Manual Router AFR677
Manual Router AFR677
Manual Router AFR677
Routing Configuration
Ruggedized ABB FOX Router AFR677
User Manual
User Manual - Routing Configuration
Ruggedized ABB FOX Router AFR677
Disclaimer: ABB has taken reasonable care in compiling this document, however ABB accepts no liability
whatsoever for any error or omission in the information contained herein and gives no other
warranty or undertaking as to its accuracy.
ABB can accept no responsibility for damages, resulting from the use of the network
components or the associated operating software. In addition, we refer to the conditions of
use specified in the license contract.
ABB reserves the right to amend this document at any time without prior notice.
Key 4
Configuration 5
1 Routing - Basics 7
1.1 ARP 9
1.2 CIDR 11
1.3 Net-directed Broadcasts 12
1.4 Multinetting 13
2 Static Routing 15
2.1 Port-based Router Interface 16
2.1.1 Configuration of the Router Interfaces 17
2.2 VLAN-based Router-Interface 19
2.3 Configuration of a Static Route 22
2.3.1 Configuration of a Static Route 22
2.3.2 Configuration of a redundant static route 23
2.3.3 Configuration of a redundant static route with load sharing 25
2.4 Static route tracking 26
2.4.1 Description of the static route tracking function 26
2.4.2 Application example for the static route tracking function 26
2.5 Adaptation for non-IP-compliant devices 29
3 Tracking 31
3.1 Interface tracking 32
3.2 Ping tracking 33
3.3 Logical tracking 35
3.4 Configuring the tracking 36
3.4.1 Configuring interface tracking 36
3.4.2 Application example for ping tracking 37
3.4.3 Application example for logical tracking 38
4 VRRP/E-VRRP 41
4.1 VRRP 42
4.1.1 Configuration of VRRP 44
4.2 E-VRRP 45
4.3 E-VRRP Domains 48
4.3.1 Configuration of E-VRRP domains 49
4.3.2 Example of configuration of E-VRRP domains 49
4.4 VRRP tracking 52
4.5 VRRP with load sharing 57
4.6 VRRP with Multinetting 58
5 RIP 59
5.1 Convergence 60
5.2 Maximum Network Size 62
6 OSPF 67
6.1 OSPF-Topology 68
6.1.1 Autonomous System 68
6.1.2 Router ID 69
6.1.3 Areas 69
6.1.4 Virtual Link 70
6.1.5 OSPF Router 72
6.1.6 Link State Advertisement 72
6.2 General Operation of OSPF 74
6.3 Setting up the Neighbor Relationship 75
6.4 Synchronization of the LSD 77
6.5 Route Determination 78
6.6 Configuring OSPF 79
7 Protocol-based VLANs 83
7.1 General Configuration 84
7.2 Configuration of the Example 85
8 Multicast Routing 87
8.1 Multicast Addresses 88
8.1.1 IP Multicast Addresses 88
8.1.2 MAC Multicast Addresses 90
8.1.3 Mapping IP MAC Multicast Addresses 91
8.2 Multicast Group Registration 92
8.3 PIM-DM/DVMRP 93
8.4 Scoping 96
8.5 Multicast Configuration 97
8.5.1 Example with Layer 3 Redundancy 97
8.5.2 Example with Layer 2 Redundancy 100
8.5.3 Tips for the configuration 101
A Appendix 103
A.1 Abbreviations used 104
A.2 Underlying IEEE Standards 106
A.3 List of RFCs 107
A.4 Entering the IP Parameters 109
A.5 Copyright of Integrated Software 112
A.5.1 Bouncy Castle Crypto APIs (Java) 112
A.5.2 Broadcom Corporation 112
The “Routing Configuration” user manual contains all the information you need to start operating the routing
function. It takes you step by step from a small router application through to the router configuration of a complex
network.
The manual enables you to configure your router by following the examples.
The “Routing Configuration” user manual requires you to be familiar with the content of the “Basic Configuration”
user manual.
You can use this manual to configure simple networks without any special knowledge. The configuration of
complex networks requires well-founded knowledge on the subject of routing and of the protocols IP, RIP, OSPF,
IGMP and VRRP.
The “Installation” user manual contains a device description, safety instructions, a description of the display, and
the other information that you need to install the device.
The “Basic Configuration” user manual contains the information you need to start operating the device. It takes
you step by step from the first startup operation through to the basic settings for operation in your environment.
The “Redundancy Configuration” user manual contains the information you need to select a suitable redundancy
procedure and configure that procedure.
You will find detailed descriptions of how to operate the individual functions in the “Web-based Interface” and
“Command Line Interface” reference manuals.
The Network Management Software AFS View provides you with additional options for smooth configuration and
monitoring:
Configuration of multiple devices simultaneously.
Graphical interface with network layouts.
Auto-topology discovery.
Event log.
Event handling.
Client / Server structure.
Browser interface
ActiveX control for SCADA integration
SNMP/OPC gateway
Key
List
Work step
Subheading
Link Indicates a cross-reference with a stored link
Note: A note emphasizes an important fact or draws your
attention to a dependency.
Courier ASCII representation in user interface
Execution in the Web-based Interface user interface
Execution in the Command Line Interface user interface
Symbols used:
Router
Switch
Bridge
Hub
A random computer
Configuration Computer
Server
1 Configuration
Because the configuration of a router is very dependent on the conditions in your network, you are first provided
with a general list of the individual configuration steps. To optimally cover the large number of options, this list is
followed by examples of networks that usually occur in the industry sector. The examples are selected so that the
configurations for other applications can be easily derived from them.
The configuration of the routing function usually contains the following steps:
Note: Adhere to the sequence of the individual configuration steps so that the configuration computer has access
to all the layer 3 Switches throughout the entire configuration phase.
Note: When you assign an IP address from the subnetwork of the management IP address to a router interface,
the Switch deletes the management IP address. You access the Switch via the IP address of the router interface.
Activate the routing globally before you assign an IP address from the subnetwork of the management IP address
to a router interface.
Note: When you assign the VLAN ID of the management VLAN to a router interface, the Switch deactivates the
management IP address. You access the Switch via the IP address of the router interface. The management
VLAN is the VLAN by means of which you access the management of all the Switches.
Note: Depending on your configuration steps, it may be necessary to change the IP parameters of your
configuration computer to enable access to the layer 3 Switches.
1 Routing - Basics
A router is a node for exchanging data on the layer 3 of the ISO/OSI layer model.
This ISO/OSI reference model had the following goals:
To define a standard for information exchange between open systems;
To provide a common basis for developing additional standards for open systems;
To provide international teams of experts with functional framework as the basis for independent development
of every layer of the model;
To include in the model developing or already existing protocols for communications between heterogeneous
systems;
To leave sufficient room and flexibility for the inclusion of future developments.
The reference model consists of 7 layers, ranging from the application layer to the physical layer.
What does the data exchange on the layer 3 mean in comparison with the data exchange on the layer 2?
Figure 1: Data Transport by a Switch and a Router in the OSI Reference Model‘s Layers
On the layer 2, the MAC address signifies the destination of a data packet. The MAC address is an address tied
to the hardware of a device. The layer 2 expects the receiver in the connected network. The data exchange to
another network is the task of layer 3. Layer 2 data traffic is spread over the entire network. Every subscriber filters
the data relevant for him from the data stream. Layer 2 switches are capable of steering the data traffic that is
intended for a specific MAC address. It thus relieves some of the load on the network. Broadcast and multicast
data packets are forwarded by the layer 2 switches at all ports.
IP is a protocol on the layer 3. IP provides the IP address for addressing data packets. The IP address is assigned
by the network administrator. By systematically assigning IP addresses, he can thus structure his network,
breaking it down into subnets (see on page 11 „CIDR“). The bigger a network gets, the greater the data volume.
Because the available bandwidth has physical limitations, the size of a network is also limited. Dividing large
networks into subnets limits the data volume on these subnets. Routers divide the subnets from each other and
only transmit the data that is intended for another subnet.
Figure 2: MAC Data Transmission: Unicast Data Packet (left) and Broadcast Data Packet (right)
This illustration clearly shows that broadcast data packets can generate a considerable load on larger networks.
You also make your network easier to understand by forming subnets, which you connect with each other using
routers and, strange as it sounds, also separate securely from each other.
A Switch uses the MAC destination address to transmit, and thus uses layer 2.
A router uses the IP destination address to transmit, and thus uses layer 3.
The subscribers associate the MAC and IP addresses using the Address Resolution Protocol (ARP).
1.1 ARP
The Address Resolution Protocol (ARP) determines the MAC address that belongs to an IP address. What is the
benefit of this?
Let's suppose that you want to configure your Switch using the Web-based interface. You enter the IP address of
your Switch in the address line of your browser. But which MAC address will your PC now use to display the
information in the Switch in your browser window?
If the IP address of the Switch is in the same subnet as your PC, then your PC sends what is known as an ARP
request. This is a MAC broadcast data packet that requests the owner of the IP address to send back his
MAC address. The Switch replies with a unicast data packet containing his MAC address. This unicast data packet
is called an ARP reply.
Query to everyone:
Whoever has the
IP address 149.218.112.101
please send me your MAC address.
149.218.112.159
00:80:63:10:11:12
149.218.112.101
00:80:63:10:11:25
Reply to PC:
My MAC address is
00:80:63:10:11:25.
If the IP address of the Switch is in a different subnet, then the PC asks for the MAC address of the gateway
entered in the PC. The gateway/router replies with its MAC address.
Now the PC packs the IP data packet with the IP address of the switch, the final destination, into a MAC frame
with the MAC destination address of the gateway/router and sends the data.
The router receives the data and releases the IP data packet from the MAC frame, so that it can then forward it in
accordance with its transmission rules.
Preabmle
MAC dest. address
MAC source address Layer 2
Type/length field
IP header with
IP source address and
IP destination address Layer 3
Data
Check field
Figure 4: Structure of a data packet from the ISO/OSI layer model perspective
All terminal devices still working with IPs of the first generation, for example, are not yet familiar with the term
'subnet'. They also send an ARP request when they are looking for the MAC address for an IP address in
a different subnet. They neither have a network mask with which they could recognize that the subnet is a different
one, nor do they have a gateway entry. In the example below, the left PC is looking for the MAC address of the
right PC, which is in a different subnet. In this example, it would normally not get a reply.
Because the router knows the route to the right PC, the proxy ARP function replies to this router interface on behalf
of the right PC with its own MAC address. Thus the left PC can address its data to the MAC address of the router,
which then forwards the data to the right PC.
Query to everyone:
Whoever has the
IP address 10.0.2.111.
10.0.1.159 10.0.2.111
00:80:63:10:11:12
Prox-ARP
00:80:63:10:22:25
Reply to PC:
The IP address 10.0.1.111
has the MAC address
00:80:63:10:22:25.
The proxy ARP function is available on the router interfaces on which you switch on the proxy ARP.
1.2 CIDR
The original class allocation of the IP addresses only planned for three address classes to be used by the users
(see “Basics of IP Parameters” in the basic configuration of the user manual).
Since 1992, five classes of IP address have been defined in the RFC 1340.
Class C with a maximum of 254 addresses was too small, and class B with a maximum of 65534 addresses was
too large for most users, as they would never require so many addresses. This resulted in ineffective usage of the
class B addresses available.
Class D contains reserved multicast addresses. Class E is reserved for experimental purposes. A gateway not
participating in these experiments ignores datagrams with this destination address.
The Classless Inter-Domain Routing (CIDR) provides a solution to these problems. The CIDR overcomes these
class boundaries and supports classless address ranges.
With CIDR, you enter the number of bits that designate the IP address range. You represent the IP address range
in binary form and count the mask bits that designate the network mask. The network mask indicates the number
of bits that are identical for all IP addresses, the network part, in a given address range. Example:
IP address, decimal Network mask, IP address, hexadecimal
decimal
149.218.112.1 255.255.255.128 10010101 11011010 01110000 00000001
149.218.112.127 10010101 11011010 01110000 01111111
25 mask bits
CIDR notation: 149.218.112.0/25
Mask bits
The combination of a number of class C address ranges is known as “supernetting”. This enables you to subdivide
class B address ranges to a very fine degree.
Using mask bits simplifies the routing table. The router determines in that direction in which most of the mask bits
match (longest prefix match).
A net-directed broadcast is an IP data packet that a device sends to a net‘s broadcast address1 to address all
receivers of that net. In a transfer network, a net-directed broadcast is sent as a MAC unicast frame. If the router
locally responsible for that network supports net-directed broadcasts, it sends these data packets as a MAC
broadcast frame to its local network.
If the router interface is VLAN based, the router sends the frame to all ports that are members of the router
interface VLAN.
This way, net-directed broadcasts can relieve your transfer network from multiple IP unicasts which would be
necessary as an alternative for a net-directed broadcast.
If the router does not support net-directed broadcasts, or if you deactivate this function for a router interface, the
router discards the received IP data packets which have been sent to the router interface‘s network broadcast
address. In case of multinetting, this applies also to the router interface‘s secondary IP addresses.
1. The net broadcast address is the topmost IP address of an IP network for which a router interface is
responsible. The device determines the broadcast address from its interface IP address and the corresponding
network mask.
If a router interface has e.g. the IP address 192.168.1.1 and the network mask 255.255.255.0, it is responsible for
the network 192.168.1.0/24. The net broadcast address is in this case 192.168.1.255.
1.4 Multinetting
Multinetting allows you to connect a number of subnets to one router port. Multinetting provides a solution for when
you want to connect existing subnets to a router within a physical medium. In this case you can use multinetting
to assign a number of IP addresses for the different subnets to the routing port to which you are connecting the
physical medium.
For a long-term solution, other network design strategies provide more advantages with regard to problem solving
and bandwidth management.
10.0.1.2/24 10.0.1.3/24
10.0.2.3/24
10.0.1.1/24
10.0.2.1/24 10.0.2.9/24
10.0.1.9/24
2 Static Routing
Static routes are user-defined routes which the Switch uses to transmit data from one subnet to another.
The user specifies to which router (next hop) the Switch forwards data for a particular subnet. Static routes are
kept in a table which is permanently stored in the Switch.
Compared to dynamic routing, the advantage of this transparent route selection is offset by the increased workload
involved in configuring the static routes. Static routing is therefore suited to very small networks or to selected
areas of larger networks. Static routing makes the routes transparent for the administrator and can be easily
configured in small networks.
If, for example, a line interruption causes the topology to change, the dynamic routing can react automatically to
this, in contrast to the static routing. If you combine static and dynamic routing, you can configure the static routes
in such a way that they have a higher priority than a route selected by a dynamic routing procedure.
The first step in configuring the router is to globally switch on the router function and configure the router interfaces.
The Switch allows you to define port-based and VLAN-based router interfaces (see fig. 7).
SN 10 A
SN 11
VLAN ID 2
A characteristic of the port-based router interface is that a subnet is connected to a port (see fig. 7).
Below (see fig. 8) you will find an example of the simplest case of a routing application with port-based router
interfaces.
10.0.1.5/24 10.0.2.5/24
Interface 2.1 Interface 2.2
IP=10.0.1.1/24 IP=10.0.2.1/24
interface 2/1 Select the first port at which you want to enter the
router interface IP address.
ip address 10.0.1.1 Assign the IP parameters to the port.
255.255.255.0
routing Switch on the router function at this port.
exit Switch to the Configuration mode.
interface 2/2 Select the second port at which you want to enter
the router interface IP address.
ip address 10.0.2.1 Assign the IP parameters to the port.
255.255.255.0
routing Switch on the router function at this port.
ip netdirbcast Switch on the forwarding of net-directed
broadcasts at this port.
exit Switch to the Configuration mode.
exit Switch to the privileged EXEC mode.
Netdir Multi
Interface IP Address IP Mask Bcast CastFwd
--------- --------------- --------------- -------- --------
2/1 10.0.1.1 255.255.255.0 Disable Disable
2/2 10.0.2.1 255.255.255.0 Enable Disable
show ip interface 2/1 Verify the rest of the settings of interface 2/1.
show ip route bestroutes Check which routes the router actually uses for
the transmission.
Note: To be able to see these entries in the routing table, the port needs to have an active connection.
A characteristic of the VLAN-based router interface is that a number of devices in a VLAN are connected to
different ports. The devices within a subnet belong to one VLAN (see fig. 7).
Below you will find an example of the simplest case of a routing application with VLAN-based router interfaces.
For the VLAN 2, the router combines ports 3.1 and 3.2 into the VLAN router interface 9.1. A VLAN router interface
remains in the routing table until at least one port of the VLAN has a connection.
VLAN 1 10.0.2.6/24
10.0.1.5/24 Port 3.1
Interface 9.1 VLAN 2
A IP=10.0.2.1/24
Interface 2.1
IP=10.0.1.1/24 Port 3.2 10.0.2.5/24
show ip vlan Display the virtual router interface that the router
has set up for the VLAN.
show ip vlan
Logical
VLAN ID Interface IP Address Subnet Mask MAC Address
------- ---------- ----------- ------------- -----------------
2 9/1 0.0.0.0 0.0.0.0 00:80:63:51:74:2C
show ip interface brief Check the entry for the virtual router interface.
Netdir Multi
Interface IP Address IP Mask Bcast CastFwd
--------- --------------- --------------- -------- --------
9/1 0.0.0.0 0.0.0.0 Disable Disable
VLAN ID: 2
VLAN Name: Gerhard
VLAN Type: Static
n the “VLAN Name” line above, enter a name with which you want to identify the VLAN.
In the “Member” column of the table, you select the ports which will belong to this VLAN.
Click on “Next” at the bottom.
In the “IP Address” line of the “Primary Address” frame, you enter the IP address for the VLAN.
Enter the related network mask in the “Network mask” line.
Click on “Close” to end the configuration of the VLAN-based router interface.
In the router interface table, the router interface 9.1 appears.
In the static VLAN table, the VLAN appears.
Tick the box in the column „net-directed broadcasts“ for the router interface 9.1.
With “Delete“, you have the opportunity to delete a selected virtual router interface from the table or to reset
a physical router interface‘s entry.
Note: When you delete a VLAN router interface, the entry for the VLAN will remain in the VLAN table.
Deleting a VLAN deletes the VLAN router interface‘s entry in the router interface table.
In the example below, router A requires the information that it can reach the subnet 10.0.3.0/24 via the router B
(next hop). It can obtain this information via a dynamic routing protocol or via a static routing entry. With this
information, router A can transmit data from subnet 10.0.1.0/24 via router B into subnet 10.0.3.0/24.
Vice versa to be able to forward data of subnet 10.0.1.0/24 router B also needs an equivalent route.
A B Interface 2.2
Interface 2.1
IP=10.0.1.1 Interface 2.2 IP=10.0.3.1
IP=10.0.2.1
You can enter static routing for port-based and VLAN-based router interfaces.
A B Interface 2.2
Interface 2.1
IP=10.0.1.1 Interface 2.2 Interface 2.1 IP=10.0.3.1
IP=10.0.2.1 IP=10.0.2.2
You have the option of assigning importance (distance) to a route. If there are a number of routes to a destination,
then the router chooses the route with the highest importance. If you do not assign a value for the importance
during the configuration, the router takes the default value “1” for the importance. This is the highest importance.
Configure router A.
show ip route bestroutes Check which routes the router actually uses for
the transmission.
show ip route bestroutes Check which routes the router actually uses for
the transmission.
L1 L2
A B
L3
With the static route tracking function, the router uses a tracking object such as a ping tracking object (see on
page 33 „Ping tracking“) to detect the connection interruption. The active static route tracking function then deletes
the interrupted route from the current routing table. If the tracking object returns to the “up” state, the router enters
the static route in the current routing table again.
10.0.2.0/24
IF 1.4 IF 1.2 IF 1.3 IF 2.2
A B
IF 1.1 IF 1.2
10.0.4.0/24
10.0.1.0/24 10.0.5.0/24
Enter the two routes to destination network 10.0.5.0/24 in the static routing table of router A.
On router B, create a ping tracking object with the track ID, for example 22, for IP address 10.0.2.1.
Enter the two routes to destination network 10.0.1.0/24 in the static routing table of router B.
Some devices use a simplfied IP stack that does not correspond to the IP standard. Without an ARP request, these
devices send their responses to the MAC address contained as the source address in the requesting packet (see
figure below, no MAC/IP address resolution). These devices exhibit this behavior with ping requests in particular
(ICMP echo request). Some of these devices also exhibit this behavior with other data packets.
As long as the router interface of the router to which such a device is connected is itself connected to the MAC
address of the physical port, the router can receive and transmit the packet.
However, if the physical port belongs to a VLAN, the VLAN router interface then has its own MAC address. Thus
the router rejects packets that are being sent to the port's MAC address.
A terminal device that performs the MAC/IP address resolution according to the IP standard starts an ARP request
to determine the correct MAC address before sending the reply to the determined VLAN MAC address (see figure
below: MAC/IP standard address resolution using ARP).
A VLAN MAC:00:80:63:00:22:00
P
00 ort M
:8
0: AC Source: 00:80:63:00:00:02 MAC/IP address
63 :
:0 resolution via ARP
0:
00 complying with
:0 Destination:00:80:63:00:22:00
2 standard
Figure 14: Addressing with simplified IP stack and compliant with the standard
For you also to be able to connect devices with a simplified IP stack to a VLAN-based router interface, the router
provides you with the VLAN single MAC mode.
In the VLAN single MAC mode, all VLAN interfaces and all physical ports use the same MAC address, with the
exception of the port-based router interface.
3 Tracking
The tracking function gives you the option of monitoring certain objects, such as the availability of an interface.
A special feature of this function is that it forwards an object status change to an application, e.g. VRRP, which
previously registered as an interested party for this information.
The definition of "up" and "down" depends on the type of the tracking object (e.g. interface tracking).
Tracking can forward the state changes of an object to the following applications:
VRRP (see on page 52 „VRRP tracking“)
Static routing (see on page 26 „Static route tracking“)
With interface tracking the Switch monitors the link status of:
physical ports
link aggregation interfaces (interfaces 8.x)
VLAN router interfaces (interfaces 9.x)
S1 S2
L1 L2
A PC B
PC A
VR
B
A link aggregation interface has link status “down” if the link to all the participating ports is interrupted.
A VLAN router interface has link status “down” if the link is interrupted from all the physical ports/link aggregation
interfaces that are members of the corresponding VLAN.
Setting a delay time enables you to insert a delay before informing the application about an object status change.
An interface tracking object is given the “down” status if the physical link interruption remains for longer than the
“link down delay” delay time.
An interface tracking object is given the “up” status if the physical link holds for longer than the “link up delay” delay
time.
State on delivery: delay times = 0 seconds.
This means that if a status changes, the registered application is informed immediately.
You can set the “link down delay” and “link up delay” delay times independently of each other in the range from 0
to 255 seconds.
You can define an interface tracking object for each interface.
With ping tracking, the device uses ping requests to monitor the link status to other devices.
S2
L1 L2
A PC B
PC A
The device sends ping requests to the device with the IP address that you entered in the “IP Address” column.
The “Ping Interval” column allows you to define the frequency for sending ping requests, and thus the additional
network load.
If the response comes back within the time entered in the “Ping Timeout” column, this response is a valid “Ping
response received”.
If the response comes back after the time entered in the “Ping Timeout” column, or not at all, this response is
evaluated as “No ping response”.
Entering a number for unreceived or received ping responses enables you to set the sensitivity of the ping behavior
of the device. The device informs the application about an object status change.
Ping tracking enables you to monitor the accessibility of defined devices. As soon as a monitored device can no
longer be accessed, the device can choose to use an alternative path.
Logical tracking enables you to logically link multiple tracking objects with each other and thus perform relatively
complex monitoring tasks.
You can use logical tracking, for example, to monitor the link status for a network node to which redundant paths
lead (see on page 38 „Application example for logical tracking“).
When a logical link delivers the result “incorrect”, the device can choose to use an alternative path.
You configure the tracking by setting up tracking objects. The following steps are required to set up a tracking
object:
Enter the tracking object ID number (track ID).
Select a tracking type, e.g. interface.
Depending on the track type, enter additional options such as “port” or “link up delay” in the interface tracking.
Note: The registration of applications (e.g. VRRP) to which the tracking function reports status changes is
performed in the application itself (see on page 52 „VRRP tracking“).
Set up interface tracking at port 1.1 with a link down delay of 0 seconds and a link up delay of 3 seconds.
In the Routing:Tracking:Configuration dialog, click on “Wizard” at the bottom right.
Select type:
Enter the values you desire:
Track ID: 1
Type: interface
Click on “Continue”.
Properties:
Enter the values you desire:
Module.Port: 1.1
Link up delay: 3
Link down delay: 0
Click on “Finish” to leave the Wizard and save the entry temporarily in the configuration.
Set up ping tracking at port 1.2 for IP address 10.0.2.53 with the preset parameters.
In the Routing:Tracking:Configuration dialog, click on “Wizard” at the bottom right.
Select type:
Enter the values you desire:
Track ID: 21
Type: ping
Click on “Continue”.
Properties:
Enter the values you desire:
IP address: 10.0.2.53
Module.Port: 1.2
Ping interval [s]: 1
No ping response: 3
Ping responses received: 2
Ping timeout [ms]: 100
Click on “Finish” to leave the Wizard and save the entry temporarily in the configuration.
Parameter Value
Operand No. 1 (track ID) 21
Operand No. 2 (track ID) 22
S1 S2
L2
L1
PC B
L4 L3
A
PC A S4 S3
VR
B
S5
S6
Logical Tracking
No. of
ID Type Instances Status Mode Changes Time since last change
--- ---- ----------- ------ ------- ------- ----------------------
31 OR 21,22 DOWN Enable 0 0 day(s), 00:04:58
4 VRRP/E-VRRP
Terminal devices usually give you the option of entering a default gateway for transmitting data packets in external
subnetworks. Here the term “Gateway” applies to a router by means of which the terminal device can communicate
in other subnetworks.
If this router fails, the terminal device cannot send any more data to external subnetworks.
In this case, the Virtual Router Redundancy Protocol (VRRP) provides assistance.
VRRP is a type of “gateway redundancy”. VRRP describes a process that groups multiple routers into one virtual
router. Terminal devices always address the virtual router, and VRRP ensures that a physical router belonging to
the virtual router takes over the data transmission.
Even if a physical router fails, VRRP ensures that another physical router takes over the distribution tasks as part
of the virtual router.
VRRP has typical switching times of 3 to 4 seconds when a physical router fails.
In many cases, such as Voice over IP, Video over IP, industrial controllers, etc., these long switching times are not
acceptable.
VRRP was further developed into the E-VRRP (Enhanced Virtual Router Redundancy Protocol).
With the appropriate configuration, E-VRRP guarantees maximum switching times of 400 milliseconds.
Thanks to this guaranteed switching time, E-VRRP enables the use of “gateway redundancy” in time-critical
applications. Even in tunnel controllers that require switching times of less than one second, the user can improve
the network availability with this form of “gateway redundancy”.
4.1 VRRP
All the routers within a network on which VRRP is active specify among themselves which router is to be the
master. This router contains the IP and MAC address of the virtual router. All the devices in the network that have
entered this virtual IP address as the default gateway use the master as the default gateway.
Redundancy
through VRRP
10.0.1.13
10.0.1.12 10.0.1.1
Default Gateway A
10.0.1.254 10.0.1.11 10.0.1.254 VR
B
10.0.1.2
10.0.1.10
If the master fails, then the remaining routers use the VRRP to specify a new master. This router then takes over
the IP and MAC address of the virtual router. Thus the devices find their route via their default gateway, as before.
The devices always only see the master with the virtual MAC and IP addresses, regardless of which router is
actually behind this virtual address.
The virtual router IP address is assigned by the administrator.
The VRRP specifies the virtual MAC address with:
00:00:5e:00:01:<VRID>.
The first 5 octets form the fixed part in accordance with RFC 2338.
The last octet is the virtual router ID (VRID). It is a number between 1 and 255. On the basis of this, the
administrator can define 255 virtual routers within a network.
00:00:5e:00:01:xx
The VRRP router sends IP Multicast messages to the IP Multicast address 224.0.0.18 in order to determine the
master. The router with the highest VRRP priority becomes the master. The VRRP priority is specified by the
administrator. If the VRRP priorities are the same, then the highest IP interface address of the VRRP routers is
decisive. If the virtual IP address is the same as the IP address of a router interface, then this router is the IP
address owner. VRRP sets the VRRP priority of an IP address owner to the value 255 and thus declares it the
master. If there is no IP address owner, then VRRP declares the router with the highest VRRP priority the master.
The master regularly sends IP Multicast messages (default: 1 s) to the other VRRP routers in order to signal that
it is ready for operation. If this message does not appear three times in a row, then the VRRP router with the
highest remaining VRRP priority declares itself the new master.
1. The IP address owner as it has the highest VRRP priority (255) by definition.
2. The VRRP router with the highest VRRP priority.
3. If the priorities are the same, the VRRP router with the highest IP address.
VRRP terms:
Virtual router
A virtual router is a router or group of routers that act as the default gateway in a network and use the Virtual
Router Redandancy Protocol.
VRRP router
A VRRP router is a router that uses VRRP. It can be part of one or more virtual routers.
Master router
The master router is the router within the virtual router that is currently responsible for forwarding data packets
and responding to ARP queries. The master router periodically sends messages (advertisements) to the other
VRRP routers (backup routers) to inform them about its existence.
IP address owner
The IP address owner is the VRRP router whose IP address is identical to the IP address of the virtual router.
By definition, it has the highest VRRP priority (255) and is thus automatically the master router.
Backup router
The backup router is a VRRP router that is not the master router. The backup router is ready to take over the
master role, should the master fail.
VRRP priority
The VRRP priority is a number between 1 and 255. It is used to determine the master router. The value 255 is
reserved for the IP address owner.
VRID
The VRID (virtual router ID) uniquely identifies a virtual router.
Virtual router MAC address
The virtual router MAC address is the MAC address of the virtual router (see fig. 4).
Virtual router IP address
The virtual router IP address is the IP address of the virtual router.
Advertisement interval
The advertisement interval describes the frequency with which the master router sends its existence message
(advertisement) to all the VRRP routers of its virtual router. The values for the advertisement interval are
between 1 and 255 seconds. The default value is 1 second.
Skew time
The skew time is the time, dependent on the VRRP priority, that specifies the time when the backup router
names itself the master router.
Skew time = ((256 - VRRP priority) / 256) * 1 second
Master down interval
The master down interval specifies the time when the backup router names itself the master router.
Master down interval = 3 * advertisement interval + skew time
You configure every port at which VRRP will be active in the same way.
4.2 E-VRRP
E-VRRP provides a number of mechanisms for shortening the switching times or reducing the number of
Multicasts:
shorter advertisement intervals
link-down notification
preempt delay
Unicast advertisement
domains
In compliance with RFC 2338, the master sends IP Multicast messages (advertisements) at intervals of one
second to the other VRRP routers. Only if this message does not appear three times do the remaining routers
select a new master.
VRRP has typical switching times of 3 to 4 seconds.
3 * Advertisement Skew-Time
Interval
Router A Backup Router
Advertisement
Master Router
Advertisement
Master Router
Router C
0 1 2 3 4 5 6 t [s]
Figure 21: Master router <-> backup router switching times according to RFC 2338
VRRP priority router A = 64
VRRP priority router B = 128
VRRP priority router C = 254
To be able to achieve faster switching times, ABB provides E-VRRP so that the cycle for sending the IP Multicast
message can be shortened to as little as 0.1 seconds. You can thus achieve switching times that are up to ten
times as fast.
The router supports up to 16 VRRP router interfaces with this shortened sending cycle.
3 * Advertisement Skew-Time
Interval
Router A Backup Router
Advertisement
Master Router
Advertisement
Master Router
Router C
Figure 22: Master router <-> backup router switching times according to E-VRRP
VRRP priority router A = 64
VRRP priority router B = 128
VRRP priority router C = 254
Another option provided by E-VRRP for shortening the switching times dramatically is the link-down notification.
You can use this function when the virtual router consists of two VRRP routers. As two VRRP routers are
participating, it is sufficient to send the link-down notification in the form of a Unicast message. In contrast to the
Multicast message, the Unicast message travels beyond the boundaries of the subnetwork. This means that if the
link is down to your own subnetwork, the link-down notification can also travel via another subnetwork to reach the
second router of the virtual router.
As soon as E-VRRP detects that the link is down, it sends the link-down notification to the second router via a
different route. The second router takes over the master function immediately after receiving the link-down
notification.
In the preempt mode, the backup router can take over the master function from the master router as soon as the
backup router receives an advertisement from the master router for which the VRRP priority is lower than its own.
Thus the preempt mode, in collaboration with VRRP tracking (see page 52), can enable a switch to a better router.
However, dynamic routing procedures take a certain amount of time to react to changed routes and refill their
routing table.
To avoid the loss of packets during this time, delayed switching (preempt delay) from the master router to the
backup router enables the dynamic routing procedure to fill the routing tables.
E-VRRP provides an additional advantage for networks with devices that have problems with higher volumes of
Multicasts. Instead of sending advertisements in the form of Multicasts, E-VRRP can send the advertisements in
the form of Unicast data packets (VRRP destination address) when using up to two E-VRRP routers.
Note: If you want to avail of the advantages of E-VRRP, then only use VRRP routers equipped with the E-VRRP
function from ABB as the virtual router.
A E-VRRP instance is a router interface configured as E-VRRP with functions that E-VRRP contains. In a E-VRRP
domain you combine multiple E-VRRP instances of a router into one administrative unit. You nominate one E-
VRRP instance as the supervisor of the E-VRRP domain. This supervisor regulates the behavior of all E-VRRP
instances in its domain.
The supervisor sends its advertisements on behalf of all E-VRRP instances in its domain.
The supervisor puts itself and the other E-VRRP instances together into the master role or the backup role.
See fig. 23 for an example of a flat network structure. All cross-VLAN data streams pass through the ring.
A B
VLAN Router
Interfaces
show ip vlan Display the virtual router interface that the router
has set up for the VLAN.
show ip vlan Logical
VLAN ID Interface IP Address Subnet Mask MAC Address
------- ---------- ----------- ------------- ------------
11 9/1 0.0.0.0 0.0.0.0 00:80:63:51:74:2C
show ip interface brief Check the entry for the virtual router interface.
Netdir Multi
Interface IP Address IP Mask Bcast CastFwd
--------- --------------- --------------- -------- --------
9/1 0.0.0.0 0.0.0.0 Disable Disable
ip vrrp 1 Create the VRID for the first virtual router at this port.
ip vrrp 1 priority 200 Assign virtual router 1 the router priority 200.
ip vrrp 1 mode Switch on the first virtual router at this port.
ip vrrp 1 ip 10.0.11.1 Assign virtual router 1 its IP address.
ip vrrp 1 domain 1 supervisor Assign the E-VRRP domain and the domain role to the interface.
ip vrrp 1 timers advertise Assign the E-VRRP notification interval to the interface.
milliseconds 100
exit Switch to the Configuration mode.
exit Switch to the privileged EXEC mode.
VLAN ID : 11
VLAN Name : VLAN1
VLAN Type : Static
VLAN Creation Time: 0 days, 00:00:06 (System Uptime)
Interface Current Configured Tagging
---------- -------- ----------- --------
1/1 Exclude Autodetect Untagged
1/2 Exclude Autodetect Untagged
1/3 Exclude Autodetect Untagged
1/4 Exclude Autodetect Untagged
2/1 Include Include Untagged
2/2 Exclude Autodetect Untagged
2/3 Exclude Autodetect Untagged
2/4 Exclude Autodetect Untagged
3/1 Exclude Autodetect Untagged
3/2 Exclude Autodetect Untagged
9/1 Exclude Autodetect Untagged
By monitoring certain router statuses (e.g. line interruption), VRRP tracking makes it possible to switch to a better
router when a link goes down.
If there is a line interruption between Switch S1 and router A (see fig. 25), router B takes over the master function
for virtual router 10.0.1.254.
Router A remains the master for virtual router 10.0.2.254. However, router A no longer has a link to subnetwork
10.0.1.0.
The virtual router interfaces are independent of each other.
S1 Priority=200
10.0.1.20 10.0.1.1
A
10.0.1.254 VR VR 10.0.2.254
B
10.0.1.2
Priority=100
As soon as the VRRP master router with the VRRP tracking function active detects the interruption of one of its
links, it lowers its VRRP priority and informs the other VRRP routers of this.
Then another VRRP router, which now has the highest priority due to this change in the situation, can take over
the master function within the skew time.
S1 Master
PC A 10.0.1.1
A
10.0.1.254 VR VR 10.0.2.254
B PC B
10.0.1.2
Slave
Figure 25: Transmission path from PC B to PC A in the case of a line interruption without tracking
Note: As the IP address owner has the fixed VRRP priority 255 by definition, the VRRP tracking function requires
the IP addresses of the VRRP router interfaces to differ from the virtual router IP address.
Note: For the backup router to be able to take over the master function from the master router with the lower
priority, the VRRP tracking function requires that the preempt mode is activated.
S1 Priority=150
10.0.1.20 10.0.1.1 10.0.2.1
Port 1.1 A Port 1.2
10.0.1.254 VR VR 10.0.2.254
Port 1.1 10.0.2.2
B
10.0.1.2 Port 1.2
Priority=200
Set up interface tracking at port 1.1 with a link down delay of 0 seconds and a link up delay of 3 seconds.
Tracking
Enter the values you desire:
“Track ID”: 1
“Decrement”: 100
Click on “Add”.
Click on “Continue”.
Click on “Finish” to leave the Wizard and save the entry temporarily in the configuration.
ip vrrp 2 track 1 decrement 100 Register the first VRRP entry for the tracking object.
exit Switch to the Configuration mode.
exit Switch to the privileged EXEC mode.
show track applications Display the registered applications.
TrackId Application Changes Time since last change
------- ---------------------- ------- ---------------------
1 VRRP 1/2 VRID: 2 0 0 day(s), 00:38:24
With the simple configuration, a router performs the gateway function for all terminal devices. The capacity of the
redundant router lies idle. VRRP allows you to also use the capacity of the redundant router. By setting up a
number of virtual routers, you can enter different default gateways on the connected terminal devices and thus
steer the data flow.
When both routers are active, the data flows via the router on which the IP address of the default gateway has the
higher VRRP priority. If a router fails, then all the data flows via the remaining routers.
IP=10.0.1.1:
10.0.1.13 VRID=1, VR-IP=10.0.1.100, Priority= 200
VRID=2, VR-IP=10.0.1.200, Priority=100
Default Gateway
10.0.1.100 10.0.1.12
A
10.0.1.11 10.0.1.100
10.0.1.200 VR
Default Gateway B
10.0.1.200 10.0.1.10
IP=10.0.1.2:
VRID=1, VR-IP=10.0.1.100, Priority=100
VRID=2, VR-IP=10.0.1.200, Priority=200
10.0.1.13 IP=10.0.1.1
IP=10.0.2.1
Default Gateway
10.0.1.100 10.0.1.12
A
10.0.1.11 10.0.1.100
10.0.2.100 VR
B
Default Gateway
10.0.2.100 10.0.2.13
IP=10.0.1.2
IP=10.0.2.2
To use VRRP with multinetting, you perform the following configuration steps on the basis of an existing VRRP
configuration (see fig. 19):
Assign a second (secondary) IP address to the port.
Assign a second (secondary) IP address to the virtual router.
interface 2/3 Select the port at which you want to configure multinetting.
ip address 10.0.2.1 255.255.255.0 secondary Assign the second IP address to the port.
ip vrrp 1 ip 10.0.2.100 secondary Assign the second IP address to the virtual router with the VR-ID 1.
5 RIP
The Routing Information Protocol (RIP) is a routing protocol based on the distance vector algorithm. It is used for
the dynamic creation of the routing table for routers.
When you start a router, the router only knows the networks directly connected to it, and it sends this routing table
to the neighboring routers. At the same time, it requests the routing tables of its neighboring routers. The router
adds this information to its routing table and thus learns which networks can be accessed via which routers, and
how much effort is involved in this. In order to detect changes in the network (when a router fails or starts), the
routers regularly repeat the exchange of all the routing tables, usually every 30 seconds. This involves a
considerable bandwidth requirement in large networks.
The costs, also known as the metric, refer to the work involved in reaching a particular network. RIP uses the hop
count for this, which describes the number of routers that are traversed along the path to the destination network.
The name 'distance vector' is derived from the fact that the distance (metric) is the criterion for determining the
route, and the direction is specified by the next hop (vector). The next hop refers to the neighboring router along
the path to the destination address.
An entry in the routing table consists of the address of the next hop, the destination address and the metric. The
RIP routing table always contains the most efficient route to the destination. This is the route with the smallest
metric and the longest suitable network mask prefix.
HC = 1 HC = 2
SN 11
SN 10 A B C
HC = 4
HC = 1
D E F
HC = 2 HC = 3
In contrast to OSPF, a RIP router regularly exchanges the content of its entire routing table with its direct neighbor.
Every router knows only its own routes and the routes of its direct neighbor. Thus it only has a local perspective.
When changes are made in the network, it takes a while until all the routers have the same uniform view of the
network. The process of achieving this condition is known as convergence.
5.1 Convergence
Assumptions:
The interruption occurs 5 seconds after B sent its routing table.
The routers send their routing table every 30 seconds (= factory setting).
There is an interval of 15 seconds between when router A sends its routing table and when router B sends its
routing table.
HC = 1 HC = 2
SN 11
SN 10 A B C
HC = 4
HC = 1
D E F
HC = 2 HC = 3
0 seconds:
Interruption
10 seconds
Router A sends its routing table:
Router A
Destination Next hop Metric
SN 10 local 0
SN 11 Router B 2
Using the routing table from router A, router B sees that router A knows a connection to destination SN 11 with a
metric of 2. Because it does not have its own connection to router C as the next hop to SN 11, router B changes
its entry to destination SN 11. It enters router A as the next hop and increases the metric from router A by 1 to 3
(distance = learned distance + 1).
Router A
Destination Next hop Metric
SN 10 local 1
SN 11 Router B 4
Using the routing table from router A, router B sees that router A knows a connection to destination SN 11 with a
metric of 4. So router B increases its metric for SN 11 by 1 to 5.
The biggest problem with RIP is that routers only know their neighbors directly. This results in long convergence
times and the count-to-infinity problem. Infinity refers to the inaccessibility of a destination, and it is designated by
hop count 16 in RIP. If the above example did not contain the parallel path via routers D, E and F, then routers A
and B would keep sending their routing tables until the metric reached a value of 16. Then the routers recognize
that the destination is inaccessible.
Using the “split horizon” approach eliminates this looping problem between two neighboring routers. Split horizon
has two operating modes.
Simple split horizon Omits the entries known by a neighbor when sending the routing table to this neighbor.
Simple split horizon with poison reverse Sends the routing table to a neighbor with the entries known by this neighbor, but denotes these
entries with the infinity metric (=16).
Thus the hop count 16 specifies the maximum size of a network with RIP as the routing procedure. The longest
paths may use up to 15 routers.
The RFC 1058 from June 1988 specifies RIP version 1. Version 1 has the following restrictions:
Use of broadcasts for protocol messages.
Does not support subnetworks/CIDR.
No authentification.
The standardization of RIP version 2 in the RFC 2453 in 1998 eliminates the above restrictions.
RIP V2 sends its protocol messages as a multicast with the destination address 224.0.0.9, and supports
subnetwork masks and authentication.
However, the restrictions relating to the size of the network remain.
Advantages Disadvantages
Easy to implement Routing tables in large networks very comprehensive
Easy to administrate Routing information is distributed slowly, because there are fixed sending intervals. This applies in
particular to connections that have elapsed, since the routing table only contains existing paths.
Count-to-infinity
The advantage of RIP is the simple configuration. After the router interface is defined and the RIP is switched on,
RIP automatically enters the required routes in the routing table.
show ip rip interface brief Verify the settings for the RIP configuration.
The IP address entries remain at 0.0.0.0 as long as the routing function is switched off globally.
show ip rip interface brief Verify the settings for the RIP configuration.
6 OSPF
Open Shortest Path First (OSPF) is a dynamic routing protocol based on the Link State Algorithm. This algorithm
is based on the link states between the routers involved.
The significant metric in OSPF is the “OSPF costs”, which is calculated from the available bit rate of a link.
OSPF was developed by IETF. OSPF is currently specified as OSPFv2 in RFC 2328. Along with many other
advantages of OSPF, the fact that it is an open standard has contributed to the wide usage of this protocol. OSPF
has replaced the Routing Information Protocol (RIP) as the standard Interior Gateway Protocol (IGP) in large
networks.
Advantages Disadvantages
Every router calculates its routes independently of the other routers. Complicated to implement
All the routers have the same basic information. Complex administration due to the large number of options.
Rapid detection of link interruptions and rapid calculation of alternative routes.
The data volume for router information is relatively small, because information is
only sent when it is required, and only the information that applies to the
immediate neighbors.
Optimal path selection through evaluation of the link quality.
OSPF is a routing protocol based on the states of the links between the routers.
Using the link states collected from all the routers and the Shortest Path First algorithm, an OSPF router
dynamically creates its routing table.
6.1 OSPF-Topology
OSPF is hierarchically structured in order to limit the scope of the OSPF information to be exchanged in large
networks. You divide up your network using what are known as areas.
Autonomous System
Area 2
Area 1
ABR ASBR
ABR
Backbone Area 0
RIP
An AS uses an “Autonomous System Boundary Router” (ASBR) to connect with the outside world. An ASBR
understands multiple protocols and serves as a gateway to routers outside the areas. An ASBR is able to transfer
routes from different protocols into the OSPF. This process is known as redistribution.
6.1.2 Router ID
The router ID in the form of an IP address is used to uniquely identify every router within an autonomous system.
To improve the transparency, it is necessary to manually configure the router ID of every OSPF router. Thus there
is no automatic function that selects the router ID from the IP interfaces of the router.
6.1.3 Areas
Each area first forms its own database using the link states within the area. The data exchange required for this
remains within the area. Each area uses an Area Border Router (ABR) to link to other areas. The routing
information is summarized as much as possible between the areas (route summarization).
By using NSSAs, you can integrate ASBRs into the area without foregoing the advantage of stub areas, namely
that external routes from the backbone are not flooded into the corresponding area.
Thus NSSAs have the advantage that external routes coming from the backbone are not all entered in the
routing tables of the internal routers. At the same time, however, a limited number of external networks (which
can be reached across the boundaries of the NSSA) can be propagated into the backbone area.
NSSA
ASBR
BGP
Area 0
BGP = Border
Gateway Protocol RIP
Totally Stubby
Stub
Area 1 Area 2
Backbone Area 0 VL
ABR ABR
Figure 34: Linking a remote area to the backbone area with a virtual link (VL)
Router 2 Router 1
Router-ID: Router-ID:
2.2.2.2 1.1.1.1
Area 1
ABR ABR
Figure 35: Expanding the backbone area with a virtual link (VL)
Configuration for the expansion of the Backbone area (see fig. 35):
Router 1:
enable Switch to the Privileged EXEC mode.
configure Switch to the Configuration mode.
router ospf Switch to the Router Configuration mode.
area 1 virtual-link 2.2.2.2 Enter the neighboring router ID for a virtual link to area 1.
Router 2:
enable Switch to the Privileged EXEC mode.
configure Switch to the Configuration mode.
router ospf Switch to the Router Configuration mode.
area 1 virtual-link 1.1.1.1 Enter the neighboring router ID for a virtual link to area 1.
OSPF was specially tailored to the needs of larger networks and provides a fast convergence and minimum usage
of protocol messages.
The concept of OSPF is based on the creation, maintenance and distribution of what is called the link state
database. This data basis describes
all the routers within a routing domain (area) and
their active interfaces and routes,
how they are linked to each other and
the costs of these links.
All the routers within an area have an identical data basis, which means that they all know the exact topology within
this area.
Every router plays its part in setting up the respective data basis by propagating its local viewpoint as Link State
Advertisements (LSAs). These LSAs are then flooded to all the other routers within an area.
OSPF supports a range of different network types such as point-to-point networks (for example, packet over
SONET/SDH), broadcast networks (Ethernet) or non-broadcast networks.
Broadcast networks are distinguished by the fact that a number of systems (terminal devices, switches, routers)
are connected to the same segment and thus can all be addressed simultaneously via broadcasts/multicasts.
OSPF generally performs the following three steps in carrying out its tasks in the network:
Setting up the neighbor relationships (hello protocol)
Synchronizing the link state database
Route calculation
When a router is started, it uses what are called hello packets to contact its neighboring routers. With these hello
packets, an OSPF router finds out which OSPF routers are near it and whether they are suitable for setting up a
neighbor relationship (adjacency).
In broadcast networks such as Ethernet, the number of neighbors increases with the number of routers connected,
as does the information exchange for clarifying and maintaining the neighbor relationships. To reduce these
volumes within an area, OSPF uses the hello protocol to determine a Designated Router (DR) within the
corresponding segment. Thus every router in an area only sets up the neighbor relationship with its designated
router, instead of with every neighbor. The designated router is responsible for the distribution of all the link state
information to its neighbor routers.
For security reasons, OSPF provides for the selection of a Backup Designated Router (BDR), which takes over
the tasks of the DR if the DR fails. The OSPF router with the highest router priority is the DR. The router priority is
specified by the administrator. If two routers have the same priority, the router with the higher router ID is selected.
The router ID is the smallest IP address of a router interface. You configure this router ID manually when starting
up the OSPF router (see on page 69 „Router ID“).
DR BDR
Hello packets are also used to check the configuration within an area (area ID, timer values, priorities) and to
monitor the neighbor relationships. Hello packets are sent cyclically (hello interval). If hello packets are not
received for a specific period (dead interval), the neighbor relationship is terminated and all the corresponding
routes are deleted.
The hello interval (default: 10 seconds) and the dead interval (default: 30 seconds) can be configured for each
router interface, but they must be uniform within an area.
show ip ospf neighbor brief all Displays the neighbor relationships of the router.
The central part of the OSPF is the Link State Database (LSD). This database contains a description of the
network and the states of all the routers. It is the source for calculating the routing table. It reflects the topology of
the network. It is set up after the designated router and backup designated router have been determined within an
area (broadcast networks).
To set up the LSD and update any topology changes, the OSPF router sends link status advertisements (LSA) to
all the directly accessible OSPF routers.
These link status advertisements consist of the interfaces and the neighbors of the sending OSPF router that can
be reached via these interfaces. OSPF routers put this information into their databases and flood the information
to all the ports.
If no topology changes occur, every router repeats its own LSAs every 30 minutes.
You can view the content of the Link State Database with the CLI command “show ip ospf database”, whereby the
entries are output in accordance with the areas.
AS External States
The interpretation of the link ID presented depends on the corresponding LSA type:
After the LSDs are learned and the neighbor relationships go to the full state, every router calculates a path to
every destination using the Shortest Path First (SPF) algorithm. After the optimal path to every destination has
been determined, these routes are entered in the routing table. The route calculation is generally based on the
accessibility of a hop and the metric (costs). The costs are added up over all the hops to the destination.
The costs of an individual router interface are based on the available bandwidth of this link. The calculation for the
standard setting is based on the following formula:
The table shows that this form of calculation in the standard configuration does not permit any distinction between
fast Ethernet and gigabit Ethernet.
You can change the standard configuration by assigning a different value for the costs to each OSPF interface.
This enables you to differentiate between fast Ethernet and gigabit Ethernet.
In the state on delivery, the default values are selected so that you can configure simple OSPF functions in just a
few steps.
After the router interface is defined and OSPF is switched on, OSPF automatically enters the required routes in
the routing table.
The example (see fig. 37) shows a simple OSPF configuration. Area 0 is already defined in the state on delivery.
The terminal devices do not have an OSPF function, so you do not have to activate OSPF on the corresponding
router interface. By activating the redistribute function, you can inject the routes to the terminal devices into the
OSPF.
interface 2/1 Switch to the Interface Konfiguration mode of interface 2.1 to setup OSPF.
ip address 10.0.2.2 255.255.255.0 Assign the IP parameters to the port.
routing Switch on the router function at this port.
ip ospf Switch on OSPFat this port .
exit Switch to the Configuration mode.
show ip ospf Verify the settings for the global OSPF configuration.
Redistributing.................................
Source......................................... Connected
Metric......................................... Not Configured
--More-- or (q)uit
Metric Type.................................... 2
Tag............................................ 0
Subnets........................................ Yes
Distribute List................................ Not configured
show ip ospf interface brief Verify the settings for the OSPF interface configuration.
7 Protocol-based VLANs
Along with port-based VLANs based on IEEE 802.1Q, the Switch also supports protocol-based VLANs based on
IEEE 802.1v.
With port-based VLANs, the Switch uses the port VLAN ID of the receiving port to determine which VLAN a data
packet belongs to if it is received without a VLAN tag.
With protocol-based VLANs, the Switch uses the protocol of the received data packet to determine which VLAN a
data packet belongs to if it is received without a VLAN tag. The Switch supports the protocols
IP,
ARP,
IPX.
Data packets from other protocols received without a VLAN tag are assigned to a VLAN by the Switch in
accordance with the port VLAN ID.
Protocol-based VLANs enable you to transfer data packets not relevant to routing across IP subnetwork
boundaries. Data packets relevant to routing are IP and ARP data packets.
Ro2
VLAN 2
Ro1
PC1
VLAN 2
Port VLAN 2
2.3
VLAN 3
2.1 2.2 Se1
PC2 VLAN 4
SN "alpha" SN "beta"
IP: 10.0.1.0/24 IP: 10.0.2.0/24
In the example (see fig. 38), PC2 and Se1 communicate via IP. These data packets are routed.
The devices Ro1, Ro2 and PC1 communicate via other Ethernet-based protocols. These data packets are
switched in VLAN 2.
Thus all IP data packets remain in their subnetworks, apart from the IP data packets that are meant for a different
subnetwork.
Group
Group Name ID Protocol(s) VLAN Interface(s)
---------------- ------ ----------- ---- ---------------------
alpha 1 0
beta 2 0
show protocol all Display the protocols assigned to the protocol groups.
Group
Group Name ID Protocol(s) VLAN Interface(s)
---------------- ------ ----------- ---- ------------------
alpha 1 IP,ARP 0
beta 2 IP,ARP 0
show protocol all Display the protocols and VLANs assigned to the VLAN protocol groups.
Group
Group Name ID Protocol(s) VLAN Interface(s)
---------------- ------ ----------- ---- ----------------------
alpha 1 IP,ARP 3
beta 2 IP,ARP 4
Logical
VLAN ID Interface IP Address Subnet Mask MAC Address
------- ----------- --------------- --------------- -----------
3 9/1 0.0.0.0 0.0.0.0 00:80:63:51:74:2C
4 9/2 0.0.0.0 0.0.0.0 00:80:63:51:74:2D
show ip interface brief Display the entries of the virtual router interface.
Netdir Multi
Interface IP Address IP Mask Bcast CastFwd
--------- --------------- --------------- -------- --------
9/1 10.0.1.1 255.255.255.0 Disable Disable
9/2 10.0.2.1 255.255.255.0 Disable Disable
8 Multicast Routing
Multicast data streams are data packets that a sender sends to multiple recipients. To reduce the network load,
the sender uses a Multicast address. He thus sends each packet only once to the Multicast address instead
of sending it to each recipient individually. The recipients recognise a Multicast data stream intended for them by
the Multicast address.
A common reason for introducing subnetworks is the restriction of broadcast data streams. Switches send
broadcast/Multicast data streams to all ports, while routers block broadcast/Multicast data streams. Multicast
routing enables you to accurately transmit Multicast data streams beyond the boundaries of subnetworks.
Accurate transmission means sending data streams with defined Multicast addresses exclusively to those devices
which want to receive the Multicast data stream.
Multicast
In the end, the following multicast IP adress ranges are left over for disposal by an organisation's administrator:
239.192.000.000 - 239.251.255.255
for an organisation's local areas.
239.255.000.000 - 239.255.255.255
for an organisation's entire area.
Note: When selecting the Multicast IP addresses, ensure that they can be uniquely mapped onto MAC Multicast
addresses (see on page 91 „Mapping IP MAC Multicast Addresses“).
0 = Internet Multicast
1= reserviert
The Internet Group Management Protocol (IGMP) describes the distribution of Multicast information between
routers and terminal devices on Layer 3.
Routers with an active IGMP function periodically send queries to find out which IP Multicast group members are
connected to the LAN, or to find out who is interested in becoming a group member.
Multicast group members reply with a Report message. This Report message contains all the parameters required
by the IGMP. The router records the IP Multicast group address from the Report message in its routing table.
The result of this is that it transfers frames with this IP Multicast group address in the target address field only in
accordance with the routing table.
Devices which no longer want to be members of a Multicast group can cancel their membership by means of a
Leave message (from IGMP version 2), and they do not transmit any more Report messages. The router removes
the routing table entry if it does not receive any Report messages within a specified period of time (aging time).
If there are multiple routers with an active IGMP function in the subnetwork, then
for IGMP version 1, all routers in this subnetwork periodically send queries
for IGMP versions 2 and 3, the routers decide which router takes over the query function (Querier Election).
Protocol Standard
IGMP v1 RFC 1112
IGMP v2 RFC 2236
IGMP v3 RFC 3376
Table 16: Standards which describe the Multicast Group Membership Discovery
An advantage that IGMP version 2 has over IGMP version 1 is that a Multicast recipient can cancel his
membership in a Multicast group, thus freeing up his bandwidth more quickly. Another advantage is the
introduction of the Querier Election.
IGMP version 3 provides more security with the Source Filtering option. Multicast recipients can define the sources
from which they want to receive Multicast data streams. The router blocks Multicast data streams with other source
addresses.
8.3 PIM-DM/DVMRP
PIM-DM (Protocol Independent Multicast - Dense Mode) is a routing protocol that uses the available Unicast
routing table of other protocols to steer Multicast data streams.
This ability, and the fast convergence it enables, is the reason why PIM-DM is now very widely-used.
The DVMRP (Distance Vector Multicast Routing Protocol) is a routing protocol that uses its own distance vector
algorithm to create its own Multicast routing table. DVMRP works similarly to RIP and is limited to 32 hops.
In the past, DVMRP was very widely-used, and today it is used because of its compatibility with existing
applications.
Both protocols use what is known as the Implicit Join method, which means that a participant who has left the
Multicast data stream is not included in the data flow. To enable a participant who has left to receive Multicase
data streams again, the routers transmit to all participants again after the hold time has elapsed. For DVMRP, the
hold time is fixed at 2 hours. For PIM-DM, the variable hold time is set at 210 seconds. PIM-DM requires that you
set the hold time to the same value for all the participating routers.
DVMRP PIM-DM
Knows the topology better because DVMRP uses its own protocol. Fast convergence
Optimization through changeable timers
In the first step for setting up the Multicast routes, a PIM-DM/DVMRP router floods Multicast data streams to all
ports, with the exception of the receiving port (= flooding).
Multicast
Routers that are not interested in the Multicast data stream send what are known as prune messages so that they
will not be sent any Multicast data streams from this source in the future.
The routers send the prune messages back in the direction from which they received the Multicast data streams
(upstream).
A router transmits a Multicast data stream until the hold time has elapsed,
when it is using IGMP to determine a Multicast recipient which is connected to a port directly or via a switch or
when a router that is connected to a Multicast recipient is connected directly to a port.
Multicast
In the second step, PIM-DM/DVMRP calculates the shortest paths (SPT - Shortest Path Tree) between the
Multicast source and the Multicast recipients. The result is the source-routed Multicast distribution tree.
Source routed means that the calculation method is tracing back from the recipient to the source (RPF - Reverse
Path Forwarding). To avoid loops, RPF rejects all Multicast data streams received at a port that do not belong to
the shortest path.
The method of the shortest paths is very efficient with regard to the data paths. However, it does have the
disadvantage that, depending on the topology, the routers require a lot of memory space to store the many
Multicast trees.
A participant who has left the Multicast data stream can return to the Multicast data stream again. This procedure
is known as Grafting. Grafting enables the participant to receive Multicast data streams again before the hold time
has elapsed.
Multicast
8.4 Scoping
In the Multicast transmission, the protocol provides two options for limiting the expansion of the Multicast data
stream:
Multicast Address Scoping / Boundary
In the Multicast Address Scoping, the administrator assigns a Multicast IP address range to a router interface
(see table 14). The router interface blocks the Multicast data streams with addresses within this address range.
Example:
ip mcast boundary 239.193.122.0 255.255.255.0
In this example, the router interface blocks Multicast data streams with a Multicast IP address in the range
239.193.122.0-239.193.122.255.
TTL Scoping
Every Multicast data packet contains a TTL (Time To Live). The TTL is a counter which each router de-
increments when it transmits a Multicast data packet.
In TTL Scoping, the administrator assigns a TTL threshold to an interface. The router interface blocks every
Multicast data packet for which the TTL is below the TTL threshold.
Example:
ip multicast ttl threshold 64
In this example, the router interface blocks Multicast data streams with a TTL whose value is less than 64.
TTL Scope
0 Restricted to the same host
1 Restricted to the same subnet
< 32 Restricted to a particular location, organization or department
< 64 Restricted to the same region
< 128 Restricted to the same continent
< 255 Unrestricted, global
IP: 10.0.3.2/24
GW: 10.0.3.1 IP: 10.0.4.2/24
GW: 10.0.4.1
Interface: 2.2
IP: 10.0.3.1/24 Interface: 2.1
IP: 10.0.4.1/24
Interface: 1.3 A Interface: 1.2
IP: 10.0.1.2/24 IP: 10.0.10.2/24 IP: 10.0.11.1/24
GW: 10.0.1.1
Interface: 1.2
Interface: 1.4 Interface: 1.2 IP: 10.0.11.2/24
IP: 10.0.1.1/24 IP: 10.0.10.1/24
C B
Interface: 1.3 Interface: 1.3 IP: 10.0.2.0/24
IP: 10.0.12.1/24 IP: 10.0.12.2/24
Configure router interfaces using the example of router A (see fig. 44):
enable Switch to the Privileged EXEC mode.
configure Switch to the Configuration mode.
Globally activate IGMP using the example of router A (see fig. 44):
ip igmp Activate IGMP at port.
Globally activate Multicast using the example of router A (see fig. 44):
ip pimdm Select the Multicast routing protocol in the configuration mode.
ip multicast Globally activate Multicast forwarding.
exit Switch to the privileged EXEC mode.
#show ip igmp
Slot/Port...................................... 2/1
IGMP Admin Mode................................ Enable
Interface Mode................................. Enable
IGMP Version................................... 2
Query Interval (secs).......................... 125
Query Max Response Time (1/10 of a second)..... 100
Robustness..................................... 2
Startup Query Interval (secs) ................. 1
Startup Query Count............................ 2
Last Member Query Interval (1/10 of a second).. 10
Last Member Query Count........................ 2
Assign other VLAN IDs to the connected VLANs and leave the MRP-/E-MRP-Ring on its own in VLAN 1. You
thus enable the transmission of the Multicast data streams on Layer 3.
If you assign multiple VLANs to the MRP-/E-MRP-Ring as transfer networks, then the Switch transmits the
Multicast data streams to every transfer network during the flood and prune phases. This means that the Switch
transmits the Multicast data streams to every VLAN and the network load is thus multiplied in the MRP-/E-MRP-
Ring.
Interface: 9.2
IP: 10.0.3.1/24 Interface: 9.2
IP: 10.0.3.1/24
Interface: 9.1 A Interface: 9.1
IP: 10.0.10.3/24 IP: 10.0.10.3/24
IP: 10.0.1.2/24
GW: 10.0.1.1 E-MRP-Ring
VLAN 1
Interface: 9.2 Interface: 9.1 Interface: 9.1
VLAN 2 IP: 10.0.1.1/24 IP: 10.0.10.1/24 IP: 10.0.10.2/24
Interface: 9.1
C Interface: 9.1 IP: 10.0.10.2/24 B
IP: 10.0.10.1/24 RM
IP: 10.0.2.0/24
With PIM-DM, if you reduce the Hello Time, a router can detect more quickly when a downstream router
becomes inactive or active again.
With PIM-DM, using a default route that has been entered can reduce the switching time. While the router is
gathering information about the path to the source (RPF), the router can use a default route that has been
entered.
VLAN 1 VLAN 2
Subnet A Subnet B
IGMP-Report IGMP-Report
A
Figure 46: Registered Multicast data stream on the VLAN routing interface
A Appendix
VL Virtual Link
VLAN Virtual Local Area Network
VLSM Variable Length Subnet Mask
VRID Virtual Router Identification
VRRP Virtual Router Redundancy Protocol
IEEE 802.1AB
Topology Discovery (LLDP)
IEEE 802.1D
Switching, GARP, GMRP, Spanning Tree (Supported via 802.1S implementation)
IEEE 802.1D-1998
Media Access Control (MAC) Bridges (includes IEEE 802.1p Priority and
Dynamic Multicast Filtering, GARP, GMRP)
IEEE 802.1Q-1998
Virtual Bridged Local Area Networks (VLAN Tagging, Port Based VLANs,
GVRP)
IEEE 802.1S
Multiple Spanning Tree
IEEE 802.1v
Protocol Based VLANs
IEEE 802.1 w.2001
Rapid Reconfiguration, Supported via 802.1S implementation
IEEE 802.1 X
Port Authentication
IEEE 802.3 - 2002
Ethernet
IEEE 802.3 ac
VLAN Tagging
IEEE 802.3 ad
Link Aggregation with Static LAG and LACP support
IEEE 802.3 x
Flow Control
Routing
RFC 826 Ethernet ARP
RFC 894 Transmission of IP Datagrams over Ethernet Networks
RFC 896 Congestion Control in IP/TCP Networks
RFC 919 IP Broadcast
RFC 922 IP Broadcast in the presence of subnets
RFC 950 IP Subnetting
RFC 1027 Using ARP to implement Transparent Subnet Gateways (Proxy ARP)
RFC 1256 ICMP Router Discovery Messages
RFC 1321 Message Digest Algorithm
RFC 1519 CIDR
RFC 1724 RIP v2 MIB Extension
RFC 1765 OSPF Database Overflow
RFC 1812 Requirements for IP Version 4 Routers
RFC 1850 OSPF MIB Draft-ietf-ipv6-rfc2096-update-07.txt
IP Forwarding Table MIB
RFC 2082 RIP-2 MD5 Authentication
RFC 2131 DHCP Relay
RFC 2328 OSPF Version 2
RFC 2453 RIP v2
RFC 2787 VRRP MIB
RFC 2863 The Interfaces Group MIB
RFC 2932 IPv4 Multicast Routing MIB
RFC 2934 PIM MIB for IPv4
RFC 3046 DHCP/BootP Relay
RFC 3101 The OSPF "Not So Stubby Area" (NSSA) Option
RFC 3376 IGMPV3
RFC 3768 VRRP, Virtual Router Redundancy Protocol
Draft-holbrook-idmr-igmpv3-ssm-08.txt – IGMPv3 / MLDv2 for SSM
Draft-ietf-idmr-dvmrp-mib-11.txt – DVMRP MIB
Draft-ietf-idmr-dvmrp-v3-10 – DVMRP
Draft-ietf-magma-igmpv3-and-routing-05.txt – IGMPv3 an Multicast Routing Protocol Interaction
Draft-ietf-magma-mgmd-mib-03.txt – Multicast Group Membership Discovery MIB
Draft-ietf-pim-v2-dm-03 – PIM-DM
Draft-ietf-smm-arch-06.txt – Source -Specific Multicast for IP
see OSPF
Area 0
SN 10 SN 11
A VLAN ID 2
E-MRP-Ring
C B
VRRP SN 12
SN 13
see “VRRP”
SN 14
To configure the layer 3 function, you require access to the management of the Switch, as described in the “Basic
Configuration” user manual.
Depending on your own application, you will find many options for assigning IP addresses to the devices. The
following example describes one option that often arises in practice. Even if you have other prerequisites, this
example shows the general method for entering the IP parameters and points out important things that you should
note.
IP = 10.0.200.11/24
SN 10
10.0.10.0 A SN 11
IP = 10.0.10.13/24 10.0.11.0
GW: 10.0.10.1 VLAN ID 2
E-MRP-Ring
SN 100
10.0.100.0 Management-IP=
Management-IP= 10.0.100.102
10.0.100.103 VLAN ID 1
IP = 10.0.13.14/24 C B
GW: 10.0.13.1 SN 12
VRRP 10.0.12.0
SN 13
10.0.13.0
IP = 10.0.12.13/24
GW: 10.0.12.1
IP = 10.0.13.13/24
GW: 10.0.13.1
IP = 10.0.14.11/24
IP = 10.0.14.14/24 GW: 10.0.14.1
GW: 10.0.14.1
SN 14
10.0.14.0
IP = 10.0.14.13/24 IP = 10.0.14.12/24
GW: 10.0.14.1 GW: 10.0.14.1
Assign the IP parameters to your configuration computer. During the configuration phase, the configuration
computer is located in subnet 100. This is necessary, so that the configuration computer has access to the
layer 3 switches throughout the entire configuration phase.
Start AFS Finder on your configuration computer.
Give all the layer 2 and layer 3 switches their IP parameters in accordance with the network plan.
You can access the devices in subnets 10 to 14 again when you have completed the following router
configuration.
Configure the router function for the layer 3 switches.
Note the sequence:
1. Layer 3 switch C
2. Layer 3 switch B
The sequence is important; you thus retain access to the devices.
As soon as you assign an IP address from the subnet of the management IP address (= SN 100) to a router
interface, the Switch deletes the management IP address. You access the Switch via the IP address of the
router interface.
IP = 10.0.200.11/24
Port 2.2:
IP = 10.0.200.10/24
Port 2.1: GW: 10.0.200.11
VLAN 1 (Management IP=10.0.100.101)
--> IP= 10.0.10.1/24
GW: 10.0.200.10 Port 3.1 - Port 3.4:
VLAN 2
Interface 9.2
A IP = 10.0.11.1/24
GW: 10.0.200.10
E-MRP-Ring
SN 100
Port 1.1: 10.0.100.0
VLAN 1 VLAN 1 Port 1.2:
Interface 9.1 VLAN 1
IP = 10.0.100.1/24 Interface 9.1
GW: 10.0.200.10 IP = 10.0.100.1/24
GW: 10 0 200 10
Figure 49: IP parameters for layer 3 switch A
After the configuration of the router function on all layer 3 switches, you have access to all the devices.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated
documentation files (the "Software"), to deal in the Software without restriction, including without limitation the
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit
persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the
Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE
OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
B Index
A IGMP 92
ABR 69, 72 IGMP Querier Interval 101
Address Resolution Protocol 9 Implicit Join 93
Adjacency 75 Importance 23, 25, 26
Advertisement 43 Infinity 62
Advertisement interval 43 Interface tracking 31, 32, 36, 37, 54
AFS View 3 Interface tracking object 32
Aging time 92 Interner Router 72
Area Border Router 69, 72 Internet Group Management Protocol 92
ARP 9, 10, 29 IP 8
ARP data packet 83 IP address 42
ASBR 68, 72 IP address owner 42, 43
Assert process 101 IP data packet 83
Autonomous System Area Border Router 72 IP stack 29
Autonomous System Boundary Router 68 ISO/OSI layer model 7
B L
Backup Designated Router 75, 77 Leave message 92
Backup router 43 Link aggregation interface 32
BDR 75 Link down delay 32
Boundary 96 Link State Advertisement 72
Broadcast 7 Link State Database 77
Link up delay 32
C Link-down notification 46
CIDR 11, 67, 80 Load sharing 25
Classless Inter-Domain Routing 11, 67 Logic tracking 31
Convergence 59 Logical tracking 35, 38
Count-to-infinity 62 LSA 72, 77
D LSD 77
Default gateway 42, 43 M
Designated Router 75, 77 MAC address 7, 42
Distance 23, 25 MAC/IP address resolution 29
Distance vector algorithm 59 Master router 43
Distance Vector Multicast Routing Protocoll 93 Metric 59
DR 75 MRP 3
DVMRP 93 MRP-/E-MRP-Ring 101
E MRP-Ring 3
Multicast 7
E-VRRP 45
Multicast address 75, 87
Extended Unique Identifier 90
Multinetting 13
F N
Flooding 93
Neighbor relationship 75
G Netdirected Broadcasts 12
Grafting 95 Netdirected Broadcasts (Port-basiert) 17
Netdirected Broadcasts (VLAN-basiert) 20
H Network Management Software 3
Hello 75 Network plan 5
Hop count 59, 62 Next hop 59
I Not So Stubby Area 69
NSSA 69
IANA 88
O Source routed 94
Open Shortest Path First 67 SPF 78
Operand 38 Split horizon 62
Operators 35 SPT 94
Organizationally Unique Identifier 90 Static route tracking 26
OSI layer model 7 Static routes 5
OSI reference model 7 Static routing 31
OSPF 5, 59, 67 Stub Area 69
OUI 90 Switching times 101
Symbol 4
P
Packet duplication 101 T
PIM-DM 93 Time To Live 96
Ping interval 33 Totally Stubby Area 69
Ping request 33 Tracking 26, 31
Ping response 33 Tracking (VRRP) 31
Ping timeout 33 TTL 96
Ping tracking 26, 31, 33
U
Port-based router Interface 16
Upstream 94
port-based router interface 29
Preempt delay 46 V
Preempt mode 46 Variable Length Subnet Mask 67
Preference 52 Virtual link 70
Protocol Independent Multicast - Dense Mode 93 Virtual MAC address 42
Protocol-based VLAN 83 Virtual router 43
Proxy ARP 10 Virtual router ID 42
Prune messages 94 Virtual router interface 84
Q Virtual router IP address 43
Virtual router MAC address 43
Querier Election 92
VL 70
R VLAN protocol group 84
Redistribute 69 VLAN router interface 32
Redistributing 69 VLAN routing 84
Redistribution 68 VLAN-based router interface 29
Redundancy 3 VLSM 67
Redundant static route 23 VRID 42, 43
Report message 92 VRRP 31
Reverse Path Forwarding 94 VRRP priority 42, 43
RFC 107 VRRP router 43
Ring/Network Coupling 3 VRRP Tracking 31
RIP 5, 59
Route Summarization 69
Route tracking 26
Router ID 75
Router priority 75
Routing Information Protocol 59
Routing Table 93
Routing table 18, 19, 26, 59
Routing tables 46
RPF 94
S
Scoping 96
Shortest Path First 78
Shortest Path Tree 94
Skew time 43
Source filtering 92
www.abb.com/utilitycommunication