Teldat Dm717-I Bridge2
Teldat Dm717-I Bridge2
Bridge
Teldat-Dm 717-I
Bridge 1
Manual Teldat SA
Legal Notice
Warranty
Teldat is not liable for any direct, indirect, collateral, consequential or any other damage connected to the delivery,
supply or use of this manual.
2 Bridge
Teldat SA Table of Contents
Table of Contents
I Related Documents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Bridge i
Table of Contents Teldat SA
7.2 Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
ii Bridge
Teldat SA Table of Contents
9.2.3 BAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
9.2.4 BRIDGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
9.2.5 BRIDGE-NUMBER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
9.2.6 BRIDGE-PROTOCOL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
9.2.7 DLS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
9.2.8 DUPLICATE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
9.2.9 ETHERTYPE-IBMRT-PC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
9.2.10 FA-GA-MAPPING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
9.2.11 FAST-IRB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
9.2.12 IBM8209_SPANNING_TREE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
9.2.13 IRB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
9.2.14 LIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
9.2.15 MAPPING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
9.2.16 NAME-CACHING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
9.2.17 NETBIOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
9.2.18 NO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
9.2.19 PORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
9.2.20 PROTOCOL-FILTER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
9.2.21 ROUTE-PROTOCOL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
9.2.22 SET. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
9.2.23 SOURCE-ROUTING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
9.2.24 SPANNING-TREE-EXPLORER . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
9.2.25 SR-TB-CONVERSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
9.2.26 STP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
9.2.27 TRANSPARENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
9.2.28 UB-CAPSULATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
9.2.29 VIRTUAL-BRIDGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
9.2.30 VIRTUAL-SEGMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
9.2.31 VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
9.2.32 EXIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Bridge iii
Table of Contents Teldat SA
10.3.10 NETBIOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
10.3.11 SPANNING TREE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
10.3.12 EXIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
iv Bridge
Teldat SA Table of Contents
Chapter 13 Configuration and Monitoring NetBIOS Name and Byte Filters . . . . . . . 134
13.1 Accessing the NetBIOS Name and Byte Configuration and Monitoring menus . . . . . . . . 134
Bridge v
Table of Contents Teldat SA
15.1 Accessing the MAC Filtering Configuration and Monitoring menus. . . . . . . . . . . . . . 154
vi Bridge
Teldat SA Table of Contents
Bridge vii
Table of Contents Teldat SA
viii Bridge
Teldat SA Related Documents
I Related Documents
Teldat-Dm 715-I Bandwidth Reservation System
Bridge 1
1 Fundamentals of Bridging Teldat SA
You can use bridges to link homogeneous or heterogeneous networks. The term homogeneous means that the con-
nected networks use the same bridging method and media types. The term heterogeneous means that the connec-
ted networks mix different bridging methods and media types.
You must route when a protocol is routable. For example, you must route when mixing Ethernet and Token Ring with
protocols that use MAC information in the upper layers
2 Bridge
Teldat SA 1 Fundamentals of Bridging
A bridge acts as a relay for frames between networks at the data link layer. The data link layer maintains physical ad-
dressing schemes, line discipline, topology reporting, error notification, flow control, and ordered delivery of data
frames. The principal service provided by the data link layer to the higher layer is that of error detection and control.
With a fully functional data link layer protocol, the next higher layer may assume virtually error-free transmission over
the link.
You must bridge when the protocol is non-routable, that is, it carries no network layer.
Bridges can also filter frames based on layer 2 fields. This means that the bridge may be configured to accept and
forward only frames of a certain type or ones that originate from a particular network. This ability to configure filters is
very useful for maintaining effective traffic flow.
Bridges are advantageous when dividing large networks into manageable segments. The advantages of bridging in
large networks can be summed up as follows:
• Bridging lets you isolate specific network areas, giving them less exposure to major network problems.
• Filtering lets you regulate the amount of traffic that is forwarded to specific segments.
• Bridges allow communication between more internetworking devices than would be supported on any single LAN
connected to a bridge.
• Bridging eliminates node limitation. Local network traffic is not passed on to all of the other connected networks.
• Bridges extend the connected length of a LAN by allowing the connection of distant workstations.
• Ethernet
• Token Ring
• Frame Relay
• PPP
• ATM
• Tunnel IP
The Token Ring interface supports source routing and transparent bridging.
The rest of the interfaces provide point-to-point connectivity for transparent and source routing traffic. It is important
to note that a bridge configuration over an interface of this type should be consistent at both endpoints. This means
that you must configure both endpoints as follows:
• Transparent to transparent
• Source routing to source routing
• Source routing/transparent to source routing/transparent
It is best if the interface is configured for both bridging methods if you want mixed bridging. Make sure that bridging
routers are consistent in their bridging method or in their routing of particular protocols.
• STB is a bridging method primarily for Ethernet environments in which bridges automatically develop bridging
Bridge 3
1 Fundamentals of Bridging Teldat SA
You can use STB and SRB alone or in combination to meet your requirements regardless of media or network topo-
logy. These combinations are Source Route Transparent Bridging (SRT), Source Route-Transparent Bridging
(SR-TB Conversion), and Adaptive Source Route Transparent Bridging (ASRT).
• SRT is a method of bridging both source routing frames and transparent frames based on the Route Information
Indicator (RII). It can be thought of as two bridges in one.
• SR-TB is a method of bridging between SRB domains and STB domains. It does this through a conversion process
between the two bridging technologies (IBM 8209).
• ASRT is Teldat’s enhancement to SRT bridging technology. It combines SRT and SR-TB functionality. It allows all
end stations in a complex bridged environment to communicate without the standard limitations. Tables are main-
tained for SRB and STB end stations so that they can be bridged or converted as required.
The decision to choose one method of bridging over another depends on the network’s topology and the applications
used on the end stations.
The bridge captures MAC frames whose destination addresses are not on the local LAN and forwards them to the
appropriate destination LAN.
Bridge A captures a MAC frame whose destination address is not on the local LAN and then sends it to bridge B
across a serial line using the appropriate serial line encapsulation to identify the bridge frame type. Remote bridge B
decapsulates the serial line header and forwards the frame to the local LANs.
4 Bridge
Teldat SA 1 Fundamentals of Bridging
When the data frame reaches Bridge B (the target bridge), the link fields are stripped off and Bridge B transmits the
original, unchanged MAC frame to its destination, end station B.
• CSMA/CD (802.3)
• Token bus (802.4)
• Token Ring (802.5)
Note
A separate frame format is used at the LLC level. This frame is then embedded in the appropriate MAC
frame.
Fig. 6 on page 6 shows the CSMA/CD and Token Ring MAC frame formats supported by the bridges. The specific
frames are detailed in the following section.
Bridge 5
1 Fundamentals of Bridging Teldat SA
• Preamble (PRE). 7-byte pattern used by the receiving end station to establish bit synchronization and then locate
the first bit of the frame.
• Start Frame Delimiter (SDF) . Indicates the start of the frame.
The portion of the frame that is actually bridged consists of the following fields:
• Destination Address (DA). Specifies the end station for which the frame is intended. This address may be a unique
physical address (one destination), a multicast address (a group of end stations as a destination) or a broadcast
address (all stations as destination). The format is 48-bit (6 octets) and must be the same for all stations on that
particular LAN.
• Source Address (SA). Specifies the end station that transmitted the frame. The form must be the same as the des-
tination address format. This address must never be multicast or broadcast address.
• Type/Length. If the value of this field is less than 0x0600, this is interpreted as length and specifies the length, in
bytes, present in the MAC frame INFO field. These are normally known as IEEE 802.3 frames. If the value of this
field is greater than 0x0600, then this is interpreted as a higher layer protocol encapsulated in the MAC frame. This
is known as Ethernet-II frame.
• Info (INFO). Data present in the MAC frame.
• Pad. Sequence of bytes that ensures that the frame is long enough for proper collision detection (CD) operation.
The minimum frame size on Ethernet is 60 bytes excluding FCS.
• Frame Check Sequence (FCS). 32-bit cyclic redundancy check value. This value is based on all fields, starting
with the destination address.
• Starting Delimiter (SD). Unique 8-bit pattern that indicates the start of the frame.
• Access Control (AC). Field with the form at PPPTMRRR where PPP and RRR are 3-bit priority and reservation
variables, M is the monitor bit, and T indicates that this is either a Token or data frame. If it is a Token, the only oth-
er field is the ending delimiter (ED).
• Frame Control (FC). Indicates if this is an LLC data frame. If not, bits in this field control operation of the Token
Ring MAC protocol.
The portion of the frame that is actually bridged consists of the following fields:
• Destination Address (DA). Specifies the device the frame is addressed to. Same as CSMA/CD, except that bit
format is non-canonical.
• Source Address (SA). Identifies the specific station that originates the frame.
6 Bridge
Teldat SA 1 Fundamentals of Bridging
• Routing Information Field (RIF). When the RII (most significant bit of most significant byte) in the source address
field is set to 1, this field appears after the source address. The RIF is required for the source routing protocol. It
consists of a 2-octet routing control field and a series of 2-octet route designator fields.
• Info (INFO). Data present in the MAC frame.
• Frame Check Sequence (FCS) A 32-bit cyclic redundancy check value. This value is based on all fields, starting
with the destination address.
• End Delimited (ED). Contains the error detection (E) bit, and the intermediate frame (I) bit. The I bit indicates that
this is the frame other then the final one of a multiple frame transmission.
• Frame Status (FS). Contains the address recognized (A) and frame copied (C) bits.
Bridge 7
2 Using Transparent Bridging (STB) Teldat SA
For each frame it receives, the bridge checks the frame’s destination address against the ones in its database. If the
destination is on the same LAN, it does not forward the frame. If the destination is on another LAN, it does forward
the frame. If the destination address is not present in the database, it forwards the frame to all the LANs connected
to the bridge except the LAN from which it originated.
All transparent bridges use the spanning tree protocol and algorithm. The spanning tree algorithm produces and
maintains a loop-free topology in a bridged network that may contain loops in its physical design. In a mesh topology,
where more than one bridge is connected between two LANs, data packets can bounce back and forth between two
LANs’ parallel bridges. This creates a redundancy in data traffic and produces the phenomenon known as looping.
Without spanning tree, when looping occurs, you must configure the local and/or remote LAN to remove the physical
loop. With spanning tree, a self-configuring algorithm allows a bridge to be added anywhere in the LAN without creat-
ing loops. When you add the new bridge, the spanning tree transparently reconfigures all bridges on the LAN into a
single loop-free spanning tree.
Spanning tree never has more than one active data route between two end stations, thus eliminating data loops. For
each bridge, the algorithm determines which bridge ports to use to forward data and which ones to block to form a
loop-free topology. Among its features spanning tree provides the following:
• Loop detection. Detects and eliminates physical data link loops in extended LAN configurations.
• Automatic backup of data paths. Deliberately configured from redundant paths. The bridges connecting to the re-
dundant paths enter backup mode automatically. When a primary bridge fails, a backup bridge becomes active.
• User configurability. Lets you tailor your network topology. Sometimes the default settings do not produce the de-
sired network topology. You can adjust the bridge priority, port priority and path cost parameters to shape the
spanning tree to your network topology.
• Seamless interoperability. Allows LAN interoperability without configuration limitations caused by diverse commu-
nications environments.
Note
Transparent bridging over X.25 is not supported. You can work around this by configuring the IP tunnel
feature.
8 Bridge
Teldat SA 2 Using Transparent Bridging (STB)
After completing the procedures just described, you can enter LIST BRIDGE to check your configuration.
To make changes to the configuration, see chapter Bridging Configuration on page 33 of this manual. After you finish
making the changes to the configuration, you must restart the router for the new configuration to take effect.
Of the information exchanged in the Hello messages, the following parameters are the most important for computing
the spanning tree:
• Root bridge ID. The bridge ID of the root bridge, the designated bridge for all the LANs to which it is connected.
• Root path cost. The sum of the designated path costs to the root via this bridge’s root port. This information is
transmitted by both the root bridge and the designated bridges to update all bridges on path information if the topo-
logy changes.
• Bridge ID. A unique ID used by the spanning tree algorithm to determine the spanning tree. Each bridge in the net-
work is assigned a unique bridge identifier.
• Port ID. The ID of the port from which the current Hello BPDU message was transmitted.
With this information available, the spanning tree begins to determine its shape and direction and then creates a lo-
gical path configuration as follows:
• A root bridge for the network is selected by comparing the bridge Ids of each bridge in the network. The bridge with
the lowest ID value (i.e. highest priority) wins. The other bridges select a port as a root port. This port is the least
cost port associated to reach the root bridge.
• The spanning tree algorithm then selects a designated bridge for each LAN. If more than one bridge is connected
to the same LAN, the bridge with the smallest path cost to the root is selected as the designated bridge. In the
case of duplicate path costs, the bridge with the lowest bridge ID is selected as the designated bridge.
• The non-designated bridges on the LANs put each port that has not been selected as a root port into a blocked
state. In the blocked state a bridge still listens to Hello BPDUs so that it can act on any changes that are made in
the network (e.g. designated bridge fails) and change its state from blocked to forwarding (i.e. forwarding data).
Through this process, the spanning tree algorithm reduces a bridged LAN network of arbitrary topology into a single
spanning tree. With the spanning tree there is never more than one active data path between any two end stations,
thus eliminating data loops.
This new configuration is bounded by a time factor. If a designated bridge fails or is physically removed, other
bridges on the LAN detect the situation when they do not receive Hello BPDUs within the time period set by the
bridge maximum age time. This event triggers a new configuration process where another bridge is selected as the
designated bridge. A new configuration is also created if the root bridge fails.
Fig. 7 on page 10 shows three LANs networked using three bridges. Each bridge is using default bridge priority set-
tings for its spanning tree configuration. In this case, the bridge with the lowest physical address is chosen as the
root bridge since the bridge priority of each bridge is the same. In this example, this is Bridge 2.
The newly-configured spanning tree stays intact due to the repeated transmissions of Hello BPDUs from the root
Bridge 9
2 Using Transparent Bridging (STB) Teldat SA
bridge at a present interval (bridge Hello time). Through this process, designated bridges are updated with all config-
uration information. The designated bridges then regenerate the information from the Hello BPDUs and distribute it to
the LANs for which they are designated bridges.
Bridge 1 Bridge 2 Bridge 3
Bridge Priority 32768 Bridge Priority 32768 Bridge Priority 32768
Address Address Address
00:00.90:00.00:10 00:00.90:00.00:01 00:00.90:00.00:05
Port 1 Port 1 Port 1
Priority: 128 Priority: 128 Priority: 128
Path Cost: 100 Path Cost: 100 Path Cost: 100
Port 2 Port 2 Port 2
Priority: 128 Priority: 128 Priority: 128
Path Cost: 17857 Path Cost: 17857 Path Cost: 17857
Port 3 Port 3 Port 3
Priority: 128 Priority: 128 Priority: 128
Path Cost: 17857 Path Cost: 17857 Path Cost: 17857
The spanning tree algorithm designates the port connecting Bridge 1 to Bridge 3 (port 2) as a backup port and blocks
it from forwarding frames that would cause a loop condition. The spanning tree created by the algorithm using the
default values is shown in the Fig. 8 on page 10 as the heavy lines connecting Bridge 1 to Bridge 2, and then Bridge
2 to Bridge 3. The root bridge is Bridge 2.
This spanning tree results in poor network performance because the workstations on LAN C can only get to the file
server on LAN A indirectly through Bridge 2 rather than using the direct connection between Bridge 1 and Bridge 3.
Normally this network uses the port between Bridge 2 and Bridge 3 infrequently. Therefore, you can improve network
performance by making Bridge 1 the root bridge of the spanning tree. You can do this by configuring Bridge 1 with
the highest priority of 1000. The spanning tree that results from this modification is shown in Fig. 9 on page 11 as the
10 Bridge
Teldat SA 2 Using Transparent Bridging (STB)
heavy lines connecting Bridge 1 to Bridge 3 and Bridge 1 to Bridge 2. The root bridge is now Bridge 1. The connec-
tion between Bridge 2 and Bridge 3 is now blocked and serves as a backup data path.
An Ethernet/IEEE 802.3 network can simultaneously support the Ethernet data link layer based on the value of the
length/type field in the MAC header.
The basic approach consists of translating Ethernet packets to IEEE 802.2 Unnumbered Information (UI) packets us-
ing the IEEE 802 SNAP SAP. The SNAP Protocol Identifier has the Organizationally Unique Identifier (OUR) of
00-00-00, with the last two bytes being the Ethernet type value.
The translation is done when a frame is sent on a LAN. The original frame format is preserved across serial lines.
Bridge 11
3 Using Source Route Bridging (SRB) Teldat SA
SRB provides local bridging over 4 and 16 Mbps Token Rings, see . Fig. 10 on page 12 It can also connect remote
LANs through a telecommunications link operating at speeds up to E1.
• IBM compatibility. The bridge is compatible with the IBM source routing bridge. It can connect IBM PC LANs run-
ning systems such as OS/2 and NetBIOS. It can also carry IBM SNA traffic between PC LANs and mainframes.
• Performance and speed. Because bridging occurs at the data-link layer instead of the network layer, packet con-
version and address table maintenance are not necessary. The means less overhead and higher-speed routing de-
cisions.
• Bridge tunneling. By encapsulating source routing packets, the bridge dynamically routes these packets through
internetworks to the desired destination end station without degradation or network size restrictions. Source routing
end stations see this path (the tunnel) as a single hop, regardless of the network complexity. This helps overcome
the usual seven-hop distance limit encountered in source routing configurations. This feature also lets you connect
source routing end stations across non-source routing media (e.g. Ethernet networks).
• FCS preservation. Teldat bridges preserve Frame Check Sequence of the Specifically Routed Frames (SRF). This
protects against data corruption of the bridged frames.
12 Bridge
Teldat SA 3 Using Source Route Bridging (SRB)
If source routing is the only feature you want, disable transparent bridging on all the bridging ports.
Do not include interfaces that traditionally do not support source routing. For example, if transparent bridging is dis-
abled and source routing is enabled on an Ethernet port, the bridging facility is disabled for this port.
After completing the procedures just described, you can enter LIST BRIDGE to verify your configuration.
If you want to make changes to the configuration, see chapter Bridging Configuration on page 33 of this guide. After
you finish changing the configuration, you must restart the router for the new configuration to take effect.
In source routing, the data-frame-forwarding decision is based on routing information within the frame. Before for-
warding the frame, end stations have obtained the route to the destination station by route discovery. The source
station that originates the frame designates the route that the frame will travel by embedding a description of the
route in the RIF of the transmitted frame. A closer look at the various types of source routing bridge frames will help
to explain further how the bridge obtains and transmits this routing information.
Since source routing MAC frames contain routing information necessary for data communication over multi-ring en-
vironments, they differ slightly in the format for the typical Token Ring MAC frames. The presence of a 1 in the RII
within the source address field indicates that an RIF containing routing information follows the source address. Fig.
11 on page 14 provides a closer look at the format of the source address field of a source routing frame.
Bridge 13
3 Using Source Route Bridging (SRB) Teldat SA
When the RII in the source address field is set to 1, an RIF is present after the source address. The RIF is required
because it provides route information during source routing. It consists of a 2-octet routing control (RC) field and a
series of 2-octet route designator (RD) fields. Fig. 12 on page 14 provides a closer look at the format of the Routing
Information Field.
The following information describes each specific field found in the RIF:
• Routing Type (RT). Indicates by bit settings if the frame is to be forwarded through the network along a specific
route or along a route (or routes) that reaches all interconnected LANs.
Depending on the bit settings in this field the source routing frame can be identified as one of the following types:
All-Route explorer frames exist if the RT bits are set to 10x where x is a don’t
care bit. These frames are generated and routed along every non-repeating
route in the network (from source to destination). This results in as many
frames arriving at the destination end station as there are different routes from
the source end station. This frame type is used to find a remote station. The
forwarding bridges add routing designators to the frame.
A spanning tree explorer frame exists if the TR bits are set to 11x where x is a
don’t care bit. Only spanning tree bridges relay the frame from one network to
another. This means that the frame appears only once on every ring in the net-
work and therefore only once at the destination end station. A station initiating
the route discovery process may use this frame type. The bridge adds routing
14 Bridge
Teldat SA 3 Using Source Route Bridging (SRB)
designator fields to the frame. It can also be used for frames sent to stations
using a group address.
Specifically-routed frames exist if the first RT bit is set to 0. When this is the
case, the Route Designator (RD) fields containing specific destination address.
During route discovery phase, this type of frame is used as a response to ARE
frame. The user data are always carried in the SRF frame format.
• Length bits (LTH). Indicates the length (in octets) of the RI field.
• Direction bit (D). Indicates the direction the frame takes to traverse the connected networks. If this bit is set to 0,
the frame travels the connected networks in the order in which they are specified in the routing information field
(e.g. RD1 to RD2 to …. to RDn). If the direction bit is set to 1, the frame travels the networks in the reverse order.
• Largest Frame Bits (LF). Indicates the largest frame size of the INFO field that can be transmitted between two
communicating end stations on a specific route. The LF bits are meaningful only for STE and ARE frames. In an
SRF, the bridge ignores the LF bits and cannot alter them. A station originating an explorer frame sets the LF bits
to the maximum frame size it can handle. Forwarding bridges set the LF bits to the largest value that does not ex-
ceed the minimum of:
The destination station may further reduce the LF value to indicate its maxim-
um frame capacity.
LF bit encodings are made up of a 3-bit base encoding and a 3-bit extended
encoding (6 bits total). The SRT bridge contains an LF mode interpretation in-
dicator so the bridge can select either base or extended LF bits. When the LF
mode interpretations indicator is set to base mode, the bridge sets the LF bits
in explorer frames with the largest frame base values. When the LF mode in-
dicator is set to extended mode, the bridge sets the LF bits in explorer frames
with the largest frame extended values.
• Route Designator fields (RDn), indicates the specific route through the network according to the sequence of the
RD fields. Each RD field contains a unique network 12-bit ring number and 4-bit bridge number that differentiates
between two or more bridges when they connect the same two rings (parallel bridges). The last bridge number in
the routing information field has a null value (all zeros).
Bridge 15
3 Using Source Route Bridging (SRB) Teldat SA
A destination ring number is configured for each PVC. Some PVC’s that are not part of the active data path are
blocked in order to maintain the loop-free topology.
16 Bridge
Teldat SA 4 Using Source Route-Transparent Bridge (SR-TB)
Source routing is available in the SRT model, between adjacent source routing Token Rings. Source-route-only
bridges cannot coexist with SRT bridges that link Ethernet and Token Ring LANs. Because a Token Ring end node
needs to communicate with an Ethernet node, it must be configured to omit RIFs. But if the end node is configured to
omit RIFs, it cannot communicate through ordinary source routing bridges that require that RIF.
SR-TB achieves this functionality by converting frames from the transparent bridging domain to source routing
frames before forwarding them to the source routing domain (and vice versa). The bridge does this by maintaining a
database of end station addresses, each with its RIF in the source routing domain. It also conducts route discovery
on behalf of the end stations present in the transparent bridging domain. It uses route discovery to find the route to
the destination station in the source routing domain. It sends frames addressed to an unknown destination in the
Spanning Tree Explorer (STE) format.
After completing the procedures just described, you can enter LIST BRIDGE to display the current bridge configura-
tion. This lets you verify and check your configuration.
If you want to make changes to the configuration, see the chapter Bridging Configuration on page 33 of this guide for
more details. After you finish making the changes to the configuration, restart the router for the new configuration to
take effect.
Bridge 17
4 Using Source Route-Transparent Bridge (SR-TB) Teldat SA
• Source routing
• Transparent bridging
Fig. 14 on page 18 shows an example of these domains. With separate domains, each source routing domain has a
single-route broadcast topology set up for its bridges. Only bridges belonging to that source routing spanning tree are
designated to forward single-route broadcast frames. In this case, frames that carry the single-route broadcast indic-
ator are routed to every segment of the source routing domain. Only one copy of the frame reaches each segment,
since the source routing spanning tree does not allow multiple paths between any two stations in the domain.
On the transparent bridging side, SR-TB operates the same as any other transparent bridge. It keeps a table of ad-
dresses for stations it knows are transparent bridging stations. It observes the inter-bridge protocols necessary to
create and maintain the network spanning tree since more than one SR-TB joins different domains.
On the source routing bridging side, SR-TB combines the functions of a source routing bridge and a source routing
end station in a specific way. As a source routing end station, it maintains an association of destination addresses
and routing information. It communicates either as an end station for applications in the bridge itself (e.g. network
management) or as an intermediary for stations on the transparent bridging side.
SR-TB forwards a frame received from its transparent bridging station to the source routing side of the bridge only if
it does not find the frame’s destination address in the transparent bridging side address table. Frames transmitted by
the bridge’s source routing station carry the routing information associated with the bridge, if such information is
known and held by the bridge.
As a source routing bridge, SR-TB participates in the route discovery process and in the routing of frames already
carrying routing information. The route designator unique to SR-TB consists of the LAN number of the individual LAN
on its source routing side and its own individual bridge number.
It also maintains a single LAN number representing all of the LANs on the transparent bridging side. It treats each
case of received and forwarded frames differently as described in SR-TB Bridge Decision Table on page 18 .
SR-TB Bridge Decision Table
Type of Frame Received Action Taken by SR-TB
Non-routed frame received by the source routing Does not copy or forward frame carrying routing information.
station.
All-routes broadcast frame received by the Copies frame and sets A and C bits of the broadcast indicator in
source routing station. the repeated frame. If destination address is in the transparent
bridging table, forwards the frame without routing information on
the transparent bridging network. Otherwise, does not forward
18 Bridge
Teldat SA 4 Using Source Route-Transparent Bridge (SR-TB)
frame.
Single-route broadcast frame received by the Does not copy or forward the frame.
Source Routing station. Bridge is not designated
as a single-route broadcast bridge.
Single-route broadcast frame received by the Copies frame sets, A and C bits in the broadcast indicator, re-
Source Routing station. Bridge is designated as moves the routing information from the frame, and forwards modi-
single-route broadcast bridge. fied frame to transparent bridging side.
Adds its bridge number to the saved routing information field and
the LAN number for transparent bridging side.
If SR-TB is part of the route and appears between the LAN num-
ber for the source routing side and LAN number for transparent
bridge side, copies frame and sets A and C bits in the repeated
frame.
If SR-TB does not already have a permanent route for the source
address, saves a copy of the routing information, complements
D-bit, and stores saved routing information for the source address
of frame.
Frame received from the Transparent bridging To forward frame to the source routing side, first determines if it
side. has routing information associated with the destination address
carried in the frame.
If yes, adds routing information to the frame, sets the RII to 1, and
queues the frame for transmission on the source routing side.
The following sections provide specific examples of frame forwarding during SR-TB bridging. These examples as-
sume that SR-TB is designated as a single-route broadcast bridge. Fig. 15 on page 20 provides the following inform-
ation to accompany the situations described in each section:
Bridge 19
4 Using Source Route-Transparent Bridge (SR-TB) Teldat SA
When SR-TB receives a frame with a source address of end station A and destination address of end station B, it
puts end station A’s address into its transparent bridging side address table. This table contains the addresses of
stations known to be on the transparent bridging side of the bridge. This is normal behavior for transparent bridging.
If end station B’s address is in the transparent bridging side’s address table, SR-TB does not forward the frame. If
end station B’s address is not in the transparent bridging side’s address table and not in the source routing side’s ad-
dress table, SR-TB does not know its location. In this case, SR-TB forwards the frame on the source routing side as
a single-route broadcast with no request for route-explorer return. Any frame end station B sends (regardless of its
destination) causes its address to be added to the transparent bridging address table. This prevents future forward-
ing of frames addressed to end station B to the source routing side.
In this example, end station A’s address is treated the same as in the previous example. Since end station C’s ad-
dress is not in the transparent bridge address table, SR-TB forwards the frame on the source routing side.
The bridge then looks for end station C’s address in its source routing address table. This table contains all known
addresses and related routing information for stations on the source routing side of the bridge. If C’s address is in the
source routing table, the bridge forwards the frame using the routing information in the address table. If C’s address
is not in the source routing table (or if it appears but has null routing information), the bridge forwards the frame on
the source routing side as a single-route broadcast with no request for route-explorer return.
When end station C receives this frame, it enters end station A’s address in its source routing table together with the
reverse direction of the route built from the SR-TB bridge and marks it as a temporary entry. When end station C
later tries to send a frame to end station A, it uses this specific route, and because the route is marked as temporary,
sends it as a non-broadcast route with a request for route-explorer return.
When the returning frame arrives, SR-TB forwards it on the transparent bridge side without routing information but
puts the route to end station C into the source routing table as a temporary route. This further causes the network
management entity (SMT) to send a route-explorer frame with an all-routes broadcast setting back to end station C.
This lets end station C select the optimal routing for frames addressed to end station A, which SR-TB then puts into
its source routing table as a permanent route.
If the frame is sent as a non-broadcast and crosses over the segment to which the SR-TB bridge is attached, the
bridge scans the RII filed for the routing sequence (LAN X to Bridge Q to LAN Y). It cannot find the sequence and so
does not forward the frame.
If the frame is sent as a single-route broadcast, the bridge discards the frame if it already knows that the end station
D is on the source routing side. If it does not know that, it forwards the frame to the transparent bridging side (minus
the routing information), and adds Q to Y to the routing information. Finally, it saves the routing information for end
station C as a temporary route in the source routing table with a non-broadcast indicator and the direction bit comple-
mented.
If the frame is sent as an all-routes broadcast, SR-TB discards the frame (because end station D’s address is not
present in the transparent bridging address table) and makes sure that end station C’s address is in the source rout-
ing table.
20 Bridge
Teldat SA 4 Using Source Route-Transparent Bridge (SR-TB)
If the frame is sent non-broadcast, SR-TB scans the RII field for the routing sequence (X to Q to Y). When it finds it, it
forwards the frame to the transparent bridging side. It also stores the routing information for end station C.
If the frame is sent as a single-route broadcast, SR-TB forwards it (minus the routing information) to the transparent
bridging side and adds Q to Y to the routing information. It also sets the non-broadcast indicator, complements the
direction bit, and enters the routing information for C’s address in its source routing table. If a temporary entry for end
station C already exists in the source routing table, SR-TB updates the routing information.
If the frame is sent as an all-routes broadcast, SR-TB discards it, but makes sure that end station C’s address is in
the source routing table.
Bridge 21
5 Miscellaneous Bridge Features Teldat SA
Route/Bridge Decision Table on page 22 shows how the destination address field determines “Bridge or Route?”
question.
Route/Bridge Decision Table
If destination MAC Address- Action the Bridge Takes
ing Contains:
Interface Address Passes the frame to the configured protocol that routes the frame.
Multicast or Broadcast Address If the frame belongs to a configured protocol it is passed to the protocol forwarder
to be routed. Frame bridging is executed if the bridge is enabled for the protocol. If
the frame does not pertain to a configured protocol, bridges the frame.
Other Unicast If the frame belongs to a configured protocol, discards the frame or frame bridging
is executed if the bridge is enabled for the protocol. If the frame does not pertain
to a configured protocol, bridges the frame.
You can enable or disable the processing of these frames on a per port basis. If enabled, the bridge learns the
source station’s behavior and generates the correct frame format. But if there is no information about the station’s
behavior (multicast or unknown stations). The bridge produces duplicate frames, one in 802.3 and 802.2 format, and
the other with the IBM-RT header.
In the spanning tree algorithm used by Transparent Bridges (TB), Hello Bridge Protocol Data Units (BPDUs) and To-
pology Change Notification (TCN) BPDUs are sent in a transparent frame to well-known group addresses of all parti-
cipating media (Token Ring, Ethernet, FDDI, etc.). Tables are built from this exchanged information and a loop free
topology is calculated.
SRB uses transparent frames to determine a loop free topology. The algorithm sends Hello BPDUs in a transparent
frame to a well-known functional address. SRB bridges do not use TCN BDPUs. The port state setting created as a
result of this spanning tree algorithm does not affect All Route Explorer (ARE) Frame and Specifically Routed Frame
(SRF) traffic.
In bridging configuration using IBM 8209 bridges, a different spanning tree method is used to detect parallel 8209
bridges. This algorithm uses Hello BPDUs sent as STE frames to IEEE 802.1D group address on the Token Ring.
On the Ethernet, Hello BPDUs are sent as transparent frames to the same group address. This method allows 8209s
to build spanning trees with transparent bridges and other IBM 8209 bridges. It does not participate in the SRB span-
ning tree protocol however, and Hello BPDUs sent by SRBs are filtered. As such, there is no way to prevent the 8209
from becoming the root bridge. If the 8209 bridge is selected as the root, then traffic between two STB domains may
22 Bridge
Teldat SA 5 Miscellaneous Bridge Features
IBM 8209 bridges filter such frames but this is allowed as it is a two-port bridge with the other port being a transpar-
ent bridge port.
• ASRT Bridge - IEEE 802.1D Spanning Tree protocol is used to make a tree with STBs and SRT bridges. 8209-like
BPDUs are also generated on all SRB interfaces to make tree with SR-TB and IBM 8209 bridges.
These Hello BPDUs are processed as soon as they are received. This causes two Hello BPDUs to be generated and
received on all SR and STB interfaces. Since both Hello BPDUs carry the same information, there is no conflict of
port information. This lets the ASRT bridge create a spanning tree with IBM 8209 and SR-TB bridges along with oth-
er STBs bridges.
• If this is configured in a port using the SET SPANNING-TREE PORT <PORT> BPDU-FILTER ENABLE com-
mand, the port doesn’t transmit or receive BPDUs.
Note
Filtering BPDUs in a port is equivalent to disabling the spanning tree in the port and could provoke
loops establishing in the network.
• If this is globally configured through the SET SPANNING-TREE BPDU-FILTER DEFAULT command, it is enabled
in all the ports which then, as they don’t have a specific BPDU filtering configuration associated, behave as edge
ports i.e. ports directly connected to a station. The rapid spanning tree states machine detects whether a port is an
edge port or not. If BPDU filtering is enabled globally, a port in an edge state doesn’t transmit BPDUs. When the
port receives a BPDU it passes to a no edge state and stops BPDU filtering. From that point the port can transmit
and receive BPDUs.
If a port has BPDU filtering enabled or disabled, it ignores the global configuration. In cases where the BPDU filtering
configuration for a port is not specified (default configuration), the global configuration and the EdgePort state vari-
able is used to determine if BPDU filtering should be executed or not. The following table describes the BPDU filter-
ing operation in a port depending on the configuration.
Configuration per Global configuration EdgePort operating BPDU filtering
port value
Disable - - Disable
Enable - Enable
-
Default Disable -
Disable
Default Enable EdgePort Enable(If the port receives a BPDU, it
passes to a Non Edge Port and BPDU filter-
ing is disabled)
Bridge 23
5 Miscellaneous Bridge Features Teldat SA
If BPDU guard is configured in a port and a BPDU is received, this is considered an erroneous situation and forces
the port to pass to a disabled state due to error detection. For further information on this state and how to recoup an
interface in this state, please see manual manual Teldat-Dm794-I Interfaces disabled by error detection .
In the same way as BPDU filtering, the BPDU guard can be configured globally or per port.
• If this is configured in a port using the SET SPANNING-TREE PORT <PORT> BPDU-GUARD ENABLE com-
mand, the port cannot receive BPDUs. If it receives a BPDU, the port passes to a disabled due to error state and
stops transmitting and receiving frames.
• If this is globally configured through the SET SPANNING-TREE BPDU-GUARD DEFAULT command, it is enabled
in all the ports which then, as they don’t have a specific BPDU guard configuration associated, behave as edge
ports i.e. ports directly connected to a station. The rapid spanning tree states machine detects whether a port is an
edge port or not. If BPDU guard is enabled globally and a port in an edge state receives a BPDU it passes to a
disabled state due to error and stops sending and transmitting frames.
If a port has BPDU guard enabled or disabled, it ignores the global configuration. In cases where the BPDU guard
configuration for a port is not specified (default configuration), the global configuration and the EdgePort state vari-
able is used to determine if BPDU guard should be executed or not. The following table describes the BPDU guard
operation in a port depending on the configuration.
Configuration per port Global configuration EdgePort operating value BPDU Guard
Disable - - Disable
Enable - - Enable
Default Disable Disable
-
Default Enable EdgePort Enable
Default Enable Non EdgePort Disable
24 Bridge
Teldat SA 6 Using IP Tunneling
The IP tunnel appears to the bridge as one of the bridge ports using IP as a means of input/output device. On the
tunnel bridge port you can configure STB, or SRB bridge behavior.
In SRB configuration, IP tunnel helps overcome the usual 7-hop distance limit encountered in source routing config-
urations. It also lets you connect source-routing end stations across non-source-routing media, such as Ethernet net-
works.
The bridging tunnel also reduces the large amounts of overhead that source routing causes in wide area networks
(WANs).
Finally, it reduces source-routing’s sensitivity to WAN faults and failures (if a path fails, all systems must restart their
transmissions).
End stations see this path or tunnel, as a single hop, regardless of the complexity of the internetwork. Fig. 16 on
page 25 shows an example of an IP internetwork using the tunnel feature in its configuration.
Fig. 16: End Stations See Routing Across Complex IP Internet as One Hop
The bridges participating in tunneling treat the IP Internet as one of the bridge segment. When the packet reaches
the destination interface, the TCP/IP headers are automatically removed and the inner packet proceeds as a stand-
ard source-routing packet.
• Least-cost Routing. OSPF accesses the fastest path (tunnel) with the fewest delays, allowing network administrat-
ors to distribute traffic over the least expensive route.
• Dynamic Routing. OSPF looks for the least-cost path, detects failures, and reroutes traffic with low overhead.
With OSPF, tunnels automatically manage paths inside the internetwork. If a line or bridge fails along the path then
the tunnel bridge automatically reroutes traffic along a new path. If a path is restored, the tunnel automatically up-
Bridge 25
6 Using IP Tunneling Teldat SA
dates to the best path. This rerouting is completely transparent to the end stations.
26 Bridge
Teldat SA 7 Multiple Bridge Entities
Each virtual bridge instance is assigned some determined interfaces or ports over which the bridge is executed. An
interface cannot form part of various bridge instances.
Each virtual bridge instance is identified with a name. The virtual bridge instance identified with 0 is known as the
‘main bridge’. You can define up to a total of eight virtual bridge instances in a device.
A new interface is automatically created in the device for each virtual bridge instance when the virtual bridge is en-
abled. From version 11.01.00, the interface has to be manually created, which enables the virtual bridge automatic-
ally. This is known as a bvi (“Bridge Virtual Interface”). This represents the group of interfaces included in the bridge.
Bvi interfaces cannot be added as bridge ports.
7.2 Considerations
There are various considerations to take into account when configuring various bridge instances:
Bridge 27
8 Integrated Routing and Bridging Teldat SA
IRB is disabled by default. The IRB command enables the “integrated routing and bridging” in a determined bridge
instance. From version 11.01.00 the command IRB is no longer necessary, this functionality will be automatically ac-
tivated when a routing protocol is configured using the command ROUTE-PROTOCOL .
A bridge configured without IRB executes bridging on received packets but does not forward them. This behavior
changes when an IPv4 or IPv6 address is configured over some of the interfaces participating in the bridge, so in
such circumstances, the protocol packets that the said configured address pertains to (IPv4 and/or IPv6) are routed
but bridging is not executed.
If you configure IRB, the processing on each packet corresponding to a determined protocol depends on the bridge
configuration for the said protocol. By default, a protocol is configured to be bridged and not routed. Through the
ROUTE-PROTOCOL command, you can activate routing for a determined protocol over the bridge.
Additionally, you need to bear in mind that it’s possible to define filters which affect the protocol. Configuration for the
said protocols can make a protocol be excluded both from the routing as well as from bridging so the packets corres-
ponding to the said protocol, which reach the device through one of the bridge interfaces, are simply dropped.
A BVI interface is an additional interface in the device that represents a group of interfaces included in a bridge. You
can assign IPv4 and/or IPv6 addresses to the BVI interface (if the bridge has IRB enabled) and can be used in the
configuration of any of the protocols in the group of IPv4 and IPv6 protocols.
Each bridge has a BVI interface associated, which is automatically created on enabling the corresponding virtual
bridge. The bvi0 interface corresponds to the main bridge instance, the bvi1 interface to the bridge virtual 1 entity and
so on. From version 11.01.00 the BVI interface has to be manually created (command ADD DEVICE BVI <id>), and
the associated bridge is automatically enabled.
Fig. 18 on page 29 shows a diagram represents a group of decisions which are taken when a determined protocol
packet is received over one of the interfaces pertaining to a bridge.
So that a packet is delivered to the corresponding protocol forwarder the said packet must be routable. This condition
can be checked by three things:
c) The packet has a destination MAC address that the bridge has registered as pertaining to the device itself.
The key to bridging and routing integration lies in the fact that the BVI has appropriate addresses both at layer 2
(MAC address) as well as at layer 3 (in our case, IP address).
28 Bridge
Teldat SA 8 Integrated Routing and Bridging
The said MAC address remains registered in the bridging tables as own addresses so subsequently packets
destined to this address can be identified as routable.
When a packet is routed through a BVI to be transmitted, the bridge selects the output interface based on the packet
destination MAC address. This address must appear in the registered MAC addressing table of one of the bridge
ports, as it must be the result of a previous ARP.
Fig. 18: Flow chart showing the processing of a packet with IRB enabled
Bridge 29
8 Integrated Routing and Bridging Teldat SA
(1) If none of the bridge’s participating interfaces has IP (IPv4 or IPv6) addresses, the IP protocol from which there
are no addresses (IPv4 or IPv6) can execute bridging but not routing.
(2) If one of the bridge’s participating interfaces has an IP (IPv4 or IPv6) address, the IP protocol which there are
addresses (IPv4 or IPv6) can execute routing but not bridging.
(3) You cannot add IP (IPv4 or IPv6) addresses to the BVI associated to the bridge.
In cases where integrated bridging and routing is enabled, the following is fulfilled:
(1) Protocol routing is disabled by default (this can be enabled through the ROUTE-PROTOCOL command).
This does not apply to versions from 11.01.00, since integrated bridging and routing is enabled only when a
routing protocol is configured.
(2) Protocol bridging is enabled by default (you can disable this through the NO BRIDGE-PROTOCOL com-
mand).
(3) You can add IP (IPv4 or IPv6) addresses to the BVI associated to the bridge.
From version 11.01.00, integrated routing and bridging is enabled automatically when a protocol is configured using
this command.
The only protocols that are currently configurable are the IPv4 and IPv6 protocols.
To enable protocol bridging, use the command BRIDGE-PROTOCOL <protocolName>. By default all protocols are
bridged.
The only protocols that are currently configurable are the IPv4 and IPv6 protocols.
The method to classify traffic in bridging ports is based on layer 2 policies such as the MAC filtering feature. However
you can configure the BVI so that routed traffic is classified before transmitting it through the bridge. In this way, you
are able to apply the layer 3 policies (e.g. IP addresses of the IP header ToS field) to packets routed through the
bridging port where Bandwidth Reservation is enabled.
To create a BVI subinterface, use the ADD DEVICE command found in the general configuration menu.
Syntax:
Example:
30 Bridge
Teldat SA 8 Integrated Routing and Bridging
Once created, you can access the subinterface configuration through the NETWORK command.
Example:
Config>net bvi0.1
-- BVI Subinterface Configuration --
bvi0.1 config>
From the BVI subinterface configuration menu, you can configure the encapsulated VLAN you want to use through
the ENCAPSULATION DOT1Q command.
Example:
The aim of Bridge Spoofing is to add a backup service in a scenario similar to the following figure:
In this scenario, various devices connected on the LAN access Internet through the EAR access router. A case
arises where a second operator wants to provide backup capability in cases where the EAR router drops, but has to
do this without modifying the said router’s configuration or the configuration of the devices on the LAN. To do this,
the new operator inserts a BR backup router between the LAN and the EAR router, as shown in the next figure:
Bridge 31
8 Integrated Routing and Bridging Teldat SA
This new BR router connects to the LAN through an Ethernet port, and to the EAR router through another Ethernet
port, so the EAR communicates with the LAN establishing a Transparent Bridging (STB), as explained in chapter Us-
ing Transparent Bridging (STB) on page 8. Thus you can insert the new BR backup router without modifying the
configuration of any of the other devices. However, in order to provide backup, you need to configure the BR router
so it processes all the outgoing traffic and sends it through the EAR or over an alternative link (the example figure
shows a UMTS link) depending on the network conditions. This enables IRB and the Bridge Spoofing feature in the
BVI (sub)interface. Consequently all the outgoing traffic is redirected to the BR router and this transmits it over the
most convenient path complying with the configured routing criteria.
If you want to guarantee the service even in cases where the BR router breaks down, you can use a bypass device
such as the Atlas 50 Bypass, which has a security mechanism that physically joins the two Ethernet ports (the LAN
and EAR ports) when faced with situations where there is a power failure.
The command enabling the Bridge Spoofing feature in the BVI (sub)interface is spoof ip-address <EAR router IP
address>. Through this command, all traffic destined to be routed by the EAR is redirected to the device itself (BVI
(sub)interface) instead of being bridged.
32 Bridge
Teldat SA 9 Bridging Configuration
From the ASRT menu, you can configure the main BRIDGE VIRTUAL instance, whose identifier is 0. Here you can
create new BRIDGE VIRTUAL instances, as well as modify its configuration. The prompt appearing when you ac-
cess a BRIDGE VIRTUAL instance which is different from the main one is VBDG.
The main bridge instance (BRIDGE VIRTUAL 0) is always created. If you wish to manage an additional instance, you
need to create it.
Basically, the configuration options are the same as for a main bridge instance and the rest of the bridging instances
with the exception of options relative to BAN and DLS, which are only operative in the main instance.
9.1.1 Accessing the main bridge instance configuration menu (BRIDGE VIRTUAL
0)
In order to access the main bridge instance configuration menu, you need to execute the PROTOCOL ASRT com-
mand from the main configuration menu.
Config>protocol asrt
To access the NetBIOS configuration commands, enter NETBIOS from the bridge configuration menu.
ASRT config>netbios
-- NetBIOS Support User Configuration --
NetBIOS config>
9.1.2 Accessing the bridge virtual instance configuration menu (BRIDGE VIRTU-
AL)
A virtual bridge consists of an instance independent to bridge where you can associate device interfaces. Each
bridge is totally independent of the others; one device interface cannot be shared by different bridge instances. The
virtual bridge feature allows you to divide the device into various independent bridges, although physically, you only
have one device.
To access the configuration menu for a bridge virtual instance, you need to execute the VIRTUAL-BRIDGE com-
mand, followed by the bridge virtual identifier from the main instance configuration menu (ASRT menu).
Example:
ASRT config>virtual-bridge 2
-- Virtual ASRT Bridge user configuration --
VBDG config>
Note
The configuration options described for the main instance are the same for the virtual instances, with
the exception of BAN and DLS options, which are only operative in the main instance. For this reason,
in this manual, all the examples given use the main instance configuration menu. The options that are
not compatible with bridge virtual instances are indicated throughout the manual.
Please bear in mind that when you are configured the main instance, the following prompt appears:
ASRT config>
Bridge 33
9 Bridging Configuration Teldat SA
Note
VBDG config>
Note
In the submenus depending on a virtual instance, you also prefix the VBDG tag.
9.2.1 ? (HELP)
Displays the commands available from the current menu. After a specific command, this displays the available op-
tions.
Syntax:
ASRT config>?
Example:
ASRT config>?
address Add unique station address entries
ban Access to the BAN configuration menu
bridge Enable bridging functionality
bridge-number Set bridge number for source routing
bridge-protocol Enable protocol for bridging
dls DLSw over the bridge
duplicate Creation of duplicate frames in mixed environments
ethertype-ibmrt-pc Translation of SNA frames to Ethernet 2 format
fa-ga-mapping Group address to functional address (and vice
versa)
fast-irb Enable integrated fast routing and bridging feature
ibm8209-spanning-tree Participate in spanning tree protocols with IBM
8209
irb Enable integrated routing and bridging feature
list List configuration
mapping Functional address to group address mapping
name-caching Access to the Name Caching configuration menu
netbios Access to the Netbios configuration menu
no Negate a command or set its defaults
port Add a LAN/WAN port to the bridging configuration
protocol-filter Filter packets based on their protocol type
route-protocol Enable protocol for routing
set Configure several bridge parameters
source-routing Source routing on a given port
spanning-tree-explorer Port propagates spanning tree explorer frames
sr-tb-conversion Source-routing frame to transparent and vice versa
stp STP participation
transparent Transparent bridging functionality on the given
port
ub-encapsulation Ungermann-Bass OUI encapsulation for XNS frames
virtual-bridge Create/enter a Virtual Bridge entity configuration
menu
virtual-segment Set bridge virtual segment number
34 Bridge
Teldat SA 9 Bridging Configuration
9.2.2 ADDRESS
Adds unique station address entries to the permanent filtering database.
Permanent database entries are not destroyed by the power off/on process and are immune to the aging settings.
Dynamic entries cannot replace permanent entries.
You need to specify the MAC address of the desired entry. It can be an individual, multicast, or broadcast address.
You can also specify the output forwarding port map for each input port.
Syntax:
9.2.2.1 DEFAULT
Creates a new permanent entry in the filtering database. It causes filtering of any frames that contain this address as
a destination address, no matter which port it came from.
Syntax:
Example:
Creating a new permanent entry to filter all packets with destination MAC address 00-A0-26-00-AC-58.
9.2.2.2 SOURCE-ADDRESS-FILT
Allows port-specific address filtering. Discards frames received with source addresses matching address entries in
the filtering database with source address filtering enabled. This lets a network manager isolate an end station by not
allowing traffic to be bridged.
Syntax:
Example:
Creating a new permanent entry to filter all packets generated by the station with MAC address 00-A0-26-00-AC-58.
9.2.2.3 NO
Bridge 35
9 Bridging Configuration Teldat SA
9.2.2.3.1 SOURCE-ADDRESS-FILT
Syntax:
Example:
Permits packet bridging for previously filtered packets coming from address 00-A0-26-AC-5.
9.2.2.4 BRIDGE
This option permits you to specify which ports filtering is executed through for a permanent filtering entry. In this way,
it’s possible to define ports that allow you to execute frame bridging with a determined destination address. To do
this you define port mapping indicating for each input port which output ports are permitted to execute frame
bridging. The different available suboptions are numerated further on in this section.
The following are examples of how this is done according to the port map:
• If a frame is received on port 1 and the port map indicates 1 (for port 1), the frame is filtered.
• If the same frame is received on port 2 and the port map indicates 1 (for port 1), the frame is forwarded to port 1.
• If a frame is received on port 1 and the matching address entry’s port map indicates 1, 2, or 3, the frame is forwar-
ded to ports 2 and 3.
• If the port map indicates no port (NONE/DAF) then the frame is filtered. This is known as destination address filter-
ing (DAF).
If no address entry is found to match the received frame, it is forwarded to all the forwarding ports (except the source
port).
It’s only possible to introduce a bridge option by address. If you wish to modify the configuration selected for an ad-
dress, you need to first eliminate the filtering entry and then re-create it with the required option.
Syntax:
9.2.2.4.1 ALL-SAME-PORT
Creates, for a MAC address, one output port map for all input ports rather than allowing for mapping only to specific
ports.
Syntax:
Example:
9.2.2.4.2 SAME-MAPPING
Creates, for a MAC address, port mapping that includes, for an output port, all the input ports. Thus, when a frame
with this address is received, independently of which input port it was received through, it is forwarded to all output
forwarding ports specified through this option except for the input port.
For the same address, you can introduce this command as many times as you consider necessary to map the output
ports.
Syntax:
36 Bridge
Teldat SA 9 Bridging Configuration
out-port Bridge output port. This can take values between 1 and 254.
Example:
Creates a filter entry for MAC address 00-00-00-33-44-5 so traffic destined for this address is sent through ports 1
and 2 independently of the input port.
9.2.2.4.3 DIFERENT-MAPPING
This is the most generic option to create port-mapping associated to a MAC address. This permits you, for a MAC
address, to indicate for each input port, which ports can be used as output ports.
For the same address, you can enter this command as many times as necessary in order to map the required ports.
Syntax:
Example:
Creates a filter entry for MAC address 00-00-00-33-44-55, so traffic destined for this address is sent through ports 1
and 2 in cases where it enters through port 3 and through port 3 in cases where it enters through port 1 or 2.
The following sections present examples of how to use the ADDRESS command to manage address table entries.
Example 1:
After adding the address, verify its status by entering LIST RANGE.
Syntax:
The value for the beginning and the end of the index is included in the interval [1..65535].
The example below show that no port map exists for that entry (in bold) and that Destination Address Filtering (DAF)
is on.
Bridge 37
9 Bridging Configuration Teldat SA
Example 2:
Creating separate output port maps for an address entry that has more than one input port.
After adding the address, verify its status by entering LIST RANGE. The example below shows an entry (in bold) that
has ports 1 and 2 as input ports and has separate port maps for both input ports. Source Address Filtering (SAF) is
also enabled.
ASRT config>
Example 3:
Creating a single output port map for all input ports associated with an address entry
38 Bridge
Teldat SA 9 Bridging Configuration
After adding the address, verify its status by entering LIST RANGE. The example below shows an entry (in bold) that
has a single port map for all input ports. Source Address Filtering (SAF) is also enabled.
ASRT config>
9.2.3 BAN
This accesses the BAN parameter configuration menu. For further information on how to configure BAN, please see
manual manual Teldat-Dm 716-I DLSw Protocol .
This menu is only accessible through the ASRT menu, i.e. from the menu associated to the main bridge entity. BAN
is not configurable in the VBDG menus associated to other virtual bridge entities.
Syntax:
ASRT config>ban
Example:
ASRT config>ban
9.2.4 BRIDGE
Enables transparent bridging.
Example:
ASRT config>bridge
ASRT config>
Command history:
Release Modification
11.01.00 This command is obsolete in version 11.01.00. To enable transparent bridging the com-
mand ADD DEVICE BVIbvi# must be used.
Bridge 39
9 Bridging Configuration Teldat SA
9.2.5 BRIDGE-NUMBER
Changes the bridge number used by the bridge in source routing.
Syntax:
Example:
ASRT config>bridge-number ?
<hex 1..f> Bridge number
ASRT config>bridge-number A
9.2.6 BRIDGE-PROTOCOL
Enables bridge for a protocol. By default bridge is enabled, this command is used to eliminate the configuration
achieved through the NO BRIDGE-PROTOCOL command, used to disable the bridge for a protocol.
Syntax:
ASRT config>bridge-protocol ?
ip IP protocol group
ipv6 IPv6 protocol group
ASRT config>
Example:
The command bridge-protocol ip enables bridge for packets from the IPv4 protocols group.
ASRT config>bridge-protocol ip
ASRT config>
The bridge-protocol ipv6 command enables the packets bridge for the IPv6 protocols group.
9.2.7 DLS
Enables DLSw over the bridge. The router running DLSw looks like a bridge to the end stations.
This command is only accessible through the ASRT menu, i.e. from the menu associated to the main bridge entity.
DLSw is not configurable in the VBDG menus associated to other virtual bridge entities.
Example:
ASRT config>dls
ASRT config>
9.2.8 DUPLICATE
Enables the generation of duplicate STE (Spanning Tree Explorer) or TSF (Transparent Spanning Frames) frames.
Duplicate frame generation is enabled by default; this command is used to eliminate the configuration achieved
through the NO DUPLICATE command. The DUPLICATE command must be followed by the frame type identifier
(TSF or STE) and the port this affects.
Activates the creation of duplicate frames in mixed bridging environments. SR-TB on an 802.5 interface (with source-
routing and transparent bridging enabled), may create inconsistencies when bridging frames to an unknown or mul-
ticast destination. The bridge does not know whether the destination is in a source-routing (only) or transparent
bridge.
To remedy this, the bridge sends out duplicates of these frames (by default). One frame has source-routing fields (a
spanning tree explorer RIF) and the other is formatted for transparent bridging (no RIF).
Entering DUPLICATE STE tells the bridge to send spanning tree explorer frames created for the source-routing en-
vironment. Entering DUPLICATE TSF tells the bridge to send out transparent spanning frames for the transparent
bridging environment. In both cases, the bridge normally sends both types of frames. Disabling transparent bridging
40 Bridge
Teldat SA 9 Bridging Configuration
Syntax:
Example:
Example:
9.2.9 ETHERTYPE-IBMRT-PC
Enables translation of SNA frames to Ethernet 2 format used by IBM RTs running OS/2/EE. See section IBM RT
Feature for SNA Traffic on page 22 in chapter Miscellaneous Bridge Features on page 22 for more details.
Syntax:
Example:
ASRT config>ethertype-ibmrt-pc 1
ASRT config>
9.2.10 FA-GA-MAPPING
Enables assigning of group addresses to functional addresses and vice versa. This functionality is necessary to for-
ward frames between Token Ring and other media (except serial line). In Token Rings, functional addresses are
more popular even though they are locally assigned group addresses due to hardware restrictions. Other media
commonly use group addresses. Under normal circumstances mapping group addresses to functional address is in-
evitable. Mapping is enabled by default if you have added mapping addresses.
Example:
ASRT config>fa-ga-mapping
ASRT config>
9.2.11 FAST-IRB
Enables the fast “integrated routing and bridge” (IRB) functionality. The IRB functionality differs from the basic where
some functional bridge blocks deactivate in cases where the network topology analysis (STP) determines that only
one of the bridge ports is in a “Forwarding” state. This produces better device performance regarding switch capa-
city.
For further information on IRB, please see chapter Integrated Routing and Bridging on page 28 in this manual.
Syntax:
ASRT config>fast-irb
Command history:
Release Modification
11.01.00 This command is obsolete in version 11.01.00. The command ROUTE-PROTOCOL auto-
matically enables the fast IRB functionality.
Bridge 41
9 Bridging Configuration Teldat SA
9.2.12 IBM8209_SPANNING_TREE
Allows bridges to participate in spanning tree protocols with IBM 8209 bridges.
Example:
ASRT config>ibm8209-spanning-tree
ASRT config>
9.2.13 IRB
Enables the “integrated routing and bridging” feature. For further information, please see chapter Integrated Routing
and Bridging on page 28 in this manual.
Syntax:
ASRT config>irb
Command history:
Release Modification
11.01.00 This command is obsolete in version 11.01.00. The command ROUTE-PROTOCOL auto-
matically enables the fast IRB functionality, which is compatible with the “integrated rout-
ing and bridging” feature.
9.2.14 LIST
Displays information about the complete bridge configuration or about selected configuration parameters.
Syntax:
ASRT config>list ?
address Reads an address entry from the permanent database
bridge Lists all general information regarding the bridge
filtering Displays the parameters associated to the bridge filter
mapping Lists specific address mapping for given protocol
permanent Displays the number of entries in the bridge's database
port Displays port information related to ports already configured
prot-filter Reads a current list of the filter protocol types
range Reads a range of address entries from the permanent database
spanning-tree Bridge information related to the spanning tree protocol
virtual-bridge Virtual Bridge entities
Syntax:
Example:
Example:
42 Bridge
Teldat SA 9 Bridging Configuration
Example:
Bridge 43
9 Bridging Configuration Teldat SA
+----------------------------------------+
-------------------| PORT INFORMATION |-------------------
+----------------------------------------+
Number of ports added: 2
Port: 1 Interface: ethernet0/0 Behavior: STB & SRB STP: Enabled
ASRT config>
Example:
44 Bridge
Teldat SA 9 Bridging Configuration
Syntax:
Example:
ASRT config>
Example:
ASRT config>
Example:
ASRT config>
Example:
Displays port information related to ports already configured. If a port number is not specified the information on all
ports is displayed.
Example:
Bridge 45
9 Bridging Configuration Teldat SA
Note
If IBM RT-PC Ethertype processing is enabled, they appear on this display. If it is not enabled, their
status does not appear.
Displays the configured protocol filters. If you do not specify a port number, the information on all of the ports is dis-
played.
Example:
46 Bridge
Teldat SA 9 Bridging Configuration
Port Map Ports where protocol filtering is applied. This field appears when you use the LIST
PROT-FILTER command without specifying a port.
Displays a range of address entries from the permanent database. You can use the LIST PERMANENT command to
determine the number of entries in the database.
Syntax:
Example:
ASRT config>
Example:
Bridge 47
9 Bridging Configuration Teldat SA
TxHoldCount Maximum number of BPDUs that can be sent through a port in one second.
Protocol Version Spanning Tree protocol version which is currently running in the bridge. This can
be “STP compatibility” if it forces a version of Spanning Tree which is compatible
with an old version of Spanning Tree protocol, or “RSTP normal operation” if it is
running Rapid Spanning Tree protocol.
Lists the virtual bridge instances that are in the device, as well as the ports associated to each of them.
This command is only available in the main bridge instance configuration menu (ASRT menu).
Example:
9.2.15 MAPPING
Adds a specific functional address to group address mapping for a protocol identifier. Converts address mapping
only on destination addresses crossing Token Ring to Ethernet or vice versa.
Note: For every Ethertype mapped value, add the corresponding SNAP-type value. This is necessary for bidirectional
mapping.
Syntax:
The most commonly used values for DECnet group address-to-functional address mapping are the following:
Ethertype Group Address Functional Address
6002 ab-00-00-02-00-00 C0:00:20:00:00:00
ab-00-00-03-00-00 C0:00:10:00:00:00
6003
6003 ab-00-00-00-04-00 C0:00:08:00:00:00
SNAP Group Address Functional Address
00-00-00-6002 ab-00-00-02-00-00 C0:00:20:00:00:00
00-00-00-6003 ab-00-00-03-00-00 C0:00:10:00:00:00
00-00-00-6003 ab-00-00-00-04-00 C0:00:08:00:00:00
Example 1:
Example 2:
48 Bridge
Teldat SA 9 Bridging Configuration
Example 3:
9.2.16 NAME-CACHING
Accesses the Name Caching facility configuration menu and the duplicate frame filtering for NetBIOS.
Syntax:
SRT config>name-caching
The name cache feature permits you to considerable reduce the number of Name-Query frames that are bridged.
NetBIOS uses 16 character names to identify the devices. The first step in data transfer is for the client to obtain a
physical address from the server name. To do this, the client sends a Spanning Tree explorer frame known as
Name-Query. The server responds with a Name-Query-Response which contains its MAC address and the route to
reach it.
With the name cache, the bridge maintains a database of names and routes. Each time a Name-Query-Response
frame is received, the MAC address and route are extracted and stored in the database.
Consequently, when the bridge receives a Name-Query frame, it checks if the queried name is in its database. If it is,
it converts the STE frame to a SRF frame. The entries in the database timeout complying with a configurable timer.
The process carried out by the cache when it receives a Name-Query frame is as follows:
(1) It searches the database for the name being queried.
(2) If the name is not found in the database, the frame is sent as is.
(3) If an entry associated to the name, indicating that a response has been received, is found, the time interval is
updated and the frame is sent converting it into an SRF using the information stored in the entry.
(4) If a Name-Query-Response has not been received from the server within the required time, the entry is invalid-
ated and the frame is sent as is. (i.e. as an STE frame).
The process carried out by the cache when it receives a Name-Query-Response frame is as follows:
(1) If there is an entry in the database for this name, the received information and the time of the last response is
updated indicating a response has been received.
(2) If there isn’t an entry in the database for this name, it is created with the received information.
Moreover, the names cache permits duplicate frame filtering. The Name-Query, Add-Name and Add-Group-Name
frames are sent up to six times. The duplicated frame filtering feature permits specifying that an instance bridging is
only executed for each type of frame in the time specified by the user.
The different commands available in the NetBIOS name cache configuration menu are detailed below.
Command Function
? (HELP) Displays all the configuration commands, or lists options for specific commands.
DISABLE Disables Name-caching facility or duplicate frame filtering.
ENABLE Enables Name-caching facility or duplicate frame filtering.
LIST Displays the currently implemented Name-caching configurations.
PORT Selects the port for configuring purposes.
TIMER Sets the different timers used in the name cache and the duplicated frame filtering.
EXIT Exits the Name-caching and duplicated frame filtering configuration menu.
9.2.16.1 ? (HELP)
Use the ? (HELP) command to list the available commands. If you enter this after a command, you can view the op-
tions.
Example:
Bridge 49
9 Bridging Configuration Teldat SA
9.2.16.2 DISABLE
Syntax:
Example:
Example:
9.2.16.3 ENABLE
Syntax:
Enables duplicate frame filtering. A timer is used to ensure that bridging is only carried out on an instance of each of
the Name-Query, Add-Name and Add-Group-Name frames in the specified period of time.
Example:
Example:
9.2.16.4 LIST
Displays the current configuration associated to the name cache and the duplicated frame filtering.
50 Bridge
Teldat SA 9 Bridging Configuration
Example:
9.2.16.5 PORT
Accesses the name cache and the duplicated frame filtering for a determined port configuration submenu.
Example:
Syntax:
The meaning of these commands and their options is the same as in the global menu except the parameters refer to
a determined port instead of being global parameters.
If, for example, you wanted to disable duplicated frame filtering in port 3, you need to execute the following com-
mands from the global configuration menu.
9.2.16.6 TIMER
Configures the different timers used in the names cache and duplicated name filtering.
Syntax:
Sets the time within which duplicate frames are filtered. The default setting is 7 seconds.
Syntax:
Example:
Bridge 51
9 Bridging Configuration Teldat SA
Sets the entry idle timer. If a client and server do not reference the entry’s name within this time interval set on this
timer, the entry is removed. The default setting is 900 seconds.
Syntax:
Example:
Sets the server timer. If the server does not respond to a Name-Query within the set time, the entry’s RIF and MAC
information is made invalid. The default setting is 3 seconds.
Syntax:
Example:
9.2.16.7 EXIT
Exits the names cache and frame duplication configuration menu and returns to the bridge configuration menu.
Example:
9.2.17 NETBIOS
Accesses the NetBIOS configuration menu.
See chapter NetBIOS Filtering and Caching commands on page 107, for an explanation for the NetBIOS configura-
tion commands.
Syntax:
ASRT config>netbios
Note
If you have not purchased the NetBIOS feature, you receive the following message if you use this com-
mand:
9.2.18 NO
Configures the parameters with their default values or deletes the configuration.
Syntax:
ASRT config>no ?
address Add unique station address entries
bridge Enable bridging functionality
bridge-protocol Enable protocol for bridging
dls DLSw over the bridge
52 Bridge
Teldat SA 9 Bridging Configuration
9.2.18.1 NO ADDRESS
Syntax:
You cannot delete reserved multicast addresses. If you attempt to delete an address entry that does not exist, the
following error message is displayed:
Example:
9.2.18.2 NO BRIDGE
Completely disables the bridge functionality. This does not eliminate the value of the previously configured paramet-
ers.
Example:
Command history:
Release Modification
11.01.00 This command is obsolete in version 11.01.00. The command NO DEVICE bvi# must be
used to disable the bridge.
9.2.18.3 NO BRIDGE-PROTOCOL
Disables bridge for a protocol so this does not bridge received packets pertaining to the specified protocol.
Syntax:
Bridge 53
9 Bridging Configuration Teldat SA
ip IP protocol group
ipv6 IPv6 protocol group
ASRT config>
Example:
The no bridge-protocol ip command disables bridging of packets from the IPv4 protocols group.
The no bridge-protocol ipv6 command disables the packets bridge for the IPv6 protocols group.
9.2.18.4 NO DLS
Example:
9.2.18.5 NO DUPLICATE
Deactivates the creation of duplicate frames in mixed bridging environments. SR-TB on an 802.5 interface (with
source-routing and transparent bridging enabled), may create inconsistencies when bridging frames to an unknown
or multicast destination. The bridge does not know whether the destination is in a source-routing (only) or transparent
bridge.
To remedy this, the bridge sends out duplicates of these frames (by default). One frame has source-routing fields (a
spanning tree explorer RIF) and the other is formatted for transparent bridging (no RIF). The NO DUPLICATE com-
mand lets you eliminate this duplication by allowing you to disable the creation of one of these types of frames. The
NO DUPLICATE command does not allow you to disable both types of frames simultaneously.
Entering NO DUPLICATE STE tells the bridge to refrain from sending spanning tree explorer frames created for the
source-routing environment. Entering NO DUPLICATE TSF tells the bridge to refrain from sending out transparent
spanning frames for the transparent bridging environment. In both cases, the bridge normally sends both types of
frames. Disabling transparent bridging also disables the creation of transparent frames.
Deactivates the creation of duplicate frames in mixed bridge environments. The SR-TB in an 802.5 interface (with
active source routing and transparent bridging) can create inconsistencies when frame bridging is executed for an
unknown source or multicast. The bridge does not know if the destination is behind source routing bridge (only) or a
transparent bridge.
Syntax:
Example:
Example:
54 Bridge
Teldat SA 9 Bridging Configuration
9.2.18.6 NO ETHERTYPE-IBMRT-PC
Deactivates the translation of SNA frames to Ethernet 2 format used by the IBM RTs which execute OS/2/EE. For
further information, please see chapter Miscellaneous Bridge Features on page 22, section IBM RT Feature for SNA
Traffic on page 22.
Syntax:
Example:
9.2.18.7 NO FA-GA-MAPPING
Deactivates group address to functional address (and vice versa) mapping. Under certain circumstances, you can
disable the mapping between group address and functional address globally.
Example:
Disables the fast integrated routing and bridging features (IRB). For further information on IRB, please see chapter
Integrated Routing and Bridging on page 28 in this manual.
Command history:
Release Modification
11.01.00 This command is obsolete in version 11.01.00. The fast integrated routing and bridging
feature is disabled when all the routing protocols have been removed using the command
NO ROUTE-PROTOCOL .
9.2.18.9 NO IBM8209_SPANNING_TREE
Prevents bridges from participating n the spanning tree protocols with IBM 8209 bridges.
Example:
9.2.18.10 NO IRB
Disables the “integrated routing and bridging” functionality. For further information, please see chapter Integrated
Routing and Bridging on page 28 in this manual.
Syntax:
Command history:
Release Modification
11.01.00 This command is obsolete in version 11.01.00. The integrated routing and bridging fea-
ture is disabled when all the routing protocols have been removed using the command
NO ROUTE-PROTOCOL .
9.2.18.11 NO MAPPING
Eliminates the assignation of a functional address to a group address for a specific protocol identifier.
Syntax:
Bridge 55
9 Bridging Configuration Teldat SA
Example 1:
Example 2:
Example 3:
9.2.18.12 NO PORT
Syntax:
Example:
9.2.18.13 NO PROTOCOL-FILTER
Syntax:
In cases where the dsap is configured, the DSAP protocol type is a value in the
hexadecimal range from 1 to FE.
In cases where ether is configured, the Ethernet protocol type is a value in the
hexadecimal range from 5DD to FFFF.
Example 1:
Example 2:
56 Bridge
Teldat SA 9 Bridging Configuration
Example 3:
9.2.18.14 NO SET
Syntax:
Example:
9.2.18.15 NO ROUTE-PROTOCOL
Syntax:
Example:
9.2.18.16 NO SOURCE-ROUTING
Disables source routing on a given port for an already participating bridge interface.
Syntax:
Example:
Prevents a port from allowing propagation of spanning tree explorer frames if source routing is enabled. Use this
command only if transparent bridging is not enabled on the port. In this case, it is automatically in conformance with
the transparent spanning tree.
Syntax:
Example:
9.2.18.18 NO SR-TB-CONVERSION
Syntax:
Bridge 57
9 Bridging Configuration Teldat SA
9.2.18.19 NO STP
Syntax:
9.2.18.20 NO TRANSPARENT
Disables transparent bridging functionality on the given port. This command is useful for cases where an alternative
communication method such as source routing is desirable.
Also this command is used to enable, for example, SRB and SR-TB. This command has pitfalls, so use it with care.
For instance, using it on an Ethernet interface disables bridging for that interface.
Syntax:
Example:
9.2.18.21 NO UB-ENCAPSULATION
Deactivates OUI Ungermann-Bass encapsulation for XNS frames. The bridge continues to transmit XNS frames to
both Ethernet and Token Ring using SNAP encapsulation with an OUI set to all zeros as usual.
Syntax:
9.2.18.22 NO VIRTUAL-BRIDGE
Syntax:
Example:
9.2.19 PORT
Adds a LAN/WAN interface to the bridging configuration. Associates a port number with the interface and enables
that port’s participation in transparent bridging. In cases where you add a Frame Relay interface, you must also spe-
cify the circuit name.
Note
You cannot add an interface corresponding to an Ethernet switch in cases where one of its ports has
the Spanning Tree Protocol enabled through the port <id> stp enable instance <id> command found on
the switch configuration menu.
Syntax:
Example 1:
Example 2:
58 Bridge
Teldat SA 9 Bridging Configuration
9.2.20 PROTOCOL-FILTER
Creates protocol filters. The bridge filters packets based on their protocol type. It also discards matching ARP pack-
ets.
Syntax:
In cases where the dsap is configured, the DSAP protocol type is a value in the
hexadecimal range from 1 to FE.
In cases where ether is configured, the Ethernet protocol type is a value in the
hexadecimal range from 5DD to FFFF.
In cases of Ethernet, it’s also possible to configure what the configured filters should do through this command
Syntax:
If you configure protocol-filter inclusive , bridge is only executed for inclusive packets in the configured filters. Con-
trariwise, if you configure protocol-filter exclusive , then bridge is executed for exclusive in the configured filters.
This is the default behavior.
You cannot add the enabled routing protocols to the router (protocols that are displayed on executing the CONFIG-
URATION command from the monitoring menu) for filtering. Common protocol filters and their values are as follows:
DSAP Types
Protocol SAP (hexadecimal value)
Banyan SAP BC (used only for 802.5)
Novell IPX SAP EO (used only for 802.5)
NetBIOS SAP FO
ISO Connectionless Internet FE
Ethernet Types
Protocol Ethernet type (hexadecimal value)
IP 0800
ARP 0806
CHAOS 0804
DECnet MOP Dump/Load 6000
DECnet MOP Remote Console 6002
DECnet 6003
Bridge 59
9 Bridging Configuration Teldat SA
Example 1:
Filtering for NetBIOS SAP (DSAP FO) packets which enter the bridge through port 1.
Example 2:
Filtering for Ethernet XNS (0600) packets which enter the bridge through port 2.
Example 3:
Filtering for SNAP AppleTalk Phase 2 (08-00-07-80-9B) packets which enter the bridge through port 3.
Example 4:
Filtering for all Ethernet packets except IP and ARP (0800 and 0806) which enter the bridge through port 1.
9.2.21 ROUTE-PROTOCOL
Enables routing for a protocol.
Syntax:
ASRT config>route-protocol ?
ip IP protocol group
ipv6 IPv6 protocol group
Example:
The route-protocol ip command enables routable packet routing for the group of IPv4 protocols.
ASRT config>route-protocol ip
ASRT config>
The route-protocol ipv6 command enables routable packet routing for the IPv6 protocol group.
9.2.22 SET
Use the SET command to set the following parameters:
60 Bridge
Teldat SA 9 Bridging Configuration
Syntax:
ASRT config>set ?
age Time for aging out dynamic entries
bridge Sets the bridge address
filtering Entries that can be held in the filtering database
lf-bit-interpretation Largest Frame (LF) bit encoding interpretation
maximum-packet-size Largest MAC service data unit (MSDU) size
port Enables or disables a bridge port
protocol Modifies the spanning tree or port parameters
route-descriptor-limit Associate a maximum RD length for ARE or STE frames
ASRT config>
Sets the time for aging out dynamic entries in the filtering database when the port with the entry is in the forwarding
state. This age is also used for aging RIF entries in the RIF table in the case of an SR-TB bridge personality.
Syntax:
Example:
Dynamic entry age time configuration with value 250 seconds and timeout checking every 20 seconds.
Sets the bridge MAC address. You must use this command when the configured bridge does not participate in any
interface with a MAC address (e.g. serial line bridge).
Syntax:
Example:
Note
Each bridge in the network must have a unique MAC address for the spanning tree protocol to operate
properly.
This is the low order 6-octet bridge address in the bridge identifier. In cases where a MAC address is not configured
in the bridge, the device uses, should this exist, the MAC of the lowest numbered port with the associated MAC ad-
dress.
To delete the configured MAC and so the device automatically selects the MAC, you need to configure a MAC ad-
dress containing all zeros.
Bridge 61
9 Bridging Configuration Teldat SA
Example:
Sets the number of entries that can be held in the bridge filtering database. If you don’t configure the size of the data-
base, a table with 1024 entries for each bridge port is created by default. The size of the filtering database can be
checking through the LIST FILTERING command.
Syntax:
Example:
Sets the Largest Frame (LF) bit encoding interpretation if source routing is enabled in this bridge.
Syntax:
In BASIC mode only three bits of the routing control field are used. EXTENDED and BASIC modes are compatible.
Example:
In EXTENDED mode, six bits of the routing control field are used to represent the maximum data unit that the bridge
supports. The default is EXTENDED. EXTENDED and BASIC modes are compatible.
Example:
Sets the largest MAC Service Data Unit (MSDU) size for a port, if source routing is enabled on this port. Obviously,
MSDU setting has no implication on traditionally transparent media. An MSDU value greater than the packet size
configured in the router is treated as an error.
The default is the size configured as the packet size for the interface associated to the port.
Syntax:
Example:
62 Bridge
Teldat SA 9 Bridging Configuration
Syntax:
Example:
Example:
Configure the maximum number of Route Descriptors (RD) that the Routing Information Field (RIF) can contain in
the All Route Explorer (ARE) frames and Spanning Tree Explorer (STE) frames forwarded by the bridge in cases
where source routing is enabled. In other words, configure the maximum number of hops for the ARE and STE
frames.
Syntax:
Example 1:
Configuring the maximum number of permitted hops for STE frames to 10 hops.
Example 2:
Configuring the maximum number of permitted hops for ARE frames to 20 hops.
Syntax:
Bridge 63
9 Bridging Configuration Teldat SA
Enables BPDU filtering by default in all ports in an Edge Port state. To disable default BPDU filtering, use the NO
command.
Syntax:
Enables BPDU guard by default in all ports in an Edge Port state. To disable default BPDU guard, use the NO com-
mand.
Syntax:
Configures the priority assigned to bridge, together with the bridge MAC address, used to form the bridge identifier.
You can configure a value in the range 0 to 65535. The 12 least significant priority bits should be 0. In cases where
they aren’t, the device will round up to the nearest valid priority. The priority default value for bridge is 32768.
Syntax:
Example:
Configures the time interval waited before changing the state in a port (in cases where bridge is selected as Span-
ning Tree bridge root). You can configure a value in the range 4 to 30 seconds. The default value is 15 seconds.
Syntax:
Example:
Note
When setting this parameter, make sure that the following condition is met:
Configures the maximum duration (time period) that the information received in the spanning tree protocol is valid for.
You can configure a value in the range 6 to 40 seconds. Default value is 20 seconds.
Syntax:
Example:
64 Bridge
Teldat SA 9 Bridging Configuration
Note
When setting this parameter, make sure that the following conditions are met:
The Bridge Hello Time value is not configurable. This is set to 2 seconds.
Permits you to configure the Spanning Tree protocol parameters for a bridge port.
Syntax:
If you select the edge-port auto option, the Spanning Tree protocol decides if this
port is directly connected to a station or not.
Both options are not exclusive. By default the port is not detected as EdgePort
and the autodetection doesn’t come into operation.
enable Enables the Spanning Tree protocol in a determined bridge port.
disable Disables the Spanning Tree protocol in a determined bridge port.
Bridge 65
9 Bridging Configuration Teldat SA
Note
Deactivating the Spanning Tree protocol in a port may produce loops in the network due to parallel
bridges.
Link type Configures the port link type: connected to a point-to-point link (link-type point-
to-point option), connection to a point-to-multipoint link (link-type point-
to-multipoint option), or detected by the Spanning Tree protocol ( link-type auto-
detect option). The latter is the default option.
Path Cost Cost associated with the port which is used in the Spanning Tree protocol for pos-
sible root path cost. The range is 1 to 65535. 0 indicates the default path cost. In
this case, the cost is automatically assigned depending on the type of interface the
port refers to.
Port Priority Port priority. The range is 0 to 255. The 4 least significant priority bits should be 0.
In cases where they aren’t, the device will round up to the nearest valid priority.
The priority default value for the port is 128.
Example 1:
Example 2:
Example 3:
Configuration for port 1 as a port directly connected to a station (a link not shared with other bridges).
Example 4:
Link configuration which port 2 is connected to as a point-to-point link (port is directly connected to another bridge).
Example 5:
Configures the Spanning Tree protocol that is being run in the device.
Syntax:
66 Bridge
Teldat SA 9 Bridging Configuration
Example:
Maximum number of BPDUs which can be sent through a port per second. You can configure a value in the range
between 1 and 10 seconds. Default is 6 BPDUs per second.
Syntax:
Example:
9.2.23 SOURCE-ROUTING
Enables source routing for a given port. Use this command when you want source routing on part of the bridge. If
source routing is the only feature you want, disable transparent bridging on the interface.
Syntax:
Note
If there are two segments already configured (i.e., a 1:N SRB configuration), you need to create a virtu-
al segment before enabling source routing in a new port.
Example:
ASRT config>source-routing 2 3
ASRT config>
9.2.24 SPANNING-TREE-EXPLORER
Lets the port allow propagation of spanning tree explorer frames if source routing is enabled. This command is valid
on Token Ring and WAN ports only. This feature is enabled by default when source routing is configured on the port.
Syntax:
Example:
ASRT config>spanning-tree-explorer 1
ASRT config>
9.2.25 SR-TB-CONVERSION
Allows for compatibility between source routing and transparent bridging domains. When this feature is enabled, the
bridge lets source-routed frames be accepted in a transparent domain by stripping off the RIF and converting them
into transparent frames.
The bridge also gathers routing information concerning source routing stations from the RIFs of passing source-rout-
ing frames. It uses this RIF information to convert transparent frames to source-routed frames. If an RIF is not avail-
able for a station, then the bridge sends the frame out as a spanning tree explorer frame in the source-routing do-
Bridge 67
9 Bridging Configuration Teldat SA
main.
In order for the conversion to operate properly, you must give the transparent bridging domain a segment number.
Configure SR-TB bridges connected to this domain with the same segment number.
Syntax:
Example:
9.2.26 STP
Globally enables the Spanning Tree protocol.
Syntax:
ASRT config>stp
9.2.27 TRANSPARENT
Enables transparent bridging functionality on the given port. Under normal circumstances, this command is not ne-
cessary.
Syntax:
Example:
ASRT config>transparent 2
ASRT config>
9.2.28 UB-CAPSULATION
Causes XNS Ethernet 2 frames to be translated into Token Rings using the Ungermann-Bass OUI in the SNAP
header. Forwards Token Ring frames containing the UB OUI header to Ethernets as type 0x0600 Ethernet 2 frames
rather than as 802.3/802.2 frames.
Syntax:
ASRT config>ub-encapsulation
9.2.29 VIRTUAL-BRIDGE
Access the configuration of a virtual bridge entity. In cases where there isn’t an entity it is created. A virtual bridge is
an entity independent to bridge where you can associate device interfaces. The same device interface cannot be
configured in various bridge entities. You can create up to 8 bridge entities, including the main entity, which are con-
figurable from the ASRT menu with identifier 0. The virtual bridge feature allows you to work with a single physical
device which behaves as several independent bridges.
On entering the VIRTUAL-BRIDGE command, you access the virtual bridge configured menu required (VBDG
menu). The virtual entity menu basically consists of the same commands as the main entity menu (ASRT menu),
with the exception of the options relative to BAN and DLS, which are only operative in the main entity.
Syntax:
68 Bridge
Teldat SA 9 Bridging Configuration
Example:
ASRT config>virtual-bridge 2
9.2.30 VIRTUAL-SEGMENT
Sets the virtual segment number used in the SRB 1:N bridge.
Syntax
Example:
ASRT config>virtual-segment 2
9.2.31 VLAN
Accesses the virtual LAN configuration menu (VLANs). For further information on the VLAN configuration, please see
manual manual Teldat-Dm 751-I “VLAN”.
Syntax:
ASRT config>vlan
9.2.32 EXIT
This command exits the bridge configuration menu and returns to the main configuration menu.
Syntax:
ASRT config>exit
Example:
ASRT config>exit
Config>
Bridge 69
10 Bridge Monitoring Teldat SA
To access the main bridge entity monitoring menu, execute the PROTOCOL ASRT command located in the main
monitoring menu.
+protocol asrt
ASRT+
Note
From the main entity monitoring menu, ASRT menu, you can access the monitoring menu for a virtual entity through
the VIRTUAL-BRIDGE command.
+protocol asrt
ASRT+virtual-bridge 1
ASRT Virtual Bridge 1+
Note
In order to access the virtual bridge entity monitoring, this must have been previously created in the
configuration menu.
10.2.1 ? (HELP)
Displays the commands available in the current menu. After a specific command, this displays the available options.
Syntax:
ASRT+?
list Lists available bridges for being configurated
virtual-bridge Accesses to the selected bridge monitoring prompt
exit
ASRT+
10.2.2 LIST
Displays the configured bridge entities.
Example:
ASRT+list
Number Bridge ID (prio/add) Status
====== ======================= ======
0 32768/00-a0-26-70-01-dc Enabled
1 32768/00-a0-26-00-03-33 Disabled
ASRT+
Number Bridge entity identifier. Identifier 0 corresponds to the main bridge entity.
Bridge ID Bridge identifier, composed of its priority and MAC address.
70 Bridge
Teldat SA 10 Bridge Monitoring
10.2.3 VIRTUAL-BRIDGE
Accesses the monitoring menu for a virtual bridge entity.
Syntax:
ASRT+virtual-bridge <id>
An identifier equal to 0 is used to refer to the main bridge entity. The monitoring commands are the same for all the
bridge entities. In section 3 “Bridge Entity Monitoring Commands” the bridge entity monitoring commands are ex-
plained.
The prompt displayed in the monitoring menu is different depending on whether we are dealing with the main entity
(ASRT Main Bridge+) or a virtual entity (ASRT Virtual Bridge 1+).
10.2.4 EXIT
Exits the bridge monitoring menu.
Example:
ASRT+exit
+
10.3.1 ? (HELP)
Displays the commands available in the current menu. After a specific command, the available options are displayed.
Syntax:
Example:
Bridge 71
10 Bridge Monitoring Teldat SA
10.3.2 ADD
Adds static entries to the filter database. These entries are not permanent: in cases where you reboot the device,
they are deleted.
Syntax:
Example:
Adds a static address entry to the bridge filter permanent database. As well as the MAC address associated to the
entry, you need to specify the port mapping that you want. This permits you, for a MAC address, to indicate for each
input port, which ports can be used as output.
To create a static entry with multiple port maps (one per input port), enter the command several times.
Example:
Creation of a static entry associated to MAC address 11-22-33-44-55-66, so those packets with this destination ad-
dress which enter through port 1, are not sent through any port, and the packets entering through port 2 are only sent
through port 3.
72 Bridge
Teldat SA 10 Bridge Monitoring
<cr>
ASRT Main Bridge+add static-entry 11-22-33-44-55-66 2 3 0
ASRT Main Bridge+
10.3.3 BAN
Accesses the BAN monitoring menu. For further information on the BAN monitoring, please see the manual Teldat-
Dm 716-I DLSw Protocol.
Syntax:
Example:
10.3.4 CACHE
Displays the contents of a selected bridging port routing cache. If the port does not have a cache, you see the mes-
sage
Syntax:
Example:
Dynamic: Addresses learned by the bridge dynamically. These entries time out if
after a specific time they are not refreshed and are deleted should the device be
switched off and on.
10.3.5 CLEAR
Clears the bridge statistics.
Syntax:
Syntax:
Bridge 73
10 Bridge Monitoring Teldat SA
COUNTERS Clears the counters for the BPDUs transmitted and received by the Spanning Tree protocol.
Example:
10.3.6 DELETE
Deletes station (MAC) address entries from the permanent database.
Syntax:
Example:
10.3.7 FLIP-MAC-ADDRESS
Lets you view specific MAC addresses in the canonical and non-canonical formats by flipping the address bit order.
The command interprets a MAC address entered with or without separation hyphens as a MAC address in canonical
format and a MAC address entered with a colon to separate it as a non-canonical format address.
Syntax:
Example 1:
You want to know the non-canonical format for MAC address 00-a0-26-44-22-11.
Example 2:
You want to know the canonical format for MAC address 00:05:64:22:44:89.
10.3.8 LIST
Displays information on the bridge configuration and functionality.
74 Bridge
Teldat SA 10 Bridge Monitoring
Syntax:
Lists all general information regarding the SR-TB bridge which converts between types of bridging.
Syntax:
Example:
Bridge 75
10 Bridge Monitoring Teldat SA
DUP: TSF STE Indicates if duplicated STE (Spanning Tree Explorer) or TSF (Transparent Span-
ning Frames) frames are sent.
Syntax:
This lets you display certain portions of the adaptive bridge RIF database. This is due to the potential size of the
database.
Syntax:
The following example illustrates each of the list adaptive-bridge database command options
Syntax 1:
Example 1:
Example 2:
76 Bridge
Teldat SA 10 Bridge Monitoring
Canonical Address Interface Port Seg Age RIF: Type Direct Len LF
IBM MAC Address RIF
Syntax 3:
Example 3:
Syntax 4:
Example 4:
Bridge 77
10 Bridge Monitoring Teldat SA
Example:
Maximum
Port Interface State MAC Address Modes MSDU Segment Flags
1 ethernet0/0 Up 00-a0-26-40-0c-e4 SR 2096 100 RD
2 ethernet0/0.1 Up 00-a0-26-40-0c-e5 T 1514 RD
SR bridge number: 1
SR virtual segment: 000
Adaptive segment: 200
ASRT Main Bridge+
Bridge ID (prio/add) Bridge identifier.
Bridge State Indicates whether bridging is enabled or disabled.
UB-Encapsulation Indicates if the UB encapsulation is enabled.
Bridge Type The configured bridge type (None, SRB, STB, SRT, SR-TB or ASRT).
Bridge capability Bridge capacity (ASRT, STB, SRB or STB/SRB).
Number of Ports Number of ports configured for that bridge.
STP Participation Participation type in the Spanning Tree Protocol.
Filtering age Lifetime associated to the database dynamic entries.
Filtering resolution Resolution used when checking the expiry for the dynamic entries in the database.
Port Port identifier.
Interface Interface associated to the port.
State The current state of the interface (Up or Down).
MAC address The MAC address associated with that port in canonical bit order.
Modes The bridging mode for the port. T indicates transparent bridging. SR indicates
source routing.
MSDU The maximum frame (data unit) size (including the MAC header but not the FCS
field) the source-routing bridge can transmit and receive on this interface.
Segment The source routing bridge segment number assigned to that port (if any).
FLAGS Indicates if the IBM RT is enabled.
SR bridge number The user-assigned source routing bridge number.
SR virtual segment The source-routing bridge virtual segment number, if any.
Adaptive segment The number of the segment used in the source-routing domain to route to the
transparent domain.
Displays the rules to convert functional addresses to group addresses used by the bridge depending on the type of
frame.
Syntax:
78 Bridge
Teldat SA 10 Bridge Monitoring
Example:
Displays the conversion rules associated to Ethernet frames. It’s possible to indicate a specific Ethernet type or dis-
play the rules associated to all Ethernet types.
Syntax:
Example:
Displays the conversion rules associated to SAP frames. It’s possible to indicate a specific SAP type or display the
rules associated to all SAP 802.2 types.
Syntax:
Example:
Displays the conversion rules associated to SNAP frames. It’s possible to indicate a specific SNAP type or display
the rules associated to all SNAP 802.2 types.
Syntax:
Bridge 79
10 Bridge Monitoring Teldat SA
Example:
Syntax:
Example:
80 Bridge
Teldat SA 10 Bridge Monitoring
Note
The fields described below are displayed for all of the LIST DATABASE command options.
Bridge 81
10 Bridge Monitoring Teldat SA
Example:
Example:
Example:
All entries in the address database associated to a determined port are displayed.
Syntax:
Example:
82 Bridge
Teldat SA 10 Bridge Monitoring
Displays a range of database entries from the total transparent bridging filtering address database. A starting and
stop MAC address is given to define the range. All entries that are within this range are displayed.
Syntax:
Example:
Example:
Syntax:
Bridge 83
10 Bridge Monitoring Teldat SA
Example:
Descriptors used to explain how packets are processed include the following:
All of the descriptors just explained also apply to ARP packets with this Ethertype.
Syntax:
Example:
Syntax:
Example:
Syntax:
Example:
84 Bridge
Teldat SA 10 Bridge Monitoring
IEEE 802 SNAP PID 00-00-00-90-00 is bridged & processed on ports 1-2
ASRT Main Bridge+
Syntax:
Example:
Syntax:
Example:
Bridge 85
10 Bridge Monitoring Teldat SA
Syntax:
The following examples illustrate each of the LIST SOURCE-ROUTING display options.
Example 1:
86 Bridge
Teldat SA 10 Bridge Monitoring
Syntax 2:
Example 2:
Bridge 87
10 Bridge Monitoring Teldat SA
Syntax 3:
Example 3:
Example:
Bridge state: Up
Displays spanning tree protocol information. The transparent bridge uses the spanning tree protocol to form a loop-
free topology.
Syntax:
88 Bridge
Teldat SA 10 Bridge Monitoring
Example:
Example:
Bridge 89
10 Bridge Monitoring Teldat SA
1 ethernet0/0 0 0 0 0 0 0
2 ethernet0/1 0 0 0 0 0 0
Displays detailed information on the spanning tree protocol operations. This shows the state of all the internal vari-
ables used during spanning tree operations.
Syntax:
Example:
90 Bridge
Teldat SA 10 Bridge Monitoring
---------------
Port Parameters
---------------
Port 1
Port priority ..................... 128
MAC Operational ................... Yes
Administrative state .............. Enabled
AuthControlledPortStatus .......... Authorized
Operational Point To Point MAC .... Not Point To Point
Admin Point To Point MAC .......... Auto
Port enabled ...................... Yes
BPDU filtering .................... enabled
BPDU guard ........................ disabled (by default)
Port path cost .................... 2000000
Oper Edge ......................... Non Edge
Rcv BPDU .......................... No
Rcv RSTP .......................... No
Rcv STP ........................... Yes
Rcv msg ........................... No
Send RSTP ......................... No
Rcv info .......................... No
mcheck ............................ No
newInfo ........................... No
Tx Count .......................... 0
role .............................. Designated
selectedRole ...................... Designated
infoIs ............................ Mine
learn ............................. Yes
learning .......................... Yes
forward ........................... Yes
forwarding ........................ Yes
sync .............................. No
synced ............................ No
proposing ......................... No
proposed .......................... No
agree ............................. No
agreed ............................ No
disputed .......................... No
reselect .......................... No
selected .......................... Yes
updtInfo .......................... No
reRoot ............................ No
fdbFlush .......................... No
tcAck ............................. No
Bridge 91
10 Bridge Monitoring Teldat SA
rcvdTc ............................ No
rcvdTcn ........................... No
rcvdTcAck ......................... No
tcProp ............................ No
AdminEdge ......................... No
AutoEdge .......................... No
Ageing Time ....................... 320
rapid Ageing ...................... No
Port priority vector:
RootBridgeID .............. 32768/00-a0-26-44-03-38
RootPathCost .............. 0
DesignatedBridgeId ........ 32768/00-a0-26-44-03-38
DesignatedPortID .......... 32769 (128/1)
BridgePortID .............. 32769 (128/1)
Port times:
Message Age ............... 0.000
Max Age ................... 20.000
Hello Time ................ 2.000
Forward Delay ............. 15.000
Designated priority vector:
RootBridgeID .............. 32768/00-a0-26-44-03-38
RootPathCost .............. 0
DesignatedBridgeId ........ 32768/00-a0-26-44-03-38
DesignatedPortID .......... 32769 (128/1)
BridgePortID .............. 0 (0/0)
Designated times:
Message Age ............... 0.000
Max Age ................... 20.000
Hello Time ................ 2.000
Forward Delay ............. 15.000
Message priority vector:
RootBridgeID .............. 32768/00-17-0e-82-e6-c2
RootPathCost .............. 0
DesignatedBridgeId ........ 32768/00-17-0e-82-e6-c2
DesignatedPortID .......... 32769 (128/1)
BridgePortID .............. 32769 (128/1)
Message times:
Message Age ............... 0.000
Max Age ................... 20.000
Hello Time ................ 2.000
Forward Delay ............. 15.000
Timers:
edgeDelayWhile ............ 0
fdWhile ................... 0
helloWhen ................. 1
mdelayWhile ............... 0
rbWhile ................... 0
rcvdInfoWhile ............. 0
rrWhile ................... 0
tcWhile ................... 0
Machine State Status:
Receive State Machine .............. RECEIVE
Receive State Machine .............. RECEIVE
Transmit State Machine ............. IDLE
Protocol Migration State Machine ... SENSING
Bridge Detection State Machine ..... NOT_EDGE
Port Information State Machine ..... CURRENT
Role Transitions State Machine ..... DESIGNATED_PORT
State Transition State Machine ..... FORWARDING
92 Bridge
Teldat SA 10 Bridge Monitoring
Example:
Displays the current spanning tree protocol state information including port, interface and cost information.
Example:
Bridge 93
10 Bridge Monitoring Teldat SA
Syntax:
Example:
Syntax:
Example:
94 Bridge
Teldat SA 10 Bridge Monitoring
Command history:
Release Modification
10.08.36.01.04, Malformed frames counter was introduced.
10.08.43,
10.09.08.01.15,
10.09.21,
11.00.00.02.06,
11.00.03
Example:
10.3.9 NAME-CACHING
Accesses the Name Caching facility monitoring menu and the duplicated frame filtering for NetBIOS.
Syntax:
Bridge 95
10 Bridge Monitoring Teldat SA
Name Cache+
Commands Function
? (HELP) Displays all the monitoring commands, or lists options for specific commands.
LIST Displays all statistics and counters related to Name Caching and duplicated
frames filtering for NetBIOS.
PORT Selects a specific port for monitoring purposes.
EXIT Exits the name caching and duplicated frames filtering monitoring menu.
10.3.9.1 ? (HELP)
Use the ? (HELP) command to list the available commands. If this is introduced after a command, you can list the
available options.
Example:
Name Cache+?
list Displays name caching and duplicated frames filtering information
port Accesses to the name caching menu for a specific port
exit
Name Cache+
10.3.9.2 LIST
Displays the current statistics and counters for the Name Caching and duplicated frames filtering. This information
can be displayed on a global or a per interface basis by using the PORT monitoring command.
Syntax:
Name Cache+list ?
add-names Displays duplicated frames filtering database
cache Displays name caching information
Displays the total entries used to filter duplicate Add-Name and Add-Group-Name frames.
Example:
Name Cache+
Name Device identifier name.
MAC Device MAC address.
Add (Group) Name Received Counter for received Add-Name and Add-Group-Name frames.
Add (Group) Name Filtered Counter for filtered Add-Name and Add-Group-Name frames.
Syntax:
96 Bridge
Teldat SA 10 Bridge Monitoring
Shows the RIF and MAC information of all known and valid server names.
Example:
Name Cache+
Displays the number of times that certain operations have been executed against a particular server name.
Example:
Broadcasts
Server Received Converted Forwarded Filtered
------------------- ---------- ----------- ----------- ----------
SOPORTE 2 0 2 0
FYUBERO 2 0 2 0
Name Cache+
10.3.9.3 PORT
Accesses the name cache and the duplicated frame filtering monitoring submenu for a determined port.
Example:
Name Cache+port 2
Name Cache Port+
Syntax:
10.3.9.3.1 LIST
Syntax:
LIST ADD-NAMES
Displays the entries used by a specified port to filter duplicate Add Names and Add Group Names frames.
Example:
Bridge 97
10 Bridge Monitoring Teldat SA
LIST CACHE
Lists cache counters related to the specified port. These counters are aggregates for all name cache operations on
this port.
Example:
10.3.9.3.2 EXIT
Exits the monitoring menu for a specific port, returning to the name cache and NetBIOS frame filtering global monit-
oring menu.
Example:
10.3.9.4 EXIT
Exits the name cache and NetBIOS frame filtering monitoring menu, returning to the bridge monitoring menu.
Example:
Name Cache+exit
ASRT Main Bridge+
10.3.10 NETBIOS
Accesses the NetBIOS monitoring menu.
See chapter NetBIOS Filtering and Caching commands on page 107, for an explanation for the NetBIOS monitoring
commands.
Syntax:
Note
If you have not purchased the NetBIOS feature, you receive the following message if you use this com-
mand:
Syntax:
98 Bridge
Teldat SA 10 Bridge Monitoring
SPANNING-TREE FORCE-BPDU-MIGRATION-CHECK
Forces RSTP BPDU frame sending in the port specified during migration time. In this way you can check to see that
there are no STP bridges in the LAN and can send RSTP BPDU frames in the port.
Syntax:
Example:
10.3.12 EXIT
Exits the virtual bridge entity monitoring menu and returns to the bridge monitoring global menu.
Syntax:
Example:
Bridge 99
11 Using NetBIOS Teldat SA
NetBIOS relies on broadcast frames for most of its functions. While this may not present a problem in LAN environ-
ments, these broadcasts can be costly in internetwork environments by causing congestion, as well as increased
costs for WAN links.
NetBIOS uses LLC type 1 (LLC1) and LLC type 2 (LLC2) services:
• LLC1 provides connectionless data transfer. It requires name conflict resolution, station status gathering flows, and
circuit and connection setup flows.
• LLC2 provides a connection-oriented data transfer that uses I-frame traffic sent on established LLC2 connections.
The Teldat router permits you to define NetBIOS configuration parameters that are different and independent for
each of the virtual bridges enabled on the device. In the same way, this maintains all the caches and state memories
associated to the NetBIOS operations independently for each bridge.
NetBIOS names have 16 ASCII characters. IBM and Microsoft reserve the 16 th character of the NetBIOS name.
• Individual names represent a single NetBIOS client or server and should be unique within the NetBIOS network.
• Group names represent a group of NetBIOS stations (an OS/2 LAN Server domain, for example). These names
should not be the same as any individual NetBIOS names in the network.
A single NetBIOS station can have multiple individual or group names. The NetBIOS application generates names
based on the name or names the network administrator configures.
100 Bridge
Teldat SA 11 Using NetBIOS
• Forward unfiltered NetBIOS UI frames on as few bridge ports or DLSw TCP sessions as possible.
Once the router filters frames, name caching and route caching control how the router forwards the remaining
frames.
Chapter Using MAC Filtering on page 152 describes MAC address filtering.
The following sections describe frame type, duplicate frame, and response filtering, name and route caching, and
name and byte filtering.
NetBIOS stations use Name Conflict Resolution frames to make sure their name is unique. Name Conflict Resolution
frames are Add-Name-Query, Add-Group-Name-Query, Add-Name Response, and Name-In-Conflict.
Use the following guidelines to determine when to filter Name Conflict Resolution frames:
• It is critical that the NetBIOS names of stations to which a NetBIOS session is established (typically a server) be
unique.
• It is also usually critical that the individual NetBIOS names of stations within the same group (or domain) be
unique.
• It is often not critical that the NetBIOS names of stations from which a NetBIOS session is set up (typically a client)
be unique, especially across domains.
For this reason, networks in which there is good control over server names may gain advantage by filtering name
conflict resolution frames. This is especially true for DLSw networks.
NetBIOS stations use General Broadcast frames to send data to all NetBIOS stations in a network. Stations rarely
use this frame, and you can typically filter it. The NetBIOS General Broadcast frame is Datagram-Broadcast.
Trace Control frames terminate NetBIOS traces in all NetBIOS stations in a network. This frame is rarely used and
you can typically filter it. The NetBIOS Trace Control frame is Terminate-Trace.
For DLSw traffic, the router filters all of the above frame types as the default. To turn frame type filtering on or off for
DLSw, use the SET FILTERS DLSW command.
Syntax:
Example:
Bridge 101
11 Using NetBIOS Teldat SA
Activates name conflict resolution frame filtering, deactivating the general broadcast frame filtering and finally activat-
ing the trace control frames for bridge traffic.
NetBIOS config>
Duplicate frame filtering causes the router to forward only one instance of each frame within a configurable amount
of time. Fig. 21 on page 102 shows how duplicate frame filtering reduces the number of broadcast frames forwarded
over the DLSw WAN.
Here is the process that the originating NetBIOS client uses to set up a session with the target NetBIOS server.
(1) After verifying that its name is unique, the originating NetBIOS client sends six Name-Query frames at half-
second intervals.
(2) The originating DLSw router receives the first Name-Query frame and forwards it to the target DLSw router. The
originating router filters the remaining five frames.
(3) The target DLSw router receives the first Name-Query frame. It then assumes responsibility for setting up the
session and sends Name-Query frames to its attached LAN as though it were the originating NetBIOS station.
(4) The target NetBIOS station responds to the Name-Query frames with a corresponding Name-Recognized frame
that contains its MAC address. For Token Ring frames, the target NetBIOS station also sends the route to the
server.
(5) The target DLSw router then returns a Specifically-Router Frame (SRF) to the originating DLSw router, which
forwards the frame to the originating NetBIOS station.
Fig. 22 on page 103 shows the duplicate frame filtering process for bridge traffic. In this example, the router receives
six Name-Query frames in half-second intervals. The Duplicate Frame Filter Timeout is set to 1.5 seconds, and the
Duplicate Frame Detect Timeout is set to 5 seconds.
102 Bridge
Teldat SA 11 Using NetBIOS
The router repeats this process until the duplicate frame detect timer expires.
For DLSw traffic, the duplicate frame filtering process is the same, except that DLSw does not use the duplicate
frame filter timer. DLSw uses only the duplicate frame detect timer. Once the originating router creates an entry, it fil-
ters all duplicate frames until the duplicate frame detect timer expires. For DLSw, you can also control how many
query frames the target DLSw router sends during a configurable time period.
Duplicate frame filtering is disabled for bridge traffic as the default. You can enable or disable it by using the EN-
ABLE DUPLICATE-FILTERING and DISABLE DUPLICATE-FILTERING commands.
Syntax:
Example:
NetBIOS config>
Warning
For DLSw, the “Command frame retry count [5]” and “Command frame retry timeout value in seconds [0.5]” permit
you to control how many query frames are sent by the destination DLSw router during a configured period of time.
Bridge 103
11 Using NetBIOS Teldat SA
If the router receives a response to a command frame that it did not forward, it drops the response and does not for-
ward it.
As described in section Duplicate Frame Filtering on page 102 , a target DLSw router takes responsibility for setting
up a session.
A router takes responsibility for setting up a session if it matches Name-Query and Name-Recognized frames within
the duplicate frame detect timeout periods. If the router does not match those frames within that time period, it does
not forward the Name-Recognized response frames, and it does not set up the session.
The default duplicate frame detect timeout is five seconds. Do not set the duplicate frame detect timeout to zero, or
the router will have no time to set up the session. You can increase the duplicate frame detect timeout using the SET
GENERAL command.
Syntax:
Warning
With name caching, the router maintains a database of NetBIOS names and routes. Each time the router receives a
Name-Recognized frame, it extracts the MAC address and route and enters that information into the database.
When the router receives a Name-Query or Status-Query, it checks to see if the name being queried is already in its
database. If it is, route caching converts the frame from an STE frame to a SRF (Specifically-Routed Frame). A timer
on the entry invalidates the database information, if the server does not respond before the timer expires.
Route caching is ON
NetBIOS config>
• Permanent entries are those that you add in the NetBIOS configuration menu. The router saves permanent entries,
and they are still available when you restart the router.
104 Bridge
Teldat SA 11 Using NetBIOS
• Static entries are those that you enter in the NetBIOS monitoring menu. The router does not save static entries,
and they are not available after you restart the router.
• Dynamic entries are those that the router learns through Name-Query and Name-Recognized processing. A timer
removes dynamic entries that are not referenced within a configurable amount of time. The router does not save
dynamic entries and they are not available after you restart the router.
There are three types of NetBIOS names kept in the name cache:
• Local is an entry the router can reach locally via the bridge network. The router saves the MAC address associated
with the name. If route caching is enabled, the router also saves the best LLC route between the router and the
NetBIOS station
• Remote is an entry the router can reach remotely via a DLSw TCP session. The router saves the best TCP ses-
sions.
You can enter NetBIOS names in ASCII and hexadecimal, either separately or intermixed. For example, you would
need to enter an adapter address in hexadecimal mode. The default data entry mode is ASCII. To enter hexadecimal
mode, type a left angle bracket (<). To return to ASCII mode, type a right angle bracket (>).
Syntax:
Example:
NetBIOS config>
Syntax:
See chapter NetBIOS Filtering and Caching commands on page 107, section
SET on page 116 command for more in-
formation on the SET CACHE-PARMS command.
Bridge 105
11 Using NetBIOS Teldat SA
From the NetBIOS monitoring menu, you can use the LIST CACHE commands in table NetBIOS List Cache Monit-
oring Commands on page 106 in order to view the cache contents.
NetBIOS List Cache Monitoring Commands
Command Displays
LIST CACHE ACTIVE All active entries in the router’s name cache including permanent, static and dy-
namic entries.
LIST CACHE CONFIG Static and permanent entries. Does not show dynamic entries.
LIST CACHE GROUP Entries that exist for NetBIOS group names.
LIST CACHE LOCAL Local cache entries. Local cache entries are those that the router learns over the
bridge.
A cache entry for a specific NetBIOS name.
LIST CACHE NAME
LIST CACHE REMOTE Remote cache entries. Remote cache entries are those that the router learns over
the DLSw WAN.
LIST CACHE UNKNOWN Entries where the types of NetBIOS entry is unknown
• Add-Group-Name-Query (source)
• Add-Name-Query (source)
• Datagram (destination)
• Name-Query (source and destination)
For information on how to create name filters, see chapter Configuration and Monitoring NetBIOS Name and Byte
Filters on page 134.
For information on how to create name filters, see chapter Configuration and Monitoring NetBIOS Name and Byte
Filters on page 134.
106 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
Monitoring commands take effect immediately, but the router does not save them after you restart the router.
You can enter NetBIOS names in ASCII and hexadecimal, either separately or intermixed. See section ADD on page 110
command for more information. NetBIOS names are case sensitive and must match the case of the network Net-
BIOS names.
Example:
NetBIOS config>
Bridge 107
12 NetBIOS Filtering and Caching commands Teldat SA
Syntax:
Example:
To do this, you need to set the SNA traffic priority, NetBIOS traffic priority and the priority queues management. The
commands to use are SNA-PRIORITY, NBS-PRIORITY and DLS-QUEUES.
Syntax:
DLSw config>sna-priority ?
critical
high
low
medium
DLSw config>nbs-priority ?
critical
high
low
medium
The router uses the priority and message allocation to selectively limit the burst-length of specific types of traffic. For
example, if you assign
• SNA traffic a priority of Critical and Critical sessions have a message allocation of 4, and
• NetBIOS traffic a priority of Medium, and Medium sessions have a message allocation of 2.
The router processes 4 SNA frames before it processes 2 NetBIOS frames. Once the router processes 2 NetBIOS
frames, it processes 4 SNA frames and so on. In this scenario, the router dedicates two-thirds of available bandwidth
to SNA traffic (a ratio of 4 to 2). Note that the router counts frames, rather than bytes, when allocating bandwidth ac-
cording to the priorities you assign.
By default, the message number assignation for each priority is 4/3/2/1 (4 messages for Critical priority for each one
of Low priority). The number of messages assigned to the Critical, High, Medium and Low, value between 1 and 9,
must be configured in descending order so more messages are processed when the priority is higher.
108 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
Syntax:
DLSw config>nbs-mtu-ui-frames ?
516
1470
2052
4399
Note that the number of bytes allocated for NetBIOS is global, and not per session.
Syntax:
DLSw config>nbs-global-memory ?
<0..4294967295> Netbios UI-Frames memory space
The configuration menu is common both for the DLSw and the main bridge instance, so the configuration changes
executed in either of the two menus affect both the DLSw as well as the NetBIOS operations over the main bridge in-
stance. Contrariwise, changes made in a virtual bridge entity configuration menu only affect the said entity.
(1) To access the NetBIOS configuration menu for a bridge entity, use the NETBIOS command from the configura-
tion menu for the said entity.
Example 1:
Accessing the main entity configuration menu.
Config>protocol asrt
Config>protocol asrt
Bridge 109
12 NetBIOS Filtering and Caching commands Teldat SA
(2) To access the NetBIOS configuration menu for the DLSw protocol, use the NETBIOS
Config>protocol dls
12.3.3 ? (HELP)
Lists available commands or options.
Syntax:
NetBIOS config>?
Example:
NetBIOS config>?
add Add a new cache entry for DLSw neighbors
delete Delete a cache entry
disable Disable netbios features
enable Enable netbios features
list List configuration
set Set NetBIOS parameters
exit
NetBIOS config>
12.3.4 ADD
Adds a new entry to the device’s name cache.
Syntax:
NetBIOS config>add ?
cache-entry Add a new cache entry for DLSw neighbors
Adds a new entry to the router’s name cache. You can add name cache entries for DLSw neighbors only. The router
ignores entries that you add for bridge traffic.
You can add multiple entries with different IP addresses for a single NetBIOS name. This allows DLSw to send the
frame to multiple DLSw neighbors.
You can enter NetBIOS names in ASCII and hexadecimal, either separately or intermixed. For example, you would
need to enter an adapter address in hexadecimal mode. The default data entry mode is ASCII. To enter hexadecimal
110 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
mode, type a left angle bracket (<). To return to ASCII mode, type a right angle bracket (>).
Note
NetBIOS names are case sensitive and must match the case of the network NetBIOS names.
Syntax:
Example:
NetBIOS config>
12.3.5 DELETE
Deletes an entry from the device’s name cache entries. You need to specify the entry number you want to delete. To
see a list of entry numbers, enter LIST CACHE ALL.
Syntax:
Example:
NetBIOS config>
12.3.6 DISABLE
Disables duplicate frame filtering or route caching for the bridge
Bridge 111
12 NetBIOS Filtering and Caching commands Teldat SA
Syntax:
NetBIOS config>disable ?
duplicate-filtering Disable duplicate frame filtering for bridging
route-caching Disable route caching for bridging
NetBIOS config>
Disables duplicate frame filtering for bridging. Duplicate frame filtering is always enabled for DLSw traffic. You cannot
enable or disable it.
Example:
NetBIOS config>
Disables route caching for bridging. Route caching is the process of converting broadcast frames to SRF
(Specifically-Routed Frames), using the entries in the NetBIOS name cache. Route caching is always enabled for
DLSw traffic. You cannot enable or disable it.
Example:
NetBIOS config>
12.3.7 ENABLE
Enables duplicate frame filtering or route caching for the bridge.
Syntax:
NetBIOS config>enable ?
duplicate-filtering Enable duplicate frame filtering for bridging
route-caching Enable route caching for bridging
NetBIOS config>
Enables duplicate frame filtering for bridging. Duplicate frame filtering is always enabled for DLSw traffic. You cannot
enable or disable it.
Example:
NetBIOS config>
Enables route caching for bridging. Route caching is always enabled for DLSw traffic. You cannot enable or disable
it. Route caching is the process of converting broadcast frames to Specifically-Routed Frames (SRF), using the
entries in the NetBIOS name cache.
Example:
112 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
Route caching is ON
NetBIOS config>
12.3.8 LIST
Displays the configuration information.
Syntax:
NetBIOS config>list ?
cache List cache entries
filters List bridging and DLSw filtering state
general List current NetBIOS caching and filtering configuration
NetBIOS config>
Syntax:
Displays all active entries in the router’s permanent name cache. Does not display static or dynamic entries.
The router displays all hexadecimal data in angle brackets. The number in angle brackets shown just before the IP
address is the 16 th character of the NetBIOS name. IBM and Microsoft reserve the 16 th character of the NetBIOS
name, and it always appears in hexadecimal.
Example:
NetBIOS config>
Displays a cache entry according to its entry number. Enter the LIST CACHE ALL command to see a list of all entry
numbers.
Example:
NetBIOS config>
Bridge 113
12 NetBIOS Filtering and Caching commands Teldat SA
Example:
NetBIOS config>
Displays a cache entry for a specific NetBIOS name. Use the following wildcards to simplify your search:
* Stands for any character string. For example, “San*” could produce:
San Francisco
Santa Fe
San Juan
? Stands for any one character.
$ Must coincide with the last character in a name.
Following are examples of valid uses of wildcards that match San Francisco:
*Fran* S??*?????????
San?Fran?isco S?*
S* S?n?F?a?c?s?o?
*o ????????????
*Isco? Isco $
San?F* *
Use as many wildcards as you like, up to the maximum number of characters in a NetBIOS name (15 or 16, depend-
ing on how many significant characters you configured using the SET CACHE-PARMS command).
Note
In order to enter the “?” wildcard without difficulty, use quotation marks around the name you wish to
search for.
In cases where you use the “$” wildcard, you need to include the final spaces in the name.
Example:
114 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
NetBIOS config>
Syntax:
Displays whether or not frame type filtering is on or off for both bridging and DLSw. Use the SET FILTERS BRIDGE
and SET FILTERS DLSW commands to turn these filters on or off.
Example:
NetBIOS config>
Displays whether or not frame type filtering is on or off for bridging. Enter the SET FILTERS BRIDGE command to
turn these filters on or off.
Example:
NetBIOS config>
Bridge 115
12 NetBIOS Filtering and Caching commands Teldat SA
Displays whether or not frame type filtering is on or off for DLSw. Enter SET FILTERS DLSW to turn these filters on
or off.
Example:
NetBIOS config>
Syntax:
Example:
Bridge-only Information:
DLS-only Information:
NetBIOS config>
Note
12.3.9 SET
Configures the different parameters associated to the NetBIOS functionality.
Syntax:
NetBIOS config>set ?
cache-parms Configure cache parameters
filters Configure filter parameters
116 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
Syntax:
Example:
To determine the best path, the router considers transmission time between nodes
on all possible routes connecting those nodes, as well as largest frame size. The
router does not consider a path suitable if it cannot accommodate the largest Net-
BIOS frame that could be transmitted over the path.
If the router receives a duplicate frame after this timer expires, it presumes the
previous route is no longer valid and it widens its search. The router forwards the
duplicate frame to both bridges and DLSw. DLSw broadcasts the corresponding
SSP message to all possible DLSw partners.
The default is 500. The range is 1 to 30,000. To optimize memory usage, pro-
cessor usage, and the amount of broadcast traffic, set this number as close as
possible to the total number of NetBIOS stations (servers and clients) that are act-
ive on this router’s local bridge network.
Max nbr remote name cache Maximum number of remotely-learned entries, group name entries and unknown
entries entries.
The default is 100. The range is 1 to 30,000. To optimize memory usage, pro-
cessor usage, and the amount of broadcast traffic, set this number to the number
of remote NetBIOS clients on this router’s local bridge network, plus about 25%.
Syntax:
Bridge 117
12 NetBIOS Filtering and Caching commands Teldat SA
Syntax:
Example:
Activates the name conflict resolution frame filtering, deactivates the general broadcast frame filtering and finally, ac-
tivates the trace control frame filtering for bridge traffic.
Accesses the NetBIOS frame name and byte filtering configuration menu.
See chapter Configuration and Monitoring NetBIOS Name and Byte Filters on page 134 for more information on the
commands available in this menu.
Example:
Syntax:
Example:
Activates the name conflict resolution frame filtering, deactivates the general broadcast frame filtering and finally, ac-
tivates the trace control frame filtering for DLSw traffic.
Configures the duplicated frame filtering operation parameters. See in chapter Using NetBIOS on page 100 section
Duplicate Frame Filtering on page 102 for more information on how duplicate frame filters work.
Syntax:
118 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
Duplicate frame filter timeout Applies only to bridged traffic if duplicate-filtering is enabled.
During this timeout period, the router filters all duplicate frames it receives.
The range is 0.0 to 100.000 seconds. Zero disables duplicate frame checking. The
default is 1.5 seconds.
Duplicate frame detect timeout Timeout time to detect duplicate frames.
Amount of time the router saves entries in its duplicate frame filter database.
When this timer expires, the router creates new entries for new frames that it re-
ceives.
Number of duplicate NetBIOS UI frames the target DLSw router sends to its loc-
ally-attached LAN. The router sends these frames at intervals specified by the
command frame retry timeout.
Example:
Warning
12.3.10 EXIT
Exits the NetBIOS configuration menu.
Syntax:
NetBIOS config>exit
Example:
NetBIOS config>exit
ASRT config>
The monitoring menu is common both for the DLSw and the main bridge entity, so the monitoring changes executed
in either of the two menus affect both the DLSw as well as the NetBIOS operations over the main bridge entity. Con-
trariwise, changes made in a virtual bridge entity monitoring menu only affect the said entity.
Bridge 119
12 NetBIOS Filtering and Caching commands Teldat SA
(1) To access the NetBIOS monitoring menu for a bridge entity, use the NETBIOS command from the monitoring
menu of the said entity
Example 1:
Accessing the main entity monitoring menu.
+protocol asrt
ASRT+virtual-bridge 0
NetBIOS+
Example 2:
Accessing the virtual bridge entity monitoring menu with identifier 2.
+protocol asrt
ASRT+virtual-bridge 1
NetBIOS+
(2) To access the NetBIOS monitoring menu for the DLSw protocol, use the NETBIOS command from the monitor-
ing menu for the said protocol
+protocol dls
Data Link Switching Console
DLSw+netbios
NetBIOS+
12.4.3 ? (HELP)
Lists available commands or options.
Syntax:
NetBIOS+?
Example:
NetBIOS+?
add Adds a new entry
120 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
12.4.4 ADD
Adds a new name cache entry to the router’s static configuration.
Syntax:
NetBIOS+add ?
cache-entry Add a new cache entry for DLSw neighbours
Adds a new entry to the router’s name cache. You can add name cache entries for DLSw neighbors only. The router
ignores entries that you add for bridge traffic.
You can add multiple entries with different IP addresses for a single NetBIOS name. This allows DLSw to send the
frame to multiple DLSw neighbors.
You can enter NetBIOS names in ASCII and hexadecimal, either separately or intermixed. For example, you would
need to enter an adapter address in hexadecimal mode. The default data entry mode is ASCII. To enter hexadecimal
mode, type a left angle bracket (<). To return to ASCII mode, type a right angle bracket (>).
Note
NetBIOS names are case sensitive and must match the case of the network NetBIOS names.
Syntax:
Example:
NetBIOS+
12.4.5 DELETE
Deletes name cache entries from the router’s static configuration or active cache. You need to specify the name as-
sociated to the cache entry you wish to delete. To see a list of entries, enter LIST CACHE CONF or LIST CACHE
ACTIVE.
Note
Syntax:
NetBIOS+delete ?
cache-entry Deletes NetBIOS name cache entries
NetBIOS+delete cache-entry ?
<word> NetBIOS name for cache entry
Example:
Bridge 121
12 NetBIOS Filtering and Caching commands Teldat SA
Name cache entry NOT found in Active list for name entered
Name cache entry has NOT been deleted from Active list
Static name cache entry deleted from temporary config list
NetBIOS+
12.4.6 DISABLE
Disables duplicate frame filtering or route caching for the bridge
Syntax:
NetBIOS+disable ?
duplicate-filtering Disables NetBIOS duplicate frame filtering
route-caching Disables NetBIOS route caching
Disables duplicate frame filtering for bridging. Duplicate frame filtering is always enabled for DLSw traffic. You cannot
enable or disable it.
Example:
NetBIOS+disable duplicate-filtering
NetBIOS+
Disables route caching for bridging. Route caching is the process of converting broadcast frames to Specifically-
Routed Frames (SRF), using the entries in the NetBIOS name cache. Route caching is always enabled for DLSw
traffic. You cannot enable or disable it.
Example:
NetBIOS+disable route-caching
Route caching is OFF
NetBIOS+
12.4.7 ENABLE
Enables duplicate frame filtering or route caching for the bridge.
Syntax:
NetBIOS+enable ?
duplicate-filtering Enables NetBIOS duplicate frame filtering
route-caching Enables NetBIOS route caching
Enables duplicate frame filtering for bridging. Duplicate frame filtering is always enabled for DLSw traffic. You cannot
enable or disable it.
Example:
NetBIOS+enable duplicate-filtering
Duplicate frame filtering is ON
NetBIOS+
Enables route caching for bridging. Route caching is always enabled for DLSw traffic. You cannot enable or disable
it. Route caching is the process of converting broadcast frames to Specifically-Routed Frames (SRF), using the
entries in the NetBIOS name cache.
122 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
Example:
NetBIOS+enable route-caching
Route caching is ON
NetBIOS+
12.4.8 LIST
Displays information on the NetBIOS operations.
Syntax:
NetBIOS+list ?
cache Lists information about the cache names
filters Lists the state of the configured filters
general Lists NetBIOS general configuration information
statistics Lists NetBIOS statistics
Syntax:
NetBIOS+list cache ?
active Lists all NetBIOS name cache information
config Lists all statics and permanents entries from the cache names
group Lists NetBIOS name cache information for name groups
local Lists NetBIOS name cache information for local names
name Lists NetBIOS name cache detail information
remote Lists NetBIOS name cache information for remote names
unknown Lists NetBIOS name cache information for unknown names
Displays all active entries in the router’s name cache, including dynamic, static and permanent entries.
The router displays all hexadecimal data in angle brackets. The number in angle brackets shown just before the IP
address is the 16 th character of the NetBIOS name. IBM and Microsoft reserve the 16 th character of the NetBIOS
name, and it always appears in hexadecimal.
If the Name Type field does not specify local, it is a remote entry. For a description of the fields in this display, see
the LIST CACHE NAME command on this section.
Example:
NetBIOS+
Displays all static and permanent name cache entries. Does not show dynamic entries.
The router displays all hexadecimal data in angle brackets. The number in angle brackets shown just before the IP
Bridge 123
12 NetBIOS Filtering and Caching commands Teldat SA
address is the 16 th character of the NetBIOS name. IBM and Microsoft reserve the 16 th character of the NetBIOS
name, and it always appears in hexadecimal.
Example:
NetBIOS+
Displays cache entries that exist for NetBIOS group names. For a description of the fields in this display, see the
LIST CACHE NAME command on this section.
Example:
NetBIOS+
Displays the local cache entries. Local cache entries are those that the router learns via the local bridge network. For
a description of the fields in this display, see the LIST CACHE NAME command on this section.
For NetBIOS clients the Local Path State is always Unknown and the MAC Address and Routing Information fields
are always empty.
Example:
NetBIOS+
Displays a cache entry for a specific NetBIOS name. Use the following wildcards to simplify your search:
* Stands for any character string. For example, “San*” could produce:
San Francisco
Santa Fe
San Juan
? Stands for any one character.
$ Must coincide with the last character in a name.
Following are examples of valid uses of wildcards that match San Francisco:
*Fran* S??*?????????
San?Fran?isco S?*
S* S?n?F?a?c?s?o?
124 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
*o ????????????
*Isco? Isco $
San?F* *
Use as many wildcards as you like, up to the maximum number of characters in a NetBIOS name (15 or 16, depend-
ing on how many significant characters you configured using the SET CACHE-PARMS command).
Note
In order to enter the “?” wildcard without difficulty, use quotation marks around the name you wish to
search for.
In cases where you use the “$” wildcard, you need to include the final spaces in the name.
Syntax:
Example:
Bridge 125
12 NetBIOS Filtering and Caching commands Teldat SA
Displays cache entries the router learns over the DLSw WAN. If the router has found the best path, it displays the IP
address associated with the DLSw neighbor that can reach the NetBIOS station. For a description of the fields in this
display, see the LIST CACHE NAME command on this section.
Example:
NetBIOS+
Displays cache entries where the type of NetBIOS name is unknown. The router enters all dynamic entries as Un-
known until it learns the type of name. It then marks entries as local, remote, or group. For a description of the fields
in this display, see the LIST CACHE NAME command on this section.
Example:
126 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
Cnt NetBIOS Name Entry Type Loc Path St Rem Path St IP Address(es)
--- ------------------- ---------- ----------- ----------- ---------------
1 CBRA <1d> DYNAMIC UNKNOWN SEARCH ALL
2 HARDWARE <1e> DYNAMIC UNKNOWN SEARCH ALL
3 JSPNRMPTGSBSSDI<52> DYNAMIC UNKNOWN SEARCH ALL
4 TEL01 <00> DYNAMIC UNKNOWN SEARCH LTD
NetBIOS+
Syntax:
NetBIOS+list filters ?
all Lists the on/off status for both bridge and DLS frame-type
filtering
bridge Lists the on/off status for bridge frame-type filtering
dlsw Lists the on/off status for DLSw frame-type filtering
Displays whether or not frame type filtering is on or off for both bridging and DLSw. Use the SET FILTERS BRIDGE
and SET FILTERS DLSW commands to turn these filters on or off.
Example:
Displays whether or not frame type filtering is on or off for bridging. Use the SET FILTERS BRIDGE command to
turn these filters on or off.
Example:
Displays whether or not frame type filtering is on or off for DLSw. Use the SET FILTERS DLSW command to turn
these filters on or off.
Example:
Bridge 127
12 NetBIOS Filtering and Caching commands Teldat SA
Example:
NetBIOS+list general
Bridge-only Information:
Bridge duplicate filtering is OFF
Bridge duplicate frame filter t/o 1.5 seconds
DLS-only Information:
DLS command frame retry count 5
DLS max remote name cache entries 100
DLS command frame retry timeout 0.5 seconds
DLS-Bridge Common Information:
Route caching is OFF
Significant characters in name 15
Max local name cache entries 500
Duplicate frame detect timeout 5.0 seconds
Best path aging timeout 60.0 seconds
Reduced search timeout 1.5 seconds
Unreferenced entry timeout 5000 minutes
NetBIOS+
Note
Syntax:
NetBIOS+list statistics ?
cache List NetBIOS name cache statistics
frames List frames statistics
general List general statistics
Example:
NetBIOS+
Syntax:
128 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
Example:
NetBIOS+
Example:
NetBIOS+
Syntax:
Example:
NetBIOS>
Example:
Bridge 129
12 NetBIOS Filtering and Caching commands Teldat SA
Frames discarded 0
Frames forwarded to bridge 0
NetBIOS+
12.4.9 SET
Configures different parameters associated to the NetBIOS operations.
Syntax:
NetBIOS+set ?
cache-parms Sets name caching parameters that apply to bridging or DLSw
filters Sets frame-type filtering
general Sets NetBIOS duplicate frame handling and retry parameters
Example:
NetBIOS+set cache-parms ?
<15..16> Number of significant characters in a NetBIOS name
NetBIOS+set cache-parms 15 ?
<1.0..100000.0> Best path aging timeout in seconds (only one decimal
value)
NetBIOS+set cache-parms 15 60 ?
<1.0..100.0> Reduced search timeout in 10ths of seconds (only one decimal
value)
NetBIOS+set cache-parms 15 60 1.5 ?
<1..100000> Unreferenced entry timeout in 10ths of seconds
NetBIOS+set cache-parms 15 60 1.5 5000 ?
<100..30000> Maximum local name cache entries
NetBIOS+set cache-parms 15 60 1.5 5000 500 ?
<100..30000> Maximum remote name cache entries
NetBIOS+set cache-parms 15 60 1.5 5000 500 100
Significant characters in name Determines whether the router considers 15 or 16 characters when it looks up the
NetBIOS name. If you enter.
To determine the best path, the router considers transmission time between nodes
on all possible routes connecting those nodes, as well as largest frame size. The
router does not consider a path suitable if it cannot accommodate the largest Net-
BIOS frame that could be transmitted over the path.
If the router receives a duplicate frame after this timer expires, it presumes the
previous route is no longer valid and it widens its search. The router forwards the
duplicate frame to both bridges and DLSw. DLSw broadcasts the corresponding
SSP message to all possible DLSw partners.
130 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
Unreferenced entry timeout The router keeps a name that is not referenced in its cache for this length of time
before deleting it. If the cache fills up, the router removes entries sooner.
The default is 500. The range is 1 to 30,000. To optimize memory usage, pro-
cessor usage, and the amount of broadcast traffic, set this number as close as
possible to the total number of NetBIOS stations (servers and clients) that are act-
ive on this router’s local bridge network.
Max nbr remote name cache Maximum number of remotely-learned entries, group name entries and unknown
entries entries.
The default is 100. The range is 1 to 30,000. To optimize memory usage, pro-
cessor usage, and the amount of broadcast traffic, set this number to the number
of remote NetBIOS clients on this router’s local bridge network, plus about 25%.
Syntax:
NetBIOS+set filters ?
bridge Sets NetBIOS frame-type filtering parameters
byte-name Displays NetBIOS Byte or Name filtering parameters
dlsw Sets NetBIOS frame-type filtering parameters
Example:
Accesses the NetBIOS frame name and byte filtering monitoring menu.
See chapter Configuration and Monitoring NetBIOS Name and Byte Filters on page 134 for more information on the
commands available in this menu.
Example:
NETBIOS Filter+
Example:
Bridge 131
12 NetBIOS Filtering and Caching commands Teldat SA
Configures the duplicated frame filtering operating parameters. See section Duplicate Frame Filtering on page 102
on chapter Using NetBIOS on page 100 for more information on how duplicate frame filters work.
Example:
NetBIOS+set general ?
<0.0..100.0> Duplicate frame filter timeout value in seconds (only one
decimal value)
NetBIOS+set general 1.5 ?
<1.0..100.0> Duplicate frame detect timeout value in seconds (only one
decimal value)
NetBIOS+set general 1.5 5.0 ?
<0..10> Command frame retry count
NetBIOS+set general 1.5 5.0 5 ?
<0.0..10.0> Command frame retry timeout value in seconds (only one
decimal value)
NetBIOS+set general 1.5 5.0 5 0.5
Warning
If DLSw is not enabled, the “retry count” and “retry timeout” values are not asked for:
Duplicate frame filter timeout Applies only to bridged traffic if duplicate-filtering is enabled.
During this timeout period, the router filters all duplicate frames it receives.
The range is 0.0 to 100.000 seconds. Zero disables duplicate frame checking. The
default is 1.5 seconds.
Duplicate frame detect timeout Timeout time for detecting duplicate frames.
Amount of time the router saves entries in its duplicate frame filter database.
When this timer expires, the router creates new entries for new frames that it re-
ceives.
Number of duplicate NetBIOS UI frames the target DLSw router sends to its loc-
ally-attached LAN. The router sends these frames at intervals specified by the
command frame retry timeout.
132 Bridge
Teldat SA 12 NetBIOS Filtering and Caching commands
12.4.10 EXIT
Exits the NetBIOS monitoring menu.
Syntax:
NetBIOS+exit
Example:
NetBIOS+exit
ASRT+
Bridge 133
13 Configuration and Monitoring NetBIOS Name and Byte Filters Teldat SA
13.1 Accessing the NetBIOS Name and Byte Configuration and Monit-
oring menus
This section describes the NetBIOS Name and Byte filter configuration and monitoring commands.
To access the NetBIOS name and byte filter configuration menu, use the SET FILTERS BYTE-NAME from the Net-
BIOS configuration menu.
Example:
Config>protocol asrt
To access the NetBIOS name and byte filter monitoring menu, use the SET FILTERS BYTE-NAME from the Net-
BIOS monitoring menu.
Example:
protocol asrt
ASRT+virtual-bridge 0
NETBIOS Filter+
The router compares each filter item against a packet in the order in which you enter the filter items.
You configure the NetBIOS name and byte filters for each port and specify whether the filter applies to input or output
packets.
The following sections provide examples of how to set up a host name filter and a byte filter. The “ NetBIOS Name
and Byte Filter Configuration Commands ” and “NetBIOS Name and Byte Filter Monitoring Commands” sec-
tions describe the commands used in these examples.
Use the following procedure as a guideline to create a name filter. Before you begin, access the NetBIOS name and
byte filter configuration menu.
134 Bridge
Teldat SA 13 Configuration and Monitoring NetBIOS Name and Byte Filters
Config>protocol asrt
Bridge 135
13 Configuration and Monitoring NetBIOS Name and Byte Filters Teldat SA
boston Name
newyork Name
NETBIOS Filters
---------------
Port # Direction Filter List Handle(s)
2 Input boston
1 Output boston or newyork
Use the following procedure as a guideline for creating a byte filter. Before you begin, access the NetBIOS name and
byte filter configuration menu.
Config>protocol asrt
136 Bridge
Teldat SA 13 Configuration and Monitoring NetBIOS Name and Byte Filters
Bridge 137
13 Configuration and Monitoring NetBIOS Name and Byte Filters Teldat SA
boston Name
newyork Name
westport Byte
NETBIOS Filters
---------------
Port # Direction Filter List Handle(s)
2 Input boston
1 Output boston or newyork
3 Output westport
13.3.1 ? (HELP)
Lists available commands or options.
Syntax:
138 Bridge
Teldat SA 13 Configuration and Monitoring NetBIOS Name and Byte Filters
Example:
13.3.2 CREATE
Creates a byte filter list or a name filter list.
Syntax:
Creates a byte filter list. Give the list a unique name of up to 16 characters. You use this name to identify the filter
list.
Syntax:
Example:
Creates a name filter list. Give the list a unique name of up to 16 characters. You use this name to identify the filter
list.
Syntax:
Example:
13.3.3 DELETE
Deletes byte filter lists, host name filter lists, and filters.
Syntax:
Bridge 139
13 Configuration and Monitoring NetBIOS Name and Byte Filters Teldat SA
Deletes a filter.
Syntax:
Deletes an input filter for a determined port, created with the FILTER-ON INPUT command.
Syntax:
Example:
Deletes an output filter for a determined port, created with the FILTER-ON OUTPUT command.
Syntax:
Example:
Syntax:
Example:
Syntax:
Example:
Note
In order to delete a filter list, the list cannot be associated to any configured filter.
140 Bridge
Teldat SA 13 Configuration and Monitoring NetBIOS Name and Byte Filters
13.3.4 DISABLE
Disables NetBIOS name and byte filtering.
Syntax:
Example:
13.3.5 ENABLE
Enables NetBIOS name and byte filtering.
Syntax:
Example:
13.3.6 FILTER-ON
Assigns one or more previously configured filter lists to the input or output a specific port.
Syntax:
Assigns one or more filter lists to incoming packets on a port. The router applies the resulting filter to all NetBIOS
packets input on the specified port.
Port Number is a configured bridging port number on the router. The port number identifies this filter. You can indic-
ate additional filter lists for a port by using the AND and OR options followed by the name of the filter list.
The router applies the filter you create with this command to all incoming NetBIOS packets on the specified port. The
router evaluates each filter list on the command line from left to right. If a packet matches an inclusive filter the router
bridges the packet. If a packet matches an exclusive filter, the router drops the packet.
If the packet is not one of the types that NetBIOS name or byte filtering supports, the router bridges the packet.
Example:
Bridge 141
13 Configuration and Monitoring NetBIOS Name and Byte Filters Teldat SA
Assigns one or more filter lists to outgoing packets on a port. The router applies the resulting filter to all NetBIOS
packets output on the specified port.
Port Number is a configured bridging port number on the router. The port number identifies this filter. You can indic-
ate additional filter lists for a port by using the AND and OR options followed by the name of the filter list.
The router applies the filter you create with this command to all outgoing NetBIOS packets on the specified port. The
router evaluates each filter list on the command line from left to right. If a packet matches an inclusive filter the router
bridges the packet. If a packet matches an exclusive filter, the router drops the packet.
If the packet is not one of the types that NetBIOS name or byte filtering supports, the router bridges the packet.
Example:
13.3.7 LIST
Displays information on all name and byte filters.
Syntax:
Example:
boston Name
newyork Name
westport Byte
NETBIOS Filters
---------------
Port # Direction Filter List Handle(s)
2 Input boston
1 Output boston or newyork
3 Output westport
NETBIOS Filter config>
NetBIOS Filtering Displays whether NetBIOS filtering is enabled or disabled.
NetBIOS Filter Lists Shows the name (handle) of the filter lists, as well as the type, either Name or
Byte.
NetBIOS Filters Assigned port number and direction (input or output) of each filter. Filter List
Handle(s) displays the name(s) of the filter list(s) making up the filter.
13.3.8 UPDATE
Accesses the filter list configuration menu, permitting you to add or delete filter items from it. For a description of the
commands available in this menu, please see section NetBIOS Name and Byte Filter Configuration Commands on
page 138 and section NetBIOS Name and Byte Filter Monitoring Commands on page 143 in this chapter.
Syntax:
Example:
142 Bridge
Teldat SA 13 Configuration and Monitoring NetBIOS Name and Byte Filters
13.3.9 EXIT
Exits the NetBIOS name and byte filter configuration menu.
Syntax:
Example:
13.4.1 ? (HELP)
Lists available commands or options.
Syntax:
NETBIOS Filter+?
Example:
NETBIOS Filter+?
list Lists information related to created filters
exit
NETBIOS Filter+
13.4.2 LIST
Displays information on all filters, on bytes, or on name filters.
Syntax:
NETBIOS Filter+list ?
byte-filter-lists Lists all of the byte filter lists that you have created
filters Lists all the filters that you have created and the
number of packets the router have filtered
name-filter-lists Lists all of the name filter lists that you have created
Example:
Bridge 143
13 Configuration and Monitoring NetBIOS Name and Byte Filters Teldat SA
NETBIOS Filter+
Lists all of the filters that you created and the number of packets the router filtered as a result of those filters.
2 Input boston 0
1 Output boston OR newyork 0
3 Output westport 0
NETBIOS Filter+
Example:
NETBIOS Filter+
13.4.3 EXIT
Exits the NetBIOS name and byte filter monitoring menu.
Syntax:
NETBIOS Filter+exit
Example:
NETBIOS Filter+exit
NETBIOS+
144 Bridge
Teldat SA 13 Configuration and Monitoring NetBIOS Name and Byte Filters
To access the filter list configuration menu, use the UPDATE command followed by the filter list name found in the
NetBIOS name and byte filter configuration menu.
Example:
Table Byte filter list configuration commands on page 145 displays the available configuration commands.
Byte filter list configuration commands
Command Function
? (HELP) Displays the available configuration commands or their options.
ADD Adds a filter item to the configured filter list.
DEFAULT Establishes the default action for the filter list.
DELETE Eliminates a filter item from the configured filter list.
LIST Displays the configuration for the filter list.
MOVE Reorders filter items within a filter list.
EXIT Exits the byte filter list configuration menu.
13.5.1 ? (HELP)
Displays the available commands or their options.
Syntax:
13.5.2 ADD
Adds a filter item to the configured byte filter list.
Syntax:
Bridge 145
13 Configuration and Monitoring NetBIOS Name and Byte Filters Teldat SA
filter item.
pattern Hexadecimal pattern, made up of between 2 to 32 characters, used to check if the
frame coincides with the filter item.
mask Hexadecimal mask, made up of between 2 and 32 characters, to apply to the
frame before checking with the configured pattern. This parameter is optional. In
cases where it is not included, the device considers that they are all binary 1’s (i.e.
all the frame bytes are considered as is).
Note
Adding filter items to filter lists adds to processing time due to the time it takes to evaluate each item in
the list. It can affect performance in heavy NetBIOS traffic.
The order in which you enter filter items is important as this determines how the router applies filter items to a packet.
The router stops comparing the packet to a filter when it finds the first match.
If the offset and pattern of a byte filter item represent bytes that do not do not exist in a NetBIOS packet (for example,
if the packet is shorter than was intended when setting up a byte-filter list), the router does not apply the filter to the
packet. If you use a series of byte filter items to set up a single NetBIOS filter list, then a packet is not tested for filter-
ing if any of the byte filter items within the NetBIOS filter list represent bytes that do not exist in the NetBIOS packet.
Example:
13.5.3 DEFAULT
Establishes the default action for the filter list. If no filter items match the contents of the packet the router considers
for filtering, the router forwards or drops the packet, depending on this setting.
Syntax:
Example 1:
The packets are dropped in cases where the packet contents do not coincide with any filter item.
Example 2:
The packets are bridged in cases where the packet contents do not coincide with any filter item.
13.5.4 DELETE
Deletes a filter item from the filter list. This provokes the filter items on the list to be re-ordered. You can check the
number assigned to each filter item by using the LIST command.
Syntax:
Example:
146 Bridge
Teldat SA 13 Configuration and Monitoring NetBIOS Name and Byte Filters
13.5.5 LIST
Displays information related to filter items in the filter list.
Syntax:
Example:
13.5.6 MOVE
Re-orders filter items within the filter list. The filter item whose number is specified by filter-item-number1 moves and
is renumbered so it is moved to just before filter-item-number2 . You can consult the number assigned to each filter
item by using the LIST command.
Syntax:
Example:
1 Ex 2 0x3344 0xffff
2 Inc 8 0x08 0xff
3 Inc 4 0x09 0xff
13.5.7 EXIT
Exits the byte filter list configuration menu.
Bridge 147
13 Configuration and Monitoring NetBIOS Name and Byte Filters Teldat SA
Syntax:
Example:
To access the filter list configuration menu, use the UPDATE command followed by the filter list identifier in the Net-
BIOS name and byte filter configuration menu.
Example:
Table Name filter list configuration commands on page 148 displays the available configuration commands.
Name filter list configuration commands
Command Function
? (HELP) Displays the available configuration commands or their options.
ADD Adds a filter item to the configured filter list.
DEFAULT Establishes the default action for the filter list.
DELETE Eliminates a filter item from the configured filter list.
LIST Displays the configuration for the filter list.
MOVE Reorders filter items within a filter list.
EXIT Exits the name filter list configuration menu.
13.6.1 ? (HELP)
Displays the available commands or their options.
Syntax:
13.6.2 ADD
Adds a filter item to the name filter list. The router compares the following frames and fields with the information you
enter with this command:
Syntax:
148 Bridge
Teldat SA 13 Configuration and Monitoring NetBIOS Name and Byte Filters
Example 1:
Example 2:
13.6.3 DEFAULT
Establishes the default action for the filter list. If no filter items match the packet the router considers for filtering, the
router forwards or drops the packet, depending on this setting.
Syntax:
Example:
The packets are bridged in cases where the packet contents do not coincide with any filtering element.
13.6.4 DELETE
Deletes a filter item from the list. This provokes the filter items to be reordered on the list. You can check the number
assigned to each filter item by using the LIST command.
Syntax:
Example:
Bridge 149
13 Configuration and Monitoring NetBIOS Name and Byte Filters Teldat SA
13.6.5 LIST
Displays information related to items in the specified filter list.
Syntax:
Example:
13.6.6 MOVE
Re-orders filter items within the filter list. The filter item whose number is specified by filter-item-number1 moves and
is renumbered so it is moved to just before filter-item-number2 . You can consult the number assigned to each filter
item by using the LIST command.
Syntax:
Example:
150 Bridge
Teldat SA 13 Configuration and Monitoring NetBIOS Name and Byte Filters
13.6.7 EXIT
Exits the name filter list configuration menu.
Syntax:
Example:
Bridge 151
14 Using MAC Filtering Teldat SA
Note
• Filter-item - A single rule for the address field of a packet. The result is either TRUE (the match was successful or
FALSE (the match was not successful).
• Filter-list - Contains a list of one or more filter-items.
• Filter - Contains a set of filter-lists.
Each filter-item specifies an address type (source or destination to match against the type in the packet with the
tokens.
The address mask is a MAC address in hex comparing the packet’s addresses. The mask is applied to the source
destination MAC address of the packet before comparing it against the specified MAC address.
The mask specifies the bytes that are to be logically ANDed with the bytes in the MAC address. It must be of equal
length to the specified MAC address.
• Name: ASCII-string
• Filter-item List: filter-item 1, …, filter-item n
• Action: INCLUDE, EXCLUDE, TAG (n)
152 Bridge
Teldat SA 14 Using MAC Filtering
A filter list is built from one or more filter items. Each filter list is given a unique name.
Applying a filter list to a packet consists of comparing each filter item in the order by which the filter item were added
to the list. If any of the filter items in the list return TRUE (the rule included in the filter item is applicable to the pack-
et), then the filter list returns its designated action (include, exclude or tag the packet).
A filter is constructed by associating a group of filter names with an interface and assigning an input or output desig-
nation. The application of a filter to a packet means that each of the associated filter lists should be applied to pack-
ets being received (input) or sent (output) on the specified interface.
When a filter evaluates a packet to an include condition, the packet is forwarded. When a filter evaluates a packet to
an exclude condition, the packet is dropped. When a filter evaluates to a tag condition, the packet being considered
is forwarded with a tag.
An additional parameter of each filter is the default action which is the result of non-match for all of its filter lists. This
default action is include. It can be set to include, exclude, or tag. In addition, if the default action is tag, a tag value is
also given.
Bandwidth Reservation classification complying with these filters is supported in ATM, Frame Relay, PPP and IP
Tunnel interfaces.
Tagging is done by creating a filter item at the MAC filtering configuration prompt and assigning a tag to it. This tag is
used to set up a bandwidth class for all packets associated with this tag. Tag values must be in the range of 1 to 64.
Supports applying tags only to bridged packets and allows only the MAC address fields of the packet to be used in
applying the tag.
For further information on using tags in bandwidth reservation, please see manual manual Teldat-Dm 715-I “Band-
width Reservation System”.
Tags can also refer to groups as in IP Tunnel. Tunnel end points can belong to any number of groups, and then
packets are assigned to a particular group through the tagging feature of MAC address filtering.
Bridge 153
15 Configuration and Monitoring MAC Filtering Teldat SA
Example:
Config>feature mac-filtering
To access the MAC filter monitoring menu, use the FEATURE MAC-FILTERING command found in the global mon-
itoring menu.
Example:
+feature mac-filtering
Filter+
15.2.1 ? (HELP)
Lists available commands or options.
Syntax:
Filter Config>?
154 Bridge
Teldat SA 15 Configuration and Monitoring MAC Filtering
Example:
Filter Config> ?
attach Add a filter list to a filter
create Create a filter list or a filter
default Set the default action for a filter
delete Delete a command
detach Delete a filter-list name from a filter
disable Disable MAC filtering
enable Enable MAC filtering
list List configuration
move Re-order filter-lists attached to a filter
reinit Reinitializes the MAC filtering system
set-cache Changes the cache size
update Enter the update filter-list menu
exit
Filter config>
15.2.2 ATTACH
Adds a filter list to a filter. A filter is constructed by associating a group of filter lists with an interface. A filter list is
built from one or more filter items.
Syntax:
Example:
15.2.3 CREATE
Creates a filter list or a filter.
Syntax:
Syntax:
Example:
Bridge 155
15 Configuration and Monitoring MAC Filtering Teldat SA
Creates a filter list. This list is identified with a name (Filter-list-name ), a unique string of up to 16 characters.
Syntax:
Example:
15.2.4 DEFAULT
Sets the default action for the filter. If none of the filter lists making up the filter apply to a packet, the default action is
executed.
Syntax:
Filter config>default ?
exclude Set exclude the default action for a filter
include Set include the default action for a filter
tag Set tag the default action for a filter
Filter config>
Syntax:
Example:
Syntax:
Example:
Sets the default action for a filter specified to tag and also configures the default tag value.
Syntax:
Example:
156 Bridge
Teldat SA 15 Configuration and Monitoring MAC Filtering
15.2.5 DELETE
Deletes a previously created filter list or filter.
Syntax:
Filter Config>delete ?
filter Delete a filter
list Delete a filter-list
Filter config>delete
Deletes a filter.
Syntax:
Example:
Removes all information associated with a filter-list including the filter items making up the list. If the filter list is asso-
ciated to a created filter, an error message is displayed and nothing is deleted.
Syntax:
Example 1:
Example 2:
15.2.6 DETACH
Deletes a filter-list name from a filter.
Syntax:
Example:
Deletes the filter list “paris” from the filter with identifier 1.
Bridge 157
15 Configuration and Monitoring MAC Filtering Teldat SA
15.2.7 DISABLE
Disables MAC filtering entirely or disables a particular filter.
Syntax:
Example:
Syntax:
Example:
15.2.8 ENABLE
Enables MAC filtering entirely or enables a particular filter.
Syntax:
Filter config>enable ?
all Enable MAC filtering
filter Enable a particular filter
Filter config>
Syntax:
Syntax:
Example:
158 Bridge
Teldat SA 15 Configuration and Monitoring MAC Filtering
15.2.9 LIST
Displays information relative to the created filters.
Syntax:
Filter Config>list ?
all List all configuration
filter List a particular filter configuration
Filter config>
Lists all the filter lists and filters that you have configured. A list of all the filter lists attached to a filter is not given.
Other information displayed includes:
• Filter Identifier
• Filter default action (TAG, INCLUDE, EXCLUDE). In cases where the default action is tag, the default tag is dis-
played in brackets.
• Filter state (enable, disable)
• Interface to which this is applied.
• Filter address (input, output).
• Cache size.
Example:
Filters
-------
Id Default State Ifc Dir Cache
-- ------- ----- --- --- ------
1 INCLUDE disabled ethernet0/0 output 16
2 EXCLUDE enabled token-ring3/0 input 16
3 TAG( 3) enabled ethernet0/1 input 16
Filter Config>
Displays a list of attached filter-lists for the specified filter and all subsequent information for the filter.
Syntax:
Example:
Bridge 159
15 Configuration and Monitoring MAC Filtering Teldat SA
15.2.10 MOVE
Re-orders the filter-lists attached to a specified filter
Syntax:
Example:
15.2.11 REINIT
Reinitializes the entire MAC filtering system from an existing configuration without needing to reboot the entire
device.
Syntax:
Filter Config>reinit
15.2.12 SET-CACHE
Changes the cache size associated to a filter.
Syntax:
160 Bridge
Teldat SA 15 Configuration and Monitoring MAC Filtering
Example:
Filter Config>set-cache 1 32
Filter Config>
15.2.13 UPDATE
Accesses the filter list configuration menu, permitting you to add or delete filter items from it. For a description of the
commands available in this menu, please see section MAC Filtering List Configuration Commands on page 164 in this
chapter.
The order in which the filter-items are specified for a filter-list is important as it determines the order in which the fil-
ter-items are applied to a packet.
Syntax:
Example:
15.2.14 EXIT
Exits the MAC filtering configuration menu.
Syntax:
Filter Config>exit
Example:
Filter Config>exit
Config>
15.3.1 ? (HELP)
Lists available commands or options.
Syntax:
Filter>?
Example:
Filter+?
Bridge 161
15 Configuration and Monitoring MAC Filtering Teldat SA
15.3.2 CLEAR
Deletes statistics.
Syntax:
Filter+clear ?
all Clears all statistics
filter Clears per filter statistics
Example:
Filter+clear all
Filter+
Deletes statistics associated to a determined filter. This also deletes all statistics for the filter lists associated to the
filter.
Syntax:
Example:
Filter+clear filter 1
Filter>
15.3.3 DISABLE
Disables MAC filtering entirely or disables a particular filter.
Syntax:
Filter+disable ?
all Disables MAC filtering completely
filter Disables a specific MAC filter
Example:
Filter+disable all
Filter+
Syntax:
162 Bridge
Teldat SA 15 Configuration and Monitoring MAC Filtering
Example:
Filter+disable filter 2
Filter+
15.3.4 ENABLE
Enables MAC filtering entirely or enables a particular filter.
Syntax:
Filter+enable ?
all Enables MAC filtering completely
filter Enables a specific MAC filter
Example:
Filter+enable all
Filter+
Syntax:
Example:
Filter+enable filter 1
Filter+
15.3.5 LIST
Displays information on the active filters.
Syntax:
Filter+list ?
all Displays a summary of the MAC filters configured
filter Displays a specific MAC filter configuration
Lists all the filter lists and filters that you have configured. A list of all the filter lists attached to a filter is not given.
• Filter identifier.
• Filter default action: INCLUDE, EXCLUDE or TAG. In cases where the default action is tag, the default tag is
shown in brackets.
• Filter state: enabled or disabled.
• Interface where the filter is applied.
• Filter address: input or output.
• Cache size.
• Number of times that a packet has been filtered as it is in the cache associated to the filter.
• Number of packets included by the filter.
• Number of packets excluded by the filter.
• Number of packets tagged by the filter.
Bridge 163
15 Configuration and Monitoring MAC Filtering Teldat SA
Example:
Filter+list all
MAC Filtering: enabled
Id Default State Interface Dir Cache Hit% Inc Exc Tag
-- ------- ----- -------------- --- ----- ---- --- --- ---
1 EXCLUDE ENA token-ring3/0 IN 32 100.0 0 0 0
2 TAG( 3) DIS serial0/1 IN 16 100.0 0 0 0
3 INCLUDE ENA ethernet0/0 OUT 16 100.0 0 0 0
4 INCLUDE ENA bri0/0 OUT 16 100.0 0 0 0
Filter+
Displays a list of attached filter-lists for the specified filter and all subsequent information for the filter.
The information shown for the filter is the same as that shown through the LIST ALL command. Additionally, the fol-
lowing information is shown for each filter list:
Example:
Filter+list filter 1
Id Default State Interface Dir Cache Hit% Inc Exc Tag
-- ------- ----- -------------- --- ----- ---- --- --- ---
1 EXCLUDE ENA token-ring3/0 IN 32 100.0 0 0 0
Filter Lists:
MemUse Action Name Count
------ ------ ---- -----
92 TAG( 1) mac-filter 0
Filter+
15.3.6 REINIT
Reinitializes the entire MAC filtering system from an existing configuration without needing to reboot the entire device
Syntax:
Filter+reinit
15.3.7 EXIT
Exits the MAC filter monitoring menu.
Syntax:
Filter+exit
Example:
Filter+exit
+
164 Bridge
Teldat SA 15 Configuration and Monitoring MAC Filtering
15.4.1 ? (HELP)
Lists available commands or options.
Syntax:
Example:
15.4.2 ADD
Adds filter-items to a filter-list. This command lets you add a hexadecimal number to compare against the source or
destination MAC address.
The order in which you add filter-items to a filter-list is important as it determines the order in which the filter-items
are applied to a packet.
The first match that occurs stops the application of filter-items, and the filter-list evaluates to include , exclude or tag,
depending on the designated action of the filter-list.
Syntax:
Example 1:
Adding a filter item to filter packets with source address 00-A0-26-00-AC-5x, where x can be any value.
Bridge 165
15 Configuration and Monitoring MAC Filtering Teldat SA
Example 2:
15.4.3 DELETE
Removes filter-items from a filter-list. You delete filter items by specifying the filter-item-number assigned to the item.
You can check the number assigned to each filter item by using the LIST command.
When you delete a filter item, any gap created in the number sequence is filled in. For example, if filter-items 1.2.3
and 4 exist and you delete filter-item 3, then filter-item 4 is renumbered to 3.
Syntax:
Example:
15.4.4 LIST
Displays the filter list configuration. It displays the following information about each filter item.
Syntax:
Displays the filter list configuration, showing the MAC addresses in canonical format
Example:
166 Bridge
Teldat SA 15 Configuration and Monitoring MAC Filtering
Displays the filter list configuration, showing the MAC addresses in non-canonical format
Example:
15.4.5 MOVE
Re-orders filter-items within the filter-list. The filter-item whose number is specified by filter-item-name 1 is moved
and renumbered to be just before filter-item-name 2 . You can check the number assigned to each filter item by using
the LIST command.
Syntax:
Example:
15.4.6 SET-ACTION
Sets the action to be executed by the filter list. If one of the filter-items of the filter-list matches the contents of the
packet being considered for filtering, the filter-list evaluates to this condition. The default is to include.
Syntax:
Bridge 167
15 Configuration and Monitoring MAC Filtering Teldat SA
exclude the action to be executed by the filter list is exclude: if the packet coincides with a
filter item, the packet is dropped.
tag the action to be executed by the filter list is tag: if the packet coincides with a filter
item, a tag is assigned to the packet.
tag-value value between 1 and 64, for the tag to be assigned to a packet in cases where the
action to execute is tag.
Example:
15.4.7 EXIT
Exits the MAC filter list configuration menu.
Syntax:
Example:
168 Bridge
Teldat SA 16 Using Protocol Threading Through a Bridged Network
Threading is no different from the SRB operation. It is how threading is implemented by the end station that is differ-
ent. The following sections describe threading for IP, DNA, IPX, AppleTalk and Apollo.
Bridge 169
16 Using Protocol Threading Through a Bridged Network Teldat SA
(8) The source end station receives the learned specific route path. It puts the RIF into the RIF table and the entry
changes to HAVE_ROUTE .
(9) Packets destined for a functional address are sent with an STE. DNA end stations can create an RIF entry us-
ing this STE frame. When this happens the state of the entry is changed to ST_ROUTE.
The DNA end stations contain an independent RIF timer. When this timer expires for a specific RIF entry, an ARE in
a loop-back packet is sent out to that specific destination. When the loop-back frame returns, the RIF entry is up-
dated. If the destination end station is on the same ring and the loop-back frame contains no RIF, the loop-back
packet is returned with no RIF entry.
The Apollo end stations contain an independent RIF timer. When this timer expires for a specific RIF entry, an STE
with XID packet is sent out to that specific destination. When the XID reply frame returns, the RIF entry is updated. If
the destination end station is on the same ring, the loop-back packet is sent and returned with no RIF entry.
If the end station needs to send out a packet and there is no entry in the RIF table for the MAC address, the end sta-
tion transmits the data as an STE.
When the RIF timer expires, the entry in the table is cleared and won’t be reentered until another packet arrives con-
taining an RIF for that entry.
170 Bridge
Teldat SA 16 Using Protocol Threading Through a Bridged Network
other ARP REQUEST packets from the same source, it drops that packet.
(5) The destination end station then generates an ARP REPLY packet including the RIF and sends it back to the
source end station with the direction bit in the RIF flipped.
(6) The source end station receives the learned route path. The MAC address and its RIF are then entered into the
ARP and RIF tables and the state designated as HAVE_ROUTE. If the RIF indicates that the packet came from
an end station on the local ring, the route is designated as ON_RING.
(7) If the RIF timer expires, an XID is sent out with an RE and the state is changed to DISCOVERING. If no XID
reply is received, the entry is discarded.
Bridge 171