLAN ID for this MAC address.
Addr Indicates the customer MAC address for which the bridge has
forwarding and/or filtering information
DestAddr Indicates the provider MAC address for which the bridge has
forwarding and/or filtering information.
PrimaryBVlanId Indicates the primary B-VLAN ID for this MAC address.
PrimaryDestSysName Indicates the primary system name of the node where the
MAC address entry comes from.
PrimaryPort Either displays the value 0, or indicates the primary port on
which a frame came from.
SecondaryBVlanId Indicates the secondary B-VLAN ID for this MAC address
SecondaryDestSysName Indicates the secondary system name of the node where the
MAC address entry comes from.
SecondaryPort Either displays the value 0, or indicates the secondary port
on which a frame came from.
SmltRemote Indicates the MAC address entry for the remote vIST peer.
Status Indicates the status of this entry:
• other
• invalid
• learned
• self
• mgmt
Configure UNI
Use the following procedure to configure a Transparent Port UNI or Switched UNI by mapping an I-SID
to a port or MLT and VLAN together.
Note
If you are configuring a T-UNI to terminate on a port or MLT on a switch in a vIST switch
cluster, you must also configure the T-UNI I-SID on the other switch of the vIST switch cluster.
You must configure the T-UNI I-SID on both switches of a vIST pair. It is not necessary to
assign an actual port or MLT to the T-UNI on the second switch.
You must first create a type of service instance identifier (I-SID) to create the different types of services
available. After you create an I-SID you can add members (ports or MLTs) to the I-SID to create
end-points for the service.
Procedure
Use the data in the following table to use the Service tab.
Name Description
ID Specifies a unique value to identify the service
associated with this entry.
Type Specifies the type of service associated with this
entry.
MacLimitEnable Indicates whether the MAC limit is enabled (true)
or disabled (false).
MaxMacLimit Indicates the maximum learned value of the MAC
address for each service I-SID.
Action Specifies I-SID related actions.
OriginBitMap Specifies the origin of the I-SID.
VnId Identifies the VXLAN service associated with this
I-SID.
Name Specifies the name of the I-SID.
Note:
This field does not apply to all hardware platforms.
Use the following procedure to associate a port and MLT with an I-SID.
Caution
Ensure that a T-UNI LACP MLT is always associated with a VLAN (even if it is the default
VLAN) before adding it to a T-UNI I-SID. Otherwise, traffic is not forwarded on the T-UNI
LACP MLT.
Procedure
Use the data in the following table to use the Elan Transparent tab.
Name Description
PortMembers The set of ports that are members of the elanTransparent service type. From the ports
available, you can select single or multiple ports.
MltIds The set of bits that represent the MLT Ids. From the MLTs available, you can select any,
or all of the MLTs to be a part of elan transparent i-sid .
Note
To view the T-UNI I-SID FDB entries filtered on a port that is part of an MLT, you must mention
the MLT ID in the option for the port.
Procedure
Name Description
IsidId Specifies the service interface identifier (I-SID).
Address Specifies the MAC address of the port assigned to the specific I-SID or
C-MAC learned on the particular I-SID.
Status Specifies the learning status of the associated MAC.
Port Specifies the port on which the MAC is learned for the specific I-SID.
PortType Specifies if the MAC address is learned locally or on an network-to-
network interface (NNI) port from a remote destination.
RemoteMacDestAddr Specifies the virtual BMAC address or system-ID of the remote destination.
RemoteMacBVlanId Specifies the B-VLAN ID on which the remote destination was discovered.
RemoteMacDestSysName Specifies the remote destination system name.
Cvid Specifies the customer VLAN ID of the associated Switched UNI port.
Switched User Network Interface (S-UNI) allows the association of local endpoints to I-SIDs based on
local port and VLAN together. With switched UNI, the same VLAN can be used on one port to create an
endpoint to one I-SID, and on another port to create an endpoint to another I-SID.
Use the following procedure to associate a port and MLT with an I-SID.
Procedure
Use the data in the following table to use the Switched Uni tab.
Name Description
Isid Displays the I-SID.
Cvid Specifies the customer VLAN identifier.
IfIndex Specifies the interface index of the Elan end point.
Bpdu Enables or disables for an untagged end point.
The default is disabled.
OriginBitmap Specifies the origin information of the service
associated with the I-SID Elan end point.
MacBased Shows if the current entry is associated to a MAC-
based Switched User Network Interface (S-UNI).
Procedure
Use the data in the following table to use the Interface tab.
Name Description
IfIndex Specifies the interface index
Isid Specifies the service interface identifier (I-SID).
Isid Name Specifies the service interface identifier name.
Vlan Specifies the platform VLAN.
Cvid Specifies the customer VID.
Type Specifies the type of service associated with the
I-SID interface.
OriginBitMap Specifies the origin of the service associated with
the I-SID interface.
Bpdu Specifies the BPDU forward option for the
untagged traffic port.
MacBased Specifies the Switched UNI MAC address.
Note
This procedure does not apply to VSP 8600 Series.
Use this procedure to modify the assigned name for the Service Identifier (I-SID).
Note
Product Notice: For XA1400 Series, you can modify a service name for IPv4 static routes and
IPv4 loopback CLIP interfaces only. For information about feature support, see VOSS Feature
Support Matrix.
Procedure
Use the data in the following table to use the Global Name tab.
Name Description
ISID Id Specifies the index number that uniquely identifies the I-SID.
ISID Name Specifies the name of the I-SID, which can be up to 64 characters.
This field is not supported on all hardware platforms.
UsedByType Specifies the I-SIDs that are in use as services. An I-SID can have
one base type or a combination of base types so that multiple
services can use the same I-SID at the same time.
Examples and network illustrations in this document may illustrate only one of the supported platforms.
Unless otherwise noted, the concept illustrated applies to all supported platforms.
SwitchC
VLAN CONFIGURATION
SwitchD
VLAN CONFIGURATION
SwitchC
-----------------------------------------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries configed: 1
-----------------------------------------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries discovered: 1
-----------------------------------------------------------------------------------------------------------------------------------
Total number of SPBM ISID entries: 2
-----------------------------------------------------------------------------------------------------------------------------------
SwitchD
SwitchD:1# show isis spbm i-sid all
======================================================================================================================
SPBM ISID INFO
======================================================================================================================
ISID SOURCE NAME VLAN SYSID TYPE HOST_NAME ISID NAME AREA AREA NAME
----------------------------------------------------------------------------------------------------------------------
12990010 f.30.14 4000 0014.0da0.13df config SwitchD ISID-12990010 HOME area-0.00.20
12990010 f.30.13 4000 0015.e89f.e3df discover SwitchC ISID-12990010 HOME area-0.00.20
SwitchC
VLAN CONFIGURATION
SwitchD
VLAN CONFIGURATION
Inter-VSN routing
Inter-VSN routing with SPBM allows routing between Layer 2 VLANs with different I-SIDs.
Note
The Layer 2 VLANs must be in the same VRF. You cannot route traffic between two different
VRFs with Inter-VSN routing.
In this example, the C-VLANs are associated with I-SIDs on the BEBs using SPBM Layer 2 VSN. With
Inter-VSN routing enabled, BCB C can route traffic between VLAN 11 (I-SID 2011) and VLAN 12 (I-SID
2012).
IP interfaces are where the routing instance exists. In this case, on Switch-20.
Note
The switch does not support IP multicast over Fabric Connect routing on inter-VSN routing
interfaces.
Note
To enable inter-VSN routing, you must configure IP interface where the routing instance
exists.
Procedure
configure terminal
2. Follow the procedures below on the Backbone Edge Bridges (BEBs) containing the VSNs you want
to route traffic between.
a. Create a customer VLAN (C-VLAN) by port:
vlan create <2-4059> type port-mstprstp <0–63>
b. Add ports in the C-VLAN:
vlan members add <1-4059> {slot/port[/sub-port][-slot/port[/sub-
port]][,...]}
c. Map a customer VLAN (C-VLAN) to a Service Instance Identifier (I-SID):
vlan i-sid <1-4059> <0–16777215> [force]
Important
When a protocol VLAN is created, all ports are added to the VLAN including SPBM
ports. To configure a protocol-based VLAN as a C-VLAN, you must first remove the
SPBM-enabled ports from the protocol based VLAN, and then configure the protocol-
based VLAN as a C-VLAN.
3. On the Backbone Core Bridge (BCB), create a VRF and add a VLAN for each VSN:
a. Create a VRF:
ip vrf WORD<1–16> vrfid <1–511>
b. Create a VLAN to associate with each VSN:
vlan create <2-4059> type port-mstprstp <0–63>
c. Enter VLAN Interface Configuration mode:
interface vlan <1-4059>
d. Add a VLAN to the VRF you created in step a:
vrf WORD<1–16>
Important
When a protocol VLAN is created, all ports are added to the VLAN including SPBM
ports. To configure a protocol-based VLAN as a C-VLAN, you must first remove the
SPBM-enabled ports from the protocol based VLAN, and then configure the protocol-
based VLAN as a C-VLAN.
The switch reserves I-SID 0x00ffffff. The switch uses this I-SID to advertise the virtual
B-MAC in an SMLT dual-homing environment. The platform clears the receive and
transmit bit of this I-SID, therefore I-SID 0x00ffffff cannot be used for any other
service.
Variable Definitions
The following table defines parameters for the vlan create command.
Variable Value
<2-4059> Specifies the VLAN ID in the range of 2 to 4059. VLAN ID 1
is the default VLAN and you cannot create or delete VLAN
ID 1. By default, the system reserves VLAN IDs 4060 to 4094
for internal use. On switches that support the vrf-scaling
and spbm-config-mode boot configuration flags, if you
enable these flags, the system also reserves VLAN IDs 3500
to 3998.
type port-mstprstp <0–63> Creates a VLAN by port:
[color <0–32> ] • <0–63> is the STP instance ID.
• color <0–32> is the color of the VLAN.
The following table defines parameters for the vlan members add command.
Variable Value
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN IDs 1 to 4059
are configurable and the system reserves VLAN IDs 4060 to 4094 for internal
use. On switches that support the vrf-scaling and spbm-config-mode boot
configuration flags, if you enable these flags, the system also reserves VLAN IDs
3500 to 3998. VLAN ID 1 is the default VLAN and you cannot create or delete
VLAN ID 1.
{slot/port[/ Identifies the slot and port in one of the following formats: a single slot and port
sub-port] [- (slot/port), a range of slots and ports (slot/port-slot/port), or a series of slots and
slot/port[/ ports (slot/port,slot/port,slot/port). If the platform supports channelization and
sub-port]] the port is channelized, you must also specify the sub-port in the format slot/port/
[,...]} sub-port.
The following table defines parameters for the vlan i-sid command.
Variable Value
<1-4059> Specifies the primary VLAN ID.
Specifies the VLAN ID in the range of 1 to 4059. By default,
VLAN IDs 1 to 4059 are configurable and the system reserves
VLAN IDs 4060 to 4094 for internal use. On switches that
support the vrf-scaling and spbm-config-mode boot
configuration flags, if you enable these flags, the system also
reserves VLAN IDs 3500 to 3998. VLAN ID 1 is the default
VLAN and you cannot create or delete VLAN ID 1.
<0-16777215> Specifies the service instance identifier (I-SID). You cannot
use I-SID 0x00ffffff. The system reserves this I-SID to
advertise the virtual BMAC in an SMLT dual-homing
environment.
This value is the same for the primary and secondary VLANs.
force Specifies the software must replace the existing VLAN-to-I-
SID mapping, if one exists.
Variable Value
WORD <1–16> Create the VRF and specify the name of the VRF instance.
vrfid <1–511> Specifies the VRF instance by number.
Variable Value
WORD <1–16> Specifies the VRF name. Associates a port to a VRF.
Variable Value
{A.B.C.D/X} Configures an IP address for the VLAN.
applications such as vMotion. Use IP Shortcuts or Layer 3 VSNs to route traffic. You must configure both
the Backbone Edge Bridges (BEBs) and the Backbone Core Bridge (BCB).
Note
To enable inter-VSN routing, you must configure the IP interface where the routing instance
exists.
Follow these steps on the BEBs that contain the VSNs you want to route traffic between.
Procedure
1. Create a customer VLAN (C-VLAN) by port and add ports in the C-VLAN:
a. In the navigation pane, expand Configuration > VLAN.
b. Select VLANs.
c. On the Basic tab, select Insert.
d. For Id, type an unused VLAN ID, or use the ID provided.
e. For Name, type the VLAN name, or use the name provided.
f. For Color Identifier, select a color from the list, or use the color provided.
g. For Type, select byPort.
h. For PortMembers, select the ellipsis (...).
i. Select the ports to add as member ports.
The ports that are selected are recessed, while the nonselected ports are not recessed. Port
numbers that are dimmed cannot be selected as VLAN port members.
j. Select OK.
k. Select Insert.
2. Map a C-VLAN to an I-SID:
a. From the same Configuration > VLAN > VLANs navigation path, select the Advanced tab.
b. For Isid, specify the I-SID to associate with the specified VLAN.
The switch reserves I-SID 0x00ffffff. The switch uses this I-SID to advertise the virtual B-MAC in
a SMLT dual-homing environment. The platform clears the receive and transmit bit of this I-SID,
therefore I-SID 0x00ffffff cannot be used for any other service.
c. Select Apply.
Important
When a protocol VLAN is created, all ports are added to the VLAN including SPBM
ports. To configure a protocol-based VLAN as a C-VLAN, you must first remove the
SPBM-enabled ports from the protocol based VLAN, and then configure the protocol-
based VLAN as a C-VLAN.
3. Configure the Backbone Core Bridge (BCB) for Inter-VSN Routing. For more information, see
Configure BCBs for Inter-VSN Routing on page 1322.
Note
To enable inter-VSN routing, you must configure the IP interface where the routing instance
exists.
Procedure
b. For Isid, specify the I-SID to associate with the specified VLAN.
c. Select Apply.
4. Configure a circuitless IP interface (CLIP):
a. In the navigation pane, expand Configuration > IP.
b. Select IP.
c. Select the Circuitless IP tab.
d. Select Insert.
e. For Interface, type a CLIP interface number.
f. Provide the IP address.
g. Provide the network mask.
h. Select Insert.
Examples and network illustrations in this document may illustrate only one of the supported platforms.
Unless otherwise noted, the concept illustrated applies to all supported platforms.
Note that the IP interfaces are configured where the routing instance exists, namely, on SwitchG.
SwitchC
VLAN CONFIGURATION
SwitchG
VRF CONFIGURATION
VLAN CONFIGURATION
VLAN CONFIGURATION
SwitchD
VLAN CONFIGURATION
SwitchG
SwitchG:1# show ip route vrf blue
================================================================================
IP Route - VRF blue
================================================================================
NH INTER
DST MASK NEXT VRF COST FACE PROT AGE TYPE PRF
--------------------------------------------------------------------------------
203.0.113.0 255.255.255.0 203.0.113.2 - 1 11 LOC 0 DB 0
203.0.113.1 255.255.255.0 203.0.113.3 - 1 12 LOC 0 DB 0
================================================================================
IP Arp Extn - VRF blue
================================================================================
SwitchG
SwitchG:1# show vlan mac-address-entry 11
================================================================================
Vlan Fdb
================================================================================
VLAN MAC SMLT
ID STATUS ADDRESS INTERFACE REMOTE TUNNEL
--------------------------------------------------------------------------------
11 learned 00:00:00:00:01:02 Port-1/2 false SwitchC
11 self 00:0e:62:25:a2:00 Port-cpp false -
SwitchC
SwitchC:1# show vlan mac-address-entry 11
================================================================================
Vlan Fdb
================================================================================
VLAN MAC SMLT
ID STATUS ADDRESS INTERFACE REMOTE TUNNEL
--------------------------------------------------------------------------------
11 learned 00:00:00:00:01:02 Port-1/2 false SwitchD
11 learned 00:0e:62:25:a2:00 Port-1/2 false SwitchD
SwitchD
SwitchD:1# show vlan mac-address-entry 12
================================================================================
Vlan Fdb
================================================================================
VLAN MAC SMLT
ID STATUS ADDRESS INTERFACE REMOTE TUNNEL
--------------------------------------------------------------------------------
12 learned 00:00:00:00:02:02 Port-1/2 false SwitchC
12 learned 00:0e:62:25:a2:01 Port-1/2 false SwitchC
The following reference architectures illustrate SPBM with multiple switches in a network.
For information about solution-specific architectures like Video Surveillance or Data Center
implementation using the switch, see Solution-Specific Reference Architectures on page 1335.
The following figure shows the MAC-in-MAC SPBM domain with BEBs on the boundary and BCBs in the
core.
The following figure illustrates an existing edge that connects to an SPBM core.
The boundary between the MAC-in-MAC SPBM domain and the 802.1Q domain is handled by the BEBs.
At the BEBs, VLANs or VRFs are mapped into I-SIDs based on the local service provisioning. Services
(whether Layer 2 or Layer 3 VSNs) only need to be configured at the edge of the SPBM backbone (on
the BEBs). There is no provisioning needed on the core SPBM nodes.
Provisioning an SPBM core is as simple as enabling SPBM and IS-IS globally on all the nodes and on the
core facing links. To migrate an existing edge configuration into an SPBM network is just as simple.
For Layer 3 virtualized routing (Layer 3 VSN), map IPv4-enabled VLANs to VRFs, create an IP VPN
instance on the VRF, assign an I-SID to the VRF, and then configure the desired IP redistribution of IP
routes into IS-IS.
For Layer 2 virtualized bridging (Layer 2 VSN), identify all the VLANs that you want to migrate into
SPBM and assign them to an I-SID on the BEB.
Campus Architecture
For migration purposes, you can add SPBM to an existing network that has SMLT configured. In fact,
if there are other protocols already running in the network, such as Open Shortest Path First (OSPF),
you can leave them in place too. SPBM uses IS-IS, and operates independently from other protocols.
However, as a best practice, eliminate SMLT in the core and eliminate other unnecessary protocols. This
reduces the complexity of the network and makes it much simpler to maintain and troubleshoot.
Whether you configure SMLT in the core, the main point to remember is that SPBM separates services
from the infrastructure. For example, in a large campus, a user may need access to other sites or
data centers. With SPBM you can grant that access by associating the user to a specific I-SID. With
this mechanism, the user can work without getting access to confidential information of another
department.
The following figure depicts a topology where the BEBs in the edge and data center distribution nodes
are configured in SMLT clusters. Prior to implementing SPBM, the core nodes would also have been
configured as SMLT clusters. When migrating SPBM onto this network design, it is important to note
that you can deploy SPBM over the existing SMLT topology without network interruption. After the
SPBM infrastructure is in place, you can create VSN services over SPBM or migrate them from the
previous end-to-end SMLT-based design.
In an SPBM network design, the only nodes where it makes sense to have an SMLT cluster configuration
is on the BEB nodes where VSN services terminate. These are the SPBM nodes where C-VLANs exist
and these C-VLANs need to be redundantly extended to non-SPBM devices such as Layer 2 edge
stackable switches. On the BCB core nodes where no VSNs are terminated and no Layer 2 edge
stackables are connected, there is no longer any use for the SMLT clustering functionality. Therefore, in
the depicted SPBM design, the SMLT/vIST configuration can be removed from the core nodes because
they now act as pure BCBs that simply transport VSN traffic and the only control plane protocol they
need to run is IS-IS.
Because SMLT BEB nodes exist in this design (the edge BEBs) and it is desirable to use equal cost paths
to load balance VSN traffic across the SPBM core, all SPBM nodes in the network are configured with
the same two B-VIDs.
Where the above figure shows the physical topology, the following two figures illustrate a logical
rendition of the same topology. In both of the following figures, you can see that the core is almost
identical. Because the SPBM core just serves as a transport mechanism that transmits traffic to the
destination BEB, all the provisioning is performed at the edge.
In the data center, VLANs are attached to Inter-VSNs that transmit the traffic across the SPBM core
between the data center on the left and the data center on the right. A common application of this
service is VMotion moving VMs from one data center to another.
The following figure uses IP shortcuts that route VLANs. There is no I-SID configuration and no Layer 3
virtualization between the edge distribution and the core. This is normal IP forwarding to the BEB.
The following figure shows an SPBM topology of a large data center. This figure represents a full-mesh
data center fabric using SPBM for storage over Ethernet. This topology is optimized for storage
transport because traffic never travels more than two hops.
Note
As a best practice, use a two-tier, full-mesh topology for large data centers.
The following figure shows an example of a traditional data center with VRRP configured. Because end
stations are often configured with a static default gateway IP address, a loss of the default gateway
router causes a loss of connectivity to the remote networks. VRRP eliminates the single point of failure
that can occur when the single static default gateway router for an end station is lost.
In the following figure, the VM moved from the data center on the left to the data center on the right.
To ensure a seamless transition that is transparent to the user, the VM retains its network connections
through the default gateway. This method works, but it adds more hops to all traffic. As you can see in
the figure, one VM move results in a complicated traffic path. Multiply this with many moves and soon
the network look like a tangled mess that is very inefficient, difficult to maintain, and almost impossible
to troubleshoot.
The VLAN routers use lookup tables to determine the best path to route incoming traffic (red dots) to
the destination VM.
VRRP BackupMaster solves the problem of traffic congestion on the vIST. Because there can be only
one VRRP Master, all other interfaces are in backup mode. In this case, all traffic is forwarded over
the vIST link towards the primary VRRP switch. All traffic that arrives at the VRRP backup interface is
forwarded, so there is not enough bandwidth on the vIST link to carry all the aggregated riser traffic.
VRRP BackupMaster overcomes this issue by ensuring that the vIST trunk is not used in such a case
for primary data forwarding. The VRRP BackupMaster acts as an IP router for packets destined for the
logical VRRP IP address. All traffic is directly routed to the destined subnetwork and not through Layer
2 switches to the VRRP Master. This avoids potential limitation in the available vIST bandwidth.
The following figure shows a solution that optimizes your network for bidirectional traffic flows.
However, this solution turns two SPBM BCB nodes into BEBs where MAC and ARP learning will be
enabled on the Inter-VSN routing interfaces. If you do not care about top-down traffic flows, you
can omit the Inter-VSN routing interfaces on the SPBM BCB nodes. This makes the IP routed paths
top-down less optimal, but the BCBs remain pure BCBs, thus simplifying core switch configurations.
Note
You can increase VRF scaling to run more than 24 VRFs. The maximum number of supported
VRFs and Layer 3 VSNs differs depending on the hardware platform. For more information
about maximum scaling numbers, see VOSS Release Notes.
If this solution must support IPv6, then a central router-pair routes all IPv6 traffic. The IPv6 traffic is
tunneled from each wiring closet to the IPv6 routers by extending Layer 2 VSNs to the q-tagged router
interfaces.
The VSP switches as access, provide an elegant network-wide E-Tree solution. Spokes, or managed
servers, cannot communicate to each other over this network, but the shared management servers on
the hub ports can access all spokes. Because of the Layer 2 – E-Tree nature of this setup, the managed
servers do not require any route entries, and only require one IP interface in this management private
VLAN. This solution supports tagged and untagged physical and virtual (VM) servers.
Figure 121: Deployment scenario — bridged video surveillance and IP camera deployment for
transportation, airports, and government
The following list outlines the benefits of the bridged video surveillance solution:
• Easy end-point provisioning
• sub second resiliency and mc forwarding
• secure tenant separation
• quick camera switching
In many customer scenarios, surveillance must be separated from the rest of the infrastructure. This
can be achieved by deploying a Layer 3 VSN for the surveillance traffic to keep the surveillance traffic
isolated from any other tenant.
Figure 122: Deployment scenario — Routed video surveillance and IP camera deployment for
transportation, airports, and government
The following list outlines the benefits of the routed video surveillance solution:
• Easy endpoint provisioning
• Optimal resiliency and mc forwarding
• Secure tenant separation
• Rapid channel/camera switching
This use case extends the Transparent Port UNI functionality to transparently forward any customer
VLAN across the services.
IP Shortcuts Configuration
Fabric Connect supports both IPv4 Shortcuts and IPv6 Shortcuts. Because IPv6 Shortcuts depend
on IPv4 Shortcuts, you should understand how IPv4 Shortcuts work (see SPBM IP shortcuts) before
jumping to the IPv6 section.
SPBM IP Shortcuts
In addition to Layer 2 virtualization, the SPBM model is extended to also support Routed SPBM,
otherwise called SPBM IP Shortcuts.
Unlike Layer 2 VSN, with SPBM IP shortcuts, no I-SID configuration is required. Instead, SPBM nodes
propagate Layer 3 reachability as “leaf” information in the IS-IS LSPs using Extended IP reachability
TLVs (TLV 135), which contain routing information such as neighbors and locally configured subnets.
SPBM nodes receiving the reachability information can use this information to populate the routes to
the announcing nodes. All TLVs announced in the IS-IS LSPs are grafted onto the shortest path tree
(SPT) as leaf nodes.
In contrast to IP routing or Multiprotocol Label Switching (MPLS), SPBM IP shortcuts provide a simpler
method of forwarding IP packets in an Ethernet network using the preestablished Ethernet FIBs on the
BEBs. SPBM allows a network to make the best use of routing and forwarding techniques, where only
the BEBs perform an IP route lookup and all other nodes perform standard Ethernet switching based
on the existing SPT. This allows for end to end IP-over-Ethernet forwarding without the need for ARP,
flooding, or reverse learning.
In the above example, the SPBM nodes in the core that are not enabled with IP shortcuts can be
involved in the forwarding of IP traffic. Since SPBM nodes only forward on the MAC addresses that
comprise the B-MAC header, and since unknown TLVs in IS-IS are relayed to the next hop but ignored
locally, SPBM nodes need not be aware of IP subnets to forward IP traffic.
With IP shortcuts, there is only one IP routing hop, as the SPBM backbone acts as a virtualized switching
backplane.
The following figure shows a sample campus network implementing SPBM IP shortcuts.
In addition, to advertise routes from the BEBs into the SPBM network, you must enable route
redistribution of direct, static, OSPF, RIP, or BGP routes into IS-IS. To advertise IPv6 routes from the
BEBs into the SPBM network, you must enable route redistribution of IPv6 direct, IPv6 static, and
OSPFv3 routes into IS-IS.
transports the IPv6 reachability information to remote BEBs and uses the shortest path, calculated by
SPBM, for data forwarding.
Note
You only configure the IPv6 address information on the edges. There is no IPv6 in the SPBM
cloud.
IS-IS transports the IPv6 routes through TLV 236 in the LSP advertisements. These routes are installed
in the Global Routing Table (GRT) with the node from which the LSPs carrying the IPv6 routes are
received as the next hop.
IPv6 Shortcuts function in a very similar manner to IPv4 Shortcuts and depends on IPv4 Shortcuts for
some functions. For example, IPv6 Shortcuts use the BMAC (local and remote) information created by
IPv4 Shortcuts.
Important
IPv4 Shortcuts must be enabled before you enable IPv6 Shortcuts.
An error is displayed if you try to enable IPv6 Shortcuts but do not have IPv4 Shortcuts
already enabled.
IPv6 Shortcuts alone can be disabled while leaving IPv4 Shortcuts enabled. When IPv4
Shortcuts is disabled without disabling IPv6 Shortcuts disabled first, a warning or error
message is displayed indicating that IPv6 should be disabled first.
To enable IPv6 Shortcuts on the BEBs and to advertise the local BEB to other IS-IS nodes, you must
configure a circuitless IPv6 address (loopback address) and specify this address as the IS-IS source
address. This source address is automatically advertised into IS-IS using TLV 236.
IPv6 Shortcuts support Circuitless IPv6 (CLIPv6), which ensures uninterrupted connectivity to the
switch as long as there is an actual path to reach it. This route always exists and the circuit is always up
because there is no physical attachment.
Use the following steps to migrate the Global Router Table (GRT) to use IPv6 Shortcuts over the SPBM
core:
• Identify the nodes that should be enabled with IPv6 Shortcuts. Apply these steps to all of these
nodes.
• Activate and validate basic IPv6 Shortcuts. For information, see SPBM IPv6 Shortcuts on page 1344.
• Configure IS-IS route preference to ensure that the IPv6 IGP protocol currently being used in the
SPBM core is preferred over the IS-IS routes.
• Enable redistribution of direct and static IPv6 routes into IS-IS.
• Create route policies to permit only IPv6 IGP routes from the access side of the SPBM network.
• Configure redistribution of routes from the IPv6 route table from each of the IPv6 IGP protocols into
IS-IS along with the appropriate route policy.
• Use the show isis spbm ipv6-unicast-fib command to check the IS-IS LSDB, IS-IS routes,
and to verify that all the desired IPv6 routes are now in IS-IS.
• Configure redistribution of IS-IS routes from the IPv6 route table into each of the IPv6 IGP protocols
in use. This redistribution does not require a route policy since IS-IS is only supported in the SPBM
core.
• Change IS-IS route-preference to ensure that IS-IS routes are preferred over other IPv6 IGP routes.
• Disable/delete old IPv6 IGP in the SPBM core.
Important
Use only one IPv6 routing protocol in the SPBM core to prevent the possibility of routing loops.
Note
This restriction does not apply to VSP 4450 Series switches.
◦ Neighbor discovery (ND) does not run on an IPv6 CLIP interface. Therefore, the system does not
detect when you configure a duplicate IPv6 address.
◦ Multiple IPv6 address configuration on an IPv6 CLIP interface is not supported.
◦ You can configure a maximum of 64 IPv6 CLIP interfaces.
◦ IPv6 CLIP interface is enabled by default and it cannot be disabled.
• IPv6 with vIST provides the same support as IPv4 with vIST.
• To help with debugging, CFM provides full support for both IPv4 and IPv6 addresses for the l2ping
and l2traceroute commands.
With ECMP, the switch can determine multiple equal-cost paths to the same destination prefix.
You can use multiple paths for load sharing of traffic. These multiple paths allow faster convergence
to other active paths in case of network failure. By maximizing load sharing among equal-cost paths,
you can use your links between routers more efficiently when sending IP and IPv6 traffic. Equal Cost
Multipath is formed using routes from the same protocol.
The number of multiple paths a switch can support differs by hardware platform. For more information
about feature support, see VOSS Release Notes.
Equal Cost Multipath (ECMP) allows the device to determine up to eight equal cost paths to the
same destination prefix. The maximum number of equal cost paths you can configure depends on the
hardware platform. For more information, see VOSS Release Notes.
If the device learns the same route from multiple sources, the information is ECMP only if the routes:
• are from the same VSN
• have the same SPBM cost
• have the same prefix cost
• have the same IP route preference
Multiple BEBs can announce the same route, either because the Layer 2 LAN connects to multiple BEBs
for redundancy, or because segments of the LAN are Layer 2 bridged. In Layer 2, if the device has to
tie-break between multiple sources, the tie-breaking is based on cost and hop count.
In Layer 3, hop count is not used for tie-breaking. Instead, the device uses the following precedence
rules to tie-break. In the following order, the device prefers:
1. Routes that do not include nodes with the overload bit set.
When a router node runs out of system resources (memory or CPU), it alerts the other routers in
the network by setting the overload bit in its link-state packets (LSPs). When this bit is set, the node
is not used for transit traffic but only for traffic packets destined to the node's directly connected
networks and IP prefixes.
2. Local routes over remote routes.
If a route is learned locally, for example, through inter-VRF route leaking, it is most preferred.
3. Routes with the lowest route preference.
By default, IS-IS routes within the same VSN are added to the LSDB with a default preference of 7.
Inter-VSN routes are added to the LSDB with a route preference of 200. You can however, change
the route preference using IS-IS accept policies.
4. Metric type internal (type 1) over metric type external (type 2).
5. Routes with the lowest SPBM cost.
6. Routes with the lowest prefix cost.
If the metric type is internal, then the tie-break is on SPB cost first, and then on the prefix cost.
Otherwise the tie-break is only on the prefix cost.
You can either change this using a route-map on the remote advertising node with the
redistribute command, or using a route-map on the local node with the IS-IS accept policy.
7. Routes within a VSN with a lower Layer 3 VSN I-SID.
The device considers the Global Routing Table (GRT) to have an I-SID equal to zero.
When you use multiple B-VLANs in the SPBM core, multiple paths exist to reach a particular SPBM
node, one on each B-VLAN; therefore, any IP prefix or IPv6 prefix that the device receives from a BEB
results in multiple ECMP paths. These paths may or may not be physically diverse. SPBM supports up to
two B-VLANs; a primary B-VLAN and a secondary B-VLAN.
If more ECMP paths are available than the configured number of paths, then the device adds the routes
using the following order: The device selects all routes from the primary B-VLAN and orders the routes
learned through that B-VLAN from lowest system ID to the highest IS-IS system ID, then the device
moves on to select all routes from the secondary B-VLAN, ordering those routes from lowest IS-IS
system ID to the highest IS-IS system ID until you reach the number of equal paths configured.
For example, consider an SPB core configured with two B-VLANs (primary B-VLAN 1000 and
secondary B-VLAN 2000), and the device learns routes from two BEBs called BEB-A (with a lower
IS-IS system ID) and BEB-B (with a higher IS-IS system ID, then the order in which the next-hop is
chosen for those routes are as follows.
If a route is learned only from BEB-A with the maximum number of allowed ECMP paths configured as 8
(default), then the order in which the next-hop is chosen for that route is:
If routes are learned from both BEB-A and BEB-B with maximum number of allowed ECMP paths
configured as 8 (default), then the order in which the next-hop is chosen for those routes are:
If ECMP is disabled, the maximum number of allowed ECMP paths is 1 and the device adds the route
from the lowest system ID with the primary B-VLAN. In this example, the device adds BEB-A B-VLAN
1000.
Note
• ECMP is supported for IPv6 Shortcut routes.
• To add IS-IS equal cost paths in the routing table, you must enable IPv6 ECMP feature
globally.
ECMP Impact on IS-IS Route Selection for Inter-VRF Routes with vIST
This section illustrates the impact ECMP can have on a configuration that implements user-defined
VRFs in a vIST cluster and how to avoid incorrect route selection.
Understanding the Configuration
IS-IS sorts paths for the same route by source-BEB B-MAC and B-VLAN ID. The primary B-VLAN ID is
first installed for each B-MAC, followed by the secondary B-VLAN ID for each B-MAC, as long as the
ECMP max-path value is not reached. On the node with the lowest B-MAC, the first path listed is its own
local inter-vrf route, while on the other node, the MIM path across the vIST is listed first.
If you disable ECMP, all but the first path is removed. Because IS-IS orders the paths by B-MAC, each
node in the vIST cluster selects the same B-MAC as the nexthop. This configuration leads one of the
nodes to select itself, the local inter-vrf route, while the other node selects the MIM path across the vIST
to get to the inter-vrf route. This situation results in an incorrect route selection.
Avoiding Incorrect Route Selection
To avoid this situation, create a policy to prevent IS-IS from determining that the MIM path across the
vIST and the local inter-VRF route are ECMP paths. Configure the local inter-VRF path as the preferred
path, and the vIST path as the backup. The following list identifies way that you can accomplish this:
• Redistribute the VRF route into IS-IS using the internal metric-type. IS-IS will always select the local
inter-VRF route. For more information about the metric type for IS-IS routes, see Fabric Basics and
Layer 2 Services on page 923.
• If an IS-IS internal metric-type is not an option, configure an IS-IS accept policy to change the
preference of inter-VRF routes learned from the IST peer. The local inter-VRF route is preferred over
the inter-VRF routes learned from the IST peer.
Important
The lower numerical value determines the higher preference.
In the preceding diagram both nodes (SwitchG and SwitchD) have an OSPF or a RIP route to
192.168.10.0/24 with the next-hop to SwitchA.
As soon as the SwitchG node redistributes that IP route into IS-IS, the SwitchD node learns the same
route through IS-IS from SwitchG. (The SwitchG node already has the route through OSPF or RIP).
Because IS-IS has a higher preference, SwitchD replaces its 192.168.10.0 OSPF route with an IS-IS one
that points at SwitchG as the next-hop. The following figure illustrates this scenario.
An alternate way to solve the preceding problem with existing functionality is to reverse the problem
by lowering the SPBM-IP (IS-IS) preference by configuring it to a value greater than RIP (100) or OSPF
(20,25,120,125). For example, log on to Global Configuration mode and use the following command to
configure a preference of 130:
Note
For IPv6, the command is ipv6 route preference protocol spbm-level1 130
Now that the OSPF or RIP routes have a higher preference than SPBM-IP (IS-IS), the above problem is
temporarily solved. However, the same issue resurfaces when the IS-IS IP routes are redistributed into
OSPF or RIP in the reverse direction as shown in the following figure for OSPF:
Because OSPF has a higher preference, SwitchD replaces its 172.16.0.0/16 IS-IS route with an OSPF
one. (Note that the 172.16.0.0/16 route will be redistributed into OSPF as an AS external route, hence
with preference 120 or 125 depending on whether type1 or type2 was used). In this case, however, you
can leverage OSPF Accept policies, which can be configured to prevent SwitchD from accepting any
AS External (LSA5) routes from SwitchG and prevent SwitchG from accepting any AS External (LSA5)
routes from SwitchD. The following is a sample configuration:
enable
configure terminal
route-map
route-map "reject" 1
no permit
enable
match protocol local|static|rip|ospf|ebgp|ibgp|dvmrp|isis
exit
router ospf
accept adv-rtr {A.B.C.D}
Note
Disable alternative routes by issuing the command no ip alternative-route to avoid
routing loops on the SMLT Backbone Edge Bridges (BEBs).
In the preceding figure, if SwitchA advertises 25000 OSPF routes to SwitchG and SwitchD, then both
SwitchG and SwitchD install the 25000 routes as OSPF routes. Since SwitchD and SwitchG have OSPF
to IS-IS redistribution enabled, they also learn these 25000 routes as IS-IS routes. IS-IS route preference
is configured with a higher numerical value (130) than the OSPF route preference (125), so SwitchD and
SwitchG keep IS-IS learned routes as alternative routes.
If SwitchA withdraws its 25000 OSPF routes, SwitchG and SwitchD remove the OSPF routes. While
the OSPF routes are removed the routing tables of SwitchG and SwitchD activate the alternative IS-IS
routes for the same prefix. Since SwitchG and SwitchD have IS-IS to OSPF redistribution enabled,
SwitchA learns these routes as OSPF and this causes a routing loop. Use the no ip alternative-
route command to disable alternative routes on SwitchG and SwitchD to avoid routing loops.
In the preceding figure, you leveraged OSPF Accept policies, which can be configured to prevent
SwitchD from accepting any AS External (LSA5) routes from SwitchG and prevent SwitchG from
accepting any AS External (LSA5) routes from SwitchD. In the case of a RIP access network, the
preceding solution is not possible because RIP has no concept of external routes and no equivalent of
accept policies. However, if you assume that a RIP network acts as an access network to an SPBM core,
then it is sufficient to ensure that when IS-IS IP routes are redistributed into RIP they are aggregated
into a single default route at the same time. The following figure and sample configuration example
illustrates this scenario:
SwitchG
IP PREFIX LIST CONFIGURATION - GlobalRouter
route-map "inject-default" 1
permit
enable
match protocol local|static|rip|ospf|ebgp|ibgp|dvmrp|isis
exit
route-map "match-network" 1
permit
enable
match protocol local|static|rip|ospf|ebgp|ibgp|dvmrp|isis
exit
route-map "set-injectlist" 1
permit
enable
match protocol local|static|rip|ospf|ebgp|ibgp|dvmrp|isis
exit
router rip
redistribute isis
redistribute isis metric 1
redistribute isis route-map "inject-default"
redistribute isis enable
exit
SwitchA
RIP PORT CONFIGURATION
SwitchD
IP PREFIX LIST CONFIGURATION - GlobalRouter
route-map "inject-default" 1
permit
enable
match protocol local|static|rip|ospf|ebgp|ibgp|dvmrp|isis
exit
route-map "match-network" 1
permit
enable
match protocol local|static|rip|ospf|ebgp|ibgp|dvmrp|isis
exit
route-map "set-injectlist" 1
permit
enable
match protocol local|static|rip|ospf|ebgp|ibgp|dvmrp|isis
exit
router rip
redistribute isis
redistribute isis metric 1
redistribute isis route-map "inject-default"
redistribute isis enable
exit
You can control the propagation of the default route on the RIP network so that both SwitchG and
SwitchD supply the default route on their relevant interfaces, and not accept it on the same interfaces.
Likewise, SwitchA will accept the default route on its interfaces to both SwitchG and SwitchD but it will
not supply the default route back to them. This will prevent the default route advertised by SwitchG
from being installed by SwitchD, and vice-versa.
The preceding example where IS-IS IP routes are aggregated into a single default route when
redistributed into the RIP network also applies when redistributing IS-IS IP routes into OSPF if that
OSPF network is an access network to an SPBM core. In this case use the following redistribution policy
configuration as an example for injecting IS-IS IP routes into OSPF:
route-map "inject-default" 1
permit
enable
match protocol local|static|rip|ospf|ebgp|ibgp|dvmrp|isis
exit
route-map "match-network" 1
permit
enable
match protocol local|static|rip|ospf|ebgp|ibgp|dvmrp|isis
exit
route-map "set-injectlist" 1
permit
enable
match protocol local|static|rip|ospf|ebgp|ibgp|dvmrp|isis
exit
router ospf
redistribute isis
redistribute isis route-map "inject-default"
redistribute isis enable
exit
Note
IPv6 IS-IS accept policies for DvR are not supported.
When you configure DvR in an SPB network, you can leverage IS-IS accept policies to control the DvR
routes learned from the DvR backbone. The DvR backbone contains the master list of all the host routes
learned from various DvR domains.
You can configure accept policies on a DvR Controller or a non-DvR BEB as a filter to determine which
DvR host routes to accept into the routing table, from the DvR backbone. Accept policies apply to only
those backbone (or inter-domain) host routes that are not part of the Controller's own DvR enabled
subnets and do not have the same domain ID as that of the Controller.
For non-DvR BEBs, all the routes present in the backbone are learned, but you can still use the accept
policies to filter specific routes.
You can use IS-IS accept policies to apply at a global default level for all advertising Backbone Edge
Bridges (BEBs) or for a specific advertising BEB.
IS-IS accept policies also allow you to use either a service instance identifier (I-SID) or an I-SID list
to filter routes. The switch uses I-SIDs to define Virtual Services Networks (VSNs). I-SIDs identify and
transmit virtualized traffic in an encapsulated SPBM frame. IS-IS accept policies can use I-SIDs or I-SID
lists to filter the incoming virtualized traffic.
IS-IS accept policies can also apply route policies to determine what incoming traffic to accept into the
routing table. With route policies the device can determine which routes to accept into the routing table
based on the criteria you configure. You can match on the network or the route metric.
On DvR Controllers in a DvR domain, you can configure a backbone route policy to determine what host
routes to accept from the DvR backbone, into the routing table. Also, just like on the route policy, you
can configure match criteria, and set preferences on the backbone route policy.
To accept both IS-IS routes and host routes from the DvR backbone, you can configure both a route
policy and a backbone route policy in the accept policy instance.
The following table describes the IPv6 IS-IS accept policy filters:
You can create an IS-IS accept policy for incoming routes for the Global Routing Table (GRT), which
accepts routes into the routing table, or for a Virtual Routing and Forwarding (VRF) instance, which
accepts incoming routes to the routing table of the VRF.
If you create an IS-IS accept policy on the switch for either the GRT or a VRF that operates at a global
default level, the accept policy applies to all routes for all BEBs in the GRT or VRF.
If you create an IS-IS accept policy on the switch for a specific advertising BEB for either the GRT or a
VRF, the IS-IS accept policy instance applies for that specific advertising BEB. If you use a more specific
filter, the system gives preference to the specific filter over the global default level.
You can also use the filter mechanism for IS-IS accept policies to redistribute routes between different
VRFs, or between a VRF and the GRT. For inter-VRF route redistribution, you match the filter based on
the I-SID, which represents the Layer 3 VSN context.
You can apply the filter at the global default level, where the IS-IS accept policy applies to all routes for
that I-SID from all BEBs, or at a specific advertising BEB level, where the filter only applies to a specific
advertising BEB. The device gives preference to a specific filter for a specific advertising BEB over the
global default filter.
For inter-VRF route redistribution, an I-SID value of 0 represents the GRT. For inter-VRF route
redistribution between VRFs, the I-SID is the source VRF (or remote VRF).
Note
If the primary B-VLAN is down either because you did not configure at least one network-to-
network interface (NNI) or all configured NNIs are down, the switch does not redistribute
inter-VRF routes through IS-IS accept policies.
The following precedence rules apply for IS-IS accept policies used in the same VSN:
• You can only apply one configured IS-IS accept policy for each route.
• You can apply either a default filter for all advertising BEBs or a filter for a specific advertising BEB.
• If you disable the accept filter, the system ignores the filter and the filter with the next highest
precedence applies.
• The device prefers the accept adv-rtr filter, which filters based on a specific advertising BEB,
over the default filter for all advertising BEBs.
• The device accepts all routes within the same VSN by default. You can apply a route policy to filter or
change the characteristics of the route by metric or preference.
• The i-sid or isid-list filters are not valid for routes within the same VSN.
The following precedence rules apply for IS-IS accept policies used for inter-VSN route redistribution:
• You can only apply one configured IS-IS accept policy for each route.
• You can apply filters at a global default level for all BEBs for a specific I-SID or I-SID list, or you can
apply filters for a specific advertising BEB for a specific I-SID or I-SID list.
• If you disable the accept filter, the system ignores the filter and the filter with the next highest
precedence applies.
• The device requires a specific filter to redistribute routes between VSNs through the use of the
i-sid or isid-list filters.
• The i-sid filter takes precedence over the isid-list filter.
• The adv-rtr filter for a specific advertising BEB takes precedence over a filter with the same
i-sid filter without the adv-rtr filter.
• The i-sid or isid-list filters only apply to routes for inter-VSN route redistribution.
• If multiple isid-list filters have the same I-SID within the list, the first on the list alphabetically
has the higher precedence.
Route Preference
The relative value of the route preference among different protocols determines which protocol the
device prefers. If multiple protocols are in the routing table, the device prefers the route with the lower
value. You can change the value at the protocol level, and you can also change the preference of
incoming IS-IS routes using the route-map with the IS-IS Accept policy filter for IPv4 only.
Route Metric
Use route-map to change the metric of a route when you accept a remote IS-IS route with IS-IS accept
policies.
You can use route-map to change the metric of a route when you redistribute the route from another
protocol to IS-IS through the route redistribution mechanism.
You can also configure the route metric with the base redistribute command without the use of
route-map.
Note
For both IPv4 and IPv6 IS-IS accept policies, if there is a mismatch in the route-map (inbound
filtering) configured, all routes are accepted by default. Unlike the redistribute route-map
(outbound filtering), where if there is a mismatch, all routes are denied by default. For more
information, see IP routing operations fundamentals on page 1836.
SPBM allows a network to make the best use of routing and forwarding techniques, where only the
BEBs perform an IP route lookup and all other nodes perform standard Ethernet switching based on the
existing shortest path tree. This allows for end to end IP-over-Ethernet forwarding without the need for
ARP, flooding, or reverse learning.
To enable IP shortcuts on the BEBs, you can configure a circuitless IP (CLIP) address (loopback
address), and specify this address as the IS-IS source address. This source address is automatically
advertised into IS-IS using TLV 135. In addition, to advertise routes from the BEBs into the SPBM
network, you must enable route redistribution of direct and static routes into IS-IS.
Note
The loopback address on each switch or BEB must all be in different subnets to ensure
connectivity between them. To do this, use a 32-bit mask with the CLIP address.
• You must configure the required SPBM and IS-IS infrastructure, which includes the creation of SPBM
B-VLANs.
• Before redistributing routes into IS-IS, you must create the Customer VLANs, add slots/ports, and
add the IP addresses and network masks.
Procedure
1. Enter Loopback Interface Configuration mode
enable
configure terminal
8. Identify routes on the local switch to be announced into the SPBM network:
redistribute {bgp | direct | ospf | rip | static}
9. Enable routes to be announced into the SPBM network
redistribute {bgp | direct | ospf | rip | static} enable
10. If you want to delete the configuration, use the no option:
no redistribute {bgp | direct | ospf | rip | static}
Example
Switch:1> enable
Switch:1(config-if)# exit
================================================================================
ISIS SPBM Info
================================================================================
SPBM B-VID PRIMARY NICK LSDB IP IPV6 MULTICAST
INSTANCE VLAN NAME TRAP
--------------------------------------------------------------------------------
1 4086-4087 4086 3.03.01 disable enable enable disable
================================================================================
ISIS SPBM SMLT Info
================================================================================
SPBM SMLT-SPLIT-BEB SMLT-VIRTUAL-BMAC SMLT-PEER-SYSTEM-ID
INSTANCE
--------------------------------------------------------------------------------
1 primary 00:00:03:03:03:03 0000.0303.0302
--------------------------------------------------------------------------------
Switch:1(config-isis)# exit
Variable definitions
Variable Value
<1–256> Specifies an interface ID value. This value is optional.
<A.B.C.D/X> Specifies an IP address and subnet mask. Use the no option to delete the specified IP
address.
<A.B.C.D> Specifies an IP address. Use the no option to delete the specified IP address.
Variable Value
<A.B.C.D> Specifies the CLIP interface to use as the source address for SPBM IP shortcuts.
Variable Value
<1–100> ip enable Enables or disables SPBM IP shortcut state.
The default is disabled. Use the no or default options to disable SPBM IP
shortcuts.
Variable Value
{bgp | direct | ospf Specifies the protocol.
| rip | static}
enable Enables the redistribution of the specified protocol into the SPBM
network.
The default is disabled. Use the no option to disable the redistribution.
metric <0–65535> Configures the metric (cost) to apply to redistributed routes. The
default is 1.
metric-type Configures the type of route to import into the protocol. The default is
{external|internal} internal.
Variable Value
route-map WORD<0–64> Configures the route policy to apply to redistributed routes. Type a
name between 0 to 64 characters in length.
subnets {allow| Indicates whether the subnets are advertised individually or aggregated
suppress} to their classful subnet. Choose suppress to advertise subnets
aggregated to their classful subnet. Choose allow to advertise the
subnets individually with the learned or configured mask of the subnet.
The default is allow.
The following table defines parameters for the isis apply redistribute command.
Variable Value
{bgp | direct | ospf | rip | static} Specifies the protocol.
Important
You must enable IPv4 Shortcuts before you enable IPv6 Shortcuts because IPv6 Shortcuts
depend on IPv4 Shortcuts for some functions.
Configuring IPv6 Shortcuts is essentially the same as the IPv4 procedure except you use the following
IPv6 commands instead of their IPv4 equivalents:
• Use ipv6 interface address to create a CLIPv6 interface with an IPv6 address.
• Use ipv6 ipv6–source-address to specify the CLIPv6 interface as the source address for IPv6
Shortcuts.
• Use spbm ipv6 enable to enable IPv6 Shortcuts.
• Use ipv6 redistribute {bgp | direct | isis | rip | ospf | static}
enable to control the redistribution of GRT IPv6 routes into the SPBM IS-IS domain.
• Use ipv6 route preference protocol spbm–level1 to change route preference values
for IPv6 Shortcut routes learned through IS-IS.
To enable IPv6 Shortcuts on the BEBs, you must configure a circuitless IPv6 (CLIPv6) address (loopback
address), and specify this address as the IS-IS source address. This source address is automatically
advertised into IS-IS using TLV 236. In addition, to advertise routes from the BEBs into the SPBM
network, you must enable route redistribution of direct and static routes into IS-IS.
Note
The loopback address on each switch or BEB must all be in different subnets to ensure
connectivity between them. To do this, use a 32-bit mask with the CLIP address, and the
CLIPv6 address prefix must be 128.
• You must configure the required SPBM and IS-IS infrastructure, which includes the creation of SPBM
B-VLANs.
• Before redistributing routes into IS-IS, you must create the Customer VLANs, add slots/ports, and
add the IPv6 addresses and network masks.
Procedure
1. Enter Loopback Interface Configuration mode
enable
configure terminal
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#interface loopback 123
Switch:1(config-if)#ipv6 interface address 123::1/128
Switch:1(config-if)#exit
Switch:1(config)#router isis
Switch:1(config-isis)#ipv6 ipv6-source-address <non-link-local ipv6–address>
Switch:1(config-isis)#spbm 1 ipv6 enable
Switch:1(config-isis)#show isis spbm
==============================================================================================================
SPBM B-VID PRIMARY NICK LSDB IP IPV6 MULTICAST SPB-PIM-GW STP-MULTI
INSTANCE VLAN NAME TRAP HOMING
--------------------------------------------------------------------------------------------------------------
1 10 1.11.16 disable disable disable disable disable enable
==============================================================================================================
ISIS SPBM SMLT Info
==============================================================================================================
SPBM SMLT-SPLIT-BEB SMLT-VIRTUAL-BMAC SMLT-PEER-SYSTEM-ID
INSTANCE
--------------------------------------------------------------------------------------------------------------
1 primary 00:00:00:00:00:00
--------------------------------------------------------------------------------------------------------------
Total Num of SPBM instances: 1
--------------------------------------------------------------------------------------------------------------
Variable Definitions
The following table defines parameters for the IPv6 Shortcuts commands.
Variable Value
ipv6-source-address Specifies the source IPv6 address for locally generated IPv6
WORD<0-46> packets whose egress port is an SPBM NNI port. The WORD<0-46>
value must be a locally configured loopback IPv6 address (CLIPv6).
Use the no option to delete the specified IPv6 address.
spbm<1–100> ipv6 enable Enables or disables SPBM IPv6 Shortcuts.
The default is disabled. Use the no or default options to disable
SPBM IPv6 Shortcuts.
ipv6 route preference Sets the route preference value for IPv6 Shortcut routes learned
protocol spbm–level1 <0– through IS-IS. The default preference is 7.
255>
ipv6 redistribute {bgp Specifies the GRT IPv6 route that you want to redistribute into the
| direct | static | SPBM IS-IS domain.
ospf | rip} enable The default is disabled. Use the no option to disable the
redistribution.
Note
• The isis apply accept [vrf WORD<1-16>] command can disrupt traffic and
cause temporary traffic loss. After you apply isis apply accept [vrf<1-16>], the
command reapplies the accept policies, which deletes all of the IS-IS route,s and adds the
IS-IS routes again. You should make all the relevant accept policy changes, and then apply
isis apply accept [vrf WORD<1-16>] at the end.
• If you use the accept command for inter-VRF routes based on the remote I-SID, the
device only accepts routes coming from remote BEBs. For instance, if a local Layer 3 VSN
exists with the same I-SID, the device does not add the local routes. The assumption is
that the device uses existent methods, either through use of another protocol or static
configuration, to obtain those routes.
• If the route policy changes, you must reapply the IS-IS accept policy, unless it was the last
sequence in the configuration.
Procedure
1. Enter VRF Router Configuration mode for a specific VRF context:
enable
configure terminal
Note
When creating an I-SID list, you can add I-SID entries until the maximum limit for
supported Layer 3 I-SIDs is reached. The system truncates any additional I-SID entries.
The maximum limit includes the I-SIDs for locally configured Layer 3 VSNs and the I-SIDs
specified for IS-IS accept policy filters.
Use the command show ip isid-list vrf WORD<1-16> to view the list of
truncated I-SIDs.
3. Create an IS-IS accept policy instance to apply to routes from all Backbone Edge Bridges (BEBs):
isis accept [i-sid <0-16777215>][isid-list WORD<1-32>]
4. Create an IS-IS accept policy instance to apply to routes for a specific BEB:
isis accept [adv-rtr <x.xx.xx>][i-sid <0-16777215>][isid-list
WORD<1-32>]
5. (Optional) Delete an IS-IS accept policy instance:
no isis accept [adv-rtr <x.xx.xx>][i-sid <0-16777215>][isid-list
WORD<1-32>]
6. Specify an IS-IS route policy to apply to routes from all BEBs:
isis accept route-map WORD<1–64>
7. Specify an IS-IS route policy to apply for a specific BEB:
isis accept adv-rtr <x.xx.xx> route-map WORD<1–64>
8. (Optional) Delete an IS-IS route policy:
no isis accept [adv-rtr <x.xx.xx>] [route-map]
9. Enable a configured IS-IS accept policy instance:
isis accept [adv-rtr <x.xx.xx>][i-sid <0-16777215>][isid-list
WORD<1-32>] [enable]
10. (Optional) Disable a configured IS-IS accept policy instance:
no isis accept [adv-rtr <x.xx.xx>][i-sid <0-16777215>][isid-list
WORD<1-32>] [enable]
Example
Variable definitions
Variable Value
WORD<1-32> Creates a name for your I-SID list.
<0-16777215> Specifies an I-SID value.
list WORD<1-1024> Specifies a list of I-SID values. For example, in the format 1,3,5,8-10.
The following table defines parameters for the isis accept command.
Variable Value
adv-rtr <x.xx.xx> Specifies a specific advertising BEB in which to apply the IS-IS accept
policy to routes for a specific advertising BEB. x.xx.xx specifies an SPBM
nickname.
The system uses the default global filter unless a filter for a specific
advertising BEB exists, in which case the system applies a more specific
filter.
The system requires an explicit filter to redistribute routes from a particular
VSN. If the default global filter or the filter for a specific advertising BEB
does not exist, the system does not redistribute the routes from the remote
VSN.
enable Enables the IS-IS accept policy.
i-sid <0-16777215> Configures the I-SID to which the IS-IS accept policy applies.
An I-SID value of 0 represents the global routing table (GRT).
isid-list Configures a list of I-SIDs to which the IS-IS accept policy applies.
WORD<1-32> An I-SID value of 0 represents the global routing table (GRT).
route-map WORD Specifies a route policy.
<1-64> You must configure a route policy earlier in a separate procedure.
The following table defines parameters for the isis apply accept command.
Variable Value
vrf WORD<1-16> Specifies a specific VRF instance.
Note
• The ipv6 isis apply accept [vrf WORD<1-16>] command can disrupt
traffic and cause temporary traffic loss. After you apply ipv6 isis apply accept
[vrf<1-16>], the command reapplies the accept policies, which deletes all of the IS-IS
routes, and adds the IS-IS routes again. You should make all the relevant accept policy
changes, and then apply ipv6 isis apply accept [vrf WORD<1-16>] at the
end.
• If you use the ipv6 accept command for inter-VRF routes based on the remote I-SID,
the device accepts routes form other local VRFs to the current VRF, therefore if the
accepted I-SID is configured on the local BEB, the device accepts its own IPv6 routes
advertised under the accepted I-SID.
• If the route policy changes, you must reapply the IPv6 IS-IS accept policy, unless it was the
last sequence in the configuration.
Procedure
configure terminal
2. (Optional) If you want to accept routes from a variety of I-SIDs, create an I-SID list before you create
an IPv6 IS-IS accept policy for the I-SID list:
ip isid-list WORD<1–32> {<0–16777215> | list WORD<1–1024>}
Note
When creating an I-SID list, you can add I-SID entries until the maximum limit for
supported Layer 3 I-SIDs is reached. The system truncates any additional I-SID entries.
The maximum limit includes the I-SIDs for locally configured Layer 3 VSNs and the I-SIDs
specified for IS-IS accept policy filters.
Use the command show ip isid-list vrf WORD<1-16> to view the list of
truncated I-SIDs.
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router vrf red
Switch:1(router-vrf)#ipv6 isis accept i-sid 100 enable
Switch:1(router-vrf)#exit
Switch:1(config)#ipv6 isis apply accept vrf red
Variable Definitions
Note
The I-SID lists created can be associated with both IPv4 or IPv6 routes.
Variable Value
WORD<1-32> Creates a name for your I-SID list.
<0-16777215> Specifies an I-SID value.
list WORD<1-1024> Specifies a list of I-SID values. For example, in the format 1,3,5,8-10.
The following table defines parameters for the ipv6 isis accept command.
Variable Value
adv-rtr Specifies the SPBM nickname for each advertising BEB to allow you to apply
<x.xx.xx> the IPv6 IS-IS accept policy to routes for a specific advertising BEB. The
system first uses the default filter, but if a more specific filter for a specific
advertising BEB is present the device applies the specific filter.
Note:
An IPv6 IS-IS accept policy that specifies the adv-rtr without an I-SID or I-SID
list will filter routes coming from the I-SID on which the policy is configured
and from the specified BEB.
The following table defines parameters for the ipv6 isis apply accept command.
Variable Value
vrf WORD<1-16> Specifies a specific VRF instance.
Use IS-IS accept policies to filter incoming IS-IS routes the device receives over the SPBM cloud. Accept
policies apply to incoming traffic and determine whether to add the route to the routing table.
If DvR is enabled on your switch, and the switch is either a DvR Controller or a non-DvR BEB within the
domain, you can configure IS-IS accept policies to accept specific host routes from the DvR backbone.
For information on DvR, see Distributed Virtual Routing on page 688.
Note
• The isis apply accept [vrf WORD<1-16>] command can disrupt traffic and
cause temporary traffic loss. After you apply isis apply accept [vrf <1-16>],
the command reapplies the accept policies, which deletes all of the IS-IS routes, and adds
the IS-IS routes again. You should make all the relevant accept policy changes, and then
apply isis apply accept [vrf WORD<1-16>] at the end.
• If the route policy changes, you must reapply the IS-IS accept policy, unless the IS-IS
accept policy was the last sequence in the configuration.
• The isis apply accept [vrf WORD<1-16>] command is not saved in the
configuration file. If you use a saved configuration file for IS-IS accept policy configuration,
you must apply the isis apply accept [vrf WORD<1-16>] command at the end.
• The number of unique Layer 3 VSN I-SIDs used on a BEB is limited to the number of VRFs
supported on the switch. This includes the I-SID values used for Layer 3 VSNs and the
I-SID values specified for the ISIS accept policy filters, which can be configured using the
ip isid-list [ISID#], accept i-sid <value>, or accept adv-rtr <isis
nn> i-sid <value> commands.
The switch supports 24 VRFs by default, so, in a default configuration, you cannot create
an ip isid-list or accept policy with more than 24 unique I-SID entries. However, the
configured VRFs take up an entry, so the formula to calculate the limit is: [24 VRF Limit
– (currently configured VRFs)]. This gives the number of unique I-SIDs that can be used
directly in the IS-IS accept policy filters, which you implement with the ip isid-list
or accept policy command. The I-SIDs used for Layer 3 VSNs can be reused in IS-IS
accept policy filters without affecting the limit.
If you increase the VRF scaling, you can create more Layer 3 VSNs. For more information
about how to increase the number of supported VRFs, see Configure the Maximum
Number of VRFs on page 3846. The maximum number of supported VRFs and Layer 3
VSNs differs depending on the hardware platform. For more information about maximum
scaling numbers, see VOSS Release Notes.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. (Optional) If you want to accept routes from a variety of I-SIDs, create an I-SID list before you create
an IS-IS accept policy for the I-SID list:
ip isid-list WORD<1–32> [<1–16777215>][list WORD<1–1024>]
Note
When creating an I-SID list, you can add I-SID entries until the maximum limit for
supported Layer 3 I-SIDs is reached. The system truncates any additional I-SID entries.
The maximum limit includes the I-SIDs for locally configured Layer 3 VSNs and the I-SIDs
specified for IS-IS accept policy filters.
Use the command show ip isid-list vrf WORD<1-16> to view the list of
truncated I-SIDs.
Note
When deleting an I-SID list, ensure that the I-SID list is not associated with an IS-IS accept
policy. Otherwise the deletion fails. An I-SID list associated with an accept policy cannot be
deleted because it must contain at least one constituent I-SID.
configure terminal
router isis
Configure IS-IS accept policies with a route policy or a backbone route policy or a combination of both,
to determine which routes the IS-IS accept policy applies to.
The IS-IS routes are selectively accepted based on the route policy. Since the backbone route policy
is not configured, all host routes from the DvR backbone are denied.
If you do not configure a route policy, by default, all IS-IS routes are accepted.
• An IS-IS accept policy with only the backbone route policy:
The DvR host routes from the DvR backbone are selectively accepted based on the backbone route
policy. Since the route policy is not configured, all IS-IS host routes are accepted.
If you do not configure a backbone route policy, all host routes from the DvR backbone are denied.
• An IS-IS accept policy with both route policy and backbone route policy:
IS-IS routes are selectively accepted based on the route policy and host routes from the DvR
backbone are selectively accepted based on the backbone route policy.
5. Configure an IS-IS accept policy instance with a route policy.
Use one of the following options:
a. Create an IS-IS accept policy instance to apply to all BEBs for a specific I-SID or I-SID list:
accept [i-sid <1-16777215>][isid-list WORD <1-32>]
b. Create an IS-IS accept policy instance to apply to a specific advertising BEB:
accept adv-rtr <x.xx.xx> [i-sid <1-16777215>][isid-list WORD <1-32>]
c. (Optional) Delete an IS-IS accept policy instance:
no accept [adv-rtr <x.xx.xx>][i-sid <1-16777215>][isid-list WORD
<1-32>]
d. Specify an IS-IS route policy to apply to routes from all BEBs:
accept route-map WORD<1–64>
e. Specify an IS-IS route policy to apply to a specific advertising BEB:
accept adv-rtr <x.xx.xx>[route-map WORD<1–64>]
f. (Optional) Delete an IS-IS route policy:
no accept [adv-rtr <x.xx.xx>] [route-map]
g. Enable an IS-IS route accept instance:
accept [adv-rtr <x.xx.xx>][enable][i-sid <1-16777215>][i-sid-list
WORD<1-32>]
h. (Optional) Disable an IS-IS route accept instance:
no accept [adv-rtr <x.xx.xx>][enable][i-sid <1-16777215>][i-sid-list
WORD<1-32>]
6. Configure an IS-IS accept policy instance with a backbone route policy to accept host routes from
the DvR backbone:
Note
IS-IS accept policies typically apply to all IS-IS routes. However, to accept DvR host routes
from the DvR backbone, you must explicitly configure the IS-IS accept policy with a
backbone route policy.
d. (Optional) Delete an IS-IS accept policy instance with backbone route policy configuration, which
applies to all BEBs for a specific I-SID or I-SID list:
no accept [i-sid <1-16777215>][isid-list WORD <1-32>] backbone-
route-map
e. Create an IS-IS accept policy instance to accept host routes from the DvR backbone and apply to
a specific advertising BEB:
accept adv-rtr <x.xx.xx> backbone-route-map WORD <1-64>
f. (Optional) Delete an IS-IS accept policy instance with backbone route policy configuration, which
applies to a specific advertising BEB
no accept adv-rtr <x.xx.xx> backbone-route-map
7. Configure an IS-IS accept policy with both route policy and backbone route policy, to selectively
accept IS-IS routes as well as host routes from the DvR backbone.
a. Create the default IS-IS accept policy instance with a route policy to accept IS-IS routes and a
backbone route policy to accept host routes from the DvR backbone:
accept route-map WORD<1–32> backbone-route-map WORD <1-64>
b. (Optional) Delete the default IS-IS accept policy with route policy and backbone route policy
configuration:
no accept route-map backbone-route-map
c. Create an accept policy instance to selectively accept IS-IS routes and host routes from the DvR
backbone, and apply to all BEBs for a specific I-SID or I-SID list:
accept [i-sid <1-16777215>][isid-list WORD <1-32>] route-map WORD<1–
32> backbone-route-map WORD<1-64>
d. (Optional) Delete an accept policy instance with route policy and backbone route policy
configuration, which applies to all BEBs for a specific I-SID or I-SID list:
no accept [i-sid <1-16777215>][isid-list WORD <1-32>] route-map
backbone-route-map
e. Create an IS-IS accept policy instance to selectively accept IS-IS routes and host routes from the
DvR backbone, and apply to a specific advertising BEB:
accept adv-rtr <x.xx.xx> route-map WORD<1–32> backbone-route-map
WORD <1-64>
f. (Optional) Delete an IS-IS accept policy instance with route policy and backbone route policy
configuration, which applies to a specific advertising BEB:
no accept adv-rtr <x.xx.xx> route-map backbone-route-map
8. Apply the IS-IS accept policy changes, which removes and re-adds all routes with updated filters:
isis apply accept [vrf WORD <1–16>]
9. Exit IS-IS Router Configuration mode:
exit
Example
Configure an I-SID based IS-IS accept policy with the route policy test:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#route-map test 1
Switch:1(route-map)#enable
Switch:1(route-map)#exit
Switch:1(config)#router isis
Switch:1(config-isis)#accept i-sid 101
Switch:1(config-isis)#accept i-sid 101 route-map test
Switch:1(config-isis)#accept i-sid 101 enable
Switch:1#exit
Switch:1(config)#isis apply accept
The following examples show the configuration of an IS-IS accept policy to accept host routes from the
DvR backbone
Example 1:
To accept host routes from the DvR backbone, you must configure a backbone route policy and apply it
to the IS-IS accept policy.
2. Configure an IS-IS accept policy for I-SID 10, and apply the route policy as a backbone route policy:
Switch:1(route-map)#exit
Switch:1(config)#router isis
Switch:1(config-isis)#accept i-sid 10 backbone-route-map dvrmap1
Switch:1(config-isis)#accept i-sid 10 enable
Switch:1(config-isis)#exit
OR
Configure the default accept policy for IS-IS and DvR, and apply the route policy as a backbone
route policy:
Switch:1(config)#route-map isismap1 1
Switch:1(route-map)#enable
Switch:1(route-map)#exit
Switch:1(config)#router isis
Switch:1(config-isis)#accept route-map isismap1 backbone-route-map dvrmap1
==================================================================================
Isis Accept - GlobalRouter
==================================================================================
- - - isismap1 dvrmap1
Example 2:
Configure an IS-IS accept policy for I–SID 10 that accepts DvR host routes in a subnet, for example,
subnet 126.1.1.0/24.
3. Create an IS-IS accept policy with I-SID 10 and apply the route policy as a backbone route policy:
Switch:1(route-map)#exit
Switch:1(config)#router isis
Switch:1(config-isis)#accept i-sid 10 backbone-route-map dvrmap2
Switch:1(config-isis)#accept i-sid 10 enable
The above command causes IS-IS to accept all routes with I-SID 10. To deny IS-IS routes and accept
only DvR host routes, you can configure an additional IS-IS route policy as follows:
Switch:1(config)#route-map isismap2 1
Switch:1(route-map)#no permit
Switch:1(route-map)#enable
Switch:1(route-map)#exit
Switch:1(config)#router isis
Switch:1(config-isis)#accept i-sid 10 route-map isismap2 backbone-route-map dvrmap2
Switch:1(config-isis)#accept i-sid 10 enable
Switch:1(config-isis)#exit
Switch:1(config)#isis apply accept
==================================================================================
Isis Accept - GlobalRouter
==================================================================================
The following examples show the configuration of IS-IS accept policies for a specific VRF instance.
Example 1:
Configure IS-IS accept policies to accept host routes from the DvR backbone, for a specific VRF
instance.
1. In the VRF green context, configure the route policy dvrmap3 for DvR:
Switch:1(config)#router vrf green
Switch:1(router-vrf)#route-map dvrmap3 1
Switch:1(router-vrf-routemap)#enable
2. Use one of the following options to configure an IS-IS accept policy, and apply the route policy as a
backbone route policy:
Configure an IS-IS accept policy for a specific advertising BEB with nickname 1.11.11:
Switch:1(router-vrf-routemap)#isis accept adv-rtr 1.11.11 backbone-route-map dvrmap3
Switch:1(router-vrf-routemap)#exit
Switch:1(router-vrf)#isis accept adv-rtr 1.11.11 enable
Switch:1(router-vrf)#show ip isis accept vrf green
==================================================================================
Isis Accept - VRF green
==================================================================================
==================================================================================
Isis Accept - VRF green
==================================================================================
==================================================================================
Isis Accept - VRF green
==================================================================================
==================================================================================
Isis Accept - VRF green
==================================================================================
==============================================================================
Isis Accept - VRF green
==============================================================================
===============================================================================
Isis Accept - VRF green
===============================================================================
Example 2:
Configure an accept policy for I–SID 10 that accepts DvR host routes in a subnet, for example, subnet
126.1.1.0/24.
2. For a specific VRF instance, create a route policy to match the IP prefix list:
Switch:1(config)#router vrf green
Switch:1(router-vrf)#route-map dvrmap4 1
Switch:1(router-vrf-routemap)#match network listPrefix
Switch:1(router-vrf-routemap)#enable
Switch:1(router-vrf-routemap)#exit
Switch:1(router-vrf)#
3. Create an IS-IS accept policy with I-SID 10, and apply the route policy as the backbone route policy:
Switch:1(router-vrf)#accept i-sid 10 backbone-route-map dvrmap4
Switch:1(router-vrf)#accept i-sid 10 enable
===============================================================================
Isis Accept - VRF green
===============================================================================
Variable definitions
Variable Value
WORD<1-32> Creates a name for your I-SID list.
<1-16777215> Specifies an I-SID number.
list WORD<1-1024> Specifies a list of I-SID values. For example, in the format 1,3,5,8-10.
Variable Value
adv-rtr <x.xx.xx> Specifies the SPBM nickname for each advertising BEB to allow you to
apply the IS-IS accept policy to routes for a specific advertising BEB. The
system first uses the default filter, but if a more specific filter for a specific
advertising BEB is present the device applies the specific filter.
backbone-route- Specifies the DvR backbone route map.
map WORD<1-64>
enable Enables an IS-IS accept policy.
i-sid Specifies an I-SID number to represent a local or remote Layer 3 VSN to
<1-16777215> which the IS-IS accept policy applies.
Use the parameter to apply a filter for routes from specific I-SIDs that
represent the remote VSN. Based on the routing policy the system applies,
the system can redistribute the remote VSN to the VSN where you applied
the filter.
An I-SID value of 0 represents the global routing table (GRT).
Variable Value
isid-list Specifies the I-SID list name that represents the local or remote Layer 3
WORD<1-32> VSNs to which the IS-IS accept policy applies.
Use the parameter to apply a default filter for all routes from specific I-SIDs
that represent the remote VSN. Based on the routing policy the system
applies, the system redistributes the remote VSN to the VSN where you
applied the filter.
An I-SID value of 0 represents the global routing table (GRT).
route-map Specifies a route policy by name.
WORD<1-64> You must configure the route policy earlier in a separate procedure.
The following table defines parameters for the isis apply accept command.
Variable Value
vrf WORD<1-16> Specifies a specific VRF instance.
Procedure
1. Display IS-IS accept policy information:
show ip isis accept [vrf WORD<1–16>][vrfids WORD<0–512>]
2. Display I-SID list information:
show ip isid-list [vrf WORD<1–16>][vrfids WORD<0–512>][WORD<1–32>]
3. Display route information:
show ip route [vrf WORD<1–16>]
The NH VRF/ISID column displays the I-SID for inter-Virtual Services Network (VSN) routes
redistributed with IS-IS accept policies, only if the I-SID redistributed does not have an IP VSN
associated with it. If an IP VSN exists for that I-SID, the VRF name displays. If the I-SID is 0, the
column represents and displays as the GlobalRouter.
The existing IS-IS routes for Layer 3 VSNs continue to display as the VRF name of the IP VSN.
4. Display the SPBM IP unicast Forwarding Information Base (FIB):
show isis spbm ip-unicast-fib [all] [id <1–16777215>][spbm-nh-as-mac]
[home|remote]
Example
Variable Definitions
The following table defines parameters for the show ip isis accept command.
Variable Value
vrf WORD<1-16> Displays I-SID list information for a particular VRF by name.
vrfids WORD<0-512> Displays I-SID list information for a particular VRF ID.
The following table defines parameters for the show ip isid-list command.
Variable Value
vrf WORD<1-16> Displays I-SID list information for a particular VRF by name.
vrfids WORD<0-512> Displays I-SID list information for a particular VRF ID.
WORD<1-32> Displays I-SID list information for a particular I-SID list name.
The following table defines parameters for the show ip route command.
Variable Value
vrf WORD<1-16> Displays I-SID list information for a particular VRF by name.
The following table defines parameters for the show isis spbm ip-unicast-fib command.
Variable Value
all Displays all IS-IS SPBM IP unicast Fowarding Information Base (FIB) information.
home Displays the IS-IS SPBM IP unicast FIB information that the system configures in
the home area.
id <1-16777215> Displays IS-IS SPBM IP unicast FIB information by I-SID ID.
remote Displays the IS-IS SPBM IP unicast FIB information that the system configures in
the remote area.
spbm-nh-as-mac Displays the next hop B-MAC of the IP unicast FIB entry.
Note
• IPv6 IS-IS accept policies are not supported for DvR.
• The I-SID lists created can be associated with both IPv4 or IPv6 routes.
• The ipv6 isis apply accept [vrf WORD<1-16>] command can disrupt traffic
and cause temporary traffic loss. After you apply ipv6 isis apply accept [vrf
<1-16>], the command reapplies the accept policies, which deletes all of the IS-IS routes,
and adds the IS-IS routes again. You should make all the relevant accept policy changes,
and then apply ipv6 isis apply accept [vrf WORD<1-16>] at the end.
• If the route policy associated with an accept policy changes, you must reapply the IPv6
IS-IS accept policy, unless the IPv6 IS-IS accept policy was the last sequence in the
configuration.
• The ipv6 isis apply accept [vrf WORD<1-16>] command is not saved in
the configuration file. If you use a saved configuration file for IPv6 IS-IS accept policy
configuration, you must apply the ipv6 isis apply accept [vrf WORD<1-16>]
command at the end.
The number of unique Layer 3 VSN I-SIDs used on a BEB is limited to the number of VRFs
supported on the switch. This includes the I-SID values used for Layer 3 VSNs and the
I-SID values specified for the IPv6 IS-IS accept policy filters.
The switch supports 24 VRFs by default, so, in a default configuration, you cannot
create an I-SID list or accept policy with more than 24 unique I-SID entries. However,
the configured VRFs take up an entry, so the formula to calculate the limit is: [24 VRF
Limit – (currently configured VRFs)]. This gives the number of unique I-SIDs that can
be used directly in the IPv6 IS-IS accept policy filters, which you implement with the
ip isid-list or ipv6 accept command. The I-SIDs used for Layer 3 VSNs can be
reused in IPv6 IS-IS accept policy filters without affecting the limit.
If you increase the VRF scaling, you can create more Layer 3 VSNs. For more information
about how to increase the number of supported VRFs, see Configure the Maximum
Number of VRFs on page 3846. The maximum number of supported VRFs and Layer 3
VSNs differs depending on the hardware platform. For more information about maximum
scaling numbers, see VOSS Release Notes.
Procedure
configure terminal
2. (Optional) If you want to accept routes from a variety of I-SIDs, create an I-SID list before you create
an IPv6 IS-IS accept policy for the I-SID list:
ip isid-list WORD<1–32> {<1–16777215> | list WORD<1–1024>}
Note
When creating an I-SID list, you can add I-SID entries until the maximum limit for
supported Layer 3 I-SIDs is reached. The system truncates any additional I-SID entries.
The maximum limit includes the I-SIDs for locally configured Layer 3 VSNs and the I-SIDs
specified for IS-IS accept policy filters.
Use the command show ip isid-list vrf WORD<1-16> to view the list of
truncated I-SIDs.
configure terminal
Example
Switch:1>enable
Switch:1#configure terminal
Switch:1(config)#router vrf vrftest
Variable Definitions
Note
The I-SID lists created can be associated with both IPv4 or IPv6 routes.
Variable Value
WORD<1-32> Creates a name for your I-SID list.
<1-16777215> Specifies an I-SID number.
list WORD<1-1024> Specifies a list of I-SID values. For example, in the format 1,3,5,8-10.
The following table defines parameters for the ipv6 isis accept command.
Variable Value
adv-rtr Specifies the SPBM nickname for each advertising BEB to allow you to apply
<x.xx.xx> the IPv6 IS-IS accept policy to routes for a specific advertising BEB. The
system first uses the default filter, but if a more specific filter for a specific
advertising BEB is present the device applies the specific filter.
Note:
An IPv6 IS-IS accept policy that specifies the adv-rtr without an I-SID or I-SID
list will filter routes coming from the I-SID on which the policy is configured
and from the specified BEB.
The following table defines parameters for the ipv6 isis apply accept command.
Variable Value
vrf WORD<1-16> Specifies a VRF instance.
Procedure
Example
Switch:1>enable
Switch:1#show ipv6 isis accept vrf vrfRED
=============================================================================
Isis Accept - VRF vrfRED
=============================================================================
ADV_RTR I-SID ISID-LIST ENABLE POLICY
-----------------------------------------------------------------------------
1.11.11 1001 - TRUE
SPBM allows a network to make the best use of routing and forwarding techniques, where only the
BEBs perform an IP route lookup and all other nodes perform standard Ethernet switching based on the
existing shortest path tree. This allows for end to end IP-over-Ethernet forwarding without the need for
ARP, flooding, or reverse learning.
To enable IP shortcuts on the BEBs, you can configure a circuitless IP address (loopback address) and
specify this adress as the IS-IS source address. This source address is automatically advertised into IS-IS
using TLV 135. In addition, to advertise routes from the BEBs into the SPBM network, you must enable
route redistribution of direct and static routes into IS-IS.
After you have configured the SPBM infrastructure, you can enable SPBM IP shortcuts to advertise IP
routes across the SPBM network using the following procedure.
• You must configure the required SPBM and IS-IS infrastructure, which includes the creation of SPBM
B-VLANs.
• Before redistributing routes into IS-IS, you must create the Customer VLANs, add slots/ports, and
add the IP addresses and network masks.
Procedure
Note
For IPv6 Shortcuts, select ipv6 in Ipv6SourceAddressType, and then use
Ipv6SourceAddress to specify the CLIPv6 interface to use as the source address for SBPM
IPv6 Shortcuts.
4. Select Apply.
5. In the navigation pane, expand Configuration > Fabric > SPBM.
6. Select the SPBM tab.
7. In IpShortcut, select enable.
Note
For IPv6 Shortcuts, select enable in Ipv6Shortcut.
8. Select Apply.
9. In the navigation pane, expand Configuration > IP.
10. Select Policy.
11. Select the Route Redistribution tab.
12. Select Insert to identify routes on the local switch to be announced into the SPBM network.
13. Using the fields provided, specify the source protocols to redistribute into IS-IS. In Protocol, ensure
you specify isis as the destination protocol.
14. Select Insert.
The VRF specific routes are transported in TLV 184 with the I-SID assigned to the VPNs. After extracting
the IP VPN IP reachability information, the routes are installed in the route tables of the appropriate
VRFs based on the I-SID association.
Procedure
Use the data in the following table to configure the IS-IS Redistribute tab.
Name Description
DstVrfId Specifies the destination Virtual Routing and Forwarding
(VRF) ID used in the redistribution.
Protocol Specifies the protocols that receive the redistributed routes.
SrcVrfId Specifies the source VRF ID used in the redistribution. For
IS-IS, the source VRF ID must be the same as the destination
VRF ID.
RouteSource Specifies the source protocol for the route redistribution
entry.
Enable Enables or disables a redistribution entry. The default is
disable.
RoutePolicy Specifies the route policy to be used for the detailed
redistribution of external routes from a specified source into
the IS-IS domain.
Metric Specifies the metric for the redistributed route. The value can
be a range between 0 to 65535. The default value is 0. Use a
value that is consistent with the destination protocol.
MetricType Specifies the metric type. Specifies a type1 or a type2 metric.
For metric type1, the cost of the external routes is equal to
the sum of all internal costs and the external cost. For metric
type2, the cost of the external routes is equal to the external
cost alone. The default is type2.
Subnets Indicates whether the subnets are advertised individually
or aggregated to their classful subnet. Choose suppress
to advertise subnets aggregated to their classful subnet.
Choose allow to advertise the subnets individually with the
learned or configured mask of the subnet. The default is
allow.
v6direct, v6static, RIPng, OSPFv3, or BGPv6, within the context of a VRF. Routing between VRFs is also
possible by using redistribution policies and injecting routes from the other protocols.
Note
RIPng is supported only on the Global Router.
The VRF specific routes are transported in TLV 184 with the I-SID assigned to the VPNs. After
extracting the IPv6 VPN reachability information, the IPv6 routes are installed in the route tables of
the appropriate VRFs based on the I-SID association.
Change the VRF instance as required to configure IPv6 IS-IS redistribution on a specific VRF instance.
Not all parameters are configurable on non-default VRFs.
Procedure
Use the data in the following table to configure the Redistribute tab.
Name Description
DstVrfId Specifies the destination Virtual Routing and
Forwarding (VRF) ID used in redistribution.
Protocol Specifies the protocols that receive the
redistributed routes.
SrcVrfId Specifies the source Virtual Routing and
Forwarding (VRF) ID used in redistribution.
RouteSource Specifies the source protocol for the route
redistribution entry.
Enable Enables or disables a redistribution entry. The
default is disabled.
RoutePolicy Specifies the route policy to be used for the
detailed redistribution of external routes from a
specified source into the IS-IS domain.
Name Description
Metric Specifies the metric for the redistributed route.
The default value is 0. Use a value that is
consistent with the destination protocol.
MetricType Specifies the metric type. Specifies a type1 or a
type2 metric. For metric type1, the cost of the
external routes is equal to the sum of all internal
costs and the external cost. For metric type2, the
cost of the external routes is equal to the external
cost alone. The default is type2.
After you apply the IS-IS accept filters, the device removes and re-adds all routes with updated filters.
Note
• After you apply IS-IS accept policies globally the application can disrupt traffic and cause
temporary traffic loss. After you configure the IS-IS accept policies value to Apply, the
device reapplies the accept policies, which deletes all of the IS-IS routes, and adds the
IS-IS routes again. You should make all the relevant accept policy changes, and then apply
IS-IS accept policies globally at the end.
• If the route policy changes, you must reapply the IS-IS accept policy, unless it was the last
sequence in the configuration.
Procedure
Use the data in the following table to configure the Accept Global tab.
Name Description
DefaultPolicyName Specifies the route policy name for the default
filter.
DefaultBackbonePolicyName Specifies the backbone host route policy name for
the default filter.
Apply Applies the default policy when you configure the
field to apply. The device only activates the default
policy if the route map (the default policy name)
has a value. If you do not select apply, the device
takes no action. The GRT always returns no action.
The system uses the default global filter unless a filter for a specific advertising BEB exists, in which case
the system applies a more specific filter.
Note
If the route policy changes, you must re-apply the IS-IS accept policy, unless it was the last
sequence in the configuration.
Procedure
Use the data in the following table to configure the Accept Nick Name tab.
Name Description
AdvertisingRtr Specifies the SPBM nickname to allow you to
apply the IS-IS accept policy to routes for a
specific advertising BEB. The system first uses
the default filter, but if a more specific filter for
a specific advertising BEB is present the device
applies the specific filter.
The value is 2.5 bytes in the format <x.xx.xx>.
Enable Enables or disables the SPBM nickname
advertising router entry. You must enable the
value to filter. The default is disabled.
PolicyName Specifies a route policy.
You must configure a policy earlier in a separate
procedure.
BackbonePolicyName Specifies the route policy for the backbone routes.
You must configure a policy earlier in a separate
procedure.
Note
If the route policy changes, you must re-apply the IS-IS accept policy, unless it was the last
sequence in the configuration.
Procedure
Use the data in the following table to configure the Accept Isid tab.
Name Description
Isid Configures a specific I-SID number to represent a
local or remote Layer 3 VSN to which the IS-IS
accept policy applies.
Based on the routing policy the system applies,
the system redistributes the remote VSN to the
VSN where you applied the filter.
An I-SID value of 0 represents the global routing
table (GRT).
Enable Enables or disables the I-SID entry. You must
enable the value to filter. The default is disabled.
PolicyName Specifies the route map name. You must configure
a policy earlier in a separate procedure.
BackbonePolicyName Specifies the backbone route map name. You
must configure a policy earlier in a separate
procedure.
Configure an IPv4 IS-IS Accept Policy for a Specific Advertising BEB and I-SID
Configures a specific advertising Backbone Edge Bridge (BEB) with a specific I-SID to allow you to
apply the IS-IS accept policy to routes for a specific advertising BEB.
Note
If the route policy changes, you must re-apply the IS-IS accept policy, unless it was the last
sequence in the configuration.
Procedure
Use the data in the following table to configure the Accept Nick-Name Isid tab.
Name Description
AdvertisingRtr Specifies the SPBM nickname to allow you to
apply the IS-IS accept policy to routes for a
specific advertising BEB.
The value is 2.5 bytes in the format <x.xx.xx>.
Isid Specifies an I-SID used to filter. The value 0 is used
for the Global Router.
Enable Enables or disables the I-SID entry. The default is
disabled.
PolicyName Specifies the route policy name. You must
configure a policy earlier in a separate procedure.
BackBonePolicyName Specifies the backbone route policy name. You
must configure a policy earlier in a separate
procedure.
Note
When creating an I-SID list, you can add I-SID entries until the maximum limit for supported
Layer 3 I-SIDs is reached. The system truncates any additional I-SID entries. The maximum
limit includes the I-SIDs for locally configured Layer 3 VSNs and the I-SIDs specified for IS-IS
accept policy filters.
Refresh the EDM tab to view the actual list of I-SIDs in the I-SID list.
Procedure
Use the data in the following table to configure the Isid-List tab.
Name Description
Name Specifies the name of the I-SID list.
Isid or Isid-List Specifies that you either want to add a particular
I-SID or a list of I-SID numbers.
Isid Specifies a particular I-SID number or a list of I-SID
numbers that represent local or remote Layer 3
VSNs to which the IS-IS accept policy applies.
An I-SID value of 0 represents the global routing
table (GRT).
Note
If the route policy changes, you must re-apply the IS-IS accept policy, unless it was the last
sequence in the configuration.
Procedure
Use the data in the following table to configure Accept Isid-List tab.
Name Description
Name Specifies the name of I-SID list.
Enable Enables or disables the I-SID list entry. The value
must be enabled to filter. The default is disabled.
PolicyName Specifies the route policy name.
BackBonePolicyName Specifies the backbone route policy name.
Configure an IPv4 IS-IS Accept Policy for a Specific Advertising BEB and I-SID-list
Configure an IS-IS accept policy to apply to a specific advertising Backbone Edge Bridge (BEB) for a
specific I-SID list to represent local or remote Layer 3 VSNs, which allows the system to redistribute the
remote VSNs to the VSN where you applied the filter.
Note
If the route policy changes, you must reapply the IS-IS accept policy, unless it was the last
sequence in the configuration.
The system uses the default global filter unless a filter for a specific advertising BEB exists, in which case
the system applies a more specific filter.
Procedure
Use the data in the following table to configure the Accept Nick-Name Isid-List tab.
Name Description
AdvertisingRtr Specifies the SPBM nickname to allow you to
apply the IS-IS accept policy to routes for a
specific advertising BEB. The system first uses the
default filter, but if a more specific filter is present
the device applies the specific filter.
The value is 2.5 bytes in the format <x.xx.xx>.
Name Specifies the name of the I-SID list used to filter.
Enable Enables or disables the SPBM nickanme
advertising router entry. You must enable the
value to filter. The default is disabled.
PolicyName Specifies a route policy name.
BackBonePolicyName Specifies a backbone route policy name.
After you apply the IPv6 IS-IS accept policy filters, the device removes and re-adds all IPv6 routes with
updated filters.
Note
• After you apply IPv6 IS-IS accept policies globally the application can disrupt traffic and
cause temporary traffic loss. After you configure the IPv6 IS-IS accept policies value to
Apply, the device reapplies the accept policies, which deletes all of the IPv6 IS-IS routes,
and adds the IPv6 IS-IS routes again. You should make all the relevant accept policy
changes, and then apply IPv6 IS-IS accept policies globally at the end.
• If the route policy changes, you must reapply the IPv6 IS-IS accept policy, unless it was the
last sequence in the configuration.
Procedure
Use the data in the following table to configure the Accept Global tab.
Name Description
DefaultPolicyName Specifies the route policy name for the default
filter.
Apply Applies the default policy when you select apply.
The device only activates the default policy if the
route map (the default policy name) has a value.
If you do not select apply, the device takes no
action. The GRT always returns no action.
NickNameTableSize Shows the IPv6 IS-IS In Filter Nick Name table size.
Name Description
IsidTableSize Shows the IPv6 IS-IS In Filter I-SID table size.
NickNameIsidTableSize Shows the IPv6 IS-IS In Filter Nick Name I-SID
table size.
IsidListTableSize Shows the IPv6 IS-IS In Filter I-SID List table size.
NickNameIsidListTableSize Shows the IPv6 IS-IS In Filter Nick Name I-SID List
table size.
The system uses the default global filter unless a filter for a specific advertising BEB exists, in which case
the system applies a more specific filter.
Note
If the route policy changes, you must re-apply the IPv6 IS-IS accept policy, unless it was the
last sequence in the configuration.
Procedure
Use the data in the following table to configure the Accept Nick Name tab.
Name Description
AdvertisingRtr Specifies the SPBM nickname to apply the IS-IS
accept policy to routes for a specific advertising
BEB. The system first uses the default filter, but if a
more specific filter for a specific advertising BEB is
present the device applies the specific filter.
Enable Enables the SPBM nickname advertising router
entry. The default is disabled.
PolicyName Specifies a route policy.
Note
If the route policy changes, you must re-apply the IPv6 IS-IS accept policy, unless it was the
last sequence in the configuration.
Procedure
Use the data in the following table to configure the Accept Isid tab.
Name Description
Isid Specifies a particular I-SID number that represents
local or remote Layer 3 VSNs to which the IPv6
IS-IS accept policy applies. An I-SID value of 0
represents the global routing table (GRT).
Enable Enables or disables the I-SID entry. The default is
disabled.
PolicyName Specifies the route policy name.
Configuring an IPv6 IS-IS accept policy for a specific advertising BEB and I-SID
Configures a specific advertising Backbone Edge Bridge (BEB) with a specific I-SID to allow you to
apply the IPv6 IS-IS accept policy to routes for a specific advertising BEB.
Note
If the route policy changes, you must re-apply the IPv6 IS-IS accept policy, unless it was the
last sequence in the configuration.
Procedure
Use the data in the following table to configure the Accept Nick-Name Isid tab.
Name Description
AdvertisingRtr Specifies the SPBM nickname to apply the IS-IS
accept policy to routes for a specific advertising
BEB.
Isid Specifies the I-SID value. The value 0 is used for
the Global Router.
Enable Enables or disables the I-SID entry. The default is
disabled.
PolicyName Specifies the route policy name. You must
configure a policy earlier in a separate procedure.
Note
When creating an I-SID list, you can add I-SID entries until the maximum limit for supported
Layer 3 I-SIDs is reached. The system truncates any additional I-SID entries. The maximum
limit includes the I-SIDs for locally configured Layer 3 VSNs and the I-SIDs specified for IS-IS
accept policy filters.
Refresh the EDM tab to view the actual list of I-SIDs in the I-SID list.
Procedure
Use the data in the following table to configure the Isid-List tab.
Name Description
Name Specifies the name of the I-SID list.
Isid Specifies a particular I-SID number or a list of I-SID
numbers that represent local or remote Layer 3
VSNs to which the IPv6 IS-IS accept policy applies.
An I-SID value of 0 represents the global routing
table (GRT).
Note
If the route policy changes, you must re-apply the IPv6 IS-IS accept policy, unless it was the
last sequence in the configuration.
Procedure
Use the data in the following table to configure Accept Isid-List tab.
Name Description
Name Specifies the name of I-SID list.
Enable Enables or disables the I-SID list entry. The default
is disabled.
PolicyName Specifies the route policy name.
Configuring an IPv6 IS-IS Accept Policy for a specific Advertising BEB and I-SID List
Configure an IPv6 IS-IS accept policy to apply to a specific advertising Backbone Edge Bridge (BEB) for
a specific I-SID list to represent local or remote Layer 3 VSNs, which allows the system to redistribute
the remote VSNs to the VSN where you applied the filter.
Note
If the route policy changes, you must reapply the IPv6 IS-IS accept policy, unless it was the
last sequence in the configuration.
The system uses the default global filter unless a filter for a specific advertising BEB exists, in which case
the system applies a more specific filter.
Procedure
Use the data in the following table to configure the Accept Nick-Name Isid-List tab.
Name Description
AdvertisingRtr Specifies the SPBM nickname to apply the IS-IS
accept policy to routes for a specific advertising
BEB. The system first uses the default filter, but if
a more specific filter is present the device applies
the specific filter.
Name Specifies the I-SID list name.
Enable Enables or disables the SPBM nickanme
advertising router entry. The default is disabled.
PolicyName Specifies a route policy name.
Examples and network illustrations in this document may illustrate only one of the supported platforms.
Unless otherwise noted, the concept illustrated applies to all supported platforms.
The following sections show the steps required to configure the SPBM IP Shortcuts parameters in this
example.
SwitchC
CIRCUITLESS INTERFACE CONFIGURATION - GlobalRouter
interface loopback 1
ip address 1 10.0.0.1/255.255.255.255
exit
ISIS CONFIGURATION
router isis
ip-source-address 10.0.0.1
spbm 1 ip enable
exit
VLAN CONFIGURATION
router isis
redistribute direct
redistribute direct metric 1
redistribute direct enable
exit
SwitchD
CIRCUITLESS INTERFACE CONFIGURATION - GlobalRouter
interface loopback 1
ip address 1 10.0.0.2/255.255.255.255
exit
ISIS CONFIGURATION
router isis
ip-source-address 10.0.0.2
spbm 1 ip enable
exit
VLAN CONFIGURATION
router isis
redistribute direct
redistribute direct metric 1
redistribute direct enable
exit
4 out of 4 Total Num of Route Entries, 4 Total Num of Dest Networks displayed.
TYPE Legend:
I=Indirect Route, D=Direct Route, A=Alternative Route, B=Best Route, E=Ecmp Rout
e,
U=Unresolved Route, N=Not in HW, F=Replaced by FTN, V=IPVPN Route, S=SPBM Route
PROTOCOL Legend:
v=Inter-VRF route redistributed
4 out of 4 Total Num of Route Entries, 4 Total Num of Dest Networks displayed.
TYPE Legend:
I=Indirect Route, D=Direct Route, A=Alternative Route, B=Best Route, E=Ecmp Rout
e,
U=Unresolved Route, N=Not in HW, F=Replaced by FTN, V=IPVPN Route, S=SPBM Route
PROTOCOL Legend:
v=Inter-VRF route redistributed
For information about supported service types, see Fabric Connect Service Types on page 1273.
IS-IS TLV 184 is used to advertise SPBM Layer 3 VSN route information across the SPBM cloud. To
associate advertised routes with the appropriate VRF, each VRF is associated with an I-SID. All VRFs in
the network that share the same I-SID participate in the same VSN.
Note
IPv4 Layer 3 VSN and IPv6 Layer 3 VSN coexist and share the same I-SID. You need to
configure I-SID only once. The advantage of having two separate VPNs, one for IPv4 and one
for IPv6 is because it gives user an option to enable them separately.
In this example, I-SID 101 is associated with VRF green and I-SID 102 is associated with VRF red. The
I-SID is used to tie the advertised routes to a particular VRF. This identifier has to be the same on all
edge nodes for a particular VRF, and has to be unique across all the VRFs on the same node
When IS-IS receives an update from an edge node, it looks for the Layer 3 VSN TLV, and if one exists, it
looks at the I-SID identifier. If that identifier is mapped to a local VRF, extracts the IPv4 or IPv6 routes
and add them to the RTM of that VRF.
With SPBM Layer 3 VSN, the packet forwarding works in a similar fashion as the IP Shortcuts on the
Global Router, with the difference that the encapsulation includes the I-SID to identify the VRF that the
packet belongs to. The following figure shows the packet forwarding for VRF red.
Note
With SPBM Layer 3 VSN, the CMAC header is all null. This header does not have any
significance in the backbone. It is included to maintain the same 802.1ah format for ease
of implementation.
At BEB D, the node strips off the B-MAC encapsulation, and performs a lookup to determine the
destination for traffic with I-SID 102. After identifying the destination as VRF red, the node forwards the
packet to the destination VRF.
Note
IPv4 Layer 3 VSN and IPv6 Layer 3 VSN coexist and share the same I-SID. The advantage of
having two separate VPNs, one for IPv4 and one for IPv6 is because it gives user an option to
enable them separately.
Consider the following when you configure the IPv6 Layer 3 VSN :
• You can enable IPv6 Layer3 VSN only when spbm boot config flag is true.
• IPv4 Shortcuts and IPv6 Shortcuts must be enabled.
If the ICMP response is disabled, the switch does not respond to any ICMP requests received on the
VRFs/Layer 3 VSNs.
If the ICMP response is enabled, the switch responds to ICMP requests received on the VRF/Layer 3
VSNs.
SPBM Layer 3 VSN uses IS-IS to exchange the routing information for each VRF. In the VRF, just like
in the Global Router (VRF 0), the routes are not redistributed into IS-IS automatically. To advertise
the VRF routes, you must explicitly redistribute one of the following protocols into IS-IS: direct, static,
RIP, OSPF, or BGP. Routing between VRFs is also possible by using redistribution policies and injecting
routes from the other protocols.
Procedure
configure terminal
Example
Variable Definitions
The following table defines parameters for the show ip ipvpn command.
Variable Value
vrf WORD<1–16> Specifies the VRF name.
vrfids WORD<0–512> Specifies the VRF ID.
Variable Value
<0–16777215> Assigns an I-SID to the VRF being configured.
Use the no or default option to remove the I-SID to VRF allocation for this VRF.
The following table defines parameters for the isis redistribute command.
Variable Value
{direct | bgp | ospf Specifies the protocol.
| rip | static}
enable Enables the redistribution of the specified protocol into the SPBM
network.
The default is disabled. Use the no or default options to disable the
redistribution.
metric <0–65535> Configures the metric (cost) to apply to redistributed routes. The
default is 1.
metric-type Configures the type of route to import into the protocol. The default is
{external|internal} internal.
route-map WORD<0–64> Configures the route policy to apply to redistributed routes. Specifies a
name.
subnets {allow| Indicates whether the subnets are advertised individually or
suppress} aggregated to their classful subnet. Choose suppress to advertise
subnets aggregated to their classful subnet. Choose allow to advertise
the subnets individually with the learned or configured mask of the
subnet. The default is allow.
The following table defines parameters for the isis apply redistribute command.
Variable Value
{direct | bgp | ospf | rip | Specifies the protocol.
static}
vrf WORD<1–16> Applies IS-IS redistribute for a particular VRF.
Specifies the VRF name.
After you have configured the SPBM infrastructure, you can enable SPBM Layer 3 VSN to advertise IPv6
routes across the SPBM network using the following procedure.
Procedure
1. Enter VRF Router Configuration mode for a specific VRF context:
enable
configure terminal
Examples
IPv6 IPVPN
==========================================================================================
VRF Name VRF ID IPv6 IPVPN IPv4 IPVPN I-SID I-SID Name
------------------------------------------------------------------------------------------
vrfred 2 enabled disabled 100 ISID-100
------------------------------------------------------------------------------------------
1 out of 1 Total IPv6 L3 VSN, 1 active IPv6 and 0 active IPv4 displayed.
Switch:1(router-vrf)#ipv6 isis redistribute direct enable
Switch:1(router-vrf)#ipv6 ospf redistribute isis enable
Switch:1(router-vrf)#ipv6 ospf apply redistribute isis vrf vrfred
Variable Definitions
The following table defines parameters for the ipv6 ipvpn command.
Variable Value
enable Enables IPv6 IPVPN. The default is disabled.
The following table defines parameters for the show ipv6 ipvpn command.
Variable Value
vrf WORD<1–16> Specifies the VRF name.
vrfids WORD<0–512> Specifies the VRF ID.
Variable Value
<0–16777215> Assigns an I-SID to the VRF being configured.
The following table defines parameters for the isis redistribute command.
Variable Value
{bgp | direct | ospf | Specifies the protocol.
static}
enable Enables the redistribution of the specified protocol into the
SPBM network.
The default is disabled.
Perform this procedure to display SPBM IPv6 unicast Forwarding Information Base (FIB).
Procedure
Example
-------------------------------------------------------------------------------------------------------------------
Home: Total number of SPBM IPv6-UNICAST FIB entries 4
Remote: Total number of SPBM IPv6-UNICAST FIB entries 0
--------------------------------------------------------------------------------------------------------------------
Variable Definitions
The following table defines parameters for the show isis spbm ipv6-unicast-fib command.
Variable Value
all Displays all IS-IS SPBM IPv6 unicast Fowarding Information Base (FIB)
information for all VRFs.
home Displays the IS-IS SPBM IPv6 unicast FIB information that the system configures
in the home area.
id <1-16777215> Displays IS-IS SPBM IPv6 unicast FIB information by I-SID ID.
remote Displays the IS-IS SPBM IPv6 unicast FIB information that the system configures
in the remote area.
spbm-nh-as-mac Displays the next hop B-MAC of the IPv6 unicast FIB entry.
Procedure
Example
SPBM Layer 3 VSN uses IS-IS to exchange the routing information for each VRF. In the VRF, just like
in the Global Router (VRF 0), the routes are not redistributed into IS-IS automatically. To advertise
the VRF routes, you must explicitly redistribute one of the following protocols into IS-IS: direct, static,
RIP, OSPF, or BGP. Routing between VRFs is also possible by using redistribution policies and injecting
routes from the other protocols.
Procedure
After you have configured the SPBM infrastructure, you can enable SPBM Layer 3 Virtual Services
Network (VSN) to advertise IPv6 routes across the SPBM network from one VRF to another using the
following procedure.
SPBM Layer 3 VSN uses IS-IS to exchange the routing information for each VRF.
Procedure
Note that IP IS-IS redistribution needs to be configured to inject the VRF routes into IS-IS.
VLAN CONFIGURATION
VLAN CONFIGURATION
VLAN CONFIGURATION
VLAN CONFIGURATION
Switch-C
Switch-C:1# show isis spbm ip-unicast-fib
================================================================================
SPBM IP-UNICAST FIB ENTRY INFO
================================================================================
VRF DEST OUTGOING SPBM PREFIX IP ROUTE
VRF ISID ISID Destination NH BEB VLAN INTERFACE COST COST PREFERENCE
--------------------------------------------------------------------------------
GRT - - 10.0.0.2/32 Switch-D 4000 1/3 20 1 7
GRT - - 10.0.14.0/24 Switch-D 4000 1/3 20 1 7
--------------------------------------------------------------------------------
Total number of SPBM IP-UNICAST FIB entries 2
--------------------------------------------------------------------------------
Switch-C:1# show isis spbm ip-unicast-fib id 13990001
================================================================================
SPBM IP-UNICAST FIB ENTRY INFO
====================================================================================
VRF DEST OUTGOING SPBM PREFIX IP ROUTE
VRF ISID ISID Destination NH BEB VLAN INTERFACE COST COST PREFERENCE
------------------------------------------------------------------------------------
green - 13990001 10.1.101.0/24 Switch-D 4000 1/2 20 1 7
------------------------------------------------------------------------------------
Total number of SPBM IP-UNICAST FIB entries 1
------------------------------------------------------------------------------------
------------------------------------------------------------------------------------
Total number of SPBM IP-UNICAST FIB entries 1
------------------------------------------------------------------------------------
Switch-C:1# show isis spbm ip-unicast-fib id all
===================================================================================
SPBM IP-UNICAST FIB ENTRY INFO
===================================================================================
VRF DEST OUTGOING SPBM PREFIX IP ROUTE
VRF ISID ISID Destination NH BEB VLAN INTERFACE COST COST PREFERENCE
-----------------------------------------------------------------------------------
GRT - - 10.0.0.2/32 Switch-D 4000 1/3 20 1 7
GRT - - 10.0.14.0/24 Switch-D 4000 1/3 20 1 7
green - 13990001 10.1.102.0/24 Switch-D 4000 1/3 20 1 7
red - 13990002 10.2.202.0/24 Switch-D 4000 1/3 20 1 7
-----------------------------------------------------------------------------------
Total number of SPBM IP-UNICAST FIB entries 4
-----------------------------------------------------------------------------------
Switch-D
Switch-D:1# show isis spbm ip-unicast-fib
================================================================================
VRF DEST OUTGOING SPBM PREFIX IP ROUTE
VRF ISID ISID Destination NH BEB VLAN INTERFACE COST COST PREFERENCE
--------------------------------------------------------------------------------
GRT - - 10.0.0.1/32 Switch-C 4000 1/2 20 1 7
VRF green—Switch-C
Switch-C:1# show ip route vrf green
================================================================================
IP Route - VRF green
================================================================================
NH INTER
DST MASK NEXT VRF/ISID COST FACE PROT AGE TYPE PRF
--------------------------------------------------------------------------------
10.1.101.0 255.255.255.0 10.1.101.1 - 1 101 LOC 0 DB 0
10.1.102.0 255.255.255.0 Switch-D vrf green 20 4000 ISIS 0 IBSV 7
2 out of 2 Total Num of Route Entries, 0 Total Num of Dest Networks displayed.
--------------------------------------------------------------------------------
TYPE Legend:
I=Indirect Route, D=Direct Route, A=Alternative Route, B=Best Route, E=Ecmp Rout
e,
U=Unresolved Route, N=Not in HW, F=Replaced by FTN, V=IPVPN Route, S=SPBM Route
PROTOCOL Legend:
v=Inter-VRF route redistributed
VRF green—Switch-D
Switch-D:1# show ip route vrf green
================================================================================
IP Route - VRF green
================================================================================
NH INTER
DST MASK NEXT VRF/ISID COST FACE PROT AGE TYPE PRF
--------------------------------------------------------------------------------
10.1.101.0 255.255.255.0 Switch-C vrf green 20 4000 ISIS 0 IBSV 7
10.1.102.0 255.255.255.0 10.1.102.1 - 1 102 LOC 0 DB 0
2 out of 2 Total Num of Route Entries, 0 Total Num of Dest Networks displayed.
--------------------------------------------------------------------------------
TYPE Legend:
I=Indirect Route, D=Direct Route, A=Alternative Route, B=Best Route, E=Ecmp Rout
e,
U=Unresolved Route, N=Not in HW, F=Replaced by FTN, V=IPVPN Route, S=SPBM Route
PROTOCOL Legend:
v=Inter-VRF route redistributed
VRF red—Switch-C
Switch-C:1# show ip route vrf red
================================================================================
IP Route - VRF red
================================================================================
NH INTER
DST MASK NEXT VRF/ISID COST FACE PROT AGE TYPE PRF
--------------------------------------------------------------------------------
10.2.201.0 255.255.255.0 10.2.201.1 - 1 201 LOC 0 DB 0
10.2.202.0 255.255.255.0 Switch-D vrf red 20 4000 ISIS 0 IBSV 7
2 out of 2 Total Num of Route Entries, 0 Total Num of Dest Networks displayed.
--------------------------------------------------------------------------------
TYPE Legend:
I=Indirect Route, D=Direct Route, A=Alternative Route, B=Best Route, E=Ecmp Rout
e,
U=Unresolved Route, N=Not in HW, F=Replaced by FTN, V=IPVPN Route, S=SPBM Route
PROTOCOL Legend:
v=Inter-VRF route redistributed
VRF red—Switch-D
Switch-D:1# show ip route vrf red
================================================================================
IP Route - VRF red
================================================================================
NH INTER
DST MASK NEXT VRF/ISID COST FACE PROT AGE TYPE PRF
--------------------------------------------------------------------------------
10.2.201.0 255.255.255.0 Switch-C vrf red 20 4000 ISIS 0 IBSV 7
10.2.202.0 255.255.255.0 10.2.202.1 - 1 202 LOC 0 DB 0
2 out of 2 Total Num of Route Entries, 0 Total Num of Dest Networks displayed.
--------------------------------------------------------------------------------
TYPE Legend:
I=Indirect Route, D=Direct Route, A=Alternative Route, B=Best Route, E=Ecmp Rout
e,
U=Unresolved Route, N=Not in HW, F=Replaced by FTN, V=IPVPN Route, S=SPBM Route
PROTOCOL Legend:
v=Inter-VRF route redistributed
The run vms layer-3 switch command runs the Layer 3 Video Surveillance install script that
pre-configures basic and common configuration parameters to deploy a video surveillance network. Use
this script to quickly and easily deploy a video surveillance network in accordance with best practices,
using networking equipment.
Use this script to use a single command on a switch to configure the core switch where the video
surveillance management and operation systems reside. Similarly, using the same command, you can
configure each edge switch where the IP cameras connect.
The switch must be in a factory-default state, to ensure correct operation of the configuration.
The Layer 3 Video Surveillance install script performs the following tasks:
• Creates a Shortest Path Bridging (SPB) network core solution with IP Shortcuts to connect IP subnet
zones between the core and edge IP subnets.
• Configures all network edge IP subnet areas containing IP cameras with an IP gateway address, that
is redistributed over the SPB fabric. This enables the fabric core to act as a single IP routing entity for
the solution.
• Relays DHCP services between each IP subnet area and the central server, for IP camera address
allocation.
• Enables IP multicast over Fabric Connect virtualization, to support and enable efficient IP multicast
communication over the fabric core from IP cameras to central Video Management System (VMS)
servers, for viewing and recording video streams.
Use the range 6–99 for switch values when you run the script on edge or access layer switches. Ensure
that the switch value is unique for each additional switch that is part of the solution.
For example, the first edge or access switch with the IP Cameras connected would use a value of switch
6. For additional edge or access switches, use switch 7, switch 8, and so on, for each IP subnet and IP
camera zone. You can connect up to 48 IP cameras to a switch within an IP subnet zone.
Note
DHCP Relay parameters are configured only when you run the script on VSP4900-48P
switches.
Configuration File
After successful completion of the Layer 3 Video Surveillance install script, the switch saves the
configuration with a filename based on the switch value provided when you ran the script. The switch
updates the primary boot configuration file flags with the new filename.
For example, running the command run vms layer-3 switch 5 results in a switch configuration
filename of spb-switch-5.cfg.
Hardware Considerations
The following list identifies which switches to configure as either a core or edge switch in a VMS
solution:
• Core switch:
◦ VSP 4450GSX-PWR+
Ports 13 to 50 are NNI ports. All other ports are untagged access ports.
◦ VSP4900-12MXU-12XE
Ports 1 to 12 and the Extreme Integrated Application Hosting (IAH) ports are untagged access
ports. Ports 13 to 24, and optional Versatile Interface Module (VIM) ports, are NNI ports.
◦ VSP4900-24S
Ports 1 to 12 are untagged access ports. Ports 13 to 24, and optional VIM ports, are NNI ports.
◦ VSP4900-24XE
Ports 1 to 12 and the IAH ports are untagged access ports. Ports 13 to 24, and optional VIM ports,
are NNI ports.
• Edge switch:
◦ VSP4900-48P
Note
To support this feature, VIM installation is mandatory in VSP4900-48P. The VIM ports
are configured as NNI ports while all fixed ports are untagged access ports.
Modes
The run vms layer-3 command can run in one of two modes:
• Non-verbose mode: This mode is a fully-automated configuration. The command runs the script
with all of the variable defined values without user intervention. This mode is the default mode.
• Verbose mode: This mode prompts you to accept or change the default parameters.
Note
Product Notice: Verbose mode only applies to VSP 4900 Series.
Note
The run vms layer-3 switch command performs the same function as the run
vms endura switch command. The switch supports the run vms endura switch
command only for backward compatibility.
The switch must be in a factory default state; the switch prompts you to confirm this.
Use a switch value of 5 for a switch in the network core where the Video Management System (VMS)
servers connect. Use a switch value of 6 onwards (until and including 99) for all switches that connect IP
Cameras at the network edge/access layer.
For each additional area and switch, increment the switch number by one. For example, use switch 7
for the second edge switch. The configuration uses the number you specify to customize the IP subnet,
loopback addresses, and SPB information.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Run the Layer 3 Video Surveillance install script:
run vms Layer—3 switch <5-99> [syntax | verbose]
Examples
The following example shows the configuration of a switch in the VMS core and shows the configuration
file created by the script.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
The following example shows the configuration of a switch at the edge, and shows the configuration file
created by the script.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Variable Definitions
The following table defines parameters for the run vms Layer-3 switch command.
Variable Value
<5-99> Specifies the numeric switch value used as a common
element to configure switch parameters such as name, VLAN
ID, SPB, and IP parameters.
Note:
Use a switch value of 5 for a switch in the network core
where the Video Management System (VMS) servers are
connected. Use a value of 6 onwards (until and including
99) for all switches used for connecting IP Cameras at the
network edge/access layer.
syntax Species that the switch displays all the commands run by the
script on the console. Use this parameter to see errors that
the script encounters.
Note:
The script does not stop if it encounters errors. To verify that
the script runs without errors, use the syntax parameter to
display errors or conflicting configurations on the switch.
Internet Key Exchange (IKE) protocol creates a Security Association (SA) in IPsec. The SA is the
relationship between two network devices that define attributes such as authentication mechanism,
encryption and hash algorithms, exchange mode, and key length for secured communications. The SA
should be agreed by both devices.
The IKE protocol is based on Internet Security Association and Key Management Protocol (ISAKMP)
which helps in building a secured connection between two or more hosts using the following concepts:
• authentication
• encryption
• key management
• security association (SA)
• policy
IKE uses a key exchange mechanism based on the Diffie-Hellman encryption key exchange protocol.
IKE provides periodic automatic key renegotiation, pre-shared and public key infrastructures, and anti-
replay defense. It is layered on top of the UDP protocol and uses UDP port 500 to exchange information
between peers.
IKE Phases
A switch negotiates with a peer using IKE in two phases.
• In phase 1, the switch negotiates the IKE SA to protect the negotiations that take place in phase
2. The SAs negotiated in phase 1 are bi-directional, and are applicable to traffic originating in both
directions.
• In phase 2, the peers negotiate and establish the SAs for IPsec and session keys through quick
mode. A Diffie-Hellman key exchange is done to achieve perfect forward secrecy, which ensures that
the compromise of a single key does not permit access to data other than that protected by that
compromised key. The SAs in phase 2 are uni-directional. They are used according to the direction of
the traffic. The quick mode is initiated by either of the peer endpoints irrespective of who initiated
phase 1.
IKE Modes
There are two modes of exchanging messages in Phase 1:
• Main mode
This is a secure mode of exchanging messages. It allows protection of the confidentiality of the peers
during negotiation. This mode provides more flexibility in proposals compared to aggressive mode.
As the main mode requires a total of 6 messages to be exchanged between peers, it is more time
consuming.
• Aggressive mode
This mode is less secure than the main mode. It does not protect the confidentiality of the peers.
However, it requires only a total of 3 messages to be exchanged for phase 1, which makes this mode
faster than the main mode. The number of total message exchange is reduced in this mode because
some messages are embedded in other messages.
The mode of message exchange in phase 2 is called quick mode. In this mode a total of 3 messages are
exchanged between the peers. This mode is used to establish IPsec SA. The negotiations in the quick
mode are protected during the phase 1 negotiations in main mode.
IKE Policies
A combination of security parameters used during the IKE SA negotiation is called a policy. The policies
must be configured on both the peers and at least one of the policies should match on both ends to
have a successful negotiation for. If a policy is not configured on both peers or if a policy does not
match on both ends, an SA cannot be setup and data cannot be exchanged.
◦ AES
• Hash function — This function is used as part of the authentication mechanism during the
authentication of peers in phase 1. It is always used with the authentication algorithm. The supported
values are:
◦ MD5
◦ SHA1
◦ SHA256
• Authentication — This process authenticates the peers. Following are the supported authentication
modes:
◦ Digital Signatures — The digital signatures use digital certificate which is signed by the certificate
authority (CA) for authentication.
◦ Pre-shared keys (PSK) — The PSKs are shared out-of-band between the peers before hand.
Using PSK in main mode exchange limits identifying the peer to an IP address (and not host
name).
• Diffe-Hellman (DH) Group — This is an algorithm used by two peers that are unknown to each
other to establish a shared secret key. This key that is decided during phase 1 is used to encrypt
subsequent message exchanges during phase 2 to establish security associations (SA) and security
policies (SP) for IPsec sessions. The supported DH Groups are as follows:
◦ Group 1 (MODP768)
◦ Group 2 (MODP1024)
◦ Group 14 (MODP2048)
• Lifetime — This is a time and data limit agreed by peers to protect an SA from getting compromised.
It ensures that the peers renegotiate the SAs just before the lifetime value expires, that is, when the
time limit is reached.
• Dead-peer detection – This is a process in which the switch waits for a response from peer for a
limited number of seconds before declaring the peer as dead. It is a keep-alive mechanism required
to perform IKE peer fail-over and to reclaim lost resources by freeing up SAs that are no longer in
use.
IKE Authentication
The security gateway of a peer must authenticate the security gateway of the peer it intends to
communicate with. This ensures that IKE SAs are established between the peers. The switch supports
the following two authentication methods:
• Digital certificates (using RSA algorithms)
For digital certificate authentication, the initiator signs the message interchange data using the
private key. The responder uses the public key of the initiator to verify the signature. The public key
is exchanged by messages containing an X.509v3 certificate. This certificate provides an assurance
that the identity of a peer, as represented in the certificate, is associated with a particular public key.
• Pre-shared keys
Pre-shared key authentication, the same secret must be configured on both security gateways
before the gateways can authenticate each other.
Signature Authentication
The switch receives the digital signature of its peer in a message exchange. The switch verifies the
digital signature by using the public key of the peer. The certificate of the peer, received during the IKE
negotiation, contains the public key. To ensure that the peer certificate is valid, the switch verifies its
digital signature by using the certificate authority (CA) public key contained in the root CA certificate.
The switch and its IKE peer require at least one common trusted root CA for authentication to work.
When IKE is configured to use digital certificates for authentication, the certificates are retrieved from
the trusted certificate store in the switch, based on the provided distinguished name. The certificates
received from the peer are verified with the public key.
IKEv2
The software supports IKEv2, which is an enhancement of the IKEv1 protocol. All IKEv2 communications
consist of pairs of messages: a request and a response. The IKEv2 protocol uses a non-reliable transport
protocol (UDP using ports 500). The pairs of exchanges allows ensuring of reliability to the IKEv2
protocol, as there is an expected response for each request.
◦ It improves upon IKEv1's latency by making the initial exchange to be of two round trips of four
messages, and allows the ability to add setup of a child SA on that exchange.
• Improved reliability through the use of sequence numbers, and acknowledgments.
◦ IKEv2 reduces the number of possible error states by making the protocol reliable as all
messages are acknowledged and sequenced.
• IKE SA integrity algorithms are supported only in IKEv2.
• Traffic Selectors are specified in IKEv2 by their own payloads type and not by overloading ID
payloads. This makes the Traffic Selectors more flexible.
• No lifetime negotiations for IKEv2, but in IKEv1 SA lifetimes are negotiated.
The VSP 8600 Series supports IP Security (IPsec) for the AAA server communication. IPsec provides
the ability to secure RADIUS and TACACS+ servers against unwanted traffic by filtering on specific
network adapters, by allowing or blocking specific protocols and enabling the server to selectively allow
traffic from specific source IP addresses.
An AAA server program deals with requests for access to computer resources and
provides authentication, authorization, and accounting (AAA) services. The switch communicates with
AAA servers using Remote Authorization Dial-in User Service (RADIUS) and Terminal Access Controller
Access Control System Plus (TACACS+). It is not sufficient to protect authentication information with
only RADIUS or TACACS+.
The following diagram shows the communication between AAA client and AAA server. The IPsec
module on the client encrypts the packets to the AAA server and decrypts the packets from the AAA
server. Similarly, the IPsec module on the server encrypts or decrypts the packets to or from the client.
To implement secure AAA server communication, the VSP 8600 Series software supports the following:
• IPsec with Internet Key Exchange (IKE) protocol for both IPv4 and IPv6.
• IPv4 implementation of IPsec is mainly for protocols involved in communication with AAA servers,
that is, RADIUS and TACACS+. However, it supports all UDP and TCP protocols.
• Digital signature as authentication method for IKE, in addition to the pre-shared key authentication
method.
• Automatic and manual keying for session establishment. IKE is the default automated key
management protocol for IPsec.
• IKEv1 and IKEv2 protocol.
Restrictions
This section describes the restrictions associated with this feature.
• AAA server protection is provided only for SSH/CLI/web/Telnet/Console Access Protection.
• FQDN (Fully Qualified Domain Names) is not supported to identify endpoints. This is because, the
user configures the IP address for the AAA servers in the switch.
• XAUTH ( 2-factor authentication ) is not supported.
• Domain of Interpretation is not supported other than for IPsec.
• NAT Traversal is not supported.
• Custom IKE messages and vendor ID for the messages are not supported.
Note
Exception: VSP 8600 Series supports IKE on Segmented Management Instance and
RADIUS with IPsec as a DEMO FEATURE.
Procedure
configure terminal
2. Create an IKE phase 1 profile:
ike profile WORD<1–32>
3. Configure the IKE phase 1 profile hash algorithm:
ike profile WORD<1–32> hash-algo <md5|sha|sha256|any>
4. Configure the IKE phase 1 profile encryption algorithm:
ike profile WORD<1–32> encrypt-algo <desCbc|3DesCbc|aesCbc|any>
5. Configure the IKE phase 1 profile Diffie-Hellman group:
ike profile WORD<1–32> dh-group <modp768|modp1024|modp2048|any>
6. Configure the IKE phase 1 encryption key length:
ike profile WORD<1–32> encrypt-key-len <128|192|256>
7. Configure the IKE phase 1 lifetime, in seconds:
ike profile WORD<1–32> lifetime-sec <0-4294967295>
8. (Optional) Delete the IKE Phase 1 profile:
no ike profile WORD<1–32>
Variable Definition
The following table defines parameters for the ike profile commands.
Variable Value
profile WORD<1–32> Specifies the IKE profile name.
hash-algo <md5| Specifies the type of hash algorithm. The default value is sha256. To set this
sha|sha256|any> option to the default value, use the default operator with the command:
default ike profile WORD<1–32> hash-algo
encrypt-algo Specifies the type of encryption algorithm. The default value is aesCbc.
<desCbc|3DesCbc| To set this option to the default value, use the default operator with the
aesCbc|any> command: default ike profile WORD<1–32> encrypt-algo
dh-group <modp768| Specifies the Diffie-Hellman (DH) group. DH groups categorize the key
modp1024|modp2048| used in the key exchange process, by its strength. The key from a higher
any> group number is more secure. The default value is modp2048. To set this
option to the default value, use the default operator with the command:
default ike profile WORD<1–32> dh-group
encrypt-key-len Specifies the length of the encryption key. The default is 256. To set this
<128|192|256> option to the default value, use the default operator with the command:
default ike profile WORD<1–32> encrypt-key-len
lifetime-sec Specifies the lifetime value in seconds. The lifetime ensures that the peers
<0-4294967295> renegotiate the SAs just before the expiry of the lifetime value, to ensure
that Security Associations are not compromised. The default value is
86400 seconds. To set this option to the default value, use the default
operator with the command: default ike profile WORD<1–32>
lifetime-sec
Procedure
configure terminal
2. Create an IKE Phase 1 profile:
ike policy WORD<1–32> laddr WORD<1–256> raddr WORD<1–256>
3. (Optional) Delete the IKE Phase 1 profile:
no ike policy WORD<1-32>
Variable Definition
The following table defines parameters for the ike policy <1–320> laddr command.
Variable Value
policy WORD<1–32> Specifies the name of the IKE Phase 1 policy.
laddr WORD<1–256> Specifies the local IPv4 or IPv6 address.
raddr WORD<1–256> Specifies the remote IPv4 or IPv6 address.
Procedure
configure terminal
2. Configure the profile name to be used for IKE Phase 1 policy:
ike policy WORD<1–32> profile WORD<1–32>
Variable Definition
The following table defines parameters for the ike policy WORD<1–32> profile WORD<1–32>
command.
Variable Value
policy WORD<1–32> Specifies the name of the IKE Phase 1 policy.
profile WORD<1–32> Specifies the name of the IKE Phase 1 profile to be used for the policy.
To set this option to the default value, use the default operator with the
command: default ike policy WORD<1-32> profile
A Diffie-Hellman key exchange is done to achieve perfect forward secrecy. This ensures that the
compromise of even a single key does not permit access to data other than that protected by that key.
Procedure
configure terminal
2. Configure the IKE Phase 2 perfect forward secrecy:
ike policy WORD<1–32> p2–pfs <enable|disable> [use-ike-group <enable|
disable>][dh-group <modp768|modp1024|modp2048|any]
Variable Definition
The following table defines parameters for the ike policy WORD<1–32> p2–pfs command.
Variable Value
policy WORD<1–32> Specifies the name of the IKE Phase 1 policy.
p2–pfs Enables the Phase 2 perfect forward secrecy.
dh-group <modp768| Configures the Diffie-Hellman (DH) group to be used for Phase 2 perfect
modp1024|modp2048| forward secrecy (PFS). The default value is modp2048. To configure this
any> option to the default value, use the default operator with the command:
default ike policy WORD<1–32> p2–pfs dh-group.
Note:
For Federal Information Processing Standards (FIPS) compliance, only the
default value modp2048 is supported.
use-ike-group Specifies whether to use the IKE Phase 1 DH group for Phase 2 PFS or
<enable|disable> not to use it. The default is enable. To set this option to the default value,
use the default operator with the command: default ike policy
WORD<1–32> p2–pfs use-ike-group
As part of the IKE protocol, one security gateway must authenticate another security gateway to make
sure that IKE SAs are established with the intended party. The switch supports two authentication
methods:
• Digital certificates
Configure peer identity name for IKE phase 1 and revocation check method.
• Pre-shared keys
Configure the same secret on both security gateways before the gateways can authenticate each
other.
Procedure
configure terminal
Variable Definitions
The following table defines parameters for the ike policy WORD<1–32> auth-method
command.
Variable Value
pre-shared-key Specifies the authentication method as pre-shared key.
digital- Specifies peer identity name for IKE phase 1.
certificate peer-
name WORD <1-64>
digital- Specifies the revocation check method. To set this option to the default
certificate value, use the default operator with the command: default ike
revocation-check- policy WORD<1–32> revocation-check-method
method<crl|none|
ocsp>
The following table defines parameters for the ike policy WORD<1–32> pre-shared-key
command.
Variable Value
pre-shared-key Specifies the pre-shared key. For Federal Information Processing Standards
WORD<0–32> (FIPS) compliance, the minimum length is 14 characters.
Dead Peer Detection (DPD) timeout is the interval for which the system sends messages to a peer to
confirm its availability.
Procedure
configure terminal
Variable Definition
The following table defines parameters for the ike policy WORD<1–32> dpd-timeout
command.
Variable Value
policy WORD<1–32> Specifies the name of the IKE Phase 1 policy.
dpd-timeout <1– Specifies the dead peer detection timeout in seconds for the IKE Phase 1
4294967295> policy. The default is 300 seconds. To set this option to the default value,
use the default operator with the command: default ike policy
WORD<1–32> dpd-timeout
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable admin state of IKE Phase 1 policy:
ike policy WORD<1–32> enable
3. (Optional) Disable IKE Phase 1 policy:
no ike policy WORD<1–32> enable
Procedure
1. Enter Privileged EXEC mode:
enable
2. Display all IKE profiles:
show ike profile
3. Display a specific ike profile:
show ike profile WORD<1–32>
Example
Switch:1#show ike profile
==========================================================================================
IKE Profile
==========================================================================================
Hash Encrypt Encrypt DH Exchange Lifetime
Variable Definition
The following table defines parameters for the show ike profile command.
Variable Value
profile WORD<1–32> Specifies the name of the profile to be displayed.
Procedure
1. Enter Privileged EXEC mode:
enable
2. Display all IKE policies:
show ike policy
3. Display a specific IKE policy:
show ike policy WORD<1–32>
4. Display a specific IKE policy at local address.
show ike policy WORD<1–32> laddr WORD<1–256>
5. Display a specific IKE policy at remote address.
show ike policy WORD<1–32> laddr WORD<1–256> raddr WORD<1–256>
Example
Switch:1#show ike policy
==========================================================================================
IKE Policy
==========================================================================================
Policy Addr Profile
Name Type Local Address Remote Address Name
------------------------------------------------------------------------------------------
iketest3 IPv4 192.168.152.104 192.168.149.207 test
v1pol IPv4 192.168.152.104 192.168.152.152 ikepro
==========================================================================================
IKE Policy
==========================================================================================
Policy Profile Revocation-Check peer-
identity
Name Version Auth-Method Pre-Shared Key Method
name
-------------------------------------------------------------------------------------------
iketest3 2 digital-cert ocsp
v1pol 1 digital-cert ocsp
==========================================================================================
IKE Policy
==========================================================================================
Policy DPD Admin Oper Use IKE
Name Timeout State State P2 PFS DH Grp DH Group IntfId
------------------------------------------------------------------------------------------
Variable Definition
The following table defines parameters for the show ike policy command.
Variable Value
policy WORD<1–32> Specifies the name of the policy to be displayed.
laddr WORD<1–256> Specifies the local IPv4 or IPv6 address.
raddr WORD<1–256> Specifies the remote IPv4 or IPv6 address.
Procedure
Example
Switch:1(config)#show ike sa version v1
==========================================================================================
IKE V1 Phase 1 Security Association
==========================================================================================
Policy Addr Initiator/
Name Type Local Address Remote Address Responder
------------------------------------------------------------------------------------------
ikepsk IPv4 192.0.2.5 198.51.100.15 Initiator
==========================================================================================
IKE V1 Phase 1 Security Association
==========================================================================================
DPD Hash Encrypt DH Lifetime
Name Timeout Algo Algo Group seconds Status
------------------------------------------------------------------------------------------
ikepsk 300 sha aesCbc modp2048 3600 active
==========================================================================================
IKE V2 Phase 1 Security Association
==========================================================================================
Policy Addr Initiator/
Name Type Local Address Remote Address Responder
------------------------------------------------------------------------------------------
v2policy IPv4 203.0.113.6 198.51.100.20 Responder
==========================================================================================
IKE V2 Phase 1 Security Association
==========================================================================================
DPD Hash Encrypt Integrity DH Lifetime
Name Timeout Algo Algo Algo Group seconds Status
------------------------------------------------------------------------------------------
v2policy 300 sha256 aesCbc modp2048 86400 active
Variable Definition
The following table defines parameters for the show ike sa command.
Variable Value
sa Specifies the IKE security association identifier.
version v1 Specifies the local IPv4 or IPv6 address for IKE Phase 1, version 1 SA.
WORD<1-32> laddr
WORD<1-256> raddr
WORD<1-256>
version v2 Specifies the local IPv4 or IPv6 address for IKE Phase 1, version 2 SA.
WORD<1-32> laddr
WORD<1-256> raddr
WORD<1-256>
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Create an IKEv2-profile:
ike v2-profile WORD<1–32>
3. Configure the IKEv2 profile hash algorithm:
ike v2-profile WORD<1–32> hash-algo <md5|sha|sha256|any>
4. Configure the IKEv2 profile encryption algorithm:
ike v2-profile WORD<1–32> encrypt-algo <desCbc|3DesCbc|aesCbc|any>
5. Configure the IKEv2 profile integrity algorithm
ike v2-profile WORD<1–32> integrity-algo <hmac-md5|hmac-sha|hmac-
sha256|aes-xcbc|any>
Variable Definition
The following table defines parameters for the ike v2–profile commands.
Variable Value
profile WORD<1–32> Specifies the IKE v2–profile name.
hash-algo <md5| Specifies the type of hash algorithm. The default value is sha256. To set this
sha|sha256|any> option to the default value, use the default operator with the command:
default ike v2–profile WORD<1–32> hash-algo
encrypt-algo Specifies the type of encryption algorithm. The default value is aesCbc.
<desCbc|3DesCbc| To set this option to the default value, use the default operator with
aesCbc|any> the command: default ike v2–profile WORD<1–32> encrypt-
algo
integrity-algomd5| Specifies the type of integrity algorithm. The default is sha256. To set this
sha-1|sha-256|aes- option to the default value, use the default operator with the command:
xcbc default ike v2–profile WORD<1–32> integrity-algo
dh-group <modp768| Specifies the Diffie-Hellman (DH) group. DH groups categorize the key
modp1024|modp2048| used in the key exchange process, by its strength. The key from a higher
any> group number is more secure. The default value is modp2048. To set this
option to the default value, use the default operator with the command:
default ike v2–profile WORD<1–32> dh-group
encrypt-key-len Specifies the length of the encryption key. The default is 256. To set this
<128|192|256> option to the default value, use the default operator with the command:
default ike v2–profile WORD<1–32> encrypt-key-len
lifetime-sec Specifies the lifetime value in seconds. The lifetime ensures that the peers
<0-4294967295> renegotiate the SAs just before the expiry of the lifetime value, to ensure
that Security Associations are not compromised. The default value is
86400 seconds. To set this option to the default value, use the default
operator with the command: default ike v2–profile WORD<1–
32> lifetime-sec
Procedure
Example
Switch:1#show ike v2-profile test
==========================================================================================
IKE2 Profile
==========================================================================================
Hash Encrypt
Encrypt Exchange
Name Algo Algo Key
Length Mode
------------------------------------------------------------------------------------------
test sha256 aesCbc
256 main
==========================================================================================
IKE2 Profile
==========================================================================================
DH Integrity
Lifetime
Name Group Algorithm
seconds
------------------------------------------------------------------------------------------
test modp2048 sha256
180
Variable Definitions
The following table defines parameters for the show ike v-2profile command.
Variable Value
WORD<1–32> Specifies the name of the policy.
Use the following procedure to bind a certificate identity to the IKE certificate store.
Procedure
configure terminal
2. Configure the certificate subject name:
ike certificate-identity cert-subject-name WORD<1-45>
Variable Definitions
The following table defines parameters for the ike certificate-identity command.
Variable Value
cert-subject-name WORD<1-45> Specifies the digital certificate subject name to be
used as the identity certificate. If a subject name is
not specified, the default subject name is Global.
1. In the navigation pane, expand Configuration > Security > Control Path.
2. Select IKE.
3. Select Globals tab.
4. In the CertIdentitySubjectName field, enter the digital certificate subject name use as identity
certificate.
Name Description
CertIdentitySubjectName Specifies the digital certificate subject name use
as identity certificate in IKE.
Procedure
1. In the navigation pane, expand Configuration > Security > Control Path.
2. Click IKE.
3. Click the Profile tab.
4. Click Insert.
5. In the Name field, type a profile name.
6. Complete the remaining optional configuration to customize the policy.
7. Click Insert.
Name Description
Name Description
Name Specifies the name of the profile.
HashAlgorithm Specifies the hash algorithms that can be used
during IKE Phase 1 SA negotiation.
The default value is sha256.
EncryptionAlgorithm Specifies the encryption algorithms that can be
used during IKE Phase 1 SA negotiation.
The default value is aesCbc.
EncryptKeyLen Specifies the key length that should be used
during IKE Phase 1 SA negotiation.
The default value is 128.
DHGroup Specifies the Diffie-Hellman groups that can be
used during IKE Phase 1 SA negotiation.
The default value is mod1024.
ExchangeMode Specifies the IKE Phase 1 negotiation mode.
The default value is main.
LifetimeSeconds Specifies the amount of time for which an IKE
Phase 1 SA can remain valid during IKE Phase 1
negotiation. A value of 0 means no the SA always
remains valid.
The default value is 86400 seconds.
Procedure
1. In the navigation pane, expand Configuration > Security > Control Path.
2. Click IKE.
3. Click the V2 Profile tab.
4. Click Insert.
5. In the Name field, type a profile name.
6. Complete the remaining optional configuration to customize the policy.
7. Click Insert.
Name Description
Name Specifies the IKE v2 profile name.
HashAlgorithm Specifies the type of hash algorithm that can
be used during IKE version 2 SA version 2
negotiation.
The default value is sha256.
EncryptionAlgorithm Specifies the encryption algorithms that can
be used during IKE version 2 SA version 2
negotiation.
The default value is aesCbc.
EncryptKeyLen Specifies the type of encryption algorithm. The
default value is keylen–256.
DHGroup Specifies the Diffie-Hellman (DH) group. DH
groups categorize the key used in the key
exchange process, by its strength. The key from
a higher group number is more secure. The default
value is modp2048.
ExchangeMode Specifies the IKE v2 profile negotiation mode.
The default value is main.
LifetimeSeconds Specifies the lifetime value in seconds. The lifetime
ensures that the peers renegotiate the SAs just
before the expiry of the lifetime value, to ensure
that Security Associations are not compromised.
The default value is 86400 seconds.
IntegrityAlgorithm Specifies the type of integrity algorithm.
Procedure
1. In the navigation pane, expand Configuration > Security > Control Path.
2. Click IKE.
3. Click the Policy tab.
4. Click Insert.
5. In the LocalIfIndex field, click either Port or Vlan, and then select an interface.
6. In the LocalAddrType field, select the type of the local address.
7. In the LocalAddr field, type the address of the local peer.
8. In the RemoteAddrType field, select the type of the remote address.
9. In the RemoteAddr field, type the address of the remote peer.
10. In the Name field, type the name for the policy.
Name must be assigned when creating the policy. Once the policy is created, the name cannot be
changed.
Name Description
LocalIfIndex Specifies the Interface Index of the local address.
Only port and vlan interfaces are supported.
LocalAddrType Specifies whether the local address is an IPv4 or
IPv6 address.
LocalAddr Specifies the address of the local peer.
RemoteAddrType Specifies whether the remote address is an IPv4
or IPv6 address.
RemoteAddr Specifies the address of the remote peer.
Name Specifies the name given to the policy. The name
should be assigned while creating the policy.
You cannot change the name after the policy is
created.
ProfileName Specifies the name of the profile that should be
used for this policy.
ProfileVersion Specifies the profile version used for the policy.
PeerName Specifies the peer name.
AuthenticationMethod Specifies the proposed authentication method for
the Phase 1 security association.
The default authentication method is pre-shared
key.
PSKValue Specifies the value of the Pre-Shared Key if the
authentication method is set to PSK.
DPDTimeout Specifies the Dead Peer Detection timeout in
seconds.
Default value is 300 seconds.
P2PFS Specifies whether or not the perfect forward
secrecy (PFS) is used when refreshing keys. To use
PFS, select enable.
The default value is disable.
P2PfsUseIkeGroup Specifies whether or not to use the same GroupId
(Diffie-Hellman Group) for phase 2 as was used in
phase 1. Ignore this entry if P2PFS is disabled.
The default value is enable.
P2PfsDHGroup Specifies the Diffie-Hellman group to use
for phase 2 when P2PFS is enabled and
P2PfsUseIkeGroup is disabled.
The default value is mod1024.
AdminState Specifies whether the policy is administratively
enabled or disabled.
The default value is disable.
Name Description
OperStatus Shows is the policy is operationally up or down.
RevocationCheckMethod Specifies the revocation check method as OCSP,
CRL or none.
Procedure
1. In the navigation pane, expand Configuration > Security > Control Path.
2. Click IKE.
3. Click the SA tab.
Name Description
Id Specifies the profile ID.
LocalIfIndex Specifies the Interface Index of the local address.
Only port and vlan interfaces are supported.
LocalAddrType Specifies whether the local address is an IPv4 or
IPv6 address.
LocalAddr Specifies the address of the local peer.
RemoteAddrType Specifies whether the remote address is an IPv4
or IPv6 address.
RemoteAddr Specifies the address of the remote peer.
Name Specifies the name given to the SA.
AuthenticationMethod Specifies the proposed authentication method for
the Phase 1 security association.
The default authentication method is pre-shared
key.
DPDTimeout Specifies the Dead Peer Detection timeout in
seconds.
HashAlgorithm Specifies the hash algorithm negotiated for this
IKE Phase 1 SA.
EncryptionAlgorithm Specifies the encryption algorithm negotiated for
this IKE Phase 1 SA.
EncryptKeyLen Specifies the encryption key length negotiated for
this IKE Phase 1 SA.
DHGroup Specifies the Diffie-Hellman group negotiated for
this IKE Phase 1 SA.
ExchangeMode Specifies the IKE Phase 1 SA mode.
Name Description
LifetimeSeconds Specifies the amount of time for which an IKE
Phase 1 SA can remain valid during IKE Phase 1
negotiation. A value of 0 means no the SA always
remains valid.
Status Specifies whether the SA is active or inactive.
Initiator Specifies whether specifies the whether the SA is
created by an initiator or a responder.
Procedure
1. In the navigation pane, expand Configuration > Security > Control Path.
2. Click IKE.
3. Click the V2 SA tab.
V2 SA field descriptions
Use the data in the following table to use the IKE > V2 SA tab.
Name Description
Id Specifies the profile ID.
LocalIfIndex Specifies the Interface Index of the local address.
Only port and vlan interfaces are supported.
LocalAddrType Specifies whether the local address is an IPv4 or
IPv6 address.
LocalAddr Specifies the address of the local peer.
RemoteAddrType Specifies whether the remote address is an IPv4
or IPv6 address.
RemoteAddr Specifies the address of the remote peer.
Name Specifies the name given to the SA.
AuthenticationMethod Specifies the proposed authentication method for
theVersion 2 security association.
The default authentication method is pre-shared
key.
DPDTimeout Specifies the Dead Peer Detection timeout in
seconds.
HashAlgorithm Specifies the hash algorithm negotiated for this
IKE Version 2 SA.
EncryptionAlgorithm Specifies the encryption algorithm negotiated for
this IKE Version 2 SA.
EncryptKeyLen Specifies the encryption key length negotiated for
this IKE Version 2 SA.
Name Description
DHGroup Specifies the Diffie-Hellman group negotiated for
this IKE Version 2 SA.
ExchangeMode Specifies the IKE Version 2 SA mode.
LifetimeSeconds Specifies the amount of time for which an IKE
Version 2 SA can remain valid during IKE Version 2
negotiation. A value of 0 means no the SA always
remains valid.
Status Specifies whether the SA is active or inactive.
Initiator Specifies whether specifies the whether the SA is
created by an initiator or a responder.
IntegrityAlgorithm Specifies the type of integrity algorithm.
This section describes how to administer and configure IP Multicast Routing protocols.
The topics in this section provide conceptual background, as well as CLI and EDM configuration
procedures.
IP multicast fundamentals
IP multicast extends the benefits of Layer 2 multicasting on LANs to WANs. Use multicasting techniques
on LANs to help clients and servers find each other. With IP multicast, a source can send information to
multiple destinations in a WAN with a single transmission. IP multicast results in efficiency at the source
and saves a significant amount of bandwidth.
• If you disable the boot flag, you can configure PIM and IGMP Snooping, but you cannot configure
SPB or IS-IS.
Important
• Any change to the spbm-config-mode boot flag requires a reboot for the change to
take effect.
• If you plan to disable the boot flag, remove all SPB configurations first.
• If you plan to use the default (enabled) setting, remove all PIM configurations first.
Simplified Virtual-IST
Simplified Virtual-IST (vIST) is for conventional network deployments that use SMLT and not SPB. The
Simplified vIST feature provides a single CLI command to enable the virtual IST for SMLT deployments.
• Simplified vIST is available ONLY for conventional multicast deployments with PIM and IGMP when
the boot flag (spbm-config-mode) is disabled.
• When the boot flag is enabled (default setting), Simplified vIST is not available. This means that you
continue to configure SPB/IS-IS for vIST.
• Simplified VIST requires that the two vIST devices be directly connected.
Note
• PIM is supported with Simplified vIST only, not SPB vIST. However, you do not have to
configure Simplified vIST to run PIM or IGMP Snooping in a non-SMLT topology.
• Do not configure LACP on SPB NNI MLT links or on the Simplified Virtual IST.
• Do not configure ECMP in PIM Simplified vIST scenarios. Running PIM in a Simplified
vIST environment with ECMP enabled may lead to incorrect behavior since there are
multiple options in terms of choosing the upstream node towards a host or source. For
example, since the path chosen cannot be predicted (it is determined by the downstream
PIM neighbor), we may end up not adding the Virtual IST MLT port in the PIM mroute’s
outgoing port list on the joined interface if the PIM Join Prune Message was received on
an alternative path, different from the interface the local router considers to be the correct
upstream to the source.
Traffic loss can occur in such an environment. Do not enable ECMP in PIM vIST scenarios.
After you disable the spbm-config-mode boot flag, you can configure PIM or IGMP Snooping on any
VLAN including the vIST VLAN.
To configure the boot flag and Simplified vIST, see Configuring IP multicast in SMLT topologies on page
1529 or Configuring multicast on the switch on page 1550.
WARNING: Please do not use virtual IST VLAN IP address for BSR and
RP related configurations, as unicast packets to virtual IST vlan
Overview of IP multicast
IP multicast transmits messages to multiple recipients at the same time. This one-to-many delivery
mechanism is similar to broadcasting, except that multicasting transmits to specific groups and
broadcasting transmits to all receivers on a network. Because IP multicast transmits only one stream of
data to the network where it replicates to many receivers, multicasting saves a considerable amount of
bandwidth.
A distribution tree is a set of multicast routers and subnetworks that permit the members of a group
to receive traffic from a source. The source of the tree depends on the algorithm used by the multicast
protocol. The following diagram is an example of a simple distribution tree where S is the multicast
source and the arrows indicate the multicast broadcast procedure.
The following diagram illustrates how the host prunes routers from the distribution tree. First, the router
sends a message to the source, after which the pruned routers do not receive multicast data.
Multicast host groups and their group members enable the IP multicast router to transmit just to
those groups interested in receiving the traffic. The switch uses the Internet Group Membership
Protocol (IGMP) to learn the existence of host group members on their directly attached subnets. A
router communicates with the hosts on a local network by sending IGMP queries. Hosts respond by
issuing IGMP reports. For more information about host groups, see Multicast host groups and Multicast
addresses on page 1462. For more information about IGMP, see Internet Group Management Protocol.
Multicast traffic forwarding transmits frames to all interfaces or subnets for which it receives IGMP
reports for the multicast group indicated in the destination IP address. Multicast packets forwarded
within the same virtual LAN (VLAN) remain unchanged. The switch does not forward packets to
networks that do not use members of the multicast group indicated in the destination IP address.
• A transient host group exists only as long as members need its services. IP addresses in the
multicast range that are not reserved for permanent groups are available for dynamic assignment to
transient host groups.
A host system on an IP network sends a message to a multicast group by using the IP multicast
address for the group. To receive a message addressed to a multicast group, however, the host must
be a member of the group and must reside on a network where that group is registered with a local
multicast router.
An IP multicast host group can consist of zero or more members and places no restrictions on its
membership. Host members can reside anywhere, they can join and leave the group at any time, and
they can be members of more than one group at the same time.
In general, hosts that are members of the same group reside on different networks. However, a range
of multicast addresses (224.0.0.x) is reserved for locally-scoped groups. All message traffic for these
hosts typically remains on the local network. Hosts that belong to a group in this address range and that
reside in different networks do not receive message traffic for each other.
Important
You can apply a special set of filters (global filters) to multicast packets. You can also create,
deny, or accept filters to configure the sources that can receive and send data. For more
information about how to configure filters, see Traffic filtering fundamentals on page 3394.
Multicast addresses
Each host group uses a unique multicast address. To reach all members of the group, a sender uses the
multicast address as the destination address of the datagram.
An IP version 4 multicast address is a Class D address (the high-order bits are 1110) from 224.0.0.0 to
239.255.255.255. These addresses are assigned statically for use by permanent groups and dynamically
for use by transient groups.
The block of addresses from 224.0.0.1 to 224.0.0.255 is reserved for routing protocols and other
low-level protocols. Multicast routers do not forward datagrams with addresses in this range because
the time-to-live (TTL) value for the packet is usually 1.
Multicast protocols
You can use the following protocols to enable multicast routing on a switch:
• Internet Group Management Protocol (IGMP)—learns the existence of host group members on
directly attached subnets.
• Multicast Router Discovery (MRDISC) protocol—discovers multicast routers in a Layer 2 bridged
domain configured for IGMP snoop.
• Protocol Independent Multicast (PIM)
◦ Sparse Mode (PIM-SM) protocol—suitable for implementation on networks sparsely populated by
receivers.
◦ Source Specific Multicast (PIM-SSM) protocol—uses a one-to-many model where members can
receive traffic from one or more specific sources. This protocol is suitable for television channels
and other content-distribution applications.
To configure static source groups, you must first globally enable PIM. If you disable PIM, the switch saves
all of the configured static source-group entries and deactivates them. After you re-enable PIM, the
switch reactivates the static source groups.
Static source groups ensure that the multicast route (mroute) records remain in the distribution tree.
After receivers join the group, they do not experience a delay in receiving multicast data because they
do not need to graft onto the group, or start a join process in the case of PIM. This timing is essential for
applications where the multicast data must send to a receiver as soon as the receiver joins the group,
for example, when a switch delivers television channels to receivers. After the receiver turns the channel,
which is equivalent to joining a group, the receiver can view the channel immediately.
Static entries result in continuous traffic if the source is active, even if no receivers exist. However, the
system does not forward traffic with a static entry if no receivers exist, but forwards it continuously to
the switch where the entry is programmed and crosses intermediate switches on the path.
You can configure static source-group entries for a specific source or subnet. If several sources on the
same subnet send traffic to the same group, traffic for all these sources flows continuously when using
the subnet configuration.
After you configure static source groups, keep the following points in mind:
• If you disable PIM, the switch deactivates all of the static source groups. After you re-enable PIM, the
switch activates the static source groups.
• In PIM-SM configuration, the static source-group feature works for both specific source addresses
and subnet addresses by using the SrcSubnetMask field.
When the network mask is 255.255.255.255, the full source address is used to match the (S,G) which
is the specific source case. When the network mask field is a subnet mask for the source, only the
source subnet is used to match (S,G)s.
• In PIM-SSM configurations, static source groups have the following limitations:
◦ Subnets: SSM static source groups work only with specific IP addresses. Static source groups
cannot work with source subnets, so the mask must use a full 32-bit mask, 255.255.255.255, and
the source must use a host address.
A host uses IGMP to register group memberships with the local querier router to receive datagrams sent
to this router targeted to a group with a specific IP multicast address.
A router uses IGMP to learn the existence of group members on networks to which it directly attaches.
The router periodically sends a general query message to each of its local networks. A host that is a
member of a multicasting group identifies itself by sending a response.
IGMP queries
When multiple IGMP routers operate on a network, one router is elected to send queries. This elected
querier periodically sends host membership queries (also known as general queries) to the attached
local subnets. The switch supports queries from all three versions of IGMP.
Each query from a router to a host includes a maximum response time field. IGMP inserts a value n into
this field specifying the maximum time in tenths of a second within which the host must issue a reply.
The host uses this value to calculate a random value between 0 and n tenths of a second for the period
that it waits before sending a response. This calculation is true for IGMP versions 2 and 3. For IGMP
version 1, this field is 0 but defaults to a value of 100, that is, 10 seconds.
If at least one host on the local network specifies that it is a member of a group, the router forwards to
that network all datagrams that bear the multicast address for the group.
Upon initialization, the host can immediately issue a report for each of its supported multicast groups.
The router accepts and processes these asynchronous reports the same as requested reports.
After hosts and routers are in a steady state, they communicate in a way that minimizes the exchange
of queries and reports. The designated routers establish a path between the IP multicast stream source
and the end stations and periodically query the end stations about whether to continue participation.
As long as a client continues to participate, all clients, including nonparticipating end stations on the
switch port, receive the IP multicast stream.
Fast leave modifies the IGMP leave processing mechanism on an IGMP interface. After the system
receives an IGMP leave message on a fast leave enabled interface, the switch does not send a group-
specific query and immediately stops sending traffic to the leaving member (IGMP host) port. Without
fast leave, traffic continues to forward until the group times out. This situation wastes bandwidth if no
receiver that requires the group traffic exists.
Fast leave mode provides two options of the fast leave mechanism—single-user mode and multiple-
users mode:
• Single-user mode: In this mode, the port stops receiving traffic immediately after a group member
on that port sends a leave message. Use the single-user mode if each interface port connects to only
one IGMP host.
• Multiple-users mode: Use this mode if the interface port connects to multiple IGMP hosts. In this
case, the port stops receiving traffic after all members leave the IGMP group. The switch removes the
leaving IGMP member and, if more group members exist on that port, the switch continues sending
traffic to the port.
When operating in multiple-users mode, the switch must use the correct membership information.
To support multiple-users mode, multicast receivers on the same interface cannot use IGMP report
suppression. If you must use IGMP report suppression, do not use this mode. Instead, use the LMQI
(configurable in units of 1/10ths of seconds) to provide a faster leave process while still sending
group-specific queries after the interface receives a leave message.
IGMP snoop
The switch provides IP multicast capability and can support all three versions of IGMP to prune group
membership for each port within a VLAN. This feature is IGMP snoop.
Important
IGMP snoop can optimize only local multicast data flow. IGMP snoop does not manage the
forwarding state of the multicast tree. You cannot configure a port as a static receiver in an
IGMP snoop-enabled VLAN that does not contain at least one dynamic receiver port and
forward multicast data.
Use the IGMP snoop feature to optimize the multicast data flow, for a group within a VLAN, to only
those ports that are members of the group. The switch builds a database of group members by listening
to IGMP reports from each port. The switch suppresses the reports heard by not forwarding them to
ports other than the one receiving the report, thus forcing the members to continuously send their
own reports. The switch relays group membership from the hosts to the multicast routers and forwards
queries from multicast routers to all port members of the VLAN. Furthermore, the switch forwards
multicast data only to the participating group members and to the multicast routers within the VLAN.
The multicast routing functionality can coexist with IGMP snoop on the same switch, but you can
configure only one of IGMP snoop or an IP multicast routing protocol, excluding IGMP, on the same
VLAN.
Multicast group trace tracks the data flow path of the multicast streams. Group trace tracks information
such as the multicast group address, the source address, ingress VLAN and port, and egress VLAN and
port.
IGMP proxy
If a switch receives multiple reports for the same multicast group, it does not transmit each report
to the multicast upstream router. Instead, the switch consolidates the reports into a single report and
forwards the one report. If you add another multicast group or the system receives a query since it last
transmitted the report upstream, the system forwards the report onto the multicast router ports. This
feature is IGMP proxy.
IGMP versions
The switch supports IGMPv1, IGMPv2, and IGMPv3. IGMPv1 and IGMPv2 are backward compatible and
can exist together on a multicast network. The following list describes the purpose for each version:
• IGMPv1 provides the support for IP multicast routing. IGMPv1 specifies the mechanism to
communicate IP multicast group membership requests from a host to its locally attached routers.
For more information, see RFC1112.
• IGMPv2 extends the features in IGMPv1 by quickly reporting group membership termination to
the routing protocol. This feature is important for multicast groups with highly volatile group
membership. For more information, see RFC2236.
• IGMPv3 supports the PIM Source Specific Multicast (SSM) protocol, PIM-SM, and snooping. A host
can selectively request or filter traffic from individual sources within a multicast group or from
specific source addresses sent to a particular multicast group. Multicast routing protocols use this
information to avoid delivering multicast packets from specific sources to networks where there are
no interested receivers. For more information, see RFC3376.
For the switch implementation of PIM-SSM, each group can use multiple sources.
The following list identifies group records that a report message includes:
• current-state record
• source-list-change record
• filter-mode-change record
A current-state record is sent by a system in response to a query received on an interface. It reports the
current reception state of that interface, with respect to a single multicast address.
The Record Type of a current-state record has one of the following two values:
• MODE_IS_INCLUDE — Indicates that the interface has a filter mode of include for the specified
multicast address. The source address fields in this group record contain the source list of the
interface for the specified multicast address.
• MODE_IS_EXCLUDE — Indicates that the interface has a filter mode of exclude for the specified
multicast address. The source address fields in this group record contain the source list of the
interface for the specified multicast address.
Source-List Change Record — The system sends a source-list-change record after a change of source
list occurs that does not coincide with a filter-mode change on the interface for a particular multicast
address. The interface on which the change occurs sends a report that includes the record. The record
type of a source-list-change record can be one of the following two values:
• ALLOW_NEW_SOURCES — Indicates that the source address [i] fields in this group record contain
a list of the additional sources that the system wishes to hear from, for packets sent to the specified
multicast address. If the change was to an include source list, these are the addresses that were
added to the list. If the change was to an exclude source list, these are the addresses that were
deleted from the list.
• BLOCK_OLD_SOURCES — Indicates that the source address [i] fields in this group record contain a
list of the sources that the system no longer wishes to hear from, for packets sent to the specified
multicast address. If the change was to an include source list, these are the addresses that were
deleted from the list; if the change was to an exclude source list, these are the addresses that were
added to the list.
If a change of source list results in both allowing new sources and blocking old sources, then two
group records are sent for the same multicast address, one of type ALLOW_NEW_SOURCES and
one of type BLOCK_OLD_SOURCES.
Filter Mode — The switch implements the filter-mode-change record. The system sends a filter-mode-
change record whenever the filter mode changes (during a change from include to exclude, or from
exclude to include) for a particular multicast address. The interface on which the change occurs sends
a report that includes the record. The record type of a filter-mode-change record can be one of the
following two values:
• CHANGE_TO_INCLUDE_MODE — Indicates that the interface has changed to include filter mode for
the specified multicast address. The source address [i] fields in this group record contain the new
source list of the interface for the specified multicast address.
• CHANGE_TO_EXCLUDE_MODE — Indicates that the interface has changed to exclude filter mode
for the specified multicast address. The source address [i] fields in this group record contain the new
source list of the interface for the specified multicast address.
IGMP states
Multicast routers implementing IGMPv3 keep one state for each group for every port in every attached
network. This group state consists of a filter-mode, a list of sources, and various timers. For each
attached network running IGMP, a multicast router records the desired reception state for that network.
This state consists of a set of records of the following form:
• multicast address
• group timer
• filter mode (source records)
Each source record is of the form source address or source timer. If all sources within a given group are
desired, an empty source record list is kept with filter-mode set to EXCLUDE. This means hosts on this
network want all sources for this group to be forwarded. This is the IGMPv3 equivalent to a IGMPv1 or
IGMPv2 group join.
Group timer
A group timer represents the time for the filter-mode to expire and switch to INCLUDE mode and is
used only when a group is in EXCLUDE mode.
Group timers are updated according to the types of group records received. If a group timer is expiring
when a router filter-mode for the group is EXCLUDE means, there are no listeners on the attached
network in EXCLUDE mode. At this point, a router will transition to INCLUDE filter-mode.
Source timer
A source timer is maintained for every source record. Source timers are updated according to:
• the type and filter-mode of the group record received
• whenever the source is present in a received record for that group.
If a source timer expires with a router filter-mode for the group of INCLUDE, the router concludes
that traffic from this particular source is no longer desired on the attached network, and deletes the
associated source record.
If a source record has a running timer with a router filter-mode for the group of EXCLUDE, it means that
at least one system desires the source. It should therefore be forwarded by a router on the network. If a
source timer expires with a router filter-mode for the group of EXCLUDE, the router informs the routing
protocol that there is no receiver on the network interested in traffic from this source. The records are
deleted when the group timer expires in the EXCLUDE router filter-mode.
Note
In order to accept v2 messages, you must enable the compatibility mode on the IGMPv3
interface.
The following table describes the forwarding suggestions that IGMPv3 makes to the routing protocol.
The table also identifies the action taken after the source timer expires, based on the filter mode of the
group.
The members that are in the exclude mode are on hold on the reporter list under the port data. By
default, IGMPv3 explicit host tracking is disabled.
Important
If explicit host tracking is enabled, you cannot downgrade the IGMPv3 interface to IGMPv1 or
IGMPv2.
When a LEAVE message is received, you must check if the member that sent this message is the last
reporter for the group. If it is the last reporter, switch to INCLUDE mode if sources are available (if no
sources are available the port is deleted). Else, delete the member. No group and source specific queries
or group specific queries are sent.
Important
To use the IGMPv3 fast leave feature, you must first enable the explicit host tracking feature.
The synchronization of IGMPv3 members and their advertised sources is different from IGMPv1 and
IGMPv2. Because of IGMPv3 compatibility mode, you must consider the IGMP member version. If you
have version 1 or 2 members, you must synchronize the IGMP information as IGMPv1 or IGMPv2 reports,
so the peer can build an accurate database. In particular, if members with version 1 or 2 exist, the group
filter mode is exclude and the exclude source list is empty. Also no v1 or v2 member will be present on
any source from include list.
Each member sends IGMP reports in the same manner for all IGMP versions. The sending mechanism
depends on the SMLT state.
After a vIST peer receives an IGMPv3 report over an SMLT link, it must pass the message to its peer. If
the SMLT state is up, the vIST peer sends the message encapsulated in an vIST IGMPv3 message. If the
SMLT state is down, the vIST peer sends the message as a plain IGMPv3 report.
In both cases the IGMPv3 message is not altered and the receiving vIST peer processes it as expected in
SMLT conditions (translating the receiving port to SMLT port if applicable).
Note
If you enable compatibility mode and the member sends an IGMPv1 or IGMPv2 report, the
message is either a vIST IGMPv1 or v2 encapsulated Message or a plain IGMPv1 or IGMPv2
report.
After SMLT up or down events occur, the vIST peer must synchronize its IGMPv3 database to its peer,
taking into account the new state of the SMLT link.
If you enable IGMP explicit host tracking, each include source stores information for each member that
advertises that particular source in an include list. This information is synchronized with the vIST peer.
If you do not enable explicit host tracking, each source from include list contains only information
related to the last member that sent an IGMPv3 report. Only this information is synchronized with the
vIST peer.
Backward compatibility
IGMPv3 for PIM-SSM is backward compatible with IGMPv2. You can configure the switch to operate
in v3-only mode or in v2-v3 compatibility mode. If you configure the switch to use v3-only mode, it
ignores all v2 and v1 messages except the query message.
If you configure the switch to operate in v2-v3 compatibility mode, the switch supports all IGMPv1, v2,
and v3 messages. The switch parses the group address of the messages. If the group address is out of
SSM range and it is a v3 message, the switch drops the message; if it is a v2 message, PIM-SM or IGMP
snoop processes handle the message.
After the switch receives an IGMPv2 leave message and the group address in it is within SSM range, the
switch sends the group-and-source specific query. If the group address is not within the SSM range, the
switch sends the group specific query.
According to RFC3376, the multicast router with IGMPv3 can use one of two methods to handle older
query messages:
• If an older version of IGMP is present on the router, the querier must use the lowest version of IGMP
present on the network.
• If a router that is not explicitly configured to use IGMPv1 or IGMPv2 hears an IGMPv1 query or
IGMPv2 general query, it logs a rate-limited warning.
You can configure if the switch dynamically downgrades the version of IGMP to handle older query
messages. If the switch downgrades, the host with IGMPv3 only capability does not work. If you do not
configure the switch to downgrade the version of IGMP, the switch logs a warning.
In v2-v3 compatibility mode, an IGMPv2 host can only join if you configure a static entry in SSM map
and if the interface operates in PIM-SSM mode or IGMP SSM-Snoop mode.
You can use the compatibility mode with Split MultiLink Trunking (SMLT). One core switch sends an
SMLT message to the other core switch after it receives an IGMPv3 message. This action synchronizes
the IGMP host information.
Implementation of IGMP
You can enable and disable multicast routing on an interface basis. If you disable multicast routing on
an interface, the interface does not generate IGMP queries. If the switch or interface is in IGMP router
behavior mode, for example, PIM enabled, you cannot configure IGMP snoop. The switch still learns the
group membership and snoops multicast receivers on the switch VLAN or ports.
Overview
In a multicast network, if you only need to use Layer 2 switching for the multicast traffic, you do not
need multicast routing. However, you must have an IGMP querier on the network for multicast traffic to
flow from sources to receivers. A multicast router provides the IGMP querier function. You can also use
the IGMP Layer 2 Querier feature to provide a querier on a Layer 2 network without a multicast router.
The Layer 2 querier function originates queries for multicast receivers, and processes the responses
accordingly. On the connected Layer 2 VLANs, IGMP snoop continues to provide services as normal.
IGMP snoop responds to queries and identifies receivers for the multicast traffic.
You must enable Layer 2 querier and configure an IP address for the querier before it can originate IGMP
query messages. If a multicast router exists on the network, the switch automatically disables the Layer
2 querier.
In a Layer 2 multicast network, enable Layer 2 querier on only one of the switches in the VLAN. A Layer
2 multicast domain supports only one Layer 2 querier. No querier election exists.
IGMP Snooping
IGMP Snooping enables Layer 2 switches in the network to examine IGMP control protocol packets
exchanged between downstream hosts and upstream routers.
When Layer 2 switches examine the IGMP control protocol packets, they:
• Generate the Layer 2 MAC forwarding tables used for further switching sessions
• Regulate the multicast traffic to prevent it from flooding the Layer 2 segment of the network
IGMP Layer 2 Querier can assume one of two roles for each of the attached networks:
• Querier
• Non-Querier
After you enable IGMP Layer 2 Querier, the system assumes it is a multicast router, so it sends the
General Query, Group Specific/Group, and Source Specific Query when Leave/BLOCK messages are
received. IGMP queries are required to maintain an IGMP group.
Note
Group Specific When Leave does not apply to IGMPv1.
The following limitations apply when you configure IGMP Layer 2 Querier on DvR enabled nodes.
• You can configure IGMP Layer 2 Querier only on the DvR Controllers in a DvR domain. When you
configure the following parameters on the Controllers, the configuration is automatically pushed to
the DvR Leaf nodes within the domain.
◦ IGMP version
◦ IGMP query interval
◦ IGMP query maximum response time
◦ IGMP robustness value
◦ IGMP last member query interval
◦ IGMP compatibility mode
• You cannot configure IGMP snooping on DvR enabled Layer 2 VSNs.
For more information on DvR, see Distributed Virtual Routing Fundamentals on page 690 .
You can use this feature to restrict access to certain multicast streams and to protect multicast
streams from spoofing (injecting data to the existing streams). For example, in a television distribution
application, instead of applying a filter to each channel (multicast group), you can apply a multicast
access policy to a range of channels (groups), thereby reducing the total number of filters and providing
a more efficient and scalable configuration. Also, if you want to add or remove television channels from
a package, you can modify the multicast access policy; you do not need to change filters for individual
VLANs or ports. Multicast access policies contain an ID and a name (for example, PremiumChannels),
the list of IP multicast addresses, and the subnet mask.
Multicast access control is not a regular filtering configuration. Multicast access control is for multicast
streams and relies on handling multicast control and initial data to prevent hosts from sending or
receiving specified multicast streams; it does not use filters. Also, multicast access control provides a
list of multicast groups in one configuration using the same routing policy prefix list configuration. For
information about prefix lists, see Configuring prefix lists on page 2911. You can configure multicast
access control and change it dynamically to support changes in the configuration without restarting the
protocol. You can change the access capabilities of a user or service subscriber without loss of service.
The local cable television company offers three packages; each one includes 35 channels (35 multicast
groups). The company configures each package in an access control policy. This policy applies to a
set of VLANs or ports to prevent users from viewing the channels on those VLANs. Use the same
policy to prevent users from sending traffic to those groups (also known as spoofing) by specifying
the deny-tx option for that port. After you define the packages, you can use them for access policy
configuration. You can easily change the package by changing the group range, without changing all
the port configurations.
The multicast access control functionality applies to an IP multicast application where you must control
user access. You can use it in financial-type applications and other enterprise applications, such as
multicast-based video conferencing.
The tx policies control the sender and ingress interface for a group; the rx policies control the receivers
and egress interface for a group.
deny-tx
Use the deny-tx access policy to prevent a matching source from sending multicast traffic to the
matching group on the interface where you configure the deny-tx access policy. Configure this policy on
the ingress interface to the multicast source. The deny-tx access policy performs the opposite function
of the allow-only-tx access policy. Therefore, the deny-tx access policy and the allow-only-tx access
policy cannot exist on the same interface at the same time.
For example, in Figure 138, a VLAN 1, the ingress VLAN, uses a deny-tx access policy. This policy
prevents multicast traffic sent by Sender from forwarding from VLAN 1 to a receiver, consequently
preventing Receiver 1 and Receiver 2 from receiving data from the multicast group. You can create
receive-only VLANs, such as VLAN 1, with the deny-tx policy.
deny-rx
Use the deny-rx access policy to prevent a matching group from receiving IGMP reports from the
matching receiver on the interface where you configure the deny-rx access policy. The deny-rx access
policy performs the opposite function of the allow-only-rx access policy. Therefore, the deny-rx access
policy and the allow-only-rx access policy cannot exist on the same interface at the same time.
For example, in Figure 139, a VLAN 2 uses a deny-rx access policy, preventing IGMP reports sent by
Receiver 1 from receiving on VLAN 2. You can deny a multicast group access to a specific VLAN or
receiver using the deny-rx policy.
deny-both
Use the deny-both access policy to prevent a matching IP address from both sending multicast traffic
to, and receiving IGMP reports from, a matching receiver on an interface where you configure the
deny-both policy. You can use this policy to eliminate all multicast activity for a receiver or source
in a specific multicast group. The deny-both access policy performs the opposite function of the
allow-only-both access policy. Therefore, the deny-both access policy and the allow-only-both access
policy cannot exist on the same interface at the same time.
For example, in Figure 140, a VLAN 2 uses a deny-both access policy, preventing VLAN 2 from receiving
IGMP reports sent by Receiver 2, and preventing multicast traffic sent by Sender 2 from forwarding
from VLAN 2. You can prevent certain VLANs from participating in an activity involving the specified
multicast groups with the deny-both policy.
allow-only-tx
Use the allow-only-tx policy to allow only the matching source to send multicast traffic to the matching
group on the interface where you configure the allow-only-tx policy. The interface discards all other
multicast data it receives. The allow-only-tx access policy performs the opposite function of the deny-tx
access policy. Therefore, the allow-only-tx access policy and the deny-tx access policy cannot exist on
the same interface at the same time.
allow-only-rx
Use the allow-only-rx policy to allow only the matching group to receive IGMP reports from the
matching receiver on the interface where you configure the allow-only-rx access policy. The interface
discards all other multicast data it receives. The allow-only-rx access policy performs the opposite
function of the deny-rx access policy. Therefore, the allow-only-rx access policy and the deny-rx access
policy cannot exist on the same interface at the same time.
allow-only-both
Use the allow-only-both policy to allow only the matching IP address to both send multicast traffic
to, and receive IGMP reports from, the matching receiver on the interface where you configure the
allow-only-both access policy. The interface discards all other multicast data and IGMP reports. The
allow-only-both access policy performs the opposite function of the deny-both access policy. Therefore,
the allow-only-both access policy and the deny-both access policy cannot exist on the same interface at
the same time.
You can use the host subnet mask to restrict access to a portion of the host network. For example, if you
configure the host subnet mask as 255.255.255.255, you use the full host address. To restrict access to a
portion of the network of a host, use a subnet mask such as 255.255.255.0. Access control applies to the
specified subnet only.
Use multicast stream limitation in an environment where you want to limit users to a certain number
of multicast streams simultaneously. For example, a television service provider can limit the number
of television channels a user can watch at a time. (To a television service provider, a multicast stream
is synonymous with a television channel.) If a user purchases a service contract for two single-tuner
television receivers, they can use two channels flowing at the same time, but not a third. The service
provider can control the bandwidth usage in addition to preventing users from watching more than the
allowed number of channels at a point in time.
You can enable the multicast stream limitation feature on the switch by using one of the following
methods:
• for each interface—This limitation controls the total number of streams for all clients on this brouter
port.
• for each VLAN—This limitation controls the total number of streams for all clients on this VLAN. This
method is equivalent to the interface stream limitation.
• for each VLAN port—This limitation controls the number of streams for all clients on this VLAN port.
This method is equivalent to the interface port stream limitation.
You can configure the maximum number of streams for each limit independently. After the number
of streams meets the limit, the interface drops additional join reports for new streams. The maximum
number of streams for each limit is 65535 and the default is 4.
IGMP multicast router discovery consists of three message types that discover multicast routers on the
network:
• Multicast router advertisements: routers advertise that IP multicast forwarding is enabled on an
interface.
• Multicast router solicitations: routers solicit a response of multicast router advertisements from all
multicast routers on a subnet.
• Multicast router termination messages: a router terminates its multicast routing functions.
Multicast routers send multicast router advertisements periodically on all interfaces where you enable
multicast forwarding. Multicast routers also send advertisements in response to multicast router
solicitations.
Multicast router solicitations transmit to the IGMP-MRDISC all-routers multicast group that uses a
multicast address of 224.0.0.2. Multicast router solicitations do not transmit if a router needs to discover
multicast routers on a directly attached subnet.
Multicast router termination messages transmit after a router terminates its multicast routing functions.
Other non-IP forwarding devices, such as Layer 2 switches, can send multicast router solicitations to
solicit multicast router advertisements.
To function MRDISC on IGMP snoop interface, you must explicitly enable MRDISC. The Solicitation
messages are sent only if IGMP snoop and MRDISC are enabled on the switch.
The switch enables this feature by default and you can not change the configuration.
Traffic distribution
Traffic distribution distributes the streams on the multilink trunk links if an MLT configuration change
occurs. For example, you can add or delete ports.
This feature distributes active streams according to the distribution algorithm on the multilink trunk
links. This distribution can cause minor traffic interruptions. To minimize the effect of distribution
of multicast traffic on the multilink trunks, the implementation does not move the streams to the
appropriate links at the same time. Instead, it distributes a few streams at every time tick of the system.
To that end, after a multilink trunk port becomes inactive, this feature distributes all the streams on the
multilink trunk ports based on the assignment provided by the distribution algorithm.
By default, distribution is enabled and you can not change the configuration.
For more information about MLT, see MultiLink Trunking on page 2360 .
Multicast virtualization
Multicast provides simplified extension of internal video and data delivery to remote locations.
Virtualized multicast enables multiple VPN routing instances on devices and supports various unicast
routing protocols so that you can provide the services of many virtual routers from one physical device.
You can configure multicast routing support with the Virtual Routing and Forwarding (VRF) Lite feature
and you can use VRF Lite to emulate many virtual routers with one router.
1. Create a VRF. For more information about how to create and configure a VRF, see Create a VRF
Instance on page 3839.
2. Create a VLAN and associate it with the VRF.
3. Enable one of the following: IGMP snooping on the VLAN, Layer 2 VSN, or Layer 3 VSN.
If you use IGMP snooping on the VLAN, ensure the IGMP version on the multicast hosts or other
network devices is either the same as the version on the VLAN, or enable compatibility mode.
Multicast virtualization does not support PIM. The switch supports IGMP with PIM only in the Global
Router.
While forwarding and routing instances are mapped to IP interfaces, incoming traffic is classified into a
VLAN and IP interface and, depending on the IP interface, routed context traffic is forwarded.
Note
PIM is supported in Global Routing Table (GRT) only.
PIM-SM, as defined in RFC2362, supports multicast groups spread out across large areas of a company
or the Internet. PIM-SM sends multicast traffic only to routers that specifically join a multicast group.
This technique reduces traffic flow over WAN links and overhead costs for processing unwanted
multicast packets.
PIM-SM is independent of a specific unicast routing protocol, but it does require the presence of
a unicast routing protocol, such as Routing Information Protocol (RIP) or Open Shortest Path First
(OSPF). PIM-SM uses the information from the unicast routing table to create and maintain multicast
trees that enable PIM-enabled routers to communicate.
Typically, a PIM-SM network consists of several multipoint data streams, each targeted to a small
number of LANs in the internetwork. For example, customers whose networks consist of multiple
hosts on different LANs can use PIM-SM to simultaneously access a video data stream, such as video
conferencing, on a different subnet.
Important
In some cases, PIM stream initialization can take several seconds.
Hosts
A host is a source, a receiver, or both:
• A source, also known as a sender, sends multicast data to a multicast group.
• A receiver receives multicast data from one or several sources that sends data to a multicast group.
PIM-SM domain
PIM-SM operates in a domain of contiguous routers on which PIM-SM is enabled.
Although a PIM-SM domain can use only one active RP router and one active BSR, you can configure
additional routers as a candidate RP (C-RP) router and as a candidate BSR (C-BSR). Candidate routers
provide backup protection in case the primary RP router or BSR fails.
As a redundancy option, you can configure several RPs for the same group in a PIM domain. As a load
sharing option, you can have several RPs in a PIM-SM domain map to different groups. The switch
devices use the hash function defined in the PIM-SM standard to elect the active RP.
Designated router
The designated router (DR), the router with the highest IP address on a LAN, performs the following
tasks:
• sends register messages to the RP router on behalf of directly connected sources
• sends join and prune messages to the RP router on behalf of directly connected receivers
• maintains information about the status of the active RP router for local sources in each multicast
group
Important
The DR is not a required configuration. Switches act automatically as the DR for directly
attached sources and receivers.
At the RP router, receivers meet new sources. Sources use the RP to identify themselves to other
routers on the network; receivers use the RP to learn about new sources.
You can configure a set of routers as C-RP routers that serve as backup to the RP router. If an RP
fails, all the routers in the domain apply the same algorithm to elect a new RP from the group of C-RP
routers. To make sure that the routers use a complete list of C-RP routers, the C-RP router periodically
sends unicast advertisement messages to the BSR. The most common implementation is to configure a
PIM-SM router as both a C-RP router and a C-BSR.
The switch devices use the hash function defined in the PIM-SM standard to elect the active RP.
You can configure a static entry for an RP router with static RP. This feature avoids the process of
selecting an active RP from the list of candidate RPs and dynamically learning about RPs through the
BSR mechanism. Static RP-enabled switches cannot learn about RPs through the BSR because the
switch loses all dynamically learned BSR information and ignores BSR messages. After you configure
static RP entries, the switch adds them to the RP set as if they were learned through the BSR.
Important
In a PIM domain with both static and dynamic RP switches, the static RP switches cannot use
a local interface configured as an RP.
When you configure a PIM static RP in a switch, the next hop of the unicast route toward the PIM static
RP must be a PIM neighbor. The PIM protocol fails to work, due to a route change, if the next hop
toward an already configured static RP becomes a non-PIM neighbor. If a PIM neighbor cannot reach
the configured RP, the RP does not activate and its state remains invalid.
A static RP-enabled switch can communicate with switches from other vendors that do not use the BSR
mechanism. Some vendors use either early implementations of PIM-SM v1 that do not support the BSR
or proprietary mechanisms like the Cisco Auto-RP. For a network to work properly with static RP, you
must map all the switches in the network (including switches from other vendors) to the same RP or
RPs, if several RPs exist in the network.
To avoid a single point of failure, you can also configure redundant static RPs.
Use the static RP feature when you do not need dynamic learning mode, typically in small networks, or
for security reasons, where RPs are forced to devices in the network so that they do not learn other RPs.
Before you can configure a static RP, you must enable PIM-SM and enable static RP.
After you meet these prerequisites, keep in mind the following configuration considerations:
• You cannot configure a static RP-enabled switch as a BSR or as a C-RP router.
• All dynamically learned BSR information is lost. However, if you disable static RP, the switch loses the
static RP information and regains the BSR functionality.
• Static RPs do not age, that is, they cannot time out.
• Switches do not advertise static RPs, so, if a new PIM neighbor joins the network, it does not know
about the static RP unless you configure it with that static RP.
• Configure all the switches in the network (including switches from other vendors) to map to the
same RP.
• In a PIM domain with both static and dynamic RP switches, the static RP switches cannot use a local
interfaces configured as an RP.
• To avoid a single point of failure, you can configure redundant static RPs for the same group prefix. If
you use a mix of vendor switches across the network, you must ensure that all switches and routers
use the same active RP because other vendors can use different algorithms to elect the active RP.
The switch devices use the hash function defined in the PIM-SM standard to elect the active RP;
other vendors can use the lowest IP address to elect the RP.
Important
To reduce convergence times, create only one static RP for each group. The more static
RPs you configure for redundancy, the more time PIM requires to rebuild the mroute table
and associate RPs.
• Static RP configured on the switch is active as long as the switch uses a unicast route to the static
RP network. If the switch loses this route, the static RP is invalidated and the hash algorithm remaps
all affected groups. If the switch regains this route, the static RP is validated and the hash algorithm
remaps the affected groups.
Bootstrap router
The BSR receives RP router advertisement messages from the candidate RPs. The BSR adds the RP
router with its group prefix to the RP set. Only one BSR exists for each PIM-SM domain.
The BSR periodically sends bootstrap messages containing the complete RP set to all routers in the
domain. The BSR ensures that all PIM-SM routers send join, prune, and register packets.
Within a PIM-SM domain, you can configure a small set of routers as C-BSRs. The C-BSR with the
highest configured priority becomes the BSR for the domain. If two C-BSRs use equal priority, the
candidate with the higher IP address becomes the BSR. If you add a new C-BSR with a higher priority to
the domain, it automatically becomes the new BSR.
Important
Configure C-BSRs on routers that are central to all candidate RPs.
Shared trees
Group members in a PIM-SM domain receive the first packet of data from sources across a shared tree.
A shared tree consists of a set of paths that connect all members of a multicast group to the RP. PIM
creates a shared tree when sources and receivers send messages toward the RP.
Shortest-path trees
After receiving a certain number of packets from the RP, the DR changes from a shared tree to an SPT.
Switching to an SPT creates a direct route between the receiver and the source. The switch changes to
the SPT after it receives the first packet from the RP.
1. A receiver multicasts an IGMP host membership message to the group that it wants to join.
2. After the last-hop router (the DR), normally the PIM router with the highest IP address for that
VLAN, receives the IGMP message for a new group join, the router looks up the associated elected
RP with responsibility for the group.
3. After it determines the RP router for the group, the last-hop router creates a (*,G) route entry in
the multicast forwarding table and sends a (*,G) join message to the RP. After the last-hop router
receives data packets from the RP, if the multicast packet arrival rate exceeds the DR threshold, the
last-hop router switches to the SPT by sending an (S,G) join message to the source. (S denotes the
source unicast IP address, and G denotes the multicast group address.)
4. If the last-hop router switches to the SPT, the following actions occur:
• All intermediate PIM routers along the path to the source create the (S,G) entry.
• To trim the shared tree, the router sends an (S,G) prune message to the RP.
You can enable the PIM Infinite Threshold Policy feature to prevent the SPT switchover. Multicast traffic
follows the shared tree path through a Rendezvous Point (RP) instead of switching over to SPT.
Note
PIM Infinite Threshold Policy for IPv4 and IPv6 is not supported on VSP 8600 Series or
XA1400 Series.
When the system ages PIM mroutes, it does not clear the (S,G) entry for an inactive route immediately
after the expiration period. Topology and hardware conditions can affect the polling interval and cause
an inactive route to remain for up to 12-15 minutes.
1. A source directly attached to a VLAN bridges the multicast data to the DR. The DR for the VLAN
(the router with the highest IP address) encapsulates each packet in a register message and sends a
unicast message directly to the RP router to distribute to the multicast group.
2. If a downstream group member chooses to receive multicast traffic, the RP router sends a join or
prune message toward the source DR and forwards the data down the RP tree after it obtains the
data natively.
3. After the receiver DR obtains the first packet, it switches to the shortest-path tree (SPT) and
continues receiving data through the SPT path.
4. If no downstream members want to receive multicast traffic, the RP router sends a register-stop
message (for the source) to the DR.
The DR starts the register suppression timer after it receives the first register-stop message. During
the register suppression timeout period (the default is 60 seconds), the following events occur:
• The DR for the source sends a probe packet to the RP router before the register suppression
timer expires. The probe packet prompts the RP router to determine whether new downstream
receivers joined the group.
• If no new receivers joined the group, the RP router sends another register-stop message to the
DR for the source, and its register suppression timer restarts.
• After the RP router no longer responds with a register-stop message to the source DR probe
message, the register suppression timer expires and the DR sends encapsulated multicast
packets to the RP router. The RP router uses this method to tell the DR that new members
joined the group.
The RP sends a register-stop message to the DR immediately after it receives the first multicast data
packet.
Important
Figure 142 on page 1486 is a simplified example and is not the best design for a network if
you locate the source and receiver as shown. In general, place RPs as close as possible to
sources.
The DR stops sending encapsulated packets to the RP after it receives a register-stop message. This
traffic stops without delay because the RP sends a register-stop message immediately after it receives
the first multicast data packet, and joins the shortest-path tree.
PIM-SMLT
IP multicast routing support with Split MultiLink Trunking (SMLT) builds a virtual switch that represents
the two switches of the split multilink trunk core.
When switches use PIM in the core, they need to exchange protocol-related updates as part of the
interswitch trunking (IST) protocol. IST hides the fact that the edge switch attaches to two physical
switches.
PIM-SMLT can work in triangular, square, and full mesh configurations with Layer 3 IP multicast.
However, PIM-SSM in square or full mesh SMLT topologies is not supported.
first shutting down the port, it can lead to excessive hardware updates to multicast forwarding
records and can result in high utilization of the CPU.
Note
In a scaled PIM over Simplified vIST deployment, disabling all the PIM interfaces (no ip
routing) causes the VLACP ports to bounce. With no user intervention, the packets start
getting processed again in approximately 10 seconds. VLACP enables the ports and full
functionality is restored.
SMLT provides for fast failover in all cases, but does not provide a functionality similar to Routed SMLT
(RSMLT).
Important
You must enable square SMLT globally before you configure square or full-mesh
configurations.
PIM uses a DR to forward data to receivers on a VLAN. If you restart the DR in an SMLT VLAN, you can
lose data because of the following actions:
• If the DR is down, the non-DR switch assumes the role and starts forwarding data.
• After the DR comes back up, it takes priority (higher IP address) to forward data so the non-DR
switch stops forwarding data.
• The DR is not ready to forward traffic due to protocol convergence and because it takes time to
learn the RP set and create the forwarding path. This situation can result in a traffic delay of 2 to 3
minutes because the DR learns the RP set after Open Shortest Path First (OSPF) converges.
A workaround to this delay is to a configure the static RP router on the peer SMLT switches. This feature
avoids the process of selecting an active RP router from the list of candidate RPs and dynamically
learning about RPs through the BSR mechanism. After the DR comes back up, traffic resumes as soon
as OSPF converges. This workaround reduces the traffic delay to approximately 15 to 65 seconds.
Note
PIM is supported in Global Routing Table (GRT) only.
Source Specific Multicast optimizes PIM-SM by simplifying the many-to-many model. Because most
multicast applications distribute content to a group in one direction, SSM uses a one-to-many model
that uses only a subset of the PIM-SM features. This model is more efficient and reduces the load on
multicast routing devices.
SSM only builds source-based SPTs. Whereas PIM-SM always joins a shared tree first, and then switches
to the source tree, SSM eliminates the need to start with a shared tree by immediately joining a source
through the SPT. SSM avoids using an RP and RP-based shared trees, which can be a potential problem.
Until now only one channel for one group was allowed to exist in ssm map. From now on multiple
channels for the members of the SSM group are allowed to be configured in this map.
This configuration is ideal for applications like television channel distribution and other content-
distribution businesses. Banking and trade applications can also use SSM as it provides more control
over the hosts receiving and sending data over their networks.
When a v2 report in SSM range is received it is translated to an igmpv3 report message with one
group record with type ALLOW and the source lists copied from the igmp ssm map static entries and
passed to igmpv3 module. When a v2 leave in SSM range is received it is translated to an igmpv3 report
message with one group record with type BLOCK and the source lists copied from the igmp ssm map
static entries and passed to igmpv3 module. This behaviour is displayed only when PIM-SSM mode is
enabled.
SSM applications use IP addresses reserved by the Internet Assigned Numbers Authority (IANA) in
the 232/8 range (232.0.0.0 to 232.255.255.255). SSM recognizes packets in this range and controls the
behavior of multicast routing devices and hosts that use these addresses. When a source (S) transmits
IP datagrams to an SSM destination address (G), a receiver can receive these datagrams by subscribing
to the (S,G) channel.
A channel is a source-group (S,G) pair where S is the source that sends to the multicast group and
G is an SSM group address. SSM defines channels on an individual or multiple source basis, which
enforces the one-to-many concept of SSM applications. In an SSM channel, each group is associated
with multiple sources.
SSM features
PIM-SM requires a unicast protocol to forward multicast traffic within the network to perform the
Reverse Path Forwarding (RPF) check. PIM-SM uses the information from the unicast routing table
to create and maintain the shared and shortest multicast tree that PIM-enabled routers use to
communicate. The unicast routing table must contain a route to every multicast source in the network
as well as routes to PIM entities like the RPs and BSR.
SSM uses only a subset of the PIM-SM features such as the SPT, DR, and some messages (hello,
join, prune, and assert). However, some features are unique to SSM. These features, described in the
following sections, are extensions of the IGMP and PIM protocols.
PIM-SSM architecture
The following diagram illustrates how the PIM-SSM architecture requires routers to perform the
following actions:
• support IGMPv3 source-specific host membership reports and queries at the edge routers
• initiate PIM-SSM (S,G) joins directly and immediately after receiving an IGMPv3 join report from the
designated router
• restrict forwarding to SPTs within the SSM address range by all PIM-SSM routers
SSM range
The standard SSM range is 232/8, but you can extend the range to include an IP multicast address.
Although you can configure the SSM range, you cannot configure it for all multicast groups (224/4 or
224.0.0.0/240.0.0.0 or 224.0.0.0/255.0.0.0).
You can extend the SSM range to configure existing applications without changing their group
configurations.
You can use the SSM channel to manually configure (S,G) entries that map existing groups to their
sending source. These table entries apply to the whole switch, not for each interface, and both IGMPv2
and IGMPv3 hosts use the SSM channel table.
The following rule applies to an SSM channel table for an individual switch:
• You can map one source to multiple groups.
• You can allow multiple sources to the same group.
Important
Different switches can use different mappings for groups to sources, for example, different
channels map differently even if they are on the same network.
SSM-configured switches can accept reports from IGMPv2 hosts on IGMPv2 interfaces if the group uses
an SSM channel table entry. However, the IGMPv2 host groups must exist in the SSM range defined on
the switch, which is 232/8 by default.
• After the SSM switch receives an IGMPv2 report for a group that is in the SSM channel table, it joins
the specified source immediately.
• After the SSM switch receives an IGMPv2 report for a group that uses an enabled static SSM channel
table entry, it triggers PIM-SSM processing as if it received an equivalent IGMPv3 report.
• After the SSM switch receives an IGMPv2 report for a group out of the SSM range, it processes the
report as if it is in PIM-SM mode.
Before you disable or delete an ssm-map, always send IGMPv1 or IGMPv2 leave messages from hosts
that operate using IGMPv1 or IGMPv2. If you do not perform this action, receiving and processing
reports in SSM range on an IGMP interface enabled with IGMPv1 or IGMPv2 can lead to unexpected
behavior.
The switch supports IGMPv3 for SSM. With IGMPv3, a host can selectively request or filter traffic from
sources within the multicast group. IGMPv3 is an interface-level configuration.
Important
IGMPv3 works without PIM-SSM or SSM-snoop enabled on the interface.
The IGMPv2 report mentioned in SSM and IGMPv2 on page 1492 is processed because it is an
IGMPv2 report received on an IGMPv2 interface. If an IGMPv2 interface receives an IGMPv3 report,
it drops the report even if PIM-SSM is enabled and the entry is in the SSM channel table. The IGMP
versions must match.
• Discard IGMP packets with a group address out of the SSM range.
The switch implements IGMPv3 in one of two modes: dynamic and static.
In dynamic mode, the switch learns about new (S,G) pairs from IGMPv3 reports and adds them to the
SSM channel table. If you do not enable dynamic mode and an IGMPv3-enabled interface receives a
report that includes a group not listed in the SSM channel table, it ignores the report.
In static mode, you can statically configure (S,G) entries in the SSM channel table. If an IGMPv3-enabled
interface receives a report that includes a group not listed in the SSM channel table, it ignores the
report. The interface also ignores the report if the group is in the table, but the source or mask does not
match what is in the table.
Important
After you enable IGMPv3, changes to the query interval and robustness values on the querier
switch propagate to other switches on the same VLAN through IGMP query.
Both IGMPv2 and IGMPv3 hosts use the SSM channel table:
• An IGMPv2 host (with an IGMPv2 VLAN) must use an existing SSM channel entry if the group is in
the SSM range.
• If you enable dynamic learning for an IGMPv3 host, the SSM channel automatically learns the group.
Otherwise, the SSM channel also needs a static entry.
The following table summarizes how a switch in PIM-SSM mode works with IGMP if you disable IGMPv3
compatibility. In the following table, references to matching a static SSM channel entry assumes that the
entry is enabled. If an entry is disabled, it is treated as though it is disallowed.
Table 118: PIM-SSM interaction with IGMPv2 and v3 with IGMPv3 compatibility disabled
Host VLAN SSM range Action
IGMPv2 host IGMPv3 VLAN In or out of range Drop report.
IGMPv3 host IGMPv2 VLAN In or out of range Drop report.
IGMPv2 host IGMPv2 VLAN In range If the report matches an existing static
SSM channel entry, create (S,G).
If the report does not match an existing
static SSM channel entry, drop it.
IGMPv2 host IGMPv2 VLAN Out of range Ignore the SSM channel table and
process the report as if it is in PIM-SM
mode.
IGMPv3 host IGMPv3 VLAN Out of range Process the report.
IGMPv3 host IGMPv3 VLAN In range Dynamic enabled. Create (S,G).
IGMPv3 host IGMPv3 VLAN In range Dynamic disabled and matches an
existing SSM channel entry. Create (S,G).
IGMPv3 host IGMPv3 VLAN In range Dynamic disabled and does not match
an existing SSM channel entry. Drop
report.
The following table summarizes how a switch in PIM-SSM mode works with IGMP if you enable IGMPv3
compatibility.
Table 119: PIM-SSM interaction with IGMPv2 and v3 with IGMPv3 compatibility enabled
Host VLAN SSM range Action
IGMPv2 Host IGMPv3 VLAN In range If the report matches
an existing static SSM
channel entry, create
(S,G).
If the report does not
match an existing static
SSM channel entry, drop
it.
IGMPv2 Host IGMPv3 VLAN Out of range Process the report as in
PIM-SM mode.
If an IGMPv3 group report enters the VLAN port and the port must discard one or more of the groups in
that packet after the application of IGMP access controls, the port drops the entire packet and does not
forward it on to other ports of the VLAN.
If an IGMPv3 interface receives an IGMPv2 or v1 query, the interface backs down to IGMPv2 or v1. As a
result, the interface flushes all senders and receivers on the interface.
Configuration limitations
Run PIM-SSM on either all switches in the domain or only on the edge routers. If you use a mix of
PIM-SSM and PIM-SM switches in the domain, run PIM-SSM on all the edge routers and run PIM-SM on
all the core routers.
Important
A PIM domain with edge routers running PIM-SM and core routers running PIM-SSM does
not operate properly. If you prefer or require a mixed PIM-SM and PIM-SSM topology, run
PIM-SSM on the edge switches and PIM-SM in the core. Ensure a valid RP configuration exists
for groups that exist outside of the SSM range. If a valid RP configuration exists, the SSM
switches process the joins in SM mode. If no RP exists, the SSM switches drop the reports.
Static source groups cannot conflict with SSM channels. If you configure a static source group or an
SSM channel, the switch performs a consistency check to make sure no conflicts exist. You can map one
group (G) to different sources or multiple groups to a single source for both static source group and an
SSM channel.
A PIM passive interface does not transmit and drops messages of the following type:
• hello
• join
• prune
• register
• register-stop
• assert
• candidate-RP-advertisement
• bootstrap
If a PIM passive interface receives these types of messages, it drops them and the switch logs a
message, detailing the type of protocol message and the IP address of the sending device. These log
messages help to identify the device that performs routing on the interface, which is useful if you must
disable a device that does not operate correctly.
Important
A device can send register and register-stop messages to a PIM passive interface, but these
messages cannot be sent out of that interface.
The PIM passive interface maintains information about hosts, through IGMP, that are related to senders
and receivers, but the interface does not maintain information about PIM neighbors. You can configure a
BSR or an RP on a PIM passive interface.
You can also use the PIM passive interface feature as a security measure to prevent routing devices from
becoming attached and participating in the multicast routing of the network.
Important
Before you change the state (active or passive) of a PIM interface, disable PIM on that
interface. This action prevents instability in the PIM operations, especially when neighbors
exists or the interface receives streams. After you disable PIM, the switch loses traffic for
approximately 80 seconds.
The multicast route statistics feature provides statistics for multicast streams through the switch. Using
the Command Line Interface (CLI), Simple Network Management Protocol (SNMP) or Enterprise Device
Manager (EDM), you can track the number of senders sending multicast streams to a particular group
address. You can also obtain a count of the packets or bytes being received for a particular multicast
group address and the average size of the frames. Multicast route statistics are supported for both IPv4
and IPv6 group addresses.
Determining the route statistics is especially useful when debugging a multicast network and also when
administering the network.
For more information on DvR, see Distributed Virtual Routing Fundamentals on page 690.
For more design guidelines, conceptual, and configuration information about IP Multicast over Fabric
Connect, see IP Multicast over Fabric Connect on page 1463.
Important
The switch does not support High Availability (HA).
The switch software supports the following:
• Protocol-Independent Multicast (PIM)
• Split MultiLink Trunking (SMLT) and Routed-SMLT (RSMLT)
1. Whenever possible, use simple network designs that do not use VLANs that span several switches.
Instead, use routed links to connect switches.
2. Whenever possible, group sources sending to the same group in the same subnet. The switch uses
a single egress forwarding pointer for all sources in the same subnet sending to the same group. Be
aware that these streams have separate hardware forwarding records on the ingress side.
3. Do not configure multicast routing on edge switch interfaces that do not contain multicast senders
or receivers. By following this rule, you:
• Provide secure control over multicast traffic that enters or exits the interface.
• Reduce the load on the switch, as well as the number of routes. This improves overall
performance and scalability.
4. Avoid initializing many (several hundred) multicast streams simultaneously. Initial stream setup is a
resource-intensive task, and initializing a large number can increase the setup time. In some cases,
this delay can result in stream loss.
5. Whenever possible, do not connect IP multicast sources and receivers by using VLANs that
interconnect switches (see the following figure). In some cases, this can result in excessive hardware
record use. By placing the source on the interconnected VLAN, traffic takes two paths to the
destination, depending on the reverse path forwarding (RPF) checks and the shortest path to the
source.
For example, if a receiver is on VLAN 1 on switch S1 and another receiver is on VLAN 2 on switch S1,
traffic can be received from two different paths to the two receivers, which results in the use of two
forwarding records. If the source on switch S2 is on a different VLAN than VLAN 3, traffic takes a
single path to switch S1 where the receivers are located.
Internet Assigned Numbers Authority (IANA) reserves addresses from 224.0.0.0 through 224.0.0.255
for link-local network applications. Multicast-capable routers do not forward packets with an address
in this range. For example, Open Shortest Path First (OSPF) uses 224.0.0.5 and 224.0.0.6, and Virtual
Router Redundancy Protocol (VRRP) uses 224.0.0.18 to communicate across local broadcast network
segments.
IANA also reserves the range of 224.0.1.0 through 224.0.1.255 for well-known applications. IANA assigns
these addresses to specific network applications. For example, the Network Time Protocol (NTP) uses
224.0.1.1, and Mtrace uses 224.0.1.32. RFC1700 contains a complete list of these reserved addresses.
Multicast addresses in the 232.0.0.0/8 (232.0.0.0 to 232.255.255.255) range are reserved only for
source-specific multicast (SSM) applications, such as one-to-many applications. While this range is the
publicly reserved range for SSM applications, private networks can use other address ranges for SSM.
Finally, addresses in the range 239.0.0.0/8 (239.0.0.0 to 239.255.255.255) are administratively scoped
addresses; they are reserved for use in private domains. Do not advertise these addresses outside the
private domain. This multicast range is analogous to the 10.0.0.0/8, 172.16.0.0/20, and 192.168.0.0/16
private address ranges in the unicast IP space.
In a private network, only assign multicast addresses from 224.0.2.0 through 238.255.255.255 to
applications that are publicly accessible on the Internet. Assign addresses in the 239.0.0.0/8 range
to multicast applications that are not publicly accessible.
Although you can use a multicast address you choose on your own private network, it is generally
not good design practice to allocate public addresses to private network entities. Do not use public
addresses for unicast host or multicast group addresses on private networks.
IP multicast addresses map to Ethernet multicast MAC addresses by placing the low-order 23 bits of
the IP address into the low-order 23 bits of the Ethernet multicast address 01:00:5E:00:00:00. Thus,
more than one multicast address maps to the same Ethernet address (see the following figure). For
example, all 32 addresses 224.1.1.1, 224.129.1.1, 225.1.1.1, 225.129.1.1, 239.1.1.1, 239.129.1.1 map to the same
01:00:5E:01:01:01 multicast MAC address.
The VSP 4450 Series devices switch IP multicast data based on the IP multicast address, not the MAC
address, and thus, do not have this issue.
As an example, consider two active multicast streams using addresses 239.1.1.1 and 239.129.1.1. Suppose
that two Ethernet hosts, receiver A and receiver B, connect to ports on the same switch and only want
the stream addressed to 239.1.1.1. Suppose also that two other Ethernet hosts, receiver C and receiver
D, also connect to the ports on the same switch as receiver A and B, and want to receive the stream
addressed to 239.129.1.1. If the switch uses the Ethernet multicast MAC address to make forwarding
decisions, then all four receivers receive both streams—even though each host only wants one stream.
This transmission increases the load on both the hosts and the switch. To avoid this extra load, ensure
that you manage the IP multicast group addresses used on the network.
The VSP 4450 Series devices do not forward IP multicast packets based on multicast MAC addresses—
even when bridging VLANs at Layer 2. Thus, the platform does not encounter this problem. Instead, the
platform internally maps IP multicast group addresses to the ports that contain group members.
When an IP multicast packet is received, the lookup is based on the IP group address, regardless of
whether the VLAN is bridged or routed. While the problem described in the previous example does
not affect the VSP 4450 Series devices, other switches in the network can be affected. This problem is
particularly true of pure Layer 2 switches.
In a network that includes multiple hardware platforms, the easiest way to ensure that this issue does
not arise is to use only a consecutive range of IP multicast addresses that correspond to the lower-order
23 bits of that range. For example, use an address range from 239.0.0.0 through 239.127.255.255. A
group address range of this size can still easily accommodate the needs of even the largest private
enterprise.
For such changes, ensure that you temporarily stop all multicast traffic. If the changes are necessary
and you have no control over the applications that send multicast data, you can disable the multicast
routing protocols before you perform the change. For example, consider disabling multicast routing
before making interface address changes. In all cases, these changes result in traffic interruptions
because they affect neighbor-state machines and stream-state machines.
In addition, when removing port members of an MLT group you must first disable the ports. Changing
the group set without first shutting the ports down can result in high-CPU utilization and processing in a
scaled multicast environment due to the necessary hardware reprogramming on the multicast records.
You can configure the IGMP version of an interface to version 3 regardless of the PIM or snooping mode.
You can configure whether the switch downgrades the version of IGMP to handle older query messages.
If the switch downgrades, the host with IGMPv3 only capability does not work. If you do not configure
the switch to downgrade the version of IGMP, the switch logs a warning.
Note
If you enable the explicit host tracking option on an IGMPv3 interface, you cannot downgrade
to IGMPv1 or IGMPv2. You must disable explicit host tracking to downgrade the IGMP version.
At a minimum, map the multicast MAC address to a set of ports within the VLAN. In addition, if traffic
is routed on the local host, you must configure an Address Resolution Protocol (ARP) entry to map
the shared unicast IP address to the shared multicast MAC address. You must configure an ARP entry
because the hosts can also share a virtual IP address, and packets addressed to the virtual IP address
need to reach each host.
Ensure that you limit the number of such configured multicast MAC addresses to a maximum of 100.
This number is related to the maximum number of possible VLANs you can configure, because for every
multicast MAC filter that you configure the maximum number of configurable VLANs reduces by one.
Similarly, configuring large numbers of VLANs reduces the maximum number of configurable multicast
MAC filters downward from 100.
Although you can configure addresses starting with 01.00.5E, which are reserved for IP multicast
address mapping, do not enable IP multicast with streams that match the configured addresses. This
configuration can result in incorrect IP multicast forwarding and incorrect multicast MAC filtering.
Multicast access policies can apply to a routed PIM interface if Internet Group Management Protocol
(IGMP) reports the reception of multicast traffic.
The following rules and limitations apply to IGMP access policy parameters when you use them with
IGMP instead of PIM:
• The static member parameter applies to IGMP snooping and PIM on both interconnected links and
edge ports.
• The Static Not Allowed to Join parameter applies to IGMP snooping and PIM on both interconnected
links and edge ports.
• For multicast access control, the denyRx parameter applies to IGMP snooping and PIM. The DenyTx
and DenyBoth parameters apply only to IGMP snooping.
To avoid the split-subnet problem in PIM networks, ensure that the RP router is not in a subnet that can
become a split subnet. Also, avoid having receivers on this subnet. Because the RP is an entity that must
be reached by all PIM-enabled switches with receivers in a network, placing the RP on a split-subnet can
impact the whole multicast traffic flow. Traffic can be affected even for receivers and senders that are
not part of the split-subnet.
For more information on interface scaling, see the VOSS Release Notes.
The software does not support virtualized PIM. PIM is supported in the Global Routing Table only.
Interfaces that run PIM must also use a unicast routing protocol (PIM uses the unicast routing table),
which puts stringent requirements on the system. With a high number of interfaces, take special care to
reduce the load on the system.
Use few active IP routed interfaces. You can use IP forwarding without a routing protocol enabled on
the interfaces, and enable only one or two with a routing protocol. You can configure proper routing by
using IP routing policies to announce and accept routes on the switch. Use PIM passive interfaces on the
majority of interfaces.
Important
For information on the maximum values for total PIM interfaces and active interfaces, see the
VOSS Release Notes. If you configure the maximum number of active interfaces, all remaining
interfaces must be passive.
When you use PIM-SM, the number of routes can scale up to the unicast route limit because PIM uses
the unicast routing table to make forwarding decisions. For higher route scaling, use OSPF instead of
Routing Information Protocol (RIP).
As a general rule, a well-designed network does not have many routes in the routing table. For PIM
to work properly, ensure that all subnets configured with PIM are reachable and that PIM uses the
information in the unicast routing table. For the RPF check, to correctly reach the source of any
multicast traffic, PIM requires the unicast routing table.
Design simple PIM networks where VLANs do not span several switches.
PIM relies on unicast routing protocols to perform its multicast forwarding. As a result, include in your
PIM network design, a unicast design where the unicast routing table has a route to every source and
receiver of multicast traffic, as well as a route to the RP router and Bootstrap router (BSR) in the
network. Ensure that the path between a sender and receiver contains PIM-enabled interfaces. Receiver
subnets are not always required in the routing table.
You cannot configure one of the interfaces on switch Sw1 as static RP because the BSR cannot
learn this information and propagate it to Sw2 and Sw3. PIM requires that you consistently configure
RP on all the routers of the PIM domain, so you can only add the remote interface Candidate-RP1
(Cand-RP) to the static RP table on Sw1.
• If a switch needs to learn an RP-set, and has a unicast route to reach the BSR through this switch,
you cannot enable or configure static RP on a switch in a mixed mode of candidate RP and static RP
switches. For examples, see the following two figures.
When an IGMP receiver joins a multicast group, PIM on the leaf router first joins the shared tree. After
the first packet is received on the shared tree, the router uses the source address information in the
packet to immediately switch over to the shortest path tree (SPT). If you enable PIM Infinite Threshold
Policy for IPv4 and IPv6, multicast traffic follows the shared tree path through a Rendezvous Point (RP)
instead of switching immediately over to the SPT.
Note
PIM Infinite Threshold Policy for IPv4 and IPv6 is not supported on VSP 8600 Series or
XA1400 Series.
PIM uses a designated router (DR) to forward data to receivers on the DR VLAN. The DR is the router
with the highest IP address on a LAN. If this router is down, the router with the next highest IP address
becomes the DR. However, if the VLAN is an SMLT VLAN, the DR is not a factor in determining which
switch forwards the data down to the receiver. Either aggregate switch can forward data to the receiver,
because the switches act as one. The switch that forwards depends on where the source is located (on
another SMLT/vIST link or on a non-SMLT/non-vIST link) and whether either side of the receiver SMLT
link is up or down. If the forwarder switch is rebooted, traffic loss occurs until protocol convergence is
completed.
In either case, configuring a static RP helps the situation. To avoid this traffic delay, a workaround is
to configure a static RP on the peer SMLT switches. This configuration avoids the process of selecting
an active RP router from the list of candidate RPs, and also of dynamically learning about RPs through
the BSR mechanism. Then, when the DR comes back, traffic resumes as soon as OSPF converges. This
workaround reduces the traffic delay.
Use CLIP to configure a resilient RP and BSR for a PIM network. When you configure an RP or BSR on a
regular interface, if it becomes nonoperational, the RP and BSR also become nonoperational. This status
results in the election of other redundant RPs and BSRs, and can disrupt IP multicast traffic flow in the
network. As a best practice for multicast networks design, always configure the RP and BSR on a CLIP
interface to prevent a single interface failure from causing these entities to fail.
Also, configure redundant RPs and BSRs on different switches such that these entities are on CLIP
interfaces. For the successful setup of multicast streams, ensure that a unicast route exists to all CLIP
interfaces from all locations in the network. A unicast route is mandatory because, for proper RP
learning and stream setup on the shared RP tree, every switch in the network needs to reach the RP and
BSR. You can use PIM-SM CLIP interfaces only for RP and BSR configurations, and are not intended for
other purposes.
Do not configure non-SMLT IGMP leaf ports on a router to be one of the redundant RP CLIP devices. It is
possible that these IGMP hosts can become isolated from the multicast data stream(s).
If you configure dual-redundant RPs (vIST peers with the same CLIP interface IP address used for the
RP), the topology in the following figure does not work in link-failure scenarios. Use caution if you
design a network with this topology where the vIST peers are PIM enabled, and the source and receiver
edges are Layer 2.
Consider an example where one of the peers, vIST-A, is the PIM DR for the source VLAN, and the source
data is hashed to vIST-A from the Layer 2 source edge. vIST-A forwards traffic to the receiver edge
using the SMLT link from vIST-A to the receiver edge. If the SMLT link fails, vIST-A does not forward
traffic over the vIST link to vIST-B, and the receiver edge does receive the data.
In this topology, the receiver edge sends an IGMP membership report for a group, which is recorded on
both vIST peers as an IGMP LEAF on the receiver SMLT port on the receiver VLAN.
Because both of the vIST peers are the RP for the group, they do not send a (*,g) PIM JOIN message
toward the other RP. The (*,g) PIM mroute does not record the vIST port as a JOIN port on either vIST
device. The PIM (*,g) mroute records only a LEAF on the SMLT receiver port.
Because the source is local (Layer 2 edge), there is no PIM (s,g) JOIN message toward the source and
the (s,g) PIM mroute does not record the vIST port as a JOIN port on either vIST device. The PIM (s,g)
mroute records only a LEAF on the SMLT receiver port.
If the source is hashed to vIST-A, the PIM DR for the incoming VLAN, traffic is forwarded to the receiver
correctly. vIST-A does not forward traffic over the vIST to vIST-B, because no JOIN exists on the vIST
port. If the receiver SMLT link from the vIST-A peer is down, the traffic is not forwarded to vIST-B, and is
not received by the receiver edge. Traffic resumes after the link is restored. If the source data hashes to
the non-DR peer, vIST-B, no problem occurs because the non-DR always forwards traffic to the DR.
A similar situation exists in this topology when vIST-A is both the RP and the DR for the Layer 2 receiver
edge. The vIST port is not in the outgoing port list because there is no JOIN message from the peer
toward the source (which is not PIM enabled). Therefore, if the SMLT link from vIST-A to the receiver
edge is down, the system does not forward traffic to the peer vIST-B and down to the receiver.
You can avoid the preceding problems with this topology by performing one of the following actions:
• Enable PIM on the source edge.
The vIST peers send PIM joins toward the source and the JOIN is recorded on the vIST port for the
(s,g). Data is forwarded to the peer.
• Do not configure dual redundant RPs.
The system forwards the traffic to the RP or to the DR, depending on which peer receives the source,
and, if the SMLT link to the receiver goes down there will be no data loss.
Use static RP to provide security, interoperability, and redundancy for PIM-SM multicast networks.
Consider if the administrative ease derived from using dynamic RP assignment is worth the security
risks involved. For example, if an unauthorized user connects a PIM-SM router that advertises itself as a
candidate RP (C-RP), it can possibly take over new multicast streams that otherwise distribute through
an authorized RP. If security is important, use static RP assignment.
You can use the static RP feature in a PIM environment with devices that run legacy PIM-SMv1 and
Cisco Auto-RP. For faster convergence, you can also use static RP in a PIM-SMv2 environment. If you
configure static RP with PIM-SMv2, the BSR is not active.
Some legacy PIM-SMv1 networks use the auto-RP protocol. Auto-RP is a Cisco proprietary protocol that
provides equivalent functionality to the legacy platform supported PIM-SM RP and BSR. You can use
the static RP feature to interoperate in this environment. For example, in a mixed-vendor network, you
can use auto-RP among routers that support the protocol, while other routers use static RP. In such a
network, ensure that the static RP configuration mimics the information that is dynamically distributed
to guarantee that multicast traffic is delivered to all parts of the network.
In a mixed auto-RP and static RP network, ensure that the legacy platform does not serve as an RP
because it does not support the auto-RP protocol. In this type of network, the RP must support the
auto-RP protocol.
You can provide RP redundancy through static RPs. To ensure consistency of RP selection, implement
the same static RP configuration on all PIM-SM routers in the network. In a mixed vendor network,
ensure that the same RP selection criteria is used among all routers. For example, to select the active
RP for each group address, the switch uses a hash algorithm defined in the PIM-SMv2 standard. If a
router from another vendor selects the active RP based on the lowest IP address, then the inconsistency
prevents stream delivery to certain routers in the network.
If a group address-to-RP discrepancy occurs among PIM-SM routers, network outages occur. Routers
that are unaware of the true RP cannot join the shared tree and cannot receive the multicast stream.
Failure detection of the active RP is determined by the unicast routing table. As long as the RP is
considered reachable from a unicast routing perspective, the local router assumes that the RP is fully
functional and attempts to join the shared tree of that RP.
The following figure shows a hierarchical OSPF network where a receiver is in a totally stubby area. If RP
B fails, PIM-SM router A does not switch over to RP C because the injected default route in the unicast
routing table indicates that RP B is still reachable.
Because failover is determined by unicast routing behavior, carefully consider the unicast routing
design, as well as the IP address you select for the RP. Static RP failover performance depends on the
convergence time of the unicast routing protocol. For quick convergence, ensure that you use a link
state protocol, such as OSPF. For example, if you use RIP as the routing protocol, an RP failure can take
minutes to detect. Depending on the application, this situation can be unacceptable.
Static RP failover time does not affect routers that have already switched over to the SPT; failover time
only affects newly-joining routers.
If you use static RP, you disable dynamic RP learning. The following figure shows an unsupported
configuration for static RP. In this example because of inter-operation between static RP and dynamic
RP, no RP exists at switch 2. However, (S,G) creation and deletion occurs every 210 seconds at switch 16.
Switches 10, 15, and 16 use static RP, whereas switch 2 uses dynamic RP. The source is at switch 10, and
the receivers are switches 15 and 16. The RP is at switch 15 locally. The receiver on switch 16 cannot
receive packets because its SPT goes through switch 2.
Switch 2 is in a dynamic RP domain, so it cannot learn about the RP on switch 15. However, (S, G)
records are created and deleted on switch 16 every 210 seconds.
You can place an RP on a switch when VLANs extend over several switches. However, when you use
PIM-SM, ensure that you do not span VLANs on more than two switches.
Use static group-range-to-RP mappings in an SMLT topology as opposed to RP set learning using the
Bootstrap Router (BSR) mechanism. Static RP allows for faster convergence in box failure, reset and HA
failover scenarios, whereas there are inherent delays in the BSR mechanism as follows:
• When a router comes back up after a failover or reset, to accept and propagate (*,g) join requests
from surrounding routers (either PIM join messages or local IGMP membership reports) to the RP, a
PIM router must determine the address of the RP for each group for which they desire (*,g) state.
The PIM router must know the unicast route to the RP address. The route to the RP address is
learned by using a unicast routing protocol such as OSPF, and the RP address is either statically
configured or dynamically learned using the BSR mechanism.
• When a box comes up after a reset, if the RP is not statically configured, it must wait for the BSR
to select the RP from candidate RP routers, and then propagate the RP set hop-by-hop to all PIM
routers. This must be done before a join message can be processed. If the PIM router receives
a join message before it learns the RP set, it drops the join message, and the router waits for
another join or prune message to arrive before it creates the multicast route and propagates the
join message to the RP. The default Join/Prune timer is 60 seconds, and because of this and the
delays inherent in BSR RP-set learning, significant multicast traffic interruptions can occur. If the RP
is statically configured, the only delay is in the unicast routing table convergence and the arrival of
the Join/Prune messages from surrounding boxes.
Do not connect non-SMLT PIM routers in a linear fashion on the same VLAN. This topology is called an
extended VLAN. Unlike a shared VLAN topology where all routers on the same VLAN are physically one
hop away from each other, a VLAN router at one end of the extended VLAN has one or more routers in
between it and the router at the far end of the extended VLAN. The following figure shows an extended
VLAN.
In the preceding figure, all routers use PIM-SSM. The source connects to Router A on VLAN 10. All
routers and receiver hosts connect on the same extended VLAN, VLAN 20. All routers have a receiver in
VLAN 20. Router D is the PIM DR for VLAN 20 and the source host is not on VLAN 20. PIM-SSM does
not require a Rendezvous Point (RP).
In this topology, each router receives an IGMP membership report from its local receiver host, and then
sends a PIM SG join message towards the source on VLAN 20. VLAN flooding propagates the PIM SG
join message through to Router A, the PIM DR for the source VLAN 10. Each router from Router D to
Router A records a PIM join on the port on which the join message was received, and then sends out its
own join message toward the source. Data then flows from the source to the receiver, as long as a join
exists on those ports.
Because all routers are in the same VLAN 20, they receive joins from one another due to flooding in
the VLAN. For example, Router D receives join messages from Router C on its port ‘b’, and Router C
receives join messages from Router B on its port toward Router B. In accordance with the PIM protocol
rules, suppression causes Router D to stop sending a join towards the source because it receives a join
for the same group and same RP on the port (port b) of the upstream neighbor (the router towards the
source). Router D does not need to send a redundant join on the same VLAN. Router D stops sending
a join, and the join that is recorded on port c of Router C eventually times out and is removed from
the egress list of the (s,g) multicast route entry on Router C. This removal causes Router C to stop
forwarding multicast traffic to Router D, and to the receiver (R1).
The purpose of join suppression is to suppress joins on a shared VLAN, such that if all routers on the
shared VLAN want to receive data from the same RP and group, then only one of them needs to send
the join on the VLAN. One join is enough to pull the data from the source router to the shared VLAN
for all routers to receive. The other routers can suppress sending their own joins when they see such a
join on the port toward the upstream router. In this way, less protocol message congestion exists in the
shared VLAN. In the following figure, Router D sends the initial join message, which is seen by Router B
and Router C. Router B and Router C suppress their own join messages. Router A (the PIM DR for the
source VLAN 10) sends the data to VLAN 20, which is received by Routers B, C, and D due to the shared
(non-extended) VLAN topology, and traffic is forwarded to all receiver hosts.
The extended VLAN topology looks exactly like the non-extended shared VLAN topology to the router,
which cannot distinguish between the two.
In the current release, you cannot disable join suppression on a router. This enhancement will be added
in a future release. Until this enhancement is included, you can perform the following actions:
1. Avoid this type of extended VLAN topology, and instead use Layer 3 routing between the routers.
Do not extend VLAN 20 throughout, but rather, create a different VLAN between each router.
2. Configure the PIM DR for VLAN 20 to be the router closer to the source (Router B) so that any
join received on the VLAN 20 DR (Router B) will be recorded as an IGMP local leaf on VLAN 20
as opposed to a PIM join, which does not time out until the receiver host stops sending IGMP
membership reports.
To optimize the flow of traffic down the shared trees in a network that uses a BSR to dynamically
advertise candidate RPs, consider the hash function. The BSR uses the hash function to assign multicast
group addresses to each C-RP.
The BSR distributes the hash mask used to compute the RP assignment. For example, if two RPs are
candidates for the range 239.0.0.0 through 239.0.0.127, and the hash mask is 255.255.255.252, that
range of addresses is divided into groups of four consecutive addresses and assigned to one or the
other C-RP.
The following figure illustrates a suboptimal design where Router A sends traffic to a group address
assigned to RP D. Router B sends traffic assigned to RP C. RP C and RP D serve as backups for each
other for those group addresses. To distribute traffic, it is desirable that traffic from Router A use RP C
and that traffic from Router B use RP D.
While still providing redundancy in the case of an RP failure, you can ensure that the optimal shared tree
is used by using the following methods.
1. Use the hash algorithm to proactively plan the group-address-to-RP assignment.
Use this information to select the multicast group address for each multicast sender on the network
and to ensure optimal traffic flows. This method is helpful for modeling more complex redundancy
and failure scenarios, where each group address has three or more C-RPs.
2. Allow the hash algorithm to assign the blocks of addresses on the network, and then view the results
using the command show ip pim active-rp .
Use the command output to assign multicast group addresses to senders that are located near the
indicated RP. The limitation to this approach is that while you can easily determine the current RP
for a group address, the backup RP is not shown. If more than one backup for a group address
exists, the secondary RP is not obvious. In this case, use the hash algorithm to reveal which of the
remaining C-RPs take over for a particular group address in the event of primary RP failure.
1. For each C-RP router with matching group address ranges, a hash value is calculated according to
the formula:
Hash value [G, M, C(i)] = {1 103 515 245 * [(1 103 515245 * (G&M) +12 345) XOR C(i)] + 12 345} mod
2^31
The hash value is a function of the group address (G), the hash mask (M), and the IP address of the
C-RP C(i). The expression (G&M) guarantees that blocks of group addresses hash to the same value
for each C-RP, and that the size of the block is determined by the hash mask.
For example, if the hash mask is 255.255.255.248, the group addresses 239.0.0.0 through 239.0.0.7
yield the same hash value for a given C-RP. Thus, the block of eight addresses are assigned to the
same RP.
2. The C-RP with the highest resulting hash value is chosen as the RP for the group. In the event of a
tie, the C-RP with the highest IP address is chosen.
This algorithm runs independently on all PIM-SM routers so that every router has a consistent view
of the group-to-RP mappings.
Candidate RP Considerations
The C-RP priority parameter determines an active RP for a group. The hash values for different RPs are
only compared for RPs with the highest priority. Among the RPs with the highest priority value and the
same hash value, the C-RP with the highest RP IP address is chosen as the active RP.
You cannot configure the C-RP priority. Each RP has a default C-RP priority value of 0, and the
algorithm uses the RP if the group address maps to the grp-prefix that you configure for that RP. If a
different router in the network has a C-RP priority value greater than 0, the switch uses this part of the
algorithm in the RP election process.
Currently, you cannot configure the hash mask used in the hash algorithm. Unless you configure
a different PIM BSR in the network with a nondefault hash mask value, the default hash mask of
255.255.255.252 is used. Static RP configurations do not use the BSR hash mask; they use the default
hash mask.
For example:
RP1 = 128.10.0.54 and RP2 = 128.10.0.56. The group prefix for both RPs is 238.0.0.0/255.0.0.0. Hash
mask = 255.255.255.252.
The hash function assigns the groups to RPs in the following manner:
The group range 238.1.1.40 to 238.1.1.51 (12 consecutive groups) maps to 128.10.0.56. The group range
238.1.1.52 to 238.1.1.55 (4 consecutive groups) maps to 128.10.0.54. The group range 238.1.1.56 to
238.1.1.63 (8 consecutive groups) maps to 128.10.0.56.
In topologies where this switch interoperates with ERS or VSP 9000 Series platforms, the selection of
the RP from multiple candidate RPs can produce different results on this switch than it does on ERS or
VSP 9000 Series. This switch conforms to PIM RFC 4601, while ERS and VSP 9000 Series platforms
conform to RFC 2362.
RFC 4601 is not backward compatible with RFC 2362 regarding how it defines the selection algorithm
for an RP, specifically when there are several candidate RPs for the same group, but with different prefix
lengths. Both RFCs have the RP selection mechanism based on a specific hash function, common to all
routers in PIM domain, however there are differences in determining the pool of candidate RPs to which
the hash function will be applied. In RFC 4601, only the RP of the group range with the longest prefix
match for the group range will be chosen to apply the hash function and thus participate in the actual
election. In RFC 2362, longest prefix match is not part of the selection criteria, and therefore ERS and
VSP 9000 Series could potentially choose a different RP, because they apply the hash function on a
different pool of candidate RPs. This would cause inconsistencies in the PIM-SM network.
To work around this issue, define RP group ranges with the same prefix length, such that the next
RFC-defined match rule applies equally across all platforms in the network.
Some designs cause unnecessary traffic flow on links in a PIM-SM domain. In these cases, traffic is not
duplicated to the receivers, but wastes bandwidth.
The following figure shows such a situation. Switch B is the DR between switches A and B. Switch C is
the RP. A receiver R is on the VLAN (V1) that connects switches A and B. A source sends multicast data
to the receiver.
IGMP reports that the messages that the receiver sends are forwarded to the DR, and both A and B
create (*,G) records. Switch A receives duplicate data through the path from C to A, and through the
second path from C to B to A. Switch A discards the data on the second path (assuming the upstream
source is A to C).
To avoid this waste of resources, do not place receivers on V1. This configuration guarantees that no
traffic flows between B and A for receivers attached to A. In this case, the existence of the receivers is
only learned through PIM join messages to the RP [for (*,G)] and of the source through SPT joins.
For proper multicast traffic flow in a PIM-SM domain, as a general rule, enable PIM-SM on all interfaces
in the network (even if paths exist between all PIM interfaces). Enable PIM on all interfaces because
PIM-SM relies on the unicast routing table to determine the path to the RP, BSR, and multicast sources.
Ensure that all routers on these paths have PIM-SM enabled interfaces.
The following figure provides an example of this situation. If A is the RP, then initially the receiver
receives data from the shared tree path (that is, through switch A).
If the shortest path from C to the source is through switch B, and the interface between C and B does
not have PIM-SM enabled, then C cannot switch to the SPT. C discards data that comes through the
shared path tree (that is, through A). The simple workaround is to enable PIM on VLAN1 between C and
B.
Source Filtering
The system can report interest in receiving packets from only a specific source address (INCLUDE), from
all but specific source addresses (EXCLUDE), or sent to specific multicast addresses. IGMPv3 interacts
with PIM-SM, PIM-SSM, and snooping to provide source filtering.
IGMPv3 supports PIM-SSM by enabling a host to selectively request traffic from individual sources
within a multicast group. The system can report interest in receiving packets from only specific
source addresses (INCLUDE). IGMPv3 interacts with PIM-SM, PIM-SSM, and snooping to provide source
filtering.
This can cause traffic interruption, but the switch recovers quickly.
Configure the core switches that relay multicast traffic so that they cover all of these groups in their
SSM range, or use PIM-SM.
• One group in the SSM range can have multiple sources for a given SSM group.
For TV applications, you can attach several TVs directly to the switch, or through an IGMP-capable
Ethernet switch. Base this implementation on IGMP; the set-top boxes use IGMP reports to join a
TV channel and IGMP leaves to exit the channel. After a viewer changes channels, the switch issues
an IGMPv2 leave for the old channel (multicast group), and sends a membership report for the new
channel. If viewers change channels continuously, the number of joins and leaves can become large,
particularly if many viewers attach to the switch.
The switch supports more than a thousand joins and leaves per second, which is well adapted to TV
applications.
Important
For IGMPv3, ensure a join rate of 1000 per second or less. This ensures the timely processing
of join requests.
If you use the IGMP proxy functionality at the receiver edge, you reduce the number of IGMP reports
received by switch. This provides better overall performance and scalability.
Fast Leave
IGMP Fast Leave supports two modes of operation: single-user mode and multiple-user mode.
In single-user mode, if more than one member of a group is on the port and one of the group members
leaves the group, everyone stops receiving traffic for this group. Single-user mode does not send a
group-specific query before the effective leave takes place.
Multiple-user mode allows several users on the same port or VLAN. If one user leaves the group and
other receivers exist for the same stream, the stream continues. The switch tracks the number of
receivers that join a given group. For multiple-user mode to operate properly, do not suppress reports.
This ensures that the switch properly tracks the correct number of receivers on an interface.
The Fast Leave feature is particularly useful in IGMP-based TV distribution where only one receiver of a
TV channel connects to a port. If a viewer changes channels quickly, you create considerable bandwidth
savings if you use Fast Leave.
You can implement Fast Leave on a VLAN and port combination; a port that belongs to two different
VLANs can have Fast Leave enabled on one VLAN (but not on the other). Thus, with the Fast Leave
feature enabled, you can connect several devices on different VLANs to the same port. This strategy
does not affect traffic after one device leaves a group to which another device subscribes. For example,
you can use this feature when two TVs connect to a port through two set-top boxes, even if you use the
single-user mode.
To use Fast Leave, you must first enable explicit host tracking. IGMP uses explicit host tracking to
track all source and group members. Explicit host tracking is disabled by default. For configuration
information, see Configuring Fast Leave Mode on page 1630.
If an IGMPv2 host leaves a group, it notifies the router by using a leave message. Because of the IGMPv2
report suppression mechanism, the router cannot access information of other hosts that require the
stream. Thus, the router broadcasts a group-specific query message with a maximum response time
equal to the last member query interval (LMQI).
Because this timer affects the latency between the time that the last member leaves and the time
the stream actually stops, you must properly tune this parameter. This timer can especially affect TV
delivery or other large-scale, high-bandwidth multimedia applications. For instance, if you assign a
value that is too low, this can lead to a storm of membership reports if a large number of hosts are
subscribed. Similarly, assigning a value that is too high can cause unwanted high-bandwidth stream
propagation across the network if users change channels rapidly. Leave latency also depends on the
robustness value, so a value of 2 equates to a leave latency of twice the LMQI.
Determine the proper LMQI value for your particular network through testing. If a very large number
of users connect to a port, assigning a value of 3 can lead to a storm of report messages after a
group-specific query is sent. Conversely, if streams frequently start and stop in short intervals, as in a TV
delivery network, assigning a value of 10 can lead to frequent congestion in the core network.
Another performance-affecting factor that you need to be aware of is the error rate of the physical
medium. For links that have high packet loss, you can find it necessary to adjust the robustness variable
to a higher value to compensate for the possible loss of IGMP queries and reports.
In such cases, leave latency is adversely affected as numerous group-specific queries are unanswered
before the stream is pruned. The number of unanswered queries is equal to the robustness variable
(default 2). The assignment of a lower LMQI can counterbalance this effect. However, if you configure
the LMQI too low, it can actually exacerbate the problem by inducing storms of reports on the network.
LMQI values of 3 and 10, with a robustness value of 2, translate to leave latencies of 6/10 of a second
and 2 seconds, respectively.
When you choose an LMQI, consider all of these factors to determine the best configuration for the
given application and network. Test that value to ensure that it provides the best performance.
Important
In networks that have only one user connected to each port, use the Fast Leave feature
instead of LMQI, because no wait is required before the stream stops. Similarly, the robustness
variable does not affect the Fast Leave feature, which is an additional benefit for links with
high loss.
General guidelines
The following list identifies general guidelines to follow if you use multicast and switch clustering:
• Enable Protocol Independent Multicast - Sparse Mode (PIM-SM) on the vIST VLAN for fast recovery
of multicast. A unicast routing protocol is not required.
• Enable Internet Group Management Protocol (IGMP) snooping and proxy on the edge switches.
The following figure shows multicast behavior in an SMLT environment. The configuration in the
following figure provides fast failover if the switch or rendezvous point (RP) fails.
1. The multicast server sends multicast data towards the source designated router (DR).
2. The source DR sends register messages with encapsulated multicast data towards the RP.
3. After the client sends IGMP membership reports towards the multicast router, the router creates a
(*,G) entry.
4. The RP sends join messages towards the source DR on the reverse path.
5. After the source DR receives the join messages, it sends native multicast traffic.
6. After SW_B or SW_D receives multicast traffic from upstream, it forwards the traffic on the vIST as
well as on the SMLT link. Other aggregation switches drop multicast traffic received over the vIST at
egress. This action provides fast failover for multicast traffic. Both SW_D and SW_E (Aggregation
switches) have similar (S,G) records.
7. In case of SW_D or RP failure, SW_B changes only the next-hop interface towards SW_E. Because
the circuitless IP (CLIP) RP address is the same, SW_B does not flush (S,G) entries and achieves fast
failover.
A triangle design is an SMLT configuration that connects edge switches or SMLT clients to two
aggregation switches. Connect the aggregation switches together with a vIST that carries all the SMLT
trunks configured on the switches.
To avoid using an external query device to provide correct handling and routing of multicast traffic to
the rest of the network, use the triangle design with IGMP Snoop at the client switches. Use multicast
routing at the aggregation switches as shown in the following figure.
Multicast data flows through the vIST link when receivers are learned on the client switch and senders
are located on the aggregation switches, or when sourced data comes through the aggregation
switches. This data is destined for potential receivers attached to the other side of the vIST. The data
does not reach the client switches through the two aggregation switches because only the originating
switch forwards the data to the client switch receivers.
Note
Always place multicast receivers and senders on the core switches on VLANs different from
those that span the vIST.
The following figure shows a switch clustering configuration with a single switch cluster core and
dual-connected edge devices. This topology represents different VLANs spanning from each edge
device and those VLANs routed at the switch cluster core. You can configure multiple VLANs on the
edge devices, 802.1Q tagged to the switch cluster core.
A square design connects a pair of aggregation switches to another pair of aggregation switches. A
square design becomes a full-mesh design if the aggregation switches are connected in a full-mesh. The
switch supports Layer 3 IP multicast (PIM-SM only) over a full-mesh SMLT or RSMLT configuration.
In a square design, configure all switches with PIM-SM. Place the bootstrap router (BSR) and RP in one
of the four core switches; and place the RP closest to the source. If using PIM-SM over a square or
full-mesh configuration, enable the multicast smlt-square flag.
The following three figures show switch clustering configurations with two-switch cluster cores and
dual-connected edge devices.
Use an edge device that supports a form of link aggregation. Disable spanning tree on the link
aggregation group on the edge devices. Enable either the VRRP BackupMaster or RSMLT Layer 2
Edge on the switch cluster core.
Use an edge device that supports a form of link aggregation. Disable spanning tree on the link
aggregation group on the edge devices. Enable either the VRRP BackupMaster or RSMLT Layer 2 Edge
on the switch cluster cores. Do not enable VRRP on the RSMLT VLAN between switch cluster cores.
Use an edge device that supports a form of link aggregation. Disable spanning tree on the link
aggregation group on the edge devices. Enable either the VRRP BackupMaster or RSMLT Layer 2 Edge
on the switch cluster cores. Do not enable VRRP on the RSMLT VLAN between switch cluster cores.
If PIM-SM or other multicast protocols are used in an SMLT environment, enable the protocol on the
vIST. Routing protocols in general are not run over an vIST but multicast routing protocols are an
exception. When using PIM-SM and a unicast routing protocol, ensure the unicast route to the BSR and
RP has PIM-SM active and enabled. If multiple OSPF paths exist and PIM-SM is not active on each pair,
the BSR is learned on a path that does not have PIM-SM active. The following figure demonstrates this
issue.
In this example, the unicast route table on Switch A learns the BSR on Switch B through VLAN 102 using
OSPF. The BSR is either not learned or does not provide the RP to Switch A.
Note
PIM is supported in Global Routing Table (GRT) only.
Hosts use the Internet Group Management Protocol (IGMP) for IPv4 and Multicast Listener Discovery
(MLD v1/v2) for IPv6 to report multicast group memberships of directly attached multicast listeners to
neighboring multicast routers. MLD is the direct IPv6 replacement for the IGMP protocol used in IPv4.
Routers use Protocol Independent Multicast-Sparse Mode (PIM-SM) and PIM source Specific Mode
(SSM) to exchange multicast routing information. The PIM-SM protocol is the multicast routing protocol
that uses the underlying unicast routing information base to build unidirectional shared trees to group
members rooted at the RP per group, and creates shortest-path trees (SPT) per source. The router
forwards multicast packets along these trees. PIM-SSM does not require RP and only supports SPT.
PIM over IPv6 uses the IPv6 unicast routing table for reverse path information about source and RP.
Note
IPv4 and IPv6 multicast streams cannot interact. To configure an end-to-end PIM IPv6
network, all nodes from sender to receiver must support PIM IPv6.
For more information on DvR, see Distributed Virtual Routing Fundamentals on page 690.
Multicast configuration that is pushed from DvR Controllers to DvR Leaf nodes
When you perform the following multicast configuration on the DvR enabled interface of a DvR
Controller, the configuration is automatically pushed to the Leaf nodes within the domain.
• IP multicast over Fabric Connect
• IGMP Layer 2 Querier parameters, such as the IGMP Layer 2 Querier version, query interval, query
maximum response time, robustness value, last member query interval and compatibility mode
• Enabling and clearing of multicast route statistics
For more information on SPB-PIM Gateway, see SPB-PIM Gateway configuration on page 3187.
A multicast routing protocol optimizes the routing of multicast information to avoid loops and restrict
multicast traffic to networks that use host membership. Examples of multicast routing protocols include
Protocol Independent Multicast–Sparse Mode (PIM–SM) and Protocol Independent Multicast–Source
Specific Multicast (PIM–SSM).
SPBM must not be enabled on the vIST peers or any router that participates in the PIM network.
The switch supports configurable VLANs in the range of 1 to 4059. VLAN 0 is invalid. VLAN ID 1 is the
default VLAN and you cannot create or delete VLAN ID 1. VLAN IDs on the switch range from 2 to 4094
but, by default, the system reserves VLAN IDs 4060 to 4094 for internal use. On switches that support
the vrf-scaling and spbm-config-mode boot configuration flags, if you enable these flags, the
system also reserves VLAN IDs 3500 to 3998.
Procedure
configure terminal
2. Disable the boot flag:
no boot config flags spbm-config-mode
Warning: Please save the configuration and reboot the switch for this
to take effect.
Important
Any change to the spbm-config-mode boot flag requires a reboot for the change to
take effect.
ip address <A.B.C.D/X>
5. Configure the vIST peer address and VLAN:
virtual-ist peer-ip <A.B.C.D> vlan <1-4059>
6. Configure the SMLT MLT:
mlt <1-512> enable
smlt
virtual-ist enable
Note
The virtual-ist enable command enables Simplified vIST and is only available
when the spbm-config-mode boot flag is disabled.
ip address <A.B.C.D/X>
9. Configure PIM or IGMP Snooping on the SMLT VLAN:
interface vlan <1-4059>
ip pim enable
11. Enable PIM globally:
ip pim enable
Note
You can also configure other global PIM attributes such as ip pim join-prune-
interval.
Example
enable
configure terminal
no boot config flags spbm-config-mode
mlt 3 enable
mlt 3 member 1/35,1/36
interface mlt 3
smlt
exit
mlt 5 enable
mlt 5 member 2/15,2/17
mlt 5 encapsulation dot1q
interface mlt 5
virtual-ist enable
exit
vlan create 50 type port-mstprstp 0
interface vlan 50
ip address 198.51.100.0 255.255.255.0 1
exit
vlan create 100
vlan mlt 100 3
interface vlan 100
ip address 192.0.2.0 255.255.255.0 2
exit
interface vlan 100
ip pim enable (or ip igmp snooping)
exit
interface vlan 50
ip pim enable
exit
ip pim enable
Note
Before you can enable the PIM Infinite Threshold Policy feature, you must first disable the
following:
• PIM-SM
• PIM-SSM
• Simplified vIST
PIM-SM is the default mode so you do not need to configure the PIM mode.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable PIM-SM:
ip pim enable
3. Configure the time between bootstrap messages:
ip pim bootstrap-period <5–32757>
4. Configure the timeout to discard data:
ip pim disc-data-timeout <5–65535>
Example
Switch:1(config)#show ip pim
Switch:1#show ip pim
==========================================================================================
Pim General Group - GlobalRouter
==========================================================================================
PimStat : disabled
Mode : sparse
StaticRP : disabled
FastJoinPrune : disabled
SptInfiniteThreshold : enabled
BootstrapPeriod : 60
CRPAdvTimeout : 60
DiscDataTimeout : 60
FwdCacheTimeout : 210
RegSupprTimeout : 60
UniRouteChangeTimeout : 5
JoinPruneInt : 60
Variable Definitions
The following table describes the variables for the ip pim command.
Variable Value
disc-data-timeout <5-65535> Specifies the duration in seconds to discard data
until the switch receives the join message from
the rendezvous point (RP). An IP multicast discard
record is created after a register packet is sent,
until the timer expires or the switch receives a join
message.
The default value is 60.
bootstrap-period Specifies the interval (in seconds) that the
elected BSR waits between originating bootstrap
messages. The range is from 5–32757 and the
default is 60 seconds.
enable Enables PIM globally on the switch.
The default is disabled.
fast-joinprune Enables or disables the PIM fast join prune feature.
fwd-cache-timeout <10-86400> Specifies the forward cache timeout value.
The default value is 120.
join-prune-interval <1-18724> Specifies the duration in seconds before the PIM
router sends out the next join or prune message to
its upstream neighbors.
The default value is 60.
mode <sparse> <ssm> Configures PIM mode on the switch.
The default value is sparse.
register-suppression-timeout <10-65535> Specifies the duration in seconds the designated
router (DR) suppresses sending registers to the
RP. The timer starts after the DR receives a
register-stop message from the RP.
The default value is 60.
rp-c-adv-timeout Specifies how often (in seconds) a router
configured as a candidate rendezvous point router
(C-RP) sends advertisement messages. After
this timer expires, the C-RP router sends an
advertisement message to the elected bootstrap
router (BSR).
The range is from 5–26214 and the default is 60
seconds.
spt-infinite-threshold Enables PIM Infinite Threshold Policy for IPv4,
so that multicast traffic follows the shared tree
path through a Rendezvous Point (RP) instead of
automatically switching over to shortest path tree
(SPT).
The default is disabled.
static-rp Enables or disables the static RP feature. You
can use static RP to configure a static entry for
an RP. A static RP permits communication with
switches from other vendors that do not use the
BSR mechanism.
Variable Value
unicast-route-change-timeout <2-65535> Specifies the duration in seconds the switch polls
the RTM for unicast routing information updates
for PIM.
The default value is 5.
virtual-neighbor Specifies to enter virtual neighbor IP to an
interface globally.
Use this procedure to enable IPv6 PIM-SM globally. By default, IPv6 PIM-SM is disabled.
Procedure
configure terminal
2. Enable IPv6 PIM-SM:
ipv6 pim enable
Note
Before you can enable the PIM Infinite Threshold Policy feature, you must first disable the
following:
• PIM-SM
• PIM-SSM
Use this procedure to configure the global IPv6 PIM-SM parameters on the switch.
Procedure
configure terminal
2. Configure the timeout to discard data:
ipv6 pim disc-data-timeout <5-65535>
3. Configure the forward cache timeout:
ipv6 pim fwd-cache-timeout <10-86400>
Example
Variable Definitions
The following table describes the variables for the ipv6 pim command.
Variable Value
disc-data-timeout <5-65535> Specifies the duration in seconds to discard data
until the switch receives the join message from
the rendezvous point (RP). An IP multicast discard
record is created after a register packet is sent,
until the timer expires or the switch receives a join
message.
The default value is 60.
enable Enables PIM globally on the switch.
The default is disabled.
fwd-cache-timeout <10-86400> Specifies the forward cache timeout value.
The default value is 120.
join-prune-interval <1-18724> Specifies the duration in seconds before the PIM
router sends out the next join or prune message to
its upstream neighbors.
The default value is 60.
Variable Value
mode <sparse> <ssm> Configures PIM mode on the switch.
The default value is sparse.
register-suppression-timeout <10-65535> Specifies the duration in seconds the designated
router (DR) suppresses sending registers to the
RP. The timer starts after the DR receives a
register-stop message from the RP.
The default value is 60.
spt-infinite-threshold Enables PIM Infinite Threshold Policy for IPv6,
so that multicast traffic follows the shared tree
path through a Rendezvous Point (RP) instead of
automatically switching over to shortest path tree
(SPT).
The default is disabled.
static-rp Add new static-rp entries and enable static-rp.
unicast-route-change-timeout <2-65535> Specifies the duration in seconds the switch polls
the RTM for unicast routing information updates
for PIM.
The default value is 5.
Procedure
configure terminal
Example
Configure the interval for join and prune messages, the time between hello messages, and then verify
the configuration.
Switch:1(config-if)#ip pim join-prune-interval 60
Switch:1(config-if)#ip pim hello-interval 30
Switch:1>show ip pim interface vlan 10
========================================================================
Vlan Ip Pim
========================================================================
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Configure the interval for join and prune messages and the time between hello messages:
Switch(config-if)#ip pim join-prune-interval 60
Switch(config-if)#ip pim hello-interval 30
Procedure
1. Enter Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Switch:1(config-if)#ipv6 pim join-prune-interval 60
Switch:1(config-if)#ipv6 pim hello-interval 30
Variable Definitions
The following table describes the variables for the ipv6 pim command.
Variable Value
hello-interval <0-18724> Specifies the duration in seconds before the
PIM router sends out the next hello message to
neighboring switches.
The default value is 30 seconds.
join-prune-interval <1-18724> Specifies the duration in seconds before the PIM
router sends out the next join or prune message to
its upstream neighbors.
The default value is 60 seconds.
Because most multicast applications distribute content to a group in one direction, SSM uses a one-to-
many model that uses only a subset of the PIM-SM features. This model is more efficient and reduces
the load on multicast routing devices.
SSM is a global configuration. After you enable SSM on a switch, it is enabled on all interfaces that run
PIM. On an SSM-enabled switch, SSM behavior is limited to the SSM group range.
Procedure
configure terminal
2. Configure PIM-SSM:
ip pim mode ssm
For more information about RIPng, see RIPng Configuration using CLI on page 2819. For more
information about OSPFv3, see OSPFv3 Configuration using CLI on page 2511.
• Enable IPv6 PIM globally.
Because most multicast applications distribute content to a group in one direction, SSM uses a one-to-
many model which requires only a subset of the PIM-SM features. This model is more efficient and
reduces the load on multicast routing devices.
SSM is a global configuration. After you enable SSM on a switch, it is enabled on all interfaces that run
PIM. On a SSM-enabled switch, SSM behavior is limited to the SSM group range.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Configure IPv6 PIM-SSM:
ipv6 pim mode ssm
Note
When you configure the following IGMP parameters on the DvR enabled interface of a DvR
Controller, the configuration is automatically pushed to the Leaf nodes within the domain.
• ip igmp version
• ip igmp query-interval
• ip igmp query-max-response
• ip igmp robust-value
• ip igmp last-member-query-interval
• ip igmp compatibility-mode
Procedure
1. Enter VLAN Interface Configuration mode:
enable
configure terminal
Example
Configure the last member query interval to 15 tenths of a second (equal to 1.5 seconds).
Switch:1(config-if)# ip igmp last-member-query-interval 15
Configure the query maximum response time to 15 tenths of a second (equal to 1.5 seconds).
Switch:1(config-if)# ip igmp query-max-response 15
Enable IGMPv3.
Switch:1(config-if)# ip igmp version 3
Variable Definitions
Use the definitions in the following table to use the ip igmp command.
Variable Value
access-list WORD<1– Specifies the name of the access list from 1–64 characters.
64> {A.B.C.D/X} <eny- Creates an access control group entry for a specific IGMP
tx|deny-rx|deny-both|allow- interface. Specify the IP address of the host and the subnet
only-tx|allow-only-rx|allow- mask used to determine the host or hosts covered by this
only-both> configuration. You can use the host subnet mask to restrict
access to a portion of the network for the host.
Indicates the action for the specified IGMP interface. For
example, if you specify deny-both, the interface denies both
transmitted and received traffic
compatibility-mode Activates v2-v3 compatibility mode. The default value is
disabled, which means IGMPv3 is not compatible with
IGMPv2. To use the default configuration, use the default
option in the command:
default ip igmp compatibility-mode
, or use the no option to disable compatibility mode:
no ip igmp compatibility-mode
dynamic-downgrade-version Configures the version of IGMP to handle older query
messages if the system downgrades. If the system
downgrades, the host with IGMPv3 only capability does not
work. If you do not configure the system to downgrade the
version of IGMP, the system logs a warning. The system
downgrades to the oldest version of IGMP on the network
by default. To use the default configuration, use the default
option in the command:
default ip igmp dynamic-downgrade-version
or use the no option to disable downgrade:
no ip igmp dynamic-downgrade-version
igmpv3-explicit-host- Enables explicit host tracking on IGMPv3. The default state is
tracking disabled.
immediate-leave Enables fast leave on a VLAN.
immediate-leave-members Configures IGMP fast leave members on a VLAN to specify
{slot/port[/sub-port] [- fast-leave-capable ports.
slot/port[/sub-port]] Identifies the slot and port in one of the following
[,...]} formats: a single slot and port (slot/port), a range of slots
and ports (slot/port-slot/port), or a series of slots and
ports (slot/port,slot/port,slot/port). If the platform supports
channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
last-member-query-interval Configures the maximum response time (in tenths of a
<0–255> second) inserted into group-specific queries sent in response
to leave group messages. This value is also the time between
group-specific query messages. You cannot configure this
value for IGMPv1.
Decreasing the value reduces the time to detect the loss of
the last member of a group. The default is 10 tenths of a
second. You should configure this value between 3–10 (equal
to 0.3 – 1.0 seconds).
Variable Value
mrdisc [maxadvertinterval Configures the multicast router discovery options to enable
<2–180>] the automatic discovery of multicast capable routers. The
[maxinitadvertinterval <2– default parameter values are:
180>] [maxinitadvertisements • maxadvertinterval: 20 seconds
<2–15>] [minadvertinterval • maxinitadvertinterval: 2 seconds
<3–180>] [neighdeadinterval
<2–180>] • maxinitadvertisements: 3
• minadvertinterval: 15 seconds
• neighdeadinterval: 60 seconds
Important:
You must configure this value lower than the query-interval.
Important:
To maximize network performance, configure this parameter
according to the version of IGMP currently in use:
• IGMPv1—Disable
• IGMPv2—Enable
• IGMPv3—Enable
snoop-querier Enables the IGMP Layer 2 Querier feature on the VLAN. The
default is disabled.
snoop-querier-addr {A.B.C.D} Specifies the IGMP Layer 2 Querier source IP address.
snooping Activates the snoop option for the VLAN.
ssm-snoop Activates support for PIM-SSM on the snoop interface.
Variable Value
static-group Configures IGMP static members to add members to a snoop
{A.B.C.D} {A.B.C.D}{slot/ group.
port[/sub-port] [-slot/ {A.B.C.D} {A.B.C.D} indicates the IP address range of
port[/sub-port]] [,...]} the selected multicast group.
[static|blocked] {slot/port[/sub-port] [-slot/port[/sub-
port]] [,...]} adds ports to a static group entry.
[static|blocked] configures the route to static or
blocked.
stream-limit stream-limit- Configures multicast stream limitation on a VLAN to limit the
max-streams <0-65535> number of concurrent multicast streams on the VLAN. The
default is 4.
stream-limit-group {slot/ Configures multicast stream limitation members on ports of
port[/sub-port] [-slot/ a specific VLAN to limit the number of multicast groups that
port[/sub-port]] [,...]} can join a VLAN. The default max-streams value is 4.
enable max-streams <0-65535>
version <1–3> Configures the version of IGMP for this interface. For IGMP
to function correctly, all routers on a LAN must use the same
version. The default value is 2 (IGMPv2).
Note
When you configure the following IGMP parameters on the DvR enabled interface of a DvR
Controller, the configuration is automatically pushed to the Leaf nodes within the domain.
• ip igmp version
• ip igmp query-interval
• ip igmp query-max-response
• ip igmp robust-value
• ip igmp last-member-query-interval
• ip igmp compatibility-mode
For more information on DvR, see Distributed Virtual Routing on page 688.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Variable definitions
Use the definitions in the following table to use the ip igmp command.
Variable Value
access-list WORD<1– Specifies the name of the access list from 1–64 characters.
64> {A.B.C.D/X} <eny- Creates an access control group entry for a specific IGMP
tx|deny-rx|deny-both|allow- interface. Specify the IP address of the host and the subnet
only-tx|allow-only-rx|allow- mask used to determine the host or hosts covered by this
only-both> configuration. You can use the host subnet mask to restrict
access to a portion of the network for the host.
Indicates the action for the specified IGMP interface. For
example, if you specify deny-both, the interface denies both
transmitted and received traffic
compatibility-mode Activates v2-v3 compatibility mode. The default value is
disabled, which means IGMPv3 is not compatible with
IGMPv2. To use the default configuration, use the default
option in the command:
default ip igmp compatibility-mode
, or use the no option to disable compatibility mode:
no ip igmp compatibility-mode
dynamic-downgrade-version Configures if the system downgrades the version of IGMP
to handle older query messages. If the system downgrades,
the host with IGMPv3 only capability does not work. If you
do not configure the system to downgrade the version of
IGMP, the system logs a warning. The system downgrades
to the oldest version of IGMP on the network by default. To
use the default configuration, use the default option in the
command:
default ip igmp dynamic-downgrade-version
or use the no option to disable downgrade:
no ip igmp dynamic-downgrade-version
igmpv3-explicit-host- Enables explicit host tracking on IGMPv3. The default state is
tracking disabled.
immediate-leave Enables fast leave on a port.
last-member-query-interval Configures the maximum response time (in tenths of a
<0–255> second) inserted into group-specific queries sent in response
to leave group messages. This value is also the time between
group-specific query messages. You cannot configure this
value for IGMPv1.
Decreasing the value reduces the time to detect the loss of
the last member of a group. The default is 10 tenths of a
second. You should configure this value between 3–10 (equal
to 0.3 – 1.0 seconds).
port {slot/port[/sub-port] Configures IGMP for a specific port.
[-slot/port[/sub-port]] Identifies the slot and port in one of the following
[,...]} formats: a single slot and port (slot/port), a range of slots
and ports (slot/port-slot/port), or a series of slots and
ports (slot/port,slot/port,slot/port). If the platform supports
channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
Variable Value
query-interval <1–65535> Configures the frequency (in seconds) at which the VLAN
transmits host query packets. The default value is 125
seconds.
query-max-response <0–255> Configures the maximum response time (in tenths of a
second) advertised in IGMPv2 general queries on this
interface. You cannot configure this value for IGMPv1. Smaller
values enable a router to prune groups faster. The default is
100 tenths of a second (equal to 10 seconds).
Important:
You must configure this value lower than the query-interval.
Important:
To maximize network performance, configure this parameter
according to the version of IGMP currently in use:
• IGMPv1—Disable
• IGMPv2—Enable
• IGMPv3—Enable
Procedure
configure terminal
Warning: Changing the SSM range will cause all spb-multicast and spb-
pim-gw enabled interfaces to be internally bounced. Do you wish to
continue? (y/n) ? (y/n)?
Enter y to continue.
4. Enable the SSM map table for all static entries:
ip igmp ssm-map all
5. Create a static entry for a specific group:
ip igmp ssm-map {A.B.C.D} {A.B.C.D} enable
6. Enable the generation of IGMP traps:
ip igmp generate-trap
7. Enable the generation of IGMP log messages:
ip igmp generate-log
8. Configure the fast leave mode:
ip igmp immediate-leave-mode {multiple-user|one-user}
Example
For the VRF Red context, configure a new IP multicast group address and create an SSM map table
entry for the multicast group and the source at 192.32.99.151. Configure the administrative state to
enable all the static SSM map table entries.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#router vrf red
Switch:1(router-vrf)#ip igmp ssm group-range 232.1.1.10/32
WARNING: Changing the SSM range will cause all spb-multicast and spb-pim-gw enabled
interfaces to be internally bounced. Do you wish to continue? (y/n) ? (y/n)? y
Switch:1(router-vrf)#ip igmp ssm-map 232.1.1.10 192.32.99.151
Switch:1(router-vrf)#ip igmp ssm-map all
Variable definitions
Use the definitions in the following table to use the ip igmp command on a VRF.
Variable Value
generate-log Enables the generation of IGMP log messages. The default is disabled.
generate-trap Enables the generation of IGMP traps. The default is disabled.
immediate-leave- • multiple-user: Removes (from the group) the IGMP member who sent the
mode {multiple- leave message. The default is multiple-user.
user|one-user} • one-user: Removes all group members on a fast leave enabled interface
port after receiving the first leave message from a member.
Variable Value
ssm dynamic- Enables dynamic learning from IGMPv3 reports. The default is enabled.
learning
ssm group-range Changes the SSM range group to define the SSM range. The SSM range
{A.B.C.D/X} parameter extends the default SSM range of 232/8 to include an IP multicast
address.
This parameter specifies an IP multicast address within the range of 224.0.0.0
and 239.255.255.255. The default is 232.0.0.0. The address mask is the IP
address mask of the multicast group. The default is 255.0.0.0.
ssm-map <all Creates a static SSM channel table entry by specifying the group and source
| {A.B.C.D} IP addresses. The IP address is an IP multicast address within the SSM range.
{A.B.C.D} enable The source IP address is an IP host address that sends traffic to the group.
Enables the administrative state for a specific entry (group). This variable does
not affect the dynamically learned entries. This state determines whether the
switch uses the static entry or saves it for future use. The default is enable for
each entry.
Procedure
Example
Switch:1>show sys stats ipmc-threshold-exceeded-cnt
SourceGroupThresholdExceeded : 7372
EgressStreamThresholdExceeded : 7331
A multicast routing protocol optimizes the routing of multicast information to avoid loops and restrict
multicast traffic to networks that use host membership. Examples of multicast routing protocols include
Protocol Independent Multicast–Sparse Mode (PIM–SM) and Protocol Independent Multicast–Source
Specific Multicast (PIM–SSM).
SPBM must not be enabled on the vIST peers or any router participating in the PIM network.
Procedure
1. In the navigation pane, expand the Configuration > Edit > Chassis folders.
2. Click the Boot Config tab.
3. Clear the EnableSpbmConfigMode to disable the boot flag.
The system responds with these messages:
Warning: Please save the configuration and reboot the switch for this
to take effect.
Important
Any change to the EnableSpbmConfigMode boot flag requires a reboot for the change to
take effect.
Note
The MltVistEnable field enables Simplified vIST and is only available when the
EnableSpbmConfigMode boot flag is disabled.
c. Click Insert.
Note
Before you can enable the PIM Infinite Threshold Policy feature, you must first disable the
following:
• PIM-SM
• PIM-SSM
• Simplified vIST
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Select PIM.
3. Select the Globals tab.
4. Select sm (sparse mode).
5. Select the Enable check box.
6. Select Apply.
Name Description
Mode Configures the mode on the routing switch: sm (Sparse Mode) or ssm
(Source Specific Multicast).
Enable Enables or disables PIM.
JoinPruneInterval Specifies how long to wait (in seconds) before the PIM router sends out
the next join or prune message to its upstream neighbors.
The range is from 1–18724 and the default is 60 seconds.
RegisterSuppTimer Specifies how long (in seconds) the designated router suppresses
sending registers to the rendezvous point (RP). The timer starts after
the designated router receives a register-stop message from the RP.
The range is from 6–65535 and the default is 60 seconds.
UniRouteChgTimeOut Specifies how often (in seconds) the switch polls the routing table
manager for unicast routing information updates for PIM.
The range is from 2–65535 and the default is 5 seconds.
Important:
If you lower this value, it increases how often the switch polls the
routing table manager. This value can affect the performance of the
switch, especially if a high volume of traffic flows through the switch.
DiscardDataTimeOut Specifies how long (in seconds) to discard data until the switch
receives a join message from the RP. An IP multicast discard record
is created after a register packet is sent, until the timer expires or the
switch receives a join message.
The range is from 5–65535 and the default is 60 seconds.
CRPADVTimeOut Specifies how often (in seconds) a router configured as a candidate
rendezvous point router (C-RP) sends advertisement messages. After
this timer expires, the C-RP router sends an advertisement message to
the elected bootstrap router (BSR).
The range is from 5–26214 and the default is 60 seconds.
BootStrapPeriod Specifies the interval (in seconds) that the elected BSR waits between
originating bootstrap messages.
The range is from 5–32757 and the default is 60 seconds.
StaticRP Enables or disables the static RP feature. You can use static RP to
configure a static entry for an RP. A static RP permits communication
with switches from other vendors that do not use the BSR mechanism.
FwdCacheTimeOut Specifies the PIM forward cache expiry value in seconds. This value
ages PIM mroutes in seconds. The range is from 10–86400 and the
default value is 210. Topology and hardware conditions can affect the
polling interval and cause an inactive route to remain for up to 12-15
minutes.
Name Description
FastJoinPrune Enables or disables the PIM fast join prune feature.
SptInfiniteThreshold Enables or disables PIM Infinite Threshold Policy, so that multicast
traffic follows the shared tree path through a Rendezvous Point (RP)
Note: Exception: not instead of automatically switching over to shortest path tree (SPT).
supported on XA1400 Series The default value is disabled, which means that multicast traffic is
or VSP 8600 Series. automatically switched over to SPT.
Note
Before you can enable the PIM Infinite Threshold Policy feature, you must first disable the
following:
• PIM-SM
• PIM-SSM
• Simplified vIST
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Select IPv6 PIM.
3. Select the Globals tab.
4. Select the Enable check box.
5. Select sm (sparse mode).
6. Select Apply.
7. Configure PIM Infinite Threshold Policy:
a. To disable PIM, clear the Enable check box, and then click Apply.
b. Select enable, and then click Apply
c. To enable PIM, select the Enable check box, and then click Apply.
Name Description
Enable Enables or disables PIM.
Mode Configures the mode on the routing switch: sm (Sparse Mode) or ssm
(Source Specific Multicast).
Name Description
RegisterSuppTimer Specifies how long (in seconds) the designated router suppresses
sending registers to the rendezvous point (RP). The timer starts after
the designated router receives a register-stop message from the RP.
The range is from 10–65535 and the default is 60 seconds.
UniRouteChgTimeOut Specifies how often (in seconds) the switch polls the routing table
manager for unicast routing information updates for PIM.
The range is from 2–65535 and the default is 5 seconds.
Important:
If you lower this value, it increases how often the switch polls the
routing table manager. This value can affect the performance of the
switch, especially if a high volume of traffic flows through the switch.
DiscardDataTimeOut Specifies how long (in seconds) to discard data until the switch
receives a join message from the RP. An IP multicast discard record
is created after a register packet is sent, until the timer expires or the
switch receives a join message.
The range is from 5–65535 and the default is 60 seconds.
StaticRP Enables or disables the static RP feature. You can use static RP to
configure a static entry for an RP. A static RP permits communication
with switches from other vendors that do not use the BSR mechanism.
FwdCacheTimeOut Specifies the PIM forward cache expiry value in seconds. This value
ages PIM mroutes in seconds. The range is from 10–86400 and the
default value is 210. Topology and hardware conditions can affect the
polling interval and cause an inactive route to remain for up to 12-15
minutes.
JoinPruneInterval Specifies how long to wait (in seconds) before the PIM router sends out
the next join or prune message to its upstream neighbors.
The range is from 1–18724 and the default is 60 seconds.
SptInfiniteThreshold Enables or disables PIM Infinite Threshold Policy, so that multicast
traffic follows the shared tree path through a Rendezvous Point (RP)
Note: Exception: not instead of automatically switching over to shortest path tree (SPT).
supported on XA1400 Series The default value is disabled, which means that multicast traffic is
or VSP 8600 Series. automatically switched over to SPT.
Procedure
Name Description
Enable Enables (true) or disables (false) PIM for the specified port.
Mode Displays the mode currently running on the routing switch.
IntfType Indicates the interface type as active or passive.
HelloInterval Specifies how long to wait (in seconds) before the PIM router
sends out the next hello message to neighboring routers. The
default is 30 seconds. The range is 0-18724 seconds.
JoinPruneInterval Specifies how long to wait (in seconds) before the PIM router
sends out the next join or prune message to its upstream
neighbors. The default is 60 seconds. The range is 1-18724
seconds.
CBSRPreference Configures the preference for this local interface to become a
candidate BSR (C-BSR). The C-BSR with the highest BSR priority
and address is the preferred BSR. The default is –1, which indicates
that the current interface is not a C-BSR. The range is -1-255.
You can also right-click the port and use the Edit IPv6 shortcut menu to reach this same tab.
Procedure
Name Description
Address Specifies the IPv6 address of the PIM interface.
NetMask Specifies the network mask for the IPv6 address of the PIM
interface.
Enable Enables (true) or disables (false) PIM for the specified port.
Mode Displays the mode currently running on the routing switch.
DR Specifies the designated router on this PIM interface.
HelloInterval Specifies how long to wait (in seconds) before the PIM router
sends out the next hello message to neighboring routers. The
default is 30 seconds. The range is 0-18724 seconds.
JoinPruneInterval Specifies how long to wait (in seconds) before the PIM router
sends out the next join or prune message to its upstream
neighbors. The default is 60 seconds. The range is 1-18724
seconds.
OperState Specifies the current operational state of this PIM interface.
Type Specifies the type of interface.
Important
After you enable PIM in SSM mode, the IGMP parameters take effect. To take full
advantage of SSM, enable IGMPv3 if hosts that attach to the switch run IGMPv3 or
configure the SSM table.
SSM is a global configuration. After you enable SSM on a switch, it is enabled on all interfaces that run
PIM. On an SSM-enabled switch, SSM behavior is limited to the SSM group range. For non-SSM groups,
the protocol behavior is PIM-SM.
Procedure
Are you sure you want to change the PIM mode? The traffic will not be
stopped immediately. All Static Source Group entries in the SSM range
will be deleted. Do you wish to continue?
7. Select Yes.
For more information about RIPng, see RIPng Configuration using EDM on page 2834. For more
information about OSPFv3, OSPFv3 Configuration using EDM on page 2575.
• Enable PIM globally.
Important
After you enable IPv6 PIM in SSM mode, the MLD parameters take effect. To take full
advantage of SSM, enable MLDv2 if hosts that attach to the switch run MLDv2.
SSM is a global configuration. After you enable SSM on a switch, it is enabled on all interfaces that run
PIM. On a SSM-enabled switch, SSM behavior is limited to the SSM group range. For non-SSM groups,
the protocol behavior is PIM-SM.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Select IPv6 PIM.
3. Select the Globals tab.
4. Select the Enable check box.
5. Select ssm (source specific multicast).
6. Select Apply.
The system displays the following message:
Procedure
1. In the navigation pane, expand the following folders: Configuration > VLAN.
2. Click VLANs.
3. Click the Basic tab.
4. Select the VLAN ID that you want to configure with PIM.
5. Click IP.
6. Click the PIM tab.
7. Select the Enable check box.
8. Click Apply.
Name Description
Enable Enables (true) or disables (false) PIM.
Mode Displays the mode that currently runs on the switch. The valid
modes are SSM and Sparse. This variable is a read-only field.
IntfType Specifies the type of interface: active or passive.
HelloInterval Specifies how long to wait (in seconds) before the PIM router
sends out the next hello message to neighboring routers. The
default is 30 seconds. The range is 0-18724.
JoinPruneInterval Specifies how long to wait (in seconds) before the PIM router
sends out the next join or prune message to its upstream
neighbors. The default is 60 seconds. The range is 1-18724.
CBSRPreference Configures the preference for this local interface to become a C-
BSR. The C-BSR with the highest BSR priority and address is the
preferred BSR. The default is –1, which indicates that the current
interface is not a C-BSR. The range is -1-255.
Procedure
1. In the navigation pane, expand the following folders: Configuration > VLAN.
2. Click VLANs.
3. Click the Basic tab.
4. Select the VLAN ID that you want to configure with PIM.
5. Click IPv6.
6. Click the PIM tab.
7. Select the Enable check box.
8. Click Apply.
Name Description
IfIndex Specifies the interface index for PIM.
Address Specifies the IPv6 address of the PIM interface.
Netmask Specifies the network mask for the IPv6 address of the PIM
interface.
Enable Enables (true) or disables (false) PIM.
Mode Displays the mode that currently runs on the switch. The valid
modes are SSM and Sparse. This variable is a read-only field.
DR Specifies the designated router on this PIM interface.
HelloInterval Specifies how long to wait (in seconds) before the PIM router
sends out the next hello message to neighboring routers. The
default is 30 seconds. The range is 0-18724.
JoinPruneInterval Specifies how long to wait (in seconds) before the PIM router
sends out the next join or prune message to its upstream
neighbors. The default is 60 seconds. The range is 1-18724.
OperState Specifies the current operational state of this PIM interface.
Type Specifies the type of interface.
Procedure
3. Click IP.
4. Click the IGMP tab.
5. Edit the appropriate values.
Note
When you configure the following IGMP parameters on the DvR Controllers in a DvR
domain, the configuration is automatically pushed to the Leaf nodes within the domain.
• Version
• QueryInterval
• QueryMaxResponseTime
• Robustness
• LastMembQueryIntvl
• CompatibilityModeEnable
For information on DvR, see .
Note
To use the fast leave feature on IGMP, enable explicit-host-tracking.
6. Click Apply.
Name Description
QueryInterval Configures the frequency (in seconds) at which the interface
transmits IGMP host query packets. The range is from 1–65535
and the default is 125.
QueryMaxResponseTime Configures the maximum response time (in tenths of a second)
advertised in IGMPv2 general queries on this interface. You cannot
configure this value for IGMPv1.
Smaller values allow a router to prune groups faster. The range is
from 0–255 and the default is 100 tenths of a second (equal to 10
seconds).
Important:
You must configure this value lower than the QueryInterval.
Robustness Configure this parameter to tune for the expected packet loss of
a network. This value is equal to the number of expected query
packet losses for each serial query interval, plus 1. If you expect
the network to lose query packets, increase the robustness value.
The range is from 2–255 and the default is 2. The default value of
2 means that the switch drops one query for each query interval
without the querier aging out.
Name Description
LastMembQueryIntvl Configures the maximum response time (in 1/10 seconds) inserted
into group-specific queries sent in response to leave group
messages. This value is also the time between group-specific
query messages. You cannot configure this value for IGMPv1.
Decrease the value to reduce the time to detect the loss of the
last member of a group. The range is from 0–255 and the default
is 10 tenths of a second. Configure this parameter to values
greater than 3. If you do not require a fast leave process, Use
values greater than 10. (The value 3 is equal to 0.3 seconds and 10
is equal to 1 second.)
SnoopEnable Enables snoop on the interface. The default is disabled.
SsmSnoopEnable Enables SSM snoop. The default is disabled.
ProxySnoopEnable Enables proxy snoop on the interface. The default is disabled.
Version Configures the version of IGMP (1, 2 or 3) that you want to use on
this interface. For IGMP to function correctly, all routers on a LAN
must use the same version. The default is version 2.
FastLeaveEnable Enables fast leave on the interface.
StreamLimitEnable Enables or disables stream limitation on this port.
Maximum Number Of Stream Configures the maximum number of streams this port permits.
The range is from 0–65535 and the default is 4.
Current Number Of Stream Displays the current number of streams. This variable is a read-
only value.
FastLeavePortMembers Lists ports that are enabled for fast leave.
SnoopMRouterPorts Shows the configuration of ports as multicast router ports. Such
ports attach to a multicast router, and forward multicast data and
group reports to the router.
Important:
Configure this variable only if you use multiple multicast routers
that do not attach to one another, but attach to the VLAN
(technically, an invalid configuration). If multicast routers use a
route between them (the valid configuration) and you configure
this variable, a multicast loop forms.
RouterAlertEnable Instructs the router to ignore IGMP packets that do not contain
the router alert IP option. If you disable this variable (default
configuration), the router processes IGMP packets regardless of
the status of the router alert IP option.
To maximize network performance, configure this parameter
according to the version of IGMP currently in use:
• IGMPv1—Disable
• IGMPv2—Enable
• IGMPv3—Enable
Name Description
DynamicDowngradeEnable Configures if the switch downgrades the version of IGMP to
handle older query messages. If the switch downgrades, the
host with IGMPv3 only capability does not work. If you do not
configure the switch to downgrade the version of IGMP, the switch
logs a warning. The default value is selected (enabled), which
means the switch downgrades to the oldest version of IGMP on
the network.
CompatibilityModeEnable Enables or disables v2-v3 compatibility mode. The default value
is clear (disabled), which means IGMPv3 is not compatible with
IGMPv2.
ExplicitHostTrackingEnable Enables or disables IGMPv3 to track hosts per channel or group.
The default is disabled. You must select this field if you want to
use fast leave for IGMPv3.
Procedure
1. In the navigation pane, expand the following folders: Configuration > VLAN.
2. Click VLANs.
3. Click the Basic tab.
4. Select a VLAN.
5. Click IP.
6. Select IGMP.
7. Configure the relevant variables.
Note
When you configure the following IGMP parameters on the DvR Controllers in a DvR
domain, the configuration is automatically pushed to the Leaf nodes within the domain.
• Version
• QueryInterval
• QueryMaxResponseTime
• Robustness
• LastMembQueryIntvl
• CompatibilityModeEnable
Configuration of IGMP snooping is not supported on DvR enabled Layer 2 VSNs.
8. Click Apply.
Name Description
QueryInterval Configures the frequency (in seconds) at which the IGMP host
query packets transmit on the interface. The range is from 1–
65535 and the default is 125.
QueryMaxResponseTime Configures the maximum response time (in tenths of a second)
advertised in IGMPv2 general queries on this interface. You cannot
configure this value for IGMPv1.
Smaller values allow a router to prune groups faster. The range is
from 0–255 and the default is 100 tenths of a second (equal to 10
seconds.)
Important:
You must configure this value lower than the QueryInterval.
Robustness Configure this parameter to tune for the expected packet loss of
a network. This value is equal to the number of expected query
packet losses for each serial query interval, plus 1. If you expect
the network to lose query packets, increase the robustness value.
The range is from 2–255 and the default is 2. The default value of
2 means that the switch drops one query for each query interval
without the querier aging out.
LastMembQueryIntvl Configures the maximum response time (in tenths of a second)
inserted into group-specific queries sent in response to leave
group messages. This value is also the time between group-
specific query messages. You cannot configure this value for
IGMPv1.
Decreasing the value reduces the time to detect the loss of the
last member of a group. The range is from 0–255 and the default
is 10 tenths of a second. Configure this parameter to values
greater than 3. If you do not require a fast leave process, use
values greater than 10. (The value 3 is equal to 0.3 seconds, and 10
is equal to 1 second.)
SnoopEnable Enables snoop on the interface. The default is disabled.
SsmSnoopEnable Enables SSM snoop. The default is disabled.
ProxySnoopEnable Enables proxy snoop on the interface. The default is disabled.
Version Configures the version of IGMP (1, 2, or 3) that you want to use on
this interface. For IGMP to function correctly, all routers on a LAN
must use the same version. The default is version 2.
FastLeaveEnable Enables or disables fast leave on the interface.
StreamLimitEnable Enables or disables stream limitation on this VLAN.
Maximum Number Of Stream Configures the maximum number of streams allowed on this
VLAN. The range is from 0–65535 and the default is 4.
Current Number Of Stream Displays the current number of streams. This value is a read-only
value.
FastLeavePortMembers Lists ports that are enabled for fast leave.
Name Description
SnoopMRouterPorts Shows the configuration of ports as multicast router ports. Such
ports attach to a multicast router, and forward multicast data and
group reports to the router.
Important:
Configure this field only if you use multiple multicast routers that
do not attach to one another, but attach to the VLAN (technically,
an invalid configuration). If multicast routers use a route between
them (the valid configuration) and you configure this variable, a
multicast loop forms.
RouterAlertEnable Instructs the router to ignore IGMP packets that do not contain
the router alert IP option. If you disable this variable (default
configuration), the router processes IGMP packets regardless of
the status of the router alert IP option.
To maximize network performance, configure this parameter
according to the version of IGMP currently in use:
• IGMPv1—Disable
• IGMPv2—Enable
• IGMPv3—Enable
MLD Fundamentals
MLD is an asymmetric protocol. It specifies separate behaviors for multicast address listeners (that is,
hosts or routers that listen to multicast packets) and multicast routers. Each multicast router learns, for
each directly attached link, which multicast addresses and which sources have listeners on that link. The
information that MLD gathers is provided to the multicast routing protocols that the router uses. This
information ensures that multicast packets arrive at all links where listeners require such packets.
A multicast router can itself be a listener of one or more multicast addresses; that is, the router
performs both the multicast router role and the multicast address listener part of the protocol. The
router collects the multicast listener information needed by the multicast routing protocol and informs
itself and other neighboring multicast routers of the listening state.
MLD versions
The purpose of the MLD protocol in the IPv6 multicast architecture is to allow an IPv6 router to discover
the presence of multicast listeners on directly-attached links and to discover which multicast addresses
are of interest to neighboring nodes. MLD is the direct IPv6 replacement for the IGMP protocol used in
IPv4. The MLD implementation described in this document is based on the MLDv2 standard, which is a
backward-compatible update to the MLDv1 standard.
There are three versions of IGMP, and two versions of MLD. IGMPv2 is equivalent in function to MLDv1
and IGMPv3 is equivalent to MLDv2.
MLD Querier
MLD Querier is similar to IGMP querier. A multicast query router communicates with hosts on a local
network by sending MLD queries. This router periodically sends a general query message to each local
network of the router. This is standard multicast behavior.
Note
Queries are sent only if PIM is enabled globally and on the interface. PIM and snooping cannot
be enabled at the same time.
Each VLAN using MLD multicast must have a router performing multicast queries. Networks with no
stand-alone devices currently have no capability for implementing the pruning of multicast traffic. A
dedicated querier must be available on the network.
There are several behavioral differences between a traditional query router and a switch or stack using
the MLD Querier functionality. The following are the differences:
• There is no election process. When a switch or stack restarts, queries are sent as part of MLD startup.
This process stops other devices from sending queries while they detect the new device starting up.
The last active device sending queries on the network is the active one. This is not the case with
Layer 3 MLD behavior.
• If the current active device stops sending queries, a timeout period must elapse before another
device takes over. This can result in an ageout of groups, and subsequent flooding, before a new
query is sent and the pruning process restarts. This occurs only during the transition between active
query devices. Once the new device is established, queries are sent as configured in the Query
Interval and Robust Values fields.
• Multiple active query devices are not supported. Enabling multiple devices establishes one active
device and other devices listening to take over should the active device fail.
The querier version is determined by the received query version and establishes the interface
operational version. By default, the interface operational version is MLDv1. If the interface operational
version is downgraded from MLDv2 to MLDv1 (when operational version is MLDv2 and a MLDv1 query is
received), then all MLDv2 listeners (registered by MLDv2 reports) are removed and all incoming MLDv2
reports are dropped.
MLD snooping
MLD snooping is an IPv6 multicast constraining mechanism running on Layer 2 devices. When MLD
snooping is enabled on a VLAN, the switch examines the MLD messages between hosts and multicast
routers and learns which hosts are interested in receiving traffic for a multicast group. Based on the
learning, the switch forwards multicast traffic only to those interfaces in the VLAN that are connected to
the interested receivers instead of flooding traffic to all the interfaces.
The following figure shows an example of this scenario. On the left side of the figure, IPv6 multicast
packets are transmitted when MLD snooping is not enabled. All the hosts that are interested and not
interested receive the IP Multicast traffic consuming bandwidth. Whereas, on the right side of the figure,
when MLD snooping is enabled and IPv6 multicast packets are transmitted, only the interested hosts
receive the IP multicast packets.
Figure 153: IPv6 multicast packet transmission when MLD snooping is enabled and not enabled
The following figure shows IPv6 multicast packets transmitted when MLD v2 snooping is enabled and
not enabled.
Figure 154: IPv6 multicast packet transmission when MLD v2 snooping is enabled and not enabled
You can perform the following configurations to manage and control IPv6 multicast groups using the
MLD snooping feature:
• Enable or disable MLD snooping on each VLAN. MLD snooping can be enabled on a maximum of 512
VLANs.
• Enable IGMP snooping and MLD snooping on the same VLAN.
Limitations
MLD snooping shares the (S,G,V) entries with IGMP snooping, where the (S,G,V) entries number =
(G,V) MLD_V1 type entries number + (S,G,V) MLD_V2 type entries number + (*,G,V) MLD_V2 type
entries number + number of groups without (*,G,V) registered listeners.
• IPv6 MLD proxy functionality is not supported.
• Multicast Flood Control (MFC) is not supported.
Procedure
configure terminal
2. Enable MLD trap generation:
ipv6 mld generate-trap
3. Disable MLD trap generation:
no ipv6 mld generate-trap
4. Set MLD trap enable status to default:
default ipv6 mld generate-trap
Procedure
configure terminal
2. Enable MLD log status:
ipv6 mld generate-log
3. Disable MLD log status:
no ipv6 mld generate-log
4. Set MLD log enable status to default:
default ipv6 mld generate-log
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Note
For MLD to function correctly, the MLD version must be the same on all routers in the
network.
Variable Definitions
The following table describes the variables for the ipv6 mld version command.
Variable Value
<1–2> Indicates the version of MLD that runs on this
interface.
Use this procedure to configure the last listener query interval in seconds for the MLD interface.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Variable Definitions
The following table describes the variables for the ipv6 mld last-listener-query-interval
command.
Variable Value
<0–60> Indicates the last listener query interval in
seconds.
Use this procedure to configure the query interval for the MLD interface.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Variable Definitions
The following table describes the variables for the ipv6 mld query-interval command.
Variable Value
<1-65535> Indicates the frequency at which MLD host query
packets transmit on this interface.
Use this procedure to configure the query maximum response time for mld interface.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Variable Definitions
The following table describes the variables for the ipv6 mld query-max-response-time
command.
Variable Value
<0–60> Indicates the query maximum response interval
time in seconds.
The robustness value allows the tuning for the expected packet loss on a link. If a link expects packet
loss, increase the robustness variable value.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Variable Definitions
The following table describes the variables for the ipv6 mld robust-value command.
Variable Value
<2–255> Specifies a numerical value for MLD snooping
robustness.
Procedure
configure terminal
Procedure
1. Enter VLAN Interface Configuration mode:
enable
configure terminal
Use this procedure to display information about the MLD snooping configuration for the switch.
Procedure
1. Enter Privileged EXEC mode:
enable
2. Display the switch MLD snooping configuration status:
show ipv6 mld snooping
Example
Switch:1#show ipv6 mld snooping
================================================================================
Mld Snooping - GlobalRouter
================================================================================
IFINDEX SNOOP SSM ACTIVE MROUTER
ENABLE SNOOP MROUTER EXPIRATION
ENABLE PORTS TIME
--------------------------------------------------------------------------------
V666 False False NONE 0
1 out of 1 entries displayed
Procedure
1. Enter Privileged EXEC mode:
enable
Example
Switch:1#show ipv6 mld snoop-trace
============================================================
Mld Snoop Trace - GlobalRouter
============================================================
GROUP/
SOURCE IN IN OUT OUT TYPE
ADDRESS VLAN PORT VLAN PORT
------------------------------------------------------------
ff10:0:0:0:0:0:0:1/ 10 2/15 10 3/16 ACCESS
5051:0:0:0:0:1:84:51
Procedure
1. Enter Privileged EXEC mode:
enable
2. Display MLD interface information:
show ipv6 mld interface [gigabitethernet {slot/port[/sub-port]}] [vlan
<1-4059>]
Examples
Switch:1#show ipv6 mld interface
==========================================================================================
Mld Interface - GlobalRouter
==========================================================================================
IF STATUS VERS OPER VERS QUERIER Wrong Query JOINS MODE
------------------------------------------------------------------------------------------
P6/3 inact 2 2 2001:0db8:3c4d:0015:0000:0000:1a2f:1aaa 0 0 pim
V666 inact 2 2 2001:0db8:3c4d:0015:0000:0000:1a2f:1bbb 0 0 pim
================================================================================
PORT QUERY QUERY ROBUST VERSION LAST DYNAMIC
NUM INTVL MAX LIST DOWNGRADE
RESP QUERY
--------------------------------------------------------------------------------
1/11 125 10 2 1 1 enabled
Variable Definitions
The following table describes the variables for the show ipv6 mld interface command.
Variable Value
vlan <1-4059> Displays MLD snooping information for the
configured VLANs.
gigabitEthernet {slot/port[/sub-port]} Displays MLD snooping information on a specific
interface.
Use this procedure to display information about the MLD traps and logs.
Procedure
1. Enter Privileged EXEC mode:
enable
2. Display the system parameters:
show ipv6 mld sys
Example
Switch:1#show ipv6 mld sys
================================================================================
Mld System Parameters - GlobalRouter
================================================================================
generate-trap : disable
generate-log : disable
Use this procedure to display the learned multicast groups in the cache.
Procedure
1. Enter Privileged EXEC mode:
enable
2. Display the learned multicast groups in the cache:
show ipv6 mld cache
Example
Switch:1#show ipv6 mld cache
==========================================================================================
MLD Cache Information
==========================================================================================
==========================================================================================
GRPADDRESS/LASTREPORTER INTERFACE EXPIRATION
------------------------------------------------------------------------------------------
ff03:0:0:0:0:0:0:0/ Vlan10 0 day(s), 00h:04m:12s
fe80:0:0:0:200:9aff:fe68:3dd5
Use this procedure to display the MLD group information to show the learned multicast groups and the
attached ports.
Procedure
Examples
Switch:1#show ipv6 mld group
================================================================================
Mld Group - GlobalRouter
================================================================================
GRPADDR/MEMBER INPORT EXPIRATION
--------------------------------------------------------------------------------
ff1e:0000:0000:0000:0000:0000:0002:4444/ V666-6/41 0
2001:0db8:3c4d:0015:0000:0000:1a2f:1a2c
================================================================================
Mld Group Detail - GlobalRouter
================================================================================
Interface: Vlan666-6/41
MLDv2 Group: ff1e:0000:0000:0000:0000:0000:0002:4444
Interface Group Mode: EXCLUDE
Interface Compatibility Mode: MLD_V2
Interface Group Timer: 258
V1 Host Timer: Not Running
Interface Group Include Source List:
Source Address Expires
2001:0db8:3c4d:0015:0000:0000:1a2f:1aaa 258
Interface Group Exclude Source List :
Source Address Expires
2001:0db8:3c4d:0015:0000:0000:1a2f:1bbb N/A
Procedure
Note
This step only applies to VSP 8600 Series.
Example
Use the following procedure to configure MLD parameters for the switch.
Procedure
Use the data in the following table to use the Globals tab.
Field Description
GenerateTrap Enables MLD to generate traps.
GenerateLog Enables MLD to generate logs.
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 MLD.
3. Click the Ssm Globals tab.
Use the data in the following table to use the Ssm Globals tab.
Field Description
RangeGroup Specifies the ssm range.
RangeMask Specifies the ssm range mask.
Procedure
Use the data in the following table to use the Interfaces tab.
Field Description
IfIndex Specifies the internetwork layer interface value of
the interface for which MLD is enabled.
QueryInterval Specifies the frequency at which MLD host-query
packets are transmitted on this interface. Values
range from 1 to 65535.
Version Indicates the MLD version.
Querier Specifies the address of the MLD Querier on the
IPv6 subnet to which this interface is attached.
Field Description
QueryMaxResponseDelay Specifies the maximum query response time
advertised in MLD queries on this interface. Values
range from 0 to 60.
Joins Specifies the number of times a group
membership has been added on this interface.
Groups Specifies the current number of entries for this
interface in the cache table.
Robustness Specifies the robustness variable tuning for the
expected packet loss on a subnet. If a subnet
is expected to experience loss, the robustness
variable can be increased. Values range from 2 to
255.
LastListenQueryIntvl Specifies the maximum response delay inserted
into the group-specific queries sent in response
to the leave group messages. It also indicates
the amount of time between group-specific query
messages. Values range from 0 to 60.
This value can be tuned to modify the leave
latency of the network. A reduced value results
in reduced time to detect the loss of the last
member of a group.
SnoopEnable Indicates if snooping is enabled.
FlushAction Specifies the MLD flush action as one of the
following:
• flushGrpMember
• flushMrouter
• flushSender
Procedure
Use the data in the following table to use the MLD tab.
Field Description
QueryInterval Specifies the frequency at which MLD host-query
packets are transmitted on this interface. Values
range from 1 to 65535.
Version Indicates the MLD version.
Querier Specifies the address of the MLD Querier on the
IPv6 subnet to which this interface is attached.
QueryMaxResponseDelay Specifies the maximum query response time
advertised in MLD queries on this interface. Values
range from 0 to 60.
Joins Specifies the number of times a group
membership has been added on this interface.
Groups Specifies the current number of entries for this
interface in the cache table.
Robustness Specifies the robustness variable tuning for the
expected packet loss on a subnet. If a subnet
is expected to experience loss, the robustness
variable can be increased. Values range from 2 to
255.
LastListenQueryIntvl Specifies the maximum response delay inserted
into the group-specific queries sent in response
to the leave group messages. It also indicates
the amount of time between group-specific query
messages. Values range from 0 to 60.
This value can be tuned to modify the leave
latency of the network. A reduced value results
in reduced time to detect the loss of the last
member of a group.
SnoopEnable Indicates if snooping is enabled.
FlushAction Specifies the MLD flush action as one of the
following:
• flushGrpMember
• flushMrouter
• flushSender
Field Description
SsmEnable Indicates if ssm is enabled.
NewQuerier Specifies the IPv6 address of the new MLD querier.
DynamicDowngradeEnable Enables dynamic downgrade of the MLD version
when older version query message is received.
OperVersion Specifies the operational version of the MLD
running on this interface.
McastMode Specifies the MLD interface mode as one of the
following:
• snoop
• pim
• snoopSpb
• routerSpb
• dvmrp
• none
Procedure
Use the data in the following table to use the MLD tab.
Field Description
QueryInterval Specifies the frequency at which MLD host-query
packets are transmitted on this interface. Values
range from 1 to 65535.
Version Indicates the MLD version.
Querier Specifies the address of the MLD Querier on the
IPv6 subnet to which this interface is attached.
QueryMaxResponseDelay Specifies the maximum query response time
advertised in MLD queries on this interface. Values
range from 0 to 60.
Field Description
Joins Specifies the number of times a group
membership has been added on this interface.
Groups Specifies the current number of entries for this
interface in the cache table.
Robustness Specifies the robustness variable tuning for the
expected packet loss on a subnet. If a subnet
is expected to experience loss, the robustness
variable can be increased. Values range from 2 to
255.
LastListenQueryIntvl Specifies the maximum response delay inserted
into the group-specific queries sent in response
to the leave group messages. It also indicates
the amount of time between group-specific query
messages. Values range from 0 to 60.
This value can be tuned to modify the leave
latency of the network. A reduced value results
in reduced time to detect the loss of the last
member of a group.
SnoopEnable Indicates if snooping is enabled.
FlushAction Specifies the MLD flush action as one of the
following:
• flushGrpMember
• flushMrouter
• flushSender
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 MLD.
3. Click Snooping tab.
4. Select a value, double-click the cell in SnoopEnable column, select True or False.
5. Select a value, double-click the cell in SsmEnable column, select True or False.
6. Click Apply.
Use the data in the following table to use the Snooping tab.
Field Description
IfIndex Specifies the interface on which you enabled MLD
snooping. It specifies the port number if the
interface is a brouter port or the VLAN number
if the interface is a VLAN.
SnoopEnable Indicates the status of MLD snooping on the
specified interface:
• True – MLD snooping is enabled
• False – MLD snooping is disabled
Use this procedure to display information about the multicast groups traversing the snoop enabled
router.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 MLD.
3. Click the Snoop Trace tab.
Use the data in the following table to use the Snoop Trace tab.
Field Description
GrpAddr Specifies the IP multicast address of the group
traversing the router.
SrcAddr Specifies the IP source address of the multicast
group address.
Field Description
OutVlan Specifies the egress VLAN ID for the multicast
group.
OutPort Specifies the egress port of the multicast group.
InVlan Specfies the ingress VLAN ID for the multicast
source.
InPort Specifies the ingress port for the multicast group.
Type Specifies the port type on which the snoop entry
is learnt.
Use this procedure to display information about the learned multicast groups in the cache.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 MLD.
3. Click the Cache tab.
Use the data in the following table to use the Cache tab.
Field Description
Address The IPv6 multicast group address for which this
entry contains information.
IfIndex Indicates the internetwork-layer interface for
which this entry contains information for an IPv6
multicast group address.
LastReporter Indicates the source IPv6 address of the last
membership report received for this IPv6 Multicast
group address on this interface. If membership
report is not received, the value is 0::0
ExpiryTime Indicates the minimum amount of time remaining
before the entry ages out.
Use this procedure to display information about the MLDv2 corresponding to each interface, port and
multicast group paired on a router.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 MLD.
Use the data in the following table to use the V2 Cache tab.
Field Description
GroupAddress Specifies the multicast group address that others
want to join. A group address can be the same for
many incoming ports.
Ifindex Identifies a physical interface or a logical interface
(VLAN), which has received group reports from
various sources.
InPort Identifies a physical interface or a logical interface
(VLAN), which has received group reports from
various sources.
Version1HostTimer Specifies the time remaining until the local router
assumes that there are no more MLDv1 members
on the IP subnet attached to the interface. This is
applicable only for MLDv1 hosts. Upon receiving
an MLDv1 report, this value is reset to the group
membership timer.
SourceFilterMode Specifies the current group state applicable on
MLDv2 compatible nodes.
Procedure
Use the data in the following table to use the Host Cache tab.
Name Description
IfIndex Shows the index value that uniquely identifies the
interface to which this entry applies.
GrpAddress Shows the IP address for the multicast group.
GrpLocallyRegistered Shows the Group Locally Registered for an IPv6
MLD host-cache entry.
GrpLastReporter Shows the Group Last Reporter address for an
IPv6 MLD host-cache entry.
GrpUpTime Shows the Group Uptime for an IPv6 MLD host-
cache entry.
Name Description
GrpExpiryTime Shows the Group Expiry Time for an IPv6 MLD
host-cache entry.
GrpFilterMode Shows the Group Filter Mode for an IPv6 MLD
host-cache entry.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 MLD.
3. Click the Source tab.
Use the data in the following table to use the Source tab.
Field Description
GroupAddress Specifies the IPv6 multicast group address for
which this entry contains information.
Ifindex Specifies the interface for which this entry
contains information for an IP multicast group
address.
InPort Identifies a physical interface or logical interface
(VLAN), which has received group reports for this
source.
HostAddress Specifies the host address to which this entry
corresponds.
MemberAddress Specifies the IPv6 address of a member that has
sent source specific report wishing to join this
source.
Expire Specifies the state of this entry.
Mode Specifies the current member state. This is
applicable to MLDv2 compatible nodes.
MemberExpire Specifies the time until the member for this source
expires.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 MLD.
3. Click the Sender tab.
Use the data in the following table to use the Sender tab.
Field Description
GrpAddr Specifies the IPv6 multicast group address.
Ifindex Specifies the interface index of the sender.
MemberAddr Specifies the IPv6 host address.
Action Specifies the MLD action as one of the following:
• none
• flushEntry
• flushGrp
Use this procedure to display information about the groups configured in this device.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 MLD.
3. Click the Group tab.
Use the data in the following table to use the Group tab.
Field Description
IPv6Address Specifies the multicast group address that others
want to join to. A group address can be the same
for many incoming ports.
Members Specifies the IP address of a source that has sent
group report whishing to join this group.
InPort Identifies a physical interface or a logical interface
which has received group reports from various
sources.
Field Description
Expiration Specifies the time left before group report expires
on this port. This is updated upon receiving a
group report.
IfIndex Identifies a physical interface or a logical interface
which has received group reports from various
sources.
Important
The spbm-config-mode boot flag must be disabled before you can configure PIM or IGMP.
To verify the setting, enter show boot config flags in Privileged EXEC mode.
For more information, see IP routing configuration using the CLI on page 1848.
• Configure a unicast protocol, for example, Routing Information Protocol (RIP) or Open Shortest Path
First (OSPF), globally and on the interfaces where you want to configure PIM-SM.
For more information about RIP, see RIP configuration using CLI on page 2809. For more
information about OSPF, see OSPF configuration using CLI on page 2468.
• Enable PIM-SM globally.
• Enable PIM-SM on individual interfaces.
• You must first configure and enable PIM on an IP interface, which can be circuitless, before you
can utilize that interface as a candidate rendezvous point (RP). To configure PIM-SM RP for an IP
interface, see Configuring a candidate rendezvous point on page 1595.
• Configure one or more bootstrap routers (BSR) to propagate RP information to all switches in the
network.
For more information about RIPng, see RIPng Configuration using CLI on page 2819. For more
information about OSPFv3, see OSPFv3 Configuration using CLI on page 2511.
• Enable IPv6 PIM-SM globally
• Enable IPv6 PIM-SM on individual interfaces.
The command you use depends on the required administrative state of the interface (enable or disable).
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Variable definitions
Use the data in the following table to use the ip pim command.
Variable Value
active Configures the selected interface. You can change
the state of a PIM interface after you create
the interface but only if you first disable PIM
on the interface. An active interface permits
PIM control transmitted and received traffic. A
passive interface prevents PIM control traffic from
transmitting or receiving, thereby reducing the
load on a system. This feature is useful if a high
number of PIM interfaces exist and connect to end
users, not to other switches. The default is active.
To configure this option to the default value, use
the default operator with the command.
passive Configures the selected interface. You can change
the state of a PIM interface after you create
the interface but only if you first disable PIM
on the interface. An active interface permits
PIM control transmitted and received traffic. A
passive interface prevents PIM control traffic from
transmitting or receiving, thereby reducing the
load on a system. This feature is useful if a high
number of PIM interfaces exist and connect to end
users, not to other switches. The default is active.
To configure this option to the default value, use
the default operator with the command.
The command you use depends on the required administrative state of the interface (enable or disable).
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
OR
ip pim enable
The second command enables an active interface only if this is the first PIM interface you create on
the port or VLAN or you created an active interface in the disabled state. If you already created a
passive interface in the disabled state, the second command enables that passive interface.
Variable definitions
Use the data in the following table to use the ip pim command.
Variable Value
active Configures the selected interface. You can change
the state of a PIM interface after you create
the interface but only if you first disable PIM
on the interface. An active interface permits
PIM control transmitted and received traffic. A
passive interface prevents PIM control traffic from
transmitting or receiving, thereby reducing the
load on a system. This feature is useful if a high
number of PIM interfaces exist and connect to end
users, not to other switches. The default is active.
To configure this option to the default value, use
the default operator with the command.
passive Configures the selected interface. You can change
the state of a PIM interface after you create
the interface but only if you first disable PIM
on the interface. An active interface permits
PIM control transmitted and received traffic. A
passive interface prevents PIM control traffic from
transmitting or receiving, thereby reducing the
load on a system. This feature is useful if a high
number of PIM interfaces exist and connect to end
users, not to other switches. The default is active.
To configure this option to the default value, use
the default operator with the command.
Procedure
configure terminal
2. Configure the PIM virtual neighbor:
ip pim virtual-neighbor <A.B.C.D> <A.B.C.D>
Example
Variable definitions
Use the definitions in the following table to use the ip pim virtual-neighbor command.
Variable Value
{A.B.C.D} {A.B.C.D} The first IP address indicates the IP address of the selected
interface. The second IP address indicates the IP address of the
neighbor.
You can configure only one interface on the switch for multiple groups. You cannot configure multiple
interfaces for multiple groups.
With the mask value, you can configure a C-RP router for several groups in one configuration.
For example, if you use a C-RP configuration with a group address of 224.0.0.0 and a group mask of
240.0.0.0, you can configure the C-RP router for a multicast range from 224.0.0.0 to 239.255.255.255.
Procedure
configure terminal
2. Add a candidate rendezvous point:
ip pim rp-candidate group <A.B.C.D> <A.B.C.D> rp <A.B.C.D>
3. Remove a candidate rendezvous point:
no ip pim rp-candidate group <A.B.C.D> <A.B.C.D>
4. Display information about the candidate rendezvous points for the PIM-SM domain:
show ip pim rp-candidate
Example
Variable definitions
Use the definitions in the following table to use the ip pim rp-candidate command.
Variable Value
group {A.B.C.D} Specifies the IP address and the address mask of the multicast
{A.B.C.D} group. After the IP address and group mask are combined, it
identifies the prefix that the local router uses to advertise itself as
a C-RP router.
rp {A.B.C.D} Specifies the IP address of the C-RP router. This address must be
one of the local PIM-SM enabled interfaces.
Configuring static RP
Configure a static RP to ignore the bootstrap router (BSR) mechanism and use the statically configured
RPs.
Static RP-enabled switches use this feature to communicate with switches from other vendors that do
not use the BSR.
Important
You cannot configure a static RP-enabled switch as a BSR or as a C-RP router.
All dynamically learned BSR information is lost. However, if you disable static RP, the switch
loses the static RP information and regains the BSR functionality.
Procedure
configure terminal
2. Enable static RP:
ip pim static-rp
3. Enter y.
4. Configure a static RP entry:
ip pim static-rp {A.B.C.D/X} {A.B.C.D}
5. Configure all the switches in the network (including switches from other vendors) to map to the
same RP.
6. Display information about the candidate rendezvous points for the PIM-SM domain:
show ip pim static-rp
Example
Variable definitions
Use the definitions in the following table to use the ip pim static-rp command.
Variable Value
{A.B.C.D/X} Specifies the IP address and address mask of the multicast
group. When combined, the IP address and address mask
identify the range of the multicast addresses that the RP
handles.
{A.B.C.D} Specifies the IP address of the static RP.
Procedure
configure terminal
2. Enable static RP:
ipv6 pim static-rp
3. Configure an IPv6 static RP entry:
ipv6 pim static-rp WORD<0-255> WORD<0-255>
4. Configure all the switches in the network (including switches from other vendors) to map to the
same RP.
5. Display information about the candidate rendezvous points for the PIM-SM domain:
show ipv6 pim static-rp
Variable Definitions
The following table describes the variables for the ipv6 pim static-rp command.
Variable Value
WORD<0-255> Specifies the IPv6 address and address mask of
the multicast group. When combined, the IPv6
address and address mask identify the range of
the multicast addresses that the RP handles.
WORD<0-255> Specifies the IPv6 address of the static RP.
The C-BSR with the highest configured preference becomes the BSR for the domain. If two C-BSRs use
equal preference, the candidate with the higher IP address becomes the BSR. If you add a new C-BSR
with a higher preference to the domain, it automatically becomes the new BSR.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Variable definitions
Use the definitions in the following table to use the ip pim bsr-candidate command.
Variable Value
preference <0–255> Activates the C-BSR on this interface and configures its
preference value, from 0–255, to become a BSR. The C-BSR
with the highest BSR preference and address is the preferred
BSR. The default is –1, which indicates that the current
interface is not a C-BSR. To set this option to the default
value, use the default operator with the command.
The C-BSR with the highest configured preference becomes the BSR for the domain. If two C-BSRs use
equal preference, the candidate with the higher IP address becomes the BSR. If you add a new C-BSR
with a higher preference to the domain, it automatically becomes the new BSR.
Procedure
configure terminal
Example
Variable definitions
Use the definitions in the following table to use the ip pim bsr-candidate command.
Variable Value
preference <0–255> Activates the C-BSR on this interface and configures its
preference value, from 0–255, to become a BSR. The C-BSR
with the highest BSR preference and address is the preferred
BSR. The default is –1, which indicates that the current
interface is not a C-BSR. To configure this option to the
default value, use the default operator with the command.
Important
The following command also activates full-mesh configurations.
Note
This procedure is supported only on a DvR Controller. It is not supported on a DvR Leaf node.
Procedure
configure terminal
2. Enable square-SMLT:
multicast smlt-square
Important
The EnableSpbmConfigMode boot flag must be disabled before you can configure PIM or
IGMP. To verify the setting, navigate to Configuration > Edit > Chassis and click on the Boot
Config tab.
For more information, see IP routing configuration using Enterprise Device Manager on page 1876.
• Configure a unicast protocol, for example, Routing Information Protocol (RIP) or Open Shortest Path
First (OSPF), globally and on the interfaces where you want to configure PIM-SM.
For more information about RIP, see RIP configuration using EDM on page 2824. For more
information about OSPF, see OSPF configuration using EDM on page 2538.
• Enable PIM-SM globally.
• Enable PIM-SM on individual interfaces.
• Configure one or more rendezvous points (RP) for the groups that multicast applications use in the
network.
Important
If you configure the rendezvous point (RP) to be the address of a circuitless IP (CLIP)
interface, then you must first configure and enable PIM on the CLIP interface before you
can utilize that interface as a candidate RP. To configure a PIM-SM RP for a circuitless IP
interface, see Configuring a candidate RP on page 1611.
• Configure one or more bootstrap routers (BSR) to propagate RP information to all switches in the
network.
Enabling static RP
Enable static RP to avoid the process of selecting an active RP from the list of candidate RPs and
dynamically learning about RPs through the BSR mechanism.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click PIM.
3. Click the Globals tab.
4. Select sm (sparse mode).
5. Select Enable.
6. Select Static RP.
7. Click Apply.
The system displays the following message:
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 PIM.
3. Click the Globals tab.
4. Select sm (sparse mode).
5. Select Enable.
6. Select Static RP.
7. Click Apply.
8. Click Yes.
Configuring a static RP
Configure a static RP to ignore the BSR mechanism and use the statically configured RPs only. A static
RP-enabled switch uses this feature to communicate with switches from other vendors that do not use
the BSR mechanism.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click PIM.
3. Click the Static RP tab.
4. Click Insert.
5. Type the required information in each box.
6. Click Insert.
Name Description
GroupAddress Configures the IP address of the multicast group. When combined
with the group mask, this value identifies the range of the
multicast addresses that the RP handles.
GroupMask Configures the address mask of the multicast group. When
combined with the group address, this value identifies the range
of the multicast addresses that the RP handles.
Address Configures the IP address of the static RP.
Status Shows the current status of the static RP entry. The status is valid
if the switch uses a unicast route to the network for the static RP
and is invalid otherwise.
Job aid
Keep in mind the following configuration considerations:
• Static RPs do not age; they cannot time out.
• Switches do not advertise static RPs, so, if a new PIM neighbor joins the network, it does not know
about the static RP unless you configure it with that static RP.
• Configure all the switches in the network (including switches from other vendors) to map to the
same RP for certain group range.
• To avoid a single point of failure, you can configure redundant static RPs for the same group prefix.
If you use a mix of vendor switches across the network, ensure that all switches or routers use the
same active RP because vendors use different algorithms to elect the active RP. This switch uses
the hash function defined in the PIM-SM standard to elect the active RP; other vendors can use the
lowest IP address to elect the RP.
• Static RP on the switch is active as long as the switch uses a unicast route to the network for the
static RP. If the switch loses this route, the static RP is invalidated, and the hash algorithm is invoked
to remap all affected groups. If the switch regains this route, the static RP is validated and the hash
algorithm is invoked to remap the affected groups.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
Name Description
GroupAddress Configures the IPv6 address of the multicast group. When
combined with the group mask, this value identifies the range
of the multicast addresses that the RP handles.
GroupMask Configures the address mask of the multicast group. When
combined with the group address, this value identifies the range
of the multicast addresses that the RP handles.
Address Configures the global IPv6 address of the static RP.
Status Shows the current status of the static RP entry. The status is valid
if the switch uses a unicast route to the network for the static RP.
Job aid
Keep in mind the following configuration considerations:
• Static RPs do not age; they cannot time out.
• Switches do not advertise static RPs, so, if a new PIM neighbor joins the network, it does not know
about the static RP unless you configure it with that static RP.
• Configure all the switches in the network (including switches from other vendors) to map to the
same RP for certain group range.
• To avoid a single point of failure, you can configure redundant static RPs for the same group prefix.
If you use a mix of vendor switches across the network, ensure that all switches or routers use the
same active RP because vendors use different algorithms to elect the active RP. This switch uses
the hash function defined in the PIM-SM standard to elect the active RP; other vendors can use the
lowest IP address to elect the RP.
• Static RP on the switch is active as long as the switch uses a unicast route to the network for the
static RP. If the switch loses this route, the static RP is invalidated, and the hash algorithm is invoked
to remap all affected groups. If the switch regains this route, the static RP is validated and the hash
algorithm is invoked to remap the affected groups.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click PIM.
Name Description
GroupAddress Shows the IP address of the multicast group.
Address Shows the IP address of the RP router. This
address must be one of the local PIM-SM enabled
interfaces.
Priority Shows the priority of the RP.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 PIM.
3. Click the Active RP tab.
Name Description
GroupAddress Shows the IPv6 address of the multicast group.
Address Shows the IPv6 address of the RP router. This
address can be one of the local PIM-SM enabled
interfaces or any reachable global IPv6 address
configured using the static-rp CLI command.
Note:
IPv6 link local address is always used as the PIM
interface address.
The C-BSR with the highest configured priority becomes the BSR for the domain. If two C-BSRs use
equal priority, the candidate with the higher IP address becomes the BSR. If you add a new C-BSR with
a higher priority to the domain, it automatically becomes the new BSR.
Procedure
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click PIM.
3. Click the Current BSR tab.
Name Description
Address Shows the IP address of the current BSR for the local PIM domain.
FragmentTag Shows a randomly generated number that distinguishes fragments that
belong to different bootstrap messages. Fragments that belong to the same
bootstrap message carry the same fragment tag.
HashMask Shows the mask used in the hash function to map a group to one of the
C-RPs from the RP set. The hashmask allows a small number of consecutive
groups to always hash to the same RP.
Priority Shows the priority of the current BSR. The C-BSR with the highest BSR
priority and address (referred to as the preferred BSR) is elected as the BSR
for the domain.
BootStrapTimer Shows the bootstrap timer. After the bootstrap timer expires, the BSR sends
out bootstrap messages.
Procedure
1. In the navigation pane, expand the following folders: Configuration > VLAN.
2. Click VLANs.
3. Click the Basic tab.
4. Select the VLAN ID that you want to configure with PIM.
5. Click IP.
6. Click the PIM tab.
7. Clear the Enable check box.
8. Click Apply.
9. Select active or passive.
10. Reenable PIM on the VLAN interface.
11. Click Apply.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click PIM.
3. Click the Interfaces tab.
4. Edit the fields by double-clicking on them, and then select or type the new value.
5. Click Apply.
Name Description
IfIndex Shows the interface Index. This variable is a read-only field.
Address Shows the IP address of the PIM interface. This variable is a read-only
field.
Name Description
NetMask Shows the network mask for the IP address of the PIM interface. This
variable is a read-only field.
Mode Shows the configured mode of this interface. The valid modes are SSM
and sparse. This variable is a read-only field.
InterfaceType Specifies if the interface is active or passive.
DR Shows the router with the highest IP address on a LAN designated to
perform these tasks.
HelloInterval Specifies how long to wait (in seconds) before the PIM router sends
out the next hello message to neighboring switches. The default is 30
seconds.
JoinPruneInterval Specifies how long to wait (in seconds) before the PIM router sends out
the next join or prune message to its upstream neighbors. The default
is 60 seconds.
CBSRPreference Configures the preference for this local interface to become a C-BSR.
The C-BSR with the highest BSR priority and address is the preferred
BSR. The default is –1, which indicates that the current interface is not a
C-BSR.
OperState Indicates the status of PIM on this interface: Up or Down.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 PIM.
3. Click the Interfaces tab.
4. Edit the fields by double-clicking on them, and then select or type the new value.
5. Click Apply.
Name Description
IfIndex Shows the interface Index. This variable is a read-only field.
Address Shows the IPv6 address of the PIM interface. This variable is a read-only
field.
NetMask Shows the network mask for the IPv6 address of the PIM interface. This
variable is a read-only field.
Enable Shows the configured mode of this PIM interface. sparseDense mode is
valid only for PIMv1.
Mode Shows the configured mode of this interface. The valid modes are SSM
and sparse. This variable is a read-only field.
Name Description
DR Shows the router with the highest IPv6 address on a LAN designated
to perform these tasks.
HelloInterval Specifies how long to wait (in seconds) before the PIM router sends
out the next hello message to neighboring switches. The default is 30
seconds.
JoinPruneInterval Specifies how long to wait (in seconds) before the PIM router sends out
the next join or prune message to its upstream neighbors. The default
is 60 seconds.
OperState Indicates the status of PIM on this interface: Up or Down.
Type Specifies the interface type.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click PIM.
3. Click the Virtual Neighbors tab.
4. Click Insert.
5. Specify the IP address of the virtual neighbor.
6. Specify the interface index for the PIM interface.
7. Click Insert.
Name Description
Address Specifies the IP address of the neighbor.
IfIndex Specifies the IP address of the PIM interface.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click PIM.
3. Click the Neighbors tab.
Name Description
Address Shows the IP address of the PIM neighbor.
IfIndex Shows the slot and port number or VLAN ID of the interface used to
reach this PIM neighbor.
UpTime Shows the time since this neighbor became a neighbor of the local
router.
ExpiryTime Shows the time remaining before the neighbor expires.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 PIM.
3. Click the Neighbors tab.
Name Description
Address Shows the IPv6 address of the PIM neighbor.
IfIndex Shows the slot and port number or VLAN ID of the interface used to
reach this PIM neighbor.
UpTime Shows the time since this neighbor became a neighbor of the local
router.
ExpiryTime Shows the time remaining before the neighbor expires.
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 PIM.
3. Click the Neighbor Secondary Address tab.
Name Description
IfIndex Shows the slot and port number or VLAN ID of the interface used to reach
this PIM neighbor.
Type Shows the address type of this PIM neighbor.
Primary The primary IPv6 address of this PIM neighbor.
SecAddress The secondary IPv6 address of this PIM neighbor.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click PIM.
3. Click the RP Set tab.
Name Description
GroupAddress Shows the IP address of the multicast group. When combined with the
group mask, this value identifies the prefix that the local router uses to
advertise itself as a C-RP router.
GroupMask Shows the address mask of the multicast group. When combined with the
group address, this value identifies the prefix that the local router uses to
advertise itself as a C-RP router.
Address Shows the IP address of the C-RP router.
HoldTime Shows the time specified in a C-RP advertisement that the BSR uses to time
out the RP. After the BSR receives an advertisement for the RP, it restarts the
timer. If no advertisement arrives before the timer expires, the BSR removes
that RP from the RP set.
ExpiryTime Shows the time remaining before this C-RP router times out.
Configuring a candidate RP
Configure a C-RP router to add it to the RP Set.
You can configure only one interface on a switch for multiple groups; that is, you cannot configure
multiple interfaces for multiple groups.
Using the GroupMask value, you can configure a candidate RP for several groups in one configuration.
For example, if you use a C-RP configuration with a GroupAddress value of 224.0.0.0 and a
GroupMask of 240.0.0.0, you can configure the C-RP router for a multicast range from 224.0.0.0 to
239.255.255.255.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click PIM.
3. Click the Candidate RP tab.
4. Click Insert.
5. Type the required information in each box.
6. Click Insert.
Name Description
GroupAddress Configures the IP address of the multicast group. When combined with the
group mask, this value identifies the prefix that the local router uses to
advertise itself as a C-RP router.
GroupMask Configures the address mask of the multicast group. When combined with
the group address, this value identifies the prefix that the local router uses to
advertise itself as a C-RP router.
InterfaceAddress Configures the IP address of the C-RP router. This address must be one of
the local PIM-SM enabled interfaces.
Important
The following configuration also activates full-mesh configurations.
Note
This procedure is supported only on a DvR Controller. It is not supported on a DvR Leaf node.
Procedure
2. Click Multicast.
3. Click the Globals tab.
4. Select MulticastSquareSmltEnable.
Clear this check box if you want to disable square-SMLT globally.
5. Click Apply.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 PIM.
3. Click the RP Set tab.
Name Description
GroupAddress Specifies the IPv6 address of the multicast group. When combined with the
group mask, this value identifies a group prefix for which the address is a
static RP.
GroupMask Specifies the address mask of the multicast group. When combined with the
group address, this value identifies a group prefix for which the address is a
static RP.
Address Specifies the IPv6 address of the static RP.
HoldTime Specifies the hold time of the static RP. The value is 0.
ExpiryTime Specifies the minimum time remaining before the static RP is down. The
value is 0.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 Mroute.
3. Click the Interfaces tab.
Name Description
IfIndex Displays the slot and port number or VLAN ID for this entry.
Ttl Displays the datagram time-to-live (TTL) threshold for the interface.
IPv6 multicast datagrams with a TTL less than this threshold are not
forwarded out of the interface. The default value of 0 means that all
multicast packets are forwarded out of the interface.
Protocol Displays the protocol as one of the following:
• other(1): none of the following
• local(2): manually configured
• netmgmt(3): configured by a network management protocol
• pimSparseMode(8): PIM-SMv2
• igmpOnly(10)
• pimSsmMode(11)
• spb
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 Mroute.
3. Click the Next Hop tab.
Name Description
Group Displays the IPv6 multicast group for this entry that specifies a next
hop on an outgoing interface.
Source Displays the network address that, when combined with the
corresponding next hop SourceMask value, identifies the source for this
entry that specifies a next hop on an outgoing interface.
SourceMask Displays the network mask that, when combined with the
corresponding next hop Source value, identifies the source for this
entry that specifies a next hop on an outgoing interface.
IfIndex Displays the slot and port number or VLAN ID for this entry.
Address Displays the address of the next hop specific to this entry. For
most interfaces, it is identical to the next-hop group. Non Broadcast
Multiple Access (NBMA) interfaces, however, can use multiple next hop
addresses out of a single outgoing interface.
Name Description
State Displays whether the outgoing interface and next hop represented by
this entry currently forward IPv6 datagrams. A value of forwarding
indicates the information is currently used; pruned indicates it is not
used.
ExpiryTime Displays the minimum amount of time that remains before this entry
ages out. The value 0 indicates that the entry is not subject to aging.
ClosestMemberHops Displays the minimum number of hops between this router and
members of the IPv6 multicast group reached through the next hop
on this outgoing interface. IPv6 multicast datagrams for the group that
use a time-to-live less than this number of hops are not forwarded to
the next hop.
Protocol Displays the protocol as one of the following:
• other(1): none of the following
• local(2): manually configured
• netmgmt(3): configured by a network management protocol
• pimSparseMode(8): PIM-SMv2
• igmpOnly(10)
• pimSsmMode(11)
• spb
Important
If you do not configure the thresholds, EDM displays only the ingress and egress records that
are currently in use.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 Mroute.
3. Click the Resource Usage tab.
4. Configure the ingress and egress thresholds.
5. Configure the notification methods.
6. Click Apply.
Name Description
Ingress Records In-Use Displays the number of ingress records (source or group) traversing the
switch.
Egress Records In-Use Displays the number of egress records traversing the switch.
Ingress Threshold Configures the ingress threshold level (0–32767).
Egress Threshold Configures the egress threshold level (0–32767).
SendTrapAndLog Sends both trap and log notification messages after the number of
streams exceeds a threshold level.
SendTrapOnly Sends only trap notification messages after the number of streams
exceeds a threshold level. You can configure only one notification type.
LogMsgOnly Sends only log notification messages after the number of streams
exceeds a threshold level.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 Mroute.
3. Click the Route tab.
Name Description
Group Displays the IPv6 multicast group for this entry that specifies a next
hop on an outgoing interface.
Source Displays the network address that, when combined with the
corresponding next hop SourceMask value, identifies the source for this
entry that specifies a next hop on an outgoing interface.
SourceMask Displays the network mask that, when combined with the
corresponding next hop Source value, identifies the source for this
entry that specifies a next hop on an outgoing interface.
UpStreamNeighbor Shows the address of the upstream neighbor from which the IPv6
datagrams from these sources are received.
IfIndex Displays the slot and port number or VLAN ID for this entry.
Name Description
ExpiryTime Displays the minimum amount of time that remains before this entry
ages out. The value 0 indicates that the entry is not subject to aging.
Protocol Displays the protocol as one of the following:
• other(1): none of the following
• local(2): manually configured
• netmgmt(3): configured by a network management protocol
• pimSparseMode(8): PIM-SMv2
• igmpOnly(10)
• pimSsmMode(11)
• spb
Important
The spbm-config-mode boot flag must be disabled before you can configure PIM or IGMP.
To verify the setting, enter show boot config flags in Privileged EXEC mode.
Important
To configure and use IGMP on a VRF instance you must first select and launch the VRF
context.
To select and launch the VRF context, see Configuring IGMP on a VRF on page 1548.
You can configure the maximum number of streams independently. After the number of streams
reaches the limit, the port drops joins to new streams. A service provider uses this feature to control the
overall bandwidth usage in addition to restricting users from attaching more than the allowed television
sets to a link.
Note
Configuration of multicast stream limitation is not supported on a node configured as the DvR
Leaf within a DvR domain.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
2. Enable multicast stream limitation and configure the maximum number of allowed streams:
ip igmp stream-limit stream-limit-max-streams <0-65535>
3. If stream-limit is already enabled on the interface, change the maximum number of allowed streams:
ip igmp stream-limit stream-limit-max-streams <0-65535>
4. Display multicast stream limitation information for the ports on a specific interface:
show ip igmp stream-limit interface
Example
Enable multicast stream limitation on the Ethernet port and configure the maximum number of allowed
streams to 8.
Switch:1(config-if)# ip igmp stream-limit
Switch:1(config-if)# ip igmp stream-limit stream-limit-max-streams 8
Variable definitions
Use the data in the following table to use the ip igmp stream-limit-max-streams command.
Variable Value
<0-65535> Configures the maximum number of allowed streams
on this port. The range is from 0–65535 and the default
is 4.
You can configure the maximum number of streams independently. After the number of streams
reaches the limit, the VLAN drops joins to new streams. A service provider uses this feature to control
the overall bandwidth usage in addition to restricting users from attaching more than the allowed
television sets to a link.
Note
Configuration of multicast stream limitation is not supported on a node configured as the DvR
Leaf within a DvR domain.
Procedure
configure terminal
Example
Enable multicast stream limitation and configure the maximum number of allowed streams to 8.
Switch:1(config-if)# ip igmp stream-limit
Switch:1(config-if)# ip igmp stream-limit stream-limit-max-streams 8
Variable definitions
Use the data in the following table to use the ip igmp stream-limit command.
Variable Value
<0-65535> Configures the maximum number of allowed streams
on this VLAN. The range is from 0–65535 and the
default is 4.
Procedure
1. Enter VLAN Interface Configuration mode:
enable
configure terminal
Example
Enable multicast stream limitation on ports 2/3 to 2/8 and configure the maximum allowed number of
streams to 6 for this interface.
Switch:1(config-if)# ip igmp stream-limit-group 2/3-2/8 max-streams 6
Variable definitions
Use the data in the following table to use the ip igmp stream-limit-group command.
Variable Value
<0–65535> Configures the maximum number of allowed streams for the
specified ports on this VLAN. The range is from 0–65535 and the
default is 4.
{slot/port[/sub-port] [- Identifies the slot and port in one of the following formats:
slot/port[/sub-port]] a single slot and port (slot/port), a range of slots and ports
[,...]} (slot/port-slot/port), or a series of slots and ports (slot/port,slot/
port,slot/port). If the platform supports channelization and the
port is channelized, you must also specify the sub-port in the
format slot/port/sub-port.
Important
The switch does not support the Multicast Router Discovery (MRDISC) protocol on brouter
ports.
Procedure
1. Enter VLAN Interface Configuration mode:
enable
configure terminal
Example
Variable definitions
Use the data in the following table to use the ip igmp mrdisc command.
Variable Value
maxadvertinterval <2–180> Configures the maximum number (in seconds) between
successive advertisements.
For this change to take effect, you must save the
configuration, and then reset the switch.
To configure this option to the default value, use the
default operator with the command. The default is
20.
maxinitadvertinterval <2–180> Configures the maximum number (in seconds) between
successive initial advertisements.
For this change to take effect, you must save the
configuration, and then reset the switch.
To configure this option to the default value, use the
default operator with the command. The default is 2.
Variable Value
maxinitadvertisements <2–15> Configures the maximum number of initial multicast
advertisements after initialization.
For this change to take effect, you must save the
configuration, and then reset the switch.
To configure this option to the default value, use the
default operator with the command. The default is 3.
minadvertinterval <3–180> Configures the minimum number (in seconds) between
successive advertisements.
For this change to take effect, you must save the
configuration, and then reset the switch.
To configure this option to the default value, use the
default operator with the command. The default is
15.
neighdeadinterval <2–180> Configures the multicast router discovery dead interval
—the number of seconds the multicast route neighbors
for the switch must wait before assuming that the
multicast router is down.
To configure this option to the default value, use the
default operator with the command. The default is
60.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Examples
Configure explicit host tracking:
Switch:1(config-if)#ip igmp igmpv3–explicit-host-tracking
================================================================================
Igmp Group - GlobalRouter
================================================================================
GRPADDR INPORT MEMBER EXPIRATION TYPE L2ISID
--------------------------------------------------------------------------------
224.5.2.1 V701-1/4 62.0.1.1 214 Dynamic 40400
224.5.2.2 V702-1/4 62.0.2.1 221 Dynamic 40400
224.5.2.3 V703-1/4 62.0.3.1 217 Dynamic 40400
224.5.2.4 V704-1/4 62.0.4.1 223 Dynamic 40400
Note:
The "*" attached to the interface (if any) indicates that the interface has explicit host
tracking disabled.
Variable definitions
Use the data in the following table to use the ip igmp igmpv3–explicit-host-tracking
command.
Variable Value
explicit-host-tracking Enables explicit host tracking on IGMPv3. The default
state is disable.
<A.B.C.D> Specifies the IP address of the group of the tracked
member.
Procedure
configure terminal
Example
Variable definitions
Use the data in the following table to use the ip igmp static-group command.
Variable Value
{A.B.C.D} {A.B.C.D} Indicates the IP address range of the selected multicast
group.
port Adds ports to a static group entry
Variable Value
{slot/port[/sub-port] [- Creates a static group entry. Specifies the port or list of ports
slot/port[/sub-port]] that is a member of the VLAN interface being configured
[,...]} to which you want to redirect the multicast stream for this
multicast group.
Identifies the slot and port in one of the following
formats: a single slot and port (slot/port), a range of slots
and ports (slot/port-slot/port), or a series of slots and
ports (slot/port,slot/port,slot/port). If the platform supports
channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
<static|blocked> Configures the route to static or blocked.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must use VRF Router Configuration mode.
Procedure
configure terminal
2. Enable SSM dynamic learning:
ip igmp ssm dynamic-learning
3. Configure the range group:
ip igmp ssm group-range <A.B.C.D/X>
Warning: Changing the SSM range will cause all spb-multicast and spb-
pim-gw enabled interfaces to be internally bounced. Do you wish to
continue? (y/n) ? (y/n)?
Enter y to continue.
Example
Define the SSM range group address (234.0.0.0) and mask (255.0.0.0). Enable dynamic learning from
IGMPv3 reports.
Switch:1(config)#ip igmp ssm group-range 234.0.0.0/255.0.0.0
WARNING: Changing the SSM range will cause all spb-multicast and spb-pim-gw enabled
interfaces to be internally bounced. Do you wish to continue? (y/n) ? (y/n)? y
Switch:1(config)#ip igmp ssm dynamic-learning
Variable definitions
Use the data in the following table to use the ip igmp ssm command.
Variable Value
{A.B.C.D/X} Defines the SSM range. The SSM range parameter extends
the default SSM range of 232/8 to include an IP multicast
address. You can configure existing applications without
having to change their group configurations. This parameter
specifies an IP multicast address within the range of
224.0.0.0 and 239.255.255.255. The default is 232.0.0.0. The
address mask is the IP address mask of the multicast group.
The default is 255.0.0.0.
Before you disable or delete an ssm-map, always send IGMPv1 or IGMPv2 leave messages from hosts
that operate in IGMPv1 or IGMPv2. If you do not perform this action, receiving and processing reports in
SSM range on an IGMP interface enabled with IGMPv1 or IGMPv2 can lead to unexpected behavior.
Important
This procedure reinitializes PIM and temporarily stops all PIM traffic. For those multicast
groups out of SSM range (for example, under PIM-SM behavior), it also causes a rendezvous
point (RP) relearn delay of up to 60 seconds. This delay can be longer if the bootstrap router
(BSR) is local.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must use VRF Router Configuration mode.
Procedure
configure terminal
2. Disable PIM:
no ip pim enable
If you forget to disable PIM, the system displays the following error message:
If you forget to delete the SSM channels, the system displays the following error message:
Warning: Changing the SSM range will cause all spb-multicast and spb-
pim-gw enabled interfaces to be internally bounced. Do you wish to
continue? (y/n) ? (y/n)?
Enter y to continue.
5. Enable PIM:
ip pim enable
Example
WARNING: Changing the SSM range will cause all spb-multicast and spb-pim-gw enabled
interfaces to be internally bounced. Do you wish to continue? (y/n) ? (y/n)? y
Variable definitions
Use the data in the following table to use the ip igmp ssm group-range and ip igmp ssm
commands.
Variable Value
{A.B.C.D/X} Defines the SSM range. The SSM range parameter extends
the default SSM range of 232/8 to include an IP multicast
address. You can configure existing applications without
having to change their group configurations. This parameter
specifies an IP multicast address within the range of
224.0.0.0 and 239.255.255.255. The default is 232.0.0.0. The
address mask is the IP address mask of the multicast group.
The default is 255.0.0.0.
consistency check to make sure no conflicts exist. You can map one group (G) to different sources or
multiple sources to the same group for both static source group and an SSM map.
The consistency check applies to all SSM map entries, even if they are disabled. If you disable an entry, it
becomes inactive. If you do not delete the entry, you can reenable it later.
After you disable an SSM map, the switch stops multicast traffic from the specified source to the
specified group. You can use this static configuration as a security feature to block traffic from a certain
source to a specific group.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must use VRF Router Configuration mode.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable the SSM map table for all static entries:
ip igmp ssm-map all
3. Create a static entry for a specific group:
ip igmp ssm-map {A.B.C.D} {A.B.C.D} enable
Example
Create an SSM map table entry for the multicast group 234.0.1.0 and the source at 192.32.99.151.
Configure the administrative state to enable all the static SSM map table entries.
Switch:1(config)#ip igmp ssm-map 234.0.1.0 192.32.99.151
Switch:1(config)#ip igmp ssm-map all
Variable definitions
Use the data in the following table to use the ip igmp ssm-map command.
Variable Value
{A.B.C.D} {A.B.C.D} Creates a static SSM channel table entry by specifying
the group and source IP addresses. The IP address is an
IP multicast address within the SSM range. The source IP
address is an IP host address that sends traffic to the group.
{A.B.C.D} enable Enables the administrative state for a specific entry (group).
This variable does not affect the dynamically learned entries.
This state determines whether the switch uses the static
entry or saves it for future use. The default is enable for each
entry.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Variable definitions
Use the data in the following table to use the ip igmp access-list command
Variable Value
{A.B.C.D/X} Creates an access control group entry for a specific IGMP
interface. Specify the IP address of the host and the subnet
mask used to determine the host or hosts covered by this
configuration. You can use the host subnet mask to restrict
access to a portion of the network for the host.
deny-tx|deny-rx|deny-both| Indicates the action for the specified IGMP interface. For
allow-only-tx|allow-only-rx| example, if you specify deny-both, the interface denies both
allow-only-both transmitted and received traffic
mode Changes the access control group configuration.
WORD<1–64> Specifies the name of the access list from 1–64 characters.
Procedure
configure terminal
Variable definitions
Use the data in the following table to use the ip igmp access-list command.
Variable Value
{A.B.C.D/X} Creates an access control group entry for a specific IGMP
interface. Specify the IP address of the host and the subnet
mask used to determine the host or hosts covered by this
configuration. You can use the host subnet mask to restrict
access to a portion of the network for the host.
deny-tx|deny-rx|deny-both| Indicates the action for the specified IGMP interface. For
allow-only-tx|allow-only-rx| example, if you specify deny-both, the interface denies both
allow-only-both transmitted and received traffic
mode Changes the access control group configuration.
WORD<1–64> Specifies the name of the access list from 1–64 characters.
If a single user connects to an interface, you do not need to track if other users exist on the interface to
perform the fast leave. In cases like this, you must change the mode to one-user.
Important
Fast leave mode applies only to fast leave enabled IGMP interfaces.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must use VRF Router Configuration mode.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
Note
This command is not supported on a node configured as the DvR Leaf within a DvR
domain.
Example
Variable definitions
Use the data in the following table to use the ip igmp immediate-leave-mode command.
Variable Value
multiple-user|one-user multiple-user removes from the group only
the IGMP member who sent the leave message.
Traffic does not stop if other receivers exist on the
interface port. This configuration is the default.
one-user removes all group members on a fast
leave enabled interface port after receiving the
first leave message from a member. This behavior
is the same as the conventional fast leave process.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Procedure
1. Enter VLAN Interface Configuration mode:
enable
configure terminal
Variable definitions
Use the data in the following table to use the ip igmp immediate-leave-members command.
Variable Value
{slot/port[/sub-port] [- Identifies the slot and port in one of the following formats:
slot/port[/sub-port]] a single slot and port (slot/port), a range of slots and ports
[,...]} (slot/port-slot/port), or a series of slots and ports (slot/port,slot/
port,slot/port). If the platform supports channelization and the
port is channelized, you must also specify the sub-port in the
format slot/port/sub-port.
When you enable IGMP Layer 2 Querier, Layer 2 switches in your network can snoop IGMP control
packets exchanged with downstream hosts and upstream routers. The Layer 2 switches then generate
the Layer 2 MAC forwarding table, used for switching sessions and multicast traffic regulation, and
provide the recurring queries required to maintain IGMP groups.
On Shortest Path Bridging (SPB) Customer VLANs (CVLAN), IGMP Querier is enabled automatically
when you enable snooping on the VLAN.
Procedure
configure terminal
What to Do Next
You must enable the IGMP Layer 2 Querier address. See EnablingIGMPLayer2QuerierAddress
You must configure the IGMP Layer 2 Querier address to an IP address in the IP subnet that IGMP hosts,
and to which IGMP snoopers in the VLAN belong.
The default IP address is 0.0.0.0 when the IGMP Layer 2 Querier is disabled.
Procedure
configure terminal
Example
Enable the IGMP Layer 2 Querier feature for VLAN 4, and configure the querier address. Verify the
configuration.
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#interface vlan 4
================================================================================
Igmp Snooping - GlobalRouter
================================================================================
IFINDEX SNOOP PROXY SSM STATIC ACTIVE MROUTER
ENABLE SNOOP SNOOP MROUTER MROUTER EXPIRATION
ENABLE ENABLE PORTS PORTS TIME
--------------------------------------------------------------------------------
V2 false false false 0
V3 false false false 0
V4 true false false 0
V200 false false false 0
Important
The EnableSpbmConfigMode boot flag must be disabled before you can configure PIM or
IGMP. To verify the setting, navigate to Configuration > Edit > Chassis and click on the Boot
Config tab.
Important
To configure and use IGMP on a VRF instance you must first select and launch the VRF
context.
To select and launch the VRF context, see Select and Launch a VRF Context View on page
3856.
The switch listens to group reports from each port and builds a database of multicast group members
for each port. The switch suppresses the reports heard by not forwarding them to other hosts, forcing
the members to continuously send their own reports.
The switch relays group membership from the hosts to the multicast routers and forwards queries from
multicast routers to all port members of the VLAN. The switch multicasts data only to the participating
group members and to the multicast routers within the VLAN.
Procedure
1. In the navigation pane, expand the following folders: Configuration > VLAN.
2. Click VLANs.
3. Click the Basic tab.
4. Select a VLAN.
5. Click IP.
6. Click the IGMP tab.
7. Select the SnoopEnable check box.
8. Select the ProxySnoopEnable check box.
9. For SteamLimtEnable, select enable.
10. Click Apply.
You can create a static entry to forward multicast data streams to a particular set of ports within the
VLAN. After you create the entry, multicast data streams always forward to the multicast router within
the VLAN, in addition to the ports in this static entry.
Important
IGMP snoop can optimize only local multicast data flow. IGMP snoop does not manage the
forwarding state of the multicast tree. You cannot configure a port as a static receiver in an
IGMP snoop-enabled VLAN that does not contain at least one dynamic receiver port and
forward multicast data.
You can configure IGMP on a VRF instance the same way you configure the Global Router
except that you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click IGMP.
3. Click the Static tab.
4. Click Insert.
5. Type the appropriate information.
6. Click Insert.
Name Description
IfIndex Shows the interface where the IGMP entry is enabled.
GrpAddr Indicates the start of the IP multicast address range of the multicast stream.
Within the indicated valid range (224.0.0.0 to 239.255.255.255), the
following are invalid addresses: 244.0.0.x and the corresponding 31 multicast
addresses that map to the IP MAC addresses. If you try to select them, you
receive an invalid message.
ToGrpAddr Indicates the end of the IP multicast address range of the multicast stream.
If an address is not entered, the IP address in the GrpAddr field is the single
address.
MemberPorts Specifies the ports to which you want to redirect the multicast stream for
this multicast group. The ports must be member ports of the VLAN.
NotAllowedToJoin Specifies the ports that do not receive the multicast stream for this multicast
group.
Before you disable or delete an ssm-map, always send IGMPv1 or IGMPv2 leave messages from hosts
that operate in IGMPv1 or IGMPv2. If you do not perform this action, receiving and processing reports in
SSM range on an IGMP interface enabled with IGMPv1 or IGMPv2 can lead to unexpected behavior.
The consistency check applies to all SSM channel entries, even if they are disabled. If you disable an
entry, it becomes inactive. If you do not delete the entry, you can reenable it later.
After you disable an SSM map, the switch stops multicast traffic from the specified source to the
specified group. You can use this static configuration as a security feature to block traffic from a certain
source to a specific group.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Select IGMP.
3. Select the Ssm Map tab.
4. Select Insert.
Name Description
IpMulticastGrp Specifies an IP multicast address that is within the SSM range.
IpSource Specifies the IP address of the source that sends traffic to the
group.
LearningMode Displays whether the entry is statically configured (Static) or
dynamically-learned from IGMPv3 (Dynamic). This variable a
read-only field.
Activity Displays the current activity of the selected (S,G) entry. True
indicates that traffic is flowing to the switch, otherwise, the
system displays it false. This variable a read-only field.
AdminState Configures the administrative state for the selected static entry.
This state determines whether the switch uses the static entries.
Configure this field to enable (default) to use the entry or disable
to save for future use.
The other global parameters enable the IGMPv3 dynamic learning feature and configure the
administrative state for all the entries in the SSM channel table.
Important
If you change the RangeGroup configuration, the switch reinitializes PIM and temporarily
stops all PIM traffic. For those multicast groups out of SSM range (for example, under PIM-SM
behavior), this procedure also causes a rendezvous point (RP) relearn delay of up to 60
seconds. This delay can be longer if the bootstrap router (BSR) is local.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand Configuration > IP.
2. Select IGMP.
3. Select the Ssm Global tab.
4. Configure the appropriate fields.
5. Select Apply.
Name Description
DynamicLearning Activates the dynamic learning of SSM channel (S,G) pairs from IGMPv3
reports. As new SSM channels are learned, the system displays them in the
SSM channel table.
RangeGroup Configures the IP multicast group address. The lowest group address is
224.0.0.0 and the highest is 239.255.255.255. The default is 232.0.0.0.
RangeMask Configures the address mask of the multicast group. The default is 255.0.0.0.
SsmMapAdminAction Configures the administrative state, which determines whether the switch
uses the table entries:
• enableAll—Globally activates all the static entries in the SSM channel
table. This value does not affect the dynamically learned entries.
• disableAll—Globally inactivates all the static entries in the SSM channel
table. This value does not affect the dynamically learned entries.
You can configure the maximum number of streams independently. After the number of streams
reaches the limit, the interface drops additional join reports for new streams. You can control the overall
bandwidth usage in addition to restricting users from receiving more than a specific limit of multicast
streams on an interface.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click IGMP.
3. Click the StreamLimit tab.
4. To change the status of an interface, double-click on the StreamLimitEnable field for the interface,
and then select enable or disable from the menu. If the interface is enabled, you can edit the
Maximum Number of Stream field.
5. Click Apply.
Name Description
Interface Displays the slot and port number or VLAN ID for this interface.
StreamLimitEnable Enables or disables stream limitation on this interface.
Maximum Number Of Stream Configures the maximum number of streams allowed on this
interface. The range is from 0–65535, and the default is 4.
Current Number Of Stream Displays the current number of streams received on this interface.
This value is a read-only value.
You can configure the maximum number of streams independently. After the number of streams
reaches the limit, the VLAN drops additional join reports for new streams. You can control the overall
bandwidth usage in addition to restricting users from receiving more than a specific limit of multicast
streams on an interface.
Procedure
1. In the navigation pane, expand the following folders: Configuration > VLAN.
2. Click VLANs.
3. Click the Basic tab.
4. Select a VLAN.
5. Click IP.
6. Click the IGMP tab.
7. For StreamLimitEnable, select enable.
8. Configure the maximum number of streams.
9. Click Apply.
Procedure
3. Click IP.
4. Click the IGMP tab.
5. In the StreamLimitEnable field, select the Enable option button.
6. Configure the maximum number of streams.
7. Click Apply.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click IGMP.
3. Click the StreamLimit Members tab.
4. Click Insert.
5. Type the number of the VLAN to which you want to add a member or click Vlan to select an ID from
the list.
6. Type the number of the slot and port that you want to add as a member or click Port, and then
select one from the graphic display. If your platform supports channelization for 40 Gbps ports and
the port is channelized, you must also specify the sub-port in the format slot/port/sub-port.
Important
You must select one of the ports in the VLAN that you selected in step 4.
Name Description
IfIndex Displays the ID of the VLAN.
Port Lists each slot and port number for this interface with stream
limitation enabled.
Identifies the slot and port in one of the following formats:
a single slot and port (slot/port), a range of slots and ports
(slot/port-slot/port), or a series of slots and ports (slot/port,slot/
port,slot/port). If the platform supports channelization and the
port is channelized, you must also specify the sub-port in the
format slot/port/sub-port.
Name Description
MaxStreams Configures the maximum number of allowed streams for this
specific port. The number of allowed streams cannot exceed the
maximum number for the interface. The range is from 0–65535
and the default is 4.
NumStreams Displays the current number of streams received on this interface.
This value is a read-only value.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click IGMP.
3. Click the StreamLimit Members tab.
4. Click on the row that lists the member you want to delete.
5. Click Delete.
If an interface does not use an IP address, the system does not display it in the IGMP table. If
an interface uses an IP address, but PIM-SM is not enabled, the system displays the interface as
notInService in the Status field.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must first launch the appropriate VRF context.
Procedure
Name Description
IfIndex Shows the interface where IGMP is enabled.
QueryInterval Configures the frequency (in seconds) at which the interface
transmits IGMP host query packets. The default is 125.
Status Shows the IGMP row status. If an interface uses an IP address
and PIM-SM is enabled, the status is active. Otherwise, it is
notInService.
Version Configures the version of IGMP (1, 2, or 3) that you want to
configure on this interface. For IGMP to function correctly, all
routers on a LAN must use the same version. The default is
version 2.
OperVersion Shows the version of IGMP that currently runs on this interface.
Querier Shows the address of the IGMP querier on the IP subnet to which
this interface attaches.
QueryMaxResponseTime Configures the maximum response time (in tenths of a second)
advertised in IGMPv2 general queries on this interface. You cannot
configure this value for IGMPv1.
Smaller values allow a router to prune groups faster. The default is
100 tenths of a second (equal to 10 seconds.)
Important:
You must configure this value lower than the QueryInterval.
WrongVersionQueries Shows the number of queries received with an IGMP version that
does not match the interface. You must configure all routers on
a LAN to run the same version of IGMP. If the interface receives
queries with the wrong version, this value indicates a version
mismatch.
Joins Shows the number of times this interface added a group
membership, which is the same as the number of times an entry
for this interface is added to the cache table. This number gives an
indication of the amount of IGMP activity over time.
Robustness Tunes for the expected packet loss of a network. This value is
equal to the number of expected query packet losses for each
serial query interval, plus 1. If you expect a network to lose query
packets, increase the robustness value.
The default value of 2 means that the switch drops one query for
each query interval without the querier aging out.
Name Description
LastMembQueryIntvl Configures the maximum response time (in tenths of a second)
inserted into group-specific queries sent in response to leave
group messages. This value is also the time between group-
specific query messages. You cannot configure this value for
IGMPv1.
Decrease the value to reduce the time to detect the loss of the
last member of a group. The range is from 0–255 and the default
is 10 tenths of second. As a best practice, configure this parameter
to values greater than 3. If you do not need a fast leave process,
you can configure values greater than 10. (The value 3 is equal to
0.3 seconds and 10 is equal to 1 second.)
OtherQuerierPresent Timeout Shows the length of time that must pass before a multicast router
determines that no other querier exists. If the local router is the
querier, the value is 0.
FlushAction Configures the flush action to one of the following:
• none
• flushGrpMem
• flushMrouter
• flushSender
RouterAlertEnable Instructs the router to ignore IGMP packets that do not contain
the router alert IP option. If you disable this variable (default
configuration), the router processes IGMP packets regardless of
the status of the router alert IP option.
Important:
To maximize network performance, configure this parameter
according to the version of IGMP currently in use.
• IGMPv1—Disable
• IGMPv2—Enable
• IGMPv3—Enable
Name Description
ExtnUpnpFilterEnable Enables Universal Plug and Play (uPnP) Filtering to filter multicast
packets destined for a specific range.
The default is disabled.
ExtnUpnpFilterAddress Indicates the multicast destination IP address to filter on an IGMP-
enabled interface.
The default is 239.255.255.250/32.
ExtnUpnpFilterAddressMask Indicates the IGMP uPnP Filtering IP subnet to which this interface
is attached.
SnoopOrigin Specifies the origin of IGMP Snooping configuration on the port.
The supported values are:
• config - Set by the user.
• radius - Set by the Remote Authentication Dail-In User Service
(RADIUS) attribute.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click IGMP.
3. Click the Sender tab.
4. Change the appropriate options.
5. Click Apply.
Name Description
IfIndex Specifies the interface where you enabled the IGMP entry.
GrpAddr Specifies the multicast group address of the multicast stream.
Within the indicated valid range (224.0.0.0 to 239.255.255.255),
the following are invalid addresses: 244.0.0.x and the
corresponding 31 multicast addresses that map to the IP MAC
addresses. If you try to select them, you receive an invalid
message.
MemberAddr Specifies the IP address of a host.
Action Flushes an entry or a group.
TPort Identifies the T port.
Name Description
State Indicates whether a sender exists because of an IGMP access filter.
The options are filtered and not filtered.
L2Isid Specifies the Layer 2 I-SID of the C-VLAN.
Fast leave relies on an alternative leave process where the switch stops sending traffic for the group
immediately after it receives a leave message, without issuing a query to check if other group members
exist on the network. Use this global parameter to alter the leave processing on fast leave enabled
IGMPv2, IGMPv3, and IGMP snoop interfaces.
Important
Fast leave mode applies only to fast leave enabled IGMP interfaces.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click IGMP.
3. Click the Global tab.
4. Select the mode.
5. Click Apply.
Name Description
FastLeaveMode Configures the mode to one of the following values:
• multipleUser: Removes from the group only the IGMP member who
sent the leave message. Traffic does not stop if other receivers exist
on the interface port. This value is the default.
• oneUser: Removes all group members on a fast leave enabled
interface port after receiving the first leave message from a
member. This behavior is the same as the conventional fast leave
process.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click IGMP.
3. Click the Access Control tab.
4. Click Insert.
5. Type the number of the slot and port or VLAN ID that you want to add as a member or click the
appropriate button, and then select one from the graphic display.
6. Click the ellipsis button (...) next to PrefixListId.
7. Select a prefix list ID.
8. Click OK.
9. Type the host address and host mask.
10. Select the action mode that you want for the specified host.
11. Click Insert.
Name Description
IfIndex Specifies the interface where the IGMP entry is enabled.
PrefixListId Specifies a numeric string that identifies the prefix list.
HostAddr Specifies the IP address of the host.
HostMask Specifies the subnet mask that determines the host or hosts
covered by this configuration. You can use the host subnet mask
to restrict access to a portion of the network for the host.
PrefixListName Specifies the name of the prefix list.
ActionMode Specifies the action for the host identified by HostAddr. The
options include the following:
• denied IP multicast transmitted traffic (deny-tx).
• denied IP multicast received traffic (deny-rx).
• denied both IP multicast transmitted and received traffic
(deny-both).
• allowed IP multicast transmitted traffic (allow-only-tx).
• allowed IP multicast received traffic (allow-only-rx).
• allowed both IP multicast transmitted and received traffic
(allow-only-both).
You can view IGMP information on a VRF instance the same way you view the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click IGMP
3. Click the Cache tab.
Name Description
Address Shows the IP multicast group address for this entry that contains this
information.
IfIndex Shows the interface from which the corresponding multicast group address
is heard.
Name Description
LastReporter Shows the IP address of the source of the last membership report received
for this IP multicast group address on this interface. If no membership report
is received, the object uses the value 0.0.0.0.
ExpiryTime Shows the amount of time (in seconds) that remain before this entry ages
out.
Version1HostTimer Shows the time that remains until the local router assumes that no IGMPv1
members exist on the IP subnet attached to the interface. Upon hearing
IGMPv1 membership report, this value resets to the group membership
timer. When the time that remains is nonzero, the local router ignores
IGMPv2 leave messages for this group that it receives on this interface.
Type Shows the type of IGMP entry.
StaticPorts Shows the static ports associated with the entry.
You can view IGMP information on a VRF instance the same way you view the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click IGMP.
3. Click the IGMPv3 Cache tab to view the IGMPv3 cache information.
Name Description
GroupAddress Specifies the Multicast group Address (Class D) that others
want to join. A group address can be the same for many
incoming ports.
IfIndex An unique value to identify a physical interface or a logical
interface (VLAN), which has received Group reports from
various sources.
InPort An unique value to identify a physical interface or a logical
interface (VLAN), which has received Group reports from
various sources.
ModeExpiryTimer Represents the time remaining before the interface
EXCLUDE state expires and the interface state transitions
to INCLUDE mode. This value is applicable only to IGMPv3-
compatible nodes.
Name Description
Version1HostTimer Specifies the time remaining until the local router assumes
that there are no longer any IGMP version 1 members on
the IP subnet attached to this interface. This entry only
applies to IGMPv1 hosts. Upon hearing any IGMPv1 report,
this value is reset to the group membership timer. While
this time remaining is non-zero, the local router ignores any
IGMPv2 Leave messages for this group that it receives on
this interface.
Version2HostTimer Specifies the time remaining until the local router assumes
that there are no longer any IGMP version 2 members on
the IP subnet attached to this interface. Upon hearing any
IGMPv2 membership report, this value is reset to the group
membership timer. Assuming no IGMPv1 hosts have been
detected, the local router does not ignore any IGMPv2 Leave
messages for this group that it receives on this interface.
SourceFilterMode Specifies the current group state, applicable to IGMPv3-
compatible nodes. The value indicates whether the state is
INCLUDE or EXCLUDE.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click IGMP.
3. Click the Multicast Router Discovery tab.
4. To edit the current configuration, double-click the value, make the change, and then click Apply.
Name Description
Interface Shows the interface where IGMP is enabled.
MrdiscEnable Enables (true) or disables (false) the router interface to listen for
multicast router discovery messages to determine where to send
multicast source data and IGMPv2 reports. If you enable snoop,
you automatically enable multicast router discovery.
Name Description
DiscoveredRouterPorts Lists ports that the Multicast Router Discovery (MRDISC) protocol
discovers.
Important:
The switch does not support the MRDISC protocol on brouter
ports.
You can view IGMP information on a VRF instance the same way you view the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click IGMP.
3. Click the Igmp Router Source List tab to view the IGMPv3 cache information.
Name Description
GroupAddress Specifies the IP multicast group address for which this entry
contains information.
IfIndex Specifies the interface for which this entry contains
information for an IP multicast group address.
InPort Specifies a unique value to identify a physical interface or a
logical interface (VLAN), which has received Group reports
for this source.
Name Description
HostAddress Specifies the host address to which this entry corresponds.
MemberAddress Specifies the IP Address of a member that has sent source
specific report wishing to join this source.
Expire This value indicates the relevance of the source list entry,
where a non-zero value indicates this is an INCLUDE state
value, and a zero value indicates this to be an EXCLUDE state
value.
Mode Specifies the current member state, applicable to IGMPv3-
compatible nodes. The value indicates whether the state is
INCLUDE or EXCLUDE.
MemberExpire This value indicates the time until the member for this source
expires.
You can configure IGMP on a VRF instance the same way you configure the Global Router except that
you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click IGMP.
3. Click the Snoop tab.
Name Description
Interface Shows the VLAN ID for the VLAN.
SnoopEnable Shows the status of IGMP snoop. IGMP snoop works only if a
multicast router exists in the VLAN.
SsmSnoopEnable Shows the status of SSM snoop.
ProxySnoopEnable Indicates whether the IGMP report proxy feature is enabled. If you
enable this feature, the switch forwards reports from hosts to the
multicast router once for each group for each query interval, or
after new group information is available. If you disable this feature,
the switch forwards all reports from different hosts to multicast
routers, and can forward more than one group report for the same
multicast group for each query interval. The default is enabled.
FastLeaveEnable Shows the status of fast leave for this port.
FastLeavePortMembers Lists ports that are enabled for fast leave.
Name Description
SnoopMRouterPorts Shows the configuration of ports as multicast router ports. Such
ports attach to a multicast router, and forward multicast data and
group reports to the router.
Important:
Configure this variable only if you use multiple multicast routers
that do not attach to one another, but attach to the VLAN
(technically, an invalid configuration). If multicast routers use a
route between them (the valid configuration) and you configure
this variable, a multicast loop forms.
SnoopActiveMRouterPorts Shows the active multicast router ports. Active multicast router
ports are ports that directly attach to a multicast router. These
ports include the querier port and all ports in the forwarding state
that you configure as well as those that were dynamically learned
through receiving queries.
SnoopMRouterExpiration Indicates the time that remains before the multicast router ages
out. If the switch does not receive queries before this time expires,
it flushes out all group memberships known to the VLAN. The
query maximum response interval (obtained from the queries
received) is used as the timer resolution.
Procedure
Name Description
GrpAddr Displays the IP multicast address of the group traversing the router.
SrcAddr Displays the IP source address of the multicast group.
OutVlan Displays the egress VLAN ID for the multicast group.
InPort Displays the ingress port for the multicast group.
InVlan Displays the ingress VLAN ID for the multicast group.
OutPort Displays the egress port of the multicast group.
Type Displays the port type on which the snoop entry is learned.
Note
The following procedure displays the dynamically learned IGMP groups. IP > IGMP > Static
displays statically configured IGMP groups. This is in contrast to the CLI command show
ip igmp group, which displays both dynamically learned and statically configured IGMP
groups, and the CLI command show ip igmp static, which displays only the statically
configured groups.
You can view IGMP information on a VRF instance the same way you view the Global Router except that
you must first launch the appropriate VRF context.
Procedure
Name Description
IpAddress Shows the multicast group address (Class D). A group address
can be the same for many incoming ports.
Members Shows the IP address of the host that issues the membership
report to this group.
InPort Shows the port that receives the group membership report.
IfIndex Shows a unique value that identifies a physical interface or a
logical interface (VLAN) that receives the membership report.
Expiration Shows the time left before the group report expires on this port.
This variable is updated after the port receives a group report.
You can enable or disable the mroute stream limit for the entire device or for individual ports when the
switch is operating. If you enable the mroute stream limit for the device and for an individual port, only
the periodic check is performed for that port.
Procedure
configure terminal
2. Enable stream limitation globally:
ip mroute stream-limit
3. Enter GigabitEthernet Interface Configuration mode.
interface gigabitethernet {slot/port[/sub-port][-slot/port[/sub-port]]
[,...]}
4. Enable stream limits:
ip mroute stream-limit
5. For Gigabit Ethernet interfaces, configure the maximum number of streams and the interval at which
to sample:
ip mroute max-allowed-streams <1–32768> max-allowed-streams-timer-
check <1–3600>
6. Show the mroute stream limit configuration:
show ip mroute interface gigabitethernet [{slot/port[/sub-port][-slot/
port[/sub-port]][,...]}]
Example
Switch:1(config)#ip mroute stream-limit
Switch:1(config)#interface gigabitethernet 3/6
Switch:1(config-if)#ip mroute stream-limit
Switch:1(config-if)#ip mroute max-allowed streams 1000 max-allowed-streams-timer-check 20
Variable definitions
Use the data in the following table to use the interface command.
Variable Value
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default,
VLAN IDs 1 to 4059 are configurable and the system reserves
VLAN IDs 4060 to 4094 for internal use. On switches that
support the vrf-scaling and spbm-config-mode boot
configuration flags, if you enable these flags, the system also
reserves VLAN IDs 3500 to 3998. VLAN ID 1 is the default
VLAN and you cannot create or delete VLAN ID 1.
{slot/port[/sub-port] [- Identifies the slot and port in one of the following
slot/port[/sub-port]] formats: a single slot and port (slot/port), a range of slots
[,...]} and ports (slot/port-slot/port), or a series of slots and
ports (slot/port,slot/port,slot/port). If the platform supports
channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
Use the data in the following table to use the ip mroute command.
Variable Value
max-allowed-streams <1– Configures the maximum number of streams on the
32768> specified port. The port is shut down if the number of
streams exceeds this limit. The value is a number between
1–32768. The default value is 1984 streams. To configure this
option to the default value, use the default operator with
the command.
max-allowed-streams-timer- Configures the sampling interval, which checks if the number
check <1–3600> of ingress multicast streams to the CPU is under a configured
limit or if the port needs to shut down. The range is between
1–3600. The default value is 10 seconds. To configure this
option to the default value, use the default operator with
the command.
Even if no receivers exist in the group, the multicast stream for a static source group entry remains
active.
The maximum number of static source groups must not exceed 1024.
Procedure
configure terminal
2. Configure a static source group entry:
ip mroute static-source-group <A.B.C.D> <A.B.C.D/X>
Example
Create a static source group for two multicast groups: 224.32.2.1 and 226.50.2.2. The static source group
for group 224.32.2.1 is for a source subnet 10.10.10.0/24. The static source group for group 226.50.2.2 is
for the host 20.20.20.100/32.
Switch:1(config)# ip mroute static-source-group 224.32.2.1 10.10.10.0/24
Switch:1(config)# ip mroute static-source-group 226.50.2.2 20.20.20.100/32
Variable definitions
Use the definitions in the following table to use the ip mroute static-source-group command.
Variable Value
A.B.C.D Specifies the IP address of the multicast group. Use the no
operator to later remove this configuration.
A.B.C.D/X Specifies the multicast source IP address and subnet
mask for the static source group entry. You cannot create
duplicate groups. How you configure the source address
depends on the protocol and mode you use.
Use the no operator to later remove this configuration.
When you configure the IP multicast software forwarding feature the system forwards the initial packets
of an IP multicast data stream it receives and creates a corresponding hardware record for subsequent
packets.
Note
This procedure is supported only on a DvR Controller. It is not supported on a DvR Leaf node.
IP multicast software forwarding is a global system configuration feature that is only applicable to
traditional PIM protocol and IGMP Snooping protocols, not SPB-PIM Gateway or Layer 3 VSN SPB
Multicast. If you enable IP multicast software forwarding, the hardware continues to forward IP multicast
traffic. The software only forwards initial data traffic.
After a new data stream arrives, the first data packet is sent to the CPU, which programs the multicast
route in hardware, and all packets that arrive subsequent to this programming are forwarded by
hardware only.
If you enable software forwarding, all initial packets received before hardware programming is complete
are sent to the CPU for forwarding and packet suppression by the hardware is disabled.
If you do not enable software forwarding, only the first data packet is sent to the CPU and subsequent
packets are suppressed by the hardware so that the CPU is not overwhelmed with traffic. During this
time, packets suppressed by the hardware are dropped.
Important
To avoid overloading the CPU, ensure that you do not use the IP multicast software
forwarding feature for video multicast applications.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable software forwarding:
multicast software-forwarding
3. Show the software forwarding configuration:
show multicast software-forwarding
Example
Switch:1#show multicast software-forwarding
================================================================================
Mcast Software Forwarding - GlobalRouter
================================================================================
McastSoftwareForwarding :enabled
Note
This procedure is supported only on a DvR Controller. It is not supported on a DvR Leaf node.
After you configure the counter thresholds for ingress and egress records, if the record usage exceeds
the threshold, you receive notification by a trap on the console, a logged message, or both.
If you do not configure the thresholds, the system displays only the ingress and egress records currently
in use.
You can configure the resource usage counter on a VRF instance the same way you configure the
Global Router except that you must use VRF Router Configuration mode.
Procedure
configure terminal
2. Configure the thresholds:
ip mroute resource-usage egress-threshold <0–32767> ingress-threshold
<0–32767>
3. Configure one of the following notification methods:
• Configure a log-only notification method:
Example
Variable definitions
Use the data in the following table to use the ip mroute resource-usage command.
Variable Value
egress-threshold <0–32767> Configures the egress record threshold (S,G). The
system sends a notification message after the number
of streams exceeds a threshold level.
To configure this option to the default value, use the
default operator with the command. The default is 0.
ingress-threshold <0–32767> Configures the ingress record threshold. The system
sends a notification message after the number of
streams exceeds a threshold level.
To configure this option to the default value, use the
default operator with the command. The default is 0.
The prefix list contains a set of contiguous or noncontiguous routes. Reference prefix lists by name from
within a routing policy.
Important
When you configure a prefix list for a route policy, add the prefix as a.b.c.d/32. You must enter
the full 32-bit mask to exact a full match of a specific IP address.
You configure prefix lists on a VRF instance the same way you configure the GlobalRouter, except that
you must use VRF Router Configuration mode.
Procedure
configure terminal
2. Configure a prefix list:
ip prefix-list WORD<1-64> {A.B.C.D/X} [ge <0–32>] [le <0–32>]
3. (Optional) Rename an existing prefix list:
ip prefix-list WORD<1-64> name WORD<1-64>
4. Display the prefix list:
show ip prefix-list [prefix {A.B.C.D}] [vrf WORD<1-16>] [vrfids
WORD<0-512>] [WORD <1-64>]
Example
List 1 LIST1:
47.17.121.50 24 24 24
1 Total Prefix List entries configured
--------------------------------------------------------------------------------
Name Appendix for Lists Converted from Old Config:
@A=conv addr list, @N=conv net list, @NR=conv net list modified as range
Variable definitions
The following table defines parameters for the ip prefix-list command.
Variable Value
{A.B.C.D/X} Specifies the IP address and the mask in one of the following
formats:
• a.b.c.d/x
• a.b.c.d/x.x.x.x
• default
The following table defines parameters for the show ip prefix-list command.
Variable Value
{A.B.C.D} Specifies the prefix to include in the command output.
vrf WORD<1-16> Specifies the name of the VRF.
Variable Value
vrfids WORD<0-512> Specifies the ID of the VRF and is an integer in the range of
0–512.
WORD<1-64> Specifies a prefix list, by name, to use for the command
output.
The following table defines parameters for the show ip prefix-list command output.
Variable Value
PREFIX Indicates the member of a specific prefix list.
MASKLEN Indicates the prefix mask length in bits.
FROM Indicates the prefix mask starting point in bits.
TO Indicates the prefix mask endpoint in bits.
This tab shows multicast routing information for IP datagrams from a particular source and addressed
to a particular IP multicast group address.
Note
This procedure is supported on a DvR Controller; it is not supported on a DvR Leaf node.
You can view the multicast routes for a Layer 3 Virtual Services Network (VSN) the same way you view
the Global Router except that you must first launch the appropriate VRF context.
Procedure
Name Description
Group Displays the IP multicast group address for this entry that contains
multicast routing information.
Source Displays the network address that, when combined with the
corresponding route SourceMask value, identifies the source that
contains multicast routing information.
SourceMask Displays the network mask that, when combined with the
corresponding route Source value, identifies the multicast source.
UpstreamNeighbor Shows the address of the upstream neighbor from which the IP
datagrams from these sources are received. The address is 0.0.0.0 if
the network is local.
Interface Displays the interface, slot and portnumber, or VLAN ID where IP
datagrams sent by these multicast sourcesto this multicast address are
received.
ExpiryTime Displays the amount of time that remains before this entry ages out.
The value 0 indicates that the entry is not subject to aging.
Protocol Displays the protocol as one of the following:
• other(1): none of the following
• local(2): manually configured
• netmgmt(3): configured by a network management protocol
• pimSparseMode(8): PIM-SMv2
• igmpOnly(10)
• pimSsmMode(11)
• spb (12)
• spbpimgw(13)
This tab shows information about the next hops used by outgoing interfaces to route IP multicast
datagrams. Each entry is one in a list of next hops on outgoing interfaces for particular sources that
send to a particular multicast group address.
You can view the multicast routes for a Layer 3 Virtual Services Network (VSN) the same way you view
the Global Router except that you must first launch the appropriate VRF context.
Procedure
Name Description
Group Displays the IP multicast group for this entry that specifies a next hop
on an outgoing interface.
Source Displays the network address that, when combined with the
corresponding next hop SourceMask value, identifies the source for this
entry that specifies a next hop on an outgoing interface.
SourceMask Displays the network mask that, when combined with the
corresponding next hop Source value, identifies the source for this
entry that specifies a next hop on an outgoing interface.
ReceiverPort Displays the receiver port for this next hop.
OutInterface Displays the interface slot and portnumber or VLAN ID for the
outgoing interface for this next hop.
Address Displays the address of the next hop specific to this entry. For
most interfaces, it is identical to the next-hop group. Non Broadcast
Multiple Access (NBMA) interfaces, however, can use multiple next hop
addresses out of a single outgoing interface.
State Displays whether the outgoing interface and next hop represented
by this entry currently forward IP datagrams. A value of forwarding
indicates the information is currently used; pruned indicates it is not
used.
UpTime Displays the up time for this entry.
ExpiryTime Displays the minimum amount of time that remains before this entry
ages out. The value 0 indicates that the entry is not subject to aging.
ClosestMemberHops Displays the minimum number of hops between this router and
members of the IP multicast group reached through the next hop on
this outgoing interface. IP multicast datagrams for the group that use
a time-to-live less than this number of hops are not forwarded to the
next hop.
Protocol Displays the protocol as one of the following:
• other(1): none of the following
• local(2): manually configured
• netmgmt(3): configured by a network management protocol
• pimSparseMode(8): PIM-SMv2
• igmpOnly(10)
• pimSsmMode(11)
• spb
You can view multicast interface information for a Layer 3 VSN the same way you view the Global
Router except that you must first launch the appropriate VRF context.
Note
This procedure is supported on a DvR Controller; it is not supported on a DvR Leaf node.
Procedure
Name Description
Interface Displays the slot and port number or VLAN ID for this entry.
Ttl Displays the datagram time-to-live (TTL) threshold for the interface. IP multicast
datagrams with a TTL less than this threshold are not forwarded out of the
interface. The default value of 0 means that all multicast packets are forwarded
out of the interface.
Protocol Displays the protocol as one of the following:
• other(1): none of the following
• local(2): manually configured
• netmgmt(3): configured by a network management protocol
• pimSparseMode(8): PIM-SMv2
• igmpOnly(10)
• pimSsmMode(11)
• spb
Note
This procedure is supported only on a DvR Controller. It is not supported on a DvR Leaf node.
The switch supports PIM only in the Global Router. You cannot configure static source groups for
specific VRF contexts.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click Multicast.
3. Click the Static Source Group tab.
4. Click Insert.
5. Complete the information in the dialog box.
6. Click Insert.
Note
This procedure is supported only on a DvR Controller. It is not supported on a DvR Leaf node.
The maximum number of static source groups must not exceed 1024.
The switch supports PIM only in the Global Router. You cannot configure static source groups for
specific VRF contexts.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click Multicast.
3. Click the Static Source Group tab.
4. Edit the required information.
5. Click Apply.
Name Description
GroupAddress Configures the multicast group IP address for this static source-group entry.
SourceSubnet Configures the multicast source address for this static source-group entry.
How you configure the source address depends on the protocol and mode
you use.
SrcSubnetMask Configures the subnet mask of the source for this static source-group entry.
Note
This procedure is supported only on a DvR Controller. It is not supported on a DvR Leaf node.
IP multicast software forwarding is a global system configuration feature that is only applicable to
traditional PIM protocol and IGMP Snooping protocols, not SPB-PIM Gateway or Layer 3 VSN SPB
Multicast. If you enable IP multicast software forwarding, the hardware still forwards IP multicast traffic.
The software forwards only initial data traffic.
After a new data stream arrives, the first data packet is sent to the CPU, which programs the
multicast route in hardware, and all packets that arrive subsequent to this programming are forwarded
by hardware only. If you enable software forwarding, all initial packets received before hardware
programming is complete are sent to the CPU for forwarding. If you enable software forwarding, packet
suppression by the hardware is disabled. If you do not enable software forwarding, only the first data
packet is sent to the CPU and subsequent packets are suppressed by the hardware so that the CPU is
not overwhelmed with traffic. During this time, packets suppressed by the hardware are dropped.
Important
To avoid overloading the CPU, do not use the IP multicast software forwarding feature for
video multicast applications.
If you configure multicast software forwarding from within a VRF context, the configuration applies
to the Global Router and all VRF contexts. You cannot change the multicast software forwarding
configuration for individual VRF contexts.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click Multicast.
3. Click the Globals tab.
4. Select the SWForwardingEnable check box.
5. Click Apply.
Name Description
SWForwardingEnable Enables the system to initially forward IP multicast
data until a hardware record is created. The
default is disabled.
StatsEnabled Enables or disables multicast route statistics. The
default is disabled.
StatsClear Clears multicast route statistics.
Procedure
Name Description
StreamLimitEnable Enables or disables mroute stream limit on the port.
StreamLimit Specifies the maximum number of multicast streams allowed to enter
the CPU through this port.
StreamTimerCheck Specifies the sampling period, in seconds, to check the number of
multicast streams that enter the CPU through this port.
Perform this procedure to limit the number of multicast streams to protect a Central Processing Unit
(CPU) from multicast data packet bursts generated by malicious applications, such as viruses that cause
the CPU to reach 100 percent utilization, or that prevent the CPU from processing protocol packets or
management requests. If more than a certain number of multicast streams ingress to a CPU through a
port during a sampling interval, the port shuts down until you take appropriate action.
Procedure
1. In the navigation pane, expand Configuration > Edit > Insight Port.
2. Select the Extreme Integrated Application Hosting (IAH) port you want to configure.
3. Select the Mroute Stream Limit tab.
4. Select StreamLimitEnable.
5. Configure other fields as required.
6. Select Apply.
Name Description
StreamLimitEnable Enables or disables mroute stream limit on the
Extreme Integrated Application Hosting (IAH)
port. The default is disabled.
StreamLimit Specifies the maximum number of multicast
streams allowed to enter the CPU through the IAH
port. The default value is 1984.
StreamTimerCheck Specifies the sampling period, in seconds, to
check the number of multicast streams that enter
the CPU through the IAH port. The default is 10
seconds.
Note
This procedure is supported only on a DvR Controller. It is not supported on a DvR Leaf node.
Important
If you do not configure the thresholds, EDM displays only the ingress and egress records that
are currently in use.
You can configure the resource usage counter on a VRF instance the same way you configure the
Global Router except that you must first launch the appropriate VRF context.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click Multicast.
3. Select the Resource Usage tab.
4. Configure the ingress and egress thresholds.
5. Configure the notification methods.
6. Click Apply.
Name Description
Egress Records In-Use Displays the number of egress records traversing the switch.
Ingress Records In-Use Displays the number of ingress records (source or group)
traversing the switch.
Egress Threshold Configures the egress threshold level (0–32767).
Ingress Threshold Configures the ingress threshold level (0–32767).
SendTrapOnly Sends only trap notification messages after the number of
streams exceeds a threshold level. Select disable if you select a
different notification type. You can configure only one notification
type.
SendTrapAndLog Sends both trap and log notification messages after the number
of streams exceeds a threshold level. Select disable if you select a
different notification type.
LogMsgOnly Sends only log notification messages after the number of streams
exceeds a threshold level. Select disable if you select a different
notification type.
These statistics are not related to the interface (port) statistics. Rather, the statistics are displayed based
on multicast group classification. By default, collection of multicast route statistics is disabled.
Note
When you enable IP multicast route statistics on the Controller node of a DvR domain, the
configuration is automatically pushed to the Leaf nodes within the domain.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable the collection of IP multicast route statistics.
ip mroute stats enable
3. (Optional) Set the IP multicast route statistics to default.
default ip mroute stats enable
4. (Optional) Disable the collection of IP multicast route statistics.
no ip mroute stats enable
5. View the IP multicast route statistics.
show ip mroute stats [WORD<3-160> {A.B.C.D[,E.F.G.H][,...]}]
Note
The maximum number of multicast group IP addresses is 10.
Example
==========================================================================
Multicast Stats
==========================================================================
--------------------------------------------------------------------------
Statistics : Enabled
==============================================================================
Multicast Stats - GlobalRouter
==============================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
------------------------------------------------------------------------------
225.0.0.1 1 30452198 3897881344 128
View the statistics for multiple (up to a maximum of 10) group IP addresses.
Switch:1#show ip mroute stats
225.0.0.1,225.0.0.2,225.0.0.3,225.0.0.4,225.0.0.5,225.0.0.6,225.0.0.7,225.0.0.8,225.0.0.9,
225.0.0.10
================================================================================
Multicast Stats - GlobalRouter
================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
--------------------------------------------------------------------------------
225.0.0.1 1 32446194 4153112832 128
225.0.0.2 1 32446196 4153112960 127
225.0.0.3 1 32446197 4153113088 127
225.0.0.4 1 32446198 4153113216 127
225.0.0.5 1 32446199 4153113472 128
225.0.0.6 1 32446200 4153113600 128
225.0.0.7 1 32446201 4153113728 128
225.0.0.8 1 32446203 4153113856 127
225.0.0.9 1 32446203 4153113856 127
225.0.0.10 1 32446203 4153113984 128
Variable definitions
Use the data in the following table to use the show ip mroute stats command.
Variable Definition
WORD<3-160> Specifies the multicast group IP address for which to display
{A.B.C.D[,E.F.G.H][,...]} statistics.
The group IP address is in one of the following formats: a
single IP address or a series of IP addresses.
You can specify a maximum of 10 groups.
Note
When you clear IP multicast route statistics on the Controller node of a DvR domain, the
configuration is automatically pushed to the Leaf nodes within the domain.
Procedure
Example:
Clear the IP multicast route statistics:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#clear ip mroute stats
Procedure
1. Enter Privileged EXEC mode:
enable
2. Monitor the IP multicast route statistics:
monitor ip mroute stats WORD<7-160> {A.B.C.D[,E.F.G.H][,...]}
Note
You can monitor a maximum of 10 group IP addresses.
Example:
Monitor the IP multicast route statistics for the group IP address 225.0.0.1. In this example, the
statistics are monitored at intervals of 5 seconds for a duration of 300 seconds.
MULTICAST STATISTIC
Monitor Interval: 5sec | Monitor Duration: 300sec Mon Dec 21 16:12:07 2015
======================================================================================
Multicast Stats - GlobalRouter
======================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
--------------------------------------------------------------------------------------
225.0.0.1 1 4716624 603727872 128
MULTICAST STATISTIC
Monitor Interval: 5sec | Monitor Duration: 300sec Mon Dec 21 16:12:13 2015
=======================================================================================
Multicast Stats - GlobalRouter
=======================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
---------------------------------------------------------------------------------------
225.0.0.1 1 4767325 610217600 128
MULTICAST STATISTIC
Monitor Interval: 5sec | Monitor Duration: 300sec Mon Dec 21 16:12:19 2015
...
...
Switch:1#
Monitor the IP multicast route statistics for a maximum of 10 group IP addresses. The statistics are
monitored at intervals of 5 seconds for a duration of 300 seconds.
========================================================================================
Multicast Stats - GlobalRouter
========================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
----------------------------------------------------------------------------------------
225.0.0.1 1 9532039 1220100992 128
225.0.0.2 1 9532041 1220101120 127
225.0.0.3 1 9532042 1220101248 127
225.0.0.4 1 9532043 1220101376 127
225.0.0.5 1 9532044 1220101632 128
225.0.0.6 1 9532045 1220101760 128
225.0.0.7 1 9532046 1220101888 128
225.0.0.8 1 9532047 1220101888 127
225.0.0.9 1 9532048 1220102016 127
225.0.0.10 1 9532048 1220102144 128
MULTICAST STATISTIC
Monitor Interval: 5sec | Monitor Duration: 300sec Mon Dec 21 16:22:13 2015
========================================================================================
Multicast Stats - GlobalRouter
========================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
----------------------------------------------------------------------------------------
225.0.0.1 1 9582672 1226582016 128
225.0.0.2 1 9582674 1226582144 127
225.0.0.3 1 9582675 1226582272 127
225.0.0.4 1 9582676 1226582400 127
225.0.0.5 1 9582677 1226582656 128
225.0.0.6 1 9582678 1226582784 128
225.0.0.7 1 9582679 1226582912 128
225.0.0.8 1 9582681 1226583040 127
225.0.0.9 1 9582681 1226583040 127
225.0.0.10 1 9582681 1226583168 128
MULTICAST STATISTIC
Monitor Interval: 5sec | Monitor Duration: 300sec Mon Dec 21 16:22:19 2015
========================================================================================
Multicast Stats - GlobalRouter
========================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
----------------------------------------------------------------------------------------
225.0.0.1 1 9625009 1232001152 128
225.0.0.2 1 9625011 1232001280 127
...
...
Switch:1#
Variable definitions
Use the data in the following table to use the monitor ip mroute stats command.
Variable Definition
WORD<7-160> Specifies the multicast group IP address for which to monitor
{A.B.C.D[,E.F.G.H][,...]} statistics.
The group IP address is in one of the following formats: a
single IP address or a series of IP addresses, up to a maximum
of 10.
These statistics are not related to the interface (port) statistics. Rather, the statistics are displayed based
on multicast group classification. By default, collection of multicast route statistics is disabled.
Procedure
configure terminal
2. Enable the collection of IPv6 multicast route statistics.
ipv6 mroute stats enable
3. (Optional) Set the IPv6 multicast route statistics to default:
default ipv6 mroute stats
4. (Optional) Disable the collection of IPv6 multicast route statistics.
no ipv6 mroute stats
5. View the IPv6 multicast route statistics.
show ipv6 mroute stats [WORD<7-400> {Ipv6address[,Ipv6address][,...]}]
Note
The maximum number of multicast group IP addresses is 10.
Example:
Enable collection of IPv6 multicast route statistics:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#ipv6 mroute stats enable
==========================================================================
Multicast Stats
==========================================================================
--------------------------------------------------------------------------
Statistics : Enabled
=====================================================================================
Multicast Stats - GlobalRouter
=====================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes
AverageSize
-------------------------------------------------------------------------------------
ff05:0:0:0:0:0:0:1 1 1962750 2355300000 1200
View the statistics for multiple group IP addresses (up to a maximum of 10).
Switch#show ipv6 mroute stats
FF05::1,FF05::2,FF05::3,FF05::4,FF05::5,FF05::6,FF05::7,FF05::8,FF05::9,FF05::a
=====================================================================================
Multicast Stats - GlobalRouter
=====================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes
AverageSize
-------------------------------------------------------------------------------------
ff05:0:0:0:0:0:0:1 1 2027508 2433009600 1200
ff05:0:0:0:0:0:0:2 1 2027507 2433008400 1200
ff05:0:0:0:0:0:0:3 1 2027507 2433008400 1200
ff05:0:0:0:0:0:0:4 1 2027507 2433008400 1200
ff05:0:0:0:0:0:0:5 1 2027507 2433008400 1200
ff05:0:0:0:0:0:0:6 1 2027505 2433006000 1200
ff05:0:0:0:0:0:0:7 1 2027505 2433006000 1200
ff05:0:0:0:0:0:0:8 1 2027505 2433006000 1200
ff05:0:0:0:0:0:0:9 1 2027505 2433006000 1200
ff05:0:0:0:0:0:0:a 1 2027505 2433006000 1200
Variable definitions
Use the data in the following table to use the show ipv6 mroute stats command
Variable Definition
WORD<7-400> Specifies the multicast group IP address for which to display
{Ipv6address[,Ipv6address] statistics.
[,...]} The group IP address is in one of the following formats: a
single IP address or a series of IP addresses.
You can specify a maximum of 10 groups.
Procedure
Example:
Clear the IPv6 multicast route statistics:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#clear ipv6 mroute stats
Procedure
Note
You can monitor a maximum of 10 group IP addresses.
Example:
Monitor the IPv6 multicast route statistics for the group IPv6 address FF05::1. In this example, the
statistics are monitored at intervals of 5 seconds for a duration of 300 seconds.
MULTICAST STATISTIC
Monitor Interval: 5sec | Monitor Duration: 300sec Tue Dec 22 16:54:25 2015
=================================================================================
Multicast Stats - GlobalRouter
=================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
----------------------------------------------------------------------------------
ff05:0:0:0:0:0:0:1 1 2446250 2935500000 1200
MULTICAST STATISTIC
Monitor Interval: 5sec | Monitor Duration: 300sec Tue Dec 22 16:54:31 2015
===================================================================================
Multicast Stats - GlobalRouter
===================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
-----------------------------------------------------------------------------------
ff05:0:0:0:0:0:0:1 1 2448947 2938736400 1200
MULTICAST STATISTIC
Monitor Interval: 5sec | Monitor Duration: 300sec Tue Dec 22 16:54:37 2015
==================================================================================
Multicast Stats - GlobalRouter
==================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
----------------------------------------------------------------------------------
ff05:0:0:0:0:0:0:1 1 2452185 2942622000 1200
...
...
Switch:1#
Monitor the IPv6 multicast route statistics for a maximum of 10 group IPv6 addresses. The statistics are
monitored at intervals of 5 seconds for a duration of 300 seconds.
===================================================================================
Multicast Stats - GlobalRouter
===================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
-----------------------------------------------------------------------------------
ff05:0:0:0:0:0:0:1 1 2768926 3322711200 1200
ff05:0:0:0:0:0:0:2 1 2768925 3322710000 1200
ff05:0:0:0:0:0:0:3 1 2768925 3322710000 1200
ff05:0:0:0:0:0:0:4 1 2768925 3322710000 1200
====================================================================================
Multicast Stats - GlobalRouter
====================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
------------------------------------------------------------------------------------
ff05:0:0:0:0:0:0:1 1 2771625 3325950000 1200
ff05:0:0:0:0:0:0:2 1 2771625 3325950000 1200
ff05:0:0:0:0:0:0:3 1 2771625 3325950000 1200
ff05:0:0:0:0:0:0:4 1 2771624 3325948800 1200
ff05:0:0:0:0:0:0:5 1 2771624 3325948800 1200
ff05:0:0:0:0:0:0:6 1 2771622 3325946400 1200
ff05:0:0:0:0:0:0:7 1 2771622 3325946400 1200
ff05:0:0:0:0:0:0:8 1 2771622 3325946400 1200
ff05:0:0:0:0:0:0:9 1 2771622 3325946400 1200
ff05:0:0:0:0:0:0:a 1 2771622 3325946400 1200
MULTICAST STATISTIC
Monitor Interval: 5sec | Monitor Duration: 300sec Tue Dec 22 17:05:07 2015
====================================================================================
Multicast Stats - GlobalRouter
====================================================================================
GroupAddress SourceCounter IngressPackets IngressBytes AverageSize
------------------------------------------------------------------------------------
ff05:0:0:0:0:0:0:1 1 2774864 3329836800 1200
ff05:0:0:0:0:0:0:2 1 2774863 3329835600 1200
ff05:0:0:0:0:0:0:3 1 2774863 3329835600 1200
ff05:0:0:0:0:0:0:4 1 2774863 3329835600 1200
ff05:0:0:0:0:0:0:5 1 2774863 3329835600 1200
ff05:0:0:0:0:0:0:6 1 2774861 3329833200 1200
ff05:0:0:0:0:0:0:7 1 2774861 3329833200 1200
ff05:0:0:0:0:0:0:8 1 2774861 3329833200 1200
ff05:0:0:0:0:0:0:9 1 2774861 3329833200 1200
ff05:0:0:0:0:0:0:a 1 2774861 3329833200 1200
...
...
Switch:1#
Variable definitions
Use the data in the following table to use the monitor ipv6 mroute stats command:
Variable Definition
WORD<7-400> Specifies the multicast group IP address for which to monitor
{Ipv6address[,Ipv6address] statistics.
[,...]} The group IP address is in one of the following formats: a
single IP address or a series of IP addresses, up to a maximum
of 10.
Note
When you enable or clear IP multicast route statistics on the Controller node of a DvR domain,
the configuration is automatically pushed to the Leaf nodes within the domain.
Procedure
Field Description
StatsEnabled Displays whether the multicast route statistics is enabled.
StatsClear Clears the multicast route statistics.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IP.
2. Click Multicast.
3. Click the Stats tab to view the statistics.
Field Description
GroupAddress Specifies the multicast group IP address for which to show
statistics.
SourceCounter Specifies the number of sources associated with the
multicast route record.
Pkts Specifies the number of packets received for the
associated IP address.
Bytes Specifies the number of bytes received for the associated
IP address.
AverageSizePerPkt Specifies the average packet length for the associated
group IP address. This information indicates only the
ingress packet length and is calculated using the following
formula: ingress packet/ingress byte.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 Mroute.
3. Click the Globals tab.
4. In the StatsEnabled field, select the option to enable or disable the collection of statistics.
5. (Optional) To clear the statistics, click StatsClear.
6. Click Apply.
Field Description
StatsEnabled Displays whether the multicast route statistics is enabled.
StatsClear Clears the multicast route statistics.
Procedure
1. In the navigation pane, expand the following folders: Configuration > IPv6.
2. Click IPv6 Mroute.
3. Click the Stats tab to view the statistics.
Field Description
GroupAddress Specifies the multicast group IP address for which to show
statistics.
SourceCounter Specifies the number of sources associated with the
multicast route record.
Pkts Specifies the number of packets received for the
associated IP address.
Bytes Specifies the number of bytes received for the associated
IP address.
AverageSizePerPkt Specifies the average packet length for the associated
group IP address. This information indicates only the
ingress packet length and is calculated using the following
formula: ingress packet/ingress byte.
(PIM-SM) or Protocol Independent Multicast-Source Specific Multicast (PIM-SSM). A BEB can forward
a multicast stream anywhere in an SPBM network where IS-IS advertises the stream to the rest of the
fabric.
The advantage of this solution over traditional approaches is the simplicity in provisioning and
deploying IP multicast bridging and routing. Also, due to the fact that only one control plane protocol
(IS-IS) exists, convergence times in the event of a network failure, are typically sub second.
You can compare the quick convergence times for IP Multicast over Fabric Connect to Interior Gateway
Protocols like Open Shortest Path First (OSPF) combined with PIM-SM or PIM-SSM. OSPF combined
with PIM-SM or PIM-SSM can have recovery times that are sub optimal with convergence times that
take tens of seconds. PIM experiences longer convergence times, in part, because unicast IP routing
protocols must converge before PIM can converge. PIM also maintains the network state for every
multicast group and uses a mechanism based on each hop to update the network about state changes,
which affects scalability.
IP Multicast over Fabric Connect is extremely scalable because you only apply the multicast bridging
and routing functionality at the SPBM fabric edge, with the streams mapped to SPBM multicast trees in
the fabric.
IP Multicast over Fabric Connect introduces extensions to the SPBM IS-IS control plane to exchange
IP multicast stream advertisement and membership information. IP Multicast over Fabric Connect uses
these extensions, along with the Internet Group Management Protocol (IGMP) Snooping and Querier
functions at the edge of the SPBM cloud, to create sub-trees of the VSN SPB for each multicast group
to transport IP multicast data.
With IP Multicast over Fabric Connect, the switch supports the following:
• Layer 2 Virtual Services Network with IGMP support on the access networks for optimized
forwarding of IP multicast traffic in a bridged network (Layer 2 VSN with IP Multicast over Fabric
Connect). Example application: Multicast in data centers.
• IP multicast routing support for IP Shortcuts using SPBM in the core and IGMP on the access
(IP Shortcuts with IP Multicast over Fabric Connect). Example applications: Video surveillance, TV/
Video/Ticker/Image distribution, VX-LAN.
• Layer 3 Virtual Services Network with VRF based routing support for IP Multicast over Fabric
Connect in the core and IGMP on the access (Layer 3 VSN with IP Multicast over Fabric Connect).
Example applications: Video surveillance, TV/Video/Ticker/Image Distribution, VX-LAN, Multi-tenant
IP multicast.
IP Multicast over Fabric Connect and Universal Plug and Play Filtering
When multicast packets are received on IGMP-enabled interfaces and the multicast group matches the
range of groups to be filtered, Universal Plug and Play (uPnP) Filtering drops them.
For more information, see Universal Plug and Play Filtering on page 1691.
The following figure shows how multicast senders and receivers connect to the SPBM cloud using BEBs.
Scope level
IP Multicast over Fabric Connect constrains all multicast streams within the level in which they originate,
which is called the scope level. In other words, if a sender transmits a multicast stream to a BEB on a
C-VLAN (a VLAN that is mapped to an I-SID, for instance, a Layer 2 VSN) with IP Multicast over Fabric
Connect enabled, only receivers that are part of the same Layer 2 VSN can receive that stream. Similarly,
if a sender transmits a multicast stream to a BEB on a VLAN that is part of the GRT or a Layer 3 VSN
with IP Multicast over Fabric Connect enabled, only receivers that are part of the same Layer 3 instance
(GRT or L3 VSN) can receive that stream.
Note
In the context of IP Multicast over Fabric Connect, scope is either the Global Routing Table or
the I-SID value of the Layer 2 or Layer 3 VSN associated with the local VLAN on which the IP
multicast data was received.
Data I-SID
After the BEB receives the IP multicast stream from the sender, a BEB allocates a data Service Identifier
(I-SID) in the range of 16,000,000 to 16,512,000 for the stream. The stream is identified by the S,G, V
tuple, which is the source IP address, the group IP address, and the local VLAN the multicast stream is
received on.
The BEB propagates this information through the SPBM cloud by using IS-IS TLV updates in LSPs, which
results in the creation of a multicast tree for that stream. All BEBs now know what data I-SID to use for
that stream and its scope. The data I-SID is a child of the scope or VSN I-SID. If no receiver requests the
IP multicast stream, the ingress BEB does not forward the multicast stream.
IGMP
After a BEB receives an IGMP join message from a receiver, a BEB queries the IS-IS database to check if
a sender exists for the requested stream within the scope of the receiver. If the requested stream does
not exist, the IGMP information is kept, but no further action is taken. If the requested stream exists, the
BEB sends an IS-IS TLV update to its neighbors to inform them of the presence of a receiver, and this
information is propagated through the SPBM cloud.
IS-IS acts dynamically using the TLV information it receives from BEBs that connect to the sender and
the receivers to create a multicast tree between them. IS-IS creates very efficient multicast trees for
the data I-SID allocated at the sender edge of the SPBM cloud to transport data between the sender
and the receivers. The data I-SID uses Tx/Rx bits to signify whether the BEB uses the I-SID to transmit,
receive, or both transmit and receive data on that I-SID. After IS-IS creates the multicast tree, the sender
transports data to the receiver across the SPBM cloud using the data I-SID.
The trigger to send IS-IS updates to announce a multicast stream into the SPBM cloud is the multicast
traffic arriving at the BEB. Because the BEB only interacts with IGMP and not PIM, all multicast traffic
must be drawn towards the BEB for the stream to be announced, which SPBM accomplishes by making
the BEB an IGMP Querier. In a VLAN, the IGMP Querier sends out periodic IGMP queries.
Note
The BEB must be the only IGMP Querier in the VLAN. If the BEB receives an IGMP query from
any other device, it causes unexpected behavior, including traffic loss.
The BEB only interacts with IGMP messages and not PIM. All multicast traffic must enter the BEB for the
data stream to be announced.
The BEB must be the only IGMP Querier in the VLAN. If the BEB receives an IGMP query from any other
device, unexpected behavior results, including traffic loss.
The IGMP query message is an IP packet and requires a source IP address. However, Layer 2 IGMP
Snooping with SPBM by default turns on the service without the configuration of an IP address on the
VLAN. By default, the BEB sends an IGMP query message with an IP source address of 0.0.0.0. If there
are interoperability issues with third party vendors as a result of the 0.0.0.0 IP address, then you can
configure the querier address under IGMP, without having to configure an IP address for the Layer 2
VSN VLAN.
IGMP Snooping, operating on the Layer 2 VSN, listens to conversations between hosts and routers, and
maintains a table for links that need IP multicast streams.
For IGMP Snooping, ensure that the IGMP version used by multicast hosts and other devices in the
network is the same as the IGMP version configured on the IGMP Snooping VLAN, or that you enable
compatibility mode.
For more conceptual and configuration information on IGMP, see IP Multicast on page 1457.
The following figure shows how multicast senders and receivers connect to the SPBM cloud using BEBs.
IGMP Snooping is widely used on Layer 2 access switches to prune multicast traffic. In IP Multicast over
Fabric Connect, BEBs are the IGMP Queriers, therefore access switches forward multicast data from the
senders as well as IGMP control messages from receivers to the BEBs.
When a sender transmits multicast data to the Layer 2 access switch that has an MLT to the switch
cluster, it is hashed towards one or the other BEBs in the switch cluster. The receiving BEB allocates a
data I-SID and sends a TLV update on either the primary B-VLAN or the secondary B-VLAN, depending
on whether the BEB is the primary or secondary switch. The primary switch uses the primary B-VLAN,
whereas, the secondary switch uses the secondary B-VLAN. This information is propagated through the
SPBM fabric so all BEBs are aware of this stream availability.
The sender information is also synchronized over the vIST to the peer switch. Then the peer switch
allocates a data I-SID for the multicast stream and sends a TLV update on the appropriate B-VLAN to
announce the availability of the stream. The data I-SIDs allocated by the primary and secondary switch
cluster peers may be the same or different, as they are allocated independently by each switch.
Note
If a sender attaches to only one BEB in a switch cluster, the sender information is not
synchronized over the vIST because it is not SMLT attached. The sender information is
advertised, and data is sent on either the primary or secondary B-VLAN. The odd-numbered
data I-SIDs use the primary B-VLAN, and the even-numbered data I-SIDs use the secondary
B-VLAN. The same hashing rules apply to the forwarding of multicast data.
When a receiver sends an IGMP join message to the Layer 2 access switch that has an MLT to the switch
cluster, it is hashed towards one or the other BEBs in the switch cluster. The receiving BEB queries the
IS-IS Link State Database (LSDB) to check if a sender exists for the requested stream within the scope
of the receiver.
If the requested stream does not exist, the BEB keeps the IGMP information but no further action is
taken. If the requested stream exists, the BEB sends an IS-IS Link State Packet (LSP), with TLV update
information, for both primary and secondary B-VLANs to its neighbors to inform them of the presence
of a receiver. The BEB propagates this information through LSPs through the SPBM cloud. The receiver
information is also synchronized over the vIST to the peer switch. The peer switch then queries its
IS-IS Link State Database (LSDB) and, if the requested stream exists, it sends an IS-IS LSP, with a TLV
update, for both primary and secondary B-VLANs to its neighbors to inform them of the presence of
the receiver.
IS-IS uses these TLV updates in LSPs to create multicast shortest path first trees in the SPBM fabric.
IS-IS creates a shortest path first tree for the primary and secondary B-VLANs, but only one of the
B-VLANs transports multicast data with the other in active standby in case of failures at the SPBM edge.
After IS-IS creates the trees, multicast data flows between senders and receivers.
The following section summarizes the IP Multicast over Fabric Connect actions in an SMLT environment.
The BEBs on the sender side behave as follows:
• Primary SMLT peer BEB always advertises the streams it receives, and sends data for them on the
primary B-VLAN.
• Secondary SMLT peer BEB always advertises the streams it receives, and sends data for them on the
secondary B-VLAN.
• Non-SMLT BEBs or SMLT BEBs with single attached senders advertise streams, and send data on
the primary or secondary B-VLAN based on hash criteria (odd-numbered data I-SIDs use primary
B-VLAN; even-numbered data I-SIDs use secondary B-VLAN).
• The secondary SMLT peer BEB that receives multicast data on secondary B-VLAN sends data to
both SMLT and non-SMLT SPBM access (UNI) links.
• The non-SMLT BEB that receives multicast data on primary or secondary B-VLAN sends data to all
SPBM access (UNI) links.
For C-VLANs in an SMLT environment, the vIST ports are not part of the VLAN.
IGMP on a C-VLAN behaves as follows to account for the fact that vIST peers do not see the
membership queries of each other:
• The vIST peer with the higher IP address sends the queries out all SMLT and non-SMLT ports on
SPBM access links.
• The vIST peer with the lower IP address only sends out queries on its non-SMLT ports. This includes
SMLT ports whose remote ports are down (SMLT state of ‘norm’).
• With the existence of an vIST peer with a higher IP address and an vIST peer with a lower IP address,
it means two queriers exist within the C-VLAN. Having two queriers poses no problems in this SPB
environment, as all SMLT access devices see the vIST peer with the higher IP address as the querier,
and non-SMLT access devices see the directly connected vIST peer as the querier. Non-SMLT access
devices that connect on either side of the vIST peers can talk to each other using the SPBM cloud.
Considerations when you connect an IP Multicast over Fabric Connect network to a PIM network
IP Multicast over Fabric Connect does not integrate PIM functionality. Apply the following
considerations when you connect to a PIM network:
• You must configure static IGMP receivers on the BEB access interface that faces the PIM network
when the sender is on the SPBM access network and the receiver is on the PIM network.
Note
The PIM router must have a configuration option to accept streams with non-local sources
or the router drops the packets. The switch does not support a configuration option to
accept streams with non-local sources.
You must configure static IGMP receivers on the PIM interface that face the IP Multicast over Fabric
Connect network when the sender is on the PIM network and the receiver is on the SPBM access
network.
Note
For security reasons and to limit unnecessary multicast streams from being injected into
the SPBM domain, you should configure ACLs on the BEB facing the PIM network.
IGMP
The BEB must be the only IGMP querier in the network. If the BEB receives an IGMP query from any
other device, it causes unpredictable behavior, including traffic loss.
SPBM supports IGMP Snooping on a C-VLAN, but it does not support PIM on a C-VLAN. If you enable
IGMP Snooping on a C-VLAN, then its operating mode is Layer 2 VSN with IP Multicast over Fabric
Connect.
SPBM supports Network Load Balancing (NLB) unicast and multicast modes. SPBM does not support
NLB Multicast operation with IGMP.
Note
The NLB Multicast operation feature is not supported on all hardware platforms. For more
information about feature support, see VLAN Feature Support on page 3761.
You must enable SSM snoop before you configure IGMP version 3, and you must enable both ssm-
snoop and snooping for IGMPv3.
For IGMP Snooping, ensure that the IGMP version used by multicast hosts and other devices in the
network is either the same as the IGMP version configured on the IGMP Snooping VLAN, or that
compatibility mode is enabled.
SSM
If you delete any ssm-map in a static range group, the switch deletes the entire static range group. For
example, create an ssm-map for 232.122.122.122 to 232.122.122.122.128 and after that configure this same
range in a static group. If you delete any ssm-map between 232.122.122.122. to 232.122.122.128, the switch
deletes the entire static range group.
PIM
There can be no interaction with PIM and multicast routers on the access.
The BEB only interacts with IGMP messages and not PIM, so all multicast traffic must be drawn towards
the BEB, which acts as the IGMP querier, for the stream to be announced.
IP Multicast over Fabric Connect does not integrate PIM functionality so the following considerations
apply when connecting to a PIM network:
• You must configure static IGMP receivers on the BEB access interface facing the PIM network when
the sender is on the SPBM access network and the receiver is on the PIM network. Static IGMP
receivers make the PIM router accept streams and avoid a Reverse Path Forwarding (RPF) check
that can change the source of the stream.
• You must configure static IGMP receivers on the PIM interface facing the IP Multicast over Fabric
Connect network when the sender is on the PIM network and the receiver is on the SPBM access
network.
• You must configure Access Control Lists (ACLs) on the BEB facing the PIM network for security.
Data I-SID
The BEB matches a single multicast stream to a particular data I-SID. As a result there is a one-to-one
mapping between the S,G to data I-SID for each BEB.
Supported services
The switch does not support IP Multicast over Fabric Connect routing on inter-VSN routing interfaces.
The switch supports the following modes of IP Multicast over Fabric Connect:
• Layer 2 VSN multicast service — Multicast traffic remains within the same Layer 2 VSN across the
SPBM cloud.
• Layer 3 VSN multicast service — Multicast traffic remains within the same Layer 3 VSN across the
SPBM cloud.
• IP Shortcuts multicast service — Multicast traffic can cross VLAN boundaries but remains confined
to the subset of VLANs with the Global Routing Table that have IP Multicast over Fabric Connect
enabled.
Multicast FIB
SPBM runs all pair Dijkstras to produce the multicast FIB. The computing node loops through each node
to run Dijkstra using that node as the root, and then prunes paths to only keep the shortest paths. The
computing node then computes the intersection of the set of I-SIDs for which the root node transmits,
with the set of I-SIDs for which the path endpoints receive.
The multicast addresses are built out of two pieces: the SPBM Node Nickname and the I-SID ID
converted to hexadecimal format to form the multicast MAC address.
|----------------------------|---------------------------------|
nickname|0x30000 hexadecimal I-SID
For example, if the nickname is 0.00.10 and the I-SID is 100 (0x64), the multicast address is
03:00:10:00:00:64.
==========================================================================================
SPBM MULTICAST FIB ENTRY INFO
==========================================================================================
MCAST DA ISID BVLAN SYSID HOST-NAME OUTGOING-INTERFACES INCOMING
INTERFACE
------------------------------------------------------------------------------------------
03:00:07:e4:e2:02 15000066 1001 0077.0077.0077 Switch-25 1/33 MLT-2
03:00:08:e4:e2:02 15000066 1001 0088.0088.0088 Switch-33 1/50,1/33 40.40.40.40
03:00:41:00:04:4d 1101 4058 00bb.0000.4100 Switch-1(*)1/3,1/49,0.0.0.0 Tunnel_to_HQ
03:00:41:00:04:4f 1103 4058 00bb.0000.4100 Switch-1(*)1/3,1/49,0.0.0.0 cpp
------------------------------------------------------------------------------------------
Total number of SPBM MULTICAST FIB entries 4
------------------------------------------------------------------------------------------
uPnP Filtering applies to both multicast receivers and multicast senders. If you want to use the uPnP
Filtering address range for actual multicast streaming, you must disable uPnP Filtering on the IGMP
interface.
uPnP Filtering is disabled by default. If you create a new IGMP interface, uPnP Filtering is enabled
automatically on the interface for the destination multicast IP address range 239.255.255.250/32. If you
enable uPnP Filtering on an existing IGMP-enabled interface with senders and receivers already present,
the filter does not delete the existing senders or receivers; the filter begins to drop packets from that
point forward. Existing senders and receivers eventually expire and senders are not relearned.
You can use CLI or EDM to configure a different destination multicast IP address range.
You must configure IP Multicast over Fabric Connect at the global level, and then enable it on the
service option or options you choose.
Note
IP Multicast over Fabric Connect uses I-SIDs starting at 16,000,000 and above. If Layer 2 or
Layer 3 I-SIDs are in this range, the system displays an error message and the switch does not
enable IP Multicast over Fabric Connect.
Note
You must enable IP multicast over Fabric Connect globally on all DvR enabled nodes
(Controllers and Leaf nodes) in a DvR domain.
You must enable IP multicast over Fabric Connect globally on all DvR enabled nodes
(Controllers and Leaf nodes) in a DvR domain.
• You must configure the required SPBM and IS-IS infrastructure, which includes the creation of SPBM
B-VLANs.
• You must create the customer VLANs (C-VLANs) and add slots/ports.
• You must add IST slot/ports to the C-VLAN for an SMLT topology.
Procedure
configure terminal
router isis
4. Enable IP Multiast over Fabric Connect globally:
spbm <1–100> multicast enable
Note
Example
Variable definitions
Variable Value
<1–100> Enables IP Multicast over Fabric Connect globally. The default is disabled.
Specifies the SPBM instance. The switch only supports one instance.
Procedure
Example
multicast : enable
fwd-cache-timeout(seconds) : 210
============================================================================
SPB multicast - Summary
============================================================================
SCOPE SOURCE GROUP DATA LSP HOST
I-SID ADDRESS ADDRESS I-SID BVID FRAG NAME
-----------------------------------------------------------------------------
GRT 192.0.2.102 233.252.0.1 16000001 63 0x0 DIST5A
Switch:1>show ip mroute route
================================================================================
Mroute Route - GlobalRouter
================================================================================
GROUP SOURCE SRCMASK UPSTREAM_NBR IF EXPIR PROT
--------------------------------------------------------------------------------
233.252.0.1 0.0.0.0 0.0.0.0 0.0.0.0 V3 30 spb-access
233.252.0.1 192.0.2.102 255.255.255.0 0.0.0.0 - 0 spb-network
233.252.0.2 0.0.0.0 0.0.0.0 0.0.0.0 V2 30 pimsm
225.1.1.1 198.51.100.99 255.255.255.0 0.0.0.0 V3 173 spb-pim-gw
Total 4
Variable Definitions
The following table defines parameters for the show isis spb-mcast-summary command.
Variable Value
count Displays the total number of SPB multicast entries.
host-name WORD<0–255> Displays the IP Multicast over Fabric Connect summary
information for a specific host-name.
lspid <xxx.xxx.xxx.xx-xx> Displays the IP Multicast over Fabric Connect summary
information for the specified LSP ID that you enter in
xxx.xxx.xxx.xx-xx — 8 byte format.
The following table defines parameters for the show ip mroute route command.
Variable Value
vrf WORD<1–32> Specifies a VRF.
vrfids WORD<0–255> Specifies the VRF ID
In SPBM, B-MAC addresses are carried within the IS-IS link-state database. To do this, SPBM supports an
IS-IS TLV that advertises the I-SID and B-MAC information across the network. Each node has a System
ID, which also serves as Backbone MAC address (B-MAC) of the switch. These Backbone MAC addresses
are populated into the SPBM VLAN Forwarding Information Base (FIB).
When the network topology is discovered and stored in the IS-IS link-state database, each node
calculates shortest path trees for each source node, so that a unicast path now exists from every node
to every other node. With this information, each node populates unicast information received from
SPBM into the FIB for forwarding purposes.
The multicast FIB is not produced until virtual services are configured and learned.
Procedure
1. Enter Privileged EXEC mode:
enable
2. Display the SPBM multicast FIB:
show isis spbm multicast-fib [vlan <1-4059>] [i-sid <1–16777215>]
[nick-name <x.xx.xx>] [summary]
Example
Switch#show isis spbm multicast-fib
==========================================================================================
SPBM MULTICAST FIB ENTRY INFO
==========================================================================================
MCAST DA ISID BVLAN SYSID HOST-NAME OUTGOING-INTERFACES INCOMING
INTERFACE
------------------------------------------------------------------------------------------
03:00:07:e4:e2:02 15000066 1001 0077.0077.0077 Switch-25 1/33 MLT-2
03:00:08:e4:e2:02 15000066 1001 0088.0088.0088 Switch-33 1/50,1/33 40.40.40.40
03:00:41:00:04:4d 1101 4058 00bb.0000.4100 Switch-1(*) 1/3,1/49,0.0.0.0
Tunnel_to_HQ
03:00:41:00:04:4f 1103 4058 00bb.0000.4100 Switch-1(*) 1/3,1/49,0.0.0.0 cpp
------------------------------------------------------------------------------------------
Total number of SPBM MULTICAST FIB entries 4
------------------------------------------------------------------------------------------
Variable Definitions
The following table defines parameters for the show isis spbm multicast-fib command.
Variable Value
vlan <1-4059> Displays the FIB for the specified SPBM VLAN.
i-sid <1–16777215> Displays the FIB for the specified I-SID.
nick-name <x.xx.xx> Displays the FIB for the specified nickname.
summary Displays a summary of the FIB.
Use the following procedure to enable Universal Plug and Play (uPnP) Filtering on an IGMP-enabled
interface. uPnP Filtering is disabled by default.
The default uPnP Filtering multicast group address range is 239.255.255.250/32. If you do not configure
the multicast group range, uPnP Filtering filters multicast packets destined for the default multicast
group range.
Procedure
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Example
Enable uPnP Filtering on a VLAN using the default multicast group address range:
Enable uPnP Filtering on a VLAN with configured multicast group address range:
Variable Definitions
The following table defines parameters for the ip igmp upnp-filter command.
Variable Value
gigabitethernet {slot/ Identifies the slot and port in one of the following formats: a single
port[/sub-port] [- slot and port (slot/port), a range of slots and ports (slot/port-slot/
slot/port[/sub-port]] port), or a series of slots and ports (slot/port,slot/port,slot/port). If
[,...]} the platform supports channelization and the port is channelized,
you must also specify the sub-port in the format slot/port/sub-
port.
ip {A.B.C.D/X} Configures the multicast destination IP address range to filter
for an IGMP interface. The default multicast group address is
239.255.255.250/32.
vlan <1-4059> Specifies the VLAN.
Procedure
Example
View uPnP Filtering information on an IGMP-enabled interface when uPnP Filtering is enabled and a
non-default multicast group address is configured:
Switch:1(config)#show ip igmp interface vlan 2
=======================================================================================
Vlan Ip Igmp
=======================================================================================
VLAN QUERY QUERY ROBUST VERSION LAST PROXY SNOOP SNOOP SSM UPnP FAST FAST
ID INTVL MAX MEMB SNOOP ENABLE ORIGIN SNOOP FILTER LEAVE LEAVE
RESP QUERY ENABLE ENABLE ENABLE ENABLE PORTS
---------------------------------------------------------------------------------------
2 125 100 2 2 10 false false RADIUS false true false
Variable Definitions
The following table defines parameters for the show ip igmp interface command.
Variable Value
gigabitethernet {slot/ Identifies the slot and port in one of the following formats: a
port[/sub-port] [-slot/ single slot and port (slot/port), a range of slots and ports (slot/
port[/sub-port]] [,...]} port-slot/port), or a series of slots and ports (slot/port,slot/
port,slot/port). If the platform supports channelization and the
port is channelized, you must also specify the sub-port in the
format slot/port/sub-port.
vlan <1-4059> Specifies the VLAN.
vrf WORD<1–16> Specifies the VRF by name.
vrfids WORD<0–512> Specifies the VRF by VRF ID.
You must configure IP Multicast over Fabric Connect at the global level, and then enable it on
the service option or options you choose.IP Multicast over Fabric Connect uses I-SIDs that start at
16,000,000 and above. The device displays an error message if the Layer 2 and Layer 3 I-SIDs are within
this range and the system does not enable IP Multicast over Fabric Connect.
Important
IP Multicast over Fabric Connect uses I-SIDs that start at 16,000,000 and above. The device
displays an error message if the Layer 2 and Layer 3 I-SIDs are within this range and the
system does not enable IP Multicast over Fabric Connect.
Note
You must enable IP multicast over Fabric Connect globally on all DvR enabled nodes
(Controllers and Leaf nodes) in a DvR domain.
Procedure
1. In the navigation pane, expand Configuration > Fabric > SPBM to determine if any I-SIDs are within
the default range reserved for multicast..
2. Select the I-SID tab to determine if the I-SIDs are within the default range reserved for multicast.
3. In the navigation pane, expand Configuration > Fabric > SPBM.
4. Select the SPBM tab.
5. If you want to enable multicast on an SPBM instance that already exists, in the Mcast column in the
table, select enable.
6. If you want to enable multicast on an SPBM instance that does not yet exit, select Insert.
7. In the Mcast box, select enable to enable IP Multicast over Fabric Connect globally.
8. Select Insert.
9. Select Apply.
Use the data in the following table to use the SPBM tab.
Name Description
Id Specifies the SPBM instance ID. Only one SPBM
instance is supported.
NodeNickName Specifies a nickname for the SPBM instance
globally. Valid value is 2.5 bytes in the format
<x.xx.xx>.
PrimaryVlan Specifies the primary SPBM B-VLANs to add to
the SPBM instance.
Vlans Specifies the SPBM B-VLANs to add to the SPBM
instance.
Name Description
LsdbTrap Configures whether to enable or disable a trap
when the SPBM LSDB changes. The default is
disable.
IpShortcut Enables or disables SPBM IP shortcut state. The
default is disable.
SmltSplitBEB Specifies whether the switch is the primary or
secondary vIST peer. The default is primary.
SmltVirtualBmac Specifies a virtual MAC address that can be used
by both peers.
SmltPeerSysId Specifies the system ID of the SPBM SMLT for this
SPBM instance.
Mcast Specifies if IP multicast over SPBM is enabled. The
default is disabled.
McastFwdCacheTimeout Specifies the global forward cache timeout in
seconds. The default is 210 seconds.
Ipv6Shortcut Enables or disables SPBM IPv6 shortcut state. The
default is disable.
McastSpbPimGwControllerEnable Enables or disables ISIS PLSB Multicast SPB PIM
Gateway controller. Disabled by default.
McastSpbPimGwGatewayEnable Enables or disables ISIS PLSB Multicast SPB PIM
Gateway. Disabled by default.
StpMultiHoming Enables or disables MSTP-Fabric Connect Multi
Homing.
The default is disabled (false).
BVlanOrigin Shows how the B-VLAN was created. The values
can be config for manual configuration using
Note: CLI or SNMP, or dynamic through Zero Touch
Exception: not supported on XA1400 Series and Fabric Configuration and Auto-sense. The default
VSP 8600 Series. is dynamic.
Procedure
Use the data in the following table to use the IpMcastRoutes tab.
Name Description
VsnIsid Specifies the VSN I-SID. Layer 2 VSN and Layer 3
VSN each require a VSN I-SID.
Group Specifies the group IP address for the IP Multicast
over Fabric Connect route.
Source Specifies the IP address where the IP Multicast
over Fabric Connect route originated.
NickName Specifies the nick name used to filter criteria.
SourceBeb Specifies the source BEB for the IP multicast route.
VlanID Specifies the ID for the C-VLAN.
VrfName Specifies the VRF name.
DataIsid Specifies the data I-SID for the IP Multicast
over Fabric Connect route. A a BEB receives IP
multicast data from a sender, a BEB allocates
a data I-SID in the range of 16,000,000 to
16,512,000 for the stream. The stream is identified
by the source IP address, group IP address, and
the local VLAN the stream is received on. The data
I-SID is a child of the scope or VSN I-SID.
Type Specifies the type for the IP Multicast over Fabric
Connect route.
Bvlan Specifies the B-VLAN for the IP Multicast over
Fabric Connect route.
NniInterfaces Specifies the NNI ports for the IP multicast route.
SPBM runs in the core on the ports that connect to
the core. These ports are NNI ports. Ports that face
a customer VLAN are user-to-network interface
(UNI) ports.
Procedure
Use the data in the following table to use the IpMcastRoutes Uni Ports tab.
Name Description
Group Specifies the group IP address for the IP Multicast
over Fabric Connect route.
Source Specifies the IP address where the IP Multicast
over Fabric Connect route originated.
VsnIsid Specifies the VSN I-SID. Layer 2 VSN and Layer 3
VSN each require a VSN I-SID.
DataIsid Specifies the data I-SID for the IP multicast route.
After a BEB receives the IP multicast data from
a sender, a BEB allocates a data I-SID in the
range of 16,000,000 to 16,512,000 for the stream.
The stream is identified by the source IP address,
group IP address, and the local VLAN the stream
is received on. The data I-SID is a child of the
scope or VSN I-SID.
SourceBeb Specifies the source BEB for the IP multicast route.
VlanId Specifies the ID for the C-VLAN.
VrfName Specifies the VRF name.
NniPorts Specifies the NNI ports for the IP multicast route.
SPBM runs in the core on the ports that connect
to the core. These ports are NNI ports. Ports facing
a customer VLAN are user-to-network interface
(UNI) ports.
Type Specifies the type for the IP multicast route.
Bvlan Specifies the B-VLANs for the IP multicast route.
In SPBM, B-MAC addresses are carried within the IS-IS link-state database. To do this, SPBM supports an
IS-IS TLV that advertises the I-SID and B-MAC information across the network. Each node has a System
ID, which also serves as Backbone MAC address (B-MAC) of the switch. These Backbone MAC addresses
are populated into the SPBM VLAN Forwarding Information Base (FIB).
When the network topology is discovered and stored in the IS-IS link-state database, each node
calculates shortest path trees for each source node, so that a unicast path now exists from every node
to every other node. With this information, each node populates unicast information received from
SPBM into the FIB for forwarding purposes.
The multicast FIB is not produced until virtual services are configured and learned.
Procedure
Use the data in the following table to use the Multicast FIB tab.
Name Description
SysId System ID of the node where the multicast FIB entry
originated.
Vlan VLAN of the multicast FIB entry.
McastDestMacAddr Multicast destination MAC Address of the multicast FIB entry
Isid I-SID of the multicast FIB entry.
Isid Name Name assigned to the I-SID.
HostName Host name of the node where the multicast FIB entry
originated.
OutgoingInterfaces Specifies the switched UNI port outgoing interface of
multicast FIB entry.
IncomingInterface Specifies the incoming interface (port or MLT) of the
multicast FIB entry.
SwitchC
enable
configure terminal
prompt SwitchC
SwitchG
enable
configure terminal
prompt SwitchG
SwitchD
enable
configure terminal
prompt SwitchD
router isis
spbm 1 multicast enable
exit
For more information on Layer 2 VSN configuration, see Layer 2 VSN configuration on page 1270.
After you configure ip igmp snooping on a VLAN that has an I-SID configured (a C-VLAN), that
VLAN is automatically enabled for IP Multicast over Fabric Connect services. No explicit configuration
exists separate from that to enable Layer 2 VSN IP Multicast over Fabric Connect.
Multicast traffic remains in the same Layer 2 VSN across the SPBM cloud for Layer 2 VSN IP Multicast
over Fabric Connect. IP Multicast over Fabric Connect constrains all multicast streams within the scope
level in which they originate. If a sender transmits a multicast stream to a BEB on a Layer 2 VSN with IP
Multicast over Fabric Connect enabled, only receivers that are part of the same Layer 2 VSN can receive
that stream.
I-SIDs
After a BEB receives IP multicast data from a sender, the BEB allocates a data service instance identifier
(I-SID) in the range of 16,000,000 to 16,512,000 for the multicast stream. The stream is identified by
the S, G, V tuple, which is the source IP address, the group IP address and the local VLAN the multicast
stream is received on. The data I-SID uses Tx/Rx bits to signify whether the BEB uses the I-SID to
transmit, receive, or both transmit and receive data on that I-SID.
In the context of Layer 2 VSNs with IP Multicast over Fabric Connect, the scope is the I-SID value of the
Layer 2 VSN associated with the local VLAN on which the IP multicast data was received.
TLVs
This information is propagated through the SPBM cloud using IS-IS Link State Packets (LSPs), which
carry TLV updates, that result in the multicast tree creation for that stream. For Layer 2 VSNs, the LSPs
carry I-SID information and information about where IP multicast stream senders and receivers exist
using TLV 144 and TLV 185.
IS-IS acts dynamically using the TLV information received from BEBs that connect to the sender and the
receivers to create a multicast tree between them.
IGMP
After a BEB receives an IGMP join message from a receiver, a BEB queries the IS-IS database to check if
a sender exists for the requested stream within the scope of the receiver. If the requested stream does
not exist, the IGMP information is kept, but no further action is taken. If the request stream exists, the
BEB sends an IS-IS TLV update to its neighbors to inform them of the presence of a receiver and this
information is propagated through the SPBM cloud.
For IGMP Snooping, ensure that the IGMP version used by multicast hosts and other devices in the
network is the same as the IGMP version configured on the IGMP Snooping VLAN, or that you enable
compatibility mode.
Use this procedure to configure IP Multicast over Fabric Connect for Layer 2 VSN functionality. With
Layer 2 VSN IP Multicast over Fabric Connect, multicast traffic remains in the same Layer 2 VSN across
the SPBM cloud.
• You must configure the required SPBM and IS-IS infrastructure, which includes the creation of SPBM
B-VLANs.
• You must create the customer VLANs (C-VLANs) and add slots/ports.
• You must assign the same I-SID to the C-VLANs on all the BEBs where you configure the C-VLAN.
• You must enable IP Multicast over Fabric Connect globally.
Traffic is only delivered to UNIs on the Layer 2 VSN where the switch receives IGMP joins and reports.
Traffic does not cross the Layer 2 VSN boundary.
Configuring ip igmp snooping on a VLAN that has an I-SID configured (a C-VLAN) automatically
enables that VLAN for IP Multicast over Fabric Connect services. No explicit configuration exists
separate from that to enable Layer 2 VSN IP Multicast over Fabric Connect.
SPBM supports enabling IGMP Snooping on a C-VLAN, but it does not support enabling Protocol
Independent Multicast (PIM) on a C-VLAN. If you enable IGMP snooping on a C-VLAN, then its
operating mode is Layer 2 Virtual Services Network with IGMP support on the access networks for
optimized forwarding of IP multicast traffic in a bridged network.
Procedure
configure terminal
4. (Optional) If you want to configure an address for the IGMP queries, enter the following command:
ip igmp snoop-querier-addr <A.B.C.D>
This step is not always required. The IGMP Querier on the BEB uses a source address 0.0.0.0 by
default. When you do not configure this, a BEB sends IGMP queries on the UNI ports with 0.0.0.0 as
the source IP address. Some Layer 2 edge switches do not support a 0.0.0.0 querier. You can use a
fictitious IP address as the querier address, and use the same address on all BEBs in the network.
5. (Optional) Enable IGMPv3 at a VLAN level by enabling SSM-snooping and IGMPv3:
ip igmp ssm-snoop
ip igmp version 3
You must enable SSM snoop before you configure IGMP version 3 and both ssm-snoop and
snooping must be enabled for IGMPv3.
For IGMP Snooping, ensure that the IGMP version used by multicast hosts and other devices in the
network is the same as the IGMP version configured on the IGMP Snooping VLAN, or that you enable
compatibility mode.
Example
Use the following options to display Layer 2 VSN information to confirm proper configuration.
Procedure
Important
When you use the command show isis spbm ip-multicast-route without
parameters or use the detail or group optional parameters without specifying a VLAN
ID or VSN I-SID, the command output displays Layer 3 context only. No Layer 2 context is
displayed.
8. Display summary information for each S, G, V tuple with the corresponding scope, data I-SID, and
the host name of the source:
show isis spb-mcast-summary [count][host-name WORD<0–255>][lspid
<xxxx.xxxx.xxxx.xx-xx>]
Example
Switch:1#show isis spbm ip-multicast-route all
===================================================================================
SPBM IP-MULTICAST ROUTE INFO ALL
===================================================================================
Type VrfName Vlan Source Group VSN-ISID Data ISID BVLAN Source-BEB
Id
-----------------------------------------------------------------------------------
snoop GRT 501 192.0.2.1 233.252.0.1 5010 16300001 10 el2
snoop GRT 501 192.0.2.1 233.252.0.2 5010 16300002 20 el2
snoop GRT 501 192.0.2.1 233.252.0.3 5010 16300003 10 el2
snoop GRT 501 192.0.2.1 233.252.0.4 5010 16300004 20 el2
snoop GRT 501 192.0.2.1 233.252.0.5 5010 16300005 10 el2
snoop GRT 501 192.0.2.1 233.252.0.6 5010 16300006 20 el2
snoop GRT 501 192.0.2.1 233.252.0.7 5010 16300007 10 el2
snoop GRT 501 192.0.2.1 233.252.0.8 5010 16300008 20 el2
snoop GRT 501 192.0.2.1 233.252.0.9 5010 16300009 10 el2
snoop GRT 501 192.0.2.1 233.252.0.10 5010 16300010 20 el2
-----------------------------------------------------------------------------------
Total Number of SPBM IP MULTICAST ROUTE Entries: 10
-----------------------------------------------------------------------------------
----------------------------------------------------------------------------------
Total Number of SPBM IP MULTICAST ROUTE Entries: 10
----------------------------------------------------------------------------------
------------------------------------------------------------------------
Total Number of SPBM IP MULTICAST ROUTE Entries: 10
------------------------------------------------------------------------
======================================================================
SPB Multicast - Summary
======================================================================
SCOPE SOURCE GROUP DATA LSP HOST
I-SID ADDRESS ADDRESS I-SID BVID FRAG NAME
----------------------------------------------------------------------
5010 192.0.2.1 233.252.0.1 16300001 10 0x0 el2
5010 192.0.2.1 233.252.0.3 16300003 10 0x0 el2
5010 192.0.2.1 233.252.0.5 16300005 10 0x0 el2
5010 192.0.2.1 233.252.0.7 16300007 10 0x0 el2
5010 192.0.2.1 233.252.0.9 16300009 10 0x0 el2
5010 192.0.2.1 233.252.0.2 16300002 20 0x0 el2
5010 192.0.2.1 233.252.0.4 16300004 20 0x0 el2
The following table defines parameters for the show isis spbm ip-multicast-route
command.
Variable Value
all Displays all IP Multicast over Fabric Connect route information.
detail Displays detailed IP Multicast over Fabric Connect route information.
group {A.B.C.D} Displays information on the group IP address for the IP Multicast over
source {A.B.C.D} Fabric Connect route. If you select source it will also display the source
IP address.
vlan <0–4084> Displays IP Multicast over Fabric Connect route information by VLAN.
vrf WORD<1–16> Displays IP Multicast over Fabric Connect route information by VRF.
vsn-isid <1–16777215> Displays IP Multicast over Fabric Connect route information by I-SID.
The following table defines parameters for the show isis spb-mcast-summary command.
Variable Value
count Displays the total number of SPB multicast entries.
host-name WORD<0–255> Displays the IP Multicast over Fabric Connect summary for a
given host-name.
lspid <xxxx.xxxx.xxxx.xx-xx> Displays the IP Multicast over Fabric Connect summary for a
given LSP ID.
Procedure
1. Enter Privileged EXEC mode:
enable
2. Display information about the interfaces where IGMP is enabled:
show ip igmp interface [gigabitethernet {slot/port[/sub-port][-slot/
port[/sub-port]][,...]}][vlan <1-4059>[vrf WORD<1–16>][vrfids WORD<0–
512>]
Example
Switch:1#show ip igmp interface
=========================================================================================
Igmp Interface - GlobalRouter
=========================================================================================
QUERY OPER QUERY WRONG LASTMEM
IF INTVL STATUS VERS. VERS QUERIER MAXRSPT QUERY JOINS ROBUST QUERY MODE L2ISID
-----------------------------------------------------------------------------------------
V100 125 activ 2 2 0.0.0.0 100 0 0 2 10 snoop-spb 1100
================================================================================
Igmp Group - GlobalRouter
================================================================================
================================================================================
Snoop Trace - GlobalRouter
================================================================================
GROUP SOURCE IN IN OUT OUT TYPE
ADDRESS ADDRESS VLAN PORT VLAN PORT
--------------------------------------------------------------------------------
233.252.0.1 192.0.2.6 500 1/1 500 1/5 ACCESS
233.252.0.10 192.0.2.7 500 1/1 500 1/10 ACCESS
Variable Definitions
The following table defines parameters for the show ip igmp interface command.
Variable Value
gigabitethernet {slot/ Identifies the slot and port in one of the following formats: a
port[/sub-port] [-slot/ single slot and port (slot/port), a range of slots and ports (slot/
port[/sub-port]] [,...]} port-slot/port), or a series of slots and ports (slot/port,slot/
port,slot/port). If the platform supports channelization and the
port is channelized, you must also specify the sub-port in the
format slot/port/sub-port.
vlan <1-4059> Specifies the VLAN.
vrf WORD<1–16> Specifies the VRF by name.
vrfids WORD<0–512> Specifies the VRF by VRF ID.
The following table defines parameters for the show ip igmp cache command.
Variable Value
vrf WORD<1–16> Specifies the VRF by name.
vrfids WORD<0–512> Specifies the VRF by VRF ID.
The following table defines parameters for the show ip igmp group command.
Variable Value
count Specifies the number of entries.
group {A.B.C.D} Specifies the group address.
member-subnet {A.B.C.D/X} Specifies the IP address and network mask.
vrf WORD<1–16> Displays the multicast route configuration for a particular VRF by
name.
vrfids WORD<0–512> Displays the multicast route configuration for a particular VRF by
VRF ID.
The following table defines parameters for the show ip igmp sender command.
Variable Value
count Specifies the number of entries.
group {A.B.C.D} Specifies the group address.
member-subnet {A.B.C.D/X} Specifies the IP address and network mask.
vrf WORD<1–16> Displays the multicast route configuration for a particular VRF by
name.
vrfids WORD<0–512> Displays the multicast route configuration for a particular VRF by
VRF ID.
The following table defines parameters for the show ip igmp snoop-trace command.
Variable Value
group {A.B.C.D} Specifies the group address.
source {A.B.C.D} Specifies the source address.
vrf WORD<1–16> Displays the multicast route configuration for a particular VRF by name.
vrfids WORD<0–512> Displays the multicast route configuration for a particular VRF by VRF ID.
View TLV Information for Layer 2 VSN IP Multicast over Fabric Connect
For Layer 2 VSN with IP multicast over Fabric Connect, TLV 185 on the BEB where the source is located,
displays the multicast source and group addresses and has the Tx bit set. Each multicast group has
its own unique data I-SID with a value between 16,000,000 to 16,512,000. TLV 144 on the BEB bridge,
where the sender is located, has the Tx bit set. All BEB bridges, where a receiver exists, have the Rx bit
set.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display IS-IS Link State Database information by Type-Length-Value (TLV):
show isis lsdb tlv <1–236> [sub-tlv <1–3>] [detail] [home|remote]
3. Display IS-IS Link State Database information by Link State Protocol ID:
show isis lsdb lspid <xxxx.xxxx.xxxx.xx-xx> tlv <1–236> [sub-tlv <1–
3>] [detail] [home|remote]
Example
Switch:1# show isis lsdb tlv 185 detail
================================================================================
ISIS LSDB (DETAIL)
================================================================================
--------------------------------------------------------------------------------
Level-1LspID: 000c.f803.83df.00-00 SeqNum: 0x000001ae Lifetime: 898
Chksum: 0xcebe PDU Length: 522
Host_name: Switch
Attributes: IS-Type 1
TLV:185 SPBM IPVPN :
VSN ISID:5010
BVID :10
Metric:0
IP Source Address: 192.0.2.1
Group Address : 233.252.0.1
Data ISID : 16300001
TX : 1
Metric:0
IP Source Address: 192.0.2.1
Group Address : 233.252.0.3
Data ISID : 16300003
TX : 1
Metric:0
IP Source Address: 192.0.2.1
Group Address : 233.252.0.5
Data ISID : 16300005
TX : 1
Metric:0
IP Source Address: 192.0.2.1
Group Address : 233.252.0.7
Data ISID : 16300007
TX : 1
Metric:0
IP Source Address: 192.0.2.1
Group Address : 233.252.0.9
Data ISID : 16300009
TX : 1
VSN ISID:5010
BVID :20
Metric:0
IP Source Address: 192.0.2.1
Group Address : 233.252.0.2
Data ISID : 16300002
TX : 1
Metric:0
IP Source Address: 192.0.2.1
Group Address : 233.252.0.4
Data ISID : 16300004
TX : 1
Metric:0
IP Source Address: 192.0.2.1
Group Address : 233.252.0.6
Data ISID : 16300006
TX : 1
Metric:0
IP Source Address: 192.0.2.1
Group Address : 233.252.0.8
Data ISID : 16300008
TX : 1
Metric:0
IP Source Address: 192.0.2.1
Group Address : 233.252.0.10
Data ISID : 16300010
TX : 1
The following table defines parameters for the show isis lsdb command.
Variable Value
detail Displays detailed information about the IS-IS Link State
database.
home Displays the IS-IS LSDB information that the system configures
in the home area.
level {l1, l2, l12} Displays information on the IS-IS level. The IEEE 802.1aq
standard currently only defines the use of one hierarchy, Level
1. Level 2 and combined Level 1 and 2 (l12) function is disabled.
local Displays information on the local LSDB.
lspid<xxxx.xxxx.xxxx.xx-xx> Specifies information about the IS-IS Link State database by
LSP ID.
remote Displays the IS-IS LSDB information that the system configures
in the remote area.
Variable Value
sub-tlv <1–3> Specifies information about the IS-IS Link State database by
sub-TLV.
sysid <xxxx.xxxx.xxxx> Specifies information about the IS-IS Link State database by
System ID.
tlv <1–236> Specifies information about the IS-IS Link State database by
TLV.
Use the Interface tab to view the IGMP interface table. When an interface does not use an IP address,
the system does not display it in the IGMP table.
Procedure
Use the data in the following table to use the Interface tab.
Name Description
IfIndex Shows the interface where IGMP is enabled.
QueryInterval Configures the frequency (in seconds) at which the interface
transmits IGMP host query packets. The default is 125.
Status Shows the IGMP row status. If an interface uses an IP address
and PIM-SM is enabled, the status is active. Otherwise, it is
notInService.
Version Configures the version of IGMP (1, 2, or 3) that you want to
configure on this interface. For IGMP to function correctly, all
routers on a LAN must use the same version. The default is
version 2.
OperVersion Shows the version of IGMP that currently runs on this interface.
Querier Shows the address of the IGMP querier on the IP subnet to which
this interface attaches.
QueryMaxResponseTime Configures the maximum response time (in tenths of a second)
advertised in IGMPv2 general queries on this interface. You cannot
configure this value for IGMPv1.
Smaller values allow a router to prune groups faster. The default is
100 tenths of a second (equal to 10 seconds.)
Important:
You must configure this value lower than the QueryInterval.
Name Description
WrongVersionQueries Shows the number of queries received with an IGMP version that
does not match the interface. You must configure all routers on
a LAN to run the same version of IGMP. If the interface receives
queries with the wrong version, this value indicates a version
mismatch.
Joins Shows the number of times this interface added a group
membership, which is the same as the number of times an entry
for this interface is added to the cache table. This number gives an
indication of the amount of IGMP activity over time.
Robustness Tunes for the expected packet loss of a network. This value is
equal to the number of expected query packet losses for each
serial query interval, plus 1. If you expect a network to lose query
packets, increase the robustness value.
The default value of 2 means that the switch drops one query for
each query interval without the querier aging out.
LastMembQueryIntvl Configures the maximum response time (in tenths of a second)
inserted into group-specific queries sent in response to leave
group messages. This value is also the time between group-
specific query messages. You cannot configure this value for
IGMPv1.
Decrease the value to reduce the time to detect the loss of the
last member of a group. The range is from 0–255 and the default
is 10 tenths of second. As a best practice, configure this parameter
to values greater than 3. If you do not need a fast leave process,
you can configure values greater than 10. (The value 3 is equal to
0.3 seconds and 10 is equal to 1 second.)
OtherQuerierPresent Timeout Shows the length of time that must pass before a multicast router
determines that no other querier exists. If the local router is the
querier, the value is 0.
FlushAction Configures the flush action to one of the following:
• none
• flushGrpMem
• flushMrouter
• flushSender
RouterAlertEnable Instructs the router to ignore IGMP packets that do not contain
the router alert IP option. If you disable this variable (default
configuration), the router processes IGMP packets regardless of
the status of the router alert IP option.
Important:
To maximize network performance, configure this parameter
according to the version of IGMP currently in use.
• IGMPv1—Disable
• IGMPv2—Enable
• IGMPv3—Enable
Name Description
SnoopQuerierAddr Specifies the pseudo address of the IGMP snoop querier.
ExplicitHostTrackingEnable Enables or disables IGMPv3 to track hosts for each channel or
group. The default is disabled. You must select this field if you
want to use fast leave for IGMPv3.
McastMode Indicates the protocol configured on the VLAN.
• snoop — Indicates IGMP snooping is enabled on a VLAN.
• snoop-spb — Indicates IGMP is enabled on a VLAN with an
associated I-SID (IP multicast over Fabric Connect for a Layer 2
VSN).
• pim — Indicates PIM is enabled.
• routed-spb — Indicates IP multicast over Fabric Connect is
enabled on the Layer 3 VSN or for IP Shortcuts.
ExtnUpnpFilterEnable Enables Universal Plug and Play (uPnP) Filtering to filter multicast
packets destined for a specific range.
The default is disabled.
ExtnUpnpFilterAddress Indicates the multicast destination IP address to filter on an IGMP-
enabled interface.
The default is 239.255.255.250/32.
ExtnUpnpFilterAddressMask Indicates the IGMP uPnP Filtering IP subnet to which this interface
is attached.
SnoopOrigin Specifies the origin of IGMP Snooping configuration on the port.
The supported values are:
• config - Set by the user.
• radius - Set by the Remote Authentication Dail-In User Service
(RADIUS) attribute.
Use this procedure to enable IP Multicast over Fabric Connect for a Layer 2 VSN. With Layer 2 VSN IP
Multicast over Fabric Connect, multicast traffic remains in the same Layer 2 VSN across the SPBM cloud.
No explicit configuration exists for a Layer 2 VSN. After you configure IP IGMP snooping on a VLAN that
has an I-SID configured, the device enables that VLAN for IP Multicast over Fabric Connect services.
SPBM supports enabling IGMP snooping on a C-VLAN, but it does not support enabling PIM on a
C-VLAN. If you enable IGMP snooping on a C-VLAN, then its operating mode is Layer 2 VSN with IGMP
support on the access networks for optimized forwarding of IP multicast traffic in a bridged network.
Procedure
Note
This step is not always required. The IGMP Querier on the BEB uses a source address
0.0.0.0 by default. When you do not configure this, a BEB sends IGMP queries on the UNI
ports with 0.0.0.0 as the source IP address. Some Layer 2 edge switches do not support
a 0.0.0.0 querier. You can use a fictitious IP address as the querier address, and use the
same address on all BEBs in the network.
enable
configure terminal
router isis
spbm 1 multicast enable
VLAN CONFIGURATION
interface vlan 9
ip igmp snooping
ip igmp snoop-querier-addr 192.0.2.201
exit
router isis
spbm 1 multicast enable
VLAN CONFIGURATION
interface vlan 19
ip igmp snooping
ip igmp version 3
ip igmp ssm-snoop
ip igmp snoop-querier-addr 192.0.2.201
exit
Note
You must enable SSM snoop before you configure IGMP version to version 3, and you must
enable both ssm-snoop and snooping for IGMPv3.
Note
You must configure basic SPBM and IS-IS infrastructure.
IP Shortcuts Configuration
This section provides fundamentals concepts for IP Shortcuts configuration. For more information on IP
Shortcuts basic configuration, see IP Shortcuts Configuration on page 1341.
Applications that can use IP Multicast over Fabric Connect within the GRT include: Video surveillance,
TV/Video/Ticker/Image distribution, VX-LAN.
Both IP Shortcuts and IP Multicast over Fabric Connect within the GRT use the GRT for the scope level
to constrain multicast streams. However, they are separate features that work independently from each
other.
Important
You do not have to enable IP Shortcuts to support IP Multicast over Fabric Connect within the
GRT.
With IP Multicast over Fabric Connect within the GRT, routing of IP multicast traffic is allowed within
the subset of VLANs in the GRT that have IP Multicast over Fabric Connect enabled. When you
enable IP Multicast over Fabric Connect on a VLAN, the VLAN automatically becomes a multicast
routing interface.
You must enable ip spb-multicast on each of the VLANs within the GRT that need to support IP
multicast traffic. Enable IP Multicast over Fabric Connect on all VLANs to which IP multicast senders and
receivers attach. IP Multicast over Fabric Connect is typically configured only on BEBs.
Note
If no IP interface exists on the VLAN, then you create one. (The IP interface must be in the
same subnet as the IGMP hosts that connect to the VLAN).
I-SIDs
Unlike IP Shortcuts with unicast, a data I-SID (for mac-in-mac encapsulation of the multicast traffic) is
required for IP Multicast over Fabric Connect within the GRT. When the multicast stream reaches the
BEB, the BEB assigns a data I-SID to the stream. The data I-SID uses Tx/Rx bits to signify whether the
BEB uses the I-SID to transmit, receive, or both transmit and receive data on that I-SID.
Unlike Layer 2 VSNs and Layer 3 VSNs, IP Multicast over Fabric Connect within the GRT does not have
a scope I-SID to determine the scope of the multicast traffic. Instead the scope is the Global Routing
Table.
TLVs
The scope and data I-SID information is propagated through the SPBM cloud using IS-IS Link State
Packets (LSPs), which carry TLV updates, and result in the multicast tree creation for that stream. For
IP Multicast over Fabric Connect within the GRT, the LSPs carry I-SID information and information about
where IP multicast stream senders and receivers exist using TLV 144 and TLV 186.
IGMP
After you configure ip spb-multicast enable, you cannot enable IGMP, IGMP Snooping, or IGMP
proxy on the interface. If you try to enable IGMP Snooping or proxy on any interface where IP Multicast
over Fabric Connect is enabled, the system displays an error message.
After you configure ip spb-multicast enable on each of the VLANs within the GRT that need to
support IP multicast traffic, any IGMP functions required for IP Multicast over Fabric Connect within the
GRT are automatically enabled. You do not need to configure anything IGMP related.
DvR
When you enable ip spb-multicast on the Controller nodes, the configuration is automatically
pushed to all the Leaf nodes within the domain.
For more information on DvR, see Distributed Virtual Routing on page 688.
Use this procedure to configure IP Multicast over Fabric Connect within the GRT. The default is disabled.
• Note
◦ You do not have to enable IP Shortcuts to support IP multicast routing in the GRT using
SPBM.
◦ You cannot enable IP PIM when IP Multicast over Fabric Connect is enabled on the
VLAN.
• You must configure the required SPBM and IS-IS infrastructure, which includes the creation of SPBM
B-VLANs.
• You must create the C-VLANs and add slots/ports.
• You must enable IP Multicast over Fabric Connect globally.
• If no IP interface exists on the VLAN, then you create one. (The IP interface must be the same subnet
as the IGMP hosts that connect to the VLAN).
With IP Multicast over Fabric Connect within the GRT, routing of IP multicast traffic is allowed within
the subset of VLANs in the GRT that have IP Multicast over Fabric Connect enabled. When you
enable IP Multicast over Fabric Connect on a VLAN, the VLAN automatically becomes a multicast
routing interface.
You must configure ip spb-multicast enable on each of the VLANs within the GRT that need to
support IP multicast traffic. The default is disabled. After you enable IP Multicast over Fabric Connect on
each of the VLANs within the GRT that need to support IP multicast traffic, any IGMP functions required
for IP Multicast over Fabric Connect within the GRT are automatically enabled. You do not need to
configure anything IGMP related.
If you only want to use IP Multicast over Fabric Connect, you do not need to enable the Layer 3 VSN or
redistribute unicast routes into or out of IS-IS. IP Multicast over Fabric Connect routing does not depend
on unicast routing, which allows for you to more easily migrate from a PIM environment to IP Multicast
over Fabric Connect. You can migrate a PIM environment to IP Multicast over Fabric Connect first and
then migrate unicast separately or not at all.
The switch only supports IPv4 addresses with IP Multicast over Fabric Connect.
Procedure
1. Enter Interface Configuration mode:
enable
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
Note
After you configure ip spb-multicast enable, you cannot enable IGMP, IGMP
Snooping, or IGMP proxy on the interface. If you try to enable IGMP Snooping or proxy
on any interface where IP Multicast over Fabric Connect is enabled, an error message
displays.
Note
When you configure ip spb-multicast enable on the Controller node of a DvR
domain, the configuration is automatically pushed to the Leaf nodes within the domain.
If routed-spb displays under mode, IP Multicast over Fabric Connect within the GRT is properly
enabled on the VLAN.
Example
=========================================================================================
The following table defines parameters for the interface vlan command.
Variable Value
<1-4059> Specifies the VLAN ID.
The following table defines parameters for the interface GigabitEthernet command.
Variable Value
{slot/port[/ Identifies the slot and port in one of the following formats: a single slot
sub-port] [- and port (slot/port), a range of slots and ports (slot/port-slot/port), or a
slot/port[/sub- series of slots and ports (slot/port,slot/port,slot/port). If the platform supports
port]] [,...]} channelization and the port is channelized, you must also specify the sub-port
in the format slot/port/sub-port.
Variable Value
<A.B.C.D/X> Specifies the address and mask.
Use this procedure to configure the VRF timeout value. The timeout value ages out the sender when
there is no multicast stream on the VRF. The default is 210 seconds.
Note
You can use this procedure for Layer 3 VSN with IP Multicast over Fabric Connect services and
IP Multicast over Fabric Connect for IP Shortcuts.
• You must configure the required SPBM and IS-IS infrastructure, which includes the creation of SPBM
B-VLANs.
• You must create the C-VLANs and add slots/ports.
• You must enable IP Multicast over Fabric Connect globally.
Procedure
configure terminal
Example
The following table defines parameters for the router vrf command.
Variable Value
WORD<1–16> Specifies the VRF name.
The following table defines parameters for the mvpn fwd-cache-timeout(seconds) command.
Variable Value
<10–86400> Specifies the timeout value. The default is 210 seconds.
Use this procedure to configure the timeout value in the GRT. The timeout value ages out the sender
when there are no multicast streams coming from the sender for a specified period of time in seconds.
The default timeout value is 210 seconds.
• You must configure the required SPBM and IS-IS infrastructure, which includes the creation of SPBM
B-VLANs.
• You must create the C-VLANs and add slots/ports.
• You must enable IP Multicast over Fabric Connect globally.
Procedure
configure terminal
router isis
2. Configure the IP Multicast over Fabric Connect forward-cache timeout:
spbm <1–100> multicast fwd-cache-timeout(seconds) <10–86400>
3. (Optional) Configure the IP Multicast over Fabric Connect forward-cache timeout to the default
value of 210 seconds:
default spbm <1–100> multicast fwd-cache-timeout(seconds)
Example
Variable Value
<1–100> Specifies the SPBM instance. The switch only supports one instance.
<10–86400> Specifies the IP Multicast over Fabric Connect forward-cache timeout in seconds. The
default is 210 seconds.
Use the following options to display IP Multicast over Fabric Connect within the GRT information to
confirm proper configuration.
Procedure
5. Display summary information for each S, G, V tuple with the corresponding scope, data I-SID, and
the host name of the source:
show isis spb-mcast-summary [count][host-name WORD<0–255>][lspid
<xxxx.xxxx.xxxx.xx-xx>]
Example
Id
--------------------------------------------------------------------------
routed GRT 501 192.0.2.1 233.252.0.1 5010 16300001 10 el2
routed GRT 501 192.0.2.1 233.252.0.2 5010 16300002 20 el2
routed GRT 501 192.0.2.1 233.252.0.3 5010 16300003 10 el2
routed GRT 501 192.0.2.1 233.252.0.4 5010 16300004 20 el2
routed GRT 501 192.0.2.1 233.252.0.5 5010 16300005 10 el2
routed GRT 501 192.0.2.1 233.252.0.6 5010 16300006 20 el2
routed GRT 501 192.0.2.1 233.252.0.7 5010 16300007 10 el2
routed GRT 501 192.0.2.1 233.252.0.8 5010 16300008 20 el2
routed GRT 501 192.0.2.1 233.252.0.9 5010 16300009 10 el2
routed GRT 501 192.0.2.1 233.252.0.10 5010 16300010 20 el2
--------------------------------------------------------------------------
Total Number of SPBM IP multicast ROUTE Entries: 10
--------------------------------------------------------------------------
=====================================================================
SPB multicast - Summary
=====================================================================
SCOPE SOURCE GROUP DATA LSP HOST
I-SID ADDRESS ADDRESS I-SID BVID FRAG NAME
---------------------------------------------------------------------
GRT 192.0.2.1 233.252.0.1 16300001 10 0x0 el2
GRT 192.0.2.1 233.252.0.3 16300003 10 0x0 el2
Variable definitions
The following table defines parameters for the show isis spbm ip-multicast-route
command.
Variable Value
all Displays all IP Multicast over Fabric Connect route information.
detail Displays detailed IP Multicast over Fabric Connect route information.
group {A.B.C.D} Displays information on the group IP address for the IP Multicast over
source {A.B.C.D} Fabric Connect route. If you select source it will also display the source IP
[source-beb WORD<0– address.
255>] Specifies the source BEB name.
vlan Displays IP Multicast over Fabric Connect route information by VLAN.
vrf Displays IP Multicast over Fabric Connect route information by VRF.
vsn-isid Displays IP Multicast over Fabric Connect route information by I-SID.
The following table defines parameters for the show isis spb-mcast-summary command.
Variable Value
count Displays the total number of SPB multicast entries.
host-name Displays the IP Multicast over Fabric Connect summary for a given
host-name.
lspid Displays the IP Multicast over Fabric Connect summary for a given
<xxxx.xxxx.xxxx.xx-xx> LSP ID.
View IGMP Information for IP Multicast over Fabric Connect within the GRT
Procedure
Example
Display IGMP information for IP multicast over Fabric Connect within the GRT:
Switch:1#show ip igmp interface
=========================================================================================
Igmp Interface - GlobalRouter
=========================================================================================
QUERY OPER QUERY WRONG LASTMEM
IF INTVL STATUS VERS. VERS QUERIER MAXRSPT QUERY JOINS ROBUST QUERY MODE L2ISID
-----------------------------------------------------------------------------------------
V100 125 activ 2 2 0.0.0.0 100 0 0 2 10 snoop-spb 1100
================================================================================
Igmp Group - GlobalRouter
================================================================================
GRPADDR INPORT MEMBER EXPIRATION TYPE L2ISID
--------------------------------------------------------------------------------
224.5.2.1 V701-1/4 62.0.1.1 214 Dynamic 40400
224.5.2.2 V702-1/4 62.0.2.1 221 Dynamic 40400
224.5.2.3 V703-1/4 62.0.3.1 217 Dynamic 40400
224.5.2.4 V704-1/4 62.0.4.1 223 Dynamic 40400
Variable definitions
The following table defines parameters for the show ip igmp interface command.
Variable Value
gigabitethernet {slot/ Identifies the slot and port in one of the following formats: a
port[/sub-port] [-slot/ single slot and port (slot/port), a range of slots and ports (slot/
port[/sub-port]] [,...]} port-slot/port), or a series of slots and ports (slot/port,slot/
port,slot/port). If the platform supports channelization and the
port is channelized, you must also specify the sub-port in the
format slot/port/sub-port.
vlan <1-4059> Specifies the VLAN.
vrf WORD<1–16> Specifies the VRF by name.
vrfids WORD<0–512> Specifies the VRF by VRF ID.
The following table defines parameters for the show ip igmp cache command.
Variable Value
vrf WORD<1–16> Specifies the VRF by name.
vrfids WORD<0–512> Specifies the VRF by VRF ID.
The following table defines parameters for the show ip igmp group command.
Variable Value
count Specifies the number of entries.
group {A.B.C.D} Specifies the group address.
member-subnet {A.B.C.D/X} Specifies the IP address and network mask.
vrf WORD<1–16> Displays the multicast route configuration for a particular VRF by
name.
vrfids WORD<0–512> Displays the multicast route configuration for a particular VRF by
VRF ID.
The following table defines parameters for the show ip igmp sender command.
Variable Value
count Specifies the number of entries.
group {A.B.C.D} Specifies the group address.
member-subnet {A.B.C.D/X} Specifies the IP address and network mask.
vrf WORD<1–16> Displays the multicast route configuration for a particular VRF by
name.
vrfids WORD<0–512> Displays the multicast route configuration for a particular VRF by
VRF ID.
View TLV Information for IP Multicast over Fabric Connect within the GRT
For IP Multicast over Fabric Connect within the GRT, TLV 186 on the BEB where the source is located
displays the multicast source and group addresses and have the Tx bit set. Each multicast group has
its own unique data I-SID with a value between 16,000,000 to 16,512,000. TLV 144 on the BEB bridge,
where the sender is located, has the Tx bit set while on all BEB bridges, where a receiver exists, has the
Rx bit set.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display IS-IS Link State Database information by TLV:
show isis lsdb tlv <1–236> [sub-tlv <1–3>][detail] [home|remote]
3. Display IS-IS Link State Database information by Link State Protocol ID:
show isis lsdb lspid <xxxx.xxxx.xxxx.xx-xx> tlv <1–236> [sub-tlv <1–
3>] [detail] [home|remote]
Example
The following table defines parameters for the show isis lsdb command.
Variable Value
detail Displays detailed information about the IS-IS Link State
database.
home Displays the IS-IS LSDB information that the system
configures in the home area.
level {l1, l2, l12} Displays information on the IS-IS level. The IEEE 802.1aq
standard currently only defines the use of one hierarchy, Level
1. Level 2 function is disabled.
local Displays information on the local LSDB.
Variable Value
lspid <xxxx.xxxx.xxxx.xx-xx> Specifies information about the IS-IS Link State database by
LSP ID.
remote Displays the IS-IS LSDB information that the system
configures in the remote area.
sub-tlv <1–3> Specifies information about the IS-IS Link State database by
sub-TLV.
sysid <xxxx.xxxx.xxxx> Specifies information about the IS-IS Link State database by
System ID.
tlv <1–236> Specifies information about the IS-IS Link State database by
TLV.
Use this procedure to enable IP Multicast over Fabric Connect on each of the VLANs within the GRT that
need to support IP multicast traffic. The default is disabled.
To configure a VRF with IP Multicast over Fabric Connect, see Configuring IP Multicast over Fabric
Connect on a VLAN for Layer 3 on page 1751.
Note
• You do not have to enable IP Shortcuts to support IP multicast routing in the GRT using
SPBM.
• You cannot enable IP PIM when IP Multicast over Fabric Connect is enabled on the VLAN.
With IP Multicast over Fabric Connect within the GRT, routing of IP multicast traffic is allowed within
the subset of VLANs in the GRT that have IP Multicast over Fabric Connect enabled. When you
enable IP Multicast over Fabric Connect on a VLAN, the VLAN automatically becomes a multicast
routing interface.
You must enable IP Multicast over Fabric Connect on each of the VLANs within the GRT that need to
support IP multicast traffic. After you enable IP Multicast over Fabric Connect on the VLANs, any IGMP
functions required for IP Multicast over Fabric Connect within the GRT are automatically enabled. You
do not need to configure anything IGMP related.
If you only want to use IP Multicast over Fabric Connect, you do not need to enable the Layer 3 VSN or
redistribute unicast routes into or out of IS-IS. IP Multicast over Fabric Connect routing within the GRT
does not depend on unicast routing. This allows for you to more easily migrate from a PIM environment
to IP Multicast over Fabric Connect. You can migrate a PIM environment to IP Multicast over Fabric
Connect first and then migrate unicast separately or not at all.
The switch only supports IPv4 addresses with IP Multicast over Fabric Connect.
Procedure
Note
After you enable IP Multicast over Fabric Connect, you cannot enable IGMP, IGMP
Snooping, or IGMP proxy on the interface. If you try to enable IGMP Snooping or proxy on
any interface where SPBM multicast is enabled, the system displays an error message.
Note
When you enable IP Multicast over Fabric Connect on a Controller switch in a DvR domain,
the configuration is automatically pushed to the Leaf nodes within the domain.
5. Click Enable.
6. Click Apply.
Configuring IP Multicast over Fabric Connect on a brouter port within the GRT
Use this procedure to enable IP Multicast over Fabric Connect on a brouter port IP interface. The default
is enabled.
To configure a brouter port for a VRF with IP Multicast over Fabric Connect, see Configuring IP Multicast
over Fabric Connect on a brouter port for a Layer 3 VSN on page 1752.
Note
• You do not have to enable IP Shortcuts to support IP multicast routing in the GRT using
SPBM.
• You cannot enable IP PIM when IP Multicast over Fabric Connect is enabled on the VLAN.
With IP Multicast over Fabric Connect within the GRT, routing of IP multicast traffic is allowed within
the subset of VLANs in the GRT that have IP Multicast over Fabric Connect enabled. When you
enable IP Multicast over Fabric Connect on a VLAN, the VLAN automatically becomes a multicast
routing interface.
You must enable IP Multicast over Fabric Connect on each of the VLANs within the GRT that need to
support IP multicast traffic. After you enable IP Multicast over Fabric Connect on the VLANs, any IGMP
functions required for IP Multicast over Fabric Connect within the GRT are automatically enabled.
If you only want to use IP Multicast over Fabric Connect, you do not need to enable the Layer 3 VSN or
redistribute unicast routes into or out of IS-IS. IP Multicast over Fabric Connect routing does not depend
on unicast routing, which allows for you to more easily migrate from a PIM environment to Multicast
over Fabric Connect. You can migrate a PIM environment to IP Multicast over Fabric Connect first, and
then migrate unicast separately or not at all.
The switch only supports IPv4 addresses with IP Multicast over Fabric Connect.
Procedure
Note
When you enable IP Multicast over Fabric Connect on a DvR Controller switch in a DvR
domain, the configuration is automatically pushed to the Leaf nodes within the domain.
6. Click Apply.
Use the data in the following table to use the SPB Multicast tab.
Name Description
Enable Enables or disables SPB Multicast. The default is
disable.
Use this procedure to configure the timeout value in the GRT. The timeout value ages out the sender
when there are no multicast streams coming from the sender for a specified period of time. The default
timeout value is 210 seconds.
Procedure
router isis
spbm 1 multicast enable
Configure the Layer 3 VSN (VRF) as a multicast VPN, and then enable IP Multicast over Fabric Connect
on VRF VLANs to which IP multicast senders and receivers attach. This configuration automatically
enables IGMP snooping and proxy on those VLANs. IGMPv2 at the VLAN level is the default setting,
with no other configuration required. If you want to use IGMPv3, you must configure IGMPv3.
Note
• You do not need to enable IP Shortcuts to support multicast routing in the Layer 3 VSN
using SPBM. IPVPN creation and I-SID assignment for the IPVPN is required, but you do
not need to enable IPVPN.
• If you only want to use IP Multicast over Fabric Connect, you do not need to enable the
Layer 3 VSN or redistribute unicast routes into or out of IS-IS. IP Multicast over Fabric
Connect routing does not depend on unicast routing for Layer 3 VSNs using VRFs, which
allows you to more easily migrate from a PIM environment to IP Multicast over Fabric
Connect. You can migrate a PIM environment to IP Multicast over Fabric Connect first and
then migrate unicast separately or not at all.
• If no IP interface exists on the VLAN, then you create one. (The IP interface must be the
same subnet as the IGMP hosts that connect to the VLAN).
With Layer 3 VSN with IP Multicast over Fabric Connect, multicast traffic remains in the same Layer 3
VSN across the SPBM cloud. For a Layer 3 VSN, traffic can cross VLAN boundaries but remains confined
to the subset of VLANs within the VRF that has IP Multicast over Fabric Connect enabled. If a sender
transmits a multicast stream to a BEB on a Layer 3 VSN with IP Multicast over Fabric Connect enabled,
only receivers that are part of the same Layer 3 VSN can receive that stream.
I-SIDs
After a BEB receives IP multicast data from a sender, the BEB allocates a data service instance identifier
(I-SID) in the range of 16,000,000 to 16,512,000 for the multicast stream. The stream is identified by
the S, G, V tuple, which is the source IP address, the group IP address and the local VLAN the multicast
stream is received on. The data I-SID uses Tx/Rx bits to signify whether the BEB uses the I-SID to
transmit, receive, or both transmit and receive data on that I-SID.
In the context of Layer 3 VSNs with IP Multicast over Fabric Connect, the scope is the I-SID value of the
Layer 3 VSN associated with the local VLAN that the IP multicast data was received on.
TLVs
This information is propagated through the SPBM cloud using IS-IS Link State Packets (LSPs), which
carry TLV updates, that result in the multicast tree creation for that stream. For Layer 3 VSNs, the LSPs
carry I-SID information and information about where IP multicast stream senders and receivers exist
using TLV 144 and TLV 185.
IS-IS acts dynamically using the TLV information received from BEBs that connect to the sender and the
receivers to create a multicast tree between them.
IGMP
After a BEB receives an IGMP join message from a receiver, the BEB queries the IS-IS database to check
if a sender exists for the requested stream within the scope of the receiver. If the requested stream does
not exist, the IGMP information is kept, but no further action is taken. If the requested stream exists, the
BEB sends an IS-IS TLV update to its neighbors to inform them of the presence of a receiver and this
information is propagated through the SPBM cloud.
DvR
On DvR Controllers in a DvR domain, you must manually configure IP multicast over Fabric Connect
on Layer 3 VSNs (VRFs). This configuration is then automatically pushed to the Leaf nodes in the DvR
domain.
For more information on DvR, see Distributed Virtual Routing on page 688.
Use this procedure to configure IP Multicast over Fabric Connect for a Layer 3 VSN.
Configure the Layer 3 VSN (VRF) as a multicast VPN, and then enable IP Multicast over Fabric Connect
on VRF VLANs to which IP multicast senders and receivers attach. After you enable IP Multicast over
Fabric Connect on VRF VLANs, snooping and proxy on those VLANs is enabled. IGMPv2 at the VLAN
level is the default setting. No configuration is required.
Note
On DvR Controllers in a DvR domain, you must manually configure IP multicast over Fabric
Connect on Layer 3 VSNs (VRFs). This configuration is then automatically pushed to the Leaf
nodes in the DvR domain.
• You must configure the required SPBM and IS-IS infrastructure, which includes the creation of SPBM
B-VLANs.
• You must create the C-VLANs and add slots/ports.
• You must enable IP Multicast over Fabric Connect globally.
• You must assign an I-SID for the IPVPN.
With Layer 3 VSN IP Multicast over Fabric Connect, multicast traffic remains in the same Layer 3 VSN
across the SPBM cloud.
For a Layer 3 VSN, traffic can cross VLAN boundaries but remains confined to the subset of VLANs
within the VRF that have ip spbm-multicast enabled. The default is disabled.
All or a subset of VLANs within a Layer 3 VSN can exchange multicast traffic. The BEB only sends out
traffic for a multicast stream on which IGMP joins and reports are received.
Note
You cannot enable IP PIM when IP Multicast over Fabric Connect is enabled on the VLAN.
The IP VPN does not need to be enabled for Layer 3 VSN multicast to function.
Procedure
configure terminal
configure terminal
Note
If the platform supports channelization and the port is channelized, you must also specify
the sub-port in the format slot/port/sub-port.
5. Enable Layer 3 VSN IP Multicast over Fabric Connect for a particular VRF:
ip spb-multicast enable
6. (Optional) Enable IGMP version 3:
ip igmp snooping
ip igmp ssm-snoop
ip igmp compatibility-mode
ip igmp version 3
Note
IGMPv2 at the VLAN level is the default setting, with no other configuration required. You
only need to use these commands if you use IGMPv3. You must enable SSM snoop before
you configure IGMP version 3, and you must enable both ssm-snoop and snooping for
IGMPv3.
For IGMP Snooping, ensure that the IGMP version used by multicast hosts and other
devices in the network is the same as the IGMP version configured on the IGMP Snooping
VLAN, or that you enable compatibility mode.
Note
If the SPBM bridge connects to an edge switch, it can be necessary to add an IGMP query
address. If you omit adding a query address, the SPB bridge sends IGMP queries with a
source address of 0.0.0.0. Some edge switch models do not accept a query with a source
address of 0.0.0.0.
Example
The following table defines parameters for the router vrf command.
Variable Value
WORD<1–16> Specifies the name of the VRF.
The following table defines parameters for the interface vlan command.
Variable Value
<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN IDs 1 to 4059 are
configurable and the system reserves VLAN IDs 4060 to 4094 for internal use. On
switches that support the vrf-scaling and spbm-config-mode boot configuration
flags, if you enable these flags, the system also reserves VLAN IDs 3500 to 3998. VLAN ID
1 is the default VLAN and you cannot create or delete VLAN ID 1.
Variable Value
GigabitEthernet{slot/port[/ Identifies the slot and port in one of the following
sub-port] [-slot/port[/sub- formats: a single slot and port (slot/port), a range of slots
port]] [,...]} and ports (slot/port-slot/port), or a series of slots and
ports (slot/port,slot/port,slot/port). If the platform supports
channelization and the port is channelized, you must also
specify the sub-port in the format slot/port/sub-port.
Variable Value
access-list WORD<1– Specifies the name of the access list from 1–64 characters.
64> {A.B.C.D/X} <eny- Creates an access control group entry for a specific IGMP
tx|deny-rx|deny-both|allow- interface. Specify the IP address of the host and the subnet
only-tx|allow-only-rx|allow- mask used to determine the host or hosts covered by this
only-both> configuration. You can use the host subnet mask to restrict
access to a portion of the network for the host.
Indicates the action for the specified IGMP interface. For
example, if you specify deny-both, the interface denies both
transmitted and received traffic.
compatibility-mode Activates v2-v3 compatibility mode. The default value is
disabled, which means IGMPv3 is not compatible with
IGMPv2. To use the default configuration, use the default
option in the command:
default ip igmp compatibility-mode
, or use the no option to disable compatibility mode:
no ip igmp compatibility-mode
dynamic-downgrade-version Configures if the system downgrades the version of IGMP
to handle older query messages. If the system downgrades,
the host with IGMPv3 only capability does not work. If you
do not configure the system to downgrade the version of
IGMP, the system logs a warning. The system downgrades
to the oldest version of IGMP on the network by default. To
use the default configuration, use the default option in the
command:
default ip igmp dynamic-downgrade-version
or use the no option to disable downgrade:
no ip igmp dynamic-downgrade-version
igmpv3-explicit-host- Enables explicit host tracking on IGMPv3. The default state is
tracking disabled.
immediate-leave Enables fast leave on a VLAN.
immediate-leave-members Configures IGMP fast leave members on a VLAN to specify
{slot/port[/sub-port] [- fast-leave-capable ports.
slot/port[/sub-port]]
[,...]}
last-member-query-interval Configures the maximum response time (in tenths of a
<0–255> second) inserted into group-specific queries sent in response
to leave group messages. This value is also the time between
group-specific query messages. You cannot configure this
value for IGMPv1.
Decreasing the value reduces the time to detect the loss of
the last member of a group. The default is 10 tenths of a
second. Configure this value between 3–10 (equal to 0.3 – 1.0
seconds).
Variable Value
mrdisc [maxadvertinterval Configure the multicast router discovery options to enable
<2–180>] the automatic discovery of multicast capable routers. The
[maxinitadvertinterval <2– default parameter values are:
180>] [maxinitadvertisements • maxadvertinterval: 20 seconds
<2–15>] [minadvertinterval • maxinitadvertinterval: 2 seconds
<3–180>] [neighdeadinterval
<2–180>] • maxinitadvertisements: 3
• minadvertinterval: 15 seconds
• neighdeadinterval: 60 seconds
Important:
You must configure this value lower than the query-interval.
Important:
To maximize network performance, configure this parameter
according to the version of IGMP currently in use:
• IGMPv1—Disable
• IGMPv2—Enable
• IGMPv3—Enable
snoop-querier Enables the IGMP Layer 2 Querier feature on the VLAN. The
default is disabled.
snoop-querier-addr {A.B.C.D} Specifies the IGMP Layer 2 Querier source IP address.
snooping Activates the snoop option for the VLAN.
ssm-snoop Activates support for SSM on the snoop interface.
Variable Value
static-group {A.B.C.D} Configures IGMP static members to add members to a snoop
{A.B.C.D} [port] {slot/ group.
port[/sub-port] [-slot/ {A.B.C.D} {A.B.C.D} indicates the IP address range of
port[/sub-port]] [,...]} the selected multicast group.
[static|blocked] [port] {slot/port[/sub-port] [-slot/port[/
sub-port]] [,...]} adds ports to a static group entry.
[static|blocked] configures the route to static or
blocked.
stream-limit stream-limit- Configures multicast stream limitation on a VLAN to limit the
max-streams <0-65535> number of concurrent multicast streams on the VLAN. The
default is 4.
stream-limit-group {slot/ Configures multicast stream limitation members on ports of
port[/sub-port] [-slot/ a specific VLAN to limit the number of multicast groups that
port[/sub-port]] [,...]} can join a VLAN. The default max-streams value is 4.
enable max-streams <0-65535>
version <1–3> Configures the version of IGMP that you want to configure
on this interface. For IGMP to function correctly, all routers
on a LAN must use the same version. The default value is 2
(IGMPv2).
Use the following options to display Layer 3 VSN with IP Multicast over Fabric Connect information to
confirm proper configuration.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display all the VRFs that have MVPN enabled and their corresponding forward cache timeout values:
show ip vrf mvpn
3. Display IP Multicast over Fabric Connect route information:
show isis spbm ip-multicast-route [all][detail]
4. Display IP Multicast over Fabric Connect by group and source address:
show isis spbm ip-multicast-route [group {A.B.C.D}][detail][source
{A.B.C.D}]
5. Display IP Multicast over Fabric Connect route information by VRF:
show isis spbm ip-multicast-route [vrf WORD<1–16>] [group {A.B.C.D}]
6. Display IP Multicast over Fabric Connect route information by VLAN:
show isis spbm ip-multicast-route [vlan <1-4059>][detail][group
{A.B.C.D}]
7. Display IP Multicast over Fabric Connect information by VSN I-SID:
show isis spbm ip-multicast-route [vsn-isid <1–16777215>][detail]
[group {A.B.C.D}]
8. Display summary information for each S, G, V tuple with the corresponding scope, Data I-SID, and
the host name of the source:
show isis spb-mcast-summary [count][host-name WORD<0–255>][lspid
<xxxx.xxxx.xxxx.xx-xx>]
Example
Vrf name : 4
mvpn : enable
fwd-cache-timeout(seconds) : 210
--------------------------------------------------------------------------------
Total Number of SPBM IP multicast ROUTE Entries: 10
--------------------------------------------------------------------------------
==========================================================================
Type VrfName Vlan Source Group VSN-ISID Data ISID BVLAN Source-BEB
Id
--------------------------------------------------------------------------
routed GRT 501 192.0.2.1 233.252.0.1 5010 16300001 10 el2
routed GRT 501 192.0.2.1 233.252.0.2 5010 16300002 20 el2
routed GRT 501 192.0.2.1 233.252.0.3 5010 16300003 10 el2
routed GRT 501 192.0.2.1 233.252.0.4 5010 16300004 20 el2
routed GRT 501 192.0.2.1 233.252.0.5 5010 16300005 10 el2
routed GRT 501 192.0.2.1 233.252.0.6 5010 16300006 20 el2
routed GRT 501 192.0.2.1 233.252.0.7 5010 16300007 10 el2
routed GRT 501 192.0.2.1 233.252.0.8 5010 16300008 20 el2
routed GRT 501 192.0.2.1 233.252.0.9 5010 16300009 10 el2
routed GRT 501 192.0.2.1 233.252.0.10 5010 16300010 20 el2
-------------------------------------------------------------------------
Total Number of SPBM IP multicast ROUTE Entries: 10
-------------------------------------------------------------------------
-------------------------------------------------------------------------
Total Number of SPBM IP multicast ROUTE Entries: 10
--------------------------------------------------------------------------
==========================================================================
SPB multicast - Summary
==========================================================================
SCOPE SOURCE GROUP DATA LSP HOST
I-SID ADDRESS ADDRESS I-SID BVID FRAG NAME
--------------------------------------------------------------------------
5010 192.0.2.1 233.252.0.1 16300001 10 0x0 el2
5010 192.0.2.1 233.252.0.3 16300003 10 0x0 el2
5010 192.0.2.1 233.252.0.5 16300005 10 0x0 el2
5010 192.0.2.1 233.252.0.7 16300007 10 0x0 el2
5010 192.0.2.1 233.252.0.9 16300009 10 0x0 el2
5010 192.0.2.1 233.252.0.2 16300002 20 0x0 el2
5010 192.0.2.1 233.252.0.4 16300004 20 0x0 el2
5010 192.0.2.1 233.252.0.6 16300006 20 0x0 el2
5010 192.0.2.1 233.252.0.8 16300008 20 0x0 el2
5010 192.0.2.1 233.252.0.10 16300010 20 0x0 el2
Variable Definitions
The following table defines parameters for the show isis spbm ip-multicast-route
command.
Variable Value
all Displays all IP Multicast over Fabric Connect route information.
detail Displays detailed IP Multicast over Fabric Connect route information.
group{A.B.C.D} Displays information on the group IP address for the IP Multicast over
Fabric Connect route.
vlan<1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN IDs
1 to 4059 are configurable and the system reserves VLAN IDs 4060 to
4094 for internal use. On switches that support the vrf-scaling and
spbm-config-mode boot configuration flags, if you enable these flags,
the system also reserves VLAN IDs 3500 to 3998. VLAN ID 1 is the default
VLAN and you cannot create or delete VLAN ID 1.
vrfWORD<1–16> Displays IP Multicast over Fabric Connect route information by VRF.
vsn-isid<1– Displays IP Multicast over Fabric Connect route information by I-SID.
16777215>
The following table defines parameters for the show isis spb-mcast-summary command.
Variable Value
count Displays the total number of SPB multicast entries.
host-nameWORD<0–255> Displays the IP Multicast over Fabric Connect summary
information by host-name.
lspid<xxxx.xxxx.xxxx.xx-xx> Displays the IP Multicast over Fabric Connect summary
information by LSP ID.
Procedure
Example
Display IGMP information for Layer 3 VSN with IP multicast over Fabric Connect:
Switch:#enable
Switch:1#show ip igmp interface vrf green
======================================================================================
Igmp Interface - GlobalRouter
======================================================================================
QUERY OPER QUERY WRONG LASTMEM
IF INTVL STATUS VERS. VERS QUERIER MAXRSPT QUERY JOINS ROBUST QUERY MODE
--------------------------------------------------------------------------------------
V100 125 activ 2 2 0.0.0.0 100 0 0 2 10 routed-spb
=======================================================================
IGMP Sender - GlobalRouter
=======================================================================
PORT/
GRPADDR IFINDEX MEMBER MLT STATE
----------------------------------------------------------------------
233.252.0.1 Vlan 501 192.2.0.1 9/5 NOTFILTERED
233.252.0.2 Vlan 501 192.2.0.1 9/5 NOTFILTERED
233.252.0.3 Vlan 501 192.2.0.1 9/5 NOTFILTERED
233.252.0.4 Vlan 501 192.2.0.1 9/5 NOTFILTERED
233.252.0.5 Vlan 501 192.2.0.1 9/5 NOTFILTERED
233.252.0.6 Vlan 501 192.2.0.1 9/5 NOTFILTERED
233.252.0.7 Vlan 501 192.2.0.1 9/5 NOTFILTERED
233.252.0.8 Vlan 501 192.2.0.1 9/5 NOTFILTERED
233.252.0.9 Vlan 501 192.2.0.1 9/5 NOTFILTERED
233.252.0.10 Vlan 501 192.2.0.1 9/5 NOTFILTERED
================================================================================
IGMP Group - GlobalRouter
================================================================================
GRPADDR INPORT MEMBER EXPIRATION TYPE
--------------------------------------------------------------------------------
233.252.0.1 V501-9/16 192.2.0.1 204 Dynamic
233.252.0.2 V501-9/16 192.2.0.1 206 Dynamic
233.252.0.3 V501-9/16 192.2.0.1 206 Dynamic
233.252.0.4 V501-9/16 192.2.0.1 207 Dynamic
233.252.0.5 V501-9/16 192.2.0.1 204 Dynamic
233.252.0.6 V501-9/16 192.2.0.1 209 Dynamic
233.252.0.7 V501-9/16 192.2.0.1 206 Dynamic
233.252.0.8 V501-9/16 192.2.0.1 206 Dynamic
233.252.0.9 V501-9/16 192.2.0.1 211 Dynamic
233.252.0.10 V501-9/16 192.2.0.1 207 Dynamic
Variable Definitions
The following table defines parameters for the show ip igmp interface command.
Variable Value
gigabitethernet {slot/ Identifies the slot and port in one of the following formats: a single
port[/sub-port] [- slot and port (slot/port), a range of slots and ports (slot/port-slot/
slot/port[/sub-port]] port), or a series of slots and ports (slot/port,slot/port,slot/port). If
[,...]} the platform supports channelization and the port is channelized, you
must also specify the sub-port in the format slot/port/sub-port.
vlan <1-4059> Specifies the VLAN ID in the range of 1 to 4059. By default, VLAN IDs
1 to 4059 are configurable and the system reserves VLAN IDs 4060
to 4094 for internal use. On switches that support the vrf-scaling
and spbm-config-mode boot configuration flags, if you enable
these flags, the system also reserves VLAN IDs 3500 to 3998. VLAN
ID 1 is the default VLAN and you cannot create or delete VLAN ID 1.
vrf WORD<1–16> Specifies the VRF by name.
vrfids WORD<0–512> Specifies the VRF by VRF ID.
The following table defines parameters for the show ip igmp cache command.
Variable Value
vrf WORD<1–16> Specifies the VRF by name.
vrfids WORD<0–512> Specifies the VRF by VRF ID.
The following table defines parameters for the show ip igmp group command.
Variable Value
count Specifies the number of entries.
group {A.B.C.D} Specifies the group address.
member-subnet {A.B.C.D/X} Specifies the IP address and network mask.
Variable Value
vrf WORD<1–16> Displays the multicast route configuration for a particular VRF by
name.
vrfids WORD<0–512> Displays the multicast route configuration for a particular VRF by
VRF ID.
The following table defines parameters for the show ip igmp sender command.
Variable Value
count Specifies the number of entries.
group {A.B.C.D} Specifies the group address.
member-subnet {A.B.C.D/X} Specifies the IP address and network mask.
vrf WORD<1–16> Displays the multicast route configuration for a particular VRF by
name.
vrfids WORD<0–512> Displays the multicast route configuration for a particular VRF by
VRF ID.
View TLV Information for a Layer 3 VSN with IP Multicast over Fabric Connect
For a Layer 3 VSN multicast, TLV 185 on the BEB where the source is located displays the multicast
source and group addresses and have the Tx bit set. Each multicast group should have its own unique
data I-SID with a value between 16,000,000 to 16,512,000. TLV 144 on the BEB bridge, where the sender
is located, has the Tx bit set. All BEB bridges, where a receiver exists, have the Rx bit set.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display IS-IS Link State Database information by TLV:
show isis lsdb tlv <1–236> [sub-tlv <1–3>] [detail] [home|remote]
3. Display IS-IS Link State Database information by Link State Protocol ID:
show isis lsdb lspid <xxxx.xxxx.xxxx.xx-xx> [tlv <1–236>] [sub-tlv <1–
3>] [detail] [home|remote]
Example
Display TLV information for a Layer 3 VSN with IP Multicast over Fabric Connect:
Switch:1# show isis lsdb tlv 185 detail
================================================================================
ISIS LSDB (DETAIL)
================================================================================
--------------------------------------------------------------------------------
Level-1 LspID: 000c.f803.83df.00-04 SeqNum: 0x000002eb Lifetime: 1113
Chksum: 0x7e3b PDU Length: 556
Host_name: el2
Attributes: IS-Type 1
TLV:185 SPBM IPVPN :
VSN ISID:5010
BVID :10
Metric:0
The following table defines parameters for the show isis lsdb command.
Variable Value
detail Displays detailed information about the IS-IS Link State
database.
home Displays the IS-IS LSDB information that the system configures
in the home area.
Variable Value
level {l1, l2, l12} Displays information on the IS-IS level. The IEEE 802.1aq
standard currently only defines the use of one hierarchy, Level
1. Level 2 function is disabled.
local Displays information on the local LSDB.
lspid<xxxx.xxxx.xxxx.xx-xx> Specifies information about the IS-IS Link State database by
LSP ID.
remote Displays the IS-IS LSDB information that the system configures
in the remote area.
sub-tlv <1–3> Specifies information about the IS-IS Link State database by
sub-TLV.
sysid <xxxx.xxxx.xxxx> Specifies information about the IS-IS Link State database by
System ID.
tlv <1–236> Specifies information about the IS-IS Link State database by
TLV.
Use this procedure to enable MVPN for a particular VRF. IP Multicast over Fabric Connect, constrains
multicast streams of senders to all receivers in the same Layer 3 VSN. MVPN functionality is disabled by
default.
Note
VLAN level configuration is also required to turn on the service on each VLAN within the VRF
on which this services is required. You can turn it on under the VLAN context or the brouter
context.
Procedure
Use the data in the following table to use the MVPN tab.
Name Description
VrfId Specifies the VRF ID.
Enable Enables Layer 3 VSN IP Multicast over Fabric
Connect services for a particular VRF. The default
is disabled.
FwdCacheTimeout Specifies the VRF timeout value. The timeout
value ages out the sender when there is no
multicast stream on the VRF. The default is 210
seconds..
Use this procedure to enable IP Multicast over Fabric Connect for a Layer 3 VSN. The default is disabled.
To configure a VLAN for IP Shortcuts with IP Multicast over Fabric Connect, see Configuring IP Multicast
over Fabric Connect on a VLAN within the GRT on page 1732.
Note
On DvR Controllers in a DvR domain, you must manually configure IP multicast over Fabric
Connect on Layer 3 VSNs (VRFs). This configuration is then automatically pushed to the Leaf
nodes in the DvR domain.
You must configure VLANs to turn on the service on each VLAN with in the VRF on which the service is
required. You can turn it on under the VLAN context or the brouter context.
If you only want to use IP Multicast over Fabric Connect, you do not need to enable the Layer 3 VSN or
redistribute unicast routes into or out of IS-IS. IP Multicast over Fabric Connect routing does not depend
on unicast routing (for Layer 3 VSN). This allows for you to more easily migrate from a PIM environment
to IP Multicast over Fabric Connect. You can migrate a PIM environment to IP Multicast over Fabric
Connect first and then migrate unicast separately or not at all.
The switch only supports IPv4 address with IP Multicast over Fabric Connect.
Note
You cannot enable IP PIM when IP Multicast over Fabric Connect is enabled on the VLAN.
Procedure
Configuring IP Multicast over Fabric Connect on a brouter port for a Layer 3 VSN
Use this procedure to enable IP Multicast over Fabric Connect on a brouter port. The default is disabled.
To configure a brouter port for IP Shortcuts with IP Multicast over Fabric Connect, see Configuring IP
Multicast over Fabric Connect on a brouter port within the GRT on page 1733.
• You must configure the required SPBM and IS-IS infrastructure, which includes the creation of SPBM
B-VLANs.
• You must configure a VRF and an IP VPN instance with an I-SID configured under it on the switch.
The IP VPN does not need to be enabled for Layer 2 VSN multicast to function.
• You must enable IP Multicast over Fabric Connect globally.
• If there is no IP interface on the VLAN, then you create one. (The IP interface must be in the same
subnet as the IGMP hosts that connect to the VLAN).
• You must enable MVPN for the particular VRF.
You must enable IP Multicast over Fabric Connect on each of the VLANs that need to support IP
multicast traffic.
If you only want to use IP Multicast over Fabric Connect, you do not need to enable the Layer 3 VSN or
redistribute unicast routes into or out of IS-IS. IP Multicast over Fabric Connect routing does not depend
on unicast routing, which allows for you to more easily migrate from a PIM environment to Multicast
over Fabric Connect. You can migrate a PIM environment to IP Multicast over Fabric Connect first, and
then migrate unicast separately or not at all.
The switch only supports IPv4 address with IP Multicast over Fabric Connect.
Procedure
Use this procedure to configure IGMP for each VLAN interface to enable the interface to perform
multicast operations.
IGMPv2 at the VLAN level is the default setting, with no other configuration required. You only need to
enable IGMPv3. You must enable SSM snoop before you configure IGMP version 3, and you must enable
both ssm-snoop and snooping for IGMPv3.
For IGMP Snooping, ensure that the IGMP version used by multicast hosts and other devices in the
network is the same as the IGMP version configured on the IGMP Snooping VLAN, or that you enable
compatibility mode.
Note
You cannot enable IP PIM when IP Multicast over Fabric Connect is enabled on the VLAN.
For IGMP Snooping, ensure that the IGMP version used by multicast hosts and other devices in the
network is the same as the IGMP version configured on the IGMP Snooping VLAN, or that you enable
compatibility mode.
Procedure
11. (Optional) If you want to enable Snoop, select the SnoopEnable box.
12. (Optional) In the Version box, select the correct IGMP version.
You must enable SSM snoop before you configure IGMP version 3, and you must enable both
ssm-snoop and snooping for IGMPv3.
13. (Optional) Select SnoopQuerierEnable, to enable Snoop Querier. Only select this option, if you want
to configure an address for the IGMP queries.
14. (Optional) In the SnoopQuerierAddr box, type an IP address, if you want to configure a snoop
querier address.
Note
If the SPBM bridge connects to an edge switch, it can be necessary to add an IGMP query
address. If you omit adding a query address, the SPB bridge sends IGMP queries with a
source address of 0.0.0. Some edge switch models do not accept a query with a source
address of 0.0.0.0.
Use the data in the following table to use the IGMP tab.
Name Description
QueryInterval Configures the frequency (in seconds) at which the IGMP host
query packets transmit on the interface. The range is from 1–
65535 and the default is 125.
QueryMaxResponseTime Configures the maximum response time (in tenths of a second)
advertised in IGMPv2 general queries on this interface. You cannot
configure this value for IGMPv1.
Smaller values allow a router to prune groups faster. The range is
from 0–255 and the default is 100 tenths of a second (equal to 10
seconds.)
Important:
You must configure this value lower than the QueryInterval.
Robustness Configure this parameter to tune for the expected packet loss of
a network. This value is equal to the number of expected query
packet losses for each serial query interval, plus 1. If you expect
the network to lose query packets, increase the robustness value.
The range is from 2–255 and the default is 2. The default value of
2 means that the switch drops one query for each query interval
without the querier aging out.
LastMembQueryIntvl Configures the maximum response time (in tenths of a second)
inserted into group-specific queries sent in response to leave
group messages. This value is also the time between group-
specific query messages. You cannot configure this value for
IGMPv1.
Decreasing the value reduces the time to detect the loss of the
last member of a group. The range is from 0–255 and the default
is 10 tenths of a second.
Configure this parameter to values greater than 3. If you do not
require a fast leave process, use values greater than 10. (The value
3 is equal to 0.3 seconds, and 10 is equal to 1 second.)
Name Description
SnoopEnable Enables or disables snoop.
SsmSnoopEnable Enables or disables support for SSM on the snoop interface.
ProxySnoopEnable Enables or disables proxy snoop.
Version Configures the version of IGMP (1, 2, or 3) that you want to use on
this interface. For IGMP to function correctly, all routers on a LAN
must use the same version. The default is version 2.
For IGMP Snooping, ensure that the IGMP version used by
multicast hosts and other devices in the network is the same as
the IGMP version configured on the IGMP Snooping VLAN, or that
you enable compatibility mode.
FastLeaveEnable Enables or disables fast leave on the interface.
StreamLimitEnable Enables or disables stream limitation on this VLAN.
Maximum Number Of Stream Configures the maximum number of streams allowed on this
VLAN. The range is from 0–65535 and the default is 4.
Current Number Of Stream Displays the current number of streams. This value is a read-only
value.
FastLeavePortMembers Selects the ports that are enabled for fast leave.
SnoopMRouterPorts Selects the ports in this interface that provide connectivity to an
IP multicast router.
DynamicDowngradeEnable Configures if the switch downgrades the version of IGMP to
handle older query messages. If the switch downgrades, the
host with IGMPv3 only capability does not work. If you do not
configure the switch to downgrade the version of IGMP, the switch
logs a warning. The default value is selected (enabled), which
means the switch downgrades to the oldest version of IGMP on
the network.
CompatibilityModeEnable Enables or disables v2-v3 compatibility mode. The default value
is clear (disabled), which means IGMPv3 is not compatible with
IGMPv2.
ExplicitHostTrackingEnable Enables or disables IGMPv3 to track hosts per channel or group.
The default is disabled. You must select this field if you want to
use fast leave for IGMPv3.
SnoopQuerierEnable Enables Snoop Querier. The default is disabled.
When you enable IGMP Layer 2 Querier, Layer 2 switches in
your network can snoop IGMP control packets exchanged with
downstream hosts and upstream routers. The Layer 2 switches
then generate the Layer 2 MAC forwarding table, used for
switching sessions and multicast traffic regulation, and provide
the recurring queries required to maintain IGMP groups.
Enable Layer 2 Querier on only one node in the VLAN.
SnoopQuerierAddr Specifies the pseudo IP address of the IGMP Snoop Querier. The
default IP address is 0.0.0.0.
If the SPBM bridge connects to an edge switch, it can be
necessary to add an IGMP query address. If you omit adding a
query address, the SPBM bridge sends IGMP queries with a source
address of 0.0.0.0. Some edge switch models do not accept a
query with a source address of 0.0.0.0.
router isis
spbm 1 multicast enable
VRF CONFIGURATION
router isis
spbm 1 multicast enable
VRF CONFIGURATION
Table 124: Internet Protocol Flow Information eXport (IPFIX) product support
Feature Product Release introduced
Internet Protocol Flow VSP 4450 Series Not Supported
Information eXport (IPFIX)
VSP 4900 Series Not Supported
VSP 7200 Series Not Supported
VSP 7400 Series VOSS 8.0
VSP 8200 Series Not Supported
VSP 8400 Series Not Supported
VSP 8600 Series Not Supported
XA1400 Series Not Supported
IPFIX Fundamentals
Internet Protocol Flow Information eXport (IPFIX) is an Internet Engineering Task Force (IETF) standard
of export for Internet Protocol flow information.
IPFIX monitors flows that pass an observation point. The switch organizes flows into a flow group,
which is contained in an observation domain.
An IPFIX flow is a set of packets that pass an observation point in the network during a certain time
interval. Packets that belong to a particular flow have a common set of properties. The switch defines
each property using values from the following:
• Source IP address
• Destination IP address
• IP protocol
• L4 source port
• L4 destination port
A packet belongs to a flow if it completely satisfies all defined properties of the flow.
The switch logically organizes flows into a flow group, which corresponds to a single observation point.
A flow can belong to only 1 flow group. A flow group is a collection of packet flows that meet match
criteria. Examples of flow groups are packets ingressing a specific physical port, or packets with a
destination IP address belonging to a specific subnet.
A flow group is contained in an observation domain. The switch assigns the flow group to an
observation domain. The observation domain has a unique observation domain ID that you can
configure. You can configure only 1 observation domain.
Use the collected information for network planning, troubleshooting a live network, and monitoring
security threats.
The best practice is to use the ExtremeAnalytics™ solution as the collector. The ExtremeAnalytics™
solution provides an enhanced method of collecting IPFIX flow information.
The external collector for the IPFIX solution must support our IPFIX template, which contains the
following element IDs defined by Internet Assigned Numbers Authority (IANA) IPFIX assignments.
IPFIX is a push protocol. The Filtering Rules and Exporting processes periodically send IPFIX messages
to configured receivers without interaction from the Collecting process.
IPFIX collects IPv4 flow information on the switch and conforms with the following:
• IPFIX supports only 1 collector.
• IPFIX learns only IPv4 flows.
• IPFIX sends and receives only TCP/UDP flows.
• IPFIX uses only UDP to export packets.
• You can configure only the template exporting timer.
• The Out-of-Band (OOB) port does not support IPFIX.
• IPFIX exports TCP/UDP IPv4 flows on IS-IS interfaces that are members of a VLAN. IPFIX does not
capture Mac-In-Mac encapsulated flows on IS-IS interfaces.
IPFIX processes IPv4 UDP or TCP Mac-in-Mac packet flows that are terminated by the switch. IPFIX
does not process Mac-in-Mac packet flows that are only traversing the switch (Layer 2 switching).
• Layer 3 Virtual Services Network (L3 VSN) flow packets on NNI ports are not learned by IPFIX.
• The switch supports only ingress sampling. The switch does not support egress sampling.
Note
IPFIX is not supported on OOB, Circuitless IP (CLIP), or VLAN Segmented Management
Instance interfaces.
Use the following procedure to enable IPFIX globally. IPFIX provides the ability to monitor IPv4 traffic
flows.
Procedure
1. Enter Global Configuration mode:
enable
configure terminal
2. Enable IPFIX:
ip ipfix enable
Examples
Enable IPFIX globally:
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#ip ipfix enable
Use the following procedure to display global status information for IPFIX.
Procedure
1. To enter User EXEC mode, log on to the switch.
2. Display IPFIX global status:
show ip ipfix
Example
Switch:1#show ip ipfix
==========================================================================================
IPFIX Global
==========================================================================================
Global-State : enable
Observation-Domain ID : 1
Flow Limit : 20000
Flow Count : 0
Aging Interval : 40
Use the following procedure to configure an aging interval for IPFIX. The aging interval determines how
long a traffic flow that is no longer being received, is retained as a flow.
Procedure
Enter Global Configuration mode:
enable
configure terminal
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#ip ipfix aging-interval 30
Variable Definitions
The following table defines parameters for the ip ipfix aging-interval command.
Variable Value
<1-60> Specifies (in seconds) the flow record aging interval. The aging interval
determines how long a traffic flow that is no longer being received is retained
as a flow.
The default is 40 seconds.
Use the following procedure to configure a collector for IPFIX. Use the ExtremeAnalytics™ solution as
the collector.
Procedure
configure terminal
2. Configure values for the collector ID, the IP address of the collector, and the IP address of the
exporter. Optionally, you can configure values for the source port sending flow information and the
destination port receiving flow information:
ip ipfix collector <1–1> {A.B.C.D} exporter-ip {A.B.C.D} [dest-port
<1-65535>] [src-port <1-65535>]
Note
You cannot configure collector or exporter IP addresses in the following formats:
• 255.255.255.255
• 127. x.x.x
• 0.x.x.x
• 224.0.0.0 to 239.255.255.255
If you configure a collector or exporter IP address in any of these formats, the following error
message is displayed:
Error: Invalid IP address
Example
Switch:1>enable
Switch:1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch:1(config)#ip ipfix collector 1 192.0.2.15 exporter-ip 192.0.2.16
dest-port 2 src-port 4
Switch:1(config)#ip ipfix collector 1 export-interval 40
S