S8 Manuale 2
S8 Manuale 2
Configuration Guide
Firmware Version 7.41
P/N 9034505-06
Notice
Enterasys Networks reserves the right to make changes in specifications and other information contained in this document and its web site without prior notice. The reader should in all cases consult Enterasys Networks to determine whether any such changes have been made. The hardware, firmware, or software described in this document is subject to change without notice. IN NO EVENT SHALL ENTERASYS NETWORKS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS DOCUMENT, WEB SITE, OR THE INFORMATION CONTAINED IN THEM, EVEN IF ENTERASYS NETWORKS HAS BEEN ADVISED OF, KNEW OF, OR SHOULD HAVE KNOWN OF, THE POSSIBILITY OF SUCH DAMAGES. Enterasys Networks, Inc. 50 Minuteman Road Andover, MA 01810 2011 Enterasys Networks, Inc. All rights reserved. Part Number: 9034505-06 November 2011 ENTERASYS, ENTERASYS NETWORKS, ENTERASYS SECURE NETWORKS, ENTERASYS S-SERIES, ENTERASYS NETSIGHT, LANVIEW, WEBVIEW, and any logos associated therewith, are trademarks or registered trademarks of Enterasys Networks, Inc., in the United States and/or other countries. For a complete list of Enterasys trademarks, see http://www.enterasys.com/company/trademarks.aspx. All other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies. Documentation URL: https://extranet.enterasys.com/downloads
ii
Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Cambodia, Cuba, Georgia, Iraq, Kazakhstan, Laos, Libya, Macau, Moldova, Mongolia, North Korea, the Peoples Republic of China, Russia, Tajikistan, Turkmenistan, Ukraine, Uzbekistan, Vietnam, or such other countries as may be designated by the United States Government), (ii) export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the technology, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a complete plant or any major component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S. Munitions List. 5. UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Program (i) was developed solely at private expense; (ii) contains restricted computer software submitted with restricted rights in accordance with section 52.227-19 (a) through (d) of the Commercial Computer Software-Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data belonging to Enterasys and/or its suppliers. For Department of Defense units, the Program is considered commercial computer software in accordance with DFARS section 227.7202-3 and its successors, and use, duplication, or disclosure by the U.S. Government is subject to restrictions set forth herein. 6. DISCLAIMER OF WARRANTY. EXCEPT FOR THOSE WARRANTIES EXPRESSLY PROVIDED TO YOU IN WRITING BY ENTERASYS, ENTERASYS DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT WITH RESPECT TO THE PROGRAM. IF IMPLIED WARRANTIES MAY NOT BE DISCLAIMED BY APPLICABLE LAW, THEN ANY IMPLIED WARRANTIES ARE LIMITED IN DURATION TO THIRTY (30) DAYS AFTER DELIVERY OF THE PROGRAM TO YOU. 7. LIMITATION OF LIABILITY. IN NO EVENT SHALL ENTERASYS OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, EVEN IF ENTERASYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS FOREGOING LIMITATION SHALL APPLY REGARDLESS OF THE CAUSE OF ACTION UNDER WHICH DAMAGES ARE SOUGHT. THE CUMULATIVE LIABILITY OF ENTERASYS TO YOU FOR ALL CLAIMS RELATING TO THE PROGRAM, IN CONTRACT, TORT OR OTHERWISE, SHALL NOT EXCEED THE TOTAL AMOUNT OF FEES PAID TO ENTERASYS BY YOU FOR THE RIGHTS GRANTED HEREIN. 8. AUDIT RIGHTS. You hereby acknowledge that the intellectual property rights associated with the Program are of critical value to Enterasys, and, accordingly, You hereby agree to maintain complete books, records and accounts showing (i) license fees due and paid, and (ii) the use, copying and deployment of the Program. You also grant to Enterasys and its authorized representatives, upon reasonable notice, the right to audit and examine during Your normal business hours, Your books, records, accounts and hardware devices upon which the Program may be deployed to verify compliance with this Agreement, including the verification of the license fees due and paid Enterasys and the use, copying and deployment of the Program. Enterasys right of examination shall be exercised reasonably, in good faith and in a manner calculated to not unreasonably interfere with Your business. In the event such audit discovers non-compliance with this Agreement, including copies of the Program made, used or deployed in breach of this Agreement, You shall promptly pay to Enterasys the appropriate license fees. Enterasys reserves the right, to be exercised in its sole discretion and without prior notice, to terminate this license, effective immediately, for failure to comply with this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return to Enterasys the Program and all copies of the Program. 9. OWNERSHIP. This is a license agreement and not an agreement for sale. You acknowledge and agree that the Program constitutes trade secrets and/or copyrighted material of Enterasys and/or its suppliers. You agree to implement reasonable security measures to protect such trade secrets and copyrighted material. All right, title and interest in and to the Program shall remain with Enterasys and/or its suppliers. All rights not specifically granted to You shall be reserved to Enterasys. 10. ENFORCEMENT. You acknowledge and agree that any breach of Sections 2, 4, or 9 of this Agreement by You may cause Enterasys irreparable damage for which recovery of money damages would be inadequate, and that Enterasys may be entitled to seek timely injunctive relief to protect Enterasys rights under this Agreement in addition to any and all remedies available at law. 11. ASSIGNMENT. You may not assign, transfer or sublicense this Agreement or any of Your rights or obligations under this Agreement, except that You may assign this Agreement to any person or entity which acquires substantially all of Your stock assets. Enterasys may assign this Agreement in its sole discretion. This Agreement shall be binding upon and inure to the benefit of the parties, their legal representatives, permitted transferees, successors and assigns as permitted by this Agreement. Any attempted assignment, transfer or sublicense in violation of the terms of this Agreement shall be void and a breach of this Agreement.
iii
12. WAIVER. A waiver by Enterasys of a breach of any of the terms and conditions of this Agreement must be in writing and will not be construed as a waiver of any subsequent breach of such term or condition. Enterasys failure to enforce a term upon Your breach of such term shall not be construed as a waiver of Your breach or prevent enforcement on any other occasion. 13. SEVERABILITY. In the event any provision of this Agreement is found to be invalid, illegal or unenforceable, the validity, legality and enforceability of any of the remaining provisions shall not in any way be affected or impaired thereby, and that provision shall be reformed, construed and enforced to the maximum extent permissible. Any such invalidity, illegality, or unenforceability in any jurisdiction shall not invalidate or render illegal or unenforceable such provision in any other jurisdiction. 14. TERMINATION. Enterasys may terminate this Agreement immediately upon Your breach of any of the terms and conditions of this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return to Enterasys the Program and all copies of the Program.
iv
Contents
About This Guide
How to Use This Guide ................................................................................................................................. xxvii Related Documents ...................................................................................................................................... xxvii Conventions Used in This Guide .................................................................................................................. xxvii Commonly Used Acronyms ......................................................................................................................... xxviii Getting Help ................................................................................................................................................. xxviii
Configuring Link Traps and Link Flap Detection ...................................................................................... 4-8 Port Broadcast Suppression .................................................................................................................. 4-10 Port Priority ............................................................................................................................................ 4-10 Port Priority to Transmit Queue Mapping ............................................................................................... 4-10 Configuring Ports .......................................................................................................................................... 4-11 Terms and Definitions ................................................................................................................................... 4-15
Unicast Polling Mode ............................................................................................................................. 7-11 Broadcast Listening Mode ...................................................................................................................... 7-12 SNTP Authentication .............................................................................................................................. 7-12 Configuring SNTP .................................................................................................................................. 7-13 SNTP Configuration Examples .............................................................................................................. 7-15 Telnet Overview ............................................................................................................................................ 7-17 Configuring Telnet .................................................................................................................................. 7-17 Telnet Examples .................................................................................................................................... 7-18 Secure Shell Overview ................................................................................................................................. 7-18 Configuring Secure Shell ....................................................................................................................... 7-19 Secure Shell Configuration Examples .................................................................................................... 7-19 Domain Name Server (DNS) Overview ........................................................................................................ 7-19 Configuring DNS .................................................................................................................................... 7-20 DNS Configuration Example .................................................................................................................. 7-21 DHCP Overview ........................................................................................................................................... 7-22 DHCP Supported Options ...................................................................................................................... 7-22 Configuring DHCP .................................................................................................................................. 7-23 DHCP Server ......................................................................................................................................... 7-25 Node Alias Overview .................................................................................................................................... 7-27 Configuring Node Alias .......................................................................................................................... 7-27 Setting Node Alias State and Max Entries ............................................................................................. 7-28 MAC Address Settings Overview ................................................................................................................. 7-29 Age Time ................................................................................................................................................ 7-29 Multicast MAC Address VLAN Port Limit ............................................................................................... 7-30 Static MAC Address Entry ...................................................................................................................... 7-30 Unicast as Multicast ............................................................................................................................... 7-30 New and Moved MAC Address Detection .............................................................................................. 7-31 Terms and Definitions ................................................................................................................................... 7-32
vii
IPsec Configuration .................................................................................................................................. 9-9 IPsec Display Commands ...................................................................................................................... 9-10 IPsec Configuration Example ....................................................................................................................... 9-10 Terms and Definitions ................................................................................................................................... 9-12
viii
ix
Configuring MSTP ...................................................................................................................................... 15-18 Example: Simple MSTP Configuration ................................................................................................. 15-19 Adjusting MSTP Parameters ................................................................................................................ 15-19 Monitoring MSTP ................................................................................................................................. 15-20 Understanding and Configuring SpanGuard .............................................................................................. 15-20 What Is SpanGuard? ............................................................................................................................ 15-20 How Does It Operate? .......................................................................................................................... 15-21 Configuring SpanGuard ....................................................................................................................... 15-21 Understanding and Configuring Loop Protect ............................................................................................ 15-22 What Is Loop Protect? .......................................................................................................................... 15-22 How Does It Operate? .......................................................................................................................... 15-22 Configuring Loop Protect ..................................................................................................................... 15-25 Terms and Definitions ................................................................................................................................. 15-27
xi
xii
Traffic Forwarding IP Static Routes ..................................................................................................... 25-12 Traffic Non-Forwarding IP Static Routes .............................................................................................. 25-14 IPv6 Neighbor Discovery ............................................................................................................................ 25-16 Duplicate Address Detection ................................................................................................................ 25-16 Neighbor Unreachability Detection ....................................................................................................... 25-16 IPv6 Address Autoconfiguration ........................................................................................................... 25-17 Managed Address Configuration .......................................................................................................... 25-17 Binding an IPv6 Address to a MAC Hardware Address ....................................................................... 25-17 Configuring IPv6 Neighbor Discovery ......................................................................................................... 25-18 Configuring IPv6 ICMP ............................................................................................................................... 25-19 DHCPv6 Relay Agent ................................................................................................................................. 25-19 The ARP Table ........................................................................................................................................... 25-20 Gratuitous ARP .................................................................................................................................... 25-21 Proxy ARP ............................................................................................................................................ 25-21 Removing the Multicast ARP Restriction ............................................................................................. 25-21 ARP Configuration Examples ............................................................................................................... 25-22 IP Broadcast ............................................................................................................................................... 25-24 Directed Broadcast ............................................................................................................................... 25-24 Directed Broadcast Configuration Example ......................................................................................... 25-24 UDP Broadcast Forwarding ................................................................................................................. 25-24 UDP Broadcast Configuration Examples ............................................................................................. 25-24 DHCP and BOOTP Relay .................................................................................................................... 25-25 DHCP/BOOTP Relay Configuration Example ...................................................................................... 25-26 Router Management and Information Display ............................................................................................ 25-26 IP Debug ..................................................................................................................................................... 25-29 Terms and Definitions ................................................................................................................................. 25-30
xiii
xiv
Multi-Exit Discriminator (MED) ............................................................................................................... 31-8 Route Aggregation ................................................................................................................................. 31-9 Source IP Address Update to the Peer ................................................................................................ 31-10 Scalability and the Peer Full Mesh Requirement ................................................................................. 31-10 Outbound Route Filtering (ORF) .......................................................................................................... 31-12 Conditional Advertisement ................................................................................................................... 31-13 BGP Soft Reset .................................................................................................................................... 31-14 Community and Extended Community Attributes ................................................................................ 31-15 Graceful Restart ................................................................................................................................... 31-17 Configuring BGP ......................................................................................................................................... 31-19 Configuring Basic BGP Router Parameters ......................................................................................... 31-21 Configuring BGP Route Injection ......................................................................................................... 31-23 Configuring External BGP Basic Peering ............................................................................................. 31-23 Configuring Internal BGP Basic Peering .............................................................................................. 31-25 Configuring Multihop EBGP Basic Peering .......................................................................................... 31-27 Configuring BGP Neighbor Parameters ............................................................................................... 31-30 Configuring Source IP Address Update ............................................................................................... 31-32 Configuring BGP Confederations ......................................................................................................... 31-33 Configuring Route Reflection ............................................................................................................... 31-36 Configuring Outbound Route Filtering (ORF) ....................................................................................... 31-40 Configuring Conditional Advertisement ................................................................................................ 31-40 Configuring BGP Soft Reset ................................................................................................................ 31-43 Configuring Graceful Restart ................................................................................................................ 31-43 BGP Monitoring and Clearing .............................................................................................................. 31-44 Terms and Definitions ................................................................................................................................. 31-44
xv
Configuring an LSNAT Real Server ..................................................................................................... 33-11 Configuring an LSNAT Virtual Server .................................................................................................. 33-11 Configuring Global Settings ................................................................................................................. 33-13 Displaying LSNAT Configuration Information and Statistics ................................................................ 33-13 LSNAT Configuration Example ................................................................................................................... 33-14 Product-Based and Enterprise Internal Domains ................................................................................. 33-14 Server Farms ....................................................................................................................................... 33-14 Configuring the myproductHTTP Server Farm and Real Servers ........................................................ 33-17 Configuring myproduct-80 Virtual Server ............................................................................................. 33-18 Configuring the myproductFTP Server Farm and Real Servers .......................................................... 33-18 Configuring myproduct-21 Virtual Server ............................................................................................. 33-19 Configuring the myinternalHTTP Server Farm and Real Servers ........................................................ 33-19 Configuring myinternal-80 Virtual Server ............................................................................................. 33-20 Configuring the myinternalFTP Server Farm Real Servers .................................................................. 33-20 Configuring myinternal-21 Virtual Server ............................................................................................. 33-21 Configuring the myinternalSMTP Server Farm and Real Servers ....................................................... 33-21 Configuring myinternal-25 Virtual Server ............................................................................................. 33-22 Terms and Definitions ................................................................................................................................. 33-23
xvi
xvii
Assigning a Policy Route-Map to an Interface ....................................................................................... 39-8 Configuring Route-Map Manager ................................................................................................................. 39-9 Route-Map Manager Configuration Examples ........................................................................................... 39-15 Policy Based Route-Map Example ....................................................................................................... 39-15 Redistribution Route-Map Example ..................................................................................................... 39-16 BGP Route-Map Example .................................................................................................................... 39-17 Terms and Definitions ................................................................................................................................. 39-17
xviii
Procedures
1-1 3-1 3-2 3-3 4-1 4-2 5-1 6-1 7-1 7-2 7-3 7-4 7-5 7-6 7-7 7-8 7-9 7-10 7-11 7-12 7-13 9-1 9-2 9-3 9-4 10-1 11-1 Initial Setup......................................................................................................................................... 1-2 Executing the Configuration Restore-Point ........................................................................................ 3-2 Deleting the Configuration Restore-Point ........................................................................................... 3-3 Running a Configuration Script........................................................................................................... 3-8 Configuring Ports.............................................................................................................................. 4-12 Configuring Link Trap and Link Flap Detection ................................................................................ 4-13 Configuring OAM .............................................................................................................................. 5-10 Configuring a Static LAG for an IDS Mirror ...................................................................................... 6-12 User Management Configuration........................................................................................................ 7-5 Authentication Configuration .............................................................................................................. 7-8 WebView Configuration ...................................................................................................................... 7-8 Management Authentication Notification MIB Configuration .............................................................. 7-9 License Configuration....................................................................................................................... 7-11 Configuring SNTP............................................................................................................................. 7-14 Telnet Configuration ......................................................................................................................... 7-17 SSH Configuration............................................................................................................................ 7-19 Configuring DNS Resolution............................................................................................................. 7-20 Enabling the DHCP Server and Configuring Automatic Address Assignment.................................. 7-23 Client Configuration .......................................................................................................................... 7-24 Configuring Node Alias ..................................................................................................................... 7-27 Configuring MAC Address Settings .................................................................................................. 7-31 Configuring an IKE Proposal .............................................................................................................. 9-7 Configuring an IKE Policy ................................................................................................................... 9-8 Configuring an IKE Map ..................................................................................................................... 9-8 Configuring IPsec ............................................................................................................................... 9-9 Probe Configuration........................................................................................................................ 10-13 PoE Configuration ............................................................................................................................ 11-4
xix
12-1 14-1 14-2 14-3 14-4 15-1 16-1 16-2 16-3 16-4 16-5 17-1 18-1 18-2 19-1 19-2 19-3 20-1 21-1 21-2 22-1 22-2 23-1 24-1 25-1 25-2 25-3 25-4 25-5 25-6 25-7 26-1 27-1 28-1 29-1 29-2 29-3 30-1 31-1 31-2 31-3 31-4 31-5 31-6 31-7 31-8 31-9 31-10 32-1 32-2 33-1 33-2 33-3 34-1 34-2 34-3
xx
Configuring LLDP (Enterasys S-Series) ........................................................................................... 12-9 New SNMPv1/v2c Configuration ...................................................................................................... 14-9 SNMPv3 Configuration ................................................................................................................... 14-11 Configuring an EngineID ................................................................................................................ 14-14 Configuring Secure Community Names ......................................................................................... 14-18 Configuring Switches 1 and 2 for Simple MSTP............................................................................. 15-19 Static VLAN Configuration .............................................................................................................. 16-10 Secure Management VLAN Configuration ..................................................................................... 16-13 Dynamic VLAN Configuration ......................................................................................................... 16-13 Configuring Protocol-Based VLAN Classification ........................................................................... 16-14 IGMP Snooping for a VLAN Configuration ..................................................................................... 16-15 Configuring Link Aggregation ......................................................................................................... 17-10 Configuring Policy Roles ................................................................................................................ 18-13 Configuring Classification Rules ..................................................................................................... 18-16 Basic IGMP Configuration .............................................................................................................. 19-19 Basic DVMRP Configuration .......................................................................................................... 19-21 Basic PIM Configuration ................................................................................................................. 19-24 Basic MLD Configuration .................................................................................................................. 20-6 Configuring a Server and Console Logging.................................................................................... 21-11 Adjusting Settings for an Application .............................................................................................. 21-12 Configuring SMON ......................................................................................................................... 22-10 Configuring Remote Network Monitoring........................................................................................ 22-11 Configuring NetFlow on S-Series Systems .................................................................................... 23-10 VRF Configuration .......................................................................................................................... 24-12 Configuring the Routing Interface ................................................................................................... 25-11 Configuring Non-forward IP Static Routes...................................................................................... 25-15 Configuring an IPv6 Static Neighbor Discovery Cache Entry ......................................................... 25-18 Configuring IPv6 ICMP ................................................................................................................... 25-19 Configuring the DHCPv6 Relay Agent............................................................................................ 25-20 Configuring the ARP Table ............................................................................................................. 25-22 Configuring IP Broadcast................................................................................................................ 25-25 Layer 3 Tunneling Configuration ...................................................................................................... 26-5 Configuring RIP ................................................................................................................................ 27-4 Configuring RIPng ............................................................................................................................ 28-4 Configuring Basic OSPF Parameters ............................................................................................. 29-22 Configuring OSPF General Optional Parameters........................................................................... 29-22 Configuring OSPF Optional Interface Parameters ......................................................................... 29-24 Configuring Basic OSPFv3 Parameters ......................................................................................... 30-25 Configuring Basic BGP ................................................................................................................... 31-22 Configuring BGP Route Injection.................................................................................................... 31-23 EBGP Basic Peering Configuration ................................................................................................ 31-25 IBGP Basic Peering Configuration ................................................................................................. 31-27 Multihop BGP Basic Peering Configuration .................................................................................... 31-30 Configuring Source IP Address to the Peer Update ....................................................................... 31-33 Configuring BGP Confederation ..................................................................................................... 31-36 Configuring BGP Route Reflection ................................................................................................. 31-39 Configuring BGP Conditional Route Advertisement ....................................................................... 31-43 Configuring Graceful Restart .......................................................................................................... 31-43 Traditional NAT Static Configuration ................................................................................................ 32-9 Traditional NAT Dynamic Configuration ........................................................................................... 32-9 LSNAT Server Farm Configuration................................................................................................. 33-10 Configuring an LSNAT Real Server................................................................................................ 33-11 Configuring an LSNAT Virtual Server ............................................................................................. 33-11 TWCB Server Farm Configuration.................................................................................................... 34-8 TWCB Cache Server Configuration.................................................................................................. 34-8 TWCB Web-Cache Configuration..................................................................................................... 34-9
35-1 36-1 36-2 36-3 36-4 37-1 38-1 38-2 38-3 38-4 38-5 38-6 38-7 39-1 39-2 39-3 39-4 40-1 41-1 42-1 42-2 42-3 42-4 42-5 42-6 42-7 42-8 42-9 42-10 42-11 42-12 42-13 42-14 42-15
Configuring VRRP ............................................................................................................................ 35-6 MAC Locking Configuration .............................................................................................................. 36-8 SSH Configuration............................................................................................................................ 36-9 TACACS+ Configuration................................................................................................................. 36-10 Host DoS Configuration .................................................................................................................. 36-11 Configuring FST ............................................................................................................................... 37-5 Creating and Managing IPv4 and IPv6 ACLs ................................................................................... 38-8 Entering and Managing Standard IPv4 ACL Rules .......................................................................... 38-9 Entering and Managing Standard IPv6 ACL Rules .......................................................................... 38-9 Entering and Managing Extended IPv4 ACL Rules .......................................................................... 38-9 Entering and Managing Extended IPv6 ACL Rules ........................................................................ 38-11 Managing IPv4 and IPv6 ACL Rules .............................................................................................. 38-12 Applying and Displaying ACLs ....................................................................................................... 38-13 Configuring a Policy Based Route-Map............................................................................................ 39-9 Configuring a Redistribution Route-Map ........................................................................................ 39-10 Configuring a Filter Route-Map ...................................................................................................... 39-11 Configuring a BGP Route-Map ....................................................................................................... 39-12 Class of Service CLI Configuration Command Summary............................................................... 40-24 RADIUS-Snooping Configuration ..................................................................................................... 41-5 IEEE 802.1x Configuration ............................................................................................................. 42-15 MAC-Based Authentication Configuration ...................................................................................... 42-16 Port Web Authentication (PWA) Configuration ............................................................................... 42-17 CEP Detection Group Configuration............................................................................................... 42-18 CEP Configuration.......................................................................................................................... 42-18 DNS and DHCP Spoofing Configuration ........................................................................................ 42-19 MultiAuth Authentication Configuration .......................................................................................... 42-19 MultiAuth Authentication Precedence Configuration ...................................................................... 42-20 MultiAuth Authentication Port and Maximum User Properties Configuration ................................. 42-21 MultiAuth Authentication Timers Configuration .............................................................................. 42-21 MultiAuth Authentication Traps Configuration ................................................................................ 42-22 VLAN Authorization Configuration .................................................................................................. 42-23 Policy Profile Assignment and Invalid Action Configuration ........................................................... 42-23 Authentication Server Configuration ............................................................................................... 42-24 RADIUS Accounting Configuration ................................................................................................. 42-25
Figures
5-1 5-2 5-3 5-4 5-5 6-1 6-2 12-1 12-2 12-3 13-1 15-1 15-2 15-3 15-4 15-5 15-6 15-7 15-8 Frame Link Monitor Option ................................................................................................................. 5-4 Frame-Seconds Link Monitor Option .................................................................................................. 5-5 Frame-Period Link Monitor Option ..................................................................................................... 5-6 Symbol-Period Link Monitor Option .................................................................................................... 5-7 Remote Loopback .............................................................................................................................. 5-8 Using Port Mirroring to Monitor a Departmental Switch ..................................................................... 6-2 Using Port Mirroring to Monitor Incoming Traffic to a Backbone Switch............................................. 6-3 Communication between LLDP-enabled Devices ............................................................................ 12-3 LLDP-MED ....................................................................................................................................... 12-5 Frame Format ................................................................................................................................... 12-6 Enhanced Transmission Selection (ETS) Queuing .......................................................................... 13-2 Redundant Link Causes a Loop in a Non-STP Network .................................................................. 15-2 Loop Avoided When STP Blocks a Duplicate Path .......................................................................... 15-2 Example of an MST Region.............................................................................................................. 15-9 MSTI 1 in a Region ......................................................................................................................... 15-11 MSTI 2 in the Same Region ........................................................................................................... 15-11 Example of Multiple Regions and MSTIs........................................................................................ 15-12 MSTP Sample Network Configuration ............................................................................................ 15-19 Basic Loop Protect Scenario .......................................................................................................... 15-24
xxi
15-9 15-10 16-1 16-2 16-3 17-1 17-2 17-3 17-4 18-1 19-1 19-2 19-3 19-4 19-5 19-6 19-7 19-8 20-1 20-2 21-1 23-1 23-2 24-1 24-2 24-3 26-1 29-1 29-2 29-3 29-4 29-5 29-6 29-7 29-8 30-1 30-2 30-3 30-4 30-5 30-6 30-7 31-1 31-2 31-3 31-4 31-5 31-6 31-7 31-8 32-1 32-2 32-3 32-4 32-5 32-6
xxii
Spanning Tree Without Loop Protect ............................................................................................. 15-24 Spanning Tree with Loop Protect ................................................................................................... 15-24 VLAN Business Scenario ................................................................................................................. 16-2 Inside the Switch .............................................................................................................................. 16-6 Example of VLAN Propagation Using GVRP ................................................................................... 16-8 LAG Formation ................................................................................................................................. 17-4 LAGs Moved to Attached State ........................................................................................................ 17-6 Example 1 Multiple Device Configuration ....................................................................................... 17-12 Example 2 Configuration ................................................................................................................ 17-17 College-Based Policy Configuration ............................................................................................... 18-19 IGMP Querier Determining Group Membership ............................................................................... 19-3 Sending a Multicast Stream with No Directly Attached Hosts .......................................................... 19-4 DVMRP Pruning and Grafting ........................................................................................................ 19-10 PIM Traffic Flow.............................................................................................................................. 19-11 Anycast-RP Configuration .............................................................................................................. 19-16 DVMRP Configuration on Two Routers .......................................................................................... 19-21 PIM-SM Configuration with Bootstrap Router and Candidate RPs ................................................ 19-26 PIM-SSM Configuration .................................................................................................................. 19-30 MLD Querier Determining Group Membership ................................................................................. 20-3 Sending a Multicast Stream with No Directly Attached Hosts .......................................................... 20-4 Basic Syslog Scenario ...................................................................................................................... 21-5 NetFlow Network Profile Example .................................................................................................... 23-2 Flow Expiration Timers ..................................................................................................................... 23-4 VRF Overview .................................................................................................................................. 24-3 NAT-Inside-VRF Configuration for Overlapping IP Networks ........................................................... 24-6 Sharing SLB Services With Multiple VRFs ..................................................................................... 24-11 Layer 3 Tunnel Configuration Example ............................................................................................ 26-7 Basic OSPF Topology ...................................................................................................................... 29-5 OSPF Router ID Topology................................................................................................................ 29-6 OSPF Designated Router Topology ................................................................................................. 29-8 OSPF Summarization Topology ..................................................................................................... 29-11 OSPF Stub Area Topology ............................................................................................................. 29-13 OSPF NSSA Topology ................................................................................................................... 29-15 Virtual Link Topology ...................................................................................................................... 29-16 Physical and Logical Single Router HA Failover Configuration ...................................................... 29-19 Basic OSPF Topology ...................................................................................................................... 30-7 OSPF Designated Router Topology ................................................................................................. 30-9 OSPF Summarization Topology ..................................................................................................... 30-12 OSPF Stub Area Topology ............................................................................................................. 30-14 OSPF NSSA Topology ................................................................................................................... 30-15 Virtual-Link Topology ...................................................................................................................... 30-18 Physical and Logical Single Router HA Failover Configuration ...................................................... 30-22 BGP Topology .................................................................................................................................. 31-4 Basic EBGP Peering Topology....................................................................................................... 31-23 Basic IBGP Peering Topology ........................................................................................................ 31-25 EBGP Multihop Peering Topology .................................................................................................. 31-28 Source IP Address to a Remote Peer ............................................................................................ 31-32 BGP Confederation Example Topology.......................................................................................... 31-34 BGP Route Reflection Example Topology...................................................................................... 31-37 BGP Conditional Advertisement Example Topology ...................................................................... 31-41 Basic NAT Static Address Translation.............................................................................................. 32-4 Basic NAPT Static Address Translation ........................................................................................... 32-4 Basic NAT Dynamic Address Translation......................................................................................... 32-6 Basic NAPT Dynamic Inside Address Translation............................................................................ 32-7 NAT Static Configuration Example ................................................................................................. 32-12 NAT Dynamic Configuration Example ............................................................................................ 32-13
33-1 33-2 33-3 34-1 34-2 34-3 35-1 35-2 35-3 35-4 36-1 37-1 40-1 40-2 40-3 40-4 40-5 40-6 40-7 41-1 41-2 42-1 42-2 42-3 42-4
LSNAT Overview .............................................................................................................................. 33-2 LSNAT Packet Flow ......................................................................................................................... 33-4 LSNAT Configuration Example....................................................................................................... 33-16 TWCB Configuration Overview......................................................................................................... 34-3 Predictor Round-Robin Overview ..................................................................................................... 34-4 TWCB Configuration Example Overview........................................................................................ 34-11 A Basic VRRP Topology................................................................................................................... 35-2 Critical-IP Address Configuration ..................................................................................................... 35-4 Basic Configuration Example ........................................................................................................... 35-8 Multi-Backup VRRP Configuration Example .................................................................................... 35-9 Blocking Unauthorized Access with MAC Locking ........................................................................... 36-4 FST Configuration Example Overview ........................................................................................... 37-10 Assigning and Marking Traffic with a Priority.................................................................................... 40-5 Strict Priority Queuing Packet Behavior ........................................................................................... 40-6 Weighted Fair Queuing Packet Behavior ......................................................................................... 40-7 Hybrid Queuing Packet Behavior ..................................................................................................... 40-8 Rate Limiting Clipping Behavior ....................................................................................................... 40-9 Rate Shaping Smoothing Behavior .................................................................................................. 40-9 QoS Configuration Example ........................................................................................................... 40-27 RADIUS-Snooping Overview............................................................................................................ 41-4 RADIUS-Snooping Configuration Example Overview ...................................................................... 41-7 Applying Policy to Multiple Users on a Single Port ........................................................................... 42-5 Authenticating Multiple Users With Different Methods on a Single Port ........................................... 42-6 Selecting Authentication Method When Multiple Methods are Validated ......................................... 42-7 Authentication Configuration Example Overview ........................................................................... 42-27
Tables
1-1 2-1 2-2 3-1 4-1 4-2 4-3 4-4 5-1 5-2 5-3 5-4 7-1 7-2 7-3 7-4 7-5 7-6 7-7 7-8 7-9 7-10 7-11 7-12 7-13 8-1 8-2 8-3 Advanced Configuration ..................................................................................................................... 1-2 CLI Properties Configuration Commands ........................................................................................... 2-4 CLI Properties Show Commands ....................................................................................................... 2-5 Configuration and Image File Management and Display Commands ................................................ 3-9 Default Port Parameters ................................................................................................................... 4-11 Managing Port Configuration............................................................................................................ 4-13 Displaying Port Configuration Information and Statistics.................................................................. 4-14 Port Configuration Terms and Definitions......................................................................................... 4-15 Frame-Period Window Values ............................................................................................................ 5-5 Symbol-Period Window Values .......................................................................................................... 5-6 Default Ethernet OAM Configuration Settings .................................................................................... 5-9 OAM Configuration Terms and Definitions ....................................................................................... 5-11 Default System Parameters................................................................................................................ 7-1 System Properties Configuration ........................................................................................................ 7-2 System Properties Management and Display Commands ................................................................. 7-3 User Account Management and Display Commands ......................................................................... 7-6 Default SNTP Parameters ................................................................................................................ 7-13 Managing and Displaying SNTP....................................................................................................... 7-15 Default DNS Parameters .................................................................................................................. 7-20 Managing DNS Resolution ............................................................................................................... 7-21 Default DHCP Parameters ............................................................................................................... 7-23 Configuring Static IP Address Assignment ....................................................................................... 7-24 Managing and Displaying DHCP ...................................................................................................... 7-25 Managing Node Alias ....................................................................................................................... 7-27 System Configuration Terms and Definitions ................................................................................... 7-32 Security Profile Mode Command Parameter Default Setting Changes .............................................. 8-3 Security Profile Mode Command Parameter Range Changes ........................................................... 8-4 Security Profile mode Command Access Changes ............................................................................ 8-4
xxiii
8-4 8-5 8-6 8-7 8-8 9-1 9-2 9-3 9-4 10-1 10-2 10-3 11-1 11-2 11-3 12-1 12-2 12-3 12-4 12-5 12-6 13-1 13-2 14-1 14-2 14-3 14-4 15-1 15-2 15-3 15-4 15-5 15-6 15-7 15-8 15-9 16-1 16-2 16-3 17-1 17-2 17-3 17-4 17-5 17-6 17-7 17-8 18-1 18-2 18-3 18-4 18-5 19-1 19-2 19-3 19-4
xxiv
Read-Write Functionality Not Accessible in C2 Security Profile Mode ............................................... 8-4 Read-Only Functionality Not Accessible in C2 Security Profile Mode ................................................ 8-6 Configuring Security Mode on the Device .......................................................................................... 8-6 Security Mode Show Commands ....................................................................................................... 8-7 Security Mode Configuration Terms and Definitions .......................................................................... 8-7 IKE Proposal Parameters ................................................................................................................... 9-4 IKE Policy Parameters........................................................................................................................ 9-5 IPsec Show Commands ................................................................................................................... 9-10 IPsec Configuration Terms and Definitions ...................................................................................... 9-12 Preset Default ICMP Probes ............................................................................................................ 10-6 Default Tracked Object Manager Parameters ................................................................................ 10-12 Tracked Object Manager Terms and Definitions ............................................................................ 10-14 PoE Powered Device Classes .......................................................................................................... 11-2 Default PoE Parameter Values......................................................................................................... 11-3 PoE Show Commands ..................................................................................................................... 11-7 LLDP Configuration Commands ....................................................................................................... 12-7 LLDP Show Commands ................................................................................................................. 12-10 Enterasys Discovery Protocol Configuration Commands ............................................................... 12-11 Enterasys Discovery Protocol Show Commands ........................................................................... 12-11 Cisco Discovery Protocol Configuration Commands ...................................................................... 12-12 Cisco Discovery Protocol Show Commands .................................................................................. 12-12 Data Center Bridging Configuration.................................................................................................. 13-3 Data Center Bridging Display Commands ........................................................................................ 13-4 SNMP Message Functions ............................................................................................................... 14-3 SNMP Terms and Definitions ........................................................................................................... 14-5 SNMP Security Models and Levels .................................................................................................. 14-7 Default Enterasys SNMP Configuration ........................................................................................... 14-9 Spanning Tree Port Roles ................................................................................................................ 15-7 Spanning Tree Port States ............................................................................................................... 15-7 MSTI Characteristics for Figure 15-6.............................................................................................. 15-12 Spanning Tree Port Default Settings .............................................................................................. 15-14 BPDU Interval Defaults................................................................................................................... 15-15 Commands for Monitoring MSTP ................................................................................................... 15-20 Commands for Monitoring SpanGuard ........................................................................................... 15-22 Commands for Monitoring Loop Protect ......................................................................................... 15-26 Spanning Tree Terms and Definitions ............................................................................................ 15-27 Default VLAN Parameters ................................................................................................................ 16-9 Displaying VLAN Information.......................................................................................................... 16-16 VLAN Terms and Definitions .......................................................................................................... 16-16 LAG2 Port Priority Assignments ....................................................................................................... 17-5 LAG Port Parameters ....................................................................................................................... 17-7 Enterasys Platform LAG Support ..................................................................................................... 17-9 Default Link Aggregation Parameters............................................................................................... 17-9 Managing Link Aggregation............................................................................................................ 17-10 Displaying Link Aggregation Information and Statistics.................................................................. 17-11 LAG and Physical Port Admin Key Assignments ........................................................................... 17-13 Link Aggregation Configuration Terms and Definitions .................................................................. 17-19 Administrative Policy and Policy Rule Traffic Classifications............................................................ 18-8 Non-Edge Protocols ....................................................................................................................... 18-11 Traffic Classification Based Policy Capabilities .............................................................................. 18-12 Displaying Policy Configuration and Statistics................................................................................ 18-17 Policy Configuration Terms and Definitions.................................................................................... 18-28 PIM Terms and Definitions ............................................................................................................. 19-17 IGMP Configuration Commands..................................................................................................... 19-18 Layer 2 IGMP Show Commands .................................................................................................... 19-19 Layer 3 IGMP Show Commands .................................................................................................... 19-20
19-5 19-6 19-7 19-8 19-9 20-1 20-2 21-1 21-2 21-3 21-4 22-1 22-2 22-3 22-4 22-5 23-1 23-2 23-3 23-4 23-5 23-6 23-7 23-8 24-1 24-2 25-1 25-2 25-3 25-4 25-5 25-6 25-7 26-1 27-1 27-2 28-1 28-2 29-1 29-2 30-1 30-2 30-3 30-4 30-5 31-1 31-2 31-3 31-4 31-5 31-6 31-7 32-1 32-2 32-3 32-4
DVMRP Configuration Commands ................................................................................................. 19-20 DVMRP Show Commands ............................................................................................................. 19-22 IPv4 PIM Commands...................................................................................................................... 19-22 IPv6 PIM Commands...................................................................................................................... 19-23 PIM IPv4 and IPv6 Display Commands.......................................................................................... 19-25 MLD Configuration Commands ........................................................................................................ 20-5 MLD Show Commands..................................................................................................................... 20-6 Syslog Terms and Definitions ........................................................................................................... 21-3 Syslog Message Components .......................................................................................................... 21-6 Syslog Command Precedence ......................................................................................................... 21-7 Syslog Server Default Settings ......................................................................................................... 21-8 RMON Monitoring Group Functions and Commands ....................................................................... 22-5 Default Network Monitoring Parameters........................................................................................... 22-7 Network Diagnostics Commands ..................................................................................................... 22-9 Managing Network Monitoring ........................................................................................................ 22-15 Displaying Network Monitoring Information and Statistics.............................................................. 22-16 Default NetFlow Configuration Settings for S-Series Systems ......................................................... 23-9 NetFlow Configuration Terms and Definitions ................................................................................ 23-10 NetFlow Version 5 Template Header and Data Field Support ....................................................... 23-11 NetFlow Version 5 Data Record Field Format ................................................................................ 23-11 NetFlow Version 9 Template Header Support ................................................................................ 23-13 NetFlow Version 9 Template Data Record Field Support............................................................... 23-13 NetFlow Version 9 Additional Template Specific Data Record Field Support ................................ 23-14 NetFlow Version 9 Templates ........................................................................................................ 23-14 Default VRF Parameters ................................................................................................................ 24-12 VRF Configuration Terms and Definitions ...................................................................................... 24-13 Entering Router Configuration Mode ................................................................................................ 25-2 Configuring Forwarding Static IP Routes ....................................................................................... 25-14 Default IP Routing Parameters ....................................................................................................... 25-26 Managing the Router ...................................................................................................................... 25-28 Displaying IP Routing Information and Statistics ............................................................................ 25-28 Configuring IP Debug ..................................................................................................................... 25-30 IP Routing Terms and Definitions ................................................................................................... 25-30 Layer 3 Tunneling Configuration Terms and Definitions ................................................................ 26-10 Default RIP Parameters.................................................................................................................... 27-4 RIP Configuration Terms and Definitions ......................................................................................... 27-5 Default RIPng Parameters................................................................................................................ 28-3 RIPng Configuration Terms and Definitions ..................................................................................... 28-4 Default OSPF Parameters .............................................................................................................. 29-21 Displaying OSPF Configuration and Statistics ............................................................................... 29-25 OSPFv3 and OSPFv2 LSA Cross-Reference .................................................................................. 30-3 Default OSPF Parameters .............................................................................................................. 30-23 Configuring OSPFv3 General Optional Parameters ....................................................................... 30-25 Configuring OSPF Optional Interface Parameters ......................................................................... 30-26 Displaying OSPFv3 Configuration and Statistics............................................................................ 30-27 AS-Path Regular Expressions .......................................................................................................... 31-7 Default BGP Parameters ................................................................................................................ 31-19 BGP Neighbor Configuration .......................................................................................................... 31-30 Configuring BGP Outbound Route Filtering ................................................................................... 31-40 Configuring BGP Soft Reset ........................................................................................................... 31-43 Monitoring and Clearing BGP Configuration .................................................................................. 31-44 BGP Terms and Definitions ............................................................................................................ 31-44 Default NAT Parameters .................................................................................................................. 32-8 NAT Resource Limits........................................................................................................................ 32-9 Managing a Traditional NAT Configuration .................................................................................... 32-10 Displaying NAT Statistics ............................................................................................................... 32-10
xxv
32-5 33-1 33-2 33-3 33-4 33-5 34-1 34-2 34-3 35-1 35-2 35-3 36-1 36-2 36-3 36-4 36-5 37-1 37-2 37-3 37-4 38-1 39-1 39-2 39-3 40-1 40-2 41-1 41-2 41-3 41-4 42-1 42-2 42-3 42-4
NAT Configuration Terms and Definitions ...................................................................................... 32-15 Default LSNAT Parameters .............................................................................................................. 33-9 LSNAT Resource Limits ................................................................................................................. 33-10 Configuring LSNAT Global Settings ............................................................................................... 33-13 Displaying LSNAT Configurations and Statistics ............................................................................ 33-13 LSNAT Configuration Terms and Definitions.................................................................................. 33-23 Default TWCB Parameters ............................................................................................................... 34-8 HTTP Outbound Interface Configuration ........................................................................................ 34-10 Displaying TWCB Statistics ............................................................................................................ 34-10 Default VRRP Parameters................................................................................................................ 35-5 Displaying VRRP Information and Statistics..................................................................................... 35-7 VRRP Configuration Terms and Definitions ................................................................................... 35-11 Host DoS Mitigation Types ............................................................................................................... 36-6 Default Security Parameters............................................................................................................. 36-7 Managing MAC Locking ................................................................................................................... 36-8 Managing TACACS+ ...................................................................................................................... 36-10 Displaying Host DoS....................................................................................................................... 36-12 Default Flow Setup Throttling Parameters........................................................................................ 37-4 Managing FST .................................................................................................................................. 37-7 Displaying FST Information and Statistics ........................................................................................ 37-9 Flow Setup Throttling Terms and Definitions.................................................................................. 37-12 ACL Configuration Terms and Definitions ...................................................................................... 38-13 Default Route-Map Manager Parameters......................................................................................... 39-9 Displaying Route-Map Manager Information and Statistics............................................................ 39-15 Route-Map Manager Terms and Definitions................................................................................... 39-17 CoS Sample Values By Traffic Type .............................................................................................. 40-26 Quality of Service Configuration Terms and Definitions ................................................................. 40-31 Default Authentication Parameters ................................................................................................... 41-5 Managing RADIUS-Snooping ........................................................................................................... 41-6 Displaying RADIUS-Snooping Statistics........................................................................................... 41-6 RADIUS-Snooping Configuration Terms and Definitions ................................................................. 41-9 Default Authentication Parameters ................................................................................................. 42-12 PWA Guest Networking Privileges Configuration ........................................................................... 42-17 MultiAuth Authentication Settings and Statistics Display................................................................ 42-22 Quality of Service Configuration Terms and Definitions ................................................................. 42-31
xxvi
Related Documents
The manuals listed below can be obtained from the World Wide Web in Adobe Acrobat Portable Document Format (PDF) at the following site: https://extranet.enterasys.com/downloads Enterasys S-Series CLI Reference provides information on how to use the Command Line Interface for the S-Series switch/routers.
Note: Calls the readers attention to any item of information that may be of special importance.
xxvii
Router: Calls the readers attention to router-specific configuration information. Caution: Contains information essential to avoid damage to the equipment. Precaucin: Contiene informacin esencial para prevenir daar el equipo. Achtung: Verweit auf wichtige Informationen zum Schutz gegen Beschdigungen.
Getting Help
For additional support related to S-Series switch/router or to this document, contact Enterasys Networks using one of the following methods:
World Wide Web www.enterasys.com/support 1-800-872-8440 (toll-free in U.S. and Canada) or 1-978-684-1000 For the Enterasys Networks Support toll-free number in your country: Phone Internet mail www.enterasys.com/support/ [email protected] To expedite your message, please type [S-SERIES] in the subject line.
Before contacting Enterasys Networks for technical support, have the following data ready: Your Enterasys Networks service contract number A description of the failure A description of any action(s) already taken to resolve the problem (for example, changing mode switches or rebooting the unit) The serial and revision numbers of all involved Enterasys Networks products in the network A description of your network environment (such as layout, cable type, other relevant environmental information) Network load and frame size at the time of trouble (if known) The device history (for example, if you have returned the device before, or if this is a recurring problem) Any previous Return Material Authorization (RMA) numbers
1
Getting Started
This chapter provides the procedures to start the S-Series device once the hardware is installed. Initially, the system can only be configured using the Command Line Interface (CLI) from a device connected directly to the console port on the chassis. This chapter also provides an overview of configuring the S-Series as a switch and router to fit into your network.
For information about... Device Management Methods Initial Configuration Advanced Configuration Overview Refer to page... 1-1 1-1 1-2
Notes: See the default parameters table located in the relevant chapter for factory default values.
The Hardware Installation Guide for your S-Series device provides setup instructions for connecting a terminal or modem to the device.
Initial Configuration
To initially configure the S-Series device, you must have connected a terminal to the local console port as described in the Hardware Installation Guide for your S-Series device. Procedure 1-1 contains the steps to assign an IP address and configure basic system parameters. For information on the command syntax and parameters, refer to the online help or the Enterasys S-Series CLI Reference.
1-1
Note: When configuring any string or name parameter input for any command, do not use any letters with diacritical marks (an ancillary glyph added to a letter). Diacritical marked letters are not supported by SNMP.
set system name [string] set system location [string] set system contact [string] set banner {motd | login} message set prompt prompt_string show time set time [mm/dd/yyyy] [hh:mm:ss]
5 6 7
Table 1-1
Task
Configure the Telnet client and server. (Telnet client is enabled by default.) Note: For security, you may wish to disable Telnet and only use SSH. Configure the Secure Shell V2 (SSHv2) client and server. Configure the Dynamic Host Configuration Protocol (DHCP) client and server. Configure the port parameters, such as speed and duplex mode. Enable SNMP and create a community string. By default, the SNMP master agent is disabled and no defined public community string is configured. Configure RMON to provide comprehensive network fault diagnosis, planning, and performance tuning information, and allow for interoperability between SNMP management stations and monitoring agents. Change the interactive login authentication method, from local to remote (RADIUS authentication). If RADIUS authentication is configured, configure the remote RADIUS servers to be used by the RADIUS client on the S-Series Layer 2 Switching Enable desired ports for switching. Set port configurations and port-based Virtual Local Area Networks (VLANs). VLANs can be created statically or dynamically. Configure Spanning Trees using STP, RSTP, or MSTP. Configure LLDP or CDP. Layer 3 Routing Configure the router id. Refer to the router id command in the Enterasys S-Series CLI Reference. Configure interfaces for IP routing. Configure the ARP table. Configure UDP broadcast forwarding, including DHCP/BOOTP relay agent. Configure routes. Configure interior gateway protocols: RIP and OSPF. Configure multicast protocols IGMP, DVMRP, and PIM, and general multicast parameters. Configure VRRP. Configure policy-based routing. Security and General Management Configure Access Control Lists (ACLs). Configure RADIUS servers. Manage user accounts and passwords. Configure system logging. Configure the S-Series using text files.
22-4
42-2 42-24
1-3
Table 1-1
Task
2
Using the CLI
This chapter provides information about CLI conventions for S-Series devices and CLI properties that you can configure.
For information about... CLI Conventions Configuring CLI Properties Refer to page... 2-1 2-4
CLI Conventions
For information about... Getting Help with CLI Syntax Using Context-Sensitive Help Performing Keyword Lookups Displaying Scrolling Screens Abbreviating and Completing Commands Using the Spacebar Auto Complete Function Refer to page... 2-1 2-1 2-2 2-3 2-3 2-4
2-1
CLI Conventions
S Chassis(rw)->show snmp S Chassis(rw)->show snmp user ? list <user> remote volatile nonvolatile read-only <cr> S Chassis(rw)->show snmp user List usernames User name Show users with remote SNMP engine ID Show temporary entries Show permanent entries Show r/o entries
Entering a question mark (?) without a space after a partial keyword will display a list of commands that begin with the partial keyword. The following example shows how to use this function for all commands beginning with co:
S Chassis(rw)->co? configure copy S Chassis(rw)->co Note: At the end of the lookup display, the system will repeat the command you entered without the ?. Execute a configuration file Upload or download an image or configuration file
CLI Conventions
The following example shows how the show mac command indicates that output continues on more than one screen.
S Chassis(rw)->show mac
MAC Address
FID
Port
Type
---------------------------------------------------------00-00-1d-67-68-69 00-00-02-00-00-00 00-00-02-00-00-01 00-00-02-00-00-02 00-00-02-00-00-03 00-00-02-00-00-04 00-00-02-00-00-05 00-00-02-00-00-06 00-00-02-00-00-07 00-00-02-00-00-08 --More-1 1 1 1 1 1 1 1 1 1 host.0.1 ge.1.2 ge.1.3 ge.1.4 ge.1.5 ge.1.6 ge.1.7 ge.1.8 ge.1.9 ge.1.10 learned learned learned learned learned learned learned learned learned learned
--------------------- --------------------- ------10.21.73.13.23 10.21.73.13.23 *.80 *.23 10.21.73.13.1030 *.161 *.1025 *.123 134.141.190.94.51246 134.141.192.119.4724 *.* *.* 134.141.89.113.514 *.* *.* *.* ESTABLISHED ESTABLISHED LISTEN LISTEN
2-3
set banner {login message | motd message} clear banner {login | motd} set width screenwidth [default] set length screenlength [default]
Set the time (in minutes) an idle console or Telnet set logout timeout [default] CLI session will remain connected before timing out. Set the current and default line editing mode or the way the Delete character is treated by the line editor. You can also set the persistence of your line editing selections. set line-editor {emacs | vi | default | delete {backspace | delete}} [default]
Refer to the Enterasys S-Series CLI Reference for more information about each command.
Refer to the Enterasys S-Series CLI Reference for a description of the output of each command.
2-5
3
Image Configuration and File Management
This chapter provides information about configuration and image file management on the S-Series devices.
For information about... Configuration and Image File Management on Your System Saving a Configuration Executing a Configuration Deleting a Configuration Restore-Point or File Downloading a File from an FTP, TFTP, or SCP Server Downloading a Firmware Image via the Serial Port Uploading a Configuration File Setting the Boot Firmware Image Running a Configuration Script Configuration and Image File Display Commands Refer to page... 3-1 3-1 3-2 3-3 3-4 3-4 3-7 3-7 3-8 3-9
Refer to the Enterasys S-Series CLI Reference for more information about each command.
Saving a Configuration
You can save the S-Series device configuration by doing one of the following: Creating a configuration restore-point. The configuration restore-point resides on your system. You cannot save a configuration restore-point to a file. Any additional configuration
Enterasys S-Series Configuration Guide 3-1
Executing a Configuration
settings that you change after creating this restore-point will not be included when the restore-point configuration is applied, such as when the system reboots. You can configure only one restore-point. To create a configuration restore-point of the current configuration, use the set config restore-point command.
set config restore-point <description>
Write the configuration to a file. To write the configuration to a file, use the show config command.
show config outfile outfile
Executing a Configuration
You can execute the S-Series device configuration by doing one of the following: Execute the configuration restore-point. Any changes that you made to the configuration after you created the configuration restore-point will be overwritten. See Procedure 3-1. Execute a configuration file that was created on, or downloaded to, the S-Series device.
View the index of the configuration restore-point. show config restore-point Indicate that the restore-point will be applied when the S-Series device reboots. When the S-Series device reboots, any configuration changes made after the restore-point was set will be lost. Reboot the S-Series device. (Optional) Append the current configuration with the configuration in a previously downloaded or created configuration file. Note: If you do not specify append, the current running configuration will be replaced with the contents of the configuration file, which will require an automated reset of the chassis. configure restore-point index
3. 4.
To execute the configuration in a configuration file stored on the S-Series device, use the configure
command. configure filename
View the index of the configuration restore-point. show config restore-point Delete the current restore-point. Because the system currently supports only one restore-point, you must delete the current restore-point before creating a new one. (Optional) Create a new restore-point. clear config restore-point index
3.
To delete a configuration file, image file, or script file, use the delete command.
delete filename
3-3
source is the URL of an FTP, TFTP, or SCP server. destination is the local file path. For a configuration or script file, destination must include slotN/.
The S-Series module to which a configuration file is downloaded must have the same hardware configuration as the S-Series module from which it was uploaded. For reasons of security, passwords are not allowed in copy command URLs. A password prompt displays upon entering a copy command. For example:
S Chassis(rw)->copy scp://[email protected]:22/myconfig slot3/myconfig Password: ########### S Chassis(rw)->
Once you have downloaded an image file, set the device to load the new image file at startup using the set boot system command. See Setting the Boot Firmware Image on page 3-7. For information on downloading
Any other terminal applications may work but are not explicitly supported.
Important Notice
The S-Series device allows you to download and store multiple image files. This feature is useful for reverting back to a previous version in the event that a firmware upgrade fails to boot successfully. After downloading firmware as described above, you can select which image file you want the device to load at startup using the setboot command in the System Image Loader menu or the set boot system command.
To download device firmware via the serial (console) port, proceed as follows: 1. With the console port connected, power up the device. The following message displays:
2.
Once the boot image is finished uncompressing, you receive a message indicating you have 3 seconds to access the bootloader menu by pressing any key. Press a key and the system image loader prompt displays:
###You have 3 seconds to access the bootloader menu### Press any key to enter System Image Loader menu PressAnyKey [System Image Loader]:
3.
To display help for all the system image loader mode commands, enter a question mark (?):
[System Image Loader]:? ?, help boot delete download list log setbaud <rate> setboot <filename> showboot clearnvram [System Image Loader]: - print this list - boot (load and go) - delete an image file - start ZMODEM download - display available images - message log - set baud rate, (9600,38400,57600,115200) - change boot image file - display boot image file - clear persistent storage
4. 5.
Use the list command to display the images currently on this device. The baud rate can be set to 9600, 38400, 57600, or 115200. Using the setbaud command, set the baud rate to 115200:
[System Image Loader]: setbaud 1152000 ###Change the baud of the terminal program to 1152000### [System Image Loader]:
6.
Use the download command to start the ZMODEM receive process. Send the image file using the ZModem protocol from your terminal application. (This procedure will vary depending on your application.) When the ZModem download is finished, the following message displays:
[System Image Loader]: download Preparing to receive file... **xxxxxxxxxxxxxxxx ###Start the ZMODEM transfer from the terminal software### Writing file... Download successful. [System Image Loader]:
3-5
7.
Use the list command to confirm the images that are currently on the device, and confirm the image currently listed as the boot image. If the current boot image is not the image you want to boot with, use the setboot filename command to set the correct boot image:
[System Image Loader]: list Filename: Version: Size: Date: CheckSum: 720010001 (Boot) 07.20.01.0001 4527490 (bytes) FRI DEC 10 15:32:24 2010 d89ace409317bc765789fce1c73b8745
Compatibility: listOfCompatibleDevices
Compatibility: listOfCompatibleDevices [System Image Loader]:setboot 720010025 [System Image Loader]:list Filename: Version: Size: Date: CheckSum: 720010001 07.20.01.0001 4527490 (bytes) FRI DEC 10 15:32:24 2010 d89ace409317bc765789fce1c73b8745
Compatibility: listOfCompatibleDevices
720010025 (Boot) 07.20.01.0025 4529790 (bytes) THU DEC 09 22:38:54 2010 6ccaaf8a5b77d7d34c6c3d972b381024
8.
When a device is booted, the device baud rate is reset to 9600. Reset the terminal application baud rate to 9600 so that it will continue to display output from the device:
[System Image Loader]: setbaud 9600 [System Image Loader]:
9.
DONE. DONE.
Phone:
(c) Copyright Enterasys Networks, Inc. 2011 Chassis Serial Number: Chassis Firmware Revision: Username: Note: If you reboot without specifying the image to boot with setboot as described above, the device will attempt to load whatever image is currently stored in the bootstring via the setboot system command. If the device cannot find the image, or it is not set, it will search through available images and attempt to boot the newest one. If the device finds and successfully boots an image file, it will set the bootstring to the name of that image file. 00e063937c7d 07.20.01.0025
source is the local file path and must include slotN/. destination is the URL of an FTP, TFTP, or SCP server.
Example
S Chassis(rw)->copy slot3/myconfig ftp://134.141.89.34/myconfig
The system must be reset by software for the new boot image to take effect at startup. If the chassis is powered OFF and then back ON, the current active image will just reload at startup Although it is not necessary to choose to reset the system and activate the new boot image immediately, the CLI will prompt you whether or not you want to do so. You can choose Yes at the question prompt to have the system reset and load the new boot image immediately, or choose
Enterasys S-Series Configuration Guide 3-7
No to load the new boot image at a later scheduled time by issuing one of the following commands: clear config, reset, or configure. The new boot setting will be remembered through resets and power downs, and will not take effect until the clear config, reset, or configure command is given.
Example
S Chassis(rw)->set boot system newimage This command can optionally reset the system to boot the new image. Do you want to reset now (y/n) [n]?y Resetting system ...
2.
Example
This example uses the copy command to copy the script file named setport.scr from IP address 10.1.221.3 to slot 4. Next, the contents of the file is displayed with the show file command. The script file requires two arguments, a port string (%1) and a VLAN id (%2). Finally, the script is executed, by specifying ge.1.1 as the first argument and 100 as the second argument.
S Chassis(rw)->copy tftp://10.1.221.3/setport.scr slot4/setport.scr
S Chassis(rw)->show file slot4/setport.scr set port alias %1 script_set_port set port vlan %1 %2 modify-egress set port jumbo enable %1 set port disable %1 set port lacp port %1 disable
show boot system dir [filename] show file filename show config [all] [facility]
Refer to the devices CLI Reference Guide for a description of the output of each command.
3-9
3-10
4
Port Configuration
This document describes port configuration on Enterasys S-Series devices.
For information about... Port Configuration Overview Configuring Ports Terms and Definitions Refer to page... 4-1 4-11 4-15
4-1
For information about... Port Flow Control Configuring Link Traps and Link Flap Detection Port Broadcast Suppression Port Priority Port Priority to Transmit Queue Mapping
Slot location for modules installed in a S-Series chassis can be: 0 through the maximum number of slots in the chassis, with 0 designating virtual system ports (lag, vlan, host, loopback), and 1 designating the lowest module slot in the chassis. Port number can be: Any port number on the module. The highest valid port number is dependent on the number of ports in a slot location and the port type. For example: If a module in slot 1 has 48, 1GbE front panel ports, and an uplink interface with 6 Mini GBICs, the range of port number designations used in the CLI command would be: ge.1.1 through ge.1.48 for the 48 1GbE front panel ports, and tg.1.1 through tg.1.6 for the 6 TGbE uplink ports. If the uplink has the same type (ge) ports as the front panel, the numbering continues with the port number ge.1.49.
Examples
Note: You can use a wildcard (*) to indicate all of an item. For example, ge.3.* would represent all Gigabit Ethernet ports in the module in slot 3.
This example shows the port-string syntax for specifying the 1-Gigabit Ethernet port 14 in the module in chassis slot 3
ge.3.14
This example shows the port-string syntax for specifying ports 1, 3 and 11 in the module in chassis slot 1:
ge.1.1;ge.1.3;ge.1.11
This example shows the port-string syntax for specifying ports 1, 3, 7, 8, 9 and 10 in the module in chassis slot 1:
ge.1.1,ge.1.3,ge.1.7-10
This example shows the port-string syntax for specifying the 10-Gigabit Ethernet port 2 of the module in chassis slot 3:
tg.3.2
This example shows the port-string syntax for specifying all 1-Gigabit Ethernet ports in the module in chassis slot 3:
ge.3.*
This example shows the port-string syntax for specifying all 10-Gbps Ethernet ports in the chassis:
tg.*.*
This example shows the port-string syntax for specifying all ports (of any interface type) in all modules in the chassis:
*.*.*
If C2 security mode is enabled, You can not create, modify, or clear a console configuration while in Read-Write user mode. When specifying a console port string, use the com keyword for the port type, as specified in the Port String Syntax Used in the CLI discussion. The following example shows how to set the baud rate to 19200 on console port com.1.1:
S Chassis(rw)->set console baud 19200 com.1.1
The following example shows how to set the bits property value to 8 on all console ports:
S Chassis(rw)->set console bits 8
4-3
The following example shows how to set the flowcontrol property value to none on console port com.1.1:
S Chassis(rw)->set console flowcontrol none com.1.1
The following example shows how to set the parity property value to even on all ports:
S Chassis(rw)->set console parity even
The following example shows how to set the stopbits property value to one on console ports com.1.1 and com.1.2:
S Chassis(rw)->set console stopbits one com.1.1-2
Ingress Filtering
The ingress filtering feature provides for a means of limiting the forwarding of received frames on the ingress port based on the VLAN egress list for that port. VLAN IDs of a ports incoming frames are compared to the ports egress list. If the received VLAN ID does not match a VLAN ID on the ports egress list, the frame is dropped. See Chapter 16, VLAN Configuration for VLAN egress list information. Ingress filtering is disabled by default. Use the set port ingress-filter command in any command mode to enable ingress filtering on the specified ports. The following example enables ingress filtering on port ge.1.1
S Chassis(rw)->set port ingress-filter ge.1.1 enable S Chassis(rw)->>show port ingress-filter ge.1.1 Port -----------ge.1.1 State -------enabled
Port Alias
The alias feature allows a string name to be associated with a port. Use the set port alias command to configure an alias for the specified ports. The following example sets the alias on port ge.1.1 to documentation
S Chassis(rw)->set port alias ge.1.1 documentation S Chassis(rw)->>show port alias ge.1.1 Alias on port ge.1.1 set to: Documentation.
Force Linkdown
When the force linkdown feature is disabled, disabling a port using set port disable will disable the ability to forward traffic, but the link stays up. When force linkdown is enabled, disabling a port using set port disable will disable the link completely. When force linkdown is enabled, disabling a port using the set port disable command will not disable PoE on that port. Force linkdown is disabled by default. Use the set forcelinkdown command in any command mode to enable the force linkdown feature on this device. The following example enables the force linkdown feature on this device:
S Chassis(rw)->set forcelinkdown enable S Chassis(rw)->show forcelinkdown ForceLinkDown feature is globally enabled. S Chassis(rw)->
Port Duplex
Duplex between two communicating devices specifies whether communication will be one way at a time (half-duplex) or in both directions simultaneously (full-duplex). When auto-negotiation is enabled, auto-negotiation determines port duplex. Use the set port duplex command to specify whether the specified ports will operate at half or full duplex when auto-negotiation is not enabled. The following example sets the port duplex on port ge.1.1 to full:
S Chassis(rw)->set port duplex ge.1.1 full S Chassis(rw)->show port duplex ge.1.1 default duplex mode is full on port ge.1.1. S Chassis(rw)->
4-5
Jumbo Frames
The jumbo frames feature supports Ethernet frames greater than 1500 bytes of payload on a port. By default, jumbo frame support is disabled on all ports and path MTU discovery is enabled. When jumbo frame support is enabled, path MTU discovery should also be enabled. Path MTU discovery is set using the set mtu command. It is possible for jumbo administrative status to be enabled and jumbo operational status to be deferred. Jumbo frame support is supported on all module ports, but some modules can only handle 12 jumbo enabled ports at one time. If on a module that only supports 12 jumbo frame ports, you enable jumbo frames, without specifying a port, by default, the first 12 ports are enabled. Should you then enable a port number higher than 12, it will immediately take back the jumbo frame resources for ports 1 - 12 and initially show an operational status of deferred. Resetting the module will enable deferred ports. Use the show port jumbo command to verify the operational status of a jumbo enabled port. A jumbo administratively disabled port will always have a jumbo operational status of disabled. If you have manually enabled jumbo frames support on the maximum number of ports allowed on the module, and you attempt to enable additional ports, the additional jumbo frame configurations will fail. You must free up resources by disabling jumbo frames on a port for each additional port you are trying to add before continuing. Use the set port jumbo command in any command mode to enable or disable jumbo frame support on the specified ports. Use the show port jumbo command to verify the operational status of a jumbo enabled port. The following example enables the port jumbo frame feature on port ge.1.1:
S Chassis(rw)->set port jumbo ge.1.1 S Chassis(rw)->show port jumbo ge.1.1
S Chassis(rw)->
1000x - 1000BASE-X, -LX, -SX, -CX half duplex mode 1000xfd - 1000BASE-X, -LX, -SX, -CX full duplex mode 1000t - 1000BASE-T half duplex mode 1000tfd - 1000BASE-T full duplex mode pause - PAUSE for full-duplex links apause - Asymmetric PAUSE for full-duplex links spause - Symmetric PAUSE for full-duplex links bpause - Asymmetric and Symmetric PAUSE for full-duplex links
Note: Advertised ability can be activated only on ports that have auto-negotiation enabled.
During auto-negotiation, making use of information gained from the advertised ability feature, the port tells the device at the other end of the segment what its capabilities and mode of operation are. If auto-negotiation is disabled, the port reverts to the values specified by the default speed, default duplex, and the port flow control commands. Use the set port negotiation command to enable auto-negotiation on the specified ports. Use the set port advertise command to specify the capabilities to be advertised on the specified ports. The following example enables auto-negotiation on port ge.1.1 and sets the advertise utility to advertise 10BASE-T half duplex mode, 10BASE-T full duplex mode, 100BASE-TX half duplex mode, 100BASE-TX full duplex mode, and Asymmetric and Symmetric PAUSE for full-duplex links:
S Chassis(rw)->set port negotiation ge.1.1 enable S Chassis(rw)->set port advertise ge.1.1 10t 10tfd 100tx 100txfd bpause S Chassis(rw)->show port advertise ge.1.1 ge.1.1 capability advertised remote
---------------------------------------------10BASE-T 10BASE-TFD 100BASE-TX 100BASE-TXFD 1000BASE-X 1000BASE-XFD 1000BASE-T 1000BASE-TFD other pause Apause Spause Bpause S Chassis(rw)-> yes yes yes yes no no no no no yes yes yes yes yes yes yes yes no no no no no no no no yes yes yes yes yes no no no no no yes no yes no
4-7
Port MDI/MDIX
The Port MDI/MDIX feature detects and adapts to straight through (MDI) or cross-over (MDIX) Ethernet cabling on switch ports. Ports can be set to auto detect, force MDI or force MDIX. The default is for auto-detection of the cabling type. Use the set port mdix command in any command mode to set the MDI/MDIX feature for the specified ports on this device. The following example sets the MDI/MDIX feature to cross-over for all ports on this device.
S Chassis(rw)->set port mdix mdix S Chassis(rw)->
The link flap function detects when a link is going up and down rapidly (also called link flapping) on a physical port, and takes the configured actions (disable port, and eventually send notification trap) to stop such a condition. If left unresolved, the link flapping condition can be detrimental to network stability because it can trigger Spanning Tree and routing table recalculation.
The link flap utility must be enabled globally and on the ports for which link flap detection is to occur. Use the set linkflap globalstate command in any command mode to globally enable the link flap utility on this device. Use the set linkflap portstate command in any command mode to enable the link flap utility on the specified ports. There are three link flap actions that can be configured as a response to link flapping: Disable the interface Generate a SYSLOG message Generate an SNMP trap
You can also set the action to all three. A link flap action will occur if the number of link flaps exceeds the configured link flap threshold (number of times the link flaps) setting within the period configured by link flap interval. Use the set linkflap action command in any command mode to set the link flap action for the specified ports. Use the set linkflap threshold command in any command mode to set the number of link flaps that will trigger a link flap action for the specified ports. Use the set linkflap interval command in any command mode to set the period of time within which the link flap threshold must be exceeded to cause the link flap action to trigger. If the link flap action is to disable the interface, a port downtime period in seconds can be configured to specify how long the disabled interface will remain down. A value of 0 indicates forever. Use the set linkflap downtime command in any command mode to configure the downtime period for the specified ports. The following example configures the link flap utility on port ge.1.1 to: Set the link flap action to all three actions Set the link flap threshold to 5 link flaps Sets the link flap interval to 10 seconds Sets the downtime period to 600 seconds
S Chassis(rw)->set linkflap action ge.1.1 all S Chassis(rw)->set linkflap threshold ge.1.1 5 S Chassis(rw)->set linkflap interval ge.1.1 10 S Chassis(rw)->set linkflap downtime ge.1.1 600 S Chassis(rw)->show linkflap parameters ge.1.1 Linkflap Port Settable Parameter Table (X means error occurred) Port -------ge.1.1 LF Status --------disabled Actions ------D..S..T Threshold ---------5 Interval ---------10 Downtime ---------600
4-9
Port Priority
The Enterasys S-Series device supports Class of Service (CoS), which allows you to assign mission-critical data to higher priority through the device by delaying less critical traffic during periods of congestion. The higher priority traffic through the device is serviced first before lower priority traffic. The Class of Service capability of the device is implemented by a priority queueing mechanism. Class of Service is based on the IEEE 802.1D (802.1p) standard specification, and allows you to define eight priorities (0 through 7) and, depending on port type, up to 16 transmit queues (0-15) of traffic for each port. A priority 0 through 7 can be set on each port, with 0 being the lowest priority. A port receiving a frame without priority information in its tag header is assigned a priority according to the default priority setting on the port. For example, if the priority of a port is set to 4, the frames received through that port without a priority indicated in their tag header are classified as a priority 4 and transmitted according to that priority. In addition, the devices rate limiting capabilities allow you to further prioritize traffic by limiting the rate of inbound or outbound traffic on a per port/priority basis.
Note: When CoS override is enabled using the set policy profile command as described in the Policy Profile Commands section of the Enterasys S-Series CLI Reference, CoS-based classification rules will take precedence over priority settings configured with the set port priority command described in this section.
Use the set port priority command in any command mode to set the port priority for the specified ports. The following example sets the port priority for port ge.1.1 to 4:
S Chassis(rw)->set port priority ge.1.1 4 S Chassis(rw)->show port priority ge.1.1 ge.1.1 is set to 4
Configuring Ports
802.1p priority value or take on the default priority value for this port. The behavior of a packet as it exits the port is dependent upon the priority value assigned to the packet and the transmit queue it exits the port on. 802.1p priority values can be mapped directly to transmit queues on a per port basis. Regardless of the 802.1p priority mapped to a queue, the queue itself has a priority from low to high where queue 0 has the lowest priority and the highest queue value has the highest priority. For example, in a strict queuing configuration, the highest queue number would empty first before moving on to the next highest queue number. See Preferential Queue Treatment for Packet Forwarding on page 40-5 for a detailed discussion of preferential queue treatment. Use the set port priority-queue command to map 802.1p priorities to transmit queues on a per port basis. The following example sets priority 5 packets to transmit queue 1 on port ge.1.1
S Chassis(rw)->set port priority-queue ge.1.1 5 1 S Chassis(rw)->show port priority-queue ge.1.1 Port -----------ge.1.1 P0 P1 P2 P3 P4 P5 P6 P7 -- -- -- -- -- -- -- -1 0 0 1 2 1 3 3
S Chassis(rw)->
Configuring Ports
This section provides details for the configuration of ports on the S-Series products. Table 4-1 lists port parameters and their default values. Table 4-1
Parameter console baud rate console flow control console bits port state port ingress filter
disabled
enabled disabled 0
Configuring Ports
Table 4-1
Parameter
broadcast suppression
port negotiation
enabled
Procedure 4-1 describes how to configure ports. Procedure 4-1 Configuring Ports
Step 1. 2. Task Administratively enable one or more ports on the system. Optionally, change the properties for one or more console ports. Command(s) set port enable port-string set console {[baud rate] | [bits num-bits] | [cts-link {enable | disable}] | [flowcontrol {none | ctsrts | dsrdtr}] | [parity {none | odd | even | mark | space}] | [stopbits {one | oneandhalf | two}] [vt100 dsr {enable | disable | timeout timeout]} [port-string] set port ingress-filter port-string enable set port alias port-string [string] set forcelinkdown enable set port speed port-string {10 | 100 | 1000} set port duplex port-string {full | half} set port jumbo enable [port-string] set port negotiation port-string enable set port mdix [port-string] {auto | mdi | mdix} set port advertise port-string {[10t] [10tfd] [100tx] [100txfd] [1000x] [1000xfd] [1000t] [1000tfd] [pause] [apause] [spause] [bpause]) set port flowcontrol port-string {receive | send | both} enable set port broadcast port-string threshold-val set port priority port-string priority set port priority-queue port-string priority queue
3. 4. 5. 6. 7. 8. 9. 10. 11.
Optionally, limit the forwarding of received frames based on port VLAN egress lists. Optionally, assign an alias name to a port. Optionally, enable the forcing of ports in the operstatus down state to become disabled. Optionally, set the default speed of one or more ports. Optionally, set the default duplex type for one or more ports. Optionally, enable jumbo frame support on one or more ports. Optionally, enable auto-negotiation on one or more ports. Optionally, set MDI/MDIX mode on one or more ports. Optionally, configure the auto-negotiation advertised capabilities on one or more ports.
Optionally, enable flow control settings for one or more ports. Optionally, set the broadcast suppression limit on one or more ports. Optionally, set a default port priority for one or more ports. Optionally, map 802.1D (802.1p) priorities to transmit queues for one or more ports.
4-12
Port Configuration
Configuring Ports
Procedure 4-2 describes how to configure link trap and link flap detection. Procedure 4-2 Configuring Link Trap and Link Flap Detection
Step 1. Task Optionally, enable one or more ports for sending SNMP trap messages when link status changes occur. Optionally, globally enable the link flap detection function for this device. Optionally, enable the link flap detection function on one or more ports. Optionally, change the period of time within which the link flap threshold must be exceeded to cause the link flap action to trigger. Optionally, set the action that will occur when a link flap violation threshold is met. Optionally, change the link flap action trigger threshold. Optionally, set the length of time one or more ports will be held down after a link flap violation threshold is met and the action is set to disable the interface. Command(s) set port trap port-string enable
2. 3. 4.
set linkflap globalstate enable set linkflap portstate enable [port-string] set linkflap interval port-string interval_value
5.
set linkflap action port-string {disableInterface | gensyslogentry | gentrap | all} set linkflap threshold port-string threshold_value set linkflap downtime port-string downtime_value
6. 7.
Configuring Ports
Table 4-2
Task
To clear all link flap options or statistics on one or more ports: To reset the broadcast threshold or clear the peak rate and peak time values on one or more ports: To reset the current default port priority setting to the default value of 0 on one or more ports: To reset port priority queue settings back to defaults for one or more ports.
Table 4-3 describes how to display port configuration information and statistics. Table 4-3
Task To display properties set for one or more console ports: To display whether or not one or more ports are enabled for switching: To display operating and admin status, speed, duplex mode and port type for one or more ports on the device: To display port counter statistics detailing traffic through the device and through all MIB2 network devices: To display the causes configured to place operating status to a down or dormant state for one or more ports:
To display all ingress-filter enabled ports or the ingress-filter state of the specified ports: To display alias name(s) assigned to one or more ports: To display the status of the force link down function: To display the default speed setting on one or more ports:
To display the default duplex setting for one or more ports: show port duplex [port-string] To display the status of jumbo frame support and MTUs on one or more ports: To display the status of auto-negotiation for one or more ports: To display MDIX mode on one or more ports: To display the advertised abilities on one or more ports: To display the flow control state for one or more ports: show port jumbo [port-string] show port negotiation [port-string] show port mdix [port-string] {all | auto | mdi | mdix} show port advertise [port-string] show port flowcontrol [port-string]
To display the default 802.1D priority for one or more ports: show port priority [port-string]
4-14
Port Configuration
Table 4-3
Task
baud rate broadcast suppression console port default priority duplex flow control force linkdown ingress filtering jumbo frame link flap detection MDI/MDIX port advertised ability port alias port string
4-16
Port Configuration
5
Ethernet Operations, Administration, and Maintenance (OAM) Configuration
This document provides the following information about configuring Ethernet Operations, Administration, and Maintenance (OAM) on the Enterasys S-Series platforms.
For information about... Using Ethernet OAM in Your Network Implementing Ethernet OAM Ethernet OAM Overview Configuring Ethernet OAM Ethernet OAM Configuration Example Terms and Definitions Refer to page... 5-1 5-2 5-2 5-9 5-10 5-11
5-1
OAM Client
The OAM client contains the essential control operations and state information concerning OAM operations on a specific port. It is responsible for the handling of received OAM PDUs from remote clients, and based upon the state of local and remote settings, allows OAM to operate upon a link. Link events are transmitted via OAM PDUs between OAM client entities. The OAM Client is also responsible for maintaining statistics concerning transmitted and received OAM PDUs. You must enable the OAM client on the device for OAM operations to take place. The OAM client is disabled by default. Use the set port oam status command to enable the OAM client on the device.
OAM Discovery
Periodic Information OAM PDU messages are exchanged between OAM clients to both initiate OAM discovery on the link and, once initiated, assure that remote client information is correct from the perspective of the local client. Information OAM PDUs can contain the remote OAM
5-2 Ethernet Operations, Administration, and Maintenance (OAM) Configuration
clients information, as well as a copy of the local clients information. Both clients must accept the exchanged information to complete OAM discovery. Clients can reject received information that is incorrect, outdated, or incomplete. OAM clients must accept two sets of information to complete OAM discovery: The remote clients information A copy of the local clients information that has been reproduced by the remote client
Once Discovery is completed, any change to configuration or state information, on either OAM client, forces the OAM discovery session to be torn down and re-established with the new information.
Network administrators may define threshold values for symbol or frame errors. If the threshold is exceeded within a configured link monitor window, a threshold crossing event has transpired and an action will be enacted. Supported link monitor actions include: Transmitting a Link Event Notification message to the remote OAM client Generating a Syslog message Taking the link operationally off-line
5-3
The administrator has the option of keeping a suspect link operationally disabled until manual intervention has taken place or for the link to be operationally re-enabled once the error condition has resolved. Configure OAM datalink layer monitoring using the set port oam link-monitor command. Configurable datalink layer options that can be configured for threshold, window, and action are: frame, frame-seconds, frame-period, and symbol-period.
Frame Option
The frame option monitors frame errors occurring during a period of time. The default threshold for the frame option is 1 errored-frame. The default window for the frame option is 1 second, and the maximum window is 60 seconds. As presented in Figure 5-1: The configured threshold is 2 errored-frames that occur within the configured window. The window within which the threshold must be exceeded for a configured action to occur is 5 seconds.
If more than 2 errored-frames are received on the monitored port within any 5 second window, the configured action occurs. Figure 5-1 Frame Link Monitor Option
Threshold = 2 errored frames Window = 5 seconds Received Frames 5 seconds = One Errored Frame = A Variable Number of Frames
Frame-Seconds Option
The frame-seconds option monitors frames within one or more one-second windows for errors. The link monitor window is specified as a number of one-second windows to monitor. The default threshold is 1 errored-second window. The default window is 60 one-second windows. The minimum window is 10 one-second windows, and the maximum window is 900 one-second windows. For example, if defaults are being used and a single frame error occurs within one of sixty one-second windows, the threshold has been met. If the threshold was raised to three errored-seconds, three one-second windows would have to register a frame error, within sixty one-second windows, for the threshold to be met.
As presented in Figure 5-2: The configured threshold is 2 one-second windows in which one or more errored-frames occur. The window is 25 one-second windows to monitor.
If there is one or more frame errors in 3 or more one-second windows within the link monitor window of 25 one-second windows, the configured action occurs. Figure 5-2 Frame-Seconds Link Monitor Option
1 Sec
1 Sec
1 Sec
1 Sec
1 Sec
25 one-second windows = 20 one-second windows = 1 errored frame 1 Sec = 1 errored one-second window
Frame-Period Option
The frame-period option monitors frame errors that occur during the reception of a given number of frames. The default threshold is 1 errored-frame. The default window is equivalent to the maximum number of minimum sized frames that may be transmitted over the link during a 1 second interval, and the upper bound is the maximum number of minimum sized frames that may be transmitted over the link during a 1 minute interval. The frame-period option defines its window values based upon the line rate of the port being configured. As such, option values may not be determined until the port has achieved a valid link state. The frame-period window default and range values, based upon link speed, are displayed in Table 5-1. Table 5-1 Frame-Period Window Values
Default Window Value 148,800 frames 1,488,000 frames 14,880,000 frames Window Value Range 14880 - 8928000 frames 148,800 to 89,280,000 frames 1,488,000 to 892,800,000 frames
As presented in Figure 5-3: The configured threshold is 4 errored-frames that occur within the configured window.
5-5
The window is the default window for a 1Gbps port: 1,488,000 frames.
If there is more than 4 errored-frames within the reception of 1,488,000 frames, the configured action occurs. Figure 5-3 Frame-Period Link Monitor Option
Threshold = 4 Errored Frames Window = 1,488,000 Frames Frames 1,488,000 Frames = 1487971 Frames = One Errored Frame
Symbol-Period Option
The symbol-period option monitors symbol errors that occur during the reception of a given number of symbols. The default threshold is 1 errored-symbol. The default window is equivalent to the maximum number of symbols that may be transmitted over the link during a one second interval, and the upper bound is the number of symbols that may be transmitted over the link during a one minute interval. The symbol-period option defines its default window value based upon the line rate of the port being configured. As such, the default window value may not be determined until the port has achieved a valid link state. The symbol-period window default and range values, based upon link speed, are displayed in Table 5-2 on page 5-6. Table 5-2 Symbol-Period Window Values
Default Window Value 131,072,000 symbols 524,288,000 symbols 5,242,880,000 symbols Window Value Range 52,428,800 - 7,864,320,000 524,288,000 - 31,457,280,000 5,242,880,000 - 314,572,800,000
As presented in Figure 5-4: The configured threshold is 5 errored-symbols. The window is the default window for a 1Gbps port: 524,288,000 symbols.
If there is more than 5 errored-symbols within the reception of 524,288,000 symbols, the configured action occurs.
Figure 5-4
Threshold = 5 Errored Symbols Window = 524,288,000 Symbols Frames 524,288,000 Symbols = 524,287,971 Symbols = One Errored Symbol
Actions
The administrator may configure one or more of three actions to be taken upon the detection of a link event: The syslog option triggers a syslog message to be generated, which confers information related to the event. The notify option triggers the transmission of a link event notification OAM PDU to the remote client. The disable-interface option operationally disables the port in question, and the port remains in that state until the administrator restores the port to operational status.
5-7
Figure 5-5
Remote Loopback
Use the set port oam remote-loopback command to enable the OAM remote loopback mode on the local OAM client. This command: Instructs the remote OAM client to initiate the remote loopback process if enabled or to terminate the remote loopback process if disabled. Is a volatile configuration option that does not persist across reboots, and is not displayed in the show config port output.
In order to initiate the remote loopback process, OAM must be configured for active mode on the local port, the OAM client must have completed the discovery process with the remote OAM client, and the remote OAM client must indicate that it supports loopback. Should the local OAM client fail to detect that the remote OAM client has successfully processed the remote loopback request, the local OAM client will exit the loopback process, and the port will maintain its current mode of operation.
Table 5-3 lists the S-Series device default Ethernet OAM configuration settings. Table 5-3
Parameter OAM client mode OAM event notification retries OAM loopback request receive behavior OAM remote loopback
disabled
OAM status OAM monitor link frame window OAM monitor link frame-period frame threshold
disabled 1 second
Specifies the number of errors received based upon 100 Mbps 1 error per the number of frames per second by port linked rate. 148,800 frames per second 1Gbps 1 error per 1,488,000 frames per second 10 Gbps 1 error per 14,880,000 frames per second
OAM monitor link Specifies the number of one-second intervals in frame-seconds threshold which one or more frame errors occurs.
1 errored-second
5-9
Table 5-3
Parameter
Specifies the action that occurs should a link monitor event occur.
notify
Procedure 5-1 provides an example of an OAM configuration. Procedure 5-1 Configuring OAM
Step 1. 2. 3. Task Administratively enable Ethernet OAM on the specified port(s). Optionally, set the operating mode for the OAM client on the specified port(s). Optionally, configure OAM link monitor functionality for the specified port. Command(s) set port oam port-string status enable set port oam port-string mode {active | passive} set port oam port-string link-monitor {frame | frame-period | frame-seconds | symbol-period} {threshold threshold | window window | action {[syslog] [disable-interface] [notify]} set port oam port-string loopback-rx {ignore | process} set port oam port-string notify-retry retries set port oam port-string remote-loopback enable clear port operstatuscause [port-string] [oam] [oamlb]
4. 5. 6. 7.
Optionally, set the OAM loopback request behavior for the specified port(s). Optionally, set the number of notify retries to send for the specified port. Optionally, enable OAM remote loopback for the specified port(s). Optionally, bring up an interface that has been taken down due to exceeding OAM monitoring thresholds.
5-10
Sets the number of notify retries sent by the remote port to 3. The local port retains the default value of 0 retries. Sets the local and remote ports OAM monitor link frame window to 3 seconds, the threshold to 2 errors and the action to Syslog, disable the interface, and notify, should the frame event threshold be reached.
OAM client
Table 5-4
Term
OAM datalink layer monitoring OAM remote loopback mode OAM remote loopback request behavior symbol symbol-period monitoring
5-12
6
Port Mirroring Configuration
This chapter provides the following information about configuring and monitoring port mirroring on S-Series devices.
For information about... How to Use Port Mirroring in Your Network Implementing Port Mirroring Overview of Port Mirroring Configurations Configuring Port Mirrors Example: Configuring and Monitoring Port Mirroring Example: Configuring a Policy Mirror Destination Refer to page... 6-1 6-3 6-4 6-6 6-9 6-12
6-1
One-to-many
Policy mirroring allows for the same mirror relationships, though policy mirroring applies only to received traffic. Depending on your network, ports that you can configure to participate in mirroring include physical ports, virtual portsincluding Link Aggregation Group (LAG) and host portsVLAN interfaces, and intrusion detection ports that are members of a LAG. For more information, refer to Overview of Port Mirroring Configurations on page 6-4. You can use port mirroring for analyzing bi-directional traffic and ensuring connectivity between, for example, a departmental switch and its high speed uplink to your backbone switch as shown in Figure 6-1. Figure 6-1 Using Port Mirroring to Monitor a Departmental Switch
This one-to-one configuration would allow you to capture traffic in both directions to the backbone uplink port. In this example, you would set a port mirror between departmental switch port 4.1 (source) and the destination port 4.2 connected to the traffic probe. You can also use port mirroring, for example, to monitor all received traffic or a specific type of received traffic to your backbone switch as shown in Figure 6-2.
Figure 6-2
The many-to-one configuration in this example would be possible by setting a port mirror on the backbone between source ports 1.2, 2.2 and 2.1 to destination port 1.1. To monitor a specific type of received traffic (for example, Web trafficTCP port 80) on the source ports, you would associate the source ports with a policy for that traffic type and associate the policy with a policy mirror destination (the destination port). Destination ports can be ports or LAGs. The Standalone device and S-Series module support supports 15 port-mirrors. These mirrors can be a mixed variety of port, VLAN, and IDS combinations. Any or all mirrors can be configured in a many-to-one mirroring configuration (that is, many sources mirrored to one destination). The LAG that is the destination of an IDS mirror can consist of up to 10 ports. Examples of port mirroring combinations on an S-Series module include: 15 port mirrors 15 VLAN mirrors 8 port and 7 VLAN mirrors 12 port and 3 VLAN mirrors 14 port and 1 IDS mirror (where the device mirrors to 10 ports) 14 VLAN and 1 IDS mirror (where the device mirrors to 10 ports)
6-3
You can also use CLI to operationally disable mirroring, if necessary, and to specify whether to mirror received traffic, transmitted traffic, or both. You can also monitor multicast traffic by enabling IGMP mirroring on specific ports.
Note: It is important to not oversubscribe ports in a mirroring configuration. This can cause bottlenecks and will result in discarded traffic.
Once configured, all packets (network, data, control, and so on) received by the switch will be mirrored. Errored packets will not be mirrored. Unless you disable Spanning Tree on destination ports, they will continue to function as active bridge ports, in accordance with the SMON (Switch Monitoring) standard.
LAG Mirrors
Each S-Series module designates a specific number of virtual link aggregation ports which the Link Aggregation Control Protocol (LACP) can use to dynamically group multiple physical ports into one logical link. Once underlying physical ports (such as ge.x.x) are associated with an aggregator port, the resulting aggregation is represented as one Link Aggregation Group (LAG) with a lag.x.x port designation. Refer to the Chapter 17, Link Aggregation Control Protocol (LACP) Configuration for more information. When used as a source port in a mirror, LAG ports act identically to a single physical port. Either dynamic or static LAGs can be used as source ports. When used as a destination port in a mirror, the mirror is configured as an IDS mirror as described in the next section.
IDS Mirrors
Since IDS devices are normally bandwidth limited, they benefit from distribution of mirrored data across multiple ports (for example, a 10 Gigabit port mirrored to multiple Gigabit Ethernet ports). An IDS mirror is a one-to-many port mirror that has been designed for use with an Intrusion Detection System. The target (destination) port of an IDS mirror must be a virtual LAG port that you administratively set, called a static LAG. Once configured, an IDS mirror load-shares traffic among all destination ports in the LAG you set as the port mirror. An S-Series module hashes the source port conversation based on source and destination IP (SIP/DIP) address pairs and sends the same pairs out the same physical port in the destination mirror. This way, each IDS device will see all of the conversations between a DIP/SIP and will not duplicate the same information out multiple destination ports. When IDS mirroring is enabled, the system performs a Layer 3 lookup for all frames. All non-IP traffic (including control frames) is
sent to an arbitrary, designated physical out-port. This port is included in the DIP/SIP hash list. If the S-Series module detects a failure of any of the physical ports in the LAG, it will automatically redistribute the DIP/SIP conversations among the remaining ports in the LAG. With IDS mirroring, source traffic is load-shared among all destination ports to ensure no packet loss. When configuring IDS mirroring on your S-Series device, you must take into consideration the following: Only one IDS mirror is allowed per S-Series chassis. Ten destination ports must be reserved for an IDS mirror. All DIP/SIP pairs will be transmitted out the same physical port. All non-IP traffic will be mirrored out the first physical port in a LAG. This port will also be used for IP traffic. Port failure or link recovery in a LAG will cause an automatic re-distribution of the DIP/SIP conversations.
Refer to Example: Configuring an IDS Mirror on page 6-11 for more information.
VLAN Mirrors
Creating a VLAN and setting a mirror for the VLAN allows you to monitor all traffic to your specified VLAN interface. For example, you could track all data traveling in and out of a confidential group of workstations, such as a Finance VLAN, by analyzing only one connection point. Considerations when configuring VLAN mirrors include: A one-to-many or many-to-one VLAN mirror is considered a single destination port. Many-to-one mapping allows multiple VLANs to be sent to one specific destination port. Oversubscribed traffic will be dropped.
A VTAP interface provides the data source input of a VLAN mirror. VTAP creation is the mechanism for adding a MIB-II interface table entry for a VLAN. A VLAN will not have a MIB-II ifIndex if a VTAP interface does not exist for it. Use the set vlan interface command to create a VTAP interface.
Avoiding Bottlenecks
It is especially important to not oversubscribe ports in a mirroring configuration because this can cause bottlenecks and will result in discarded traffic. If, for example, there are 10 users in VLAN 1, each attached to a 10 Mbps port, when you mirrored VLAN 1 to another 10 Mbps port to which your sniffer is attached, the probe switch would probably have to drop packets at the destination port. Since your purpose in configuring mirroring is to see all of the traffic for VLAN 1, it would be better in this scenario to attach the sniffer to a 100 Mbps port.
Policy Mirrors
The mirror destination mirrors only the received traffic specified in an associated policy. If a source port is associated with both a port mirror and a policy mirror destination, the policy mirror destination takes precedence over the port mirror: the source port traffic specified in the associated policy is mirrored only at the policy mirror destination port, not at the port mirror. For example, a port mirror is created to mirror, on the destination port ge.1.2, the traffic received at source port ge.1.1. Port ge.1.1 is also associated with a policy for Web traffic. That policy has a
6-5
policy mirror destination with ge.1.3 as the destination port. Because the policy mirror destination takes precedence over the port mirror, the Web traffic for port ge.1.1 is mirrored to port ge.1.3 only. Port ge.1.2 mirrors all other traffic with the exception of the Web traffic.
Note: The S-Series hardware does not support both port mirroring and outbound rate limiting of a frame. Port mirroring of an outbound rate limited frame is disabled by default. Use the set port mirroring orl enable command to enable port mirroring and disable outbound rate limiting of outbound rate limited frames.
For information about... Reviewing Port Mirroring Reviewing Policy Mirror Destinations Setting Port or VLAN Mirroring Setting Policy Mirror Destinations Deleting Mirrors
Use this command to display the status of enhanced port mirroring on the device:
show port mirroring enhanced
Examples
This example shows that no port mirrors are configured on the device:
S Chassis(rw)->show port mirroring No Port Mirrors configured. IGMP Multicast Mirror status Disabled Mirror Outbound Rate Limited Frames : Disabled
This example shows that a port mirror is configured between source port vtap.0.5 and ge.1.1 and that both received (Rx) and transmitted (Tx) frames will be monitored. It also shows that mirroring status is currently administratively and operationally enabled. A mirror must be administratively enabled (as described in the next section) and its source and destination ports must have an active link for operational status to be enabled.
S Chassis(rw)->show port mirroring Port Mirroring ==============
Source Port
= vtap.0.5
This example shows how to enable ports ge.3.1 and ge.3.4 for enhanced port mirroring and to display enhanced port mirroring status for this device:
S Chassis(rw)->set port mirroring enhanced enable ge.3.1,4
Port
S Chassis(rw)->
If not specified, both received and transmitted frames will be mirrored. The S-Series hardware does not support both port mirroring and outbound rate limiting of a frame. Outbound rate limiting is enabled and port mirroring is disabled by default for outbound rate limited frames. Use this command to set port mirroring behavior for outbound rate limited frames:
set port mirroring orl {enable | disable}
Note: By default, when you create a port mirror, the port mirror is enabled.
6-7
Examples
This example shows how to create a port mirror to mirror frames sourced on port ge.1.4 and received on port ge.1.11:
S Chassis(rw)->set port mirroring create ge.1.4 ge.1.11 rx
This example shows how to create a many-to-one mirroring configuration between source ports ge.1.2, ge.1.3 and ge.1.4, and target port ge.1.10. By default, frames in both directions will be monitored:
S Chassis(rw)->set port mirroring create ge.1.2-4 ge.1.10
This example enables port mirroring and enables outbound rate limiting of outbound rate limited frames:
S Chassis(rw)->set port mirroring orl enable
This example shows how to configure mirroring from source port 5 to destination port 1 in slot 1 (ge.1.1):
S Chassis(rw)->set vlan interface 5 create S Chassis(rw)->set port mirroring create vtap.0.5 ge.1.1 S Chassis(rw)->show port mirror Port Mirroring ==============
Mirror Outbound Rate Limited Frames : Disabled Note: If you configure a port mirror on an uplink (tagged) port, make sure the port is assigned to egress frames with that VLAN tag. Refer to Chapter 16, VLAN Configuration for more information about configuring VLANs.
Example
This example enables enhanced port mirroring on ports ge.3.1 and ge.3.4:
S Chassis(rw)->set port mirroring enhanced ge.3.1,4
You must also associate the policy mirror destination with either a policy role or a policy rule, which you then must associate with a policy role, by setting the mirror-index for the mirror-destination parameter in the following commands: set policy profile set policy rule admin-profile
The mirror-index value in the set policy commands is the same as the control-index-list value in the set mirror commands. For more information about the policy commands, see Chapter 18, Policy Configuration.
Deleting Mirrors
Use this command to clear a port mirroring configuration:
clear port mirroring source destination
2.
On the console main screen, expand My Network in the file directory tree, right-click All Devices, and select Add Device.
6-9
3. 4. 5.
Model theS-Series device by entering its IP address in the field provided. Click OK. On the console main screen, expand All Devices in the file directory tree to show the IP address(es) of the device(s) you just modeled. Right click on the IP address of the S-Series device and select Device Manager. The device manager screen displays for the S-Series device.
6. 7.
Right click on port 1 (ge.1.1) and select RMON Ethernet Statistics. Repeat step 9 for port 5 (ge.1.5). RMON Ethernet statistics charts will display for ports 1 and 5.
6-10
8. 9.
Note that the section of the two charts that shows the frame count by frame size lists no larger size frames (512-1518 bytes). In the next step, you will create large frames. Open the Command Prompt window and set up a continuous ping to the S-Series device, as shown below. Use -l 1400 to set the size of the ping frame to 1400 bytes and -t to set a continuous ping.
10. Refer back to the RMON Ethernet Statistics windows opened in Steps 9 and 10. You should see the number of 1024 - 1518 frames incrementing on Port 1 because the NMS is connected on this port. You should also see that these larger size frames are not incrementing on Port 5. 11. From the terminal session with the S-Series device, create a port mirroring instance with port 1 (ge.1.1) as the source and port 5 (ge.1.5) as the destination port.
S Chassis(su)->set port mirroring create ge.1.1 ge.1.5 both
13. Refer again to the RMON Ethernet Statistics windows and notice that both port 1 and port 5 are now incrementing the larger size frames. If you connected a network analyzer to port 5, you would see these frames being received and transmitted on port 1.
2.
6-12
7
System Configuration
This document provides the following information about system configuration on the Enterasys S-Series platforms.
For information about... System Properties Overview User Management Overview Management Authentication Notification MIB Overview License Overview SNTP Overview Telnet Overview Secure Shell Overview Domain Name Server (DNS) Overview DHCP Overview Node Alias Overview MAC Address Settings Overview Terms and Definitions Refer to page... 7-1 7-5 7-8 7-10 7-11 7-17 7-18 7-19 7-22 7-27 7-29 7-32
7-1
You must configure your S-Series device with an IP interface and an IP address. You can also configure other system properties on the S-Series device. See Table 7-2. Table 7-2
Task Set IP interfaces. You may specify an IP interface as the default management IP interface. Set the system IP address, subnet mask and default gateway. If not specified, ip-mask will be set to the natural mask of the ip-address and ip-gateway will be set to the ip-address. If not specified, the first IP interface configured on a system becomes the default IP interface. Control the gratuitous ARP processing behavior. By default, gratuitous ARP is disabled. Set the threshold for sending CPU utilization notification messages. A value of 0 will disable utilization notification messages. Change the time of day on the system clock. Enable or disable the daylight savings time function. Configure one of the following: Specific dates to start and stop daylight savings time. These settings will be non-recurring and will have to be reset annually. Recurring daylight savings time settings. These settings will start and stop daylight savings time at the specified day of the month and hour each year and will not have to be reset annually. (Optional) Configure a name for the system. A name string containing a space in the text must be enclosed in quotes as shown in the example below. If string is not specified, the system name will be cleared. (Optional) Identify the location of the system. A location string containing a space in the text must be enclosed in quotes as shown in the example below. If string is not specified, the location name will be cleared. (Optional) Identify a contact person for the system. A contact string containing a space in the text must be enclosed in quotes as shown in the example below. If string is not specified, the contact name will be cleared. set system contact [string] set system location [string] set summertime date start_month start_date start_year start_hr_min end_month end_date end_year end_hr_min [offset_minutes] set time [mm/dd/yyyy] [hh:mm:ss] set summertime {enable | disable} [zone] set system utilization threshold threshold set ip gratuitous-arp [request|reply|both]
set summertime recurring start_week start_day start_month start_hr_min end_week end_day end_month end_hr_min [offset_minutes]
Table 7-2
Task
Set the alias, a text name, for a physical object. If string is not specified, the specified alias will be cleared.
Table 7-3 lists system properties management and display commands for S-Series devices. Table 7-3
Task Display the gratuitous ARP processing behavior. Display system information, including contact information, power and fan tray status and uptime. Display the systems hardware configuration. Display system resource utilization information. Display the current time of day in the system clock. Display daylight savings time settings. Display the alias (a text name) for one or more physical objects.
Display the status of the path MTU (maximum transmission transmission) discovery protocol on the device. Display information about scheduled device resets. Display output for technical support-related commands. Optionally, you can write this output to a file. Clear the IP interface. Clear an IP address. Stop all gratuitous ARP processing.
7-3
Table 7-3
Task
Clear the threshold for sending CPU utilization notification messages. Clear the daylight savings time configuration. Reset the alias for a physical object to a zero-length string.
Reset the asset ID for a module to a zero-length string. Reset the state of the path MTU discovery protocol back to enabled. Reset the device without losing any user-defined configuration settings or to display information about device resets. Reset an option module CPU. Schedule a system reset at a specific future time. This feature is useful for loading a new boot image. Schedule a system reset after a specific time. This feature is useful for loading a new boot image. Clear all user-defined switch and router configuration parameters for one or all modules.
reset nemcpu mod.nemcpu reset at hh:mm [mm/dd] [reason] reset in hh:mm [reason] clear config mod_num | all
2.
Change system default passwords or set a new login password on the CLI. (Only available to users with super-user access.)
7-5
4.
Optionally, disable access to the boot menu during bootup. Access to the boot menu is enabled by default. Set the number of failed login attempts before locking out (disabling) a read-write or read-only user account, the number of minutes to lockout the default admin super user account after maximum login attempts, and the number of inactive days before a non-superuser account is locked out. If you set inactive to 0, no accounts will be locked out due to inactivity. Once a user account is locked out, it can only be re-enabled by a super user with the set system login command.
5.
set system lockout {[attempts attempts] [time minutes [all]] [port {enable | disable] [inactive days [all]] [emergency-access]}
6. 7.
Optionally, enable FIPS mode on the device. Fips mode is disabled by default. Optionally, set the devices security profile. The security profile defaults to normal.
set security fips mode {enable | disable} set security profile {c2 | normal}
Table 7-4 lists user account management and display commands for S-Series devices. Table 7-4
Task To display user login account information. To display current password configuration settings. To display settings for locking out users. To display the current boot access state for this device. To display the current security FIPS mode state for this device.
To display the current security profile for this device. show security profile
Table 7-4
Task
To remove a local login user account or to reset a specified option to its default value. The account is removed if no optional parameters are entered. To reset system lockout parameters to default values. To clear local login password parameters to default values. If no options are specified, all options are reset to default values.
clear system lockout [attempts] [time] [inactive] clear system password [aging] [history] [length] [min-required-chars {[uppercase] [lowercase] [numeric] [special]}] [require-at-creation] [allow-duplicate] [allow-user-id] [substring-match-len] [allow-repeating-chars] [change-first-login] [change-frequency] [expire-warning] [grace-period] clear security boot-access clear security fips mode clear security profile
To reset access to the boot menu during bootup to the default state of enabled. To reset FIPS mode state to the default value of disabled on the device. To reset the device security profile to the default value of normal.
S Chassis(su)->set system login netops read-write enable S Chassis(su)->set password rw Please enter new password: ******** Please re-enter new password: ******** Password changed. S Chassis(su)->set system password age 60 length 6 allow-repeating-chars no S Chassis(su)->set system lockout attempts 5 time 30 inactive 60
7-7
Using WebView
By default, WebView (Enterasys Networks embedded web server for device configuration and management tasks) is enabled on TCP port number 80 of the S-Series device. You can verify WebView status, enable or disable WebView, and reset the WebView port. Procedure 7-3 describes how to configure WebView on an S-Series device. Procedure 7-3 WebView Configuration
Step 1. 2. 3. Task Enable WebView If necessary, change the TCP port for WebView from the default (port 80). Display WebView status to verify your changes. Command(s) set webview {enable | disable} set webview port port show webview
By default, all Management Authentication Notification types are enabled. Procedure 7-4 Management Authentication Notification MIB Configuration
Step 1. Task Enable or disable the Management Authentication Notification MIB. By selecting the optional Management access type, you can specifically enable or disable a single access type, multiple access types or all of the access types. Display the current setting for the Management Authentication Notification MIB. If necessary, set the current setting for the Management Authentication Notification access types to the default setting of enabled. Command(s) set mgmt-auth-notify {enable | disable} [console] [ssh] [telnet] [web]
2. 3.
This example shows how to set only the console and telnet authentication access types to be enabled on the Management Authentication Notification MIB. That information is then displayed with the show command:
S Chassis(su)->set mgmt-auth-notify enable console telnet S Chassis(su)->show mgmt-auth-notify
This example displays the state of Management Authentication Notification access types prior to using the clear command, then displays the same information after using the clear command:
S Chassis(su)->show mgmt-auth-notify
Management Type
Status
7-9
License Overview
S Chassis(su)->clear mgmt-auth-notify
S Chassis(su)->show mgmt-auth-notify
License Overview
A license, purchased separately, is available for the following: Increased port capacity, to 1024 users per S-Series access module or SSA (S-EOS-PPC license) Enhanced routing for S-Series S-130 fabric class (S-EOS-L3-S130 license) Advanced routing for S-Series S-150 fabric class (S-EOS-L3-S150 license)
You must activate the purchased license key. The S-EOS-L3-S130 license is required to run VRF on the S130 class of fabrics or in the S3 chassis with S130 class I/O module installed. In a mixed chassis of S150 and S130 Fabrics, the feature entitlement will revert to the S130 feature set and therefore a license would be required to run VRF in this mixed environment. The S-EOS-L3-S150 license is not currently available. This license is reserved for future routing enhancements on the S150 class of fabrics. The license is activated on an S-Series module or chassis, as applicable, by using the set license command in any command mode to specify the license type and the ASCII advanced licensing key. Use the show license command in any command mode to display the license key once you have activated the license.
Configuring a License
Procedure 7-5 describes how to configure the license on an S-Series device. License commands can be entered in any command mode.
7-10
System Configuration
SNTP Overview
License Examples
The following example shows how to activate a port capacity license:
S Chassis(rw)->set license port-capacity "0001:S-EOS-PPC:0:12345678:0:Enterprise Name:0:abcdefgh:abcdefghijklmnopqrstuvwxyz123456" slot 2
The following example shows how to display an advanced routing license information:
S Chassis(rw)->show license
Location --------
Status ----------
Key ----------------------------------------
port-capacity slot 1 active 0001:S-EOS-PPC:A:BCDEFGHI:0:Enterprise Name:0:12345678:abcdefghijklmnopqrstuvwxyz123456 port-capacity slot 2 active 0001:S-EOS-PPC:1:BCDEFGHI:0:Enterprise Name:0:12345678:abcdefghijklmnopqrstuvwxyz123456 port-capacity slot 3 active 0001:S-EOS-PPC:0:BCDEFGHI:0:Enterprise Name:0:12345678:abcdefghijklmnopqrstuvwxyz123456 l3-s130 chassis active 0001:S-EOS-L3-S130:0:abcdefg:0:Enterprise Name:0:00000000:abcdefghij+abcdefghijklmnopqrst/abcdefghijklmnopqrstuv /1234567890abcdefghijklmno/12345==The following example shows how to clear the port
SNTP Overview
Simple Network Time Protocol (SNTP) provides for the synchronizing of system time for managed devices across a network. The S-Series implementation supports unicast polling and broadcast listening modes of operation to obtain the time from an SNTP server. SNTP is a subset of the Network Time Protocol (NTP) as specified in RFC 1305. The most recent version of SNTP is specified in RFC 2030. Since SNTP is a subset of NTP, all NTP servers are capable of servicing SNTP clients. The SNTP mode is set on the client using the set sntp client command.
SNTP Overview
The default is for all servers to have the same precedence. In this case, the server ordering is based upon the indexing of the server table. The SNTP client makes a request to the SNTP server. The client waits a period of time configured using the set sntp poll-timeout command for a response from the server. If the poll timeout timer expires, the client will resend another request, up to the number of retries specified by the set sntp poll-retry command. If the retries have been exhausted, the client request is sent to the next server with the lowest configured precedence value or the next server in the server table, if precedence values are the same. If no server responds, the client waits the configured poll-interval time period and the process starts over again.
SNTP Authentication
SNTP authentication provides the means for the SNTP client to authenticate the SNTP server using symmetric key cryptography. Because SNTP packet data is not sensitive information, the packet itself does not require encryption. Symmetric key cryptography uses a secret password shared between the SNTP client and server to generate an encrypted checksum which is appended to the SNTP packet data. The S-Series SNTP authentication supports 128-bit MD5 symmetric key cryptography. SNTP authentication is configured by: Globally enabling the mode for the SNTP client Configuring up to 32 SNTP authentication key instances, by specifying: A numeric key that identifies this SNTP authentication instance The MD5 authentication type A password as either an ASCII string of up to 32 printed characters (no white space) or the Hex formatted cypher produced by the previously entered ASCII string
Associating an SNTP key instance with the SNTP server Enabling the authentication trust flag for the SNTP instance key assigned to the SNTP client
Authentication Mode
SNTP authentication mode must be set to enabled for SNTP authentication to occur between the SNTP client and server. When the mode is set to enable, the SNTP client authenticates with the SNTP server before synchronization occurs. When the mode is set to disable, no authentication is performed on SNTP communications. SNTP authentication is set to disabled by default. Use the set sntp authentication mode command to enable SNTP authentication on the SNTP client.
7-12
System Configuration
SNTP Overview
Authentication Key
The SNTP authentication key specifies the authentication instance to be used by the SNTP client when authenticating with the SNTP server. The SNTP client supports the configuration of up to 32 authentication keys. The authentication key instance ID is a numeric value. Each authentication key instance specifies the authentication type and password. SNTP authentication supports the MD5 authentication algorithm. The password is known to both the SNTP client and server. The password consists of an ASCII string of up to 32 non-white characters or the hexadecimal formatted cypher that was generated from the previously entered ASCII string. Use the set sntp authentication key command to configure an authentication key instance. This example shows how to create SNTP authentication key instances 1 - 3:
S Chassis(rw)->set sntp authentication key 1 md5 foobaraboof S Chassis(rw)->set sntp authentication key 2 md5 DEADBEAFCAFEBABEDEADBEAFCAFEBAE S Chassis(rw)->set sntp authentication key 3 md5 0123456789012345678901234567890
The SNTP authentication key is associated with an SNTP server using the set sntp server command. This example shows how to set the server at IP address 10.21.1.100 as an SNTP server and to SNTP authenticate using authentication key instance 1:
S Chassis(rw)->set sntp server 10.21.1.100 key 1
Configuring SNTP
This section provides details for the configuration of SNTP on the S-Series products. Table 7-5 lists SNTP parameters and their default values. Table 7-5
Parameter SNTP authentication mode
SNTP Overview
Table 7-5
Parameter
Specifies whether the current SNTP disabled state is broadcast, unicast, or disabled. Specifies a value that determines the order in which SNTP servers are polled if the precedence values are not the same. Specifies the propagation delay added to the time sent to the client in broadcast listening mode. Specifies the interval between unicast SNTP requests by the client to the server. Specifies the number of times the client will resend the SNTP request to the server before moving on to the next server. Specifies the amount of time a client will wait for a response from the the SNTP server before retrying. Specifies the offset in hours and minutes from UTC for this device 1 (highest precedence)
broadcast delay
3000 milliseconds
poll-interval
16 seconds
poll-retry
poll-timeout
5 seconds
timezone offset
0 hours, 0 minutes
Procedure 7-6 describes how configure SNTP. SNTP can be configured in any command mode. Procedure 7-6 Configuring SNTP
Step 1. 2. Task Set the SNTP operation mode on the client. When operating in broadcast mode, optionally change the broadcast delay period in milliseconds to be added to the server time for this client. When operating in unicast mode, set the SNTP server(s) for this client, optionally specifying a precedence value per server. When operating in unicast mode, optionally change the poll interval between SNTP unicast requests. When operating in unicast mode, optionally change the number of poll retries to a unicast SNTP server. Command(s) set sntp client {broadcast | unicast | disable} set sntp broadcastdelay time
3.
set sntp server ip-address [precedence][key key-instance] set sntp poll-interval interval
4.
5.
7-14
System Configuration
SNTP Overview
7.
Table 7-6 describes how to manage and display SNTP. Table 7-6
Task To display SNTP client settings: To set the SNTP clients operational mode to disable: To remove one or all servers from the SNTP server list: To reset the delay time for SNTP broadcast frames to its default value: To reset the poll interval between unicast SNTP requests to its default value: To reset the number of poll retries to a unicast SNTP server to its default value: To reset the SNTP poll timeout to its default value: To display the current timezone setting: To remove the SNTP timezone adjustment values: To clear SNTP authentication key configuration or reset the SNTP authentication mode to the default value:
SNTP Overview
SNTP Version: 4 Current Time: SAT AUG 01 14:34:53 2009 Timezone: 'EDT', offset from UTC is -4 hours and 0 minutes Client Mode: broadcast Broadcast Delay: 3500 microseconds Broadcast Count: 1 Poll Interval: 512 seconds Poll Retry: 1 Poll Timeout: 5 seconds SNTP Poll Requests: 0 Last SNTP Update: SAT AUG 01 14:23:54 2009 Last SNTP Request: SAT AUG 01 14:23:54 2009 Last SNTP Status: Enabled
Status
Precedence
SNTP-Server
The following example configures the client for SNTP unicast mode with SNTP authentication operational: Enables SNTP authentication mode Creates an SNTP authentication key instance 1 and sets the password to foobar Sets the SNTP server to IP address 10.21.1.100 and assigns authentication key instance 1 to it Set the SNTP authentication key trust flag to enable for key instance 1 Sets the SNTP poll interval to 600 seconds Sets the UTC timezone to Eastern Daylight Time (EDT) Sets the poll retry to 2 Displays the current SNTP configuration
S Chassis(rw)->set sntp client unicast S Chassis(rw)->set sntp authentication mode enable S Chassis(rw)->set sntp authentication key 1 md5 foobar S Chassis(rw)->set sntp authentication trust 1 enable S Chassis(rw)->set sntp server 10.21.1.100 key 1 S Chassis(rw)->set sntp poll-interval 600 S Chassis(rw)->set timezone EDT -4 0 S Chassis(rw)->set sntp poll-retry 2 S Chassis(rw)->show sntp SNTP Version: 4 Current Time: FRI MAY 06 15:33:53 2011 Timezone: 'EDT', offset from UTC is -4 hours and 0 minutes
7-16
System Configuration
Telnet Overview
Client Mode: unicast Broadcast Delay: 3000 microseconds Broadcast Count: 0 Poll Interval: 600 seconds Poll Retry: 2 Poll Timeout: 5 seconds SNTP Poll Requests: 2 Last SNTP Update: MON MAY 02 14:42:52 2011 Last SNTP Request: MON MAY 02 14:42:52 2011 Last SNTP Status: Enabled
SNTP Servers:
Status
Precedence
Key
SNTP-Server
----------------------------------------------------------------------Active 1 1 10.21.1.100
Status
Key
Type
Trusted
S Chassis(rw)->
Telnet Overview
Telnet provides an unsecured communications method between a client and the switch. Telnet is activated by enabling Telnet on the device, using the set telnet enable command in any command mode. Use the show telnet command in any command mode to display whether Telnet is currently enabled or disabled.
Configuring Telnet
Procedure 7-7 describes how to configure and use Telnet on an S-Series device. Telnet commands can be entered in any command mode. Procedure 7-7 Telnet Configuration
Step 1. 2. Task Enable or disable either inbound or outbound or both Telnet services. Verify the Telnet status. Command(s) set telnet {enable | disable} {all | inbound | outbound} show telnet
Telnet Examples
The following example shows how to enable Telnet:
S Chassis(rw)->set telnet enable all
An SSH server resides on the S-Series platform and listens for client connection requests. Once a request is authenticated, a secure connection is formed through which all subsequent traffic is sent. All traffic is encrypted across the secure channel, which ensures data integrity. This prevents someone from seeing clear text passwords or file content, as is possible with the Telnet application. Once SSH has been enabled and the S-Series has at least one valid IP address, you can establish an SSH client session from any TCP/IP based node on the network, by using an application supporting SSH to connect to an IP address and entering your user name and password. Refer to the instructions included with your SSH application for information about establishing a session.
7-18
System Configuration
SSH is activated by enabling the SSH server on the device, using the set ssh enable command in any command mode. Enabling the server automatically generates a host key for the server, used during the life of the client to server connection. The host key type can be set to either dsa or rsa. The host key type defaults to rsa. The SSH server can be reinitialized. Reinitializing the server clears all current client to server connections. Reinitializing the server does not reinitialize the host key. Should you believe the host key has been compromised, or otherwise wish to change it, the host key can be reinitialized using the set ssh hostkey reinitialize command. An SSH session to a remote host can be started using the ssh command. Use the show ssh state command in any command mode to display whether SSH is currently enabled or disabled.
4.
The following command reinitializes the host key on the SSH server:
S Chassis(rw)->set ssh hostkey reinitialize
The port number the DNS resolver uses for DNS queries can be configured. The default port is 53. DNS requests will time out and retry the request after a configurable number of seconds. After a configurable amount of retries, if there is more than a single DNS server configure, the request will be sent to the next configured server for up to the number of configured retries.
Configuring DNS
This section provides details for the configuration of DNS resolution on the S-Series products. Table 7-7 lists DNS parameters and their default values. Table 7-7
Parameter DNS resolver state DNS zone
query-retries
Procedure 7-9 describes how to configure DNS resolution. DNS can be configured in any CLI command mode. Procedure 7-9 Configuring DNS Resolution
Step 1. 2. 3. Task Enable DNS on the switch if you have manually disabled it. DNS is enabled by default. Optionally, set the domain name for this device. Configure the DNS servers for this device. Valid server values are: primary, secondary, tertiary, quaternary. Optionally, configure the DNS zone for IPv4 and IPv6 IP address to name lookups. Optionally, configure the port number the DNS resolver uses for DNS queries. The default port is 53. Optionally, change the number of seconds before a DNS request is retried when the DNS server fails to respond. Command(s) set ip dns enable set ip dns domain name set ip dns server ip-address server
4. 5.
set ip dns zone {ipv4 | ipv6} zone-name set ip dns port-number port-number
6.
7-20
System Configuration
Table 7-8 describes how manage DNS resolution on an S-Series switch. DNS commands can be configured in any CLI command mode. Table 7-8
Task To clear the DNS domain name configuration. To clear the DNS server configuration. To reset the DNS IPv4 or IPv6 zone configuration. To reset the DNS port number used for DNS queries to the default value. To reset the DNS timeout to the default value.
To reset the number DNS query retries to the default value. clear ip dns query-retries To clear all DNS configuration to the default state. To reset DNS status for this device to the default value. To display DNS configuration for this device. clear ip dns all clear dns status show ip dns
Configures the DNS timeout value to 4 seconds Configures the number of query retries to 3
S-Series(rw)->set ip dns domain Enterasys.Documentation S-Series(rw)->set ip dns server 153.50.50.10 primary S-Series(rw)->set ip dns server 153.50.50.20 secondary S-Series(rw)->set ip dns timeout 4 S-Series(rw)->set ip dns query-retries 3 S-Series(rw)->show ip dns Current State: Default DNS domain name: DNS zones: IPv4: IPv6: in-addr.arpa ip6.int Enabled Enterasys.Documentation
DHCP Overview
DNS port number: DNS server timeout: DNS query retries: DNS Name servers
DHCP Overview
The Dynamic Host Configuration Protocol (DHCP) provides services for allocating and delivering IP addresses and other configuration parameters to Internet hosts. DHCP consists of two components: a protocol for delivering host-specific configuration parameters from a DHCP server to a host, and a mechanism for allocating network addresses to hosts. Optional functionality also provides services to complete high-availability, authenticated and QoS-dependant host configuration. The DHCP protocol is based on a client-server model in which a designated DHCP server allocates network addresses and delivers configuration parameters to dynamically configured clients. Throughout the remainder of this section, the term server refers to a host providing initialization parameters through DHCP, and the term client refers to a host requesting initialization parameters from a DHCP server. DHCP supports the following mechanisms for IP address allocation: Automatic DHCP assigns an IP address to a client for a limited period of time (or until the client explicitly relinquishes the address). Manual A client's IP address is assigned by the network administrator, and DHCP is used simply to convey the assigned address to the client.
The amount of time that a particular IP address is valid for a system is called a lease. The S-Series device maintains a lease database which contains information about each assigned IP address, the MAC address to which it is assigned, the lease expiration, and whether the address assignment is dynamic or static. The DHCP lease database is stored in flash memory.
Note: The S-Series DHCP server is not designed to work as the primary DHCP server in an enterprise environment with hundreds of clients that are constantly seeking IP address assignment or reassignment. A standalone DHCP server with a redundant backup server may be more suitable for this type of environment.
7-22
System Configuration
DHCP Overview
Configuring DHCP
This section provides details for the configuration of DHCP on the S-Series products. Table 7-9 lists DHCP parameters and their default values. Table 7-9
Parameter DHCP interface state number of ping packets
ping timeout
500 milliseconds
Procedure 7-10 describes enabling the DHCP feature and client configuration. Procedure 7-10 Enabling the DHCP Server and Configuring Automatic Address Assignment
Step 1. Task Enable DHCP on the routing interface in interface configuration command mode. DHCP is enabled by default. Configure the local address pool to be used as a DHCP subnet for automatic IP address assignment. Optionally, in local address pool configuration mode, exclude a range of IP addresses from the configured local pool subnet, specifying the beginning IP address and the number of additional addresses to exclude. Enter DHCP address pool configuration command mode for the specified pool. Specify, in DHCP pool or client-class mode, the lease duration for an IP address dynamically assigned by a DHCP server to a client. In DHCP pool configuration mode, enable DHCP host configuration mode and optionally associate a client class with a DHCP client. In DHCP pool configuration mode, specify parameters for a new DHCP client address. Specify, in configuration command mode, the number of packets a DHCP Server sends to a pool address as part of a ping operation. Specify, in configuration command mode, the number of milliseconds the DHCP server will wait for a ping reply from an IP address before timing out. Command(s) ip dhcp server
2.
3.
4. 5.
6.
client-identifier unique-identifier [client-class name] hardware-address hardware-address [type] ip dhcp ping packets number
7. 8.
9.
DHCP Overview
Table 7-10 describes how to configure the router. Table 7-10 Configuring Static IP Address Assignment
Task Optionally, configure static IP address assignment in DHCP host configuration command mode by specifying an host IP address and network mask for a static DHCP binding. Use either the hardware-address or client-identifier command in DHCP pool configuration command mode to enter host configuration command mode. Command(s) host address [mask | prefix-length]
Client Configuration
Command(s) domain-name name
2.
3.
4.
6.
bootfile filename
7.
next-server ip-address
8. 9.
option code [instance number] {ascii string | hex string | ip address} client-name name [client-class name]
10.
client-class name
7-24
System Configuration
DHCP Overview
Table 7-11 describes how to manage and display DHCP. Table 7-11 Managing and Displaying DHCP
Task Command(s)
To display IP DHCP bindings, in any command mode enter: show ip dhcp binding [ip-address] To display DHCP server statistics, in any command mode enter: To delete one or all automatic DHCP address bindings, in configuration command mode enter: To clear ip dhcp server statistics, in configuration command mode enter: show ip dhcp server statistics clear ip dhcp binding {address | *} clear ip dhcp server statistics
DHCP Server
DHCP provides the following mechanisms for IP address allocation by a DHCP server: AutomaticDHCP assigns an IP address, from a range of addresses defined by the ip local pool command in configuration mode and configured as a pool of addresses by the ip dhcp pool command. The address is assigned to a client for a limited period of time set by the lease command (or until the client explicitly relinquishes the address). The exclude command is used to exclude one or more IP addresses from a DHCP local address pool. ManualA clients IP address is assigned by the network administrator using the host command in DHCP host configuration command mode, and DHCP is used simply to convey the assigned address to the client. Enter DHCP host configuration command mode using the hardware-address or client-identifier commands in DHCP pool configuration command mode. The hardware-address or client-identifier command specifies the client hardware address and client unique identifier, respectively.
The S-Series device maintains a lease database which contains information about each assigned IP address, the MAC address/unique identifier to which it is assigned, the lease expiration, and whether the address assignment is automatic or static. In addition to assigning IP addresses, the DHCP server can also be configured to assign the following to requesting clients: Default router(s), using the default-router command in DHCP pool configuration command mode DNS server(s), using the dns-server command, and domain name, using the domain-name command in DHCP pool configuration command mode NetBIOS WINS server(s), using the netbios-name-server command, and node type, using the netbios-node-type command in DHCP pool configuration command mode Boot file, using the bootfile command mode in DHCP pool configuration command mode DHCP options as defined by RFC 2132, using the option command in DHCP pool configuration command mode Next server in the DHCP server boot process, using next-server in the DHCP pool configuration command mode
DHCP Overview
Client-classes are created within a DHCP pool context using the client-class command. There are two modes in which a client-class can be assigned, by: Directly associating a client-class with a client binding using either the hardware-address or client-identifier commands Receiving a dynamic request with DHCP option 77 (user class) client-class match
These settings will apply to any client configured within pool1 that is not overwritten by either a client class setting or a received option setting. The example first configures a local pool pool1 to either automatically or allow the manual setting of IP addresses from the 10.60.0.0 subnet. IP addresses 10.60.0.10 - 30 are excluded from the local pool1. These addresses cannot be automatically or manually assigned to clients in this pool. DHCP pool configuration is then entered for pool1 setting the default router to 1.1.1.1 and the DNS server to 2.2.2.2. When client classes are not applied, these values will be configured along with all the other values listed for this pool. Client-class class1 is configured as specified above. The client-class class1 is applied to client 00:11:22:33:44:55. Entering host configuration mode for this client, the DNS server is set to IP address 5.5.5.5. This setting will override the class1 DNS server setting for this client. The host IP address for this client is manually set to 10.60.0.1 from the local pool. If the client IP address were not manually set, the client IP address would have been automatically set from the local pool of addresses configured for pool1.
S Chassis(rw-config)->ip local pool pool1 10.60.1.0 255.255.255.0 S Chassis(rw-config-ip-local-pool)->exclude 10.60.1.10 20 S Chassis(rw-config-ip-local-pool)->exit S Chassis(rw-config)->ip dhcp pool pool1 S Chassis(rw-config-dhcp-pool)->domain-name MyCompany.com S Chassis(rw-config-dhcp-pool)->bootfile dhcpboot S Chassis(rw-config-dhcp-pool)->option 72 ip 10.70.0.10 10.70.0.11 10.70.0.12 S Chassis(rw-config-dhcp-pool)->next-server 10.70.0.12 S Chassis(rw-config-dhcp-pool)->lease 100 S Chassis(rw-config-dhcp-pool)->default-router 1.1.1.1
7-26
System Configuration
S Chassis(rw-config-dhcp-pool)->dns-server 2.2.2.2 S Chassis(rw-config-dhcp-pool)->client-class class1 S Chassis(rw-config-dhcp-class)->default-router 3.3.3.3 S Chassis(rw-config-dhcp-class)->dns-server 4.4.4.4 S Chassis(rw-config-dhcp-class)->exit S Chassis(rw-config-dhcp-pool)->hardware-address 00:11:22:33:44:55 client-class class1 S Chassis(rw-config-dhcp-host)->dns-server 5.5.5.5 S Chassis(rw-config-dhcp-host)->host 10.60.0.1 S Chassis(rw-config-dhcp-host)->exit S Chassis(rw-config-dhcp-pool)->exit S Chassis(rw-config)->
Table 7-12 describes how to display and manage the node alias on the S-Series device. Table 7-12 Managing Node Alias
Task To display the current port node alias state and maximum entries settings. Command(s) show nodealias config [port-string]
To display node alias entries for all or the specified port(s). show nodealias [port-string]
clear nodealias {port port-string | alias-id alias-id | [protocols protocols]} clear nodealias config port-string
Port: ge.1.1
Time:
2009-07-24 16:20:37
-------------------------------------------------------Alias ID Vlan ID Protocol Rtr priority = 194020 = 1 = vrrp = 0xff Active MAC Address Rtr ID = true = 00-00-5e-00-01-01 = 0x01
The following example displays all entries on port ge.1.1 with a MAC address beginning with 00-90:
S-Series(rw)->show nodealias mac 00-90 ge.1.1
Port: ge.1.1
Time:
2009-07-24 16:28:47
-------------------------------------------------------Alias ID Vlan ID Protocol = 194067 = 1 = ip Active MAC Address Source IP = true = 00-90-27-17-13-e7 = 10.21.2.95
The following example displays all entries on port ge.1.1 with an IP subnet of 10.21.*.*
S-Series(rw)->show nodealias protocol ip ip_address 10.21 ge.1.1
Port: ge.1.1
Time:
2009-07-25 08:12:33
7-28
System Configuration
-------------------------------------------------------Alias ID Vlan ID Protocol . . . = 194426 = 1 = ip Active MAC Address Source IP = true = 00-00-5e-00-01-01 = 10.21.64.1
Port: ge.1.1
Time:
2009-07-25 08:25:15
-------------------------------------------------------Alias ID Vlan ID Protocol = 194460 = 1 = ip Active MAC Address Source IP = true = 00-01-f4-5b-5f-a7 = 10.21.64.1
Port: ge.1.1
Time:
2009-07-25 08:14:45
-------------------------------------------------------Alias ID Vlan ID Protocol = 194435 = 1 = ip Active MAC Address Source IP = true = 00-e0-63-86-2b-bf = 10.21.64.2
Age Time
Both learned and statically configured MAC addresses can be assigned an age in seconds after which they will be flushed from the FID. The default value is 300 seconds. Use the set mac agetime command in any command mode to configure the MAC age-time for MAC addresses on this device. The following example sets the age-time for MAC addresses on this device to 600 seconds:
S Chassis(rw)->set mac agetime 600 S Chassis(rw)->show mac agetime Aging time: 600 seconds S Chassis(rw)->
Unicast MAC addresses can be statically entered into a FID for a single port. This entry can be configured as either permanent or ageable. If ageable, it will age out the same as a dynamically learned MAC address.
MAC Address
FID
Port
Type
Status
----------------- ---- ------------- ------- ------00-00-5E-00-01-01 1 00-16-41-A8-8F-D8 1 00-A0-C9-0A-8F-52 1 00-A4-01-FF-0E-01 1 00-B0-D0-B7-D2-C5 1 S Chassis(rw)-> ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 learned learned learned mgmt learned ageable
Unicast as Multicast
The unicast as multicast feature causes unicast searches in the filter data base to match on statically configured multicast entries using hardware forwarding. The unicast as multicast feature is used when a data stream originates from or is forwarded to a unicast address that then forwards it to multiple hosts, such as when using Network Load Balancing (NLB). When unicast as multicast is enabled on the device, a lookup is performed to determine if the unicast address has also been configured for multicast on the device. If a multicast address is found, packets are hardware forwarded out the configured VLAN and port(s) as defined in the static multicast configuration by extending the search phase of the Layer 2 lookup to match an unlearned destination MAC address against static multicast MAC entries.. The unicast as multicast feature is configured by: 1. Using the set mac multicast command, in any command mode, to specify the MAC address to be treated as a multicast address, specifying the VLAN and egress port(s) to use
7-30
System Configuration
2.
Using the set mac unicast-as-multicast command, in any command mode, to enable static unicast MAC addresses to be treated as multicast addresses on this device
The following command enables the unicast as multicast feature on this device:
S Chassis(rw)->set mac unicast-as-multicast enable S Chassis(rw)->show mac unicast-as-multicast Unicast as multicast: enabled S Chassis(rw)->
Use the set movedaddrtrap command in any command mode to enable SNMP trap messaging to report detection of a moved MAC address either globally on the device or on a specified port basis. The moved MAC address trap feature is disabled by default. The following example configures SNMP trap messaging to send a notification when a moved MAC address is detected on port ge.1.1:
S Chassis(rw)->set movedaddrtrap ge.1.1 enable S Chassis(rw)->
Procedure 7-13 describes how to configure MAC address settings. All commands for this feature can be set in any command mode. Procedure 7-13 Configuring MAC Address Settings
Step 1. 2. 3. 4. Task Optionally, change the age time for MAC addresses FID entries for this device. Optionally, limit a multicast MAC address to a specific port within a VLAN. Optionally, enter a static unicast MAC address into the FID. Optionally, enable unicast MAC addresses to be treated as multicast MAC addresses on this device. Optionally, enable SNMP trap messaging to report the detection of new MAC addresses for the specified port or all ports. Command(s) set mac agetime time set mac multicast mac-address vlan-id [port-string] {append | clear} set mac unicast mac-address fid receive-port [ageable] set mac unicast-as-multicast {enable | disable} set newaddrtrap [port-string] {enable | disable}
5.
Domain Name Server (DNS) resolver Dynamic Host Configuration Protocol (DHCP) entry FID manual address assignment node alias poll-interval poll-timeout precedence Secure Shell (SSH)
7-32
System Configuration
7-34
System Configuration
8
Security Mode Configuration
This chapter provides information about configuring and monitoring security modes on S-Series devices.
For information about... How to Use Security Mode in Your Network Implementing Security Mode Configuring Security Mode Security Mode Configuration Example Terms and Definitions Refer to page... 8-1 8-6 8-6 8-7 8-7
Boot menu access which enables or disables access to the boot menu
Note: Super-user administrative privilege is required to access security mode configuration for FIPS, security profile, and boot menu access.
8-1
Note: Changing the FIPS security mode of the switch requires a system reset.
Note: Changing the security profile mode of the switch requires a system reset.
By default you can gain access to this menu as the device is booting by pressing any key once you see the line:
Press any key to enter System Image Loader menu
Pressing any key places you at the System Image Loader prompt:
[System Image Loader]:
See Setting the Boot Firmware Image on page 3-7 for additional boot menu information. Access to the boot menu can be enabled or disabled using the set security boot-access command. The show security boot-access command displays the current boot menu access setting for the device. Disabling access to the boot menu affects all user privilege modes, including super-user.
Description Sets the time an idle console, SSH or Telnet CLI session will remain connected before being logged out. See Using the CLI on page 2-1 for additional configuration information. Sets the number of minutes to lockout the default admin super-user account after maximum login attempts. See User Management Overview on page 7-5 for additional configuration information. Sets the minimum interval in minutes between password changes allowed for non-super-users. See User Management Overview on page 7-5 for additional configuration information. Sets the number of inactive days before a non-super-user account is locked out. See User Management Overview on page 7-5 for additional configuration information. Sets a grace period in either the number of logins or days before the password is locked out. See User Management Overview on page 7-5 for additional configuration information. Sets the number of days after a password expires before the password is locked out. See User Management Overview on page 7-5 for additional configuration information. Sets the SNMP user configuration privacy. Sets the SNMP user configuration authentication.
8 minutes
0 never
1 day
0 never
90 days
0 off
3 logins
0 off
30 days
8-3
Description Sets the number of failed login attempts before locking out (disabling) a read-write or read-only user account. See User Management Overview on page 7-5 for additional configuration information.
Description Sets the authentication type required for this user as MD5 or SHA. Only MD5 is affected by C2 security profile mode. Sets the privacy protocol to Advanced Encryption Standard (AES) or Data Encryption Standard (DES). Only DES is affected by C2 security profile mode. Creates a new SNMPv3 user. Sets the properties for one or more console ports. Only VT100 is affected by C2 security profile. See Console Port Parameters on page 4-3 for additional configuration information.
Allowed
DES Cloaked
Description Secure directory including secure logs. See Configuration and Image File Display Commands on page 3-9 for additional configuration information.
Table 8-4
Description The display of messages logged on all blades. See Interpreting Messages on page 21-6 for additional configuration information. Script access to secure logs. See Running a Configuration Script on page 3-8 for additional configuration information. Display technical support-related information output. See Table 7-3 on page 7-3 for additional configuration information. Display of encrypted passwords is cloaked in the show config command output. See Executing a Configuration on page 3-2 for additional configuration information. Display of encrypted passwords is cloaked in the show file command output. See Table 7-3 on page 7-3 for additional configuration information. The non-append version of the configure command is not available. See Executing a Configuration on page 3-2 for additional configuration information.
script
show support
show config
show file
configure
Ability to create, modify, or delete snmp users, {set | clear} snmp {user | access | notify | access views, traps configuration and engine ID is engine-id} not available. See Configuring SNMP on page 14-7 Ability to create, modify, or delete the authentication login method. See Setting the Authentication Login Method on page 7-7 for additional configuration information. Ability to create, modify, or delete system login, lockout, or password. See User Management Overview on page 7-5 for additional configuration information. Ability to create, modify, or delete console settings. See Console Port Parameters on page 4-3 for additional configuration information. Ability to create, modify, or delete logging local, application, default, server or here. See Syslog Overview on page 21-2 for additional configuration information. Ability to display or set the C2 security profile mode. Ability to display or set the FIPS security mode. Ability to display or set the security boot access mode. Ability to clear the configuration on all modules. {set | clear} authentication login
{show | set} security profile {show | set} security fips mode {show | set} security boot-access clear config all
8-5
Description Secure directory including secure logs. The display of messages logged on all blades. Script access to secure logs. Display technical support-related information output. Display of encrypted passwords is cloaked in the show config and show file command outputs. The non-append version of the configure command is not available. Ability to display or set the C2 security profile. Ability to display the FIPS security mode. Ability to display the security boot access mode.
Refer to the Enterasys S-Series CLI Reference for more information about each command.
Refer to the Enterasys S-Series CLI Reference for a description of the output of each command.
S Chassis(su)->set security fips mode enable This command will reset the system. Resetting system ... S Chassis(su)->set security profile c2 This command will reset the system. Resetting system ... S Chassis(su)->set security boot-access disable Are you sure you want to continue? (y/n) [n]y
8-7
Table 8-8
Term
FIPS security
9
IPsec Protocol Configuration
This chapter provides information about configuring and monitoring the IPsec protocol on S-Series devices.
For information about... How to Use IPsec in Your Network IPsec Implementation Requirements Understanding the IPsec Protocol Configuring IPsec Terms and Definitions Refer to page... 9-1 9-2 9-3 9-7 9-12
HMAC-SHA1 is the supported IKE integrity mechanism. 3DES and the Advanced Encryption Standard (AES) encryption algorithms are supported. AES supports key lengths of 128, 192, and 256 bits. IPsec does not prevent the independent simultaneous use of MSCHAP-V2 style encryption of user passwords between the switch and the RADIUS server. If FIPS security mode is enabled, using the set security fips mode command, only the SHA1 authentication algorithm is supported.
9-1
Configure the IPsec default instance by assigning an IKE map to it. Optional IPsec and IKE configuration includes enabling IPsec traps.
IKE Proposal
For this release, the following IKE proposal parameters do not support default values and must be manually configured: The IKE Diffie-Hellman group. The IKE proposal encryption. The IKE proposal SHA1 hash and integrity (authentication).
IKE Policy
The following IKE policy parameters must be manually configured: The Authentication Pre-Shared Key (PSK) The IKE policy lifetime. This release does not provide a default value. The policy SA peer (server). The IKE proposal assignment to the IKE policy. The IKE version. This release does not provide a default value.
IKE Map
For this release, the following IKE map parameters must be manually configured: The UDP protocol. This release does not provide a default value. The destination IPv4 or IPv6 address (server). The encapsulation mode. This release does not provide a default value. The IKE map lifetime and bandwidth. This release does not provide a default value. The IKE policy assigned to the IKE map. The IKE proposal assigned to the IKE map. The source IPv4 or IPv6 address (local device).
ESP operates directly on top of IP, using IP protocol number 50. The Security Association (SA) protocol provides a bundle of algorithms and data required for ESP operations that are the basis for IPsec. The algorithms and data configured within an SA are used to encrypt and authenticate a particular flow in one direction. In a standard bi-directional communications session, two SAs are used, one for each direction. Security associations are established using the Internet Security Association and Key Management Protocol which provides for manual configuration of pre-shared secrets (keys) using the Internet Key Exchange (IKE). IPsec identifies the SA that determines the protection to provide to an outgoing packet based upon a Security Parameter Index (SPI) and the packet header destination address. The SPI is an index to the security association database. The S-Series IPsec implementation supports the configuration of a default SA. A default SA is configured by entering the IPsec default instance configuration mode and assigning an IKE map to the default SA.
IKE Map
An IKE map groups together all algorithms and parameters that make up the SA. An IKE map contains the following parameters: The IKE proposal which groups the IKE map algorithms configured for the SA The IKE policy which groups policy related parameters configured for the SA The source and destination IP address and port for the SA The encapsulation type for the SA The map lifetime in time and bandwidth The transmission protocol (UDP) used by the SA Whether or not encryption is required
Use the crypto ike-map command in global VRF router configuration mode to create or modify an IKE map and enter IKE map configuration mode.
IKE Proposal
The IKE proposal groups together the IKE map algorithms configured for the SA. There are two IKE modes to which proposals are assigned: main mode and quick mode. The same IKE proposal can be assigned to both modes, or each mode can be assigned a unique IKE proposal depending upon your configuration needs.
9-3
The main mode or key exchange proposal is assigned to an IKE map in IKE map configuration mode. Main mode is the IKE negotiation that establishes a secure channel, known as the Internet Security Association and Key Management Protocol (ISAKMP) SA, between two devices. Quick mode (also known as Phase 2) is the IKE negotiation that establishes a secure channel between two computers to protect data. Quick mode negotiates on behalf of the IPsec SAs. During quick mode, keying material is refreshed or, if necessary, new keys are generated. The quick mode proposal is assigned to an IKE policy using the proposal command in IKE policy configuration mode. Use the crypto ike-proposal command in global VRF router configuration mode to create or modify an IKE proposal. Specify the name of the IKE proposal when entering the command. Upon entering the command, you are placed in IKE proposal configuration mode for the named proposal. See Table 9-1 for a description of IKE proposal parameters. Use the proposal command in IKE map configuration mode to assign a main mode (key exchange) proposal to an IKE map. Table 9-1
Parameter IKE Diffie-Hellman (DH) group
Encryption
Encryption is the process of transforming information, usually referred to as plaintext, using an algorithm, called a cipher, to make it unreadable to anyone except those possessing the associated key. The IKE proposal supports four encryption types: 3des Triple Data Encryption Standard encryption algorithm aes128cbc The Advanced Encryption Standard (AES) 128 bit key size Cipher-Block Chaining (CBC) encryption algorithm. aes192cbc The Advanced Encryption Standard (AES) 192 bit key size Cipher-Block Chaining (CBC) encryption algorithm. aes256cbc The Advanced Encryption Standard (AES) 1256 bit key size Cipher-Block Chaining (CBC) encryption algorithm. This release does not support a default encryption algorithm. You must manually enter an encryption algorithm. Use the encryption command in IKE proposal configuration mode to set the encryption algorithm for the IKE proposal.
Hash
The hash algorithm is used during phase 1 negotiation between the SA authenticating devices. This release supports the Secure Hash Algorithm 1 (SHA1) hash. This release does not support a hash default value. You must manually enter the hash algorithm for one to be configured. Use the hash command in IKE proposal configuration mode to configure the hash algorithm for the IKE proposal.
Table 9-1
Parameter Integrity
IKE Policy
The IKE policy groups together policy related parameters configured for the SA. Use the crypto ike-policy command in global VRF router configuration mode to create or modify an IKE policy. Specify the name of the IKE policy when entering the command. Upon entering the command you are placed in IKE policy configuration mode for the named policy. See Table 9-2 for a description of IKE policy parameters. Table 9-2
Parameter Authentication Pre-shared Key
Initial Contact
If the local host has rebooted, peers may have SAs that are no longer valid. If the initial contact feature is enabled, upon reboot an initial contact message is sent to a peer so that it will delete old SAs. Use the initial-contact command to enable the initial contact feature for the SA. The initial contact feature is disabled by default.
Lifetime
The IKE policy lifetime specifies the life cycle of an ISAKMP SA and is configured in minutes. The policy lifetime determines when a policy times out. A lifetime renegotiation automatically occurs before the lifetime is to expire. If the renegotiation is unsuccessful, the policy expires. Use the lifetime time command in IKE policy configuration mode to configure an IKE policy timeout period.
Passive Mode
Passive mode configures the IKE policy to wait for the peer to initiate the IKE session. By default a device is in active mode and constantly polls to see if the peer is up. Use the passive command in IKE policy configuration mode to configure the IKE policy for passive mode.
9-5
Table 9-2
Parameter Peer
The quick mode proposal, used to establish and refresh user-level SAs, is assigned to an IKE policy using the proposal command in IKE policy configuration mode. The S-Series supports IKE version 1 for this release. Use the version command in IKE policy configuration mode to specify the IKE version used for the policy. This release does not support a default IKE version. You must manually enter an IKE version.
Version
Encapsulation
The SA encapsulation is determined by the type of communications required and determines whether the whole packet or only the data portion of the packet is encrypted and authenticated. There are two modes of encapsulation: Transport mode is used for host-to-host communications. In transport mode, only the transferred data of the IP packet is encrypted or authenticated. The routing is intact, since the IP header is neither modified nor encrypted; however, when the authentication header is used, the IP addresses cannot be translated, because to do so would invalidate the hash value. Tunnel mode is used to create virtual private networks. In tunnel mode, the entire IP packet is encrypted or authenticated. It is then encapsulated into a new IP packet with a new IP header.
This release does not support a default SA encapsulation. You must manually configure IKE map encapsulation.
Configuring IPsec
Use the encapsulation command in IKE map configuration mode to specify the encapsulation mode to use for the SA.
SA Lifetime
A lifetime can be set for the SA in both seconds and aggregate bandwidth. When a lifetime expires the SA is renegotiated as a security measure. This release does not support a default SA lifetime. You must manually configure an SA lifetime for this IKE map. Use the lifetime command in IKE map configuration mode to configure a lifetime value for the SA.
Transmission Protocol
The UDP protocol is supported for SA packet transmission. This release does not support a default SA transmission protocol. You must manually configure an SA transmission protocol for this IKE map. Use the protocol udp command to specify UDP as the SA transmission protocol.
Encryption Request
By default, encryption is required to be used for the SA both locally and by the peer. If the peer does not support encryption, packets are not sent for the SA. If encryption request is enabled and the peer does not support encryption, packets are sent unencrypted. Use the request command to set the requirement for encryption to request for the SA. Request is disabled by default.
Configuring IPsec
IKE Proposal Configuration
Procedure 9-1 describes IKE proposal configuration on the Enterasys S-Series devices. Procedure 9-1 Configuring an IKE Proposal
Step 1. Task Enter IKE proposal configuration mode, from the global VRF router configuration mode, to create a new or modify an existing IKE proposal. In IKE proposal configuration mode, configure the IKE Diffie-Hellman (DH) key exchange group for the SA: DH group 1 (modp768) DH group 2 (modp1024) DH group 14 (modp2048) 3. In IKE proposal configuration mode, configure the encryption algorithm for the IKE proposal. encryption {3des | aes128cbc | aes192cbc | aes256cbc} Command(s) crypto ike-proposal proposal-identifier
2.
dh_group {1 | 2 | 14}
9-7
Configuring IPsec
Refer to the Enterasys S-Series CLI Reference for more information about each command.
2.
3. 4. 5. 6. 7. 8.
initial-contact lifetime time minutes passive peer address proposal proposal-identifier version version
Refer to the Enterasys S-Series CLI Reference for more information about each command.
2.
src address
Configuring IPsec
4. 5.
6. 7.
8. 9.
10. 11.
Refer to the Enterasys S-Series CLI Reference for more information about each command.
IPsec Configuration
Procedure 9-4 describes IPsec configuration on the Enterasys S-Series devices. Procedure 9-4 Configuring IPsec
Step 1. Task Enter the IPsec default SA configuration mode, from the global VRF router configuration mode, to configure IPsec on the device. In IPsec default SA configuration mode, assign an IKE map to the IPsec default SA. In global VRF router configuration mode, optionally enable IPsec traps. In global VRF router configuration mode, enable IPsec on the router. Command(s) crypto ipsec default
2. 3. 4.
Refer to the Enterasys S-Series CLI Reference for more information about each command.
9-9
Refer to the Enterasys S-Series CLI Reference for a description of the output of each command.
2. 3. 4. 5. 6.
The following configuration example will follow the IPsec configuration order suggested above.
IKE Proposal
As indicated in IKE Proposal on page 9-3, there are two IKE modes to which an IKE proposal is assigned:
9-10
Each IKE mode can be assigned a unique IKE proposal or the same proposal may be assigned to both modes, depending upon your configuration requirements. For this example we will configure a single IKE proposal named winRadiusPro, to be used in both IKE modes, with the following values: IKE Diffie-Hellman key exchange group 14 Encryption aes128cbc Hash SHA1 Integrity SHA1
S Chassis(su)->configure S Chassis(su-config)->crypto ike-proposal winRadiusPro S Chassis(su-crypto-proposal)->dh_group 14 S Chassis(su-crypto-proposal)->encryption aes128cbc S Chassis(su-crypto-proposal)->hash sha1 S Chassis(su-crypto-proposal)->integrity sha1 S Chassis(su-crypto-proposal)->exit S Chassis(su-config)->
IKE Policy
The IKE policy for this example is named winRadiusPol. The initial contact and passive mode features will not be enabled for this configuration. The winRadiusPol IKE policy is configured with the following values: Authentication pre-shared key testkey Lifetime 360 minutes Peer address 1.1.191.22 IKE quick proposal winRadiusPro IKE version 1
S Chassis(su-config)->crypto ike-policy winRadiusPol S Chassis(su-crypto-policy)->authentication psk testkey S Chassis(su-crypto-policy)->lifetime time 360 S Chassis(su-crypto-policy)->peer 1.1.191.22 S Chassis(su-crypto-policy)->proposal winRadiusPro S Chassis(su-crypto-policy)->version 1 S Chassis(su-crypto-policy)->exit S Chassis(su-config)->
IKE Map
The IKE map for this example is named winRadius. IKE map parameters are configured with the following values: IKE main proposal winRadiusPro IKE policy winRadiusPol Source IP address 192.1.1.0/24 Source port standard RADIUS port 500
Destination IP address 192.2.2.0/24 Destination port standard RADIUS port 500 Encapsulation type transport Lifetime time 5 minutes Lifetime bandwidth 100000 kilobytes The transmission protocol udp Encryption request enabled
S Chassis(su-config)->crypto ike-map winRadius S Chassis(su-crypto-map)->proposal winRadiusPro S Chassis(su-crypto-map)->policy winRadiusPol S Chassis(su-crypto-map)->src 192.1.1.0/24 S Chassis(su-crypto-map)->src-port 500 S Chassis(su-crypto-map)->dst 192.2.2.0/24 S Chassis(su-crypto-map)->dst-port 500 S Chassis(su-crypto-map)->encapsulation transport S Chassis(su-crypto-map)->lifetime time 5 S Chassis(su-crypto-map)->lifetime bandwidth 100000 S Chassis(su-crypto-map)->protocol udp S Chassis(su-crypto-map)->request S Chassis(su-crypto-map)->exit S Chassis(su-config)->
IPsec
For this release an IPsec default instance is configurable. You assign the IKE map winRadius to the IPsec default instance within IPsec default instance configuration mode. You enable IPsec on the router in global VRF router configuration mode. For this IPsec configuration example we will also enable IPsec traps.
S Chassis(su-config)->crypto ipsec default S Chassis(su-crypto-ipsec-defaul)->ike map winRadius S Chassis(su-crypto-ipsec-defaul)->exit S Chassis(su-config)->crypto ipsec trap-enable S Chassis(su-config)->crypto ipsec enable S Chassis(su-config)->
9-12
Table 9-4
Term Encryption
ESP Authenticity ESP Confidentiality ESP Integrity Hash IKE Diffie-Hellman Group IKE Map IKE Policy IKE Proposal
Initial Contact Internet Key Exchange protocol (IKE) IPsec Security Association (SA) Security Parameter Index (SPI)
The Internet Protocol Security Architecture, defined in RFC 4301, that provides a set of security services for traffic at the IP layer in both IPv4 and IPv6 environments. The establishment of shared security attributes between two network entities to support secure communication within the IPsec protocol suite. An index to the security association database that helps in differentiating between two traffic streams where different encryption rules and algorithms may be in use.
9-14
10
Tracked Object Manager Configuration
This document provides the following information about configuring the tracked object manager on the Enterasys S-Series platform.
For information about... Using Tracked Object Manager in Your Network Implementing Probes Tracked Object Manager Overview Configuring a Probe for Policy Based Routing Configuring a Probe for Layer 3 Tunneling Configuring a Probe for Server Load Balancing Configuring a Probe for TWCB Configuring a Probe for VRRP Configuring Tracked Object Manager Terms and Definitions Refer to page... 10-1 10-2 10-3 10-8 10-9 10-9 10-10 10-11 10-12 10-14
The tracked object manager supports the configuration of a probe on four S-Series applications. The type of probe used depends upon the S-Series application using it. Configure a probe for: Policy Based Routing (PBR) to monitor a next hop IP address using an ICMP probe
Implementing Probes
Server Load Balancing (SLB) to monitor an LSNAT real server IP address using an ICMP ping, or a port using TCP or UDP port verification, as well as verify an application running on the real server, by configuring the TCP or UDP probe for ACV Transparent Web Cache Balancing (TWCB) to monitor a cache IP address using an ICMP probe or perform port verification on the cache server, by configuring a TCP or UDP probe Virtual Router Redundancy Protocol (VRRP) to monitor a critical IP interface using an ICMP probe
Note: Prior to the S-Series Firmware Release 7.21, the tracked objects functionality was performed in policy based routing by the route map pinger feature, and the probe functionality was performed in SLB and TWCB by fail detection. Both route map pinger and the previous application based fail detection have been removed from the S-Series firmware and have been replaced by the tracked object manager feature.
Implementing Probes
To configure a probe: Create the probe by specifying a probe name and type Optionally configure a description to be associated with this probe Optionally modify the number of consecutive failed faildetect probes that will determine when the service is declared down Optionally modify the interval between faildetect probes Optionally modify the number of successful pass detection probes that will determine when a service marked as down will be declared up Optionally modify the interval between pass detection probes Optionally modify the length of time the tracked object manager will wait for a response from the monitored service before declaring that a probe request failed For a TCP probe, optionally modify the open interval that sets how long the tracked object manager should wait for the completion of the TCP 3-way handshake When configuring ACV on a TCP or UDP probe: Set the request string that will initiate the ACV session on the server Set the reply string that will validate the server response to the request string If required by the protocol being monitored, configure a close string to close the session
10-2
The three probe protocols supported by the tracked object manager are ICMP, UDP, and TCP. Probe parameters are configured in probe configuration mode. You enter probe configuration mode by creating the probe in global configuration mode, specifying the name of the probe and the probe protocol. If the specified probe already exists, tracked object manager enters configuration command mode for the named probe. The probe protocol used determines the fail detection method(s) that are available for monitoring the remote service. The fail detection methods supported for monitoring a remote service are: Ping Port Service Verification Application Content Verification (ACV)
Probes that do not yet exist can be assigned to monitor a service, but fail detection will not occur until the probe is created.
Probe Parameters
Probe parameters are configurable by entering the probe configuration mode from the global configuration mode.
Probe Description
A probe description of up to 127 printable characters can be configured. If a space character is entered, the description must be enclosed by double quotes (). Probe descriptions display in the detailed version of the show probe command output.
The number of consecutive failed probe attempts before tracked object manager declares a remote service down The delay, in seconds, between probes to a remote service that is currently declared up The time, in seconds, the track object manager waits for a response from the monitored service before declaring a failed probe The time, in seconds, the track object manger waits for the TCP 3-way handshake to complete
Ping
A remote service can be configured for the ping failure detection method by setting the probe protocol to ICMP. The ping failure detection method can be used by all S-Series applications supported by the tracked object manager.
10-4
protocol-independent and is designed to work with any type of server that communicates via formatted ASCII text messages, including HTTP, FTP, and SMTP. ACV can be configured on either a TCP or UDP probe.
For example, if you sent the following string to your HTTP server, HEAD / HTTP/ 1.1\\r\\nHost: www.enterasys.com\\r\\n\\r\\n, you could expect to get a response of a string returned similar to the following:
HTTP/1.1 200 OK Date: Tue, 9 Feb 2010 20:03:40 GMT Server: Apache/2.0.40 (Red Hat Linux) Last-Modified: Wed, 6 Jan 2010 13:56:03 GMT ETag: 297bc-b52-65f942c0 Accept-Ranges: bytes Content-Length: 2898
You can search for a reply string of 200 OK. This would result in a successful verification of the service. Because ACV can search for a string in only the first 255 bytes of the response, in most HTTP cases the response will have to be in the packet's HTTP header (that is, you will not be able to search for a string contained in the web page itself). Some protocols such as FTP or SMTP require users to issue a command to close the session after making the request. An ACV close string can be configured and sent by the tracked object manager to the server to close the session.
Table 10-1
Probe Name $pbr_default
$slb_default
The default server load balancing ICMP probe. Default values are: Fail-detect count: 4 Pass-detect count: 1 Fail-detect interval: 5 Pass-detect interval: 5 3-way TCP handshake wait time: 5 Server response wait time: 2
$tunnel_default
The default layer 3 tunnel ICMP probe. Default values are: Fail-detectcount: 3 Pass-detect count: 1 Fail-detect interval: 10 Pass-detect interval: 5 3-way TCP handshake wait time: 5 Server response wait time: 2
$twcb_default
The default TWCB ICMP probe. Default values are: Fail-detect count: 4 Pass-detect count: 1 Fail-detect interval: 5 Pass-detect interval: 5 3-way TCP handshake wait time: 5 Server response wait time: 2
$vrrp_default
The default VRRP ICMP probe. Default values are: Fail-detect count: 3 Pass-detect count: 3 Fail-detect interval: 1 Pass-detect interval: 10 3-way TCP handshake wait time: 5 Server response wait time: 3
How a default ICMP probe is handled depends upon the application the default probe is associated with. Default ICMP probes associated with non-server-based applications such as policy based routing and VRRP are manually applied. Default ICMP probes associated with server-based applications such as server load balancing and TWCB are auto-applied.
10-6
The VRRP default ICMP probe is used to monitor remote critical IP addresses. When configuring a default ICMP probe, the probe cannot be specified by name. The VRRP default probe is configured when the remote keyword is specified. Use the vrrp critical-ip command in interface configuration mode, specifying the remote keyword, to apply the VRRP default probe to a critical IP interface. This example sets the internet facing IP address 20.20.20.2 on VLAN 20 as the critical-IP address for VRRP instance 1, sets the decrement operational priority to 100 should the interface go down, and assigns the VRRP default probe $vrrp_default to monitor the interface:
S Chassis(rw)->configure S Chassis(rw-config)->interface vlan 20 S Chassis(rw-config-intf-vlan.0.20)->vrrp critical-ip 1 20.20.20.2 100 remote probe-name $vrrp_default S Chassis(rw-config-intf-vlan.0.20)->no shutdown S Chassis(rw-config-intf-vlan.0.20)->
This example shows how to monitor address 99.99.99.1 for layer 3 tunnel 1 using the default tunnel probe (you could also specify the default tunnel probe name: $tunnel_default instead of the default keyword):
S Chassis(rw)->configure S Chassis(rw-config)->interface tunnel 1 S Chassis(rw-config-intf-tun.0.1)->tunnel probe 99.99.99.1 probe-name default S Chassis(rw-config-intf-tun.0.1)->
In a server configuration context, probe configuration can be reset to factory default values by resetting fail detection for that server context. Resetting fail detection in a server configuration context: Sets the probe type to the default value of probe Sets the probe for probe one to the default probe for the server context Removes any configured probe configuration for probe two
Use the route-map probe command in router configuration mode to assign an ICMP probe to monitor the specified next hop IP address. Create a probe, using the probe command. A default ICMP probe can not be specified by name. Use the default keyword to assign the default policy based routing ICMP probe. This example shows how to create the ICMP probe ICMP-PBR and assign it to a route-map probe to monitor next hop IP addresses 101.10.1.252 and 2000::1301:0:21f:45ff:fe4d:8722. The fail detection count is set to 5 attempts, and the fail detection interval is set to 5 seconds. The two assigned sessions are displayed:
S Chassis(su-config)->probe ICMP-PBR icmp S Chassis(su-config-probe)->faildetect count 5 interval 5 S Chassis(su-config-probe)->inservice S Chassis(su-config-probe)->exit S Chassis(su-config)->route-map probe 101.10.1.252 probe-name ICMP-PBR S Chassis(su-config)->route-map probe 2000::1301:0:21f:45ff:fe4d:8722 probe-name ICMP-PBR S Chassis(su-config)->show probe sessions
Client Codes: P-policy based routing, S-SLB, V-VRRP, W-TWCB T-tracked object probe ... Probe: ICMP-PBR, icmp IP Address Port Status StChngs Last Change Clients
--------------------------------- ----- --------- ------- ------------- ------101.10.1.252 2000::1301:0:21f:45ff:fe4d:8722 Displayed 2 sessions ... S Chassis(su-config)-> 0 0 Up Up 1 1 0h0m30s 0h0m40s P P
10-8
S Chassis(su-config)->probe ICMP-Tunnel icmp S Chassis(su-config-probe)->faildetect interval 5 S Chassis(su-config-probe)->passdetect interval 5 S Chassis(su-config-probe)->inservice S Chassis(su-config-probe)->exit S Chassis(rw)->configure S Chassis(rw-config)->interface tunnel 1 S Chassis(rw-config-intf-tun.0.1)->tunnel probe 99.99.99.1 probe-name ICMP-Tunnel S Chassis(rw-config-intf-tun.0.1)->no shutdown S Chassis(rw-config-intf-tun.0.1)->
Assign the probe to probe one of the 10.1.2.3 port 80 real server in the server farm myproductHTTP: Enable the real server configuration
S Chassis(su)->configure S Chassis(su-config)->probe TCP-HTTP tcp S Chassis(su-config-probe)->faildetect interval 5 S Chassis(su-config-probe)->passdetect interval 5 S Chassis(su-config-probe)->acv request GET / HTTP/1.1\\r\\nHost: 2.0.0.5\\r\\n\\r\\n S Chassis(su-config-probe)->acv reply HTTP/1.1 200 OK\\r\\n S Chassis(su-config-probe)->inservice S Chassis(su-config-probe)->show probe TCP-HTTP detail Probe: Administrative state: Fail-detect count: Fail-detect interval: 3-way TCP handshake wait time: Application Content Verification: Request-string: GET / HTTP/1.1\\r\\nHost: 2.0.0.5\\r\\n\\r\\n Reply-string: Close-string: Search-Depth: 255 HTTP/1.1 200 OK\\r\\n TCP-HTTP inservice 3 5 5 Type: Session count: Pass-detect count: Pass-detect interval: Server response wait time: tcp-acv 1 3 5 10
S Chassis(su-config-probe)->exit S Chassis(su-config)->ip slb serverfarm myproductHTTP S Chassis(su-config-slb-sfarm)->real 10.1.2.3 port 80 S Chassis(su-config-slb-real)->faildetect probe one TCP-HTTP S Chassis(su-config-slb-real)->inservice S Chassis(su-config-slb-real)->
10-10
Place the probe inservice Display a detailed level of configuration information for the probe Assign the probe to probe one of the 186.89.10.51 cache server on the TWCB server farm s1Server: Assign port 8080 as the TCP port to be monitored. Enable the real server configuration
S Chassis(su)->configure S Chassis(su-config)->probe TCP-HTTP tcp S Chassis(su-config-probe)->inservice S Chassis(su-config-probe)->acv request GET / HTTP/1.1\\r\\nHost: 2.0.0.5\\r\\n\\r\\n S Chassis(su-config-probe)->acv reply HTTP/1.1 200 OK\\r\\n S Chassis(su-config-probe)->show probe TCP-HTTP detail Probe: Administrative state: Fail-detect count: Fail-detect interval: 3-way TCP handshake wait time: Application Content Verification: Request-string: GET / HTTP/1.1\\r\\nHost: 2.0.0.5\\r\\n\\r\\n Reply-string: Close-string: Search-Depth: 255 HTTP/1.1 200 OK\\r\\n TCP-HTTP inservice 3 5 5 Type: Session count: Pass-detect count: Pass-detect interval: Server response wait time: tcp-acv 1 3 5 10
S Chassis(su-config-probe)->exit S Chassis(su-config)->ip twcb wcserverfarm s1Server S Chassis(config-twcb-wcsfarm)->cache 186.89.10.51 S Chassis(config-twcb-cache)->faildetect probe one TCP-HTTP S Chassis(config-twcb-cache)->faildetect app-port 8080 S Chassis(config-twcb-cache)->inservice S Chassis(config-twcb-cache)->
S Chassis(su-config)->probe ICMP-VRRP icmp S Chassis(su-config-probe)->faildetect interval 5 S Chassis(su-config-probe)->passdetect interval 5 S Chassis(su-config-probe)->inservice S Chassis(su-config-probe)->exit S Chassis(rw)->configure S Chassis(rw-config)->interface vlan 20 S Chassis(rw-config-intf-vlan.0.20)->vrrp critical-ip 1 20.20.20.2 10 remote probe-name ICMP-VRRP S Chassis(rw-config-intf-vlan.0.20)->no shutdown S Chassis(rw-config-intf-vlan.0.20)->
10 seconds 3 probes
probe passdetect interval The delay between probes to a service marked as down. probe state receive interval The service state of a configured probe. The time, in seconds, the tracked object manager waits for a response from the monitored service before declaring a failed probe. The number of characters into the server response to search for the ACV reply string. Default probe for server load balancing faildetect probe one and two. The default probe behavior for this real server configuration. The interval, in seconds, the track object manager waits for the 3-way handshake to complete.
search depth
255 characters
SLB faildetect probe one and two SLB faildetect type TCP 3-way handshake interval
probe one: $slb_default probe two: empty probe; fail detection is active 5 seconds
10-12
Table 10-2
Parameter
TWCB faildetect application port TWCB faildetect probe one and two TWCB faildetect type
Procedure 10-1 describes how to configure probes. Procedure 10-1 Probe Configuration
Step 1. 2. 3. Task Create a probe, specifying the probe name and protocol type. Optionally, configure a description to be associated with the probe. Optionally, modify the number of consecutive failed faildetect probes that determine when the service is declared down. Optionally, modify the interval between fail detection probes. Optionally, modify the number of successful pass detection probes that determine when a service marked as down will be declared up. Optionally, modify the interval between pass detection probes. Optionally, specify the length of time the tracked object manager waits for a response from the monitored service before declaring that a probe has failed. For a TCP probe, optionally modify the interval that sets how long the tracked object manager waits for the completion of the TCP 3-way handshake. When configuring ACV on a TCP or UDP probe, set the request string that will initiate the ACV session on the server. When configuring ACV on a TCP of UDP probe, set the ACV validation reply string the server responds to the request string with. When configuring ACV on a TCP probe, if required by the monitored protocol, configure a close string to close the session. Enable the probe by placing it inservice. Command(s) probe probe-name {icmp | tcp | udp} description description-text faildetect count count
4. 5.
6. 7.
8.
open wait-interval
9.
10.
11.
12.
inservice
server port verification application content verification (ACV) ICMP ping default ICMP probe close string reply string request string search depth faildetect count faildetect interval probe one and two fail detection type open interval passdetect count passdetect interval receive interval
10-14
11
Power over Ethernet Configuration
This chapter provides information about configuring and monitoring Power over Ethernet (PoE) on the S-Series devices.
Important Notice
This section applies only to PoE-equipped S-Series devices. Consult the Hardware Installation Guide shipped with your product to determine if it is PoE-equipped.
For information about... How to Use PoE in Your Network Implementing PoE Configuring PoE
Ethernet implementations employ differential signals over twisted pair cables. This requires a minimum of two twisted pairs for a single physical link. Both ends of the cable are isolated with transformers blocking any DC or common mode voltage on the signal pair. PoE exploits this fact by using two twisted pairs as the two conductors to supply a direct current to a PD. One pair carries the power supply current and the other pair provides a path for the return current. Using PoE allows you to operate PDs in locations without local power (that is, without AC outlets). Having such a network setup can reduce the costs associated with installing electrical wiring and AC outlets to power the various devices.
Implementing PoE
You can configure PoE on your PoE-compliant Enterasys device through the CLI-based procedures presented in the section Configuring PoE on page 11-3. As part of your plan to implement PoE in your network, you should ensure the following: The power requirements of your PDs are within the limits of the PoE standards.
Implementing PoE
Your PoE-compliant Enterasys device can supply enough power to run your PDs. See Table 11-1 for power ranges based on each device class.
If SNMP traps are enabled, the Enterasys device generates a trap to notify the network administrator if a power state occurs on a PD (for example, when a PD is powered up or unplugged) If insufficient power is available for an attached PD, the corresponding port LED on the Enterasys device turns amber. The LED also turns amber if a PoE fault occurs (for example, a short in the Ethernet cable).
Configuring PoE
wattages cannot exceed the total system power available, it may be necessary to adjust existing budgets to free up power for the new module. When a PoE module is removed from a switch configured with manual power distribution mode, the PoE budget for each module will not be recalculated, based on the assumption that the module removed will be replaced with a new module that should receive the same amount of PoE power. As noted above, if the total available PoE power is reduced, the power will automatically be redistributed based on applying the calculated percentages. If an additional PoE supply is installed, there is no impact on the assigned PoE since specific wattages have been assigned to each module. Only the Total Power Detected value will change. The extra PoE power, however, is available for further redistribution manually.
Power management to PDs is configured with the command set inlinepower management. PoE classes are defined in Table 11-1 on page 11-2.
Configuring PoE
Once you have determined how to implement PoE on your S-Series device, the following sections will help you configure PoE.
For information about... Default Settings PoE Configuration Procedure Example PoE Configuration PoE Display Commands Refer to page... 11-3 11-4 11-7 11-7
Default Settings
Table 11-2 lists PoE parameters and their default values. Table 11-2 Default PoE Parameter Values
Parameter Total Power Available Description The percentage of total power available that a chassis can withdraw from the total power detected. The allocation mode for system power available for PoE. Default Value 100
auto
Configuring PoE
75% disable
11-4
Configuring PoE
Configuring PoE
11-6
Configuring PoE
Refer to the Enterasys S-Series CLI Reference for more information about each command.
To make power available for all the PDs connected to the module in slot 1, change the systems power allocation mode:
S3(su)->set inlinepower mode manual
Now, none of the 1200W available for PoE is assigned to the PoE modules. Assign the 1200W, or some portion of the 1200W to the PoE modules to power the attached PDs.
S3(su)->set inlinepower assign 1200 1
Configuring PoE
Refer to the Enterasys S-Series CLI Reference for a description of the output of each command.
11-8
12
Discovery Protocol Configuration
This chapter provides information about configuring and monitoring discovery protocols on the S-Series devices.
For information about... How to Use Neighbor Discovery in Your Network Understanding Neighbor Discovery Configuring LLDP Configuring Enterasys Discovery Protocol Configuring Cisco Discovery Protocol Refer to page... 12-1 12-2 12-7 12-11 12-12
Neighbor discovery is useful for Determining an accurate physical network topology Creating an inventory of network devices Troubleshooting the network
LLDP, Enterasys Discovery Protocol, and Cisco Discovery Protocol are enabled on Enterasys devices by default. Though all three discovery protocols can run simultaneously, LLDP is the preferred protocol. If a device, attached to a port that has been enabled for neighbor discovery, does not support LLDP but supports Enterasys Discovery Protocol or Cisco Discovery Protocol, then one of those protocols is used instead.
12-2
Figure 12-1
Discovery MIB Port Device ge. 1.1 IP phone ge. 1.2 PC ge. 1.4 IP switch
PSTN
Im a switch
Im a switch
Im a switch
Im a switch
Im a switch
Im a switch
Im a switch Im an IP phone
Im an IP-PBX
Im an IP phone
LLDP-MED
The LLDP-Media Endpoint Discovery (LLDP-MED) extension of LLDP is defined to share information between media endpoint devices such as IP telephones, media gateways, media servers, and network connectivity devices. Either LLDP or LLDP-MED, but not both, can be used on an interface between two devices. A switch port uses LLDP-MED when it detects that an LLDP-MED device is connected to it. LLDP-MED provides the following benefits: Auto discovery of LAN policies, such as VLAN ID, 802.1p priority, and DiffServ codepoint settings, leading to plug-and-play networking. Device location and topology discovery, allowing creation of location databases and, in the case of VoIP, provision of E911 services. Extended and automated power management of Power over Ethernet endpoints Inventory management, allowing network administrators to track their network devices and to determine their characteristics, such as manufacturer, software and hardware versions, and serial or asset numbers.
There are two primary LLDP-MED device types (as shown in Figure 12-2 on page 12-5): Network connectivity devices, which are LAN access devices such as LAN switch/router, bridge, repeater, wireless access point, or any device that supports the IEEE 802.1AB and MED extensions defined by the standard and can relay IEEE 802 frames via any method.
Enterasys S-Series Configuration Guide 12-3
Im an IP phone
Im a PC
Endpoint devices, which have three defined sub-types or classes: LLDP-MED Generic Endpoint (Class I) All endpoint products that, while requiring the base LLDP discovery services defined in the standard, do not support IP media or act as an end-user communication device, such as IP communications controllers, other communication-related servers, or any device requiring basic services. Discovery services defined in this class include LAN configuration, device location, network policy, power management, and inventory management. LLDP-MED Media Endpoint (Class II) All endpoint products that have IP media capabilities but that may not be associated with a particular end user, such as voice/media gateways, conference bridges, and media servers. Capabilities include all of the capabilities defined for Generic Endpoint (Class I) and are extended to include aspects related to media streaming. Discovery services defined in this class include media type specific network layer policy discovery. LLDP-MED Communication Endpoint (Class III) All endpoint products that act as an endpoint user communication device supporting IP media. Capabilities include all of the capabilities defined for the Generic Endpoint (Class I) and Media Endpoint (Class II) devices and are extended to include aspects related to end user devices, such as IP phones, PC-based soft phones, and other communication devices that directly support the end user.
12-4
Figure 12-2
LLDP-MED
LLDP-MED Network Connectivity Devices: Provide IEEE 802 network access to LLDP-MED endpoints (for example, L2/L3 switch)
LLDP-MED Generic Endpoints (Class I): Basic participant endpoints in LLDP-MED (for example, IP communications controller)
IP Network Infrastructure
(IEEE 802 LAN)
LLDP-MED Media Endpoints (Class ll): Supports IP media streams (for media gateways, conference bridges)
LLDP-MED Communication Device Endpoints (Class III): Support IP communication end user (for example, IP phone, soft phone)
LLDPDU Frames
As shown in Figure 12-3, each LLDPDU frame contains the following mandatory TLVs: Chassis ID The chassis identification for the device that transmitted the LLDP packet. Port ID The identification of the specific port that transmitted the LLDP packet. The receiving LLDP agent joins the chassis ID and the port ID to correspond to the entity connected to the port where the packet was received. Time to Live The length of time that information contained in the receive LLDP packet will be valid. End of LLDPDU Indicates the final TLV of the LLDPDU frame.
Figure 12-3
Frame Format
IEEE 802.3 LLDP frame format
LLDP Ethertype
88-CC 2 octets
LLDPDU format
Chassis ID TLV Port ID TLV (M) (M) Time to Live TLV (M) Optional TLV ... Optional TLV
End of LLDPDU TLV (M)
Each LLDPDU frame can also contain the following optional TLVs: Port Description The port from which the LLDP agent transmitted the frame. System Name The systems administratively assigned name. System Description Includes the systems name, hardware version, OS level, and networking software version. System Capabilities A bitmap that defines the primary functions of the system. The currently defined capabilities include, among other things, WLAN access point, router, and telephone. Management Address The IP or MAC address associated with the local LLDP agent that may be used to reach higher layer entities.
An LLDPDU frame can also contain the following extension TLVs: 802.1 VLAN extension TLVs describe attributes associated with VLANs: Port VLAN ID Allows a bridge port to advertise the ports VLAN identifier (PVID) that will be associated with untagged or priority tagged frames it receives. Port & Protocol VLAN ID Allows a bridge to advertise whether it supports protocol VLANs and, if so, what VLAN IDs these protocols will be associated with. VLAN Name Allows a bridge to advertise the textual name of any VLAN with which it is configured. Protocol Identity Allows a bridge to advertise the particular protocols that are accessible through its port.
802.3 LAN interface extensions TLVs describe attributes associated with the operation of an 802.3 LAN interface: MAC/PHY Configuration/Status Advertises the bit-rate and duplex capability of the sending 802.3 node, the current duplex and bit-rating of the sending 802.3 node, and whether these settings were the result of auto-negotiation during link initiation or manual override. Power-Via-MDI Advertises the power-via-MDI capabilities of the sending 802.3 node. Link-Aggregation Advertises whether the link is capable of being aggregated, whether it is currently in an aggregation, and, if it is in an aggregation, the port of the aggregation.
12-6
Configuring LLDP
Maximum Frame Size Advertises the maximum supported 802.3 frame size of the sending station.
LLDP-MED extension TLVs: Capabilities Indicates the network connectivity devices capabilities. Network Policy Used to configure tagged/untagged VLAN ID/L2 priority/DSCP on LLDP-MED endpoints (for example, IP phones). Location Identification Provides the location identifier information to communication endpoint devices, based on the configuration of the network connectivity device it is connected to. Extended Power via MDI Enables advanced power management between LLDP-MED endpoints and network connectivity devices. Inventory Management Includes hardware revision, firmware revision, software revision, serial number, manufacturer name, model name, and asset ID.
Some TLVs support multiple subtypes. For example, Port ID is sent as an ifName (e.g., ge.1.1) between Enterasys devices, but when an LLDP-MED endpoint is detected on a port, that TLV subtype changes to a network address (MAC address), and other MED TLVs are sent, as defined by the MED spec.
Configuring LLDP
LLDP Configuration Commands
Table 12-1 lists LLDP configuration commands. The table indicates which commands are device specific. Table 12-1
Task Set the time, in seconds, between successive LLDP frame transmissions initiated by changes in the LLDP local system information. Default value is 30 seconds. Set the number of LLDP PDU packets sent when entering fast transmission state. Set the frequency of LLDP PDU transmissions while in fast transmission state. Set the time-to-live value used in LLDP frames sent by this device. The time-to-live for LLDPDU data is calculated by multiplying the transmit interval by the hold multiplier. The default value is 4. Set the minimum interval between LLDP notifications sent by this device. LLDP notifications are sent when a remote system change has been detected. The default value is 5 seconds.
set lldp tx-fast-count count set lldp tx-fast-interval frequency set lldp hold-multiplier multiplier-val
Configuring LLDP
Table 12-1
Task
Set the number of fast start LLDPDUs to be sent when an LLDP-MED endpoint device, such as a phone, is detected. Network connectivity devices transmit only LLDP TLVs in LLDPDUs until they detect that an LLDP-MED endpoint device has connected to a port. At that point, the network connectivity device starts sending LLDP-MED TLVs at a fast start rate on that port. The default value is 3. Enable or disable transmitting and processing received LLDPDUs on a port or range of ports. Enable or disable sending LLDP traps when a remote system change is detected. Enable or disable sending an LLDP-MED trap when a change in the topology has been sensed on the port (that is, a remote endpoint device has been attached or removed from the port). Configure LLDP-MED location information on a port or range of ports. Currently, only Emergency Call Services (ECS) Emergency Location Identification Number (ELIN) is supported. ELIN is a special phone number used to indicate location, and is assigned and associated with small geographies in the organization.It is one of the forms of identification that the location identification TLV provides. Select the optional LLDP and LLDP-MED TLVs to be transmitted in LLDPDUs by the specified port or ports.
set lldp port status {tx-enable | rx-enable | both | disable} port-string set lldp port trap {enable | disable} port-string set lldp port med-trap {enable | disable} port-string
set lldp port tx-tlv {[all] | [port-desc] [sys-name] [sys-desc] [sys-cap] [mgmt-addr] [vlan-id] [stp] [lacp] [gvrp] [mac-phy] [poe] [link-aggr] [max-frame] [med-cap] [med-pol] [med-loc] [med-poe] [enhanced-trans-config] [enhanced-trans-rec] [priority-flowctrl]} port-string set lldp port network-policy {all | voice | voice-signaling | guest-voice | guest-voice-signaling | softphone-voice | video-conferencing | streaming-video | video-signaling} [state {enable | disable}] [ tag {tagged | untagged}] [vid {vlan-id | dot1p}] [cos cos-value] [dscp dscp-value] port-string clear lldp {all | tx-interval | hold-multipler | trap-interval | med-fast-repeat} clear lldp port status port-string
Configure network policy for a set of applications on a port or range of ports. The policies configured with this command are sent in LLDPDUs as LLDP-MED Network Policy TLVs. Multiple Network Policy TLVs can be sent in a single LLDPDU.
Return LLDP parameters to their default values. Return the port status to the default value of both (both transmitting and processing received LLDPDUs are enabled). Return the port LLDP trap setting to the default value of disabled. Return the port LLDP-MED trap setting to the default value of disabled. Return the port ECS ELIN location setting to the default value of null.
clear lldp port trap port-string clear lldp port med-trap port-string clear lldp port location-info elin port-string
12-8
Configuring LLDP
Table 12-1
Task
Return network policy for a set of applications on a port or range of ports to default values.
Clear the optional LLDP and LLDP-MED TLVs to be transmitted in LLDPDUs by the specified port or ports to the default value of disabled.
Refer to the Enterasys S-Series CLI Reference for more information about each command.
Configuring LLDP
show lldp port tx-tlv [data-center-bridging] [port-string] show lldp port location-info [port-string] show lldp port local-info [port-string] show lldp port remote-info [port-string] show lldp port network policy {all | voice | voice-signaling | guest-voice | guestvoice-signaling | software-voice | video-conferencing | streaming-video | videosignaling} [port-string]
Refer to the Enterasys S-Series CLI Reference for a description of the output of each command.
12-10
Refer to the Enterasys S-Series CLI Reference for more information about each command.
This example shows how to enable the CDP for port ge.1.2:
S Chassis(rw)->set cdp state enable ge.1.2
This example shows how to disable the CDP for port ge.1.2:
S Chassis(rw)->set cdp state disable ge.1.2
Refer to the Enterasys S-Series CLI Reference for a description of the output of each command.
set ciscodp port { [status {disable | enable}] [ vvid {<vlan-id> | none | dot1p | untagged}] [trust-ext {trusted | untrusted}] [cos-ext value] } <port-string> clear ciscodp { [status | timer | holdtime | port {status | vvid | trust-ext | cos-ext}] } <port-string>
Refer to the Enterasys S-Series CLI Reference for more information about each command.
Display global Cisco Discovery Protocol information. show ciscodp Display summary information about the Cisco Discovery Protocol on one or more ports. Display Network Neighbor Discovery information from all supported discovery protocols. show ciscodp port info [port-string] show neighbors [port-string]
Refer to the Enterasys S-Series CLI Reference for a description of the output of each command.
12-12
13
Data Center Bridging Configuration
This chapter provides information about configuring and monitoring Data Center Bridging (DCB) protocols on S-Series devices.
For information about... How to Use Data Center Bridging in Your Network Implementing Data Center Bridging Enhanced Transmission Selection Configuration Priority-Based Flow Control Configuration Configuring Data Center Bridging Refer to page... 13-1 13-2 13-2 13-3 13-3
The base control protocol utilized in Data Center Bridging is the Data Center Bridging Exchange (DCBX) protocol. It allows Ethernet devices to detect Data Center Bridging capability on the peer device, as well as Data Center Bridging configuration between peer devices. ETS and PFC protocols utilize DCBX. DCBX uses LLDP to exchange attributes between two linked peers. LLDP is unidirectional and advertises connectivity and management information about the local station to adjacent stations on the same IEEE 802 LAN. DCBX state machines are invoked when the remote MIB changes and a DCBX TLV is present.
Non-Enhanced Transmission
Priority 7
Traffic Class 7
Priority 6
Traffic Class 6
Priority 5
Traffic Class 5
Enhanced Transmission
Strict Priority Scheduler Priority 4 Traffic Class 4 Strict Priority Priority 3 WFQ Scheduler 70%
Priority 2
Priority 1
30%
Priority 0
13-2
802.1 priorities 4 - 0 are configured for ETS queuing. Traffic class 4 is assigned to 802.1 priorities 4 and 3. Traffic class 2 is assigned priorities 2 - 0. If all non-ETS queues are empty and there is remaining bandwidth, traffic classes 4 and 2 will be serviced using weighted fair queue scheduling. Based upon ETS bandwidth allocation, the weighted fair queue scheduler will service traffic class 4 at 70 percent and traffic class 2 at 30 percent of remaining bandwidth. Within each traffic class group (4 and 2 in this example), each priority is serviced based on a strict priority scheduler. This example shows how to create a CoS transmit queue port group entry named testTxq with a port group ID of 2 and a port type ID of 1:
S Chassis(rw)->set cos port-config txq 2.1 name testTxq
We now assign ETS groups to an 11 queue device, followed by allocation of ETS bandwidth to the assigned groups. Using the enhanced-groups option, ETS group to queue assignment is: Group 2 to queues 0, 1, and 2 Group 4 to queues 3 and 4
Using the enhanced-percentage option the assigned ETS bandwidth allocation is: 30 percent to group 2 70 percent to group 4
S Chassis(rw)->set cos port-config txq 2.1 name testTxq enhanced-groups 2,2,2,4,4,0,0,0,0,0,0,0 enhanced-percentage 0,30,0,70,0,0,0,0
Table 13-2 lists Data Center Bridging display commands. Table 13-2
Task Display the ETS group CoS transmit queue port group mappings by the port group and type. Display port flow control state by port. Display LLDP port Data Center Bridging transmit TLV support. Display the local or remote system information, including ETS information, stored for one or more ports.
Refer to the Enterasys S-Series CLI Reference for more information about each command.
13-4
14
Simple Network Management Protocol (SNMP) Configuration
This chapter provides information about configuring and monitoring SNMP on Enterasys S-Series devices.
For information about... Using SNMP in Your Network SNMP Concepts SNMP Support on S-Series Devices Configuring SNMP Reviewing SNMP Settings Refer to page... 14-1 14-2 14-4 14-7 14-20
SNMP Concepts
SNMP Concepts
It is helpful to understand the following SNMP concepts:
For information about... Manager/Agent Model Components Message Functions Access to MIB Objects Refer to page... 14-2 14-2 14-3
Message Functions
SNMP uses five basic message types (Get, Get Next, Get Response, Set, and Trap) to communicate between the manager and the agent. The Get and Get Next messages allow the manager to request information for a specific variable. The agent, upon receiving a Get or Get Next message, will issue a Get Response message to the manager with either the information requested or an error indication about why the request cannot be processed.
14-2
SNMP Concepts
A Set message allows the manager to request a change to a specific variable. The agent then responds with a Get Response message indicating the change has been made or an error indication about why the change cannot be made. A trap or inform message allows the agent to spontaneously inform the manager of an important event in the network. The SNMP manager and agent use information in the MIB to perform the operations described in Table 14-1. Table 14-1
Operation get-request get-next-request get-bulk-request2 get-response set-request trap | inform3
1. With this operation, an SNMP manager does not need to know the exact variable name. A sequential search is performed to find the needed variable from within a table. 2. The get-bulk operation is only supported in SNMPv2c or later. 3. Inform notifications are only supported in SNMPv3.
Read-write (rw)Gives read and write access to authorized management stations to all objects in the MIB, but does not allow access to the community strings.
User-Based
SNMPv3 provides a User-Based Security Model (USM) which relies on a user name match for authenticated access to network management components. Refer to Security Models and Levels on page 14-6 for more information.
Versions Supported
Enterasys devices support three versions of SNMP: Version 1 (SNMPv1) This is the initial implementation of SNMP. Refer to RFC 1157 for a full description of functionality. Version 2 (SNMPv2c) The second release of SNMP, described in RFC 1907, has additions and enhancements to data types, counter size, and protocol operations. Version 3 (SNMPv3) This is the most recent version of SNMP, and includes significant enhancements to administration and security. The major difference between SNMPv3 and earlier versions is that v3 provides a User-Based Security Model (USM) to associate users with managed access to security information. In addition to better security and better access control, SNMPv3 also provides a higher degree of reliability for notifying management stations when critical events occur. SNMPv3 is fully described in RFC 2571, RFC 2572, RFC 2573, RFC 2574, and RFC 2575.
14-4
Unlike SNMPv1 and SNMPv2c, in SNMPv3, the concept of SNMP agents and SNMP managers no longer apply. These concepts have been combined into an SNMP entity. An SNMP entity consists of an SNMP engine and SNMP applications. An SNMP engine consists of the following four components: Dispatcher Sends and receives messages. Message processing subsystem Accepts outgoing PDUs from the dispatcher and prepares them for transmission by wrapping them in a message header and returning them to the dispatcher. Also accepts incoming messages from the dispatcher, processes each message header, and returns the enclosed PDU to the dispatcher. Security subsystem Authenticates and encrypts messages. Access control subsystem This component determines which users and which operations are allowed access to managed objects.
OID
Table 14-2
Term security level
security model
An authentication strategy that is set up for an SNMP user and the group in which the user resides. A combination of a security model and a security level determines which security mechanism is employed when handling an SNMP frame. Specifies whether an SNMP user entry will be stored in volatile or nonvolatile memory. A list of SNMP notify values that link a target (management station IP) address to specific SNMP notifications. A unique identifier and a specific IP address that will receive SNMP notification messages. A named set of security/authentication criteria used to generate a message to a target. A notification message sent by an SNMPv1 or v2c agent to a network management station, a console, or a terminal to indicate the occurrence of a significant event, such as when a port or device goes up or down, when there are authentication failures, and when power supply errors occur. A person registered in SNMPv3 to access management information. In v1 and v2c, a user is set with the community name string. User-Based Security Model, the SNMPv3 authentication model which relies on a user name match for access to network management components. View-based Access Control Model, which determines remote access to SNMP managed objects, allowing subsets of management information to be organized into user views. Specifies permission for accessing SNMP MIB objects granted to a particular SNMP user group. View types and associated access rights are: read - view-only access write - allowed to configure MIB agent contents notify - send trap messages
view
A combination of a security model and a security level determines which security mechanism is employed when handling an SNMP frame. Table 14-3 identifies the levels of SNMP security available on Enterasys devices and authentication required within each model.
14-6
Configuring SNMP
Table 14-3
Model v1 v2c
authPriv
MD5 or SHA
DES
Access Control
In addition to the Security Models and Levels described above, the Enterasys implementation of SNMP also provides a View-based Access Control Model (VACM), which determines remote access to managed objects. VACM allows you to organize subsets of management information into views. Management information that is in a user's view gives the user the corresponding access level to that management information: either read, write, or notify. Individual users can be organized into groups for whom you can pre-define what views are available based on the security model and security level used to request access. In this way, VACM allows you to permit or deny access to any individual item of management information depending on a user's group membership and the level of security provided by the communications channel.
Configuring SNMP
This section provides the following information about configuring SNMP on Enterasys devices:
For information about... Configuration Basics How SNMP Processes a Notification Configuration SNMP Defaults Configuring SNMPv1/SNMPv2c Configuring SNMPv3 Configuring Secure SNMP Community Names
Configuration Basics
Completing an SNMP configuration on an Enterasys device involves defining users who will be authorized to receive SNMP notifications about network events, associating security (target)
Configuring SNMP
parameters, access rights and MIB views to those users, and specifying an IP address where they will receive notifications. The basic steps in this process are: 1. Creating a name that will act as an SNMP user password: 2. 3. 4. 5. 6. 7. This will be a community name for an SNMPv1 or v2c configuration, or A user name for an SNMPv3 configuration.
Creating a group for the user named in Step 1. Creating access rights for the user group named in Step 2. Defining MIB view(s) for the user group. Creating a target parameters entry to associate security and authorization criteria to the users created in Step 1. Verifying if any applicable SNMP notification entries exist, or creating a new one. You will use this entry to send SNMP notification messages to the appropriate targets configured in Step 5. Creating a target address entry to bind a management IP address to: The notification entry and tag name created in Step 6, and The target parameters entry created in Step 5.
Note: Commands for configuring SNMP on Enterasys devices are independent during the SNMP setup process. For instance, target parameters can be specified when setting up optional notification filters even though these parameters have not yet been created with the set snmp targetparams command. The steps in this section are a guideline to configuring SNMP and do not necessarily need to be executed in this order.
3.
4. 5.
14-8
Configuring SNMP
SNMP Defaults
Device Start Up Configuration
By default, SNMPv1 is configured on Enterasys switches. Table 14-4 lists the default configuration parameters, which include a single community name - public - granting read-write access to the whole MIB tree for both SNMPv1 and SNMPv2c. Table 14-4
Parameter Community name Group access privileges Group user name Security model Security access rights MIB view
You can revise this default configuration by following the steps described in Adding to or Modifying the Default Configuration on page 14-10. To take advantage of the advanced security and other features available in SNMPv3, it is recommended that you add to the Enterasys default configuration by configuring SNMPv3 as described in Configuring SNMPv3 on page 14-11. Refer also to Configuring Secure SNMP Community Names on page 14-18 for a description of a recommended configuration that will prevent unsecured access to SNMP information.
Configuring SNMPv1/SNMPv2c
Creating a New Configuration
Procedure 14-1 shows how to create a new SNMPv1 or SNMPv2c configuration. This example assumes that you havent any preconfigured community names or access rights.
Note: The v1 parameter in this example can be replaced with v2 for SNMPv2c configuration.
2. 3.
Create a security model (VACM) group using the community name you assigned in step 1. Set security access rights for the VACM group.
4.
Configuring SNMP
6.
7.
Example
The following example displays an S-Series device configuration using the steps in Procedure 14-1. It shows how to: Create the community name public. Assign the public user to the group named groupRW and the SNMPv1 security model. Specify that, if SNMP messages are received with the public name string, the view RW for read requests, write requests, and notify requests will be applied to this user. For the view RW, include the MIB subtree denoted with OID 1 and 0.0, and exclude view access to subtree denoted with OID 1.3.6.1.6.3.13.1 (which is the notification MIB). Assign a target parameters entry, TVv1public, for security level processing to the public community name. Create a target address entry named TVTrap at IP address 10.42.1.10, which will use security and authorization criteria contained in the target parameters entry called TVv1public, and bind these parameters together with a tag entry called TVTrapTag.
S Chassis(su)->set snmp community public S Chassis(su)->set snmp group groupRW user public security model v1 S Chassis(su)->set snmp access groupRW security-model v1 read RW write RW notify RW S Chassis(su)->set snmp view viewname RW subtree 1 S Chassis(su)->set snmp view viewname RW subtree 0.0 S Chassis(su)->set snmp view viewname RW subtree 1.3.6.1.6.3.13.1 excluded S Chassis(su)->set snmp targetparams TVv1public user public security-model v1 message processing v1 S Chassis(su)->set snmp targetaddr TVTrap 10.42.1.10 param TVv1public taglist TVTraptag S Chassis(su)->set snmp notify TVTrap tag TVTrapTag
Configuring SNMP
S Chassis(su)->set snmp view viewname All subtree 1 Note: Any use of the parameter 'All' must be exactly as shown in this example. Any other variation (including, but not limited to, values such as 'all' or 'ALL') will not be valid.
You can modify this default configuration as shown in the following examples.
Use this command to remove the public community name from the default configuration:
S Chassis(su)->clear snmp community public Note: You can leave the set snmp group groupRW user public security-model v1 statement in the default configuration in case you want to re-activate the public community name at some point, or can clear it as well.
Refer to Configuring Secure SNMP Community Names on page 14-18 for a description of a recommended configuration that will prevent unsecured access to SNMP information.
Configuring SNMPv3
Procedure 14-2 shows how to complete a basic SNMPv3 configuration.
.
Configuring SNMP
14-12
Configuring SNMP
The following example is an S-Series device configuration using the steps in Procedure 14-2. It shows how to: Create the user Enterasys_user, specifying authentication, encryption, and security credentials. Assign Enterasys_user to the Enterasys group and associate it to the SNMPv3 security model, usm. Specify that, if SNMP messages are received with authentication and encryption, the view, readView for read requests, and the view writeView for write requests will be applied to this user group based on the USM security model. For the view writeView, include the MIB subtree denoted with OID 1, and exclude the subtree denoted by OID 1.3.6.1.4.1.5624.1.2.16. Assign an SNMPv3 target parameters entry named matrixn to the Enterasys_user using the USM security model. Create a target address entry named Enterasys_Networks at IP address 172.29.10.1 which will use security and authorization criteria contained in a target parameters entry called matrixn, and bind these parameters together with a tag entry called v3TrapTag.
S Chassis(su)->set snmp user Enterasys_user authentication md5 my_authentication privacy my_privacy S Chassis(su)->set snmp group Enterasys user Enterasys_user security-model usm S Chassis(su)->set snmp access Enterasys security-model usm privacy read readView write writeView S Chassis(su)->set snmp view viewname readView subtree 1 S Chassis(su)-> set snmp view viewname writeView subtree 1 S Chassis(su)-> set snmp view viewname writeView subtree 1.3.6.1.4.1.5624.1.2.16 excluded S Chassis(su)-> set snmp targetparams matrixn user Enterasys_user security-model usm message-processing v3 S Chassis(su)-> set snmp targetaddr Enterasys_Networks 172.29.10.1 param matrixn taglist v3TrapTag S Chassis(su)->set snmp notify SNMPv3TrapGen tag v3TrapTag inform
Configuring SNMP
S Chassis(su)->set snmp targetparams v3TP user v3user security-model usm messageprocessing v3 privacy
Inform EngineIDs
In the Enterasys SNMP implementation, the receiver's EngineID value is used by both the sender and receiver to propagate inform notifications. In order to send and receive SNMP v3 informs in their most secure form (with authentication and privacy enabled), you must configure a user ID and corresponding receiver EngineID on the sender as shown in the example in Procedure 14-3. This example assumes that NetSight Console is the receiver, and an S-Series switch is the sender.
Note: The following file location and EngineID are provided as examples. Your settings will vary.
Procedure 14-3 adds to the configuration example shown in Configuring an SNMPv3 Inform or Trap Engine ID on page 14-13. Procedure 14-3 Configuring an EngineID
Step 1. 2. Task If necessary, create an SNMP3 configuration. On the management station, navigate to and display the Netsight Console SNMP trap configuration file. Determine the EngineID from this line in the configuration file. On the Matrix N, define the same user as in the above example (v3user) with this EngineID and with the same Auth/Priv passwords you used previously. Command(s) Refer to Configuring an SNMPv3 Inform or Trap Engine ID on page 14-13. C:\Program Files\Enterasys Networks\NetSight Shared\snmptrapd.conf oldEngineID 0x800007e5804f190000d232aa40 set snmp user v3user remote 800007e5804f190000d232aa40 authentication md5 md5passwd privacy despasswd Note: You can omit the 0x from the EngineID. You can also use the colon notation like this: 80:00:07:e5:80:4f:19:00:00:d2:32:aa:4 0 C:\Program Files\Enterasys Networks\NetSight Console\Bin\snmptrapd.conf
3. 4.
5.
Navigate to and display the user configuration on the management station. (This assumes that you have already created the user in Netsight Console, so you will only need to add it to the configuration file of the trap daemon.) Using any plain text editor, add this line to the configuration file.
6.
Trap EngineID
To use traps instead of inform notifications, you would change the preceding configuration as follows: 1. 2. Use this command to specify trap notifications:
set snmp notify v3notify tag v3tag trap
Verify that the createuser entry in the NetSight Console SNMP trap configuration looks like this: createuser -e 0x800015f80300e06314d79c v3user MD5 md5passwd DES despasswd
14-14
Configuring SNMP
When you are finished modifying the configuration, save the file and restart the SNMP Trap Service using Netsight Services Manager.
Note: When installed on a Unix platform, the NetSight server must be manually restarted.
You can test this configuration using any MIB browser directed to the IP of the configured device and using the default community name public associated with the view All. If configured correctly, only your specified sections of the MIBs will be visible.
As defined in RFC2575, an SNMP mask is an optional parameter of the set snmp view command. You can use a mask to modify a view inclusion, designating certain octets of an OID string as wild-card don't care values. Once defined, you can view within a MIB branch (using a MIB browser such as that offered within the NetSight suite of products) only those leaves associated with specific items, such as designated port numbers, MAC addresses, and IP addresses. For example, the RMON Statistics MIB branch is defined as follows, with the leaves defined within that branch each having multiple iterations, one for each port.
Configuring SNMP
etherStatsEntry=1.3.6.1.2.1.16.1.1.1 etherStatsIndex=1.3.6.1.2.1.16.1.1.1.1.<port> etherStatsDataSource=1.3.6.1.2.1.16.1.1.1.2.<port> etherStatsDropEvents=1.3.6.1.2.1.16.1.1.1.3.<port> etherStatsOctets=1.3.6.1.2.1.16.1.1.1.4.<port> etherStatsPkts=1.3.6.1.2.1.16.1.1.1.5.<port> etherStatsBroadcastPkts=1.3.6.1.2.1.16.1.1.1.6.<port> etherStatsMulticastPkts=1.3.6.1.2.1.16.1.1.1.7.<port> etherStatsCRCAlignErrors=1.3.6.1.2.1.16.1.1.1.8.<port> etherStatsUndersizePkts=1.3.6.1.2.1.16.1.1.1.9.<port> etherStatsOversizePkts=1.3.6.1.2.1.16.1.1.1.10.<port> etherStatsFragments=1.3.6.1.2.1.16.1.1.1.11.<port> etherStatsJabbers=1.3.6.1.2.1.16.1.1.1.12.<port> etherStatsCollisions=1.3.6.1.2.1.16.1.1.1.13.<port> etherStatsPkts64Octets=1.3.6.1.2.1.16.1.1.1.14.<port> etherStatsPkts65to127Octets=1.3.6.1.2.1.16.1.1.1.15.<port> etherStatsPkts128to255Octets=1.3.6.1.2.1.16.1.1.1.16.<port> etherStatsPkts256to511Octets=1.3.6.1.2.1.16.1.1.1.17.<port> etherStatsPkts512to1023Octets=1.3.6.1.2.1.16.1.1.1.18.<port> etherStatsPkts1024to1518Octets=1.3.6.1.2.1.16.1.1.1.19.<port> etherStatsOwner=1.3.6.1.2.1.16.1.1.1.20.<port> etherStatsStatus=1.3.6.1.2.1.16.1.1.1.21.<port>
As shown in the example output above, when displaying the etherStatsEntry branch, all ports are listed for each leaf before moving on to the ports of the next leaf as the result of listing all of the data in numeric OID order. Here is an abbreviated example of one such SNMP query.
Object etherStatsIndex etherStatsIndex etherStatsDataSource etherStatsDataSource etherStatsStatus etherStatsStatus Instance 1001 1518 1001 1518 1001 1518 Type INTEGER INTEGER OBJECT ID OBJECT ID INTEGER INTEGER Value 1001 1518 1.3.6.1...11001 1.3.6.1...12006 valid(1) valid(1)
Example
This example shows you how to use the mask parameter to significantly refine your query output, so that only data for specified ports is returned. For this example, assume that S-Series slot 1 port 12 is of interest. The first ten octets of the etherStatsEntry (1.3.6.1.2.1.16.1.1.1) must match exactly as specified. The next octet, representing each of the 21 possible leaves within that branch, need not match exactly. The remainder, representing the port number, must match exactly as specified. The bit representations for this would be 11111111-11011111, or 0xffdf. If the actual OID string being masked is longer than the specified bits, the missing bits to the right are assumed to be 1's. It is thus only necessary to make the mask long enough (in increments of 8-bit bytes) to designate, with a 0 bit, any desired "wild-card" OID string octets. The following is an SNMP View using these specifications, starting with a default configuration.
S Chassis(su)->show snmp view View Name = All Subtree OID = 1 Subtree mask = View Type = included Storage type = nonVolatile Row status = active View Name = All
14-16
Configuring SNMP
Subtree OID Subtree mask View Type Storage type Row status
= = = = =
S Chassis(su)->clear snmp view All 1 S Chassis(su)->set snmp view viewname All subtree 1.3.6.1.2.1.16.1.1.1.0.1012 mask ff:df S Chassis(su)->show snmp view View Name = All Subtree OID = 0.0 Subtree mask = View Type = included Storage type = nonVolatile Row status = active View Name Subtree OID Subtree mask View Type Storage type Row status = = = = = = All 1.3.6.1.2.1.1.1.0.244 ff:df included nonVolatile active
You can see by the unexpected Subtree OID value that this view actually accommodates only the right-most 8 bits of the entered decimal value 1012. The hexadecimal equivalent is 0x3f4, and the decimal equivalent of 0xf4 is 244. It is therefore true that this defined subtree will get a "hit" on multiple port values (244, 500, 756, 1012, etc), should they exist. This has nothing to do with the mask, and everything to do with the reasonable limitations of MIB design.
Note: Any use of the mask parameter assumes the View Type is configured as included. Parameters included or excluded cannot be specified along with the mask parameter.
An SNMP query of the etherStatsEntry branch using the community name associated with this defined view would display a result similar to the following.
Object etherStatsIndex etherStatsDataSource etherStatsDropEvents etherStatsOctets etherStatsPkts etherStatsBroadcastPkts etherStatsMulticastPkts etherStatsCRCAlignErrors etherStatsUndersizePkts etherStatsOversizePkts etherStatsFragments etherStatsJabbers etherStatsCollisions etherStatsPkts64Octets etherStatsPkts65to127Octets etherStatsPkts128to255Octets etherStatsPkts256to511Octets etherStatsPkts512to1023Octets etherStatsPkts1024to1518Octets etherStatsOwner etherStatsStatus Instance 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 Type INTEGER OBJECT ID Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter OCTET STRING INTEGER Value 1012 1.3.6.1...11012 54323 302877211 1592774 793487 729406 0 0 0 0 0 0 0 458931 55190 656909 57 1 monitor valid(1)
Configuring SNMP
14-18
Configuring SNMP
Example
The following example shows an S-Series device configuration using the steps in Procedure 14-4.
S Chassis(su)->set snmp access gAdmin security-model usm privacy exact read vSecured write vSecured notify vSecured S Chassis(su)->set snmp access gReadOnlyV1V2C security-model v1 vUnsecured S Chassis(su)->set snmp access gReadOnlyV1V2C security-model v2c vUnsecured S Chassis(su)->set snmp access gReadWriteV1V2C security-model v1 vUnsecured write vUnsecured exact read exact read exact read
S Chassis(su)->set snmp access gReadWriteV1V2C security-model v2c exact read vUnsecured write vUnsecured S Chassis(su)->set snmp community cnPrivate securityname sn_v1v2c_rw S Chassis(su)->set snmp community cnPublic securityname sn_v1v2c_ro S Chassis(su)->set snmp group gReadOnlyV1V2C user sn_v1v2c_ro security-model v1 S Chassis(su)->set snmp group gReadWriteV1V2C user sn_v1v2c_rw security-model v1 S Chassis(su)->set snmp group gReadOnlyV1V2C user sn_v1v2c_ro security-model v2c S Chassis(su)->set snmp group gReadWriteV1V2C user sn_v1v2c_rw security-model v2c S Chassis(su)->set snmp group gAdmin user it-admin security-model usm S Chassis(su)->set snmp user it-admin authentication sha auth_key privacy priv_key S Chassis(su)->set snmp view viewname vSecured subtree 1 S Chassis(su)->set snmp view viewname vSecured subtree 0.0 S Chassis(su)->set snmp view viewname vUnsecured subtree 1 S Chassis(su)->set snmp view viewname vUnsecured subtree 0.0 S Chassis(su)->set snmp view viewname vUnsecured subtree 1.3.6.1.6.3.15 excluded S Chassis(su)->set snmp view viewname vUnsecured subtree 1.3.6.1.6.3.16 excluded S Chassis(su)->set snmp view viewname vUnsecured subtree 1.3.6.1.6.3.18.1.1 excluded
Community
Use this command to display SNMPv1/SNMPv2c community names and status. In SNMPv1 and v2, community names act as passwords to remote management.
show snmp community [name]
Example
S Chassis(su)->show snmp community public Name Security name Context Transport tag Storage type Status = public = public = = = nonVolatile = active
Context
Use this command to display the context list configuration for SNMP view-based access control:
show snmp context
Example
S Chassis(su)->show snmp context --- Configured contexts: default context (all MIBs) router
14-20
Counters
Use this command to display SNMP traffic counter values:
show snmp counters
Example
S Chassis(su)->show snmp counters --- mib2 SNMP group counters: snmpInPkts snmpOutPkts snmpInBadVersions snmpInBadCommunityUses snmpInASNParseErrs snmpInTooBigs snmpInNoSuchNames snmpInBadValues snmpInReadOnlys snmpInGenErrs snmpInTotalReqVars snmpInTotalSetVars snmpInGetRequests snmpInGetNexts snmpInSetRequests snmpInGetResponses snmpInTraps snmpOutTooBigs snmpOutNoSuchNames snmpOutBadValues snmpOutGenErrs snmpOutGetRequests snmpOutGetNexts snmpOutSetRequests snmpOutGetResponses snmpOutTraps snmpSilentDrops snmpProxyDrops --- USM Stats counters: usmStatsUnsupportedSecLevels = 0 usmStatsNotInTimeWindows usmStatsUnknownUserNames usmStatsUnknownEngineIDs usmStatsWrongDigests usmStatsDecryptionErrors = 0 = 0 = 0 = 0 = 0 = 396601 = 396601 = 0 = 0 = 0 = 0 = 0 = 0 = 0 = 0 = 403661 = 534 = 290 = 396279 = 32 = 0 = 0 = 0 = 11 = 0 = 0 = 0 = 0 = 0 = 396601 = 0 = 0 = 0
snmpInBadCommunityNames = 0
Engineid
Use this command to display SNMP engine properties:
show snmp engineid
Example
S Chassis(su)->show snmp engineid EngineId: 80:00:15:f8:03:00:e0:63:9d:b5:87 Engine Boots Engine Time Max Msg Size = 12 = 162181 = 2048
Groups
Use this command to display SNMP group information. If no parameters are specified, all information about all groups is displayed.
show snmp group [groupname groupname] [user user] [security-model {v1 | v2c | usm}] [volatile | nonvolatile | read-only]
Example
S Chassis(su)->show snmp group Security model Security/user name Group name Storage type Row status Security model Security/user name Group name Storage type Row status Security model Security/user name Group name Storage type Row status Security model Security/user name Group name Storage type Row status = SNMPv1 = public = groupRW = nonVolatile = active = SNMPv2c = public = groupRW = nonVolatile = active = USM = admin1 = alladmin = nonVolatile = active = USM = admin2 = alladmin = nonVolatile = active
14-22
Example
S Chassis(su)->show snmp access Group Security model Security level Read View Write View Notify View Context match Storage type Row status Group Security model Security level Read View Write View Notify View Context match Storage type Row status = groupRW = SNMPv1 = noAuthNoPriv = All = All = All = "default context" (exact) = nonVolatile = active = groupRW = SNMPv2c = noAuthNoPriv = All = All = All = "default context" (exact) = nonVolatile = active
Example
S Chassis(su)-> show snmp targetparams matrix Target Parameter Name = matrix Security Name Message Proc. Model Security Level Storage type Rox status = Enterasys_user = USM = authNoPriv = nonVolatile x= active
Example
S Chassis(su)-> show snmp targetaddr Target Address Name = Enterasys_user Tag List IP Address UDP Port# Target Mask Timeout Retry count Parameters Storage type Row status = = 172.29.10.1 = 162 = 255.255.255.255 = 1500 = 3 = matrix = nonVolatile x= active
Notify
Use this command to display the SNMP notify configuration, which determines which management targets will receive SNMP notifications. If no parameters are entered, information about all notify configurations is displayed.
show snmp notify [notify] [volatile | nonvolatile | read-only]
Example
S Chassis(su)->show snmp notify Notify name Notify Tag Notify Type Storage type Status Notify name Notify Tag Notify Type Storage type Status = 1 = Console = trap = nonVolatile = active = 2 = TrapSink = trap = nonVolatile = active
Notify Filter
Use this command to display SNMP notify filter information, identifying which profiles will not receive SNMP notifications:
show snmp notifyfilter [profile] [subtree oid-or-mibobject] [volatile | nonvolatile | read-only]
Example
S Chassis(su)->show snmp notifyfilter
14-24 Simple Network Management Protocol (SNMP) Configuration
Profile Subtree Subtree mask Filter type Storage type Row status
Notify Profile
Use this command to display SNMP notify profile information:
show snmp notifyprofile [profile] [targetparam targetparam] [volatile | nonvolatile | read-only]
Example
S Chassis(su)->show snmp notifyprofile area51 Notify Profile TargetParam Storage type Row status = area51 = v3ExampleParams = nonVolatile xx= active
Users
Use this command to display SNMPv3 users:
show snmp user [list] | [user] | [remote remote ] [volatile | nonvolatile | read-only]
Example
S Chassis(su)->show snmp user Enterasys_user EngineId xxxxxxxxxxxxxxx= 80:00:15:f8:03:00:e0:63:9d:cb:89 Username Auth protocol Privacy protocol Storage type = Enterasys_user = usmHMACMD5AuthProtocol = usmDESPrivProtocol = nonVolatile
Views
Use this command to display SNMP views. If no parameters are entered, all view information is displayed.
show snmp view [viewname] [subtree oid-or-mibobject] [volatile | nonvolatile | read-only]
Example
S Chassis(su)->show snmp view readView View Name Subtree OID = readView = 1
14-26
15
Spanning Tree Configuration
This chapter provides the following information about configuring and monitoring Spanning Tree protocols on Enterasys S-Series devices:
For information about... Using the Spanning Tree Protocol in Your Network STP Overview Understanding How Spanning Tree Operates Configuring STP and RSTP Configuring MSTP Understanding and Configuring SpanGuard Understanding and Configuring Loop Protect Terms and Definitions Refer to page... 15-1 15-2 15-6 15-12 15-18 15-20 15-22 15-27
STP Overview
Figure 15-1
With Spanning Tree running on your network devices, there would be no need for you to manually disable links. STP would automatically block one of the redundant paths, as shown in Figure 15-2, restoring a smooth data transfer between Switch 1 and 2 and end users. In the event that the primary (unblocked) path failed, STP would place the blocked path back into service and block the failed link. When enabled, it would do this automatically, without administrative intervention. Figure 15-2 Loop Avoided When STP Blocks a Duplicate Path
STP Overview
S-Series devices support the Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP), and Multiple Spanning Tree Protocol (MSTP) as defined in the following standards and described in this document: IEEE 802.1D (Spanning Tree Protocol) IEEE 802.1w (Rapid Spanning Tree Protocol) IEEE 802.1s (Multiple Spanning Tree Protocol) IEEE 802.1t (Update to 802.1D)
15-2
STP Overview
Note: MSTP and RSTP are fully compatible and interoperable with each other and with legacy STP.
As described previously, STP resolves the problems of physical loops in a network by establishing one primary path between any two devices. It does this by enabling switching devices to exchange information using Bridge Protocol Data Unit (BPDU) messages. STP uses BPDUs to designate a bridge for each switched LAN segment, and one root bridge for the Spanning Tree. The root bridge is the logical center of the Spanning Tree and is used to determine which paths to block and which to open. If you are familiar with STP operation and wish to adjust the defaults in your network, you can determine the topology of the Spanning Tree by adjusting the bridge priority, port priority, and path cost. The bridge priority assigns the bridges relative priority compared to other bridges. The port priority assigns the ports priority in relation to the other ports on the same bridge. By default, the port cost is a value assigned to the port based on the speed of the port. The faster the speed, the lower the cost. This helps to determine the quickest path between the root bridge and a specified destination. The segment attached to the root bridge normally has a path cost of zero. Each bridge has a Bridge Identification (BID), which is derived from the bridges MAC address and bridge priority. The bridge with the lowest BID becomes the root bridge.
MSTP can automatically detect the version of Spanning Tree being used on a LAN and send out the equivalent type of BPDU. In addition, MSTP incorporates a force version feature that allows you to administratively force MSTP to behave as STP or RSTP.
STP Features
Enterasys switching devices provide seamless Spanning Tree functionality by: Creating a single Spanning Tree from any arrangement of switching or bridging elements. Compensating automatically for the failure, removal, or addition of any switching device in an active data path. Achieving port changes in short time intervals, which establishes a stable active topology quickly with minimal network disturbance. Using a minimum amount of communications bandwidth to accomplish the operation of the Spanning Tree Protocol. Reconfiguring the active topology in a manner that is transparent to stations transmitting and receiving data packets. Managing the topology in a consistent and reproducible manner through the use of Spanning Tree Protocol parameters. Increasing security and reliability with SpanGuard, as described below and in Understanding and Configuring SpanGuard on page 15-20. Further protecting your network from loop formation with Loop Protect, as described below and in Understanding and Configuring Loop Protect on page 15-22. Supporting more port density and faster port speeds as described in Updated 802.1t on page 15-5. Supporting the Restricted TCN feature as described in Restricted TCN on page 15-5. Supporting the Restricted Role feature as described in Restricted Role on page 15-6.
SpanGuard
The Enterasys SpanGuard feature helps protect your network from two situations that can cause a Denial of Service condition: repeated topology change notifications and an unwanted bridge being inserted into and forcing traffic through the topology. SpanGuard increases security and reliability by preventing Spanning Tree respans that can occur when BPDUs are received on edge (user) ports, and notifies network management that they were attempted. If a SpanGuard enabled port receives a BPDU, it becomes locked and transitions to the blocking state. It will only transition out of the blocking state after a globally specified time or when it is manually unlocked.
15-4
By default, SpanGuard is globally disabled on S-Series devices and must be globally enabled to operate on all user ports. For configuration information, refer to Understanding and Configuring SpanGuard on page 15-20.
Loop Protect
The Loop Protect feature prevents or short circuits loop formation caused by redundant paths in your network by requiring ports to receive type 2 BPDUs (RSTP/MSTP) on point-to-point inter-switch links (ISLs) before their states are allowed to become forwarding. Further, if a BPDU timeout occurs on a port, its state becomes listening until a BPDU is received. In this way, both upstream and downstream facing ports are protected. When a root or alternate port loses its path to the root bridge due to a message age expiration, it takes on the role of designated port and will not forward traffic until a BPDU is received. When a port is intended to be the designated port in an ISL, it constantly proposes and will not forward until a BPDU is received, and will revert to listening if it fails to get a response. This protects against misconfiguration and protocol failure by the connected bridge. By default, the Loop Protect feature is globally disabled on S-Series devices and must be globally enabled to operate on all ports. For configuration information, refer to Understanding and Configuring Loop Protect on page 15-22.
Updated 802.1t
IEEE 802.1t is enabled by default on S-Series devices. This updated Spanning Tree protocol supports multiple Spanning Trees, more switch port density and faster port speeds. 802.1t includes the following updates: New bridge identifier encoding (4-bit priority, 12-bit system ID extension, 48-bit bridge address) New port identifier encoding (4-bit priority, 12-bit port number) Bridge detection state machine (for edge port identification) Path cost default values (switch between old and new default values)
Restricted TCN
Restricted TCN is a Spanning Tree protocol feature that allows or disallows Topology Change Notification (TCN) propagation on specified ports. When Restricted TCN is set to true, the port does not propagate received TCNs and topology changes to other ports. When set to true, temporary loss of connectivity can occur after changes in a Spanning Trees active topology, due to persistent, incorrectly learned, station location information. You set this command to true to prevent unnecessary address flushing in the core region of the network, caused by activation of bridges external to the network. A possible reason for not allowing TCN propagation is when bridges are not under the full control of the administrator or because MAC_Operational for the attached LANs transitions frequently. TCN propagation is set to false by default: the port propagates received TCNs and topology changes to other ports.
Example
The following example sets the Restricted TCN feature to true on port ge.2.1 and verifies the configuration:
S Chassis(rw)->set spantree restrictedtcn ge.2.1 true S Chassis(rw)->show spantree restrictedtcn port ge.2.1
Port ge.2.1
Restricted Role
Restricted Role is a Spanning Tree protocol feature that allows or disallows the root role on specified ports. When Restricted Role is set to true, the port will not to be selected as the root port for the Common Instance Spanning Tree (CIST) or any Multiple Spanning Tree Instance (MSTI), even if it has the best Spanning Tree priority. A port with Restricted Role set to true is selected as an alternate port after the root port has been selected. If set to true, Restricted Role can cause lack of Spanning Tree connectivity. Setting Restricted Role to true prevents bridges, external to a core region of the network, from influencing the Spanning Tree active topology. You may wish to use Restricted Role when bridges are not under your full control. Restricted role is set to false (root role is allowed) by default.
Example
The following example sets the Restricted Role feature to true on port ge.2.1 and verifies the configuration:
S Chassis(rw)->set spantree restrictedrole ge.2.1 true S Chassis(rw)->show spantree restrictedrole port ge.2.1 Port ge.2.1 has restrictedRole set to True
15-6
Each bridge is serviced by only one designated bridge. The root bridge serves as the designated bridge for all bridges to which it is directly attached. For each bridge, Spanning Tree calculates all possible paths back to the root bridge. If the path cost is equal from multiple paths, the designated bridge will be determined by the lowest bridge ID.
STPs main goal is to insure a fully connected, optimized, loop-free topology. The port role calculation makes this possible. A secondary goal, realized with the introduction of RSTP, is to move root and designated ports to the forwarding state as quickly as possible. A root port may move to forwarding as soon as any recent former root port is put into blocking. A designated port may move to forwarding once the connected device acknowledges agreement with the new topology information. This is typically an exchange of two BPDUs. For all transitions from blocking to forwarding, the port will move through the listening and learning states. In a stable topology, all the root and designated ports will be forwarding and the alternate and backup ports will be blocking. When there is a network topology change, Spanning Tree recalculates port roles. Ports which are no longer part of the active topology will be put into blocking. New designated ports will only forward after receiving an acknowledgement or, in the case of a port being connected to a 802.1d device, after a sufficient time has passed. This prevents transient loops as the network reconverges. STP port roles are described in Table 15-1. Port states are described in Table 15-2. Table 15-1
Port Role Root Alternate Designated Backup
Table 15-2
Port State Blocking
Table 15-2
Port State Listening
MSTP Operation
MSTP makes it possible for VLAN switching devices to use multiple Spanning Trees, allowing traffic belonging to different VLANs to flow over potentially different paths within the LAN. It builds upon the advancements of RSTP with its decreased time for network re-spans. MSTPs principle objective is to increase bandwidth utilization by allowing: Frames assigned to different VLANs to follow different data routes Ports to block for some Spanning Trees and forward for others Every ISL in the topology to be forwarding for at least one Spanning Tree
MST Region
An MST region is a group of devices that are configured together to form a logical region. The MST region presents itself to the rest of the network as a single switching device, which simplifies administration. Path cost is only incremented when traffic enters or leaves the region, regardless of the number of devices within the region. Each LAN can only be a member of one region. Figure 15-3 shows that the MST region appears as a single switching device to Devices 1 and 2, but really consists of three devices.
15-8
Figure 15-3
Device 1
Device 2
MST Region
For a switching device to be considered as part of an MST region, it must be administratively configured with the same configuration identifier information as all other devices in the MST region. The configuration identifier consists of the following four separate parts: Format Selector One octet in length and is always 0. It cannot be administratively changed. Configuration Name A user-assigned, case sensitive name given to the region. The maximum length of the name is 32 octets. Revision Level Two octets in length. The default value of 0 may be administratively changed. Configuration Digest 16 octet HMAC-MD5 signature created from the configured VLAN Identification (VID)/Filtering Identification (FID) to Multiple Spanning Tree Instances (MSTI) mappings. All devices must have identical mappings to have identical configuration digests.
The MST region designates one CIST regional root bridge for the region, regardless of the number of MSTIs. The regional root provides the connectivity from the region to the CIST root when the CIST root lies outside the region.
MST configuration digest described in the previous section and displayed in the following example. By default, every bridge will have a FID-to-SID mapping that equals VLAN FID 1/SID 0. Use this command to determine MSTI configuration identifier information, and whether or not there is a misconfiguration due to non-matching configuration identifier components:
show spantree mstcfgid
Example
This example shows how to display MSTI configuration identifier information. In this case, this bridge belongs to Region1:
S Chassis->show spantree mstcfgid MST Configuration Identifier: Format Selector: Configuration Name: Revision Level: 0 Region1 88
In order for other bridges to belong to Region1, all four elements of those bridges configuration ID output must match. The only default value that must be changed for this to happen is the configuration name setting. Use this command to change the configuration name from the default bridge MAC address value to Region1:
set spantree mstcfgid cfgname Region1
Since an MSTI is a separate Spanning Tree, each MSTI has its own root inside the MST region. Figure 15-4 and Figure 15-5 show two MSTIs in a single region. Switching device 3 is the root for MSTI 1, switching device 2 is the root for MSTI 2, and switching device 5 is the CIST regional root. Traffic for all the VLANs attached to an MSTI follow the MSTIs spanned topology. Various options may be configured on a per-MSTI basis to allow for differing topologies between MSTIs. To reduce network complexity and processing power needed to maintain MSTIs, you should only create as many MSTIs as needed.
15-10
Figure 15-4
MSTI 1 in a Region
Figure 15-5
MSTI 2
3
Legend:
Physical Link Blocked VLANs
Figure 15-6 shows 3 regions with five MSTIs. Table 15-3 defines the characteristics of each MSTI. Ports connected to PCs from devices 1, 3, 9, and 11 will be automatically detected as edge ports. Devices 4 and 10 are the CIST regional roots and, because they contain the master port for their regions, are also the regional root devices. Each MSTI can be configured to forward and block various VLANs.
Figure 15-6
Region 1
1 2
Region 2
6 8
Region 3
9
12
10
11
Master Port
Master Port
Table 15-3
MSTI / Region MSTI 1 in Region 1 MSTI 2 in Region 1 MSTI 1 in Region 2 MSTI 1 in Region 3 MSTI 2 in Region 3
15-12
Specifying active will display information for port(s) that have received BPDUs since boot. This example shows how to display the devices Spanning Tree configuration:
S Chassis(rw)->show spantree stats SID Spanning tree mode Designated Root Designated Root Priority Designated Root Cost Designated Root Port Root Max Age Root Hello Time Root Forward Delay Bridge ID MAC Address Bridge priority Bridge Max Age Bridge Hello Time Bridge Forward Delay Topology Change Count Time Since Top Change - 1 - enabled - 00-e0-63-6c-9b-6d - 0 - 1 - ge.5.1 - 20 sec - 2 sec
2. 3. 4.
Notes: By default, Spanning Tree is enabled globally on S-Series devices and enabled on all ports.
In addition to setting priority mode, you can globally configure the priority of an individual bridge. When two bridges tie for position as the root bridge, this setting affects the likelihood that a bridge will be selected. The lower the bridges priority, the more likely the bridge will be selected as the root bridge. Use this command to set the bridge priority:
set spantree priority priority [sid]
Valid priority values are: For 802.1t priority mode: 061440 (in increments of 4096), with 0 indicating high priority and 61440 low priority. Values will automatically be rounded up or down, depending on the 802.1t value to which the entered value is closest. For 802.1D priority mode: 065535 (in increments of 1), with 0 indicating high priority and 65535 low priority.
Valid sid values are 04094. If not specified, SID 0 will be assumed.
15-14
Valid priority values are 0240 (in increments of 16) with 0 indicating high priority. Valid sid values are 04094. If not specified, SID 0 will be assumed.
Va1id cost values are: 065535 if legacy path cost is enabled. 0200000000 if legacy path cost is disabled.
Valid sid values are 04094. If not specified, SID 0 will be assumed.
Notes: Please refer to the IEEE 802.1D specification for guidance in setting appropriate cost values for your port speeds. By default, legacy path cost is disabled. Enabling the device to calculate legacy path costs affects the range of valid values that can be administratively assigned. To check the status of legacy path cost, use show spantree legacypathcost. To disable legacy path cost, if necessary use set spantree legacypathcost disable.
Hello time is the interval at which the bridge or individual ports send BPDU messages. By default, bridge hello mode is enabled, meaning the device uses a single bridge administrative hello time. Adjust the bridge hello time as follows: 1. Check the status of bridge hello mode:
show spantree bridgehellomode
2. 3.
15-16
Use this command to adjust the maximum number of user configured Spanning Trees allowed on the device:
set spantree maxconfigurablestps numstps
When SNMP trap messaging is configured and the backup root function is enabled, a trap message will be generated when the backup becomes the new root of the network.
A status of true indicates the LAN segment is operating as a point-to-point link. A status of false indicates it is not. If port-string is not specified, point-to-point operating status will be displayed for all Spanning Tree ports. 2. Display the point-to-point administrative status of a LAN segment attached to a port:
show spantree adminpoint [port port-string]
A status of true indicates the port is administratively set to be considered point-to-point. A status of false indicates the port is administratively set to be considered non point-to-point. A status of auto (the default setting) indicates that the firmware is allowed to determine the ports point-to-point status.
Configuring MSTP
If port-string is not specified, point-to-point administrative status will be displayed for all Spanning Tree ports. 3. If necessary, change the point-to-point administrative status of a LAN segment attached to a port:
set spantree adminpoint port-string auto | true | false
A status of true or Edge-Port indicates the port is operating as an edge port. A status of false or Non-Edge-Port indicates it is not. If port-string is not specified, edge port status will be displayed for all Spanning Tree ports. 4. Display the edge port administrative status of one or more port(s):
show spantree adminedge [port port-string]
A status of true or Edge-Port indicates the port is administratively set to be considered an edge port. A status of false or Non-Edge-Port indicates the port is administratively set to be considered a non edge port. If port-string is not specified, edge port administrative status will be displayed for all Spanning Tree ports. 5. If necessary, change the edge port administrative status of one or more port(s):
set spantree adminedge port-string true
Configuring MSTP
In order for MSTP to provide multiple forwarding paths, the following must happen: The configuration identifier must match on all bridges within the region. All bridges must be within the same region. All bridges must be connected to MSTP-aware bridges. (They can be connected using a shared media such as a repeater provided that a single Spanning Tree device does not reside on that LAN).
Note: A single Spanning Tree device between two MSTP bridges will terminate the ability to have multiple forwarding paths. An MSTP region is bounded by a single STP device and can not contain a device in the regions interior that is not part of the region.
15-18 Spanning Tree Configuration
Configuring MSTP
For information about... Example: Simple MSTP Configuration Adjusting MSTP Parameters Monitoring MSTP
Procedure 15-1 shows how to configure Switches 1 and 2 for MSTP. Procedure 15-1 Configuring Switches 1 and 2 for Simple MSTP
Step 1. 2. 3. 4. 5. 6. Task Create VLANs 2 and 3. Set each switchs configuration name to South. Create MSTI SID 2. Create MSTI SID 3. Create a FID-to-SID mapping for VLAN 2 to SID 2. Create a FID-to-SID mapping for VLAN 3 to SID 3. Command(s) set vlan create 2-3 set spantree mstcfgid cfgname South set spantree msti sid 2 create set spantree msti sid 3 create set spantree mstmap 2 sid 2 set spantree mstmap 3 sid 3
Monitoring MSTP
Use the commands in Table 15-6 to monitor MSTP statistics and configurations on S-Series devices. You can also use the show commands described in Reviewing and Enabling Spanning Tree on page 15-13 to review information related to all Spanning Tree protocol activity. Table 15-6
Task Verify that MSTP is running on the device. Display the maximum configurable MSTIs allowed on the device. Display a list of MSTIs configured on the device. Display the mapping of one or more filtering database IDs (FIDs) to Spanning Trees. Since VLANs are mapped to FIDs, this shows to which SID a VLAN is mapped. Display the Spanning Tree ID(s) assigned to one or more VLANs. Display MST configuration identifier elements, including format selector, configuration name, revision level, and configuration digest. Display protocol-specific MSTP counter information.
What Is SpanGuard?
As described previously in the overview of SpanGuard on page 15-4, this feature enables Enterasys switching devices to detect unauthorized bridges in your network, resolving the threat of repeated topology change notifications or new root bridge announcements causing a Denial of Service (DoS) condition. It prevents Spanning Tree respans that can occur when BPDUs are received on user ports and notifies you (network management) they were attempted. If a SpanGuard enabled port receives a BPDU, it becomes locked and transitions to the blocking state. It will only transition out of the blocking state after a globally specified time or when it is manually unlocked. By default, SpanGuard is globally disabled on S-Series devices and must be globally enabled to operate on all user ports. For configuration information, refer to Configuring SpanGuard on page 15-21.
15-20
The port will become locked again if it receives another offending BPDU after the timeout expires or it is manually unlocked. In the event of a DoS attack with SpanGuard enabled and configured, no Spanning Tree topology changes or topology reconfigurations will be seen in your network. The state of your Spanning Tree will be completely unaffected by the reception of any spoofed BPDUs, regardless of the BPDU type, rate received or duration of the attack. By default, when SNMP and SpanGuard are enabled, a trap message will be generated when SpanGuard detects that an unauthorized port has tried to join a Spanning Tree.
Configuring SpanGuard
Use the following commands to configure device ports for SpanGuard, to enable the SpanGuard function, and to review SpanGuard status on the device.
Review and set edge port status as follows: 1. 2. 3. Use the show commands described in Defining Edge Port Status on page 15-18 to determine edge port administrative status on the device. Set edge port administrative status to false on all known ISLs. Set edge port administrative status to true on any remaining ports where SpanGuard protection is desired. This indicates to SpanGuard that these ports are not expecting to receive any BPDUs. If these ports do receive BPDUs, they will become locked.
Use this command to adjust the SpanGuard timeout value. This sets the length of time that a SpanGuard-affected port will remain locked:
set spantree spanguardtimeout timeout
Enterasys S-Series Configuration Guide 15-21
Valid values are 065535 seconds. Default is 300 seconds. Setting the value to 0 will set the timeout to forever. Use this command to manually unlock a port that was locked by the SpanGuard function. This overrides the specified timeout variable:
set spantree spanguardlock port-string
15-22
Communicating port non-forwarding status through traps and syslog messages Disabling a port based on frequency of failure events
Figure 15-8
Figure 15-9 on page 15-24 shows that, without Loop Protect, a failure could be as simple as someone accidentally disabling Spanning Tree on the port between Switch 2 and 3. Switch 3s blocking port eventually transitions to a forwarding state which leads to a looped condition. Figure 15-9 Spanning Tree Without Loop Protect
Figure 15-10 shows that, with Loop Protect enabled, Switch 3 will not go to a forwarding state until it has received a BPDU from Switch 2. Figure 15-10 Spanning Tree with Loop Protect
15-24
If no SID is specified, SID 0 is assumed. This command takes precedence over per port STP enable/disable state (portAdmin). Normally, portAdmin disabled would cause a port to go immediately to forwarding. If Loop Protect is enabled, that port should go to listening and remain there.
Note: The Loop Protect enable/disable settings for an MSTI port should match those for the CIST port.
The Loop Protect window is a timer value, in seconds, that defines a period during which Loop Protect events are counted. The default value is 180 seconds. If the timer is set to 0, the event counter is not reset until the Loop Protect event threshold is reached. Use this command to set the Loop Protect event window value in seconds:
set spantree lpwindow value
Use this command to enable or disable Loop Protect event notification. By default, this is disabled:
set spantree lptrapenable {enable | disable}
Example
The following example shows a switching device with Loop Protect enabled on port lag.0.2, SID 56:
S Chassis->show spantree lp port lag.0.2 sid 56 LoopProtect is enabled on port lag.0.2, SID 56 S Chassis->show spantree lplock port lag.0.2 sid 56 LoopProtect Lock status for port lag.0.2, SID 56_ is UNLOCKED S Chassis->show spantree lpcapablepartner port lag.0.2 Link partner of port lag.0.2_is LoopProtect-capable.
15-26
S Chassis->show spantree nonforwardingreason port lag.0.2 Port lag.0.2 has been placed in listening or blocking state on SID 0 by the LoopProtect feature.
BID BPDU
Designated port Edge port FID Forward delay Hello time ISLs Loop Protect
Table 15-9
Term Port cost
15-28
16
VLAN Configuration
This chapter provides the following information about configuring and monitoring 802.1Q VLANs on Enterasys S-Series devices.
For information about... Using VLANs in Your Network Implementing VLANs Understanding How VLANs Operate VLAN Support on Enterasys S-Series Switches Configuring VLANs Terms and Definitions Refer to page... 16-1 16-2 16-3 16-6 16-9 16-16
Note: This document describes the configuration and operation of VLANs as defined by the IEEE 802.1Q standard and assumes that all devices being configured support that standard. No other types of VLANs will be covered.
Implementing VLANs
Figure 16-1 shows a simple example of using port-based VLANs to achieve these benefits. In this example, two buildings house the Sales and Finance departments of a single company, and each building has its own internal network. The end stations in each building connect to a switch on the bottom floor. The two switches are connected to one another with a high speed link. Figure 16-1 VLAN Business Scenario
Without any VLANs configured, the entire network in the example in Figure 16-1 would be a broadcast domain, and the switches would follow the IEEE 802.1D bridging specification to send data between stations. A broadcast or multicast transmission from a Sales workstation in Building One would propagate to all the switch ports on Switch A, cross the high speed link to Switch B, and then be propagated out all switch ports on Switch B. The switches treat each port as being equivalent to any other port, and have no understanding of the departmental memberships of each workstation. Once Sales and Finance are placed on two separate VLANs, each switch understands that certain individual ports or frames are members of separate workgroups. In this environment, a broadcast or multicast data transmission from one of the Sales stations in Building One would reach Switch A, be sent to the ports connected to other local members of the Sales VLAN, cross the high speed link to Switch B, and then be sent to any other ports and workstations on Switch B that are members of the Sales VLAN. Separate VLANs also provides unicast separation between Sales and Finance. Finance can not ping Sales unless there is a routed VLAN configured for both Finance and Sales. Another benefit to VLAN use in the preceding example would be your ability to leverage existing investments in time and equipment during company reorganization. If, for instance, the Finance users change location but remain in the same VLAN connected to the same switch port, their network addresses do not change, and switch and router configuration is left intact.
Implementing VLANs
By default, all Enterasys switches run in 802.1Q VLAN operational mode. All ports on all Enterasys switches are assigned to a default VLAN (VLAN ID 1), which is enabled to operate and assigns all ports an egress status of untagged. This means that all ports will be allowed to transmit frames from the switch without a VLAN tag in their header. Also, there are no forbidden ports (prevented from transmitting frames) configured.
16-2
VLAN Configuration
You can use the CLI commands described in this document to create additional VLANs, to customize VLANs to support your organizational requirements, and to monitor VLAN configuration.
Determining how you want information to flow and how your network resources can be best used to accomplish this will help you customize the tasks described in this document to suit your needs and infrastructure. Once your planning is complete, you would proceed through the steps described in Configuring VLANs on page 16-9.
VLAN traffic is not made available to any other VLAN for forwarding purposes. This setting is useful for handling devices (such as servers) with NICs that share a common MAC address. One FID is assigned per VLAN. This is the default mode on Enterasys switches. Shared Virtual Local Area Network (VLAN) Learning (SVL): Two or more VLANs are grouped to share common source address information. This setting is useful for configuring more complex VLAN traffic patterns, without forcing the switch to flood the unicast traffic in each direction. This allows VLANs to share addressing information. It enables ports or switches in different VLANs to communicate with each other (when their individual ports are configured to allow this to occur). One FID is used by two or more VLANs.
Untagged Frames
When, for example, the switch receives a frame from Port 1 and determines the frame does not currently have a VLAN tag, but recognizes that Port 1 is a member of VLAN A, it will classify the frame to VLAN A. In this fashion, all untagged frames entering a VLAN switch assume membership in a VLAN.
Note: A VLAN ID is always assigned to a port. By default, it is the default VLAN (VLAN ID = 1).
The switch will now decide what to do with the frame, as described in Forwarding Decisions on page 16-5.
Tagged Frames
When, for example, the switch receives a tagged frame from Port 4 and determines the frame is tagged for VLAN C, it will classify it to that VLAN regardless of its port VLAN ID (PVID). This frame may have already been through a VLAN aware switch, or originated from a station capable of specifying a VLAN membership. If a switch receives a frame containing a tag, the switch will classify the frame in regard to its tag rather than the PVID for its port, following the ingress precedence rules listed below.
Ingress Precedence
VLAN assignment for received (ingress) frames is determined by the following precedence: 1. 2. 3. 802.1Q VLAN tag (tagged frames only) Policy or Traffic Classification (which may overwrite the 802.1Q VLAN tag) For more information, refer to Configuring Protocol-Based VLAN Classification on page 16-14. Port VID (PVID)
16-4
VLAN Configuration
Forwarding Decisions
VLAN forwarding decisions for transmitting frames is determined by whether or not the traffic being classified is or is not in the VLANs forwarding database as follows: Unlearned traffic: When a frames destination MAC address is not in the VLANs forwarding database (FDB), it will be forwarded out of every port on the VLANs egress list with the frame format that is specified. Refer toBroadcasts, Multicasts, and Unlearned Unicastsbelow for an example. Learned traffic: When a frames destination MAC address is in the VLANs forwarding database, it will be forwarded out of the learned port with the frame format that is specified. Refer to Learned Unicasts below for an example.
Learned Unicasts
When a VLAN switch receives a frame with a known MAC address as its destination address, the action taken by the switch to determine how the frame is transmitted depends on the VLAN, the VLAN associated FID, and if the port identified to send the frame is enabled to do so. When a frame is received it is classified into a VLAN. The destination address is looked up in the FID associated with the VLAN. If a match is found, it is forwarded out the port identified in the lookup if, and only if, that port is allowed to transmit frames for that VLAN. If a match is not found, then the frame is flooded out all ports that are allowed to transmit frames belonging to that VLAN.
Max Interfaces
: 16
Current Interfaces : 1
VLAN
Port
Storage Type
S Chassis(rw)->
A FID 2 D FID 3
B FID 2 E FID 4
Port 4
Port 5
Port 6
Assume a unicast untagged frame is received on Port 3 in the example in Figure 16-2. The frame is classified for VLAN C (the frames PVID is VLAN C). The switch would make its forwarding decision by comparing the destination MAC address to information previously learned and entered into its filtering database. In this case, the MAC address is looked up in the FDB for FID 3, which is associated with VLANs C and D. Lets say the switch recognizes the destination MAC of the frame as being located out Port 4. Having made the forwarding decision based on entries in the FID, the switch now examines the port VLAN egress list of Port 4 to determine if it is allowed to transmit frames belonging to VLAN C. If so, the frame is transmitted out Port 4. If Port 4 has not been configured to transmit frames belonging to VLAN C, the frame is discarded. If, on the other hand, a unicast untagged frame is received on Port 5, it would be classified for VLAN E. Port 5 has is own filtering database and is not aware of what addressing information has been learned by other VLANs. Port 5 looks up the destination MAC address in its FID. If it finds a match, it forwards the frame out the appropriate port, if and only if, that port is allowed to transmit frames for VLAN E. If a match is not found, the frame is flooded out all ports that are allowed to transmit VLAN E frames.
Configurable Range
The allowable user-configurable range for VLAN IDs (VIDs) on Enterasys S-Series switches is from 2 through 4094. This range is based on the following rules: VID 0 is the null VLAN ID, indicating that the tag header in the frame contains priority information rather than a VLAN identifier. It cannot be configured as a port VLAN ID (PVID).
16-6
VLAN Configuration
VID 1 is designated the default PVID value for classifying frames on ingress through a switched port. This default can be changed on a per-port basis. VID 4095 is reserved by IEEE for implementation use.
Notes: Each VLAN ID in a network must be unique. If you enter a duplicate VLAN ID, the Enterasys switch assumes you intend to modify the existing VLAN.
VLAN Types
Enterasys switches support traffic classification for the following VLAN types:
Port-Based VLANs
Port-based VLANs are configured by associating switch ports to VLANs in two ways: first, by manipulating the port VLAN ID (PVID); and second, by adding the port itself to the egress list of the VLAN corresponding to the PVID. Any traffic received by a port is associated to the VLAN identified by the port's PVID. By virtue of this association, this traffic may egress the switch only on those ports listed on the VLAN's egress list. For example, given a VLAN named Marketing, with an ID value of 6, by changing the PVID values of ports 1 through 3 to 6, and adding those ports to the egress list of the VLAN, we effectively restrict the broadcast domain of Marketing to those three ports. If a broadcast frame is received on port 1, it will be transmitted out ports 2 and 3 only. In this sense, VLAN membership is determined by the location of traffic ingress, and from the perspective of the access layerwhere users are most commonly locatedegress is generally untagged.
Policy-Based VLANs
Rather than making VLAN membership decisions simply based on port configuration, each incoming frame can be examined by the classification engine which uses a match-based logic to assign the frame to a desired VLAN. For example, you could set up a policy which designates all e-mail traffic between the management officers of a company to a specific VLAN so that this traffic is restricted to certain portions of the network. With respect to network usage, the administrative advantages of policy classification would be application provisioning, acceptable use policy, and distribution layer policy. All of these provisions may involve simultaneous utilization of inter-switch links by multiple VLANs, requiring particular attention to tagged, forbidden, and untagged egress settings. As described above, PVID determines the VLAN to which all untagged frames received on associated ports will be classified. Policy classification to a VLAN takes precedence over PVID assignment if: policy classification is configured to a VLAN, and PVID override has been enabled for a policy profile, and assigned to port(s) associated with the PVID.
How It Works
When a VLAN has egress, the information is transmitted out GVRP configured ports on the device in a GARP formatted frame using the GVRP multicast MAC address. A switch that receives this frame examines the frame and extracts the VLAN IDs. GVRP then dynamically registers (creates) the VLANs and adds the receiving port to its tagged member list for the extracted VLAN IDs. The information is then transmitted out the other GVRP configured ports of the device. Figure 16-3 shows an example of how VLAN Blue from end station A would be propagated across a switch network. In this figure, port 1 of Switch 4 is registered as being a member of VLAN Blue and Switch 4 declares this fact out all its ports (2 and 3) to Switch 1 and Switch 2. These two switches register this in the port egress lists of the ports (Switch 1, port 1 and Switch 2, port 1) that received the frames with the information. Switch 2, which is connected to Switch 3 and Switch 5 declares the same information to those two switches and the port egress list of each port is updated with the new information, accordingly. Figure 16-3 Example of VLAN Propagation Using GVRP
Switch 1 Switch 2 Switch 3
1 R
1 R 2 D
D 3
1 R
2 D 3 D Switch 4 1 R
1 R
End Station A
Switch 5
R D
Note: If a port is set to forbidden for the egress list of a VLAN, then the VLANs egress list will not be dynamically updated with that port.
Administratively configuring a VLAN on an 802.1Q switch creates a static VLAN entry that will always remain registered and will not time out. However, GVRP-created dynamic entries will time out, and their registrations will be removed from the member list if the end station is
16-8 VLAN Configuration
Configuring VLANs
removed. This ensures that, if switches are disconnected or if end stations are removed, the registered information remains accurate. The end result of GVRP dynamic VLAN configuration is that each ports egress list is updated with information about VLANs that reside on that port, even if the actual station on the VLAN is several hops away.
Configuring VLANs
Once you have planned your implementation strategy as described inPreparing for VLAN Configuration on page 16-3, you can begin configuring VLANs as described in this section.
For information about... Default Settings Configuring Static VLANs Creating a Secure Management VLAN Configuring Dynamic VLANs Configuring Protocol-Based VLAN Classification Configuring IGMP VLAN Snooping Monitoring VLANs Refer to page... 16-9 16-10 16-12 16-13 16-14 16-15 16-16
Default Settings
Table 16-1 lists VLAN parameters and their default values. Table 16-1
Parameter garp timer
gvrp
1 second
Configuring VLANs
Table 16-1
Parameter
Enabled
VLAN1/ Default VLAN VLANs use an independent filtering database Disabled Tagged
vlan name
None
3. 4.
set vlan name vlan-id string set port vlan port-string vlan-id
16-10
VLAN Configuration
Configuring VLANs
Note: If the VLAN specified has not already been created, the above command will create it. It will also add the VLAN to the ports egress list as untagged, and remove the default VLAN from the ports egress list. This automatically changes the existing untagged VLAN egress permission to match the new PVID value. 5. Configure VLAN egress, which determines which ports a frame belonging to the VLAN may be forwarded out on. Static configuration: Add the port to the VLAN egress list for the device. The default setting, tagged, allows the port to transmit frames for a particular VLAN. The untagged setting allows the port to transmit frames without a VLAN tag. This setting is usually used to configure a port connected to an end user device. The forbidden setting prevents the port from participating in the specified VLAN and ensures that any dynamic requests for the port to join the VLAN will be ignored. If necessary, remove ports from the VLAN egress list. If specified, the forbidden setting will be cleared from the designated ports and the ports will be reset as allowed to egress frames, if so configured by either static or dynamic means. If forbidden is not specified, tagged and untagged egress settings will be cleared from the designated ports. Dynamic configuration: By default, dynamic egress is disabled on all VLANs. If dynamic egress is enabled for a VLAN, the device will add the port receiving a frame to the VLANs egress list as untagged according to the VLAN ID of the received frame. 6. Optionally, set VLAN constraints to control the filtering database a VLAN will use for forwarding traffic. Filtering databases can be shared or independent. By default, filtering databases are independent. Optionally, enable ingress filtering on a port to drop those incoming frames that do not have a VLAN ID that matches a VLAN ID on the ports egress list. Optionally, choose to discard tagged or untagged, (or both) frames on selected ports. Select none to allow all frames to pass through. set vlan dynamicegress vlan-id {enable | disable} clear vlan egress vlan-list port-string [forbidden] set vlan egress vlan-id port-string forbidden | tagged | untagged
7.
8.
Configuring VLANs
Example Configuration
The following shows an example S-Series device configuration using the steps in Procedure 16-1. In this example, VLAN 100 is created and named VLANRED. Ports ge.1.2, 1.3 and 1.4 are assigned to VLAN 100 and added to its egress list. VLAN 100 is then configured as a routing interface with an IP address of 120.20.20.24.
S Chassis(rw)->set vlan create 100 S Chassis(rw)->set vlan name 100 VLANRED S Chassis(rw)->set port vlan ge.1.2-4 100 The PVID is used to classify untagged frames as they ingress into a given port. Would you like to add the selected
port(s) to this VLAN's untagged egress list and remove them from all other VLANs untagged egress list (y/n) NOTE: [n]? y
configured tagged egress lists. S Chassis(rw)->router S Chassis(rw)-router)->configure terminal S Chassis(rw)-router-config)->interface vlan 100 S Chassis(rw)-router-config-intf-Vlan-100)->ip address 120.20.20.1/24 S Chassis(rw)-router(config-intf-Vlan-100)->no shutdown
If you want to configure a port to drop incoming frames that do not have a VLAN ID that matches a VLAN ID on the ports egress list, use the set port ingress-filter command. For example:
S Chassis(rw)->set port ingress-filter ge.1.2-4 enable
If you want to configure a port to discard tagged or untagged incoming frames, use the set port discard command. For example, to configure the ports to drop tagged frames on ingress:
S Chassis(rw)->set port discard ge.1.2-4 tagged
Configuring VLANs
device that is connected in the network to ensure that each switch has a secure management VLAN.
.
4.
Note: By default, community namewhich determines remote access for SNMP managementis set to public with read-write access. For more information, refer to your devices SNMP documentation.
2.
3. 4.
show garp timer [port-string] set garp timer {[join timer-value] [leave timer-value] [leaveall timer-value]} port-string
Caution: The setting of GARP timers is critical and should only be changed by personnel familiar with 802.1Q standards.
Configuring VLANs
3. 4.
set port ingress-filter port-string disable set policy profile profile-index [name name] [pvid-status {enable | disable}] [pvid pvid]
5.
set policy rule admin-profile port port-string [port-string port-string] [admin-pid admin-pid] set policy rule profile-index {protocol data [mask mask]} [vlan vlan]
6.
Example Configuration
The following shows an example S-Series device configuration using the steps in Procedure 16-4. This example configures a policy that ensures that IP traffic received on the specified ingress ports will be mapped to VLAN 2, while all other types of traffic will be mapped to VLAN 3. 1. 2. Two VLANs are created: VLAN 2 and VLAN 3. Ports 1 through 5 on the Gigabit Ethernet IOM in slot 4 are configured as egress ports for the VLANs while ports 8 through 10 on the Gigabit Ethernet IOM in slot 5 are configured as ingress ports that will do the policy classification. Policy profile number 1 is created that enables PVID override and defines the default behavior (classify to VLAN 3) if none of the classification rules created for the profile are matched.
3.
16-14
VLAN Configuration
Configuring VLANs
4. 5.
Administrative rules are created that apply policy profile number 1 to all frames received on the ingress ports ge.5.8 through 10. Classification rules are created for policy profile number 1 that assign IP frames to VLAN 2. The rules identify IP frames by using the ether protocol parameter, which classifies on the Type field in the headers of Layer 2 Ethernet II frames, and the protocol data of 0x0800 (IP type), 0x0806 (ARP type), and 0x8035 (RARP type).
S Chassis(rw)->set vlan create 2, 3 S Chassis(rw)->set vlan egress 2 ge.4.1-2 S Chassis(rw)->set vlan egress 3 ge.4.3-5 S Chassis(rw)->set port ingress-filter ge.5.8-10 disable S Chassis(rw)->set policy profile 1 name protocol_based_vlan pvid-status enable pvid 3 S Chassis(rw)->set policy rule admin-profile port ge.5.8 port-string ge.5.8 admin-pid 1 S Chassis(rw)->set policy rule admin-profile port ge.5.9 port-string ge.5.9 admin-pid 1 S Chassis(rw)->set policy rule admin-profile port ge.5.10 port-string ge.5.10 admin-pid 1 S Chassis(rw)->set policy rule 1 ether 0x0800 mask 16 vlan 2 S Chassis(rw)->set policy rule 1 ether 0x0806 mask 16 vlan 2 S Chassis(rw)->set policy rule 1 ether 0x8035 mask 16 vlan 2
Monitoring VLANs
Table 16-2 describes the show commands that display information about VLAN configurations. Refer to Enterasys S-Series CLI Reference for a description of the output of each show command. Table 16-2
Task Display all existing VLANs. Display the VLAN constraint setting. Display the VLAN dynamic egress setting. Display all static VLANs. Display ports assigned to VLANs. Display existing GVRP settings. Display GARP timer vlaues for one or more ports. Display IGMP VLAN configuration. Display IGMP enable state of VLAN. Display all groups on a given VLAN. Display IGMP VLAN query state. Display static ports on the given vid, group.
16-16
VLAN Configuration
Table 16-3
Term
Forwarding List GARP Multicast Registration Protocol (GMRP) GARP VLAN Registration Protocol (GVRP) Generic Attribute Registration Protocol (GARP) Port VLAN List
A list of the ports on a particular device that are eligible to transmit frames for a selected VLAN. A GARP application that functions in a similar fashion as GVRP, except that GMRP registers multicast addresses on ports to control the flooding of multicast frames. A GARP application used to dynamically create VLANs across a switched network.
GARP is a protocol used to propagate state information throughout a switched network. A per port list of all eligible VLANs whose frames can be forwarded out one specific port and the frame format (tagged or untagged) of transmissions for that port. The Port VLAN List specifies what VLANs are associated with a single port for frame transmission purposes. Four bytes of data inserted in a frame that identifies the VLAN/frame classification. The Tag Header is inserted into the frame directly after the Source MAC address field. Twelve bits of the Tag Header represent the VLAN ID. The remaining bits are other control information. A data frame that contains a Tag Header. A VLAN aware device can add the Tag Header to any frame it transmits. A data frame that does not have a Tag Header. A unique number (between 1 and 4094) that identifies a particular VLAN. A 32-character alphanumeric name associated with a VLAN ID. The VLAN Name is intended to make user-defined VLANs easier to identify and remember.
16-18
VLAN Configuration
17
Link Aggregation Control Protocol (LACP) Configuration
This document describes the link aggregation feature and its configuration on Enterasys S-Series devices.
For information about... Using Link Aggregation in Your Network Implementing Link Aggregation Link Aggregation Overview Configuring Link Aggregation Link Aggregation Configuration Examples Terms and Definitions Refer to page... 17-1 17-2 17-3 17-9 17-11 17-19
The concept of grouping multiple ports into a single link is not a new idea. Cabletron's SmartTrunk, Cisco's Inter Switch Link trunking, and Adaptec's Duralink are previous examples. The problem with these older methods, from the network administrators point of view, is that they are proprietary. Administrators who wanted to implement faster logical links faced major problems if they also wanted, or needed, to use a different brand of networking hardware. Link aggregation is standards based allowing for interoperability between multiple vendors in the network. Older implementations required manual configuration. With LACP, if a set of links can aggregate, they will aggregate. LACPs ability to automatically aggregate links represents a timesaver for the network administrator who will not be required to manually configure the aggregates. However, manual overrides are provided for when the administrator needs to customize. Link aggregation also provides for rapid configuration and reconfiguration when there are changes in the physical connections. Link aggregation will automatically and quickly converge the new configuration. This convergence typically occurs in one second or less. Link aggregation is a cost effective way to implement increased bandwidth. A major benefit of link aggregation is the ability to incrementally add bandwidth in a linear fashion. Without link aggregation, if there is a need to increase the bandwidth for a 100Mbps pipe, the only choice is an exponential upgrade to a 1000Mbps pipe. If there is a need for a 300Mbps pipe, aggregating three 100Mbps ports is both less expensive, because a forklift hardware upgrade is avoided, and makes for more efficient use of the system ports that are already available. The physical links within the aggregate can serve as redundant backups to one another. Since only a single MAC address representing the entire aggregate is presented to the MAC client, the failure of any link within the aggregate is transparent. Failover is handled within the link aggregation sublayer.
17-2
LACP Operation
In order to allow LACP to determine whether a set of links connect to the same device, and to determine whether those links are compatible from the point of view of aggregation, it is necessary to be able to establish: A globally unique identifier for each device that participates in link aggregation. A means of identifying the set of capabilities associated with each port and with each aggregator, as understood by a given device. A means of identifying a LAG and its associated aggregator.
For each aggregatable port in the device, LACP: Maintains configuration information (reflecting the inherent properties of the individual links as well as those established by network administration) to control aggregation. Exchanges configuration information with other devices to allocate the link to a LAG.
Note: A given link is allocated to, at most, one LAG at a time. The allocation mechanism attempts to maximize aggregation, subject to management controls.
Attaches the port to the aggregator used by the LAG, and detaches the port from the aggregator when it is no longer used by the LAG. Uses information from the partner devices link aggregation control entity to decide whether to aggregate ports.
The operation of LACP involves the following activities: Checking that candidate links can actually be aggregated. Controlling the addition of a link to a LAG and the creation of the group if necessary. Monitoring the status of aggregated links to ensure that the aggregation is still valid. Removing a link from a LAG if its membership is no longer valid, and removing the group if it no longer has any member links.
Figure 17-1 displays a LAG formation example containing three devices with five 100Mbps ports and three 1Gb ports configured. For this example, all ports are operating in full-duplex mode, and
the admin key for all LAG ports has been set to 100. Device A is the actor and therefore determines which ports will join a LAG. Devices B and C are the partners. In our example two LAGs have formed because the actor ports are shared between two partner devices. Attempting to form a single LAG using all the actor ports would have broken the rule that actor and partner ports must operate in parallel. Figure 17-1 LAG Formation
PARTNER
Port Speed
100M 100M 100M
Device B
Admin Key
100 100 100
1 2 3
ACTOR
Admin Key
100 100 200
Port Speed
100M 100M 100M
Device A
LAG 1
1 2 3
LAG 2
4 5 6 7 8
Device C
1 2 3 4 5 6 7 8
Actor ports 1 - 3 on device A directly connect to partner ports 1 - 3 on device B: We have already stated that all ports are operating in full-duplex mode, so rule 1 is satisfied for all three ports. Investigating the port admin keys, we see that ports 1 and 2 on device A are set to 100 (the same setting as all LAG ports on the device), while port 3 on device A is set to 200. Because the port admin keys are the same for both the LAG port and these physical ports, ports 1 and 2 satisfy rule 2. Because the admin key for physical port 3 is different from any possible LAG for this device, port 3 can not be part of any LAG. Because ports 1 and 2 for both the actor and partner operate in parallel with each other, rule 3 is satisfied for these ports. Rule 4 is satisfied, regardless of whether single port LAGs are enabled, because there are two aggregatable port pairings between devices A and B.
17-4
For these reasons, LAG 1 (lag.0.1) is formed using actor and partner ports 1 and 2. Actor ports 4 - 8 on device A directly connect to partner ports 4 - 8 on device C: Because all ports are operating in full-duplex mode, rule one is satisfied for all five ports. Investigating port admin keys, we see that ports 4 - 6 on device A are set to 100 (the same setting as all LAG ports on the device), while ports 7 and 8 on device A are set to 300 and 400, respectively. Because port admin keys for all LAGs and the physical ports 4 - 6 are the same, physical ports 4 - 6 satisfy rule 2. Because the admin key settings for physical ports 7 and 8 do not agree with any LAG admin key setting on the device, ports 7 and 8 can not be part of any LAG. Because ports 4 - 6 for both the actor and partner operate in parallel with each other, rule 3 is satisfied for these ports. Rule 4 is satisfied, regardless of whether single port LAG is enabled, because there are three aggregatable port pairings between devices A and C.
For these reasons, LAG 2 is formed using actor and partner ports 4 - 6.
Note: Port speed is not a consideration in the forming phase for LAGs. LAG 2 contains 100Mbps and 1Gb port members.
Attached Ports
Once a LAG is formed, two steps must take place before traffic can pass over the LAG: The device that will choose which ports to move to the attached state must be identified The process of moving the chosen ports to the LACP attached state must take place
A system ID, made up of the device MAC address and the system priority, is associated with each device. The device with the lower system priority is in charge of selecting the LAG members to move to the attached state. If a system priority tie occurs, the system with the lower MAC address value breaks the tie. Only LAG members with the same port speed can be moved to the attached state. In a case where multiple speeds are present in a LAG, the LAG member with the lowest port priority on the device in charge, as well as all other members with the same port speed as the member with the lowest port priority, are selected and moved to the attached state. Using LAG2 in Figure 17-1 on page 17-4 as an example, if the LAG2 member port priorities are set as shown in Table 17-1 on page 17-5, ports 4 and 5 are moved to the attached state. Table 17-1
Port Number 4 5 6
This is true because port 4 has the lowest priority of the three ports currently in the LAG, and port 5 has the same speed as the port with the lowest priority in the LAG, regardless of its priority. Because port 6 has both a different speed and a higher priority than the port with the lowest priority in the LAG, it is not moved to the attached state. If LAG members with different port speeds should tie for the lowest port priority, the LAG member with the lowest port number breaks the tie. In our example, should all three ports have
the same port priority, ports 4 and 5 would still be the ports moved to the attached state because port 4 has the lowest port number and port 5 has the same port speed as port 4. If in our example you wanted the reverse outcome of port 6 moved to the attached state instead of ports 4 and 5, setting port 6 to a lower priority than ports 4 and 5, as well as enabling the single port LAG feature on this device, would accomplish that goal. Aggregatable ports not moved to the attached state are made available to form another LAG providing a LAG resource is available for this system. Port 6 in Figure 17-1 on page 17-4, was not moved to the attached state. The only criteria port 6 does not meet to form its own LAG is rule 4: being a single aggregatable port. The single port LAG feature must be enabled for port 6 to form a LAG. If single port LAG is enabled on this system, port 6 would form and attach to LAG 3. Figure 17-2 illustrates the three LAGs described in this example. Figure 17-2 LAGs Moved to Attached State
Device B
PARTNER
Port Speed
100M 100M 100M
Admin Key
100 100 100
1 2 3
ACTOR
Admin Key
100 100 200
Port Speed
100M 100M 100M
Device A
LAG 1
1 2 3
LAG 2
100 100
100M 100M
4 5
LAG 3
Device C
1 2 3 4 5 6 7 8
6 7 8
Should an aggregatable port be available with all LAG resources depleted for this system, the port is placed in LACP standby state. Ports in standby state do not forward traffic. If all ports initially moved to the attach state for a given LAG become unavailable, a LAG resource will then be available. LACP will initiate a new selection process using the ports in standby state, using the same rules as the initial process of forming LAGs and moving ports to the attached state.
17-6
Port Priority
Table 17-2
Term
Administrative State
A default partner system ID can be set. This is a default MAC address for the system partner. (Optional) LACP PDU processing can be enabled or disabled for this port.
Flow Regeneration
Flow regeneration determines how flows will behave when a new port joins a link aggregation. When enabled, LACP will redistribute all existing flows over the LAG, taking into account the new port(s) that joined the LAG. It will also attempt to load balance existing flows to take advantage of the new port that has joined the LAG. When flow regeneration is disabled and a new port joins the LAG, the distribution of current flows remains unchanged and does not take advantage of the new port. All new flows will take into account the new port on the LAG. Flow regeneration is disabled by default.
17-8
Disabled (disallows creation of a single port LAG) Disabled 30 second: frequency of LACP PDU transmission 90 seconds: period before declaring the partner port down
LACP Port Timeout State Port state determining the frequency of LACP PDU transmission and period before declaring the partner LACP port down if no response is received.
Procedure 17-1 describes how to configure link aggregation. Procedure 17-1 Configuring Link Aggregation
Step 1. 2. 3. 4. 5. Task In switch command mode, enable LACP on the device. Optionally, change the system priority for the device. Optionally, change the administratively assigned key for each aggregation on the device. Optionally, enable single port LAGs on the device. Optionally, enable port active state for all LAG participating ports and modify the LAG port parameters. See Table 17-2 on page 17-7 for a description of port parameters. Command(s) set lacp {disable | enable} set lacp asyspri value set lacp aadminkey port-string value set lacp singleportlag {enable | disable} set port lacp port port-string { [aadminkey aadminkey] [aportpri aportpri] [padminsyspri padminsyspri] [padminsysid padminsysid] [padminkey padminkey] [padminportpri padminportpri] [padminport padminport] [aadminstate {lacpactive | lacptimeout | lacpagg | lacpsync | lacpcollect | lacpdist | lacpdef | lacpexpire}] [padminstate {lacpactive | lacptimeout | lacpagg | lacpsync | lacpcollect | lacpdist | lacpdef | lacpexpire}] [enable | [disable] } 6. 7. 8. Optionally, change how flows behave when a port joins or is removed from a LAG. Optionally, change the out-port behavior for flows over the LAG. Optionally, assign static ports to a LAG when the partner device only supports a non-LACP method of aggregation. set lacp flowRegeneration {enable | disable} set lacp outportAlgorithm {dip-sip | da-sa | round-robin} set lacp static lagportstring [key] port-string
17-10
Table 17-5
Task
Reset a link aggregation port setting to the default value for one or more ports. See Table 17-2 on page 17-7 for a description of port parameters.
Reset the LACP flow regeneration setting to its default value of disabled. Reset the LACP out-put algorithm setting to its default value of DIS-SIP.
Table 17-6 describes how to display link aggregation information and statistics. Table 17-6
Task Display the global LACP enable state, or display information about one or more aggregator ports. Display the status of the single port LAG function. Display link aggregation information for one or more underlying physical ports. Display LACP flow regeneration state. Display the current configured out-port algorithm.
show lacp singleportlag show port lacp port port-string {[status {detail | summary}] | [counters]} [sort {port | lag}] show lacp flowRegeneration show lacp outportAlgorithm
Figure 17-3
DS to Fixed Switch PORTS ge1.2 ge2.2 ge3.2 ge4.2 Admin KEY 200
LAG Admin KEY 1 100 2 200 3 300 System Priority DS 32768 ES 100 SS 100 Server > 100
LAG1
LAG2
Edge Switch
ES to DS PORTS ge1.1 ge1.2 ge2.1 ge3.1 Admin KEY 100
Fixed Switch
Fixed Switch to DS PORTS ge1.1 ge1.2 ge2.1 ge2.2 Admin KEY 200 Fixed Switch to Server PORTS fe1.1 fe1.2 fe2.1 fe2.2 Admin KEY 300
LAG3
End-Users
End-Users
Server to Fixed Switc PORTS NIC1 NIC2 NIC3 NIC4 Admin KEY 300
Three LAGs are created for the example: LAG 1 provides an uplink aggregate of four 1Gb ports for the edge switch devices to the distribution switch. LAG2 provides an uplink aggregate of four 1Gb ports for the Fixed Switches to the distribution switch for both the end-user and server data flows. LAG3 provides an aggregate of four 100Mbps ports between the Fixed Switches and the server.
Each LAG consists of four ports. The primary goal of the aggregates in this example is to provide link and slot redundancy for the affected data streams. With that in mind, LAG members are
17-12
spread between available system slots. Four out of the five distribution switch available slots are used providing complete redundancy at the distribution switch. All three slots are used in the edge switch. The four ports from the server to the Fixed Switches and the Fixed Switches to the distribution switch are evenly split between the two Fixed Switches. For this example we will manually configure the LAGs that will form and prevent any other LAGs from forming. Because we have specific port to LAG goals in mind, the first thing we want to do on each device is to ensure that LAGs form only where we configure them. Since the admin key for the LAG and its associated ports must agree for the LAG to form, an easy way to ensure that LAGs do not automatically form is to set the admin key for all LAGS on all devices to a non-default value. The physical ports will initially retain admin key defaults. In our example, the admin keys for all LAGs are set to the highest configurable value of 65535. Both physical port and LAG admin keys will be set as shown in Table 17-7 to ensure that the LAGs form only for the desired ports. Table 17-7
Device Distribution Switch
Edge Switch
100
Fixed Switch
200
300
Server
300
Which device determines port selection for the LAG is an optional consideration. If system priorities remain at the default value, the lowest MAC address device determines port selection for the LAG. For purposes of this example, we will set the system priority of the edge switch to 100 to ensure it will control port selection for LAG1, instead of the distribution switch. The Fixed Switch system priority will be set to 100 to ensure it will control port selection for LAG2, instead of the distribution switch. For the Fixed Switch to control port selection for LAG3 requires that you ensure that the server has a system priority higher than 100. Each LAG in our example is made up of physical ports of the same speed, so there is no need to set the port priority to a non-default value. The only port value to be changed is the admin key for each physical port and each LAG. These modifications are detailed in Table 17-7 on page 17-13. Given that the intent of the example is to have three LAGs of 4 ports each, there is no need to enable the single port LAG feature. Once the LAGs initiate, they will persist across resets. Should only a single port be active after a reset, the LAG will form regardless of the single port LAG feature setting. Flow regeneration is enabled for the distribution switch and edge switch in our example. This setting will ensure that should a LAG port become disabled and then become active again, LACP will redistribute existing flows over all the ports in the new LAG. The Fixed Switch does not support flow regeneration. The output algorithm defaults to selecting the output port based upon the destination and source IP address. This setting will not be changed in our example. In any case, note that the Fixed Switch does not support the output algorithm feature.
LAGs 1 and 2 will form on the distribution switch so we need to set the admin keys for these LAGs:
S Chassis(rw)->set lacp aadminkey lag.0.1 100 S Chassis(rw)->set lacp aadminkey lag.0.2 200
We next want to enable the port active state and set the admin keys for the distribution switch physical ports:
S S S S S S S S Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set port port port port port port port port lacp lacp lacp lacp lacp lacp lacp lacp port port port port port port port port ge.1.1 ge.2.1 ge.3.1 ge.4.1 ge.1.2 ge.2.2 ge.3.2 ge.4.2 aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey 100 100 100 100 200 200 200 200 enable enable enable enable enable enable enable enable
Because we want the edge switch and the Fixed Switch to be in charge of port selection, the system priority for the distribution switch will be left at the default value of 32768. We next enable flow regeneration on the distribution switch:
S Chassis(rw)->set lacp flowRegeneration enable
17-14
LAG 1 will form on the edge switch so we need to set the admin key for this LAG:
S Chassis(rw)->set lacp aadminkey lag.0.1 100
We next want to enable the port active state and set the admin keys for the edge switch physical ports:
S S S S Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set port port port port lacp lacp lacp lacp port port port port ge.1.1 ge.1.2 ge.2.1 ge.3.1 aadminkey aadminkey aadminkey aadminkey 100 100 100 100 enable enable enable enable
Next we want to change the system priority for the edge switch so that it will be in charge of port selection on LAG1:
S Chassis(rw)->set lacp asyspri 100
LAGs 2 and 3 will form on the Fixed Switch so we need to set the admin key for this LAG:
FixedSwitch(rw)->set lacp aadminkey lag.0.2 200 FixedSwitch(rw)->set lacp aadminkey lag.0.3 300
We next want to enable the port active state and set the admin keys for the Fixed Switch physical ports:
FixedSwitch(rw)->set FixedSwitch(rw)->set FixedSwitch(rw)->set FixedSwitch(rw)->set FixedSwitch(rw)->set FixedSwitch(rw)->set FixedSwitch(rw)->set FixedSwitch(rw)->set port port port port port port port port lacp lacp lacp lacp lacp lacp lacp lacp port port port port port port port port ge.1.1 ge.1.2 ge.2.1 ge.2.2 ge.1.1 ge.1.2 ge.2.1 ge.2.2 aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey 200 200 200 200 300 300 300 300 enable enable enable enable enable enable enable enable
Next we want to change the system priority for the Fixed Switch so that it will be in charge of port selection on LAGs 2 and 3:
FixedSwitch(rw)->set lacp asyspri 100
17-16
Figure 17-4
Example 2 Configuration
Upstream Switch
Upstream to Edge PORTS fe1.1-4 Port Priority 32768 fe2.1-4 Port Priority 32768 ge2.1 Port Priority 100 ge3.1 Port Priority 100 Admin KEY all ports 100
LAG1
LAG2
KEY 100
KEY 100
Edge to Upstream PORTS fe1.1-8 Port Priority 32768 ge2.1 Port Priority 100 ge3.1 Port Priority 100 Admin Key for all ports 100
Edge Switch
End-Users
We next want to enable the port active state and set the admin keys for the edge switch physical ports associated with LAG1 and LAG2:
S S S S S S S S S S Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set port port port port port port port port port port lacp lacp lacp lacp lacp lacp lacp lacp lacp lacp port port port port port port port port port port ge.2.1 ge.3.1 ge.1.1 ge.1.2 ge.1.3 ge.1.4 ge.1.5 ge.1.6 ge.1.7 ge.1.8 aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey 100 100 100 100 100 100 100 100 100 100 enable enable enable enable enable enable enable enable enable enable
System priority determines which device will be in charge of port selection. This is an optional consideration. For this example we will leave system priority at the default value and allow the device with the lowest MAC address to determine port selection. Port priority determines which aggregatable ports available for a LAG are moved to the attached state when different speed physical ports form a LAG. For this example we want to ensure that the 1Gb ports move to the attached state for LAG1. We will set the port priority to 100 for the 1Gb actor ports should this device be in charge of selecting ports to move to the attached state:
S Chassis(rw)->set port lacp port ge.2.1 aportpri 100 S Chassis(rw)->set port lacp port ge.3.1 aportpri 100
We next want to enable the port active state and set the admin keys for the upstream switch physical ports associated with LAG1:
S S S S S S S S S S Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set Chassis(rw)->set port port port port port port port port port port lacp lacp lacp lacp lacp lacp lacp lacp lacp lacp port port port port port port port port port port ge.2.1 ge.3.1 ge.1.1 ge.1.2 ge.1.3 ge.1.4 ge.2.1 ge.2.2 ge.2.3 ge.2.4 aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey 100 100 100 100 100 100 100 100 100 100 enable enable enable enable enable enable enable enable enable enable
System priority determines which device will be in charge of port selection. This is an optional consideration. For this example we will leave system priority at the default value and allow the device with the lowest MAC address to determine port selection. Port priority determines which aggregatable ports available for a LAG are moved to the attached state when different speed physical ports form a LAG. For this example we want to ensure that the
17-18
1Gb ports move to the attached state for LAG1. We will set the port priority to 100 for the 1Gb actor ports should this device be in charge of selecting ports to move to the attached state:
S Chassis(rw)->set port lacp port ge.2.1 aportpri 100 S Chassis(rw)->set port lacp port ge.3.1 aportpri 100
LAG
LACPDU
Admin Key
Port Priority
System Priority
17-20
18
Policy Configuration
This document describes the Enterasys policy feature and its configuration on Enterasys S-Series devices.
For information about... Using Policy in Your Network Implementing Policy Policy Overview Configuring Policy Policy Configuration Example Terms and Definitions Refer to page... 18-1 18-2 18-2 18-13 18-19 18-28
Implementing Policy
Identifying and restricting routing to legitimate routing IP addresses to prevent DoS, spoofing, data integrity and other routing related security issues Ensuring that FTP/TFTP file transfers and firmware upgrades only originate from authorized file and configuration management servers Preventing clients from using legacy protocols such as IPX, AppleTalk, and DECnet that should no longer be running on your network
Enterasys NetSight Policy Manager provides a centralized point and click configuration, and one click pushing of defined policy out to all network elements. Use the Enterasys NetSight Policy Manager for ease of initial configuration and response to security and provisioning issues that may come up during real-time network operation.
Implementing Policy
To implement policy: Identify the roles of users and devices in your organization that access the network Create a policy role for each identified user role Associate classification rules and administrative profiles with each policy role Optionally, configure a class of service and associate it directly with the policy role or through a classification rule Optionally, enable hybrid authentication, which allows RADIUS filter-ID and tunnel attributes to be used to dynamically assign policy roles and VLANs to authenticating users Optionally, set device response to invalid policy
Policy Overview
Introduction
This section provides an overview of policy configuration. Policy is implemented on an Enterasys platform by associating users and devices in the network with defined enterprise roles (such as sales, engineering, or administration) that are configured in a policy role. The policy role is associated with rules that define how network resources will be provisioned and controlled for role members, as well as how security will be applied to the role member. An administrative profile associates a specific role member traffic classification with a policy role.
Note: In a CLI configuration context, the policy role is configured within a policy profile using the set policy profile command. throughout this discussion, policy role and policy profile mean the same thing.
18-2
Policy Configuration
Policy Overview
This document presents policy configuration from the perspective of the CLI. Though it is possible to configure policy from the CLI, CLI policy configuration in even a small network can be prohibitively complex from an operational point of view. It is highly recommended that policy configuration be performed using the NetSight Policy Manager. The NetSight Policy Manager provides: Ease of rule and policy role creation The ability to store and and retrieve roles and policies The ability, with a single click, to enforce policy across multiple devices
The official Policy Manager documentation is accessed using online help from within the application. This online documentation completely covers the configuration of policy in a Policy Manager context. For access to the Policy Manager data sheet or to setup a demo of the product, see http://www.enterasys.com/products/visibility-control/netsight-policy-manager.aspx.
Because users, devices, and applications are all identifiable within a flow, a network administrator has the capacity to define and control network access and usage by the actual role the user or device plays in the network. The nature of the security challenge, application access, or amount of network resource required by a given attached user or device, is very much dependent upon the role that user or device plays in the enterprise. Defining and applying each role assures that network access and resource usage align with the security requirements, network capabilities, and legitimate user needs as defined by the network administrator.
Policy Roles
Defining a Policy Role
The policy role is a container that holds all aspects of policy configuration for a specific role. Policy roles are identified by a numeric profile-index value between 1 and the maximum number of roles supported on the platform. Please see your devices firmware release notes for the maximum
Policy Overview
number of roles supported. Policy roles are configured using the set policy profile command. Policy configuration is either directly specified with the set policy profile command or is associated with the role by specifying the profile-index value within the command syntax where the given policy option is configured. For example, when configuring a policy maptable entry using the set policy maptable command (see VLAN-to-Policy Mapping on page 18-5), the command syntax requires that you identify the policy role the maptable entry will be associated with, by specifying the profile-index value. When modifying an existing policy role the default behavior is to replace the existing role with the new policy role configuration. Use the append option to limit the change to the existing policy role to the options specified in the entered command. A policy role can also be identified by a text name of between 1 and 64 characters. This name value is used by the RADIUS filter-ID attribute to identify the policy role to be applied by the switch with a successful authentication. The following example creates a policy profile with a profile-index value of 1 and a profile name, student, to be used by the RADIUS filter-ID functionality:
S Chassis(rw)->set policy profile 1 student
The following example creates a policy profile with a profile-index value of 1 and associates with it a default profile with a profile-index value of 2.
S Chassis(rw)->set policy profile 1 pvid-status enable 2
CoS configurations are identified by a numeric value between 0 - 255. 0 - 7 are fixed 802.1p CoS configurations. CoS configurations 8 - 255 are user configurable. Policy uses the cos option followed by the CoS configuration ID value to associate a CoS with a policy role. See Chapter 40, Quality of Service (QoS) Configuration for a complete discussion of QoS configuration.
18-4
Policy Configuration
Policy Overview
The following example creates a policy profile with a profile-index value of 1 and associates with the profile a user configured CoS 8:
S Chassis(rw)->set policy profile 1 cos 8
Adding Tagged, Untagged, and Forbidden Ports to the VLAN Egress Lists
The VLAN Egress list contains a list of ports that a frame for this VLAN can exit. Specified ports are automatically assigned to the VLAN egress list for this policy role as tagged, untagged, or forbidden. Ports are added to the VLAN egress list using the egress-vlans, forbidden-vlans, and untagged-vlans options of the set policy profile command.
VLAN-to-Policy Mapping
VLAN-to-Policy mapping provides for the manual configuration of a VLAN-to-Policy association that creates a policy maptable entry between the specified VLAN and the specified policy role. A policy maptable holds the VLAN-to-Policy mappings. When an incoming tagged VLAN packet is seen by the switch, a lookup of the policy maptable determines whether a VLAN-to-policy mapping exists. If the mapping exists, the associated policy is applied to this packet. This feature can be used at the distribution layer in environments where non-policy capable edge switches are deployed and there is no possibility of applying Enterasys policy at the edge. Tagged frames received at the distribution layer interface for a VLAN with an entry in the policy maptable will have the associated policy applied to the frame. Use the set policy maptable command specifying a single VLAN ID or range of IDs and the policy profile-index to create a policy maptable entry. The following example creates a policy maptable entry associating VLAN 100 and policy profile 10:
S Chassis(rw)->set policy maptable 100 10
Policy Overview
Hybrid authentication mode determines how the RADIUS filter-ID and the three RFC 3580 VLAN tunnel attributes (VLAN Authorization), when either or all are included in the RADIUS access-accept message, will be handled by the switch. The three VLAN tunnel attributes define the base VLAN-ID to be applied to the user. In either case, conflict resolution between RADIUS attributes is provided by the maptable response feature.
Note: VLAN-to-policy mapping to maptable response configuration behavior is as follows: If the RADIUS response is set to policy, any VLAN-to-policy maptable configuration is ignored for all platforms. If the RADIUS response is set to tunnel, VLAN-to-policy mapping can occur on an S-Series platform. If the RADIUS response is set to both and both the filter-ID and tunnel attributes are present, VLAN-to-policy mapping configuration is ignored. See the Policy Maptable Response on page 42-11 for a detailed RADIUS response discussion.
Please see Configuring RADIUS on page 42-24 for a discussion of RADIUS configuration, the RADIUS filter-ID, and VLAN authorization. Use the policy option of the set policy maptable response command to configure the switch to dynamically assign a policy using the RADIUS filter-ID in the RADIUS response message. The following example specifies that the RADIUS filter-ID, if it is present, should be included in the RADIUS response message when a user authenticates:
S Chassis(rw)->set policy maptable response policy
If all attributes exist, the following rules apply: The policy role will be enforced, with the exception that any port PVID specified in the role will be replaced with the VLAN tunnel attributes The policy map is ignored because the policy role is explicitly assigned VLAN classification rules are assigned as defined by the policy role
vlanauthorization must be enabled or the VLAN tunnel attributes are ignored and the default VLAN is used. Please see Configuring VLAN Authorization on page 42-23 for a complete VLAN Authorization discussion. Hybrid Mode support eliminates the dependency of VLAN assignment based on roles. As a result, VLANs can be assigned via the tunnel-private-group-ID, as defined per RFC3580, while assigning roles via the filter-ID. This separation gives administrators more flexibility to segment their networks for efficiency beyond the role limits associated with the B3, C3, and G3 platforms. The following example specifies that either or both the vlan-tunnel and filter-ID attributes in the RADIUS response message can be included in the RADIUS response message:
S Chassis(rw)->set policy maptable response both
18-6
Policy Configuration
Policy Overview
Use the set policy invalid action command to specify a default action to take when asked to apply an invalid or unknown policy. The following example specifies that an attempt to apply an invalid or unknown policy should be ignored:
S Chassis(rw)->set policy invalid action default-policy
Classification Rules
Classification rules associate specific traffic classifications or policy behaviors with the policy role. There are two aspects of classification rule configuration: The association of a traffic classification with a policy role by assigning the traffic classification to an administrative profile. The assignment of policy rules that define desired policy behaviors for the specified traffic classification type.
Both the administrative profile and policy rules are associated with the policy role by specifying the admin-pid option, in the case of an administrative profile, or a profile-index value, in the case
Enterasys S-Series Configuration Guide 18-7
Policy Overview
of the policy rule. Administrative profiles and policy rules are configured using the set policy rule command. The administrative profile assigns a traffic classification to a policy role by using the admin-profile option of the set policy rule command. Policy rules are based on traffic classifications. Table 18-1 on page 18-8 provides the supported policy rule traffic classification command options and definitions. A detailed discussion of supported traffic classifications is available in the Traffic Classification Rules section of the NetSight Policy Manager online help. Table 18-1 Administrative Policy and Policy Rule Traffic Classifications
Description Classifies based on MAC source address. Classifies based on MAC destination address. Classifies based on source IPX address. Classifies based on destination IPX address. Classifies based on source IPX socket. Classifies based on destination IPX socket. Classifies based on transmission control in IPX. Classifies based on IPX packet type. Classifies based on source IP address. Classifies based on destination IP address. Classifies based on IP fragmentation value. Classifies based on UDP source port. Classifies based on UDP destination port. Classifies based on TCP source port. Classifies based on TCP destination port. Classifies based on ICMP type. Classifies based on Type of Service field in IP packet. Classifies based on protocol field in IP packet. Classifies based on type field in Ethernet II packet. Classifies based on DSAP/SSAP pair in 802.3 type packet. Classifies based on VLAN tag. Classifies based on Tag Control Information. Classifies based on port-string. Attribute ID 1 2 3 4 5 6 7 8 12 13 14 15 16 17 18 19 21 22 25 26 27 28 31
Traffic Classification macsource macdest ipxsource ipxdest ipxsourcesocket ipxdestsocket ipxclass ipxtype ipsourcesocket ipdestsocket ip frag udpsourceportip udpdestportip tcpsourceportip tcpdestportip icmptype iptos ipproto ether llcDsapSsap vlantag tci port
A data value is associated with most traffic classifications to identify the specific network element for that classification. For data value and associated mask details, see the Valid Values for Policy Classification Rules table in the set policy rule command discussion of the command reference guide for your platform.
18-8
Policy Configuration
Policy Overview
The following example enables TCI overwrite for policy profile 1, followed by an example that enables TCI overwrite on port ge.1.1:
S Chassis(rw)->set policy profile 1 tci-overwrite enable S Chassis(rw)->set port tcioverwrite ge.1.1 enable
Policy Overview
Policy Accounting
Policy accounting controls the collection of classification rule hits. If a hit occurs on a policy rule, policy accounting flags that the hit has occurred and will remain flagged until cleared. Policy accounting is enabled by default. Policy accounting can be enabled or disabled using the set policy accounting command.
18-10
Policy Configuration
Policy Overview
To disable a port for the first use of any policy profile rule, see Disabling an Ingress Port on First Profile Rule Use on page 18-7. Use the clear policy disabled-ports to clear ports from the disabled state due to a policy rule hit on those ports. Use the show policy disabled-ports command to display ports that have been disabled due to first profile rule use.
Non-Edge Protocols
Policy Effect Every network needs DHCP. Automatically mitigate the accidental or malicious connection of a DHCP server to the edge of your network to prevent DoS or data integrity issues, by blocking DHCP on the source port for this device. DNS is critical to network operations. Automatically protect your name servers from malicious attack or unauthorized spoofing and redirection, by blocking DNS on the source port for this device. RIP, OSPF, and BGP topology protocols should only originate from authorized router connection points to ensure reliable network operations. Routers and default gateways should not be moving around your network without approved change processes being authorized. Prevent DoS, spoofing, data integrity and other router security issues by blocking router source MAC and router source IP addresses at the edge. Prevent data theft and worm propagation by blocking SMTP at the edge.
Policy Overview
Table 18-2
Protocol
SNMP Protocol
Legacy Protocols
Policy Capabilities
Table 18-3 provides a listing of policy capabilities. Table 18-3 Traffic Classification Based Policy Capabilities
Description The ability to dynamically assign a policy based upon a traffic classification. The ability to administratively assign a policy based upon a traffic classification. The ability to assign a forwarding VLAN rule. The ability to assign a drop traffic rule. The ability to assign a forward traffic rule. The ability to assign a CoS rule. The ability to assign traffic priority using a CoS assignment. The ability to apply a destination mirror to this rule. The ability to clear mirroring on this rule. The ability to prohibit mirroring on this rule. The ability to always look at the highest bit mask for an exact traffic classification match. The ability to assign rules based upon the ingress VLAN. (TCI overwrite must be enabled). The ability to overwrite user priority and other VLAN tag TCI field classification information. The ability to enable policy accounting. The ability to enable syslog and traps for rule hit notification. The ability to set a drop, forward, or default-policy behavior based upon an invalid action.
Traffic Classification Dynamic PID Assign Rule Admin PID Assign Rule VLAN Forwarding Deny Permit CoS Assign Rule Priority Destination Mirror Clear Mirror Prohibit Mirror Longest Prefix Rules VLAN Assign Rule TCI Overwrite Rule-Use Accounting Rule-Use Notification Invalid Policy Action
18-12
Policy Configuration
Configuring Policy
Table 18-3
Configuring Policy
This section presents configuration procedures and tables including command description and syntax in the following policy areas: profile, classification, and display. Procedure 18-1 describes how to configure policy roles and related functionality. Procedure 18-1 Configuring Policy Roles
Step 1. Task In any command mode, create a policy role. name - (Optional) Specifies a name for this policy profile; used by the filter-ID attribute. This is a string from 1 to 64 characters. pvid-status - (Optional) Enables or disables PVID override for this policy profile. If all the classification rules associated with this profile are missed, then this parameter, if specified, determines the default VLAN for this profile. pvid - (Optional) Specifies the PVID to assign to packets, if PVID override is enabled and invoked as the default behavior. cos-status - (Optional) Enables or disables Class of Service override for this policy profile. If all the classification rules associated with this profile are missed, then this parameter, if specified, determines the default CoS assignment. cos - (Optional) Specifies a CoS value to assign to packets, if CoS override is enabled and invoked as the default behavior. Valid values are 0 to 255. egress-vlans - (Optional) Specifies the port to which this policy profile is applied should be added to the egress list of the VLANs defined by egress-vlans. Packets will be formatted as tagged. forbidden-vlans - (Optional) Specifies the port to which this policy profile is applied should be added as forbidden to the egress list of the VLANs defined by forbidden-vlans. Packets from this port will not be allowed to participate in the listed VLANs. Command(s) set policy profile profile-index [name name] [pvid-status {enable | disable}] [pvid pvid] [cos-status {enable | disable}] [cos cos] [egress-vlans egress-vlans] [forbidden-vlans forbidden-vlans] [untagged-vlans untagged-vlans] [append] [clear] [tci-overwrite {enable | disable}] [precedence precedence-list] [mirror-destination <mirror-index>] | [clear-mirror] | [prohibit-mirror][syslog {enable | disable}] [trap {enable | disable}] [disable-port {enable | disable}]
Configuring Policy
18-14
Policy Configuration
Configuring Policy
7.
Procedure 18-2 describes how to configure classification rules as an administrative profile or to assign policy rules to a policy role. Procedure 18-2 Configuring Classification Rules
Step 1. Task In any command mode, optionally set an administrative profile to assign traffic classifications to a policy role. See Table 18-1 on page 18-8 for traffic classification-type descriptions. See the set policy rule command discussion in the command reference guide that comes with your device for traffic classification data and mask information. port-string - (Optional) Applies this administratively-assigned rule to a specific ingress port. S-Series devices with firmware versions 3.00.xx and higher also support the set policy port command as an alternative to administratively assign a profile rule to a port. storage-type - (Optional) Adds or removes this entry from non-volatile storage. admin-pid - Associates this administrative profile with a policy profile index ID. Valid values are 1 - 1023. Command(s) set policy rule admin-profile classification-type [data] [mask mask] [port-string port-string] [storage-type {non-volatile | volatile}] [admin-pid admin-pid] [syslog {enable | disable | prohibit}] [trap {enable | disable | prohibit}] [disable-port {enable | disable | prohibit}] [tci-overwrite {enable | disable | prohibit}] [mirror-destination <mirror-index>] | [clear-mirror] | [prohibit-mirror]
Configuring Policy
18-16
Policy Configuration
Configuring Policy
5.
6.
Table 18-4 describes how to display policy information and statistics. Table 18-4
Task In any command mode, display policy role information. In any command mode, display the action the device should take if asked to apply an invalid or unknown policy, or the number of times the device has detected an invalid/unknown policy, or both action and count information. In any command mode, display the current control status of the collection of rule usage statistics. In any command mode, display syslog parameters for policy rule entries. In any command mode, display VLAN-ID to policy role mappings table. In any command mode, display TCI overwrite tag control information on one or more ports. In any command mode, display policy classification and admin rule information.
show policy syslog [machine-readable] [extended-format] show policy maptable vlan-list show port tcioverwrite [port-string]
show policy rule [attribute] | [all] | [admin-profile] | [profile-index] [port-hit] classification-type [data] [mask mask] [port-string port-string] [rule-status {active | not-inservice | not-ready}] [storage-type {non-volatile | volatile}] [vlan vlan] | [drop | forward] [dynamic-pid dynamic-pid] [cos cos] [admin-pid admin-pid] [syslog {enable | disable}] [-verbose] [trap {enable | disable}] [disable-port {enable | disable}] [usage-list] [display-if-used] show policy capability
In any command mode, display all policy classification capabilities for this device.
Configuring Policy
Table 18-4
Task
In any command mode, display a list of currently supported traffic rules applied to the administrative profile for one or more ports. In any command mode, display a count of the number of times the device has dropped syslog or trap rule usage notifications on ports. In any command mode, display disabled ports for all rule entries. In any command mode, display the current state of the autoclear feature. In any command mode, display status of dynamically assigned roles.
show policy disabled-ports show policy autoclear {all | link | interval | profile | ports} show policy dynamic {[syslog-default] [trap-default]}
18-18
Policy Configuration
2 student ge.1.1-10 10 8
Profile: Name: Ports: PVID: CoS: Services: 10.10.50.0/24 Admin: 10.10.60.0/24 Faculty: 10.10.70.0/24
Guest
Students
Profile: Name: Ports: VLAN: CoS: 3 phoneFS ge.1.1-10 11 10
Enhanced Policy: Policy Accounting enabled Policy Syslog machine-readable Policy Invalid Action default-policy Port TCI Overwrite ge.1.1-10
Distribution Switch/Router
Profile: Name: Ports: Data: 7 distribution ge.1.1-26 Cos 11
4 faculty ge.1.1-10 10 8
Faculty
Services
Note: For purposes of this discussion, Edge Switch and Distribution Switch refer to S-Series platforms.
Roles
The example defines the following roles: guest - Used as the default policy for all unauthenticated ports. Connects a PC to the network providing internet only access to the network. Provides guest access to a limited number of the edge switch ports to be used specifically for internet only access. Policy is applied using the port level default configuration, or by authentication, in the case of the Services Edge Switch port internet only access PCs. student - Connects a dorm room PC to the network through a Student Fixed Switch port. A configured CoS rate limits the PC. Configured rules deny access to administrative and faculty servers. The PC authenticates using RADIUS. Hybrid authentication is enabled. The student policy role is applied using the filter-ID attribute. The base VLAN is applied using the tunnel attributes returned in the RADIUS response message. If all rules are missed, the settings configured in the student policy profile are applied. phoneFS - Connects a dorm room or faculty office VoIP phone to the network using a stackable fixed switch port. A configured CoS rate limits the phone and applies a high priority. The phone authenticates using RADIUS. Hybrid authentication is enabled. Policy is applied using the filter-ID returned in the RADIUS response message. The base VLAN is applied using the tunnel attributes returned in the RADIUS response message. If all rules are missed, the settings configured in the phoneFS policy profile are applied. faculty - Connects a faculty office PC to the network through a Faculty Fixed Switch port. A configured CoS rate limits the PC. A configured rule denies access to the administrative servers. The PC authenticates using RADIUS. Hybrid authentication is enabled. The faculty policy role is applied using the filter-ID attribute. The base VLAN is applied using the tunnel attributes returned in the RADIUS response message for the authenticating user. If all rules are missed, the settings configured in the faculty policy profile are applied. phoneES - Connects a services VoIP phone to the network using a Services Edge Switch port. A configured CoS rate limits the phone for both setup and payload, and applies a high priority. The phone authenticates using RADIUS. Tunnel authentication is enabled. The base VLAN is applied using the tunnel attributes returned in the RADIUS response message. Policy is applied using a maptable configuration. If all rules are missed, the settings configured in the phoneES policy profile are applied. services - Connects a services PC to the network through the Services Edge Switch port. A configured CoS rate limits the PC. Services are denied access to both the student and faculty servers. The PC authenticates using RADIUS. The base VLAN is applied using the tunnel attributes returned in the RADIUS response message for the authenticating user. The services policy role is applied using a policy maptable setting. The policy accounting, syslog, invalid action and TCI overwrite are enabled for this role. If all rules are missed, the settings configured in the services policy profile are applied. distribution - The Distribution policy role is applied at the Distribution Switch providing rate limiting.
18-20
Policy Configuration
Policy Domains
It is useful to break up policy implementation into logical domains for ease of understanding and configuration. For this example, it is useful to consider four domains: basic edge, standard edge on the Fixed Switch, premium edge on the Services Edge Switch, and premium distribution on the Distribution Switch.
Basic Edge
Protocols not appropriate to the edge should be blocked. For this example we will block DHCP, DNS, SNMP, SSH, Telnet and FTP at the edge on the data VLAN. We will forward destination port DHCP and DNS and source port for IP address request to facilitate auto configuration and IP address assignment. See Blocking Non-Edge Protocols at the Edge Network Layer on page 18-11 for a listing of protocols you should consider blocking at the edge.
Standard Edge
Edge Switch platforms will be rate-limited using a configured CoS that will be applied to the student and faculty, and phoneFS policy roles. Fixed Switch support for hybrid authentication depends upon the platform and firmware release. The Fixed Switch in this example supports the hybrid authentication capability. Hybrid authentication will be enabled.
Premium Edge
The Edge Switch will be rate-limited using a configured CoS that is applied to the services and phoneES policy role. This premium edge platform will be enabled for the following capabilities: Policy Accounting Syslog rule usage enabled and set to machine-readable Invalid policy action set to drop TCI overwrite enabled
Premium Distribution
The Distribution Switch Router will be rate-limited using a configured CoS. Premium distribution will be enabled for the following policy capabilities: Policy Accounting Syslog Rule Usage enabled and set to machine-readable Invalid policy action set to drop TCI overwrite enabled
Platform Configuration
This section will provide the CLI based policy configuration on the following platforms: Student Fixed Switch Faculty Fixed Switch Services Edge Switch Distribution Switch
In CLI mode, configuration takes place on each platform. When using the NetSight Policy Manager, configuration takes place at a central location and is pushed out to the appropriate network devices. For this configuration example, CoS related configuration will be specified as a final CoS. For details on configuring CoS, see Understanding QoS Configuration on the S-Series on page 40-10.
Note: CLI command prompts used in this configuration example have the following meaning: Enterasys(rw)-> - Input on all platforms used in this example. Fixed Switch(rw)-> - Input on all Fixed Switches. StudentFS-> - Input on the student Fixed Switch. FacultyFS-> - Input on the faculty Fixed Switch. Services(rw)-> - Input on the services S-Series device. Distribution(rw)-> - Input on the distribution S-Series device.
Guest policy allows internet traffic. TCP destination Ports 80, 8080, and 443 will be allowed traffic forwarding.
Enterasys(rw)->set policy rule 1 tcpdestportIP 80 mask 16 forward Enterasys(rw)->set policy rule 1 tcpdestportIP 443 mask 16 forward Enterasys(rw)->set policy rule 1 tcpdestport 8080 mask 16 forward
Create a policy role that applies a CoS 8 to data VLAN 10 and configures it to rate-limit traffic to 1M with a moderate priority of 5.
StudentFS(rw)->set policy profile 2 name student pvid-status enable pvid 10 cos-status enable cos 8
Students should only be allowed access to the services server (subnet 10.10.50.0/24) and should be denied access to both the administrative (subnet 10.10.60.0/24) and faculty servers (subnet 10.10.70.0/24).
StudentFS(rw)->set policy rule 2 ipdestsocket 10.10.60.0 mask 24 drop StudentFS(rw)->set policy rule 2 ipdestsocket 10.10.70.0 mask 24 drop
Because we can not apply separate rate limits to the phone setup and payload ports on the Fixed Switch using policy rules, apply CoS 10 with the higher payload appropriate rate limit of 100k bps and a high priority of 6 to the phoneFS role.
Fixed Switch(rw)->set policy profile 3 name phoneFS cos-status enable cos 10 pvid-status enable pvid 11
Create a policy role that applies a CoS 8 to data VLAN 10 and configures it to rate-limit traffic to 1M with a moderate priority of 5.
18-24 Policy Configuration
FacultyFS(rw)->set policy profile 4 name faculty pvid-status enable pvid 10 cos-status enable cos 8
Faculty should only be allowed access to the services (subnet 10.10.50.0/24) and the faculty servers (subnet 10.10.70.0/24) and should be denied access to the administrative server (subnet 10.10.60.0/24). FacultyFS(rw)->set policy rule 4 ipdestsocket 10.10.60.0 mask 24 drop
Because VLANs can be applied to Services Edge Switch ports using the appropriate traffic classification, the explicit deny all PVID 0 will be applied at policy creation. Separate rate limits can be applied to the phone setup and payload ports on the Services Edge Switch using policy rules. A default CoS of 4 will be applied at policy role creation.
ServicesES(rw)->set policy profile 5 name phoneES pvid-status enable pvid 0 cos-status enable cos 4
auto configuration and IP address assignment. Drop traffic for protocols SNMP (161), SSH (22), Telnet (23) and FTP (20 and 21) on the phone VLAN.
ServicesES(rw)->set ServicesES(rw)->set ServicesES(rw)->set ServicesES(rw)->set ServicesES(rw)->set ServicesES(rw)->set ServicesES(rw)->set ServicesES(rw)->set policy policy policy policy policy policy policy policy rule rule rule rule rule rule rule rule 5 5 5 5 5 5 5 5 udpsourceport udpdestportIP udpdestportIP udpdestportIP tcpdestportIP tcpdestportIP tcpdestportIP tcpdestportIP 68 mask 16 forward 67 mask 16 forward 53 mask 16 forward 161 mask 16 drop 22 mask 16 drop 23 mask 16 drop 20 mask 16 drop 21 mask 16 drop
Apply a CoS 9 to phone setup data on VLAN 11, rate limiting the data to 5 pps with a high priority of 7 on port 2427. Apply a CoS 10 to phone payload data on VLAN 11, rate limiting the data to 100k bps with a high priority of 7 for both source and destination on port 5004.
ServicesES(rw)->set policy rule 5 upddestIP 2427 mask 16 vlan 11 cos 9 ServicesES(rw)->set policy rule 5 updsourceIP 5004 mask 16 vlan 11 cos 10 ServicesES(rw)->set policy rule 5 upddestIP 5004 mask 16 vlan 11 cos 10
ServicesES(rw)->set policy profile 6 name services pvid-status enable pvid 0 cos-status enable cos 4 tci-overwrite enable
18-26
Policy Configuration
that the tunnel attributes returned in the RADIUS response message will be used by the authenticating user. Associate VLAN 10 with policy role 6 using the set policy maptable command.
ServicesES(rw)->set policy maptable response tunnel ServicesES(rw)->set policy maptable 10 6
Apply a CoS 8 to data VLAN 10 and configure it to rate-limit traffic to 1M and moderate priority of 5 for services IP subnet 10.10.30.0 mask 28. We will also enable traps and syslog for this subnet.
ServicesES(rw)->set policy rule 6 ipsourcesocket 10.10.30.0 mask 28 syslog enable trap enable vlan 10 cos 8
Services should only be allowed access to the services server (subnet 10.10.50.0/24) and should be denied access to the faculty servers (subnet 10.10.70.0/24) and administrative servers (subnet 10.10.60.0/24).
ServicesES(rw)->set policy rule 6 ipdestsocket 10.10.60.0 mask 24 drop ServicesES(rw)->set policy rule 6 ipdestsocket 10.10.70.0 mask 24 drop
Enable Enhanced Edge Switch Capabilities on the Services Edge Switch Platform
The Services Edge Switch platform supports a number of enhanced capabilities not available on the Fixed Switch platforms. The following enhanced policy capabilities are enabled: policy accounting to flag the occurrence of a rule hit, syslog rule usage set to machine-readable for enterprise specific backend syslog statistics gathering, an invalid action set to default policy should an invalid policy occur, TCI overwrite enabled to allow for Type of Service (ToS) overwrite for the VoIP phone.
ServicesES(rw)->set ServicesES(rw)->set ServicesES(rw)->set ServicesES(rw)->set policy accounting enable policy syslog machine-readable policy invalid action default-policy port tcioverwrite ge.1.1-10
Distribution(rw)->set policy profile 7 name distribution cos-status enable cos 4 tci-overwrite enable
Hybrid Authentication An authentication feature that allows the switch to use both the filter-ID and tunnel attributes in the RADIUS response message to determine how to treat the authenticating user. Policy A component of Secure Networks that provides for the configuration of a role based profile for the securing and provisioning of network resources based upon the function the user or device plays within the enterprise network. A logical entity that can be configured to provide VLAN to policy role mappings.
Policy Maptable
18-28
Policy Configuration
Table 18-5
Term
TCI Overwrite
18-30
Policy Configuration
19
Multicast Configuration
This document describes the multicast feature and its configuration on S-Series devices.
For information about... How to Use Multicast in Your Network Implementing Multicast Understanding Multicast Configuring Multicast Refer to page... 19-1 19-2 19-2 19-18
Unlike unicast and broadcast, multicast uses network infrastructure efficiently because only one copy of the source traffic is sent throughout the network, going only to interested receivers, minimizing the burden placed on the sender, network, and receiver. The routers in the network take care of replicating the packet, where necessary, to reach multiple receivers. If a router decides that there are no interested users downstream from itself, it prunes the stream back to the next router. Thus, unwanted streams are not sent to the pruned routers, saving bandwidth and preventing unwanted packets from being sent.
Implementing Multicast
Implementing Multicast
You can implement the IGMP, DVMRP, and PIM multicast protocols on Enterasys devices using simple CLI commands as described in this document. A basic configuration process involves the following tasks: 1. 2. Configuring the VLANs and IP interfaces on which you want to transmit multicast. Enabling the multicast protocol(s) on configured interfaces.
For PIM, you must also configure a unicast routing protocol, such as OSPF. For both DVMRP and PIM for IPv4 to operate, IGMP must be enabled. For PIM for IPv6 to operate, the Multicast Listener Discovery (MLD) protocol must be enabled.
Understanding Multicast
Multicast allows a source to send a single copy of data using a single IP address from a well-defined range for an entire group of recipients (a multicast group). A source sends data to a multicast group by simply setting the destination IP address of the datagram to be the multicast group address. Sources do not need to register in any way before they can begin sending data to a group, and do not need to be members of the group themselves. Routers between the source and recipients use the group address to route the data, forwarding duplicate data packets only when the path to recipients diverges. Hosts that wish to receive data from the multicast group join the group by sending a message to a multicast router on a local interface, using a multicast group membership discovery protocol, such as IGMP. For more information, see Internet Group Management Protocol (IGMP) on page 19-2. Multicast routers communicate among themselves using a multicast routing protocol, such as DVMRP or PIM-SM. These protocols calculate a multicast distribution tree of recipients to ensure that: Multicast traffic reaches all recipients that have joined the multicast group Multicast traffic does not reach networks that do not have any such recipients (unless the network is a transit network on the way to other recipients) The number of identical copies of the same data flowing over the same link is minimized
For more information, see Distance Vector Multicast Routing Protocol (DVMRP) on page 19-5 and Protocol Independent Multicast (PIM) on page 19-11.
Understanding Multicast
Querier A device that periodically sends out queries in search of multicast hosts on a directly connected network. If multiple queriers are present on the LAN, the querier with the lowest IP address assumes the role. Host A client end station that sends one of two IGMP messages to a querier: Join message Indicates the host wants to receive transmissions associated to a particular multicast group. Leave message Indicates the host wants to stop receiving the multicast transmissions. IGMP Querier Determining Group Membership
IGMP Querier
Figure 19-1
IGMP Query
IGMP Membership
Router for 224.1.1.1
IGMP Membership
Router for 226.7.8.9
Member of 224.1.1.1
Member of 226.7.8.9
As shown in Figure 19-1, a multicast-enabled device can periodically ask its hosts if they want to receive multicast traffic. If there is more than one device on the LAN performing IP multicasting, one of these devices is elected querier and assumes the responsibility of querying the LAN for group members. Based on the group membership information learned from IGMP, a device can determine which (if any) multicast traffic needs to be forwarded to each of its ports. At Layer 3, multicast switch devices use this information, along with a multicast routing protocol, to support IP multicasting across the Internet. IGMP provides the final step in IP multicast delivery. It is only concerned with forwarding multicast traffic from the local switch device to group members on a directly attached subnetwork or LAN segment. IGMP neither alters nor routes any IP multicast packets. Since IGMP is not concerned with the delivery of IP multicast packets across subnetworks, an external IP multicast device is needed if IP multicast packets have to be routed across different subnetworks.
Note: On VLANs where IGMP snooping is enabled, any received multicast stream will be flooded to the VLAN until such time as the IGMP database is populated, then stream forwarding will revert to ports with group membership only.
Understanding Multicast
Router 1
Solicited Join
3 2
Network A
4 5
Host 1
1
Switch 1 Multicast Server
6 2
Router 2
7 8
Host 2
Figure 19-2 provides an example of IGMP processing on Enterasys devices when there are no directly attached hosts. 1. A single IP multicast server, with no directly attached hosts, sends a multicast stream into the network via Switch 1.
Understanding Multicast
2.
Because IGMP snooping is disabled, Switch 1 floods the multicast stream to all ports which are linked to Router 1 and Router 2. Each router performs an IGMP forwarding check to see if there are any hosts that want to join the multicast group on its locally attached network. Each router drops multicast packets until a host joins the group using one of the following messages: solicited join (sent in response to an IGMP query produced by the routers interface) In Figure 19-2, this type of exchange occurs between Router 1 and Host 1 when: (3) Router 1 sends a query to potential Host 1. (4) Host 1 responds with a join message. (5) Router 1 forwards the multicast stream. unsolicited join (sent as a request without receiving an IGMP query first) In Figure 19-2, this type of exchange occurs between Router 2 and Host 2 when: (6) Host 2 sends a join message to Router 2. (7) Router 2 forwards the multicast stream to Host 2. (8) When it no longer wants to receive the stream, Host 2 can do one of the following: - Send a leave message to Router 2. - Time out the IGMP entry by not responding to further queries from Router 2.
DVMRP routes multicast traffic using a technique known as reverse path forwarding (RPF). When a router receives IP multicast packets, it first does an RPF check to determine if the packets are received on the correct interface. If so, the router forwards the packets out to the following: Local IGMP receivers for that group on interfaces for which the transmitting router is the designated forwarder Neighbor routers that have indicated their dependence on the transmitting router for forwarding multicast packets from that source (this is determined during DVMRP Route Exchange) and from which the transmitting router has not received any prune messages.
If not, the packets are discarded by the router. The transmitting router does not forward the packets back to the source. If a router is attached to a set of VLANs that do not want to receive from a particular multicast group, the router can send a prune message back up the distribution tree to stop subsequent packets from traveling where there are no members. DVMRP periodically re-floods in order to reach any new hosts that want to receive from a particular group.
Understanding Multicast
DVMRP routers dynamically discover their neighbors by sending neighbor probe messages periodically to an IP multicast group address that is reserved for all DVMRP routers. Key features of DVMRP are the following: uses the well-known multicast IP address 224.0.0.4 uses IGMP to exchange routing datagrams does not require an underlying Layer 3 routing protocol to provide a path to remote multicast destinations combines many of the features of the Routing Information Protocol (RIP) with the Truncated Reverse Path Broadcasting (TRPB) algorithm to route multicast packets between sources and receivers
Probe Messages
Each DVMRP-enabled interface transmits multicast probe packets to inform other DVMRP routers that it is operational. Probe messages are sent every 10 seconds on every interface running DVMRP. These messages provide: A mechanism for DVMRP devices to locate each other. Probe messages contain a list of the neighbors detected for each enabled interface. If no neighbors are found, the network is considered to be a leaf network. A mechanism for DVMRP devices to determine the capabilities of neighboring devices. Probe messages contain flags about neighbors DVMRP capabilities and version compliance. A keep-alive function for quickly detecting neighbor loss. If a probe message from an adjacent neighbor is not seen within 35 seconds, the neighbor is timed out.
Route Table
Each DVMRP-enabled device builds a DVMRP route table to maintain routes to all networks involved in DVMRP routing. As shown in the following S-Series modular switch example, the DVMRP route table contains a destination and next hop IP address, associated interface, metric value, expiration time, and up-time.
S Chassis(su)->show ip dvmrp route Destination Next Hop Interface Metric Expire Uptime ---------------------------------------------------------------------------9.9.9.0/24 168.3.2.1 vlan.0.3200 3 00:01:52 2d, 19:34:45 21.2.2.0/24 168.3.2.1 vlan.0.3200 2 00:01:52 3d, 01:14:49 21.21.21.0/24 168.3.2.1 vlan.0.3200 2 00:01:52 3d, 01:14:49 29.2.2.0/24 168.3.2.1 vlan.0.3200 2 00:01:52 3d, 01:14:49
Understanding Multicast
32.1.1.0/24 32.11.11.0/24 92.9.2.0/24 100.3.3.0/24 129.2.9.0/24 139.3.9.0/28 160.2.2.0/24 168.2.1.0/24 168.3.0.0/16 168.3.1.0/26 168.8.1.0/24 188.21.21.0/24 188.23.23.0/24 189.8.9.0/24 191.9.1.0/24 191.9.9.0/24 192.9.2.0/24 193.9.3.0/24 198.9.8.0/24 198.23.23.0/24 199.23.23.0/24 250.9.9.0/24
168.3.2.1 168.3.2.1 168.3.2.1 Connected 168.3.2.1 Connected 168.3.2.1 168.3.2.1 Connected Connected 168.3.2.1 168.3.2.1 168.3.2.1 168.3.2.1 168.3.2.1 168.3.2.1 168.3.2.1 Connected 168.3.2.1 168.3.2.1 168.3.2.1 168.3.2.1 26
vlan.0.3200 vlan.0.3200 vlan.0.3200 vlan.0.3200 vlan.0.3200 vlan.0.390 vlan.0.3200 vlan.0.3200 vlan.0.3200 vlan.0.3100 vlan.0.3200 vlan.0.3200 vlan.0.3200 vlan.0.3200 vlan.0.3200 vlan.0.3200 vlan.0.3200 vlan.0.930 vlan.0.3200 vlan.0.3200 vlan.0.3200 vlan.0.3200
2 2 2 1 2 1 2 2 1 5 3 2 2 4 3 3 2 1 4 2 2 2
00:01:52 00:01:52 00:01:52 00:00:00 00:01:52 00:00:00 00:01:52 00:01:52 00:00:00 00:00:00 00:01:52 00:01:52 00:02:02 00:02:02 00:02:02 00:02:02 00:02:02 00:00:00 00:02:02 00:02:02 00:02:02 00:02:02
3d, 01:14:49 3d, 01:14:49 3d, 01:14:49 02:09:22 2d, 19:02:06 3d, 01:14:54 3d, 01:14:49 3d, 01:14:49 02:09:22 2d, 21:54:44 2d, 19:34:25 3d, 01:14:49 3d, 01:14:49 2d, 19:34:15 2d, 19:34:45 2d, 19:34:45 3d, 01:14:49 3d, 01:14:54 2d, 19:34:15 3d, 01:14:49 3d, 01:14:49 3d, 01:14:49
Route Reports
DVMRP-enabled devices send route report packets to adjacent DVMRP devices every 60 seconds. When a DVMRP device receives one, it checks to verify that the report is from a known neighbor before processing. The first time a device sees its own address in a neighbors probe packet, it sends a unicast copy of its entire routing table to the neighbor to reduce start-up time. The route report packet contains data about all networks/routes of which the sending device is aware. This information is used to determine the reverse path back to a particular multicast source. Every DVMRP device keeps a separate metric associated with each route. This metric is the sum of all interface metrics between the device originating the report and the source network. DVMRP devices accept route reports for aggregated source networks in accordance with classless inter-domain devices (CIDR). This means that, if a prune or graft is received on a downstream interface for which the source network is aggregated, then a prune or graft should be sent upstream (to the multicast source). If a DVMRP device has a large number of DVMRP routes, it will spread route reports across the route update interval (60 seconds) to avoid bottlenecks in processing and route synchronization issues. For the purpose of pruning, DVMRP needs to know which downstream routes depend on the device for receiving multicast streams. Using poison reverse, the upstream router maintains a table of the source network and all downstream devices that are dependent on the upstream device.
Mroute Table
DVMRP-enabled devices use the mroute table to maintain a source-specific forwarding tree. When a DVMRP device is initialized, it assumes the role of the designated forwarder for all of its locally attached networks. Before forwarding any packets, all devices use IGMP to learn which networks would like to receive particular multicast group streams. In the case of a shared network, the device with a lower interface metric (a configurable value), or the lower IP address will become the designated forwarder.
Enterasys S-Series Configuration Guide 19-7
Understanding Multicast
A DVMRP device forwards multicast packets first by determining the upstream interface, and then by building the downstream interface list. If a downstream router has no hosts for a multicast stream, it sends a prune message to the upstream router. If the upstream routers outbound list is now empty, it may send a prune message to its upstream router. If a downstream device has pruned a multicast group that a host would like to now receive, the downstream device must send a DVMRP graft message to its upstream device. The DVMRP graft will traverse the source-specific multicast delivery tree to the device that is receiving this stream. As shown in the following example, the Mroute table displays the incoming interface IP address, the multicast group address, the uptime of the stream, incoming interface port number, and the outgoing interface port number.
S Chassis(su)->show ip mroute IP Multicast Routing Table Flags: D - Dense, S - Sparse, C - Connected, L - Local, P - Pruned R - RP-bit set, F - Register flag, T - SPT-bit set, J - Join SPT Timers: Uptime/Expires DVMRP (191.9.1.11/32, 234.1.1.1), 00:00:36/00:00:00, flags: Incoming interface: vlan.0.3200 Outgoing interface list: DVMRP (191.9.1.12/32, 234.1.1.1), 00:00:36/00:00:00, flags: Incoming interface: vlan.0.3200 Outgoing interface list: DVMRP (193.9.3.30/32, 234.3.3.3), 3d, 01:13:10/00:00:00, flags: Incoming interface: vlan.0.930 Outgoing interface list: vlan.0.3100, Forward/DVMRP, 2d, 19:32:38/00:00:00 DVMRP (193.9.3.31/32, 234.3.3.3), 3d, 01:13:04/00:00:00, flags: Incoming interface: vlan.0.930 Outgoing interface list: vlan.0.3100, Forward/DVMRP, 2d, 19:32:38/00:00:00 DVMRP (193.9.3.32/32, 234.3.3.3), 3d, 01:13:11/00:00:00, flags: Incoming interface: vlan.0.930 Outgoing interface list: vlan.0.3100, Forward/DVMRP, 2d, 19:32:38/00:00:00
Prune Messages
If a device receives a datagram that has no IGMP group members present, and all the downstream networks are leaf networks, the device sends a prune packet upstream to the source tree. When sending a prune upstream, the device: 1. Decides if the upstream neighbor is capable of receiving prunes. 2. 3. If it is not, then the sending device proceeds no further. If it is, then the sending device proceeds as follows.
Stops any pending grafts awaiting acknowledgments. Determines the prune lifetime. This value should be the minimum of the default prune lifetime (randomized to prevent synchronization) and the remaining prune lifetimes of the downstream neighbors.
4.
Forms and transmits the packet to the upstream neighbor for the source.
Understanding Multicast
To ensure the prune is accepted, the DVMRP-enabled device sets a negative cache prune entry for three seconds. If the traffic has not stopped after three seconds, the device sends another prune and doubles the cache entry. This method is called exponential back-off. The more prunes that are dropped, the longer the back-off becomes. After the prune lifetime expires (two hours), the prune transmission process is repeated. When receiving a prune, the upstream device: 1. Decides if the sending neighbor is known. 2. 3. 4. If the neighbor is unknown, it discards the received prune. If the neighbor is known, the receiving device proceeds as follows.
Ensures the prune message contains at least the correct amount of data. Copies the source address, group address, and prune time-out value, and, if it is available in the packet, the netmask value to determine the route to which the prune applies. Determines if there is active source information for the source network, multicast group (S,G) pair. If there is not, then the device ignores the prune. If there is, then the device proceeds as follows.
5.
Verifies that the prune was received from a dependent neighbor for the source network. If it was not, then the device discards the prune. If it was, then the device proceeds as follows.
6.
Determines if a prune is currently active from the same dependent neighbor for this S,G pair. If not active, creates a state for the new prune and sets a timer for the prune lifetime If active, resets the timer to the new time-out value.
7.
Determines if all dependent downstream devices on the interface from which the prune was received have now sent prunes. If they have not, removes the interface from all forwarding cache entries for this group instantiated using the route to which the prune applies. If they have, determines if there are group members active on the interface and if this device is the designated forwarder for the network.
Graft Messages
Leaf devices send graft messages when the following occur: A new local member joins a group that has been pruned upstream and this device is the designated forwarder for the source. A new dependent downstream device appears on a pruned branch. A dependent downstream device on a pruned branch restarts. A graft retransmission timer expires before a graft ACK is received.
Graft messages are sent upstream hop-by-hop until the multicast tree is reached. Since there is no way to tell whether a graft message was lost or the source has stopped sending, each graft message is acknowledged hop-by-hop. When sending grafts, the downstream device does the following: 1. 2. Verifies a prune exists for the source network and group. Verifies that the upstream device is capable of receiving prunes (and therefore grafts).
Enterasys S-Series Configuration Guide 19-9
Understanding Multicast
3. 4.
Adds the graft to the retransmission timer list awaiting an acknowledgment. Formulates and transmits the graft packet.
When receiving grafts, the upstream device does the following: 1. Verifies whether the neighbor is known. 2. 3. 4. If unknown, discards the received graft. If known, proceeds as follows.
Ensures the graft message contains at least the correct amount of data. Sends back a graft ACK to the sender. If the sender was a downstream dependent neighbor from which a prune had previously been received: Removes the prune state for this neighbor. If necessary, updates any forwarding cache entries based on this (source, group) pair to include this downstream interface.
Figure 19-3 shows the DVMRP pruning and grafting process. Figure 19-3 DVMRP Pruning and Grafting
Source
DVMRP Multicast
Multicast Traffic
Prune
Graft Prune*
IGMP Join
New Host
Existing Host
19-10
Multicast Configuration
Understanding Multicast
PIM, a shared-tree technology, designates a router as the rendezvous point (RP), which is the root of a shared tree for a particular group. All sources send packets to the group via the RP (that is, traffic flows from the sender to the RP, and from the RP to the receiver). By maintaining one RP-rooted tree instead of multiple source-rooted trees, bandwidth is conserved. Figure 19-4 illustrates the PIM traffic flow. Figure 19-4 PIM Traffic Flow
7 3 1
DR
Source
RP
Receiver
Understanding Multicast
1.
The sources DR registers (that is, encapsulates) and sends multicast data from the source directly to the RP via a unicast routing protocol (number 1 in figure). The RP de-encapsulates each register message and sends the resulting multicast packet down the shared tree. The last-hop router (that is, the receivers DR) sends a multicast group (*,G) join message upstream to the RP, indicating that the receiver wants to receive the multicast data (number 2 in figure). This builds the RP tree (RPT) between the last-hop router and the RP. The RP sends an S,G join message to the source (number 3 in figure). It may send the join message immediately, or after the data rate exceeds a configured threshold. This allows the administrator to control how PIM-SM uses network resources. The last-hop router joins the shortest path tree (SPT) and sends an S,G join message to the source. (number 4 in figure).This builds the SPT. Native multicast packets (that is, non-registered packets) are sent from the sources DR to the receiver on its SPT (number 5 in figure), while registered multicast packets continue to be sent from the sources DR to the RP. A prune message is sent from the last-hop router to the RP (number 6 in figure). A prune message (register-stop) is sent from the RP to the sources DR (number 7 in figure). Once traffic is flowing down the SPT, the RPT is pruned for that given S,G.
2.
3.
4. 5.
6. 7.
When receivers go away, prunes are sent (S,G prune messages towards the source on the SPT, and *,G prune messages towards the RP on the RPT). When new receivers appear, the process begins again.
Key Features
Key features of PIM-SM are the following:
19-12
Uses IGMP to propagate group membership information Sends hello messages to determine neighbor presence and configuration
Multicast Configuration
Understanding Multicast
Sends join/prune messages to determine the need to retain multicast route information for a particular group on an interface Sends assert messages to resolve conflicts that occur regarding inbound interfaces Uses routes in the Multicast Routing Information Base (MRIB) to perform its reverse path forwarding check
Key features of PIM-SSM are the following: Protects against Denial of Service Attacks from unwanted sources Is easier to provision and maintain due to the single source address that a receiver can request data from Provides the ideal mechanism for internet broadcasts that originate from a single source and go to multiple receivers Does not require unique multicast addresses; it depends upon the receiver request for the destination address of the broadcast
Register These messages are used by a sources DR to encapsulate (register) multicast data, and send it to the rendezvous point (RP) a PIM-SM router designated as the root of a shared tree. Register-Stop These messages are used by the RP to tell the sources DR to stop registering traffic for a particular source. Join/Prune (J/P) These messages contain information on group membership received from downstream routers. PIM-SM adopts RPF technology in the join/prune process. When a multicast packet arrives, the router first judges the correctness of the arriving interfaces: If the packet is a source address/multicast group (S,G) entry (on the shortest path tree (SPT)), then the correct interface is the reverse path forwarding (RPF) interface towards the source. If the packet is not an S,G entry (on the RP tree (RPT)), then the correct interface is the RPF interface towards the RP.
A router directly connected to the hosts is often referred to as a leaf router or DR. The leaf router is responsible for sending the prune messages to the RP, informing it to stop sending multicast packets associated with a specific multicast group. When the RP receives the prune message, it will no longer forward the multicast traffic out the interface on which it received the prune message. Assert These messages indicate that the device received a data packet on its outbound (receiving) interface for the group. They report the metric or distance to the source or RP to help the device identify the most direct path to the root of the tree. If multiple routers claim to have the most direct path to the source or RP, each device sends its own assert message and the router with the best metric wins. The other device will then remove that link from its outbound interface list for the group.
Understanding Multicast
Bootstrap These messages are sent by the PIM-SM router that has been elected as the bootstrap router (BSR) to inform all PIM-SM routes of the RP/group mappings. Candidate RP message These messages are sent by the configured candidate RP routers to the BSR to inform the BSR of its RP/group candidacy.
Join/Prune (J/P) These messages contain information on group membership received from downstream routers. PIM-SM adopts RPF technology in the join/prune process. When a multicast packet arrives, the router first judges the correctness of the arriving interfaces: If the packet is a source address/multicast group (S,G) entry (on the shortest path tree (SPT)), then the correct interface is the reverse path forwarding (RPF) interface towards the source.
Assert These messages indicate that the device received a data packet on its outbound (receiving) interface for the group. They report the metric or distance to the source to help the device identify the most direct path to the root of the tree. If multiple routers claim to have the most direct path to the source, each device sends its own assert message and the router with the best metric wins. The other device will then remove that link from its outbound interface list for the group.
Anycast-RP
The relationship between a source or receiver and the PIM RP router is a one-to-one relationship. The relationship between a source or receiver and an Anycast-RP set of routers is a one-to-many relationship, where one of multiple anycast configured RPs is selected by the routing protocol to be the source or receiver PIM RP router. The purpose of anycast-RP is to provide a means of fast convergence when a PIM RP router fails. Anycast-RP provides for the selection of a set of routers to be identified as anycast RPs by Configuring each member of the anycast-RP set as either a static RP or a PIM candidate RP using the same loopback anycast IP address as the RP IP address Configuring: A loopback interface with the same IP address for each anycast-RP router in the set Either a second loopback interface or another hardware interface to be configured with a unique address for this peer of the anycast-RP set
Each anycast-RP router is configured with the same anycast-RP address and all the peer-addresses of each router in the anycast-RP router set. A unique peer address is used to allow each member of the anycast-RP set to identify all other members of the set. Each anycast-RP and peer-address combination is configured in its own command line entry using the ip pim anycast-rp command.
19-14
Multicast Configuration
Understanding Multicast
The routing protocol determines which member of the anycast-RP router set will function as the PIM RP router. Should the PIM RP router fail, the routing protocol determines the next anycast-RP router that will become the new PIM RP router, based upon the routing protocols routing criteria. Figure 19-5 on page 19-16 illustrates an Anycast-RP configuration example.
RP1
Create and enable VLAN 10 with IP interfaces Configure the underlying unicast routing protocol (OSPF) Enable IGMP on VLAN 10 Configure interface loopback 1 with the anycast-RP address 1.1.1.1/32 Configure interface loopback 2 with the peer-address 10.0.0.1/32 Configure 1.1.1.1 as either a static RP using the ip pim rp-address command or an RP candidate using the ip pim rp-candidate command Configure RP 1.1.1.1 as an anycast-RP set with the peer-addresses for RP1, RP2, and RP3 using the following commands: ip pim anycast-rp 1.1.1.1 10.0.0.1 ip pim anycast-rp 1.1.1.1 20.0.0.1 ip pim anycast-rp 1.1.1.1 30.0.0.1
RP2
Create and enable VLAN 20 with IP interfaces Configure the underlying unicast routing protocol (OSPF) Enable IGMP on VLAN 20 Configure interface loopback 1 with the anycast-RP address 1.1.1.1/32 Configure interface loopback 2 with the peer-address 20.0.0.1/32 Configure 1.1.1.1 as either a static RP using the ip pim rp-address command or an RP candidate using the ip pim rp-candidate command Configure RP 1.1.1.1 as an anycast-RP set with the peer-addresses for RP1, RP2, and RP3 using the following commands: ip pim anycast-rp 1.1.1.1 10.0.0.1 ip pim anycast-rp 1.1.1.1 20.0.0.1 ip pim anycast-rp 1.1.1.1 30.0.0.1
RP3
Create and enable VLAN 30 with IP interfaces Configure the underlying unicast routing protocol (OSPF) Enable IGMP on VLAN 30 Configure interface loopback 1 with the anycast-RP address 1.1.1.1/32 Configure interface loopback 2 with the peer-address 30.0.0.1/32 Configure 1.1.1.1 as either a static RP using the ip pim rp-address command or an RP candidate using the ip pim rp-candidate command
Understanding Multicast
Configure RP 1.1.1.1 as an anycast-RP set with the peer-addresses for RP1, RP2, and RP3 using the following commands: ip pim anycast-rp 1.1.1.1 10.0.0.1 ip pim anycast-rp 1.1.1.1 20.0.0.1 ip pim anycast-rp 1.1.1.1 30.0.0.1
Figure 19-5
Anycast-RP Configuration
LpBK1 1.1.1.1 I1 10.0.0.1
RP1
LpBK1 1.1.1.1 I2 20.0.0.2
VLAN 10
RP2
VL
AN
20
LpBK1 1.1.1.1
VLAN 30 DR Source
I3 30.0.0.3
RP3
VLAN 100
With all anycast-RPs configured, the routing protocol selects RP3 as the RP for this domain based upon its routing criteria. Should RP3 fail, the routing protocol will determine which of the remaining routers in the anycast-RP set will take over as RP. Should the failed router return to an operational state, the routing protocol will determine whether a new PIM RP will be selected based upon current conditions.
19-16
Multicast Configuration
Understanding Multicast
A small number of routers within a PIM domain are configured as candidate BSRs, and each C-BSR is given a BSR priority. All C-BSRs multicast bootstrap messages (BSMs) containing their priority to the ALL-PIM-ROUTERS group. When a C-BSR receives a bootstrap message from a C-BSR with a higher priority, it stops sending. This continues until only one C-BSR remains sending bootstrap messages, and it becomes the elected BSR for the domain. The root of a group-specific distribution tree whose branches extend to all nodes in the PIM domain that want to receive traffic sent to the group. RPs provide a place for receivers and senders to meet. Senders use RPs to announce their existence, and receivers use RPs to learn about new senders of a group. The RP router, for the group, is selected by using the hash algorithm defined in RFC 2362.
PIM routers configured to participate as RPs for some or all groups. C-RPs send C-RP Advertisement messages to the BSR. The messages contain the list of group prefixes for which the C-RP is willing to be the RP. Once the PIM-SM routers receive the BSRs message, the routers use a common hashing algorithm to hash the C-RP address, group, and mask together to identify which router will be the RP for a given group. A C-RP router must also learn which PIM-SM router is the BSR. Each designated candidate-BSR (C-BSR) asserts itself as the BSR, then defers once it receives a preferable BSR message. Eventually, all C-RPs send their messages to a single BSR, which communicates the Candidate RP-set to all PIM-SM routers in the domain.
Static RP
If a BSR is not used to distribute RP set information, RP-to-group mappings are configured statically on each router. Static RP configuration and use of bootstrap routers are mutually exclusive. You should not configure both in a PIM-SM domain because such configuration could result in inconsistent RP sets. Statically configured RP set information will take precedence over RP set information learned from a BSR.
Anycast-RP
Anycast-RP provides a means of fast convergence when a PIM RP router fails. All members of the anycast-RP set share the same IP address configured on a loopback interface of each set member. A peer-address associated with the member specifies a unique IP address that identifies the router and can be either a loopback or physical interface.
A designated router is elected from all the PIM routers on a shared network. DRs are responsible for encapsulating multicast data from local sources into PIM-SM register messages and for unicasting them to the RP. The router with the highest priority wins the DR election. In the case of a tie, the router with the highest IP address wins.
Configuring Multicast
Table 19-1
Term PIM Domain
Configuring Multicast
This section provides the following information about configuring multicast.
For information about... Configuring IGMP Configuring DVMRP Configuring PIM Refer to page... 19-18 19-20 19-22
Configuring IGMP
IGMP is configured at the switch level in any command mode on the S-Series devices. At Layer 2, IGMP can be enabled for VLANs, regardless of whether it is enabled on routed interfaces. If, however, IGMP is enabled on a routed interface, and the routed interface is a routed VLAN, then IGMP must also be enabled at the switch level.
Remove IGMP configuration settings for one or more VLANs. Change the IGMP classification of received IP frames. Clear the binding of IP protocol ID to IGMP classification.
set igmp delete vlan-list set igmp protocols [classification classification] [protocol-id protocol-id] [modify] clear igmp protocols [protocol-id protocol-id]
19-18
Multicast Configuration
Configuring Multicast
Table 19-2
Task
Creates a new static IGMP entry or to adds one or more new include or exclude ports to an existing entry.
For more information on IGMP CLI commands, refer to your devices CLI Reference Guide.
Configuring Multicast
Table 19-3
Task
Display the binding of IP protocol id to IGMP classification. Display IGMP information for a specific VLAN. Display IGMP reporter information. Display IGMP flow information. Display IGMP counter information.
Table 19-4 lists Layer 3 IGMP show commands for S-Series devices. Table 19-4
Task Display IGMP information regarding multicast group membership. Display multicast-related information about a specific interface or all interfaces.
Configuring DVMRP
DVMRP Configuration Commands
Table 19-5 lists the DVMRP configuration commands for S-Series devices. Table 19-5
Task Enable or disable DVMRP on an interface.
Configure the metric associated with a set of destinations for DVMRP reports.
19-20
Multicast Configuration
Configuring Multicast
Figure 19-6
VLAN 3 VLAN 1
Router R2
192.40.0.1
192.0.1.2
192.0.1.1
192.20.0.1
Router R1 Configuration
For the VLAN 1 interface, which provides connection to Router R2, an IP address is assigned and DVMRP is enabled. For the VLAN 2 interface, which provides connection to the host network, an IP address is assigned and DVMRP is enabled.
R1(su)->config R1(su-config)->interface vlan 1 R1(su-config-intf-vlan.0.1)->ip address 192.0.1.2 255.255.255.0 R1(su-config-intf-vlan.0.1)->ip dvmrp R1(su-config-intf-vlan.0.1)->no shutdown R1(su-config-intf-vlan.0.1)->exit R1(su-config)->interface vlan 2 R1(su-config-intf-vlan.0.2)->ip address 192.40.0.1 255.255.255.0 R1(su-config-intf-vlan.0.2)->ip dvmrp R1(su-config-intf-vlan.0.2)->no shutdown R1(su-config-intf-vlan.0.2)->exit
Router R2 Configuration
For t he VLAN 1 interface, which provides connection to the Router R1, an IP address is assigned and DVMRP is enabled. For the VLAN 3 interface which provides connection to the host network, an IP address is assigned and DVMRP is enabled.
Configuring Multicast
R2(su)->config R2(su-config)->interface vlan 1 R2(su-config-intf-vlan.0.1)->ip address 192.0.1.1 255.255.255.0 R2(su-config-intf-vlan.0.1)->ip dvmrp R2(su-config-intf-vlan.0.1)->no shutdown R2(su-config-intf-vlan.0.1)->exit R2(su-config)->interface vlan 3 R2(su-config-intf-vlan.0.3)->ip address 192.20.0.1 255.255.255.0 R2(su-config-intf-vlan.0.3)->ip dvmrp R2(su-config-intf-vlan.0.3)->no shutdown R2(su-config-intf-vlan.0.3)->exit
Refer to the Enterasys S-Series CLI Reference for an example of each commands output.
Configuring PIM
PIM Configuration Commands
Table 19-7 lists the PIM configuration commands for Enterasys S-Series devices. Table 19-7
Task Enable PIM-SM on a routing interface. Use the no command to disable PIM-SM. Enable PIM-SSM in router configuration mode. Use the no command to disable PIM-SSM.
Enable the router to announce its candidacy as a BootStrap Router (BSR). Use the no command to remove the router as a BSR candidate. Set the priority for which a router will be elected as the designated router (DR). Use the no command to disable the DR functionality. Set a static rendezvous point (RP) for a multicast group, specifying a specific group or a group-list. Use the no command to remove the static RP configuration.
19-22
Multicast Configuration
Configuring Multicast
Table 19-7
Task
Enable the router to advertise itself as a PIM candidate rendezvous point (RP) to the BSR specifying either a specific group or a group-list. Use the no command to remove the router as an RP candidate.
Enable control of whether static RP configurations will override dynamic RP information learned for IPv4 groups. Filter PIM neighbors by specifying a standard ACL containing neighbors to allow. Configure an anycast Rendezvous Points (RP) set member for a multicast group. Use the no command to remove the specified anycast member.
Table 19-8 lists the PIM IPv6 configuration commands for Enterasys S-Series devices. Table 19-8
Task Enable PIM-SM on a routing interface. Use the no command to disable PIM-SM. Enable PIM-SSM on a routing interface. Use the no command to disable PIM-SSM Enable the router to announce its candidacy as a BootStrap Router (BSR). Use the no command to remove the router as a BSR candidate. Set the priority for which a router will be elected as the designated router (DR). Use the no command to disable the DR functionality. Set a static rendezvous point (RP) for a multicast group, specifying a specific group or a group-list. Use the no command to remove the static RP configuration. Enable the router to advertise itself as a PIM candidate rendezvous point (RP) to the BSR specifying a group-list. Use the no command to remove the router as an RP candidate.
Enable control of whether static RP configurations will override dynamic RP information learned for IPv6 groups. Filter PIM neighbors by specifying a standard ACL containing neighbors to allow.
Configuring Multicast
Table 19-8
Task
Configure an anycast Rendezvous Points (RP) set member for a multicast group. Use the no command to remove the specified anycast member.
Procedure 19-3, which describes the basic steps the configure PIM-SM on an S-Series device, assumes the following: VLANs have been configured and enabled with IP interfaces. The unicast routing protocol has been configured. IGMP has been enabled on the devices and VLANs that will be connected with hosts. For information on enabling IGMP, see Configuring IGMP on page 19-18.
Note: PIM-SSM and PIM-SM can coexist in a network. A candidate BSR, candidate RP, and static RP addresses can be configured in a PIM-SSM configuration, but are not required. Along with IGMP, PIM-SSM must be enabled on the source host interface and be reachable by the PIM-SSM destination addresses.
Command(s)
IPv4: ip pim dr-priority priority IPv6: ipv6 pim dr-priority priority
IPv4: ip pim bsr-candidate pim-interface [priority priority] IPv6: ipv6 pim bsr candidate bsr interface-address [priority priority]
19-24
Multicast Configuration
Configuring Multicast
Command(s)
IPv4: ip pim rp-candidate pim-interface group-address group-mask [priority priority] IPv6: ipv6 pim bsr candidate rp pim-interface-address {[group-list group-list] [priority priority]}
4.
If static RP set distribution is desired, configure the static RP set information in global configuration mode. The RP set information must be the same on all PIM routers in the network. Note: Static RP set distribution cannot be combined with BSR RP set distribution in the same PIM domain. Routers with statically configured RP set information discard RP set information learned from a BSR.
IPv4: ip pim rp-address rp-address group-address group-mask IPv6: ipv6 pim rp-address rp-address group-list group-list
5.
Configure PIM-SM and/or PIM/SSM on the S-Series router that will run PIM-SM. PIM-SM is configured on the interface. PIM-SSM is globally configured in global configuration mode. IPv6 PIM-SSM is enabled on the device by default with an address range of FF3E:0000/32.
Display summary tables of PIM interfaces, neighbors, BSR, and group-to-RP mappings. Display RP anycast information for all or a specified RP. Display BootStrap Router (BSR) information. Display information about PIM interfaces that are currently up (not shutdown). Display the PIM multicast route (*,G and S,G) table. Display the PIM multicast route (*,G and S,G) table by type.
Configuring Multicast
Table 19-9
Task
Display the active rendezvous points (RPs) that show {ip | ipv6} pim rp [mapping] are cached with associated multicast routing entries. Display the rendezvous point (RP) selected for a specified group. Display PIM statistics for this device. Display the multicast routing table.
show {ip | ipv6} pim rp-hash group-address show {ip | ipv6} pim statistics show {ip | ipv6} mroute [source source | group group | interface interface] [brief] [summary] show {ip | ipv6} mcache [group group | source source] [interface] [verbose | brief | summary] [statistics] [-wide]
Display the multicast forwarding cache that was used to program the hardware flow.
Refer to the Enterasys S-Series CLI Reference for a description of the output of each command.
Router R2
VLAN 3
172.1.2/24
VLAN 5
172.2.4/24
VLAN 2
VLAN 7
Router R1
172.1.1/24
Router R4
VLAN 8
172.4.4/24
172.1.3/24
172.3.4/24
VLAN 4
VLAN 6
Router R3
172.3.3/24
VLAN 10
19-26
Multicast Configuration
Configuring Multicast
Router R1 Configuration
On this router, IGMP is enabled on VLAN 2, which connects to hosts, and PIM-SM is enabled on all interfaces. IGMP is used to determine host group membership on directly attached subnets. Note that IGMP is enabled in switch mode on S-Series routers. VLAN 2 is configured as the backup candidate RP for all multicast groups by using the default RP priority of 192. Note that the C-RP with the smallest priority value is elected. Alternatively, you could configure a loopback interface as a candidate RP, to avoid the dependency on a particular interface.
R1(su-config)->router id 1.1.1.1 R1(su-config)->interface vlan 2 R1(su-config-intf-vlan.0.2)->ip address 172.1.1.1 255.255.255.0 R1(su-config-intf-vlan.0.2)->no shutdown R1(su-config-intf-vlan.0.2)->exit R1(su)->set R1(su)->set R1(su)->set R1(su)->set igmp igmp igmp igmp enable 2 enable 3 enable 4 query-enable 2
R1(su-config)->ip pim rp-candidate 172.1.1.1 224.0.0.0 240.0.0.0 R1(su-config)->interface vlan 2 R1(su-config-intf-vlan.0.2)->ip pim sparse-mode R1(su-config-intf-vlan.0.2)->exit R1(su-config)->interface vlan 3 R1(su-config-intf-vlan.0.3)->ip address 172.1.2.1 255.255.255.0 R1(su-config-intf-vlan.0.3)->no shutdown R1(su-config-intf-vlan.0.3)->ip pim sparse-mode R1(su-config-intf-vlan.0.3)->exit R1(su-config)->interface vlan 4 R1(su-config-intf-vlan.0.4)->ip address 172.1.3.1 255.255.255.0 R1(su-config-intf-vlan.0.4)->no shutdown R1(su-config-intf-vlan.0.4)->ip pim sparse-mode R1(su-config-intf-vlan.0.4)->exit
Router R2 Configuration
On this router, PIM-SM is enabled on all interfaces. VLAN 9 is configured as a candidate BSR and is assigned a priority higher than the default of 0. Note that the C-BSR with the largest priority value is elected. VLAN 9 is also configured as a candidate RP for the multicast group 224.2.2.0/24. Its priority is set to 2, which will most likely make it the elected RP for that particular group, since the C-RP with the smallest priority value is elected. (Note that Router R3 has an RP candidate priority value of 3 for that group.) Again, alternatively, you could configure a loopback interface as a candidate BSR or RP, to avoid the dependency on a particular interface.
R2(su)->set R2(su)->set R1(su)->set R1(su)->set igmp igmp igmp igmp enable enable enable enable 3 9 8 5
R2(su-config)->router id 1.1.1.2 R2(su-config)->ip pim bsr-candidate vlan 9 priority 2 R2(su-config)->interface vlan 3 R2(su-config-intf-vlan.0.3)->ip address 172.1.2.2 255.255.255.0
Configuring Multicast
R2(su-config-intf-vlan.0.3)->no shutdown R2(su-config-intf-vlan.0.3)->ip pim sparse-mode R2(su-config-intf-vlan.0.3)->exit R2(su-config)->interface vlan 9 R2(su-config-intf-vlan.0.9)->ip address 172.2.2.2 255.255.255.0 R2(su-config-intf-vlan.0.9)->no shutdown R2(su-config-intf-vlan.0.9)->ip pim sparse-mode R2(su-config-intf-vlan.0.9)->exit R2(su-config)->ip pim rp-candidate 172.2.2.2 224.2.2.0 255.255.255.0 priority 2 R2(su-config)->interface vlan 8 R2(su-config-intf-vlan.0.8)->ip address 172.2.3.2 255.255.255.0 R2(su-config-intf-vlan.0.8)->no shutdown R2(su-config-intf-vlan.0.8)->ip pim sparse-mode R2(su-config-intf-vlan.0.8)->exit R2(su-config)->interface vlan 5 R2(su-config-intf-vlan.0.5)->ip address 172.2.4.2 255.255.255.0 R2(su-config-intf-vlan.0.5)->no shutdown R2(su-config-intf-vlan.0.5)->ip pim sparse-mode R2(su-config-intf-vlan.0.5)->exit
Router R3 Configuration
On this router, PIM-SM is enabled on all interfaces. VLAN 10 is configured as a backup candidate BSR, by leaving its priority at the default of 0. VLAN 10 is also configured as a backup candidate RP for multicast group 224.2.2.0/24, by setting its priority value slightly higher (3) than the priority configured on R2 for the same group (2) (since the C-RP with the smallest priority value is elected).
R3(su)->set igmp enable R3(su)->set igmp enable R3(su)->set igmp enable R3(su)->set igmp enable R3(su)->configure 4 8 10 6
R3(su-config)->router id 1.1.1.3 R3(su-config)->ip pim bsr-candidate vlan 10 R3(su-config)->interface vlan 4 R3(su-config-intf-vlan.0.4)->ip address 172.1.3.3 255.255.255.0 R3(su-config-intf-vlan.0.4)->no shutdown R3(su-config-intf-vlan.0.4)->ip pim sparse-mode R3(su-config-intf-vlan.0.4)->exit R3(su-config)->interface vlan 8 R3(su-config-intf-vlan.0.8)->ip address 172.2.3.3 255.255.255.0 R3(su-config-intf-vlan.0.8)->no shutdown R3(su-config-intf-vlan.0.8)->ip pim sparse-mode R3(su-config-intf-vlan.0.8)->exit R3(su-config)->interface vlan 10 R3(su-config-intf-vlan.0.10)->ip address 172.3.3.3 255.255.255.0 R3(su-config-intf-vlan.0.10)->no shutdown R3(su-config-intf-vlan.0.10)->ip pim sparse-mode R3(su-config-intf-vlan.0.10)->exit R3(su-config)->ip pim rp-candidate 172.3.3.3 224.2.2.0 255.255.255.0 priority 3 R3(su-config)->interface vlan 6 R3(su-config-intf-vlan.0.6)->ip address 172.3.4.3 255.255.255.0
19-28
Multicast Configuration
Configuring Multicast
Router R4 Configuration
This router does not play any special role in PIM-SM, except that it has hosts directly connected to it. IGMP is enabled on the interface that connects to hosts and PIM-SM is enabled on all interfaces.
R3(su)->set igmp enable 5 R3(su)->set igmp enable 6 R3(su)->set igmp enable 7 R3(su)->configure R4(su-config)->router id 1.1.1.4 R4(su-config)#interface vlan 5 R4(su-config-intf-vlan.0.5)->ip address 172.2.4.4 255.255.255.0 R4(su-config-intf-vlan.0.5)->no shutdown R4(su-config-intf-vlan.0.5)->ip pim sparse-mode R4(su-config-intf-vlan.0.5)->exit R4(su-config)->interface vlan 6 R4(su-config-intf-vlan.0.6)->ip address 172.3.4.4 255.255.255.0 R4(su-config-intf-vlan.0.6)->no shutdown R4(su-config-intf-vlan.0.6)->ip pim sparse-mode R4(su-config-intf-vlan.0.6)->exit R4(su-config)->interface vlan 7 R4(su-config-intf-vlan.0.7)->ip address 172.4.4.4 255.255.255.0 R4(su-config-intf-vlan.0.7)->no shutdown R4(su-config-intf-vlan.0.7)->ip pim sparse-mode R4(su-config-intf-vlan.0.7)->exit
Configuring Multicast
Figure 19-8
PIM-SSM Configuration
Source Host
171.1.1.1/24
Router R1
Router R1 Configuration
On this router: Enable PIM-SSM with the default group range Configure VLAN 2 with the source host IP address 171.1.1.1/24, and enable PIM-SM on the interface Configure VLAN 5 with the receiver IP address 171.1.2.1/24, and enable PIM-SM on the interface Enable IGMP on VLAN 2 and VLAN 5. IGMP is used to determine host group membership on directly attached subnets. Note that IGMP is enabled in switch mode on S-Series routers. Enable IGMP querying on the receiver interface (VLAN 5)
R1(su-config)->router id 1.1.1.1 R1(su-config)->ip pim ssm default R1(su-config)->interface vlan 2 R1(su-config-intf-vlan.0.2)->ip address 171.1.1.1 255.255.255.0 R1(su-config-intf-vlan.0.2)->ip pim sparse-mode R1(su-config-intf-vlan.0.2)->no shutdown R1(su-config-intf-vlan.0.2)->exit R1(su-config)->interface vlan 5 R1(su-config-intf-vlan.0.5)->ip address 171.1.2.1 255.255.255.0 R1(su-config-intf-vlan.0.2)->ip pim sparse-mode R1(su-config-intf-vlan.0.5)->no shutdown R1(su-config-intf-vlan.0.5)->exit R1(su-config)->exit R1(su)->set igmp enable 2 R1(su)->set igmp enable 5 R1(su)->set igmp query-enable 5
19-30
Multicast Configuration
20
Multicast Listener Discovery (MLD) Configuration
For information about... What Is MLD? Why Would I Use MLD in My Network? How Do I Implement MLD? Understanding MLD Configuring MLD Refer to page... 20-1 20-1 20-2 20-2 20-5
What Is MLD?
Multicast Listener Discovery (MLD) enables each IPv6 router to discover the presence of nodes wishing to receive multicast packets on its directly attached links, and determines which multicast addresses are of interest to those neighboring nodes. MLD provides the discovered information to the routing protocol used by the router, in order to ensure that multicast packets are delivered to all links where there are interested receivers. Multicast is a one source to many destinations method of simultaneously sending information over a network using the most efficient delivery strategy over each link. Only the end stations that explicitly indicate a need to receive a given multicast stream will receive it. Applications that take advantage of multicast include video conferencing, streaming video, corporate communications, distance learning, and distribution of software, stock quotes, and news. See Multicast Configuration on page 19-1 for a detailed multicast discussion. The S-Series supports MLD version 1 (RFC 2710) and version 2 (RFC 3810). MLD defaults to version 2.
For PIM for IPv6 to operate, the Multicast Listener Discovery (MLD) protocol must be enabled. You must also configure a unicast routing protocol, such as OSPFv3. For both DVMRP and PIM for IPv4 to operate, IGMP must be enabled. See Configuring IGMP on page 19-18 for IGMP configuration information.
Understanding MLD
Multicast allows a source to send a single copy of data using a single IP address from a welldefined range for an entire group of recipients (an MLD group). A source sends data to an MLD group by simply setting the destination IP address of the datagram to be the MLD group address. Sources do not need to register in any way before they can begin sending data to a group, and do not need to be members of the group themselves. Routers between the source and recipients use the group address to route the data, forwarding duplicate data packets only when the path to recipients diverges. Hosts that wish to receive IPv6 data from the MLD group join the group by sending a message to a multicast router on a local interface, using MLD. Multicast routers communicate among themselves using a multicast routing protocol, such as DVMRP of PIM-SM. These protocols calculate a multicast distribution tree of recipients to ensure that: Multicast traffic reaches all recipients that have joined the MLD group Multicast traffic does not reach networks that do not have any such recipients (unless the network is a transit network on the way to other recipients) The number of identical copies of the same data flowing over the same link is minimized.
Group membership management is fundamental to the multicasting process. An arbitrary group of receivers can express interest in receiving a particular multicast stream, regardless of the physical or geographical boundaries of its members. The purpose of IPv6 multicast group management is to optimize a switched networks performance so multicast packets will only be forwarded to those ports containing MLD group hosts or multicast switch devices instead of flooding to all ports in the subnet (VLAN). MLD uses three key components to control multicast membership: Source A server that sends an IPv6 multicast data stream with a particular MLD destination IPv6 and MAC address. A server may not have direct MLD involvement, as it often does not receive a multicast stream, but only sends a multicast stream. Querier A device that periodically sends out queries in search of multicast hosts on a directly connected network. If multiple queriers are present on the LAN, the querier with the lowest IP address assumes the role. Host A client end station that sends one of two MLD messages to a querier:
20-2
Join message Indicates the host wants to receive transmissions associated to a particular multicast group. Leave message Indicates the host wants to stop receiving the multicast transmissions.
Understanding MLD
Figure 20-1
MLD Query
MLD Membership
Router for 2001:2010::10
MLD Membership
Router for 2001:2020::20
Member of 2001:2010::10
Member of 2001:2020::20
As shown in Figure 20-1, an MLD-enabled device can periodically ask its hosts if they want to receive multicast traffic. If there is more than one device on the LAN performing IPv6 multicasting, one of these devices is elected querier and assumes the responsibility of querying the LAN for group members. Based on the group membership information learned from MLD, a device can determine which (if any) multicast traffic needs to be forwarded to each of its ports. At Layer 3, multicast switch devices use this information, along with a multicast routing protocol, to support IPv6 multicasting across the Internet. MLD provides the final step in IPv6 multicast delivery. It is only concerned with forwarding multicast traffic from the local switch device to group members on a directly attached subnetwork or LAN segment. MLD neither alters nor routes any IPv6 multicast packets. Since MLD is not concerned with the delivery of IPv6 multicast packets across subnetworks, an external IPv6 multicast device is needed if IPv6 multicast packets have to be routed across different subnetworks.
Understanding MLD
MLD snooping is disabled by default on Enterasys devices. You can enable it using the set mld enable command on Enterasys S-Series devices as described in Configuring MLD on page 20-5. MLD actively sends MLD query messages to learn locations of multicast switches and member hosts in MLD groups within each VLAN.
Router 1
Solicited Join
3 2
Network A
4 5
Host 1
1
Switch 1 Multicast Server
6 2
Router 2
7 8
Host 2
Figure 20-2 provides an example of MLD processing on Enterasys devices when there are no directly attached hosts. 1. 2. A single IP multicast server, with no directly attached hosts, sends a multicast stream into the network via Switch 1. Because MLD snooping is disabled, Switch 1 floods the multicast stream to all ports which are linked to Router 1 and Router 2. Each router performs an MLD forwarding check to see if there are any hosts that want to join the multicast group on its locally attached network. Each router drops multicast packets until a host joins the group using one of the following messages: solicited join (sent in response to an MLD query produced by the routers interface) In Figure 20-2, this type of exchange occurs between Router 1 and Host 1 when: (3) Router 1 sends a query to potential Host 1. (4) Host 1 responds with a join message. (5) Router 1 forwards the multicast stream. unsolicited join (sent as a request without receiving an MLD query first) In Figure 20-2, this type of exchange occurs between Router 2 and Host 2 when: (6) Host 2 sends a join message to Router 2.
20-4
Configuring MLD
(7) Router 2 forwards the multicast stream to Host 2. (8) When it no longer wants to receive the stream, Host 2 can do one of the following: - Send a leave message to Router 2. - Time out the MLD entry by not responding to further queries from Router 2.
Configuring MLD
MLD is configured in switch mode on Enterasys S-Series devices. At Layer 2, MLD can be enabled for VLANs, regardless of whether it is enabled on routed interfaces. If, however, MLD is enabled on a routed interface, and the routed interface is a routed VLAN, then MLD must also be enabled at the switch level.
Remove MLD configuration settings for one or more VLANs. Create a new static MLD entry or add one or more new ports to an existing entry. Remove a static MLD entry or remove one or more ports from an existing entry. Change the MLD classification of received IP frames. Clear the binding of IP protocol ID to MLD classification. Enable port fast leave on the specified port or range of ports. Disable port fast leave on the specified port or range of ports.
Configuring MLD
For more information on MLD CLI commands, refer to your devices CLI Reference Guide.
20-6
Configuring MLD
Table 20-2
Task
Display MLD flow information. Display MLD counter information. Display the number of MLD flows set on the Enterasys S-Series device.
Configuring MLD
20-8
21
System Logging Configuration
This chapter provides the following information about configuring and monitoring Syslog on Enterasys S-Series devices.
For information about... Using Syslog in Your Network Syslog Overview Configuring Syslog Refer to page... 21-1 21-2 21-6
Syslog Overview
The following section provides an overview of Syslog features and functions supported on Enterasys devices and their default configurations. Later sections will provide instructions on changing default settings to suit your network logging needs.
Syslog Overview
Developers of various operating systems, processes, and applications determine the circumstances that will generate system messages and write those specifications into their programs. Messages can be generated to give status, either at a certain period of time, or at some other interval, such as the invocation or exit of a program. Messages can also be generated due to a set of conditions being met. Typically, developers quantify these messages into one of several broad categories, generally consisting of the facility that generated them, along with an indication of the severity of the message. This allows system administrators to selectively filter the messages and be presented with the more important and time sensitive notifications quickly, while also having the ability to place status or informative messages in a file for later review. Switches must be configured with rules for displaying and/or forwarding event messages generated by their applications. In addition, Syslog servers need to be configured with appropriate rules to collect messages so they can be stored for future reference. This document will describe how to complete these key configuration steps on S-Series platforms. If C2 security mode is enabled, while in Read-Write user mode you can not: Create, modify, or clear a server logging configuration Create, modify, or clear a default logging configuration Create, modify, or clear a logging application configuration
21-2
Syslog Overview
Severity
Syslog Overview
Table 21-1
Term Application
Syslog server
Enterasys devices allow up to 8 server IP addresses to be configured as destinations for Syslog messages. By default, Syslog server is globally enabled, with no IP addresses configured, at a severity level of 8.
21-4
Syslog Overview
Figure 21-1
Default application settings in the example in Figure 21-1 have not been modified. Therefore, an emergency message triggered by a system reset due to loss of the master module is forwarded to Syslog destinations. The CLI-related message notifying that a user has logged in remotely is also forwarded. Configured Syslog server(s) will receive all forwarded messages since their default severity threshold is at 8 (accepting messages at all severity levels). Any messages generated by applications at severity levels 7 and 8 are not forwarded in this example. For instance, forwarding does not occur for an AAA authentication-related debugging message with information about RADIUS access level processing for a particular user. If at some point in time it becomes necessary, for example, to log all AAA authentication-related message activity and to save it to a file so authentication details can be tracked, the administrator can allow that specific application to forward debugging messages to a Syslog server, as well as to the console and persistent file storage. For more information on how to configure these basic settings, refer to Syslog Command Precedence on page 21-7, and the Configuration Examples on page 21-11.
Configuring Syslog
Interpreting Messages
Every system message generated by the S-Series platforms follows the same basic format:
<facility/severity> time stamp address application [slot] message text
Example
This example shows Syslog informational messages, displayed with the show logging buffer command. It indicates that messages were generated by facility code 16 (local4) at severity level 5 from the CLI application on IP address 10.42.71.13.
S Chassis(rw)->show logging buffer <165>Sep <165>Sep (telnet) 4 07:43:09 10.42.71.13 CLI[5]User:rw logged in from 10.2.1.122 (telnet) 4 07:43:24 10.42.71.13 CLI[5]User: debug failed login from 10.4.1.100
Sep 4 07:43:09 10.42.71.13 CLI (5) = Slot 5 in the chassis. User: debug failed login from 10.4.1.100 (telnet)
Configuring Syslog
For information about... Syslog Command Precedence About Server and Application Severity Levels Configuring Syslog Server(s) Modifying Syslog Server Defaults Reviewing and Configuring Logging for Applications Enabling Console Logging and File Storage Configuration Examples Refer to page... 21-7 21-7 21-7 21-8 21-9 21-10 21-11
21-6
Configuring Syslog
Syslog Component Command Logging defaults set logging default {[facility facility] [severity severity] [port port]}
Server settings
set logging server index ip-addr ip-addr [facility facility] [severity severity] [descr descr] [port port] state enable | disable
Index is a value from 1 to 8 that specifies the server table index number for this server. 2. (Optional) Verify the server configuration:
show logging server [index]
If index is not specified, information for all configured Syslog servers will be displayed.
Configuring Syslog
Example
This sample output from the show logging server command shows that two servers have been added to the devices Syslog server list. These servers are using the default UDP port 514 to receive messages from clients and are configured to log messages from the local1 and local2 facilities, respectively. Logging severity on both servers is set at 5 (accepting messages at severity levels 5 through 1). Using the commands described in the next section, these settings can be changed on a per-server basis, or for all servers.
S Chassis(rw)->show logging server
IP Address
Facility
Severity
Description
Port
Status
------------------------------------------------------------------------1 132.140.82.111 local1 2 132.140.90.84 local2 warning(5) warning(5) default default 514 514 enabled enabled
Use the following commands to change these settings either during or after enabling a new server.
If not specified, optional server parameters will be set to the system defaults listed in Table 21-4. Refer back to Filtering by Severity and Facility and to Table 21-1 for more information. on how these parameters operate. To change default parameters for all servers:
set logging default {[facility facility] [severity severity] [port port]}
21-8
Configuring Syslog
Examples
This example shows how to configure the switch to forward messages from facility category local6 at severity levels 3, 2, and 1 to Syslog server 1 at IP address 134.141.89.113:
S Chassis(rw)->set logging server 1 ip-addr 134.141.89.113 facility local6 severity 3
This example shows how to change Syslog defaults so that messages from the local2 facility category at a severity level of 4 will be forwarded to all servers. These settings will apply to all newly-configured servers, unless explicitly configured with the set logging server command:
S Chassis(rw)->set logging default facility local2 severity 4
Example
This example shows output from the show logging application all command. A numeric and mnemonic value for each application is listed with the severity level at which logging has been configured and the server(s) to which messages will be sent. In this case, logging for applications has not been changed from the default severity level of 6. This means that notifications and messages with severity values 6 through 1 will be sent to configured servers.
S Chassis(rw)->show logging application all Application Current Severity Level Server List
---------------------------------------------------------88 89 90 91 93 95 96 105 111 112 117 118 140 141 142 145 147 RtrAcl CLI SNMP Webview System RtrFe Trace RtrLSNat FlowLimt UPN AAA Router AddrNtfy OSPF VRRP RtrArpProc LACP 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 1-8 1-8 1-8 1-8 1-8 1-8 1-8 1-8 1-8 1-8 1-8 1-8 1-8 1-8 1-8 1-8 1-8
Configuring Syslog
6 6 6
3(critical) 6(notifications)
Note: Mnemonic values are case sensitive and must be typed as they are listed in the show logging application command display for your device. Refer to Table 21-1 for sample CLI mnemonic values.
Example
This example shows how to set the severity level for SSH (Secure Shell) to 5 so that warning conditions and messages of greater severity (levels 5 to 1) generated by that application will be sent to Syslog server 1.
S Chassis(rw)->set logging application SSH level 5 server 1
Use the following commands to review and configure console logging and file storage.
21-10
Configuring Syslog
Note: The set logging local command requires that you specify both console and file settings. For example, set logging local console enable would not execute without also specifying file enable or disable or sfile enable or disable for a secure file.
This adds the current CLI session to the list of Syslog destinations, and will be temporary if the current CLI session is using Telnet or SSH.
Note: These log files may also be copied to another device using FTP or TFTP.
Configuration Examples
Enabling a Server and Console Logging
Procedure 21-1 shows how you would complete a basic Syslog configuration. In this example, the default application severity level has not been modified, allowing all applications to forward messages to configured destinations. One Syslog server is configured on IP address 10.1.1.2, logging all messages. Console logging is enabled, but persistent file storage is not. Procedure 21-1 Configuring a Server and Console Logging
Step 1. 2. 3. Task Configure Syslog server 1 and accept default settings (listed in Table 21-4 on page 21-8). (Optional) Verify that application logging settings are at default values for the enabled server. Enable console logging and disable file storage. Command(s) set logging server 1 ip-addr 10.1.1.2 state enable show logging application all set logging local console enable file disable
Note: The set logging local command requires that you specify both console and file settings. For example, set logging local console enable would not execute without also specifying file enable or disable.
Configuring Syslog
21-12
22
Network Monitoring Configuration
This document describes the network monitoring features and their configuration on Enterasys S-Series devices.
For information about... Using Network Monitoring in Your Network Network Monitoring Overview Configuring Network Monitoring Refer to page... 22-1 22-2 22-7
Network Diagnostics: Determine the availability of another node on the network (ping) Display a hop-by-hop path through an IP network (traceroute) Query name servers (nslookup)
Display of switch network connections: Display statistics for the active connections on the switch Display switch users Send a message to switch user
RMON: Record statistics measured by the RMON probe for each monitored interface on the device. Record periodic statistical samples from a network. Periodically gather statistical samples from variables in the probe and compares them with previously configured thresholds. Record statistics associated with each host discovered on the network.
Control the generation and notification of events from the device. Generate tables that describe hosts that top a list ordered by one of their statistics. Record statistics for conversations between two IP addresses. Allow packets to be matched by a filter equation. Allow packets to be captured upon a filter match.
Use the show history command in any command mode to display the currently configured size of the history buffer.
S Chassis(rw)->show history History size currently set to: 25 S Chassis(rw)->
Use the history command in any command mode to display the contents of the history buffer.
S Chassis(rw)->history 1 history 2 show gvrp 3 show vlan 4 show igmp S Chassis(rw)->
Network Diagnostics
S-Series network diagnostics provide for: Pinging another node on the network to determine its availability Performing a traceroute through the IP network to display a hop-by-hop path from the device to a specific destination host Querying name servers to translate hostnames to IP addresses or IP addresses to hostnames
Use the ping command, in any command mode, to determine whether the specified node is available.
S Chassis(rw)->ping -c 10 127.0.0.1 PING 127.0.0.1 (localhost) 64 bytes of data. 64 bytes from 127.0.0.1 (localhost): icmp_seq=0 ttl=64 time=1.58 ms 64 bytes from 127.0.0.1 (localhost): icmp_seq=1 ttl=64 time=1.52 ms
22-2
64 bytes from 127.0.0.1 (localhost): icmp_seq=2 ttl=64 time=1.57 ms 64 bytes from 127.0.0.1 (localhost): icmp_seq=3 ttl=64 time=2.26 ms 64 bytes from 127.0.0.1 (localhost): icmp_seq=4 ttl=64 time=1.42 ms
Use the traceroute command, in any command mode, to display a hop-by-hop path through an IP network from the device to a specific destination host.
S Chassis(rw)->traceroute 192.167.252.17 traceroute to 192.167.252.17 (192.167.252.17), 30 hops max, 40 byte packets 1 2 3 matrix.enterasys.com (192.167.201.40) 14.1.0.45 (14.1.0.45) 40.000 ms 20.000 ms 20.000 ms 20.000 ms
10.000 ms 50.000 ms
192.167.252.17 (192.167.252.17)
Use the nslookup command, in any command mode, to query name servers, translating hostnames to IP addresses or IP addresses to hostnames.
S Chassis(su)->nslookup -x 127.0.0.1 Name: localhost Address: 127.0.0.1
Use the show netstat command to display switch connection statistics. Use the stats option to display statistics for all supported protocols.
S Chassis(rw)->show netstat stats Ip: 26034 total packets received 25824 with invalid addresses 0 forwarded 0 incoming packets discarded 187 incoming packets delivered 6391 requests sent out 21 dropped because of missing route Icmp: 14 ICMP messages received 0 input ICMP message failed ICMP input histogram: destination unreachable: 14 6184 ICMP messages sent 0 ICMP messages failed ICMP output histogram: destination unreachable: 1 echo request: 6183
Tcp: 2 active connection openings 2 passive connection openings 0 failed connection attempts 0 connection resets received 4 connections established 153 segments received 153 segments send out 0 segments retransmitted 0 bad segments received 0 resets sent Udp: 42 packets received 1 packets to unknown port received 0 packet receive errors 57 packets sent S Chassis(rw)->
Users
The network monitoring feature supports the display of information about the active console port or Telnet session(s) logged in to the switch. It also provides for the ability to send a message to one or all users with active sessions. Use the show users command to display information for active console port or Telnet sessions on the switch.
S Chassis(rw)->show users Session User Location
-------- ----- -------------------------* console telnet admin console (via com.1.1) rw 134.141.192.18
S Chassis(rw)->
Use the tell command to send a message to one or all users on the switch.
S Chassis(rw)->tell [email protected] System reset in 15 minutes
RMON
RMON (Remote Network Monitoring) is an industry standard specification that provides comprehensive network fault diagnosis, planning, and performance tuning information and allows for interoperability between SNMP management stations and monitoring agents. RMON extends the SNMP MIB capability by defining additional MIBs that generate a much richer set of data about network usage. These MIB groups each gather specific sets of data to meet common network monitoring requirements.
22-4
Table 22-1 lists: The nine RMON monitoring groups supported on S-Series devices Each groups function The elements it monitors The groups associated commands RMON Monitoring Group Functions and Commands
What It Does... Records statistics measured by the RMON probe for each monitored interface on the device. What It Monitors... Packets dropped, packets sent, bytes sent (octets), broadcast and multicast packets, CRC errors, oversized and undersized packets, fragments, jabbers, and counters for packets. Sample period, number of samples and item(s) sampled. CLI Command(s) show rmon stats set rmon stats clear rmon stats
Table 22-1
RMON Group Statistics
History
Alarm
Periodically gathers statistical samples from variables in the probe and compares them with previously configured thresholds. If the monitored variable crosses a threshold, an event is generated. Controls the generation and notification of events from the device.
show rmon alarm set rmon alarm properties set rmon alarm status clear rmon alarm
Event
show rmon event set rmon event properties set rmon event status clear rmon event
Host
Host address, packets and bytes received and transmitted, and broadcast, multicast and error packets. Statistics, top host(s), sample stop and start period, rate base, and duration.
show rmon host set rmon host properties set rmon host status clear rmon host
Host TopN Generates tables that describe hosts that top a list ordered by one of their statistics. These rate-based statistics are samples of one of their base statistics over an interval specified by the management station. Matrix Records statistics for conversations between two IP addresses. As the device detects a new conversation, it creates a new matrix entry.
show rmon topN set rmon topN properties set rmon topN status clear rmon topN
Source and destination address pairs and packets, bytes and errors for each pair.
show rmon matrix set rmon matrix properties set rmon matrix status clear rmon matrix
Table 22-1
RMON Group Filter
Packet Capture
S Chassis(rw)->set smon priority create ge.1.1 S Chassis(rw)->set smon priority enable ge.1.1 S Chassis(rw)->show smon priority ge.1.1 priority 0 Show Priority Statistics -----------------------Interface = ge.1.1 Owner Creation Status = none = 0 days 0 hours 37 minutes 36 seconds = enabled
--------------------
Octets
256168 0
S Chassis(rw)->
22-6
The following example: Creates an SMON VLAN session for port ge.1.1 Enables SMON VLAN monitoring for port ge.1.1 Displays statistics for VLAN 1 for the enabled port:
S Chassis(rw)->set smon vlan create ge.1.1 S Chassis(rw)->set smon vlan enable ge.1.1 S Chassis(rw)->show smon vlan vlan 1 Show VLAN Statistics -------------------Interface = ge.1.1 Owner Creation Status = none = 20 days 1 hours 44 minutes 27 seconds = enabled
--------------------
S Chassis(rw)->
owner type
startup
Table 22-2
Parameter rthresh fthresh revent
fevent
alarm, event, topN, matrix or host status channel action channel control channel event status
channel description capture action capture offset capture asksize capture slice
capture loadsize
100
To optionally change the size of the history buffer, use the set history command, specifying the size of the history buffer. The default option configures the specified history buffer setting to persist for all future sessions. Otherwise, the setting only affects this session. This example shows how to set the size of the command history buffer to 25 lines and make this the default setting:
S Chassis(rw)->set history 25 default
To optionally send a message to one or all active users on this switch, use the tell command, specifying an individual destination or all users. The dest option specifies the user and location in the user@location format. This example shows how to tell user [email protected] about a system reset:
S Chassis(rw)->show users Session User Location
22-8
-------- ----- -------------------------* console telnet admin console (via com.1.1) rw 134.141.192.18
Table 22-3
Task
-I (Optional) Specifies that ICMP echo requests should be used instead of UDP datagrams. -i source-interface (Optional) Specifies the IP source interface (for example vlan.0.5 for VLAN 5). -m max-ttl (Optional) Specifies the maximum Time-To-Live (TTL) for outgoing packets. -n host-ip-address (Optional) Specifies that name server contact should be avoided. -p udp-dest-port (Optional) Specifies the initial UDP destination port. For each sent probe the UDP destination port is increased by one. -q number-of-probes (Optional) Specifies the number of probes to send out for each hop. -r (Optional) Specifies that normal host routing tables should be bypassed. -s source-ip-address (Optional) Specifies the source IP address for the traceroute probes. -t tos (Optional) Specifies the Type-of-Service (ToS) for IPv4 or the traffic class for IPv6. -v version (Optional) Forces traceroute to use either IPv4 or IPv6. -V router (Optional) Specifies the virtual router to use for this traceroute. -w period (Optional) Specifies the time in seconds to wait for a response to a probe. -x (Optional) Specifies that traceroute should not calculate checksum. host host Specifies an IP address or a host to find a route to. To query a name server to translate hostnames to IP addresses or IP addresses to hostnames: -x (Optional) Specifies that a reverse lookup should be performed. If this parameter is used, then you must specify an IP address as the host variable. -v {4 | 6} (Optional) Specifies the IP version for this name server lookup. host Specifies the host name, or an IP address, in the case of a reverse lookup. nslookup [-x] [-v {4 | 6}] host
Procedure 22-1 describes how to configure SMON. SMON commands can be entered from any command mode. Procedure 22-1 Configuring SMON
Step 1. Task Optionally, first create and then enable an SMON session for the collection of Ethernet priority statistics for the specified port(s). Command(s) set smon priority {create | enable} port-string [owner]
22-10
Procedure 22-2 describes how to configure RMON. RMON commands can be entered from any command mode. Procedure 22-2 Configuring Remote Network Monitoring
Step 1. Task Optionally, configure RMON to to create entries that record statistics measured by the RMON probe for each specified interface. index - Specifies the index number for this entry port-string - assigns this entry to a specific port owner - (Optional) Specifies the management station owner for this entry 2. Optionally, specify the maximum number and period for recorded statistical samples from a network. index - Specifies the index number for this entry port-string - assigns this entry to a specific port bucket - (Optional) Specifies the maximum number of entries to maintain interval - (Optional) Specifies the period between samples in seconds owner - (Optional) Specifies the management station owner for this entry 3. Configure RMON probe variable thresholds that will trigger an alarm if crossed by a sampled probe. index - Specifies the entry for this set of alarm properties interval - (Optional) Specifies the period between samples in seconds object - (Optional) Specifies the MIB object to be monitored type - (Optional) Specifies a monitoring method set rmon alarm properties index [interval interval] [object object] [type {absolute | delta}] [startup {rising | falling | either}] [rthresh rthresh] [fthresh fthresh] [revent revent] [fevent fevent] [owner owner] set rmon history index [port-string] [buckets buckets] [interval interval] [owner owner] Command(s) set rmon stats index [port-string] [owner]
22-12
22-14
Table 22-4
Task
To delete an RMON channel entry: To delete an RMON filter entry: To delete an rmon capture entry:
Table 22-5 describes how to display network monitoring information and statistics. Table 22-5
Task To display the contents of the CLI history buffer: To display the current history buffer size setting: To display switch connection statistics for all or the specified protocol: To display information for the active console port or Telnet sessions on the switch: To display SMON priority statistics counters for all or the specified port(s) and priorities: To display SMON VLAN statistics counters for all or the specified port(s) and VLAN(s): To display RMON statistics for one or more ports: To display RMON history properties and statistics: To display RMON alarm entries: To display RMON event entry properties: To display RMON properties and statistics associated with each host discovered on the network: To display RMON TopN properties and statistics: To display RMON matrix properties and statistics: To display RMON channel entries for one or more ports: To display one or more RMON filter entries To display RMON capture entries and associated buffer control entries:
22-16
23
NetFlow Configuration
This document describes the NetFlow feature and its configuration on Enterasys S-Series switch/routers.
For information about... Using NetFlow in Your Network Implementing NetFlow Understanding Flows Configuring NetFlow on the S-Series Terms and Definitions NetFlow Version 5 Record Format NetFlow Version 9 Templates Refer to page... 23-1 23-2 23-3 23-5 23-10 23-11 23-12
Implementing NetFlow
Can understand your networks flow characteristics, allowing for better planning when transitioning to new applications or services.
Implementing NetFlow
Having a profile of captured flows that transit your network over time is a crucial first step in implementing a secure network. This NetFlow profile provides you with a good understanding of the actual group and individual behaviors that make up the roles you set by policy and to which you apply QoS. A profile can also be very helpful during network planning exercises, such as projecting how a network might react to the introduction of a new application prior to actual implementation. Figure 23-1 illustrates an example of a NetFlow network profile setup. Figure 23-1 NetFlow Network Profile Example
Captured Flows
HTTP Flow
Voice over IP
...
Voice over IP
...
Enable NetFlow
Enable NetFlow
LAN Cloud
Enable NetFlow
Independent Flows
NetFlow export packets sent to the collector/management application based upon a flow expiration criteria Management Application Installed
23-2
NetFlow Configuration
Understanding Flows
To complete a NetFlow network profile, enable NetFlow on all ports where packet flows aggregate. At the top of Figure 23-1 you will find an abbreviated sample of the independent flow records that are captured at each NetFlow-enabled port. These flow records will be retained locally in a cache until a flow expiration criteria has been met. As shown, when one of the flow expiration criteria is met, NetFlow export packets are then sent to the NetFlow collector server(s), where a collector and management application has been installed. The management application will process the records and generate useful reports. These reports provide you with a clear picture of the flows that traverse your network, based upon such data points as source and destination address, start and end time, application, and packet priority. The following steps provide a high-level overview of a NetFlow implementation: 1. 2. Determine the business or network purpose of the information NetFlow will provide you. Choose a collector and management application(s), such as Enterasys SIEM, best suited for the purpose for which you are collecting the data. Install the application(s) on the NetFlow collector server(s). Identify the paths used by the data to be collected by NetFlow. Identify the choke point interfaces where the IP packet flows you want NetFlow to capture aggregate. Enable NetFlow on the identified interfaces. Identify up to four NetFlow collector servers by configuring the IP address for each collector. Use the data reporting generated by the NetFlow management application to address the purpose determined in step 1.
3. 4. 5. 6. 7.
Understanding Flows
The concept of a flow is critical to understanding NetFlow. A flow is a stream of IP packets in which the values of a fixed set of IP packet fields is the same for each packet in the stream. A flow is identified by a set of key IP packet fields found in the flow. Each packet containing the same value for all key fields is considered part of the same flow, until flow expiration occurs. If a packet is viewed with any key field value that is different from any current flow, a new flow is started based upon the key field values for that packet. The NetFlow protocol will track a flow until an expiration criteria has been met, up to a configured number of current flows. The data captured for each flow is different, based on the NetFlow export version format supported by the network device. This data can include such items as packet count, byte count, destination interface index, start and end time, and next hop router. See NetFlow Version 5 Record Format on page 23-11 for NetFlow Version 5 template data field descriptions and NetFlow Version 9 Templates on page 23-12 for NetFlow Version 9 template data field descriptions.
Understanding Flows
The inactive timer determines the length of time NetFlow waits before expiring a given flow once that flow has stopped. The inactive timer is a fixed value of 40 seconds and cannot be configured. Rules for expiring NetFlow cache entries include: Flows which have been idle for 40 seconds (fixed value in firmware) are expired and removed from the cache. Long lived flows are expired and removed from the cache. (Flows are not allowed to live more than 30 minutes by default; the underlying packet conversation remains undisturbed). Flows associated with an interface that has gone down are automatically expired.
Figure 23-2 provides a graphic depiction of how these timers interact. Flows 1 and 3 show a single long lasting logical flow. Flow 1 times out and expires at 30 minutes, the active timer length. Because the flow expires, an export packet is sent to the NetFlow collector. Flow 3 continues this long lasting flow for another 10 minutes. At time 40 minutes the flow ends. The 40 second inactive timer initiates and expires at 40 minutes and 40 seconds resulting in an export packet to the NetFlow collector for flow 3. At the NetFlow collector, the management application joins the two flows into a single logical flow for purposes of analysis and reporting. Flow 2 is a 7.5-minute flow that never expires the active timer. It begins at 2.5 minutes and ends at 10 minutes. At 10 minutes the inactive timer commences and expires the flow at 10 minutes and 40 seconds. At this time, NetFlow sends an export packet for the flow to the NetFlow collector for processing. Figure 23-2
Flows
Flow Expiration
Flow 1
Flow 1 expires
Flow 2
Flow 2 expires
Flow 3
2.5 Min.
30 Min.
23-4
NetFlow Configuration
NetFlow records are generated only for flows for which a hardware connection has been established. As long as the network connection exists (and NetFlow is enabled), NetFlow records will be generated. Flows that are switched in firmware (soft forwarded) will not have NetFlow records reported. For flows that are routed, the S-Series firmware reports the source and destination ifIndexes as the physical ports, not routed interfaces. In the case of a LAG port, the module(s) that the physical ports are on will generate NetFlow records independently. They will however, report the source ifIndex as the LAG port. The Flow Sequence Counter field in the NetFlow Header is unique per module. The Engine ID field of the NetFlow Header is used to identify each unique module.
Use the set netflow export-interval command to change the active flow export timer value for each system. Use the clear netflow export-interval command to reset the active flow export timer to its default value.
This message indicates that you have configured the maximum number of export destinations for the device. Remove a configured export destination using the clear netflow export-destination ip-address command before adding an additional export destination. Use the set netflow export-destination command to configure the IP address of a NetFlow collector for this system and optionally set the UDP port. Use the clear netflow export-destination command to clear the specified NetFlow collector configuration.
23-6
NetFlow Configuration
Use the set netflow export-version {5|9} command to set the NetFlow export version. Use the clear netflow export-version command to reset the export version to the default value of Version 5.
Template refresh based on the timeout period is performed on every module. Since each S-Series module handles its own packet transmissions, template refresh based on number of export packets sent is managed by each module independently. The refresh rate defines the maximum delay a new or restarted NetFlow collector would experience, before it learns the format of the data records being forwarded (from the template referenced by the data records). Refresh rates affect NetFlow collectors during their start up. Collectors must ignore incoming data flow reports until the required template is received. The default behavior is for the template to be sent after 20 flow report packets are sent. Since data record packets are sent out per flow, a long FTP flow may cause the template timeout timer to expire before the maximum number of packets are sent. In any case a refresh of the template is sent at timeout expiration as well. Setting the appropriate refresh rate for your S-Series device must be determined, because the default settings of a 20 flow report packet refresh rate and a 30-minute timeout may not be optimal for your environment. For example, a switch processing an extremely slow flow rate of, say, 20 flow report packets per half hour, would refresh the templates only every half hour using the default settings, while a switch sending 300 flow report packets per second would refresh the templates 15 times per second. Enterasys recommends that you configure your S-Series device so it does not refresh templates more often than once per second. Use the set netflow template to set the NetFlow export template refresh rate and timeout for this system. Use the clear netflow template to reset the NetFlow export template refresh rate and timeout to the default values.
23-8
NetFlow Configuration
If the mac option is enabled, both incoming source and destination MAC addresses are included in the export data for the collector. If the vlan option is enabled, VLANs associated with both the ingress and egress interfaces are included in the export data for the collector. Use the set netflow export-data enable {mac | vlan} command to enable either the MAC or VLAN export data. Use the set netflow export-data disable {mac | vlan} command to disable either the MAC or VLAN export data. Use the clear netflow export-data command to reset both MAC and VLAN optional export data configuration to the default value of disabled.
Export Version
Version 5
Table 23-1
Parameter
Timeout-period
Procedure 23-1 provides a CLI example of a NetFlow setup. Steps 1 3 are required. Steps 4 6 are optional depending upon the needs of your configuration. All NetFlow commands can be configured in any command mode. Procedure 23-1 Configuring NetFlow on S-Series Systems
Step 1. 2. 3. 4. 5. 6. 7. Task Enable NetFlow collection on the specified port. Configure up to four NetFlow collector destination servers for this system. Globally enable the NetFlow cache for this system. Optionally, modify the active flow timer value for this system. Command(s) set netflow port port_string enable set netflow export-destination ip-address [udp-port] set netflow cache enable set netflow export-interval interval
Optionally, change NetFlow record format set netflow export-version version between version 5 and version 9 for this system. Optionally, enable NetFlow Version 9 MAC and VLAN export data. If using version 9, optionally modify the number of export packets sent that cause a template to be retransmitted by an individual S-Series module and the length of the timeout period, in minutes, after which a template is retransmitted by all modules in the system. Verify any configuration changes made. set netflow export-data enable {mac | vlan} set netflow template {[refresh-rate packets] [timeout minutes]
8.
23-10
NetFlow Configuration
Table 23-2
Term
NetFlow Collector
NetFlow Export
NetFlow Version 5 Header Data Field count sys_uptime unix_secs unix_nsecs flow_sequence engine_type engine_id sampling_interval count Field Contains Number of flows exported in this packet (1-30). Current time in milliseconds since the export device booted. Current count of seconds since 0000 UTC 1970. Residual nanoseconds since 0000 UTC 1970. Sequence counter of total flows seen. Type of flow-switching engine. Slot number of the flow-switching engine. First two bits hold the sampling mode; remaining 14 bits hold value of sampling interval. Number of flows exported in this packet (1-30).
Table 23-4
NetFlow Version 5 Data Record Format Data Field srcaddr dstaddr Field Contains Source IP address of the device that transmitted the packet. IP address of the destination of the packet.
Table 23-4
NetFlow Version 5 Data Record Format Data Field nexthop input output dPkts dOctets first last srcport dstport pad1 tcp_flags prot tos src_as dst_as src_mask dst_mask pad2 Field Contains IP address of the next hop router. SNMP index of input interface. SNMP index of output interface. Number of packets in the flow. Total number of Layer 3 bytes in the packets of the flow. SysUptime at start of flow. SysUptime at the time the last packet of the flow was received. TCP/UDP source port number or equivalent. TCP/UDP destination port number or equivalent. Unused (zero) bytes. Cumulative OR of TCP flags. IP protocol type (for example, TCP = 6; UDP = 17). IP type of service (ToS). Autonomous system number of the source, either origin or peer. Autonomous system number of the destination, either origin or peer. Source address prefix mask bits. Destination address prefix mask bits. Unused (zero) bytes.
23-12
NetFlow Configuration
Table 23-5 on page 23-13 details the NetFlow Version 9 template header fields supported by all Version 9 templates. Table 23-5 NetFlow Version 9 Template Header Support
NetFlow Version 9 Header Data Field Format Version Flow Record Count Description NetFlow template Version 9 The total number of records in the export packet, which is the sum of the options flow set records, template flowset records, and data flowset records. Time in milliseconds since this device was first booted. Time in seconds since 0000 UTC 1970, at which the export packet leaves the exporter. Incremental sequence counter of all export packets sent from the exporter. This is an accumulative count that lets the collector know if any packets have been missed. Engine Type (1 = Line Card). Engine ID (One based module slot number). Templates All Templates All Templates
Source ID
All Templates
Table 23-6 details the NetFlow Version 9 base data record fields supported by Version 9 templates. Base data record fields are supported by all IPv4 and IPv6 Version 9 templates. IPv4 specific data records are only supported by IPv4 templates. IPv6 specific data records are only supported by IPv6 templates. Table 23-6 NetFlow Version 9 Template Data Record Field Support
NetFlow Version 9 Base Data Record Fields Data Field SIP Description (Source) IPv4 or IPv6 address of the device that transmitted the packet. (Destination) IPv4 or IPv6 address of the destination device. MIBII 32-bit ID of the interface on which the packet was transmitted. MIBII 32-bit ID of the interface on which the packet was received. Templates 256 - 271 IPv4 addresses 272 - 287 IPv6 addresses 256 - 271 IPv4 addresses 272 - 287 IPv6 addresses All templates All templates
DIP
Dest IfIndex Source IfIndex Packet Count Byte Count Start Time Last Time IP Protocol Source TOS
The number of packets switched through this flow. All templates The number of bytes switched through this flow. sysUptime in milliseconds at which the first packet of this flow was switched. sysUptime in milliseconds at which the last packet of this flow was switched. IP protocol for this flow. (Source) Type of service field value for this flow. All templates All templates All templates All templates All templates
Table 23-7 details the additional NetFlow Version 9 data record fields specific to a given Version 9 template. Table 23-7 NetFlow Version 9 Additional Template Specific Data Record Field Support
NetFlow Version 9 Additional Template Specific Data Record Fields Data Field Source MAC Description Source MAC addresses for this flow. Templates IPv4: 257, 259, 261, 263, 265, 267, 269, 271 IPv6: 272, 274, 276, 278, 280, 282, 284, 286 Destination MAC Destination MAC addresses for this flow. IPv4: 257, 259, 261, 263, 265, 267, 269, 271 IPv6: 272, 274, 276, 278, 280, 282, 284, 286 Source VLAN Source VLAN ID associated with the ingress interface for this flow. IPv4: 258, 259, 262, 263, 266, 267, 270, 271 IPv6: 273, 274, 277, 278, 281, 282, 285, 286 Destination VLAN Destination VLAN ID associated with the egress interface for this flow. IPv4: 258, 259, 262, 263, 266, 267, 270, 271 IPv6: 273, 274, 277, 278, 281, 282, 285, 286 Layer 4 Source Port TCP/UDP source port numbers (for example, FTP, Telnet, or equivalent). IPv4: 260, 261, 262, 263, 268, 269, 270, 271 IPv6: 275, 276, 277, 278, 283, 284, 285, 286 Layer 4 Destination Port TCP/UDP destination port numbers (for example, FTP, Telnet, or equivalent). IPv4: 260, 261, 262, 263, 268, 269, 270, 271 IPv6: 275, 276, 277, 278, 283, 284, 285, 286 Next Hop Router Specifies the BGP IPv4 or IPv6 next-hop address. IPv4: 264, 265, 266, 267, 268, 269, 270, 271 IPv6: 279, 280, 281, 282, 283. 284, 285, 286
Table 23-8 provides a description of each IPv4 and IPv6 NetFlow Version 9 template per template ID. Table 23-8 NetFlow Version 9 Templates
IPv4 Version 9 Templates Template ID 256 257 258 Description Base switch template containing IPv4 base data record entries. Switch and MAC ID template containing IPv4 base data record entries, along with source and destination MAC addresses. Switch and VLAN ID template containing IPv4 base data record entries and source and destination VLAN IDs.
23-14
NetFlow Configuration
Table 23-8
259
260 261
262
263
268 269
270
271
IPv6 Version 9 Templates 272 273 274 275 Base switch template containing IPv6 base data record entries. Switch and MAC ID template containing IPv6 base data record entries, along with source and destination MAC addresses. Switch and VLAN ID template containing IPv6 base data record entries and source and destination VLAN IDs. Switch, MAC ID, and VLAN ID template containing IPv6 base data record entries, along with source and destination MAC addresses and source and destination VLAN IDs. Switch and Layer 4 port template containing IPv6 base data record entries, along with source and destination Layer 4 ports.
276
Table 23-8
277
278
279
284 285
286
287
23-16
NetFlow Configuration
24
Virtual Routing and Forwarding (VRF) Configuration
This document provides the following information about configuring Virtual Routing and Forwarding (VRF) on the Enterasys S-Series platforms.
For information about... Using VRF in Your Network Implementing VRF VRF Overview Configuring VRF Terms and Definitions Refer to page... 24-1 24-1 24-2 24-12 24-13
Implementing VRF
To configure a VRF: Create the VRF in any command mode, optionally specifying an SNMPv3 context name. Enter the VRF router mode, followed by entering configuration mode for the created VRF. For each VRF with a subnet reachable by a different VRF instance, configure static routes to perform next hop lookup in the VRF instance. For IP address policy, in which the next hop interface is a member of a different VRF, when configuring a policy route map, set the next hop behavior to perform the route lookup on the next hop VRF.
VRF Overview
When multiple VRFs contain overlapping IP networks that communicate to a larger internet, use the NAT-inside-VRF feature to differentiate between the VRFs containing the overlapping IP networks. When a single VRF provides Server Load Balancing (SLB) services for multiple VRFs, configure the virtual server to provide SLB services to all VRFs in this router. When changing the destination address for the forwarding of local UDP broadcasts to an address located on a different VRF, specify the destination VRF in the helper address configuration. Also, set DHCP relay information to force the client to include VPN option 82 in packets sent to the DHCP server.
VRF Overview
For information about... VRFs, Interfaces, and IP Addresses VRF and Static Route Next Hop Lookup VRF and Set Policy Next Hop Lookup VRFs With Overlapping IP Networks Server Load Balancing (SLB) Services Between VRFs Forwarding Local UDP Broadcasts To A Different VRF Refer to page... 24-3 24-4 24-5 24-5 24-8 24-11
S-Series devices have a single default router named global. The global router: Exists when you first boot the device Manages the VRFs for this physical router Can neither be created nor deleted Can manage up to 128 VRF instances depending upon your system
Use the show limits application vrf command to determine the number of VRF instances your system supports. Each optional VRF instance you create functions as its own routing domain. All routing features and protocols that are supported on the global router are also supported in a VRF instance. VRF instance router protocol configuration (for example, configuring PIM, OSPF, and IGMP) is identical to the global router protocol configuration. Protocol configurations in different VRFs do not conflict with each other because they are completely separate instances of the protocol. You create a VRF router, in any command mode, using the set router vrf create command. The command requires that you specify a name of up to 31 printable characters, except for the space character. Enterasys recommends that you provide the VRF with a meaningful name such as Marketing or Internet-Access. You can optionally specify an SNMPv3 context of up to 31 characters. If not specified, the SNMPv3 context defaults to the name of the VRF instance. If the VRF instance name exceeds 28 characters, the SNMPv3 context must be specified when creating the VRF. Refer to the set router vrf create command for information on creating a VRF instance. The behavior when clearing the global router is different versus clearing a VRF instance. When you clear the global router, a blank configuration file is written to persistent memory. The global router is not deleted. Unlike the global router, all VRFs can be both created and deleted. When you clear a VRF, the VRF is deleted along with all of its configuration.
24-2
VRF Overview
Use the clear router vrf command to clear the global router configuration or to delete a VRF instance from the system. Figure 24-1 on page 24-3 presents a router that has been segmented into three VRF routers: two VRF routers with user group access named Alpha-Group and Beta-Group, and a VRF for internet access named Internet-Access. Figure 24-1 VRF Overview
Physical Router
192.168.10.1/24 Vlan.0.1
134.141.94.100/24 Vlan.0.5
global
VRF: Internet-Access
VRF: Alpha-Group
192.168.10.10/24 Vlan.0.10 192.168.16.10/24 Vlan.0.16
VRF: Beta-Group
192.168.10.20/24 192.168.16.20/24 Vlan.0.100 Vlan.0.160
VLAN 10
VLAN 16
VLAN 100
VLAN 160
VRF Overview
interface from its current VRF instance before moving the interface to a different VRF instance. To remove an interface from a VRF instance, along with all its configuration, use the command no interface interface-name. In VRF configuration mode, the interface interface-name command automatically binds the named interface to the current VRF and enters interface configuration mode. If the interface has already been bound to a different VRF, an error message is displayed. IP addresses assigned in different VRFs are completely separate, thus overlapping or identical IP addressing is permitted across different VRFs. For example, VRF Corporate may have IP address range 10.1.100.1/16 associated with interface ge.1.1 while the Marketing VRF has IP address range 10.1.100.1/16 associated with interface ge.1.2. As a packet ingresses the router, the interface it ingresses on will determine which VRF router will receive it. The routing tables for each VRF router will handle routes within the physical router for overlapping IP addresses. If an overlapping IP address requires communication with the outside internet through a shared-access-VRF, you must configure the IP address for NAT-inside-VRF on the shared-access-VRF so that it will know how to communicate with the correct VRF. See VRFs With Overlapping IP Networks on page 24-5 for NAT-inside-VRF details.
Refer to Figure 24-1 on page 24-3 for the following discussion. Only VRF Internet-Access contains next hop information for destination addresses reachable by the internet gateway router. If a packet ingresses on VLAN 10 for IP address 192.168.10.5, with a destination address of 66.249.81.104 that is only reachable by the internet gateway router, a lookup on the VRF Alpha-Group route table will fail. By configuring a static route on VRF Alpha-Group pointing to VRF Internet-Access as the egress VRF, the Internet-Access VRF will be used for the next hop lookup destination address 66.249.81.104.
Note: Using the vrf vrf-name parameter is more dynamic than configuring a standard static route, in that it determines the next hop based upon a route table lookup. A standard static route specifies a single next hop. Should that next hop be unavailable, the subnet is no longer reachable. A standard static route can be configured to reach the next hop that is a member of a different VRF using the syntax: ip route destination-prefix/length next-hop-address interface next-hop-interface. Because the vrf vrf-name parameter provides greater flexibility in determining the next hop, it is recommended that you use the vrf vrf-name parameter.
This example shows how to specify on VRF Alpha-Group that the next hop lookup to destination prefix 66.249.81.0/24, for packets ingressing on VRF Alpha-Group, is performed on VRF Internet-Access:
S Chassis(rw-*ha-Group-config)->ip route 66.249.81.0/24 vrf Internet-Access
24-4
VRF Overview
This example shows how to specify on VRF Alpha-Group that the next hop lookup to destination address 2001:11ac:fd34::/48, for packets ingressing on VRF Alpha-Group, is performed on VRF Internet-Access:
S Chassis(rw-*ha-Group-config)->ipv6 route 2001:11ac:fd34::/48 vrf Internet-Access
VRF Overview
Because VRF Internet-Access is used as the shared access resource out of the router for both VRF Alpha-Group and Beta-Group, a means of masking the conflicting networks is required. These conflicting networks can be masked using the NAT-inside-VRF feature. NAT-inside-VRF is a means of letting the outside NAT configuration know which VRF the inside NAT configuration belongs to. NAT-inside-VRF can be configured for both static or dynamic inside NAT. Figure 24-2 NAT-Inside-VRF Configuration for Overlapping IP Networks
PACKET A SRC: 134.141.94.110 DST: 66.249.81.104 PACKET B SRC: 66.249.81.104 DST: 134.141.94.110
Internet
Physical Router
134.141.94.100/24 Vlan.0.5
VRF: Internet-Access
VRF: Alpha-Group
192.168.10.10/24 Vlan.0.10 192.168.16.10/24 Vlan.0.16
VRF: Beta-Group
192.168.10.10/24 192.168.16.20/24 Vlan.0.100 Vlan.0.160
PACKET A SRC: 192.168.10.15 DST: 66.249.81.104 PACKET B SRC: 66.249.81.104 DST: 192.168.10.15
24-6
VRF Overview
2.
On VRF Internet-Access, configure interface VLAN 5, IP address 134.141.94.100/24 for IP NAT outside using the ip nat outside command in interface configuration mode. This assures that any packet egressing the system on IP subnet 134.141.94.100/24 will be considered for network address translation. On VRF Internet-Access, configure the NAT static rule specifying 192.168.10.15 (VLAN 10) as the inside source address and 134.141.94.1 (VLAN 5) as the outside source address, and VRF Alpha-Group as the inside VRF. This assures that any packet that has been considered for network address translation, with an IP source address of 192.168.10.15 on an interface configured for NAT inside, and belongs to VRF Alpha-Group will be NATed. The IP source address will be changed to 134.141.94.110.
3.
Packet A is received on VLAN 10, IP address 192.168.10.15. The VRF Alpha-Group routing table determines that 134.141.94.110 on VLAN 5 is the next hop for this route. Because the receive interface is configured for inside NAT and the destination interface is configured for outside NAT, the NAT process considers Packet A for network address translation. The static rule ip nat inside source static 192.168.10.15 134.141.94.110 inside-vrf Alpha-Group results in the source address for Packet A being changed from 192.168.10.15 to 134.141.94.110 and is routed to the next hop router out interface VLAN 5. When Packet B from IP source address 66.249.81.104 is received on IP interface 134.141.94.100, because the receiving interface is configured as NAT outside, the interface is checked against NAT global addresses, and the IP destination for packet B is changed to its original source IP address: 192.168.10.15.
S Chassis(su)->router Alpha-Group S Chassis(su-*ha-Group)->configure S Chassis(su-*ha-Group-config)->interface vlan 10 S Chassis(su-*ha-Group-config-intf-vlan.0.10)->ip address 192.168.10.1/24 S Chassis(su-*ha-Group-config-intf-vlan.0.10)->ip nat inside S Chassis(su-*ha-Group-config-intf-vlan.0.10)->exit S Chassis(su-*ha-Group-config)->exit S Chassis(su-*ha-Group)->exit S Chassis(su)->router Internet-Access S Chassis(su-*t-Access)->configure S Chassis(su-*t-Access-config)->interface vlan 5 S Chassis(su-*t-Access-config-intf-vlan.0.5)->ip address 134.141.94.100/24 S Chassis(su-*t-Access-config-intf-vlan.0.5)->ip nat outside S Chassis(su-*t-Access-config-intf-vlan.0.5)->exit S Chassis(su-*t-Access-config)->ip nat inside source static 192.168.10.15 134.141.94.110 inside-vrf Alpha-Group
2.
VRF Overview
3. 4. 5.
On VRF Internet-Access, configure a standard access-list named dynamic-nat with a permit host 192.168.10.15 entry. On VRF Internet-Access, configure an IP NAT pool named internet-out containing outside address range 134.141.94.121 to 134.141.94.129. On VRF Internet-Access, configure an IP NAT inside source list with the inside access-list dynamic-nat and outside address pool internet-out, specifying Alpha-Group as the inside VRF.
Packet A is received on VLAN 10, IP address 192.168.10.15. The VRF Alpha-Group routing table determines that 134.141.94.104 on VLAN 5 is the next hop for this route. Because the receive interface is configured for inside NAT and the destination interface is configured for outside NAT, the NAT process considers Packet A for network address translation. The inside source list, configured in Step 5 above, assures that any packet being considered for network address translation, with an IP source address matching a dynamic-nat access-list permit clause, received on an interface configured for NAT inside, and belonging to VRF Alpha-Group, will be NATed. In this case, the IP source address will will be changed to a dynamically selected address from NAT pool internet-out. When Packet B from IP source address 66.249.81.104 is received on IP interface 134.141.94.100, because the receiving interface is configured as NAT outside, the interface is checked against NAT global addresses, and the IP destination for packet B is changed to its original source IP address: 192.168.10.15.
S Chassis(su)->router Alpha-Group S Chassis(su-*ha-Group)->configure S Chassis(su-*ha-Group-config)->interface vlan 10 S Chassis(su-*ha-Group-config-intf-vlan.0.10)->ip address 192.168.10.1/24 S Chassis(su-*ha-Group-config-intf-vlan.0.10)->ip nat inside S Chassis(su-*ha-Group-config-intf-vlan.0.10)->exit S Chassis(su-*ha-Group-config)->exit S Chassis(su-*ha-Group)->exit S Chassis(su)->router Internet-Access S Chassis(su-*t-Access)->configure S Chassis(su-*t-Access-config)->interface vlan 5 S Chassis(su-*t-Access-config-intf-vlan.0.5)->ip address 134.141.94.100/24 S Chassis(su-*t-Access-config-intf-vlan.0.5)->ip nat outside S Chassis(su-*t-Access-config-intf-vlan.0.5)->exit S Chassis(su-*t-Access-config)->ip access-list standard dynamic-nat S Chassis(su-*t-Access-cfg-std-acl-dyna*-nat)->permit host 192.168.10.15 S Chassis(su-*t-Access-cfg-std-acl-dyna*-nat)->exit S Chassis(su-*t-Access-config)->ip nat pool internet-out 134.141.94.121 134.141.94.129 S Chassis(su-*t-Access-config)->ip nat inside source list dynamic-nat pool internet-out inside-vrf Alpha-Group
24-8
VRF Overview
S-Series platforms. An SLB configuration consists of a virtual server, acting as the proxy device, and a server-farm made up of one or more real servers. The virtual server configuration specifies: A Virtual IP address (VIP) Either a UDP or TCP port number to listen for client requests on A server-farm from which a real server is selected to handle a client request
The server-farm configuration specifies: A list of real servers A load balancing method
The virtual server selects a real server to handle a client request for a service. SLB services can be configured on a single VRF and shared with multiple non-SLB configured VRFs, by specifying the all-vrfs parameter when configuring the virtual server. Figure 24-3 on page 24-11 presents an example of an SLB all-VRFs configuration. The packet processing and flow for this example is as follows: 1. Packet A ingresses the router on VLAN 10, IP address 192.168.10.15 of VRF Alpha-Group. Packet As destination is the virtual server 10.21.141.100 which is configured for all-VRF on VRF Services. VRFs Alpha-Group and Beta-Group contain overlapping IP networks. See VRFs With Overlapping IP Networks on page 24-5 for a full explanation of how overlapping IP networks are handled in a VRF environment. VRF Services is configured with the local-net source NAT pool with an address range 192.168.16.51 through 192.168.16.55. VRF Services performs Network Address Translation (NAT) on Packet A. An SLB binding is created, selecting the new addresses from the local-net pool. The SLB binding stores both sets of addresses that make up the network address translation. Packet A is forwarded to the selected real server by VRF Services. The real server responds with Packet B. The source address for Packet B is the real server. The destination address for Packet B is the NATed address on VRF Services. On VRF Services, Packet Bs source address is changed to the pre-NATed virtual server address 10.21.141.100 and the destination address is changed to the pre-NATed VRF Alpha-Group address 192.168.10.15. Packet B is forwarded to VRF Alpha-Group.
2.
3. 4. 5.
6.
S Chassis(su)->router Services S Chassis(su-Services)->configure S Chassis(su-Services-config)->ip nat pool local-net 192.168.16.51 192.168.16.55 S Chassis(su-Services-config)->ip slb serverfarm local-www S Chassis(su-Services-config-slb-sfarm)->real 192.168.16.101 S Chassis(su-Services-config-slb-real)->inservice S Chassis(su-Services-config-slb-real)->exit S Chassis(su-Services-config-slb-sfarm)->real 192.168.16.102 S Chassis(su-Services-config-slb-real)->inservice S Chassis(su-Services-config-slb-real)->exit S Chassis(su-Services-config-slb-sfarm)->real 192.168.16.103 S Chassis(su-Services-config-slb-real)->inservice S Chassis(su-Services-config-slb-real)->exit
VRF Overview
S Chassis(su-Services-config-slb-sfarm)->exit S Chassis(su-Services-config)->ip slb vserver WWW S Chassis(su-Services-config-slb-vserver)->virtual 10.21.141.100 tcp www all-vrfs S Chassis(su-Services-config-slb-vserver)->serverfarm local-www S Chassis(su-Services-config-slb-vserver)->source nat pool local-net S Chassis(su-Services-config-slb-vserver)->inservice S Chassis(su-Services-config-slb-vserver)->exit S Chassis(su-Services-config)->
24-10
VRF Overview
Figure 24-3
Server-Farm: local-www
PACKET B SRC: 192.168.16.101:80 DST: 192.168.16.51:1024
192.168.16.101
192.168.16.102
3
PACKET A SRC: 192.168.16.51:1024 DST: 192.168.16.101:80
Physical Router
5
192.168.16.103
VRF: Alpha-Group
192.168.10.10/24 Vlan.0.10 192.168.16.10/24 Vlan.0.16
VRF: Beta-Group
192.168.10.10/24 192.168.16.20/24 Vlan.0.100 Vlan.0.160
6 1
PACKET B SRC: 10.21.141.100:80 DST: 192.168.10.15 PACKET A SRC: 192.168.10.15 DST: 10.21.141.100:80
Configuring VRF
When forwarding the local UDP broadcasts from a VRF to a destination address on the global router or a different VRF, the DHCP relay agent must include information about itself in order for the DHCP server to determine which pool of client addresses to pull the lease from. Including Option 82 in the DHCP relay information provides the required DHCP relay information. Use the ip dhcp relay information option vpn command to include DHCP relay agent information in the packet sent to the DHCP server by the client. The following example: Enables IP forwarding for the UPD protocol on VRF Alpha-Group Enables DHCP/BOOTP relay on VLAN 10 of VRF Alpha-Group and sets the new destination address to 134.141.95.105 on VRF Internet-Access Configures the inclusion of DHCP relay agent information in the packet sent to the DHCP server by the client
S Chassis(su)->router Alpha-Group S Chassis(su-*ha-Group)->configure S Chassis(su-*ha-Group-config)->ip forward-protocol udp S Chassis(su-*ha-Group-config)->interface vlan.0.10 S Chassis(su-*ha-Group-config-intf-vlan.0.10)->ip helper-address 134.141.95.105 vrf Internet-Access S Chassis(su-*ha-Group-config-intf-vlan.0.10)->exit S Chassis(su-*ha-Group-config)->ip dhcp relay information option vpn S Chassis(su-*ha-Group-config)->
Configuring VRF
This section provides details for the configuration of VRF on the S-Series products. Table 24-1 lists VRF parameter default values. Table 24-1
Parameter SNMPv3 context Name router context
Procedure 24-1 describes how to configure VRF. Procedure 24-1 VRF Configuration
Step 1. 2. 3. Task Create the VRF, in any configuration mode, optionally specifying an SNMPv3 context name. Enter router mode for the VRF to be configured. Enter configuration mode for this VRF router instance. Command(s) set router vrf create vrf-name [context context-name] router [name] configure
24-12
5.
Optionally, when creating a policy route map, with a match IP address policy in which the interface belongs to a different VRF, configure the next hop VRF to perform the route lookup using its routing table. Optionally, when multiple VRFs contain overlapping IP networks that communicate to the outside internet, use the NAT-inside-VRF feature to differentiate the VRFs containing the overlapping IP networks.
6.
ip nat inside source static local-ip global-ip [inside-vrf vrf-name] or ip nat inside source static {tcp | udp} local-ip local-port global-ip global-port inside-vrf vrf-name virtual ip-address {tcp | udp} port [service service-name] [all-vrfs] virtual-range start-address end-address {tcp | udp} port [service service-name] [all-vrfs] ip helper-address destination-address [global] [vrf vrf-name] ip dhcp relay information option vpn
7.
Optionally, when a VRF provides LSNAT SLB services to one or more non-SLB configured VRFs, configure the virtual server or a range of virtual servers of the SLB configured VRF with the all-VRFs feature Optionally, in interface configuration mode, when forwarding local UDP broadcasts to a new destination address, on a different VRF, specify the destination VRF using the vrf parameter. In addition, in VRF configuration mode, specify that option 82 information be included in packets sent to the DHCP server by the client.
8.
Table 24-2
Term
shared-access-VRF SNMPv3 context Virtual Routing and Forwarding (VRF) VRF instance
24-14
25
IP Routing Configuration
This document describes IPv4 and IPv6 routing configuration on Enterasys S-Series devices.
For information about... The Router The Routing Interface IP Static Routes IPv6 Neighbor Discovery Configuring IPv6 Neighbor Discovery Configuring IPv6 ICMP DHCPv6 Relay Agent The ARP Table IP Broadcast Router Management and Information Display IP Debug Terms and Definitions Refer to page... 25-1 25-4 25-11 25-16 25-18 25-19 25-19 25-20 25-24 25-26 25-29 25-30
The Router
The current firmware implementation supports a single default Virtual Routing and Forwarding (VRF) router named global and up to 128 VRF instances, depending upon your system. See Chapter 24, Virtual Routing and Forwarding (VRF) Configuration for VRF feature and configuration details. There are two ways of accessing the global VRF router configuration: Directly from global configuration mode, accessed by entering the configure command from the system command mode First entering router command mode from system command mode using the router command, specifying global as the name of the router, followed by entering the configure command to gain access to the router configuration mode
To enter a non-global VRF router instance, use the router command, specifying the name of the VRF instance to configure, followed by entering the configure command to gain access to the router configuration mode for that VRF instance. Once in either router configuration or global configuration command mode, the same set of router configuration commands are available to you.
The Router
Use the clear router vrf command to clear the routing configuration for the global router or the specified VRF router instance on the device. This is a very powerful command that should only be used if you intend to completely clear all router and interface configuration for the specified VRF router. Unless attached via a direct console connection, loss of management connectivity to the VRF router should be expected after using the clear router vrf command.
S Chassis(rw-router-config)->
To enter the global VRF router configuration context from the router configuration command mode, and verify the current router context, enter:
S Chassis(rw)->router global S Chassis(rw-router)->configure S Chassis(rw-router-config)->show router Router Services are currently running on module 1. VRF Context RD : global : not set
S Chassis(rw-router-config)->
Table 25-1 describes how to enter router configuration mode. Table 25-1
Task In system configuration mode, enter router command mode for the specified router. Supported routers: global or a named VRF created using the set router vrf create command. To enter router configuration command mode for the global or named VRF router, use the configure command in router command mode. The global router can also be configured in global configuration command mode.
25-2
IP Routing Configuration
The Router
the current VRF context. The following example displays a sample output of the show limits command:
S Chassis(su)->show limits Chassis limits: Application Limit In use Entry size Total Memory
-------------------------------- --------- --------- ------------ -----------access-lists access-list-entries access-list-entries-per-list applied-access-lists applied-ipv4-in applied-ipv4-out applied-ipv6-in applied-ipv6-out appsvc-ftp-alg-entries appsvc-global-bindings . . . Total Memory 529.7M 1000 5000 5000 4096 1024 1024 1024 1024 8000 65536 0 0 0 0 0 0 0 0 0 6.2K 160B 152B 40B 104B 6M 781.6K 152.1K 312.5K 6.5M
S Chassis(su)->
Use the show running-config command to display non-default router configuration for either all or a specified option. When specifying all, both default and non-default configuration displays. Additional options are available for the display of a subset of the running configuration by feature or protocol. Enter the show running-config ? command for a listing of the additional options. The following example displays a sample output of the show running-config command:
S Chassis(su)->show running-config # **** Global Router Configuration **** configure terminal ! interface vlan.0.1 ip address 100.10.10.10 255.0.0.0 primary ip dvmrp no shutdown exit interface vlan.0.56 . . . S Chassis(su)->
IP Routing Addresses
IPv4 Interface Address
A single primary network IPv4 address is configurable on an interface. Up to 100 secondary network IPv4 addresses are configurable. The first network IP address assigned to an interface is the primary whether explicitly configured as primary or not. To configure a secondary network IP address on an interface, the address must be explicitly configured as secondary, otherwise you will be queried as to whether you want to overwrite the current primary. In the following example the IP address is set to 99.0.0.1/24. This setting is followed by an attempt to configure 99.0.0.2/16 as a secondary address, while failing to specify the secondary keyword. When queried as to whether the primary IP address should be changed, n is entered. The secondary keyword is added on the next line. The show running-config command output confirms the configuration:
S Chassis(rw-config-intf-vlan.0.99)->ip address 99.0.0.1/24 S Chassis(rw-config-intf-vlan.0.99)->ip address 99.0.0.2/16 Do you want to replace primary IP address (y/n) [n]?n S Chassis(rw-config-intf-vlan.0.99)->ip address 99.0.0.2/16 secondary S Chassis(rw-config-intf-vlan.0.99)->show running-config interface vlan.0.99 # **** VRF default (default) **** configure terminal ! interface vlan.0.99 ip address 99.0.0.1 255.255.255.0 primary ip address 99.0.0.2 255.255.0.0 secondary exit !
25-4 IP Routing Configuration
exit S Chassis(rw-config-intf-vlan.0.99)->
The ip address command in interface configuration command mode is used to assign IP networks as primary or secondary to a routing interface. See IPv6 Interface Address on page 25-5 for IPv6 address configuration information. The no ip address command removes the specified IPv4 address configuration for this interface.
S Chassis(rw)->configure S Chassis(rw-config)->interface vlan 1 S Chassis(rw-config-intf-vlan.0.1)->ip address 10.21.130.59 255.255.128.0 S Chassis(rw-config-intf-vlan.0.1)->no shutdown S Chassis(rw-config-intf-vlan.0.1)->exit S Chassis(rw-config)->
See the current firmware release notes for the number of routing interfaces supported on an S-Series routing module. Each interface can be configured for the RIP, BGP and/or OSPF routing protocols. A primary IP address must be configured on each routing interface. Secondary IP addresses can optionally be configured. See the current firmware release notes for the number of secondary addresses supported on an interface and module. Use the ip address command in interface configuration command mode to assign an IP address and optional secondary IP addresses to an interface, specifying whether the assigned address is primary or secondary. S-Series routing interfaces support Equal Cost Multipath (ECM). ECM is a routing technique for routing packets along multiple paths of equal cost. Two algorithms are available for ECM routing: Hash threshold Path selection is based upon a firmware generated hash. This is the default algorithm Round robin Path selection is based upon a simple round robin algorithm
Use the ip ecm-forwarding-algo command to set the ECM forwarding algorithm for this S-Series device. ECM forwarding uses the hash threshold algorithm by default.
EUI-64 is an IPv6 address automatic interface addressing capability. By implementing the IEEE's 64-bit Extended Unique Identifier (EUI-64) format, a host can automatically assign itself a unique 64-bit IPv6 interface identifier without the need for manual configuration or DHCP. This is accomplished on Ethernet interfaces by referencing the already unique 48-bit MAC address and reformatting that value to match the EUI-64 specification as specified in RFC 2373. When configuring an EUI-64 address, the specified prefix must have a length of 64. A general prefix allows an assigned name to represent a network prefix from which longer IPv6 addresses can be configured. The sub-bits added to the general prefix can both extend the network prefix by adding to the specified prefix length, as well as complete the IPv6 address. Use the ipv6 general-prefix command to configure a general prefix. See IPv6 General Prefix on page 25-6 for general prefix details. Use the show ipv6 interface command to display IPv6 addresses assigned by the ipv6 address command. See IPv4 Interface Address on page 25-4 for IPv4 address configuration information. The no ipv6 address command removes the specified IPv6 address configuration for this interface.
vlan.0.51 is Operationally down, Administratively down IPv6 is enabled link-local address is fe80::211:88ff:fe7c:32c1%vlan.0.51 Global unicast address(es): 2001:11ac:fd34:50:0:0:abcd:33, subnet is 2001:11ac:fd34:50::/64 ... S Chassis(su-config-intf-vlan.0.51)->
25-6
IP Routing Configuration
This example sets the IPv6 link local address for interface VLAN 50 to fe80:1234:5678::300:
S Chassis(su-config)->interface vlan 50 S Chassis(su-config-intf-vlan.0.50)->ipv6 address fe80:1234:5678::300 link-local Do you want to replace IPv6 link-local address (y/n) [n]?y S Chassis(su-config-intf-vlan.0.50)->
This example sets an IPv6 EUI-64 address for interface VLAN 50 based upon the prefix 2001:febd:1234:0/64, and displays the EUI-64 address in the interface output:
S Chassis(su-config)->interface vlan 50 S Chassis(su-config-intf-vlan.0.50)->ipv6 address 2001:febd:1234:0/64 eui-64 S Chassis(su-config-intf-vlan.0.50)->show ipv6 interface vlan.0.50 vlan.0.50 is Operationally down, Administratively down IPv6 is enabled link-local address is fe80::2e0:63ff:fe6b:1d26%vlan.0.50 Global unicast address(es): 2001:febd:1234::2e0:63ff:fe6b:1d26, subnet is 2001:febd:1234::/64 [EUI] ... S Chassis(su-config-intf-vlan.0.50)->
A non-routing host management IP interface can now be configured: In interface configuration command mode using the interface command In any command mode using an enhanced set ip address command
When configuring the non-routing host management IP interface in interface configuration command mode you must explicitly set the interface as a non-forwarding interface using the no ip forwarding command for IPv4 forwarding or the no ipv6 forwarding command for IPv6 forwarding. IPv6 forwarding is disabled by default. On an IPv4 interface, you must disable IP Proxy ARP using the no ip proxy-arp command.
When configuring a non-routing host management IPv4 and IPv6 interfaces in any command mode, use the set ip address command. The IP address is assigned to the specified interface. The set ip address command automatically configures the specified interface to disable both IP forwarding and IP Proxy ARP for IPv4. IPv6 forwarding is disabled by default and IPv6 proxy is not supported. This command can only be used in a non-routing host management IP interface context. The set ip address command only allows for the specifying of a primary IPv4 address or an IPv6 address. If you wish to configure a non-forwarding IP interface with secondary IP addresses, use the interface command in configuration command mode to configure the interface. IPv6 addressing makes no distinction between primary and secondary addresses and treats IPv6 addresses equally. When clearing an IPv4 or IPv6 address, the IP address to be cleared is explicitly stated. This command can be used on a primary IPv4 address or any IPv6 address. Use the no ip address command in interface configuration command mode to clear a secondary IP address. The clear ip address command will not clear the interface the IP address is assigned to. Use the clear ip interface command to clear the IP interface the IP address is assigned to. The following example clears the IP address 125.100.10.1 assigned to VLAN 5 in the example above and then deletes IP interface VLAN 5:
S Chassis(rw)->clear ip address 125.100.10.1 S Chassis(rw)->clear ip interface vlan.0.5
The above example is replicated below using the set ip address command in system command mode:
S Chassis(rw)->set ip address 125.50.10.1 mask 255.255.0.0 interface vlan.0.1 S Chassis(rw)->set ip address 125.100.10.1 mask 255.255.0.0 interface vlan.0.5
25-8
IP Routing Configuration
S Chassis(rw)->
In release 7.x, this method is still supported for the configuration of a single non-routing host management interface.
Note: When using the legacy method of configuring a single non-routing host management interface, the set ip address command interface parameter is optional, though recommended. You must explicitly specify the interface when configuring multiple IP interfaces.
MAC-Address is: 0011.880c.9f78 The name of this device is vlan.0.1 MTU is 1500 bytes The bandwidth is 10000 Mb/s Encapsulation ARPA, Loopback not set ARP type: ARPA, ARP Timeout: 3600 seconds
Use the show ip interface command to display information for interfaces configured for IP.
S Chassis(rw-config)->show ip interface vlan.0.1 vlan.0.1 is Operationally up, Administratively up IP Address 10.21.130.59 Mask 255.255.128.0 IP forwarding enabled Frame Type ARPA MAC-Address 00.11.88.0c.9f.78 Incoming IPv4 Access list is Incoming IPv6 Access list is Outgoing IPv4 Access list is Outgoing IPv6 Access list is Directed-broadcast is disabled MTU is 1500 bytes ARP Timeout is 3600 seconds ARP Retransmit Time is 1 seconds ARP Stale-Entry-Timeout is 1200 seconds Proxy ARP is disabled Gratuitous ARP updating is set to update on ARP replies and ARP requests Gratuitous ARP learning is not set ICMP Re-Directs are enabled ICMP Echo Replies are always sent ICMP Mask Replies are always sent NAT INSIDE: Not Set
NAT OUTSIDE: Not Set TWCB Redirect Outbound WebCache: Not Set Policy routing disabled S Chassis(rw-config)->
This example shows how to display IPv6 configuration information for VLAN 51:
S Chassis(rw)->show ipv6 interface vlan.0.51
vlan.0.51 is Operationally down, Administratively down IPv6 is enabled link-local address is fe80::21f:45ff:fe5b:f5cf%vlan.0.51 Global unicast address(es): 2001:11ac:fd34:50::abcd:33, subnet is 2001:11ac:fd34:50::/64 Joined group address(es): (None) IPV6 forwarding disabled
25-10
IP Routing Configuration
IP Static Routes
IPV6 address auto-configuration is enabled MTU is 1500 bytes ICMP error messages limited to one every 100 milliseconds Sending of ICMP Destination Unreachable Messages is enabled Sending of ICMP Redirect Messages is enabled Sending of ICMP Echo-Reply Messages is enabled ND DAD is enabled, number of DAD attempts: 1 S Chassis(rw)->
Procedure 25-1 describes how to configure the routing interface. Procedure 25-1 Configuring the Routing Interface
Step 1. Task Enter router interface configuration command mode for the specified interface, from either global configuration or router configuration command mode. Set the primary, and optionally the secondary, IPv4 address for this interface, in interface configuration command mode. Optionally, configure an IPv6 general prefix in global configuration mode to be assigned to an IPv6 address. Set the IPv6 address for this interface in interface configuration command mode. Optionally disable IPv4 forwarding on this interface. Optionally enable IPv6 forwarding on this interface. Optionally, set the Equal Cost Multipath (ECM) forwarding algorithm for forwarding IP packets on routing interfaces, from global configuration command mode. Enable this interface along with any changes made, in interface configuration command mode. Command(s) interface {vlan vlan-id | loopback loopback-id | interface-name}
2.
ip address {ip-address | ip-address/prefixLength} ip-mask [primary | secondary] ipv6 general-prefix name prefix/length
3.
4.
ipv6 address {link-local-address link-local | ipv6-address/length | ipv6-prefix/length eui-64 | autoconfig | general-prefix sub-bits/length} no ip forwarding ipv6 forwarding ip ecm-forwarding-algo [hash-thold | round-robin]
5. 6. 7.
8.
no shutdown
IP Static Routes
An IP static route can be configured as a traffic forwarding route or as a non-forwarding management route for both IPv4 and IPv6. Traffic forwarding static routes are configured in global configuration mode using the ip route command for IPv4 routes and the ipv6 route command for IPv6 routes. See Traffic Forwarding IP Static Routes for a traffic forwarding static route discussion. Non-forwarding management routes can be configured using either the ip route or ipv6 route commands in configuration command mode or the set ip route in any command mode. See Traffic Non-Forwarding IP Static Routes on page 25-14 for a non-forwarding static route discussion.
IP Static Routes
An administrative distance can be optionally configured that is used for route selection preference. The lower the numeric distance value, the greater the preference for the route. An OSPF tag-ID can be specified. Routes are managed by the RTM (Route Table Manager) and are contained in the RIB (Route Information Base). The RIB contains up to 8 equal cost routes from any route source to each network and installs these routes in the FIB (Forwarding Information Base). The routes in the FIB are distributed to every module for use by the router's ingress module as frames are received. Traffic forwarding IP static routes are configured using the ip route command for IPv4 routes or the ipv6 route command for IPv6 routes, in global configuration mode.
The following example enters a static route with no next-hop interface specified. The route prefix and length is 33.1.1.0/24 and the next-hop is 133.1.1.2.
S Chassis(rw-config)->ip route 33.1.1.0/24 133.1.1.2
25-12
IP Routing Configuration
IP Static Routes
This is a legacy format. You are not prevented from entering the route in this format, but the behavior has changed as follows: A search of all configured subnets for a subnet containing the next-hop 133.1.1.2 is performed. That search will determine that this next-hop is on interface vlan.0.333 as indicated in the configuration above. The configured route will be as if you had entered the command:
S Chassis(rw-config)->ip route 33.1.1.0/24 133.1.1.2 interface vlan.0.333
Should an interface not be found for this next-hop, the route will be configured as if you specified the route as a recursive route as follows:
S Chassis(rw-config)->ip route 33.1.1.0/24 133.1.1.2 recursive
The following example enters a static route for prefix and length 33.1.2.0/24 with a next-hop of 144.1.1.2, but this time specifying the interface, vlan.0.444, that the next-hop is on:
S Chassis(rw-config)->ip route 33.1.2.0/24 144.1.1.2 interface vlan.0.444
The following example configures a blackhole route for prefix and length 192.168.1.0/24. Packets destined for blackhole routes are silently dropped. An ICMP network unreachable message is not sent to the packet source.
S Chassis(rw-config)->ip route 192.168.1.0/24 blackhole
The following example configures a reject route that overlaps the 192.168.1.0/24 blackhole route for prefix and length 192.168.1.0/30. In this case, packets destined for this next-hop are also dropped, but an ICMP network unreachable message is sent to the packet source:
S Chassis(rw-config)->ip route 192.168.1.0/30 reject
The following example configures an overlapping route allowing frames to 192.168.1.5 and 192.168.1.6 to be forwarded to next-hop 100.1.1.3 on interface vlan.0.100:
S Chassis(rw-config)->ip route 192.168.1.4/30 100.1.1.3 interface vlan.0.100
Use the show ip route command to display IP routes for this device. Route display can be narrowed by specifying route type: connected, ospf, rip, or static. The show ip route command output for this series of inputs is:
S Chassis(rw-config)->show ip route Host IP Route Table for VRF default Codes: C-connected, D-dynamic, H-host, S-static *-no forwarding interface
S* C* H S S C H C H H C C H S*
10.0.0.0/8 10.21.128.0/17 10.21.130.151 33.1.1.0/24 33.1.2.0/24 100.1.1.0/24 100.1.1.2 101.1.1.0/24 101.1.1.2 127.0.0.1 133.1.1.0/24 133.1.1.0/24 133.1.1.1 134.141.0.0/16
10.21.128.1 10.21.130.151 10.21.130.151 133.1.1.2 144.1.1.2 100.1.1.2 100.1.1.2 101.1.1.2 101.1.1.2 127.0.0.1 133.1.1.1 direct 133.1.1.1 10.21.128.1
vlan.0.4000 vlan.0.4000 lo.0.1 vlan.0.333 vlan.0.444 vlan.0.100 lo.0.1 vlan.0.100 lo.0.1 lo.0.1 vlan.0.333 vlan.0.333 lo.0.1 vlan.0.4000
Enterasys S-Series Configuration Guide 25-13
IP Static Routes
192.168.1.4/30
100.1.1.3
vlan.0.100
Number of routes = 15
Use the show ip protocols command to display information about IP protocols running on this device.
S Chassis(rw-config)->interface vlan.0.4000 S Chassis(rw-config-intf-vlan.0.4000)->ipv6 forwarding S Chassis(rw-config-intf-vlan.0.4000)->exit S Chassis(rw-config)->ipv6 route 2001:11ac:fd34::/48 2001:11ac:fd34:3333::4 interface vlan.0.4000 tag 65514 S Chassis(rw-config)->
In interface configuration mode, set the IPv6 routing interface for this static route to allow forwarding of IPv6 traffic. Optionally, in global configuration command mode, configure IPv6 static routes.
ipv6 route prefix/length {ipv6-address [recursive | interface interface-name] | interface interface-name | vlan vlan-id | blackhole | reject} [distance] [tag tag-id]
25-14
IP Routing Configuration
IP Static Routes
The second method is using the legacy command set ip route in system configuration mode specifying an IPv4 or IPv6 destination address. For static routes that will be used to route transit frames, use the ip route or ipv6 route command as described in section Traffic Forwarding IP Static Routes on page 25-12.
The following example uses the legacy method of configuring a non-forwarding static route from the system command mode with a destination of 192.122.173.42 and a gateway of 192.122.168.38:
S Chassis(rw)->set ip route 192.122.173.42 192.122.168.38
The following example uses the legacy method of configuring a non-forwarding static route from the system command mode with a destination of 192.122.173.50 and a next-hop interface of VLAN 50:
S Chassis(rw)->set ip route 192.122.173.50 vlan.0.50
Procedure 25-2 describes how to configure a non-forwarding IP traffic route. Procedure 25-2 Configuring Non-forward IP Static Routes
Step 1. Task In interface configuration mode, set the routing interface for this static route to not forward IP traffic. In global configuration mode, configure the static route. Command(s) no ip forwarding
2.
ip route {prefix mask | prefix/prefix-length}{ip-address [recursive] | interface interface-name| vlan vlan-id} [distance] [tag tag-id] [blackhole] [reject] ipv6 route prefix/length {ipv6-address [recursive | interface interface-name] | interface interface-name | vlan vlan-id | blackhole | reject} [distance] [tag tag-id] set ip route {destination | default} {gateway | interface} [mask]
3.
Optionally, in global configuration command mode, configure IPv6 static routes. IPv6 forwarding is disabled by default. Alternatively, in system configuration mode, configure the non-forwarding static route. This method supports legacy configurations. It is recommended that you use the method described in steps 1 - 3.
4.
The S-Series implements the neighbor discovery protocol by sending neighbor advertisement and neighbor solicitation messages to determine its neighbors and to perform unreachability detection and DAD. The S-Series sends router advertisement messages to advertise its presence and also various link and Internet parameters. Router advertisements sent by the S-Series can contain prefixes that are used for determining whether another address shares the same link (on-link determination) and for address autoconfiguration by hosts on that link. S-Series
Notes: The S-Series does not support router preferences, as defined in RFC 4191.
Neighbor solicitation and neighbor advertisement messages are used to dynamically build the neighbor discovery cache. Entries in the neighbor discovery cache can also be statically configured in global configuration mode. Other neighbor discovery parameters are configured at the interface configuration level.
25-16
IP Routing Configuration
unicast neighbor solicitation messages that solicit neighbor advertisements as reachability confirmation from the next hop.
IPv6 Address --------------------------------------2001:11ac:fd34:3333:0:0:0:3 2501:0:0:0:0:0:0:4 fe80:0:0:0:21f:45ff:fe5b:f5cf 2502:0:0:0:0:0:0:4 fe80:0:0:0:21f:45ff:fe5b:f5cf fe80:0:0:0:21f:45ff:fe5b:f5cf fe80:0:0:0:21f:45ff:fe5b:f5cf 3014:0:0:0:0:0:0:4 fe80:0:0:0:21f:45ff:fe5b:f5cf --------------------------------------Neighbor Entries Found: 9 S Chassis(su-config)->
Hardware Address Flg Age Updated Expire Interface Port ----------------- --- ---------- ------- ------ ----------- -------11-11-11-11-11-11 FR 1m - vlan.0.2501 host.0.1 00-1f-45-5b-f5-cf LR 1h01m - vlan.0.2501 host.0.1 00-1f-45-5b-f5-cf LR 1h01m - vlan.0.2501 host.0.1 00-1f-45-5b-f5-cf LR 18h26m - vlan.0.2502 host.0.1 00-1f-45-5b-f5-cf LR 18h26m - vlan.0.2502 host.0.1 00-1f-45-5b-f5-cf LR 18h26m - vlan.0.2503 host.0.1 00-1f-45-5b-f5-cf LR 18h26m - vlan.0.2504 host.0.1 00-1f-45-5b-f5-cf LR 18h26m - vlan.0.3014 host.0.1 00-1f-45-5b-f5-cf LR 18h26m - vlan.0.3014 host.0.1 ----------------- --- ---------- ------- ------ ----------- --------
ipv6 nd managed-config-flag
25-18
IP Routing Configuration
Procedure 25-3 Configuring an IPv6 Static Neighbor Discovery Cache Entry (continued)
Task In interface configuration monde, Optionally stop sending router advertisements on the IPv6 interface. In interface configuration mode, Optionally modify the number of milli-seconds the router is considered to be reachable on this IPv6 interface. Command(s) ipv6 nd ra suppress ipv6 nd reachable interval
The following example sets the DHCPv6 destination server address to the link-local address fe80::21f:45ff:fe5b:f5cf and specifies VLAN 100 as the destination server interface:
S Chassis(su-config)->interface vlan 50 S Chassis(su-config-intf-vlan.0.50)->ipv6 dhcp relay destination fe80::21f:45ff:fe5b:f5cf vlan.0.100 S Chassis(su-config-intf-vlan.0.50)->
The following example sets the DHCPv6 destination server address to 2001:2010::00aa:
S Chassis(su-config)->interface vlan 50 S Chassis(su-config-intf-vlan.0.50)->ipv6 dhcp relay destination 2001:2010::00aa S Chassis(su-config-intf-vlan.0.50)->
The following example overrides the source interface for IPv6 DHCP relayed messages on VLAN 50 and sets it to loopback interface 1:
S Chassis(su-config)->interface vlan 50 S Chassis(su-config-intf-vlan.0.50)->ipv6 dhcp relay source-interface lpbk.0.1 S Chassis(su-config-intf-vlan.0.50)->
Procedure 25-6 describes how to configure the DHCPv6 relay agent. Procedure 25-5 Configuring the DHCPv6 Relay Agent
Step 1. Task In interface command mode, configure the IPv6 DHCP relay agent to forward an IPv6 DHCP request from a client or other relay agent to the destination server or relay agent address. In either global configuration or interface command mode, configure a source interface when relaying received messages for this device or on a per interface basis. Command(s) ipv6 dhcp relay destination ipv6-address [interface]
2.
25-20
IP Routing Configuration
Gratuitous ARP
Gratuitous ARP provides an ARP announcement packet containing valid sender hardware and protocol addresses for the host that sent it. Such a request is not intended to solicit a reply, but merely updates the ARP caches of other hosts that receive the packet. Gratuitous ARP is usually an ARP request, but it may also be an ARP reply. ARP announcements are sent out during startup. This helps to resolve problems which would otherwise occur if, for example, an IP-address-to-MAC-address mapping changed because a network card was replaced. In this example, gratuitous ARP solves the problem of remote hosts that still have the old mapping in their ARP caches. The S-Series provides for setting the behavior when an ARP announcement is received for an already existing ARP table entry or for a non-existing ARP table entry, referred to as ARP learning. IP gratuitous ARP is disabled by default for the modification of pre-existing ARP table entries and the learning of new table entries. Use the ip gratuitous-arp command in interface configuration command mode to: Configure the device to ignore gratuitous ARP announcements received for existing ARP table entries (the default) Configure the device to change the ARP table if the gratuitous ARP announcement is a reply Configure the device to change the ARP table if the gratuitous ARP announcement is a request.
Use the ip gratuitous-arp-learning command, in interface configuration command mode, to allow an interface to learn new ARP bindings using gratuitous ARP. This command is disabled if ip gratuitous-arp ignore is configured (default setting). Otherwise it will learn new ARP bindings from reply, request, or both types of ARP announcements, based upon the option specified in this command. Gratuitous ARP configuration does not affect normal ARP operations. Normal ARP packets (non gratuitous) will always be learned and updated regardless of gratuitous ARP configuration.
Proxy ARP
Proxy ARP provides for the ability of a device on a given network to answer the ARP queries for a network address that is not on that network. The ARP Proxy, being aware of the traffic destinations location, provides its own MAC address in reply. Serving as an ARP Proxy for another host effectively directs LAN traffic to the Proxy. The directed traffic is then typically routed by the proxy to the intended destination via another interface. Proxy ARP is enabled by default. Typically, proxy arp is only used to reply to requests for hosts that are reachable via a non-default route. Proxy ARP can be configured to respond to ARP requests for hosts that are only reachable via the default route. Proxy ARP can also be configured to respond to ARP requests that are received on the interface to which this command is applied, if the source IP address of the request is reachable on the local interface.
S Chassis(rw)->set arp 10.21.128.1 00:00:5e:00:01:01 temp S Chassis(rw)->configure S Chassis(rw-config)->arp timeout 2800 S Chassis(rw-config)->arp stale-entry-timeout 900 S Chassis(rw-config)->show arp FLAGS: U = Unresolved L = Local * = Stale S = Static V = VRRP B = Best Guess Interface
IP Address
Hardware Address
Flg Age
Updated Interface
Port
--------------- ----------------- --- ---------- ------- ----------- -------10.21.128.1 10.21.130.59 00:00:5e:00:01:01 00:11:88:0c:9f:78 B L 4h55m 5h05m 1m vlan.0.1 - vlan.0.1 ge.1.1 host.0.1
--------------- ----------------- --- ---------- ------- ----------- -------ARP Entries Found: 2 S Chassis(rw-config)->
The following example enables gratuitous ARP and ARP learning for ARP replies on VLAN 1:
S Chassis(rw)->configure S Chassis(rw-config)->interface vlan 1 S Chassis(rw-config-intf-vlan.0.1)->ip gratuitous-arp reply S Chassis(rw-config-intf-vlan.0.1)->ip gratuitous-arp-learning reply S Chassis(rw-config-intf-vlan.0.1)->exit S Chassis(rw-config)->
The following example enables proxy ARP for both default and local routes:
S Chassis(rw)->configure S Chassis(rw-config)->ip prox S Chassis(rw-config)->interface vlan 1 S Chassis(rw-config-intf-vlan.0.1)->ip proxy-arp default-route local S Chassis(rw-config-intf-vlan.0.1)->exit S Chassis(rw-config)->
Procedure 25-6 describes how to configure the ARP table. Procedure 25-6 Configuring the ARP Table
Step 1. Task In configuration command mode, add mapping entries to the ARP table with the option of configuring them as temporary. Command(s) set arp ip-address mac-address [interface interface] [temp]
25-22
IP Routing Configuration
4.
5.
Optionally, in interface configuration command ip gratuitous-arp {ignore | reply | request} mode, override the default ARP update process. ignore - Ignore all gratuitous ARP frames, no updates will occur. This option will also prevent any new learning from gratuitous arps, if the command ip gratuitous-arp-learning was used. reply - Update from gratuitous arp reply only. request - Update from gratuitous arp request only.
6.
Optionally, in interface configuration command mode, allow an interface to learn new ARP bindings using gratuitous ARP. both - Allows learning from both gratuitous arp reply and request. reply - Allows learning from gratuitous arp reply. request - Allows learning from gratuitous arp request.
7.
Optionally, in interface configuration command mode, enable proxy ARP on an interface. default-route - Sets the router to respond to ARP requests for hosts that are only reachable via the default route. Typically, proxy arp is only used to reply to requests for host that are reachable via a non-default route. local - Allows the router to respond to ARP requests that are received on the interface to which this command is applied if the target IP address of the request is reachable on the interface that received the request.
8. 9.
Optionally, in interface configuration command mode, set a MAC address on an interface. Optionally, in interface configuration command mode, remove the multicast restriction on ARP packets.
IP Broadcast
IP Broadcast
Directed Broadcast
A directed broadcast address for each physical network has all ones in the host ID part of the address. The packet originates from a network device that is not part of the destination subnet and is forwarded in the same manner as a unicast packet sent to its destination subnet. When the packet reaches the directed broadcast address, if directed broadcast is enabled on the device, it is sent to every host on the destination network or subnetwork by rewriting the directed broadcast address to that of the standard broadcast address on that destination subnet. If directed broadcast is disabled on the destination interface, directed broadcasts are dropped. Use the ip directed-broadcast command, in interface configuration command mode, to enable directed broadcasts for directed broadcasts received on this interface.
25-24
IP Routing Configuration
IP Broadcast
This example shows how to enable forwarding of Domain Naming System UDP datagrams (port 53) by naming the protocol:
S Chassis(rw-config)->ip forward-protocol udp domain
Procedure 25-7 describes how to configure IP broadcast. Procedure 25-7 Configuring IP Broadcast
Step 1. 2. Task In interface configuration command mode, enable IP directed broadcasts on an interface. In configuration command mode, optionally, enable UDP broadcast forwarding and specify the destination port number or keyword that controls the forwarding protocol. port - 1 - 65535 bootps - Specifies the Bootstrap Protocol server (67) port. domain - Specifies the Domain Name Service (53) port. nameserver - Specifies the IEN116 name service (42) port. netbios-dgm - Specifies the NetBIOS datagram service (138) port. netbios-ns - Specifies the NetBIOS name service (137) port. tacacs - Specifies the Terminal Access Controller Access Control System (49) port. tftp - Specifies the Trivial File Transfer Protocol (69) port. time - Specifies the Time (37) port. 3. In interface configuration command mode, optionally, enable DHCP/BOOTP relay and the forwarding of local UDP broadcasts, specifying a new destination address. In interface configuration command mode, optionally insert the VPN option (82) into the relay agent DHCP packet. ip helper-address address Command(s) ip directed-broadcast ip forward-protocol udp [port]
4.
The DHCP/BOOTP relay agent function will detect the DHCP request and make the necessary changes to the header, replacing the destination address with the address of the server and the source with its own address, and then send it to the server. When the response comes from the server, the DHCP/BOOTP relay function sends it to the host.
Enterasys S-Series Configuration Guide 25-25
Use the ip helper-address command in conjunction with the ip forward-protocol command to configure DHCP/BOOTP relay functionality to the specified server(s). When forwarding the local UDP broadcasts from a VRF to a destination address on a different VRF, the DHCP relay agent needs to include information about itself in order for the DHCP server to determine which pool of client addresses to pull the lease from. Including Option 82 in the DHCP relay information provides the required DHCP relay information. Use the ip dhcp relay information option vpn command to include DHCP relay agent information in the packet sent to the server by the DHCP client. When forwarding the local UDP broadcasts from a VRF to a destination address on a different VRF, the DHCP relay agent needs to include information about itself in order for the DHCP server to determine which pool of client addresses to pull the lease from. Including Option 82 in the DHCP relay information provides the required DHCP relay information. Use the ip dhcp relay information option vpn command to include DHCP relay agent information in the packet sent to the server by the DHCP client.
1200 seconds
ARP timeout
3600 seconds
25-26
IP Routing Configuration
Table 25-3
Parameter
disabled
directed broadcast
disabled
hash threshold
global
gratuitous ARP
disabled
IP ICMP echo reply IP ICMP mask reply IP ICMP redirection IP ICMP unreachable IPv4 forwarding IPv6 address autoconfiguration IPv6 forwarding
Table 25-3
Parameter
IPv6 neighbor discovery reachable time IPv6 neighbor solicitation interval IPv6 router advertisement hop limit suppression IPv6 router advertisement interval IPv6 router advertisement lifetime IPv6 router advertisement MTU IPv6 router advertisement suppression neighbor discovery Duplicate Address Detection (DAD)
1 second disabled
maximum interval: 600 seconds minimum interval: 198 seconds 1800 seconds
1500 bytes
disabled
1 attempt
proxy ARP
Table 25-5 describes how to display IP configuration information and statistics. Table 25-5
Task To display router configuration:
25-28
IP Routing Configuration
IP Debug
Table 25-5
Task
To display the application limits for this router: To display non-default, user entered configuration, or all configuration for this router: Supported applications can be determined by entering the show running-config ? command. To display configuration information for one or more interfaces: To display configuration information for one or more IPv4 routing interfaces: To display configuration information for one or more IPv6 routing interfaces: To display information about IP protocols running on this device:
show interface [interface-name] show ip interface [interface-name] [brief] show ipv6 interface [interface-name [prefix]] [brief] show ip protocols
To display information about IP routes: show ip route [host [connected | host-address | dynamic | static]] [dest-address [prefix-mask] | prefix/prefix-length | connected | ospf | rip | static | summary] To display the devices ARP table: To display debug IP packet utility settings: To display debug IP VRRP utility settings: show arp [ip-address] [interface interface] [statistics] show debugging debug ip vrrp show
IP Debug
The IP debug utility provides debug level monitoring of : BGP IP Packets OSPFv2 OSPFv3 VRRP
Within the IP packet debug utility, monitoring can be filtered based upon VLAN, MAC address, Ether type, access list or ARP address using the debug packet filter command. Debug message display can be both throttled to a specified number of messages per second or a maximum limit as well as set for a maximum or minimum level of information per message using the debug packet control command. If the maximum limit is reached, restart the packet debug utility to restart message display. By default messages display at a verbose level. The information level can also be set to brief to display less information per message. The debug ip packet-restart command restarts the packet logging process. Depending on the packet debug limit configuration, a specified number of logs will be displayed as frames are processed. By default, this is 10 logs. Use the restart command to see another 10 logs.
Use the debug ip packet command in configuration command mode to configure IP packet debug. Use the debug ip bgp command to enable the debug IP BGP utility for monitoring BGP timers, messages and routes. Use the debug ip ospf to enable the debug IP OSPFv2 utility or debug ipv6 ospf to enable the debug OSPFv3 utility for monitoring OSPF adjacencies, LSA generation, packets, and retransmissions. Use the debug packet show-statistics command to display debug statistics for packet and host counters, and IPv4 and IPv6 exceptions. Use the debug packet clear-statistics command to clear all debug utility counters. Use the show debugging command to display the current IP debug utility settings. Table 25-6 describes how to configure IP debug. All IP debug commands are accessed in configuration command mode. Table 25-6
Task Optionally, disable the debug IP packet utility. Optionally, restart the debug IP packet utility. Optionally, filter the display of debug IP packet messages by the specified criteria.
Configuring IP Debug
Command(s) no debug packet debug packet restart debug packet filter {[vlan-in-list vlan-list] [vlan-out-list vlan-list] [port-in-list port-list] [port-out-list port-list] [src-mac mac-address] [dest-mac mac-address] [etype value] [access-list access-list] [arp {ip-address netmask | ip-address/length}]} debug packet control {[throttle throttle] [limit limit] [verbose | brief]} debug ip bgp {keepalive | notification | open | route-refresh | route-add | route-ineligible | route-remove | update | dampen | timer} debug {ip | ipv6} ospf {adj | lsa-generation | packet | retransmission | trace-interface trace-interface} debug ip vrrp [advertisements | critical-ip | trace-interface trace-interface | trace-vrid vrid]
Optionally, set debug IP packet utility control parameters that throttle or limit message display and set the amount of information displayed per message. Optionally, enable the debug IP BGP utility.
25-30
IP Routing Configuration
Table 25-7
Term broadcast forwarding
directed broadcast
Duplicate Address Detection (DAD) general prefix global router gratuitous ARP
IP address IP address helper IP debug managed address configuration management interface neighbor discovery
25-32
IP Routing Configuration
26
Layer 3 Tunneling Configuration
This chapter provides information about configuring and monitoring Layer 3 tunneling on S-Series devices.
For information about... How to Use Layer 3 Tunneling in Your Network Implementing Layer 3 Tunneling Layer 3 Tunnel Overview Configuring Layer 3 Tunneling Layer 3 Tunnel Configuration Example Terms and Definitions Refer to page... 26-1 26-2 26-3 26-5 26-6 26-10
IP-IP tunneling which provides support for IPv4 over an IPv4 Layer 3 tunnel interface as defined in RFC 2003. IPv6 tunneling which provides support for IPv6 over an IPv6 Layer 3 tunnel interface as defined in RFC 2473. IPv4 to IPv6 tunneling which supports IPv4 over an IPv6 Layer 3 tunnel interface as defined in RFC 2473. IPv6 to IPv4 tunneling which supports IPv6 over an IPv4 Layer 3 tunnel interface as defined in RFC 2473.
A Layer 3 tunnel interface can be assigned to a static route using the ip route or ipv6 route command, depending upon the route IP type. The Layer 3 tunnel source and destination must be reachable either by a configured static route or a supported routing protocol such as RIP, BGP, or OSPF. If route lookup selects a route using a Layer 3 tunnel, the underlying delivery interface is determined based upon the destination address of the selected route. The Layer 3 tunnel delivery interface is displayed using the show tunnel command. See the interface command entry, in the Enterasys S-Series CLI Reference, for create, enable, and disable Layer 3 tunnel command details.
Note: Layer 3 tunnel configuration is currently supported on the Global VRF only for both ends of the tunnel. Intermediate hops within the tunnel can be configured on a non-Global VRF router.
Optionally, modify the packet Type of Service Optionally, modify the hop limit for the Layer 3 tunnel Optionally, if GRE IPv4 over IPv4 tunnel mode is not being used, configure a tunnel probe to monitor an address associated with the Layer 3 tunnel
26-2
With the static route configured, ping the destination address using the ping command to assure reachability.
IP Address
The interface IP address is the standard IP address associated with any interface and should not be confused with the Layer 3 tunnel source address which is used by the outer header to route the encapsulated payload. Use the ip address command for IPv4 addressing or the ipv6 address command for IPv6 addressing, in Layer 3 tunnel interface configuration mode, to configure an IP address on the interface.
Tunnel Mode
The tunnel mode determines the encapsulation capabilities of the tunnel. GRE mode provides for all four IPv4 and IPv6 encapsulation types. GRE mode is used when you do not want to limit the Layer 3 tunnel to a particular encapsulation type. There is also a tunnel mode specific to each of the four encapsulation types. Use a tunnel mode specific to an encapsulation type if you wish to limit the tunnel to that encapsulation type. Use the tunnel mode command in Layer 3 tunnel configuration mode to configure the Layer 3 tunnel encapsulation type. The supported encapsulation types and their associated command keywords are: GRE gre IPv4 over IPv4 ipip IPv4 over IPv6 ipip ipv6 IPv6 over IPv4 ipv6ip IPv6 over IPv6 ipv6ip ipv6
Enterasys S-Series Configuration Guide 26-3
GRE Keepalive
GRE keepalive is used to monitor the tunnel destination. The keepalive configuration only affects GRE IPv4 over IPv4 Layer 3 tunnels. Unlike a tunnel probe that is only capable of monitoring the state of the specified IP address, GRE keepalive both monitors the state of the IP address and whether the end-point was able to decapsulate the tunnel packet. A failed keepalive causes the Layer 3 tunnel to transition to the down state. When enabling GRE keepalive, specify the transmit interval that determines the period between the transmission of keepalive messages and the number of GRE keepalive retries. Use the tunnel keepalive command, in Layer 3 tunnel configuration mode, to enable GRE keepalive on a GRE IPv4 over IPv4 tunnel.
GRE Keyword
The GRE keyword, as defined in RFC 2890, is a four octet number inserted by the encapsulator. It may be used by the receiver to authenticate the source of the packet. The S-Series device does not process the GRE keyword, but supports the configuration of the parameter should a non-S-Series device require it. Use the tunnel keyword command, in Layer 3 tunnel configuration mode, to specify a GRE keyword for the Layer 3 tunnel.
Tunnel Probe
A tunnel probe is used to monitor a tunnel endpoint IP address. A tunnel probe can be used in any tunnel mode. If a probe fails, the associated tunnel is taken down. A default ICMP tunnel probe exists named $tunnel_default or a probe can be configured using the tracked object manager probe facility. See Configuring a Probe for Layer 3 Tunneling on page 10-9 for configuration details for creating and configuring a probe.
Note: It is recommended that you use GRE keepalive to monitor a GRE IPv4 over IPv4 tunnel. GRE keepalive both monitors the state of the IP address and whether the end-point was able to decapsulate the tunnel packet. All other tunnel modes only support the tunnel probe. In any case, do not configure both a GRE keepalive and tunnel probe.
Use the tunnel probe command, in Layer 3 tunnel configuration mode, specifying the tunnel destination address, to monitor the Layer 3 tunnel endpoint IP address.
Time-To-Live (TTL)
The tunnel TTL is the hop limit for the tunnel. Tunnel header TTL defaults to 64 hops. The TTL value used by the outer tunnel header can be modified. Use the tunnel ttl command, in Layer 3 tunnel configuration mode, to modify the TTL value for the packet as it transits the tunnel. When the packet is decapsulated at the tunnel destination, the original packet TTL value applies.
26-4
Checkspoof
The checkspoof feature verifies that the source address of the packet received on the interface is reachable from the receiving interface or any interface depending upon the checkspoof configuration. This feature helps protect against attacks where the source of the attack is unknown to the router. The checkspoof feature can be configured on any interface. Use the ip checkspoof or ipv6 checkspoof command in Layer 3 tunnel configuration mode to configure checkspoofing on the Layer 3 tunnel interface for the specified IP type. See the Routing Interface Commands chapter of the Enterasys S-Series CLI Reference for details on the ip checkspoof command and the IPv6 Interface Commands chapter of the Enterasys S-Series CLI Reference for details on the ipv6 checkspoof command.
Access-Groups
By applying ACLs to an access-group, access restrictions to inbound or outbound frames can be applied to an interface when operating in router mode. Access-groups can be applied to a Layer 3 tunnel interface. Use the ip access-group command to apply IPv4 ACLs to a Layer 3 tunnel interface and the ipv6 access-group command to apply IPv6 ACLs to a Layer 3 tunnel interface in Layer 3 tunnel configuration mode.
2. 3. 4. 5.
tunnel source ip-address tunnel destination ip-address ip address ip-address tunnel mode {gre | ipip [ipv6] | ipv6ip [ipv6]}
6.
7.
8.
10.
tunnel probe ip-address probe-name {default | probe-name} ip route {prefix mask | prefix/prefix-length} interface interface-name [distance] [tag tag-id] or ipv6 route prefix/length interface interface-name [distance] [tag tag-id]
11.
ip checkspoof {strict-mode | loose-mode} ipv6 checkspoof {strict-mode | loose-mode} ip access-group {access-list-number | name} {in | out} ipv6 access-group name {in | out}
13.
Refer to the Enterasys S-Series CLI Reference for more information about each command.
26-6
destination address as depicted in Figure 26-1. Figure 26-1 Layer 3 Tunnel Configuration Example
Tunnel Source
4 2 3
Router 1
Layer 3 Tunnel
5
Underlying Interface from Router 1
Network
1
Packet Source
Tunnel Destination
8
Underlying Interface from Router 2
Router 2
7
Packet Destination
1 2 3 4
PC 1, IP address 2111::2 IP address 2111::1 Router 1 underlying tunnel interface: VLAN 50 Packet Destination, IP address 2333::2
5 6 7 8
Router 1 packet ingress interface: VLAN 11 Router 1, Loopback 1, IP address 88.88.88.1 Router 2, Loopback 1, IP address 99.99.99.1 Router 2 underlying tunnel interface: VLAN 60
2. 3.
4.
The route table lookup determines that the best next hop route is using a tunnel that is sourced from loopback 1 using IP address 88.88.88.1 as the source address. The original packet header and payload is encapsulated into the outer tunnel header that has a source address of 88.88.88.1 and a destination address of 99.99.99.1. In this case, the GRE tunnel is functioning as an IPv6 over IPv4 tunnel. The route table lookup determines that the underlying interface for the tunnel is VLAN 50, because a static route exists for VLAN 50 specifying the tunnel destination address 99.99.99.1 as its route destination. The tunnel encapsulated packet is transmitted to the tunnel destination address 99.99.99.1 as a logical single hop from the point of view of the original encapsulated packet header. At the tunnel destination, the outer tunnel header is removed and routing lookup determines the next hop, based upon the best next hop to the destination address of the original packet header. The packet is routed, using a standard route lookup, however many hops required to get to the packet destination. A returning packet that is routed over the Layer 3 tunnel will use the tunnel underlying interface from the point of view of Router 2 when transiting the tunnel. In this case, the initial underlying interface for the Layer 3 tunnel is VLAN 60.
5.
6.
7. 8.
Router 1
1. 2. Configures loopback interface 1 with an IP address of 88.88.88.1, to be used as the source for the Layer 3 tunnel from the perspective of Router 1 Creates Layer 3 tunnel 1 (tun.0.1) configured for: 3. 4. GRE mode Source address 88.88.88.1 Destination address 99.99.99.1 Layer 3 tunnel interface IP address 1.1.1.1 A default tunnel probe to monitor the tunnel destination address 99.99.99.1 A Time-To-Live rewrite of 10 hops A GRE keyword of 123456
Establishes reachability with the Layer 3 tunnel destination address using a static route with the Layer 3 tunnel destination address 99.99.99.1 as the route destination over VLAN 50 Configures an IPv6 static route to prefix 2333::0/64 over tunnel 1
S Chassis(su)->configure S Chassis(su-config)->interface loopback 1 S Chassis(su-config-intf-loop.0.1)->ip address 88.88.88.1 255.255.255.255 primary S Chassis(su-config-intf-loop.0.1)->no shutdown S Chassis(su-config-intf-loop.0.1)->exit S Chassis(su-config)->interface tunnel 1 S Chassis(su-config-tun.0.1)->tunnel mode gre
26-8
S Chassis(su-config-tun.0.1)->tunnel source 88.88.88.1 S Chassis(su-config-tun.0.1)->tunnel destination 99.99.99.1 S Chassis(su-config-tun.0.1)->ip address 1.1.1.1 S Chassis(su-config-tun.0.1)->tunnel probe 99.99.99.1 probe-name default S Chassis(su-config-tun.0.1)->tunnel ttl 10 S Chassis(su-config-tun.0.1)->tunnel keyword 123456 S Chassis(su-config-tun.0.1)->no shutdown S Chassis(su-config-tun.0.1)->exit S Chassis(su-config)->ip route 99.99.99.1/32 vlan 50 S Chassis(su-config)->ipv6 route 2333::0/64 interface tun.0.1
Router 2
1. 2. Configures loopback interface 1 with an IP address of 99.99.99.1, to be used as the source for the Layer 3 tunnel from the perspective of Router 2 Creates Layer 3 tunnel 1 (tun.0.1) configured for: 3. 4. GRE mode Source Address 99.99.99.1 Destination Address 88.88.88.1 Layer 3 tunnel interface IP address 2.2.2.2 A default tunnel probe to monitor the tunnel destination address 88.88.88.1 A Time-To-Live rewrite of 10 hops A GRE keyword of 123456
Establishes reachability with the Layer 3 tunnel destination address using a static route with the Layer 3 tunnel destination address 88.88.88.1 as the route destination over VLAN 60 Configures an IPv6 static route to prefix 2111::0/64 over tunnel 1
S Chassis(su)->configure S Chassis(su-config)->interface loopback 1 S Chassis(su-config-intf-loop.0.1)->ip address 99.99.99.1 255.255.255.255 primary S Chassis(su-config-intf-loop.0.1)->no shutdown S Chassis(su-config-intf-loop.0.1)->exit S Chassis(su-config)->interface tunnel 1 S Chassis(su-config-tun.0.1)->tunnel mode gre S Chassis(su-config-tun.0.1)->tunnel source 99.99.99.1 S Chassis(su-config-tun.0.1)->tunnel destination 88.88.88.1 S Chassis(su-config-tun.0.1)->ip address 2.2.2.2 S Chassis(su-config-tun.0.1)->tunnel probe 88.88.88.1 probe-name default S Chassis(su-config-tun.0.1)->tunnel ttl 10 S Chassis(su-config-tun.0.1)->tunnel keyword 123456 S Chassis(su-config-tun.0.1)->no shutdown S Chassis(su-config-tun.0.1)->exit S Chassis(su-config)->ip route 88.88.88.1/32 vlan 60 S Chassis(su-config)->ipv6 route 2111::0/64 interface tun.0.1
The use of network layer tunneling protocols to connect disjoint networks within the same (trusted) enterprise campus network, resulting in the destination address of the Layer 3 tunnel functioning as a logical next hop. The original packet data and header that gets encapsulated into the tunnel outer header. The number of hops a packet will take before expiring and be no longer deliverable. The destination IP address used by the outer encapsulating header as the packet transits the Layer 3 tunnel. A means of monitoring both whether the tunnel endpoint is up and whether the packet has been decapsulated at the endpoint for a GRE IPv4 over IPv4 tunnel only. A GRE tunnel mode supported numeric password scheme. Specifies the encapsulation type(s) supported by the tunnel as GRE (any IP type combination) or a specific original packet IP type header over the tunnel IP type header. A means of monitoring whether the tunnel endpoint of any tunnel mode type is up. The source IP address used by the outer encapsulating header as the packet transits the Layer 3 tunnel.
Payload Time-To-Live (TTL) Tunnel Destination Address Tunnel Keepalive Tunnel Keyword Tunnel Mode
26-10
27
Routing Information Protocol (RIP) Configuration
This document describes the RIP feature and its configuration on Enterasys S-Series devices.
For information about... Using RIP in Your Network RIP Overview Configuring RIP Terms and Definitions Refer to page... 27-1 27-1 27-4 27-5
RIP Overview
This section provides an overview of RIP configuration. Enabling RIP on the device starts the RIP process which then begins populating its routing table and sending and receiving routing updates. Use the router rip command in configuration command mode to both enable RIP on the device and enter RIP configuration command mode. Within RIP configuration command mode: Attach one or more networks to the RIP process specifying the IP address of the directly connected network, followed by the wildcard mask for this network. RIP network wildcard masks are reverse networks (use 1s for dont care bits). Use the network command to attach one or more networks to this RIP process. Optionally change the preference value for using RIP as the routing protocol for this device by changing the RIP administrative distance value using the distance command. Optionally specify interfaces which will not transmit any RIP update packets using the passive-interface command.
RIP Overview
Optionally adjust routing timers associated with: The frequency of routing updates by specifying the interval, in seconds, at which routing updates are sent The expiration of routes by specifying the interval, in seconds, from the point of the last update after which a route times out and is marked as expired The deletion of routes by specifying the interval in seconds from the point of a routes expiration after which a route is deleted from the routing table
Using the timers command. Use the show ip protocols command to display RIP timer values. Specify route types that can be redistributed in RIP update messages using the redistribute command. The S-Series supports redistribution of connected and static routes, optionally specifying the hop count metric for these routes, or specifying OSPF using the process ID to redistribute.
S Chassis(rw-config)->router rip S Chassis(rw-config-rip)->network 10.10.20.0 0.0.0.255 S Chassis(rw-config-rip)->network 10.10.50.0 0.0.0.255 S Chassis(rw-config-rip)->passive-interface vlan 10 S Chassis(rw-config-rip)->passive interface vlan 20 S Chassis(rw-config-rip)->timers basic 25 150 100 S Chassis(rw-config-rip)->redistribute ospf 16546 S Chassis(rw-config-rip)->exit S Chassis(rw-config-)->
RIP Overview
Use the key-string command in key configuration command mode to specify the key string associated with this key. Use the accept-lifetime command in key configuration command mode to specify the time period during which this key can be received for authentication by interface this key chain is associated with. Use the send-lifetime command in key configuration command mode to specify the time period during which this key can be sent by the interface this key chain is associated with. Use the ip rip authentication keychain command in interface configuration command mode to specify the named key chain this interface will use when authenticating RIP packets. The following example: configures key 3 on key chain md5key, with a key string of password, an accept-lifetime and send-lifetime from the current time to infinite Configures VLAN 5 for RIP MD5 authentication Applies the md5key key chain to VLAN 5
S Chassis(rw-config)->key chain md5key S Chassis(rw-config-keychain)->key 3 S Chassis(rw-config-keychain-key)->key-string password S Chassis>Router(config-keychain-key)->accept-lifetime 02:30:00 jul 30 2009 infinite S Chassis(rw-config-keychain-key)->send-lifetime 02:30:00 jul 30 2009 infinite S Chassis(rw-config-keychain-key)->show running config . . . ! key chain md5key key 3 key-string password accept-lifetime 02:30:00 Jul 30 2009 06:28:14 Feb 7 2106 send-lifetime 02:30:00 Jul 30 2009 06:28:14 Feb 7 2106 exit exit ! S Chassis(rw-config-keychain-key)->exit S Chassis(rw-config-keychain)->exit S Chassis(rw-config)->interface vlan 5 S Chassis(rw-config-intf-vlan.0.5)->ip rip authentication mode md5 S Chassis(rw-config-intf-vlan.0.5)->ip rip authentication keychain md5key S Chassis(rw-config-intf-vlan.0.5)->exit S Chassis(rw-config)->
Configuring RIP
Configuring RIP
This section provides details for the configuration of RIP on the S-Series products. Table 27-1 lists RIP parameters and their default values. Table 27-1
Parameter RIP process distance
flush interval
120 seconds
Procedure 27-1 describes how to configure RIP. Procedure 27-1 Configuring RIP
Step 1. 2. 3. Task In configuration command mode, enable the RIP process for this device. In RIP configuration command mode, attach one or more networks to this RIP process. Optionally, in RIP configuration command mode, change the administrative distance for RIP routing on this device. Command(s) router rip network ip-address wild-card-bits distance weight
4.
Optionally, in interface configuration command ip rip offset {in | out} value mode, add an offset to the hop metric of an incoming or outgoing RIP route for this interface.
7.
key key-id
8.
key-string text
9.
accept-lifetime start-time month date year {duration seconds | end-time | infinite} send-lifetime start-time month date year {duration seconds | end-time | infinite} ip rip authentication keychain name
10.
11.
12.
13.
14.
Table 27-2
Term RIP offset
update interval expiration interval flush interval key chain key key string accept-lifetime send-lifetime passive-interface
28
Routing Information Protocol Next Generation (RIPng) Configuration
This document describes the RIPng feature and its configuration on Enterasys S-Series devices.
For information about... Using RIPng in Your Network RIPng Configuration Overview Configuring RIPng Terms and Definitions Refer to page... 28-1 28-2 28-3 28-4
Each network has an IPv6 destination address prefix and prefix length associated with it. Authentication has been removed from RIPng.
Because IPv6 addressing prefix is ambiguous concerning network addressing compared to IPv4, you do not directly specify a network destination address. Instead, you enable RIPng on the interface using the ipv6 rip enable command and the interface address is automatically set as the network destination address. An offset can be added or removed to the hop metric for all incoming or outgoing RIPng routes for a given interface. Adding an offset is used for the purpose of making an interface a backup. Use the ipv6 rip offset command in interface configuration mode to add or remove an offset for either incoming or outgoing RIPng routes.
Enables the RIPng process on this device and enters RIPng configuration command mode Configures VLANs 10 as a passive-interface Changes the RIPng timers to a 25 second update time, a 150 second expiration interval, and a 100 second flush time: Configures the redistribution of OSPF process ID 16546 routes over this RIPng process
Configuring RIPng
Configures IPv6 access-list ipv6list1 with a rule to deny route 2001:0:0:0:21f:45ff:fe3d:21be/64 and applies the ACL to the distribution-list for outgoing packets on VLAN 20 Enables RIPng on VLANs 10 and 20
S Chassis(rw-config)->ipv6 router rip S Chassis(rw-config-ripng)->passive-interface vlan 10 S Chassis(rw-config-ripng)->timers basic 25 150 100 S Chassis(rw-config-ripng)->redistribute ospf 16546 S Chassis(rw-config-ripng)->exit S Chassis(rw-config)->ipv6 access-list standard ipv6list1 S Chassis(rw-cfg-ipv6-std-acl)->deny 2001:0:0:0:21f:45ff:fe3d:21be/64 S Chassis(rw-cfg-ipv6-std-acl)->exit S Chassis(rw-config)->ipv6 router rip S Chassis(rw-config-ripng)->distribute-list ipv6list1 out vlan 20 S Chassis(rw-config-ripng)->exit S Chassis(rw-config)->interface vlan 10 S Chassis(rw-config-intf-vlan.0.10)->ipv6 rip enable S Chassis(rw-config-intf-vlan.0.10)->exit S Chassis(rw-config-)->interface vlan 20 S Chassis(rw-config-intf-vlan.0.20)->ipv6 rip enable S Chassis(su-config-intf-vlan.0.20)->exit S Chassis(rw-config)->
Configuring RIPng
This section provides details for the configuration of RIPng on the S-Series products. Table 28-1 lists RIPng parameters and their default values. Table 28-1
Parameter RIPng process distance
flush interval
120 seconds
Procedure 28-1 describes how to configure RIPng. Procedure 28-1 Configuring RIPng
Step 1. 2. Task In configuration command mode, enable the RIPng process for this device. Optionally, in RIPng configuration command mode, change the administrative distance for RIPng routing on this device. Optionally, in RIPng configuration command mode, change the basic timers associated with RIPng: Update interval Route expiration interval Route flush interval 4. Optionally, in RIPng configuration command mode, specify an interface that will be prevented from transmitting RIPng update packets. Optionally, in RIPng configuration command mode, specify a standard IPv6 ACL to be added to the distribute-list to filter networks received and to suppress networks from being advertised in RIPng updates. In RIPng configuration command mode, specify the non-RIPng protocols to be distributed in RIPng update messages. In interface configuration mode, enable RIPng on all interfaces that will use the protocol. Optionally, in interface configuration command mode, add an offset to the hop metric of an incoming or outgoing RIPng route for this interface. passive-interface vlan vlan-id Command(s) ipv6 router rip distance weight
3.
5.
6.
redistribute {bgp | connected | ospf process-id | static} [metric metric-value] [route-map route-map] ipv6 rip enable ipv6 rip offset {in | out} value
7. 8.
28-4
Table 28-2
Term
28-6
29
Open Shortest Path First (OSPFv2) Configuration
This chapter provides the following information about configuring and monitoring OSPFv2 on Enterasys S-Series devices:
For information about... Using the OSPF Protocol in Your Network Implementing OSPF OSPF Overview Configuring OSPF Refer to page... 29-1 29-2 29-3 29-20
This OSPF implementation supports RFC 2328 OSPF Version 2. The OSPF protocol is designed expressly for the TCP/IP internet environment. It provides for the authentication of routing updates, and utilizes IP multicast when sending and receiving the updates. OSPF routes IP packets based solely on the destination IP address found in the IP packet header. IP packets are not encapsulated in any further protocol headers as they transit the Autonomous System. OSPF is a dynamic routing protocol in that it quickly detects topological changes in the AS, such as router interface failures, and calculates new loop-free routes after a period of convergence. This period of convergence is short and involves a minimum of routing traffic. In a link-state routing protocol, each router maintains a database describing the ASs topology. This database is referred to as the link-state database. Each participating router has an identical database. Each individual piece of this database is a particular routers local state made up of such information as the routers usable interfaces and reachable neighbors. The router distributes its local state throughout the AS by flooding. Each network that has at least two attached routers has a designated router. The designated router generates an LSA for the network and has other special responsibilities in the running of the protocol, enabling a reduction in the number of adjacencies required on a network. This in turn reduces the amount of routing protocol traffic and the size of the link-state database.
Implementing OSPF
All routers run the exact same algorithm, in parallel. From the link-state database, each router constructs a tree of shortest paths with itself as root. This shortest-path tree provides the route to each destination in the AS. Externally derived routing information appears on the tree as leaves. When several equal-cost routes to a destination exist, traffic is distributed equally among them. The cost of a route is described by a single dimensionless metric. OSPF allows sets of networks to be grouped together. Such a grouping is called an area. The topology of an area is hidden from the rest of the AS. This information hiding enables a significant reduction in routing traffic. Also, routing within the area is determined only by the areas own topology, lending the area protection against bad routing data. An area is a generalization of an IP subnetted network. OSPF enables the flexible configuration of IP subnets. Each route distributed by OSPF has a destination and mask. Two different subnets of the same IP network number may have different masks providing a different range of addresses for that subnet. This is commonly referred to as Variable Length Subnet Masking (VLSM). A packet is routed to the longest or most specific match. Host routes are considered to be subnets whose masks are all ones (0xffffffff). All OSPF protocol exchanges are authenticated. This means that only trusted routers can participate in the ASs routing. The S-Series platform supports either simple or MD5 authentication schemes. Separate authentication schemes can be configured for each IP subnet. Route redistribution is supported for RIP, connected, and static routes.
Implementing OSPF
To implement OSPF in your network: Map out the AS including routers, network subnets, and the areas to which they belong Configure each routing interface on each router with an IP address and mask Create an OSPF routing instance for this AS Configure the network addresses, masks, and areas for each router in the AS Configure each router with a router ID Optionally determine which router will be the designated router and backup and configure OSPF priority values accordingly Optionally configure OSPF timers Optionally, configure the protocols and route types that will be redistributed over this AS Optionally configure interface cost Optionally modify the administrative distance for OSPF routes Optionally configure either simple or MD5 authentication per interface Optionally configure areas including virtual-links, stub, and NSSA Optionally enable graceful-restart
29-2
OSPF Overview
OSPF Overview
OSPF is enabled by creating an OSPF instance. Once an instance is created, the routers OSPF settings are configured with respect to the Instance ID and IP interfaces. By default, OSPF is disabled on the S-Series device. Be aware that unspecified parameters use their default values, and any parameters specified at the interface level will override the values specified at the area level.
Configuring an IP Address
An IP address must be associated with any interface that will route traffic on the router. In interface configuration mode, configure the IP address for each routing interface using the ip address command specifying the IP address and mask. For example, IP address 10.10.10.1 would be specified as 10.10.10.1 255.255.255.0. Enable the interface using the no shutdown command.
Configuring Networks
A network is made up of a number of IP routers that belong to the same IP network, subnet, or supernet as determined by a devices combined IP address and mask. An edge connecting a router to a network indicates that the router has an interface on the network. Networks can be either transit or stub networks. Transit networks are those capable of carrying data traffic that is neither locally originated nor locally destined. A stub network has only incoming edges. Use the network command in the OSPF router configuration command mode to configure networks and associated areas for this router. See section Configuring OSPF Areas on page 29-9 for information on OSPF areas and their configuration.
Note: OSPF network wildcard masks are reverse networks. This means that wherever there is a 1 in a regular netmask, use a 0 in a wildcard mask. For example, if the network mask is 255.255.255.0 (/24), specify a wildcard mask of 0.0.0.255.
OSPF Overview
Example
The following example configures the basic OSPF topology as displayed in Figure 29-1 on page 29-5:
29-4
OSPF Overview
Figure 29-1
Vlan 1 172.10.1.1/2 4
Vlan 2 172.10.2.2/24
Vlan 3 172.2.1.1/24
Vlan 2 172.10.2.1/24
Host 1 172.10.1.99/24
Router 1
Router 2
Example
The following example configures the router ID topology as displayed in Figure 29-2 on page 29-6:
Router 1
Router 1(rw)->configure Router 1(rw-config)->interface loopback 1 Router 1(su-config-intf-loop.0.1)->ip address 1.1.1.1 255.255.255.255 Router 1(rw-config-intf-vlan.0.1)->exit Router 1(rw-config)->router ospf 1 Router 1(rw-config-ospf-1)->network 10.1.2.2 0.0.0.255 area 1 Router 1(rw-config-ospf-1)->router-id 1.1.1.1 Router 1(rw-config-ospf-1)->exit Router 1(rw-config)->
Router 2
Router 2(rw)->configure Router 2(rw-config)->interface loopback 1 Router 2(su-config-intf-loop.0.1)->ip address 2.2.2.2 255.255.255.255 Router 2(rw-config-intf-vlan.0.1)->exit Router 2(rw-config)->router ospf 1 Router 2(rw-config-ospf-1)->network 10.1.2.1 0.0.0.255 area 1
OSPF Overview
Router 2(rw-config-ospf-1)->network 10.2.3.1 0.0.0.255 area 0 Router 2(rw-config-ospf-1)->router-id 2.2.2.2 Router 2(rw-config-ospf-1)->exit Router 2(rw-config)->
Router 3
Router 3(rw)->configure Router 3(rw-config)->interface loopback 1 Router 3(su-config-intf-loop.0.1)->ip address 3.3.3.3 255.255.255.255 Router 3(rw-config-intf-vlan.0.1)->exit Router 3(rw-config)->router ospf 1 Router 3(rw-config-ospf-1)->network 10.3.4.1 0.0.0.255 area 2 Router 3(rw-config-ospf-1)->network 10.2.3.2 0.0.0.255 area 0 Router 3(rw-config-ospf-1)->router-id 3.3.3.3 Router 3(rw-config-ospf-1)->exit Router 3(rw-config)->
Router 4
Router 4(rw)->configure Router 4(rw-config)->interface loopback 1 Router 4(su-config-intf-loop.0.1)->ip address 4.4.4.4 255.255.255.255 Router 4(rw-config-intf-vlan.0.1)->exit Router 4(rw-config)->router ospf 1 Router 4(rw-config-ospf-1)->network 10.3.4.2 0.0.0.255 area 2 Router 4(rw-config-ospf-1)->router-id 4.4.4.4 Router 4(rw-config-ospf-1)->exit Router 4(rw-config)->
Figure 29-2
Router 1
Router 2
Router 3
Router 4
29-6
OSPF Overview
A Backup Designated Router (BDR) is also elected in case the Designated Router (DR) fails, in which case the BDR will become the DR.
Note: A DR is required only for multi-access networks. Point-to-Point links do not need a DR because only a single adjacency is required.
To elect a DR from a host of candidates on the network, each router multicasts a hello packet and examines the priority of hello packets received from other routers. The router with the highest priority is elected the DR, and the router with the next highest priority is elected the BDR. Any router with a priority of 0 will opt out of the DR election process. See the Configuring Router Priority on page 29-7 for details on configuring router priority. If DR candidates all share non-zero priorities, OSPF applies the router ID as a tie-breaker where the highest ID is chosen DR and the next highest ID is chosen BDR.
Router 4 will not take part in the election process at all. Router 3 has the highest priority and therefore will be elected DR. Router 1 has the second highest priority and will be elected BDR.
Example
The following example provides the input required to configure the designated router topology as displayed in Figure 29-3 on page 29-8:
Router 1
Router 1(rw)->configure Router 1(rw-config)->interface vlan 1 Router 1(rw-config-intf-vlan.0.1)->ip ospf priority 25 Router 1(rw-config-intf-vlan.0.1)->exit Router 1(rw-config)->
Router 2
Router 2(rw)->configure Router 2(rw-config)->interface vlan 1 Router 2(rw-config-intf-vlan.0.1)->ip ospf priority 10 Router 2(rw-config-intf-vlan.0.1)->exit Router 2(rw-config)->
OSPF Overview
Router 3
Router 3(rw)->configure Router 3(rw-config)->interface vlan 1 Router 3(rw-config-intf-vlan.0.1)->ip ospf priority 30 Router 3(rw-config-intf-vlan.0.1)->exit Router 3(rw-config)->
Router 4
Router 4(rw)->configure Router 4(rw-config)->interface vlan 1 Router 4(rw-config-intf-vlan.0.1)->ip ospf priority 0 Router 4(rw-config-intf-vlan.0.1)->exit Router 4(rw-config)->
Figure 29-3
BDR
Area 1
Router 1
Router 2
Router 4
DR
Router 3
Default Distance
0 1 20 - Routes external to the AS 200 - Routes internal to the AS
29-8
OSPF Overview
Route Source
OSPF RIP
Default Distance
110 120
Use the distance ospf command in OSPF router configuration command mode to change the administrative distance assigned to the OSPF protocol. This command provides for the configuration of separate values for OSPF external and intra-area routes.
OSPF Overview
Example
The following example provides the input required to configure summarization of the three area topology as displayed in Figure 29-4 on page 29-11:
Area 1
ABR1(rw)->configure ABR1(rw-config)->router ospf 1 ABR1(rw-config-ospf-1)->area 1 range 10.2.0.0 255.255.0.0 ABR1(rw-config-ospf-1)->exit ABR1(rw-config)->
Area 2
ABR2(rw)->configure ABR2(rw-config)->router ospf 1 ABR2(rw-config-ospf-1)->area 2 range 10.3.0.0 255.255.0.0 ABR2(rw-config-ospf-1)->area 2 range 10.3.2.0 255.255.255.0 not-advertised ABR2(rw-config-ospf-1)->exit ABR2(rw-config)->
Area 3
ABR3(rw)->configure ABR3(rw-config)->router ospf 1 ABR3(rw-config-ospf-1)->area 3 range 10.1.0.0 255.255.0.0 ABR3(rw-config-ospf-1)->exit ABR3(rw-config)->
29-10
OSPF Overview
Figure 29-4
OSPF Overview
Example
Every router in Areas 1 and 2 are configured for a stub area (Routers 1, 2, and 3 for Area 1 and Routers 5, 6, 7, and 8 for Area 2). Additionally, ABR routers 3, 5, and 6 are also configured with a default-cost to be assigned to the stub area. Router 5 has a lower metric cost when compared to Router 6, so Router 5 will be the preferred router for packets to access the area, with Router 6 employed as a backup in case Router 5 fails. The following example provides the input required to configure the stub topology as displayed in Figure 29-5 on page 29-13:
Router 1
Router1(rw-config)->router ospf 1 Router1(rw-config-ospf-1)->area 1 stub
Router 2
Router2(rw-config)->router ospf 1 Router2(rw-config-ospf-1)->area 1 stub
Router 3
Router3(rw-config)->router ospf 1 Router3(rw-config-ospf-1)->area 1 stub Router3(rw-config-ospf-1)->area 1 default-cost 15
Router 5
Router5(rw-config)->router ospf 1 Router5(rw-config-ospf-1)->area 2 stub Router3(rw-config-ospf-1)->area 2 default-cost 15
Router 6
Router6(rw-config)->router ospf 1 Router6(rw-config-ospf-1)->area 2 stub Router6(rw-config-ospf-1)->area 2 default-cost 20
Router 7
Router7(rw-config)->router ospf 1 Router7(rw-config-ospf-1)->area 2 stub
Router 8
Router8(rw-config)->router ospf 1 Router8(rw-config-ospf-1)->area 2 stub
29-12
OSPF Overview
Figure 29-5
Router 1
Router 5
Router 7
Router 3
Router 4
Router 2
Router 6
Router 8
Example
Routers 2 and 6 are configured as the ABRs between Area 1 and 0, and Router 4 as the ASBR. Router 2 is configured to set Area 1 as an NSSA, and Type 7 routes from the connected domain will be translated to Type 5 routes into the backbone. ABR Router 2 will only translate Type 7 LSAs; static routes redistributed by router 4. Also, Router 2 will always translate, since it is configured to do so; Router 6 will not, since only one ABR will perform the translation for a given area. Router 4 will be configured to redistribute static routes. The following example provides the input required to configure the NSSA topology as displayed in Figure 29-6 on page 29-15:
OSPF Overview
Router 6 (ABR)
Router 6(rw)->configure Router 6(rw-config)->interface vlan 1 Router 6(rw-config-intf-vlan.0.1)->ip address 11.1.1.6 255.255.255.252 Router 6(rw-config-intf-vlan.0.1)->no shutdown Router 6(rw-config-intf-vlan.0.1)->exit Router 6(rw-config)->interface vlan 2 Router 6(rw-config-intf-vlan.0.2)->ip address 23.1.1.6 255.255.255.252 Router 6(rw-config-intf-vlan.0.2)->no shutdown Router 6(rw-config-intf-vlan.0.2)->exit Router 6(rw-config)->router ospf 1 Router 6(rw-config-ospf-1)->router-id 6.6.6.6 Router 6(rw-config-ospf-1)->area 1 nssa Router 6(rw-config-ospf-1)->network 11.1.1.0 0.0.0.3 area 0 Router 6(rw-config-ospf-1)->network 23.1.1.0 0.0.0.3 area 1 Router 6(rw-config-ospf-1)->exit
Router 2(ABR)
Router 2(rw)->configure Router 2(rw-config)->interface vlan 1 Router 2(rw-config-intf-vlan.0.1)->ip address 11.1.1.2 255.255.255.252 Router 2(rw-config-intf-vlan.0.1)->no shutdown Router 2(rw-config-intf-vlan.0.1)->exit Router 2(rw-config)->interface vlan 2 Router 2(rw-config-intf-vlan.0.2)->ip address 23.1.1.1 255.255.255.252 Router 2(rw-config-intf-vlan.0.2)->no shutdown Router 2(rw-config-intf-vlan.0.2)->exit Router 2(rw-config)->router ospf 1 Router 2(rw-config-ospf-1)->router-id 2.2.2.2 Router 2(rw-config-ospf-1)->network 11.1.1.0 0.0.0.3 area 0 Router 2(rw-config-ospf-1)->network 23.1.1.0 0.0.0.3 area 1 Router 2(rw-config-ospf-1)->area 1 nssa Router 2(rw-config-ospf-1)->area 1 nssa-range 10.2.0.0 255.255.0.0 Router 2(rw-config-ospf-1)->exit
Router 4 (ASBR)
Router 4(rw)->configure Router 4(rw-config)->interface vlan 2 Router 4(rw-config-intf-vlan.0.1)->ip address 23.1.1.2 255.255.255.252 Router 4(rw-config-intf-vlan.0.1)->no shutdown Router 4(rw-config-intf-vlan.0.1)->exit Router 4(rw-config)->interface vlan 3 Router 4(rw-config-intf-vlan.0.2)->ip address 30.1.1.1 255.255.255.252 Router 4(rw-config-intf-vlan.0.2)->no shutdown Router 4(rw-config-intf-vlan.0.2)->exit
29-14
OSPF Overview
Router 4(rw-config)->router ospf 1 Router 4(rw-config-ospf-1)->router-id 4.4.4.4 Router 4(rw-config-ospf-1)->network 23.1.1.0 0.0.0.3 area 1 Router 4(rw-config-ospf-1)->area 1 nssa transrole always Router 4(rw-config-ospf-1)->redistribute static metric-type 1 Router 4(rw-config-ospf-1)->exit
Figure 29-6
Backbone
Area 2
Router 6
Router 1
Router 3
Router 4
Router 5
Router 2
Example
The following example presents the configuration required to configure the virtual-link displayed in Figure 29-7 on page 29-16:
OSPF Overview
Router 1
Router 1(rw-config)->router ospf 1 Router 1(rw-config-ospf-1)->area 0.0.0.1 virtual-link 2.2.2.2 Router 1(rw-config-ospf-1)->exit Router 1(rw-config)->
Router 2
Router 2(rw-config)->router ospf 2 Router 2(rw-config-ospf-2)->area 0.0.0.1 virtual-link 1.1.1.1 Router 2(rw-config-ospf-2)->exit Router 2(rw-config)->
Figure 29-7
Area 3
Area 2
29-16
OSPF Overview
See Configuring OSPF Timers on page 29-20 for an OSPF timers discussion.
Note: RFC 2328 specifies that the retransmit-interval should be greater than the expected round-trip delay between the two routers. This may be hard to estimate for a virtual link; it is better to err on the side of making it too large.
Graceful Restart
OSPF graceful restart, sometimes referred to as non-stop forwarding, provides for an OSPF router to remain on the forwarding path during a restart of its OSPF software. Graceful-restart has three elements to its configuration: enabling, helper router, and restart interval. Enabling graceful restart instructs the firmware to perform a graceful restart, rather than a standard OSPF restart. Restart is only initiated by a fail-over. Grace LSAs are sent when OSPF is restarted on another module. Whether the failover is intentional or not, the failed router protocol is restarted on another module, and upon startup, OSPF sends grace LSAs out to its neighbors
OSPF Overview
using existing link aggregation groups. Use the graceful-restart enable command to enable the graceful restart ability on this router. The helper relationship with the restarting router is on a per network segment basis. The helper monitors the network for topology changes. If no changes occur, the helper router continues to advertise its LSAs as though no restart was occurring. If the restarting router was the designated router, the helper continues to treat it as such. If a topology change does occur, graceful restart is terminated on the restarting router and a standard restart occurs. Helper mode can be disabled on a restarting router neighbor using the ip ospf helper-disable command in interface command mode. If the restarting router receives an LSA indicating a disabled helper, the graceful restart terminates and a standard restart occurs. A restart interval provides for a maximum time in seconds after which the graceful restart will terminate should it not complete or terminate for other reasons within the interval. Use the graceful-restart restart-interval command to change the restart interval setting. View the router OSPF section of the show running-config display to verify any non-default graceful restart settings.
In a stable network, the route and rule information is fairly constant. If the router protocol process was to suddenly fail, forwarding information current at the time of the failure in all probability is usable for the short time after the failure until recovery occurs. During this recovery period, existing connections (that were not directly using the failed module) remain in effect. New connections continue to be installed using the last known good forwarding information. The router protocol process that failed is dynamically restarted. The user does not configure where the router process is running. The router forwarding process remains active on every module. The protocol process exchanges protocol and maintains state that it distributes to the other modules and does not have to run on any specific module. One exception to this rule is that the module must have 256M of memory to be router protocol process eligible. Upon failure of a module running the router protocol process, the protocol process is started on a recovery module. One of the first messages it sends to its OSPF neighbors is a grace LSA. High availability failover will successfully occur if the following is true: The router is enabled for graceful restart The neighbors are enabled to participate as graceful restart helper The OSPF dead interval is configured for a sufficient period such that the grace LSA is received by its neighbors before the configured OSPF dead interval expires And each neighbor is a member of a LAG common to the failed router, allowing the neighbor to remain up
29-18
OSPF Overview
Figure 29-8
Router Neighbor A
Neighbor B
OSPF
LAG
Router
Neighbor B
100.1.1.0/24
VLAN 100
100.1.1.0/24
VLAN 100
100.1.1.3
100.1.1.5
Figure 29-8 depicts the physical and logical configurations of the single router high availability failover mechanism. The neighbor to router lines display direct neighbor connections to the router enabled for OSPF graceful restart and members of LAGs common to the failing router. The server to router lines display VLAN connections common to both the failing and recovery routers.
Configuring OSPF
are not included in the packet, snooping the key is impossible. Network users can still snoop the contents of packets, though, because packets are not encrypted. S-Series device MD5 authentication is compliant with OSPF RFC 2328. This specification uses the MD5 algorithm and an authentication key of up to 16 characters.
To ensure efficient adjacency between OSPF neighbors, the S-Series device provides hello-interval and dead-interval commands. The hello interval is the period between transmissions of hello packet advertisements. The dead interval is the period that can elapse without receiving a routers hello packets before its neighbors will declare it down. Use the ip ospf hello-interval command in interface configuration command mode to configure the period between transmissions of hello packet advertisements. Use the ip ospf dead-interval in interface configuration command mode to configure the period between receiving hello packets before the associated neighbor is declared down. In order to ensure that flooding is reliable, LSAs are retransmitted until they are acknowledged. The period between retransmissions is the retransmit-interval. If this interval is set too low for an interface, needless retransmissions will take place. If the value is set too high, the speed of the flooding, during the period of lost packets, may be affected. Use the ip ospf retransmit-interval command in interface configuration command mode to configure the retransmit-interval. The transmit-delay is an estimation of the number of seconds it takes to transmit a link state update packet over this interface. This value should take into account transmission and propagation delays. Use the ip ospf transmit-delay command in interface configuration command mode to configure the transmit-delay. The SPF-delay is the amount of time that transpires between the receipt of an OSPF update and the SPF calculation. Use the timers spf command in OSPF router configuration command mode to specify the amount of time between receiving an OSPF update and an SPF calculation occurring. The OSPF timers can also be configured for an area virtual-link. See Configuring Area Virtual-Links on page 29-15.
Configuring OSPF
This section provides details for the configuration of OSPF on S-Series platforms.
29-20
Configuring OSPF
Default Settings
Table 29-1 lists OSPF parameters and their default values. Table 29-1
Parameter router ID
interface cost
interface priority
broadcast 4294967295 Update starts 4294967295 Update restarts 50 Inter-area/external updates 0 Intra updates
Specifies the number of units SPF calculation runs before pausing. Specifies the amount of time between receiving an OSPF update and the start of an SPF calculation. A timer that determines the retransmission of LSAs in order to ensure reliable flooding. Specifies the number of seconds it takes to transmit a link state update packet over this interface. The period between transmissions of hello packet advertisements.
10000 5 seconds
retransmit interval
5 seconds
transmit delay
1 second
hello interval
10 seconds for broadcast and point-to-point networks; 30 seconds for non-broadcast and point-to-multipoint networks 40 seconds
dead interval
The period that can elapse without receiving a routers hello packets before its neighbors will declare it down.
Configuring OSPF
Table 29-1
Parameter distance
graceful-restart
120 seconds
Procedure 29-1 describes how to configure basic OSPF parameters. All commands in this procedure are entered in OSPF router configuration command mode, except where indicated. Procedure 29-1 Configuring Basic OSPF Parameters
Step 1. Task Configure an IP address for all routing interfaces in the AS. primary - (Optional) Specifies that the configured IP address is a primary address. secondary - (Optional) Specifies that the configured IP address is a secondary address. 2. 3. Create an OSPF routing instance. Configure the network addresses, masks, and areas for each subnet on this AS. area - Specifies the area-id to be associated with the OSPF address range. Valid values are decimal values between 0 - 4294967295 or an IP address. A subnet address can be specified as the area-id to associate areas with IP subnets. router ospf process-id network ip-address wildcard-mask area area-id Command(s) ip address {ip-address | ip-address/prefixLength} ip-mask [primary | secondary]
Procedure 29-2 describes how to configure basic OSPF parameters. Procedure 29-2 Configuring OSPF General Optional Parameters
Step 1. 2. 3. 4. Task Optionally, change the OSPF router ID for this device. Optionally, configure the OSPF router neighbors for this router. Optionally, change the SPF LSA thresholds for this router. Optionally, change the SPF pause frequency to specify the number of units SPF calculation runs before pausing. Command(s) router-id ip-address neighbor ip-address [priority priority] spf lsa-thresholds num-start num-restart num-intra-full num-ia-ext-full spf pause-frequency units
29-22
Configuring OSPF
6. 7.
distance [ospf {external | intra-area}] weight area area-id range ip-address ip-mask [not-advertised] area area-id stub [no-summary] area area-id default-cost cost area {area-id | ip-address} nssa [no-summary] [transstabilityint seconds] [transrole always] area {area-id | ip-address} nssa-range ip-address mask
8. 9. 10.
11.
12.
area area-id virtual-link ip-address area area-id virtual-link ip-address authentication-key key area area-id virtual-link ip-address dead-interval seconds area area-id virtual-link ip-address hello-interval seconds area area-id virtual-link ip-address message-digest-key digest-key md5 format line auth-key area area-id virtual-link ip-address retransmit-interval seconds area area-id virtual-link ip-address transmit-delay seconds
13. 14.
Optionally, enable passive OSPF on the specified interface. Optionally, allow routing information discovered through non-OSPF protocols to be distributed in OSPF update messages. Optionally, assign an OSPF route filter route-map to the OSPF distribute-list. Optionally, enable the graceful-restart feature on this router. Optionally, change the graceful-restart restart interval for this router. Optionally, in system command mode, reset the specified OSPF process ID or the OSPF process.
passive-interface {vlan-id | interface-name} redistribute {rip | static | connected} [route-map id-number] [metric metric value] [metric-type type-value] [tag tag] distribute-list route-map name in graceful-restart enable graceful-restart restart-interval interval clear ip ospf process [process-id]
Configuring OSPF
20.
rfc1583compatible
Procedure 29-3 describes how to configure optional OSPF interface parameters. All commands in this procedure are entered in interface configuration command mode. Procedure 29-3 Configuring OSPF Optional Interface Parameters
Step 1. 2. 3. 4. Task Optionally, change the cost of sending an OSPF packet on this router interface. Optionally, change the OSPF priority value for this router interface. Optionally, change the OSPF poll-interval value for this non-broadcast neighbor. Optionally, change the amount of time between retransmissions of LSAs for adjacencies that belong to this interface. Optionally, change the amount of time required to transmit a link state update packet on this interface. Optionally, enable the ignore MTU advertisement feature for the neighbor of this interface. Optionally, change the number of seconds this router must wait before sending a hello packet to neighbor routers on this interface. Optionally, change the number of seconds this router must wait to receive a hello packet from its neighbor before determining that the neighbor is out of service. Optionally, assign a password on this interface to be used by neighboring routers using OSPFs simple password authentication. Optionally, enable OSPF MD5 authentication on this interface. Optionally, disable the graceful restart helper feature on this interface. Optionally, specify the network type that this interface is connected to. Command(s) ip ospf cost cost ip ospf priority number ip ospf poll-interval seconds ip ospf retransmit-interval seconds
5.
6.
ip ospf ignore-mtu
7.
8.
9.
ip ospf message-digest-key keyid md5 key ip ospf helper-disable ip ospf network {non-broadcast | broadcast | point-to-point | point-to-multipoint}
29-24
Configuring OSPF
Table 29-2
Task
Displaying OSPF configuration. Displaying OSPF link state database information. Displaying information about OSPF internal entries to area border routers and autonomous system boundary routers. Displaying OSPF interface configuration information. Displaying OSPF neighbor information. Displaying OSPF virtual-links configuration information.
show ip ospf interface [vlan vlan-id] show ip ospf neighbor [detail] [ip-address] [vlan vlan-id] show ip ospf virtual-links
Configuring OSPF
29-26
30
Open Shortest Path First Version 3 (OSPFv3) Configuration
This chapter provides the following information about configuring and monitoring OSPFv3 on Enterasys S-Series devices:
For information about... Using the OSPFv3 Protocol in Your Network Implementing OSPFv3 OSPFv3 Configuration Overview OSPFv3 Configuration Details Refer to page... 30-1 30-4 30-5 30-23
This OSPFv3 implementation supports RFC 2740 OSPF for IPv6. The OSPFv3 protocol is designed expressly for the TCP/IP internet environment. OSPFv3 utilizes IP multicast when sending and receiving routing updates. Routing updates are optionally authenticated using IPsec for OSPFv3. OSPFv3 routes IP packets based solely on the destination IP address found in the IP packet header. IP packets are not encapsulated in any further protocol headers as they transit the AS. OSPFv3 is a dynamic routing protocol in that it quickly detects topological changes in the AS, such as router interface failures, and calculates new loop-free routes after a period of convergence. This period of convergence is short and involves a minimum of routing traffic. In a link-state routing protocol, each router maintains a database describing the ASs topology. This database is referred to as the link-state database. Each participating router has an identical database. Each individual database entry is a particular routers local state made up of such information as the routers usable interfaces and reachable neighbors. The router distributes its local state throughout the AS by flooding. Each network that has at least two attached routers has a designated router. The designated router generates an LSA for the network and has other special responsibilities in the running of the
protocol, enabling a reduction in the number of adjacencies required on a network. This in turn reduces the amount of routing protocol traffic and the size of the link-state database. All routers run the exact same algorithm, in parallel. From the link-state database, each router constructs a tree of shortest paths with itself as root. This shortest-path tree provides the route to each destination in the AS. Externally derived routing information appears on the tree as leaves. When several equal-cost routes to a destination exist, traffic is distributed equally among them. The cost of a route is described by a single dimensionless metric. OSPF allows sets of networks to be grouped together. Such a grouping is called an area. The topology of an area is hidden from the rest of the AS. This information hiding enables a significant reduction in routing traffic. Also, routing within the area is determined only by the areas own topology, lending the area protection against bad routing data. An area is a generalization of an IP subnetted network. OSPF enables the flexible configuration of IP subnets. Each route distributed by OSPF has a destination. Two different subnets of the same IP network number may have different masks providing a different range of addresses for that subnet. This is commonly referred to as Variable Length Subnet Masking (VLSM). A packet is routed to the longest or most specific match. Host routes are considered to be subnets whose masks are all ones (0xffffffff). If IPsec for OSPFv3 is enabled on the interface, OSPFv3 protocol exchanges are authenticated. This means that only trusted routers can participate in the ASs routing. The S-Series platform supports IPsec for OSPFv3. See IPsec for OSPFv3 on page 30-4 for a listing of supported authentication and encapsulation algorithms. Route redistribution is supported for RIP, connected, and static routes. OSPFv3 is similar to OSPFv2 in its usage of the SPF algorithm, flooding, Designated Router (DR) election, timers, metrics, concept of a link-state database, intra/inter area and AS external routes and virtual-links. OSPFv3 differs with OSPFv2 in many respects, as outlined in OSPFv3 and OSPFv2 Differences on page 30-2. OSPFv3 is not backward compatible with OSPFv2. If you need to route both IPv4 and IPv6 using OSPF, enable both OSPFv3 and OSPFv2 on the device.
30-2
the network on a link basis, IPv6 does not forward (route) IPv6 datagrams having link-local source addresses. OSPF specific authentication has been removed and replaced by optionally configuring IPsec for OSPFv3 as defined in RFC 4552. If IPsec for OSPFv3 is not enabled on the interface, OSPFv3 authentication does not take place for OSPF packets. RFC 1583 compatibility does not apply to OSPFv3. To take advantage of IPv6s link-local scope, OSPFv3 adds a link-local flooding scope to the domain and area flooding scopes present in OSPFv2. The link LSA, which has link-local flooding scope and can not be flooded beyond any attached router, has been added for neighbors on a single link. Two new LSAs have been introduced: the link LSA and the intra-area LSA. Point-to-point links are supported in order to enable operation over tunnels. OSPFv3 views IPv6-over-IPv4 tunnels as a point-to-point interface with a link-local address and possibly a global unicast address. OSPFv3 uses the reported MTU for tunnel interfaces. The prefix advertisement for OSPFv3 is now in the new intra-area prefix LSA. When information is only relevant to the connected neighbor, OSPFv3 puts it in the link LSA, not in the router or network LSA, in both cases avoiding flooding information beyond the relevant information scope. Table 30-1 details the supported LSA types by LS ID and name for OSPFv3 and OSPF v2. Table 30-1 OSPFv3 and OSPFv2 LSA Cross-Reference
OSPFv2 LSAs 1 Router LSA 2 Network LSA 3 Network Summary LSA 4 ASBR Summary LSA 5 AS-External LSA 6 Group Membership LSA 7 NSSA External LSA No Corresponding LSA for OSPFv2 No Corresponding LSA for OSPFv2
OSPFv3 LSAs 0x2001 Router LSA 0x2002 Network LSA 0x2003 Inter-Area Prefix LSA 0x2004 Inter-Area Router LSA 0x2005 AS-External LSA 0x2006 Group Membership LSA 0x2007 Type-7 LSA 0x2008 Link LSA 0x2009 Intra-Area Prefix LSA
Unlike for OSPFv2, the router and network LSAs for OSPFv3 do not advertise prefixes. In OSPFv3, the router and network LSAs only represent the routers node information for SPF and are only flooded if information relevant to the SPF algorithm changes. This behavior avoids the flooding of prefix changes that are not relevant to SPF. Inter-area prefix, inter-area router, and type-7 LSAs have the same function as their OSPFv2 counterparts listed in Table 30-1.
OSPFv3 specifies the processing of unsupported LSAs. Unsupported LSAs are maintained in the database and flooded according to scope. In OSPFv3, routers with 100 or more interfaces generate more than one router LSA. A new link LSA has been created. Addresses in LSAs are specified as [prefix, prefix length]. OSPFv2 supports multiple OSPF processes on a device. The current OSPFv3 implementation supports a single OSPFv3 process.
Implementing OSPFv3
OSPFv3 supports multiple OSPFv3 instances on an interface. Multiple OSPFv3 instances provide for the sharing of an interface when more than one physical network segment needs access to an interface. It also provides for the configuration of multiple areas on a single interface. The multiple OSPF instances feature is not supported by OSPFv2. The IPv6 all SPF routers multicast address is FF02::5; the all DRouters multicast address is FF02::6. Both have link-local scope.
Keep in mind that OSPFv3 message header fields differ in that there: Are no fields for authentication Is an instance ID field that has local link significance only
The mechanisms for neighbor discovery and adjacency formation have not changed. The supported interface types point-to-point, point-to-mulitpoint, broadcast, NBMA, and virtual have not changed. LSA flooding and aging have not changed. All of OSPFv2 optional capabilities, including on-demand circuit support, NSSA areas, and the multicast extensions to OSPF are supported in OSPFv3. Area ID and Router ID remain 32 bit identifiers. Areas can be configured for Not-So-Stubby-Area (NSSA), Stub Area, and virtual-links.
The IPsec encryption algorithms supported are: Triple Data Encryption Standard (3DES) AESCBC (with 128, 192, or 256 bit keys)
Implementing OSPFv3
To implement OSPFv3 in your network:
30-4
Map out the AS including routers and the areas to which they belong Create an OSPFv3 routing instance for this AS
Configure each router with a router ID Configure the area that each router belongs to Enable OSPFv3 on each routing interface for the router specifying the OSPFv3 process, area and optional instance Optionally enable IPsec and configure IPsec authentication or encrypted authentication on each routing interface Optionally determine which router will be the designated router and backup and configure OSPF priority values on each routing interface accordingly Optionally configure OSPFv3 timers Optionally, configure the protocols and route types that will be redistributed over this AS Optionally configure interface cost Optionally modify the administrative distance for OSPF routes Optionally enable graceful restart
the the MAC address associated with the interface. Use the ipv6 enable command to enable IPv6 on a non-routing IPv6 interface. Use the ipv6 forwarding command to enable IPv6 on a routing interface. Use the ipv6 address command link-local option to manually configure the IPv6 link-local address. When manually configuring a link-local address, if a link-local address already exists on the interface, a warning displays asking you if you wish to change it. Enable the interface using the no shutdown command.
S Chassis(su)->configure S Chassis(su-config)->interface vlan 1255 S Chassis(su-config-intf-vlan.0.1255)->ipv6 forwarding S Chassis(su-config-intf-vlan.0.1255)->no shutdown S Chassis(su-config-intf-vlan.0.1255)->show ipv6 interface vlan.0.1255 brief Oper Status Legend: up = up; dn = down; tn = tentative dp = duplicate --Status-Interface IPv6 Address Pfx Adm Op Fwd
30-6
Figure 30-1
Router 1
Router 2
1 2
Host 1 172.10.1.99/24
3 4
1 2
3 4
Example
The following example configures the basic OSPF topology as displayed in Figure 30-1 on page 30-7:
Router 2(rw-config-intf-vlan.0.2)->ipv6 ospf 1 area 0.0.0.1 Router 2(rw-config-intf-vlan.0.2)->exit Router 2(rw-config)->interface vlan 3 Router 2(rw-config-intf-vlan.0.3)->ipv6 forwarding Router 2(rw-config-intf-vlan.0.3)->ipv6 ospf 1 area 0.0.0.0 Router 2(rw-config-intf-vlan.0.3)->exit Router 2(rw-config)->ipv6 router ospf 1 Router 2(rw-config-ospfv3)->router-id 2.2.2.2 Router 2(rw-config-ospfv3)->exit Router 2(rw-config)->
To elect a DR from a host of candidates on the network, each router multicasts an hello packet and examines the priority of hello packets received from other routers. The router with the highest priority is elected the DR, and the router with the next highest priority is elected the BDR. Any router with a priority of 0 will opt out of the DR election process. See the Configuring Router Priority on page 30-9 for details on configuring router priority. If DR candidates all share the same non-zero priorities, OSPF applies the router ID as a tie-breaker where the highest ID is
30-8
chosen DR and the next highest ID is chosen BDR. If the priorities are not same, router ID values are not used and the highest priority determines the DR and BDR.
Router 4 will not take part in the election process at all. Router 3 has the highest priority and therefore will be elected DR. Router 1 has the second highest priority and will be elected BDR. Figure 30-2 OSPF Designated Router Topology
BDR
Area 1
Router 1
Router 2
Router 4
DR
Router 3
Example
The following example provides the input required to configure the designated router topology as displayed in Figure 30-2 on page 30-9:
Router 1
Router 1(rw)->configure Router 1(rw-config)->interface vlan 1 Router 1(rw-config-intf-vlan.0.1)->ipv6 ospf priority 25 Router 1(rw-config-intf-vlan.0.1)->exit
Router 1(rw-config)->
Router 2
Router 2(rw)->configure Router 2(rw-config)->interface vlan 1 Router 2(rw-config-intf-vlan.0.1)->ipv6 ospf priority 10 Router 2(rw-config-intf-vlan.0.1)->exit Router 2(rw-config)->
Router 3
Router 3(rw)->configure Router 3(rw-config)->interface vlan 1 Router 3(rw-config-intf-vlan.0.1)->ipv6 ospf priority 30 Router 3(rw-config-intf-vlan.0.1)->exit Router 3(rw-config)->
Router 4
Router 4(rw)->configure Router 4(rw-config)->interface vlan 1 Router 4(rw-config-intf-vlan.0.1)->ipv6 ospf priority 0 Router 4(rw-config-intf-vlan.0.1)->exit Router 4(rw-config)->
Use the distance ospf command in OSPFv3 router configuration command mode to change the administrative distance assigned to the OSPFv3 protocol. This command provides for the configuration of separate values for OSPFv3 external and intra-area routes.
30-10
Figure 30-3
Backbone
Area 3
2001:3::1:x/64 2001:3::2:x/64 2001:3::3:x/64
Area 1
2001:1::1:x/64 2001:1::2:x/64 2001:1::3:x/64
Example
The following example provides the input required to configure summarization of the three area topology as displayed in Figure 30-3 on page 30-12:
Area 1
ABR1(rw)->configure ABR1(rw-config)->router ospf 1 ABR1(rw-config-ospf-1)->area 1 range 2001:1::0/64 ABR1(rw-config-ospf-1)->exit ABR1(rw-config)->
Area 2
ABR2(rw)->configure ABR2(rw-config)->router ospf 1 ABR2(rw-config-ospf-1)->area 2 range 2001:2::0/64 ABR2(rw-config-ospf-1)->area 2 range 2001:2:4::0/64 not-advertised ABR2(rw-config-ospf-1)->exit ABR2(rw-config)->
Area 3
ABR3(rw)->configure ABR3(rw-config)->router ospf 1 ABR3(rw-config-ospf-1)->area 3 range 2001:3::0/64
30-12
ABR3(rw-config-ospf-1)->exit ABR3(rw-config)->
Figure 30-4
Router 1
Router 5
Router 7
Router 3
Router 4
Router 2
Router 6
Router 8
Example
Every router in Areas 1 and 2 are configured for a stub area (Routers 1, 2, and 3 for Area 1 and Routers 5, 6, 7, and 8 for Area 2). Additionally, ABR routers 3, 5, and 6 are also configured with a default-cost to be assigned to the stub area. Router 5 has a lower metric cost when compared to Router 6, so Router 5 will be the preferred router for packets to access the area, with Router 6 employed as a backup in case Router 5 fails. The following example provides the input required to configure the stub topology as displayed in Figure 30-4 on page 30-14:
Router 1
Router1(rw-config)->router ospf 1 Router1(rw-config-ospf-1)->area 1 stub
Router 2
Router2(rw-config)->router ospf 1 Router2(rw-config-ospf-1)->area 1 stub
Router 3
Router3(rw-config)->router ospf 1 Router3(rw-config-ospf-1)->area 1 stub Router3(rw-config-ospf-1)->area 1 default-cost 15
Router 5
Router5(rw-config)->router ospf 1 Router5(rw-config-ospf-1)->area 2 stub Router3(rw-config-ospf-1)->area 2 default-cost 15
Router 6
Router6(rw-config)->router ospf 1 Router6(rw-config-ospf-1)->area 2 stub Router6(rw-config-ospf-1)->area 2 default-cost 20
Router 7
Router7(rw-config)->router ospf 1 Router7(rw-config-ospf-1)->area 2 stub
Router 8
Router8(rw-config)->router ospf 1 Router8(rw-config-ospf-1)->area 2 stub
30-14
Router 6
Router 1
Router 3
Router 4
Router 5
Router 2
Example
Routers 2 and 6 are configured as the ABRs between Area 1 and 0, and Router 4 as the ASBR. Router 2 is configured to set Area 1 as an NSSA, and Type 7 routes from the connected domain will be translated to Type 5 routes into the backbone. ABR Router 2 will only translate Type 7 LSAs; static routes redistributed by router 4. Also, Router 2 will always translate, since it is configured to do so; Router 6 will not, since only one ABR will perform the translation for a given area. Router 4 will be configured to redistribute static routes. The following example provides the input required to configure the NSSA topology as displayed in Figure 30-5 on page 30-15:
Router 6 (ABR)
Router 6(rw)->configure
Enterasys S-Series Configuration Guide 30-15
Router 6(rw-config)->interface vlan 1 Router 6(rw-config-intf-vlan.0.1)->ipv6 address 2001:0:1:::1:1/64 Router 6(rw-config-intf-vlan.0.1)->ipv6 forwarding Router 6(rw-config-intf-vlan.0.1)->ipv6 ospf 1 area 0.0.0.0 Router 6(rw-config-intf-vlan.0.1)->no shutdown Router 6(rw-config-intf-vlan.0.1)->exit Router 6(rw-config)->interface vlan 2 Router 6(rw-config-intf-vlan.0.2)->ipv6 address 2001:1:1::1:1/64 Router 6(rw-config-intf-vlan.0.2)->ipv6 forwarding Router 6(rw-config-intf-vlan.0.2)->ipv6 ospf 1 area 0.0.0.1 Router 6(rw-config-intf-vlan.0.2)->no shutdown Router 6(rw-config-intf-vlan.0.2)->exit Router 6(rw-config)->ipv6 router ospf 1 Router 6(rw-config-ospfv3)->router-id 6.6.6.6 Router 6(rw-config-ospfv3)->area 1 nssa Router 6(rw-config-ospfv3)->exit
Router 2(ABR)
Router 2(rw)->configure Router 2(rw-config)->interface vlan 1 Router 2(rw-config-intf-vlan.0.1)->ipv6 address 2001:0:1::2:1/64 Router 2(rw-config-intf-vlan.0.1)->ipv6 forwarding Router 2(rw-config-intf-vlan.0.1)->ipv6 ospf 1 area 0.0.0.0 Router 2(rw-config-intf-vlan.0.1)->no shutdown Router 2(rw-config-intf-vlan.0.1)->exit Router 2(rw-config)->interface vlan 2 Router 2(rw-config-intf-vlan.0.2)->ipv6 address 2001:1:1::2:1/64 Router 2(rw-config-intf-vlan.0.2)->ipv6 forwarding Router 2(rw-config-intf-vlan.0.2)->ipv6 ospf 1 area 0.0.0.1 Router 2(rw-config-intf-vlan.0.2)->no shutdown Router 2(rw-config-intf-vlan.0.2)->exit Router 2(rw-config)->ipv6 router ospf 1 Router 2(rw-config-ospfv3)->router-id 2.2.2.2 Router 2(rw-config-ospfv3)->area 1 nssa Router 2(rw-config-ospfv3)->area 1 nssa-range 2002:1:1::1/64 Router 2(rw-config-ospfv3)->exit
Router 4 (ASBR)
Router 4(rw)->configure Router 4(rw-config)->interface vlan 2 Router 4(rw-config-intf-vlan.0.2)->ipv6 address 2001:1:1::2:2/64 Router 4(rw-config-intf-vlan.0.2)->ipv6 forwarding Router 4(rw-config-intf-vlan.0.2)->ipv6 ospf 1 area 0.0.0.1 Router 4(rw-config-intf-vlan.0.1)->no shutdown Router 4(rw-config-intf-vlan.0.1)->exit Router 4(rw-config)->interface vlan 3
30-16 Open Shortest Path First Version 3 (OSPFv3) Configuration
Router 4(rw-config-intf-vlan.0.3)->ipv6 address 2001:3:1::1:1/64 Router 4(rw-config-intf-vlan.0.3)->ipv6 forwarding Router 4(rw-config-intf-vlan.0.3)->ipv6 ospf 1 area 0.0.0.1 Router 4(rw-config-intf-vlan.0.3)->no shutdown Router 4(rw-config-intf-vlan.0.3)->exit Router 4(rw-config)->ipv6 router ospf 1 Router 4(rw-config-ospfv3)->router-id 4.4.4.4 Router 4(rw-config-ospfv3)->area 1 nssa transrole always Router 4(rw-config-ospfv3)->redistribute static metric-type 1 Router 4(rw-config-ospfv3)->exit
Figure 30-6
Virtual-Link Topology
Area 1 Backbone
Area 3
Area 2
Example
The following example presents the configuration required to configure the virtual-link displayed in Figure 30-6 on page 30-18:
Router 1
Router 1(rw-config)->router ospf 1 Router 1(rw-config-ospf-1)->area 0.0.0.1 virtual-link 2.2.2.2 Router 1(rw-config-ospf-1)->exit Router 1(rw-config)->
Router 2
Router 2(rw-config)->router ospf 2 Router 2(rw-config-ospf-2)->area 0.0.0.1 virtual-link 1.1.1.1 Router 2(rw-config-ospf-2)->exit Router 2(rw-config)->
See Configuring OSPFv3 Timers on page 30-22 for an OSPF timers discussion.
30-18
Note: RFC 2328 specifies that the retransmit-interval should be greater than the expected round-trip delay between the two routers. This may be hard to estimate for a virtual-link; it is better to err on the side of making it too large.
Supported IPsec encryption ciphers are: 3DES Triple Data Encryption Standard cipher algorithm AESCBC AES (Cipher Block Chaining) cipher algorithm
Each IPsec configuration must have a Security Parameters Index (SPI) with a value between 256 4294967295 assigned to it and a security key. The key can be specified as a hex key. IPsec must be enabled in global VRF router configuration mode using the crypto ipsec enable command before using IPsec for OSPFv3 authentication or encrypted authentication. Configure IPsec for OSPFv3 on an interface for authentication only by specifying the SPI and authentication algorithm using the ipv6 ospf authentication command in interface configuration mode. This example shows how to configure VLAN 1 for IPsec SPI entry 256 for MD5 authentication with a hex key of 1234567890abcdef:
S Chassis(rw-config)->crypto ipsec enable S Chassis(rw-config)->interface vlan 1 S Chassis(rw-config-intf-vlan.0.1)->ipv6 ospf authentication spi 256 md5 1234567890abcdef hex
Configure IPsec for OSPFv3 on an interface for encrypted authentication by specifying the SPI, authentication algorithm and encryption cipher using the ipv6 ospf encryption command in interface configuration mode. This example shows how to configure VLAN 1 for IPsec SPI entry 256 for the 128-bit aescbc encryption with a key of 1234567890abcdef, and for MD5 authentication with a hex key of 1234567890abcdef:
S Chassis(rw-config)->crypto ipsec enable S Chassis(rw-config)->interface vlan 1 S Chassis(rw-config-intf-vlan.0.1)->ipv6 ospf encryption ipsec spi 256 esp aescbc 128 1234567890abcedf hex auth md5 1234567890abcdef hex
route map is created with the specified name. See Configuring a Not So Stubby Area (NSSA) on page 30-15 for an example of redistribution of static routes by an ASBR in an NSSA context. Use the redistribute command in OSPF router configuration command mode to permit the redistributions of OSPF, RIP, static, or connected routes by this router.
Graceful Restart
OSPF graceful restart, sometimes referred to as non-stop forwarding, provides for an OSPF router to remain on the forwarding path during a restart of its OSPF software. Graceful restart has three elements to its configuration: enabling, helper router, and restart interval. Enabling graceful restart instructs the firmware to perform a graceful restart, rather than a standard OSPF restart. Restart is only initiated by a fail-over. Grace LSAs are sent when OSPF is restarted on another module. Whether the failover is intentional or not, the failed router protocol is restarted on another module, and upon startup, OSPF sends grace LSAs out to its neighbors using existing link aggregation groups. Use the graceful-restart enable command to enable the graceful restart ability on this router. The helper relationship with the restarting router is on a per network segment basis. The helper monitors the network for topology changes. If no changes occur, the helper router continues to advertise its LSAs as though no restart was occurring. If the restarting router was the designated router, the helper continues to treat it as such. If a topology change does occur, graceful restart is terminated on the restarting router and a standard restart occurs. Helper mode is enabled by default. Helper mode can be disabled on a restarting router neighbor using the ipv6 ospf helper-disable command in interface command mode. If the restarting router receives an LSA indicating a disabled helper, the graceful restart terminates and a standard restart occurs. A restart interval provides for a maximum time in seconds after which the graceful restart will terminate should it not complete or terminate for other reasons within the interval. Use the graceful-restart restart-interval command to change the restart interval setting. View the router OSPF section of the show running-config display to verify any non-default graceful restart settings.
30-20
In a stable network, the route and rule information is fairly constant. If the router protocol process was to suddenly fail, forwarding information current at the time of the failure in all probability is usable for the short time after the failure until recovery occurs. During this recovery period, existing connections (that were not directly using the failed module) remain in effect. New connections continue to be installed using the last known good forwarding information. The router protocol process that failed is dynamically restarted. You do not configure where the router process is running. The router forwarding process remains active on every module. The protocol process exchanges protocol and maintains state that it distributes to the other modules and does not have to run on any specific module. One exception to this rule is that the module must have 256M of memory to be router protocol process eligible. Upon failure of a module running the router protocol process, the protocol process is started on a recovery module. One of the first messages it sends to its OSPF neighbors is a grace LSA. High availability failover will successfully occur if the following is true: The router is enabled for graceful restart The neighbors are enabled to participate as graceful restart helpers The OSPF dead interval is configured for a sufficient period such that the grace LSA is received by its neighbors before the configured OSPF dead interval expires And each neighbor is a member of a LAG common to the failed router, allowing the neighbor to remain up
Figure 30-7
Router Neighbor A
Neighbor B
OSPF
LAG
Router
Neighbor B
100.1.1.0/24
VLAN 100
100.1.1.0/24
VLAN 100
100.1.1.3
100.1.1.5
Figure 30-7 depicts the physical and logical configurations of the single router high availability failover mechanism. The neighbor to router lines display direct neighbor connections to the router enabled for OSPF graceful restart and members of LAGs common to the failing router. See Chapter 17, Link Aggregation Control Protocol (LACP) Configuration for LAG configuration details. The server 100.1.1.3 and 100.1.1.5 to router lines display VLAN connections common to both the failing and recovery routers. Helper mode on each neighbor is enabled by default. Enable graceful restart on the router using the graceful-restart enable command.
S Chassis(rw-config)->router ospf 1 S Chassis(rw-config-ospf-1)->graceful-restart enable S Chassis(rw-config-ospf-1)->
30-22
Transmit-Delay SPF-Delay
To ensure efficient adjacency between OSPF neighbors, the S-Series device provides hello-interval and dead-interval commands. The hello interval is the period between transmissions of hello packet advertisements. The dead interval is the period that can elapse without receiving a routers hello packets before its neighbors will declare it down. Use the ipv6 ospf hello-interval command in interface configuration command mode to configure the period between transmissions of hello packet advertisements. Use the ipv6 ospf dead-interval in interface configuration command mode to configure the period between receiving hello packets before the associated neighbor is declared down. In order to ensure that flooding is reliable, LSAs are retransmitted until they are acknowledged. The period between retransmissions is the retransmit-interval. If this interval is set too low for an interface, needless retransmissions will take place. If the value is set too high, the speed of the flooding, during the period of lost packets, may be affected. Use the ipv6 ospf retransmit-interval command in interface configuration command mode to configure the retransmit-interval. The transmit-delay is an estimation of the number of seconds it takes to transmit a link state update packet over this interface. This value should take into account transmission and propagation delays. Use the ipv6 ospf transmit-delay command in interface configuration command mode to configure the transmit-delay. The SPF-delay is the amount of time that transpires between the receipt of an OSPF update and the SPF calculation. Use the timers spf command in OSPFv3 router configuration command mode to specify the amount of time between receiving an OSPF update and an SPF calculation occurring. The OSPF timers can also be configured for an area virtual-link. See Configuring Area Virtual-Links on page 30-17.
Default Settings
Table 30-2 lists OSPF parameters and their default values. Table 30-2
Parameter router ID
interface cost
Table 30-2
Parameter
interface priority
broadcast
50 Inter-area/external updates
Specifies the number of cpu units SPF calculation runs before pausing. Specifies the amount of time between receiving an OSPF update and the start of an SPF calculation. A timer that determines the retransmission of LSAs in order to ensure reliable flooding. Specifies the number of seconds it takes to transmit a link state update packet over this interface. The period between transmissions of hello packet advertisements.
retransmit interval
5 seconds
transmit delay
1 second
hello interval
10 seconds for broadcast and point-to-point networks 30 seconds for non-broadcast and point-to-multipoint networks
dead interval
The period that can elapse without receiving a routers hello packets before its neighbors will declare it down. Specifies the administrative distance for OSPF routes. The available protocol with the lowest administrative distance is chosen for this route.
40 seconds
distance
connected: 0 static: 1 BGP: 20 - Routes external to the AS 200 - Routes internal to the AS OSPF = 110 RIP = 120
graceful restart
Provides for an OSPF router to remain on the forwarding path during a restart of its OSPF software.
disabled
30-24
Table 30-2
Parameter
Procedure 30-1 describes how to configure basic OSPF parameters. Procedure 30-1 Configuring Basic OSPFv3 Parameters
Step 1. 2. Task Create an OSPF routing instance in router configuration mode. In interface configuration mode, enable OSPFv3 on each routing interface, specifying the OSPFv3 process, area, and optional instance Optionally, in interface configuration mode, configure an IPv6 address for all routing interfaces in the AS. Command(s) ipv6 router ospf process-id ipv6 ospf process area area [instance instance-id] ipv6 address {link-local-address link-local | ipv6-address/length | ipv6-prefix/length eui-64 | autoconfig | general-prefix sub-bits/length}
3.
Table 30-3 describes how to configure basic OSPFv3 parameters. Table 30-3
Task Optionally, change the OSPFv3 router ID for this device. Optionally, change the SPF LSA thresholds for this router. Optionally, change the SPF pause frequency to specify the number of units SPF calculation runs before pausing. Optionally, change the delay, in milliseconds, between the receipt of an update and the beginning of the SPF execution. Optionally, change the administrative distance for OSPFv3 routes. Optionally, define the range of addresses used by this Area Border Router (ABR) when communicating routes to other areas. Optionally, configure an area as a stub area. Optionally, set the cost for the default route that is sent into a stub area by an ABR. Optionally, configure an area as a not so stubby area.
distance [ospf {external | intra-area}] weight area area-id range ipv6-address [not-advertise] area area-id stub [no-summary] area area-id default-cost cost area {area-id | A.B.C.D} nssa [no-summary] [transstabilityint seconds] [transrole always] area {area-id | A.B.C.D} nssa-range ipv6-address [not-advertise]
Optionally, configure an Autonomous System Border Router (ASBR) to summarize Type 7 to Type 5 routes matching the specified address and mask.
Table 30-3
Task
Optionally, configure an OSPF virtual-link, which represents a logical connection between the backbone and a non-backbone connected OSPF area.
Optionally, enable passive OSPF on the specified interface. passive-interface {vlan vlan-id | interface-name} Optionally, allow routing information discovered through non-OSPF protocols to be distributed in OSPF update messages. Optionally, assign an OSPF route filter route-map to the OSPF distribute-list. Optionally, enable adjacency logging on this OSPFv3 router. redistribute {bgp | connected | rip | static | blackhole} [route-map name] [metric metric-value] [metric-type type-value] [tag tag] distribute-list route-map name in log-adjacency
Optionally, enable the graceful restart feature on this router. graceful-restart enable Optionally, change the graceful restart restart interval for this router. Optionally, in system command mode, reset the specified OSPFv3 process ID or the OSPFv3 process. Optionally, in global configuration command mode, enable OSPFv3 protocol debugging output for the specified subsystem. graceful-restart restart-interval interval clear ipv6 ospf process [process-id] debug ipv6 ospf {subsystem}
Table 30-4 describes how to configure optional OSPF interface parameters. All commands in this procedure are entered in interface configuration command mode. Table 30-4
Task Optionally, configure the OSPFv3 router neighbors for this router. Optionally, assign a cost for the specified neighbor on the interface. Optionally, set the OSPFv3 priority value for the specified neighbor on the interface. Optionally, set a non-broadcast neighbor polling interval. Optionally, filter outgoing link-state advertisements to an OSPFv3 neighbor on this interface. Optionally, set the OSPFv3 priority value for the interface.
30-26
Table 30-4
Task
Optionally, set the amount of time between retransmissions of link state advertisements (LSAs) for adjacencies that belong to the interface. Optionally, set the amount of delay before transmitting a link state update packet on an interface. Optionally, enable the ignore MTU advertisement feature for the neighbor of this interface. Optionally, change the number of seconds this router must wait before sending a hello packet to neighbor routers on this interface. Optionally, change the number of seconds this router must wait to receive a hello packet from its neighbor before determining that the neighbor is out of service. Optionally, configure IPsec authentication on an interface. Optionally, configure IPsec encrypted authentication on an interface.
ipv6 ospf transmit-delay seconds ipv6 ospf ignore-mtu ipv6 ospf hello-interval seconds
ipv6 ospf dead-interval {seconds | minimal [hello-multiplier number]} ipv6 ospf authentication spi spi {md5 key | sha1 key | aescbc key} [hex] ipv6 ospf encryption ipsec spi spi {none | 3des key | aescbc {128 | 192 | 256} key} [hex] auth {md5 key | sha1 key | aescbc key | no-auth} ipv6 ospf helper-disable ipv6 ospf network {non-broadcast | broadcast | point-to-point | point-to-multipoint}
Optionally, disable the graceful restart helper feature on this interface. Optionally, specify the network type that this interface is connected to.
Table 30-5 describes how to display OSPFv3 configuration and statistics. Table 30-5
Task Displaying OSPFv3 configuration. Displaying OSPFv3 link-state database information. Displaying information about OSPFv3 internal entries to area border routers and autonomous system boundary routers. Displaying OSPFv3 interface configuration information. Displaying OSPFv3 neighbor information. Displaying OSPFv3 virtual-links configuration information.
show ipv6 ospf interface [vlan vlan-id] show ipv6 ospf neighbor [router-id] [detail] [vlan vlan-id] show ipv6 ospf virtual-links
30-28
31
Border Gateway Protocol (BGP) Configuration
This chapter provides the following information about configuring and monitoring BGP on Enterasys S-Series devices:
For information about... Using BGP in Your Network Implementing BGP BGP Overview Configuring BGP Terms and Definitions Refer to page... 31-1 31-4 31-5 31-19 31-44
Path Attributes
BGP routing updates include the complete route to each destination, as well as other information related to the route. Route information is included in the path attributes. BGP uses path attributes to provide more information about each route. Path attributes can also be used to distinguish between groups of routes to determine administrative preferences, allowing greater flexibility in determining route preference to achieve a variety of administrative ends. Supported BGP attributes include IP next hop, Multi-Exit Discriminator (MED), and local preference. BGP also uses path attributes to maintain the AS path. The AS path is a path attribute that provides a list of the AS numbers the route traverses. The AS path is used for loop detection. Its length is used as a route selection criteria in the event the same prefix is learned from multiple peers. BGP uses the AS path and the path attributes to determine the network topology. This, in turn, enables BGP to detect and eliminate routing loops and to make routing policy decisions.
Refer to Using AS-Path Regular Expressions on page 31-7 for information about using regular expressions when configuring AS path preference in route-maps.
BGP Sessions
BGP supports two basic types of sessions between neighbors: internal (sometimes referred to as IBGP) and external (EBGP). Internal sessions are run between routers in the same autonomous system. External sessions run between routers in different autonomous systems. When a router routes to an external peer, the local AS number is prepended to the AS path. This means that routes received from an external peer are guaranteed to have the AS number of that peer at the start of the path. In general, routes received from an internal neighbor will not have the local AS number prepended to the AS path. Those routes will have the same AS path that the route had when the first internal neighbor received the route from an external peer. Routes with no AS numbers in the path may be legitimately received from internal neighbors. BGP considers these routes internal to the receiver's own AS. External BGP sessions may or may not include the Multi-Exit Discriminator (MED) among its path attributes. BGP uses MED to break ties between routes with equal preference from the same neighboring AS. Internal BGP sessions carry the local preference attribute. The larger the local preference value, the greater the route is preferred within an AS. Internal sessions can optionally include the MED, carried in from external sessions.
Routes
A route consists of a prefix, a prefix length, and a set of information indicating policies and preference to reach the destinations indicated by the prefix. A prefix is made up of a dotted decimal formatted network identifier that includes a length that specifies the number of significant bits in the network. The route prefix is contained in the Network Layer Reachability Information (NLRI) and the BGP next hop path attribute determines where packets matching the prefix should be forwarded. The BGP next hop may be non-directly connected. In this case, for the route to be installed in the routing table, the router must have a route to the BGP Next Hop. You can redistribute routing information between BGP and another protocol, and use route-maps to control the route updates.
Routing Policy
Routing policies can be used to filter routes both on an import and export basis, based upon its IP prefix, community (RFC 1997), extended community (RFC 4260), AS path, source IP address, and IP next hop. Routing policy is configured in a route-map, which is then applied to the route.
31-2
in the AS to be reflectors. The other routers are configured as clients. Route reflection is defined in RFC 4456.
BGP Sub-Features
Supported BGP sub-features include: Graceful restart Provides for the continued processing of the data-forwarding plane of a router should the control plane fail (RFC 4724) Outbound Route Filtering Allows a BGP speaker to send to its BGP peer a set of Outbound Route Filters (ORFs), which the peer applies in addition to its locally configured outbound filters (if any), to constrain its outbound routing updates to the speaker (RFC 5291) Route Refresh Allows for the dynamic exchange of route refresh requests between BGP speakers and subsequent re-advertisement of the respective Adj-RIB-Out (RFC 2918) Multiprotocol BGP Extensions Enable BGP to carry routing information for multiple Network Layer protocols such as IPX (RFC 2858) 4-Octet AS numbers Allows for the encoding of 4-octet AS numbers (RFC 4893) TCP/MD5 Authentication Enhances BGP security by defining a TCP option for carrying an MD5 digest in a TCP segment that acts like a signature for that segment, incorporating information known only to the connection end points (RFC 2385) Conditional Advertisement Provides for the sending of BGP announcements, in addition to normal announcements, when a route specified in the configured advertise map does not exist in the configured non-exist map Aggregation Provides for the aggregating of one or more specific routes into a single aggregate route, if a more specific route of the aggregate route exists in the BGP routing table. Soft Reconfiguration Speeds up the route installation process when an inbound policy change occurs by keeping a local copy of the routes for the specified peer or group
Figure 31-1 shows a sample BGP topology with four autonomous systems: Autonomous system A displays a standard fully meshed AS Autonomous system B displays a route reflected topology Autonomous system C and D displays a confederation topology with two confederations
Implementing BGP
Figure 31-1
BGP Topology
IBGP Neighbors
EBGP Neighbor
EBGP Neighbor
AS C
AS D
Implementing BGP
Before configuring BGP on the routers in your network, map out the network BGP topology including autonomous systems (full mesh, route reflected, and confederation), member routers, router peers, peer policy (route-maps) Required steps to implement BGP in your network: Configure each router specifying the autonomous system the router belongs to Configure each router as part of a full mesh, route reflection, or confederation topology Configure all IBGP and EBGP neighbors for the router including all optional neighbor parameters specified in Configuring BGP Neighbor Parameters on page 31-30
31-4
BGP Overview
BGP parameters with default values that can be modified: Optionally modify the route MED value using an applied route-map and optional MED behaviors using the appropriate BGP commands Optionally modify the local preference of advertised routes for the router Optionally modify the BGP route selection priority (distance) compared to other protocols for the router Optionally modify maximum allowed EBGP and IBGP ECMP routes for the router
BGP features that can be configured on the router: Optionally configure aggregate addresses Optionally configure soft reset on the router by configuring soft reconfiguration for the neighbor or automatic router refresh for the router Optionally enable graceful restart on the router Optionally configure outbound route filtering for the router Optionally configure BGP route-maps and apply them to configured neighbors and route redistribution Optionally configure Syslog and trap behavior for changes in peer state
BGP Overview
For information about... Injecting Routes Into BGP Using AS-Path Regular Expressions Route Selection Preference Route Selection Preference Multi-Exit Discriminator (MED) Route Aggregation Source IP Address Update to the Peer Scalability and the Peer Full Mesh Requirement Outbound Route Filtering (ORF) Conditional Advertisement BGP Soft Reset Community and Extended Community Attributes Graceful Restart Refer to page... 31-5 31-7 31-8 31-8 31-8 31-9 31-10 31-10 31-12 31-13 31-14 31-15 31-17
BGP Overview
Using Redistribution
With redistribution, the user specifies the source protocol in BGP router configuration mode. Redistribution can be configured for all routes of the specified type or routes can be filtered using a route-map. Redistribution entries are created with a specified source and destination protocol to allow redistribution from the source to the destination protocol. The user can also configure a route-map to specify a set of matching prefixes as well as to set route attributes on matching routes. In the S-Series implementation for the redistribution route-map, matching is performed only on an IP prefix as specified in an access-list. The redistribution command line allows for setting MED, local-preference, AS-path limit, and origin to matching routes. Filtering on AS-path regular expressions is supported; see Using AS-Path Regular Expressions on page 31-7. BGP route-maps support setting the AS, AS-path limit, community, a number of extended community values, local preference, MED, IP next hop, origin, ORF-association local, weight, and flap table. See Chapter 39, Route-Map Manager Configuration for BGP route-map configuration details. Use the redistribute connected command, optionally specifying a route-map, AS-path limit, origin, MED, and local preference for the route, to inject all or filtered connected routes into BGP. In the following example BGP is configured to redistribute connected routes that match the contents of the connRoute route-map:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->redistribute connected route-map connRoute
Use the redistribute rip command, optionally specifying a route-map, AS-path limit, origin, MED, and local preference for the route, to inject all or filtered RIP routes into BGP. In the following example BGP is configured to redistribute all RIP routes with the local preference set for 100.
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->redistribute rip local-pref 100
Use the redistribute static command, optionally specifying a route-map, AS-path limit, origin, MED, and local preference for the route, to inject all or filtered static routes into BGP. In the following example BGP is configured to redistribute all static routes with the local preference set for 100.
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->redistribute static local-pref 100
Use the redistribute ospf command, optionally specifying the route-map, AS-path limit, origin, MED, and local preference attributes for the route, to inject all or filtered OSPF routes into BGP. In the following example BGP is configured to redistribute OSPF routes that match the contents of the OSPFroutes route-map.
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->redistribute ospf route-map OSPFroutes
31-6
BGP Overview
Use the network command, specifying the network prefix and length and optionally specifying the route-map, AS-path limit, origin, MED, and local preference attributes for the route, to inject a route into BGP. The following example imports the network 10.1.0.0 with a mask of 255.255.255.0 into BGP. Additionally, this network range will be advertised to other peers.
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp router-id 159.1.1.9 S Chassis(su-config-bgp)->network 10.1.0.0/24
Note: Regular expressions are also supported by the BGP community and extended community attributes.
BGP Overview
This example shows how to match a packet AS path attribute that starts with AS number 20313 and with the next AS number ending with 13:
S Chassis(su)->configure S Chassis(su-config)->route-map bgp bgprm1 permit S Chassis(su-config-route-map-bgp)->match as-path ^20313.*13$ S Chassis(su-config-route-map-bgp)->show route-map bgprm1 route-map bgp bgprm1 permit 10 match afi ipv4 match safi unicast match as-path "^20313_$13" S Chassis(su-config-route-map-bgp)->
See Chapter 39, Route-Map Manager Configuration for BGP route-map configuration details.
31-8
BGP Overview
The following example disables BGP deterministic MED for BGP router 65151:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->no bgp deterministic-med S Chassis(su-config-bgp)->
Use the bgp always-compare-med command, in BGP configuration mode, to compare MEDs when multiple routes with differing MEDs are received from peers in different autonomous systems. The following example enables the comparison of MEDs from different ASs:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp always-compare-med S Chassis(su-config-bgp)->
Route Aggregation
Route aggregation allows you to aggregate one or more specific routes into a single route. Aggregate routes are only created if a more specific route of the aggregate route exists in the BGP routing table. Aggregate route configuration options provide for: Creating and advertising the aggregate route while at the same time suppressing the advertisement of all the more specific routes for this aggregate through route summarization. Retaining the advertisement of the AS-Path information for the specific routes of the aggregate. The default behavior for an aggregate route is to suppress the AS-Path information for the specific routes of the aggregate. It may be desirable to retain AS-Path information for routes in the aggregate that belong to an AS outside of the AS in which the aggregate is created. Enabling both route summarization and advertisement of the AS-Path information for the specific routes of the aggregate. Creating and advertising an aggregate while at the same time suppressing only those specific routes that match clauses in the applied route-map. Prefixes contained in the aggregate route that are not specifically matched in the route-map are not suppressed. You can not use this option in conjunction with route summarization. Creating and advertising an aggregate, while at the same time allow specifying in a route-map which AS path information is retained in the aggregate. This option is used in conjunction with retaining the advertisement of the AS-Path information for specific routes of the aggregate. You can not use this option in conjunction with route summarization. Creating and advertising an aggregate, while at the same time allowing for the modifying of aggregate route attributes specified in the route-map.
The following example creates and advertises aggregate route 200.51.0.0/22 and suppresses the advertisement of all the more specific routes for this aggregate:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->aggregate-address 200.51.0.0/22 summary S Chassis(su-config-bgp)->
The following example sets the MED attribute to 50 for routes in aggregate route 200.51.0.0/22 using route-map attrmap1:
S Chassis(su-config)->route-map bgp attrmap1 permit 10 S Chassis(su-config-route-map-bgp)->set med 50 S Chassis(su-config-route-map-bgp)->exit
BGP Overview
S Chassis(su-config)->show route-map attrmap1 route-map bgp attrmap1 permit 10 set med 50 S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->aggregate-address 200.51.0.0/22 attribute-map attrmap1 S Chassis(su-config-bgp)->
The following example retains AS-path information for routes 200.51.1.0/24 using route-map advmap1 in aggregate route 200.51.0.0/22:
S Chassis(su-config)->ip prefix-list advlist1 permit seq 1 200.51.1.0/24 S Chassis(su-config)->route-map bgp advmap1 S Chassis(su-config-route-map-bgp)->match prefix-list advlist1 S Chassis(su-config-route-map-bgp)->exit S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->aggregate-address 200.51.0.0/22 advertise-map advmap1 S Chassis(su-config-bgp)->
See Configuring Source IP Address Update on page 31-32 for a remote peer source IP address update configuration example.
31-10
BGP Overview
Confederations
The confederations extension to BGP, defined in RFC 3065, provides for the configuration of AS confederations. An AS confederation is a collection of routers, belonging to one or more autonomous systems, advertised as a single AS number to BGP speakers that are not members of the confederation. Each AS confederation has a confederation ID. A router member of the confederation advertises itself to non-confederation peers using the AS confederation ID. A router member of the confederation advertises itself to other confederation peers using its AS number. A confederation ID can be any value from 1 to 65535. Each router member of a confederation must identify its confederation member peers. Confederation information in the AS path sent to a neighbor peer is included by default. Inclusion of confederation information in the AS path sent to a neighbor peer can be disabled. It is possible to have AS path segments that do not adhere strictly to the confederation standard. Strict confederation path standards can be enforced. Strict confederation path enforcement is disabled by default. See Figure 31-1 on page 31-4 for a depiction of a BGP confederation topology. Use the bgp confederation-id command, in BGP configuration mode, to specify the confederation this router belongs to. The following example configures the BGP router to be a member of BGP confederation 100:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp router-id 151.1.1.9 S Chassis(su-config-bgp)->bgp confederation-id 100 S Chassis(su-config-bgp)->
Use the neighbor confed-member command, in BGP configuration mode, to configure the neighbor as a member of the routers confederation. The following example configures neighbor 200.51.1.1 as a member of this routers confederation:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp router-id 159.1.1.9 S Chassis(su-config-bgp)->bgp confederation-id 100 S Chassis(su-config-bgp)->neighbor 200.51.1.1 confed-member S Chassis(su-config-bgp)->
Use the neighbor aggregate-confed command, in BGP configuration mode, to enable the inclusion of confederation information in the AS path sent to this routers peers. The following example disables the inclusion of confederation information in the AS paths sent to this routers peers:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp router-id 159.1.1.9 S Chassis(su-config-bgp)->no neighbor 200.51.1.1 aggregate-confed S Chassis(su-config-bgp)->
Use the bgp strict-confeds command, in BGP configuration mode, to enable BGP to drop AS-Paths with non-standard confederation segments. The following example enables the strict-confeds feature on this router:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp strict-confeds
BGP Overview
S Chassis(su-config-bgp)->
See Configuring BGP Confederations on page 31-33 for a BGP confederation configuration example.
Route Reflection
Route reflection enables you to configure a BGP speaker as a route reflector which passes internally learned routes to a cluster of linked IBGP neighbors. The route reflector configured router advertises the routes it has learned from each linked client to the other linked clients in the AS. In a route reflection topology, the route reflector is the hub, and each client only peers with the the hub. This eliminates the full mesh requirement. You can configure one or more routers in the AS to be reflectors. Some or all of the other routers for the AS are configured as clients. Route reflection is defined in RFC 4456. Route reflection clients only peer with the route reflector. Route reflection configuration only occurs on the route reflector, identifying each route reflection client. Multiple route reflectors can be configured in an AS. Multiple route reflectors can belong to a single route reflection cluster. A route reflection cluster is identified by a unique ID. If only a single route reflector is configured for an AS, the cluster ID defaults to the router ID of the route reflector. See Autonomous System B of Figure 31-1 on page 31-4 for a depiction of a route reflection topology. Use the neighbor route-reflector-client command, in BGP configuration mode, to identify each client for the route reflection cluster. The following example specifies that the neighbor 168.192.50.5 is a client of route reflector 1.1.1.1:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp router-id 1.1.1.1 S Chassis(su-config-bgp)->neighbor 168.92.50.5 remote-as 5 S Chassis(su-config-bgp)->neighbor 168.92.50.5 route-reflector-client
Use the bgp cluster-id command, in BGP configuration mode, to specify a unique route reflection cluster ID the route reflector(s) belong to. The following example configures a cluster ID of 1.2.3.4 for router 1.1.1.1:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp router-id 1.1.1.1 S Chassis(su-config-bgp)->bgp cluster-id 1.2.3.4 S Chassis(su-config-bgp)->
See Configuring Route Reflection on page 31-36 for a route reflection configuration example.
BGP Overview
error code. In this case, the local router will resend its OPEN message without the capability advertised. Use the bgp orf comm-filter command to configure ORF for community filtering on both the local router and the peer router. This example configures BGP to send the ORF capability for community filtering for IPv4 unicast to the peer:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp router-id 151.1.1.9 S Chassis(su-config-bgp)->bgp orf ipv4 unicast comm-filter send S Chassis(su-config-bgp)->
Use the bgp orf extcomm-filter command to configure ORF for extended community filtering on both the local router and the peer router. This example configures BGP to send ORF capability for extended community filtering for IPv4 unicast:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp router-id 151.1.1.9 S Chassis(su-config-bgp)->bgp orf ipv4 unicast extcomm-filter send S Chassis(su-config-bgp)->
Use the bgp orf prefix-filter command to configure ORF for prefix filtering on this router. This example configures BGP to send the ORF capability for prefix filtering to the BGP peer for IPv4 unicast:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp router-id 151.1.1.9 S Chassis(su-config-bgp)->bgp orf ipv4 unicast prefix-filter send S Chassis(su-config-bgp)->
Conditional Advertisement
The conditional advertisement feature allows a service provider to advertise certain routes to a preferred subnet under normal operational conditions, while maintaining the ability to move its traffic to an alternative subnet should its preferred routes fail. The conditional advertisement feature uses two route-maps to achieve this capability: The non-exist-map route-map which contains match prefix-list clauses for the preferred route(s) used under normal operational conditions The advertise-map route-map which contains match prefix-list clauses for the alternative route(s) used only if a preferred route is not available
Should any route specified in the non-exist route-map fail (no longer exist), BGP advertises all the routes specified in the advertise route-map, otherwise routes in the advertise route-map are not advertised to the peer. The conditional advertisement feature can be used to reduce traffic within an AS. To configure the conditional advertisement feature: Create two prefix lists: one used to match prefixes for the advertise route-map; a second to match prefixes for the non-exist route-map Create a BGP route-map with a match clause for the advertise prefix-list Create a BGP route-map with a match clause for the non-exist prefix-list
Enterasys S-Series Configuration Guide 31-13
BGP Overview
The following example: Configures an advertise map prefix-list named adv-list1 and assigns it to BGP route-map adv-map1, specifying prefix 1.0.0.0/8 as the advertised prefix Configures a non-exist map prefix-list named non-exist-list1 and assigns it to BGP route-map non-exist-map1, specifying prefix 2.0.0.0/8 as the non-exist map prefix Configures a BGP advertise map for neighbor 192.168.12.112 that assigns adv-map1 as the advertise map route-map and non-exist-map1 as the non-exist map route-map
S Chassis(su-config)->ip prefix-list adv-list1 permit seq 1 1.0.0.0/8 S Chassis(su-config)->route-map bgp adv-map1 S Chassis(su-config-route-map-bgp)->match adv-list1 adv-map1 S Chassis(su-config-route-map-bgp)->exit S Chassis(su-config)->ip prefix-list non-exist-list1 permit seq 1 2.0.0.0/8 S Chassis(su-config)->route-map bgp non-exist-map1 S Chassis(su-config-route-map-bgp)->match non-exist-list1 non-exist-map1 S Chassis(su-config-route-map-bgp)->exit S Chassis(su-config)->router bgp 1 S Chassis(su-config-bgp)->neighbor 192.168.12.112 advertise-map adv-map1 non-exist-map non-exist-map1 S Chassis(su-config-bgp)->
See Configuring Conditional Advertisement on page 31-40 for a BGP conditional advertisement example.
Route-Refresh
Route refresh, defined in RFC 2918, is a capability that the peer advertises in the OPEN message during session establishment. If both the local router and its peer agree to support this capability, a
31-14 Border Gateway Protocol (BGP) Configuration
BGP Overview
router can send a route refresh message to its peer whenever the local routers inbound policy changes. The peer will respond by resending its update messages. The local router can then reapply its policy without tearing down the BGP connection and without locally storing the received routes. If the route refresh capability is enabled, the route refresh message is generated automatically when the inbound policy changes. Route refresh is enabled by default. If the soft reconfiguration soft reset method is enabled (see Internally Stored Route Reconfiguration) route refreshes are not sent. Use the bgp automatic-route-refresh command, in BGP router configuration mode, to enable route refresh on the local router. The following example disables BGP automatic route refresh for BGP router 65151:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->no bgp automatic-route-refresh S Chassis(su-config-bgp)->
The following example clears all BGP peers and sends a route refresh message to each cleared peer.
S Chassis(rw)->clear ip bgp * soft
Community Attribute
Communities provide a label to a set of prefixes that share one or more common properties. Upstream providers use the community label to apply routing policy using route-maps to the community member prefixes. Route-maps support the community attribute for both match and set clauses. Use the set community route-map clause to label the route as a member of the specified community. There are two means of specifying a community name: Specify the AS number this route belongs to, followed by a colon (:), followed by the community number
BGP Overview
Specify a predefined community value, as defined in RFC 1997 and RFC 3765, that are supported by the community field such as: NO_EXPORT Routes must not be advertised outside a BGP confederation boundary NO_ADVERTISE Routes must not be advertised to other BGP peers NO_EXPORT_SUBCONFED Routes must not be advertised to external BGP peers NO_PEER Routes must not be advertised across bilateral peer connections
This example shows how to set the AS and community values if all match clauses match for the bgprm1 route-map to AS 100 and community 100:
S Chassis(su)->configure S Chassis(su-config)->route-map bgp bgprm1 permit S Chassis(su-config-route-map-bgp)->match prefix-list pl100 S Chassis(su-config-route-map-bgp)->set community 100:100 S Chassis(su-config-route-map-bgp)->
This example shows how to set the community value to block all routes advertised across bilateral peer connections:
S Chassis(su)->configure S Chassis(su-config)->route-map bgp bgprm1 permit S Chassis(su-config-route-map-bgp)->match prefix-list pl200 S Chassis(su-config-route-map-bgp)->set community NO_PEER S Chassis(su-config-route-map-bgp)->
The route-map match community clause provides the ability to set route policy for packets that have been set with community name matching the community name specified in the match clause. This example shows how to match a packet community to community 100 in AS 121:
S Chassis(su)->configure S Chassis(su-config)->route-map bgp bgprm1 permit S Chassis(su-config-route-map-bgp)->match community 121:100 S Chassis(su-config-route-map-bgp)->
Use the set clause for the appropriate extended community type to label a route with the specified extended community. The extended community is labeled with a set value appropriate to the extended community. For example: The IPv4 route-target extended community requires a set value consisting of a valid IPv4 address followed by a colon (:) followed by a number in the range 0 - 65535. The firmware converts this set value into a hex identifier. The hex identifier for each set extended community is displayed in the show ip bgp output. When configuring an extended
31-16 Border Gateway Protocol (BGP) Configuration
BGP Overview
community match clause, use the show ip bgp command to determine the appropriate extended community identifier. This example shows how to remove all matching extended communities from the AS route target 1001:10000 when all match clauses match for route-map bgprm1:
S Chassis(su)->configure S Chassis(su-config)->route-map bgp bgprm1 permit S Chassis(su-config-route-map-bgp)->match prefix-list permit200 S Chassis(su-config-route-map-bgp)->set extended-community as-route-target 1001:10000 remove-specific S Chassis(su-config-route-map-bgp)->
This example shows how to match a packet against the extended community AS route target attribute 000203E9000186A0:
S Chassis(su)->show ip bgp 1.0.0.0/8 detail Route status codes: > - active
Extended Community attributes in route: Route Target: 1001:10000 (0x000203E9000186A0) S Chassis(su)->configure S Chassis(su-config)->route-map bgp bgprm1 permit S Chassis(su-config-route-map-bgp)->match extended-community 000203E9000186A0 S Chassis(su-config-route-map-bgp)->
Graceful Restart
BGP graceful restart provides for the continued processing and packet forwarding of a routers data-forwarding plane even if the router control plane fails. With both a router and its peer graceful restart enabled, BGP exchanges the graceful restart capability (BGP code 64) in the initial BGP OPEN messages that establish the session. When a failure takes place and the router restarts its BGP process, normally peer routers clear all routes associated with the restarting router. When graceful restart is enabled on a router, the peer router marks all routes as "stale" and continues to forward packets based on the expectation that the restarting router will reestablish the BGP session within a reasonable period of time. During the period of the restart, the restarting router continues to forward packets based upon routing state at the time of the restart. Peers refresh the restarting router with RIB updates. When the restarting router opens the new BGP session, it will again send the BGP capability code 64 to its peers with flags set to let the peer router know that the BGP process has restarted. When the restarting router completes its restart and RIB update, it in turn updates its peers with any new updates. Graceful restart reduces routing flaps, which stabilizes the network and reduces the consumption of control-plane resources.
BGP Overview
BGP graceful restart timing is based upon four configurable intervals: Restart defer interval Specifies the upper bound (in seconds) on the amount of time route selection will be deferred when BGP is restarting. The value specified should be large enough to provide all peers with enough time to send all their routes. The value must be greater than or equal to the restart timeout setting. Restart timeout interval Specifies the interval which BGP advertises to its peers, in the OPEN message exchange, as the estimated time (in seconds) it will take for the BGP session to be reestablished after a restart. This can be used to speed up routing convergence by its peer in case the BGP speaker does not come back after a restart. Following a local restart, BGP will impose the restart timeout value as the upper bound on the length of time permitted for BGP to restart. If BGP fails to restart within the restart timeout period, route selection will commence immediately thereby overriding the restart defer timer. Restart time interval Allows the peer to configure the maximum time (in seconds) it will wait for the restarting router to come back after a restart. This value will be used instead of the restart timeout value advertised in the OPEN message exchange, if the OPEN message value exceeds this restart timer value. Stale path interval Configures the maximum time following a restart before removing stale routes from the peer. The stale path interval must be greater than or equal to the restart time.
Graceful restart must be enabled for the four configurable graceful restart timers to be relevant. Use the bgp graceful-restart command, in BGP configuration mode, to enable graceful restart on the local router. The following example enables graceful restart on router 151.1.1.9
S Chassis(su-config-bgp)->bgp router 65151 S Chassis(su-config-bgp)->bgp router-id 151.1.1.9 S Chassis(su-config-bgp)->bgp graceful-restart S Chassis(su-config-bgp)->
Use the bgp restart-defer command, in BGP configuration mode, to configure the time to defer route selection after gracefully restarting. The following example configures the defer timer to 150 seconds:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp router-id 151.1.1.9 S Chassis(su-config-bgp)->bgp restart-defer 150 S Chassis(su-config-bgp)->
Use the bgp restart-time command, in BGP configuration mode, to configure the maximum time to wait for a graceful restarting peer to come back up after a restart. The following example configures the restart time to be 100 seconds:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp router-id 159.1.1.9 S Chassis(su-config-bgp)->bgp restart-time 100 S Chassis(su-config-bgp)->
Use the bgp restart-timeout command, in BGP configuration mode, to configure the estimated time advertised to peers in the OPEN message for the session to be reestablished after a graceful restart. The following example configures the restart-timeout to be 150 seconds:
S Chassis(su-config)->router bgp 65151
31-18
Configuring BGP
Use the bgp stale-path-time command, in BGP configuration mode, to configure the maximum time following a restart stale routes are allowed to persist on the peer. The following example sets the stale-path-time to 150 seconds:
S Chassis(su-config)->router bgp 65151 S Chassis(su-config-bgp)->bgp router-id 159.1.1.9 S Chassis(su-config-bgp)->bgp stale-path-time 150
Configuring BGP
For information about... Configuring Basic BGP Router Parameters Configuring BGP Route Injection Configuring External BGP Basic Peering Configuring Internal BGP Basic Peering Configuring Multihop EBGP Basic Peering Configuring BGP Neighbor Parameters Configuring Source IP Address Update Configuring BGP Confederations Configuring Route Reflection Configuring Outbound Route Filtering (ORF) Configuring Conditional Advertisement Configuring BGP Soft Reset Configuring Graceful Restart BGP Monitoring and Clearing Refer to page... 31-21 31-23 31-23 31-25 31-27 31-30 31-32 31-33 31-36 31-40 31-40 31-43 31-43 31-44
This section provides details for BGP configuration on S-Series products. Table 31-2 lists BGP default values. Table 31-2
Parameter advertisement interval
AS origination interval
15 seconds
AS path limit
Configuring BGP
Table 31-2
Parameter
distance (External to AS) The priority given to external BGP routes relative to other protocols for the local router. distance (Internal to AS) The priority given to internal BGP routes relative to other protocols for the local router. A BGP extension that provides for the continued processing and forwarding of packets by the data-forwarding plane even if the control plane fails. The time in seconds after which a reachable routes penalty value decays to half of its current value. The time in seconds after which an unreachable routes penalty value decays to half of its current value. The number of seconds to use when negotiating a peering session within a group. The interval in seconds between returning to the idle state and reinitiating a TCP connection for the peer. The interval between keepalive messages The preference for this route over other possible routes on the local router. The maximum number of external BGP ECMP routes on the local router. The maximum number of internal BGP ECMP routes on the local router. The maximum number of outbound route filtering entries that will be accepted from the peer. The peak number of prefixes that BGP will accept for installation into the routing information base. The Multi-Exit Discriminator value when configuring a route.
20
200
graceful restart
disabled
half-life reachable
300 seconds
half-life unreachable
900 seconds
90 seconds
15 seconds
maximum EBGP ECMP routes maximum IBGP ECMP routes maximum ORF entries
1 1 100000
maximum prefixes
0 unlimited
MED
31-20
Configuring BGP
Table 31-2
Parameter
1800 seconds
open delay
0 no delay
120 seconds
restart time
120 seconds
restart timeout
120
50 30 seconds
120
time-to-live (TTL)
64
Configuring BGP
Procedure 31-1 describes how to configure Basic BGP. Procedure 31-1 Configuring Basic BGP
Step 1. Task In configuration command mode, enable BGP and enter BGP configuration mode, specifying the autonomous system for this router. In BGP configuration mode, configure the BGP router-ID. In BGP configuration mode, optionally configure an aggregate by combining the characteristics of multiple routes so that a single route is advertised. In BGP configuration mode, optionally enable aggregation of routes independent of the route MED. In BGP configuration mode, optionally disable deterministic processing of MEDs. In BGP configuration mode, optionally specify whether to compare MEDs when multiple routes with differing MEDs are received from peers in different Autonomous Systems. In BGP configuration mode, optionally modify the local-preference of advertised routes for the router. In BGP configuration mode, optionally modify the route selection priority given to internal or external BGP routes compared to other protocols for the router. In BGP configuration mode, optionally modify the maximum number of allowed external BGP ECMP routes. In BGP configuration mode, optionally modify the maximum number of allowed internal BGP ECMP routes. In BGP configuration mode, optionally disable BGP configuration on the router. Administratively disabled BGP configuration can be reenabled using the enable command. In BGP configuration mode, optionally disable message logging via the syslog mechanism whenever a BGP peer enters or leaves the established state. In BGP configuration mode, optionally enable the sending of BGP traps when a peer transitions to Established or a lower state. Command(s) router bgp as-number
2. 3.
bgp router-id router-id aggregate-address prefix/length [summary] [as-set] [summary-and-as-set] [suppress-map route-map] [advertise-map route-map] [attribute-map route-map] bgp aggregate-med
4.
5. 6.
7.
8.
9.
10.
11.
no enable
12.
no log-up-down
13.
31-22
Configuring BGP
2.
In BGP configuration mode, optionally specify redistribute connected [aspath-limit limit] that connected routes are redistributed into BGP. [origin code] [med value] [local-pref value] [route-map name] In BGP configuration mode, optionally specify that RIP routes are redistributed into BGP. In BGP configuration mode, optionally specify that static routes are redistributed into BGP. In BGP configuration mode, optionally specify that OSPF routes are redistributed into BGP. redistribute rip [aspath-limit limit] [origin code] [med value] [local-pref value] [route-map name] redistribute static [aspath-limit limit] [origin code] [med value] [local-pref value] [route-map name] redistribute ospf proc-id [aspath-limit limit] [origin code] [med value] [local-pref value] [route-map name]
3.
4.
5.
The example consists of two routers with a connection on subnet 192.168.12.0/24. One router belongs to AS 1. The other router belongs to AS 2. The example configuration consists of configuring, for each router: The connection interface and IP address
Configuring BGP
The AS the router belongs to The router ID The connection neighbor IP address and remote AS The redistribution of static routes
Router 1
Router 1(rw)->configure Router 1(rw-config)->interface vlan 12 Router 1(rw-config-intf-vlan.0.12)->ip address 192.168.12.111 255.255.255.0 Router 1(rw-config-intf-vlan.0.12)->no shutdown Router 1(rw-config-intf-vlan.0.12)->exit
Router 1(rw)->configure Router 1(rw-config)->router bgp 1 Router 1(su-config-bgp)->bgp router-id 1.1.1.1 Router 1(su-config-bgp)->neighbor 192.168.12.112 remote-as 2 Router 1(su-config-bgp)->redistribute static Router 1(su-config-bgp)->
Router 2
Router 2(rw)->configure Router 2(rw-config)->interface vlan 12 Router 2(rw-config-intf-vlan.0.12)->ip address 192.168.12.112 255.255.255.0 Router 2(rw-config-intf-vlan.0.12)->no shutdown Router 2(rw-config-intf-vlan.0.12)->exit
Router 2(rw)->configure Router 2(rw-config)->interface vlan 13 Router 2(rw-config-intf-vlan.0.13)->ip address 192.168.13.111 255.255.255.0 Router 2(rw-config-intf-vlan.0.13)->no shutdown Router 2(rw-config-intf-vlan.0.13)->exit
Router 2(rw)->configure Router 2(rw-config)->router bgp 2 Router 2(su-config-bgp)->bgp router-id 2.2.2.2 Router 2(su-config-bgp)->neighbor 192.168.12.111 remote-as 1 Router 2(su-config-bgp)->redistribute static
Router 2(su-config-bgp)-> Procedure 31-3 is a simple configuration intended for external BGP propagation.
31-24
Configuring BGP
2. 3.
In configuration mode, configure loopback and physical addresses and enter interface configuration mode. In interface configuration mode, configure the IP address for the interface that serves as the BGP speaker. In configuration mode, specify an AS number for the router and enter BGP Configuration mode. In BGP configuration mode, configure a BGP-specific router ID to override the global router ID. In BGP configuration mode, configure the peer by identifying its IP address and AS. In BGP configuration mode, redistribute routes into BGP, optionally specifying a route-map. Supported route-types are connected, static, OSPF, and RIP.
4. 5. 6. 7.
Configuring BGP
The example consists of two routers with a connection on subnet 192.168.12.0/24. Because this is an internal BGP connection, both routers belong to the same AS. The example configuration consists of configuring, for each router: The loopback interface for the update source IP address The connection interface and IP address The AS the router belongs to The router ID The connection neighbor IP address (use update source IP address) and remote AS The connection neighbor IP address, specifying the update source IP address for this router The redistribution of static routes
Router 1
Router 1(rw)->configure Router 1(rw-config)->interface loopback 1 Router 1(rw-config-intf-loop.0.1)->ip address 1.1.1.1 255.255.255.0 Router 1(rw-config-intf-loop.0.1)->no shutdown Router 1(rw-config-intf-loop.0.1)->exit
Router 1(rw-config)->interface vlan 12 Router 1(rw-config-intf-vlan.0.12)->ip address 192.168.12.111 255.255.255.0 Router 1(rw-config-intf-vlan.0.12)->no shutdown Router 1(rw-config-intf-vlan.0.12)->exit
Router 1(rw)->configure Router 1(rw-config)->router bgp 1 Router 1(su-config-bgp)->bgp router-id 1.1.1.1 Router 1(su-config-bgp)->neighbor 2.2.2.2 remote-as 1 Router 1(su-config-bgp)->neighbor 2.2.2.2 update-source 1.1.1.1 Router 1(su-config-bgp)->redistribute static Router 1(su-config-bgp)->
Router 2
Router 1(rw)->configure Router 1(rw-config)->interface loopback 1 Router 1(rw-config-intf-loop.0.1)->ip address 2.2.2.2 255.255.255.0 Router 1(rw-config-intf-loop.0.1)->no shutdown Router 1(rw-config-intf-loop.0.1)->exit
Router 2(rw-config)->interface vlan 12 Router 2(rw-config-intf-vlan.0.12)->ip address 192.168.12.112 255.255.255.0 Router 2(rw-config-intf-vlan.0.12)->no shutdown Router 2(rw-config-intf-vlan.0.12)->exit
31-26
Configuring BGP
Router 2(rw)->configure Router 2(rw-config)->interface vlan 13 Router 2(rw-config-intf-vlan.0.13)->ip address 192.168.13.111 255.255.255.0 Router 2(rw-config-intf-vlan.0.13)->no shutdown Router 2(rw-config-intf-vlan.0.13)->exit
Router 2(rw)->configure Router 2(rw-config)->router bgp 2 Router 2(su-config-bgp)->bgp router-id 2.2.2.2 Router 2(su-config-bgp)->neighbor 1.1.1.1 remote-as 1 Router 1(su-config-bgp)->neighbor 1.1.1.1 update-source 2.2.2.2 Router 2(su-config-bgp)->redistribute static Router 2(su-config-bgp)->
Procedure 31-4 on page 31-27 is a simple configuration intended for internal BGP propagation. Procedure 31-4 IBGP Basic Peering Configuration
Step 1. Task In configuration mode, configure static routes between BGP routers to allow IP traffic transmission between remote routers. Command ip route {prefix mask | prefix/prefix-length} {ip-address [recursive | interface interface-name] | interface interface-name | vlan vlan-id | vrf egress-vrf | blackhole | reject} [distance] [tag tag-id] interface {vlan vlan-id | loopback loopback-id | interface-name} ip address {ip-address ip-mask | ip-address/prefixLength} [primary | secondary] router bgp as-number bgp router-id router-id neighbor ip-address update-source source-addr
2. 3.
In configuration mode, configure loopback and physical addresses and enter interface configuration mode. In interface configuration mode, configure the IP address for the interface that serves as the BGP speaker. In configuration mode, specify an AS number for the router and enter BGP Configuration mode. In BGP configuration mode, configure a BGP-specific router ID to override the global router ID. In BGP configuration mode, specify an update source IP address assigned to a loopback interface, for this router, to be used as the source address instead of the default outgoing interface IP address. In BGP configuration mode, configure the peer by identifying its source IP address and AS. In BGP configuration mode, redistribute routes into BGP, optionally specifying a route-map. Supported route-types are connected, static, OSPF, and RIP.
4. 5. 6.
7. 8.
neighbor ip-address remote-as as-num redistribute route-type [aspath-limit limit] [origin code] [med value] [local-pref value] [route-map name]
Configuring BGP
Be aware that no IP traffic can pass to advertised BGP routes until an IGP protocol or static route is configured for those prefixes on the middle router. See Figure 31-4 on page 31-28 for a presentation of the multihop EBGP basic peering configuration example topology. Figure 31-4 EBGP Multihop Peering Topology
Router 2 non-BGP
.111
.112
Router 1(rw)->configure Router 1(rw-config)->router bgp 1 Router 1(su-config-bgp)->bgp router-id 1.1.1.1 Router 1(su-config-bgp)->neighbor 192.168.13.111 remote-as 2 Router 1(su-config-bgp)->redistribute static Router 1(su-config-bgp)->
31-28
19
V 2. LA 16 N 8. 1 13 3 .0 /2 4
Configuring BGP
Router 2
Router 2(rw)->configure Router 2(rw-config)->interface vlan 12 Router 2(rw-config-intf-vlan.0.12)->ip address 192.168.12.112 255.255.255.0 Router 2(rw-config-intf-vlan.0.12)->no shutdown Router 2(rw-config-intf-vlan.0.12)->exit
Router 2(rw-config)->interface vlan 13 Router 2(rw-config-intf-vlan.0.13)->ip address 192.168.13.111 255.255.255.0 Router 2(rw-config-intf-vlan.0.13)->no shutdown Router 2(rw-config-intf-vlan.0.13)->exit
Router 3
Router 3(rw)->configure Router 1(rw-config)->interface vlan 13 Router 1(rw-config-intf-vlan.0.13)->ip address 192.168.13.112 255.255.255.0 Router 1(rw-config-intf-vlan.0.13)->no shutdown Router 1(rw-config-intf-vlan.0.13)->exit
Router 1(rw)->configure Router 1(rw-config)->ip route 192.168.12.0/24 192.168.12.111 interface vlan 13 Router 1(rw-config)->router bgp 2 Router 1(su-config-bgp)->bgp router-id 2.2.2.2 Router 1(su-config-bgp)->neighbor 192.168.12.111 remote-as 1 Router 1(su-config-bgp)->redistribute static Router 1(su-config-bgp)->
Procedure 31-5 is a simple configuration intended for multihop BGP propagation. Procedure 31-5 Multihop BGP Basic Peering Configuration
Step 1. Task In configuration mode, configure static routes between BGP routers to allow IP traffic transmission between remote routers. Command ip route {prefix mask | prefix/prefix-length} {ip-address [recursive | interface interface-name] | interface interface-name | vlan vlan-id | vrf egress-vrf | blackhole | reject} [distance] [tag tag-id] interface {vlan vlan-id | loopback loopback-id | interface-name} ip address {ip-address ip-mask | ip-address/prefixLength} [primary | secondary] router bgp as-number bgp router-id router-id
2. 3.
In configuration mode, configure loopback and physical addresses and acquire interface configuration mode. In interface configuration mode, configure the IP address for the interface that serves as the BGP speaker. In configuration mode, specify an AS number for the router and enter BGP Configuration mode. In BGP configuration mode, configure a BGP-specific router ID to override the global router ID.
4. 5.
Configuring BGP
7. 8.
neighbor ip-address clear-counters neighbor ip-address confed-member neighbor ip-address connect-retry-interval interval
31-30
Configuring BGP
Table 31-3
Task
In BGP configuration mode, explicitly enable a peer that has been administratively disabled. A configured peer is enabled by default. In BGP configuration mode, optionally modify the interval between returning to the idle state and reinitiating a TCP connection for this neighbor. In BGP configuration mode, optionally configure EBGP peer routes to not contain this neighbors AS. In BGP configuration mode, optionally modify the maximum number of Outbound Route Filtering (ORF) entries that will be accepted from this neighbor. In BGP configuration mode, optionally modify the peak number of prefixes that BGP will accept for installation into the Routing Information Base (RIB). In BGP configuration mode, optionally configure BGP to always set the BGP next hop to the EBGP peer's address, overriding third-party next hops. In BGP configuration mode, optionally set this neighbors next hop as the router's own address on advertisement. In BGP configuration mode, optionally modify the interval between the establishment of a TCP connection and the sending of an OPEN message to open a BGP session. In BGP configuration mode, optionally prevent the router from ever trying to open a BGP connection with the specified peer. In BGP configuration mode, optionally configure a simple password for the peer. In BGP configuration mode, optionally create a BGP peer group and add a peer group neighbor. In BGP configuration mode, optionally configure the peer type of the specified peer or group. In BGP configuration mode, optionally configure whether updates for prefixes containing the NOPEER community will be accepted by or sent to this neighbor. In BGP configuration mode, optionally specify a BGP route-map to be used for controlling the import or export of routes to and from the specified peer or group. In BGP configuration mode, optionally specify that the router will act as a route reflector for this neighbor. In BGP configuration mode, optionally modify the interval between the advertisement and subsequent withdrawal of a route. In BGP configuration mode, optionally enable soft-reconfiguration for a peer or peer group. In BGP configuration mode, optionally modify holdtime and keepalive time values within a BGP peer.
neighbor ip-address idle-hold-interval interval neighbor ip-address ignore-leading-as neighbor ip-address maximum-orf num
neighbor ip-address maximum-prefix num [warning-only] neighbor {ip-address | groupID} next-hop-peer neighbor {ip-address | groupID} next-hop-self neighbor ip-address open-delay seconds neighbor ip-address passive neighbor ip-address password string neighbor groupID peer-group neighbor ip-address peer-group pgname neighbor {ip-prefix/length | groupID} peer-type {ibgp | ebgp | ebgp-confed} neighbor {ip-address | groupID} peering-type {bilateral | unspecified} neighbor {ip-address | groupID} route-map rm-name {in | out} neighbor ip-address route-reflector-client neighbor ip-address route-withdraw-interval interval neighbor {ip-address | groupID} soft-reconfiguration neighbor ip-address timers keepalive-value holdtime-value
Configuring BGP
Table 31-3
Task
In BGP configuration mode, optionally modify the time to live (TTL) value. In BGP configuration mode, optionally specify the source IP address to be used in all TCP and BGP messages sent to the peer.
Network
Initial Route Alternate Route
Router 1 AS: 10 Source-address: 1.1.1.1 Neighbor: 3.3.3.3 remote-as 10 Router 3 AS: 10
Router 3 AS 10
Router 1
S Chassis(su-config)->router bgp 10 S Chassis(su-config-bgp)->bgp router-id 1.1.1.1 S Chassis(su-config-bgp)->neighbor 3.3.3.3 remote-as 10
31-32 Border Gateway Protocol (BGP) Configuration
192 . 168 . 1 2 .0
/2 4
Configuring BGP
Router 3
S Chassis(su-config)->router bgp 10 S Chassis(su-config-bgp)->bgp router-id 3.3.3.3 S Chassis(su-config-bgp)->neighbor 1.1.1.1 remote-as 10 S Chassis(su-config-bgp)->neighbor 1.1.1.1 update-source 3.3.3.3
Procedure 31-6 describes how to configure the source IP address to the remote peer. Procedure 31-6 Configuring Source IP Address to the Peer Update
Step 1. 2. Task In BGP configuration mode, specify the neighbor this update source IP address will be applied to. In BGP configuration mode, specify the update source IP address for this neighbor. Command(s) neighbor ip-address remote-as as-num neighbor ip-address update-source source-addr
Configuring BGP
Figure 31-6
Confederation 100
2 A N /2 4 VL 0.2.0 .2 0.1 20
Router 2 AS 2 .1
20 VLA 0.1 N 0.4 4 .0/ 24
.2
.2
Router 4 AS 4
Router 1
Router 1(rw)->configure Router 1(rw-config)->interface vlan 1 Router 1(rw-config-intf-vlan.0.1)->ip address 200.10.1.1 255.255.255.0 Router 1(rw-config-intf-vlan.0.1)->no shutdown Router 1(rw-config-intf-vlan.0.1)->exit
Router 1(rw)->configure Router 1(rw-config)->router bgp 1 Router 1(su-config-bgp)->bgp router-id 1.1.1.1 Router 1(su-config-bgp)->neighbor 200.10.1.2 remote-as 100 Router 1(su-config-bgp)->redistribute static Router 1(su-config-bgp)->
Router 2
Router 2(rw)->configure Router 2(rw-config)->interface vlan 1 Router 2(rw-config-intf-vlan.0.1)->ip address 200.10.1.2 255.255.255.0 Router 2(rw-config-intf-vlan.0.1)->no shutdown Router 2(rw-config-intf-vlan.0.1)->exit
31-34
Configuring BGP
Router 2(rw-config-intf-vlan.0.2)->ip address 200.10.2.1 255.255.255.0 Router 2(rw-config-intf-vlan.0.2)->no shutdown Router 2(rw-config-intf-vlan.0.2)->exit
Router 2(rw-config)->interface vlan 4 Router 2(rw-config-intf-vlan.0.4)->ip address 200.10.4.1 255.255.255.0 Router 2(rw-config-intf-vlan.0.4)->no shutdown Router 2(rw-config-intf-vlan.0.4)->exit
Router 2(rw-config)->router bgp 2 Router 2(su-config-bgp)->bgp router-id 2.2.2.2 Router 2(su-config-bgp)->neighbor 200.10.1.1 remote-as 1 Router 2(su-config-bgp)->neighbor 200.10.2.2 remote-as 3 Router 2(su-config-bgp)->neighbor 200.10.4.2 remote-as 4 Router 2(su-config-bgp)->bgp confederation-id 100 Router 2(su-config-bgp)->neighbor 200.10.2.2 confed-member Router 2(su-config-bgp)->neighbor 200.10.4.2 confed-member Router 2(su-config-bgp)->redistribute static Router 2(su-config-bgp)->
Router 3
Router 3(rw)->configure Router 3(rw-config)->interface vlan 2 Router 3(rw-config-intf-vlan.0.2)->ip address 200.10.2.2 255.255.255.0 Router 3(rw-config-intf-vlan.0.2)->no shutdown Router 3(rw-config-intf-vlan.0.2)->exit
Router 3(rw-config)->interface vlan 3 Router 3(rw-config-intf-vlan.0.3)->ip address 200.10.3.1 255.255.255.0 Router 3(rw-config-intf-vlan.0.3)->no shutdown Router 3(rw-config-intf-vlan.0.3)->exit
Router 3(rw-config)->router bgp 3 Router 3(su-config-bgp)->bgp router-id 3.3.3.3 Router 3(su-config-bgp)->neighbor 200.10.2.1 remote-as 2 Router 3(su-config-bgp)->neighbor 200.10.3.2 remote-as 4 Router 3(su-config-bgp)->bgp confederation-id 100 Router 3(su-config-bgp)->neighbor 200.10.2.1 confed-member Router 3(su-config-bgp)->neighbor 200.10.3.2 confed-member Router 3(su-config-bgp)->redistribute static Router 3(su-config-bgp)->
Router 4
Router 4(rw)->configure Router 4(rw-config)->interface vlan 3 Router 4(rw-config-intf-vlan.0.3)->ip address 200.10.3.2 255.255.255.0
Enterasys S-Series Configuration Guide 31-35
Configuring BGP
Router 4(rw-config)->interface vlan 4 Router 4(rw-config-intf-vlan.0.4)->ip address 200.10.4.2 255.255.255.0 Router 4(rw-config-intf-vlan.0.4)->no shutdown Router 4(rw-config-intf-vlan.0.4)->exit
Router 4(rw-config)->router bgp 4 Router 4(su-config-bgp)->bgp router-id 4.4.4.4 Router 4(su-config-bgp)->neighbor 200.10.3.1 remote-as 3 Router 4(su-config-bgp)->neighbor 200.10.4.1 remote-as 2 Router 4(su-config-bgp)->bgp confederation-id 100 Router 4(su-config-bgp)->neighbor 200.10.3.1 confed-member Router 4(su-config-bgp)->neighbor 200.10.4.1 confed-member Router 4(su-config-bgp)->redistribute static Router 4(su-config-bgp)->
Procedure 31-7 describes how to configure BGP confederations. Procedure 31-7 Configuring BGP Confederation
Step 1. 2. Task In BGP configuration mode, specify the confederation this BGP router belongs to. In BGP configuration mode, configure the specified neighbor as a member of the router's confederation. In BGP configuration mode, optionally enable the inclusion of confederation information in the AS paths sent to this routers peers. In BGP configuration mode, optionally enable BGP to drop AS-Paths with erroneous confederation segments. Command(s) bgp confederation identifier confed-id neighbor ip-address confed-member
3.
4.
31-36
Configuring BGP
Figure 31-7
AS 2
AS 3
Router 4 .2
Router 5 .2
AS 1
.1 .1
Router 2 .2
Router 3
.2
Router 1
Router 1(rw)->configure Router 1(rw-config)->interface vlan 1 Router 1(rw-config-intf-vlan.0.1)->ip address 200.10.1.1 255.255.255.0 Router 1(rw-config-intf-vlan.0.1)->no shutdown Router 1(rw-config-intf-vlan.0.1)->exit
Router 1(rw)->configure Router 1(rw-config)->interface vlan 2 Router 1(rw-config-intf-vlan.0.2)->ip address 200.10.2.1 255.255.255.0 Router 1(rw-config-intf-vlan.0.2)->no shutdown Router 1(rw-config-intf-vlan.0.2)->exit
Router 1(rw)->configure Router 1(rw-config)->router bgp 1 Router 1(su-config-bgp)->bgp router-id 1.1.1.1 Router 1(su-config-bgp)->bgp cluster-id 1.1.1.1 Router 1(su-config-bgp)->neighbor 200.10.1.2 remote-as 1
Configuring BGP
Router 1(su-config-bgp)->neighbor 200.10.1.2 route-reflector-client Router 1(su-config-bgp)->neighbor 200.10.2.2 remote-as 1 Router 1(su-config-bgp)->neighbor 200.10.2.2 route-reflector-client Router 1(su-config-bgp)->redistribute static Router 1(su-config-bgp)->
Router 2
Router 2(rw)->configure Router 2(rw-config)->interface vlan 1 Router 2(rw-config-intf-vlan.0.1)->ip address 200.10.1.2 255.255.255.0 Router 2(rw-config-intf-vlan.0.1)->no shutdown Router 2(rw-config-intf-vlan.0.1)->exit
Router 2(rw)->configure Router 2(rw-config)->interface vlan 3 Router 2(rw-config-intf-vlan.0.2)->ip address 200.10.3.1 255.255.255.0 Router 2(rw-config-intf-vlan.0.2)->no shutdown Router 2(rw-config-intf-vlan.0.2)->exit
Router 2(rw)->configure Router 2(rw-config)->router bgp 1 Router 2(su-config-bgp)->bgp router-id 2.2.2.2 Router 2(su-config-bgp)->neighbor 200.10.1.1 remote-as 1 Router 2(su-config-bgp)->neighbor 200.10.3.2 remote-as 2 Router 2(su-config-bgp)->redistribute static Router 2(su-config-bgp)->
Router 3
Router 3(rw)->configure Router 3(rw-config)->interface vlan 2 Router 3(rw-config-intf-vlan.0.2)->ip address 200.10.2.2 255.255.255.0 Router 3(rw-config-intf-vlan.0.2)->no shutdown Router 3(rw-config-intf-vlan.0.2)->exit
Router 3(rw)->configure Router 3(rw-config)->interface vlan 4 Router 3(rw-config-intf-vlan.0.4)->ip address 200.10.4.1 255.255.255.0 Router 3(rw-config-intf-vlan.0.4)->no shutdown Router 3(rw-config-intf-vlan.0.4)->exit
Router 3(rw)->configure Router 3(rw-config)->router bgp 1 Router 3(su-config-bgp)->bgp router-id 3.3.3.3 Router 3(su-config-bgp)->neighbor 200.10.2.1 remote-as 1 Router 3(su-config-bgp)->neighbor 200.10.4.2 remote-as 3 Router 3(su-config-bgp)->redistribute static
31-38 Border Gateway Protocol (BGP) Configuration
Configuring BGP
Router 3(su-config-bgp)->
Router 4
Router 4(rw)->configure Router 4(rw-config)->interface vlan 3 Router 4(rw-config-intf-vlan.0.3)->ip address 200.10.3.2 255.255.255.0 Router 4(rw-config-intf-vlan.0.3)->no shutdown Router 4(rw-config-intf-vlan.0.3)->exit
Router 4(rw)->configure Router 4(rw-config)->router bgp 2 Router 4(su-config-bgp)->bgp router-id 4.4.4.4 Router 4(su-config-bgp)->neighbor 200.10.3.1 remote-as 1 Router 4(su-config-bgp)->redistribute static Router 4(su-config-bgp)->
Router 5
Router 5(rw)->configure Router 5(rw-config)->interface vlan 4 Router 5(rw-config-intf-vlan.0.4)->ip address 200.10.4.2 255.255.255.0 Router 5(rw-config-intf-vlan.0.4)->no shutdown Router 5(rw-config-intf-vlan.0.4)->exit
Router 5(rw)->configure Router 5(rw-config)->router bgp 3 Router 5(su-config-bgp)->bgp router-id 5.5.5.5 Router 5(su-config-bgp)->neighbor 200.10.4.1 remote-as 1 Router 5(su-config-bgp)->redistribute static Router 5(su-config-bgp)->
Procedure 31-8 describes how to configure BGP route reflection. Procedure 31-8 Configuring BGP Route Reflection
Step 1. Task In BGP configuration mode, specify that the router will act as a route reflector for the specified neighbor. In BGP configuration mode, specify the route reflection cluster ID for the cluster the route reflector belongs to. This value defaults to the route reflector router ID if only a single route reflector is configured for the cluster, otherwise a cluster ID must be specified. Command(s) neighbor ip-address route-reflector-client
2.
Configuring BGP
In BGP configuration mode, optionally specify whether bgp orf ipv4 unicast comm-filter {send | receive the ORF capability for community filtering is to be sent | both} to the BGP peer, received from the BGP peer, or both. In BGP configuration mode, optionally specify whether the ORF capability for extended community filtering is to be sent to the BGP peer, received from the BGP peer, or both. In BGP configuration mode, optionally specify whether the Outbound Route Filtering (ORF) capability for prefix filtering is to be sent to the BGP peer, received from the BGP peer, or both. bgp orf ipv4 unicast extcomm-filter {send | receive | both}
31-40
Configuring BGP
Figure 31-8
19
4 13 /2 N .0 A .13 VL 6 8 1 2.
.112
Network
1.0.0.0/8
2.0.0.0/8
For Router 1
Configure two static routes with next hops to 192.168.13.112 on VLAN 13 to destination prefixes 1.0.0.0/8 and 2.0.0.0/8 Configure the non-exist map prefix-list named non-exist-list1 and assign it to BGP route-map non-exist-map1, specifying prefix 2.0.0.0/8 as the non-exist map prefix Configure the advertise map prefix-list named adv-list1 and assign it to BGP route-map adv-map1, specifying prefix 1.0.0.0/8 as the advertised prefix Configure the router for AS 10 with a router ID of 1.1.1.1 Configure IP address 192.168.12.112 as the peer Configure the BGP advertise map for neighbor 192.168.12.112 and assign adv-map1 as the advertise map route-map and non-exist-map1 as the non-exist map route-map
Router 1(su)->configure Router 1(su-config)->ip route 1.0.0.0/8 192.168.13.112 interface vlan.0.13 Router 1(su-config)->ip route 2.0.0.0/8 192.168.13.112 interface vlan.0.13 Router 1(su-config)->ip prefix-list adv-list1 permit seq 1 1.0.0.0/8 Router 1(su-config)->route-map bgp adv-map1 Router 1(su-config-route-map-bgp)->match prefix-list adv-list1 Router 1(su-config-route-map-bgp)->exit Router 1(su-config)->ip prefix-list non-exist-list1 permit seq 1 2.0.0.0/8 Router 1(su-config)->route-map bgp non-exist-map1 Router 1(su-config-route-map-bgp)->match prefix-list non-exist-list1 Router 1(su-config-route-map-bgp)->exit Router 1(su-config)->router bgp 10
Configuring BGP
Router 1(su-config-bgp)->bgp router-id 1.1.1.1 Router 1(su-config-bgp)->neighbor 192.168.12.112 remote-as 10 Router 1(su-config-bgp)->neighbor 192.168.12.112 advertise-map adv-map1 non-exist-map non-exist-map1 Router 1(su-config-bgp)->
For Router 2:
Configure a static route with the next hop 192.168.12.111 on VLAN 12 to destination prefix 192.168.13.0/24 Configure Router 2 for AS 10 with a router ID of 2.2.2.2 Configure IP address 192.168.12.111 as the peer
Router 2(su)->configure Router 2(su-config)->ip route 192.168.13.0/24 192.168.12.111 interface vlan.0.12 Router 2(su-config)->router bgp 10 Router 2(su-config-bgp)->bgp router-id 2.2.2.2 Router 2(su-config-bgp)->neighbor 192.168.12.111 remote-as 10 Router 2(su-config-bgp)->Verifying the Configuration
If advertised map configuration is not applied, the Router 1 advertised routes output for 192.168.12.112 would display both configured static routes as being advertised to Router 2:
Router 1(su)->show ip bgp peer 192.168.12.112 advertised-routes Route status codes: adv - advertised, sup - suppressed, pw - pending w/drawal, wd - w/drawn Route aggregation codes: 1 - Route is not aggregating or aggregated 2 - Route is aggregating 3 - Route is unsuppressed aggregated 4 - Route is suppressed aggregated
With the advertised map configuration applied, only network 2.0.0.0 displays:
Router 1(su)->show ip bgp peer 192.168.12.112 advertised-routes .... Stat Aggr adv 1 Network 2.0.0.0 Next Hop 192.168.13.112 Rib MED Local-Pref Origin AS Path U 0 100 Inc
Should static route 2.0.0.0/8 be withdrawn, network 1.0.0.0 is advertised and network 2.0.0.0 displays as withdrawn:
Router 1(su-config)->no ip route 2.0.0.0/8 192.168.13.112 interface vlan.0.13 1 Router 1(su-config)->show ip bgp peer 192.168.12.112 advertised-routes .... Stat Aggr adv wd 1 1 Network 1.0.0.0 2.0.0.0 Next Hop 192.168.13.112 192.168.13.112 Rib MED Local-Pref Origin AS Path U U 0 0 100 100 Inc Inc
31-42
Configuring BGP
Procedure 31-9 describes how to configure BGP conditional route advertisement. Procedure 31-9 Configuring BGP Conditional Route Advertisement
Step 1. Task In router configuration mode, configure a prefix list for both the advertise and non-exist prefixes to be matched in the appropriate route-maps. In router configuration mode, create both an advertise and non-exist route-map. In BGP route-map configuration mode, add match statements containing the configured prefix lists to the appropriate BGP route-map. In BGP configuration mode, specify the advertise and non-exist maps to be applied to this neighbor. Command(s) ip prefix-list name [seq seq-value] {deny | permit} {prefix/length} [source-address] [next-hop] [ge length] [le length] [nlri] route-map bgp name [permit | deny] [sequence-number] match prefix-list prefix-list
2. 3.
4.
4.
5.
31-44
Table 31-7
Term AS AS path BGP
route reflector
route refresh
soft reconfiguration
31-46
32
Network Address Translation (NAT) Configuration
This document provides the following information about configuring Network Address Translation (NAT) on the Enterasys S-Series platform.
Note: NAT is currently not supported on the S-Series S-130 module. For information about... Using Network Address Translation in Your Network Implementing NAT NAT Overview Configuring NAT NAT Configuration Examples Terms and Definitions Refer to page... 32-1 32-2 32-2 32-8 32-11 32-15
Enterasys support for NAT provides a practical solution for organizations who wish to streamline their IP addressing schemes. NAT operates on a router connecting a private network to a public
Implementing NAT
network, simplifying network design and conserving IP addresses. NAT can help organizations merge multiple networks together and enhance network security by: Helping to prevent malicious activity initiated by outside hosts from entering the corporate network Augmenting privacy by keeping private intranet addresses hidden from view of the public internet, thereby inhibiting scans Limiting the number of IP addresses used for private intranets that are required to be registered with the Internet Assigned Numbers Authority (IANA)
Implementing NAT
To implement NAT in your network: Enable NAT on both the inside (local) and outside (public) interfaces to be used for translation If you intend to use inside source address dynamic translation (see Dynamic Address Translations on page 5 for details): Define an access-list of inside addresses Define a NAT address pool of outside addresses Enable dynamic translation of inside addresses specifying an access-list of inside addresses and a NAT address pool of outside addresses Optionally configure overload for NAPT (defaults to NAT) Optionally specify the interface to which translations are applied
If you intend to use inside source address static translation (see Static Address Translation on page 3 for details), enable inside source address static translation in the appropriate NAT or NAPT context Optionally change the NAT FTP control port from its default of 21 Optionally modify maximum allowed entries and NAT translation timeout values
NAT Overview
This section provides an overview of NAT configuration.
NAT Configuration
A traditional NAT configuration is made up of a private network or intranet, a public network, and a router that interconnects the two networks. The private network is made up of one or more devices each assigned an inside (internal) address that is not intended to be directly connectable to a public network device. The router interconnecting the private and public networks support traditional NAT. It is NATs responsibility to translate the inside address to a unique outside address to facilitate communication with the public network for intranet devices. NAT allows translations between IP addresses. NAPT allows translations between multiple inside addresses and their associated ports and a single outside IP address and its associated ports. NAT and NAPT support both static and dynamic address translation.
NAT Binding
A NAT flow has two devices associated with it that are in communication with each other: the client device belonging to the inside (private) network and the server device belonging to the
32-2 Network Address Translation (NAT) Configuration
NAT Overview
outside (public) network. Each active NAT flow has a binding resource associated with it. Each flow is based upon the following criteria: If it is a non-FTP NAT flow: Source IP Address - The inside client IP address Destination IP Address - The outside server IP address
If it is a NAPT or FTP flow: Source IP Address - The inside client IP address Destination IP Address - The outside server IP address Source Port - The inside client source port Destination Port - The outside server destination port
NAT Overview
Figure 32-1
External Public Network DA: 10.1.1.1 SA: 200.1.1.1 Server1 10.1.1.1 DA: 200.1.1.1 SA: 10.1.1.1
NAT ROUTER
DA: 10.1.1.1 SA: 200.1.1.50 DA: 200.1.1.50 SA: 200.1.1.1 Client1 200.1.1.50
NAT ROUTER
32-4
NAT Overview
Client1 Walkthrough:
Client1 sends an IP packet to Server1 via the NAT router. The packet arrives on a VLAN configured as NAT inside and Server1 is accessible through a VLAN configured as NAT outside. An access-list matching Client1's source IP address is configured to a NAT list rule. A dynamic binding is created and a global IP address is assigned to the binding 200.1.1.1. The packet is sent to Server1 with the destination IP unchanged and the source IP address changed to 200.1.1.1. Server1 sends an IP packet back to 200.1.1.1. This packet matches the previously created dynamic binding. The packet is sent on to Client1 with the destination IP address changed from 200.1.1.1 to 200.1.1.50. The source IP address remains unchanged.
NAT Overview
Figure 32-3
External Public Network DA: 10.1.1.1 SA: 200.1.1.60 DA: 10.1.1.2 SA: 200.1.1.50 DA: 10.1.1.1 SA: 200.1.1.1 Server1 10.1.1.1 DA: 200.1.1.1 SA: 10.1.1.1
NAT ROUTER
Client2 200.1.1.60
DA: 10.1.1.1 SA: 200.1.1.50 DA: 200.1.1.50 SA: 200.1.1.1 Client1 200.1.1.50
Client2 Walkthrough:
Client2 presents an unNATed example. Client2s actual source address is seen by the external network both when Server1 receives data from and sends data to Client2.
NAT Overview
address of 200.1.1.50:35000 as the destination address. Server1s response is delivered to IP address 200.1.1.50:35000. Figure 32-4 Basic NAPT Dynamic Inside Address Translation
External Public Network DA: 10.1.1.1:80 SA: 200.1.1.1:80 DA: 200.1.1.1:80 SA: 10.1.1.1:80 Server1 10.1.1.1
NAT ROUTER
DA: 10.1.1.1:80 SA: 200.1.1.50:35000 DA: 200.1.1.50:35000 SA: 200.1.1.1:80 Client1 200.1.1.50
NAT Timeouts
The maximum timeout value in seconds per flow is configurable for the following flow types: Dynamic translation UDP and TCP ICMP DNS FTP
Configuring NAT
data portion, are supported. The FTP control port is configurable. NAT also supports the FTP extended modes as defined in RFC2428. The NAT implementation also supports the translation of the IP address embedded in the data portion of following types of ICMP error message: destination unreachable (type3), source quench (type4), redirect (type5), time exceeded (type 11) and parameter problem (type 12). NAT also supports an ALG for ICMP echo request/reply when these are forwarded via an overloaded (port-NATed) list rule.
Enabling NAT
When traffic subject to translation originates from or is destined to an interface, that interface must be enabled for NAT. If the interface is part of the internal private network, it should be enabled as an inside interface. If the interface is part of the external public network, it should be enabled as an outside interface.
Configuring NAT
This section provides details for the configuration of NAT on the S-Series products. Table 32-1 lists NAT parameters and their default values. Table 32-1 Default NAT Parameters
Parameter Overload Description Specifies that NAPT translation should take place for this dynamic pool binding. Specifies the timeout value applied to dynamic translations. Specifies the timeout value applied to the UDP translations. Specifies the timeout value applied to the TCP translations. Specifies the timeout value applied to the ICMP translations. Specifies the timeout value applied to the DNS translations. Specifies the timeout value applied to the FTP translations. Default Value NAT translation
Timeout UDP timeout TCP timeout ICMP timeout DNS timeout FTP timeout
240 seconds 240 seconds 240 seconds 240 seconds 240 seconds 240 seconds
32-8
Configuring NAT
Table 32-2 lists NAT resource limits. Table 32-2 NAT Resource Limits
Resource Global Bindings IP Addresses Pools Port Mapped Addresses Static Rules S-Series 65536 2000 10 20 1000
2.
3.
ip nat inside source static {tcp | udp} local-ip local-port global-ip global-port
2.
ip access-list list-number {deny | permit} source ip nat pool name start-ip-address end-ip-address {netmask netmask | prefix-length prefix-length}
3.
Configuring NAT
clear ip nat bindings {all | pool pool | id id | match {protocol | * | icmp {sip | *} {dip | *} | tcp {sip | * port | *} {dip | * port | *} | udp {sip | *} {dip | *}} [detail] clear ip nat statistics
32-10
Table 32-4
Task
Figure 32-5
External Public Network DA: 10.1.1.1 SA: 200.1.1.1 DA: 200.1.1.1 SA: 10.1.1.1 VLAN 100 DA: 10.1.1.1:80 SA: 200.1.1.1:80 Server1 10.1.1.1 10.1.1.1:80 DA: 200.1.1.1:80 SA: 200.1.1.1:80
NAT ROUTER
DA: 10.1.1.1:80 SA: 200.1.1.60:35000 DA: 200.1.1.60:35000 SA: 200.1.1.1:80 Client2 200.1.1.60
32-12
Internal Private Network DA: 200.1.1.50 SA: 10.1.1.1 DA: 10.1.1.1 SA: 200.1.1.50 VLAN 10
NAT ROUTER
Client1 10.1.1.1
DA: 200.1.1.50 SA: 10.1.1.2 DA: 10.1.1.2 SA: 200.1.1.50 Client2 10.1.1.2
VLAN 20 DA: 200.1.1.50:80 SA: 10.1.1.3:125 DA: 10.1.1.3:125 SA: 200.1.1.50:80 Client3 10.1.1.3 VLAN 20 DA: 200.1.1.50:80 SA: 10.1.1.4:125 DA: 10.1.1.4:125 SA: 200.1.1.50:80 Client4 10.1.1.4
To configure Client1 and Client2 for dynamic NAT translation on the NAT router, we define access-list 1 to permit the local IP addresses 10.1.1.1 and 10.1.1.2. We then configure the NAT translation NAT pool natpool with the global address range of 200.1.1.1 to 200.1.1.2. We then enable dynamic translation of inside addresses associating access-list 1 with the NAT pool natpool. To configure Client3 and Client4 for dynamic NAPT translation on the NAT router, we define access-list 2 to permit the local IP addresses 10.1.1.3 and 10.1.1.4. We then configure NAT pool dynamicpool with a global range of 200.1.1.3 to 200.1.1.3. We then enable dynamic translation of inside addresses for overload associating access-list 2 with the NAT pool naptpool.
32-14
32-16
33
Load Sharing Network Address Translation (LSNAT) Configuration
This document provides the following information about configuring LSNAT on the Enterasys S-Series platform.
For information about... Using LSNAT on Your Network Implementing LSNAT LSNAT Overview Configuring LSNAT LSNAT Configuration Example Terms and Definitions Refer to page... 33-1 33-3 33-3 33-9 33-14 33-23
Figure 33-1 on page 2 provides the following example of an LSNAT deployment: 1. 2. A request for service is sent by the client to a virtual server. The destination address for the service request is the virtual server's unique Virtual IP (VIP) address. A VIP address is defined by an IP Address (or IP Address range), IP Protocol, and UDP/TCP port number. The same IP address can be used for multiple virtual servers if a different port address is used. The LSNAT configured router recognizes the VIP address and knows that LSNAT must select a real server to forward the request to. Before forwarding the request, based upon the server load balancing process configured (round robin is displayed), LSNAT selects the real server for this request. LSNAT changes the destination IP address from the VIP address to the address of the selected real server member
Enterasys S-Series Configuration Guide 33-1
3.
of the server farm associated with the virtual server address. The packet is then forwarded to the selected real server. 4. 5. The real server sends a service response back to the client with its address as the response source address. At the router, LSNAT sees the real server address and knows it must first translate it back to the VIP address before forwarding the packet on to the client.
Figure 33-1
LSNAT Overview
2
Real Server IP Address Request VIP to Real IP Address Translation LSNAT Configured Virtual IP Address
3 4
Real Server IP Address Server Response Packet
Router
Global Internet
5
al Response Real IP to VIP Address Translation Client
The need for load sharing arises when a single server is not able to cope with the service demand. Legacy load sharing schemes were often ad-hoc and platform-specific, having the problem of lengthy reordering times on the servers and the inability to account for server load variations. LSNAT configuration and operation is separate from the client and servers and therefore does not care which client, server, or service is involved. It merely maps a single VIP to multiple real server IP address and port combinations, based upon a configured load balancing algorithm, and forwards packets accordingly. With load sharing over multiple servers, reliability is increased by allowing you to take an individual server offline for scheduled maintenance, without disrupting ongoing service operations. The servers are easily removed and replaced in the queue making maintenance a transparent activity, eliminating maintenance related downtime for the site. Load sharing also provides redundancy in the case of a server failure. LSNAT automatically removes the failed server from the selection process. When the failed server becomes active again, LSNAT automatically adds the server back into the selection process. Server and TCP/UDP port verification can ensure that the ports used by LSNAT are operational. TCP/UPD port service verification is capable of determining whether a server is active before creating a session. This feature eliminates the point of failure vulnerability by automatically recognizing a server is down and taking it out of the LSNAT load balancing process.
33-2
Implementing LSNAT
Security is improved since only the VIP is known, not the specific server addresses, ensuring that only the appropriate traffic goes to the servers. LSNAT improves network performance by leveling traffic over many systems. Using LSNAT in conjunction with Aggregate Links removes the performance bottleneck and reliability concerns of one physical link to a server by bundling multiple links, with fail over if a link goes down. Utilizing the IP-Policy and QoS features of the S-Series device with the LSNAT feature further improves the performance and security of the network. When tied with the Virtual Redundant Router Protocol (VRRP), the network becomes even more reliable and secure. For all these reasons, LSNAT is ideal for enterprise account web servers, application servers, or database servers.
Implementing LSNAT
To implement LSNAT in your network: 1. Configure one or more server farms by: 2. Specifying a server farm name Configuring real servers as members of the server farm Specifying a load balancing algorithm for each server farm
Configure each real server by: Optionally configuring and assigning a probe(s) to monitor real server state, port verification and application content verification Optionally limiting the maximum number of active connections for this real server Optionally specifying a round robin weight value for this real server Enabling the real server for service
3.
Configure a virtual server by: Specifying a virtual server name Associating a virtual server with a server farm Configuring a virtual server IP address (VIP) Optionally restricting access to specific virtual server clients Optionally specifying a sticky type and idle timeout Enabling the virtual server for service
4.
Configure global virtual server settings by: Optionally defining a non-standard FTP port to be used by virtual servers Optionally allowing all clients to directly access all services provided by real servers
5.
LSNAT Overview
This section provides an overview of the LSNAT components. The LSNAT configuration is made up of one or more server farms, each containing multiple real servers that face the client through a configured virtual server. All aspects of an LSNAT configuration relate to the configuration or management of one of these three LSNAT components: server farm, real server, and virtual server.
Enterasys S-Series Configuration Guide 33-3
LSNAT Overview
Figure 33-2 on page 33-4 presents an LSNAT packet flow. A request for services is sent by the client to the Virtual server IP address (VIP) on the LSNAT configured router. The source address for this request is the client IP address. The destination address for the request is the LSNAT VIP address. The LSNAT router recognizes the VIP address and based upon the server load balancing algorithm (round robin is displayed) LSNAT changes the destination address from the VIP address to the address of one of the real server members of the server farm associated with the VIP address. The packet is forwarded to the selected real server. When the real server sends a response back to the client, LSNAT sees the real server address and translates it back to the virtual server before forwarding the packet on to the client. Figure 33-2 LSNAT Packet Flow
10.10.125.1:80
Router
10.10.125.3:80
Global Internet
VIP194.56.13.2:80
Client IP196.86.100.12:125
33-4
LSNAT Overview
Round Robin
The round robin algorithm treats all servers equally by ordering the real servers and selecting them one at a time for each new session request. When it gets to the last real server in the ordering, it starts at the beginning again.
Least Connections
The least connections algorithm always assigns the next session to the real server with the least number of active connections currently assigned.
Stickiness
Stickiness refers to the ability of a virtual server to associate some set of IP network tuple information to a real server. A virtual server using stickiness will create a sticky entry when it creates a binding. The sticky entry contains a mapping of client source IP address, and optionally, destination IP and destination UDP/TCP port number, and the real server that was selected. The bindings can come and go but the sticky entries persist using a separate idle timer. When a new request is processed by a virtual server, the sticky table is checked for an entry matching the virtual server's sticky type. If an entry is found, then the load balancing algorithm is skipped and the request is mapped to the sticky entrys indicated real server. In this way a virtual server associates particular clients to a real server for as long as the sticky entry remains in the table. A sticky entry will only start aging when it has no associated bindings.
LSNAT Overview
Fail Detection
It is important for LSNAT to know whether a real server can provide the requested service. There are three methods supported to determine the state of a real server, server ports, and its applications: Ping - The real server is pinged. TCP/UDP Port Service Verification - The application service port is verified. Application Content Verification (ACV) - The content of an application is verified.
Fail detection methods are configured within probes using the tracked object manager facility. Probe creation and configuration is detailed, along with fail detection method details in Chapter 10, Tracked Object Manager Configuration. ICMP ping probe monitoring of a real server occurs by default, using the predefined ICMP probe $slb_default. See Preset Default ICMP Probes on page 10-5 for preset default ICMP probe details. LSNAT server load balancing supports the assigning of up to two probes per server: an ICMP ping and a UDP or TCP probe that can be configured for port verification and optionally for application content verification. Probes are assigned to a real server configuration using the faildetect probe command in real server configuration mode. When assigning a probe to a real server, specify probe one or two, and the name of the probe. The $slb_default default ICMP ping probe is auto-assigned to probe one, whenever probe one is not configured with an administratively created probe. The probe type setting allows you to set whether configured probes are active or inactive for a server context. The probe type setting does not change the probe configuration. When probe type is set to probe, the probe configuration for the server context is active; probes are sent to the server in accordance with the configured settings. When probe type is set to none, the probe configuration is inactive; no probes are sent for the server context, and the real server is set to UP. The default probe type is probe. Use the probe type command in real server configuration mode to set the probe type for the server context. In a server configuration context, probe configuration can be reset to factory default values by resetting fail detection for that server context. Resetting fail detection in a server configuration context: Sets the probe type to the default value of probe Sets the probe for probe one to the default probe for the server context Removes any configured probe configuration for probe two
Any preexisting probe is overwritten when assigning a probe. This example shows how to: Create a TCP probe named TCP-HTTP Set the fail detection interval to 5 seconds Set the pass detection interval to 5 seconds Configure the ACV request and reply strings Place the probe inservice Display a detailed level of configuration information for the probe Assign the probe to probe one of the 10.1.2.3 port 80 real server in the server farm myproductHTTP: Enable the real server configuration
33-6
LSNAT Overview
S Chassis(su)->configure S Chassis(su-config)->probe TCP-HTTP tcp S Chassis(su-config-probe)->faildetect interval 5 S Chassis(su-config-probe)->passdetect interval 5 S Chassis(su-config-probe)->acv request GET / HTTP/1.1\\r\\nHost: 2.0.0.5\\r\\n\\r\\n S Chassis(su-config-probe)->acv reply HTTP/1.1 200 OK\\r\\n S Chassis(su-config-probe)->inservice S Chassis(su-config-probe)->show probe TCP-HTTP detail Probe: Administrative state: Fail-detect count: Fail-detect interval: 3-way TCP handshake wait time: Application Content Verification: Request-string: GET / HTTP/1.1\\r\\nHost: 2.0.0.5\\r\\n\\r\\n Reply-string: Close-string: Search-Depth: 255 HTTP/1.1 200 OK\\r\\n TCP-HTTP inservice 3 5 5 Type: Session count: Pass-detect count: Pass-detect interval: Server response wait time: tcp-acv 1 3 5 10
S Chassis(su-config-probe)->exit S Chassis(su-config)->ip slb serverfarm myproductHTTP S Chassis(su-config-slb-sfarm)->real 10.1.2.3 port 80 S Chassis(su-config-slb-real)->faildetect probe one TCP-HTTP S Chassis(su-config-slb-real)->inservice S Chassis(su-config-slb-real)->
LSNAT Overview
If you want to provide direct client access to real servers configured as part of a server farm, there are two mechanisms that can provide direct client access. The first mechanism, configured within global configuration mode with the ip slb real-server access client command, allows you to identify specific client networks that can set up connections directly to a real servers IP address, as well as continue to use the virtual server IP address. The second mechanism, configured in global configuration mode with the ip slb real-server access unrestricted command, allows all clients to directly access all services provided by real servers, except for those services configured for server load balancing.
The virtual server virtual port protocol (UDP/TCP) must always match the real server port protocol. The virtual server is identified by its Virtual IP Address (VIP), port protocol, and port number. A virtual server configured for a given VIP and port number must be configured for either UDP or TCP, but can not be configured for both.
33-8 Load Sharing Network Address Translation (LSNAT) Configuration
Configuring LSNAT
If the real servers port is set to 0, the only valid fail detect types for the real server is none or ping.
Configuring UDP-One-Shot
Many UDP applications send only two packets in the form of a request and a reply. For such applications it is a waste of resources to set up a new binding and hardware connection for every request and then let each binding idle age out. With UDP-one-shot configured, a binding is created and the request packet is sent. The reception of a reply packet back causes the binding to be deleted within one second. Bindings created by UDP-one-shot will not result in the installation of a hardware connection. Use the udp-one-shot command in SLB virtual server configuration command mode to enable UDP-one-shot on a virtual server.
Configuring LSNAT
This section provides details for the configuration of LSNAT on the S-Series products. Table 33-1 lists LSNAT parameters and their default values. Table 33-1 Default LSNAT Parameters
Parameter Port Number (FTP) Predictor Faildetect probe one and two Faildetect Type Description The port number for the FTP control port for all virtual servers. The load balancing algorithm for this server farm. Default probe for server load balancing faildetect probe one and two. Specifies whether the current fail detection configuration is active (probe) or inactive (none) for the real server context. Default Value 21 Round Robin probe one: $slb_default probe two: empty probe
Configuring LSNAT
Table 33-1
Parameter
Unlimited
Weight
Service Type
None
Table 33-2 lists LSNAT resource limits. Table 33-2 LSNAT Resource Limits
Resource Bindings Reals Server Farms Sticky Entries VIP Addresses Virtual Servers S-Series 65536 500 300 65536 1000 500 SSA 131072 500 300 65536 1000 500
3.
inservice
33-10
Configuring LSNAT
2.
3.
4.
faildetect reset
5.
maxconns maximum-number
6.
weight weight-number
7.
inservice
3.
serverfarm serverfarm-name
Configuring LSNAT
5.
6.
source nat pool pool In SLB virtual server configuration command mode, optionally configure a client source NAT pool to source NAT the traffic through the virtual server with the IP addresses from the NAT pool. In SLB virtual server configuration command mode, enable the virtual server for service In SLB virtual server configuration command mode, optionally configure this virtual server to participate in VRRP state changes. Specify the VLAN on which the VRRP is configured and the virtual router ID associated with the routing interface for this VRRP. In SLB virtual server configuration command mode, optionally restrict access to this virtual server to configured clients. In SLB virtual server configuration command mode, optionally configure UDP application connections to delete the binding when the reply packet is received. Bindings created by UDP-one-shot will not result in the installation of a hardware connection. In SLB virtual server configuration command mode, optionally configure the stickiness type. In SLB virtual server configuration command mode optionally configure the sticky entry timeout value for this virtual server. In global configuration command mode, optionally allow specific clients to access the load balancing real servers in a particular LSNAT server farm without address translation. In router command mode, optionally clear sticky entries or remove bindings. inservice vrrp vlan vlan vrid
7. 8.
9.
10.
udp-one-shot
11. 12.
13.
14.
clear ip slb {sticky | bindings} {all | id id | match {sip | *} {sport | *} {dip | *} {dport | *}}
33-12
Configuring LSNAT
show ip slb vservers [detail | virtserver-name] show ip slb statistics show ip slb bindings {match [ip-address | *] | id id | summary} show ip slb info show ip slb sticky {match sip port dip port | id id | summary} show ip slb statistics-sticky
The HTTP, FTP, and SMTP domains providing employee access to the enterprise internal server farms are: www.myinternal.com ftp.myinternal.com smtp.myinternal.com
Server Farms
For both the public product-based and enterprise internal server farms, the enterprise IT clients will have direct access to the servers without any address translation required. All other clients that have access rights to these server farms will be address translated.
33-14
Figure 33-3
33-16
Configure the real servers on the myproductHTTP server farm by: Configuring probe TCP-HTTP for application content verification and search-depth, modifying the faildetect and passdetect intervals, applying the probe to probe two of each HTTP server, and using the default ICMP ping probe in probe one Configuring the following real servers: 10.10.10.1:80, 10.10.10.2:80, and 10.10.10.3:80 Configuring weight for each real server Enabling each real server by placing each server in service
Note: We will not modify the maximum number of active connections allowed on any real server for this configuration example.
TCP-HTTP inservice 3 5 5
Type: Session count: Pass-detect count: Pass-detect interval: Server response wait time:
tcp-acv 1 3 5 2
S Chassis(rw-config-slb-real)->exit S Chassis(rw-config-slb-sfarm)->real 10.10.10.2 port 80 S Chassis(rw-config-slb-real)->faildetect probe two TCP-HTTP S Chassis(rw-config-slb-real)->weight 2 S Chassis(rw-config-slb-real)->inservice S Chassis(rw-config-slb-real)->exit S Chassis(rw-config-slb-sfarm)->real 10.10.10.3 port 80 S Chassis(rw-config-slb-real)->faildetect probe two TCP-HTTP S Chassis(rw-config-slb-real)->weight 2 S Chassis(rw-config-slb-real)->inservice S Chassis(rw-config-slb-real)->exit S Chassis(rw-config-slb-sfarm)->exit S Chassis(rw-config)->
Configure the real servers on the myproductFTP server farm by: Configuring the following real servers: 10.10.10.4:21 and 10.10.10.5:21 Configuring the FTP servers for both ping and TCP port service verification using the default ICMP probe in probe one and configuring the TCP-FTP probe, using default values, and configuring it for probe two Enabling each real server by placing each server in service
33-18
Notes: We will not modify the maximum number of active connections allowed on any real server for this configuration example.
Configure the real servers on the myinternal server farm by: Configuring the following real servers: 10.10.10.8:80 and 10.10.10.9:80 Configuring the HTTP servers with probe TCP-HTTP first configured in myproductHTTP Server Farm and Real Server CLI Input on page 33-17 for probe two Configuring a faildetect command string, reply string, and read till index value for each HTTP server Enabling each real server by placing each server in service
33-20
Configure the real servers on the myinternalFTP server farm by: Configuring the following real servers: 10.10.10.10:21 and 10.10.10.11:21 Configuring the FTP servers for both ping and TCP port service verification using the TCP-FTP probe first configured in myproductFTP Server Farm and Real Server CLI Input on page 33-19 Enabling each real server by placing each server in service
Configuring the following real servers: 10.10.10.6:25 and 10.10.10.7:25 Configuring the SMTP servers for both ping and TCP port service verification using the default ICMP probe in probe one and configuring the TCP-SMTP probe, using default values, and configuring it for probe two Enabling each real server by placing each server in service
Notes: We will not modify the maximum number of active connections allowed on any real server for this configuration example.
33-22
probe one and two real server request packet response packet server farm session sticky type
sticky mode tracked object manager Virtual IP (VIP) address virtual server
Table 33-5
Term
33-24
34
Transparent Web Cache Balancing (TWCB) Configuration
This document provides the following information about configuring Transparent Web Cache Balancing on the Enterasys S-Series platform.
For information about... Using Transparent Web Cache Balancing (TWCB) on Your Network Implementing TWCB TWCB Overview Configuring TWCB TWCB Configuration Example Refer to page... 34-1 34-2 34-2 34-7 34-10
Implementing TWCB
In standard web caching, a user-cache is configured and assigned to a single cache server. TWCB provides for load balancing across all cache-servers of a given server farm that can be configured for heavy web-users using a predictor round-robin algorithm. Scalability is provided by the ability to associate multiple cache-servers with the web-cache. This scalability is further refined by the ability to logically associate cache-servers with multiple server farms.
Implementing TWCB
Implementing TWCB requires a routed network with IP interfaces that allow the S-Series router to send requests for the internet to the correct web caching device. There are five aspects to TWCB configuration: Create the server farms that will cache the web objects and populate them with cache-servers. Optionally associate heavy web-users with a round-robin list which caches those users web objects across all servers associated with the configured server farm. Optionally specify the hosts whose HTTP requests will or will not be redirected to the cache-servers. Create a TWCB web-cache that the server farms will be associated with. Apply the TWCB web-cache to an outbound interface, to redirect HTTP traffic on that interface to the cache-servers.
TWCB Overview
A TWCB configuration is made up of one or more cache-servers that are logically grouped in a server farm and one or more server farms that are associated with a web-cache. Figure 34-1 provides an overview of a TWCB configuration. In our overview, Cache1 is the name of the web-cache. It is made up of two server farms: s1Server and s2Server. The s1Server server farm is configured with 2 cache-servers from the 186.89.0.0 subnet. The s2Server server farm is configured with 5 cache-servers from the 176.89.0.0 subnet. Web objects for each end-user are cached on a cache server. The S-Series router does not act as a cache for web objects; rather, it redirects HTTP requests to local servers on which web objects are cached. The cache-servers should have a web-based transparent proxy cache running. The Squid application is an example of a web-based transparent proxy cache. In our example a user on the 10.10.10.0/24 subnet initiates a web request, which it sends to the router. The router determines that the destination address is accessible through a VLAN that has a TWCB web-cache applied to it. TWCB determines that the request is eligible for redirection, selects a cache server from a server farm, and sends the request to that cache server. The cache server will either service the request from its cache or go out to the Internet (using its own source IP address) and retrieve the needed information. The cache server will respond to the client using the web sites IP address as the source IP address. From the client's perspective it is communicating with the actual web site, when in fact it is really conversing with a local transparent cache. Once a web object resides in the cache, any future requests for that web object will be handled by the cache server until the cache entry expires. Cache entry expiration is configured in the web-based transparent proxy cache application installed on the cache server.
34-2
TWCB Overview
Figure 34-1
Cache1 s1Server
186.89.10.51 186.89.10.55 Server Farms s2Server Cache Servers 176.89.10.20 176.89.10.32 176.89.10.45 176.89.10.50 176.89.10.52
There are five components in a TWCB configuration: The server farm The cache server The web-cache The outbound interface The switch and router
You create a server farm by naming it. Upon naming a server farm, you are placed in web-cache server farm configuration mode. The cache server is the IP address of the actual transparent proxy web cache server. The default behavior for selecting a cache from a server farm is to use a hash of the destination IP addresses. Should a single cache server be associated with one or more heavy traffic destination IP addresses then the round robin selection mechanism can be used to balance traffic to particular ranges of destination IP addresses among the caches configured to the server farm.
TWCB Overview
In Figure 34-2 we see how requests destined for one particular destination IP, configured for standard caching, only accesses cached web objects from the cache server where its cache resides. In this case, the destination IP addresses reside on the s1Server server farm 186.89.10.51 cache server. The s2Server server farm is configured with a predictor round-robin list. Each list member has its web objects cached across all the cache-servers on the s2Server server farm. Figure 34-2 Predictor Round-Robin Overview
Cache1 s1Server Standard Caching Behavior
186.89.10.51 186.89.10.55 Server Farms s2Server Cache Servers Router 176.89.10.20 176.89.10.32 176.89.10.45 176.89.10.50 176.89.10.52 Global Internet
The predictor round-robin feature allows for the creation of up to 10 user lists. Members of a predictor round-robin list no longer have a single cache on a single cache server. Instead, web objects for list members are cached across all cache servers associated with this server farm in a round robin fashion. A server farm with a configured predictor of round-robin will only cache members of predictor round-robin lists associated with that server farm.
34-4
TWCB Overview
Fail Detection
It is important for TWCB to know whether a cache server can provide the requested service. There are three fail detection methods for determining the state of a cache server, server port, and application content: Ping - The real server is pinged. TCP Port Service Verification - The application service port is verified. Application Content Verification (ACV) - The content of an application is verified.
Fail detection methods are configured within probes using the tracked object manager facility. Probe creation and configuration is detailed, along with fail detection method details in Chapter 10, Tracked Object Manager Configuration. ICMP ping probe monitoring of a cache server occurs by default, using the predefined ICMP probe $twcb_default. See Preset Default ICMP Probes on page 10-5 for preset default ICMP probe details. TWCB supports the assigning of up to two probes per server: an ICMP ping and a TCP or UDP probe that can be configured for port verification and optionally for ACV. Probes are assigned to a cache server configuration using the faildetect probe command in cache server configuration mode. When assigning a probe to a cache server, specify probe one or two, and the name of the probe. The $twcb_default default ICMP ping probe is auto-assigned to probe one. The probe type setting allows you to set whether configured probes are active or inactive for a server context. The probe type setting does not change the probe configuration. When probe type is set to probe, the probe configuration for the server context is active; probes are sent to the server in accordance with the configured settings. When probe type is set to none, the probe configuration is inactive; no probes are sent for the server context. The default probe type is probe. Use the probe type command in real server configuration mode to set the probe type for the server context. In a server configuration context, probe configuration can be reset to factory default values by resetting fail detection for that server context. Resetting fail detection in a server configuration context: Sets the probe type to the default value of probe Sets the probe for probe one to the $twcb_default default probe for the server context Removes any configured probe configuration for probe two
TWCB fail detection sets the application port to 80 by default. Use the faildetect app-port command in cache server configuration mode to set the TCP port on the cache server to a value other than 80 if required.
Enterasys S-Series Configuration Guide 34-5
TWCB Overview
Any preexisting probe is overwritten when assigning a probe. This example shows how to: Create a TCP probe named TCP-HTTP Configure the ACV request and reply strings Place the probe inservice Display a detailed level of configuration information for the probe Assign the probe to probe one of the 186.89.10.51 cache server on the TWCB server farm s1Server: Assign port 8080 as the TCP port to be monitored. Enable the real server configuration
S Chassis(su)->configure S Chassis(su-config)->probe TCP-HTTP tcp S Chassis(su-config-probe)->inservice S Chassis(su-config-probe)->acv request GET / HTTP/1.1\\r\\nHost: 2.0.0.5\\r\\n\\r\\n S Chassis(su-config-probe)->acv reply HTTP/1.1 200 OK\\r\\n S Chassis(su-config-probe)->show probe TCP-HTTP detail Probe: Administrative state: Fail-detect count: Fail-detect interval: 3-way TCP handshake wait time: Application Content Verification: Request-string: GET / HTTP/1.1\\r\\nHost: 2.0.0.5\\r\\n\\r\\n Reply-string: Close-string: Search-Depth: 255 HTTP/1.1 200 OK\\r\\n TCP-HTTP inservice 3 5 5 Type: Session count: Pass-detect count: Pass-detect interval: Server response wait time: tcp-acv 1 3 5 10
S Chassis(su-config-probe)->exit S Chassis(su-config)->ip twcb wcserverfarm s1Server S Chassis(config-twcb-wcsfarm)->cache 186.89.10.51 S Chassis(config-twcb-cache)->faildetect probe one TCP-HTTP S Chassis(config-twcb-cache)->faildetect app-port 8080 S Chassis(config-twcb-cache)->inservice S Chassis(config-twcb-cache)->
The Web-Cache
The web-cache is a logical entity in which server farms are added and rules are configured that govern what TCP data flows should be redirected. Multiple web-caches can be configured on a device. Use the show router limit command to determine the number of web-caches supported on the device. A web-cache supports a single protocol port such as port 80, 443 or 8080. A web-cache can be configured per protocol port for each VRF segment configured on the device. You create a web-cache by naming it in router configuration command mode. Once entered, you are placed in TWCB web-cache configuration command mode. Once in TWCB web-cache configuration command mode, you can:
34-6 Transparent Web Cache Balancing (TWCB) Configuration
Configuring TWCB
Add up to 10 server farms to a web-cache. Optionally specify a non-standard port for the redirection of HTTP requests. Outbound HTTP requests are directed to port 80 by default. Create bypass lists containing a range of host web sites for which HTTP requests are not redirected to the cache servers for this web-cache. Specify the clients (source IP addresses) whose HTTP requests are or are not redirected to the cache server. Clients permitted redirection take part in TWCB. Clients denied redirection do not take part in TWCB. All clients are permitted redirection by default.
TWCB matches bindings based upon the following four tuples: TCP protocol, source IP address, destination IP address, and destination web cache HTTP port value. Use the show ip twcb bindings command to display active TWCB bindings for this device.
Configuring TWCB
This section provides details for the configuration of TWCB on the S-Series products.
For information about... Configuring the Server Farm Configuring the Cache Server Configuring the Web-Cache Configuring the Outbound Interface Displaying TWCB Statistics/Information Refer to page... 34-8 34-8 34-9 34-10 34-10
Configuring TWCB
Table 34-1
Parameter faildetect
ping-int
5 seconds
ping-retries
app-int
15 seconds
app-retries
maxconns
0 (no limit)
34-8
Configuring TWCB
3.
4.
faildetect reset
5.
6. 7.
3. 4. 5. 6.
Add the specified server farm to this web-cache. serverfarm serverfarm-name Place this web-cache server farm in service. Optionally redirect outbound HTTP requests to a non-standard HTTP port number. Optionally specify web host sites for which HTTP requests are not redirected to the cache servers. Optionally permit or deny redirection of HTTP requests for the list of clients to this web-cache. Place this web-cache in service. inservice http-port port-number bypass-list range begin-ip-address end-ip-address hosts {permit | deny} redirect range begin-ip-address end-ip-address inservice
7. 8.
Task Redirect outbound HTTP traffic from this outbound interface to the cache servers.
34-10
See Figure 34-3 for a depiction of the example setup. Figure 34-3 TWCB Configuration Example Overview
Cache1 s1Server
186.89.10.51 186.89.10.55 VLAN 100 Server Farms s2Server Cache Servers 176.89.10.20 Router Web Site Host Global Internet
Configure the end-users that will use this server farm by setting the round-robin predictor ranges:
S Chassis(rw-config-twcb-wcsfarm)->predictor roundrobin 50.10.10.01 50.10.10.15 S Chassis(rw-config-twcb-wcsfarm)->predictor roundrobin 40.10.10.45 40.10.10.60 S Chassis(rw-config-twcb-wcsfarm)->
34-12
34-14
35
Virtual Router Redundancy Protocol (VRRP) Configuration
This document describes the Virtual Router Redundancy Protocol (VRRP) feature and its configuration on Enterasys S-Series devices.
For information about... Using VRRP in Your Network Implementing VRRP in Your Network VRRP Overview Configuring VRRP VRRP Configuration Examples Terms and Definitions Refer to page... 35-1 35-2 35-2 35-5 35-7 35-11
VRRP Overview
This section provides an overview of VRRP configuration.
Router R2 VRID 1
ge.1.2 172.200.1.2/16 ge.1.1 VLAN 111 172.111.1.2/16
172.111.1.1
Host 1
Figure 35-1 shows a basic VRRP topology with a single virtual router. Routers R1 and R2 are both configured with one virtual router (VRID 1). Router R1 serves as the master and Router R2 serves as the backup. The hosts are configured to use 172.111.1.1/16 as the default route. If Router R1 should become unavailable, Router R2 would take over virtual router VRID 1 and its associated IP addresses. Packets sent to 172.111.1.1/16 would go to Router R2. When Router R1 comes up again, it would take over as master, and Router R2 would revert to backup.
VRRP Overview
VRRP Overview
The default priority setting is enabled with a value of 10. Setting the critical-IP address priority to enabled signals that the critical-IP will affect the operational priority for the VRID. Setting the priority to disabled signals the critical-IP interface state will have no effect on the operational priority for the VRID. Up to 2048 critical-IP addresses can be configured on a device. Up to 10 per VRID. If the critical-IP address is configured on a router where the VRID IP address is owned by that router, the critical-IP configuration is ignored. When a router owns the IP address configured for the VRID, that router is automatically made the master with a hard-coded priority of 255. Only the failure of the interface with the VRID IP address can cause the router to move to backup status. Figure 35-2 presents a typical critical-IP address configuration. Figure 35-2 Critical-IP Address Configuration
WWW
Router 1
ge.1.2 172.200.1.1/16
Router 2
ge.1.2 172.200.1.2/16
VRID 1
172.111.1.5 ge.1.1 VLAN 111 172.111.1.1/16 ge.1.1 VLAN 111 172.111.1.2/16
Host 1
172.111.100/16 Default Gateway 172.111.1.1
The VRRP configuration is entered as follows: On both router 1 and router 2, in VLAN 111 configuration command mode, VRID 1 is created using the vrrp create command. On both router 1 and router 2, in VLAN 111 configuration command mode, the IP address 172.111.1.5 is assigned to VRID 1 using the vrrp address command. On router 1, in VLAN 111 configuration command mode, the VRRP priority is set to 105 using the vrrp priority command. On router 2, in VLAN 111 configuration command mode, the VRRP priority is set to 100 using the the vrrp priority command.
Configuring VRRP
On router 1, in VLAN 200 configuration command mode, configure IP address 172.200.1.1/16 as critical-IP address, enabling a priority of 10, using the vrrp critical-ip command.
In this example, should the critical-IP address 172.200.1.1/16 go down, the VRID 1 priority would decrement by 10, the value of the down critical-IP address, to 95. Router 2, with a priority set to 100 would take over as master. Should the critical-IP address 172.200.1.1/16 come back up, the priority for router 1 would increment by 10 from 95 to 105. Router 1 would now have a priority higher than the current priority 100 for VRID 1 and would become master once again.
Configuring VRRP
This section provides details for the configuration of VRRP on the S-Series products. Table 35-1 lists VRRP parameters and their default values. Table 35-1
Parameter priority advertise-interval
Configuring VRRP
Table 35-1
Parameter
interface-up delay
VRRP preemption
enabled
accept-mode
disabled
Procedure 35-1 describes how to configure VRRP. Procedure 35-1 Configuring VRRP
Step 1. Task Create a virtual router instance. Supported VRRP Versions: Command(s) vrrp create vrid version
2. 3. 4. 5. 6. 7.
Configure all VRRP IP addresses associated with this virtual router. Configure a VRRP primary address for this virtual router. Optionally, change the VRRP router priority for this virtual router. Optionally, change the advertise interval for this virtual router. Optionally, set the VRID state interface down to interface up delay. Configure any critical-IP interfaces for this virtual router. Optionally, configure this router for VRRP authentication Optionally, enable accept-mode for this virtual router, allowing the master to accept IP packets for the configured associated IP address list. Optionally change the master preemption setting for this VRRP router.
8. 9.
10.
Table 35-2 describes how to display VRRP information and statistics. Table 35-2
Task Display VRRP configuration information for this system. Display VRRP statistics for this system. Display VRRP configuration information for a specified interface. Display detailed VRRP configuration information.
Figure 35-3
Router R2 VRID 1
ge.1.2 172.200.1.2/16 ge.1.1 VLAN 111 172.111.1.2/16
172.111.1.1
Host 1
Preempt: yes, 1,
Virtual IP Count:
Critical IP Count:
Virtual IP Addresses: 172.111.1.1 Critical IP Addresses: Interface S Chassis(rw-config)-> Critical Priority State
S Chassis(rw-config-intf-vlan.0.111)->vrrp advertise-interval 1 centiseconds 150 S Chassis(rw-config-intf-vlan.0.111)->vrrp enable 1 S Chassis(rw-config-intf-vlan.0.111)->no shutdown S Chassis(rw-config-intf-vlan.0.111)->exit S Chassis(rw-config)->show ip vrrp verbose Interface: vlan.0.111 VRID: 1 Version: 3, State: Backup Master IP Address : 172.111.1.1 Primary IP Address: 172.111.1.2 Virtual MAC Address: 00:00:6A:00:03:01 Advertisement Interval: Operational Priority: Accept: no , 1.50 seconds 100, Configured Priority: 100 Preempt time: 0 seconds 0
Preempt: yes, 1,
Virtual IP Count:
Critical IP Count:
Virtual IP Addresses: 172.111.1.1 Critical IP Addresses: Interface S Chassis(rw-config)-> Critical Priority State
In this configuration, if an interface on VLAN 111 for Router R1 fails, the interface on Router R2 will take over for forwarding outside the local LAN segment.
172.111.1.50
VRID 2
172.111.1.1
VRID 1
Host 2
Three VRRP instances are configured on VLAN 111 for both S-Series devices on Router R1s interface, 172.111.1.1, and Router R2s interface, 172.111.1.2. Each virtual router is given a different virtual IP address that is used as a default gateway by a subset of hosts that reside of the LAN segment. Because interfaces on Router R1 and Router R2 for VLAN 111 are configured as belonging to VRID 1, 2, and 3, VRRP will support resiliency between these interfaces if one interface becomes in-operational. To load balance traffic generated from the hosts on the 172.111.0.0/16 network, the hosts are partitioned into being configured with default gateways matching the virtual IP address of the
Enterasys S-Series Configuration Guide 35-9
VRRP virtual routers, and the VRRP Master for each VRRP instance is configured for distribution across Router R1 and Router R2. It is known that Router R1s interface, 172.111.1.1, will become Master for VRID 1 because it is the IP address owner for the virtual router. This interface is also configured to be Master for VRID 3 by raising its VRRP priority in VRRP instance 3 to 200. Therefore, Router R1s interface 172.111.1.1 will be Master for VRID 1 and VRID 3 handling traffic on this LAN segment sourced from subnets 172.111.0.0/18 and 172.111.128.0/18. Router R2s interface is configured to be the Master for VRID 2 by raising its VRRP priority in VRRP instance 2. Therefore, Router R2s interface 172.111.1.2 will be Master for VRID 2 handling traffic on this LAN segment sourced from subnets 172.111.64.0/18. In this configuration, an interface on VLAN 111 for Router R1 or Router R2, or VRID 1, 2, or 3 fails, the interface on the other router will take over for forwarding outside the local LAN segment.
Router R1
S Chassis(rw)->configure S Chassis(rw-config)->interface vlan 111 S Chassis(rw-config-intf-vlan.0.111)->vrrp create 1 v2-IPv4 S Chassis(rw-config-intf-vlan.0.111)->vrrp address 1 172.111.1.1 S Chassis(rw-config-intf-vlan.0.111)->vrrp enable 1 S Chassis(rw-config-intf-vlan.0.111)->vrrp create 2 v2-IPv4 S Chassis(rw-config-intf-vlan.0.111)->vrrp address 2 172.111.1.50 S Chassis(rw-config-intf-vlan.0.111)->vrrp enable 2 S Chassis(rw-config-intf-vlan.0.111)->vrrp create 3 v2-IPv4 S Chassis(rw-config-intf-vlan.0.111)->vrrp address 3 172.111.1.150 S Chassis(rw-config-intf-vlan.0.111)->vrrp priority 3 200 S Chassis(rw-config-intf-vlan.0.111)->vrrp enable 3 S Chassis(rw-config-intf-vlan.0.111)->no shutdown S Chassis(rw-config-intf-vlan.0.111)->exit S Chassis(rw-config)->
Router R2
S Chassis(rw)->configure S Chassis(rw-config)->interface vlan 111 S Chassis(rw-config-intf-vlan.0.111)->vrrp create 1 v2-IPv4 S Chassis(rw-config-intf-vlan.0.111)->vrrp address 1 172.111.1.1 S Chassis(rw-config-intf-vlan.0.111)->vrrp enable 1 S Chassis(rw-config-intf-vlan.0.111)->vrrp create 2 v2-IPv4 S Chassis(rw-config-intf-vlan.0.111)->vrrp address 2 172.111.1.50 S Chassis(rw-config-intf-vlan.0.111)->vrrp priority 2 200 S Chassis(rw-config-intf-vlan.0.111)->vrrp enable 2 S Chassis(rw-config-intf-vlan.0.111)->vrrp create 3 v2-IPv4 S Chassis(rw-config-intf-vlan.0.111)->vrrp address 3 172.111.1.150 S Chassis(rw-config-intf-vlan.0.111)->vrrp enable 3 S Chassis(rw-config-intf-vlan.0.111)->no shutdown S Chassis(rw-config-intf-vlan.0.111)->exit S Chassis(rw-config)->
35-10
VRID Master
Virtual Router ID a unique number associated with each virtual router. The VRRP router that is assuming the responsibility of forwarding packets sent to the IP address(es) associated with the virtual router, and answering ARP requests for these IP addresses. The set of VRRP routers available to assume forwarding responsibility for a virtual router should the current Master fail. An abstract object managed by VRRP that acts as a default router for hosts on a shared LAN. It consists of a Virtual Router Identifier and a set of associated IP address(es) across a common LAN. A VRRP Router may backup one or more virtual routers. The VRRP router that has the virtual router's IP address(es) as real interface address(es). This is the router that, when up, will respond to packets addressed to one of these IP addresses for ICMP pings, TCP connections, etc. The priority field specifies the sending VRRP router's priority for the virtual router. Higher values equal higher priority. This field is an 8 bit unsigned integer field. The priority value for the VRRP router that owns the IP address(es) associated with the virtual router MUST be 255 (decimal). VRRP routers backing up a virtual router MUST use priority values between 1-254 (decimal). The default priority value for VRRP routers backing up a virtual router is 100 (decimal). The priority value zero (0) has special meaning indicating that the current Master has stopped participating in VRRP. This is used to trigger Backup routers to quickly transition to Master without having to wait for the current Master to timeout.
IP Address owner
Priority
Accept Mode
When enabled, it allows the master for this virtual router to accept IP packets for the configured associated IP address list.
35-12
36
Security Configuration
This document provides the following information about configuring security features on the Enterasys S-Series platforms.
For information about... Using Security Features in Your Network Implementing Security Security Overview Configuring Security Refer to page... 36-1 36-2 36-3 36-7
MAC Locking
The MAC locking security feature provides for limiting access to a port to specified MAC addresses or a maximum number of MAC addresses on a first come first serve basis. In the first case, a device with a MAC address that is not specifically configured will not be allowed access to a port. This provides the network administrator with confidence that only known devices will gain access to a port. The second case provides a means of controlling the maximum number of unique devices that will have access at any given time to the port configured for this mode of MAC locking.
Secure Shell
The Secure Shell (SSH) security feature provides a secure encrypted communications method between a client and the switch providing data privacy and integrity that is an alternative to the unsecure Telnet protocol. Using SSH the entire session is encrypted, including the transmission of user names and passwords, and negotiated between a client and server both configured with the SSH protocol. Telnet sessions are insecure. All data is sent unencrypted. Use SSH instead of Telnet when the security of login and data transmission is a concern.
Implementing Security
TACACS+
The TACACS+ security feature provides an alternative to RADIUS for the authentication of devices desiring access to the network. TACACS+ provides device authentication, session authorization, and per-command authorization, as well as accounting on a session and per command basis.
Implementing Security
Take the following steps to implement supported S-Series security features in your network: To implement MAC locking: Enable MAC locking both globally and on the ports to be configured for MAC locking For ports that you are going to restrict access based upon a devices MAC address, set the port to MAC lock static and specify the maximum number of configure MAC addresses for that port For ports you are going to restrict on a first come first serve for a set number of MAC addresses, enable dynamic MAC locking specifying the maximum number of MAC addresses allowed for that port Optionally move all current dynamically enabled MAC locking MAC addresses to a static MAC locking configuration Optionally allow dynamic MAC addresses to age based upon the configured MAC agetime Optionally enable MAC lock trap messaging
To implement Secure Shell: Enable the SSH server Set or reinitalize the host key Verify the SSH state
To implement TACACS+: Enable TACACS+ on the client Configure the TACACS+ server to be used by the client Optionally enable TACACS+ session accounting Optionally configure the TACACS+ session authorization service or privilege level Optionally enable per command authorization Optionally enable the TCP single connection feature for this device
To implement Host DoS: Enable one or more DoS attack mitigation types
36-2
Security Configuration
Security Overview
Optionally set a logging event rate per a specified amount of time Optionally enable logging Verify the Host DoS configuration
Security Overview
For information about... MAC Locking Secure Shell TACACS+ Host DoS Refer to page... 36-3 36-4 36-4 36-6
MAC Locking
MAC Locking, sometimes referred to as MAC-based port locking, port locking, or port security, helps prevent unauthorized access to the network by limiting access based on a devices MAC address. MAC locking locks a port to one or more MAC addresses, preventing connection of unauthorized devices via a port. With MAC locking enabled, the only frames forwarded on a MAC locked port are those with the configured or dynamically selected MAC addresses for that port. There are two different types of MAC locking: Static MAC Locking - Locking one or more specified MAC addresses to a port. Dynamic MAC Locking - Locking one or more MAC addresses to a port based on first arrival of received frames after dynamic MAC locking is enabled. The configuration specifies the maximum number of end users that will be allowed. As each new end user is identified, it is MAC locked up to the maximum number of users. Once the maximum number of users have been MAC locked, all other users will be denied access to the port until a MAC locked address is either aged, if aging is configured, or the session for that user ends.
MAC Locking is disabled by default. MAC locking must be both globally enabled and enabled on the desired ports. When globally enabling MAC lock you can optionally specify the port or ports to enable, or enable MAC locking on all ports. Once enabled, ports can be configured for either static or dynamic MAC locking. When configuring static MAC locking, specify the user MAC address and the port string for that user. When configuring dynamic MAC locking, specify the port and the maximum number of users that will be dynamically MAC locked. MAC addresses that are currently dynamically active can be auto reconfigured as static using the set maclock move command for the specified port. Dynamic MAC lock address aging can be enabled per port. If the Filter DataBase (FDB) entry ages out for this station, the corresponding dynamic MAC locked stations will no longer be MAC locked. The age time for the FDB is set by the set mac agetime command and is displayed using the show mac agetime command. Dynamic MAC lock address aging is disabled by default. Figure 36-1 displays two users on a shared hub connected to an S-Series switch port. Data from the MAC locked user is forwarded on to the enterprise network. Data from the unconfigured user is dropped.
Security Overview
Figure 36-1
hub
Valid user
Unconfigured
Rogue device
Secure Shell
Secure Shell (SSH) is a protocol for secure remote login over an insecure network. SSH provides a secure substitute for Telnet by encrypting communications between two hosts. The S-Series SSHv2 implementation includes: Data privacy Communication integrity
An SSH server resides on the S-Series platform and listens for client connection requests. Once a request is authenticated, a secure connection is formed through which all subsequent traffic is sent. All traffic is encrypted across the secure channel, which ensures data integrity. This prevents someone from seeing clear text passwords or file content, as is possible with the Telnet application. Once SSH has been enabled and the S-Series has at least one valid IP address, you can establish an SSH session from any TCP/IP based node on the network, by using SSH to connect to an IP address, and entering your user name and password. Refer to the instructions included with your SSH application for information about establishing a session. SSH is activated by enabling the SSH server on the device. Enabling the server automatically generates a host key for the server, used during the life of the client to server connection. The SSH server can be reinitialized. Reinitializing the server clears all current client to server connections. Reinitializing the server does not reinitialize the host key. Should you believe the host key has been compromised, or otherwise wish to change it, the host key can be reinitialized with a separate command.
TACACS+
TACACS+ (Terminal Access Controller Access Control System Plus) is a security protocol that can be used as an alternative to the standard RADIUS security protocol. The client function is implemented on the S-Series device to control access to this device in conjunction with a remote server. TACACS is defined in RFC 1492, and TACACS+ is defined in an un-published and expired Internet Draft draft-grant-tacacs-02.txt, The TACACS+ Protocol Version 1.78", January, 1997.
36-4
Security Configuration
Security Overview
TACACS+ client functionality falls into four basic capabilities: authentication and session authorization, per-command authorization, session accounting, and per-command accounting. When the single connect feature is enabled, the TACACS+ client will use a single TCP connection for all requests to a given TACACS+ server.
Security Overview
Host DoS
The Host DoS feature provides protection against all known DoS attack mitigation types. Table 36-2 lists the configurable Host DoS mitigation types. Table 36-1
Threat Bad SIP Spoof
SYN+FIN and SYN+RST frames are discarded. All ICMP fragmented packets are discarded. Receipt of ICMP packets is limited to a user configurable limit of packets per second. ICMP packets exceeding the configured maximum ICMP size are discarded. Packets with a Multicast or Broadcast source IP address are discarded. Packets with the destination IP address equal to the source IP address are discarded. ICMP directed broadcast packets are discarded. UDP directed broadcast packets are discarded. Packets beyond established rates are discarded.
Large ICMP
Port Scan
Globally enable host DoS for this device using the hostdos enable command. Host DoS is globally enabled by default. Entering a command line for each threat, specify the mitigation-type, in the hostdos command in global configuration command mode, to enable the specific DoS attack type to be mitigated. The ICMP maximum allowed length can be set using the hostdos command icmp-maxlength option.
Configuring Security
the number of logs per specified time period. Supported time periods are seconds, minutes, hours, and days. The event rate default is for all logs to display. Logging can be disabled using the hostdos command nolog option.
Configuring Security
Table 36-2 lists Security parameters and their default values. Table 36-2
Parameter MAC locking status
maximum number of Specifies the maximum number of dynamic MAC addresses MAC addresses that will be locked on a port configured for dynamic MAC locking. first arrival MAC address aging MAC lock traps maximum number of static MAC addresses SSH state TACACS+ state Specifies that dynamic MAC locked addresses will be aged after the time set by the MAC agetime configuration. Specifies whether traps associated with MAC locking will be sent. Specifies the maximum number of static MAC addresses allowed on a port. Specifies whether the SSH protocol is enabled or disabled on this device. Specifies whether the TACACS+ protocol is enable or disabled on this device.
600
disabled
disabled 64
disabled disabled
TACACS+ server timeout Specifies the TACACS+ server timeout for the all TACACS+ servers. session privilege level Specifies the attribute value for the TACACS+ session management privilege level.
Specifies whether the TACACS+ single disabled connect feature is enabled or disabled.
Configuring Security
2.
3. 4.
set maclock mac_address port_string {create | enable | disable} set maclock firstarrival port_string value
5. 6. 7.
set maclock move port-string set maclock agefirstarrival port_string {enable | disable} set maclock trap port_string {enable | disable}
Table 36-3 describes how to manage MAC locking on an S-Series port. All MAC locking commands can be entered in any command mode. Table 36-3
Step 1.
Task Display MAC locking configuration information for dynamic configurations, static configurations or by port. Clear dynamic MAC locking configuration by port. Clear static MAC locking configuration by port. Clear MAC locking from one or more static MAC addresses.
2. 3. 4.
36-8
Security Configuration
Configuring Security
The following command lines enable port ge.1.1 for a maximum of 3 static MAC address entries. This is followed by four static MAC address creation entries. The fourth entry fails because the maximum allowed has been set to 3:
S Chassis(rw)->set maclock static ge.1.1 3 S Chassis(rw)->set maclock 00-10-a4-e5-08-4e ge.1.1 create S Chassis(rw)->set maclock 08-00-20-7c-e0-db ge.1.1 create S Chassis(rw)->set maclock 00-60-08-14-4b-15 ge.1.1 create S Chassis(rw)->set maclock 00-01-f4-2c-ad-b4 ge.1.1 create Set failed for ge.1.1. S Chassis(rw)->show maclock stations static
S Chassis(rw)->
The following command lines configure ports ge.1.2 through 5 for dynamic MAC locking with a maximum of 15 users on each port. This line is followed by a line enabling MAC locking trap messaging on ports ge.1.1 through 5:
S Chassis(rw)->set maclock firstarrival ge.1.2-5 15 S Chassis(rw)->set maclock trap ge.1.1-5 enable S Chassis(rw)->
The following command reinitializes the host key on the SSH server:
S Chassis(rw)->set ssh hostkey reinitialize
Configuring Security
Configuring TACACS+
Procedure 36-3 describes how to configure TACACS+ on an S-Series device. TACACS+ commands can be entered in any command mode. Procedure 36-3 TACACS+ Configuration
Step 1. 2. 3. 4. Task Enable or disable the TACACS+ client. Configure the TACACS+ server(s) to be used by the TACACS+ client. Optionally, enable TACACS+ session accounting Optionally, configure the TACACS+ session authorization service or privilege level. The attribute for privilege level is: priv-lvl. Optionally, enable per command accounting within an authorized session. Optionally, enable per command authorization. Optionally, enable the TCP single connection feature for this device. Command(s) set tacacs {enable | disable} set tacacs server {index [ipaddress port [secret]] | all timeout timeout} set tacacs session accounting enable set tacacs session {authorization service name | read-only attribute value | read-write attribute value | super-user attribute value} set tacacs command accounting enable set tacacs command authorization enable set tacacs singleconnect enable
5. 6. 7.
Table 36-4 describes how to manage TACACS+ on an S-Series device. All TACACS+ commands can be entered in any command mode. Table 36-4
Task Display TACACS+ configuration or state. Display the current TACACS+ server configuration. Clear the TACACS+ server configuration or reset the server timeout to the default value. Display the current TACACS+ client session settings. Reset TACACS+ session authorization settings to their default values. Display the current TACACS+ single connect state.
Managing TACACS+
Command(s) show tacacs [state] show tacacs server {index | all} clear tacacs server {all | index} [timeout] show tacacs session {authorization | accounting} [state] clear tacacs session authorization { [service] [read-only] [read-write] [super-user] } show tacacs singleconnect [state]
The following commands configure and verify two TACACS servers for this device to indexes 1 and 2. Index 1 has an IP address of 10.10.10.20 on port 49 with a secret mysecret1. Index 2 has an IP address of 10.10.10.30 on port 49 with a secret of mysecret2. The server timeout value will remain at the default of 10 seconds.
S Chassis(rw)->set tacacs server 1 10.10.10.20 49 mysecret1 S Chassis(rw)->set tacacs server 2 10.10.10.30 49 mysecret2 S Chassis(rw)->show tacacs server all
36-10
Security Configuration
Configuring Security
Port ----49 49
Timeout ------10 10
The following command enables and verifies session authorization for the exec service:
S Chassis(rw)->set tacacs session authorization service exec S Chassis(rw)->show tacacs session authorization TACACS+ service: exec
TACACS+ session authorization A-V pairs: access level attribute read-only read-write super-user S Chassis(rw)-> 'priv-lvl' 'priv-lvl' 'priv-lvl' value '0' '1' '15'
The following commands enable and verify session accounting, followed by commands that enable both accounting and authorization on a per command basis, for this device:
S Chassis(rw)->set tacacs session accounting enable S Chassis(rw)->show tacacs session accounting TACACS+ session accounting state: enabled
S Chassis(rw)->set tacacs command accounting enable S Chassis(rw)->set tacacs command authorization enable S Chassis(rw)->
The following command enables the TCP single connection feature for this device:
S Chassis(rw)->set tacacs singleconnect S Chassis(rw)->
2. 3.
hostdos mitigation-type hostdos mitigation-type event-rate count {per-seconds | per-minutes | per-hours | per-days} hostdos mitigation-type nolog
4.
Configuring Security
Table 36-4 describes how to display Host DoS configuration state and counters on an S-Series device. Table 36-5
Step 1. 2.
Task Display configuration state for one or all Host DoS attack mitigation types. Display statistic counters for one or all Host DoS attack mitigation types.
S Chassis(rw-config)->hostdos enable S Chassis(rw-config)->hostDoS spoof rate 5 per-minute S Chassis(rw-config)->hostdos xmastree nolog S Chassis(rw-config)->show hostDoS hostDoS is globally enabled hostDoS icmp-maxlength is 1024 hostDoS Spoof is enabled , logging is enabled , rate is hostDoS XmasTree hostDoS IcmpFrag hostDoS IcmpFlood hostDoS IcmpSize hostDoS BadSIP hostDoS LANd hostDoS Smurf hostDoS Fraggle hostDoS SynFlood hostDoS PortScan hostDoS TearDrop 5 per-minute 0 per-second 0 per-second 0 per-second 0 per-second 0 per-second 0 per-second 0 per-second 0 per-second 0 per-second 0 per-second 0 per-second
is enabled , logging is disabled, rate is is disabled, logging is enabled , rate is is disabled, logging is enabled , rate is is disabled, logging is enabled , rate is is disabled, logging is enabled , rate is is disabled, logging is enabled , rate is is disabled, logging is enabled , rate is is disabled, logging is enabled , rate is is disabled, logging is enabled , rate is is disabled, logging is enabled , rate is is disabled, logging is enabled , rate is
S Chassis(rw-config)->
36-12
Security Configuration
37
Flow Setup Throttling Configuration
This document provides the following information about configuring flow setup throttling on the Enterasys S-Series platforms.
For information about... Using Flow Setup Throttling in Your Network Implementing Flow Setup Throttling Flow Setup Throttling Overview Configuring Flow Setup Throttling Flow Setup Throttling Configuration Example Terms and Definitions Refer to page... 37-1 37-1 37-2 37-4 37-9 37-12
6. 7. 8.
Optionally, enable the disable port action globally on the device. Enable FST on the device. Verify the configuration or monitor baseline configurations using the FST show commands.
The idea is to only involve flow management when an event worthy of examination occurs. This baseline will vary according to how the port is used in the network. That is why each port should be set to a traffic classification with appropriate associated limits and actions. Once the baselines for an FST port classification are determined, implement FST as defined in Implementing Flow Setup Throttling on page 37-1 and fully described below.
37-2
Alternately, an administrator may choose to configure an interface with a small print server as a user port given that its flow setup needs may be similar to that of a user port. Aggregated user port - a port likely to have multiple end stations attached either through a wireless access point or an unmanaged low cost hub or switch. It is expected that this class may also be used instead of the Inter-Switch Link class when switches are interconnected using a lower speed link. Inter-Switch Link - a port that is used as a high-speed interconnect between two intelligent switches or routers. Unspecified port - a port in which nothing can be assumed about its intended use.
Note: Port classifications function only as traffic classification guidelines. Each port classification can be configured with any set of limits, and any interface can be associated with any port classification.
Associated actions when the flow limit is reached can be set to: Notify This option sends out an SNMP trap notification when the associated threshold is exceeded. If the flowlimit threshold is exceeded, a single notification is sent out. The notification action is reset when the number of flows drops below the flowlimit threshold. In order for SNMP traps to be sent as a result of this option, the notify action must be both associated with one or more port classifications and globally enabled on the device. When globally enabling notification on the device, a notification interval option can be set. The specified interval sets the number of seconds to wait before generating another notification of the same type for the same interface. This allows notification generation to be throttled in the case of a flow counter or rate that is repeatedly transitioning across a threshold. A value of 0 indicates that the device should not suppress any notifications related to the flowlimiting. Drop This action drops flow setup requests in excess of the configured limit and discards the associated packets. The use of this option could cause the device to repetitively process setup requests for the dropped flows. The process of dropping flow setup requests and their associated packets could cause end stations attached to this interface to behave in an indeterminate manner. The use of this option may also prevent the device from being able to count additional flows and from reaching any additional configured limits. Disable This option operationally disables the interface. The interface operational status is set to the down state. The interface remains in the down state until the associated FST interface status is set to operational using the set flowlimit port command, the FST feature is disabled, or the device is reset. In order for a port to be disabled as a result of this option, the disable action must be associated with one or more port classifications and globally enabled on the device using the set flowlimit shutdown command.
Sending out an SNMP trap notification is often times used as the low-level limit action. Dropping excess flows or even disabling the port can be appropriate high-level limit actions.
port classification
unspecified
37-4
Procedure 37-1 describes how to configure FST. Procedure 37-1 Configuring FST
Step 1. Task Set the low- and high-limit values for each traffic classification to be applied to network ports. limit1 - The low-limit option to which the specified limit is applied. limit2 - The high-limit option to which the specified limit is applied. limit - specifies flows threshold for each limit type. userport - Specifies the configured limit will be applied to an edge port with a single attached user. Default values: limit1 = 800, limit2 = 1000. serverport - Specifies the configured limit will be applied to a port with a server attached to it. Default values: limit1 = 5000, limit2 = 6000. aggregateduser - Specifies the configured limit will be applied to an edge port with multiple users attached to it. Default values: limit1 = 5000, limit2 = 6000. interswitchlink - Specifies the configured limit will be applied to a high speed interconnect port between switches or routers. Default values: limit1 = 14000, limit2 = 16000. unspecified - Specifies the configured limit will be applied to a port for which the intended usage is unknown. Default values: limit1 = 0, limit2 = 0 (disabled). If no port classification type is specified, the limit is applied to all classifications. Command(s) set flow limit {limit1 limit | limit2 limit} [userport | serverport | aggregateduser | interswitchlink | unspecified]
37-6
7. 8.
Managing FST
Command clear flowlimit {limit1 | limit2} [userport | serverport | aggregateduser | interswitchlink | unspecified]
Table 37-2
Task
Clear the specified action configured for the specified port classification or for all port classifications. action1 - The low-limit action option to be cleared. action2 - The high-limit action option to be cleared. userport - Clears the user port classification. serverport - Clears the specified action for the server port classification. aggregateduser - Clears the specified action for the multi-user port classification. interswitchlink - Clears the specified action for the ISL port classification. unspecified - Clears the specified action for the unspecified port classification. If no port classification is specified, the specified action is cleared for all port classifications. Clear the port classification for the specified port or for all ports. The port classification is reset to unspecified (the default). port-string - Specifies the port for which to clear the port classification. If no port-string is specified, the port classification is cleared on all ports. Clear the flowlimit notification interval to the default value. Clear all FST statistics associated with one or more ports. port-string - Specifies the port for which to clear the show display statistics. If no port-string is specified, the statistics are cleared on all ports.
37-8
Table 37-3 describes how to display link aggregation information and statistics. Table 37-3
Task Display FST port configuration for one or more ports. port-string - Specifies the port for the display of port configuration. If no port-string is specified, configuration is displayed for all ports. Display FST statistics for one or more ports. port-string - Specifies the port for the display of FST statistics. If no port-string is specified, statistics are displayed for all ports. Display FST port classification configuration. If a port classification is not specified, configuration for all port classifications is displayed. show flowlimit class [userport | serverport | aggregateduser | interswitchlink | unspecified] show flowlimit stats [port-string]
The configuration components used in this example are two S-Series chassis, a PC, a wireless access point, and a server. The configuration example assumes the default action configuration list of notify only for action1 and disable and notify for action2. Therefore: There is no need to make any configuration changes for action1 since action1 is always set to notify and that is the default. For action2, when either notification or disable are configured actions, there is no need to set these actions. For notification only actions, disable will be cleared. When drop is the configured action, drop is added and disable is cleared.
See Figure 37-1 on page 37-10 for an overview of this FST configuration example. Figure 37-1 FST Configuration Example Overview
Switch 2
Inter-Switch Link
Port: Class: Limit1: Action1: Limit2: Action2: ge.3.10 interswitchlink 9775 notify 13600 notify
Switch 1
PC
Port: Class: Limit1: Action1: Limit2: Action2: ge.1.5 userpirt 51 notify 71 disable and notify
Unspecified
Port: Class: Limit1: Action1: Limit2: Action2: ge.1.7 unspecified 0 notify 0 disable and notify
Switch 1 Configuration
The switch 1 chassis has ports with a single PC, a wireless access point, and an unspecified device.
37-10
S1(rw)->set flow limit1 51 userport S1(rw)->set flow limit2 71 userport S1(rw)->set flowlimit port enable ge.1.5
S1(rw)->set flowlimit port class aggregateduser ge.1.10 S1(rw)->set flow limit1 6210 aggregateduser S1(rw)->set flow limit2 8640 aggregateduser S1(rw)->clear flowlimit action2 disable aggregateduser S1(rw)->set flowlimit action2 drop aggregateduser S1(rw)->set flowlimit port enable ge.1.10
S1(rw)->set flowlimit port class unspecified ge.1.7 S1(rw)->set flowlimit port enable ge.1.7
S2(rw)->set flowlimit port class serverport ge.3.5 S2(rw)->set flow limit1 4945 serverport S2(rw)->set flow limit2 6880 serverport S2(rw)->clear flowlimit action2 disable serverport S2(rw)->set flowlimit port enable ge.3.5
S2(rw)->set flowlimit port class interswitchlink ge.3.10 S2(rw)->set flow limit1 9775 interswitchlink S2(rw)->set flow limit2 13600 interswitchlink S2(rw)->clear flowlimit action2 disable interswitchlink S2(rw)->set flowlimit port enable ge.3.10
disable interface
drop
37-12
Table 37-4
Term
notification interval
precedence
37-14
38
Access Control List Configuration
This document provides the following information about configuring IPv4 and IPv6 Access Control Lists (ACLs) on the Enterasys S-Series platforms.
For information about... Using Access Control Lists (ACLs) in Your Network Implementing ACLs ACL Overview Configuring ACLs Terms and Definitions Refer to page... 38-1 38-1 38-2 38-8 38-13
Implementing ACLs
To implement an ACL on your network: Create the ACL Enter the rules and comments for this ACL that will determine which packets will be forwarded or not forwarded on the routing interface this ACL will be applied to Optionally manage your ACL by: Copying a preexisting ACL to a non-existing ACL Appending a preexisting ACL to another preexisting ACL Entering an ACL comment entry Deleting an ACL rule entry Inserting a new ACL rule entry into an ACL Moving an ACL rule to a new location in an ACL
ACL Overview
ACL Overview
This section describes ACL creation, rule entry, and application of the ACL to a routing interface required to implement an ACL, as well as, the features available for managing ACL rules and displaying ACLs.
Creating an ACL
There are two types of ACLs: standard and extended. The type of ACL you need depends exclusively upon the packet field(s) that will generate a hit for the rules specified in the ACL. For a standard ACL, only the source IP address is configurable. For an extended ACL, the protocol, source IP address, destination IP address, and in the case of the TCP or UDP protocols, matching source and destination ports are configurable. There are two ways to identify the new ACL: a number or a name. The use of a number is for IPv4 ACLs only. Standard IPv4 ACL numbers range from 1 to 99. Extended IPv4 ACL numbers range from 100 to 199. Both IPv4 and IPv6 allow alphanumeric names that must start with an alpha character. A name may be quoted, as the quotes are stripped, but spaces are not supported in the quoted string. A name cannot be one of the show access-lists keywords brief or applied, or any prefix thereof such as ?br? or ?app?. Names can be up to 64 characters in length. Once you have determined the appropriate ACL type, use the: ip access-list standard command to create an IPv4 standard access-list and ipv6 access-list standard command to create an IPv6 standard access-list ip access-list extended command to create an IPv4 extended access-list and ipv6 access-list extended command to create an IPv6 extended access-list
In each case, specifying the access-list number or name for the ACL. An existing ACL can be copied to a non-existing ACL of the same IP type (IPv4 or IPv6). An existing ACL can be appended to the end of another existing ACL of the same IP type, but a standard ACL may not be appended to an extended ACL nor vice versa. Upon creating the ACL, you are placed in the access-list configuration command mode where you can enter rules or comment entries for this ACL.
The following example creates an extended IPv4 ACL with the access-list number 100 as its identifier:
S Chassis(rw-config)->ip access-list extended 100 S Chassis(rw-cfg-ext-acl)->
The following example creates a standard ACL with the name ipv4acl1 as its identifier:
S Chassis(rw-config)->ip access-list standard ipv4acl1 S Chassis(rw-cfg-std-acl)->
38-2
ACL Overview
The following example creates an extended IPv6 ACL with the access-list number acl100 as its identifier:
S Chassis(rw-config)->ipv6 access-list extended 100 S Chassis(rw-cfg-ipv6-ext-acl)->
The following example creates a standard IPv6 ACL with the name ipv6acl1 as its identifier:
S Chassis(rw-config)->ipv6 access-list standard ipv6acl1 S Chassis(rw-cfg-ipv6-std-acl)->
TCP and UDP rules can match source and destination ports against the following values: equal to, not equal to, greater than, less than, or a specified range. TCP rules can also distinguish established connections for new connection requests. ICMP can be set for message type and code. See the details for the permit and deny commands in the Enterasys S-Series CLI Reference for supported ICMP message types and codes. Extended ACLs can optionally be set for a Diffserv codepoint (DSCP), IP precedence, or IP Type of Service (ToS) value for both IPv4 and IPv6. IPv6 provides additional support for routing header match against source-routed packet, and the packets routing extension header, mobility extension header, and mobility-type extension header. For a standard ACL, a source IPv4 address and an optional wildcard or IPv6 address and length are specified for the rule. For an extended ACL a source and destination IP address and wildcard are specified for the rule. In the case of an IPv4, Source and destination wildcards provide an inverted mask (specifies the dont care bits as 1s). 0.0.0.0 specifies an exact match. An any option is available for. The any option is short hand for 0.0.0.0 255.255.255.255.
ACL Overview
Logging of ACL configuration activity is supported via syslog messages. This logging can be enabled for a specified entry, all entries, or the final implicit deny rule using the log entry command in access list configuration mode. Logging format can be in either a verbose or summary format. Comments can be entered at the next available entry location, and, once entered, can be moved to a desired location. Use the permit command to create a rule that forwards packets based upon the defined rule. Use the deny command to create a rule that prevents the forwarding of packets based upon the defined rule.
0.0.255.255
The following example creates an extended access-list 120 and configures a deny entry for the IP protocol with a source address 20.0.0.1 and source wildcard of 0.0.255.255 and a destination address of any. Syslog messaging is enabled to log any hit for this rule. This rule is followed by a permit rule for any other source or destination IP protocol traffic:
S Chassis(rw-config)->ip access-list extended 120 S Chassis(rw-cfg-ext-acl)->deny ip 20.0.0.1 0.0.255.255 any log S Chassis(rw-cfg-ext-acl)->permit ip any any S Chassis(rw-cfg-ext-acl)->show access-lists 120 Extended IP access list 120 1 deny ip 20.0.0.1 any any (3 entries) any
0.0.255.255
2 permit ip
This example enters configuration mode for extended IPv6 access list acl120 and configures a permit entry for the IP protocol with a source address 2001:1234:50:0:21f:45ff:fe3d:21aa/64 and a destination address of any:
S Chassis(rw-config)->ipv6 access-list extended acl120 S Chassis(rw-cfg-ipv6-ext-acl)->permit ipv6 2001:1234:50:0:21f:45ff:fe3d:21aa/64 any
38-4
ACL Overview
S Chassis(rw-cfg-ipv6-ext-acl)->
4 permit ip
-- implicit deny all -S Chassis(rw-cfg-ext-acl)->delete from 2 to 3 S Chassis(rw-cfg-ext-acl)->show access-lists 120 Extended IP access list 120 1 deny ip 20.0.0.1 any any (3 entries) any
0.0.255.255
2 permit ip
The following example enters configuration mode for standard IPv6 access list acl2 and deletes rule entry 10 - 12:
S Chassis(rw-config)->ipv6 access-list standard acl2 S Chassis(rw-cfg-ipv6-std-acl)->delete from 10 to 12 S Chassis(rw-cfg-ipv6-std-acl)->
30.0.0.1 40.0.0.1
ACL Overview
S Chassis(rw-cfg-ext-acl)->show access-lists 121 Extended IP access list 121 (5 entries) 1 deny 2 deny 3 deny ip ip ip 20.0.0.1 30.0.0.1 40.0.0.1 any any 0.0.255.255 0.0.255.255 0.0.255.255 any any any
4 permit ip
This example enters configuration mode for standard IPv6 access list acl2 and moves rule entries 10 - 12 before rule entry 5:
S Chassis(rw-config)->ipv6 access-list standard acl2 S Chassis(rw-cfg-ipv6-std-acl)->move before 5 from 10 to 12 S Chassis(rw-cfg-ipv6-std-acl)->
4 permit ip
-- implicit deny all -S Chassis(rw-cfg-ext-acl)->replace 1 deny ip 10.0.0.1 0.0.255.255 any S Chassis(rw-cfg-ext-acl)->show access-lists 121 Extended IP access list 121 (5 entries) 1 deny 2 deny 3 deny ip ip ip 10.0.0.1 30.0.0.1 40.0.0.1 any any 0.0.255.255 0.0.255.255 0.0.255.255 any any any
4 permit ip
This example replaces entry 1 of IPv6 access list acl10 with a permit any source address :
S Chassis(rw-config)->ipv6 access-list standard acl10 S Chassis(rw-cfg-ipv6-std-acl)->replace 1 permit any S Chassis(rw-cfg-ipv6-std-acl)->
38-6
ACL Overview
The following example displays an extended ACL 121 and inserts a new entry 2 with a deny rule for source IP address 20.0.0.1 and destination IP address any:
S Chassis(rw-config)->ip access-list extended 121 S Chassis(rw-cfg-ext-acl)->show access-lists 121 Extended IP access list 121 (5 entries) 1 deny 2 deny 3 deny ip ip ip 10.0.0.1 30.0.0.1 40.0.0.1 any any 0.0.255.255 0.0.255.255 0.0.255.255 any any any
4 permit ip
-- implicit deny all -S Chassis(rw-cfg-ext-acl)->insert before 2 deny ip 20.0.0.1 0.0.255.255 any S Chassis(rw-cfg-ext-acl)->show access-lists 121 Extended IP access list 121 (6 entries) 1 deny 2 deny 3 deny 4 deny ip ip ip ip 10.0.0.1 20.0.0.1 30.0.0.1 40.0.0.1 any any 0.0.255.255 0.0.255.255 0.0.255.255 0.0.255.255 any any any any
5 permit ip
This example enters configuration mode for extended IPv6 access list acl10 and inserts a rule before entry 10 that permits packets with a source address for host 2002:100::50 and a destination address of 2001:100::100:25/64 with a ToS value of 6:
S Chassis(rw-config)->ipv6 access-list standard acl10 S Chassis(rw-cfg-ipv6-ext-acl)->insert before 10 permit host 2002:100::50 2001:100::100:25/64 traffic-class 6 S Chassis(rw-cfg-ipv6-ext-acl)->
Applying ACLs
Once you have defined an ACL, it can be applied per routing interface. An ACL can be applied to host access or an interface before it is created. The association of the name or number of the ACL to the host or interface is persistent. You can use ACLs to filter traffic on individual interfaces, with a directional context (inbound, outbound, or both). Use the ip access-group command to apply an IPv4 access-list to an interface and the ipv6 access-group command to apply an IPv6 access-list to an interface, in interface configuration command mode, specifying the access-list number or name followed by the directional context to which this ACL will be applied. Use the ip host-access command for an IPv4 access-list and the ipv6 host-access command for an IPv6 access-list in configuration command mode, specifying the access-list number or name, to apply an ACL to host services for this device. Use the show access-lists applied to display access-lists that have been applied to a routing interface. The following example applies the extended ACL 121 to both the inbound and outbound direction on VLAN 2.
S Chassis(su-config)->interface vlan 2 S Chassis(su-config-intf-vlan.0.2)->ip access-group 121 in
Configuring ACLs
S Chassis(su-config-intf-vlan.0.2)->ip access-group 121 out S Chassis(su-config-intf-vlan.0.2)->show access-lists applied Extended IP access list 121, applied inbound on interface 2 Extended IP access list 121, applied outbound on interface 2 S Chassis(su-config-intf-vlan.0.2)-> (5 entries) (5 entries)
This example shows how to apply the standard access list acl10 for all inbound frames on VLAN 50. Based upon the definition of access list acl10, only frames with source fe80:0:0:0:21f:45ff:fe3d:21aa/64 are routed. All the frames with other sources received on VLAN 50 are dropped:
S Chassis(su-config)->ipv6 access-list standard acl10 S Chassis(su-cfg-ipv6-std-acl)->permit fe80:0:0:0:21f:45ff:fe3d:21aa/64 log S Chassis(su-cfg-ipv6-std-acl)->exit S Chassis(su-config)->interface vlan 50 S Chassis(su-config-intf-vlan.0.50)->ipv6 access-group acl10 in S Chassis(su-config-intf-vlan.0.50)-
Configuring ACLs
This section provides details for the configuration of ACLs on the S-Series products. Procedure 38-1 describes how to create an IPv4 ACL and manage IPv4 ACLs at the ACL level. Procedure 38-1 Creating and Managing IPv4 and IPv6 ACLs
Step 1. Task In global configuration command mode, create a standard or extended IPv4 or IPv6 ACL, or enter IPv4 or IPv6 ACL configuration mode for an already existing ACL. In global configuration command mode, optionally, copy a preexisting IPv4 or IPv6 ACL to a non-existing IPv4 or IPv6 ACL. Command(s) ipv4 access-list {standard | extended} {access-list-number | name} ipv6 access-list {standard | extended} name ipv4 ip access-list {standard | extended} {access-list-number | name} copy to {access-list-number | name} ipv6 ip access-list {standard | extended} name copy to name 3. In global configuration command mode, optionally, append a preexisting IPv4 or IPv6 ACL to another preexisting IPv4 or IPv6 ACL. ipv4 ip access-list {standard | extended} {access-list-number | name} append to {access-list-number | name} ipv6 ip access-list {standard | extended} name append to name 4. In global configuration command mode, optionally, check the efficiency of an IPv4 or IPv6 ACL. ipv4 ip access-list {standard | extended} {access-list-number | name} check ipv6 ip access-list {standard | extended} name check
2.
38-8
Configuring ACLs
Procedure 38-2 describes how to enter and manage standard ACL rules. Procedure 38-2 Entering and Managing Standard IPv4 ACL Rules
Step 1. Task In IPv4 ACL configuration command mode, optionally, create a standard IPv4 ACL deny rule entry. In IPv4 ACL configuration command mode, optionally, insert a new standard IPv4 ACL rule entry before the specified preexisting entry for this standard ACL. In IPv4 ACL configuration command mode, optionally, replace the specified standard ACL entry with the specified new entry. Command(s) deny {source source-wildcard | any | host ip-address]} [log | log-verbose] insert before entry {remark text | {permit | deny} {source source-wildcard | any | host ip-address} [log | log-verbose]} replace entry {remark "text" | deny {source [source-wildcard] | any | host ip-address] | permit {source [source-wildcard] | any | host ip-address]}
2.
3.
Procedure 38-3 describes how to enter and manage standard ACL rules. Procedure 38-3 Entering and Managing Standard IPv6 ACL Rules
Step 1. Task In IPv6 ACL configuration command mode, optionally, create a standard IPv6 ACL permit rule entry. In IPv6 ACL configuration command mode, optionally, create a standard IPv6 ACL deny rule entry. In IPv6 ACL configuration command mode, optionally, insert a new standard IPv6 ACL rule entry before the specified preexisting entry for this standard ACL. In IPv6 ACL configuration command mode, optionally, replace the specified standard ACL entry with the specified new entry. Command(s) permit {source-address/length | any | host ip-address]} [log | log-verbose] deny {source-address/length | any | host ip-address]} [log | log-verbose] insert before entry { remark text | {permit | deny}} {source-address/length | any | host ip-address]} [log | log-verbose] replace entry { remark text | {permit | deny}} {source-address/length | any | host ip-address]} [log | log-verbose]
2.
3.
4.
Procedure 38-4 describes how to enter and manage extended IPv4 ACL rules. Procedure 38-4 Entering and Managing Extended IPv4 ACL Rules
Step 1. Task In IPv4 ACL configuration command mode, optionally, create an extended IPv4 ACL permit rule entry. Command(s) permit {protocol-num | ip | ah | esp | gre} {source source-wildcard | any | host ip-address} {destination destination-host wildcard | any | host ip-address} [dscp code] [precedence value] [tos value] [log | log-verbose] permit tcp {source source-wildcard | any | host ip-address} [{eq | neq | gt | lt} source-port] [range start-port end-port] {destination destination-host wildcard | any | host ip-address} [{eq | neq | gt | lt} dest-port] [range start-port end-port] [established] [dscp code] [precedence value] [tos value] [log | log-verbose]
Configuring ACLs
Procedure 38-4 Entering and Managing Extended IPv4 ACL Rules (continued)
Step Task Command(s) permit udp {source source-wildcard | any | host ip-address} [{eq | neq | gt | lt} source-port] [range start-port end-port] {destination destination-host wildcard | any | host ip-address} [{eq | neq | gt | lt} dest-port] [range start-port end-port] [dscp code] [precedence value] [tos value] [log | log-verbose] permit icmp {source source-wildcard | any | host ip-address} {destination destination-host wildcard | any | host ip-address} [msg icmp-msg] [dscp code] [precedence value] [tos value] [log | log-verbose] 2. In IPv4 ACL configuration command mode, optionally, create an extended IPv4 ACL deny rule entry. deny {protocol-num | ip | ah | esp | gre} {source source-wildcard | any | host ip-address} {destination destination-host wildcard | any | host ip-address} [dscp code] [precedence value] [tos value] [log | log-verbose] deny tcp {source source-wildcard | any | host ip-address} [{eq | neq | gt | lt} source-port] [range start-port end-port] {destination destination-host wildcard | any | host ip-address} [{eq | neq | gt | lt} dest-port] [range start-port end-port] [established] [dscp code] [precedence value] [tos value] [log | log-verbose] deny udp {source source-wildcard | any | host ip-address} [{eq | neq | gt | lt} source-port] [range start-port end-port] {destination destination-host wildcard | any | host ip-address} [{eq | neq | gt | lt} dest-port] [range start-port end-port] [dscp code] [precedence value] [tos value] [log | log-verbose] deny icmp {source source-wildcard | any | host ip-address} {destination destination-host wildcard | any | host ip-address} [msg icmp-msg] [dscp code] [precedence value] [tos value] [log | log-verbose] 3. In IPv4 ACL configuration command mode, optionally, insert a new extended IPv4 ACL rule entry before the specified preexisting entry for this extended ACL. See the appropriate command syntax when entering a deny or permit rule to be inserted. In IPv4 ACL configuration command mode, optionally, replace the specified extended IPv4 ACL entry with the specified new entry. See the appropriate command syntax when entering a deny or permit rule to be replaced. insert before entry {remark "text" | deny-syntax | permit-syntax}
4.
38-10
Configuring ACLs
Procedure 38-5 describes how to enter and manage extended IPv6 ACL rules. Procedure 38-5 Entering and Managing Extended IPv6 ACL Rules
Step 1. Task In IPv6 ACL configuration command mode, optionally, create an extended IPv6 ACL permit rule entry. Command(s) permit {protocol-num | ipv6 | ah | esp | gre} {source-address/length | any | host ip-address} {destination-address/length | any | host ip-address} [dscp code] [traffic-class value] [flow-label value] [log | log-verbose] [routing] [routing-type type] [mobility] [mobility-type type] permit tcp {source-address/length | any | host ip-address} [{eq | neq | gt | lt} source-port] [range start-port end-port] {destination-address/length | any | host ip-address} [{eq | neq | gt | lt} dest-port] [range start-port end-port] [established] [dscp code] [traffic-class value] [flow-label value] [log | log-verbose] [routing] [routing-type type] [mobility] [mobility-type type] permit udp {source-address/length | any | host ip-address} [{eq | neq | gt | lt} source-port] [range start-port end-port] {destination-address/length | any | host ip-address} [{eq | neq | gt | lt} dest-port] [range start-port end-port] [dscp code] [traffic-class value] [flow-label value] [log | log-verbose] [routing] [routing-type type] [mobility] [mobility-type type] permit icmpv6 {source-address/length | any | host ip-address} {destination-address/length | any | host ip-address} [icmpv6-type [icmpv6-code] | msg icmpv6-msg] [dscp code] [traffic-class value] [flow-label value] [log | log-verbose] [routing] [routing-type type] [mobility] [mobility-type type] 2. deny {protocol-num | ipv6 | ah | esp | gre} {source-address/length | any | host ip-address} {destination-address/length | any | host ip-address} [dscp code] [traffic-class value] [flow-label value] [log | log-verbose] [routing] [routing-type type] [mobility] [mobility-type type] deny tcp {source-address/length | any | host ip-address} [{eq | neq | gt | lt} source-port] [range start-port end-port] {destination-address/length | any | host ip-address} [{eq | neq | gt | lt} dest-port] [range start-port end-port] [established] [dscp code] [traffic-class value] [flow-label value] [log | log-verbose] [routing] [routing-type type] [mobility] [mobility-type type]
Configuring ACLs
Procedure 38-5 Entering and Managing Extended IPv6 ACL Rules (continued)
Step 3. Task In IPv6 ACL configuration command mode, optionally, create an extended IPv6 ACL deny rule entry. Command(s) deny udp {source-address/length | any | host ip-address} [{eq | neq | gt | lt} source-port] [range start-port end-port] {destination-address/length | any | host ip-address} [{eq | neq | gt | lt} dest-port] [range start-port end-port] [dscp code] [traffic-class value] [flow-label value] [log | log-verbose] [routing] [routing-type type] [mobility] [mobility-type type] deny icmpv6 {source-address/length | any | host ip-address} {destination-address/length | any | host ip-address} [icmpv6-type [icmpv6-code] | msg icmpv6-msg] [dscp code] [traffic-class value] [flow-label value] [log | log-verbose] [routing] [routing-type type] [mobility] [mobility-type type] 4. In IPv6 ACL configuration command mode, optionally, insert a new extended IPv6 ACL rule entry before the specified preexisting entry for this extended ACL. See the appropriate command syntax when entering a deny or permit rule to be inserted. In IPv6 ACL configuration command mode, optionally, replace the specified extended IPv6 ACL entry with the specified new entry. See the appropriate command syntax when entering a deny or permit rule to be replaced. insert before entry {remark "text" | deny-syntax | permit-syntax}
5.
Procedure 38-6 describes how to manage ACL rules. Procedure 38-6 Managing IPv4 and IPv6 ACL Rules
Step 1. Task In IPv4 or IPv6 ACL configuration command mode, optionally, enable logging for the specified rule, the final implicit deny rule, or all rules. In IPv4 or IPv6 ACL configuration command mode, optionally, delete a preexisting ACL rule entry. In IPv4 or IPv6 ACL configuration command mode, optionally, move a preexisting ACL entry before the specified entry or range of entries. In IPv4 or IPv6 ACL configuration command mode, optionally, enter a text comment as the next ACL entry. Command(s) log [entry] [implicit] [all]
2.
3.
4.
remark text
38-12
Procedure 38-7 describes how to apply and display ACLs. Procedure 38-7 Applying and Displaying ACLs
Step 1. Task In interface configuration command mode, apply an ACL to a routing interface specifying the whether the ACL applies to inbound or outbound frames. In configuration command mode, apply an ACL to the host services for this device. Command(s) ipv4 access-group {access-list-number | name} {in | out} ipv6 access-group access-list-name {in | out} ipv4 host-access {access-list-number | name} ipv6 host-access name 3. 4. In any command mode, optionally, display ACL configuration. In any command mode, optionally, display applied ACLs. In any command mode, optionally, clear ACL display counters. show access-lists [access-list-number | name] [from start-range to end-range]] [brief] show access-lists applied [host | interfaces [vlan | inbound | outbound | in-and-out]] clear access-lists counters [ {access-list-number | name} | applied [host | interfaces [vlan vlan-id] [inbound | outbound | in-and-out] ]
2.
5.
38-14
39
Route-Map Manager Configuration
This document describes the route-map manager feature and its configuration on Enterasys S-Series devices.
For information about... Using Route-Map Manager in Your Network Implementing Route-Maps Route-Map Manager Overview Configuring Route-Map Manager Route-Map Manager Configuration Examples Terms and Definitions Refer to page... 39-1 39-3 39-4 39-9 39-15 39-17
A named route-map consists of a set of permit or deny entries. Entries are sequenced by unique sequence numbers per named route-map. A route-map can contain multiple route-map sequences. Route-map entries are not unlike the permit and deny statements in an ACL with one very important exception: unlike the ACL, all route-map entries must be successful for this route-maps action to occur. Each route-map sequence may contain one or more match and set clauses. A match clause contains the criteria that determines whether the permit or deny action for this entry should be taken. All route-map entries for a given sequence must be successful for a route-map action to occur. If multiple sequences are configured, the first one that matches all entries will "pass" and return the set actions for that sequence. If a sequence does not pass, the next sequence is processed until a sequence in which all entries match is found. If no entries match for all sequences, then the route-map is not used. A set clause defines the action for this route-map. Depending on the route-map type and permit/deny setting of the route-map sequence, zero or more set clauses are supported per route-map sequence.
If both criteria are true, the next hop will be chosen from the default-next hop IP address list, using the configured load-policy setting. If the next hop of a policy IP address match belongs to a different VRF, you can set the next hop VRF to perform the route lookup. The route-map probe feature provides for the configuration of an ICMP probe to monitor next hops.
Redistribution Route-Maps
For redistribution route-maps, if a match clause is configured, a match of the packet source IP address against either a specified VLAN or the contents of one or more specified ALCs is required. A configured set entry specifies a route tag, metric, metric increment or decrement, or metric type to be used for redistribution by the ACLs matched in this route-map. Redistribution route-maps, with a set entry specifying a route tag, must be assigned to the redistribute command within the OSPF router configuration command mode, for redistribution based upon this route-map to occur.
BGP Route-Maps
For BGP permit route-maps, all match clauses within a sequence must match for set clauses to be performed. For BGP deny route-maps, all match clauses within a sequence must match for the packet to be dropped. There is an exception to the all match clauses rule: in the case of multiple match prefix entries, only a single prefix entry needs to match. BGP route-maps support match clauses for: Address Family Indicator (AFI) and Subsequent Address Family Indicator (SAFI) attributes AS-Path attribute Community name Extended-community name Prefix list Multi-Exit Discriminator (MED)
Implementing Route-Maps
BGP route-maps support set clauses for: Autonomous System (AS) Maximum length of the AS path attribute Community name Extended community attributes: IP route target AS and 4-octet AS route target IP site of origin AS and 4-octet AS site of origin OSPF domain and router ID OSPF route type
Local preference Multi-Exit Discriminator (MED) IP next hop Origin Local Outbound Rate Filtering (ORF) association Weight Flap table
Implementing Route-Maps
Implementing a Policy Based Route-Map
To implement a policy based route-map: Create a policy based route-map and one or more entries for this route map For each sequence in the route-map, optionally configure match clauses to filter the packet based upon the specification of up to five ACLs per match clause For each sequence in the route-map, optionally configure a set clause specifying up to 5 next hops or default next hops per command line (system maximum of 128) Optionally configure the route-map probe feature to monitor each specified next hop in the route-map If the next hop of a policy IP address match belongs to a different VRF, set the next hop VRF to perform the route lookup
Assign the configured route-map to the interface for which policy-based routing is to be performed (a route-map can be assigned to multiple interfaces) Optionally, change the policy priority settings for this interface Optionally, change the load-policy settings for this interface
Creating a Route-Map
When creating a route-map, specify: Whether it is a policy based, redistribution, or filter route-map The name of the route-map using up to 32 alpha-numeric characters Whether this sequence is a permit or deny (defaults to permit) A sequence number for this entry (defaults to 10)
Currently, up to 100 each of filter, redistribution, BGP, and policy route-maps are permitted.
Multiple sequences can be input for a single named route-map. Configuring a route-map sequence places you in route-map configuration command mode for the configuration of route-map match and set clauses. The system-wide maximum number of both match and set route-map clauses is 1000. Policy route-maps must have at least one IP address match clause and at least one next hop or default next hop clause. An ACL that has not yet been created can be specified in an IP address match clause. If a route-map is applied to an interface, any ACLs that have not been created will be ignored. Policy based route-maps must be assigned to an interface using the ip policy route-map command in interface configuration mode. Redistribution route-maps must be associated with the redistribution of OSPF routes within the OSPF routing protocol using the redistribute command in OSPF router configuration command mode. Filter route-maps must be associated with the filtering of OSPF routes from the OSPF route table (FIB) using the distribute-list route-map in command. Use the route-map policy command in configuration command mode to create a policy based route-map. Use the route-map redistribution command in configuration command mode to create a redistribution route-map. Use the route-map filter command in configuration command mode to create an OSPF filter route-map.
There can be multiple match clauses associated with a single route-map sequence. A route-map sequences set clause determines the action the route-map will take when a successful match for this sequence occurs. The action configurable for a set clause depends upon the route-map type. For a policy based route-map, the set clause specifies one or more next hops for this route. For the redistribution route-map, the set clause specifies an OSPF route tag for this route.
Route-Map Probe
The route-map manager supports the assigning of an ICMP probe to monitor a next hop IP address. Tracked object manager uses the route-map facility to monitor the IP address, but you do not assign the ICMP probe to a specific route-map. If a next hop IP address is declared down, it is removed from the next hop selection process for all route-maps specifying this address as a next hop, until it is declared up again. The assigned ICMP probe will ping port 0 of the specified IPv4 or IPv6 address. A route-map probe entry is configurable for each configured next hop address. Currently a combination of up to 128 standard or default next hop addresses are configurable on a system. If the same next hop is referenced in multiple route-maps, only a single route-map probe instance is created. See Chapter 10, Tracked Object Manager Configuration for tracked object manager details. Use the route-map probe command in router configuration mode to assign an ICMP probe to monitor the specified next hop IP address. A predefined policy based routing ICMP probe named $pbr_default can be used, or you can create a probe, using the probe command. Predefined ICMP probes can not be specified by name. Use the default keyword when configuring the default route-map probe. This example shows how to create the ICMP probe ICMP-PBR and assign it to a route-map probe to monitor next hop IP addresses 101.10.1.252 and 2000::1301:0:21f:45ff:fe4d:8722. The fail detection count is set to 5 attempts, and the fail detection interval is set to 5 seconds. The two assigned sessions are displayed:
S Chassis(su-config)->probe ICMP-PBR icmp S Chassis(su-config-probe)->faildetect count 5 interval 5 S Chassis(su-config-probe)->inservice S Chassis(su-config-probe)->exit S Chassis(su-config)->route-map probe 101.10.1.252 probe-name ICMP-PBR S Chassis(su-config)->route-map probe 2000::1301:0:21f:45ff:fe4d:8722 probe-name ICMP-PBR S Chassis(su-config)->show probe sessions
Client Codes: P-policy based routing, S-SLB, V-VRRP, W-TWCB T-tracked object probe ... Probe: ICMP-PBR, icmp IP Address Port Status StChngs Last Change Clients
--------------------------------- ----- --------- ------- ------------- ------101.10.1.252 2000::1301:0:21f:45ff:fe4d:8722 Displayed 2 sessions ... S Chassis(su-config)-> 0 0 Up Up 1 1 0h0m30s 0h0m40s P P
Priority allows the user to specify whether the route-map lookup or the route table lookup will have priority in the next hop selection process as follows: only - Uses the priority based routing next hop and drops the packet if the priority based routing next hop is not available first - Uses priority based routing next hop or uses the route table next hop if the priority based next hop is not available last - Uses the route table if the route exists there, otherwise the priority based routing next hop is used
Use the ip policy route-map command in interface configuration command mode to assign a route-map to an interface. Use the ip policy load-policy command in interface configuration command mode to determine the load balancing algorithm that will be used in the next hop selection process. Use the ip policy priority command in interface configuration command mode to specify whether the route-map lookup or route table lookup will determine the next hop for this route.
Procedure 39-1 describes how to configure a policy based route-map. Procedure 39-1 Configuring a Policy Based Route-Map
Step 1. Task In configuration command mode, create a policy based route map, optionally specifying whether this entry is a permit or deny, and the sequence number for this entry. This command provides access to policy based route-map configuration command mode. Use this command to create multiple entries if required. 2. In policy based route-map configuration command mode, specify one or more match clauses for this route-map, specifying up to five ACLs that will be matched against the packet source IP address. Though not necessary, it is recommended that all ACLs be configured before assigning them to an IP address match clause. In policy based route-map configuration command mode, specify a set clause containing up to five next hop IP addresses for this route-map. One or more of these commands can be specified. In policy based route-map configuration command mode, specify a set clause containing up to five default next hop IP addresses for this route-map to be used when next hops are not specifically configured or available using the set next-hop command. One or more of these commands can be specified. match ip address access-list Command(s) route-map policy name [permit | deny] [sequence-number]
3.
4.
6.
route-map probe ip-address probe-name {name | default} ip policy priority {[only] [first] [last]}
7.
8.
9.
In interface configuration command mode, ip policy route-map name assign the configured route-map to the interface.
Procedure 39-2 describes how to configure a redistribution route-map. Procedure 39-2 Configuring a Redistribution Route-Map
Step 1. Task In configuration command mode, create a redistribution route map, optionally specifying whether this entry is a permit or deny, and the sequence number for this entry. This command provides access to redistribution route-map configuration command mode. Use this command to create multiple entries if required. 2. In redistribution route-map configuration command mode, specify one or more match clauses for this route-map, specifying up to five ACLs that will be matched against the packet source IP address. In redistribution route-map configuration command mode, specify a VLAN interface to match a packet source IP address against. In redistribution route-map configuration command mode, specify one or a range of metric costs that will be matched against the packet metric cost. In redistribution route-map configuration command mode, specify an OSPF tag ID or range of IDs that will be matched against the packet OSPF tag ID. In redistribution route-map configuration command mode, specify a set clause containing an OSPF route tag for this route-map. match ip address access-list Command(s) route-map redistribution name [permit | deny] [sequence-number]
3.
4.
5.
6.
39-10
8.
9.
10.
11.
redistribute {rip | static | connected} [route-map name] [metric metric value] [metric-type type-value] [tag tag]
Procedure 39-2 describes how to configure an OSPF filter route-map. Procedure 39-3 Configuring a Filter Route-Map
Step 1. Task In configuration command mode, create an OSPF filter route map, optionally specifying whether this entry is a permit or deny, and the sequence number for this entry. This command provides access to filter route-map configuration command mode. Use this command to create multiple entries if required. 2. In filter route-map configuration command mode, specify one or more IP network address, next hop, or source router ID match clauses for this route-map, specifying up to five ACLs that will be matched against specified IP type. address - network address next-hop - next hop route-source - source router ID 3. In filter route-map configuration command mode, specify one or more outbound interface match clauses that will be matched against the route outbound interface. match interface {interface-name | alias} match ip {address | next-hop | route-source} access-list Command(s) route-map filter name [permit | deny] [sequence-number]
5.
6.
Procedure 39-4 describes how to configure a BGP route-map. Procedure 39-4 Configuring a BGP Route-Map
Step 1. Task In configuration command mode, create a BGP route map, optionally specifying whether this entry is a permit or deny, and the sequence number for this entry. This command provides access to BGP route-map configuration command mode. Use this command to create multiple entries if required. 2. In BGP route-map configuration command mode, configure a match clause to match a packet against its IPv4 or IPv6 Address Family Indicator (AFI) attribute. In BGP route-map configuration command mode, configure a match clause to match a packet against its Subsequent Address Family Indicator (SAFI) attribute, specifying whether the attribute is unicast or multicast. In BGP route-map configuration command mode, configure a match clause to match a packet against its AS path attribute. In BGP route-map configuration command mode, configure a match clause to match a packet against the specified community name. match afi {ipv4 | ipv6} Command(s) route-map bgp name [permit | deny] [sequence-number]
3.
4.
5.
39-12
7.
8.
9.
set as num
10.
11.
12.
13.
14.
15.
16.
18.
19.
20.
set extended-community ospf-route-type area route-type type [type2-metric] {remove-all | remove-specific | set-specific | remove-all-and-set} set local-preference value
21.
22.
23.
24.
25.
26.
27.
39-14
Table 39-2 describes how to display route-map manager information. Display commands can be entered in any command mode. Table 39-2
Task To display configured route-maps: To display the policy applied to a routing interface:
S Chassis(rw)->configure S Chassis(rw-config)->ip access-list extended 101 S Chassis(rw-cfg-ext-acl)->permit ip 60.10.0.0 0.0.255.255 host 50.10.0.1 S Chassis(rw-cfg-ext-acl)->permit ip 60.10.0.0 0.0.255.255 host 50.10.0.2 S Chassis(rw-cfg-ext-acl)->deny ip any any S Chassis(rw-cfg-ext-acl)->show access-lists 101 Extended IP access list 101 1 permit ip 2 permit ip 3 deny ip 60.10.0.0 60.10.0.0 any any (4 entries) host 50.10.0.1 host 50.10.0.2
0.0.255.255 0.0.255.255
-- implicit deny all -S Chassis(rw-cfg-ext-acl)->exit S Chassis(rw-config)->route-map policy rmP1 permit 10 S Chassis(rw-config-route-map-pbr)->match ip address 101 S Chassis(rw-config-route-map-pbr)->set next-hop 30.10.0.10 30.10.0.20 30.10.0.30 S Chassis(rw-config-route-map-pbr)->exit S Chassis(rw-config)->show route-map rmP1 route-map policy rmP1 permit 10
match ip address 101 set next-hop 30.10.0.10 30.10.0.20 30.10.0.30 Policy matches: 0 packets S Chassis(rw-config)->route-map probe 30.10.0.10 default S Chassis(rw-config)->route-map probe 30.10.0.20 default S Chassis(rw-config)->route-map probe 30.10.0.30 default S Chassis(rw-config)->interface vlan 110 S Chassis(rw-config-intf-vlan.0.110)->ip policy priority only S Chassis(rw-config-intf-vlan.0.110)->ip policy load-policy round-robin S Chassis(rw-config-intf-vlan.0.110)->ip policy route-map rmP1 S Chassis(rw-config-intf-vlan.0.110)->show ip policy Interface ----------vlan.0.110 Route map Priority Load policy Match count
S Chassis(rw-config-intf-vlan.0.110)->exit S Chassis(rw-config)->
S Chassis(rw)->configure S Chassis(rw-config)->ip access-list standard OSPF S Chassis(rw-cfg-std-acl)->permit 40.0.0.0 0.0.0.255 S Chassis(rw-cfg-std-acl)->permit 40.0.10.0 0.0.0.255 S Chassis(rw-cfg-std-acl)->show access-lists OSPF Standard IP access list OSPF 1 permit 40.0.0.0 2 permit 40.0.10.0 0.0.0.255 0.0.0.255 (3 entries)
-- implicit deny all -S Chassis(rw-cfg-std-acl)->exit S Chassis(rw-config)->route-map redistribution rmR1 permit 10 S Chassis(rw-config-route-map)->match ip address OSPF S Chassis(rw-config-route-map)->set tag 65432 S Chassis(rw-config-route-map)->exit S Chassis(rw-config)->show route-map rmR1 route-map redistribution rmR1 permit 10 match ip address OSPF set tag 65432 S Chassis(rw-config)->router ospf 1 S Chassis(rw-config-ospf-1)->redistribute rip route-map rmR1
39-16 Route-Map Manager Configuration
S Chassis(rw-config-ospf-1)->exit S Chassis(rw-config)->
S Chassis(su)->configure S Chassis(su-config)->route-map bgp bgprm1 permit S Chassis(su-config-route-map-bgp)->match prefix-list permit100 S Chassis(su-config-route-map-bgp)->match prefix-list pfxlist1 S Chassis(su-config-route-map-bgp)->match as-path ^20313.*13$ S Chassis(su-config-route-map-bgp)->set ip next-hop 152.50.25.10 S Chassis(su-config-route-map-bgp)->
39-18
40
Quality of Service (QoS) Configuration
This chapter describes the QoS feature as it is implemented on the Enterasys S-Series devices.
For information about... Using Quality of Service in Your Network Implementing Quality of Service Quality of Service Overview Understanding QoS Configuration on the S-Series The QoS CLI Command Flow QoS Configuration Example Terms and Definitions Refer to page... 40-1 40-2 40-2 40-10 40-24 40-25 40-31
You configure packet preference and forwarding treatment based upon a flows sensitivity to delay, delay variation (jitter), bandwidth, availability and packet drop. QoS uses packet priority, in conjunction with queue treatment configuration, to determine the interfaces inbound and forwarding behavior for this packet. Packet preference and forwarding treatment for a given flow can be applied to roles configured in Enterasys policy. Without QoS, all packets are treated as though the delivery requirements and characteristics of any given packet are equal to any other packet. In other words, non-QoS packet delivery is not able to take into account application sensitivity to packet delay, jitter, amount of bandwidth required, packet loss, or availability requirements of the flow. QoS provides management mechanisms for these flow characteristics. QoS achieves its bandwidth management capabilities by: Setting priorities that define traffic handling Dedicating bandwidth and prioritizing queuing for specific applications, and reducing packet transmission delay and jitter Managing congestion by shifting packet loss to applications that can tolerate it
The S-Series Flex-Edge feature, supported on all S-Series switches, provides the unique capability to classify traffic as it enters the switch. Traffic critical to ensuring the operational state of the network and to maintain application continuity is identified and prioritized at ingress, prior to being passed on for packet processing. See Flex-Edge on page 40-2 for more details.
These QoS abilities collectively make up a Class of Service (CoS). The remainder of this section will briefly describe CoS and its components.
Flex-Edge
All S-Series switches support the Flex-Edge feature, which provides a unique mechanism for the classification of traffic as it enters the switch. With the Enterasys Flex-Edge feature, the switch is significantly less vulnerable to network congestion issues at peak traffic times. Traffic critical to ensuring the operational state of the network and maintaining application continuity is identified and prioritized at ingress, prior to being passed on for packet processing. Network high availability is assured, and important users and applications are guaranteed bandwidth and priority. The Flex-Edge feature assigns one of five traffic categories to each packet as it enters the switch. Flex-Edge, using the advanced Media Access Control (MAC) capability on the switch, queues each of five traffic categories into its own prioritized queue. Each queue will not pass any traffic on to the packet processor until all higher priority queues are empty (see Strict Priority Queuing on page 40-5 for more information on this type of queuing).
40-2
If flow control is enabled on the port, either manually or using auto-negotiation, Flex-Edge applies backpressure to front and aggregator ports to avoid discard. The MAC capability monitors traffic on all ports, by category and priority, and makes intelligent decisions concerning which front panel ports to initiate flow control on, by sending a MAC PAUSE frame to the sending device out the port causing the congestion.
Note: The Flex-Edge feature and the port priority (IEEE 802.1D) configuration are functionally separate and have no affect on each other.
Priority queueing, from high priority to low priority, is given to the following five traffic categories: 1. Network control Protocol packets necessary for maintaining network topology such as: 2. 3. 4. 5. L2 (STP, GVRP, LACP) L3 (VRRP, OSPF, RIP, BGP, DVMRP, PIM) ARP
Network discovery - Protocol packets used for dissemination of network characteristics such as: LLDP, CtronDP, and CiscoDP Authentication Configured drop-precedence - Packets associated with a policy rule that specifies a Class of Service with a configured drop-precedence of favored (0), best-effort (1), or unfavored (2) Best effort - All traffic that doesnt fall into any other category listed here
Network control, network discovery, and authentication priorities are hard coded and cannot be modified. Drop-precedence is assigned to a Class of Service using the set cos settings command and applied to a policy rule using the set policy rule command. Best-effort is traffic that is undefined within the Flex-Edge context, and therefore by definition cannot be configured for purposes of backpressure or packet drop. Best-effort categorized traffic is given the lowest priority by the Flex-Edge mechanism, with the exception of unfavored drop-precedence which is the lowest priority possible within the Flex-Edge mechanism. The only user configurable aspect of the Flex-Edge feature is drop-precedence. Drop-precedence is a CoS settings option. CoS settings are assigned to a policy rule. In a Flex-Edge context, drop precedence is limited to rules that apply to a single port and specify a traffic classification of either port or macsource. For any packets matching the policy rule, you can assign one of three drop-precedence priority levels: Favored - A drop-precedence value of 0 provides a better chance of being passed on for packet processing than traffic categorized as best-effort. Best-Effort - A drop-precedence value of 1 provides a best-effort level of priority within the Flex-Edge priority scheme. Unfavored - A drop-precedence value of 2 provides a somewhat worse chance of being passed on for packet processing than traffic categorized as best-effort. This is the lowest possible priority setting within the Flex-Edge mechanism.
compatibility, CoS entries 07 cannot be removed. CoS entries 8-255 can be configured for the following services: 802.1p priority IP ToS rewrite value Priority Transmit Queue (TxQ) with configurable forwarding behavior In-bound (IRL) and outbound (ORL) rate limiter per transmit queue Outbound rate shaper per transmit queue
The CoS configuration for each service can be easily viewed using the CoS setting tables. Ports are bundled into port groups with the group assigned to a CoS, significantly cutting down on operational overhead and complexity.
The ToS parameter is: An 8-bit field with values 0255 Supported in layer 3 only Also referred to as the Differentiated Services Code Point (DSCP) when limited to the lower 5 bits of the field
Figure 40-1 displays the relationship between your application, priority level, 802.1p, and ToS assignments (shown here using DSCP terminology). QoS priority/ToS configuration: Derives its characteristic requirements from the end-system application Is configured on the edge device the application is connected to Is propagated through the network in the protocol packet header
40-4
Figure 40-1
The ICMP protocol, used for error messaging, has a low bandwidth requirement, with a high tolerance for delay and jitter, and is appropriate for a low priority setting. HTTP and FTP protocols, used respectively for browser-generated and file transfer traffic, have a medium to high bandwidth requirement, with a medium to high tolerance for delay and jitter, and are appropriate for a medium priority level. Voice (VoIP), used for voice calls, has a low bandwidth requirement, but is very sensitive to delay and jitter and is appropriate for a high priority level. See RFC 1349 for further details on ToS. See RFCs 2474 and 2475 for further details on DSCP.
Figure 40-2
40-6
Figure 40-3
Hybrid Queuing
Hybrid queuing combines the properties of both strict priority and weighted fair queuing. Figure 40-4 on page 40-8, depicts hybrid queuing. The configuration is for strict priority queuing on queue 3 and weighted fair queuing for the remaining queues, with queue 2 receiving 50 percent of the remaining time slices, and the other queues receiving 25 percent each. The benefit of hybrid queuing is that queues configured as strict priority will receive all the bandwidth that is available in the order of their priority until empty. Remaining bandwidth will be used by the weighted fair queues based upon the time slice percentages configured. The down side remains that anytime strict priority queuing is used, should the strict priority queues never fully empty, remaining queues will be starved of bandwidth.
Figure 40-4
Rate Limiting
Rate limiting is used to control the rate of traffic entering (inbound) and/or leaving (outbound) a switch per CoS. Rate limiting allows for the throttling of traffic flows that consume available bandwidth, in the process providing room for other flows. Rate limiting guarantees the availability of bandwidth for other traffic by preventing the rate limited traffic from consuming more than the assigned amount of a networks resources. Rate limiting accomplishes this by setting a cap on the bandwidth utilization of specific types of both inbound and outbound traffic. When a rate limit has been exceeded, the CoS can be configured to perform one or all of the following: record a Syslog message, send an SNMP trap to inform the administrator, and automatically disable the port. Figure 40-5 on page 40-9 illustrates how bursty traffic is clipped above the assigned threshold with rate limiting applied.
40-8
Figure 40-5
Rate Shaping
Rate Shaping throttles the rate at which a port transmits (outbound) queued packets. Rate Shaping buffers packets received above the configured rate on a per CoS basis, rather than dropping them. Only when buffer capacity is exceeded are packets dropped. Rate shaping may be configured for a CoS on a port, for an 802.1p priority on a port, or for all Classes of Service on a port. Figure 40-6 illustrates how bursty traffic is smoothed out when it bursts above the assigned threshold with rate shaping applied. Figure 40-6 Rate Shaping Smoothing Behavior
Rate shaping retains excess packets in a queue and then schedules these packets for later transmission over time. Therefore, the packet output rate is smoothed and bursts in transmission are not propagated as seen with rate limiting. Rate shaping can be implemented for multiple reasons, such as controlling bandwidth, to offer differing levels of service, or to avoid traffic congestion on other links in the network by removing the burstiness property of traffic that can lead to discarded packets. Rate shaping is important for real-time traffic, where packet loss is extremely detrimental to these applications. Instead of discarding traffic imposed by rate limiting, delays are induced into its transmission by retaining the data for future transmission. However, the delays must also be bounded to the degree that the traffic is sensitive to delays.
Numerous QoS values are associated with each other through reference. With the exception of 802.1p priority and ToS, CoS values are first mapped to a port group, which associates a CoS configuration with a port type. A port group has the following CoS parameters associated with it: Physical port(s) Strict priority or weighted fair queuing behavior Rate-limit setting(s) Rate-shaping setting(s) A port queue A port reference
Understanding how these parameters are first mapped to the port group and then to a TxQ or IRL reference is the key to understanding QoS configuration. Where appropriate, the task column in Procedure 40-1 on page 40-24 identifies these mapping relationships. See Determining CoS Port-Type on page 40-11 and Configuring CoS Port Groups on page 40-13 for a port group discussion.
40-10
TxQ
Port type 0 supports eleven transmit queues, while type 1 supports four. Use the show cos port-type txq to display all the system's ports currently associated to each type. The following example displays default values for the show cos port-type txq command output:
S Chassis(rw)->show cos port-type txq Number txq = irl = orl = fld = of resources: transmit queue(s) inbound rate limiter(s) outbound rate limiter(s) flood rate limiter(s) Supported rate types: perc = percentage pps = packets per second Kbps = kilobits per second Mbps = megabits per second Gbps = gigabits per second Tbps = terabits per second
Index ----0
IRL
Type 0 supports 24 Inbound Rate Limiters. Type 1 supports 32 Inbound Rate Limiters. Use the show cos port-type irl command to display the port types and their associated ports. The following example displays default values for the show cos port-type irl command output:
S Chassis(rw)->show cos port-type irl Number txq = irl = orl = fld = of resources: transmit queue(s) inbound rate limiter(s) outbound rate limiter(s) flood rate limiter(s) Supported rate types: perc = percentage pps = packets per second Kbps = kilobits per second Mbps = megabits per second Gbps = gigabits per second Tbps = terabits per second Supported rate type --------perc pps Kbps Mbps Eligible ports ----------------None Unselected ports ----------------None
Index ----0
Gbps 1 S-Series 32 IRL 32 irl perc pps Kbps Mbps Gbps ge.4.1-48; ge.6.1-48; ge.8.1-48; ge.8.101-112 None
ORL
Type 0 supports 4 Outbound Rate Limiters, while type 1 supports sixteen Outbound Rate Limiters. Use the show cos port-type orl command to display the port types and their associated ports. The following example displays default values for the show cos port-type orl command output:
S Chassis(rw)->show cos port-type orl Number txq = irl = orl = fld = of resources: transmit queue(s) inbound rate limiter(s) outbound rate limiter(s) flood rate limiter(s) Supported rate types: perc = percentage pps = packets per second Kbps = kilobits per second Mbps = megabits per second Gbps = gigabits per second Tbps = terabits per second Supported rate type --------perc pps Kbps Mbps Gbps perc pps Kbps Mbps Gbps Eligible ports ----------------None Unselected ports ----------------None
Index ----0
S-Series 16 ORL
16 orl
Flood Control
Flood Control is only supported on port-type 0. Three reference limiters are supported. Use the show cos port-type flood-ctrl command to display the port types and their associated ports. The following example displays default values for the show cos port-type flood-crtl command output:
S Chassis(rw)->show cos port-type flood-ctrl Number txq = irl = orl = fld = of resources: transmit queue(s) inbound rate limiter(s) outbound rate limiter(s) flood rate limiter(s) Supported rate types: perc = percentage pps = packets per second Kbps = kilobits per second Mbps = megabits per second Gbps = gigabits per second Tbps = terabits per second Supported rate type --------Eligible ports ----------------Unselected ports -----------------
Index ----40-12
3 fld
:Q [ 4]: 0 Q [ 5]: 0 Q [ 6]: 0 Q [ 7]: 0 :Q [ 8]: 100 Q [ 9]: LLQ Q [10]: LLQ Percentage/queue :Q [ 0]: LLQ Q [ 1]: 0% Q [ 2]: 0% Q [ 3]: 0% :Q [ 4]: 0% Q [ 5]: 0% Q [ 6]: 0% Q [ 7]: 0% :Q [ 8]: 100% Q [ 9]: LLQ Q [10]: LLQ ----------------------------------------------------------------------
Additional port groups can be created using the set cos port-config txq command. Name and associated ports can be configured, as well as TxQ settings. You need to: Identify the port-group for configuration Optionally, specify port-group Name, associated ports, and arb-percentage or arb-slices
Additional port groups can be created using the set cos port-config irl command. Port group name and associated ports can be configured. You need to: Identify the port-group for configuration Optionally, specify port-group Name and associated ports
40-14
Outbound Rate Limiting Port Configuration Entries ---------------------------------------------------------------------Port Group Name :S-Series 48 ORL Port Group :0 Port Type :0 Assigned Ports :none ---------------------------------------------------------------------Port Group Name :N/A 16 ORL Port Group :0 Port Type :1 Assigned Ports :none ---------------------------------------------------------------------Port Group Name :N/A 4 ORL Port Group :0 Port Type :2 Assigned Ports :none ----------------------------------------------------------------------
Additional port groups can be created using the set cos port-config orl command. Port group name and associated ports can be configured. You need to: Identify the port-group for configuration Optionally, specify port-group Name and associated ports
Additional port groups can be created using the set cos port-config flood-ctrl command. Port group name and associated ports can be configured. You need to: Identify the port-group for configuration Optionally, specify port-group Name and associated ports
The set cos port-resource txq command is used for creating outbound rate shapers. You need to:
40-16 Quality of Service (QoS) Configuration
Identify the port group for configuration Identify the queue resource ID, along with unit and rate desired for that queue
20 21 22 23
The set cos port-resource irl command is used for creating inbound rate limiters. You need to: Identify the port group for configuration Identify the limiter resource ID, along with desired unit, rate, and actions
The show cos port-resource orl command displays resources for each port group created along with the index, as described above. By default, no resources are configured for ORL port-resources. Rates displayed as none indicate no resources exist. The default rate limiting algorithm is tail-drop. The action field in the display indicates user-desired action for each syslog, trap, and port disable behavior when configured. The following example displays default values for the show cos port-resource orl command output:
S Chassis(rw)->show cos port-resource orl '?' after the rate value indicates an invalid rate value Group Index ----------0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 . . . 0.2 0.2 0.2 0.2 Resource -------0 1 2 3 4 5 6 7 Type ---orl orl orl orl orl orl orl orl Unit ---perc perc perc perc perc perc perc perc Rate ---------none none none none none none none none Rate Limit Type --------------drop drop drop drop drop drop drop drop Action -----none none none none none none none none
20 21 22 23
The set cos port-resource orl command is used for creating outbound rate limiters. You need to: Identify the port group for configuration Identify the limiter resource ID, along with desired unit, rate, and actions
40-18
-------0 1 2 3
perc none
Configure a CoS flood control resource entry, by mapping a port group with a traffic type such as multicast or broadcast, along with the ability to optionally set syslog, trap, and/or disable port behaviors should the limit be exceeded. This index is used by the rate-limit option when setting a flood control cos reference The set cos port-resource flood-ctrl command is used for configuring a CoS flood control resource entry.
The TxQ reference table can be displayed using the show cos reference txq command and displays port-group, reference index, and physical queue. The following example displays default values for the show cos reference txq command output:
S Chassis(rw)->show cos reference txq Group Index ----------0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 . . . Reference --------0 1 2 3 4 5 6 7 Type ---txq txq txq txq txq txq txq txq Queue -----------0 1 2 3 4 5 6 7
10 11 12 13 14 15
5 5 6 6 7 7
Although the TxQ reference table is populated by default, the Queue-to-Reference mapping can be configured using the set cos reference txq command. You need to: Identify the port group for configuration Identify the transmit queue reference, along with the associated queue
28 29 30 31
Physical-Limiter to reference mapping can be configured using the set cos reference irl command. The other references not configured are indicated by rate limiter none. To configure a physical limiter to reference mapping, you need to: Identify the port group for configuration Identify the rate-limit reference
40-20
The following example displays default values for the show cos reference orl for port group 0.0 command output:
S Chassis(rw)->show cos reference orl 0.0 Group Index ----------0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 . . . 0.0 0.0 0.0 0.0 Reference --------0 1 2 3 4 5 6 7 Type ---orl orl orl orl orl orl orl orl Rate Limiter -----------none none none none none none none none
44 45 46 47
Physical-Limiter to reference mapping can be configured using the set cos reference orl command. The other references not configured are indicated by rate limiter none. To configure a physical limiter to reference mapping, you need to: Identify the port group for configuration Identify the rate-limit reference
queue to be assigned by CoS; it points to the CoS TxQ reference mapping table index entry. It may be thought of as the virtual queue that is associated to a physical queue defined by the TxQ reference mapping table. TxQ reference mapping table defines 16 TxQ references, therefore CLI input for TxQ reference in the CoS Settings Table is 0-15. See CoS TxQ Reference Mapping on page 40-19 for a TxQ reference configuration discussion. IRL Reference: The CoS IRL reference field is optional, as rate limits are not required. Like the TxQ reference field, the IRL reference does not assign an inbound rate limit but points to the CoS IRL Reference Mapping Table. This reference may also be thought of as the virtual rate limiter that will assign the physical rate limiter defined by the IRL Reference Mapping Table. The IRL Reference Mapping Table defines 32 IRL references, therefore input for IRL reference in the CoS Settings Table is 0-31. See CoS IRL Reference Mapping Table on page 40-20 for an IRL reference configuration discussion. ORL Reference: The CoS ORL reference field is optional, as rate limits are not required. Like the TxQ and IRL reference fields, the ORL reference does not assign an outbound rate limit but points to the CoS ORL Reference Mapping Table. This reference may also be thought of as the virtual rate limiter that will assign the physical rate limiter defined by the ORL Reference Mapping Table. The IRL Reference Mapping Table defines 48 ORL references, therefore input for ORL reference in the CoS Settings Table is 0 - 47. See CoS ORL Reference Mapping Table on page 40-20 for an ORL reference configuration discussion. Drop-Precedence Reference: Drop-Precedence indicates a preference for dropping packets, often used in association with Weighted Random Early Detection (WRED) queues. The S-Series implementation uses the values to prioritize packets. Drop precedence has a special meaning within a Flex-Edge context. Packets assigned a drop-precedence value are assigned a 4th level of priority in the Flex-Edge mechanism, and are limited to rules applied to a single port. See Flex-Edge on page 40-2 for a detailed Flex-Edge drop-precedence discussion. Flood Control Reference: The CoS flood control reference field is optional. Flood control limiting is not required. Enable or disable flood control for the specified CoS index. New CoS Indexes can be created using the set cos settings command. ToS, 802.1p priority, TxQ reference, and IRL Reference can be configured for each CoS Index. You need to: Enter a CoS Index value from 0255 Specify 802.1p priority (Index entries 8255 only), tos-value, txq-reference and irl-reference
Use the set cos settings command to create or modify an already existing CoS index. Use the show cos settings command to display current CoS indexes. The following example displays default values for the show cos settings command output:
S Chassis(rw)->show cos settings * Means attribute has not been configured CoS Index --------0 1 2 3 4 5 6 7 Priority ---------0 1 2 3 4 5 6 7 ToS ------* 32.0 64.0 96.0 128.0 * * * TxQ ----0 4 8 12 16 10 12 14 IRL ----* * * * * 11 * * ORL ----* * * * * * * * Drop Prec --------* * * * * * * * Flood-Ctrl ---------Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled
40-22
Port -----------ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ... ge.1.1 ge.1.1 ge.1.1
Type ---irl irl irl irl irl irl irl irl irl irl irl irl irl irl
Violations are also displayed by resource and port using the show cos port-resource command. Violating ports are displayed at the end of the resource table.
3.
4.
set cos port-config orl port_group.port_type name name ports ports_list show cos port-config orl
5.
set cos port-config flood-ctrl port_group.port_type name name ports ports_list show cos port-config flood-ctrl
6.
set cos port-resource txq port_group.port_type tx_queue unit unit rate rate show cos port-resource txq port_group.port_type set cos port-resource irl port_group.port_type index unit unit rate rate syslog setting trap setting disable-port setting show cos port-resource irl port_group.port_type
7.
40-24
9.
set cos port-resource flood-ctrl port_group.port_type traffic-type unit unit rate rate syslog setting trap setting disable-port setting show cos port-resource flood-ctrl port_group.port_type set cos reference txq port_group.port_type reference queue queue show cos reference txq port_group.port_type
10.
11.
set cos reference irl port_group.port_type reference rate-limit IRLreference show cos reference irl port_group.port_type
12.
set cos reference orl port_group.port_type reference rate-limit IRLreference show cos reference orl port_group.port_type
13.
set cos settings cos-list [priority priority] [tos-value tos-value] [txq-reference txq-reference] [irl-reference irl-reference] [orl-reference orl-reference] [drop-precedence drop-precedence][flood-ctrl flood-ctrl] show cos settings set cos state enable show cos state
14.
This example assumes CEP authentication using H.323 for VoIP. If you are not authenticating your VoIP end point with CEP H.323 authentication, you will need to adjust the VoIP policy accordingly. For instance, SIP uses UDP port 5060, not the TCP port 1720.
Notes: Enterasys highly recommends that you use the NetSight Policy Manager to configure QoS on your network, whether you are applying policy or not. This example discusses the QoS configuration using Policy Manager followed by CLI input summaries.
To simplify this discussion of the configuration process, this example is limited to the VoIP configuration context. Table 40-1 provides a set of sample values for priority, IRL, and transmit queue across a number of real world traffic types. This table can be used as an aid in thinking about how you might want to apply CoS across your network. Note that scavenger class is traffic that should be treated as less than best effort: external web traffic, for instance. Table 40-1 CoS Sample Values By Traffic Type
Transmit Queue IRL Name Priority Edge Loop Detect Scavenger Best Effort Bulk Data Critical Data Network Control Network Management RTP Voice/Video 0 0 1 2 3 4 5 6 1 Mbps 7 25 Mbps 3 3 25% 25% 40 PPS 2 Mbps 1 Mbps 2 2 1Mbps 25% 25% 1 1 80% 45% 45% 10 PPS 15 Mbps Core 10 PPS 0 0 10% 5% 5% Queue # Edge Core Shaping Edge Core WFQ Edge Core
Figure 40-7 displays the network setup for this example configuration, with the desired Profile/QoS summary for each network node. Each node is configured with VoIP and Data VLANs. Each VoIP VLAN contains four 1-gigabit interfaces for each node.
40-26
Figure 40-7
VLAN 21 Data
ge.1.2-5
Core Edge
ge.1.10 IP addr:10.0.0.1
ge.1.10-13 Policy Profile: Ports: Default: CoS: egress-vlans: tci-overwrite: ToS: Rate Limit Physical queue: VolPCore-VLAN12 ge.1.10-3 CoS 5 9 12 enabled 184 1024 kbps 2 H.323 CEP: Policy Profile: Ports: Default: CoS: tci-overwrite: tcidestIP Port 1720: Rate Limit Tos Physical queue: Authentication H323CallSetup ge.1.10 CoS 5 10 enabled 10.0.01 1024 kbps 184 2
Edge Router
VLAN 11 Data
VLAN 12 VoIP
A core profile for the router and an edge profile for the switch provide for the difference in rate limiting needs between the enduser and aggregation devices. A call setup profile provides rate limiting for the setup aspect of the VoIP call. Each edge and core VLAN profile will be configured for default CoS 5 (best default priority for voice and video), the addition of its associated VLAN to its egress VLAN list, and ToS overwrite. We will create a separate CoS for both the edge and core to handle ToS, rate-limit and queue configuration for these devices. The H.323 call setup profile will be configured so that TCP call setup traffic on the TCP destination port 1720:10.0.0.1 of its gigabit link will be configured for the proper rate limit on that port.
Using NetSight Policy Manager, configure the policy roles and related services as follows:
Create a Rate-limiter
Create a rate-limit as follows: Inbound rate-limit of 25 mbps Apply it to port group types 32/8/100 for index 0
Create a Rule
Create a Layer 2 traffic classification rule for VLAN ID 22 within the VoIPCore service. Associate CoS 8 as the action for the rule.
40-28
Create a Rate-limiter
Create a rate-limit as follows: Inbound rate-limit of 1 mbps Apply it to port group types 32/8/100 for index 0
Create a Rule
Create a Layer 2 traffic classification rule for VLAN ID 22 within the VoIPEdge service. Associate CoS 9 as the action for the rule.
Create a Rate-limiter
Create a rate-limit as follows: Inbound rate-limit of 5 pps Apply it to port group types 32/8/100 for index 1
Router 1
The policy role creation discussed above is appropriate for Router 1 as follows: Apply role VoIPCore-VLAN22 to ports ge.1.2-5.
Switch 1
VoIPEdge and H323CallSetup roles are applied to Switch 1 as follows: Apply role VoIPEdge-VLAN12 to ports ge.1.10-13. Apply role H323CallSetup to port ge.1.10
40-30
S Chassis(rw)->set cos 9 priority 5 tos-value 184.0 txq-reference 8 irl-reference 1 S Chassis(rw)->set policy profile 2 name H323CallSetup cos 5 tci-overwrite enable S Chassis(rw)->set policy rule admin-profile port ge.1.10 mask 16 port-string ge.1.10 admin-pid 2 S Chassis(rw)->set policy rule 1 tcpdestportIP 1720:10.0.0.1 cos 10 port-string ge.1.10 S Chassis(rw)->set cos port-resource irl 3.1 2 unit pps rate 5 S Chassis(rw)->set cos reference irl 3.1 10 rate-limit 1 S Chassis(rw)->set cos 10 priority 5 tos-value 184.0 txq-reference 8 irl-reference 2 S Chassis(rw)->set cos state enable
Port Group Port Type Priority Quality of Service (QoS) Rate Limiting Rate Shaping
40-32
41
RADIUS Snooping Configuration
This document provides the following information about configuring RADIUS-Snooping on the Enterasys S-Series platforms.
For information about... Using RADIUS-Snooping in Your Network Implementing RADIUS-Snooping RADIUS-Snooping Overview Configuring RADIUS-Snooping RADIUS-Snooping Configuration Example Terms and Definitions Refer to page... 41-1 41-2 41-2 41-5 41-7 41-9
Implementing RADIUS-Snooping
Idle and session timeouts support Multi-user authentication on a port Multi-authentication method support
With RS-enabled on the distribution-tier switch, these Secure Networks capabilities can be configured by the network administrator on an end-user basis.
Implementing RADIUS-Snooping
RS requires that unencrypted RADIUS request frames, from the edge switch, transit the distribution-tier switch, before proceeding to the up-stream RADIUS server for validation.
Note: A router cannot reside between the RADIUS client and the distribution-tier switch enabled for RS. The presence of a router would modify the calling-station ID of the RADIUS request frame that RS depends upon to learn the MAC address of the end-station for this session.
To configure RS on a distribution-tier switch: Set the global MultiAuth mode to multi Set the MultiAuth port mode to auth-opt for all ports that are part of the RS configuration Globally enable RS on the distribution-tier switch Enable RS on all ports over which RADIUS request and response frames will transit Optionally change the period RS will wait for a RADIUS response frame from the server Populate the RADIUS-Snooping flow table with RS client and RADIUS server combinations
RADIUS-Snooping Overview
This section provides an overview of RADIUS-Snooping configuration and management.
RADIUS-Snooping Configuration
MultiAuth Configuration
MultiAuth must be enabled if the RADIUS-Snooping configuration involves the authentication of more than a single user on a port. There are two aspects to multiauthentication in a RADIUS-Snooping configuration: The global MultiAuth mode must be changed from the default mode of strict to multi, in order to authenticate multiple downstream users. The MultiAuth port mode must be set to auth-opt for both upstream (to the RADIUS server) and downstream (to the authenticating switch) ports. Setting global MultiAuth to multi sets the default port value from auth-opt to force-auth. Reset the mode for the affected ports to auth-opt.
See the MultiAuth Authentication on page 42-5 for a complete discussion on MultiAuth configuration.
Enabling RADIUS-Snooping
RS is enabled globally on the distribution-tier switch. It is also enabled on the distribution-tier switch ports directly attached to the edge switch that the RADIUS request frames transit, from the
RADIUS-Snooping Overview
edge switch to the RADIUS server, as well as the ports the response frames transit, from the RADIUS server back to the edge switch.
RADIUS-Snooping Management
RADIUS-Snooping management options are available to: Terminate all RS sessions or on a per port or MAC address basis Reset all RS configuration to its default settings Clear all RADIUS-Snooping flow table entries or per index entry Display RS statistics
Enterasys S-Series Configuration Guide 41-3
RADIUS-Snooping Overview
Figure 41-1
RADIUS-Snooping Overview
RADIUS Server
Edge Switch
Figure 41-1 illustrates the RADIUS request frame and RADIUS response frame paths. As the RADIUS request frame from the RADIUS client edge device transits the distribution-tier switch, it is snooped. An RS session is created on the distribution-tier switch, if: RADIUS snooping is enabled on the switch
Configuring RADIUS-Snooping
RADIUS Snooping is enabled on the port The RADIUS client edge device and RADIUS server combination are defined in the RADIUS snooping flow table
When the RADIUS server receives the request, the authenticating device is first validated. After validating the authenticating device, the server authenticates the user session itself based on passed username and password attributes. If that succeeds an access accept message containing RADIUS attributes is sent back to the client, otherwise an access reject message is sent back. As the RADIUS response frame transits the distribution-tier switch, the RADIUS attributes contained in the response frame are applied to this session, if an RS session was created for this client server combination and the session has not timed out.
Configuring RADIUS-Snooping
This section provides details for the configuration of RADIUS-Snooping on the S-Series products. Table 41-1 lists RS parameters and their default values. Table 41-1
Parameter RADIUS-Snooping timeout
RS system and port state Enables or disables RS on the distribution-tier switch in a system context or on this port in a port context. Enables or disables packet drop in a port context. authallocated Specifies the maximum number of allowed RS sessions from all RADIUS clients, on a per port basis. Specifies traffic drop behavior for this port. The numeric ID of a RADIUS-Snooping flow table entry. Specifies the RADIUS UDP port. Specifies the RADIUS secret for this RADIUS-Snooping flow table entry.
Disabled
8, 128, or 256 depending upon the system license for this device Disabled None 1812 No secret
Configuring RADIUS-Snooping
5.
6.
Managing RADIUS-Snooping
Table 41-2 describes how to manage RADIUS-Snooping on the distribution-tier switch. Table 41-2
Task To terminate active sessions on the system for the specified port or MAC address. To reset all RS configuration to its default value on this system. To clear all entries or the specified index entry from the RS flow table.
Managing RADIUS-Snooping
Command(s) set radius-snooping initialize {port port-string | mac-address} clear radius-snooping all clear radius-snooping flow {all | index}
To display a general overview of the global RS status. To display the RS status for the specified port. To display information for all or the specified flow index entry. To display a summary of sessions for the specified port or MAC address.
show radius-snooping show radius-snooping port port-string show radius-snooping flow {index | all} show radius-snooping session {port port-string | mac mac-address}
RADIUS Server
50.50.50.60
Network Core
Layer 2 Switch
Index 1 Flows
Distribution-Tier Switch
Index 2 Flows
Authenticating Devices
Authenticating Devices
We first enable RADIUS-Snooping at the system level for the distribution-tier switch. We then enable two sets of ports (ge.1.5-10 and ge.1.15-24) over which all RADIUS-Snooping request and response frames will transit. In the same command line we: Enable drop on all ports Set the maximum number of RS sessions per port to 256
We then configure the two flows as specified above for UDP port 1812 and a secret of mysecret. We complete the configuration by changing the timeout value at the system level to 15 seconds from a default of 20 seconds.
RADIUS-Snooping
41-10
42
Authentication Configuration
This document provides the following information about configuring user authentication on the Enterasys S-Series platforms.
For information about... Using Authentication in Your Network Implementing User Authentication Authentication Overview Configuring Authentication Authentication Configuration Example Terms and Definitions Refer to page... 42-1 42-2 42-2 42-12 42-27 42-31
Enterasys switch products support the configuration of up to three simultaneous authentication methods per user, with a single authentication method applied based upon MultiAuth authentication precedence. Network resources represent a major capital investment for your organization and can be vulnerable to both undesired resource usage and malicious intent from outside users. Authentication provides you with a user validation function which assures that the supplicant requesting access has the right to do so and is a known entity. To the degree a supplicant is not a
known entity, access can be denied or granted on a limited basis. The ability of authentication to both validate a users identity and define the resources available to the user assures that valuable network resources are being used for the purposes intended by the network administrator.
Authentication Overview
For information about... IEEE 802.1x Using EAP MAC-Based Authentication (MAC) Port Web Authentication (PWA) Convergence End Point (CEP) Multi-User And MultiAuth Authentication Remote Authentication Dial-In Service (RADIUS) Refer to page... 42-2 42-3 42-3 42-3 42-4 42-7
All Enterasys platforms support IEEE 802.1x, which protects against unauthorized access to a network, DoS attacks, theft of services and defacement of corporate web pages. 802.1x configuration consists of setting port, global 802.1x parameters, and RADIUS parameters on the switches to point the switch to the authentication server. The Filter-ID RADIUS attribute can be configured on the authentication server to direct dynamic policy assignment on the switch to the 802.1x authenticating end system.
42-2
Authentication Configuration
Authentication Overview
Authentication Overview
Multi-User Authentication
Multi-user authentication provides for the per-user or per-device provisioning of network resources when authenticating. It supports the ability to receive from the authentication server: A policy traffic profile, based on the user accounts RADIUS Filter-ID configuration A base VLAN-ID, based on the RFC 3580 tunnel attributes configuration, also known as dynamic VLAN assignment
When a single supplicant connected to an access layer port authenticates, a policy profile can be dynamically applied to all traffic on the port. When multi-user authentication is not implemented, and more than one supplicant is connected to a port, firmware does not provision network resources on a per-user or per-device basis. Different users or devices may require a different set of network resources. The firmware tracks the source MAC address for each authenticating user regardless of the authenticating protocol being used. Provisioning network resources on a per-user basis is accomplished by applying the policy configured in the RADIUS Filter-ID, or the base VLAN-ID configured in the RFC 3580 tunnel attributes, for a given users MAC address. The RADIUS Filter-ID and tunnel attributes are part of the RADIUS user account and are included in the RADIUS Access-Accept message response from the authentication server. The number of allowed users per port can be configured using the set multiauth port numusers command. See the set multiauth port command in the Enterasys S-Series CLI Reference for the number of supported users per module. The show multiauth port command displays both the allowed number of users configured and the maximum number of users supported per port for the device. The allowed number of users defaults to the maximum number of supported users for the port. In Figure 42-1 each user on port ge.1.5 sends an authentication request to the RADIUS server. Based upon the Source MAC address (SMAC), RADIUS looks up the account for that user and includes the Filter-ID associated with that account in the authentication response back to the switch (see section The RADIUS Filter-ID on page 42-8 for Filter-ID information). The policy specified in the Filter-ID is then applied to the user. See section RFC 3580 on page 42-8 for information on dynamic VLAN assignment and tunnel attribute configuration.
42-4
Authentication Configuration
Authentication Overview
Figure 42-1
Switch
Radius Server
Authentication Credentials User 1 Authentication Credentials User 2
User 1
SMAC 00-00-00-11-11-11
Authentication Credentials User 3 Dynamic Admin Rule for Policy 1 SMAC = 00-00-00-11-11-11 ge.1.5 Dynamic Admin Rule for Policy 2 SMAC = 00-00-00-22-22-22 ge.1.5 Dynamic Admin Rule for Policy 3 SMAC = 00-00-00-33-33-33 ge.1.5 User1 Filter ID --> Policy X
User 2
SMAC 00-00-00-22-22-22
Port ge.1.5
Authentication Request Authentication Response
User 3
SMAC 00-00-00-33-33-33
MultiAuth Authentication
Authentication mode support provides for the global setting of a single authentication mode 802.1X (strict-mode) or multiple modes (MultiAuth) per user or port when authenticating. Strict mode is the appropriate mode when authenticating a single 802.1X user. All traffic on the port receives the same policy in strict mode. When authenticating PWA, CEP, or MAC, you must use MultiAuth authentication, whether authenticating a single or multiple supplicants. MultiAuth authentication supports the simultaneous configuration of up to three authentication methods per user on the same port, but only one method per user is actually applied. When MultiAuth authentication ports have a combination of authentication methods enabled, and a user is successfully authenticated for more than one method at the same time, the configured authentication method precedence will determine which RADIUS-returned filter ID will be processed and result in an applied traffic policy profile. See Setting MultiAuth Authentication Precedence on page 42-20 for authentication method precedence details. The number of users or devices MultiAuth authentication supports depends upon the type of device, whether the ports are fixed access or uplink, and whether increased port capacity or extra chassis user capacity MUA licenses have been applied. See the firmware customer release note that comes with your device for details on the number of users or devices supported per port. In Figure 42-2, multiple users are authenticated on a single port each with a different authentication method. In this case, each user on a single port successfully authenticates with a different authentication type. The authentication method is included in the authentication credentials sent to the RADIUS server. RADIUS looks up the user account for that user based upon the SMAC. The filter ID for that user is returned to the switch in the authentication response, and the authentication is validated for that user.
Authentication Overview
Figure 42-2
Switch
Radius Server
User 1
SMAC 00-00-00-11-11-11
802.1X
MAU Logic
User 2
SMAC 00-00-00-22-22-22
Port
Authentication Method MAC
User 3
SMAC 00-00-00-33-33-33
In Figure 42-3, full MultiAuth authentication takes place in that multiple users on a single port are validated for more than one authentication method. The applied authentication and policy are based upon the authentication method precedence level. On the far right column of the figure, the authentication methods are listed from top to bottom in order of precedence (the default order is displayed). User 1 is authenticating with both the 802.1x and PWA methods, with the Credit policy. Both the 802.1x and PWA authentication methods are validated, but only the 802.1x MultiAuth session is applied, because that has the highest precedence. User 2 is authenticating with both PWA and MAC methods, with the Sales policy. PWA, having a higher precedence than MAC, is the MultiAuth session applied for User 2. User 3 is a guest and is authenticating with the MAC method only. The MAC MultiAuth session, with the Guest policy is applied for User 3.
42-6
Authentication Configuration
Authentication Overview
Figure 42-3
SMAC=User 1
SMAC=User 2
SMAC=User 3
Switch
MultiAuth Sessions
<User 1, 802.1x, Authenticated, PID=Credit, Applied>
Auth. Agent
802.1X
Credit Policy Role
<User 2, PWA, Authenticated, PID=Sales, Applied> <User 1, PWA, Authenticated, PID=Credit, Not Applied>
MAU Logic
<User 3, MAC, Authenticated, PID=Guest, Applied> <User 1, MAC, Authenticated, PID=Guest, Not Applied> <User 2, MAC, Authenticated, PID=Guest, Not Applied>
Port X
Guest Policy Role
The Remote Authentication Dial-In User Service (RADIUS) is an extensible protocol used to carry authentication and authorization information between the switch and the Authentication Server (AS). RADIUS is used by the switch for communicating supplicant supplied credentials to the authentication server and the authentication response from the authentication server back to the switch. This information exchange occurs over the link-layer protocol. The switch acts as a client to RADIUS using UDP port 1812 by default (configurable in the set radius command). The authentication server contains a database of valid supplicant user accounts with their corresponding credentials. The authentication server checks that the information received from the switch is correct, using authentication schemes such as PAP, CHAP, or EAP. The authentication server returns an Accept or Reject message to the switch based on the credential validation performed by RADIUS. The implementation provides enhanced network security by using a shared secret and MD5 password encryption. Required authentication credentials depend upon the authentication method being used. For 802.1x and PWA authentication, the switch sends username and password credentials to the authentication server. For MAC authentication, the switch sends the device MAC address and a
Enterasys S-Series Configuration Guide 42-7
Authentication Overview
password configured on the switch to the authentication server. The authentication server verifies the credentials and returns an Accept or Reject message back to the switch.
policyname is the name of the policy to apply to this authentication. access-mgmtTypes supported are: ro (read-only), rw (read-write), and su (super-user). The un-decorated Filter-ID supports the policy attribute only in the following format:
policyname
The undecorated format is simply a string that specifies a policy profile name. The undecorated format cannot be used for management access authentication. Decorated Filter-IDs are processed first. If no decorated Filter-IDs are found, then undecorated Filter-IDs are processed. If multiple Filter-IDs are found that contain conflicting values, a Syslog message is generated.
RFC 3580
Enterasys switches support the RFC 3580 RADIUS tunnel attribute for dynamic VLAN assignment. The VLAN-Tunnel-Attribute implements the provisioning of service in response to a successful authentication. On ports that do not support policy, the packet will be tagged with the VLAN-ID. The VLAN-Tunnel-Attribute defines the base VLAN-ID to be applied to the user.
42-8
Authentication Configuration
Authentication Overview
The Tunnel-Type attribute indicates the tunneling protocol to be used when this attribute is formatted in RADIUS Access-Request messages, or the tunnel protocol in use when this attribute is formatted in RADIUS Access-Accept messages. Set Tunnel-Type attribute parameters as follows: Type: Set to 64 for Tunnel-Type RADIUS attribute Length: Set to 6 for six-byte length of this RADIUS attribute Tag: Provides a means of grouping attributes in the same packet which refer to the same tunnel. Valid values for this field are from 0x01 through 0x1F, inclusive. Set to 0 if unused. Unless alternative tunnel types are provided, it is only necessary for tunnel attributes to specify a single tunnel. As a result, where it is only desired to specify the VLAN-ID, the tag field should be set to zero (0x00) in all tunnel attributes. Value: Indicates the type of tunnel A value of 0x0D (decimal 13) indicates that the tunneling protocol is a VLAN.
Tunnel-Medium-Type indicates the transport medium to use when creating a tunnel for the tunneling protocol, determined from Tunnel-Type attribute. Set Tunnel-Medium-Type attribute parameters as follows: Type: Set to 65 for Tunnel-Medium-Type RADIUS attribute Length: Set to 6 for six-byte length of this RADIUS attribute Tag: Provides a means of grouping attributes in the same packet which refer to the same tunnel. Valid value for this field are 0x01 through 0x1F, inclusive. Set to 0 if unused. Unless alternative tunnel types are provided, it is only necessary for tunnel attributes to specify a
Enterasys S-Series Configuration Guide 42-9
Authentication Overview
single tunnel. As a result, where it is only desired to specify the VLANID, the tag field should be set to zero (0x00) in all tunnel attributes. Value: Indicates the type of tunnel. A value of 0x06 indicates that the tunneling medium pertains to 802 media (including Ethernet)
Tunnel-Private-Group-ID attribute indicates the group ID for a particular tunneled session. Set the Tunnel-Private-Group-ID attribute parameters as follows: Type: Set to 81 for Tunnel-Private-Group-ID RADIUS attribute Length: Set to a value greater than or equal to 3. Tag: Provides a means of grouping attributes in the same packet which refer to the same tunnel. Valid values for this field are from 0x01 through 0x1F, inclusive. Set to 0 if unused. Unless alternative tunnel types are provided, it is only necessary for tunnel attributes to specify a single tunnel. As a result, where it is only desired to specify the VLANID, the tag field should be set to zero (0x00) in all tunnel attributes. String: Indicates the group. For the VLAN ID integer value, it is encoded as a string using ASCII. For example, the VLAN ID integer value 103 would be represented as 0x313033
42-10
Authentication Configuration
Authentication Overview
Configuring Authentication
If the VLAN-to-policy mapping table is invalid, then the etsysPolicyRFC3580MapInvalidMapping MIB is incremented and the VLAN specified by the tunnel attributes will be applied to the authenticating user.
If VLAN authorization is not enabled, the user will be allowed onto the port with the default policy, if it exists. If no default policy exists, the port VLAN will be applied.
Configuring Authentication
This section provides details for the configuration of authentication methods, MultiAuth and RADIUS.
For information about... Configuring IEEE 802.1x Configuring MAC-based Authentication Configuring Port Web Authentication (PWA) Configuring Convergence End Point (CEP) Configuring MultiAuth Authentication Configuring RADIUS Refer to page... 42-14 42-15 42-16 42-17 42-19 42-24
Table 42-1 lists Authentication parameters and their default values. Table 42-1
Parameter cep port
42-12
Authentication Configuration
Configuring Authentication
Table 42-1
Parameter dot1x
strict - authentication limited to 802.1x for a single user on a port. auth-opt - Authentication is optional based upon global and port configuration. Precedence from high to low: 802.1x, PWA, MAC, CEP. 0 - no timeout in effect. Disabled. Disabled.
MultiAuth precedence
2.
5 seconds.
1800 seconds.
Configuring Authentication
Table 42-1
Parameter radius retries
radius timeout
20 seconds.
Both: management-access and network-access. Globally: Disabled. Per Port: Enabled. Untagged.
Procedure 42-1 describes how to configure IEEE 802.1x on an authenticator switch port. Unspecified parameters use their default values.
42-14
Authentication Configuration
Configuring Authentication
3. 4.
set dot1x {enable | disable} [port-string] [index index-list] set dot1x init [index index-list]
5.
6.
Configuring Authentication
Enabling MAC authentication on a port Enabling MAC authentication globally Setting the authentication mode to multi Optionally reinitializing or reauthenticating existing sessions
Procedure 42-2 describes how to configure MAC-based authentication. Unspecified parameters use their default values. Procedure 42-2 MAC-Based Authentication Configuration
Step 1. Task Optionally set or clear a global password on the switch. Command(s) set macauthentication password password clear macauthentication password password set macauthentication authallocated number port-string set macauthentication port {enable | disable}
2. 3.
Set or clear the number of MAC authentication sessions supported on a port. Enable or disable MAC authentication on a port. By default, MAC authentication is disabled for all ports. MAC authentication must be enabled on the ports that will use it. Enable or disable MAC authentication globally on the device. By default, MAC authentication is globally disabled on the device. Set the MultiAuth mode. Display MAC authentication configuration or status of active sessions. If a session or port requires reinitialization, reinitialize a specific MAC session or port.
4.
5. 6.
set multiauth mode multi show macauthentication show macauthentication session set macauthentication macinitialize mac-address set macauthentication portinitialize port-string
7.
8.
Procedure 42-3 describes how to configure PWA authentication. Unspecified parameters use their default values.
42-16
Authentication Configuration
Configuring Authentication
3.
4.
Configuring Authentication
Procedure 42-5 describes the steps to configure CEP. Procedure 42-5 CEP Configuration
Step 1. 2. 3. Task Determine the policy profile index of the profile you wish to associate with a CEP type. Associate a policy profile with a CEP type. Enable or disable the CEP device port for the CEP type If you are using the Cisco discovery protocol, enable the Cisco discovery protocol. You can also optionally set the voice VLAN ID, whether tagged traffic is trusted or untrusted, and 802.1X priority transmitted to the Cisco IP phone to format in the 802.1Q VLAN tag of its VoIP traffic. If the Cisco discovery protocol is enabled on any port, enable the Cisco discovery protocol globally. Globally enable or disable CEP on the switch. Command(s) show policy profile all set cep policy {cisco | h323 | siemens | sip} policy-index set cep port port-string cep-type enable set cep port port-string cep-type disable set ciscodp port { [status {disable | enable}] [ vvid {vlan-id | none | dot1p | untagged}] [trust-ext {trusted | untrusted}] [cos-ext value] } port-string
4.
5.
6.
7. 8.
Set the MultiAuth mode. Display CEP connections, detection, policy and port settings.
set multiauth mode multi show cep {connections | detection | policy | port}
42-18
Authentication Configuration
Configuring Authentication
3.
Configuring Authentication
Set a new order of precedence for the selection set multiauth precedence {[dot1x] [mac] [pwa] [cep] [radius-snooping]} of the RADIUS filter ID that will be returned when multiple authentication methods are authenticated at the same time for a single user. Reset the order MultiAuth authentication precedence to the default values. clear multiauth precedence
2.
Procedure 42-9 describes setting the MultiAuth authentication port and maximum user properties.
42-20 Authentication Configuration
Configuring Authentication
Procedure 42-9 MultiAuth Authentication Port and Maximum User Properties Configuration
Step 1. 2. 3. 4. 5. Task Set the specified ports to the MultiAuth authentication optional port mode. Set the specified ports to the MultiAuth authentication required port mode. Set the specified ports to the MultiAuth authentication force authenticated port mode. Set the specified ports to the MultiAuth authentication force unauthenticated port mode. Optionally set the maximum number of authenticated users for the specified port. Notes: This value can be set to any value up to the maximum number of MultiAuth users supported for the device. See the firmware release notes that come with your device for the maximum number of supported MultiAuth users the device supports. 6. 7. Reset the ports MultiAuth authentication port clear multiauth port mode port-string mode to the default value for the specified ports. Reset the ports MultiAuth authentication port maximum number of users to the default value for the specified ports. clear multiauth port numusers port-string Command(s) set multiauth port mode auth-opt port-string set multiauth port mode auth-reqd port-string set multiauth port mode force-auth port-string set multiauth port mode force-unauth port-string set multiauth port mode numusers numusers port-string
2.
3.
4.
Configuring Authentication
4.
Display MultiAuth authentication port settings for all or the specified ports. Display end-user MAC addresses per port for all MAC addresses and ports or for those specified. Display MultiAuth authentication sessions for all sessions or the specified authentication method, MAC address, or ports. Display MultiAuth authentication idle timeout values. Display MultiAuth authentication session timeout values. Display MultiAuth authentication trap settings.
42-22
Authentication Configuration
Configuring Authentication
The VLAN authorization table will always list any tunnel attributes VIDs that have been received for authenticated end systems, but a VID will not actually be assigned unless VLAN authorization is enabled both globally and on the authenticating port. Dynamic VLAN authorization overrides the port PVID. Dynamic VLAN authorization is not reflected in the show port vlan display. The VLAN egress list may be statically configured, enabled based upon the set vlanauthorization egress command, or have dynamic egress enabled to allow full VLAN membership and connectivity. Procedure 42-12 describes setting VLAN authorization configuration. Procedure 42-12 VLAN Authorization Configuration
Step 1. 2. 3. Task Enable or disable VLAN authorization both globally and per port. Reset VLAN authorization configuration to default values for the specified port-list or for all. Display VLAN authorization configuration settings for the specified port-list or for all. Command(s) set vlanauthorization {enable | disable} clear valanauthorization {port-list | all} show vlanauthorization {port-list | all}
Configuring Authentication
Procedure 42-13 Policy Profile Assignment and Invalid Action Configuration (continued)
Step 2. 3. 4. Task Map the VLAN ID to the profile index. Display the current maptable configuration. Set the action to take when an invalid policy or VLAN is received by the authenticating switch. Command(s) set policy maptable {vlan-list profile-index | response {tunnel | policy | both}} show policy maptable. set policy invalid action {default-policy | drop | forward}
Configuring RADIUS
You can set, clear, and display RADIUS configuration for both authentication and accounting.
The S-Series firmware supports the configuration of multiple ASs. The lowest index value associated with the server determines the primary server. If the primary server is down, the operational server with the next lowest index value is used. If the switch fails to establish contact with the authentication server before a configured timeout, the switch will retry for the configured number of times. Servers can be restricted to management access or network access authentication by configuring the realm option. Procedure 42-14 describes authentication server configuration. Procedure 42-14 Authentication Server Configuration
Step 1. 2. Task Configure the index value, IP address, and secret value for this authentication server. Optionally set the number of seconds the switch will wait before retrying authentication server establishment. Optionally set the number of retries that will occur before the switch declares an authentication server down. Command(s) set radius server index ip-address [secret-value] set radius timeout timeout
3.
42-24
Authentication Configuration
Configuring Authentication
5. 6. 7.
set radius {enable | disable} clear radius {[state] [retries] [timeout] [server [index | all] [realm {index | all}] show radius [state | retries | authtype | timeout | server [index | all]]
Firmware supports the configuration of multiple RADIUS accounting servers. The lowest index value associated with the server determines the primary server. If the primary server is down, the operational server with the next lowest index value is used. If the switch fails to establish contact with the primary server before a configured timeout, the switch will retry for the configured number of times. Procedure 42-15 describes RADIUS accounting configuration. Procedure 42-15 RADIUS Accounting Configuration
Step 1. 2. 3. 4. 5. 6. Task Set the minimum interval at which RADIUS accounting sends interim updates. Set the number of seconds between each RADIUS accounting interim update. Set the number of times a switch will attempt to contact a RADIUS accounting server. Set the amount of time to establish contact with a RADIUS accounting server before timing out. Configure the RADIUS accounting server. Enable or disable RADIUS accounting on this switch. Command(s) set radius accounting intervalminimum interval set radius accounting updateinterval interval set radius accounting retries retries set radius accounting timeout timeout {index | all} set radius accounting server {index | all} ip_address udp-port [server-secret] set radius accounting {enable | disable}
Configuring Authentication
8.
42-26
Authentication Configuration
LAN Cloud 1
Modular Switch Router
Configure policies Enable RADIUS Enable multi-user authentication
Our configuration example consists of the following steps as shown in Figure 42-4 and described in the sections that follow: 1. 2. Configuring policies, RADIUS, and MultiAuth authentication on the switch. Creating RADIUS user accounts on the authentication server.
3. 4. 5. 6.
Configuring for the engineering group 802.1x end-user stations. Configuring for the engineering group Siemens CEP devices. Configuring for the printer cluster MAC authentication. Configuring for the public area internet access for PWA.
S Chassis(rw)->set multiauth mode multi S Chassis(rw)->set multiauth port mode force-auth ge.1.5-7 S Chassis(rw)->set multiauth port numusers 6 ge.1.5-7 S Chassis(rw)->set multiauth port mode force-auth ge.1.19-24 S Chassis(rw)->set multiauth port numusers 6 ge.1.19-24
Enables MultiAuth authentication system and module traps for the S-Series configuration.
S Chassis(rw)->set multiauth trap system enabled S Chassis(rw)->set multiauth trap module enabled
This completes the MultiAuth authentication configuration piece for this example. Keep in mind that you would want to use the set multiauth precedence command, to specify which authentication method should take precedence, should you have a single user configured for multiple authentications on the same port.
42-28
Authentication Configuration
Configuring EAP on the end-user station and setting up the RADIUS account for each station is dependent upon your operating system and the RADIUS application being used, respectively. The important thing the network administrator should keep in mind is that these two configurations should be in place before moving on to the 802.1x configuration on the switch. In an 802.1x configuration, policy is specified in the RADIUS account configuration on the authentication server using the RADIUS Filter-ID. See The RADIUS Filter-ID on page 42-8 for RADIUS Filter-ID information. If a RADIUS Filter-ID exists for the user account, the RADIUS protocol returns it in the RADIUS Accept message and the firmware applies the policy to the user.
Note: Globally enabling 802.1x on a switch sets the port-control type to auto for all ports. Be sure to set port-control to forced-auth on all ports that will not be authenticating using 802.1x and no other authentication method is configured. Otherwise these ports will fail authentication and traffic will be blocked.
The following CLI input: Enables 802.1x on the switch Sets port-control to forced-auth for all connections between switches and routers, because they do not use authentication and would be blocked if not set to forced-auth.
S Chassis(rw)->set dot1x enable S Chassis(rw)->set dot1x auth-config authcontrolled-portcontrol forced-auth ge.1.5 S Chassis(rw)->set dot1x auth-config authcontrolled-portcontrol forced-auth ge.1.19 S Chassis(rw)->set dot1x auth-config authcontrolled-portcontrol forced-auth ge.2.24
S Chassis(rw)->set cep enable S Chassis(rw)->set cep policy siemens 9 S Chassis(rw)->set cep port ge.1.16-18 siemens enable
With the authentication server configured with a RADIUS account for each printer, and the printer policy preconfigured, enter the following CLI input:
S Chassis(rw)->set macauthentication enable S Chassis(rw)->set macauthentication password enterasys S Chassis(rw)->set macauthentication significant-bits 24 S Chassis(rw)->set macauthentication port enable ge.1.3-4
42-30
Authentication Configuration
Once the policy and RADIUS account are configured, enter the following CLI input on the switch:
S Chassis(rw)->set pwa enable S Chassis(rw)->set pwa ipaddress 10.10.10.101 S Chassis(rw)->set banner \Enterasys Networks Public Internet Access Station\ S Chassis(rw)->set pwa enhancemode enable S Chassis(rw)->set pwa gueststatus authradius S Chassis(rw)->set pwa guestname guest S Chassis(rw)->set pwa guestpassword password S Chassis(rw)->set pwa portcontrol enable ge.1.6
MAC-based Authentication MultiAuth Authentication Multi-user Authentication Port Web Authentication (PWA) RADIUS Filter ID
Table 42-4
Term
RADIUS Protocol
Supplicant
42-32
Authentication Configuration