00 CG 960
00 CG 960
00 CG 960
Application Guide
for Networking OS 7.8
IBM Flex System EN2092 1Gb Ethernet Scalable Switch
Application Guide
for Networking OS 7.8
Note: Before using this information and the product it supports, read the general information in the Safety information
and Environmental Notices and User Guide documents on the IBM Documentation CD and the Warranty Information
document that comes with the product.
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
For documentation about installing the switch physically, see the Installation Guide
for your EN2092.
This material is intended to help those new to IBM Networking OS products with the
basics of switch management. This part includes the following chapters:
• Chapter 1, “Switch Administration,” describes how to access the EN2092 in
order to configure the switch and view switch information and statistics. This
chapter discusses a variety of manual administration interfaces, including local
management via the switch console, and remote administration via Telnet, a web
browser, or via SNMP.
• Chapter 2, “Initial Setup,” describes how to use the built-in Setup utility to
perform first-time configuration of the switch.
• Chapter 3, “Service Location Protocol,” describes the Service Location Protocol
(SLP) that allows the switch to provide dynamic directory services.
• Chapter 4, “System License Keys,” describes how to manage Features on
Demand (FoD) licenses and how to allocate bandwidth between physical ports
within the installed licenses’ limitations.
Part 5: IP Routing
• Chapter 17, “Basic IP Routing,” describes how to configure the EN2092 for IP
routing using IP subnets, BOOTP, and DHCP Relay.
• Chapter 18, “Internet Protocol Version 6,” describes how to configure the
EN2092 for IPv6 host management.
• Chapter 19, “Using IPsec with IPv6,” describes how to configure Internet
Protocol Security (IPsec) for securing IP communications by authenticating and
encrypting IP packets, with emphasis on Internet Key Exchange version 2, and
authentication/confidentiality for OSPFv3.
• Chapter 20, “Routing Information Protocol,” describes how the IBM Networking
OS software implements standard Routing Information Protocol (RIP) for
exchanging TCP/IP route information with other routers.
• Chapter 21, “Internet Group Management Protocol,” describes how the IBM
Networking OS software implements IGMP Snooping or IGMP Relay to conserve
bandwidth in a multicast-switching environment.
• Chapter 22, “Multicast Listener Discovery,” describes how Multicast Listener
Discovery (MLD) is used with IPv6 to support host users requests for multicast
data for a multicast group.
• Chapter 23, “Border Gateway Protocol,” describes Border Gateway Protocol
(BGP) concepts and features supported in IBM Networking OS.
Part 8: Monitoring
• Chapter 31, “Remote Monitoring,” describes how to configure the RMON agent
on the switch, so that the switch can exchange network monitoring data.
• Chapter 32, “sFLOW, described how to use the embedded sFlow agent for
sampling network traffic and providing continuous monitoring information to a
central sFlow analyzer.
• Chapter 33, “Port Mirroring,” discusses tools how copy selected port traffic to a
monitor port for network analysis.
Part 9: Appendices
• Appendix A, “Glossary,” describes common terms and concepts used throughout
this guide.
• Appendix B, “Getting help and technical assistance,” describes how to get help.
• Appendix C, “Notices,” provides trademark and other compliance information.
Additional References
Additional information about installing and configuring the EN2092 is available in the
following guides:
• IBM Flex System EN2092 1Gb Ethernet Scalable Switch Installation Guide
• IBM Networking OS Menu-Based CLI Command Reference
• IBM Networking OS ISCLI Command Reference
• IBM Networking OS Browser-Based Interface Quick Guide
ABC123 This type is used for names of View the readme.txt file.
commands, files, and directories
used within the text.
AaBbCc123 This block type depicts menus, Click the Save button.
buttons, and other controls that
appear in Web browsers and other
graphical interfaces.
You also can visit our web site at the following address:
http://www.ibm.com/support
Click the Support tab.
The warranty card received with your product provides details for contacting a
customer support representative. If you are unable to locate this information, please
contact your reseller. Before you call, prepare the following information:
• Serial number of the switch unit
• Software release version number
• Brief description of the problem and the steps you have already taken
• Technical support dump information (# show tech-support)
This chapter discusses the various methods that can be used to administer the
switch.
Administration Interfaces
The switch software provides a variety of user-interfaces for administration. These
interfaces vary in character and in the methods used to access them: some are
text-based, and some are graphical; some are available by default, and some
require configuration; some can be accessed by local connection to the switch, and
others are accessed remotely using various client applications. For example,
administration can be performed using any of the following:
• The Flex System chassis management module tools for general chassis
management
• A built-in, text-based command-line interface and menu system for access via
serial-port connection or an optional Telnet or SSH session
• The built-in Browser-Based Interface (BBI) available using a standard
web-browser
• SNMP support for access through network management software such as IBM
Director.
In all cases, administration requires that the switch hardware is properly installed
and turned on. (see the IBM Flex System EN2092 1Gb Ethernet Scalable Switch
Installation Guide).
For more information, see “Using the Chassis Management Module” on page 29.
Browser-Based Interface
The Browser-based Interface (BBI) provides access to the common configuration,
management and operation features of the EN2092 through your Web browser.
For more information, refer to the IBM Networking OS BBI Quick Guide.
Remote access using the network requires the accessing terminal to have a valid,
routable connection to the switch interface. The client IP address may be configured
manually, or an IPv4 address can be provided automatically through the switch
using a service such as DHCP or BOOTP relay (see “BOOTP/DHCP Client IP
Address Services” on page 32), or an IPv6 address can be obtained using IPv6
stateless address configuration.
Note: Throughout this manual, IP address is used in places where either an IPv4
or IPv6 address is allowed. IPv4 addresses are entered in dotted-decimal
notation (for example, 10.10.10.1), while IPv6 addresses are entered in
hexadecimal notation (for example, 2001:db8:85a3::8a2e:370:7334). In
places where only one type of address is allowed, IPv4 address or IPv6
address is specified.
The EN2092 uses port 66 (MGT1) to communicate with the chassis management
module(s). Even when the EN2092 is in a factory default configuration, you can use
the 1Gb Ethernet port on each CMM to configure and manage the EN2092.
For more information about using the chassis management module, see the IBM
Flex System EN2092 1Gb Ethernet Scalable Switch Installation Guide.
Note: EN2092s installed in Bay 1 and Bay 2 connect to server NICs 1 and 2,
respectively.
By default, Telnet access is disabled. Use the following commands (available on the
console only) to enable or disable Telnet access:
Once the switch is configured with an IP address and gateway, you can use Telnet
to access switch administration from any workstation connected to the management
network.
To establish a Telnet connection with the switch, run the Telnet program on your
workstation and issue the following Telnet command:
You will then be prompted to enter a password as explained “Switch Login Levels”
on page 33.
Two attempts are allowed to log in to the switch. After the second unsuccessful
attempt, the Telnet client is disconnected via TCP session closure.
The switch can do only one session of key/cipher generation at a time. Thus, a
SSH/SCP client will not be able to login if the switch is doing key generation at that
time. Similarly, the system will fail to do the key generation if a SSH/SCP client is
logging in at that time.
The supported SSH encryption and authentication methods are listed below.
• Server Host Authentication: Client RSA-authenticates the switch when starting
each connection
• Key Exchange: ecdh-sha2-nistp521, ecdh-sha2-nistp384, ecdh-sha2-nistp256,
ecdh-sha2-nistp224, ecdh-sha2-nistp192, rsa2048-sha256, rsa1024-sha1,
diffie-hellman-group-exchange-sha256, diffie-hellman-group-exchange-sha1,
diffie-hellman-group14-sha1, diffie-hellman-group1-sha1
• Encryption: aes128-ctr, aes128-cbc, rijndael128-cbc, blowfish-cbc,3des-cbc,
arcfour256, arcfour128, arcfour
• MAC: hmac-sha1, hmac-sha1-96, hmac-md5, hmac-md5-96
By default, the SSH feature is enabled. For information about enabling and using
SSH for switch access, see “Secure Shell and Secure Copy” on page 60.
Once the IP parameters are configured and the SSH service is enabled, you can
access the command line interface using an SSH connection.
To establish an SSH connection with the switch, run the SSH program on your
workstation by issuing the SSH command, followed by the switch IPv4 or IPv6
address:
You will then be prompted to enter a password as explained “Switch Login Levels”
on page 33.
You can access the BBI directly from an open Web browser window. Enter the URL
using the IP address of the switch interface (for example, http://<IPv4 or IPv6
address>).
When you first access the switch, you must enter the default username and
password: USERID; PASSW0RD (with a zero). You are required to change the
password after first login.
-or-
EN 2092(config)# no access http enable (Disable HTTP access)
The default HTTP web server port to access the BBI is port 80. However, you can
change the default Web server port with the following command:
To access the BBI from a workstation, open a Web browser window and type in the
URL using the IP address of the switch interface (for example, http://<IPv4 or
IPv6 address>).
-or-
EN 2092(config)# access https enable (Enable HTTPS access)
When a client (such as a web browser) connects to the switch, the client is asked to
accept the certificate and verify that the fields match what is expected. Once BBI
access is granted to the client, the BBI can be used as described in the IBM
Networking OS BBI Quick Guide.
Context buttons—These buttons allow you to select the type of action you wish to
perform. The Configuration button provides access to the configuration elements for
the entire switch. The Statistics button provides access to the switch statistics and
state information. The Dashboard button allows you to display the settings and
operating status of a variety of switch features.
For information on using the BBI, refer to the IBM Networking OS BBI Quick Guide.
To access the SNMP agent on the EN2092, the read and write community strings on
the SNMP manager should be configured to match those on the switch.
The read and write community strings on the switch can be changed using the
following commands:
The SNMP manager should be able to reach any one of the IP interfaces on the
switch.
For the SNMP manager to receive the SNMPv1 traps sent out by the SNMP agent
on the switch, configure the trap host on the switch with the following commands:
Note: You can use a loopback interface to set the source IP address for SNMP
traps. Use the following command to apply a configured loopback interface:
For more information on SNMP usage and configuration, see “Simple Network
Management Protocol” on page 345.
The EN2092 can function as a relay agent for Bootstrap Protocol (BOOTP) or
DHCP. This allows clients to be assigned an IPv4 address for a finite lease period,
reassigning freed addresses later to other clients.
Acting as a relay agent, the switch can forward a client’s IPv4 address request to up
to four BOOTP/DHCP servers. In addition to the four global BOOTP/DHCP servers,
up to four domain-specific BOOTP/DHCP servers can be configured for each of up
to 10 VLANs.
BOOTP and DHCP relay are collectively configured using the BOOTP commands
and menus on the EN2092.
All file transfer commands include SFTP support along with FTP and TFTP support.
SFTP is available through the menu-based CLI, ISCLI, BBI, and SNMP.
The EN2092 1Gb Ethernet Scalable Switch can operate in two boot modes:
• Compatibility mode (default): This is the default switch boot mode. This mode
may use algorithms and key lengths that may not be allowed/acceptable by NIST
SP 800-131A specification. This mode is useful in maintaining compatibility with
previous releases and in environments that have lesser data security
requirements.
• Strict mode: Encryption algorithms, protocols, and key lengths in strict mode are
compliant with NIST SP 800-131A specification.
When in boot strict mode, the switch uses Secure Sockets Layer (SSL)/Transport
Layer Security (TLS) 1.2 protocols to ensure confidentiality of the data to and from
the switch.
By default, HTTP, Telnet, and SNMPv1 and SNMPv2 are disabled on the EN2092.
The following cipher suites are acceptable (listed in the order of preference) when
the EN2092 1Gb Ethernet Scalable Switch is in strict mode:
Table 6. List of Acceptable Cipher Suites in Strict Mode
Cipher ID Key Authentication Encryption MAC Cipher Name
Exchange
0xC027 ECDHE RSA AES_128_CBC SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
0xC013 ECDHE RSA AES_128_CBC SHA1 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
0xC012 ECDHE RSA 3DES SHA1 SSL_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
0x0033 DHE RSA AES-128_CBC SHA1 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
0x0067 DHE RSA AES_128_CBC SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
0x0016 DHE RSA 3DES SHA1 SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
0x002F RSA RSA AES_128_CBC SHA1 TLS_RSA_WITH_AES_128_CBC_SHA
0x003C RSA RSA AES_128_CBC SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256
0x000A RSA RSA 3DES SHA1 SSL_RSA_WITH_3DES_EDE_CBC_SHA
When strict mode is enabled, you will see the following message:
Warning, security strict mode limits the cryptographic algorithms used by secure
protocols on this switch. Please see the documentation for full details, and
verify that peer devices support acceptable algorithms before enabling this
mode. The mode change will take effect after reloading the switch and the
configuration will be wiped during the reload. System will enter security strict
mode with default factory configuration at next boot up.
Do you want SNMPV3 support old default users in strict mode (y/n)?
Warning, disabling security strict mode. The mode change will take effect after
reloading the switch.
You must reboot the switch for the boot strict mode enable/disable to take effect.
Limitations
In IBM Networking OS 7.8, consider the following limitation/restrictions if you need
to operate the switch in boot strict mode:
• Power ITEs and High-Availability features do not comply with NIST SP 800-131A
specification.
• The EN2092 will not discover Platform agents/Common agents that are not in
strict mode.
• Web browsers that do not use TLS 1.2 cannot be used.
• Limited functions of the switch managing Windows will be available.
Setup can be activated manually from the command line interface any time after
login: EN 2092(config)# setup
2. Enter USERID as the default administrator and PASSW0RD (with a zero) as the
default password.
3. Enter the following command at the prompt:
EN 2092(config)# setup
Restarting Setup
You can restart the Setup utility manually at any time by entering the following
command at the administrator prompt:
EN 2092(config)# setup
System Date:
Enter year [2012]:
Enter the four-digits that represent the year. To keep the current year, press
<Enter>.
3. Enter the month of the current system date at the prompt:
System Date:
Enter month [1]:
Enter the month as a number from 1 to 12. To keep the current month, press
<Enter>.
4. Enter the day of the current date at the prompt:
Enter the date as a number from 1 to 31. To keep the current day, press <Enter>.
The system displays the date and time settings:
System Time:
Enter hour in 24-hour format [18]:
Enter the hour as a number from 00 to 23. To keep the current hour, press
<Enter>.
6. Enter the minute of the current time at the prompt:
Enter the minute as a number from 00 to 59. To keep the current minute, press
<Enter>.
7. Enter the seconds of the current time at the prompt:
Enter the seconds as a number from 00 to 59. To keep the current second, press
<Enter>. The system then displays the date and time settings:
BootP Option:
Current BOOTP: disabled
Enter new BOOTP [d/e]:
Spanning Tree:
Current Spanning Tree Group 1 setting: ON
Turn Spanning Tree Group 1 OFF? [y/n]
Enter y to turn off Spanning Tree, or enter n to leave Spanning Tree on.
Port Config:
Will you configure VLANs and VLAN tagging for ports? [y/n]
If you wish to change settings for VLANs, enter y, or enter n to skip VLAN
configuration.
Note: The sample screens that appear in this document might differ slightly from
the screens displayed by your system. Screen content varies based on the
firmware versions and options that are installed.
2. Select the port to configure, or skip port configuration at the prompt:
If you wish to change settings for individual ports, enter the number of the port
you wish to configure. To skip port configuration, press <Enter> without
specifying any port and go to “Setup Part 3: VLANs” on page 45.
3. Configure Gigabit Ethernet port flow parameters.
he system prompts:
Enter rx to enable receive flow control, tx for transmit flow control, both to
enable both, or none to turn flow control off for the port. To keep the current
setting, press <Enter>.
Port VLAN tagging config (tagged port can be a member of multiple VLANs)
Current VLAN tag support: disabled
Enter new VLAN tag support [d/e]:
Enter d to disable VLAN tagging for the port or enter e to enable VLAN tagging
for the port. To keep the current setting, press <Enter>.
6. The system prompts you to configure the next port:
When you are through configuring ports, press <Enter> without specifying any
port. Otherwise, repeat the steps in this section.
VLAN Config:
Enter VLAN number from 2 to 4094, NULL at end:
If you wish to change settings for individual VLANs, enter the number of the
VLAN you wish to configure. To skip VLAN configuration, press <Enter> without
typing a VLAN number and go to “Setup Part 4: IP Configuration” on page 46.
2. Enter the new VLAN name at the prompt:
Entering a new VLAN name is optional. To use the pending new VLAN name,
press <Enter>.
Enter each port, by port number, and confirm placement of the port into this
VLAN. When you are finished adding ports to this VLAN, press <Enter> without
specifying any port.
4. Configure Spanning Tree Group membership for the VLAN:
VLAN Config:
Enter VLAN number from 2 to 4094, NULL at end:
Repeat the steps in this section until all VLANs have been configured. When all
VLANs have been configured, press <Enter> without specifying any VLAN.
Although the switch supports both IPv4 and IPv6 networks, the Setup utility permits
only IPv4 configuration. For IPv6 configuration, see “Internet Protocol Version 6” on
page 211.
IP Interfaces
IP interfaces are used for defining the networks to which the switch belongs.
IP Config:
IP interfaces:
Enter interface number: (1-128)
Current VLAN: 1
Enter new VLAN [1-4094]:
Enter the number for the VLAN to which the interface belongs, or press <Enter>
without specifying a VLAN number to accept the current setting.
5. At the prompt, enter y to enable the IP interface, or n to leave it disabled:
Repeat the steps in this section until all IP interfaces have been configured. When
all interfaces have been configured, press <Enter> without specifying any interface
number.
IP default gateways:
Enter default gateway number: (1-3, 4)
Enter the number for the IP default gateway to be configured. To skip default
gateway configuration, press <Enter> without typing a gateway number and go
to “IP Routing” on page 48.
2. At the prompt, enter the IPv4 address for the selected default gateway:
Enter the IPv4 address in dotted decimal notation, or press <Enter> without
specifying an address to accept the current setting.
3. At the prompt, enter y to enable the default gateway, or n to leave it disabled:
Repeat the steps in this section until all default gateways have been configured.
When all default gateways have been configured, press <Enter> without
specifying any number.
IP Routing
When IP interfaces are configured for the various IP subnets attached to your
switch, IP routing between them can be performed entirely within the switch. This
eliminates the need to send inter-subnet communication to an external router
device. Routing on more complex networks, where subnets may not have a direct
presence on the EN2092, can be accomplished through configuring static routes or
by letting the switch learn routes dynamically.
This part of the Setup program prompts you to configure the various routing
parameters.
Enter y to review the changes made during this session of the Setup utility. Enter
n to continue without reviewing the changes. We recommend that you review the
changes.
3. Next, decide whether to apply the changes at the prompt:
Enter y to save the changes to flash. Enter n to continue without saving the
changes. Changes are normally saved at this point.
5. If you do not apply or save the changes, the system prompts whether to abort
them:
SLP defines specialized components called agents that perform tasks and support
services as follows:
• User Agent (UA) supports service query functions. It requests service information
for user applications. The User Agent retrieves service information from the
Service Agent or Directory Agents. A Host On-Demand client is an example of a
User Agent.
• Service Agent (SA) provides service registration and service advertisement.
Note: In this release, SA supports UA/DA on Linux with SLPv2 support.
• Directory Agent (DA) collects service information from Service Agents to provide
a repository of service information in order to centralize it for efficient access by
User Agents. There can only be one Directory Agent present per given host.
The Directory Agent acts as an intermediate tier in the SLP architecture, placed
between the User Agents and the Service Agents, so they communicate only with
the Directory Agent instead of with each other. This eliminates a large portion of the
multicast request or reply traffic on the network, and it protects the Service Agents
from being overwhelmed by too many service requests.
Active DA Discovery
When a Service Agent or User Agent initializes, it can perform Active Directory
Agent Discovery using a multicast service request and specifies the special,
reserved service type (service:directory-agent). Active DA Discovery is
achieved through the same mechanism as any other discovery using SLP.
The Directory Agent replies with unicast service replies, which provides the URLs
and attributes of the requested service.
You can also use the website to review and manage licenses, and to obtain
additional help. if required.
Note: An IBM ID and password are required to log into the FoD website. If you do
not yet have an IBM ID, you can register at the website.
Activation keys are provided as files that must be uploaded to the EN2092. To
acquire an activation key, use the FoD website to purchase an Authorization Code.
You will need to provide the unique ID (UID) of the specific EN2092 where the key
will be installed. The UID is the last 12 characters of the EN2092 serial number. This
serial number is located on the Part Number (PN) label and is also displayed during
successful login to the device.
When available, download the activation key file from the FoD site.
EN 2092> enable
EN 2092# configure terminal
EN 2092(config)# software-key
EN 2092(config)# enakey addr <server IP address> keyfile <key filename>
3. Follow the prompts to enter the appropriate parameters, including the file
transfer protocol and server parameters.
Note: Repeat the enakey command for any additional keys being installed.
The system prompts you to confirm your request. Once confirmed, the system
will reboot with the new licenses.
In the event that the EN2092 must be replaced, a new activation key must be
acquired and installed. When the replacement is handled through IBM Service and
Support, your original license will be transferred to the serial number of the
replacement unit and you will be provided a new license key.
Trial Keys
Trial keys are license keys used for evaluation purposes, upgrading the number of
available ports for limited time. They are managed and obtained like regular license
keys, from the IBM System x Features on Demand (FoD) website:
http://www.ibm.com/systems/x/fod/
Trial keys expire after a predefined number of days. 10 days before the expiration
date, the switch will begin to issue the following syslog messages:
The software demo license for Upgrade1 will expire in 10 days. The switch will
automatically reset to the factory configuration after the license expires. Please
backup your configuration or enter a valid license key so the configuration will not
be lost.
When the trial license expires, all features enabled by the key are disabled,
configuration files (active and backup) are deleted and the switch resets to the
factory configuration. To prevent this, either install a regular upgrade license to
overwrite the trial key, or manually remove the trial key and reset the switch.
For instance, the FlexSystem may include two compute nodes and a single SFP+
uplink, while the current license has the INTA1 – INTA14 and EXT1 – EXT10
Ethernet ports enabled by default.
To make best use of the available resources, the administrator decides to activate
internal ports INTB1 and INTB2 to provide redundant connections for the two
compute nodes and to enable the high speed SFP+ EXT21 port for the uplink.
EN 2092(config)# reload
Flexible Port Mapping is disabled if all available licenses are installed (all physical
ports are available).
Removing a license key reverts the port mapping to the default settings for the
remaining licensing level. To manually revert the port mapping to the default settings
use the following command:
To change the administrator password, you must login using the administrator
password.
Note: If you forget your administrator password, call your technical support
representative for help using the password fix-up mode.
You can also change the default user names, if desired. The user name length can
be up to 64 characters.
The default administrator account is USERID. The default password for the
administrator account is PASSW0RD (with a zero). To change the administrator
password, use the following procedure:
1. Connect to the switch and log in as the administrator.
2. Use the following command to change the administrator password:
The default password for the user account is user. This password can be changed
from the user account. The administrator can change all passwords, as shown in the
following procedure.
1. Connect to the switch and log in as the administrator.
2. Use the following command to change the user password:
SSH is a protocol that enables remote administrators to log securely into the
EN2092 over a network to execute management commands.
SCP is typically used to copy files securely from one machine to another. SCP uses
SSH for encryption of data on the network. On a EN2092, SCP is used to download
and upload the switch configuration via secure channels.
Although SSH and SCP are disabled by default, enabling and using these features
provides the following benefits:
• Identifying the administrator using Name/Password
• Authentication of remote administrators
• Authorization of remote administrators
• Determining the permitted actions and customizing service for individual
administrators
• Encryption of management messages
• Encrypting messages between the remote administrator and switch
• Secure copy support
The IBM Networking OS implementation of SSH supports both versions 1.5 and 2.0
and supports SSH clients version 1.5 - 2.x. The following SSH clients have been
tested:
• SSH 1.2.23 and SSH 1.2.27 for Linux (freeware)
• SecureCRT 3.0.2 and SecureCRT 3.0.3 for Windows NT (Van Dyke
Technologies, Inc.)
• F-Secure SSH 1.1 for Windows (Data Fellows)
• Putty SSH
• Cygwin OpenSSH
• Mac X OpenSSH
• Solaris 8 OpenSSH
• AxeSSH SSHPro
• SSH Communications Vandyke SSH A
• F-Secure
Begin a Telnet session from the console port and enter the following commands:
Syntax:
Note: The -4 option (the default) specifies that an IPv4 switch address will be
used. The -6 option specifies IPv6.
Example:
Syntax:
Syntax:
Example:
When loading a configuration file to the switch, the apply and save commands are
still required, in order for the configuration commands to take effect. The apply and
save commands may be entered manually on the switch, or by using SCP
commands.
Syntax:
Example:
• The CLI diff command is automatically executed at the end of putcfg to notify
the remote client of the difference between the new and the current
configurations.
• putcfg_apply runs the apply command after the putcfg is done.
• putcfg_apply_save saves the new configuration to the flash after
putcfg_apply is done.
• The putcfg_apply and putcfg_apply_save commands are provided
because extra apply and save commands are usually required after a putcfg;
however, an SCP session is not in an interactive mode.
To Copy the Switch Image and Boot Files to the SCP Host
Syntax:
Example:
Syntax:
Example:
When the SSH server is first enabled and applied, the switch automatically
generates the RSA host key and stores it in FLASH memory.
To configure RSA host key, first connect to the EN2092 through the console port
(commands are not available via external Telnet connection), and enter the
following command to generate it manually.
When the switch reboots, it will retrieve the host key from the FLASH memory.
Note: The switch will perform only one session of key/cipher generation at a time.
Thus, an SSH/SCP client will not be able to log in if the switch is performing
key generation at that time. Also, key generation will fail if an SSH/SCP client
is logging in at that time.
Strong Passwords
The administrator can require use of Strong Passwords for users to access the
EN2092. Strong Passwords enhance security because they make password
guessing more difficult.
When strong password is enabled, users can still access the switch using the old
password but will be advised to change to a strong password while attempting to log
in.
The administrator can choose the number of days allowed before each password
expires. When a strong password expires, the user is allowed to log in one last time
(last time) to change the password. A warning provides advance notice for users to
change the password.
The end user is by default assigned to the user access level (also known as class of
service, or CoS). CoS for all user accounts have global access to all resources
except for User CoS, which has access to view only resources that the user owns.
For more information, see Table 8 on page 72.
To change the user’s level, enter the class of service cos command:
EN 2092(config)# access user 1 level {user|operator|administrator}
An end user account must be enabled before the switch recognizes and permits
login under the account. Once enabled, the switch requires any user to enter both
username and password.
EN 2092(config)# [no] access user 1 enable
Locking Accounts
To protect the switch from unauthorized access, the account lockout feature can be
enabled. By default, account lockout is disabled. To enable this feature, ensure the
strong password feature is enabled (See “Strong Passwords” on page 65). Then
use the following command:
EN 2092(config)# access user strong-password lockout
After multiple failed login attempts, the switch locks the user account if lockout has
been enabled on the switch.
Usernames:
user - Enabled - offline
oper - Disabled - offline
admin - Always Enabled - online 1 session
Protected Mode
Protected Mode settings allow the switch administrator to block the management
module from making configuration changes that affect switch operation. The switch
retains control over those functions.
The following management module functions are disabled when Protected Mode is
turned on:
• External Ports: Enabled/Disabled
• External management over all ports: Enabled/Disabled
• Restore Factory Defaults
• New Static IP Configuration
In this release, configuration of the functions listed above are restricted to the local
switch when you turn Protected Mode on. In future releases, individual control over
each function may be added.
Note: Before you turn Protected Mode on, make sure that external management
(Telnet) access to one of the switch’s IP interfaces is enabled.
If you lose access to the switch through the external ports, use the console port to
connect directly to the switch, and configure an IP interface with Telnet access.
CAUTION
If you configure the RADIUS secret using any method other than through
the console port, the secret may be transmitted over the network as clear
text.
3. If desired, you may change the default UDP port number used to listen to
RADIUS.
The well-known port for RADIUS is 1645.
4. Configure the number retry attempts for contacting the RADIUS server, and the
timeout period.
The default EN2092 setting for backdoor and secure backdoor access is
disabled. Backdoor and secure backdoor access is always enabled on the
console port.
All user privileges, other than those assigned to the Administrator, have to be
defined in the RADIUS dictionary. RADIUS attribute 6 which is built into all RADIUS
servers defines the administrator. The file name of the dictionary is RADIUS
vendor-dependent. The following RADIUS attributes are defined for IBM Networking
OS user privileges levels:
Table 9. IBM Networking OS-proprietary Attributes for RADIUS
Administrator Vendor-supplied 6
(USERID)
Authorization
Authorization is the action of determining a user’s privileges on the device, and
usually takes place after authentication.
The default mapping between TACACS+ authorization levels and IBM Networking
OS management access levels is shown in Table 10. The authorization levels listed
in this table must be defined on the TACACS+ server.
Table 10. Default TACACS+ Authorization Levels
user 0
oper 3
admin (USERID) 6
user 0–1
oper 6–8
You can customize the mapping between TACACS+ privilege levels and EN2092
management access levels. Use the following command to manually map each
TACACS+ privilege level (0-15) to a corresponding EN2092 management access
level: EN 2092(config)# tacacs-server user-mapping
You can use TACACS+ to record and track software login access, configuration
changes, and interactive commands.
The following examples illustrate the format of IBM Networking OS commands sent
to the TACACS+ server:
Use the following commands to change the password for the primary and secondary
TACACS+ servers:
Statement 21:
CAUTION
If you configure the TACACS+ secret using any method other than a direct
console connection, the secret may be transmitted over the network as
clear text.
3. If desired, you may change the default TCP port number used to listen to
TACACS+. The well-known port for TACACS+ is 49.
Each entry in the LDAP server is referenced by its Distinguished Name (DN). The
DN consists of the user-account name concatenated with the LDAP domain name.
If the user-account name is John, the following is an example DN:
uid=John,ou=people,dc=domain,dc=com
EN2092 user groups and user accounts must reside within the same domain. On
the LDAP server, configure the domain to include EN2092 user groups and user
accounts, as follows:
• User Accounts:
Use the uid attribute to define each individual user account.
• User Groups:
Use the members attribute in the groupOfNames object class to create the user
groups. The first word of the common name for each user group must be equal
to the user group names defined in the EN2092, as follows:
– admin (USERID)
– oper
– user
3. If desired, you may change the default TCP port number used to listen to LDAP.
The well-known port for LDAP is 389.
The 802.1X standard describes port-based network access control using Extensible
Authentication Protocol over LAN (EAPoL). EAPoL provides a means of
authenticating and authorizing devices attached to a LAN port that has
point-to-point connection characteristics and of preventing access to that port in
cases of authentication and authorization failures.
RADIUS
802.1x Client Server
EAPOL IBM Switch RADIUS-EAP
Authenticator
Ethernet (RADIUS Client) UDP/IP
Port Unauthorized
EAPOL-Start
EAP-Request (Credentials)
EAP-Response (Credentials)
Radius-Access-Request
Radius-Access-Challenge
EAP-Request (Credentials)
EAP-Response (Credentials)
Radius-Access-Request
Radius-Access-Accept
EAP-Success
Port Authorized
© Copyright IBM Corp. 2014 Chapter 7: 802.1X Port-Based Network Access Control 83
EAPoL Message Exchange
During authentication, EAPOL messages are exchanged between the client and the
EN2092 authenticator, while RADIUS-EAP messages are exchanged between the
EN2092 authenticator and the RADIUS server.
If a client that does not support 802.1X connects to an 802.1X-controlled port, the
EN2092 authenticator requests the client's identity when it detects a change in the
operational state of the port. The client does not respond to the request, and the port
remains in the unauthorized state.
Note: When an 802.1X-enabled client connects to a port that is not
802.1X-controlled, the client initiates the authentication process by sending
an EAPOL-Start frame. When no response is received, the client retransmits
the request for a fixed number of times. If no response is received, the client
assumes the port is in authorized state, and begins sending frames, even if
the port is unauthorized.
Guest VLAN
The guest VLAN provides limited access to unauthenticated ports. The guest VLAN
can be configured using the following command:
Client ports that have not received an EAPOL response are placed into the Guest
VLAN, if one is configured on the switch. Once the port is authenticated, it is moved
from the Guest VLAN to its configured VLAN.
When Guest VLAN enabled, the following considerations apply while a port is in the
unauthenticated state:
• The port is placed in the guest VLAN.
• The Port VLAN ID (PVID) is changed to the Guest VLAN ID.
• Port tagging is disabled on the port.
© Copyright IBM Corp. 2014 Chapter 7: 802.1X Port-Based Network Access Control 85
Supported RADIUS Attributes
The 802.1X Authenticator relies on external RADIUS servers for authentication with
EAP. Table 12lists the RADIUS attributes that are supported as part of
RADIUS-EAP authentication based on the guidelines specified in Annex D of the
802.1X standard and RFC 3580.
Table 12. Support for RADIUS Attributes
© Copyright IBM Corp. 2014 Chapter 7: 802.1X Port-Based Network Access Control 87
EAPoL Configuration Guidelines
When configuring EAPoL, consider the following guidelines:
• The 802.1X port-based authentication is currently supported only in
point-to-point configurations, that is, with a single supplicant connected to an
802.1X-enabled switch port.
• When 802.1X is enabled, a port has to be in the authorized state before any
other Layer 2 feature can be operationally enabled. For example, the STG state
of a port is operationally disabled while the port is in the unauthorized state.
• The 802.1X supplicant capability is not supported. Therefore, none of its ports
can successfully connect to an 802.1X-enabled port of another device, such as
another switch, that acts as an authenticator, unless access control on the
remote port is disabled or is configured in forced-authorized mode. For example,
if a EN2092 is connected to another EN2092, and if 802.1X is enabled on both
switches, the two connected ports must be configured in force-authorized mode.
• Unsupported 802.1X attributes include Service-Type, Session-Timeout, and
Termination-Action.
• RADIUS accounting service for 802.1X-authenticated devices or users is not
currently supported.
• Configuration changes performed using SNMP and the standard 802.1X MIB will
take effect immediately.
• IPv6 ACLs
Up to 128 ACLs are supported for networks that use IPv6 addressing. IPv6 ACLs
are configured using the following CLI menu:
• Management ACLs
Up to 128 MACLs are supported. ACLs for the different types of management
protocols (Telnet, HTTPS, etc.) provide greater granularity for securing
management traffic.
Management ACLs are configured using the following CLI menu:
1 icmp
2 igmp
6 tcp
17 udp
89 ospf
112 vrrp
Flag Value
URG 0x0020
ACK 0x0010
PSH 0x0008
RST 0x0004
SYN 0x0002
FIN 0x0001
When multiple ACLs are assigned to a port, higher-priority ACLs are considered
first, and their action takes precedence over lower-priority ACLs. ACL order of
precedence is discussed in the next section.
To create and assign ACLs in groups, see “ACL Groups” on page 93.
If multiple ACLs match the port traffic, only the action of the one with the lowest ACL
number is applied. The others are ignored.
The ACL number is the sole factor in determining ACL order of precedence. The
order in which ACLs are applied to a port does not affect the order of precedence,
nor does the ACL Group number (see “ACL Groups” on page 93), the order in which
an ACL is assigned to an ACL Group, or the order in which the ACL Group is
assigned to a port.
ACL 1:
VLAN = 1
SIP = 10.10.10.1 (255.255.255.0)
Action = permit
ACL Group 1
ACL 1:
VLAN = 1
SIP = 10.10.10.1 (255.255.255.0)
Action = permit
ACL 2:
VLAN = 2
SIP = 10.10.10.2 (255.255.255.0)
Action = deny
ACL 3:
Priority = 7
DIP = 10.10.10.3 (255.255.255.0)
Action = permit
ACL Groups organize ACLs into traffic profiles that can be more easily assigned
to ports. The EN2092 supports up to 256 ACL Groups.
Note: ACL Groups are used for convenience in assigning multiple ACLs to ports.
ACL Groups have no effect on the order in which ACLs are applied (see
“ACL Order of Precedence” on page 92). All ACLs assigned to the port
(whether individually assigned or part of an ACL Group) are considered as
individual ACLs for the purposes of determining their order of precedence.
Actions taken by an ACL are called In-Profile actions. You can configure additional
In-Profile and Out-of-Profile actions on a port. Data traffic can be metered, and
re-marked to ensure that the traffic flow provides certain levels of service in terms of
bandwidth for different types of network traffic.
Metering
Using meters, you set a Committed Rate in Kbps (1000 bits per second in each
Kbps). All traffic within this Committed Rate is In-Profile. Additionally, you can set a
Maximum Burst Size that specifies an allowed data burst larger than the Committed
Rate for a brief period. These parameters define the In-Profile traffic.
Meters keep the sorted packets within certain parameters. You can configure a
meter on an ACL, and perform actions on metered traffic, such as packet
re-marking.
Re-Marking
Re-marking allows for the treatment of packets to be reset based on new network
specifications or desired levels of service. You can configure the ACL to re-mark a
packet as follows:
• Change the DSCP value of a packet, used to specify the service level that traffic
should receive.
• Change the 802.1p priority of a packet.
The source port for the mirrored packets cannot be a portchannel, but may be a
member of a portchannel.
The destination port to which packets are mirrored must be a physical port.
If the ACL or VMap has an action (permit, drop, etc.) assigned, it cannot be used to
mirror packets for that ACL.
The ACL must be also assigned to it target ports as usual (see “Assigning
Individual ACLs to a Port” on page 92, or “Assigning ACL Groups to a Port” on
page 102).
• For VMaps (see “VLAN Maps” on page 98):
EN 2092(config)# access-control vmap <VMap number> mirror port <monitor destination port>
You must enable statistics for each ACL that you wish to monitor:
Use this configuration to block traffic to a specific host. All traffic that ingresses on
port EXT1 is denied if it is destined for the host at IP address 100.10.1.1
1. Configure an Access Control List.
ACL Example 2
Use this configuration to block traffic from a network destined for a specific host
address. All traffic that ingresses in port EXT2 with source IP from class
100.10.1.0/24 and destination IP 200.20.2.2 is denied.
1. Configure an Access Control List.
This configuration blocks traffic from a network that is destined for a specific egress
port. All traffic that ingresses port EXT1 from the network 100.10.1.0/24 and is
destined for port 3 is denied.
1. Configure an Access Control List.
Individual VMAP filters are configured in the same fashion as regular ACLs, except
that VLANs cannot be specified as a filtering criteria (unnecessary, since the VMAP
are assigned to a specific VLAN or associated with a VM group VLAN).
Once a VMAP filter is created, it can be assigned or removed using the following
configuration commands:
• For a regular VLAN:
Note: Each VMAP can be assigned to only one VLAN or VM group. However, each
VLAN or VM group may have multiple VMAPs assigned to it.
Lower MACL numbers have higher priority. Up to 128 MACLs can be configured.
Ports are grouped into broadcast domains by assigning them to the same VLAN.
Frames received in one VLAN can only be forwarded within that VLAN, and
multicast, broadcast, and unknown unicast frames are flooded only to ports in the
same VLAN.
The EN2092 automatically supports jumbo frames. This default cannot be manually
configured or disabled.
The EN2092 1Gb Ethernet Scalable Switch (EN2092) supports jumbo frames with a
Maximum Transmission Unit (MTU) of 9,216 bytes. Within each frame, 18 bytes are
reserved for the Ethernet header and CRC trailer. The remaining space in the frame
(up to 9,198 bytes) comprise the packet, which includes the payload of up to 9,000
bytes and any additional overhead, such as 802.1q or VLAN tags. Jumbo frame
support is automatic: it is enabled by default, requires no manual configuration, and
cannot be manually disabled.
Note: Jumbo frames are not supported for traffic sent to switch management
interfaces.
IBM Networking OS supports up to 1024 VLANs per switch. Even though the
maximum number of VLANs supported at any given time is 1024, each can be
identified with any number between 1 and 4094. VLAN 1 is the default VLAN for the
external ports and the internal blade ports.
VLAN 4095 is reserved for use by the management network, which includes the
management ports. This configuration allows Serial over LAN (SoL) management—
a feature available on certain server blades. Management functions can also be
assigned to other VLANs (using the following command:
Note: The sample screens that appear in this document might differ slightly from
the screens displayed by your system. Screen content varies based on the
type of blade chassis unit that you are using and the firmware versions and
options that are installed.
Each port in the switch has a configurable default VLAN number, known as its PVID.
By default, the PVID for all non-management ports is set to 1, which correlates to
the default VLAN ID. The PVID for each port can be configured to any VLAN
number between 1 and 4094.
* = PVID/Native-VLAN is tagged.
# = PVID is ingress tagged.
Trk = Trunk mode
NVLAN = Native-VLAN
Each port on the switch can belong to one or more VLANs, and each VLAN can
have any number of switch ports in its membership. Any port that belongs to multiple
VLANs, however, must have VLAN tagging enabled (see “VLAN Tagging/Trunk
Mode” on page 108).
Tagging places the VLAN identifier in the frame header of a packet, allowing each
port to belong to multiple VLANs. When you add a port to multiple VLANs, you also
must enable tagging on that port.
802.1Q Switch
VLAN 1
DA CRC
SA
Incoming Outgoing Data
untagged Data untagged packet
packet (unchanged) SA
CRC DA
Key
By default:
All ports are assigned PVID = 1
All external ports are untagged members of VLAN 1
All internal server ports are untagged members of VLAN 1
BS45010A
Note: The port numbers specified in these illustrations may not directly correspond
to the physical port configuration of your switch model.
When a VLAN is configured, ports are added as members of the VLAN, and the
ports are defined as either tagged or untagged (see Figure 3 through Figure 6).
The default configuration settings for EN2092s have all ports set as untagged
members of VLAN 1 with all ports configured as PVID = 1. In the default
configuration example shown in Figure 2, all incoming packets are assigned to
VLAN 1 by the default port VLAN identifier (PVID =1).
Port 5
Untagged member
of VLAN 2
Port 4
Port 5
802.1Q Switch CRC* Data Tag SA DA
(*Recalculated)
Port 6 Port 7 Port 8
Port 5
Before
Port 6 Port 7 Port 8
Untagged member
of VLAN 2
As shown in Figure 6, the tagged packet remains unchanged as it leaves the switch
through port 5, which is configured as a tagged member of VLAN 2. However, the
tagged packet is stripped (untagged) as it leaves the switch through port 7, which is
configured as an untagged member of VLAN 2.
Port 4
Port 5
802.1Q Switch CRC Data Tag SA DA
Outgoing After
SA untagged packet
changed Key
DA (tag removed)
Priority - User_priority
CFI - Canonical format indicator
VID - VLAN identifier
• When using Spanning Tree, STG 2-128 may contain only one VLAN unless
Multiple Spanning-Tree Protocol (MSTP) mode is used. With MSTP mode,
STG 1 to 32 can include multiple VLANs.
Server #1 Server #2
VLAN #3 VLAN #1, 2, 3
GbE
Switch Module
Shared Media
Gigabit/Tagged
adapter
PC #1 PC #2 PC #3 PC #4 PC #5
VLAN #2 VLAN #2 VLAN #1 VLAN #3 VLAN #1 & #2
Component Description
Switch This switch is configured for three VLANs that represent three
different IP subnets. Two servers and five clients are attached to
the switch.
Server #1 This server is a member of VLAN 3 and has presence in only one IP
subnet. The associated internal switch port is only a member of
VLAN 3, so tagging is disabled.
Server #2 This high-use server needs to be accessed from all VLANs and IP
subnets. The server has a VLAN-tagging adapter installed with
VLAN tagging turned on. The adapter is attached to one of the
internal switch ports, that is a member of VLANs 1, 2, and 3, and
has tagging enabled. Because of the VLAN tagging capabilities of
both the adapter and the switch, the server is able to communicate
on all three IP subnets in this network. Broadcast separation
between all three VLANs and subnets, however, is maintained.
PCs #1 and These PCs are attached to a shared media hub that is then
#2 connected to the switch. They belong to VLAN 2 and are logically in
the same IP subnet as Server 2 and PC 5. The associated external
switch port has tagging disabled.
Note: VLAN tagging is required only on ports that are connected to other EN2092s
or on ports that connect to tag-capable end-stations, such as servers with
VLAN-tagging adapters.
With PVLAN, the switch classifies incoming packets by Ethernet protocol of the
packets, not by the configuration of the ingress port. When an untagged or
priority-tagged frame arrives at an ingress port, the protocol information carried in
the frame is used to determine a VLAN to which the frame belongs. If a frame’s
protocol is not recognized as a pre-defined PVLAN type, the ingress port’s PVID is
assigned to the frame. When a tagged frame arrives, the VLAN ID in the frame’s tag
is used.
Each VLAN can contain up to eight different PVLANs. You can configure separate
PVLANs on different VLANs, with each PVLAN segmenting traffic for the same
protocol type. For example, you can configure PVLAN 1 on VLAN 2 to segment IPv4
traffic, and PVLAN 8 on VLAN 100 to segment IPv4 traffic.
To define a PVLAN on a VLAN, configure a PVLAN number (1-8) and specify the
frame type and the Ethernet type of the PVLAN protocol. You must assign at least
one port to the PVLAN before it can function. Define the PVLAN frame type and
Ethernet type as follows:
• Frame type—consists of one of the following values:
– Ether2 (Ethernet II)
– SNAP (Subnetwork Access Protocol)
– LLC (Logical Link Control)
• Ethernet type—consists of a 4-digit (16 bit) hex value that defines the Ethernet
type. You can use common Ethernet protocol values, or define your own values.
Following are examples of common Ethernet protocol values:
– IPv4 = 0800
– IPv6 = 86dd
– ARP = 0806
All member ports of a PVLAN have the same PVLAN priority level.
PVLAN Tagging
When PVLAN tagging is enabled, the switch tags frames that match the PVLAN
protocol. For more information about tagging, see “VLAN Tagging/Trunk Mode” on
page 108.
Untagged ports must have PVLAN tagging disabled. Tagged ports can have PVLAN
tagging either enabled or disabled.
PVLAN tagging has higher precedence than port-based tagging. If a port is tag
enabled, and the port is a member of a PVLAN, the PVLAN tags egress frames that
match the PVLAN protocol.
Use the tag-pvlan command (vlan <x> protocol-vlan <x> tag-pvlan <x>) to
define the complete list of tag-enabled ports in the PVLAN. Note that all ports not
included in the PVLAN tag list will have PVLAN tagging disabled.
Configuring PVLAN
Follow this procedure to configure a Protocol-based VLAN (PVLAN).
1. Configure VLAN tagging/trunk mode for ports.
2. Create a VLAN and define the protocol type(s) supported by the VLAN.
EN 2092(config)# vlan 2
EN 2092(config-vlan)# protocol-vlan 1 frame-type ether2 0800
Note: If VLAN tagging is turned on and the port being added to the VLAN has a
different default VLAN (PVID/Native VLAN), you will be asked to confirm
changing the PVID to the current VLAN.
5. Enable the PVLAN.
Use Private VLANs to partition a VLAN domain into sub-domains. Each sub-domain
is comprised of one primary VLAN and one secondary VLAN, as follows:
• Primary VLAN—carries unidirectional traffic downstream from promiscuous
ports. Each Private VLAN has only one primary VLAN. All ports in the Private
VLAN are members of the primary VLAN.
• Secondary VLAN—Secondary VLANs are internal to a private VLAN domain,
and are defined as follows:
– Isolated VLAN—carries unidirectional traffic upstream from the host servers
toward ports in the primary VLAN and the gateway. Each Private VLAN can
contain only one Isolated VLAN.
– Community VLAN—carries upstream traffic from ports in the community
VLAN to other ports in the same community, and to ports in the primary
VLAN and the gateway. Each Private VLAN can contain multiple community
VLANs.
After you define the primary VLAN and one or more secondary VLANs, you map the
secondary VLAN(s) to the primary VLAN.
Configuration Example
Follow this procedure to configure a Private VLAN.
1. Select a VLAN and define the Private VLAN type as primary.
Base port mode is the default. You may upgrade the port mode using Key1, Key2,
or both. To upgrade the port mode, you must obtain a software license key.
Use the following command to enter the software license key to upgrade the port
mode:
After you enter the license key, you must reset the switch (/boot/reset) for the
change to take affect. Use the following command to verify the port configuration:
* = PVID is tagged.
Two trunk types are available: static trunk groups (portchannel), and dynamic LACP
trunk groups. Up to 52 trunks of each type are supported, either static, LACP or
mixed, depending of the number and type of available ports. Each trunk can include
up to 32 member ports .
Figure 8. Port Trunk Group
Switch 1 Switch 2
Aggregate
Port Trunk
Trunk groups are also useful for connecting a EN2092 to third-party devices that
support link aggregation, such as Cisco routers and switches with EtherChannel
technology (not ISL trunking technology) and Sun's Quad Fast Ethernet Adapter.
Trunk Group technology is compatible with these devices when they are configured
manually.
Trunk traffic is statistically distributed among the ports in a trunk group, based on a
variety of configurable options.
Also, since each trunk group is comprised of multiple physical links, the trunk group
is inherently fault tolerant. As long as one connection between the switches is
available, the trunk remains active and statistical load balancing is maintained
whenever a port in a trunk group is lost or returned to service.
Before you configure your trunk, you must consider these settings, along with
specific configuration rules, as follows:
• Read the configuration rules provided in the section, “Static Trunk Group
Configuration Rules” on page 125.”
• Determine which switch ports are to become trunk members (the specific ports
making up the trunk).
• Ensure that the chosen switch ports are set to enabled.
• Ensure all member ports in a trunk have the same VLAN configuration.
• Consider how the existing Spanning Tree will react to the new trunk
configuration. See “Spanning Tree Protocols” on page 133 for configuration
guidelines.
• Consider how existing VLANs will be affected by the addition of a trunk.
© Copyright IBM Corp. 2014 Chapter 10: Ports and Trunking 125
• You cannot configure a trunk member as a monitor port in a port-mirroring
configuration.
• Trunks cannot be monitored by a monitor port; however, trunk members can be
monitored.
• All ports in static trunks must have the same link configuration (speed, duplex,
flow control).
Application Switch
Switch
Prior to configuring each switch in the above example, you must connect to the
appropriate switch’s Command Line Interface (CLI) as the administrator.
Note: For details about accessing and using any of the menu commands
described in this example, see the IBM Networking OS Command
Reference.
1. Connect the switch ports that will be members in the trunk group.
2. Configure the trunk using these steps on the EN2092:
a. Define a trunk group.
Trunk group 1 (on the EN2092) is now connected to trunk group 3 on the Application
Switch.
Note: In this example, a EN2092 and an application switch are used. If a third-party
device supporting link aggregation is used (such as Cisco routers and
switches with EtherChannel technology or Sun's Quad Fast Ethernet
Adapter), trunk groups on the third-party device should be configured
manually. Connection problems could arise when using automatic trunk
group negotiation on the third-party device.
4. Examine the trunking information on each switch.
Information about each port in each configured trunk group is displayed. Make
sure that trunk groups consist of the expected ports and that each port is in the
expected state.
© Copyright IBM Corp. 2014 Chapter 10: Ports and Trunking 127
Configurable Trunk Hash Algorithm
Traffic in a trunk group is statistically distributed among member ports using a hash
process where various address and attribute bits from each transmitted frame are
recombined to specify the particular trunk port the frame will use.
The switch can be configured to use a variety of hashing options. To achieve the
most even traffic distribution, select options that exhibit a wide range of values for
your particular network. Avoid hashing on information that is not usually present in
the expected traffic, or which does not vary.
The EN2092 supports the following hashing options, which can be used in any
combination:
– Source MAC address (smac)
When enabled, Layer 4 port information (TCP, UPD, etc.) is added to the hash if
available. The L4port option is ignored when Layer 4 information is not
included in the packet (such as for Layer 2 packets), or when the useL2 option is
enabled.
Note: For MPLS packets, Layer 4 port information is excluded from the hash
calculation. Instead, other IP fields are used, along with the first two MPLS
labels.
© Copyright IBM Corp. 2014 Chapter 10: Ports and Trunking 129
Link Aggregation Control Protocol
LACP Overview
Link Aggregation Control Protocol (LACP) is an IEEE 802.3ad standard for grouping
several physical ports into one logical port (known as a dynamic trunk group or Link
Aggregation group) with any device that supports the standard. Please refer to IEEE
802.3ad-2002 for a full description of the standard.
IEEE 802.3ad allows standard Ethernet links to form a single Layer 2 link using the
Link Aggregation Control Protocol (LACP). Link aggregation is a method of grouping
physical link segments of the same media type and speed in full duplex, and treating
them as if they were part of a single, logical link segment. If a link in a LACP trunk
group fails, traffic is reassigned dynamically to the remaining link or links of the
dynamic trunk group.
A port’s Link Aggregation Identifier (LAG ID) determines how the port can be
aggregated. The Link Aggregation ID (LAG ID) is constructed mainly from the
system ID and the port’s admin key, as follows:
• System ID: an integer value based on the switch’s MAC address and the system
priority assigned in the CLI.
• Admin key: a port’s admin key is an integer value (1 - 65535) that you can
configure in the CLI. Each EN2092 port that participates in the same LACP trunk
group must have the same admin key value. The admin key is local significant,
which means the partner switch does not need to use the same admin key value.
For example, consider two switches, an Actor (the EN2092) and a Partner (another
switch), as shown in Table 16.
Table 16. Actor vs. Partner LACP configuration
In the configuration shown in Table 16, Actor switch ports 38 and 39 aggregate to
form an LACP trunk group with Partner switch ports 1 and 2. LACP automatically
determines which member links can be aggregated and then aggregates them. It
provides for the controlled addition and removal of physical links for the link
aggregation.
Each port in the EN2092 can have one of the following LACP modes.
If an LACP group member port is connected to a port that is in LACP off mode, the
LACP port will not be able to converge. The link remains up, but the port is set to
discarding state.
When the system is initialized, all ports by default are in LACP off mode and are
assigned unique admin keys. To make a group of ports aggregatable, you assign
them all the same admin key. You must set the port’s LACP mode to active to
activate LACP negotiation. You can set other port’s LACP mode to passive, to
reduce the amount of LACPDU traffic at the initial trunk-forming stage.
Use the following command to check whether the ports are trunked.
Static trunks are listed as trunks 1 though 52. Dynamic trunks are listed as 53
through 104.
© Copyright IBM Corp. 2014 Chapter 10: Ports and Trunking 131
132 EN2092 1Gb Ethernet Scalable Switch: Application Guide
Chapter 11. Spanning Tree Protocols
When multiple paths exist between two points on a network, Spanning Tree Protocol
(STP), or one of its enhanced variants, can prevent broadcast loops and ensure that
the EN2092 1Gb Ethernet Scalable Switch (EN2092) uses only the most efficient
network path.
PVSRT Mode
Note: Per-VLAN Rapid Spanning Tree (PVRST) is enabled by default on the
EN2092.
Using STP, network devices detect and eliminate logical loops in a bridged or
switched network. When multiple paths exist, Spanning Tree configures the network
so that a switch uses only the most efficient path. If that path fails, Spanning Tree
automatically sets up another active path on the network to sustain network
operations.
IBM Networking OS PVRST mode is based on IEEE 802.1w RSTP. Like RSTP,
PVRST mode provides rapid Spanning Tree convergence. However, PVRST mode
is enhanced for multiple instances of Spanning Tree. In PVRST mode, each VLAN
may be automatically or manually assigned to one of 127 available STGs, with each
STG acting as an independent, simultaneous instance of STP. PVRST uses IEEE
802.1Q tagging to differentiate STP BPDUs and is compatible with Cisco
R-PVST/R-PVST+ modes.
The relationship between ports, trunk groups, VLANs, and Spanning Trees is shown
in Table 17.
Table 17. Ports, Trunk Groups, and VLANs
Due to the sequence involved in these STP states, considerable delays may occur
while paths are being resolved. To mitigate delays, ports defined as edge ports
(“Port Type and Link Type” on page 151) may bypass the discarding and
learning states, and enter directly into the forwarding state.
Bridge Priority
The bridge priority parameter controls which bridge on the network is the STG root
bridge. To make one switch become the root bridge, configure the bridge priority
lower than all other switches and bridges on your network. The lower the value, the
higher the bridge priority. Use the following command to configure the bridge
priority:
© Copyright IBM Corp. 2014 Chapter 11: Spanning Tree Protocols 135
Port Priority
The port priority helps determine which bridge port becomes the root port or the
designated port. The case for the root port is when two switches are connected
using a minimum of two links with the same path-cost. The case for the designated
port is in a network topology that has multiple bridge ports with the same path-cost
connected to a single segment, the port with the lowest port priority becomes the
designated port for the segment.
Root Guard
The root guard feature provides a way to enforce the root bridge placement in the
network. It keeps a new device from becoming root and thereby forcing STP
re-convergence. If a root-guard enabled port detects a root device, that port will be
placed in a blocked state.
You can configure the root guard at the port level using the following commands:
Loop Guard
Note: The global loop guard command will be effective on a port only if the
port-level loop guard command is set to default as shown below:
EN 2092(config-if)# spanning-tree guard loop none
To enable loop guard at the port level, enter the following command:
The port path cost assigns lower values to high-bandwidth ports, such as 10 Gigabit
Ethernet, to encourage their use. The cost of a port also depends on whether the
port operates at full-duplex (lower cost) or half-duplex (higher cost). For example, if
a 100-Mbps (Fast Ethernet) link has a “cost” of 10 in half-duplex mode, it will have a
cost of 5 in full-duplex mode. The objective is to use the fastest links so that the
route with the lowest cost is chosen. A value of 0 (the default) indicates that the
default cost will be computed for an auto-negotiated link or trunk speed.
The port path cost can be a value from 1 to 200000000. Specify 0 for automatic path
cost.
Enterprise
Routing
Switches
Switch 1 x Switch 2
STP
Blocks Link
© Copyright IBM Corp. 2014 Chapter 11: Spanning Tree Protocols 137
To prevent a network loop among the switches, STP must block one of the links
between them. In this case, it is desired that STP block the link between the blade
switches, and not one of the EN2092 uplinks or the Enterprise switch trunk.
During operation, if one EN2092 experiences an uplink failure, STP will activate the
switch-to-switch link so that server traffic on the affected EN2092 may pass through
to the active uplink on the other EN2092, as shown in Figure 11.
Figure 11. Spanning Tree Restoring the Switch-to-Switch Link
Enterprise
Routing Uplink
Switches Failure
Switch 1 Switch 2
STP
Restores Link
In this example, port 10 on each switch is used for the switch-to-switch link. To
ensure that the EN2092 switch-to-switch link is blocked during normal operation, the
port path cost is set to a higher value than other paths in the network. To configure
the port path cost on the switch-to-switch links in this example, use the following
commands on each switch.
EN 2092(config)# interface port 10
EN 2092(config-if)# spanning-tree stp 1 path-cost 60000
EN 2092(config-if)# exit
Multiple STGs provide multiple data paths which can be used for load-balancing and
redundancy. To enable load balancing between two EN2092s using multiple STGs,
configure each path with a different VLAN and then assign each VLAN to a separate
STG. Since each STG is independent, they each send their own IEEE 802.1Q
tagged Bridge Protocol Data Units (BPDUs).
Each STG behaves as a bridge group and forms a loop-free topology. The default
STG 1 may contain multiple VLANs (typically until they can be assigned to another
STG). STGs 2-128 may contain only one VLAN each.
STG 1 STG 2
False x
Loop VLAN 1 VLAN 30
is active is active
In the second network, the problem of improper link blocking is resolved when the
VLANs are placed into different Spanning Tree Groups (STGs). Since each STG
has its own independent instance of Spanning Tree, each STG is responsible only
for the loops within its own VLAN. This eliminates the false loop, and allows both
VLANs to forward packets between the switches at the same time.
© Copyright IBM Corp. 2014 Chapter 11: Spanning Tree Protocols 139
VLAN and STG Assignment
In PVRST mode, up to 128 STGs are supported. Ports cannot be added directly to
an STG. Instead, ports must be added as members of a VLAN, and the VLAN must
then be assigned to the STG.
STG 1 is the default STG. Although VLANs can be added to or deleted from default
STG 1, the STG itself cannot be deleted from the system. By default, STG 1 is
enabled and includes VLAN 1, which by default includes all switch ports (except for
management VLANs and management ports).
STG 128 is reserved for switch management. By default, STG 128 is disabled, but
includes management VLAN 4095 and the management ports.
By default, all other STGs (STG 2 through 127) are enabled, though they initially
include no member VLANs. VLANs must be assigned to STGs. By default, this is
done automatically using VLAN Automatic STG Assignment (VASA), though it can
also be done manually (see “Manually Assigning STGs” on page 141).
When VASA is enabled (as by default), each time a new VLAN is configured, the
switch will automatically assign that new VLAN to its own STG. Conversely, when a
VLAN is deleted, if its STG is not associated with any other VLAN, the STG is
returned to the available pool.
The specific STG number to which the VLAN is assigned is based on the VLAN
number itself. For low VLAN numbers (1 through 127), the switch will attempt to
assign the VLAN to its matching STG number. For higher numbered VLANs, the
STG assignment is based on a simple modulus calculation; the attempted STG
number will “wrap around,” starting back at the top of STG list each time the end of
the list is reached. However, if the attempted STG is already in use, the switch will
select the next available STG. If an empty STG is not available when creating a new
VLAN, the VLAN is automatically assigned to default STG 1.
If ports are tagged, each tagged port sends out a special BPDU containing the
tagged information. Also, when a tagged port belongs to more than one STG, the
egress BPDUs are tagged to distinguish the BPDUs of one STG from those of
another STG.
VASA is enabled by default, but can be disabled or re-enabled using the following
command:
EN 2092(config)# [no] spanning-tree stg-auto
If VASA is disabled, when you create a new VLAN, that VLAN automatically belongs
to default STG 1. To place the VLAN in a different STG, assign it manually.
VASA applies only to PVRST mode and is ignored in RSTP and MSTP modes.
When a VLAN is assigned to a new STG, the VLAN is automatically removed from
its prior STG.
Note: For proper operation with switches that use Cisco PVST+, it is
recommended that you create a separate STG for each VLAN.
© Copyright IBM Corp. 2014 Chapter 11: Spanning Tree Protocols 141
Adding and Removing Ports from STGs
• When you add a port to a VLAN that belongs to an STG, the port is also added to
that STG. However, if the port you are adding is an untagged port and is already
a member of another STG, that port will be removed from its current STG and
added to the new STG. An untagged port cannot belong to more that one STG.
For example: Assume that VLAN 1 belongs to STG 1, and that port 1 is
untagged and does not belong to any STG. When you add port 1 to VLAN 1, port
1 will automatically become part of STG 1.
However, if port 5 is untagged and is a member of VLAN 3 in STG 2, then adding
port 5 to VLAN 1 in STG 1 will not automatically add the port to STG 1. Instead,
the switch will prompt you to decide whether to change the PVID from 3 to 1:
"Port 5 is an UNTAGGED/Access Mode port and its current PVID/Native VLAN is 3.
Confirm changing PVID/Native VLAn from 3 to 1 [y/n]:" y
• When you remove a port from VLAN that belongs to an STG, that port will also be
removed from the STG. However, if that port belongs to another VLAN in the
same STG, the port remains in the STG.
As an example, assume that port 2 belongs to only VLAN 2, and that VLAN 2
belongs to STG 2. When you remove port 2 from VLAN 2, the port is moved to
default VLAN 1 and is removed from STG 2.
However, if port 2 belongs to both VLAN 1 and VLAN 2, and both VLANs belong
to STG 2, removing port 2 from VLAN 2 does not remove port 2 from STG 2,
because the port is still a member of VLAN 1, which is still a member of STG 2.
• An STG cannot be deleted, only disabled. If you disable the STG while it still
contains VLAN members, Spanning Tree will be off on all ports belonging to that
VLAN.
The relationship between port, trunk groups, VLANs, and Spanning Trees is shown
in Table 17 on page 134.
For example, in Figure 13, though VLAN 2 is shared by the Switch A and Switch B,
each switch is responsible for the proper configuration of its own ports, VLANs, and
STGs. Switch A identifies its own port 17 as part of VLAN 2 on STG 2, and the
Switch B identifies its own port 8 as part of VLAN 2 on STG 2.
Figure 13. Implementing Multiple Spanning Tree Groups
Chassis Application
Switch A Switch B
STG 2
17 8
VLAN 2
18 2 1
STG 3
VLAN 3 STG 1
VLAN 1
8 2 1
1 8
Application Application
Switch C Switch D
The VLAN participation for each Spanning Tree Group in Figure 13 on page 143 is
as follows:
• VLAN 1 Participation
Assuming Switch B to be the root bridge, Switch B transmits the BPDU for VLAN
1 on ports 1 and 2. Switch C receives the BPDU on port 2, and Switch D receives
the BPDU on port 1. Because there is a network loop between the switches in
VLAN 1, either Switch D will block port 8 or Switch C will block port 1, depending
on the information provided in the BPDU.
• VLAN 2 Participation
Switch B, the root bridge, generates a BPDU for STG 2 from port 8. Switch A
receives this BPDU on port 17, which is assigned to VLAN 2, STG 2. Because
switch B has no additional ports participating in STG 2, this BPDU is not
forwarded to any additional ports and Switch B remains the designated root.
• VLAN 3 Participation
For VLAN 3, Switch A or Switch C may be the root bridge. If Switch A is the root
bridge for VLAN 3, STG 3, then Switch A transmits the BPDU from port 18.
Switch C receives this BPDU on port 8 and is identified as participating in
VLAN 3, STG 3. Since Switch C has no additional ports participating in STG 3,
this BPDU is not forwarded to any additional ports and Switch A remains the
designated root.
© Copyright IBM Corp. 2014 Chapter 11: Spanning Tree Protocols 143
Configuring Multiple STGs
This configuration shows how to configure the three instances of STGs on the
switches A, B, C, and D illustrated in Figure 13 on page 143.
Because VASA is enabled by default, each new VLAN is automatically assigned its
own STG. However, for this configuration example, some VLANs are explicitly
reassigned to other STGs.
1. Set the Spanning Tree mode on each switch to PVRST.
Note: PVRST is the default mode on the EN2092. This step is not required
unless the STP mode has been previously changed, and is shown here
merely as an example of manual configuration.
2. Configure the following on Switch A:
3. Enable VLAN 2 and VLAN 3.
EN 2092(config)# vlan 2
EN 2092(config-vlan)# exit
EN 2092(config)# vlan 3
EN 2092(config-vlan)# exit
EN 2092(config)# vlan 2
EN 2092(config-vlan)# stg 2
EN 2092(config-vlan)# exit
EN 2092(config)# interface port 8
EN 2092(config-if)# switchport mode trunk
EN 2092(config-if)# switchport trunk allowed vlan add 2
EN 2092(config-if)# exit
EN 2092(config)# vlan 3
EN 2092(config-vlan)# stg 3
EN 2092(config-vlan)# exit
EN 2092(config)# interface port 8
EN 2092(config-if)# switchport mode trunk
EN 2092(config-if)# switchport trunk allowed vlan add 3
EN 2092(config-if)# exit
Switch D does not require any special configuration for multiple Spanning Trees.
Switch D uses default STG 1 only.
© Copyright IBM Corp. 2014 Chapter 11: Spanning Tree Protocols 145
Rapid Spanning Tree Protocol
RSTP provides rapid convergence of the Spanning Tree and provides the fast
re-configuration critical for networks carrying delay-sensitive traffic such as voice
and video. RSTP significantly reduces the time to reconfigure the active topology of
the network when changes occur to the physical topology or its configuration
parameters. RSTP reduces the bridged-LAN topology to a single Spanning Tree.
RSTP was originally defined in IEEE 802.1w (2001) and was later incorporated into
IEEE 802.1D (2004), superseding the original STP standard.
RSTP parameters apply only to Spanning Tree Group (STG) 1. The PVRST mode
STGs 2-128 are not used when the switch is placed in RSTP mode.
RSTP is compatible with devices that run IEEE 802.1D (1998) Spanning Tree
Protocol. If the switch detects IEEE 802.1D (1998) BPDUs, it responds with IEEE
802.1D (1998)-compatible data units. RSTP is not compatible with Per-VLAN Rapid
Spanning Tree (PVRST) protocol.
Note: In RSTP mode, Spanning Tree for the management ports is turned off by
default.
Port States
RSTP port state controls are the same as for PVRST: discarding, learning,
and forwarding.
Due to the sequence involved in these STP states, considerable delays may occur
while paths are being resolved. To mitigate delays, ports defined as edge ports
(“Port Type and Link Type” on page 151) may bypass the discarding and
learning states, and enter directly into the forwarding state.
MSTP allows frames assigned to different VLANs to follow separate paths, with
each path based on an independent Spanning Tree instance. This approach
provides multiple forwarding paths for data traffic, thereby enabling load-balancing,
and reducing the number of Spanning Tree instances required to support a large
number of VLANs.
MSTP Region
A group of interconnected bridges that share the same attributes is called an MST
region. Each bridge within the region must share the following attributes:
• Alphanumeric name
• Revision number
• VLAN-to STG mapping scheme
MSTP provides rapid re-configuration, scalability and control due to the support of
regions, and multiple Spanning-Tree instances support within each region.
CIST allows the MSTP region to act as a virtual bridge to other bridges outside of
the region, and provides a single Spanning-Tree instance to interact with them.
CIST port configuration includes Hello time, Edge port enable/disable, and Link
Type. These parameters do not affect Spanning Tree Groups 1–32. They apply only
when the CIST is used.
© Copyright IBM Corp. 2014 Chapter 11: Spanning Tree Protocols 147
MSTP Configuration Guidelines
This section provides important information about configuring Multiple Spanning
Tree Groups:
• When MSTP is turned on, the switch automatically moves management VLAN
4095 to the CIST. When MSTP is turned off, the switch moves VLAN 4095 from
the CIST to Spanning Tree Group 128.
• When you enable MSTP, you must configure the Region Name. A default version
number of 0 is configured automatically.
• Each bridge in the region must have the same name, version number, and VLAN
mapping.
This configuration shows how to configure MSTP Groups on the switch, as shown in
Figure 14.
Figure 14. Implementing Multiple Spanning Tree Groups
Enterprise Enterprise
Routing Switch Routing Switch
MSTP Group 1 MSTP Group 2
Root Root
This example shows how multiple Spanning Trees can provide redundancy without
wasting any uplink ports. In this example, the server ports are split between two
separate VLANs. Both VLANs belong to two different MSTP groups. The Spanning
Tree priority values are configured so that each routing switch is the root for a
different MSTP instance. All of the uplinks are active, with each uplink port backing
up the other.
1. Configure port membership and define the STGs for VLAN 1. Enable tagging
on uplink ports that share VLANs. Port 19 and port 20 connect to the Enterprise
Routing switches.
© Copyright IBM Corp. 2014 Chapter 11: Spanning Tree Protocols 149
3. Map VLANs to MSTP instances:
4. Add server ports 1 and 2 to VLAN 1. Add uplink ports 19 and port 20 to VLAN 1.
5. Configure port membership and define the STGs for VLAN 2. Add server
ports 3, 4, and 5 to VLAN 2. Assign VLAN 2 to STG 2.
Edge ports send BPDUs to upstream STP devices like normal STP ports, but should
not receive BPDUs. If a port with edge enabled does receive a BPDU, it
immediately begins working as a normal (non-edge) port, and participates fully in
Spanning Tree.
Link Type
The link type determines how the port behaves in regard to Rapid Spanning Tree.
Use the following commands to define the link type for the port:
© Copyright IBM Corp. 2014 Chapter 11: Spanning Tree Protocols 151
152 EN2092 1Gb Ethernet Scalable Switch: Application Guide
Chapter 12. Quality of Service
Quality of Service (QoS) features allow you to allocate network resources to
mission-critical applications at the expense of applications that are less sensitive to
such factors as time delays or network congestion. You can configure your network
to prioritize specific types of traffic, ensuring that each type receives the appropriate
QoS level.
QoS Overview
QoS helps you allocate guaranteed bandwidth to critical applications, and limit
bandwidth for less critical applications. Applications such as video and voice must
have a certain amount of bandwidth to work correctly; using QoS, you can provide
that bandwidth when necessary. Also, you can put a high priority on applications
that are sensitive to timing out or those that cannot tolerate delay, assigning that
traffic to a high-priority queue.
By assigning QoS levels to traffic flows on your network, you can ensure that
network resources are allocated where they are needed most. QoS features allow
you to prioritize network traffic, thereby providing better service for selected
applications.
Figure 15 on page 153 shows the basic QoS model used by the EN2092 1Gb
Ethernet Scalable Switch (EN2092).
Figure 15. QoS Model
The EN2092 uses the Differentiated Services (DiffServ) architecture to provide QoS
functions. DiffServ is described in IETF RFC 2474 and RFC 2475.
With DiffServ, you can establish policies for directing traffic. A policy is a
traffic-controlling mechanism that monitors the characteristics of the traffic (for
example, its source, destination, and protocol) and performs a controlling action on
the traffic when certain characteristics are matched.
The EN2092 allows you to classify packets based on various parameters. For
example:
• Ethernet—source MAC, destination MAC, VLAN number/mask, Ethernet type,
priority
• IPv4—source IP address/mask, destination address/mask, type of service, IP
protocol number
• IPv6—source IP address/prefix, destination address/prefix, next header, flow
label, traffic class
• TCP/UPD—source port, destination port, TCP flag
• Packet format—Ethernet format, tagging format, IPv4, IPv6
• Egress port
Actions taken by an ACL are called In-Profile actions. You can configure additional
In-Profile and Out-of-Profile actions on a port. Data traffic can be metered, and
re-marked to ensure that the traffic flow provides certain levels of service in terms of
bandwidth for different types of network traffic.
Using meters, you set a Committed Rate in Kbps (1000 bits per second in each
Kbps). All traffic within this Committed Rate is In-Profile. Additionally, you can set a
Maximum Burst Size that specifies an allowed data burst larger than the Committed
Rate for a brief period. These parameters define the In-Profile traffic.
Meters keep the sorted packets within certain parameters. You can configure a
meter on an ACL, and perform actions on metered traffic, such as packet
re-marking.
Re-Marking
Re-marking allows for the treatment of packets to be reset based on new network
specifications or desired levels of service. You can configure the ACL to re-mark a
packet as follows:
• Change the DSCP value of a packet, used to specify the service level traffic
should receive.
• Change the 802.1p priority of a packet.
7 6 5 4 3 2 1 0
The EN2092 can perform the following actions to the DSCP:
• Read the DSCP value of ingress packets
• Re-mark the DSCP value to a new value
• Map the DSCP value to an 802.1p priority
Once the DSCP value is marked, the EN2092 can use it to direct traffic prioritization.
The EN2092 default settings are based on the following standard PHBs, as defined
in the IEEE standards:
• Expedited Forwarding (EF)—This PHB has the highest egress priority and
lowest drop precedence level. EF traffic is forwarded ahead of all other traffic.
EF PHB is described in RFC 2598.
• Assured Forwarding (AF)—This PHB contains four service levels, each with a
different drop precedence, as shown below. Routers use drop precedence to
determine which packets to discard last when the network becomes congested.
AF PHB is described in RFC 2597.
Drop
Precedence Class 1 Class 2 Class 3 Class 4
• Class Selector (CS)—This PHB has eight priority classes, with CS7 repre-
senting the highest priority, and CS0 representing the lowest priority, as shown
below. CS PHB is described in RFC 2474.
Highest CS7 56
CS6 48
CS5 40
CS4 32
CS3 24
CS2 16
CS1 8
Lowest CS0 0
Critical CS7 7
Then you must enable DSCP re-marking on any port that you wish to perform this
function.
Note: If an ACL meter is configured for DSCP re-marking, the meter function takes
precedence over QoS re-marking.
The following example includes the basic steps for re-marking DSCP value and
mapping DSCP value to 802.1p.
1. Turn DSCP re-marking on globally, and define the DSCP-DSCP-802.1p
mapping. You can use the default mapping.
Example 2
The following example assigns strict priority to VoIP traffic and a lower priority to all
other traffic.
1. Create an ACL to re-mark DSCP value and COS queue for all VoIP packets.
IBM Networking OS provides Quality of Service functions based on the priority bits
in a packet’s VLAN header. (The priority bits are defined by the 802.1p standard
within the IEEE 802.1q VLAN header.) The 802.1p bits, if present in the packet,
specify the priority that should be given to packets during forwarding. Packets with a
numerically higher (non-zero) priority are given forwarding preference over packets
with lower priority bit value.
The IEEE 802.1p standard uses eight levels of priority (0-7). Priority 7 is assigned to
highest priority network traffic, such as OSPF or RIP routing table updates, priorities
5-6 are assigned to delay-sensitive applications such as voice and video, and lower
priorities are assigned to standard applications. A value of 0 (zero) indicates a “best
effort” traffic prioritization, and this is the default when traffic priority has not been
configured on your network. The EN2092 can filter packets based on the 802.1p
values, and it can assign or overwrite the 802.1p value in the packet.
Figure 17. Layer 2 802.1q/802.1p VLAN Tagged Packet
7 6 5 4 3 2 1 0 7 6 5 4 3 2 1 0
Egress packets are placed in a COS queue based on the priority value, and
scheduled for transmission based on the scheduling weight of the COS queue.
To configure a port’s default 802.1p priority value, use the following commands.
See “Queuing and Scheduling” on page 163 for details on scheduling weights.
EN 2092(config)# qos transmit-queue mapping <802.1p priority value (0-7)> <COS queue (0-7)>
To set the COS queue scheduling weight, use the following command.
The scheduling weight can be set from 0 to 15. Weight values from 1 to 15 set the
queue to use weighted round-robin (WRR) scheduling, which distributes larger
numbers of packets to queues with the highest weight values. For distribution
purposes, each packet is counted the same, regardless of the packet’s size.
A scheduling weight of 0 (zero) indicates strict priority. Traffic in strict priority queue
has precedence over other all queues. If more than one queue is assigned a weight
of 0, the strict queue with highest queue number will be served first. Once all traffic
in strict queues is delivered, any remaining bandwidth will be allocated to the WRR
queues, divided according to their weight values.
Note: Use caution when assigning strict scheduling to queues. Heavy traffic in
queues assigned with a weight of 0 can starve lower priority queues.
For a scheduling method that uses a weighted deficit round-robin (WDRR)
algorithm, distributing packets with an awareness of packet size, see “Enhanced
Transmission Selection” on page 302.
You can adjust the logging interval between 0 and 30 minutes using the following
command:
Setting the logging interval to 0 will log packet drops immediately (with up to 1
second delay), and will ignore further drops on the same queue during the next 2
minutes.
• VMready
The switch’s VMready software makes it virtualization aware. Servers that run
hypervisor software with multiple instances of one or more operating systems
can present each as an independent virtual machine (VM). With VMready, the
switch automatically discovers virtual machines (VMs) connected to switch.
For details on this feature, see “VMready” on page 169.
VM Group Types
VEs, as well as internal ports, external ports, static trunks and LACP trunks, can be
placed into VM groups on the switch to define virtual communication boundaries.
Elements in a given VM group are permitted to communicate with each other, while
those in different groups are not. The elements within a VM group automatically
share certain group-level settings.
IBM Networking OS 7.8 supports up to 32 VM groups. There are two different types:
• Local VM groups are maintained locally on the switch. Their configuration is not
synchronized with hypervisors.
• Distributed VM groups are automatically synchronized with a virtualization man-
agement server (see “Assigning a vCenter” on page 179).
Local VM Groups
The configuration for local VM groups is maintained on the switch (locally) and is not
directly synchronized with hypervisors. Local VM groups may include only local
elements: local switch ports and trunks, and only those VEs connected to one of the
switch ports or pre-provisioned on the switch.
Local VM groups support limited VE migration: as VMs and other VEs move to
different hypervisors connected to different ports on the switch, the configuration of
their group identity and features moves with them. However, VE migration to and
from more distant hypervisors (those not connected to the EN2092, may require
manual configuration when using local VM groups).
Distributed VM Groups
Distributed VM groups allow configuration profiles to be synchronized between the
EN2092 and associated hypervisors and VEs. This allows VE configuration to be
centralized, and provides for more reliable VE migration across hypervisors.
Using distributed VM groups requires a virtualization management server. The
management server acts as a central point of access to configure and maintain
multiple hypervisors and their VEs (VMs, virtual switches, and so on).
The EN2092 must connect to a virtualization management server before distributed
VM groups can be used. The switch uses this connection to collect configuration
information about associated VEs, and can also automatically push configuration
profiles to the virtualization management server, which in turn configures the
hypervisors and VEs. See “Virtualization Management Servers” on page 179 for
more information.
Creating VM profiles is a two part process. First, the VM profile is created as shown
in the following command on the switch:
Next, the profile must be edited and configured using the following configuration
commands:
For virtual switch bandwidth shaping parameters, average and peak bandwidth are
specified in kilobits per second (a value of 1000 represents 1 Mbps). Burst size is
specified in kilobytes (a value of 1000 represents 1 MB).
Note: The bandwidth shaping parameters in the VM profile are used by the
hypervisor virtual switch software. To set bandwidth policies for individual
VEs, see “VM Policy Bandwidth Control” on page 183.
EN 2092(config)# virt vmgroup <VM group number> profile <VM profile name>
Only one VM profile can be assigned to a given distributed VM group. To change the
VM profile, the old one must first be removed.
Note: The VM profile can be added only to an empty VM group (one that has no
VLAN, VMs, or port members). Any VM group number currently configured
for a local VM group (see “Local VM Groups” on page 170) cannot be
converted and must be deleted before it can be used for a distributed VM
group.
For VM membership changes, hypervisors modify their internal virtual switch port
groups, adding or removing internal port memberships to enforce the boundaries
defined by the distributed VM groups. Virtual switch port groups created in this
fashion can be identified in the virtual management server by the name of the VM
profile, formatted as follows:
IBM_<VM profile name>
(or)
IBM_<VM profile name>_<index number> (for vDS profiles)
The VMcheck solution addresses these security concerns by validating the MAC
addresses assigned to VMs. The switch periodically sends hello messages on
server ports. These messages include the switch identifier and port number. The
hypervisor listens to these messages on physical NICs and stores the information,
which can be retrieved using the VMware Infrastructure Application Programming
Interface (VI API). This information is used to validate VM MAC addresses. Two
modes of validation are available: Basic and Advanced.
Use the following command to select the validation mode or to disable validation:
Basic Validation
The switch, using the hello message information, identifies a hypervisor port. If the
hypervisor port is found in the hello message information, it is deemed to be a
trusted port. Basic validation should be enabled when:
• A VM is added to a VM group, and the MAC address of the VM interface is in the
Layer 2 table of the switch.
• A VM interface that belongs to a VM group experiences a “source miss” i.e. is not
able to learn new MAC address.
• A trusted port goes down. Port validation must be performed to ensure that the
port does not get connected to an untrusted source when it comes back up.
Use the following command to set the action to be performed if the switch is unable
to validate the VM MAC address:
When the switch receives frames from a VM, it first validates the VM interface based
on the VM MAC address, VM Universally Unique Identifier (UUID), Switch port, and
Switch ID available in the hello message information. Only if all the four parameters
are matched, the VM MAC address is considered valid.
In advanced validation mode, if the VM MAC address validation fails, an ACL can be
created to drop the traffic received from the VM MAC address on the switch port.
Use the following command to specify the number of ACLs to be used for dropping
traffic:
Use the following command to set the action to be performed if the switch is unable
to validate the VM MAC address:
Command Description
Distributed port groups on a vDS are available to all hypervisors that are connected
to the vDS. Members of a single distributed port group can communicate with each
other.
Note: vDS works with ESX 4.0 or higher versions.
EN 2092# virt vmware dvswitch add <datacenter name> <dvSwitch name> [<dvSwitch-version>]
Prerequisites
Before adding a vDS on the EN2092, ensure the following:
• VMware vCenter is fully installed and configured and includes a “bladevm”
administration account and a valid SSL certificate.
• A virtual distributed switch instance has been created on the vCenter. The vDS
version must be higher or the same as the hypervisor version on the hosts.
• At least two hypervisors are configured.
Guidelines
Before migrating VMs to a vDS, consider the following:
• At any one time, a VM NIC can be associated with only one virtual switch: to the
hypervisor’s virtual switch, or to the vDS.
• Management connection to the server must be ensured during the migration.
The connection is via the Service Console or the Kernel/Management Interface.
• The vDS configuration and migration can be viewed in vCenter at the following
locations:
– vDS: Home> Inventory > Networking
– vDS Hosts: Home > Inventory > Networking > vDS > Hosts
Note: These changes will not be displayed in the running configuration on the
EN2092.
Assigning a vCenter
Assigning a vCenter to the switch requires the following:
• The vCenter must have a valid IPv4 address which is accessible to the switch
(IPv6 addressing is not supported for the vCenter).
• A user account must be configured on the vCenter to provide access for the
switch. The account must have (at a minimum) the following vCenter user privi-
leges:
– Network
– Host Network > Configuration
– Virtual Machine > Modify Device Settings
Once vCenter requirements are met, the following configuration command can be
used on the EN2092 to associate the vCenter with the switch:
This command specifies the IPv4 address and account username that the switch
will use for vCenter access. Once entered, the administrator will be prompted to
enter the password for the specified vCenter account.
The noauth option causes to the switch to ignores SSL certificate authentication.
This is required when no authoritative SSL certificate is installed on the vCenter.
Note: By default, the vCenter includes only a self-signed SSL certificate. If using
the default certificate, the noauth option is required.
Once the vCenter configuration has been applied on the switch, the EN2092 will
connect to the vCenter to collect VE information.
vCenter Scans
Once the vCenter is assigned, the switch will periodically scan the vCenter to collect
basic information about all the VEs in the datacenter, and more detailed information
about the local VEs that the switch has discovered attached to its own ports.
The switch completes a vCenter scan approximately every two minutes. Any major
changes made through the vCenter may take up to two minutes to be reflected on
the switch. However, you can force an immediate scan of the vCenter by using one
of the following ISCLI privileged EXEC commands:
-or-
EN 2092# show virt vm -v -r (Scan vCenter and display result)
Exporting Profiles
VM profiles for discovered VEs in distributed VM groups are automatically
synchronized with the virtual management server and the appropriate hypervisors.
However, VM profiles can also be manually exported to specific hosts before
individual VEs are defined on them.
By exporting VM profiles to a specific host, IBM port groups will be available to the
host’s internal virtual switches so that new VMs may be configured to use them.
VM migration requires that the target hypervisor includes all the virtual switch port
groups to which the VM connects on the source hypervisor. The VM profile export
feature can be used to distribute the associated port groups to all the potential hosts
for a given VM.
A VM profile can be exported to a host using the following ISCLI privileged EXEC
command:
EN 2092# virt vmware export <VM profile name> <host list> <virtual switch name>
The host list can include one or more target hosts, specified by host name, IPv4
address, or UUID, with each list item separated by a space. If the virtual switch
name is omitted, the administrator will be prompted to select one from a list or to
enter a new virtual switch name.
Once executed, the requisite port group will be created on the specified virtual
switch. If the specified virtual switch does not exist on the target host, it will be
created with default properties, but with no uplink connection to a physical NIC (the
administrator must assign uplinks using VMware management tools.
Pre-Provisioning VEs
VEs may be manually added to VM groups in advance of being detected on the
switch ports. By pre-provisioning the MAC address of VEs that are not yet active,
the switch will be able to later recognize the VE when it becomes active on a switch
port, and immediately assign the proper VM group properties without further
configuration.
Undiscovered VEs are added to or removed from VM groups using the following
configuration commands:
EN 2092(config)# [no] virt vmgroup <VM group number> vm <VE MAC address>
VLAN Maps
A VLAN map (VMAP) is a type of Access Control List (ACL) that is applied to a
VLAN or VM group rather than to a switch port as with regular ACLs (see “Access
Control Lists” on page 89). In a virtualized environment, VMAPs allow you to create
traffic filtering and metering policies that are associated with a VM group VLAN,
allowing filters to follow VMs as they migrate between hypervisors.
VMAPs are configured using the following ISCLI configuration command path:
IBM Networking OS 7.8 supports up to 128 VMAPs. Individual VMAP filters are
configured in the same fashion as regular ACLs, except that VLANs cannot be
specified as a filtering criteria (unnecessary, since VMAPs are assigned to a specific
VLAN or associated with a VM group VLAN).
Note: Each VMAP can be assigned to only one VLAN or VM group. However, each
VLAN or VM group may have multiple VMAPs assigned to it.
The optional intports or extports parameter can be specified to apply the
action (to add or remove the VMAP) for either the internal ports or external ports
only. If omitted, the operation will be applied to all ports in the associated VLAN or
VM group.
Note: VMAPs have a lower priority than port-based ACLs. If both an ACL and a
VMAP match a particular packet, both filter actions will be applied as long as
there is no conflict. In the event of a conflict, the port ACL will take priority,
though switch statistics will count matches for both the ACL and VMAP.
Bandwidth allocation can be defined either for transmit (TX) traffic or receive (RX)
traffic. Because bandwidth allocation is specified from the perspective of the VE, the
switch command for TX Rate Control (txrate) sets the data rate to be sent from
the VM to the switch, and the RX Rate Control (rxrate) sets the data rate to be
received by the VM from the switch.
The committed rate is specified in multiples of 64 kbps, from 64 to 10,000,000. The
maximum burst rate is specified as 32, 64, 128, 256, 1024, 2048, or 4096 kb. If both
the committed rate and burst are set to 0, bandwidth control in that direction (TX or
RX) will be disabled.
When txrate is specified, the switch automatically selects an available ACL for
internal use with bandwidth control. Optionally, if automatic ACL selection is not
desired, a specific ACL may be selected. If there are no unassigned ACLs available,
txrate cannot be configured.
VM Profile Bandwidth Shaping (see “VM Profiles” on page 173) is configured per
VM group and is enforced on the server by a virtual switch in the hypervisor.
Shaping is unidirectional and limits traffic transmitted from the virtual switch to the
EN2092. Shaping is performed prior to transmit VM Policy Bandwidth Control. If the
egress traffic for a virtual switch port group exceeds shaping parameters, the traffic
is dropped by the virtual switch in the hypervisor. Shaping uses server CPU
resources, but prevents extra traffic from consuming bandwidth between the server
and the EN2092.
VM Policy Bandwidth Control is configured per VE, and can be set independently for
transmit and receive traffic. Bandwidth policies are enforced by the EN2092. VE
traffic that exceeds configured levels is dropped by the switch upon ingress (for
txrate) or before egress (for rxrate). Setting txrate uses ACL resources on
the switch.
Local VE Information
A concise list of local VEs and pre-provisioned VEs is available with the following
ISCLI privileged EXEC command:
Number of entries: 8
* indicates VMware ESX Service Console Interface
+ indicates VMware ESX/ESXi VMKernel or Management Interface
Note: The Index numbers shown in the VE information displays can be used to
specify a particular VE in configuration commands.
--
12 of 12 entries printed
* indicates VMware ESX Service Console Interface
+ indicates VMware ESX/ESXi VMkernel or Management Interface
To view additional detail regarding any specific VE, see “vCenter VE Details” on
page 187).
If a vCenter is available, the following ISCLI privileged EXEC command displays the
name and UUID of all VMware hosts, providing an essential overview of the data
center:
vCenter VEs
When prompted, enter the user password that the switch must use for access to
the vCenter.
3. Create the VM profile.
When VMs are added, the server ports on which they appear are automatically
added to the VM group. In this example, there is no need to manually add ports
and .
5. If necessary, enable VLAN tagging for the VM group:
Note: If the VM group contains ports which also exist in other VM groups, tagging
should be enabled in both VM groups. In this example configuration, no ports
exist in more than VM group.
To avoid the ARP resolution, you must create a static ARP entry with multicast MAC
address. You must also specify the list of ports through which the multicast packet
must be sent out from the gateway or Layer 2/Layer 3 node.
With these configurations, a packet with a unicast IPv4 destination address and
multicast MAC address can be sent out as per the multicast MAC address
configuration. NLB maps the unicast IP address and multicast MAC address as
follows:
Cluster multicast MAC address: 03-BF-W-X-Y-Z; where W.X.Y.Z is the
cluster unicast IP address.
You must configure the static multicast ARP entry only at the Layer 2/Layer 3 or
Router node, and not at the Layer 2-only node.
• Configure the static multicast ARP entry: Multicast ARP static entries should be
configured without specifying the list of ports to be used. Use the following
command:
© Copyright IBM Corp. 2014 Chapter 15: Static Multicast ARP 189
Configuration Example
Consider the following example:
• Cluster unicast IP address: 10.10.10.42
• Cluster multicast MAC address: 03:bf:0A:0A:0A:2A
• Cluster VLAN: 42
• List of individual or port trunks to which traffic should be forwarded: 54 and 56
Following are the steps to configure the static multicast ARP based on the given
example:
1. Configure the static multicast FDB entry.
EN 2092(config)# mac-address-table multicast 03:bf:0A:0A:0A:2A 42
54,56
Limitations
• You must configure the ARP only in the Layer 2/Layer 3 node or the router node
but not in the Layer 2-only node. IBM Networking OS cannot validate if the node
is Layer 2-only.
• The packet is always forwarded to all the ports as specified in the Multicast MAC
address configuration. If VLAN membership changes for the ports, you must
update this static multicast MAC entry. If not, the ports, whose membership has
changed, will report discards.
• ACLs take precedence over static multicast ARP. If an ACL is configured to
match and permit ingress of unicast traffic, the traffic will be forwarded based on
the ACL rule, and the static multicast ARP will be ignored.
Each individual SPAR requires exactly one uplink, which can be a port, a port
channel, or an LACP group. Limiting SPAR connectivity to one external uplink
prevents the creation of loops.
SPAR operates as a Layer 2 broadcast network. Hosts on the same VLAN, attached
to a SPAR, can communicate with each other and with the upstream switch. Hosts
on the same VLAN, but attached to different SPARs, communicate via the upstream
switch.
If a VLAN is defined on multiple SPARs, the egress port mask is used to prevent
communication between the SPARs in the same local domain VLAN. Since port
membership of each SPAR is unique, the egress port mask ensures that different
SPAR ports in the same local domain VLAN do not communicate with each other.
In local domain processing, all SPAR ports must have the following settings:
• Tagging/Trunk mode must be enabled.
• Ingress VLAN tagging is disabled on all SPAR ports.
• PVID/Native VLAN is based on any VLAN defined in SPAR.
SPAR provides single or multiple VLAN connectivity through a single uplink port or
LAG (static or LACP). VLAN definition within the SPAR domain is not required.
Although the uplink can be shared by multiple networks using the pass-through
domain, SPAR will not be server-VLAN aware. Hence, multiple VLAN traffic will be
mixed together in a single broadcast domain, that is, broadcast traffic on different
VLANs from the upstream network will reach all servers attached to the SPAR
pass-through domain. The servers drop the packets if they do not belong to the
desired VLAN. The pass-through implementation uses ingress VLAN tagging, that
is, tagpvid-ingress is enabled on all SPAR ports.
In pass-through domain processing mode, all SPAR ports must have the following
settings:
• PVID/Native VLAN tagging is disabled.
• Ingress VLAN tagging is enabled on all SPAR ports.
• PVID/Native VLAN is based on the SPAR DVLAN.
Limitations
The following limitations apply:
• UFP and SPAR cannot be configured together.
• Trunks must first be configured for SPAR before they can be used. Static or Link
Aggregation Control Protocol (LACP) trunks created on the global switch cannot
reference any SPAR ports. Use the commands in the following menus to define
trunks in the SPAR context:
EN 2092(config)# portchannel ?
A VLAN assigned to a SPAR cannot be used for any other switch application.
Similarly, VLAN used by any other switch application cannot be assigned to a
SPAR.
EN 2092(config)# spar 1
6. Enable SPAR 1.
EN 2092(config-spar)# enable
EN 2092(config)# spar 2
The following steps create three local domains: VLAN, 10, 20, and 30
7. Create local domain 1, assign VLAN 10, and specify the SPAR ports that are
members of the that VLAN.
8. Create local domain 2, assign VLAN 20, and specify the SPAR ports that are
members of the that VLAN.
9. Create local domain 3, assign VLAN 30, and specify the SPAR ports that are
members of the that VLAN.
EN 2092(config-spar)# enable
IP Routing Benefits
The EN2092 uses a combination of configurable IP switch interfaces and IP routing
options. The switch IP routing capabilities provide the following benefits:
• Connects the server IP subnets to the rest of the backbone network.
• Provides the ability to route IP traffic between multiple Virtual Local Area
Networks (VLANs) configured on the switch.
The combination of faster routing and switching in a single device provides another
service—it allows you to build versatile topologies that account for legacy
configurations.
This is a situation that switching alone cannot cure. Instead, the router is flooded
with cross-subnet communication. This compromises efficiency in two ways:
• Routers can be slower than switches. The cross-subnet side trip from the switch
to the router and back again adds two hops for the data, slowing throughput
considerably.
• Traffic to the router increases, increasing congestion.
Even if every end-station could be moved to better logical subnets (a daunting task),
competition for access to common server pools on different subnets still burdens the
routers.
10 Gbps
Server Subnet:
Primary Default 206.30.15.2-254
IF#2 IF#3
Router: 205.21.17.1
IF#4
IF#1
10 Gbps
Secondary Default
Router: 205.21.17.2
The EN2092 connects the Gigabit Ethernet and Fast Ethernet trunks from various
switched subnets throughout one building. Common servers are placed on another
subnet attached to the switch. A primary and backup router are attached to the
switch on yet another subnet.
3. Set each server and workstation’s default gateway to the appropriate switch IP
interface (the one in the same subnet as the server or workstation).
Examine the resulting information. If any settings are incorrect, make the
appropriate changes.
EN 2092(config)# vlan 1
EN 2092(config-vlan)# exit
EN 2092(config)# interface port ext1,ext2 (Add ports to VLAN 1)
EN 2092(config-if)# switchport mode trunk
EN 2092(config-if)# switchport trunk allowed vlan add 1
EN 2092(config-if)# exit
EN 2092(config)# vlan 2
EN 2092(config-vlan)# exit
EN 2092(config)# interface port ext3,ext4 (Add ports to VLAN 2)
EN 2092(config-if)# switchport mode trunk
EN 2092(config-if)# switchport trunk allowed vlan add 2
EN 2092(config-if)# exit
EN 2092(config)# vlan 3
EN 2092(config-vlan)# exit
EN 2092(config)# interface port inet5a,int6a (Add ports to VLAN 3)
EN 2092(config-if)# switchport mode trunk
EN 2092(config-if)# switchport trunk allowed vlan add 3
EN 2092(config-if)# exit
Each time you add a port to a VLAN, you may get the following prompt:
Examine the resulting information. If any settings are incorrect, make the
appropriate changes.
Boston Raleigh
20.1.1.1 10.1.1.2
The use of two servers provide failover redundancy. The client request is forwarded
to both BOOTP servers configured on the switch. However, no health checking is
supported.
Generally, you should configure the command on the switch IP interface that is
closest to the client, so that the BOOTP server knows from which IP subnet the
newly allocated IP address should come.
Use the following commands to configure the switch as a BOOTP relay agent:
DHCP relay agent eliminates the need to have DHCP/BOOTP servers on every
subnet. It allows the administrator to reduce the number of DHCP servers deployed
on the network and to centralize them. Without the DHCP relay agent, there must be
at least one DHCP server deployed at each subnet that has hosts needing to
perform the DHCP request.
DHCP defines the methods through which clients can be assigned an IP address for
a finite lease period and allowing reassignment of the IP address to another client
later. Additionally, DHCP provides the mechanism for a client to gather other IP
configuration parameters it needs to operate in the TCP/IP network.
In the DHCP environment, the EN2092 acts as a relay agent. The DHCP relay
feature enables the switch to forward a client request for an IP address to two
BOOTP servers with IP addresses that have been configured on the switch.
When a switch receives a UDP broadcast on port 67 from a DHCP client requesting
an IP address, the switch acts as a proxy for the client, replacing the client source IP
(SIP) and destination IP (DIP) addresses. The request is then forwarded as a UDP
Unicast MAC layer message to two BOOTP servers whose IP addresses are
configured on the switch. The servers respond as a UDP Unicast message back to
the switch, with the default gateway and IP address for the client. The destination IP
address in the server response represents the interface address on the switch that
received the client request. This interface address tells the switch on which VLAN to
send the server response to the client.
Boston
GbESM
20.1.1.1
Use the following commands to configure the switch as a DHCP relay agent:
This chapter describes the basic configuration of IPv6 addresses and how to
manage the switch via IPv6 host management.
Unlike IPv4, a subnet mask is not used for IPv6 addresses. IPv6 uses the subnet
prefix as the network identifier. The prefix is the part of the address that indicates the
bits that have fixed values or are the bits of the subnet prefix. An IPv6 prefix is
written in address/prefix-length notation. For example, in the following address, 64
is the network prefix:
21DA:D300:0000:2F3C::/64
© Copyright IBM Corp. 2014 Chapter 18: Internet Protocol Version 6 213
IPv6 Address Types
IPv6 supports three types of addresses: unicast (one-to-one), multicast
(one-to-many), and anycast (one-to-nearest). Multicast addresses replace the use
of broadcast addresses.
Unicast Address
Multicast
The following well-known multicast addresses are pre-defined. The group IDs
defined in this section are defined for explicit scope values, as follows:
FF00:::::::0 through FF0F:::::::0
Anycast
Packets sent to an anycast address or list of addresses are delivered to the nearest
interface identified by that address. Anycast is a communication between a single
sender and a list of addresses.
Anycast addresses are allocated from the unicast address space, using any of the
defined unicast address formats. Thus, anycast addresses are syntactically
indistinguishable from unicast addresses. When a unicast address is assigned to
more than one interface, thus turning it into an anycast address, the nodes to which
the address is assigned must be explicitly configured to know that it is an anycast
address.
IPv6 Interfaces
Each IPv6 interface supports multiple IPv6 addresses. You can manually configure
up to two IPv6 addresses for each interface, or you can allow the switch to use
stateless autoconfiguration. By default, the switch automatically configures the IPv6
address of its management interface.
You can manually configure two IPv6 addresses for each interface, as follows:
• Initial IPv6 address is a global unicast or anycast address .
Note that you cannot configure both addresses as anycast. If you configure an
anycast address on the interface you must also configure a global unicast
address on that interface.
• Second IPv6 address can be a unicast or anycast address .
Each IPv6 interface can belong to only one VLAN. Each VLAN can support only one
IPv6 interface. Each VLAN can support multiple IPv4 interfaces.
© Copyright IBM Corp. 2014 Chapter 18: Internet Protocol Version 6 215
Interface 127 is reserved for IPv6 host support. This interface is included in
management VLAN 4095. Use the following commands to configure the IPv6
gateway:
The switch uses Neighbor Discovery protocol (ND) to gather information about other
router and host nodes, including the IPv6 addresses. Host nodes use ND to
configure their interfaces and perform health detection. ND allows each node to
determine the link-layer addresses of neighboring nodes, and to keep track of each
neighbor’s information. A neighboring node is a host or a router that is linked directly
to the switch. The switch supports Neighbor Discovery as described in RFC 4861.
To add or remove entries in the static neighbor cache, use the following command
path:
© Copyright IBM Corp. 2014 Chapter 18: Internet Protocol Version 6 217
Host vs. Router
Each IPv6 interface can be configured as a router node or a host node, as follows:
• A router node’s IP address is configured manually. Router nodes can send
Router Advertisements.
• A host node’s IP address is autoconfigured. Host nodes listen for Router
Advertisements that convey information about devices on the network.
Note: When IP forwarding is turned on all IPv6 interfaces configured on the switch
can forward packets.
You can configure each IPv6 interface as either a host node or a router node. You
can manually assign an IPv6 address to an interface in host mode, or the interface
can be assigned an IPv6 address by an upstream router, using information from
router advertisements to perform stateless auto-configuration.
Supported Applications
The following applications have been enhanced to provide IPv6 support.
• Ping
The ping command supports IPv6 addresses. Use the following format to ping
an IPv6 address:
ping <host name>|<IPv6 address> [-n <tries (0-4294967295)>]
[-w <msec delay (0-4294967295)>] [-l <length (0/32-65500/2080)>]
[-s <IP source>] [-v <TOS (0-255)>] [-f] [-t]
To ping a link-local address (begins with FE80), provide an interface index, as
follows:
ping <IPv6 address>%<Interface index> [-n <tries (0-4294967295)>]
[-w <msec delay (0-4294967295)>] [-l <length (0/32-65500/2080)>]
[-s <IP source>] [-v <TOS (0-255)>] [-f] [-t]
• Traceroute
The traceroute command supports IPv6 addresses (but not link-local
addresses).
Use the following format to perform a traceroute to an IPv6 address:
traceroute <host name>| <IPv6 address> [<max-hops (1-32)>
[<msec delay (1-4294967295)>]]
If you set the request version to v4, the DNS application sends an A query first,
to resolve the hostname with an IPv4 address. If no A record is found for that
hostname (no IPv4 address for that hostname) an AAAA query is sent to resolve
the hostname with a IPv6 address.
If you set the request version to v6, the DNS application sends an AAAA query
first, to resolve the hostname with an IPv6 address. If no AAAA record is found
for that hostname (no IPv6 address for that hostname) an A query is sent to
resolve the hostname with an IPv4 address.
© Copyright IBM Corp. 2014 Chapter 18: Internet Protocol Version 6 219
Configuration Guidelines
When you configure an interface for IPv6, consider the following guidelines:
• Support for subnet router anycast addresses is not available.
• Interface 127 are reserved for IPv6 management.
• A single interface can accept either IPv4 or IPv6 addresses, but not both IPv4
and IPv6 addresses.
• A single interface can accept multiple IPv6 addresses.
• A single interface can accept only one IPv4 address.
• If you change the IPv6 address of a configured interface to an IPv4 address, all
IPv6 settings are deleted.
• A single VLAN can support only one IPv6 interface.
• Health checks are not supported for IPv6 gateways.
• IPv6 interfaces support Path MTU Discovery. The CPU’s MTU is fixed at 1500
bytes.
• Support for jumbo frames (1,500 to 9,216 byte MTUs) is limited. Any jumbo
frames intended for the CPU must be fragmented by the remote node. The
switch can re-assemble fragmented packets up to 9k. It can also fragment and
transmit jumbo packets received from higher layers.
IPv6 Example 1
The following example uses IPv6 host mode to autoconfigure an IPv6 address for
the interface. By default, the interface is assigned to VLAN 1.
1. Enable IPv6 host mode on an interface.
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip6host
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 3
EN 2092(config-ip-if)# ipv6 address 2001:BA98:7654:BA98:FEDC:1234:ABCD:5214
EN 2092(config-ip-if)# ipv6 prefixlen 64
EN 2092(config-ip-if)# ipv6 seccaddr6 2003::1 32
EN 2092(config-ip-if)# vlan 2
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
The secondary IPv6 address is compressed, and the prefix length is 32.
2. Configure the IPv6 default gateway.
EN 2092(config)# interface ip 3
EN 2092(config-ip-if)# no ipv6 nd suppress-ra
4.
© Copyright IBM Corp. 2014 Chapter 18: Internet Protocol Version 6 221
222 EN2092 1Gb Ethernet Scalable Switch: Application Guide
Chapter 19. Using IPsec with IPv6
Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol
(IP) communications by authenticating and encrypting each IP packet of a
communication session. IPsec also includes protocols for establishing mutual
authentication between agents at the beginning of the session and negotiation of
cryptographic keys to be used during the session.
Since IPsec was implemented in conjunction with IPv6, all implementations of IPv6
must contain IPsec. To support the National Institute of Standards and Technology
(NIST) recommendations for IPv6 implementations, IBM Networking OS IPv6
feature compliance has been extended to include the following IETF RFCs, with an
emphasis on IP Security (IPsec) and Internet Key Exchange version 2, and
authentication/confidentiality for OSPFv3:
• RFC 4301 for IPv6 security
• RFC 4302 for the IPv6 Authentication Header
• RFCs 2404, 2410, 2451, 3602, and 4303 for IPv6 Encapsulating Security Pay-
load (ESP), including NULL encryption, CBC-mode 3DES and AES ciphers,
and HMAC-SHA-1-96.
• RFCs 4306, 4307, 4718, and 4835 for IKEv2 and cryptography
• RFC 4552 for OSPFv3 IPv6 authentication
• RFC 5114 for Diffie-Hellman groups
Note: This implementation of IPsec supports DH groups 1, 2, 5, 14, and 24.
Both ESP and AH rely on security associations. A security association (SA) is the
bundle of algorithms and parameters (such as keys) that encrypt and authenticate a
particular flow in one direction.
The security protocol for the session key is either ESP or AH. Outgoing packets are
labeled with the SA SPI (Security Parameter Index), which the remote device will
use in its verification and decryption process.
Every outgoing IPv6 packet is checked against the IPsec policies in force. For each
outbound packet, after the packet is encrypted, the software compares the packet
size with the MTU size that it either obtains from the default minimum maximum
transmission unit (MTU) size (1500) or from path MTU discovery. If the packet size
is larger than the MTU size, the receiver drops the packet and sends a message
containing the MTU size to the sender. The sender then fragments the packet into
smaller pieces and retransmits them using the correct MTU size.
The maximum traffic load for each IPSec packet is limited to the following:
• IKEv2 SAs: 5
• IPsec SAs: 10 (5 SAs in each direction)
• SPDs: 20 (10 policies in each direction)
© Copyright IBM Corp. 2014 Chapter 19: Using IPsec with IPv6 225
Setting up Authentication
Before you can use IPsec, you need to have key policy authentication in place.
There are two types of key policy authentication:
• Preshared key (default)
The parties agree on a shared, secret key that is used for authentication in an
IPsec policy. During security negotiation, information is encrypted before
transmission by using a session key created by using a Diffie-Hellman
calculation and the shared, secret key. Information is decrypted on the receiving
end using the same key. One IPsec peer authenticates the other peer's packet
by decryption and verification of the hash inside the packet (the hash inside the
packet is a hash of the preshared key). If authentication fails, the packet is
discarded.
• Digital certificate (using RSA algorithms)
The peer being validated must hold a digital certificate signed by a trusted
Certificate Authority and the private key for that digital certificate. The side
performing the authentication only needs a copy of the trusted certificate
authorities digital certificate. During IKEv2 authentication, the side being
validated sends a copy of the digital certificate and a hash value signed using the
private key. The certificate can be either generated or imported.
Note: During the IKEv2 negotiation phase, the digital certificate takes precedence
over the preshared key.
Source file name: <path and filename of host private key file>
Confirm download operation [y/n]: y
Note: When prompted for the port to use for download the file, if you used a
management port to connect the switch to the server, enter mgt, otherwise
enter data.
© Copyright IBM Corp. 2014 Chapter 19: Using IPsec with IPv6 227
Enabling IKEv2 Preshared Key Authentication
To set up IKEv2 preshared key authentication:
1. Enter the local preshared key.
© Copyright IBM Corp. 2014 Chapter 19: Using IPsec with IPv6 229
Using a Manual Key Policy
A manual policy involves configuring policy and manual SA entries for local and
remote peers.
To configure a manual key policy, you need:
• The IP address of the peer in IPv6 format (for example, “3000::1”).
• Inbound/Outbound session keys for the security protocols.
You can then assign the policy to an interface. The peer represents the other end of
the security association. The security protocol for the session key can be either ESP
or AH.
To create and configure a manual policy:
1. Enter a manual policy to configure.
EN 2092(config)# ipsec manual-policy <policy number>
Note: In a dynamic policy, the AH and ESP keys are created by IKEv2.
3. After you configure the IPSec policy, you need to apply it to the interface to
enforce the security policies on that interface and save it to keep it in place after
a reboot. To accomplish this, enter:
© Copyright IBM Corp. 2014 Chapter 19: Using IPsec with IPv6 231
232 EN2092 1Gb Ethernet Scalable Switch: Application Guide
Chapter 20. Routing Information Protocol
In a routed environment, routers communicate with one another to keep track of
available routes. Routers can learn about available routes dynamically using the
Routing Information Protocol (RIP). IBM Networking OS software supports RIP
version 1 (RIPv1) and RIP version 2 (RIPv2) for exchanging TCP/IPv4 route
information with other routers.
Note: IBM Networking OS 7.8 does not support IPv6 for RIP.
When a switch receives a routing update that contains a new or changed destination
network entry, the switch adds 1 to the metric value indicated in the update and
enters the network in the routing table. The IPv4 address of the sender is used as
the next hop.
Stability
RIP includes a number of other stability features that are common to many routing
protocols. For example, RIP implements the split horizon and hold-down
mechanisms to prevent incorrect routing information from being propagated.
RIP prevents routing loops from continuing indefinitely by limiting the number of
hops allowed in a path from the source to a destination. The maximum number of
hops in a path is 15. The network destination network is considered unreachable if
increasing the metric value by 1 causes the metric to be 16 (that is infinity). This
limits the maximum diameter of a RIP network to less than 16 hops.
RIP is often used in stub networks and in small autonomous systems that do not
have many redundant paths.
For more information see The Configuration Menu, Routing Information Protocol
Configuration in the IBM Networking OS Command Reference.
RIPv1
RIP version 1 uses broadcast User Datagram Protocol (UDP) data packets for the
regular routing updates. The main disadvantage is that the routing updates do not
carry subnet mask information. Hence, the router cannot determine whether the
route is a subnet route or a host route. It is of limited usage after the introduction of
RIPv2. For more information about RIPv1 and RIPv2, refer to RFC 1058 and
RFC 2453.
RIPv2
RIPv2 is the most popular and preferred configuration for most networks. RIPv2
expands the amount of useful information carried in RIP messages and provides a
measure of security. For a detailed explanation of RIPv2, refer to RFC 1723 and
RFC 2453.
RIPv2 improves efficiency by using multicast UDP (address 224.0.0.9) data packets
for regular routing updates. Subnet mask information is provided in the routing
updates. A security option is added for authenticating routing updates, by using a
shared password. IBM Networking OS supports using clear password for RIPv2.
Poison Reverse
Simple split horizon in RIP omits routes learned from one neighbor in updates sent
to that neighbor. That is the most common configuration used in RIP, with the Poison
Reverse feature disabled. Split horizon with poisoned reverse enabled includes
such routes in updates, but sets their metrics to 16. The disadvantage of using this
feature is the increase of size in the routing updates.
Triggered Updates
Multicast
RIPv2 messages use IPv4 multicast address (224.0.0.9) for periodic updates.
Multicast RIPv2 updates are not processed by RIPv1 routers. IGMP is not needed
since these are inter-router messages which are not forwarded.
To configure RIPv2 in RIPv1 compatibility mode, set multicast to disable, and set
version to both.
Default Route
The RIP router can listen and supply a default route, usually represented as
IPv4 0.0.0.0 in the routing table. When a router does not have an explicit route to a
destination network in its routing table, it uses the default route to forward those
packets.
Metric
The metric field contains a configurable value between 1 and 15 (inclusive) which
specifies the current metric for the interface. The metric value typically indicates the
total number of hops to the destination. The metric value of 16 represents an
unreachable destination.
© Copyright IBM Corp. 2014 Chapter 20: Routing Information Protocol 235
Authentication
RIPv2 authentication uses plain text password for authentication. If configured using
Authentication password, then it is necessary to enter an authentication key value.
The following method is used to authenticate a RIP message:
• If the router is not configured to authenticate RIPv2 messages, then RIPv1 and
unauthenticated RIPv2 messages are accepted; authenticated RIPv2 messages
are discarded.
• If the router is configured to authenticate RIPv2 messages, then RIPv1 and
RIPv2 messages which pass authentication testing are accepted;
unauthenticated and failed authentication RIPv2 messages are discarded.
For maximum security, RIPv1 messages are ignored when authentication is
enabled (/cfg/l3/rip/if <x>/auth/password); otherwise, the routing information
from authenticated messages is propagated by RIPv1 routers in an unauthenticated
manner.
EN 2092(config)# vlan 3
EN 2092(config-vlan)# exit
EN 2092(config)# interface port 3
EN 2092(config-if)# switchport mode trunk
EN 2092(config-if)# switchport trunk allowed vlan add 3
EN 2092(config-if)# exit
Use the following command to check the current valid routes in the routing table of
the switch:
For those RIP learnt routes within the garbage collection period, that are routes
phasing out of the routing table with metric 16, use the following command:
Locally configured static routes do not appear in the RIP Routes table.
© Copyright IBM Corp. 2014 Chapter 20: Routing Information Protocol 237
238 EN2092 1Gb Ethernet Scalable Switch: Application Guide
Chapter 21. Internet Group Management Protocol
Internet Group Management Protocol (IGMP) is used by IPv4 Multicast routers to
learn about the existence of host group members on their directly attached subnet
(see RFC 2236). The IPv4 Multicast routers get this information by broadcasting
IGMP Membership Queries and listening for IPv4 hosts reporting their host group
memberships. This process is used to set up a client/server relationship between an
IPv4 Multicast source that provides the data streams and the clients that want to
receive the data.
The EN2092 1Gb Ethernet Scalable Switch (EN2092) can perform IGMP Snooping,
or act as an IGMP Relay (proxy) device.
IGMP Snooping conserves bandwidth. With IGMP Snooping, the switch learns
which ports are interested in receiving multicast data, and forwards multicast data
only to those ports. In this way, other ports are not burdened with unwanted
multicast traffic.
The switch can sense IGMP Membership Reports from attached clients and act as a
proxy to set up a dedicated path between the requesting host and a local IPv4
Multicast router. After the pathway is established, the switch blocks the IPv4
Multicast stream from flowing through any port that does not connect to a host
member, thus conserving bandwidth.
IGMP Groups
The EN2092 supports a maximum of 4096 IGMP entries, on a maximum of 1024
VLANs. One IGMP entry is allocated for each unique join request, based on the
VLAN and IGMP group address only (regardless of the port). If multiple ports join
the same IGMP group using the same VLAN, only a single IGMP entry is used.
By default, the EN2092 snoops the first eight sources listed in the IGMPv3 Group
Record. Use the following command to change the number of snooping sources:
IGMPv3 Snooping is compatible with IGMPv1 and IGMPv2 Snooping. You can
disable snooping on version 1 and version 2 reports, using the following command:
4. Enable IGMP.
© Copyright IBM Corp. 2014 Chapter 21: Internet Group Management Protocol 241
5. View dynamic IGMP information.
To display information about IGMP Groups:
Note: If IGMP Snooping v1/v2 is enabled and IGMPv3 Snooping is disabled, the
output of IGMPv3 reports and queries show some items as IGMPv3 (V3),
though they retain v2 behavior. For example, the Source IPv4 address is
not relevant for v2 entries.
A total of 128 static Mrouters can be configured on the EN2092. Both internal and
external ports can accept a static Mrouter.
Note: When static Mrouters are used, the switch will continue learning dynamic
Mrouters via IGMP snooping. However, dynamic Mrouters may not replace
static Mrouters. If a dynamic Mrouter has the same port and VLAN
combination as a static Mrouter, the dynamic Mrouter will not be learned.
© Copyright IBM Corp. 2014 Chapter 21: Internet Group Management Protocol 243
IGMP Relay
The EN2092 can act as an IGMP Relay (or IGMP Proxy) device that relays IGMP
multicast messages and traffic between an Mrouter and end stations. IGMP Relay
allows the EN2092 to participate in network multicasts with no configuration of the
various multicast routing protocols, so you can deploy it in the network with minimal
effort.
To a multicast router, IGMP Relay appears as a host. The Mrouter sends IGMP host
queries to IGMP Relay, and IGMP Relay responds by forwarding IGMP host reports
and unsolicited join messages from its attached hosts.
IGMP Relay also forwards multicast traffic between the Mrouter and end stations,
similar to IGMP Snooping.
You can configure up to two Mrouters to use with IGMP Relay. One Mrouter acts as
the primary Mrouter, and one is the backup Mrouter. The EN4093 uses ICMP health
checks to determine if the primary and backup mrouters are reachable.
Configuration Guidelines
Consider the following guidelines when you configure IGMP Relay:
• IGMP Relay and IGMP Snooping/Querier are mutually exclusive—if you enable
IGMP Relay, you must turn off IGMP Snooping/Querier.
• Add the upstream VLANs to the IGMP Relay list, using the following command:
– Enable CPU forwarding to ensure that multicast data is forwarded across the
VLANs.
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip address 10.10.1.1 255.255.255.0 enable
EN 2092(config-ip-if)# vlan 2
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 3
EN 2092(config-ip-if)# ip address 10.10.2.1 255.255.255.0 enable
EN 2092(config-ip-if)# vlan 3
EN 2092(config-ip-if)# exit
© Copyright IBM Corp. 2014 Chapter 21: Internet Group Management Protocol 245
IGMP Querier
IGMP Querier allows the switch to perform the multicast router (Mrouter) role and
provide Mrouter discovery when the network or virtual LAN (VLAN) does not have a
router.
When the IGMP Querier feature is enabled on a VLAN, the switch participates in the
Querier election process and has the possibility to be elected as Querier for the
VLAN. The IGMP querier periodically broadcasts IGMP Queries and listens for
hosts to respond with IGMP Reports indicating their IGMP group memberships. If
multiple Mrouters exist on a given network, the Mrouters elect one as the querier,
which performs all periodic membership queries. The election process can be
based on IPv4 address or MAC address.
Note: When IGMP Querier is enabled on a VLAN, the switch performs the role of
IGMP querier only if it meets the IGMP querier election criteria.
FastLeave
In normal IGMP operation, when the switch receives an IGMPv2 leave message, it
sends a Group-Specific Query to determine if any other devices in the same group
(and on the same port) are still interested in the specified multicast group traffic. The
switch removes the affiliated port from that particular group, if it does not receive an
IGMP Membership Report within the query-response-interval.
With FastLeave enabled on the VLAN, a port can be removed immediately from the
port list of the group entry when the IGMP Leave message is received, unless a
multicast router was learned on the port.
Enable FastLeave only on VLANs that have only one host connected to each
physical port.
IGMP Filtering
With IGMP Filtering, you can allow or deny a port to learn certain IGMP/IPMC
groups. This allows you to restrict users from receiving certain multicast traffic.
If access to a multicast group is denied, IGMP Membership Reports from the port
are dropped, and the port is not allowed to receive IPv4 multicast traffic from that
group. If access to the multicast group is allowed, Membership Reports from the
port are forwarded for normal processing.
To configure IGMP Filtering, you must globally enable IGMP filtering, define an
IGMP filter, assign the filter to a port, and enable IGMP Filtering on the port. To
define an IGMP filter, you must configure a range of IPv4 multicast groups, choose
whether the filter will allow or deny multicast traffic for groups within the range, and
enable the filter.
Each IGMP Filter allows you to set a start and end point that defines the range of
IPv4 addresses upon which the filter takes action. Each IPv4 address in the range
must be between 224.0.0.0 and 239.255.255.255.
Each IGMP filter can allow or deny IPv4 multicasts to the range of IPv4 addresses
configured. If you configure the filter to deny IPv4 multicasts, then IGMP
Membership Reports from multicast groups within the range are dropped. You can
configure a secondary filter to allow IPv4 multicasts to a small range of addresses
within a larger range that a primary filter is configured to deny. The two filters work
together to allow IPv4 multicasts to a small subset of addresses within the larger
range of addresses.
© Copyright IBM Corp. 2014 Chapter 21: Internet Group Management Protocol 247
Note: Lower-numbered filters take precedence over higher-number filters. For
example, the action defined for IGMP Filter 1 supersedes the action defined
for IGMP Filter 2.
MLDv2 protocol, when compared to MLDv1, adds support for source filtering—the
ability for a node to report interest in listening to packets only from specific source
addresses, or from all but specific source addresses, sent to a particular multicast
address. MLDv2 is interoperable with MLDv1. See RFC 3569 for details on
Source-Specific Multicast (SSM).
Note: Multicast Address Specific Queries and Multicast Address and Source
Specific Queries are sent only in response to State Change Reports,
and never in response to Current State Reports.
• Multicast Listener Report: Sent by a host when it joins a multicast group, or in
response to a Multicast Listener Query sent by the Querier. Hosts use these
reports to indicate their current multicast listening state, or changes in the
multicast listening state of their interfaces. These reports are of two types:
– Current State Report: Contains the current Multicast Address Listening State
of the host.
– State Change Report: If the listening state of a host changes, the host
immediately reports these changes through a State Change Report
message. These reports contain either Filter Mode Change records and/or
Source List Change records. State Change Reports are retransmitted
several times to ensure all Mrouters receive it.
• Multicast Listener Done: Sent by a host when it wants to leave a multicast group.
This message is sent to the link-scope all-routers IPv6 destination address of
FF02::2. When an Mrouter receives a Multicast Listener Done message from the
last member of the multicast address on a link, it stops forwarding traffic to this
multicast address.
Without MLD, the switch forwards IPv6 multicast traffic through all ports, increasing
network load. Following is an overview of operations when MLD is configured on
EN2092:
• The switch acts as an Mrouter when MLDv1/v2 is configured and enabled on
each of its directly attached links. If the switch has multiple interfaces connected
to the same link, it operates the protocol on any one of the interfaces.
• If there are multiple Mrouters on the subnet, the Mrouter with the numerically
lowest IPv6 address is elected as the Querier.
• The Querier sends general queries at short intervals to learn multicast address
listener information from an attached link.
• Hosts respond to these queries by reporting their per-interface Multicast Address
Listening state, through Current State Report messages sent to a specific
multicast address that all MLD routers on the link listen to.
• If the listening state of a host changes, the host immediately reports these
changes through a State Change Report message.
• The Querier sends a Multicast Address Specific Query to verify if hosts are
listening to a specified multicast address or not. Similarly, if MLDv2 is configured,
the Querier sends a Multicast Address and Source Specific Query to verify, for a
specified multicast address, if hosts are listening to a specific set of sources, or
not. MLDv2 listener report messages consists of Multicast Address Records:
– INCLUDE: to receive packets from source specified in the MLDv2 message
– EXCLUDE: to receive packets from all sources except the ones specified in
the MLDv2 message
• A host can send a State Change Report to indicate its desire to stop listening to
a particular multicast address (or source in MLDv2). The Querier then sends a
multicast address specific query to verify if there are other listeners of the
multicast address. If there aren’t any, the Mrouter deletes the multicast address
from its Multicast Address Listener state and stops sending multicast traffic.
Similarly in MLDv2, the Mrouter sends a Multicast Address and Source Specific
Query to verify if, for a specified multicast address, there are hosts still listening
to a specific set of sources.
© Copyright IBM Corp. 2014 Chapter 22: Multicast Listener Discovery 251
How Flooding Impacts MLD
The flooding parameters must be configured per VLAN. Enter the following
command to set the flood or cpu options:
MLD Querier
An Mrouter acts as a Querier and periodically (at short query intervals) sends query
messages in the subnet. If there are multiple Mrouters in the subnet, only one can
be the Querier. All Mrouters on the subnet listen to the messages sent by the
multicast address listeners, and maintain the same multicast listening information
state.
All MLDv2 queries are sent with the FE80::/64 link-local source address prefix.
Querier Election
Only one Mrouter can be the Querier per subnet. All other Mrouters will be
non-Queriers. MLD versions 1 and 2 elect the Mrouter with the numerically lowest
IPv6 address as the Querier.
Table 24 lists the default settings for MLD features and variables.
Table 24. MLD Timers and Default Values
Other Querier Present Interval [OQPT] 255 seconds [derived: RV*QI + ½ QRI]
Older Version Querier Present Timeout: 260 seconds [derived: RV*QI+ QRI]
[OVQPT]
Older Version Host Present Interval 260 seconds [derived: RV* QI+QRI]
[OVHPT]
© Copyright IBM Corp. 2014 Chapter 22: Multicast Listener Discovery 253
Configuring MLD
Following are the steps to enable MLD and configure the interface parameters:
1. Turn on MLD globally.
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# ipv6 address 2002:1:0:0:0:0:0:3
EN 2092(config-ip-if)# ipv6 prefixlen 64
Static routes should have a higher degree of precedence than dynamic routing
protocols. If the destination route is not in the route cache, then the packets are
forwarded to the default gateway which may be incorrect if a dynamic routing
protocol is enabled.
It is also useful to tell routers outside your network (upstream providers or peers)
about the routes you can access in your network. External networks (those outside
your own) that are under the same administrative control are referred to as
autonomous systems (AS). Sharing of routing information between autonomous
systems is known as external routing.
AS 11
AS 20
ISP A
iBGP
eBGP Internet
AS 50
ISP B
Application
Switch
Typically, an AS has one or more border routers—peer routers that exchange routes
with other ASs—and an internal routing scheme that enables routers in that AS to
reach every other router and destination within that AS. When you advertise routes
to border routers on other autonomous systems, you are effectively committing to
carry data to the IPv4 space represented in the route being advertised. For
example, if you advertise 192.204.4.0/24, you are declaring that if another router
sends you data destined for any address in 192.204.4.0/24, you know how to carry
that data to its destination.
For each Internet host, you must be able to send a packet to that host, and that host
has to have a path back to you. This means that whoever provides Internet
connectivity to that host must have a path to you. Ultimately, this means that they must
“hear a route” which covers the section of the IPv4 space you are using; otherwise,
you will not have connectivity to the host in question.
A route map allows you to match attributes, such as metric, network address, and
AS number. It also allows users to overwrite the local preference metric and to
append the AS number in the AS route. See “BGP Failover Configuration” on
page 263.
IBM Networking OS allows you to configure 32 route maps. Each route map can
have up to eight access lists. Each access list consists of a network filter. A network
filter defines an IPv4 address and subnet mask of the network that you want to
include in the filter. Figure 22 illustrates the relationship between route maps,
access lists and network filters.
Figure 22. Distributing Network Filters in Access Lists and Route Maps
1 9
---
Route Map 2 ---
---
8 16
-----
-----
-----
-----
-----
-----
----- 1 249
---
Route Map 32 ---
---
8 256
© Copyright IBM Corp. 2014 Chapter 23: Border Gateway Protocol 257
Incoming and Outgoing Route Maps
You can have two types of route maps: incoming and outgoing. A BGP peer router
can be configured to support up to eight route maps in the incoming route map list
and outgoing route map list.
If a route map is not configured in the incoming route map list, the router imports all
BGP updates. If a route map is configured in the incoming route map list, the router
ignores all unmatched incoming updates. If you set the action to deny, you must add
another route map to permit all unmatched updates.
Route maps in an outgoing route map list behave similar to route maps in an
incoming route map list. If a route map is not configured in the outgoing route map
list, all routes are advertised or permitted. If a route map in the outgoing route map
list is set to permit, matched routes are advertised and unmatched routes are
ignored.
Precedence
You can set a priority to a route map by specifying a precedence value with the
following commands:
The smaller the value the higher the precedence. If two route maps have the same
precedence value, the smaller number has higher precedence.
Configuration Overview
To configure route maps, you need to do the following:
1. Define network filter.
Enter a filter number from 1 to 256. Specify the IPv4 address and subnet mask of
the network that you want to match. Enable the network filter. You can distribute
up to 256 network filters among 32 route maps each containing eight access
lists.
2. (Optional) Define the criteria for the access list and enable it.
Specify the access list and associate the network filter number configured in
Step 1.
EN 2092(config)# route-map 1
EN 2092(config-route-map)# access-list 1 match-address 1
EN 2092(config-route-map)# access-list 1 metric <metric value>
EN 2092(config-route-map)# access-list 1 action deny
EN 2092(config-route-map)# access-list 1 enable
EN 2092(config-route-map)# as-path-list 1 as 1
EN 2092(config-route-map)# as-path-list 1 action deny
EN 2092(config-route-map)# as-path-list 1 enable
EN 2092(config-route-map)# enable
EN 2092(config-route-map)# exit
EN 2092(config-router-bgp)# exit
Aggregating Routes
Aggregation is the process of combining several different routes in such a way that
a single route can be advertised, which minimizes the size of the routing table. You
can configure aggregate routes in BGP either by redistributing an aggregate route
into BGP or by creating an aggregate entry in the BGP routing table.
© Copyright IBM Corp. 2014 Chapter 23: Border Gateway Protocol 259
To define an aggregate route in the BGP routing table, use the following commands:
Redistributing Routes
In addition to running multiple routing protocols simultaneously, IBM Networking OS
software can redistribute information from one routing protocol to another. For
example, you can instruct the switch to use BGP to re-advertise static routes. This
applies to all of the IP-based routing protocols.
You can also conditionally control the redistribution of routes between routing
domains by defining a method known as route maps between the two domains. For
more information on route maps, see “What is a Route Map?” on page 257.
Redistributing routes is another way of providing policy control over whether to
export OSPF routes, fixed routes, and static routes. For an example configuration,
see “Default Redistribution and Route Aggregation Example” on page 265.
BGP Attributes
The following two BGP attributes are discussed in this section: Local preference and
metric (Multi-Exit Discriminator).
When there are multiple paths to the same destination, the local preference attribute
indicates the preferred path. The path with the higher preference is preferred (the
default value of the local preference attribute is 100). Unlike the weight attribute,
which is only relevant to the local router, the local preference attribute is part of the
routing update and is exchanged among routers in the same AS.
• Using the route map local preference method, which affects both inbound and
outbound directions.
EN 2092(config)# route-map 1
EN 2092(config_route_map)# local-preference
EN 2092(config_router_map)# exit
This attribute is a hint to external neighbors about the preferred path into an AS
when there are multiple entry points. A lower metric value is preferred over a higher
metric value. The default value of the metric attribute is 0.
Unlike local preference, the metric attribute is exchanged between ASs; however, a
metric attribute that comes into an AS does not leave the AS.
When an update enters the AS with a certain metric value, that value is used for
decision making within the AS. When BGP sends that update to another AS, the
metric is reset to 0.
Unless otherwise specified, the router compares metric attributes for paths from
external neighbors that are in the same AS.
© Copyright IBM Corp. 2014 Chapter 23: Border Gateway Protocol 261
Selecting Route Paths in BGP
BGP selects only one path as the best path. It does not rely on metric attributes to
determine the best path. When the same network is learned via more than one BGP
peer, BGP uses its policy for selecting the best route to that network. The BGP
implementation on the EN2092 uses the following criteria to select a path when the
same route is received from multiple peers.
1. Local fixed and static routes are preferred over learned routes.
2. With iBGP peers, routes with higher local preference values are selected.
3. In the case of multiple routes of equal preference, the route with lower AS path
weight is selected.
AS path weight = 128 x AS path length (number of autonomous systems
traversed).
4. In the case of equal weight and routes learned from peers that reside in the
same AS, the lower metric is selected.
Note: A route with a metric is preferred over a route without a metric.
5. The lower cost to the next hop of routes is selected.
6. In the case of equal cost, the eBGP route is preferred over iBGP.
7. If all routes have same route type (eBGP or iBGP), the route with the lower
router ID is selected.
When the path is selected, BGP puts the selected path in its routing table and
propagates the path to its neighbors.
As shown in Figure 23, the switch is connected to ISP 1 and ISP 2. The customer
negotiates with both ISPs to allow the switch to use their peer routers as default
gateways. The ISP peer routers will then need to announce themselves as default
gateways to the EN2092.
Figure 23. BGP Failover Configuration Example
ISP 1 ISP 2
Peer 1 Router AS 100 AS 200 Peer 2 Router
(Primary) (Secondary)
IP:200.200.200.2 IP:210.210.210.2
IP: 200.200.200.1
IP: 210.210.210.1
Server 1 enter
BladeC Server 2
IP: 200.200.200.10 IP: 200.200.200.11
On the EN2092, one peer router (the secondary one) is configured with a longer AS
path than the other, so that the peer with the shorter AS path will be seen by the
switch as the primary default gateway. ISP 2, the secondary peer, is configured with
a metric of “3,” thereby appearing to the switch to be three router hops away.
1. Define the VLANs.
For simplicity, both default gateways are configured in the same VLAN in this
example. The gateways could be in the same VLAN or different VLANs.
EN 2092(config)# vlan 1
© Copyright IBM Corp. 2014 Chapter 23: Border Gateway Protocol 263
3. Enable IP forwarding.
IP forwarding is turned on by default and is used for VLAN-to-VLAN (non-BGP)
routing. Make sure IP forwarding is on if the default gateways are on different
subnets or if the switch is connected to different subnets and those subnets need
to communicate through the switch (which they almost always do).
Note: To help eliminate the possibility for a Denial of Service (DoS) attack, the
forwarding of directed broadcasts is disabled by default.
4. Configure BGP peer router 1 and 2.
As illustrated in Figure 24, you have two peer routers: an internal and an external
peer router. Configure the EN2092 to redistribute the default routes from AS 200 to
AS 135. At the same time, configure for route aggregation to allow you to condense
the number of routes traversing from AS 135 to AS 200.
Figure 24. Route Aggregation and Default Route Redistribution
0.0.0.0/0
Default routes towards
internal peer router
1. Configure the IP interface.
2. Configure the AS number (AS 135) and router ID number (10.1.1.135).
© Copyright IBM Corp. 2014 Chapter 23: Border Gateway Protocol 265
5. Configure peer router 1 to import default routes from peer router 2
All routing devices maintain link information in their own Link State Database
(LSDB). The LSDB for all routing devices within an area is identical but is not
exchanged between different areas. Only routing updates are exchanged between
areas, thereby significantly reducing the overhead for maintaining routing
information on a large, dynamic network.
Backbone
Area 0
(Also a Transit Area)
ABR ABR
ABR
Internal LSA
Routes Virtual
Stub Area Transit Area Link
External LSA
Routes
ASBR
Stub Area, NSSA,
ABR = Area Border Router or Transit Area
ASBR = Autonomous System Connected to Backbone
Non-OSPF Area Boundary Router via Virtual Link
RIP/BGP AS
BGP Backbone
Area 3
Area 0
Inter-Area Routes
External ABR
ASBR (Summary Routes)
Routes
RIP
ABR ABR
Internal
ASBR Router
Area 1 Area 2
Neighbors are routing devices that maintain information about each others’ health.
To establish neighbor relationships, routing devices periodically send hello packets
on each of their interfaces. All routing devices that share a common network
segment, appear in the same area, and have the same health parameters (hello
and dead intervals) and authentication parameters respond to each other’s hello
packets and become neighbors. Neighbors continue to send periodic hello packets
to advertise their health to neighbors. In turn, they listen to hello packets to
determine the health of their neighbors and to establish contact with new neighbors.
The hello process is used for electing one of the neighbors as the area’s Designated
Router (DR) and one as the area’s Backup Designated Router (BDR). The DR is
adjacent to all other neighbors and acts as the central contact for database
exchanges. Each neighbor sends its database information to the DR, which relays
the information to the other neighbors.
The BDR is adjacent to all other neighbors (including the DR). Each neighbor sends
its database information to the BDR just as with the DR, but the BDR merely stores
this data and does not distribute it. If the DR fails, the BDR will take over the task of
distributing database information to the other neighbors.
Configurable Parameters
In IBM Networking OS, OSPF parameters can be configured through the Command
Line Interfaces (CLI/ISCLI), Browser-Based Interface (BBI), or through SNMP. For
more information, see “Switch Administration” on page 23.”
The CLI supports the following parameters: interface output cost, interface priority,
dead and hello intervals, retransmission interval, and interface transmit delay.
In addition to the above parameters, you can also specify the following:
• Shortest Path First (SPF) interval—Time interval between successive
calculations of the shortest path tree using the Dijkstra’s algorithm.
• Stub area metric—A stub area can be configured to send a numeric metric value
such that all routes received via that stub area carry the configured metric to
potentially influence routing decisions.
• Default routes—Default routes with weight metrics can be manually injected into
transit areas. This helps establish a preferred route when multiple routing
devices exist between two areas. It also helps route traffic to external networks.
• Passive—When enabled, the interface sends LSAs to upstream devices, but
does not otherwise participate in OSPF protocol exchanges.
• Point-to-Point—For LANs that have only two OSPF routing agents (the EN2092
and one other device), this option allows the switch to significantly reduce the
amount of routing information it must carry and manage.
Defining Areas
If you are configuring multiple areas in your OSPF domain, one of the areas must be
designated as area 0, known as the backbone. The backbone is the central OSPF
area and is usually physically connected to all other areas. The areas inject routing
information into the backbone which, in turn, disseminates the information into other
areas.
Since the backbone connects the areas in your network, it must be a contiguous
area. If the backbone is partitioned (possibly as a result of joining separate OSPF
networks), parts of the AS will be unreachable, and you will need to configure virtual
links to reconnect the partitioned areas (see “Virtual Links” on page 277).
An OSPF area is defined by assigning two pieces of information: an area index and
an area ID. The commands to define and enable an OSPF area are as follows:
EN 2092(config)# router ospf
EN 2092(config-router-ospf)# area <area index> area-id <n.n.n.n>
EN 2092(config-router-ospf)# area <area index> enable
EN 2092(config-router-ospf)# exit
Note: The aindex option above is an arbitrary index used only on the switch and
does not represent the actual OSPF area number. The actual OSPF area
number is defined in the areaid portion of the command as explained in the
following sections.
Assigning the Area Index
The aindex <area index> option is actually just an arbitrary index (0-2) used only by
the EN2092. This index does not necessarily represent the OSPF area number,
though for configuration simplicity, it should where possible.
For example, both of the following sets of commands define OSPF area 0 (the
backbone) and area 1 because that information is held in the area ID portion of the
command. However, the first set of commands is easier to maintain because the
arbitrary area indexes agree with the area IDs:
• Area index and area ID agree
area 0 area-id 0.0.0.0 (Use index 0 to set area 0 in ID octet
format)
area 1 area-id 0.0.0.1 (Use index 1 to set area 1 in ID octet
format)
• Area index set to an arbitrary value
area 1 area-id 0.0.0.0 (Use index 1 to set area 0 in ID octet
format)
area 2 area-id 0.0.0.1 (Use index 2 to set area 1 in ID octet
format)
For example, the following commands could be used to configure IPv4 interface 14
for a presence on the IPv4 10.10.10.1/24 network, to define OSPF area 1, and to
attach the area to the network:
Note: OSPFv2 supports IPv4 only. IPv6 is supported in OSPFv3 (see “OSPFv3
Implementation in IBM Networking OS” on page 425).
Interface Cost
The OSPF link-state algorithm (Dijkstra’s algorithm) places each routing device at
the root of a tree and determines the cumulative cost required to reach each
destination. Usually, the cost is inversely proportional to the bandwidth of the
interface. Low cost indicates high bandwidth. You can manually enter the cost for
the output route with the following command:
DR and BDR elections are made through the hello process. The election can be
influenced by assigning a priority value to the OSPF interfaces on the EN2092. The
command is as follows:
Summarizing Routes
Route summarization condenses routing information. Without summarization, each
routing device in an OSPF network would retain a route to every subnet in the
network. With summarization, routing devices can reduce some sets of routes to a
single advertisement, reducing both the load on the routing device and the
perceived complexity of the network. The importance of route summarization
increases with network size.
Summary routes can be defined for up to 16 IP address ranges using the following
command:
where <range number> is a number 1 to 16, <IPv4 address> is the base IP address
for the range, and <subnet mask> is the IPv4 address mask for the range. For a
detailed configuration example, see “Example 3: Summarizing Routes” on
page 286.
Note: OSPFv2 supports IPv4 only. IPv6 is supported in OSPFv3 (see “OSPFv3
Implementation in IBM Networking OS” on page 425).
Default Routes
When an OSPF routing device encounters traffic for a destination address it does
not recognize, it forwards that traffic along the default route. Typically, the default
route leads upstream toward the backbone until it reaches the intended area or an
external router.
Each EN2092 acting as an ABR automatically inserts a default route into each
attached area. In simple OSPF stub areas or NSSAs with only one ABR leading
upstream (see Area 1 in Figure 27), any traffic for IP address destinations outside
the area is forwarded to the switch’s IP interface, and then into the connected transit
area (usually the backbone). Since this is automatic, no further configuration is
required for such areas.
Metric:
10
ASBR to
external networks
If the switch is in a transit area and has a configured default gateway, it can inject a
default route into rest of the OSPF domain. Use the following command to configure
the switch to inject OSPF default routes:
In the command above, <metric value> sets the priority for choosing this switch for
default route. The value none sets no default and 1 sets the highest priority for
default route. Metric type determines the method for influencing routing decisions
for external routes.
When the switch is configured to inject a default route, an AS-external LSA with link
state ID 0.0.0.0 is propagated throughout the OSPF routing domain. This LSA is
sent with the configured metric value and metric type.
The OSPF default route configuration can be removed with the command:
EN 2092(config-router-ospf)# no default-information
The area which contains a virtual link must be a transit area and have full routing
information. Virtual links cannot be configured inside a stub area or NSSA. The area
type must be defined as transit using the following command:
The virtual link must be configured on the routing devices at each endpoint of the
virtual link, though they may traverse multiple routing devices. To configure a EN2092
as one endpoint of a virtual link, use the following command:
where <link number> is a value between 1 and 3, <area index> is the OSPF area
index of the transit area, and <router ID> is the IP address of the virtual neighbor
(nbr), the routing device at the target endpoint. Another router ID is needed when
configuring a virtual link in the other direction. To provide the EN2092 with a router
ID, see the following section, Router ID.
For a detailed configuration example on Virtual Links, see “Example 2: Virtual Links”
on page 283.
To change the router ID from static to dynamic, set the router ID to 0.0.0.0, save the
configuration, and reboot the EN2092. To view the router ID, enter:
Authentication
OSPF protocol exchanges can be authenticated so that only trusted routing devices
can participate. This ensures less processing on routing devices that are not
listening to OSPF packets.
OSPF allows packet authentication and uses IP multicast when sending and
receiving packets. Routers participate in routing domains based on pre-defined
passwords. IBM Networking OS supports simple password (type 1 plain text
passwords) and MD5 cryptographic authentication. This type of authentication
allows a password to be configured per area.
Figure shows authentication configured for area 0 with the password test. Simple
authentication is also configured for the virtual link between area 2 and area 0. Area
1 is not configured for OSPF authentication.
Figure 28. OSPF Authentication
Area 1 Area 0
Simple authentication
Application key=test
Switch 2
IF 1 IF 2
Switch 4
EN 2092(config)# interface ip 1
EN 2092(config-ip-if)# ip ospf key test
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip ospf key test
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 3
EN 2092(config-ip-if)# ip ospf key test
EN 2092(config-ip-if)# exit
4. Configure a simple text password up to eight characters for the virtual link
between Area 2 and Area 0 on switches 2 and 4.
EN 2092(config)# interface ip 1
EN 2092(config-ip-if)# ip ospf message-digest-key 1
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip ospf message-digest-key 1
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 3
EN 2092(config-ip-if)# ip ospf message-digest-key 1
EN 2092(config-ip-if)# exit
5. Configure MD5 key for the virtual link between Area 2 and Area 0 on switch 2
and switch 4.
If redundant routes via multiple routing processes (such as OSPF, RIP, BGP, or
static routes) exist on your network, the switch defaults to the OSPF-derived route.
If dynamic router ID selection is used (see “Router ID” on page 278), loopback
interfaces can be used to force router ID selection. If a loopback interface is
configured, its IP address is automatically selected as the router ID, even if other IP
interfaces have lower IP addresses. If more than one loopback interface is
configured, the lowest loopback interface IP address is selected.
IF 1 IF 2
10.10.7.1 10.10.12.1
Network Network
10.10.7.0/24 10.10.12.0/24
Note: OSPFv2 supports IPv4 only. IPv6 is supported in OSPFv3 (see “OSPFv3
Implementation in IBM Networking OS” on page 425).
EN 2092(config)# interface ip 1
EN 2092(config-ip-if)# ip ospf area 0
EN 2092(config-ip-if)# ip ospf enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip ospf area 1
EN 2092(config-ip-if)# ip ospf enable
EN 2092(config-ip-if)# exit
IF 1 IF 2 IF 1 IF 1
10.10.7.1 10.10.12.1 10.10.12.2 10.10.24.1
Virtual Link 1
Note: OSPFv2 supports IPv4 only. IPv6 is supported in OSPFv3 (see “OSPFv3
Implementation in IBM Networking OS” on page 425).
EN 2092(config)# interface ip 1
EN 2092(config-ip-if)# ip address 10.10.7.1 255.255.255.0 enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip address 10.10.12.1 255.255.255.0 enable
EN 2092(config-ip-if)# exit
3. Enable OSPF.
EN 2092(config)# interface ip 1
EN 2092(config-ip-if)# ip ospf area 0
EN 2092(config-ip-if)# ip ospf enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip ospf area 1
EN 2092(config-ip-if)# ip ospf enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 1
EN 2092(config-ip-if)# ip address 10.10.12.2 255.255.255.0 enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip address 10.10.24.1 255.255.255.0 enable
EN 2092(config-ip-if)# exit
3. Enable OSPF.
EN 2092(config)# interface ip 1
EN 2092(config-ip-if)# ip ospf area 1
EN 2092(config-ip-if)# ip ospf enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip ospf area 2
EN 2092(config-ip-if)# ip ospf enable
EN 2092(config-ip-if)# exit
The following example shows one summary route from area 1 (stub area)
injected into area 0 (the backbone). The summary route consists of all IP addresses
from 36.128.192.0 through 36.128.254.255 except for the routes in the range
36.128.200.0 through 36.128.200.255.
Note: OSPFv2 supports IPv4 only. IPv6 is supported in OSPFv3 (see “OSPFv3
Implementation in IBM Networking OS” on page 425).
IF 1 IF 2
10.10.7.1 36.128.192.1
ABR 36.128.192.x to
Summary Route
36.128.254.x
10.10.7.0/24 36.128.192.0/18
Network Network
Note: You can specify a range of addresses to prevent advertising by using the
hide option. In this example, routes in the range 36.128.200.0 through
36.128.200.255 are kept private.
EN 2092(config)# interface ip 1
EN 2092(config-ip-if)# ip address 10.10.7.1 255.255.255.0 enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip address 36.128.192.1 255.255.255.0 enable
EN 2092(config-ip-if)# exit
2. Enable OSPF.
8. Use the hide command to prevent a range of addresses from advertising to the
backbone.
EN 2092(config)# router ospf
EN 2092(config-router-ospf)# area-range 2 address 36.128.200.0 255.255.255.0
EN 2092(config-router-ospf)# area-range 2 area 1
EN 2092(config-router-ospf)# area-range 2 hide
EN 2092(config-router-ospf)# exit
Although OSPFv2 and OSPFv3 are very similar, they represent independent
features on the EN2092. They are configured separately, and both can run in
parallel on the switch with no relation to one another, serving different IPv6 and IPv4
traffic, respectively.
See “Internet Protocol Version 6” on page 211 for configuring IPv6 interfaces.
OSPFv3 Limitations
IBM Networking OS 7.8 does not currently support the following OSPFv3 features:
• Multiple instances of OSPFv3 on one IPv6 link.
• Authentication of OSPFv3 packets via IPv6 Security (IPsec) for virtual links.
IF 3 IF 4
10::1 36::1
ABR 36::0/32
Summary Route (- 36::0/8)
10::0/56 36::0/56
Network Network
Note: You can specify a range of addresses to prevent advertising by using the
hide option. In this example, routes in the 36::0/8 range are kept private.
EN 2092(config)# interface ip 3
EN 2092(config-ip-if)# ipv6 address 10:0:0:0:0:0:0:1
EN 2092(config-ip-if)# ipv6 prefixlen 56
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 4
EN 2092(config-ip-if)# ip address 36:0:0:0:0:0:1
EN 2092(config-ip-if)# ipv6 prefixlen 56
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
This is equivalent to configuring the IP address and netmask for IPv4 interfaces.
2. Enable OSPFv3.
This is equivalent to the OSPFv2 enable option in the router ospf command
path.
3. Define the backbone.
EN 2092(config-router-ospf3)# area 0 area-id 0.0.0.0
EN 2092(config-router-ospf3)# area 0 type transit
EN 2092(config-router-ospf3)# area 0 enable
The ipv6 command path is used instead of the OSPFv2 ip command path
6. Attach the network interface to the stub area.
EN 2092(config)# interface ip 4
EN 2092(config-ip-if)# ipv6 ospf area 1
EN 2092(config-ip-if)# ipv6 ospf enable
EN 2092(config-ip-if)# exit
The ipv6 command path is used instead of the OSPFv2 ip command path
This differs from OSPFv2 only in that the OSPFv3 command path is used, and
the address and prefix are specified in IPv6 format.
8. Use the hide command to prevent a range of addresses from advertising to the
backbone.
EN 2092(config-router-ospf)# area-range 2 address 36:0:0:0:0:0:0:0 8
EN 2092(config-router-ospf)# area-range 2 area 0
EN 2092(config-router-ospf)# area-range 2 hide
EN 2092(config-router-ospf)# exit
This differs from OSPFv2 only in that the OSPFv3 command path is used, and
the address and prefix are specified in IPv6 format.
2. Enable OSPFv3:
EN 2092(config# ipv6 router ospf
EN 2092(config-router-ospf3)# router-id 12.12.12.12
EN 2092(config-router-ospf3)# enable
The following sections discuss PIM support for the EN2092 1Gb Ethernet Scalable
Switch:
• “PIM Overview” on page 295
• “Supported PIM Modes and Features” on page 296
• “Basic PIM Settings” on page 296
• “Additional Sparse Mode Settings” on page 299
• “Using PIM with Other Features” on page 300
• “PIM Configuration Examples” on page 301
PIM Overview
PIM is designed for efficiently routing multicast traffic across one or more IPv4
domains. This has benefits for application such as IP television, collaboration,
education, and software delivery, where a single source must deliver content (a
multicast) to a group of receivers that span both wide-area and inter-domain
networks.
PIM is used by multicast source stations, client receivers, and intermediary routers
and switches, to build and maintain efficient multicast routing trees. PIM is protocol
independent; It collects routing information using the existing unicast routing
functions underlying the IPv4 network, but does not rely on any particular unicast
protocol. For PIM to function, a Layer 3 routing protocol (such as BGP, OSPF, RIP,
or static routes) must first be configured on the switch.
Some routing and switching devices perform special PIM-SM functions. Within each
receiver domain, one router is elected as the Designated Router (DR) for handling
multicasts for the domain. DRs forward information to a similar device, the
Rendezvous Point (RP), which holds the root tree for the particular multicast group.
Receiver join requests as well as sender multicast content initially converge at the
RP, which generates and distributes multicast routing data for the DRs along the
delivery path. As the multicast content flows, DRs use the routing tree information
obtained from the RP to optimize the paths both to and from send and receive
stations, bypassing the RP for the remainder of content transactions if a more
efficient route is available.
The following PIM modes and features are not currently supported in IBM
Networking OS 7.8:
• Hybrid Sparse-Dense Mode (PIM-SM/DM). Sparse Mode and Dense Mode may
be configured on separate IP interfaces on the switch, but are not currently sup-
ported simultaneously on the same IP interface.
• PIM Source-Specific Multicast (PIM-SSM)
• Anycast RP
• PIM RP filters
• Only configuration via the switch ISCLI is supported. PIM configuration is cur-
rently not available using the menu-based CLI, the BBI, or via SNMP.
The sparse option will place the component in Sparse Mode (PIM-SM). The dense
option will place the component in Dense Mode (PIM-DM). By default, PIM
component 1 is configured for Sparse Mode. PIM component 2 is unconfigured by
default.
Note: A component using PIM-SM must also be configured with a dynamic or static
Rendezvous Point (see “Specifying the Rendezvous Point” on page 299).
To define an IP interface for use with PIM, first configured the interface with an IPv4
address and VLAN as follows:
Note: The PIM feature currently supports only one VLAN for each IP interface.
Configurations where different interfaces on different VLANs share IP
addresses are not supported.
Next, PIM must be enabled on the interface, and the PIM network component ID
must be specified:
© Copyright IBM Corp. 2014 Chapter 25: Protocol Independent Multicast 297
PIM Neighbor Filters
The EN2092 accepts connection to up to 8 PIM interfaces. By default, the switch
accepts all PIM neighbors attached to the PIM-enabled interfaces, up to the
maximum number (24 neighbors). Once the maximum is reached, the switch will
deny further PIM neighbors.
To ensure that only the appropriate PIM neighbors are accepted by the switch, the
administrator can use PIM neighbor filters to specify which PIM neighbors may be
accepted or denied on a per-interface basis.
To turn PIM neighbor filtering on or off for a particular IP interface, use the following
commands:
When filtering is enabled, all PIM neighbor requests on the specified IP interface will
be denied by default. To allow a specific PIM neighbor, use the following command:
To remove a PIM neighbor from the accepted list, use the following command.
You can view configured PIM neighbor filters globally or for a specific IP interface
using the following commands:
2. Configure the IPv4 address of the switch interface which will be advertised as a
candidate RP for the specified multicast group:
The switch interface will participate in the election of the RP that occurs on the
Bootstrap Router, or BSR (see “Specifying a Bootstrap Router” on page 300).
Alternately, if no election is desired, the switch can provide a static RP, specified
using the following command:
3. If using dynamic RP candidates, configure the amount of time that the elected
interface will remain the RP for the group before a re-election is performed:
Use the following commands to configure the DR priority value (Interface IP mode):
Note: A value of 0 (zero) specifies that the EN2092 will not act as the DR. This
setting requires the EN2092 to be connected to a peer that has a DR priority
setting of 1 or higher in order to ensure that a DR will be present in the
network.
© Copyright IBM Corp. 2014 Chapter 25: Protocol Independent Multicast 299
Specifying a Bootstrap Router
Using PIM-SM, a Bootstrap Router (BSR) is a PIM-capable router that hosts the
election of the RP from available candidate routers. For each PIM-enabled IP
interface, the administrator can set the preference level for which the local interface
becomes the BSR:
A value of 255 highly prefers the local interface as a BSR. A value of -1 indicates
that the PIM CBSR preference is not configured on the local interface.
If using ACLs or VMAPs, be sure to permit traffic for local hosts and routers.
• IGMP Query is disabled by default. If IGMP Querier is needed with PIM, be sure
to enable the IGMP Query feature globally, as well as on each VLAN where it is
needed.
• If the switch is connected to multicast receivers and/or hosts, be sure to enable
IGMP snooping globally, as well as on each VLAN where PIM receivers are
attached.
2. Configure a PIM network component with dynamic RP settings, and set it for
PIM Sparse Mode:
The IP interface represents the PIM network being connected to the switch. The
IPv4 addresses in the defined range must not be included in another IP interface
on the switch under a different VLAN.
4. Enable PIM on the IP interface and assign the PIM component:
© Copyright IBM Corp. 2014 Chapter 25: Protocol Independent Multicast 301
Example 2: PIM-SM with Static RP
The following commands can be used to modify the prior example configuration to
use a static RP:
Where 225.1.0.0 255.255.0.0 is the multicast group base address and mask, and
10.10.1.1 is the static RP address.
Note: The same static RP address should be configured for all switches in the
group.
Example 3: PIM-DM
This example configures PIM Dense Mode (PIM-DM) on one IP interface. PIM-DM
can be configured independently, or it can be combined with the prior PIM-SM
examples (which are configured on a different PIM component) as shown in
Figure 33.
Note: In the following example, since the receivers and sources are connected in
different areas, the border router must be configured for the IPMC traffic to
be forwarded. IBM Networking OS supports only partial configuration of PIM
border router.
Figure 33. Network with both PIM-DM and PIM-SM Components
PIM-SM PIM-DM
Multicast Multicast
225.1.0.0/16 239.1.0.0/16
PIM Enabled
IBM Switch
IP Interface 11 IP Interface 22
IP 10.10.1.1 IP 10.10.1.2
VLAN 101 VLAN 102
Component 1 Component 2
Media
Servers
EN 2092(config)# interface ip 22
EN 2092(config-ip-if)# ip address 10.10.1.2 255.255.255.255
EN 2092(config-ip-if)# vlan 102
EN 2092(config-ip-if)# enable
5. (Optional) Configure PIM border router if the IPMC traffic is flowing between
PIM domains:
Note: For PIM Dense Mode, the DR, RP, and BSR settings do not apply.
© Copyright IBM Corp. 2014 Chapter 25: Protocol Independent Multicast 303
304 EN2092 1Gb Ethernet Scalable Switch: Application Guide
Part 6: High Availability
Fundamentals
Internet traffic consists of myriad services and applications which use the Internet
Protocol (IP) for data delivery. However, IP is not optimized for all the various
applications. High Availability goes beyond IP and makes intelligent switching
decisions to provide redundant network configurations.
In Figure 34, four ports are trunked together between the switch and the enterprise
routing device. Connectivity is maintained as long as one of the links remain active.
The links to the server are also trunked, allowing the secondary NIC to take over in
the event that the primary NIC link fails.
Figure 34. Trunking Ports for Link Redundancy
Enterprise
Server
Routing Switch
NIC 1
Internet
NIC 2
Trunk Trunk
For more information on trunking, see “Ports and Trunking” on page 121.
You may select a physical port, static trunk, or an LACP adminkey as a Hot Link
interface. Only external uplink ports can be members of a Hot Links trigger interface.
Forward Delay
The Forward Delay timer allows Hot Links to monitor the Master and Backup
interfaces for link stability before selecting one interface to transition to the active
state. Before the transition occurs, the interface must maintain a stable link for the
duration of the Forward Delay interval.
Preemption
You can configure the Master interface to resume the active state whenever it
becomes available. With Hot Links preemption enabled, the Master interface
transitions to the active state immediately upon recovery. The Backup interface
immediately transitions to the standby state. If Forward Delay is enabled, the
transition occurs when an interface has maintained link stability for the duration of
the Forward Delay period.
FDB Update
Use the FDB update option to notify other devices on the network about updates to
the Forwarding Database (FDB). When you enable FDB update, the switch sends
multicasts of addresses in the forwarding database (FDB) over the active interface,
so that other devices on the network can learn the new path. The Hot Links FBD
update option uses the station update rateto determine the rate at which to send
FDB packets.
When the appropriate number of links in a trigger group return to service, the switch
enables the internal ports. This causes the NIC team on the affected server blades
to fail back to the primary switch (unless Auto-Fallback is disabled on the NIC team).
The backup switch processes traffic until the primary switch’s internal links come up,
which can take up to five seconds.
VLAN Monitor
The VLAN Monitor allows Layer 2 Failover to discern different VLANs. With VLAN
Monitor turned on:
• If enough links in a trigger fail (see “Setting the Failover Limit” on page 313), the
switch disables all internal ports that reside in the same VLAN membership as
the trunk(s) in the trigger.
• When enough links in the trigger return to service, the switch enables the internal
ports that reside in the same VLAN membership as the trunk(s) in the trigger.
If you turn off the VLAN Monitor (EN 2092# no failover vlan), only one
failover trigger is allowed. When a link failure occurs on the trigger, the switch
disables all internal server-blade ports.
Server 2
Internet
Server 3
Trigger 1
Server 4
Backup Switch
Enterprise
Routing Switch
VLAN 1:
VLAN 2:
VLAN Monitor = On
Figure 58 shows a configuration with two trunks, each in a different Failover Trigger.
Switch 1 is the primary switch for Server 1 and Server 2. Switch 2 is the primary
switch for Server 3 and Server 4. VLAN Monitor is turned on. STP is turned off.
If all links go down in trigger 1, Switch 1 disables all internal ports that reside in
VLAN 1. If all links in trigger 2 go down, Switch 1 disables all internal ports that
reside in VLAN 2.
Figure 36. Two trunks, each in a different Failover Trigger
Trigger 1 Switch 1
Server 1
Trigger 2
Server 2
Internet
Server 3
Trigger 1
Server 4
Enterprise Trigger 2 Switch 2
Routing Switch
VLAN 1:
VLAN 2:
VLAN Monitor = On
Figure 59 shows a configuration with two trunks. VLAN Monitor is turned off, so only
one Failover Trigger is configured on each switch. Switch 1 is the primary switch for
Server 1 and Server 2. Switch 2 is the primary switch for Server 3 and Server 4. STP
is turned off.
If all links in trigger 1 go down, switch 1 disables all internal links to server blades.
Trigger 1 Switch 1
Server 1
Server 2
Internet
Server 3
Trigger 1
Server 4
Enterprise Switch 2
Routing Switch
VLAN 1:
VLAN 2:
VLAN Monitor = Off
The switch automatically enables the control list items when the monitor list items
return to service.
A monitor port is considered operational as long as the following conditions are true:
• The port must be in the Link Up state.
• If STP is enabled, the port must be in the Forwarding state.
• If the port is part of an LACP trunk, the port must be in the Aggregated state.
If any of the above conditions is false, the monitor port is considered to have failed.
A control port is considered Operational if the monitor trigger is up. As long as the
trigger is up, the port is considered operational from a teaming perspective, even if
the port itself is actually in the Down state, Blocking state (if STP is enabled on the
port), or Not Aggregated state (if part of an LACP trunk).
To view the state of any port, use one of the following commands:
LACP
Link Aggregation Control Protocol allows the switch to form dynamic trunks. You can
use the admin key to add up to 64 LACP trunks to a failover trigger using automatic
monitoring. When you add an admin key to a trigger, any LACP trunk with that
admin key becomes a member of the trigger.
When the switch determines that ports in the trigger are in STP Forwarding state,
then it automatically enables the appropriate internal ports, based on the VLAN
monitor. The switch fails back to normal operation.
VRRP Overview
In a high-availability network topology, no device can create a single point-of-failure
for the network or force a single point-of-failure to any other part of the network. This
means that your network will remain in service despite the failure of any single
device. To achieve this usually requires redundancy for all vital network
components.
With VRRP, Virtual Interface Routers (VIR) allow two VRRP routers to share an IP
interface across the routers. VIRs provide a single Destination IPv4 (DIP) address
for upstream routers to reach various servers, and provide a virtual default Gateway
for the server blades.
Virtual Router
Two or more VRRP routers can be configured to form a virtual router (RFC 2338).
Each VRRP router may participate in one or more virtual routers. Each virtual router
consists of a user-configured virtual router identifier (VRID) and an IPv4 address.
There is no requirement for any VRRP router to be the IPv4 address owner. Most
VRRP installations choose not to implement an IPv4 address owner. For the
purposes of this chapter, VRRP routers that are not the IPv4 address owner are
called renters.
Within each virtual router, one VRRP router is selected to be the virtual router
master. See “Selecting the Master VRRP Router” on page 319 for an explanation of
the selection process.
Note: If the IPv4 address owner is available, it will always become the virtual router
master.
The virtual router master forwards packets sent to the virtual router. It also responds
to Address Resolution Protocol (ARP) requests sent to the virtual router's IPv4
address. Finally, the virtual router master sends out periodic advertisements to let
other VRRP routers know it is alive and its priority.
Within a virtual router, the VRRP routers not selected to be the master are known as
virtual router backups. Should the virtual router master fail, one of the virtual router
backups becomes the master and assumes its responsibilities.
At Layer 3, a Virtual Interface Router (VIR) allows two VRRP routers to share an IP
interface across the routers. VIRs provide a single Destination IPv4 (DIP) address
for upstream routers to reach various destination networks, and provide a virtual
default Gateway.
Note: Every VIR must be assigned to an IP interface, and every IP interface must
be assigned to a VLAN. If no port in a VLAN has link up, the IP interface of
that VLAN is down, and if the IP interface of a VIR is down, that VIR goes
into INIT state.
If the master is not available, the backup becomes the master and takes over
responsibility for packet forwarding and responding to ARP requests.
If, at any time, a backup determines that it has higher priority than the current
master does, it can preempt the master and become the master itself, unless
configured not to do so. In preemption, the backup assumes the role of master and
begins to send its own advertisements. The current master sees that the backup
has higher priority and will stop functioning as the master.
A backup router can stop receiving advertisements for one of two reasons—the
master can be down, or all communications links between the master and the
backup can be down. If the master has failed, it is clearly desirable for the backup
(or one of the backups, if there is more than one) to become the master.
Note: If the master is healthy but communication between the master and the
backup has failed, there will then be two masters within the virtual router. To
prevent this from happening, configure redundant links to be used between
the switches that form a virtual router.
© Copyright IBM Corp. 2014 Chapter 28: Virtual Router Redundancy Protocol 319
Failover Methods
With service availability becoming a major concern on the Internet, service
providers are increasingly deploying Internet traffic control devices, such as
application switches, in redundant configurations. Traditionally, these configurations
have been hot-standby configurations, where one switch is active and the other is in
a standby mode. A non-VRRP hot-standby configuration is shown in the figure
below:
Figure 38. A Non-VRRP, Hot-Standby Configuration
Intranet Clients
Primary Switch
IP: 200.200.200.100
A
Internet
Servers
B
Secondary Switch
IP: 200.200.200.101
Internet
Enterprise Switch 2
Routing Switch
Active (subnet B and D)
Hot-Standby Redundancy
The primary application for VRRP-based hot-standby is to support Server Load
Balancing when you have configured Network Adapter Teaming on your server
blades. With Network Adapter Teaming, the NICs on each server share the same
IPv4 address, and are configured into a team. One NIC is the primary link, and the
others are backup links. For more details, refer to the relevant network adapter
documentation.
Active
10.10.10.1
Clients
Switch 1
Interswitch
Servers
Link
Enterprise
Routing Switch Switch 2
10.10.10.2
Standby
Backup Link
© Copyright IBM Corp. 2014 Chapter 28: Virtual Router Redundancy Protocol 321
Virtual Router Group
The virtual router group ties all virtual routers on the switch together as a single
entity. By definition, hot-standby requires that all virtual routers failover as a group,
and not individually. As members of a group, all virtual routers on the switch (and
therefore the switch itself), are in either a master or standby state.
The virtual router group cannot be used for active-active configurations or any other
configuration that require shared interfaces.
Each VRRP advertisement can include up to 128 addresses. All virtual routers are
advertised within the same packet, conserving processing and buffering resources.
Parameter Description
Number of IP interfaces on the switch Helps elect the virtual routers with the
that are active (“up”) most available routes as the master. (An IP
interface is considered active when there
tracking-priority-increment is at least one active port on the same
interfaces VLAN.) This parameter influences the
VRRP router's priority in virtual interface
routers.
Number of active ports on the same Helps elect the virtual routers with the
VLAN most available ports as the master. This
parameter influences the VRRP router's
tracking-priority-increment priority in virtual interface routers.
ports
Note: In a hot-standby configuration, only
external ports are tracked.
Number of virtual routers in master Useful for ensuring that traffic for any
mode on the switch particular client/server pair is handled by
the same switch, increasing routing
tracking-priority-increment efficiency. This parameter influences the
virtual-routers VRRP router's priority in virtual interface
routers.
Each tracked parameter has a user-configurable weight associated with it. As the
count associated with each tracked item increases (or decreases), so does the
VRRP router's priority, subject to the weighting associated with each tracked item. If
the priority level of a standby is greater than that of the current master, then the
standby can assume the role of the master.
See “Configuring the Switch for Tracking” on page 324 for an example on how to
configure the switch for tracking VRRP priority.
© Copyright IBM Corp. 2014 Chapter 28: Virtual Router Redundancy Protocol 323
Virtual Router Deployment Considerations
Assigning VRRP Virtual Router ID
During the software upgrade process, VRRP virtual router IDs will be automatically
assigned if failover is enabled on the switch. When configuring virtual routers at any
point after upgrade, virtual router ID numbers must be assigned. The virtual router
ID may be configured as any number between 1 and 255. Use the following
commands to configure the virtual router ID:
The user can implement this behavior by configuring the switch for tracking as
follows:
1. Set the priority for switch 1 to 101.
2. Leave the priority for switch 2 at the default value of 100.
3. On both switches, enable tracking based on ports (ports), interfaces (ifs), or
virtual routers (vr). You can choose any combination of tracking parameters,
based on your network configuration.
Note: There is no shortcut to setting tracking parameters. The goals must first be
set and the outcomes of various configurations and scenarios analyzed to
find settings that meet the goals.
Active-Active Configuration
Figure 41 shows an example configuration where two EN2092s are used as VRRP
routers in an active-active configuration. In this configuration, both switches respond
to packets.
Figure 41. Active-Active High-Availability Configuration
NIC 1: 10.0.1.2/24
Internet NIC 2: 10.0.2.2/24
Server 3
NIC 1: 10.0.1.3/24
NIC 2: 10.0.2.3/24
4 Switch 2
Enterprise 1
Server 4
NIC 1: 10.0.1.4/24
Routing Switch 2 NIC 2: 10.0.2.4/24
L2 Switch VIR 1: 192.168.1.200 (Backup)
VIR 2: 192.168.2.200 (Master)
Although this example shows only two switches, there is no limit on the number of
switches used in a redundant configuration. It is possible to implement an
active-active configuration across all the VRRP-capable switches in a LAN.
In the scenario illustrated in Figure 41, traffic destined for IPv4 address 10.0.1.1 is
forwarded through the Layer 2 switch at the top of the drawing, and ingresses
EN2092 1 on port EXT1. Return traffic uses default gateway 1 (192.168.1.1).
If the link between EN2092 1 and the Layer 2 switch fails, EN2092 2 becomes the
Master because it has a higher priority. Traffic is forwarded to EN2092 2, which
forwards it to EN2092 1 through port EXT4. Return traffic uses default gateway 2
(192.168.2.1), and is forwarded through the Layer 2 switch at the bottom of the
drawing.
© Copyright IBM Corp. 2014 Chapter 28: Virtual Router Redundancy Protocol 325
To implement the active-active example, perform the following switch configuration.
EN 2092(config)# interface ip 1
EN 2092(config-ip-if)# ip address 192.168.1.100 255.255.255.0
EN 2092(config-ip-if)# vlan 10
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip address 192.168.2.101 255.255.255.0
EN 2092(config-ip-if)# vlan 20
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 3
EN 2092(config-ip-if)# ip address 10.0.1.100 255.255.255.0
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 4
EN 2092(config-ip-if)# ip address 10.0.2.101 255.255.255.0
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
4. Enable tracking on ports. Set the priority of Virtual Router 1 to 101, so that it
becomes the Master.
EN 2092(config)# vlan 10
EN 2092(config-vlan)# exit
EN 2092(config)# interface port EXT1
EN 2092(config-if)# switchport mode trunk
EN 2092(config-if)# switchport trunk allowed vlan add 10
EN 2092(config-if)# exit
EN 2092(config)# vlan 20
EN 2092(config-vlan)# exit
EN 2092(config)# interface port EXT2
EN 2092(config-if)# switchport mode trunk
EN 2092(config-if)# switchport trunk allowed vlan add 20
EN 2092(config-if)# exit
EN 2092(config)# interface ip 1
EN 2092(config-ip-if)# ip address 192.168.1.101 255.255.255.0
EN 2092(config-ip-if)# vlan 10
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip address 192.168.2.100 255.255.255.0
EN 2092(config-ip-if)# vlan 20
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 3
EN 2092(config-ip-if)# ip address 10.0.1.101 255.255.255.0
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 4
EN 2092(config-ip-if)# ip address 10.0.2.100 255.255.255.0
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
© Copyright IBM Corp. 2014 Chapter 28: Virtual Router Redundancy Protocol 327
3. Turn on VRRP and configure two Virtual Interface Routers.
4. Enable tracking on ports. Set the priority of Virtual Router 2 to 101, so that it
becomes the Master.
5. Configure ports.
EN 2092(config)# vlan 10
EN 2092(config-vlan)# exit
EN 2092(config)# interface port EXT1
EN 2092(config-if)# switchport mode trunk
EN 2092(config-if)# switchport trunk allowed vlan add 10
EN 2092(config-if)# exit
EN 2092(config)# vlan 20
EN 2092(config-vlan)# exit
EN 2092(config)# interface port EXT2
EN 2092(config-if)# switchport mode trunk
EN 2092(config-if)# switchport trunk allowed vlan add 20
EN 2092(config-if)# exit
IF 1: 174.14.20.110
IF 2: 10.1.1.110
VIR 1: 174.14.20.100
VIR 2: 10.1.1.100
NIC 1 IP = 10.0.1.1
Active Server 1
Switch 1
Internet
Hot Standby
Switch 2
NIC 1 IP = 10.0.1.2
Enterprise Server 2
Routing Switch IF 1: 174.14.20.111
IF 2: 10.1.1.111
VIR 1: 174.14.20.100 = Active Links
VIR 2: 10.1.1.100 = Standby Links
© Copyright IBM Corp. 2014 Chapter 28: Virtual Router Redundancy Protocol 329
Task 1: Configure EN2092 1
1. On EN2092 1, configure the interfaces for clients (174.14.20.110) and servers
(10.1.1.110).
EN 2092(config)# interface ip 1
EN 2092(config-ip-if)# ip address 174.14.20.110 (Define IPv4 address for interface 1)
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip address 10.1.1.110 (Define IPv4 address for interface 2)
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
4. Configure VRRP Group parameters. Set the VRRP priority to 101, so that this
switch is the Master.
EN 2092(config)# interface ip 1
EN 2092(config-ip-if)# ip address 174.14.20.111 (Define IPv4 address for interface 1)
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
EN 2092(config)# interface ip 2
EN 2092(config-ip-if)# ip address 10.1.1.111 (Define IPv4 address for interface 2)
EN 2092(config-ip-if)# enable
EN 2092(config-ip-if)# exit
EN 2092(config-vrrp)# hot-standby
4. Configure VRRP Group parameters. Use the default VRRP priority of 100, so
that this switch is the Standby.
© Copyright IBM Corp. 2014 Chapter 28: Virtual Router Redundancy Protocol 331
332 EN2092 1Gb Ethernet Scalable Switch: Application Guide
Part 7: Network Manage-
ment
LLDP Overview
Link Layer Discovery Protocol (LLDP) is an IEEE 802.1AB-2005 standard for
discovering and managing network devices. LLDP uses Layer 2 (the data link layer),
and allows network management applications to extend their awareness of the
network by discovering devices that are direct neighbors of already known devices.
With LLDP, the EN2092 can advertise the presence of its ports, their major
capabilities, and their current status to other LLDP stations in the same LAN. LLDP
transmissions occur on ports at regular intervals or whenever there is a relevant
change to their status. The switch can also receive LLDP information advertised
from adjacent LLDP-capable network devices.
The LLDP transmit function and receive function can be independently configured
on a per-port basis. The administrator can allow any given port to transmit only,
receive only, or both transmit and receive LLDP information.
The LLDP information to be distributed by the EN2092 ports, and that which has
been collected from other LLDP stations, is stored in the switch’s Management
Information Base (MIB). Network Management Systems (NMS) can use Simple
Network Management Protocol (SNMP) to access this MIB information.
LLDP-related MIB information is read-only.
Changes, either to the local switch LLDP information or to the remotely received
LLDP information, are flagged within the MIB for convenient tracking by
SNMP-based management systems.
For LLDP to provide expected benefits, all network devices that support LLDP
should be consistent in their LLDP configuration.
To view the LLDP transmit and receive status, use the following commands:
Scheduled Interval
The EN2092 can be configured to transmit LLDP information to neighboring devices
once each 5 to 32768 seconds. The scheduled interval is global; the same interval
value applies to all LLDP transmit-enabled ports. However, to help balance LLDP
transmissions and keep them from being sent simultaneously on all ports, each port
maintains its own interval clock, based on its own initialization or reset time. This
allows switch-wide LLDP transmissions to be spread out over time, though
individual ports comply with the configured interval.
The global transmit interval can be configured using the following command:
where interval is the number of seconds between LLDP transmissions. The range is
5 to 32768. The default is 30 seconds.
Minimum Interval
In addition to sending LLDP information at scheduled intervals, LLDP information is
also sent when the EN2092 detects relevant changes to its configuration or status
(such as when ports are enabled or disabled). To prevent the EN2092 from sending
multiple LLDP packets in rapid succession when port status is in flux, a transmit
delay timer can be configured.
The transmit delay timer represents the minimum time permitted between
successive LLDP transmissions on a port. Any interval-driven or change-driven
updates will be consolidated until the configured transmit delay expires.
The minimum transmit interval can be configured using the following command:
© Copyright IBM Corp. 2014 Chapter 29: Link Layer Discovery Protocol 337
Time-to-Live for Transmitted Information
The transmitted LLDP information is held by remote systems for a limited time. A
time-to-live parameter allows the switch to determine how long the transmitted data
should be held before it expires. The hold time is configured as a multiple of the
configured transmission interval.
where multiplier is a value between 2 and 10. The default value is 4, meaning that
remote systems will hold the port’s LLDP information for 4 x the 30-second
msgtxint value, or 120 seconds, before removing it from their MIB.
Trap Notifications
If SNMP is enabled on the EN2092 (see “Using Simple Network Management
Protocol” on page 31), each port can be configured to send SNMP trap notifications
whenever LLDP transmissions are sent. By default, trap notification is disabled for
each port. The trap notification state can be changed using the following
commands:
The trap delay timer represents the minimum time permitted between successive
trap notifications on any port. Any interval-driven or change-driven trap notices from
the port will be consolidated until the configured trap delay expires.
The minimum trap notification interval can be configured using the following
command:
If SNMP trap notification is enabled, the notification messages can also appear in
the system log. This is enabled by default. To change whether the SNMP trap
notifications for LLDP events appear in the system log, use the following
commands:
In addition, if LLDP is fully disabled on a port (using admstat disabled) and later
re-enabled, the EN2092 will temporarily delay resuming LLDP transmissions on the
port in order to allow the port LLDP information to stabilize. The reinitialization delay
interval can be globally configured for all ports using the following command:
© Copyright IBM Corp. 2014 Chapter 29: Link Layer Discovery Protocol 339
Types of Information Transmitted
When LLDP transmission is permitted on the port (see “Enabling or Disabling LLDP”
on page 336), the port advertises the following required information in
type/length/value (TLV) format:
• Chassis ID
• Port ID
• LLDP Time-to-Live
The EN2092 stores the collected LLDP information in the MIB. Each remote
LLDP-capable device is responsible for transmitting regular LLDP updates. If the
received updates contain LLDP information changes (to port state, configuration,
LLDP MIB structures, deletion), the switch will set a change flag within the MIB for
convenient notification to SNMP-based management systems.
Using the isCLI the following command displays remote LLDP information:
To view a summary of remote information, omit the Index number parameter. For
example:
© Copyright IBM Corp. 2014 Chapter 29: Link Layer Discovery Protocol 341
To view detailed information for a remote device, specify the Index number as found
in the summary. For example, in keeping with the sample summary, to list details for
the first remote device (with an Index value of 1), use the following command:
System Name :
System Description : IBM 1/10Gb Uplink Ethernet Switch Module for IBM
BladeCenter, IBM Networking OS: version 7.8, boot image: version 6.9.1.14
Note: Received LLDP information can change very quickly. When using show
commands, it is possible that flags for some expected events may be too
short-lived to be observed in the output.
Remote devices can also intentionally set their LLDP time-to-live to 0, indicating to
the switch that the LLDP information is invalid and should be immediately removed.
© Copyright IBM Corp. 2014 Chapter 29: Link Layer Discovery Protocol 343
LLDP Example Configuration
1. Turn LLDP on globally.
SNMP Version 1
To access the SNMP agent on the EN2092, the read and write community strings on
the SNMP manager should be configured to match those on the switch.
SNMPv1 and SNMPv2 have no default read and write communities. The read and
write community strings on the switch can be configured using the following
commands:
The SNMP manager should be able to reach the management interface or any one
of the IP interfaces on the switch.
For the SNMP manager to receive the SNMPv1 traps sent out by the SNMP agent
on the switch, configure the trap host on the switch with the following command:
Note: You can use a loopback interface to set the source IP address for SNMP
traps. Use the following command to apply a configured loopback interface:
EN 2092(config)# snmp-server trap-source loopback <1-5>
EN 2092(config)# snmp-server ?
For more information on SNMP MIBs and the commands used to configure SNMP
on the switch, see the IBM Networking OS 7.8 Command Reference.
Default Configuration
IBM Networking OS has four SNMPv3 users by default. All the four users have
access to all the MIBs supported by the switch:
• User 1 name is adminmd5 (password adminmd5). Authentication used is MD5.
Privacy protocol used is DES.
• User 2 name is adminsha (password adminsha). Authentication used is SHA.
Privacy protocol used is DES.
• User 3 name is adminshaaes (password Edpq132x!#9Zpx432w). Authenti-
cation used is SHA. Privacy protocol used is AES-128.
In boot strict mode (See “Boot Strict Mode” on page 36), IBM Networking OS has
only one SNMPv3 user:
• User 1 name is adminshaaes (password Edpq132x!#9Zpx432w). Authenti-
cation used is SHA. Privacy protocol used is AES-128.
2. Configure a user access group, along with the views the group may access.
Use the access table to configure the group’s access level.
Because the read view, write view, and notify view are all set to “iso,” the user
type has access to all private and public MIBs.
3. Assign the user to the user group. Use the group table to link the user to a
particular access group.
If you want to allow user access only to certain MIBs, see “View-Based
Configuration,” next.
© Copyright IBM Corp. 2014 Chapter 30: Simple Network Management Protocol 347
View-Based Configurations
• Switch User equivalent
To configure an SNMP user equivalent to the switch “user” login, use the
following configuration:
© Copyright IBM Corp. 2014 Chapter 30: Simple Network Management Protocol 349
Configuring SNMP Trap Hosts
SNMPv1 Trap Host
1. Configure a user with no authentication and password.
2. Configure an access group and group table entries for the user. Use the
following menu to specify which traps can be received by the user:
In the following example the user will receive the traps sent by the switch.
4. Specify the IPv4 address and other trap parameters in the targetAddr and
targetParam tables. Use the following commands to specify the user name
associated with the targetParam table:
Note: IBM Networking OS 7.8 supports only IPv4 addresses for SNMP trap hosts.
5. Use the community table to specify which community string is used in the trap.
The SNMPv2 trap host configuration is similar to the SNMPv1 trap host
configuration. Wherever you specify the model, use snmpv2 instead of snmpv1.
Note: IBM Networking OS 7.8 supports only IPv4 addresses for SNMPv1 and
SNMP v2 trap hosts.
© Copyright IBM Corp. 2014 Chapter 30: Simple Network Management Protocol 351
SNMPv3 Trap Host Configuration
To configure a user for SNMPv3 traps, you can choose to send the traps with both
privacy and authentication, with authentication only, or without privacy or
authentication.
It is not necessary to configure the community table for SNMPv3 traps because the
community string is not used by SNMPv3.
The following example shows how to configure a SNMPv3 user v3trap with
authentication only:
The IBM Networking OS SNMP agent supports the following generic traps as
defined in RFC 1215:
• ColdStart
• WarmStart
• LinkDown
• LinkUp
• AuthenticationFailure
The SNMP agent also supports two Spanning Tree traps as defined in RFC 1493:
• NewRoot
• TopologyChange
© Copyright IBM Corp. 2014 Chapter 30: Simple Network Management Protocol 353
The following are the enterprise SNMP traps supported in IBM Networking OS:
Table 27. IBM Networking OS-Supported Enterprise SNMP Traps
© Copyright IBM Corp. 2014 Chapter 30: Simple Network Management Protocol 355
Table 27. IBM Networking OS-Supported Enterprise SNMP Traps (continued)
© Copyright IBM Corp. 2014 Chapter 30: Simple Network Management Protocol 357
Switch Images and Configuration Files
This section describes how to use MIB calls to work with switch images and
configuration files. You can use a standard SNMP tool to perform the actions, using
the MIBs listed in Table 28. .
Table 28. lists the MIBS used to perform operations associated with the Switch
Image and Configuration files.
Table 28. MIBs for Switch Image and Configuration Files
agTransferServer 1.3.6.1.4.1872.2.5.1.1.7.1.0
agTransferImage 1.3.6.1.4.1872.2.5.1.1.7.2.0
agTransferImageFileName 1.3.6.1.4.1872.2.5.1.1.7.3.0
agTransferCfgFileName 1.3.6.1.4.1872.2.5.1.1.7.4.0
agTransferDumpFileName 1.3.6.1.4.1872.2.5.1.1.7.5.0
agTransferAction 1.3.6.1.4.1872.2.5.1.1.7.6.0
agTransferLastActionStatus 1.3.6.1.4.1872.2.5.1.1.7.7.0
agTransferUserName 1.3.6.1.4.1872.2.5.1.1.7.9.0
agTransferPassword 1.3.6.1.4.1.1872.2.5.1.1.7.10.0
agTransferTSDumpFileName 1.3.6.1.4.1.1872.2.5.1.1.7.11.0
The following SNMP actions can be performed using the MIBs listed in Table 28. .
• Load a new Switch image (boot or running) from a FTP/TFTP server
• Load a previously saved switch configuration from a FTP/TFTP server
• Save the switch configuration to a FTP/TFTP server
• Save a switch dump to a FTP/TFTP server
© Copyright IBM Corp. 2014 Chapter 30: Simple Network Management Protocol 359
Saving the Switch Configuration
To save the switch configuration to a FTP/TFTP server follow the steps below. This
example shows a FTP/TFTP server at IPv4 address 192.168.10.10, though IPv6 is
also supported.
1. Set the FTP/TFTP server address where the configuration file is saved:
Set agTransferServer.0 "192.168.10.10"
2. Set the name of the configuration file:
Set agTransferCfgFileName.0 "MyRunningConfig.cfg"
3. If you are using an FTP server, enter a username:
Set agTransferUserName.0 "MyName"
4. If you are using an FTP server, enter a password:
Set agTransferPassword.0 "MyPassword"
5. Initiate the transfer. To save a running configuration file, enter 4:
Set agTransferAction.0 "4"
RMON Overview
The RMON MIB provides an interface between the RMON agent on the switch and
an RMON management application. The RMON MIB is described in RFC 1757.
The RMON standard defines objects that are suitable for the management of
Ethernet networks. The RMON agent continuously collects statistics and proactively
monitors switch performance. RMON allows you to monitor traffic flowing through
the switch.
The switch supports the following RMON Groups, as described in RFC 1757:
• RMON Group 1–Statistics
• RMON Group 2–History
• RMON Group 3–Alarms
• RMON Group 9–Events
Data is stored in buckets, which store data gathered during discreet sampling
intervals. At each configured interval, the history instance takes a sample of the
current Ethernet statistics, and places them into a bucket. History data buckets
reside in dynamic memory. When the switch is re-booted, the buckets are emptied.
Requested buckets are the number of buckets, or data slots, requested by the user
for each History Group. Granted buckets are the number of buckets granted by the
system, based on the amount of system memory available. The system grants a
maximum of 50 buckets.
1.3.6.1.2.1.2.2.1.1.<x>
-mgmt.interfaces.ifTable.ifIndex.interface
The last digit (x) represents the interface on which to monitor, which corresponds to
the switch port number. History sampling is done per port, by utilizing the interface
number to specify the port number.
where <x> is the number of the port to monitor. For example, the full OID for port
1 would be: 1.3.6.1.2.1.2.2.1.1.1
Index Owner
----- ----------------------------------------------
1 rmon port 1 history
Each Alarm index consists of a variable to monitor, a sampling time interval, and
parameters for rising and falling thresholds. The Alarm group can be used to track
rising or falling values for a MIB object. The object must be a counter, gauge,
integer, or time interval.
Use one of the following commands to correlate an Alarm index to an Event index:
EN 2092(config)# rmon alarm <alarm number> rising-crossing-index <event number>
EN 2092(config)# rmon alarm <alarm number> falling-crossing-index <event number>
1.3.6.1.2.1.5.1.<x> - mgmt.icmp.icmpInMsgs
This value represents the alarm's MIB OID, as a string. Note that for non-tables, you
must supply a .0 to specify an end node.
Alarm Example 2
RMON events use SNMP and system logs to send notifications. Therefore, an
SNMP trap host must be configured for trap event notification to work properly.
RMON uses a syslog host to send syslog messages. Therefore, an existing syslog
host must be configured for event log notification to work properly. Each log event
generates a system log message of type RMON that corresponds to the event.
This configuration creates an RMON event that sends a syslog message each time
it is triggered by an alarm.
The EN2092 supports a “many to one” mirroring model. As shown in Figure 43,
selected traffic for ports EXT1 and EXT2 is being monitored by port EXT3. In the
example, both ingress traffic and egress traffic on port EXT2 are copied and
forwarded to the monitor. However, port EXT1 mirroring is configured so that only
ingress traffic is copied and forwarded to the monitor. A device attached to port
EXT3 can analyze the resulting mirrored traffic.
Figure 43. Mirroring Ports
38 39 40 41
The EN2092 supports two monitor ports with two-way mirroring, or four monitor
ports with one-way mirroring. Each monitor port can receive mirrored traffic from any
number of target ports.
IBM Networking OS does not support “one to many” or “many to many” mirroring
models where traffic from a specific port traffic is copied to multiple monitor ports.
For example, port EXT1 traffic cannot be monitored by both port EXT3 and EXT4 at
the same time, nor can port EXT2 ingress traffic be monitored by a different port
than its egress traffic.
Ingress and egress traffic is duplicated and sent to the monitor port after processing.
Note: The EN2092 1Gb Ethernet Scalable Switch (EN2092) cannot mirror
LACPDU packets. Also, traffic on management VLANs is not mirrored to the
external ports.
The following procedure may be used to configure port mirroring for the example
shown in Figure 43 on page 371:
1. Specify the monitoring port, the mirroring port(s), and the port-mirror direction.
If you have a VRRP address that two switches are sharing, then the VRID
number needs to be identical on both switches so each virtual router on each
switch knows with whom to share.
VRRP Virtual Router Redundancy Protocol. A protocol that acts very similarly to
Cisco's proprietary HSRP address sharing protocol. The reason for both of
these protocols is so devices have a next hop or default gateway that is always
available. Two or more devices sharing an IP interface are either advertising or
listening for advertisements. These advertisements are sent via a broadcast
message to an address such as 224.0.0.18.
With VRRP, one switch is considered the master and the other the backup. The
master is always advertising via the broadcasts. The backup switch is always
listening for the broadcasts. Should the master stop advertising, the backup will
take over ownership of the VRRP IP and MAC addresses as defined by the
specification. The switch announces this change in ownership to the devices
around it by way of a Gratuitous ARP, and advertisements. If the backup switch
didn't do the Gratuitous ARP the Layer 2 devices attached to the switch would
not know that the MAC address had moved in the network. For a more detailed
description, refer to RFC 2338.
You can solve many problems without outside assistance by following the
troubleshooting procedures that IBM provides in the online help or in the
documentation that is provided with your IBM product. The documentation that
comes with IBM systems also describes the diagnostic tests that you can perform.
Most systems, operating systems, and programs come with documentation that
contains troubleshooting procedures and explanations of error messages and error
codes. If you suspect a software problem, see the documentation for the operating
system or program.
You can find service information for IBM systems and optional devices at
http://www.ibm.com/support/.
For more information about Support Line and other IBM services, see
http://www.ibm.com/services/, or see http://www.ibm.com/planetwide/ for support
telephone numbers. In the U.S. and Canada, call 1-800-IBM-SERV
(1-800-426-7378).
In the U.S. and Canada, hardware service and support is available 24 hours a day,
7 days a week. In the U.K., these services are available Monday through Friday,
from 9 a.m. to 6 p.m.
© Copyright IBM Corp. 2014 Appendix B: Getting help and technical assistance 379
380 EN2092 1Gb Ethernet Scalable Switch: Application Guide
Appendix C. Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may be
used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you any
license to these patents. You can send license inquiries, in writing, to:
IBM may use or distribute any of the information you supply in any way it believes
appropriate without incurring any obligation to you.
Intel, Intel Xeon, Itanium, and Pentium are trademarks or registered trademarks of
Intel Corporation or its subsidiaries in the United States and other countries.
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc., in
the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
CD or DVD drive speed is the variable read rate. Actual speeds vary and are often
less than the possible maximum.
When referring to processor storage, real and virtual storage, or channel volume,
KB stands for 1024 bytes, MB stands for 1 048 576 bytes, and GB stands for
1 073 741 824 bytes.
Maximum internal hard disk drive capacities assume the replacement of any
standard hard disk drives and population of all hard disk drive bays with the largest
currently supported drives that are available from IBM.
Some software might differ from its retail version (if available) and might not include
user manuals or all program functionality.
Particulate • The room air must be continuously filtered with 40% atmospheric dust spot
efficiency (MERV 9) according to ASHRAE Standard 52.21.
• Air that enters a data center must be filtered to 99.97% efficiency or greater,
using high-efficiency particulate air (HEPA) filters that meet MIL-STD-282.
• The deliquescent relative humidity of the particulate contamination must be
more than 60%2.
• The room must be free of conductive contamination such as zinc whiskers.
Gaseous • Copper: Class G1 as per ANSI/ISA 71.04-19853
• Silver: Corrosion rate of less than 300 Å in 30 days
1 ASHRAE 52.2-2008 - Method of Testing General Ventilation Air-Cleaning Devices for Removal
Efficiency by Particle Size. Atlanta: American Society of Heating, Refrigerating and Air-Condi-
tioning Engineers, Inc.
2 The deliquescent relative humidity of particulate contamination is the relative humidity at which
the dust absorbs enough water to become wet and promote ionic conduction.
3 ANSI/ISA-71.04-1985. Environmental conditions for process measurement and control systems:
Airborne contaminants. Instrument Society of America, Research Triangle Park, North Carolina,
U.S.A.
In the request, be sure to include the publication part number and title.
When you send information to IBM, you grant IBM a non-exclusive right to use or
distribute the information in any way it believes appropriate without incurring any
obligation to you.
Properly shielded and grounded cables and connectors must be used in order to
meet FCC emission limits. IBM is not responsible for any radio or television
interference caused by using other than recommended cables and connectors or by
unauthorized changes or modifications to this equipment. Unauthorized changes or
modifications could void the user's authority to operate the equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1) this device may not cause harmful interference, and (2)
this device must accept any interference received, including interference that may
cause undesired operation.
Dieses Gerät ist berechtigt, in Übereinstimmung mit dem Deutschen EMVG das
EG-Konformitätszeichen - CE - zu führen.
Verantwortlich für die Einhaltung der EMV Vorschriften ist der Hersteller:
IBM Deutschland
Technical Regulations, Department M456
IBM-Allee 1, 71137 Ehningen, Germany
Telephone: +49 7032 15-2937
E-mail: [email protected]
Generelle Informationen:
This is a Class A product based on the standard of the Voluntary Control Council for
Interference (VCCI). If this equipment is used in a domestic environment, radio
interference may occur, in which case the user may be required to take corrective
actions.
Please note that this equipment has obtained EMC registration for commercial use.
In the event that it has been mistakenly sold or purchased, please exchange it for
equipment certified for home use.
W
website, publication ordering 377
website, support 378
website, telephone support numbers 378
Printed in USA