Dt00xte220en 17
Dt00xte220en 17
Dt00xte220en 17
BOOTCAMP - EDITION 17
PARTICIPANT'S GUIDE
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Proprietary Ownership Declaration
I agree not to copy, produce, reproduce, transfer, distribute, decode and/or modify any
ALE material (including any and all documentation, manuals, software presentation,
student book and software files) made available and/or used as part of the ALE training.
I acknowledge that sharing of any kind of courseware and media used are strictly forbidden
without approval from ALE Training Services.
I represent and warrant that I will not use or not permit to use the courseware and\or
educational tools supplied by ALE to provide trainings in a private capacity or for my
employer or any third party.
I also acknowledge and agree that ALE owns and reserves all copyright in and all other
intellectual property rights relating to the ALE training material (including courseware and
all associated documentation) provided during the training.
I understand that any breach or threat of breach of the above shall entitle ALE to injunctive
and other appropriate equitable relief (without the necessity of proving actual damages),
in addition to whatever remedies ALE may have at law.
Furthermore, I acknowledge and agree that ALE will be entitled to cancel immediately any
and all of my Certifications in case of any breach of the above.
Maintenance – eBook
The eBook is available on the Knowledge Hub training platform. Internet access is required
to download the eBook.
Participants should be informed that they must bring their laptop for the classroom or
virtual session.
In case of issue for downloading the eBook, the user can open a ticket with the ALE
Welcome Center for assistance.
ALE technical support will be provided on an "AS IS" and "AS AVAILABLE" basis without
warranty of any kind.
AOS OmniSwitch LAN
Bootcamp
DT00XTE220EN
Agenda
1
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Topics
Administration – Class schedule
Course agenda
2
Administration – Class schedule
3
Agenda
Day 1
• Course introduction • Virtual Chassis
‐ Training course agenda & Access to remote lab ‐ Overview & Lab: Virtual chassis (6360)
Day 2
• Multiple VLAN Registration Protocol
• Link Aggregation Groups ‐ Overview
‐ Overview ‐ Lab : MVRP
‐ Lab : Link Aggregation and 802.1Q
• AOS Network security
• Spanning Tree Protocole (STP) ‐ Overview
‐ Overview ‐ Lab: Port mapping
‐ Lab : STP ‐ Lab: Learned Port Security
• VRRP
‐ Overview • Graceful Restart
‐ Lab : Virtual router redundancy Protocol ‐ Overview
• IP interfaces • DHCP
6 ‐ Overview ‐ Overview
‐ Lab : DHCP Serveur & DHCP Relay
Agenda
9
Internet Ressources
• Alcatel-Lucent Enterprise Web Site
https://www.al-enterprise.com/en
10
Internet Resources
Partners Website ALE Network Equipment
• MyPortal • www.al-enterprise.com/en/products/switches
Spacewalkers Community
• www.spacewalkers.com
11
OmniSwitch Details - Product Data sheets
LAN Switches
• OmniSwitch 2260 WebSmart switch: datasheet
• OmniSwitch 2360 WebSmart switch: datasheet
• OmniSwitch 6360 LAN switch: datasheet
• OmniSwitch 6465 L2+ Hardened LAN Switch datasheet
• OmniSwitch 6560 L2+ Multigig LAN switch: datasheet
• OmniSwitch 6570 Gigabit Metro Ethernet LAN Switch datasheet
• OmniSwitch 6860 L3 LAN switch with multigig and DPI option datasheet
• OmniSwitch 6865 L3 Hardened Switch datasheet
• OmniSwitch 6900 L3 core switch datasheet Management Platform
• OmniSwitch 9900 Chassis core switch datasheet • OmniVista 2500 (on premises) datasheet
• OmniVista Cirrus (cloud) datasheet
Stellar WLAN
• OmniAccess Stellar AP1101 802.11ac AP: datasheet
• OmniAccess Stellar AP1201 entry-level 802.11ac wave 2 AP: datasheet
• OmniAccess Stellar AP1201H resident 802.11ac wave 2 AP: datasheet
• OmniAccess Stellar AP1220 high performance wave 2 AP: datasheet
• OmniAccess Stellar AP1230 ultra high performance wave 2 AP: datasheet
• OmniAccess Stellar AP1251 hardened wave 2 AP: datasheet
• OmniAccess Stellar AP1301 entry level Wi-Fi 6 AP: datasheet
• OmniAccess Stellar AP1311 high performance Wi-Fi 6 AP: datasheet
• OmniAccess Stellar AP1320 high performance Wi-Fi 6 AP: datasheet
• OmniAccess Stellar AP1351 premium high-end Wi-Fi 6 AP: datasheet
• OmniAccess Stellar AP1360 hardened outdoor Wi-Fi 6 AP: datasheet
Poster (Complete ALE Network Solutions Portfolio)
The status switches usually the next Monday after the session has ended.
14
Reach the session evaluation
Directly from the Home page / My Recent Learning activity;
•if “Evaluate” option is viewable, please click on it.
•if “Evaluate” is not proposed, click on “Open Curriculum” and after, on “Evaluate”
15
OMNISWITCH R8
REMOTE LAB CONNECTION
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
Notes: Other web browser may have some issue with copy/paste from a lab guide to the remote terminal
session. Known workaround for FireFox: https://sudoedit.com/firefox-async-clipboard/
https://rdp.al-mydemo.com/
- Password: unique per session – Sent from our LMS to the Instructor
REMOTE LABS > TOPOLOGY
Two possibilities
OS6900-A 1 OS6900-B 2
1/1/25 1/2/1
1/1/26 1/2/2
OS6900-A 1 OS6900-B 2
1/2/1 1/2/1
1/2/2 1/2/2
1
3
4
VIRTUAL MACHINES
• 10 VM (Clients)
• Podx_OV<ov_release>
• OmniVista 2500: 192.168.100.107
• Firewall/NAT server
• Podx_pfSense : 192.168.100.108
DHCP SERVER
• A DHCP server is running with an IP address of 192.168.100.102 and has the following
scopes (where x stands for the switch number):
OMNIVISTA 2500 & INTERNET ACCESS
• An OmniVista 2500 server is configured with the IP address 192.168.100.107/24.
https://10.4.pod#.208:8443
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
CAMPUS LAN NETWORK
SOLUTION
O M N I S W I T C H P O RT F O L I O
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
AP1301H AP1411
AP1431 AP375
AP5xx OA4xxx
AP136x
AP1201/BG AP1251 AP1301 AP13xx AP1451
AP12xx
PARTNERS
IP/MPLS
NEW
LAN OmniSwitch
OS6860E/N
Core
Access
POL
OS6900 OS9900
WDM
OS6570M
7750 SR 7705 SAR
OS6360
7250 IXR 7210 SAS
Rugged
VSR
SD-WAN
7450 ESS /SASE
OS2x60 OS6560
OS6865 OS6465/T
OMNISWITCH 6560
Model OS6560-24X4
24 x 10/100/1G Base-T ports
2 x SFP 1G ports
4 x SFP+ 1/10G ports
Model OS6560-P24X4
Value Multi-GIG and 10G LAN switch Model OS6560-24Z8 OS6560-X10 10G
Linux based AOS software 16 x 10/100/1000 Base- ports
8 x 1G / 2,5G Base-T ports
1/10Gig or MultiGig (1G/2.5G) port models 2 x SFP+ 1/10G ports
Up to eight switches in a virtual chassis (uplink / stacking / remote stacking)
OS6560-24X4 Multi Gig
PoE (802.3.at) and HPOE (802.3.bt) standards Model OS6560-P24Z8
OS6560-P24X4
16 x 10/100/1000 Base- ports (802.3af/at)
10G, 10G remote, and 20G stacking options 8 x 1G / 2,5G Base-T ports
Backup Power supply POE (802.3af/at/bt) (Up to 95W on a port)
2 x SFP+ 10G ports
MACSec Support (uplink/stacking / remote stacking)
OS6560-24Z8
Same power supplies as OS6860 Model OS6560-24Z24
OS6560-P24Z8
Metro Ethernet Features 24 x 100/1G/2,5G Base-T ports
4 x SFP+ 1/10G ports
OSPF stub area 2 x QSFP 20G dedicated stacking ports
Model OS6560-P24Z24
24 x 100/1G/2,5G Base-T ports OS6560-24Z24
POE (802.3af/bt) (Up to 95W on a port) OS6560-P24Z24
4 x SFP+ 10G ports
2 x QSFP 20G dedicated stacking ports
TYPICAL DEPLOYMENT Model OS6560-P48Z16
32 x 10/100/1000 Base-T ports OS6560-P48Z16
For networks with 802.11ac multi-gig APs POE (802.3af/at) (Up to 30W on a port)
16 x 100/1G/2,5G Base-T ports
(over the air throughput >1G) (PoE over 2.5G access) POE (802.3af/at/bt) (Up to 95W on a port)
4 x SFP+ 10G ports
2 x QSFP 20G dedicated stacking ports
Access switch in 10 gigabit converged campus networks OS6560-48X4
Model OS6560-48X4
Aggregation for wired and wireless access 48 x 10/100/1000 Base-T ports
OS6560-P48X4
Carrier and Service Provider Ethernet Access 2 x SFP ports
POE (802.3af/at/bt)
4 x SFP+ 10G ports (Stacking/Uplinks)
Model OS6560-P48X4
48 x 10/100/1000 Base-T ports
POE (802.3af/at) (Up to 30W on a port)
2 x SFP ports
POE (802.3af/at/bt)
4 x SFP+ 10G ports (Stacking/Uplinks)
OMNISWITCH 6560
METRO ETHERNET FEATURES OMNISWITCH 6560
Starting from 89R01, all models of OS6560 support Metro Ethernet features. OS6560-X10 10G
OS6560-P48Z16
OS6560-48X4
OS6560-P48X4
OMNISWITCH 6570M -12(D)
OS6570M-12 GigE
OmniSwitch® 6570M Metro Ethernet LAN Switch • 1RU x 1/2 rack chassis.
Deployments benefiting from the OmniSwitch 6570M family include: • 8xRJ45 10/100/1000 BaseT
• Edge of small-to-mid-sized networks
• 2x100/1G Base-X SFP,
• Branch office enterprise and campus workgroups
• 2x1G/10G SFP+ ports.
• Service provider managed services application
Customer Premises Equipment (CPE) • Internal AC PSU.
OS6570M-12/-12D
OMNISWITCH 6570M –U28
OS6570M-U28
OMNISWITCH 6860E
STACKABLE GIGABIT ETHERNET LAN SWITCH
MAIN CHARACTERISTICS OMNISWITCH 6860E
Stackable Gigabit Ethernet LAN switch
Up to 264 Gb/s of wire-rate capacity Models OS6860(E)-(P)24/48 OS6860(E)-(P)24 (D)
Advanced L3 routing*: VRF, Multicast, IPv4 and IPv6 24-port and 48-port models
RJ45 and/or PoE+/++ and SFP
Up to eight switches in a virtual chassis (local or remote stacking) ports
Optional choice of standard or advanced backup power 4 fixed SFP+ (1G/10G) ports
2 VFL QSFP+ stacking ports (20G
Universal Network Profiles: Policy based access each)
Network Analytics and Control (signature based) AC power supply
TYPICAL DEPLOYMENT
Models OS6860E-P24Z8 OS6860E-P24Z8
Converged campus networks 16 x 100/1000 Base-T POE+ ports
Access switch 8 x 2.5G Multi-Gigabit HPoE ports
Multi-Gig Advanced Access 4 fixed SFP+ (1G/10G) ports
2 VFL QSFP+ ports (20G each)
High capacity & high-density wired and wireless access AC power supply
Distribution switch
Data Center
Top of Rack switch
Carrier and Service Provider Ethernet Access
OMNISWITCH 6860N
STACKABLE GIGABIT ETHERNET LAN SWITCH
MAIN CHARACTERISTICS OMNISWITCH 6860N
Secure virtual networks Models OmniSwitch 6860N-
OS6860N-P(H)(X)48M
P(H)(X)48Mc
SPB, VxLAN*, MPLS* VPNs
36 100/1G/2.5G BaseT bt PoE
256-bit MACsec 12 100/1G/2.5G/5G/10G BaseT bt
Native Inline routing PoE
2 QSFP28 VFL ports
WiFi 6 Ready 1 expansion slot OS6860N-P24M
Full Multi-gig Support
95W PoE (802.3bt) Models OmniSwitch 6860N-P24Mc
24 100/1G/2.5G/5G/10G BaseT bt
Next-Gen HW PoE
Hi-speed uplinks 2 QSFP28 VFL ports
2 x 100G Stacking 1 expansion slot OS6860N-P(H)48Z
Built for Next-Gen L3 Access Networks Models OmniSwitch 6860N-
P(H)48Zc
36 x 1GBaseT 60W PoE, 12 x 5G multi-
TYPICAL DEPLOYMENT gig 95W PoE, 4 x 10/25G SFP28 fixed, OS6860N-P24Z
MACsec uplinks
Converged campus networks
Models OmniSwitch 6860N-P24Zc
Multi-Gig Advanced Access 12 x 1GBaseT 60W PoE, 12 x 5G multi-
Access switch gig 95W PoE, 4 x 10/25G SFP28 fixed,
High capacity & high-density wired and wireless access MACsec uplinks
OS6860N-U28(D)
Distribution switch Models OmniSwitch 6860N-U28(D)
Data Center 24 x 100/1000BaseX,4 x 1/10G SFP+,
Top of Rack switch 4 x 10/25G SFP28 fixed uplinks. All
ports MACsec capable.
Carrier and Service Provider Ethernet Access
OMNISWITCH 6860N
STACKABLE GIGABIT ETHERNET LAN SWITCH
TYPICAL DEPLOYMENT
Converged campus networks
Core/aggregation switch
Data Center
End of Row Switch
Spine-Leaf Architecture (L3 design)
OMNISWITCH 9912
MAIN CHARACTERISTICS OMNISWITCH 9900
12-slot Chassis based LAN Switch OS9912
2 CMM (Chassis Management Module) Slots
10 Network Interface Module Slots
4 CFM (Chassis Fabric Module) Slots, rear accessible
4 power supply bays, front accessible 2 x CMM
3 fan tray Slots, rear accessible OS9912-CHAS with 4
QSFP28
High-performance and very low latency Layer-2/Layer-3 switching 12 slot chassis
100G ports
25.6 Tbps Full Duplex switching fabric
OS9912 will support virtual chassis technology in future release. OS99-CMM2
Hardware Redundancy 4 QSFP28 100 GigE Ports
Power supply
Management
OS9912-CFM
Switch fabric
Fans 12.8 Tbps switching capacity
OS9912-Fan Tray
OS9912-CFM
Internal PoE supply/ HPoE up to 75W & 802.3at support
7920W of inline PoE power
OS9912-Fan Tray
17.25-RU form factor
TYPICAL DEPLOYMENT
Converged campus networks
Core/aggregation switch
Data Center
End of Row Switch
Spine-Leaf Architecture (L3 design)
OMNISWITCH 9900 NI MODULES & POWER SUPPLIES
OS99-GNI-48
MAIN CHARACTERISTICS
MAIN CHARACTERISTICS 48 x RJ-45 10/100/1000-BaseT ports OMNISWITCH 9900
OS99-GNI-P48
Modules provide very low latency for high-performance server clusters and core 48 x RJ-45 10/100/1000-BaseT PoE ports OS9907
8 ports HPoE (75W)
connectivity over QSFP28, QSFP+, SFP+, DAC or CAT 5/6. 40 ports 802.3at (30W)
OS99-GNI-U48
Modular slots offer versatility in terms of 100GigE QSFP28, 40 GigE QSFP+, 10 GigE 48 unpopulated wire rate SFP 1000Base-X ports
SFP+, 10 G Base-T and 10/100/1000Base-T ports. OS99-XNI-U12Q
12 x 1/10G SFP+
Each QSFP port is capable of operating as 40 GigE or 4x10 GigE. 1 x 10/40G QSFP
Each QSFP28 port is capable of operating as 40/100 GigE or 4x10/25 GigE. OS99-XNI-U24
24 x 1/10G SFP+
Internal POE supply/ HPoE up to 75W & 802.3at support OS99-XNI-P24Z8 OS99-PS-A
16 x 1G/10G Base-T ports 3000W@220V
Power Supply options 8 x 1G/2.5G/10G Base-T ports
Redundant Power
1200W@110V
Ports 1-8: 10/100/1000/2500/5000/10000 Mbps or
Support 75W HPoE supplies 3+1
PS-AC (3000W@220V/ 1200W@110V)
PS-DC (2500W)
Ports 9-24:10/100/1000/10000 Mbps
Up to 30W POE (at)
OS99-PS-A
OS9912
OS99-PS-D
OS99-XNI-UP24Q2
2500W
12 x 1/10GigE SFP+ ports
12 x 1G/2.5G/10G BaseT 802.3bt PoE ports
2 x 40G QSFP+
OS99-CNI-U20
20 x 100G QSFP28
OEM SWITCHES
OMNISWITCH 2260
MAIN CHARACTERISTICS OMNISWITCH 2260
Gigabit Ethernet LAN switch
8-, 24- and 48 ports
Fan-less on 10/P10, 24/P24 models Model OS2260-(P) 8
Standalone 8 fixed 10/100/1000 Base-T ports OS2260-(P)10
Advanced Layer2+ with static routing POE: IEEE 802.2at/af
4 fixed SFP (1G) ports
Optimized PoE+ budget
PPoE/FPoE
1G user port/uplink models
Model OS2260-(P) 24
OmniVista Cirrus Support
Limited CLI, Webview2.0 24 fixed 10/100/1000 Base-T ports
POE: IEEE 802.2at/af OS2260-(P)24
No 10G uplinks 2 fixed SFP (1G) ports
No Backup Power Supply
No Stacking
Model OS2260-(P) 48
TYPICAL DEPLOYMENT 48 fixed 10/100/1000 Base-T ports
POE: IEEE 802.2at/af
• Small and medium-sized business network solutions 2 fixed RJ45/SFP (1G) ports
OS2260-(P)48
• High-speed desktop connectivity
• Secure wireless connectivity
• Unified communications (IP telephony, video, and converged solutions)
OMNISWITCH 2360
MAIN CHARACTERISTICS Model OS2360-(P) 24
24 fixed 10/100/1000 Base-T ports
OMNISWITCH 2360
POE: IEEE 802.2at/af
Stackable Gigabit LAN switches 2 fixed SFP (1) ports
OS2360-(P)24(X)
10 GigE virtual chassis bandwidth up to 4 units (stacking)
Model OS2360-P24X
24- and 48-port models
24 fixed 10/100/1000 Base-T ports
Gigabit Ethernet SFP uplink ports or 10 Gigabit Ethernet SFP+ uplink ports POE: IEEE 802.2at/af
2 SFP+ (1/10G) uplink ports
(X models) 2 SFP+ (1/10G) VFL ports
Reduced power consumption with energy efficient ethernet (EEE)
technology Model OS2360-(P) 48
Simplified web-based management 48 fixed 10/100/1000 Base-T ports OS2360-(P)48(X)
POE: IEEE 802.2at/af
Fanless with non-POE 8 and 24 ports model 2 fixed RJ45/SFP (1G) ports
Easy MAC/IP-based ACLs
Model OS2360-P48X
No Backup Power Supply 48 fixed 10/100/1000 Base-T ports
POE: IEEE 802.2at/af
2 fixed SFP (1G) uplink ports
2 SFP+ (1/10G) uplink ports
OS2360-U24X
TYPICAL DEPLOYMENT 2 SFP+ (1/10G) VFL ports
OS2360-U48X
Model OS2360-U48X
48 x 100M/1G SFP ports
6 x SFP(+) SW configurable ports:
4 x 1/10GE uplinks, 2x10 GE uplinks/VFL
OMNISWITCHES COMPARISON
OMNISWITCH WEBSMART 2260, 2360 COMPARISON
OS2260 OS2360
Software OEM OEM
L2 L2
Features
Non Stackable Stackable
Routing Basic static Basic static
10M/100M/1G 10M/100M/1G
User ports
802.3at support 802.3at support
Advanced Security AG, UNP, CP, BYOD AG, UNP, CP, BYOD MACsec AG, UNP, CP, BYOD AG, UNP, CP, BYOD, MACsec
Management OmniVista 2500 NMS OmniVista 2500 NMS OmniVista 2500 NMS OmniVista 2500 NMS
Mac Table 48K 64K 228K 128K
Routing Table 12K 12K 128K 128K
Multicast Full IP Multicast routing Full IP Multicast routing Full IP Multicast routing Full IP Multicast routing
OMNISWITCH -PRODUCT DATA SHEETS
OMNISWITCH DETAILS - PRODUCT DATA SHEETS
LAN Switches
• OmniSwitch 2260 WebSmart switch: datasheet
• OmniSwitch 2360 WebSmart switch: datasheet
• OmniSwitch 6360 LAN switch: datasheet
• OmniSwitch 6465 L2+ Hardened LAN Switch datasheet
• OmniSwitch 6560 L2+ Multigig LAN switch: datasheet
• OmniSwitch 6570 Gigabit Metro Ethernet LAN Switch datasheet
• OmniSwitch 6860 L3 LAN switch with multigig and DPI option datasheet
• OmniSwitch 6865 L3 Hardened Switch datasheet
• OmniSwitch 6900 L3 core switch datasheet
• OmniSwitch 9900 Chassis core switch datasheet Management Platform
• OmniVista 2500 (on premises) datasheet
Stellar WLAN • OmniVista Cirrus (cloud) datasheet
• OmniAccess Stellar AP1101 802.11ac AP: datasheet
• OmniAccess Stellar AP1201 entry-level 802.11ac wave 2 AP: datasheet
• OmniAccess Stellar AP1201H resident 802.11ac wave 2 AP: datasheet
• OmniAccess Stellar AP1220 high performance wave 2 AP: datasheet
• OmniAccess Stellar AP1230 ultra high-performance wave 2 AP: datasheet
• OmniAccess Stellar AP1251 hardened wave 2 AP: datasheet
• OmniAccess Stellar AP1301 entry level Wi-Fi 6 AP: datasheet
• OmniAccess Stellar AP1311 high performance Wi-Fi 6 AP: datasheet
• OmniAccess Stellar AP1320 high performance Wi-Fi 6 AP: datasheet
• OmniAccess Stellar AP1351 premium high-end Wi-Fi 6 AP: datasheet
• OmniAccess Stellar AP1360 hardened outdoor Wi-Fi 6 AP: datasheet
ALE SECURED CODE
LAN CAMPUS - HARDENED AOS SOFTWARE
• ALE diversified AOS ALE
• Increasing security at network devices Secured
Code
• Same functionality and performance as the normal
release
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNISWITCH R8
C O N N E C T I N G TO T H E S W I T C H
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
AOS OmniSwitch
Authentication Server Local User
RADIUS or LDAP Login via console port
• How it works
AOS OmniSwitch
* USB Adapter with Bluetooth Technology supported on an OS6465, 6560, 6860, 6865, 6900-V72 /C32
USB adapters supported are listed on release note
ACCESS VIA THE CONSOLE PORT
• CLI: Command Line Interface
• Use software like Tera Term, Putty, HyperTerminal …
Default settings
OS6860N Notes:
• USB 3.0 version dongles are supported on OS6360/6465/6560 models.
• USB 2.0 version dongles are supported on all models.
• All the chassis of a VC should have a USB-to-Ethernet dongle for proper VC EMP functionality.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Remote Switch Access
How to
✓ Administrate the OmniSwitches remotely
Contents
1 Accessing to the Switch Remotely .......................................................... 2
2 Authenticating to the Switch ................................................................ 4
2.1. Enabling the SSH connection ...................................................................... 4
2.2. Testing the SSH connection ....................................................................... 4
2.2.1. Configuring the OmniSwitch .............................................................................. 5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Remote Switch Access
Implementation
- If the switch has an EMP interface (OS6900, OS6860E), an IP address will be assigned to it.
- If the switch does not have an EMP interface (OS6560, OS6360), a USB-to-Ethernet dongle is connected to
the usb port of the switch. This creates a USB-to-Ethernet interface for switches that do not have an EMP
port. This interface is treated as an EMP interface, and all EMP-related functions and CLIs are applicable
to the USB-to-Ethernet dongle.
- For example, check the IP interface of one switch which has an EMP interface (ex. 6900-A):
sw1 (6900-A) -> show ip interface
Total 3 interfaces
Flags (D=Directly-bound)
- For example, check the IP interface of one switch which doesn’t have an EMP interface and uses the
dongle USB-to-Ethernet (ex. 6360-A):
- From your Windows Desktop, open a console and try to ping the 8 switches:
C:\>ping 10.4.Pod#.1
C:\>ping 10.4.Pod#.2
C:\>ping 10.4.Pod#.3
C:\>ping 10.4.Pod#.5
C:\>ping 10.4.Pod#.6
C:\>ping 10.4.Pod#+100.7
C:\>ping 10.4.Pod#+100.8
4
Remote Switch Access
Tips
If the SSH service type has Authentication = denied, type the command:
-> aaa authentication ssh local
- As you can see here, HTTP authentication is enabled, and the first authentication server to be polled is
the local database.
Notes
By default, the WebView is enabled on the OmniSwitch but you are not allowed to authenticate. On the
Remote-Lab, the WebView access has already been enabled.
Tips
SSL is forced by default in Release 8. It means that you can’t connect with plain HTTP on R8 OmniSwitches, you
will be automatically redirected to an HTTPS connection.
7
Remote Switch Access
Change the value to "45 for the CLI interface and “15” for the Webview" then click on Apply at the
bottom of the page
- From the CLI, check that the modification has been taken into account:
sw3 (6560-A) -> show session config
Cli Default Prompt = sw3 (6560-A) ->,
Cli Banner File Name = ,
Cli Inactivity Timer in minutes = 45,
Ftp Banner File Name = ,
Ftp Inactivity Timer in minutes = 4,
Http Inactivity Timer in minutes = 15,
Http Banner File Name = ,
Login Timer in seconds = 55,
Maximum number of Login Attempts = 3,
- Return to the Webview application. In the horizontal icon bar at the top of the page, select the third
icon from the left (write memory).
- You can hover with your mouse over the ports to get more information By clicking on a port you will be
redirected to the chassis port configuration page.
- Select Layer 2 > VLAN in the VLAN management column or in the left menu.
- Click on the "+" icon to create a new VLAN
- The table of the vlan created on the switch is displayed.
Vlan : 59
Description : Student
10
Remote Switch Access
- Connect to the OmniSwitch 6560-A and verify that the VLAN has been created on the OmniSwitch :
- Click on yes
- In the CLI of the OmniSwitch 6560-A, verify that the VLANs have been deleted and save it on flash
running directory
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
AOS RELEASE 8
OMNISWITCH 6360 OMNISWITCH 6560 OMNISWITCH 6860E/N OS6570M (GIGABIT METRO ETHERNET)
HARDENED SWITCHES
OMNISWITCH 6465
OMNISWITCH 6865
R8
AOS MANAGING FILES/DIRECTORIES
FLASH MEMORY • Rollback Based on the working, certified and User-defined
directories
USER DEFINED DIR
• Additional User-defined directories
• Created by the user (any name)
• Can be used to store additional switch configurations.
WORKING CERTIFIED USER. DIR. NETWORK • Configuration changes CAN be saved directly to any user-
defined directory
(V72/C32/X48C
6/T48C6/
X48C4E/V48C8
T24C2 …
* Extract from “Release Notes –- Release 8.9R3
R8
AOS MANAGING FILES/DIRECTORIES
• System Boot Sequence Flash RAM
• Bootstrap Basic Operation (U-Boot)
• Hardware Initialization BOOTROM 1
• Memory Diagnostics
2
• The image contains its own copy of WORKING
KERNEL.LNK FROM
the kernel specific to the SW version DIR. OS PACKAGE
OR =
RAM
≠ DIFFERENT CONTENT
≠ DIFFERENT CONTENT
RUNNING CONFIGURATION
USER. DIR.
RUNNING CONFIGURATION RUNNING CONFIGURATION
Command to force reboot from WORKING directory or user defined directory: Command to force reboot from CERTIFIED directory:
-> reload from working no rollback-timeout -> reload all
-> reload from <userdefined> no rollback-timeout
R8
AOS MANAGING FILES/DIRECTORIES
Configuration Rollback
Directory which the switch booted from and
where the configuration changes will be
saved
* Except when the Running directory is the Certified directory
* Running configuration (RAM): current operating configuration of the switch retrieved from the running
directory in addition to any configuration changes made by the user.
R8
AOS MANAGING FILES/DIRECTORIES
Configuration Rollback
sw7 (OS6860-A) -> write memory flash-synchro = write memory + copy running certified
R8
AOS MANAGING FILES/DIRECTORIES
• When the switch boots from the CERTIFIED
3
directory, changes made to the switch cannot
be saved and files cannot be moved between
directories.
FLASH MEMORY FLASH MEMORY
1 1
4
≠ DIFFERENT CONTENT
≠ DIFFERENT CONTENT 5
RAM RAM
2 2
CERTIFIED CERTIFIED
• The configuration backup command creates a .tar file where are stored the collected files
• The tar file name is “configuration_backup.tar” and will be placed in “/flash/config-backup-
recovery” folder
Sends Config
R8
CLI – HELP > QUICK WALKTHROUGH
Command Line Interface (CLI) specifications
Online Help
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
OmniSwitches Directories Content (R8)
How to
✓ Manage the OmniSwitches R8 main directories content
Contents
1 Introduction .................................................................................... 2
2 Viewing the Image & Configuration Files .................................................. 2
3 Checking the working and certified Directories .......................................... 2
3.1. Displaying the working and certified directories content .................................... 2
3.2. Displaying the microcode version ................................................................ 3
4 Booting behavior in Release 8 ............................................................... 3
5 Determining from which directory the switch was loaded? ............................. 3
6 Synchronizing RAM and Running Directory ................................................. 4
7 Saving the Running Configuration to Working Directory ................................. 5
8 Creating a User-Defined Directory .......................................................... 7
9 Deleting the User Directory .................................................................. 8
10 Annex: USB Backup & Restore ............................................................... 8
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
OmniSwitches Directories Content (R8)
1 Introduction
In Release 8, the management of an OmniSwitch is controlled by 2 types of files:
- Images files, which are proprietary code developed by Alcatel-Lucent Enterprise to run the hardware.
- A configuration files, named vcboot.cfg and vcsetup.cfg, in text format, sets and controls the
configurable functions.
The directory structure that store the image and configuration files is divided in several parts:
- The certified directory contains files that have been certified by an authorized user as the default files
for the switch.
- The working directory is a holding place for new files. Files in the working directory must be tested
before committing them to the certified directory.
- The user-defined directories are created by the user and are like the working directory in that they can
contain image and configuration files.
- The running directory is the directory where the configuration changes will be saved.
- The running configuration, stored in the RAM, contains the current operating parameters of the
OmniSwitch obtained from the image and configuration files.
- If the running directory is the certified directory, you will not be able to save any changes made to the
running directory. If the switch reboots, any configuration changes will be lost. In order to save
configuration changes, the running directory cannot be the certified directory.
To check from which directory the OmniSwitch is running, and the content comparison between the WORKING
and CERTIFIED directories:
sw3 (6560-A) -> show running-directory
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
- Running configuration: WORKING > the OmniSwitch is running from the working directory.
- Certify/Restore Status: CERTIFIED > the working directory content matches the certified directory
content.
- Running Configuration: SYNCHRONIZED > the running configuration matches the WORKING configuration.
4
OmniSwitches Directories Content (R8)
- 3 new VLANs are now created. Changes are made to the configuration file in RAM. These changes take
effect immediately but are not written permanently; they will be lost if the OmniSwitch reboots.
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Running Configuration : NOT SYNCHRONIZED
- Running configuration: WORKING > the OmniSwitch is running from the WORKING directory.
- Certify/Restore Status: CERTIFIED > the working directory content matches the certified directory
content.
- Running Configuration: NOT SYNCHRONIZED > the running configuration does not match the
configuration of the working directory.
IN OUR CASE, THE VLAN 2, 3 AND 99 WILL BE LOST, AS THEY ARE NOW STORED IN THE RUNNING
CONFIGURATION.
5
OmniSwitches Directories Content (R8)
- To check that:
sw3 (6560-A) -> show running-directory
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFY NEEDED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
- Running configuration: WORKING > the OmniSwitch is running from the working directory.
- Certify/Restore Status: CERTIFY NEEDED > the WORKING directory does not match the CERTIFIED
directory.
- Running Configuration: SYNCHRONIZED > the running configuration matches the configuration of the
working directory.
HOWEVER, SINCE THE CONFIGURATION FILE WAS SAVED TO THE WORKING DIRECTORY, THAT FILE IS STILL IN
THE WORKING DIRECTORY AND CAN BE RETRIEVED.
SINCE THE WORKING AND CERTIFIED DIRECTORIES ARE NOT THE SAME, THE OMNISWITCH WILL BE RUNNING
FROM THE CERTIFIED DIRECTORY.
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : CERTIFIED,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
- Note that when an OmniSwitch is running from the CERTIFIED directory, it is not possible to manipulate
files in the directory structure (i.e. a configuration will be applied in the running configuration, but it
will not be possible to save it neither in the working nor the certify directory):
sw3 (6560-A) -> vlan 4
sw3 (6560-A) -> write memory
ERROR: Write memory is not permitted when switch is running in certified mode
- Let’s reboot the OmniSwitch on Working directory where vlan have been recorded:
sw3 (6560-A) -> reload from working no rollback-timeout
Confirm Activate (Y/N) : y
This operation will verify and copy images before reloading.
It may take several minutes to complete...
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFY NEEDED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
- Create a user defined directory and copy the contents of the WORKING directory to it:
Tips
The lab directory may have been already created, ignore error and proceed on.
During the copy; it tries to copy the boot.md5 file but a “permission denied” message is displayed. This file is
auto generated so ignore this error and proceed.
- Now let’s see what files are stored in the newly created directory:
sw3 (6560-A) -> ls lab
Nos.img cspbroker.conf vcboot.cfg.sav
cloudagent.cfg vcboot.cfg vcsetup.cfg
- Once the switch boots, verify that it booted from the lab directory:
sw3 (6560-A) -> show running-directory
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : lab,
Certify/Restore Status : CERTIFY NEEDED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
- Running configuration: lab > the OmniSwitch is running from the user-defined lab.
- Certify/Restore Status: CERTIFY NEEDED > the running directory (“lab”) does not match the CERTIFIED
directory.
- Running Configuration: SYNCHRONIZED > the running configuration matches the configuration stored in
the running directory (here the user-defined “lab” directory)
- Overwrite the contents of the certified directory with the configuration from the running directory
(“lab” directory here):
sw3 (6560-A) -> copy running certified
Wed Apr 2 04:22:40 : flashManager FlashMgr Main INFO message:
+++ Verifying image directory lab on CMM flash
Wed Apr 2 04:23:04 : ChassisSupervisor MipMgr INFO message:
+++ Copy running to certified succeeded
8
OmniSwitches Directories Content (R8)
Notes
The copy running certified command should only be done if the running configuration has been verified.
- Running configuration: lab > the OmniSwitch is running from the user-defined lab.
- Certify/Restore Status: CERTIFIED > the running directory (“lab”) matches the CERTIFIED directory.
- Running Configuration: SYNCHRONIZED > the running configuration matches the configuration stored in
the running directory (here the user-defined “lab” directory)
Warning > What if the OmniSwitch reboots now?
IF THE OMNISWITCH IS REBOOTED (IF THE POWER TO THE OMNISWITCH IS INTERRUPTED), THE OMNISWITCH
WILL BOOT FROM THE “LAB” DIRECTORY, SINCE THE RUNNING (LAB) AND CERTIFIED DIRECTORIES ARE THE SAME
(Certify/Restore Status: CERTIFIED).
Here is an example of a USB backup. This exercise cannot be done on the remote lab. The USB port is used to
connect the USB-to-Eth dongle
- When this command is enabled, the images and configuration from certified and running directories are
copied into /uflash/6560/certified and /uflash/6560/running directories.
- When write memory is executed and backup is enabled, the configuration files and images from
/flash/<running-directory> are copied to /uflash/6560/<running-directory name> (ex. lab)
- When usb backup admin-state is enabled and copy running certified and write memory flash-synchro
commands are executed, the configuration and images from /flash/certified will be copied to
/uflash/6560/certified:
sw3 (6560-A) -> write memory flash-synchro
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
1 2
• Goal
8 3
• Virtual Chassis = Group of switches which appears
3 6
as a single router or bridge Master
VFL
VFL 7 4
• Key Points
• Single Point of management 4 5 8 5
On 24/48
port models
OS9900 8 x OS6865/OS6860/E/N
OS6860E/N/OS6865
Up to 2 VFL member ports
For 10Gbps For 40Gbps Up to 8 VFL member ports
2 x OS9900 OS99-XNI-U24/48 OS99-CNI-U8 Local stacking via
Native 40G QSFP on CMM with OS99-XNI-U12Q dedicated 20G VFL ports
40G-to-10G splitter cable OS99-XNI-P12Q and/or Remote stacking via
Native 40G QSFP ports on CMM
10G SFP+ ports
2 x 2 ports
For 100Gbps
OS99-CNI-U8
Native QSFP28 ports
VIRTUAL CHASSIS - TOPOLOGIES
OS6900-X/T48C6/X48C6/V48C8/C32E/X24C2/T24C2
Slave
Slave
3 6
4 5
Slave Slave
ROLES AND ELECTIONS
• Master and slaves communicate to ensure that the slaves have up-to date copies of the
master’s image files and configuration files.
• Reboot required after a slave update (new images and configuration files).
Master/Slave election
based on virtual chassis
protocol (ISIS-VC) IS-IS VC
Master Slave
Highest chassis priority value 1 2
Slave Slave
Longest chassis uptime 3 6
(if difference in uptime >10 mn)
4 5
Smallest Chassis ID value
Slave Slave
4 5 4 5 4 5
Slave Slave Slave Slave Slave Slave
VIRTUAL CHASSIS SPECIFICATIONS
Management network
Potential
OS6860
duplicate MAC/IP
MASTER MASTER
SLAVE
VSCP
ACCESS
Link Aggregation
Building 1 Building 2
Platforms Supported in R8
MASTER SLAVE
ACCESS
• Requires an upstream or downstream device to act as helper switch Use the virtual-chassis split-protection admin-state and virtual-chassis split-
protection linkagg commands to enable VCSP and create the VCSP link aggregate
• Proprietary protocol called “VC Split Protocol” on the VC.
• VCSP LAG towards the helper switch Use the virtual-chassis split-protection helper admin-state and virtual-chassis
split-protection helper linkagg commands to enable the VCSP helper and create
• Every VC member switch recommended to have one port as part of the the VCSP helper link aggregate on the helper switch
VCSP LAG to the helper device Extract from OmniSwitch AOS Release 8 Switch Management Guide
IN SERVICE SOFTWARE UPGRADE (ISSU)
• Goal
• Used to upgrade the software on a VC with minimal
network disruption
3
• Each element is upgraded individually 1
Master – Chassis ID 1
Slave – Chassis ID = 2
• Step by Step
issu-dir Directory
• Upload new code, vcsetup.cfg and vcboot.cfg Issu_dir Directory
in a new directory (ex. issu_dir) vcboot.cfg
vcboot.cfg vcsetup.cfg code
• Launch the dedicated issu command
vcsetup.cfg
• The image and configuration files are then
Slave – Chassis ID = 3
copied to all of the Slaves code
2
• The Slaves are then reloaded from the ISSU
directory in order from lowest to highest Issu_dir Directory
chassis ID code
vcboot.cfg vcsetup.cfg
REMOTE CLI ACCESS THROUGH ANY MEMBER ON A VC
• A user can access to remote CLI console of any • Supported Platforms:
VC with secure shell protocol (SSH). • OS9900, OS6900, OS6860N, OS6860/OS6865,
OS6560, OS6465, OS6360.
ssh-chassis <username>@<chassis-id>
Local Chassis: 2
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+---------------+--------+-----+------+------------------
1 Master Running 1 100 0 2c:fa:a2:61:3a:2d
2 Slave Running 2 100 0 2c:fa:a2:60:ff:6b
VIRTUAL CHASSIS - CONFIGURATION
VIRTUAL CHASSIS CONFIGURATION
Step by Step
Switch Bootup
• Main use case
N Y
vcsetup.cfg exists?
Disable Auto
configuration Y
on boot
VC Mode
Auto Vcsetup
AUTO-VC VFL : AUTO or
created
Static Management
Assign a Chassis ID
Assign a Chassis ID
Assign a Chassis ID
Must be different for each switch belonging to the Virtual Chassis
Chassis 1 Chassis 2
1 2
Define a Priority
Between 0 to 255, switch with the highest priority is elected Master
1 2
VIRTUAL CHASSIS CONFIGURATION
Step by Step
Configure Automatic VFL mode Configure Static VFL link & ports
Specify ports that are designated as VFLs Create VFL ID
and software will automatically assign VFL IDs. Specify its member ports
WORKING CERTIFIED
MASTER
RUNNING
CONFIGURATION
MONO CMM, … …
Current CMM Slot : CHASSIS-1 A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFY NEEDED
SYNCHRONIZATION STATUS
Flash Between CMMs : NOT SYNCHRONIZED, WORKING CERTIFIED
Running Configuration : SYNCHRONIZED SLAVE
VIRTUAL CHASSIS SYNCHRONIZATION - EXAMPLE
-> copy running certified
RAM
WORKING CERTIFIED
MASTER
RUNNING
CONFIGURATION
WORKING CERTIFIED
SLAVE
… …
WORKING CERTIFIED
SLAVE
VIRTUAL CHASSIS SYNCHRONIZATION - EXAMPLE
-> copy flash-synchro
1 2
RAM
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS
… SYNCHRONIZATION STATUS
Flash Between CMMs : SYNCHRONIZED,
Running Configuration : SYNCHRONIZED
-> write memory flash-synchro - This command can also be used to synchronize the virtual chassis
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Virtual Chassis-6360
How to
✓ This lab is designed to familiarize you with the Virtual Chassis feature (VC)
and its configuration.
Contents
1 Configure a Virtual Chassis of two switches ............................................... 2
1.1. Objective ............................................................................................ 2
1.2. Management ......................................................................................... 3
2 Virtual Chassis Monitoring.................................................................... 6
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Virtual Chassis-6360
1.1. Objective
3
Virtual Chassis-6360
1.2. Management
- Assign a globally unique chassis identifier to the switch 6360A and enable the switch to operate in virtual
chassis mode
sw5 (6360-A) -> show virtual-chassis topology
Legend: Status suffix "+" means an added unit after last saved topology
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 100 0 94:24:e1:7c:82:1d
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 100 1 94:24:e1:7c:82:1d
- Force the 6360-A to be the master chassis, assign a highest chassis priority to it:
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 100 1 94:24:e1:7c:82:1d
Notes:
A reload is mandatory to take account the chassis priority
Notes:
Wait until complete restart. (* close to 4 mn in lab context)
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 200 1 94:24:e1:7c:82:1d
- Assign a globally unique chassis identifier to the switch 6360B and enable the switch to operate in virtual
chassis mode
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 100 0 94:24:e1:7c:79:65
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 2 100 1 94:24:e1:7c:79:65
Notes:
A reload is mandatory to take account the new chassis -id
The command write memory is protected by issuing a warning to prevent or warn purging the configuration of
the elements that are missing. Chassis id has been changed in this case.
Notes:
Wait until complete restart.
Tue Jun 22 03:04:41 : qosNi Info INFO message:
+++ VC Takeover in progress.
+++ VC Takeover complete.
Chassis Supervision: CMM has reached the ready state [L8]
Legend: Status suffix "+" means an added unit after last saved topology
Local Chassis: 2
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
2 Master Running 2 100 1 94:24:e1:7c:79:65
Notes:
On the 6360-B, INTERFACE 2/1/27 and INTERFACE 2/1/28 automatically LINK UP and the switch Reboot.
Legend: Status suffix "+" means an added unit after last saved topology
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 200 1 94:24:e1:7c:82:1d
2 Slave Running+ 2 100 1 94:24:e1:7c:79:65
Notes:
suffix “+”, if any VC element is detected as “Running” but not configuration saved
- Save the configuration and Check the virtual-chassis topology and Copy running to certified:
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 200 1 94:24:e1:7c:82:1d
2 Slave Running 2 100 1 94:24:e1:7c:79:65
! IP:
Notes:
The “Is Primary” field defines the primary port of the virtual fabric link.
8
Virtual Chassis-6360
- Verify the consistency of system-level mandatory parameters between the two chassis:
-
sw5 (6360-A) -> show virtual-chassis consistency
Legend: * - denotes mandatory consistency which will affect chassis status
licenses-info - A: Advanced; B: Data Center;
Notes:
The two chassis in the same Virtual-Chassis group must maintain identical configuration and operational
parameters.
Password: switch
- Although the prompt is the same, you are now connected to the secondary VC. Type the following:
Local Chassis: 2
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 200 1 2c:fa:a2:05:cd:71
2 Slave Running 2 100 1 2c:fa:a2:05:cd:a9
- Look at the Local Chassis parameter. Now it says 2, which means you are connected to the secondary VC.
log
- As you can see here, HTTP authentication is enabled, and the first authentication server to be polled is
the local database. If it is not, enable it via the command : aaa authentication http local
Notes
By default, the WebView is enabled on the OmniSwitch but you are not allowed to authenticate. On the
Remote-Lab, the WebView access has already been enabled.
- Check the WebView status:
- Opening the WebView from the Windows Desktop, open a Web Browser (ex. Firefox, Chrome)
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• How it works
• Ports become members of VLANs by
• Static Configuration Vlan 50
Vlan10 Vlan 60
• Mobility/with or without Authentication *
• 802.1q
VLAN 3
VLAN 4
VLAN 5
1/1/4
VLAN 6
1/1/6
VLAN MANAGEMENT - STATIC VLAN MEMBERSHIP
Configuration –Step by step
Defining a VLAN
-> vlan 2
Optional commands
-> vlan 4 admin-state enable
-> vlan 4 name Engineering
Use quotes around string if the VLAN name contains multiple words with spaces between them
-> vlan 10-15 100-105 200 name “Training Network”
Monitoring
-> show vlan 4
-> show vlan members
-> show ip interface
VLAN MANAGEMENT - DYNAMIC VLAN MEMBERSHIP
• Goal
VLAN 4
VLAN 5
VLAN 6
Classification
Rules
4. MAC-OUI
5. MAC address range
6. LLDP
7. Auth-type
8. IP address
9. VLAN tag
VLAN MANAGEMENT - DYNAMIC VLAN MEMBERSHIP
• Device oriented : VLAN according to traffic criteria (MAC@, etc…)
UNP profile
Enabling a mobile port VLAN ID
ACL QoS
Configure UNP profile
*
-> unp profile employee Location
Period
Map the vlan to UNP
* Policy list, location and period will be seen
in the following chapter (Access Guardian)
unp profile employee map vlan 20
VLAN MANAGEMENT - DYNAMIC VLAN MEMBERSHIP
• Device oriented : unp according to traffic criteria (MAC@, etc…)
• unp classification rules Configuration – step by step
• When classification is enabled but authentication is disabled or fails,UNP classification rules are appliedto
the traffic received on the UNP port.
• Eg : Binding rule that combines a MAC address rule, an IP address rule, and a port rule
-> unp classification mac-address 00:11:22:33:44:55 ip-address 10.0.0.20 mask 255.255.0.0 port 1/1/1 profile1 employee
• “ext-r1” rule combines a port rule and vlan tag type rule
• Create the required UNP profile and map the profile to VLAN 20
No Auth -> unp profile corporate
-> unp profile corporate map vlan 20
Classification • Create another UNP profile that will serve as a default profile
Rules and map the profile to VLAN 10
-> unp profile def_unp
-> unp profile def_unp map vlan 10
UNP Profile
• Create a MAC range classification rule and associate the rule to
the “corporate” UNP profile
-> unp classification-rule rule1 mac-address-range 08:00:27:00:98:0A 08:00:27:00:98:FF
Default -> unp classification-rule rule1 profile1 corporate
UNP Profile
• Enable UNP on the user port that will connect to user device
-> unp port 1/1/1 port-type bridge
Block
• Set the default UNP profile on the user port
-> unp port 1/1/1 default-profile def_unp
INTER VLAN ROUTING
INTER VLAN ROUTING
• IP interfaces are associated with VLANs
• IP routing is active as soon as at least one IP interface is associated with a VLAN
1/1/2
VLAN 20
Virtual Router
The operational status of a VLAN
remains inactive as long as no active
port is associated with this VLAN
1/1/6
VLAN 60
Virtual Router
-> show vlan 20
Name : data,
Type : Static Vlan,
Administrative State : enabled,
Operational State : enabled,
IP Routing : enabled,
IP MTU : 1500
Tagged Frames
IEEE 802.1Q – TAGGED VLANS
4 Bytes
802.1Q - CONFIGURATION
VLAN 4
VLAN 4
VLAN 3
VLAN 3
VLAN 278 VLAN 278
1/1/24 1/1/24
* 802.1X and Mac authentication will be seen in more details in the following chapter (Access Guardian)
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
VLANs
How to
✓ Manage VLANs on the OmniSwitches
Contents
1 Topology ........................................................................................ 2
2 Creating a VLAN ............................................................................... 2
3 Creating Additional VLANs ................................................................... 7
4 Dynamic VLAN Membership ................................................................ 11
5 Deleting VLANs & IP interfaces ............................................................ 14
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
VLANs
1 Topology
Below the topology that will be used during this lab:
2 Creating a VLAN
VLANs provide the ability to segregate a network into multiple broadcast domains. Additionally, Virtual Router
ports (or IP Interfaces) can be assigned to VLANs to allow traffic to be switched at Layer 3.
- In its untagged configuration, the switch has only one VLAN, the VLAN 1. This is the default VLAN and all
ports are initially associated with it. This VLAN CANNOT be deleted, but it can be disabled if desired.
- Let’s run the command to see the VLANs that exist on the switch as well as information on a single VLAN
(ex. 6360-A):
sw5 (OS6360-A) -> show vlan
stree mble src
vlan type admin oper 1x1 flat auth ip tag lrn name
-----+-----+------+------+------+------+----+-----+-----+------+----------
1 std on off on on off off off on VLAN 1
3
VLANs
- Notice the VLAN Administrative State is enabled, however its Operational State is disabled. Without
members the VLAN will be Operationally down.
Notes
You can also list the ports and their associated VLAN (notice that the status of all the ports is “inactive”, so the
Vlan is operationally down):
-> show vlan members
- In order to have IP connectivity to a VLAN interface (not required for connectivity to other
clients/servers within a VLAN), an IP address (IP interface) must be assigned to a Virtual Router port and
associated to that VLAN. This IP address can then be used for IP connectivity as well as Layer 3
switching.
4
VLANs
- To create the IP interface (ex. int_1 = IP interface name, 192.168.10.5 = IP@ of the IP Interface):
sw5 (6360-A) -> ip interface int_1 address 192.168.10.5/24
- The Device status is unbound. It is because the IP interface has not been associated to a VLAN yet.
- To bind the IP Interface (ex. int 1) to a VLAN (ex. VLAN 1):
sw5 (6360-A) -> ip interface int_1 vlan 1
Notes
The last 2 commands can be merged into a single command:
-> ip interface int_1 address 192.168.10.5/24 vlan 1
- If Status = DOWN, it indicates no active ports or devices have been associated with the VLAN that the IP
interface has been assigned to. If an IP interface is DOWN, it cannot be connected to, will not reply to
PING requests nor will it be advertised in any router updates. This will not affect the Layer 2 broadcast
domain, however.
- Let’s activate a port in VLAN 1 to change the status to enable:
sw5 (6360-A) -> interfaces 1/1/1 admin-state enable
Tips
The equipment connected to the port 1/1/1 of the 6360-A is the Client 5 virtual machine:
-
5
VLANs
- By default, all ports (including the port 1/1/1) belong to VLAN 1, so the VLAN 1 will become active.
- Run the command to check that the status of the IP interface is UP:
sw5 (6360-A) -> show ip interface
Total 3 interfaces
Flags (D=Directly-bound)
Now that the VLAN has an active port, let’s modify the IP information of the Client 5, and ping the IP
interface associated with VLAN 1.
Windows Desktop
Double-click on VMware
vSphere
- IP address: 192.168.10.105
- Subnet mask:
255.255.255.0
- Default gateway:
192.168.10.5 (The IP address
of VLAN 1 virtual router)
- From Client 5, open a command prompt and ping the switch’s VLAN 1 Virtual Router IP address. You
should now have IP connectivity:
7
VLANs
- To begin, let’s create a new VLAN and assign an IP address to that VLAN as done previously:
sw5 (6360-A) -> vlan 50
sw5 (6360-A) -> ip interface int_50 address 192.168.50.5/24 vlan 50
Windows Desktop
Double-click on VMware
vSphere
- IP address: 192.168.50.55
- Subnet mask:
255.255.255.0
- Default gateway:
192.168.50.5 (The IP address
of VLAN 50 virtual router)
10
VLANs
By default, the switch will route packets between VLAN 1 and VLAN 50 using the IP interfaces that you have
created.
- From client 9, open a command prompt and ping the client 5. You should now have IP connectivity:
11
VLANs
- As we haven't yet managed the DHCP server at this stage in the training, we'll assign a static IP address
to client 6. Assign an IP address to the Client 6:
Windows Desktop
Double-click on VMware
vSphere
Or
12
VLANs
- IP address: 192.168.40.106
- Subnet mask:
255.255.255.0
And click on OK
- Check Mac-learning table for the port 2/1/1. (example with pod 5 client 6)
sw5 (6360-A) -> show mac-learning port 2/1/1
Legend: Mac Address: * = address not valid,
Mac Address: & = duplicate static address,
- Configure a unp classification rule based on mac address. In this command, mac address is the client 6 of
pod5.in your case, check result on show mac-learning command done previously
sw5 (6360-A) -> unp classification mac-address 00:50:56:90:ee:0a profile1 employee
- Enable UNP on the user port that will connect to user device
sw5 (6360-A) -> unp port 2/1/1 port-type bridge
Notes
VLAN 1 cannot be deleted. It is only possible to deactivate.
- Check that the VLAN 50 and the IP interfaces have been correctly deleted:
sw5 (6360-A) -> show vlan
vlan type admin oper ip mtu name
------+-------+-------+------+------+------+------------------
1 std Ena Ena Dis 1500 VLAN 1
4094 vcm Ena Dis Dis 1500 VCM IPC
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• It is also possible to assign different severity levels to different switch applications (some
of the events will be filtered out of the display)
SWITCH LOGGING APPLICATION ID LEVELS OF REPORTING
• Specific applications may have different levels of reporting and can be specified by their
application ID or by their numeric equivalent
show swlog appid ?
^
ALL <string>
SWLOG PMD ChassisSupervisor flashManager MIP_GATEWAY
ConfigManager capManCmm vc_licManager vcmCmm SSTIME SSAPP
mrvld capManSig fabric portMgrCmm vfcm intfCmm dafcCmm
linkAggCmm VlanMgrCmm ipmscmm pvlanCmm isis_spb_0 isisVc
stpCmm AGCMM slCmm mirMonSFlowCmm ipv4 ipv6 ipsecSys ipsec
tcamCmm qosCmm vstkCmm eoamCmm erpCmm NTP udpRelay
remoteConfig AAA havlanCmm SES rmon WEBVIEW trapmgr radCli
ldapClientCmm tacClientCmm healthCmm svcCmm lldpCmm udldCmm
evbCmm mpls saaCmm SNMP csEventMonitor bfdcmm mvrpCmm
dhcp6r messageService dhcpv6Srv dhcpSrv grm bcdcmm lpCmm
DG_CMM qmrCmm iprm_0 vrrp_0 ospf_0 flashManagerNI capManNi
vcmNi portMgrNi bcd vfcn intfNi dafcNi linkAggNi VlanMgrNi
stpNi erpNi vstkNi fdbmgr1 slNi healthNi ipni ip6ni
mirMonSFlowNi tcamni qosNi ipmsni svcNi evbNi lldpNi udldNi
bfdni mvrpNi AGNI DG_NI nipktrly loamNi eoamNi fdbmgr4 lpNi
fdbmgr3
SWITCH LOGGING APPLICATION ID
• Example of levels of reporting management for OSPF
• All sub application
sw1 (6900-A) -> swlog appid ospf_0 subapp all level 8 or sw1 (6900-A) -> swlog appid ospf_0 subapp all level debug3
• Application
• show log swlog |grep [appid] |grep [subapp] …
sw1 (6900-A) -> show log swlog |grep ospf
2017 Jun 10 10:43:46 Pod18sw1 swlogd: ospf_0 INFO debug2(7) (11654):(3157):ENTER select usec=870000, lastMs=264773690, curMs=264773820.
2017 Jun 10 10:43:47 Pod18sw1 swlogd: ospf_0 INFO debug2(7) (11654):(3163):EXIT select with n=0, lastMs=264773690, curMs=264773820, drcTimeGetMs=264774691
2017 Jun 10 10:43:47 Pod18sw1 swlogd: ospf_0 AREA debug2(7) (11654):(3254):[curTime=251159s] Flooding area 0.0.0.0
2017 Jun 10 10:43:47 Pod18sw1 swlogd: ospf_0 TIME debug2(7) (11654):(1259):Intf addr 172.16.17.1, curTime = 251159, helloTimer = 251497, deadTimer = 75447
2017 Jun 10 10:43:47 Pod18sw1 swlogd: ospf_0 TIME debug2(7) (11654):(1259):Intf addr 172.16.18.1, curTime = 251159, helloTimer = 251160, deadTimer = 66940
2017 Jun 10 10:43:47 Pod18sw1 swlogd: ospf_0 TIME debug2(7) (11654):(1259):Intf addr 192.168.110.1, curTime = 251159, helloTimer = 251160, deadTimer = 66940
2017 Jun 10 10:43:47 Pod18sw1 swlogd: ospf_0 INFO debug2(7) (11654):(3157):ENTER select usec=999000, lastMs=264774690, curMs=264774691.
DISPLAYING SWITCH LOGGING RECORDS
• Reverse
2022 Jun 10 11:43:59 Pod18sw1 swlogd: ospf_0 AREA debug2(7) (11654):(3254):[curTime=251171s] Flooding area 0.0.0.0
2022 Jun 10 11:43:59 Pod18sw1 swlogd: ospf_0 TIME debug2(7) (11654):(1259):Intf addr 172.16.17.1, curTime = 251171, helloTimer = 251497, deadTimer = 75447
2022 Jun 10 11:43:58 Pod18sw1 swlogd: ospf_0 TIME debug2(7) (11654):(1259):Intf addr 172.16.18.1, curTime = 251171, helloTimer = 251180, deadTimer = 66940
2022 Jun 10 11:43:58 Pod18sw1 swlogd: ospf_0 TIME debug2(7) (11654):(1259):Intf addr 192.168.110.1, curTime = 251171, helloTimer = 251180, deadTimer = 66940
READABLE CUSTOMER EVENT LOGS
• OmniSwitch is now designed to provide Readable Customer Event information about
important events on the Switch
• User-friendly, consistent and customer readable format.
• Must be enabled
-> command-log enable/disable
-> swlog remote command-log enable/disable
EXAMPLE
-> show command-log
Command : vlan 68 router ip 168.14.12.120
UserName : admin
Date : MON APR 28 01:42:24
Ip Addr : 128.251.19.240
Result : SUCCESS
Command : vlan 68 router ip 172.22.2.13
UserName : admin
Date : MON APR 28 01:41:51
Ip Addr : 128.251.19.240
Result : ERROR: Ip Address must not belong to IP VLAN 67 subnet
Command : command-log enable
UserName : admin
Date : MON APR 28 01:40:55
Ip Addr : 128.251.19.240
Result : SUCCESS
Command : command-log enable
UserName : admin
Date : MON APR 28 11:13:13
Ip Addr : console
Result : SUCCESS
• Specifications
• Data stored in compliance with the ENC file format (Network General Sniffer Format)
• 6 – session ID
-> show port monitor file
• Session can be paused, resumed, disabled and associated with a timeout
-> rmon probes alarm enable Probe’s Owner: Analyzer-p:128.251.18.166 on Slot 1, Port 35
History Control Buckets Requested = 2
-> rmon probes stats enable History Control Buckets Granted = 2
-> show rmon probes history 30562 History Control Interval = 30 seconds
History Sample Index = 5859
Entry 10325
Flavor = History, Status = Active
Time = 48 hrs 53 mins,
System Resources (bytes) = 601
SYSTEM HEALTH
OVERVIEW
• Monitors switch resource utilization and thresholds
• Switch-level Input/Output
• Memory and CPU Utilization Levels
• Most recent utilization level (percentage)
• Average utilization level over the last minute (percentage)
• Average utilization level over the last hour (percentage)
• Maximum utilization level over the last hour (percentage)
• Threshold level
-> show health
sw8 (6860-B) -> show health
CMM Current 1 Min 1 Hr 1 Day
Resources Avg Avg Avg
--------------------+---------+-------+-------+-------
CPU 11 13 11 0
Memory 57 57 57 0
SFLOW
SFLOW - NETWORK MONITORING TECHNOLOGY
• Industry standard with many vendors • sFlow data applications
• Delivering products with sFlow support (RFC 3176) • Detecting, diagnosing and fixing network problems
• Gives visibility in to the activity of the network • Real time congestion management
• Provides network usage information and network • detecting unauthorized network activity (DOS)
wide view of usage and active routes • Usage accounting and billing
• Used for measuring network traffic, collecting, • Understanding application mix (web, DNS etc.)
storing and analyzing the traffic data • Route profiling and peering optimization
• Capacity planning
OmniSwitch
Forwarding tables
sFlow Agent
Sampling
Interface counters
Switching ASICs
Network
OVERVIEW
• Traffic flows monitoring and sampling technology embedded within switches
• sFlow Agent software process running as part of the switch software
• sFlow Collector which receives, analyses the monitored data (3rd Party software)
• sFlow Collector makes use of SNMP to communicate with a sFlow agent in order to configure sFlow
monitoring on the device (switch)
sFlow
sFlow
sFlow
sFlow
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Switch maintenance and Diagnostics tools
How to
✓ This lab is designed to familiarize you with some basic troubleshooting and
debugging tools on an OmniSwitch.
Contents
1 Switch Logging ................................................................................. 2
2 Readable Customer Event Logs.............................................................. 3
3 Command Logging ............................................................................. 4
4 Port Mirroring .................................................................................. 5
5 Port Monitoring ................................................................................ 5
6 Health ........................................................................................... 7
7 RMON............................................................................................ 7
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Switch maintenance and Diagnostics tools
1 Switch Logging
Switch Logging can be used to track informational or debugging messages from the switch. This is
dependent upon the severity level set for a particular process. Logging can be configured to send its output
to flash, console, or an external server. By default, switch logging is enabled
- On the 6860-A, type the following:
sw7 (6860-A) -> show swlog
Operational Status : Running,
File Size per file : 1250 Kbytes,
Log Device 1 : console flash,
Syslog FacilityID : local0(16),
Hash Table entries age limit : 60 seconds,
Switch Log Preamble : Enabled,
Switch Log Debug : Disabled,
Switch Log Duplicate Detection : Enabled,
Console Display Level : info
- You should see that logging is running and sending its output to both flash and the console. It does not
mean that all messages will be displayed on the console, only messages matching the severity level, by
default, informational (6). Logging can be disabled if desired.
- Type the following:
sw7 (6860-A) -> swlog disable
- The logging feature has a number of application IDs. These IDs are used to determine which process
generated the logging message and at what severity level. Consult the user guide for a list of processes
and associated severity levels. By default all processes are set to a severity level of 6, which is
informational, as indicated above. All logging messages are stored in the swlog*.log files and can be
viewed right on the switch.
sw7 (6860-A) -> show log swlog
Notes
Use CTRL+C keys to stop the display of the file.
You may also use show log swlog | grep “string to find” or show log swlog timestamp mm/dd/yy
hh:mm:ss to find specific information on the log file.
3
Switch maintenance and Diagnostics tools
AOS is now designed to provide Readable Customer Event information about important events on the
OmniSwitch in a user-friendly, consistent and customer readable format. A new set of CLI commands are
introduced to view Readable Customer Events. Unlike AOS Syslog, Readable Customer Event feature provides
logs for the most significant switch events
sw7 (6860-A) -> swlog appid all subapp all level event
- Compare the output of this command with the show log swlog from the previous section
Notice the difference in the output of both commands
The show log events command has the following output:
3 Command Logging
Like switch logging, commands entered on the OmniSwitch can captured to a log file. These can then be
reviewed later to see what changes have been made. This is a very valuable tool, especially when modifying
the switch configuration.
- Type the following:
sw7 (6860-A) -> show command-log
- You should now see the commands you entered displayed on the screen with information about the time
and where they were entered from, such as a console or TELNET session.
- To disable it enter :
sw7 (6860-A) -> command-log disable
5
Switch maintenance and Diagnostics tools
4 Port Mirroring
Port mirroring can be configured to copy traffic from one or multiple ports to another. The destination port
would normally have a traffic analyzer connected.
- Let’s create a mirroring session to copy traffic from one port to another.
sw7 (6860-A) -> port-mirroring 1 source port 1/1/1 destination port 1/1/10
5 Port Monitoring
Port Monitoring makes it possible to capture traffic being sent to and from a port and store it in /flash in
".enc" (or Sniffer) format. The data is stored in a file named pmonitor.enc by default, but this can be
modified. The file can then be transferred off the switch and viewed in detail using a traffic analyzer. It is
also possible to display the output directly to the console or to a telnet session.
- Start a port monitoring session :
sw7 (6860-A) -> interfaces 1/1/1 admin-state enable
sw7 (6860-A) -> port-monitoring 1 source port 1/1/1 enable
- You should now see a message indicating that it has finished writing the capture file. The data is stored in
a file called pmonitor.enc in the /flash directory.
sw7 (6860-A) -> ls -l
total 7948
-rw-r--r-- 1 admin user 4053444 Jan 1 2021 UAppSig.upgrade_kit
drwxr-xr-x 2 admin user 4096 Jan 5 2021 bootflash
drwxr-xr-x 2 admin user 4096 Jan 1 00:06 certified
-rw-r--r-- 1 admin user 66402 Feb 11 03:54 command.log
drwxr-xr-x 2 admin user 4096 Dec 4 17:20 diags
-rw-r--r-- 1 admin user 526184 Dec 4 17:20 eeprom
drwxr-xr-x 5 admin user 4096 Jan 1 00:04 externalCPU
drwxr-xr-x 2 admin user 4096 Feb 8 01:19 foss
-rw-r--r-- 1 admin user 239 Feb 8 01:20 hwinfo
drwxr-xr-x 2 admin user 4096 Jan 1 2021 labinit
drwxr-xr-x 2 admin user 16384 Dec 4 17:21 lost+found
drwxr-xr-x 2 admin user 4096 Jan 5 2021 network
drwxr-xr-x 3 admin user 4096 Jan 5 2021 pmd
-------r-- 1 root root 4835 Feb 11 04:09 pmonitor.enc
drwxrwx--- 2 root admins 4096 Jan 1 00:00 python
-rw-r--r-- 1 admin user 2848 Jan 2 21:45 snapall
drwxr-xr-x 6 admin user 4096 Jan 1 00:01 switch
-rw-r--r-- 1 admin user 735660 Jan 1 2021 swlog
drwxr-xr-x 2 admin user 4096 Feb 8 01:21 swlog_archive
-rw-r--r-- 1 admin user 740893 Feb 11 04:09 swlog_chassis1
-rw-r--r-- 1 admin user 1280009 Feb 7 19:13 swlog_chassis1.0
drwxr-xr-x 2 admin user 4096 Jan 5 2021 system
-------r-- 1 root root 4835 Feb 11 02:06 test.cap
-rw-r--r-- 1 admin user 594809 Jan 1 2021 u-boot.8.2.1.R01.255.tar.gz
-rw-r--r-- 1 admin user 3453 Jan 1 2021 u-boot_copy
drwxr-xr-x 2 admin user 4096 Feb 8 01:20 working
- Use the ‘?’ to display additional parameters. How would you change the name of the capture file?
sw7 (6860-A) -> show port-monitoring ?
^
STATUS FILE
6 Health
The Health feature can be used to gather basic information on the state of the switch such as CPU, memory
and traffic utilization information.
sw7 (6860-A) -> show health
CMM Current 1 Min 1 Hr 1 Day
Resources Avg Avg Avg
----------------------+---------+-------+-------+-------
CPU 7 7 7 6
Memory 64 64 64 64
7 RMON
Remote Monitoring can be used to gather statistics for displaying in OmniVista or other NMS solutions.
Make sure that interface 1/1/1 is enabled so you can get these statistics.
-> interfaces 1/1/1 admin-state enable
Chassis/
Entry Slot/Port Flavor Status Duration System Resources
-------+----------+---------+-----------+------------+----------------
1001 1/1/1 Ethernet Active 74:21:55 300 bytes
1004 1/1/4 Ethernet Active 74:21:55 300 bytes
1010 1/1/10 Ethernet Active 74:21:55 301 bytes
1023 1/1/23 Ethernet Active 74:21:55 301 bytes
1024 1/1/24 Ethernet Active 74:21:55 301 bytes
1003 1/1/3 Ethernet Active 74:21:55 300 bytes
1006 1/1/6 Ethernet Active 74:21:54 300 bytes
1005 1/1/5 Ethernet Active 74:21:54 300 bytes
1009 1/1/9 Ethernet Active 72:50:10 300 bytes
1007 1/1/7 Ethernet Active 01:13:21 300 bytes
Chassis/
Entry Slot/Port Flavor Status Duration System Resources
-------+----------+---------+-----------+------------+----------------
1 1/1/1 History Active 74:22:28 5470 bytes
2 1/1/4 History Active 74:22:28 5470 bytes
3 1/1/10 History Active 74:22:28 5471 bytes
4 1/1/23 History Active 74:22:28 5471 bytes
5 1/1/24 History Active 74:22:28 5471 bytes
6 1/1/3 History Active 74:22:28 5470 bytes
7 1/1/6 History Active 74:22:27 5470 bytes
8 1/1/5 History Active 74:22:27 5470 bytes
9 1/1/9 History Active 72:50:43 5470 bytes
10 1/1/7 History Active 01:13:54 5470 bytes
Chassis/
Entry Slot/Port Flavor Status Duration System Resources
-------+----------+---------+-----------+------------+----------------
8
Switch maintenance and Diagnostics tools
Probe's Owner: Switch Auto Probe on Chassis 1, Slot 1, Port 1, ifindex 1001
Entry 1001
Flavor = Ethernet, Status = Active,
Time = 74 hrs 23 mins,
System Resources (bytes) = 300
OMNISWITCH R8
POWER OVER ETHERNET (POE)
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
Maximum current Imax 350 mA 600 mA 600 mA per pair 960 mA per pair
Three power class levels Four power class Six power class levels Eight power class levels
Energy Management
(1-3) levels (1-4) (1-6) (1-8)
Category 3 and
Supported cabling Category 5 Category 5 Category 5
Category 5
POWER OVER ETHERNET - OMNISWITCH 6360
Budget Power over Ethernet Specifications
OMNISWITCH 6360
OS6360-(P)10/10 A
OS6360-(P)48, (P48X)
OS6860(E)-(P)24 OS6860N-P48M
OS6860(E)-(P)48
OS6860N-P48Z
OS6860E-P24Z8
OS6860N-P24Z8
POWER OVER ETHERNET- OMNISWITCH 6560
OS6560
Software AOS 8 base
10M/100M/1G/2,5G
User ports 802.3at/bt
95W POE (Up to 95W on a port)
OS6560-P24X4 OS6560-P24Z24
Multi Gig
OS6465-P6
OS6465-P12
OS6465-P28
POWER OVER ETHERNET – OMNISWITCH 6865
OMNISWITCH 6865
OS6865-P16X
OS6865-U28X
OS6865-U12X
POE MANAGEMENT ON AOS R8
POE MANAGEMENT
• Displays the power supplies hardware information and current status:
-> show powersupply
Total PS
Chassis/PS Power Type Status Location
-----------+---------+--------+--------+-----------
1/1 920 AC UP Internal
Total 920
• Provides uninterrupted power to the connected device (PD) even when the switch is restarting or
recharging, such as during a soft restart
-> lanpower ppoe {enable | disable}
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNISWITCH R8
L I N K A G G R E G AT I O N G R O U P S
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
------+----------+--------+-----+-------------+------------+-------------
1 Static 40000001 8 ENABLED UP 2 2
2 Dynamic 40000002 4 ENABLED DOWN 0 0
3 Dynamic 40000003 8 ENABLED DOWN 0 2
4 Static 40000005 2 DISABLED DOWN 0 0
Command Usage
show linkagg counters Displays statistics collected for the type and number of packets
transmitted and received on link aggregate ports.
show linkagg traffic Displays the total number of packets and bytes that are received and
transmitted on link aggregate ports.
show linkagg accounting Displays statistics collected for packets transmitted and received on
link aggregate ports.
show linkagg port Displays information about link aggregation ports.
LOAD BALANCING CONTROL
HASHING CONTROL ALGORITHM Source
Address
Destination
Address
• Hashing Control
• Control over the hashing mode
Server #
• Link Aggregation
• ECMP Brief Mode
• Server Load Balancing
• Two hashing algorithms available
Source Destination UDP/TCP
• Brief Mode Address Address Port
• UDP/TCP ports not included
• Only Source IP and destination IP addresses
are considered
Server #
-> hash-control brief
Extended Mode
• Extended
• UDP/TCP ports to be included in the hashing Switch Default Hasing Mode
algorithm 9900 extended
• Result in more efficient load balancing 6900 brief
-> hash-control extended [ udp-tcp-port | no] 6860 extended
6865 extended
6560 extended
6465 brief
6360 brief
LOAD BALANCING MULTICAST ON LINK AGGREGATION
GROUPS
• Multicast traffic is by default forwarded through the primary port of the Link Aggregation
Group
• User has the option to enable hashing for non-unicast traffic, which will load balance the
non-unicast traffic across all ports in the Link Aggregation Group
• If non-ucast option is not specified, link aggregation will only load balance unicast packets
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Link Aggregation
How to
✓ This lab is designed to familiarize you with Dynamic link aggregation.
Contents
1 Topology ........................................................................................ 2
2 Link Aggregation – Dynamic between 6860’s .............................................. 2
2.1. Create a Dynamic Link Aggregation .............................................................. 2
2.2. Test the configuration ............................................................................. 4
3 Link Aggregation – Dynamic between 6860-A and 6900-A ............................... 6
3.1. Create a Dynamic Link Aggregation .............................................................. 6
3.2. Test the configuration ............................................................................. 7
4 Link Aggregation – Dynamic between 6900-A and 6900-B ............................... 8
4.1. Create a Dynamic Link Aggregation .............................................................. 8
4.2. Test the configuration ............................................................................ 10
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Link Aggregation
1 Topology
Link Aggregation provides the ability to combine multiple physical ports into a single logical port for added
throughput and redundancy; this can be done statically using OmniChannel or dynamically using the IEEE
802.3ad (LACP) protocol.
• sw8 (6860-B)
3
Link Aggregation
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
78 Dynamic 40000078 2 ENABLED DOWN 0 0
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
78 Dynamic 40000078 2 ENABLED DOWN 0 0
- Notice we have no ports associated, using the actor admin key assigned to the link aggregation, let's
associate the ports:
- Ports are associated to a dynamic link aggregation using the actor admin key. Although in the above
example the actor admin key matches the link agg number, this is not a requirement as the admin key
has local significance only.
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
78 Dynamic 40000078 2 ENABLED UP 2 2
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
78 Dynamic 40000078 2 ENABLED UP 2 2
4
Link Aggregation
Dynamic Aggregate
SNMP Id : 40000078,
Aggregate Number : 78,
SNMP Descriptor : Dynamic Aggregate Number 78 ref 40000078 size 2,
Name : ,
Admin State : ENABLED,
Operational State : UP,
Aggregate Size : 2,
Number of Selected Ports : 2,
Number of Reserved Ports : 2,
Number of Attached Ports : 2,
Primary Port : 1/1/23,
Port Selection Hash : Source Destination Ip,
Wait To Restore Time : 0 Minutes
LACP
MACAddress : [2c:fa:a2:0e:62:5c],
Actor System Id : [00:00:00:00:00:00],
Actor System Priority : 0,
Actor Admin Key : 78,
Actor Oper Key : 78,
Partner System Id : [00:00:00:00:00:00],
Partner System Priority : 0,
Partner Admin Key : 0,
Partner Oper Key : 78
Dynamic Aggregate
SNMP Id : 40000078,
Aggregate Number : 78,
SNMP Descriptor : Dynamic Aggregate Number 78 ref 40000078 size 2,
Name : ,
Admin State : ENABLED,
Operational State : UP,
Aggregate Size : 2,
Number of Selected Ports : 2,
Number of Reserved Ports : 2,
Number of Attached Ports : 2,
Primary Port : 1/1/23,
Port Selection Hash : Source Destination Ip,
Wait To Restore Time : 0 Minutes
LACP
MACAddress : [e8:e7:32:d4:84:20],
Actor System Id : [00:00:00:00:00:00],
Actor System Priority : 0,
Actor Admin Key : 78,
Actor Oper Key : 78,
Partner System Id : [00:00:00:00:00:00],
Partner System Priority : 0,
Partner Admin Key : 0,
Partner Oper Key : 78
Total 4 interfaces
Flags (D=Directly-bound)
- To demonstrate the redundancy capabilities, experiment with removing a link and monitor the results of your pings tests
Tips
You can use the command ping <dest_ip_address> count <number> to send more than 6 pings.
To break a ping sequence, press the key CTRL+C
To simulate a link failure, you can bring down the corresponding interface :
interface chassis/slot/port admin-state disable (6860)
- Now, we define a dynamic link aggregate on 6900-A and 6860-A, assign the group ID 17 and size it at 2
ports even if there is only one port available. – (For future extension)
sw1 (6900-A) -> linkagg lacp agg 17 size 2 actor admin-key 17
sw1 (6900-A) -> linkagg lacp port 1/1/5 actor admin-key 17
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
17 Dynamic 40000017 2 ENABLED DOWN 0 0
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
17 Dynamic 40000017 2 ENABLED UP 1 1
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
- Now, we define a dynamic link aggregate on 6900-A and 6900-B, assign the group ID 12 and size it at 2
ports.
- Please note that for sw1 (6900-A), some PODs are equipped with the new 6900T24C2 switch (SW1), while
others are equipped with a 6900T20 or X20 models. This has an impact on the ports used in the rest of
the exercise, so we'll start by checking the type of switch on your POD.
- Type the following command to determine the type of switch used in the POD.
- If the result for model name is OS6900-T24C2, the ports used will be: 1/1/25-26,
- Otherwise, if the result is OS6900-T20 or X20, the ports used will be: 1/2/1-2
- in this lab, we have got a OS6900-T24C2, so commands are the following one
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
12 Dynamic 40000012 2 ENABLED DOWN 0 0
17 Dynamic 40000017 2 ENABLED UP 1 1
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
12 Dynamic 40000012 2 ENABLED DOWN 0 0
Or
sw1 (6900-A) -> show linkagg agg 12 port
How to
✓ Create Dynamic Aggregation Links
Contents
1 Topology ........................................................................................ 2
2 Creating a Dynamic Link Aggregation ...................................................... 3
2.1. Creating a Dynamic Link Aggregation between the 6360 virtual chassis
and the 6860-A ...................................................................................... 3
2.1.1. On the 6360 virtual chassis ................................................................................ 3
2.1.2. On the 6860-A ............................................................................................... 4
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Link Aggregation
1 Topology
Link Aggregation provides the ability to combine multiple physical ports into a single logical port for added
throughput and redundancy. In this lab, you will create dynamic link aggregation using the IEEE 802.3ad (LACP)
protocol on AOS Release 8.
In this lab, you are going to create a new link aggregation between the 6360 Virtual Chassis and 6860-A. The link
aggregation 78 (Vlan 278) has been already created between the 2 OS6860s for in the network core.
Furthermore, for security reason, the client wants to avoid using the VLAN1 (the default VLAN). Thus, the
default VLAN on the link aggregation will be the VLAN 57.
3
Link Aggregation
2.1. Creating a Dynamic Link Aggregation between the 6360 virtual chassis and the 6860-A
- Now, we will define a dynamic link aggregate, assign the group ID 7 and configure its size to 2:
sw5 (OS6360-A) -> linkagg lacp agg 7 size 2 actor admin-key 7
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
7 Dynamic 40000007 2 ENABLED DOWN 0 0
- Using the actor admin key assigned to the link aggregation, associate the ports 1/1/3 and 2/1/4 to the
linkagg 7:
sw5 (6360-A) -> linkagg lacp port 1/1/3 actor admin-key 7
sw5 (6360-A) -> linkagg lacp port 2/1/4 actor admin-key 7
- Now 2 ports are linked to the link aggregation, but the link aggregation is still DOWN, because the
configuration on the other side (on the 6860-A) has not been done yet.
sw5 (6360-A) -> show linkagg
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
7 Dynamic 40000007 2 ENABLED DOWN 0 0
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
7 Dynamic 40000007 2 ENABLED UP 2 2
17 Dynamic 40000017 2 ENABLED UP 1 1
78 Dynamic 40000078 2 ENABLED UP 2 2
Dynamic Aggregate
SNMP Id : 40000007,
Aggregate Number : 7,
SNMP Descriptor : Dynamic Aggregate Number 7 ref 40000007 size 2,
Name : ,
Admin State : ENABLED,
Operational State : UP,
Aggregate Size : 2,
Number of Selected Ports : 2,
Number of Reserved Ports : 2,
Number of Attached Ports : 2,
Primary Port : 1/1/3,
Port Selection Hash : Source Destination Ip,
Wait To Restore Time : 0 Minutes
LACP
MACAddress : [2c:fa:a2:0e:62:49],
Actor System Id : [00:00:00:00:00:00],
Actor System Priority : 0,
Actor Admin Key : 7,
Actor Oper Key : 7,
Partner System Id : [00:00:00:00:00:00],
Partner System Priority : 0,
Partner Admin Key : 0,
Partner Oper Key : 7
Agg-Down/Violation Reason: None,
6
Link Aggregation
Dynamic Aggregate
SNMP Id : 40000007,
Aggregate Number : 7,
SNMP Descriptor : Dynamic Aggregate Number 7 ref 40000007 size 2,
Name : ,
Admin State : ENABLED,
Operational State : UP,
Aggregate Size : 2,
Number of Selected Ports : 2,
Number of Reserved Ports : 2,
Number of Attached Ports : 2,
Primary Port : 1/1/3,
Port Selection Hash : Source Destination Ip,
Wait To Restore Time : 0 Minutes
LACP
MACAddress : [94:24:e1:7c:79:6f],
Actor System Id : [00:00:00:00:00:00],
Actor System Priority : 0,
Actor Admin Key : 7,
Actor Oper Key : 7,
Partner System Id : [00:00:00:00:00:00],
Partner System Priority : 0,
Partner Admin Key : 0,
Partner Oper Key : 7
Agg-Down/Violation Reason: None,
o On the 6860-A:
sw7 (OS6860-A)-> vlan 57
sw7 (OS6860-A)-> vlan 57 members linkagg 7 untagged
Infrastructure
Client 5
Double-click on VMware vSphere
- IP address: 192.168.57.105
- Subnet mask: 255.255.255.0
Client 7
Double-click on VMware vSphere
- IP address: 192.168.57.107
- Subnet mask: 255.255.255.0
- To demonstrate the redundancy capabilities, put a port (belonging to the link aggregation) down, and
monitor the results of your pings tests.
sw7 (6860-A) -> interface 1/1/3 admin-state disable
How To
✓ Apply 802.1q tagging on link aggregation and ports
Content
1 Topology ........................................................................................ 2
2 Enabling the 802.1Q Tagging ................................................................ 2
2.1. Tagging a Link ....................................................................................... 2
2.1.1. On the 6360 Virtual Chassis ............................................................................... 2
2.1.2. On the 6860-B ............................................................................................... 2
2.2. Creating Additional VLANs ........................................................................ 3
2.3. Configuring 802.1Q on Ports ...................................................................... 4
3 Testing the Configuration .................................................................... 6
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
802.1q
1 Topology
In a Layer 2 environment the Ports is used for bridging traffic across a physical connection between
switches. In an IEEE 802.1Q environment, the Default VLAN for the port is bridged, and all the other VLANs
will have the IEEE 802.1Q tag inserted for proper VLAN association at the remote side.
- Activate the port 2/1/3 on the 6360 Virtual Chassis (linked to the 6860-B):
sw5 (6360-A) -> interfaces 2/1/3 admin-state enable
- Create the VLAN 58, then modify the VLAN on the port 2/1/3 from the default VLAN to VLAN 58:
sw5 (6360-A) -> vlan 58
sw5 (6360-A) -> vlan 58 members port 2/1/3 untagged
- Create the VLAN 58, then modify the VLAN on the port 1/1/3 from the default VLAN to VLAN 58:
sw8 (6860-B) -> vlan 58
sw8 (6860-B) -> vlan 58 members port 1/1/3 untagged
- Create the VLANs 20 and 30 on the 3 switches (Virtual Chassis of 6360-A, 6860-A et 6860-B) :
sw5 (6360-A) -> vlan 20
sw5 (6360-A) -> vlan 30
- For now, no port has been assigned neither to VLAN 20 nor VLAN 30.
- Tag the VLANs 20 and 30 on the link between the 3 switches (in red on the diagram below):
o On the 6360-A:
sw5 (6360-A) -> show vlan 20 members
port type status
----------+-----------+---------------
2/1/3 qtagged forwarding
0/7 qtagged forwarding
o On the 6860-A:
sw7 (6860-A) -> show vlan 20 members
port type status
----------+-----------+---------------
0/7 qtagged forwarding
0/78 qtagged forwarding
o On the 6860-B:
sw8 (6860-B) -> show vlan 20 members
port type status
----------+-----------+---------------
1/1/3 qtagged blocking
0/78 qtagged forwarding
If we take, for example, the port 1/1/3 on the 6860-B, we can see that it is carrying tagged information for
VLANs 20 and 30 and bridging the VLAN 58.
Reminder
A physical port always has 1 VLAN (the default VLAN for the port) that bridges traffic (level 2)
6
802.1q
- Let’s assign the port of each Client VM to the appropriate VLAN, and modify their IP addresses as
described below:
o Client 5:
sw5 (6360-A) -> vlan 20 members port 1/1/1 untagged
sw5 (6360-A) -> interfaces 1/1/1 admin-state enable
sw5 (6360-A) -> show vlan members port 1/1/1
vlan type status
--------+-----------+---------------
20 untagged forwarding
o Client 6:
sw5 (6360-A) -> vlan 30 members port 2/1/1 untagged
sw5 (6360-A) -> interfaces 2/1/1 admin-state enable
sw5 (6360-A) -> show vlan members port 2/1/1
vlan type status
--------+-----------+---------------
30 untagged forwarding
- Check that the Client 5 (VLAN 20) can reach its gateway (ping 192.168.20.7)
- Check that the Client 6 (VLAN 30) can reach its gateway (ping 192.168.30.8)
7
802.1q
- How are the Clients VM exchange between each other (Layer 2 or Layer 3)?
----------------------------------------------------------------------------------------------------------------------------- -
----------------------------------------------------------------------------------------------------------------------------- -
- Save the configuration and Copy running to certified all the switches managed
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
1/1/1 1/1/2
F - DP ROOT BRIDGE F - DP
• Goal
• Self-configuring algorithm that
maintains a loopfree topology
on a network 1/1/1 F - RP F - RP 1/1/1
SW-B (MAC@: bb) 1/1/2 1/1/5
• Provides helps to provide data X SW-C (MAC@: cc)
F - DP BLK- ALT
path redundancy and network PRIORITY: 32768 PRIORITY: 32768
scalability
• How it works
• Supports two Spanning Tree operating modes:
• flat (single STP instance per switch) flat
1/1/1 VLAN 1 1/1/1
• per-VLAN (single STP instance per VLAN) SW-A (MAC@: aa) 1/1/2 VLAN 2 1/1/2 SW-B (MAC@: bb)
X
(By default on OmniSwitch) 1/1/3 VLAN 3 1/1/3
X
STP REMINDER
-> show spantree
SW-A (MAC@: aa)
VLAN STP Protocol Priority
-----+--------+---------+--------------
1 ON RSTP 32768 (0x8000)
1/1/1 RP -FW DP FW
VLAN 1, 20, 30
PRIORITY: 32768
MAC@ : E8:E7:32:56:45:C4
Mode selection
Protocol selection
Mode selection
Select Mode
-> spantree mode {flat | per-vlan}
Monitor
-> show spantree mode
Spanning Tree Global Parameters
Current Running Mode : Per VLAN,
Current Protocol : N/A (Per VLAN),
Path Cost Mode : AUTO,
Auto VLAN Containment : N/A
Cisco PVST+ mode : Disabled
VLAN Consistency check: Disabled
STP CONFIGURATION
STEP BY STEP
Protocol selection
Select protocol
-> spantree [cist | vlan vlan_id] protocol {stp | rstp | mstp}
Bridge ID, Priority and Path Cost If MSTP is the active flat mode protocol, enter a value that
is a multiple of 4096 (for example, 4096, 8192, 12288).
VLAN Port Oper Status Path Cost Role Loop Guard Note
-----+-------+------------+---------+------+----------+------
1 1/1/1 FORW 4 DESG DIS
1 1/1/2 DIS 0 DIS DIS
Displays Spanning Tree bridge information for a per-VLAN mode VLAN instance
-> show spantree vlan [vlan_id]
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Spanning Tree Protocol (STP)
How to
✓ Configure the Spanning Tree Protocol (STP) options on an OmniSwitch.
Contents
1 Topology ........................................................................................ 2
2 Managing the Spanning Tree Protocol ...................................................... 2
2.1. Changing the priority of the 6860-A ............................................................. 2
2.2. Identifying the port status ........................................................................ 3
2.3. Testing the redundancy ........................................................................... 6
3 Using the 1x1 Spanning Tree Mode ......................................................... 8
3.1. Configuring the Priority............................................................................ 9
3.2. Verifying the Configuration ....................................................................... 9
3.2.1. Verifying the VLAN 20 Configuration..................................................................... 9
3.2.2. Verifying the VLAN 30 Configuration................................................................... 11
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Spanning Tree Protocol (STP)
1 Topology
The Spanning Tree Protocol (STP) is an important concept to understand in a bridged network.
- Customer wants to have the 6860-A as root bridge for vlan 20 and vlan 30
To achieve this, change the priority of the 6860 to ensure that:
sw7 (6860-A) -> spantree vlan 20 priority 20000
sw7 (6860-A) -> spantree vlan 30 priority 20000
o On the 6860-A:
sw7 (6860-A) -> show spantree vlan 20
Spanning Tree Parameters for Vlan 20
Spanning Tree Status : ON,
Protocol : IEEE Rapid STP,
mode : Per VLAN (1 STP per Vlan),
Priority : 20000 (0x4E20),
Bridge ID : 8000-2c:fa:a2:0e:62:3f,
Designated Root : 8000-2c:fa:a2:0e:62:3f,
Cost to Root Bridge : 0,
Root Port : None,
TxHoldCount : 3,
Topology Changes : 5,
Topology age : 03:00:02,
Last TC Rcvd Port : Slot 0 Interface 7,
Last TC Rcvd Bridge : 8000-94:24:e1:7c:82:1d,
Current Parameters (seconds)
Max Age = 20,
Forward Delay = 15,
Hello Time = 2
Parameters system uses when attempting to become root
System Max Age = 20,
System Forward Delay = 15,
System Hello Time = 2
o On the 6860-B:
sw8 (6860-B) -> show spantree vlan 20
Spanning Tree Parameters for Vlan 20
Spanning Tree Status : ON,
Protocol : IEEE Rapid STP,
mode : Per VLAN (1 STP per Vlan),
Priority : 32768 (0x8000)
Bridge ID : 8000-e8:e7:32:d4:84:03,
Designated Root : 8000-2c:fa:a2:0e:62:3f,
Cost to Root Bridge : 3,
Root Port : Slot 0 Interface 78,
TxHoldCount : 3,
Topology Changes : 5,
Topology age : 03:01:19,
4
Spanning Tree Protocol (STP)
This gives you the configured STP parameters of VLAN 20. Notice the mode (Per VLAN or 1X1), meaning
each VLAN runs a separate STP instance.
Additionally, take note of the Bridge ID and the Designated Root. If they are the same, your switch is the
Root Bridge for VLAN 20.
- We can also deduce from the above output that our STP is relatively stable, it has been 03:01:19
hours since the last topology change (Topology Age) and we have only had 5 Topology changes
By default, the bridge priority is 32768 (0x8000). Since all priorities are identical by default, the switch
with the lowest MAC address is selected as the root bridge (in this example, the 6860-A has the lowest
MAC address).
Also, notice that only one side of the link(s) has a port or link aggregation with the status BLK (blocking).
This ensures the neighbor(s) are still able to initiate a topology change in the event of a failure.
- Fill up the following diagrams:
For VLAN 20
For VLAN 30
Notes
The Client 5 is already in the VLAN 20. If not, type: sw5 (6360-A) -> vlan 20 members port 1/1/1 untagged
- Configure the network interface of the Client 8 with the following information:
Client 8:
IP address = 192.168.20.108
Subnet mask = 255.255.255.0
Default Gateway = 192.168.20.7
- Start a continuous ping between client connected across an uplink (e.g between client 8 and client 5):
Client 8:
C:\> ping –t 192.168.20.105
- Once your ping is successful, remove the connection between the 6360 virtual Chassis and the 6860-A:
sw5 (6360-A) -> linkagg lacp agg 7 admin-state disable
- Relaunch the commands above, and notice how quickly Rapid STP recovers from a link failure:
sw7 (6860-A) -> show spantree vlan 20
Spanning Tree Parameters for Vlan 20
Spanning Tree Status : ON,
Protocol : IEEE Rapid STP,
mode : Per VLAN (1 STP per Vlan),
Priority : 20000 (0x4E20),
Bridge ID : 8000-2c:fa:a2:0e:62:3f,
Designated Root : 8000-2c:fa:a2:0e:62:3f,
Cost to Root Bridge : 0,
Root Port : None,
TxHoldCount : 3,
Topology Changes : 8,
7
Spanning Tree Protocol (STP)
Tips
Remember that anytime there is a physical change, the STP will make the network infrastructure re-converge.
8
Spanning Tree Protocol (STP)
As the default parameters are the same for each VLAN (base MAC address, cost links, etc…), the status of
each port is the same for each VLAN. To take advantage of the 1x1 mode and provide load-balancing, it may
be necessary to modify bridge priority to have a predictable behavior.
For example, this design would be interesting, considering that the blocked port for each VLAN is different:
Here, the 6360 VC is the access switch and 6860s are core switches. The 6360 VC has a dual attachment to
the 6860s to provide redundancy. The goal is to have one of the uplinks up for VLAN 20 and the other one for
VLAN 30.
9
Spanning Tree Protocol (STP)
o On the 6860-B:
sw8 (6860-B) -> show spantree vlan 20
Spanning Tree Parameters for Vlan 20
Spanning Tree Status : ON,
Protocol : IEEE Rapid STP,
mode : Per VLAN (1 STP per Vlan),
Priority : 20000 (0x4E20),
Bridge ID : 8000-e8:e7:32:d4:84:03,
Designated Root : 4E20-94:24:e1:e8:b4:13,
Cost to Root Bridge : 0,
Root Port : None,
TxHoldCount : 3,
Topology Changes : 10,
Topology age : 00:04:57,
Last TC Rcvd Port : 1/1/3,
Last TC Rcvd Bridge : 8000-94:24:e1:f0:f6:39,
Current Parameters (seconds)
Max Age = 20,
Forward Delay = 15,
Hello Time = 2
Parameters system uses when attempting to become root
System Max Age = 20,
System Forward Delay = 15,
System Hello Time = 2
o On the 6360:
sw5 (6360-A) -> show spantree vlan 20
Spanning Tree Parameters for Vlan 20
Spanning Tree Status : ON,
Protocol : IEEE Rapid STP,
mode : Per VLAN (1 STP per Vlan),
Priority : 32768 (0x8000),
Bridge ID : 8000-94:24:e1:f0:f6:39,
Designated Root : 4E20-94:24:e1:e8:b4:13,
Cost to Root Bridge : 4,
Root Port : 2/1/3,
TxHoldCount : 3,
Topology Changes : 16,
Topology age : 00:04:04,
Last TC Rcvd Port : 2/1/3,
Last TC Rcvd Bridge : 8000-94:24:e1:e8:b4:13,
Current Parameters (seconds)
Max Age = 20,
Forward Delay = 15,
Hello Time = 2
Parameters system uses when attempting to become root
System Max Age = 20,
System Forward Delay = 15,
System Hello Time = 2
o On the 6860-A:
Sw7 (6860-A) -> show spantree
sw7 (6860-A) -> show spantree vlan 30
sw7 (6860-A) -> show spantree vlan 30 ports
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• Goal
• Possibility to map several VLANs to one instance
(IEEE 802.1s standard
CIST
MSTI
• How it works
• How it works
MST Region2
• A MSTP region is IST
• A collection of switches
• Sharing the same view of physical topology
REGION
CIST 1
• Partitioning into the same set of logical topologies REVISION
MSTI NB: 1
• MSTP Region seen as one switch for IST
the rest of the world CST
any MSTI
• CST interacts with STP outside the region Achieve
this by representing the region as one Virtual
IST
spantree MST Region3
• MST region sees the outside world via its CIST/ CST REGION 3
interaction only REVISION NB: 1
MSTP REMINDER - INTRA REGION CIST 0 = VLAN 1
MSTI 1 = VLAN 11 to 13
MSTI 2 = VLAN 14 to 16
• How it works MSTI 3 = VLAN 17 to 20
Root spantree
• BPDUs are carried through the network via the MSTI CIST 0
0 (aka IST, Internal Spanning Tree) MSTI 1
• Root switch sends out BPDUs with maximum hop
count which is decremented at each switch as BPDUs
are forwarded. At 0 hop, the BPDUs are discarded
• One BPDU is exchanged for all instances over default
VLAN
• MSTP BPDUs are sent on every port
• The maximum hop count supported is 40, default is VLAN 11 to 20 tagged
20
Configure MSTIs
SW3
Configure MSTIs
Mapping:
1/1/11 1/1/22
CONFIGURING MSTP - EXAMPLE
SwitchA VLAN 1 to 15 Root spantree
MSTI 2
Example 1 1/1/1 1/1/2
X
1/1/11
X SwitchB
1/1/22
SwitchA-> show spantree mst port 1/1/1 SwitchB-> show spantree mst port 1/1/2
MST Role State Pth Cst Edge Boundary Op Cnx Vlans MST Role State Pth Cst Edge Boundary Op Cnx Vlans
---+------+-----+--------+----+--------+------+--------- ---+------+-----+--------+----+--------+------+---------
0 DESG FORW 20000 NO NO PTP 0 ROOT FORW 20000 NO NO PTP
1 DESG FORW 20000 NO NO PTP 1-15 1 ROOT FORW 20000 NO NO PTP 1-15
2 ALT BLK 20000 NO NO PTP 2 DESG FORW 20000 NO NO PTP
SwitchA-> show spantree mst port 1/1/11 SwitchB-> show spantree mst port 1/1/22
MST Role State Pth Cst Edge Boundary Op Cnx Vlans MST Role State Pth Cst Edge Boundary Op Cnx Vlans
---+------+-----+--------+----+--------+------+--------- ---+------+-----+--------+----+--------+------+---------
0 DESG FORW 20000 NO NO PTP 100 0 ALT BLK 20000 NO NO PTP 100
1 DESG FORW 20000 NO NO PTP 1 ALT BLK 20000 NO NO PTP
2 ROOT FORW 20000 NO NO PTP 16-20 2 DESG FORW 20000 NO NO PTP 16-20
CONFIGURING MSTP - EXAMPLE
Priority Switch A Switch B Switch C
Mapping:
Root spantree
Switch B MSTI 1
Switch B
Root spantree
MSTI 2
1/1/2 3/1/1 3/1/2 1/1/2
1/1/3 1/1/3 3/1/1
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Multiple Spanning Tree Protocol
How to
✓ This lab is designed to familiarize you with the Multiple Spanning Tree
Protocol (MSTP) on an OmniSwitch.
Contents
1 Topology ........................................................................................ 2
2 Multiple Spanning Tree ....................................................................... 3
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Multiple Spanning Tree Protocol
1 Topology
3
Multiple Spanning Tree Protocol
Notes
The commands above set the switch to flat mode, configured a Multiple STP region name and revision level,
and finally enabled the IEEE MSTP protocol. 1X1 and MSTP cannot be configured at the same time; and the
switch must be configured in flat Spanning Tree mode.
- Now, check to see how 802.1s operates with just the single default STP instance, called the Common
and Internal Spanning Tree (CIST):
sw5 (6360-A) -> show spantree cist vlan-map
Cist
Name : ,
VLAN list : 1-4094
- You should see that all VLANs belong to the CIST instance, the CIST instance is created by default and all
VLANs on the switch are mapped to it by default.
- Now, create 2 additional STP instances and map the appropriate VLANs to them. Type the following:
sw5 (6360-A) -> spantree msti 1
sw5 (6360-A) -> spantree msti 2
sw5 (6360-A) -> spantree msti 1 vlan 20
sw5 (6360-A) -> spantree msti 2 vlan 30
Cist
Name : ,
VLAN list : 1-19,21-29,31-4094
Msti 1
Name : ,
VLAN list : 20
Msti 2
Name : ,
VLAN list : 30
Cist
Name : ,
VLAN list : 1-19,21-29,31-4094
Msti 1
Name : ,
VLAN list : 20
Msti 2
Name : ,
VLAN list : 30
Cist
Name : ,
VLAN list : 1-19,21-29,31-4094
Msti 1
Name : ,
VLAN list : 20
Msti 2
Name : ,
VLAN list : 30
Notes
Vlan 20 and 30 have been removed from the CIST and associated with a Multiple Spanning Tree Instance (MSTI).
We could have of course associate several VLAN to the same MSTI
6
Multiple Spanning Tree Protocol
- Notice that both MSTIs have the same root bridge. Load balancing can be achieved by changing the
priority of bridge for different MSTI as we have done with RSTP:
sw7 (6860-A) -> spantree msti 1 priority 16384
sw8 (6860-B) -> spantree msti 2 priority 16384
Notes
Priority has to be multiple of 4096 (8192, 12288, 16384, …, 61440)
Topology Changes : 9,
Topology age : 00:15:29,
Last TC Rcvd Port : Slot 0 Interface 7,
Last TC Rcvd Bridge : 8001-e8:e7:32:d9:b4:b9,
Current Parameters (seconds)
Max Age = 20,
Forward Delay = 15,
Hello Time = 2
Parameters system uses when attempting to become root
System Max Age = 20,
System Forward Delay = 15,
System Hello Time = 2
Auto-Vlan-Containment: Enabled ,
Priority : 32770 (0x8002),
Bridge ID : 8002-e8:e7:32:d9:b4:b9,
Designated Root : 4002-e8:e7:32:b3:3c:f9,
Cost to Root Bridge : 18000,
Root Port : Slot 0 Interface 78,
TxHoldCount : 3,
Topology Changes : 4,
Topology age : 00:17:36,
Last TC Rcvd Port : Slot 0 Interface 78,
Last TC Rcvd Bridge : 0000-00:00:00:00:00:00,
Current Parameters (seconds)
Max Age = 20,
Forward Delay = 15,
Hello Time = 2
Parameters system uses when attempting to become root
System Max Age = 20,
System Forward Delay = 15,
System Hello Time = 2
Tips
Note, in Multiple Spanning Tree the bridge priority is the assigned Bridge Priority value PLUS the MSTI instance
value
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• Configures the maximum number of dynamic VLANs that can be created by MVRP.
-> mvrp {port chassis/slot/port[– port2] | linkagg agg_id[-agg_id2]} registration {normal | fixed | forbidden}
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Multiple VLAN Registration Protocol
How to
✓ This lab is designed to familiarize you with the MVRP feature and learn
how to configure it through the CLI.
Contents
1 Topology ........................................................................................ 2
2 Use MVRP ....................................................................................... 3
2.1. Configure the maximum number of VLANs ...................................................... 3
2.2. Create some dynamic VLANs ...................................................................... 3
2.3. Delete VLAN ......................................................................................... 5
2.4. Revert to 1x1 RSTP mode ......................................................................... 6
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Multiple VLAN Registration Protocol
1 Topology
MVRP has to be globally enabled on a switch before it can start forwarding MVRP frames.
In order to have MVRP enabled, switch must be in spanning-tree flat mode.
- At this step our network is configure with STP 1x1, but to enable MVRP we have to be in flat mode.
- To configure STP flat mode type:
sw7 (6860-A) -> spantree mode flat
sw8 (6860-B) -> spantree mode flat
sw5 (6360-A) -> spantree mode flat
Tips
MVRP can be enabled on ports regardless of whether it is globally enabled or not. However, for the port to
become an active participant, MVRP must be globally enabled on the switch. By default, MVRP is disabled on
the ports. To enable MVRP on a specified port, use the mvrp port command
Notes
MVRP can be configured only on fixed, 802.1 Q and aggregate ports. It cannot be configured on mirror, mobile,
VPLS Access, and VLAN Stacking User ports.
3
Multiple VLAN Registration Protocol
2 Use MVRP
- To modify the maximum number of dynamic VLANs the switch is allowed to create, use the command:
sw5 (6360-A) -> mvrp maximum-vlan 150
sw7 (6860-A) -> mvrp maximum-vlan 150
sw8 (6860-B) -> mvrp maximum-vlan 150
Notes
The VLAN type is then Dynamic
5
Multiple VLAN Registration Protocol
Notes
VLAN are automatically created and port tagged, but of course, there’s no ip interface creation nor association
with MSTI.
- What happens to it ?
Tips
The mvrp status is equal to the dyn. That means the VLAN 40 has been automatically re-created.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• To specify the UDP server IP address to which traffic destined for a UDP port is forwarded
as unicast packets.
-> ip udp relay {service {tftp | tacacs | ntp | nbns | nbdd | dns} | port port_num
[description description]} address ip_address
GENERIC UDP PORT RELAY
• To display the generic UDP relay service configuration
-> show ip udp relay [service {tftp | tacacs | ntp | nbns | nbdd | dns} | port port_num]
• To display the current statistics for each UDP port relay service.
-> show ip udp relay statistics [service {tftp | tacacs | ntp | nbns | nbdd | dns}]
[port [port_num]]
• Duplicate request received during the time the switch is attempting to resolve the ARP is
dropped
• Avoids CPU utilization climb and destabilizing the switch while next-hop is being resolved
ARP POISONING DETECTION
• Detects the presence of a ARP-Poisoning host on the network
• Identifies unsolicited ARP Replies from an attacker, false ARP requests and unsolicited
ARP replies
• Sends out ARP Requests for certain configurable restricted addresses and its own interface
addresses
• Reply to all ARP Requests for its IP Interface address, but will not learn the ARP mapping of the
source from such packets
• ARP Reply will be accepted only if the Switch had originated a corresponding ARP Request
• Logs the event and send a trap
1. ARP Poisoning by a host that
ARP Poisoning Examples Man in the middle replies to all ARP Requests
THU JAN 24 16:34:38 : NS (123) alert message:
+++ +++++++++++++++++++++++++++++++++++++++++++++++
+++ ARPADDRESSSCAN source detected on 1/7... 2. ARP Requests from an Attacker
+++ Trigger Operation... Impersonation
+++ Interval Count Sensitivity
+++ ---------------------------------------------
+++ 5 5 50 3. Unsolicited ARP Replies from an
+++ Traffic Statistics... MAC Flooding Attacker
+++ Packet-Type Direction Count
+++ ---------------------------------------------
+++ ARP_REP OUT 0
+++ ARP_REQ IN 71
+++ +++++++++++++++++++++++++++++++++++++++++++++++
ARP POISONING DETECTION
• Adding an ARP Poison restricted address
• Maximum of two IP addresses per IP interface
-> ip dos arp-poison restricted-address 192.168.100.152
• Displaying the number of attacks detected for configured ARP poison restricted-addresses
-> show ip dos arp-poison
• Use the alias keyword to specify that the switch will act as an alias (proxy) for this IP
address.
-> arp 171.11.1.1 00:05:02:c0:7f:11 alias
LOCAL PROXY ARP
• Allows the network administrator to configure proxy functionality on the switch
• Enables proxy ARP on a per VLAN basis
• All ARP requests received on VLAN member ports are answered with the MAC address of
the VLAN’s virtual IP router port
Switch B Normal ARP
ARP
Local Proxy ARP
ARP
Switch A Switch C
PC 1 PC 2
192.168.10.101 192.168.10.102
-> ip interface name [address ip_address] [mask subnet_mask] [admin [enable | disable]] [vlan vid]
[forward | no forward] [local-proxy-arp | no local-proxy-arp] [eth2 | snap] [primary | no primary]
PROXY ARP FILTERING
• Extended Proxy ARP Filtering
• Blocks the switch from providing ARP replies for the specified IP address(es).
• It is generally used in conjunction with the Local proxy ARP application
• By default, no ARP filters exist in the switch
-> arp filter ip_address [mask mask] [vid] [sender | target] [allow | block]
-> arp filter 198.0.0.0 mask 255.0.0.0 sender block
Examples
• Enables, disables a port mapping session -> port-mapping 3 user-port 1/2/3 network-port 1/6/4
-> port-mapping 4 user-port 1/2/5-8
-> port-mapping session_id {enable | disable} -> port-mapping 5 user-port 1/2/3 network-port slot 3
DHCP Server
• Described in RFC 4562 1- DHCP ACK – option 3
• Control unwanted broadcast traffic and host-to-host Router IP/Gateway = IP1
• Configures the action on a single port, a range of ports, when the port reaches the storm
violated state
interfaces {slot chassis/slot| port chassis/slot/port[-port2]} flood-limit {bcast | mcast | uucast | all} action
{shutdown | trap | default}
LEARNED PORT SECURITY
LEARNED PORT SECURITY
• Mechanism for controlling network device access on one or more switch ports
• Limit the amount of time source learning occurs on all LPS ports
• Limit the max number of L2 addresses that can be learned on a port. (Dynamic or Static)
• Limit the L2 address learning for the specific period of time
• Disables all learning on the port. Existing MAC addresses are retained but no additional learning of
addresses, except for static MAC addresses, is allowed
• Configures the amount of time, in minutes, to allow source learning on all LPS ports.
-> port-security learning-window minutes
• Configuring the maximum number of filtered MAC addresses that can be learned on the LPS
port(s)
-> port-security port chassis/slot/port[-port2] maximum number
• Converting the dynamically learned MAC addresses on the LPS port(s) to static MAC
addresses
-> port-security {port chassis/slot/port[-port2] | chassis} convert-to-static
• The following set of commands enables LPS on port 1/1/1, converting dynamically learned
MAC address of currently attached device to static. When another device is connected to
port 1/1, a violation occurs and this port will be shutdown
-> port-security port 1/1/1 admin-state enable
-> port-security port 1/1/1 maximum 1
-> port-security port 1/1/1 violation shutdown
-> port-security port 1/1/1 convert-to-static enable
LEARNED PORT SECURITY
• Displays Learned Port Security configuration and table entries
-> show port-security
Port : 1/1/15
Operation Mode : DISABLED,
Max Bridged MAC allowed : 1,
Max Filtered MAC allowed : 5,
Low End of MAC Range : 00:00:00:00:00:00,
High End of MAC Range : ff:ff:ff:ff:ff:ff,
Violation Setting : RESTRICT,
• Clears all port violations on the switch for the given port
-> clear violation port { chassis/slot/port[-port2] | linkagg agg_id[-agg_id2]}
LEARNED PORT SECURITY - L2 NOTIFICATION
• Provides notification of newly learned bridged MAC addresses after the port matches the
specified threshold amount
-> port-security port chassis/slot/port[-port2] learn-trap-threshold number
• Sends a trap for every MAC learned after the threshold is reached. It contains:
• MAC address
• Slot/Port
• VLAN
• Date & Time
LEARNED PORT SECURITY
Packet loss due to LPS port learning
• Objective
• Avoids packet loss due to LPS port learning by reinjecting the packets received from clients back to
the forwarding path of the switch.
• Hence by default all the packets trapped on LPS port will be reinjected back to the switch once the MAC is
successfully learned.
• Can also be customized to filter and inject packets matching specific protocol types or UDP source
and destination ports.
[no] port-security [port <c/s/p1[-p2]>] pkt-relay Enables packet relay feature on a single or range of LPS ports.
port-security pkt-relay protocol {udp}|{icmp} |{igmp} Configures the protocol filter criteria for packet relay feature.
port-security pkt-relay protocol {udp [src-port <port1[-port2]>]} Configures the UDP source ports as the criteria for packet relay.
port-security pkt-relay protocol {udp [dst-port <port1[-port2]>]} Configures the UDP destination ports as the criteria for packet relay.
show port-security port Displays the packet relay configuration on the port.lost in LPS. If the packet should be allowed. it must be re-injected
into the forwarding path, currently, it is discarded.
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Port Mapping
How to
✓ This lab is designed to familiarize you with the concept of Port Mapping.
Contents
1 Topology ........................................................................................ 2
2 Bi-Directional Port-Mapping ................................................................. 3
2.1. Prerequisites configuration ....................................................................... 3
2.2. Manage port mapping .............................................................................. 5
3 Configuring Multiple ports ................................................................... 5
4 Remove management ......................................................................... 6
5 Summary ........................................................................................ 6
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Port Mapping
1 Topology
Port Mapping is a security feature, which controls communication between peer users. Each session comprises
a session ID, a set of user ports, and/or a set of network ports. The user ports within a session cannot
communicate with each other and can only communicate via network ports.
A port mapping session can be configured in the unidirectional or bidirectional mode. In the unidirectional
mode, the network ports can communicate with each other within the session. In the bidirectional mode, the
network ports cannot communicate with each other. Network ports of a unidirectional port mapping session
can be shared with other unidirectional sessions but cannot be shared with any sessions configured in the
bidirectional mode.
3
Port Mapping
2 Bi-Directional Port-Mapping
- Configure an IP interface for VLAN 50 on all switches in the 192.168.50.X/24 subnet replacing the 'X' with
your switch number
sw5 (6360-A) -> ip interface int_50 address 192.168.50.5/24 vlan 50
sw7 (6860-A) -> ip interface int_50 address 192.168.50.7/24 vlan 50
sw8 (6860-B) -> ip interface int_50 address 192.168.50.8/24 vlan 50
Client 5 Client 9
IP address : 192.168.50.105 IP address : 192.168.50.109
Subnet mask : 255.255.255.0 Subnet mask : 255.255.255.0
Default Gateway : 192.168.50.5 Default Gateway : 192.168.50.5
5
Port Mapping
- You should find that you can only ping 6860-A as it is the one at the remote end of linkagg 7.
- Create a second session which will map port 1/1/2 to port 2/1/3:
sw5 (6360-A) -> port-mapping 2 user-port 1/1/2 network-port 2/1/3
- From client 9 on port 1/1/2. You should now be able to ping 6860-B but not 6860-A.
4 Remove management
5 Summary
Port Mapping is a security feature, which controls communication between peer users. Each session comprises
a session ID, a set of user ports, and/or a set of network ports. The user ports within a session cannot
communicate with each other and can only communicate via network ports.
OmniSwitch R8
Learned Port Security
How to
✓ This lab is designed to familiarize yourself with Learned Port Security
feature.
Contents
1 Topology ........................................................................................ 2
2 Learned Port Security ........................................................................ 3
2.1. Configure the switch to learn maximum one mac address ................................... 3
2.2. Configure the switch port to accept the traffic only from currently attached device ... 4
2.3. Port violation........................................................................................ 5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Learned Port Security
1 Topology
The LPS feature is used in networks to prevent employees to use small basic switches or hub in the enterprise
network. This can grandly help IT stuff to efficiently manage network security.
Learned Port Security provides controls over the source learning function on an OmniSwitch.
- On the 6860-B, assign port 1/1/8 to vlan 180 and activate the interface:
- On the 6560-A, activate the interfaces 1/1/1 and 1/1/8, and assign an IP address to VLAN 1:
Notes
In this example above, there’s 3 mac addresses: 1 from client 3 and 2 from 6560. The 6560 uses different mac
addresses for Layer 2 traffic, like LLDP or STP and another one, the chassis base mac address for Layer3 traffic
associated with VLAN 1 IP interface.
3
Learned Port Security
- Once again try to ping the gateway from both client 3 and 6560 (it should fail).
Port: 1/1/8
Admin-State : ENABLED,
Operation Mode : ENABLED,
Max MAC bridged : 1,
Trap Threshold : DISABLED,
Violation : RESTRICT,
Max MAC filtered : 5,
Violating MAC : NULL,
Pkt-Relay : DISABLED
- The first mac address seen is normally bridged but the others are filtered. There’s more chance for
Layer 2 traffic to be bridged than other Layer 3 traffic.
- Once again try to ping the gateway from both client 3 and 6560-A
- Now it should remain only 2 mac addresses: one from client 3 and another one from the IP interface of
VLAN 1 in 6560-A.
Notes
Here, the Client 3 mac address is bridged, the 6560A is filtered. Thus we can ping the gateway from client 3
but not from 6560-A.
2.2. Configure the switch port to accept the traffic only from currently attached device
In order to allow only one dynamically learned mac address on a switch LPS port (only fixe ports), we will
use convert-to-static parameter with port-security. The currently attached devices mac address will be
associated to this LPS port and one static entry will be created in mac address table. This means that only
this device will be allowed on that port.
Please notice that the device must be learned on the LPS port before to enter the command port-security
convert-to-static
- To convert the dynamically learned MAC addresses to static addresses on a specific LPS port at any time
irrespective of the source learning time window, use the port-security convert-to-static command as
shown below:
- Analyze carefully the output of the command shown below, you can see that the currently attached
device mac address is learned on the specified port and the type of the entry is permanent (static).
Port: 1/1/8
Admin-State : ENABLED,
Operation Mode : ENABLED,
Max MAC bridged : 1,
Trap Threshold : DISABLED,
Violation : SHUTDOWN,
Max MAC filtered : 0,
Violating MAC : NULL,
Pkt-Relay : DISABLED
Notes
In the example above, the switch mac address age out, so as there’s only the client 3 mac address learnt on the
port, is still forwarding
- Try to ping again the gateway from both client 3 and 6560-A. You should see a warning message on the
6860-B :
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• Goal
• High availability feature •DHL
• Provides fast failover between Core/Aggregation and •LinkA VLANs •LinkB VLANs
• How it works
• DHL Active-Active splits VLANs between two active
links
• The forwarding status of each VLAN is modified by
DHL to prevent network loops and maintain •FAILED STATE (ONE LINK DOWN)
connectivity to the core when one of the links •AGGREGATION OR CORE LAYER
•DHL
•ACCESS LAYER
DUAL-HOME LINK SPECIFICATIONS
• DHL is supported on the following platforms:
•NORMAL STATE (BOTH LINKS UP)
•DHL
• Only one session per switch is allowed.
•LinkA VLANs •LinkB VLANs
• Each session has only two links (linkA and linkB).
•ACCESS LAYER
• A physical port or a link aggregate (linkagg) ID
could be a DHL link.
• The same port or link aggregate is not
configurable as both linkA or linkB.
• DHL is not supported on mobile, 802.1x-enabled,
GVRP, or UNI ports
DHL TIMERS & MAC-FLUSHING
• Pre-Emption timer
•NORMAL STATE (BOTH LINKS UP)
• Amount of time to wait before a failed link that has
recovered can resume servicing VLANs
•AGGREGATION CORE LAYER
• 0 to 600 seconds OR
• None (default): The staled MAC address entries are kept in the MAC table
• MVRP Enhanced:
• Joins only VLAN that are maps on DHL link
• When DHL link fails, the other link issues joins message with « new » flags set
• When DHL link recovers, the link issues new joins to reestablish connectivity
• RAW Flooding
• List of MAC addresses learned on non-DHL port for all VLAN assigned to DHL links
• Send a broadcast frame with source MAC address from that list on redundant
DHL links in case of failure, or on the primary in case of recovery.
MAC ADDRESS FLUSHING MVRP ENHANCED
SW2 1/3 SW3
1/2
1/1 1/1
•VLAN 2 •MVRP Join +
SW2 1/3 SW3
•VLAN 1 • « New » flag
1/2
1/1 1/1
•DHL SW1
•VLAN 1 •VLAN 2 •(VLAN 2)
SW1
RAW FLOODING
•(VLAN 2)
SW2 1/3 SW3
Map the VLANs to the LinkB -> dhl 1 linka linkagg 1 linkb port 1/1/2
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Dual Home Link Active-Active
How to
✓ Setup the high availability Dual-Home Link Active-Active feature.
Contents
1 Topology ........................................................................................ 2
2 Configuring the Prerequisites ............................................................... 3
2.1. Prerequisite: Creating a linkagg from 6360 VC to 6860-B .................................... 3
2.2. Assigning VLANs on the Link Aggregations ...................................................... 4
2.3. Tag the VLAN 20 and 30 on the link aggregation ............................................... 4
2.4. Tag the VLAN 57 on the link aggregation 78 .................................................... 5
3 Configuring the DHL Active-Active link .................................................... 5
3.1. DHL session Creation ............................................................................... 5
4 DHL Active-Active Monitoring ............................................................... 6
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Dual Home Link Active-Active
1 Topology
The customer wants to configure the dual home link solution instead of the STP.
Dual-Home Link (DHL) provides fast failover between core and edge switches without implementing Spanning
Tree.
This mapping prevents network loops by designating only one active link for each VLAN, even though both links
remain active and are associated with each of the common VLANs.
When one of the 2 active DHL links fails or is brought down, the VLANs mapped to that link are then forwarded
on the remaining active link to maintain connectivity to the core. When the failed link comes back up, DHL
waits a configurable amount of time before the link resumes forwarding of its assigned VLAN traffic.
DHL linkA and linkB must belong to the same default VLAN.
3
Dual Home Link Active-Active
- For the purpose of the lab, create a link aggregation between the 6360 VC and the 6860-B:
o 6360 VC
sw5 (6360-A) -> linkagg lacp agg 8 size 2 actor admin-key 8
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
7 Dynamic 40000007 2 ENABLED UP 2 2
8 Dynamic 40000008 2 ENABLED DOWN 0 0
o 6860-B
sw8 (6860-B) -> show vlan members port 1/1/3
vlan type status
--------+-----------+---------------
20 qtagged forwarding
30 qtagged forwarding
58 untagged forwarding
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
8 Dynamic 40000008 2 ENABLED UP 2 2
28 Dynamic 40000028 2 ENABLED UP 1 1
78 Dynamic 40000078 2 ENABLED UP 2 2
Notes
Spanning Tree is disabled on all the DHL enabled ports
IP address = 192.168.20.105
Subnet mask = 255.255.255.0
Default Gateway = 192.168.20.7
- From Client 5, start a continuous ping to the VLAN 20 IP interface (created on the 6860-A):
C:\> ping –t 192.168.20.7
- The VLAN 20 is blocked on the link aggregation to avoid a loop. Thus, the traffic goes from 6360-A to
6860-A via the link aggregation 7:
sw5 (6360-A) -> show vlan 20 members
port type status
----------+-----------+---------------
1/1/1 untagged forwarding
0/7 qtagged forwarding
0/8 qtagged dhl-blocking
- Now disable the link aggregation 7 on the 6360-A while the ping is still running:
- Stop the ping and enable the link aggregation 7 on the 6360-A:
sw5 (6360-A) -> linkagg lacp agg 7 admin-state enable
Notes
It can takes a few seconds for the VLAN 20 to be forwarded back on the link aggregation 8: when the failed link
comes back up, DHL waits a configurable amount of time (default: 30 secs) before the link resumes forwarding
of its assigned VLAN traffic.
- Save configuration:
sw5 (6360-A) -> write memory flash-synchro
sw8 (6860-B) -> write memory flash-synchro
OMNISWITCH R8
V I RT U A L R O U T E R R E D U N D A N C Y P R O TO C O L (VRRP)
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
Virtual Router IP
• RFCs Supported
• RFC 2338 – Virtual Router Redundancy Protocol
Subnet
• RFC 2787 – Definitions of Managed Objects for
the Virtual
Virtual Router ID = 2
Master 1 Backup 1
Backup 2 Master 2
Subnet
Def GW = Def GW =
VR 1 IP address VR 2 IP address
* Two virtual routers with their hosts splitting traffic between them
VRRP REMINDER
• VRRP Tracking
• Base set of tracking policies supported:
• ADDRESS
• IPV4-INTERFACE
• IPV6-INTERFACE
• PORT 2
• VLAN
Master 1 Pri = 100 1/1/3 1/1/1 Backup 1 Pri = 80
3 R1 Virtual Router ID = 1
VLAN 20 (int_20) R2 4
Backup 1 Pri = 70
Master 1 Pri = 80
1 5
Default Route
* At least two virtual routers must be configured on the LAN—a master router and a backup router.
VRRP – FULL CONFIGURATION STEP
Step by step
Setting Pre-emption
- Allow by default
- may be disabled “no pre-empt”
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Virtual Router Redundancy Protocol (VRRP)
How to
✓ Configure the VRRP protocol in Release 8
Contents
1 Topology ........................................................................................ 2
2 Configuring the VRRP ......................................................................... 3
3 Configuring the Master / Backup............................................................ 8
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Virtual Router Redundancy Protocol (VRRP)
1 Topology
The Virtual Router Redundancy Protocol is a standard router redundancy protocol which provides redundancy by
eliminating the single point of failure inherent in a default route environment. The VRRP router, which controls
the IP address associated with a virtual router is called the master router and is responsible for forwarding
virtual router advertisements. If the master router becomes unavailable, the highest priority backup router
transitions to the master state.
3
Virtual Router Redundancy Protocol (VRRP)
o On 6860-A
o On 6860-B
- In the steps above, we have created 2 VRRP instances 1 and 2 (VRRP 1, VRRP 2), and associated it with
respectively VLAN 20 and 30 (VRRP 1 > VLAN 20, VRRP 2 > VLAN 30). We have then associated a Virtual IP
address of 192.168.20.254 to VRRP 1 and 192.168.30.254 to VRRP 2 which both VRRP instances will
share.
- Also take note of the Virtual MAC address. This is the address that the router will use in the active state
for all the responses. This prevents end stations from having to re-arp to their router in the event of a
failure:
sw7 (6860-A) -> show ip vrrp statistics
Checksum Errors : 0,
Version Errors : 0,
VRID Errors : 0
Interface
VRID Name State UpTime Become Master Adv. Rcvd
----+--------------------------------+----------+----------+-------------+----------
1 int_20 Master 98575 1 0
2 int_30 Master 81058 1 0
6
Virtual Router Redundancy Protocol (VRRP)
Interface
VRID Name State UpTime Become Master Adv. Rcvd
----+--------------------------------+----------+----------+-------------+----------
1 int_20 Backup 44764 0 448
2 int_30 Backup 34581 0 346
- From the “statistics” command, we can see that the 6860-A is the active virtual router. Since all
priorities are equal, the lowest router ID is the selection criteria.
- The DHCP server has not been configured with these gateway addresses, so to perform this test we need
to switch back to static addresses by setting the gateway for clients 5 and 9.
- Now let's change our default gateway for clients 5 and 9 :
Client 5:
IP address = 192.168.20.105
Subnet mask = 255.255.255.0
Default Gateway = 192.168.20.254
Client 9:
IP address = 192.168.30.109
Subnet mask = 255.255.255.0
Default Gateway = 192.168.30.254
- Notice that the “Physical Address” which corresponds to the IP address 192.168.20.254 is the VRRP
interface MAC address (VRRP instance 1 > VLAN 20).
- Now start a continuous ping to VRRP interface (192.168.20.254) from the client 5 …
C:\> ping –t 192.168.20.254
- … Then remove the master VRRP gateway (in this example 6860-A). We will simply reboot the switch
(don’t forget to save!):
6860-A -> write memory
6860-A -> reload from working no rollback-timeout
- Notice how quickly the DHL switch from one link to the other, and how fast the Backup VRRP becomes
master. Check the VRRP status on 6860-B:
sw8 (6860-B) -> show ip vrrp statistics
Checksum Errors : 0,
Version Errors : 0,
VRID Errors : 0
Interface
VRID Name State UpTime Become Master Adv. Rcvd
----+--------------------------------+----------+----------+-------------+----------
1 int_20 Master 6205571 1 62003
2 int_30 Master 6195388 1 61900
- To provide load balancing between both 6860, we will configure the 6860-A to be Master on VLAN 20,
and the 6860-B to be Master on VLAN 30.
- The default priority is 100. Let’s put a priority of 150 for VRRP 1 on 6860-A, and a priority of 150 for
VRRP 2 on 6860-B:
Warning
THE VRRP INSTANCE MUST BE DISABLED BEFORE CHANGING THE PRIORITY
Interface
VRID Name State UpTime Become Master Adv. Rcvd
----+--------------------------------+----------+----------+-------------+----------
1 int_20 Master 1895 1 3
2 int_30 Backup 112204 0 1122
Interface
VRID Name State UpTime Become Master Adv. Rcvd
----+--------------------------------+----------+----------+-------------+----------
1 int_20 Backup 6356865 1 62164
2 int_30 Master 2228 1 3
OMNISWITCH R8
I P I N T E R FA C E S
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• Automatically advertised by RIP and OSPF protocols when the interface is created (not by BGP)
• Use
• RP (Rendez-Vous Point) in PIMSM
• sFlow Agent IP address
• Source IP of RADIUS authentication
• NTP Client
• BGP peering
• OSPF router-id
• Switch and Traps Identification from an NMS station (i.e OmniVista)
CUSTOM IP INTERFACE/LOOPBACK0 FOR IP SERVICE
• To configure a source IP address as the outgoing IP interface for an IP service
• Any IP interface/ loopback
• In the particular VRF based on an application specific command
[vrf vrf_name] ip service source-ip {Loopback0 | interface_name} [tftp] [telnet] [tacacs]
[swlog] [ssh] [snmp] [sflow] [radius] [ntp] [ldap] [ftp] [dns] [all]
Application Interface-name
-------------+--------------------------------
dns -
ftp -
ldap -
ntp -
radius -
sflow -
snmp Loopback0
ssh -
swlog -
tacacs -
telnet -
tftp - -
STATIC / DYNAMIC ROUTING
STATIC VS DYNAMIC ROUTING
• Static Routes
• Entered manually by the network administrator
• Anytime the network topology changes, administrator must update the routes
• Static routes always have priority over dynamic routes
• Suitable for environments where network traffic is relatively predictable and where network
design is relatively simple
• Invalid
• Default at 180 - range 3..360
• The time interval before an active route expires (and enters the “garbage” state)
• AOS to enforce the constraint that invalid cannot be less than 3x of update
• Hold-down
• Default at 0 - range 0..120
• The time interval during which a route remains in the hold-down state.
Whenever a route is seen from the same gateway with a higher metric
than the route in the RIB, the route goes into hold-down.
• This excludes route updates with an INFINITY metric
-> ip rip holddown-timer 10 Default 0
APPLYING AN ACL ON THE EMP PORT
APPLYING AN ACL ON THE EMP PORT
• This feature allows for applying an ACL on the EMP port of the switch.
• Only a single empacl policy list with multiple policy rules is supported.
• The following CLI commands are associated with this feature:
-> policy list list_name type empacl
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNISWITCH R8
O P E N S H O R T E S T PAT H F I R S T ( O S P F ) - F U N D A M E N TA L S
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
ID = 4.4.4.4 ID = 5.5.5.5
FINDING NEIGHBOURS
R1 State R1 R2 R2 State
• Exchange Process
Down Hello Down
Init Init
Hello
2-Way 2-Way
Hello
Exstart (cont. R1 ID) Exstart
- Hello interval: 10 seconds
Exchange Hello Exchange (keep-alive function)
(cont. R2 ID)
Loading Loading
- Dead interval: 40 seconds
Full Full
• Down State
• Router have not exchanged any OSPF information
• Init State
• A destination router has received a new router’s hello packet
• Adds it to its neighbour list
• 2-Way State
• The new router receives a unidirectional reply from the destination router
• Adds the destination router to its neighbour list
DESIGNATED & BACKUP DESIGNATED ROUTERS
• Once in 2-Way State, the routers elect a Designated Router (DR) and a Backup Designated
Router (BDR)
• 1 DR and 1 BDR for each broadcast segment
• Role
• Maintaining the LSDB (Link State DataBase) Update (dst @: 224.0.0.5) 3
R1 R2 R3
• Receiving and disseminating update
to the routers on the segment 2
DR BDR DROther
Update
DROther 1
New link!
R4
DESIGNATED & BACKUP DESIGNATED ROUTERS
• DR & BDR Election
• The DR & BDR are elected according to the following parameters:
1• IP interface priority (highest priority)
2• Router ID (highest value)
ID = 1.1.1.1 ID = 2.2.2.2 ID = 3.3.3.3
Priority = 250 Priority = 200 Priority = 150
• If the DR fails,
DR BDR DROther
• The BDR is promoted to DR
• Another Router (DROther) is promoted to BDR
DROther DROther
ID = 4.4.4.4 ID = 5.5.5.5
Priority = 100 Priority = 50
DESIGNATED & BACKUP DESIGNATED ROUTERS
• Election > Exstart State
• DR & BDR form adjacencies with the other OSPF routers
• Highest router ID becomes the master and start the exchange process
ID = 1.1.1.1 ID = 2.2.2.2 ID = 3.3.3.3
Priority = 250 Priority = 200 Priority = 150
SLAVE
DR BDR DROther
DROther DROther
MASTER
ID = 4.4.4.4 ID = 5.5.5.5
Priority = 100 Priority = 50
MASTER SLAVE
R4 R1 (DR)
R4 DBD R1 (DR)
• ID Adv. Router
Init • Cost Adv Router Init
• Seq nb
2-Way 2-Way
Exstart Exstart
LSAck
Exchange Exchange
SHARING ROUTING INFORMATION
• Loading information in the Database > Loading State
• If the master has more up-to-date information than the slave,
• Slave sends a Link State Request (LSR) to the master
• Master then sends a Link State Update (LSU) with detailed information of the links
• Slave incorporate information in its local database
• Slave sends a Link State Acknowledge (LSAck) to the master MORE
MASTER SLAVE
UP-TO-DATE
• If slave has more up-to-date information, INFO R4 R1 (DR)
DR BDR DROther
2
VLAN 1
DROther
1
1 A new network is discovered by R4 R4
3 The DR informs the other routers on the segment about the change
(destination @: 224.0.0.5 = all OSPF routers)
SHARING ROUTING INFORMATION
• Metrics/Cost
• Indicates the overhead required to send packets out a particular interface
• Cost is calculated:
• From the root node to every other node in the network
• Using the metric cost of the outgoing interfaces
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNISWITCH R8
O P E N S H O R T E S T PAT H F I R S T ( O S P F ) – A R E A S
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
DISTRIBUTION
… … ACCESS … …
AREA 1 AREA 2
MY ROUTING TABLE IS TOO BIG
I’M RUNNING LOW ON MEMORY!
OVERVIEW
• Main benefit of creating areas > reduce the number of routes to propagate
• If divided in areas, an OSPF network must have:
• A Backbone Area
• Distributes information between areas
• Must be contiguous (if not, virtual links can be configured)
• Non-backbone area(s) directly connected to the backbone area
… …
AREA 1.1.1.1 AREA 2.2.2.2
ROUTER TYPES
BACKBONE ROUTER (BB) & INTERNAL ROUTER (IR)
• Routers that are entirely within the backbone area are called Backbone Router (BB)
• Routers that are wholly within an area are called Internal Routers (IR)
BB
IR … IR IR … IR
AREA 2.2.2.2
AREA 1.1.1.1
AREA BORDER ROUTER (ABR)
• Router that attaches multiples areas (backbone + other areas)
• Condense the topological information of their attached areas for distribution to the
backbone
• The backbone in turn distributes the information to the other areas
• Main function
• Summarize sub networks found throughout the OSPF system
ABR
AREA 0.0.0.0 …
AREA 1.1.1.1
AUTONOMOUS SYSTEM BOUNDARY ROUTER (ASBR)
• Router that is running multiple routing protocols
• Serves as a gateway
• Able to import and translate different protocols into OSPF (redistribution)
EXTERNAL DOMAIN
RIP
ASBR
AREA 0.0.0.0 …
AREA 1.1.1.1
LSA TYPES
LSA – TYPE 1 > ROUTER LSA
• Each router within the area floods router LSA
• Aim: provide a list with all the directly connected links
• A router LSA always stays within the area
• Generated by every router
R2
R1 R3
AREA 0.0.0.0
Each router sends a LSA – Type 1 to each other with all its directly connected links
LSA – TYPE 2 > NETWORK LSA
• Only generated by DR (multi-access network)
• A network LSA always stays within the area
• Aim: send ID of all the routers connected to the multi-access network
R2 DR
R3
R1
AREA 0.0.0.0
AREA 0.0.0.0
R3
R1 floods the new route information via a LSA – Type 1 (Router LSA) in the Area 2
Reminder: LSA – Type 1 stays within the area!
ABR (1) creates an LSA – Type 3 (Summary LSA) and flood it into the area 0
This LSA is flooded into all the other areas
LSA – TYPE 5 > EXTERNAL LSA
• Generated by the ASBR
• Aim: redistribute external routes into OSPF
AREA 0.0.0.0
R3
AREA 2.2.2.2
LSA – TYPE 5 ABR (1)
ABR (2)
LSA – TYPE 5 LSA – TYPE 5
ASBR … R2
…
RIP R4 R5
The ASBR redistributes the RIP routes into OSPF via a LSA – Type 5 – External LSA
The LSA – Type 5 – External LSA is flooded into all the other areas
LSA – TYPE 4 > SUMMARY ASBR LSA
• Generated by the ABR
• Aim: inform other routers where to find the ASBR
• Includes the ASBR Router ID
AREA 0.0.0.0
R3
AREA 2.2.2.2
LSA – TYPE 1 ABR (1)
ABR (2)
LSA – TYPE 4 LSA – TYPE 4
ASBR … R2
…
R4 R5
RIP
AREA 1.1.1.1
EXTERNAL DOMAIN
The ASBR redistributes the RIP routes into OSPF via a LSA – Type 7 – External LSA (because Area 2 is NSSA)
The ABR (1) convert the LSA – Type 7 to LSA – Type 5, then flood it into all the other areas
*LSA-Type 6 are not explained in this course as they are not used in today’s infrastructures
AREA TYPES
STANDARD AREA
AREA 0 STANDARD AREA 1
R1 R2 R3
EXTERNAL
TYPE 1/2 TYPE 1/2
DOMAIN
TYPE 3
TYPE 5
TYPE 4
• Router Types
• R2 = Area Border Router (ABR)
• R3 = Autonomous System Boundary Router (ASBR)
• LSA Types
• Type 1 & 2 LSAs are flooded between routers in the same area
• Type 3 & 5 are flooded throughout the backbone and all standard areas
• Type 4 LSAs are injected into the backbone by the ABR of an area which contains an ASBR
STUB AREA
• External routes are not forwarded in a stub area
AREA 0 STUB AREA 1
R1 R2 R3
DEFAULT
• Router Types
• R2 = Area Border Router (ABR)
• R2 & R3 share a common stub area
• LSA Types
• Type 5 LSAs are not propagated into the stub area
• Instead, R2 (ABR) injects a Type 3 LSA containing a default route into the stub area (« through itself »)
• Type 4 LSAs are not propagated into the stub area
TOTALLY STUBBY AREA
• External routes + Type 3 LSAs are not forwarded in a Totally Stubby area
AREA 0 TOTALLY STUBBY AREA 1
R1 R2 R3
DEFAULT
• Router Types
• R2 = Area Border Router (ABR)
• R2 & R3 share a common stub area
• LSA Types
• Like stub areas, totally stubby areas do not receive Type 4 & Type 5 LSAs from their ABRs
• Neither do the Type 3 LSAs
• All routing out of the area relies on a single default route injected by the ABR
NOT SO STUBBY AREA (NSSA)
• Stub & Totally Stubby Areas
• Pro: Convenient to reduce the resource utilization of routers (no external routes to process)
• Con: Neither type can contain an ASBR (as types 4 & 5 LSAs not authorized)
AREA 0 NSSA 1
R1 R2 R3
EXTERNAL
TYPE 1/2 TYPE 1/2
DOMAIN
TYPE 5 TYPE 7
TYPE 4
• Router Types
DEFAULT
• R2 = Area Border Router (ABR)
• R3 = Autonomous System Boundary Router (ASBR)
• LSA Types
• Type 7 LSAs = Type 5 LSAs in disguise
• This allows an ASBR to advertise external links to an ABR
ROUTES REDISTRIBUTION
ROUTES REDISTRIBUTION
• Allows to learn and advertise IPv4 routes between different protocols
• Uses route maps to:
• Determine which routes are allowed/denied access to the network
EXTERNAL DOMAIN
• Modify route parameters before they are redistributed
RIP
• STEP 1: Configuring Route Maps 192.168.1.0/24
192.168.2.0/24
• A Route Map is composed of
AREA 0.0.0.0
• Action ASBR
• Route map name
• Sequence number
• Action: permit/deny
• Match EXAMPLE: REDISTRIBUTION OF 192.168.1.0 ONLY
• Criteria that a route must match
• Action statement is applied to the route ROUTE MAP
- ACTION: PERMIT
• Set - MATCH: 192.168.1.0/24
• Modify route information before being redistributed - SET: NOT USED
• Applied if - ACTION: DENY
• All the route-map criteria is met
- MATCH: 192.168.2.0/24
• The action permits redistribution
- SET: NOT USED
ROUTES REDISTRIBUTION
• STEP 2: Configuring Route Redistribution
• Redistribution from source protocol to destination protocol
• Source protocol: from which the sources are learned
• Destination protocol: from which the sources are redistributed
Creating an Area
Enabling OSPF
OSPF CONFIGURATION
Step by Step
Creating an Area
Create the OSPF area(s)
AREA 0 AREA 1
AREA 0 AREA 1
AREA 0 AREA 1
OSPF CONFIGURATION
Step by Step
REDIST. REDIST.
AREA 0 AREA 1
RIP
EXTERNAL DOMAIN
Enabling OSPF
Enable the OSPF Software previously loaded
OSPF CONFIGURATION
0) CONFIGURING THE ROUTER-ID
SW-> ip router router-id 192.168.254.7
7) ENABLING OSPF
SW-> ip ospf admin-state enable
REDIST. REDIST.
AREA 0 AREA 1
RIP
EXTERNAL DOMAIN
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNISWITCH R8
O P E N S H O R T E S T PAT H F I R S T ( O S P F )
A D VA N C E D F E AT U R E S & M O N I T O R I N G
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
WITH SUMMARIZATION
AREA 0.0.0.0
192.168.0.0/23 VIA ABR
ABR
WITHOUT SUMMARIZATION
192.168.0.0/24 VIA ABR
192.168.0.0/24 192.168.1.0/24 192.168.1.0/24 VIA ABR
AREA 1.1.1.1
AGGREGATION
• Internal routes: Summarization > External routes: Aggregation
• Same advantages as Summarization
• Smaller routing tables
• Less LSA flooding
• Less bandwith, memory & CPU usage
• Aggregated routes are carried by LSA – Type 5 (External ASBR LSA)
• External routes aggregation done on the ASBR
WITH SUMMARIZATION
AREA 0.0.0.0
192.168.0.0/23 VIA ABR
ASBR
WITHOUT SUMMARIZATION
192.168.0.0/24 VIA ABR
192.168.0.0/24 192.168.1.0/24 192.168.1.0/24 VIA ABR
EXTERNAL DOMAIN
OSPF INTERFACE AUTHENTICATION
• If authentication enabled, neighbours can communicate only if:
• They use the same type of authentication
• They have a matching password or key
• 2 types of authentication:
• Simple
• Uses simple clear-text passwords
• MD5
• Encrypted authentication, uses a key and a password
VIRTUAL LINK
• Reminder: all areas must be connected to the backbone area (Area 0)
• Not possible? Solution: Virtual Link
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNISWITCH R8
G L O B A L R O U T I N G P R O TO C O L S R E D I S T R I B U T I O N
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
RIB
Destination
Routing
Protocol
REDIST ROUTE MAP
-> show ip router database
Route Redistribution
r indicates recursive static route, with following address in brackets
Local 3 Redist
Protocol Route Preference Value
------------+------------------------
Local 1
Static Route Best (preferred) routes Static 2
RIP Map OSPF
ISISL1
110
115
OSPF ISISL2 118
RIP 120
BGP
IS-IS 2 EBGP
IBGP
Import
190
200
210
Destination Routing
Protocol -> show ip routes
• ACTION
• Match • PERMIT
• DENY • SET
• IP-ADDRESS • METRIC 1
• IP-NEXTHOP Action • EFFECT
• IPV4-INTERFACE • ADD
• IPV6-ADDRESS • SUBTRACT
• REPLACE
• IPV6-INTERFACE Match • NONE
• IPV6-NEXTHOP
• METRIC-TYPE
• METRIC Set… • INTERNAL
• ROUTE-TYPE Route-Map • EXTERNAL
• LEVEL2 • TAG
• LEVEL1
• COMMUNITY
• INTERNAL
• EXTERNAL • LOCAL-PREFERENCE
• TAG IP • LEVEL
access- Redist- • LEVEL1-2
• LEVEL2
list control • LEVEL1
• IP ACCESS-LIST
• ACCESS-LIST-NAME • REDIST-CONTROL
• IP-ADDRESS/MASK • ALL-SUBNETS
• NO-SUBNETS
• AGGREGATE
NEW REDISTRIBUTION - COMMANDS
• Route map criteria specification
ip route-map route-map-name [sequence-number number] action {permit | deny}
ip route-map route-map-name [sequence-number number] set metric metric [effect {add |subtract |
replace | none}]
• Rip redistribution
->ip redist {local | static | ospf | isis | bgp} into rip route-map route-map-name
• OSPF redistribution
->ip redist {local | static | rip | isis | bgp} into ospf route-map route-map-name
ROUTE MAP - ACCESS LIST CREATION
• Convenient way to add multiple IPv4 or IPv6 addresses to route-maps
• Maximum 200 per switch
• Create the Access List name
-> ip access-list access-list-name
• Define access-list statements
-> ip access-list access-list-name address address/mask [action {permit | deny}]
[redist-control {all-subnets | no-subnets | aggregate}]
• Deletes route map all sequence number of 50 in the rip_1 route map
-> no ip route-map rip_1 sequence-number 50
Notes: The “no” version of the command that specifies a match or set parameter only deletes that
parameter from the route-map. If a sequence-number is included but no match or set
parameters, then only that specific route-map is deleted. If the command only has a route-
map-name, then the entire route-map is deleted.
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
OSPF
How to
✓ Implement a OSPF backbone area configuration, different types of areas,
authentication and virtual links on an OmniSwitch.
Contents
1 Topology ........................................................................................ 3
2 Configuration .................................................................................. 4
2.1. Client VLAN Configuration......................................................................... 4
2.2. Configure connections between 6860B and 6900-B ............................................... 4
3 OSPF Backbone ................................................................................ 5
3.1. OSPF Backbone Logical Diagram .................................................................. 5
3.2. Configuration........................................................................................ 5
3.2.1. Loopback interface configuration ........................................................................ 6
3.3. Verification .......................................................................................... 8
4 OSPF Areas ................................................................................... 12
4.1. OSPF Areas Logical Diagram ..................................................................... 12
4.2. Configuration....................................................................................... 13
4.3. Verification ......................................................................................... 13
4.4. Configuration....................................................................................... 15
4.5. Verification ......................................................................................... 15
4.6. Virtual-link configuration (on both switches) ................................................. 18
4.6.1. Configure the backbone area on switch 6900-B and 6860-B ........................................ 18
4.6.2. Create Virtual-link ....................................................................................... 19
4.6.3. Verify the working of the virtual-link.................................................................. 19
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
OSPF
4.7. Let’s add VLANs 20 and 30 into our OSPF network in Area 3.3.3.3......................... 23
4.8. On the 6860s create and configure Area 3.3.3.3: ............................................. 23
4.9. Verify the correct operation of the OSPF setup with the following commands: ......... 24
5 OSPF Redistribution ......................................................................... 28
6 Access to the DATA server ................................................................. 31
7 OSPF Authentication ........................................................................ 34
7.1. Simple Authentication ............................................................................ 34
7.2. MD5 Authentication ............................................................................... 34
8 Stub Area .................................................................................... 35
8.1. OSPF Areas Logical diagram ...................................................................... 35
8.2. Configuration....................................................................................... 36
8.3. Verification ......................................................................................... 37
3
OSPF
1 Topology
Open Shortest Path First routing (OSPF) is a shortest path first (SPF), or link state, protocol. OSPF is an interior
gateway protocol (IGP) that distributes routing information between routers in a single Autonomous System
(AS). OSPF chooses the least-cost path as the best path. OSPF is suitable for complex networks with large
numbers of routers since it provides faster convergence where multiple flows to a single destination can be
forwarded on one or more interfaces simultaneously.
4
OSPF
2 Configuration
- Enable interfaces
3 OSPF Backbone
All OSPF networks must have an OSPF backbone area configured
3.2. Configuration
- Enable OSPF protocol on 2 switches to advertise all local routes. In order to have a complete
connectivity between all switches, OSPF will be used to advertise dynamically all the routes.
- The first step is to load OSPF protocol and to enable OSPF on the newly created IP interfaces. As all
OSPF networks must have a backbone area, this will be created with 0.0.0.0 as the area identifier.
- Loopback0 is always advertised, even if there are no users on the switch; no route re-distribution is necessary.
- Let’s define the router-id and the backbone area on all switches:
Router Id = 192.168.254.1,
OSPF Version Number = 2,
Admin Status = Disabled,
Area Border Router ? = No,
AS Border Router Status = Disabled,
Route Tag = 0,
SPF Hold Time (in seconds) = 10,
SPF Delay Time (in seconds) = 5,
MTU Checking = Disabled,
# of Routes = 0,
# of AS-External LSAs = 0,
# of self-originated LSAs = 0,
# of LSAs received = 0,
External LSDB Limit = -1,
Exit Overflow Interval = 0,
# of SPF calculations done = 0,
# of Incr SPF calculations done = 0,
# of Init State Nbrs = 0,
# of 2-Way State Nbrs = 0,
# of Exchange State Nbrs = 0,
# of Full State Nbrs = 0,
# of attached areas = 1,
# of Active areas = 0,
# of Transit areas = 0,
# of attached NSSAs = 0,
Default Route Origination = none,
Default Route Metric-Type/Metric = type2 / 1,
BFD Status = Disabled
Opaque Transit Capability = Enabled
Redistribute internal BGP routes = Disabled
Attached Interfaces =
- Verify that there are not any interfaces associated with the backbone area yet:
- Let’s assign the interfaces to the corresponding OSPF area. This is done in two steps. The first one is to
enable the interfaces into OSPF, and then the interfaces are assigned to their corresponding area:
3.3. Verification
- Now that the backbone area has been created on all switches, let’s verify some basic OSPF parameters
on the 2 switches:
- Each switch has 1 neighbours in full state meaning there have been route updates exchanged between
them.
- Now, let’s verify the routes that are seen by each switch.
Notes
The first command shows the routes learned by the switch using any static or dynamic routing protocol. This is
the global routing table. In this example, only LOCAL and OSPF routes are present.
The second one only shows the OSPF routes learned by the switch
Domain Domain
Destination/Mask Gateway Metric Name ID Type
---------------------+-----------------+--------+--------+--------+----------
172.16.17.0/24 172.16.17.1 1 Vlan 217 Intra
192.168.254.1/32 0.0.0.0 0 N/A Intra
192.168.254.7/32 172.16.17.7 1 Vlan 217 Intra
- Verify that all switches Loopback0 IP addresses are in the routing table. One is LOCAL to the switch
whereas the other two are learned through OSPF.
- Also verify that all other IP interfaces that were configured are also present in the routing table as well.
- Type the following command to verify the Link State DataBase (LSDB)
- At this point, the LSDB should include 3 Link State Advertisements (LSA)
- There are 2 routers in the network setup. Each router sends one LSA (rtr)
- There is a Designated Router elected on each network segment. This DR sends one LSA (net)
- Remember that the switch with the highest priority, or in case of a tie, the highest router ID will be
chosen as a Designated Router and the second highest will be the Backup DR. Let’s check the DR and
BDR status on your switch:
sw1 (6900-A) -> show ip ospf interface
- Type the following to save your running configuration as the next labs are built on this configuration.
-> write memory flash-synchro
- You can also save your running configuration in a file on the flash that will be used for the OSPF virtual
link lab.
- Type the following on all Switches:
4 OSPF Areas
- This second part of the lab is designed to familiarize you with the configuration of an OSPF virtual link
on an OmniSwitch. Virtual links can be used to create a virtual backbone connection on an OmniSwitch.
The idea is to split the origin OSPF Backbone by forming two different independent OSPF Backbones
and then by using the ospf virtual links, we will connect them back again.
Switch1 will be configured with a virtual link to Switch 2 and Switch 7 will be configured with another
virtual link to Switch 8. We will create two transit areas to connect the two ospf backbones.
The area 1.1.1.1 using vlan 212 between the switches 1 and 2 and the area 2.2.2.2 using the vlan 278
between the switches 7 and 8.
13
OSPF
4.2. Configuration
On the 6900-A and 6900-B create and configure Area 1.1.1.1:
4.3. Verification
- Verify the correct operation of the OSPF setup with the following commands:
sw1 (6900-A) -> show ip ospf area
Area Id AdminStatus Type OperStatus
---------------+-------------+-------------+------------
0.0.0.0 enabled normal up
1.1.1.1 enabled normal up
- Verify that the new routes have been learned by OSPF and are seen by switches:
14
OSPF
- Verify that in the LSDB new LSAs have been added (sumnet). These LSAs have the information of the
networks that belong to a different area:
4.4. Configuration
On the 6860-A and 6860-B create and configure Area 2.2.2.2:
4.5. Verification
- Verify the correct operation of the OSPF setup with the following commands:
- Verify that the new routes have been learned by OSPF and are seen by switches:
- Verify that in the LSDB new LSAs have been added (sumnet). These LSAs have the information of the
networks that belong to a different area:
- With the commands above, we have created the transit areas and attached the relevant interfaces to
them. The next step is to configure the ospf virtual links using these ospf interfaces and areas.
- Where 192.168.254.2 is the Switch2 (6900-B) Loopback0 address, and it’s configured as the Switch2
router-id.
- Where 192.168.254.1 is the Switch1 (6900-A) Loopback0 address, and it’s configured as the Switch1
router-id.
- Where 192.168.254.8 is the Switch2 (6860-B) Loopback0 address, and it’s configured as the Switch8
router-id.
- Where 192.168.254.7 is the Switch7 (6860-A) Loopback0 address, and it’s configured as the Switch7
router-id.
4.7. Let’s add VLANs 20 and 30 into our OSPF network in Area 3.3.3.3
4.9. Verify the correct operation of the OSPF setup with the following commands:
sw1 (6900-A) -> show ip ospf area
Area Id AdminStatus Type OperStatus
---------------+-------------+-------------+------------
0.0.0.0 enabled normal up
1.1.1.1 enabled normal up
- Verify that the new routes have been learned by OSPF and are seen by all switches:
- Verify that in the LSDB new LSAs have been added (sumnet). These LSAs have the information of the
networks that belong to a different area:
5 OSPF Redistribution
- It was demonstrated in the two previous parts of the lab how interfaces running OSPF participate in
distributing routing information within the Autonomous System.
- In this part we will manage the other interfaces. For example , int_120 on 6900_B, int_70 on 6860-A
and int_80 on 6860-B are seen are local routes. However, they will not run the OSPF protocol. For
them to be reachable, redistribution will need to be configured.
- Check on the 6860 than this new route has been learnt:
- Check on the 6900 than this new route has been learnt:
- To have an Internet access for VM clients, a pre-configuration must be done on the OS6900-A
- Default route 0.0.0.0/0 on 6900-A is a static route which should be advertised to other switch
Manage a Redistribution of Static routes
----| truncated]
32
OSPF
Notes
The second static route has been managed previously on the conf download to the switch at the beginning of
the training. 10.0.0.51 is the IP address of the DNS.
- The previous section showed how to redistribute a local route. The same can be applied to a static
route.
- To redistribute the static route into OSPF another filter must be created since static routes are not
considered part of the OSPF Autonomous System. Type the following:
7 OSPF Authentication
- Verify that the switches have become neighbors once authentication was enabled on both ends of the
link
MD5 is a more secure way of configuring authentication when using OSPF. By using MD5, the keys will be
encrypted, unlike simple passwords. A key number and a key string must be supplied for MD5.
- These two values will be combined and used in the MD5 hashing algorithm for authentication between
the switches. Check your routing tables, neighbors, and interfaces and enable debugging to display any
problems.
8 Stub Area
8.2. Configuration
- For this Lab, we will add a new 6560 switch to become an internal router for stub area 4.4.4.4
- A router becomes an internal router when it doesn’t have a Backbone connection and is member of only
a single area. For the purposes of the lab, Stub-Switches will be used as an internal router.
Notes
Switches in Stub Areas do not have external routes in their routing database
- Check areas:
8.3. Verification
- Type the following on 6560-A:
Domain Domain
Destination/Mask Gateway Metric Name ID Type
---------------------+-----------------+--------+--------+--------+----------
0.0.0.0/0 172.16.137.7 2 Vlan 137 Inter
172.16.12.0/24 172.16.137.7 3 Vlan 137 Inter
172.16.17.0/24 172.16.137.7 2 Vlan 137 Inter
172.16.28.0/24 172.16.137.7 3 Vlan 137 Inter
172.16.78.0/24 172.16.137.7 2 Vlan 137 Inter
172.16.137.0/24 172.16.137.3 1 Vlan 137 Intra
192.168.20.0/24 172.16.137.7 2 Vlan 137 Inter
192.168.30.0/24 172.16.137.7 3 Vlan 137 Inter
192.168.60.0/24 192.168.60.3 1 Vlan 60 Intra
192.168.254.1/32 172.16.137.7 2 Vlan 137 Inter
192.168.254.2/32 172.16.137.7 3 Vlan 137 Inter
192.168.254.3/32 0.0.0.0 0 N/A Intra
192.168.254.7/32 172.16.137.7 1 Vlan 137 Intra
192.168.254.8/32 172.16.137.7 2 Vlan 137 Inter
Notes
On the stub-switch, there should be a default route with a next-hop pointing towards the IP interface of the
backbone switch
How would the stub area be changed into a totally stubby area?
OMNISWITCH R8
G R A C E F U L R E S TA R T
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
Network Segment S
Router A Router C
R1 LSACK R2 LSACK R3
RESTARTING ROUTER
• During the restart neighbors act as if nothing happened to the restarting router
• The restarting router is still listed as an adjacency.
• Traffic is forwarded to the restarting router
• The restarting router performs non-stop forwarding
DATA
R1 R2 R3
RESTART PENDING…
GRACEFUL RESTART
• With Graceful restart
• When the restarting router comes up:
• It discovers neighbors and re-establishes adjacencies.
• It synchronizes its LSDB
• It does not send any LSA/LSP because it still has incomplete routing information. If it sent outdated
LSAs/LSPs the neighbors would think that the network had changed forcing them to run SPF calculations
throughout the area
NEIGH. ADJ. NEIGH. ADJ.
LSA LSA
SPF
• When the restarting router has synchronized its LSDB:
• It sends out its updated LSAs/LSP. The neighbors do not run SPF algorithm based on these LSAs/LSPs.
• It purges the grace LSAs/LSPs by setting their age to the maximum value. The neighbors see these LSAs/LSPs
as ‘expired’ and discard them
• In this way the graceful restart has successfully completed
CLI - GRACEFUL RESTART
->ip {ospf/ISIS/BGP} graceful-restart
Note: Graceful restart is disabled for OSPF and ISIS and enabled for BGP by default
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNISWITCH R8
DHCP
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
DHCP CLIENT
LAN SWITCH
LAN
• When the DHCP Relay feature is enabled, DHCP packets are Forward Delay(seconds)
Max number of hops
= 0,
= 16,
• Global basis configuration sw8 (6860-B) -> show ip dhcp relay statistics
Global Statistics :
Reception From Client :
Total Count = 0, Delta = 0
Forw Delay Violation :
Total Count = 0, Delta = 0
Max Hops Violation :
Total Count = 0, Delta = 0
Agent Info Violation :
• To Configure the DHCP relay destination address for Total Count = 0, Delta = 0
Invalid Gateway IP :
the
-> specified IP interface
ip dhcp relay interface if_name destination ip_address Total Count = 0, Delta = 0
Server Specific Statistics :
From Interface int_20 to Server 192.168.100.102
Tx Server :
Total Count = 0, Delta = 0
ip dhcp relay interface int_20 destination 192.168.100.102 InvAgentInfoFromServer:
Total Count = 0, Delta = 0
DHCP SNOOPING
DHCP SNOOPING
• Globally, per VLAN or per port.
• DHCP Snooping feature
DISCOVER
• Filters DHCP packets between untrusted sources and a
trusted DHCP server REQUEST
• Configurable MAC:
• DHCP port status IP:
Lease time:
• Trusted Type:
Un-trusted Port (dynamic or static)
• DHCP traffic is fully allowed VLAN
ifIndex
• Client only (Request only) Trusted Port
• Block (no DHCP traffic allowed) Binding Database
Block DHCP traffic
• Port IP Source Filtering
• on source port - MAC - IP
• Rate Limiting
DHCP SNOOPING
• Layer 2 DHCP Snooping
• Applies DHCP Snooping functionality to bridged DHCP client/server broadcasts
• Does not require an IP interface on ingress VLAN
• Does not require the use of the relay agent to process DHCP packets
• Both L2 and L3 DHCP Snooping are active when DHCP Snooping is globally enabled
Untrusted
Trusted Port
Untrusted
Rogue DHCP
Server
DHCP SNOOPING
• Release 8 Platforms Supported
• By default, DHCP Snooping is disabled
1 byte1 byte 1 byte 1 byte 2 bytes 1 byte 1 byte 1 byte 1 byte 12 bytes (Variable)
Remote-id
•Agent ID
Subremote-id
Suboption TLV
Lenght
Remote-id lenght
• Example
-> dhcp-snooping option-82 format user-string “Building B Server”
-> dhcp-snooping option-82 format system-name
-> dhcp-snooping option-82 format base-mac
-> dhcp-snooping option-82 format interface-alias
-> dhcp-snooping option-82 format auto-interface-alias
DHCP SNOOPING
• Displays the global DHCP Snooping configuration
-> show dhcp-snooping
• Displays a list of VLANs that have DHCP Snooping enabled and whether or not MAC address
verification and Option-82 data insertion is enabled for each VLAN
-> show dhcp-snooping vlan
• Displays the trust mode and DHCP Snooping violation statistics for all switch ports and link
aggregates that are filtered by DHCP Snooping
-> show dhcp-snooping port
• DAI is implemented by combining both DHCP snooping and IP source filtering capabilities
on the OmniSwitch.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
DHCP Server & DHCP Relay
How to
✓ Configure the DHCP Relay feature (aka IP Helper)
Contents
1 Topology ........................................................................................ 2
2 Accessing the DHCP Server .................................................................. 3
3 Testing the DHCP Relay ...................................................................... 5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
DHCP Server & DHCP Relay
1 Topology
A DHCP server provides dynamic IP addresses on lease for client interfaces on a network. It manages a pool of IP
addresses and information about client configuration parameters. The DHCP server obtains an IP address
request from the client interfaces.
After obtaining the requests, the DHCP server assigns an IP address, a lease period, and other IP configuration
parameters, such as the subnet mask and the default gateway.
The DHCP Relay feature allows UDP broadcast packets to be forwarded across VLANs that have IP routing
enabled.
3
DHCP Server & DHCP Relay
- Check if there is a route from the 6860 to the DHCP server (192.168.100.102):
sw7 (6860-A) -> show ip routes
Total 25 routes
o On the 6860-B:
Sw8 (6860-B) -> ip dhcp relay destination 192.168.100.102
Sw8 (6860-B) -> ip dhcp relay admin-state enable
sw8 (6860-B) -> show ip dhcp relay
IP DHCP Relay :
DHCP Relay Admin Status = Enable,
Forward Delay(seconds) = 0,
Max number of hops = 16,
Relay Agent Information = Disabled,
Relay Agent Information Policy = Drop,
DHCP Relay Opt82 Format = Base MAC,
DHCP Relay Opt82 String = e8:e7:32:cd:57:f3,
PXE support = Disabled,
Relay Mode = Global,
Bootup Option = Disable,
5
DHCP Server & DHCP Relay
- Check that VLANs 20 or 30 are correctly mapped to ports for clients connected to the 6360 virtual
chassis.
sw5 (6360-A) -> show vlan 20 members
port type status
----------+-----------+---------------
1/1/1 default forwarding
2/1/1 default forwarding
0/7 qtagged forwarding
0/8 qtagged dhl-blocking
Note: if ports are not assigned to the correct VLAN, type the following commands :
o Assign the VLAN 20 or 30 to the clients connected to the 6360 virtual chassis:
sw5 (6360-A) -> vlan 20 members port 1/1/1 untagged
sw5 (6360-A) -> vlan 20 members port 2/1/1 untagged
sw5 (6360-A) -> vlan 30 members port 1/1/2 untagged
sw5 (6360-A) -> vlan 30 members port 2/1/2 untagged
Tips
The IP DHCP relay feature can also be configured
on a per-VLAN basis.
This can be interesting if different DHCP servers
must serve IP addresses for different subnets.
Here, as we have a unique DHCP server, it’s not
necessary.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
Global Parameters
Setting Up Policies
Monitoring Policies
Auto-QOS configuration
QOS CONFIGURATION
Global Parameters
Description Command/keyword
By default, QoS is enabled on the switch. If QoS policies are qos enable/disable
configured and applied, the switch attempts to classify and apply
relevant policy actions
Displays global information about QoS configuration show qos config
Resets the QoS configuration to its defaults qos reset
Deletes the pending configuration qos revert
Flushes the configuration qos flush
Apply the configuration qos apply
QOS CONFIGURATION
Step by Step
Step by Step
To change the default QSet profile (QSP 1) to one of the other supported profiles (QSP 2, 3, or 4)
qos qsp system-default 2
QOS CONFIGURATION
Step by Step
CONDITION ACTION
---- ----
… …
• Prioritization, Bandwidth
Gets Policies from shaping
L2 (source & dest) • ICMP filtering
• CLI • MAC, VLAN, • ICMP prioritizing, ICMP rate
• Webview • Slot/Port, IPMS Filtering limiting
• PolicyView (OV) • 802.1p/ToS/DSCP marking and
L3/L4 mapping
• Policy Based Routing PBR for
• SIP, DIP, redirecting
• TCP,UDP,IP proto • Routed traffic
• Source TCP/UDP port
• Destination TCP/UDP port • Policy Based Mirroring
• Advanced Layer 2 to 4 Filtering
• Server Load Balancing
-> policy condition condition_name
[source ip ip_address [mask netmask]]
QOS CONFIGURATION
[source ipv6 {any | ipv6_address [mask netmask]}
[destination ip ip_address [mask netmask]]
[destination ipv6 {any | ipv6_address [mask netmask]}
[multicast ip ip_address [mask netmask]]
Setting Up Policies
Examples
-> policy port group techports 1/1/1 3/1/1 3/2/1 3/3/1
-> policy condition cond4 source port group techports
-> policy network group netgroup3 173.21.4.0 mask 255.255.255.0 10.10.5.3
-> policy condition cond5 destination network group netgroup3
-> policy mac group macgrp2 08:00:20:00:00:00 mask ff:ff:ff:00:00:00 00:20:DA:05:f6:23
-> policy condition cond6 source mac group macgrp2
QOS CONFIGURATION
Step by Step
Setting Up Policies
Examples
policy action action2 priority 7
Mark, Prioritize,
Actions Defaults Shape Filter, Mirror,…
Description Keyword Default
Whether the flow matching the rule disposition Accept
should be accepted or Denied
QOS CONFIGURATION
Step by Step INCOMING PACKET
PACKET CLASSIFICATION
H
E ACTION
A CONDITION ACTION
D
Setting Up Policies E
---- ----
applies to
R outgoing
POLICY RULE traffic
Create a policy rule
-> policy rule rule_name [enable | disable] [precedence precedence] [condition condition]
[action action] [validity period name | no validity period] [save] [log [log-interval seconds]]
[count {packets | bytes}] [trap | no trap] [default-list | no default-list]
Examples
policy condition c1 source ip 10.10.2.3
Setting Up Policies
Examples
Maps traffic destined for port 3/2 with and 802.1p value of 4 to an 802.1p value of 7
-> policy condition Traffic destination port 1/1/1 802.1p 4 802.1P MAPPING
-> policy action SetBits 802.1p 7
-> policy rule Rule2 condition Traffic action SetBits
Monitoring Policies
Displaying the actual number of matches for the configured rules
-> show active policy rule
Policy From Prec Enab Act Refl Log Trap Save Def Matches
R1 cli 0 Yes Yes No No Yes Yes Yes 2
(L2/3): C1 -> QoS_Action1
R2 cli 0 Yes Yes No No Yes Yes Yes 0
(L2/3): C2 -> QoS_Action1
R3 cli 0 Yes Yes No No Yes Yes Yes 0
(L2/3): C3 -> QoS_Action1
Monitoring Policies
Display the QoS statistics
-> show qos statistics
48-7A-55-00-00-00 to 48-7A-55-FF-FF-FF ALE 8008 IP Phone MAC Range Mac adress = ALE Phone > Priority 5
Non ALE Phone > Default
24.0.0.0/8
191.24.0.0/16 10.0.0.0/8
190.27.3.0/24
20.0.0.0/8
R3
R1 150.21.0.0/16
192.168.99.254 Firewall/Gateway
Internet
192.168.10.0 192.168.99.0
2/1
Unknown DA
20.10.0.0 10.10.0.0
POLICY BASED ROUTING - EXAMPLE
• Traffic from the firewall is sent back to the switch to be re-routed
• Adding the source port to the condition allows traffic to not get caught in a loop
-> policy condition TrafficFromFW source IP 10.10.0.0 mask 255.255.0.0 source port 2/1/1
-> policy action To_Internet permanent gateway IP 192.168.10.254
-> policy rule Redirect_Internet condition TrafficFromFW action To_Internet
192.168.99.254 Firewall/Gateway
Internet
192.168.10.0 192.168.99.0
2/1
Unknown DA
20.10.0.0 10.10.0.0
REMOTE PORT MIRRORING (RPM)
REMOTE PORT MIRRORING (RPM)
• Allows traffic to be carried over the network to a remote switch
• Achieved by using a dedicated remote port mirroring VLAN
• RPM VLAN has to be configured on the source, destination and intermediate switches
• No other traffic is allowed on that VLAN
SOURCE PORT
POLICY BASED MIRRORING
• Mirroring is done based on a QoS policy instead of a specific port
• 1 session supported at any given time
• Port Based Mirroring. It can be done on incoming or outgoing traffic or both.
• Policy action mirror
• Mirror traffic based on
• Source & Destination addresses
• Address pairs
• Protocols
• VLAN classification
• Port mirroring and monitoring cannot be configured on the same port
INGRESS, EGRESS, OR BOTH INGRESS & EGRESS PACKETS
POLICY ACTION & PORT ASSIGNMENT
DIRECT TRAFFIC TO MIRROR PORT
MIRRORING POLICY
POLICY BASED MIRRORING
• Example 1
-> policy condition c1 source ip 1.1.1.1
-> policy action a1 ingress egress mirror 1/1/1
-> policy rule r1 condition c1 action a1
-> qos apply
Policy rule r1 will cause all packets with a source IP of 1.1.1.1 to be ingress and egress
mirrored to port 1/1/1
• Example 2
-> policy condition c1 source ip 1.1.1.1
-> policy action a2 ingress egress mirror 1/1/1 disposition drop
-> policy rule r2 condition c1 action a2
-> qos apply
Policy rule r2 drops traffic with a source IP of 1.1.1.1, but the mirrored traffic from
this source is not dropped and is forwarded to port 1/1/1
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Quality of Service (QoS)
How to
✓ Configure Quality of Service rules on the OmniSwitches R8
Contents
1 Introduction .................................................................................... 2
2 Configuring Port Default 802.1P/ToS/DSCP ............................................... 3
3 Configuring Trusted Ports .................................................................... 3
3.1. Example 1 ........................................................................................... 3
3.2. Example 2 ........................................................................................... 4
4 Configuring the Policies ...................................................................... 4
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Quality of Service (QoS)
1 Introduction
By default, the QoS feature is enabled on an OmniSwitch. If QoS policies are configured and applied, the switch
will attempt to classify traffic and apply relevant policy actions.
Notes
In this lab, we will not cover all the QoS features. The main objective of this lab is to provide an overview
about how to configure the QoS. For more information, read the Policy Condition Combination table in the
Network Configuration Guide for a list of valid combinations.
Diagram containing all the devices that will be used during this lab:
- Before beginning, reset all the QoS parameters back to default (6360-A):
sw5 (6360-A) -> qos flush
sw5 (6360-A) -> qos apply
sw5 (6360-A) -> show qos config
QoS Configuration
Admin = enable,
Trust ports = no,
Log lines = 10240,
Log level = 6,
Log console = no,
Forward log = no,
User-port filter = spoof ,
User-port shutdown = none,
Phones = trusted,
DEI Mapping = disable,
DEI Marking = disable,
Pending changes = none
3
Quality of Service (QoS)
Notes
In this example above:
- Any untagged traffic (traffic without any 802.1p settings) arriving on port 1/1/1 will be tagged with an
802.1p value of 7 (highest priority).
- If the port is configured to be untrusted, any tagged traffic will be tagged with an 802.1p value of 7.
- If the port is configured to be trusted, any tagged traffic will preserve the 802.1p value in the flow.
3.1. Example 1
- To configure individual ports to recognize 802.1p or ToS, use the qos port trusted command with the
desired slot/port number:
Notes
In this example above, the qos port trusted command specifies that port will be able to recognize and trust
the 802.1p bits. The global setting is active immediately; however, modifying a port configuration requires qos
apply to activate the change.
4
Quality of Service (QoS)
3.2. Example 2
- In the following example:
o A policy condition “Traffic” is then created to classify traffic containing 802.1p bits set to 4.
o The policy action “SetBits” specifies that the bits will be changed to 7 when the traffic leaves
the switch
o A policy rule called 802.1p_rule puts the condition and the action together.
sw5 (6360-A) -> policy rule 802.1p_rule condition Traffic action SetBits
Notes
802.1p mapping may also be set for Layer 3 traffic, which typically has the 802.1p bits set to 0.
- In the above example, what would happen if ingress traffic on chassis 1 slot 1 port 1 was tagged with an
802.1p value of 5?
----------------------------------------------------------------------------------------------------------------------------- ------
Let’s consider that the devices located in the VLAN 20 are employees, and the devices located in the VLAN 30
are contractors. We want to prioritize employees’ traffic over contractors’ traffic.
- The rule is not active on the switch until it has been applied:
sw5 (6360-A) -> show active policy rule
Rule name : 802.1p_rule
Condition name = Traffic,
Action name = SetBits
- In this following example, any flow coming from the VLAN 20 is sent to a queue supporting its maximum
bandwidth requirement. Via the QoS feature, it is also possible to modify the policy action that you have
created earlier to limit the maximum bandwidth:
sw5 (6360-A) -> policy action priority_5 maximum bandwidth 100k
sw5 (6360-A) -> qos apply
- The bandwidth can be specified in abbreviated units, in this case, 100k (= 100 kilo bytes).
- Check the management:
sw5 (6360-A) -> show policy condition
Condition name : Traffic
802.1p = 4
- To specify a precedence value for a rule, use the policy rule command with the precedence keyword:
sw5 (6360-A) -> policy rule rule1 precedence 1000 condition client_traffic action priority_5
- By default, rules are enabled. Rules may be disabled or re-enabled through the policy rule command:
sw5 (6360-A) -> policy rule rule1 disable
sw5 (6360-A) -> qos apply
sw5 (6360-A) -> show active policy rule
Rule name : 802.1p_rule
Condition name = Traffic,
Action name = SetBits
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• OmniVista 2500
• Network Management System (NMS)
• Unified Management / Monitoring / Provisioning of LAN & WLAN devices:
• ALE OmniSwitch Switches
• ALE OmniAccess Stellar Access Points
• 3rd Party Devices
ALE OMNISWITCH
• PROVISION
• MANAGE
• MAINTAIN
OMNIVISTA 2500
• Installation • Administration
• OmniVista 2500 = Virtual Appliance • Web Interface
Hypervisors
• VMware ESXi
• VirtualBox
• MS Hyper-V
• KVM
HOME PAGE
• Applications
• Accessible via
a drop down menu
• Dashboard
• Applications widgets
• OV 2500 Home Page
• Quick overview
• Customizable
(add/remove…)
APPLICATIONS
ADMIN
• Notifications
• Display traps generated by the devices
• Perform an action when receiving urgent /
important traps
(send a mail, run an application, forward the trap…)
• Topology
• Topology view of all the discovered devices
• View information about a specific device
• Perform certain actions
(edit/telnet/reboot a device)
MAIN FEATURES
APPLICATION BANDWITH
ANALYTICS
• Analytics
• View of network resources utilization (users, R
devices, applications)
• Reports generation (usage trends, predictive
analysis of future network utilization…)
• Application Visibility
• Identify and restrict usage of applications
that are used by users (ex. Facebook)
• Uses the DPI feature (Deep Packet Inspection)
MAIN FEATURES
HEAT MAP
FLOOR PLAN
• Floor Plan
• Determine optimal placement of access
points in a location
• Heat Map
• Create & Organize Wi-Fi coverage maps
(“Heat Maps”)
GUESTS VLAN, EMPLOYEES VLAN,
• Captive Portal
• Integrated captive portal with credentials CAPTIVE PORTAL
GUESTS
EMPLOYEE
DEVICE (BYOD)
MAIN FEATURES
STANDBY
VLAN + RULES
MASTER « CAMERAS »
• High Availability
• 1 OV2500 Master / 1 OV2500 Standby
• Avoid loss of service
• Troubleshooting
• Embedded troubleshooting tools
• Rapid isolation of network issues
• APIs
• Northbound RESTful APIs
• Integration of network management functions
with 3rd party ecosystem application
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
How to
✓ Access to the OmniVista 2500 NMS server
✓ Test connectivity between the OmniVista 2500 and the OmniSwitches
✓ Discover & Manage the OmniSwitches from the OmniVista 2500
Contents
1 Introduction .................................................................................... 3
2 Topology ........................................................................................ 3
3 Powering On the OmniVista 2500 NMS Virtual Machine .................................. 4
4 Configuring the SNMP ......................................................................... 6
4.1. Configuring SNMP in the 6360 VC ................................................................. 6
4.2. Configuring SNMP in the 6900-A ................................................................. 12
4.3. Configuring SNMP in the 6900-B ................................................................. 13
4.4. Configuring SNMP in the 6860A .................................................................. 13
4.5. Configuring SNMP in the 6860B .................................................................. 13
4.6. Configuring SNMP in the 6560-A ................................................................. 13
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
1 Introduction
Your company has just bought a set of OmniSwitches and wants to manage them using a centralized platform.
The OmniVista 2500 NMS is a management system that will be used to monitor and configure the switches.
In this lab, your task is to the setup the basic parameters needed in the OmniSwitches and OmniVista server to
be able to discover the switches in the OmniVista, and to arrange them on a map so the physical links between
them can be monitored.
2 Topology
The OmniVista 2500 NMS Virtual Appliance has already been deployed in the R-Lab infrastructure. Its initial
parameters (IP address, size of network, license) have also been configured
- Select the Virtual Machine PodX_OV (X = R-Lab Number), then right-click on it and select Snapshot ->
Snapshot Manager…:
Warning
THE NAME OF THE VM MAY BE DIFFERENT ACCORDING TO THE OV VERSION INSTALLED IN THE POD.
MAKE SURE THAT YOU ARE SELECTING THE “OV…” VM.
5
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
- Check the progress in the Status Bar, at the bottom of the screen.
- Once it is completed, right-click on the VM PodX_OV and select Power -> Power On
Tips
It takes 10-15 minutes for the OmniVista 2500 NMS virtual machine to boot up completely. You cannot access it
right away. Continue with the following part to learn how to configure the OmniSwitches parameters. You will
come back to the OmniVista later in this lab.
6
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
For the Access training (215) this management has already been done for the core and distribution
switches. Not for training bootcamp (220) and advanced (216)
- Create an SNMP user account, set the read-write rights, and enable the SHA+DES encryption:
sw5 (6360-A) -> user snmpuserv3 read-write all password Superuser01= sha+des
- Declare the OmniVista Server as management station (ex. IP@ of OV2500 Server: 192.168.100.107):
sw5 (6360-A) -> snmp station 192.168.100.107 snmpuserv3 v3 enable
- We will use the Loopback0 IP interface address for the communication between the OmniVista and the
OmniSwitches. Manage the Loopback0 on the switch:
Total 6 interfaces
Flags (D=Directly-bound)
Name IP Address Subnet Mask Status Forward Device Flags
--------------------------------+---------------+---------------+------+-------+---------+------
EMP-CHAS1 10.4.21.5 255.255.255.0 UP NO EMP
EMP-CHAS2 10.4.21.6 255.255.255.0 UP NO EMP
EMP-CMMA-CHAS1 0.0.0.0 0.0.0.0 DOWN NO EMP
EMP-CMMA-CHAS2 0.0.0.0 0.0.0.0 DOWN NO EMP
Loopback 127.0.0.1 255.255.255.255 UP NO Loopback
Loopback0 192.168.254.5 255.255.255.255 UP YES Loopback0
Application Interface-name
-------------+--------------------------------
dns -
ftp -
ldap -
ntp -
radius -
sflow -
snmp Loopback0
ssh -
swlog -
tacacs -
telnet -
tftp - -
7
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
- Check the presence of a route to the network 192.168.100.0 on the 6860-A and 6860-B:
- Try to ping the OmniVista from the 6860-A and the 6860-B:
To be able to reach the OmniVista 2500 from the 6360 VC, a default route must be created on it.
Notes > Reminder: Connection between the 6360 VC and the 6860s
The 6360 is connected to both 6860s:
- Connection to the 6860-A through the link aggregation 7 (VLAN 57)
- Connection to the 6860-B through the link aggregation 8 (VLAN 57)
Total 7 interfaces
Flags (D=Directly-bound)
Total 11 interfaces
Flags (D=Directly-bound)
Before command (route not known on 6900-A table) After command route available (distribute via 0SPF)
10
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
Total 10 interfaces
Flags (D=Directly-bound)
- Try to ping the OmniVista internal address from the int_57 interface:
- As we want to use the Loopback0 to communicate with the OmniVista, launch a ping from the Loopback0
interface:
sw5 (6360-A) -> ping 192.168.100.107 source-interface Loopback0
PING 192.168.100.107 (192.168.100.107) from 192.168.254.5 : 56(84) bytes of data.
Notes >
For trainee who attend access training (215). Dynamic routing protocol is fully explained on advanced training.
Objective of this command is to update automatically routing table on core switches via ospf protocol.
Notes
These static routes will be automatically broadcasted on the core network thanks to the routing process
running between the core switches (6900 and 6860).
---
192.168.254.5/32 +172.16.17.7 00:00:10 OSPF
-----
- Try to ping the OmniVista internal address through the Loopback0 interface:
- Create an SNMP user account, set the read-write rights, and enable the SHA+DES encryption:
Sw1 (6900-A) -> user snmpuserv3 read-write all password Superuser01= sha+des
- Declare the OmniVista Server as management station (ex. IP@ of OV 2500 Server: 192.168.100.107):
Sw1 (6900-A) -> snmp station 192.168.100.107 snmpuserv3 v3 enable
sw1 (6900-A) -> write memory flash-synchro
13
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
- Create an SNMP user account, set the read-write rights, and enable the SHA+DES encryption:
sw2 (6900-B) -> user snmpuserv3 read-write all password Superuser01= sha+des
- Declare the OmniVista Server as management station (ex. IP@ of OV 2500 Server: 192.168.100.107):
sw2 (6900-B) -> snmp station 192.168.100.107 snmpuserv3 v3 enable
sw2 (6900-B) -> write memory flash-synchro
- Create an SNMP user account, set the read-write rights, and enable the SHA+DES encryption:
Sw7 (6860-A) -> user snmpuserv3 read-write all password Superuser01= sha+des
- Declare the OmniVista Server as management station (ex. IP@ of OV 2500 Server: 192.168.100.107):
Sw7 (6860-A) -> snmp station 192.168.100.107 snmpuserv3 v3 enable
sw7 (6860-A) -> write memory flash-synchro
- Create an SNMP user account, set the read-write rights, and enable the SHA+DES encryption:
Sw8 (6860-B) -> user snmpuserv3 read-write all password Superuser01= sha+des
- Declare the OmniVista Server as management station (ex. IP@ of OV 2500 Server: 192.168.100.107):
Sw8 (6860-B) -> snmp station 192.168.100.107 snmpuserv3 v3 enable
sw8 (6860-B) -> write memory flash-synchro
- Create an SNMP user account, set the read-write rights, and enable the SHA+DES encryption:
sw3 (6560-A) -> user snmpuserv3 read-write all password Superuser01= sha+des
- Declare the OmniVista Server as management station (ex. IP@ of OV 2500 Server: 192.168.100.107):
sw3 (6560-A) -> snmp station 192.168.100.107 snmpuserv3 v3 enable
sw3 (6560-A) -> write memory flash-synchro
The Configuration of the OmniSwitches is now complete. The next step consists in discovering the
OmniSwitches in the OmniVista 2500 NMS.
14
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
Notes
The Remote-Lab is configured for the OmniVista 2500 NMS platform to be reached directly from the Windows
Desktop of the access machine, allowing an easier access.
- Launch a web browser from the Windows desktop and enter the following URL (see diagram below):
https://10.4.Pod#.208:8443.
An Evaluation License provides full OmniVista 2500 NMS feature functionality, but it is valid only
for 90 Days (starting from the date the license is generated). There is one file that contains all of
the Device (AOS, Third-Party, Stellar APs) and Service Licenses (VM, Guest, BYOD).
In this section, you will learn how to generate and install an evaluation license
- Copy & Paste the following URL in your RDP session: https://lds.al-enterprise.com/
- Enter:
o Customer ID: 99999
o Order Number: evaluation
o Leave the Customer Email field blank
- Click on Submit
- By entering your mail you can receive the license information by mail.
Click on OK
- The main Dashboard will be shown once the licenses are applied correctly
17
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
Once the license file correctly inserted, please delete the file (“EVAL…”) from the
computer.
- In the Create Discovery Profile screen, General section, enter the following parameters:
Name: Training
CLI/FTP User Name: admin
CLI/FTP Password: switch
Confirm CLI/FTP Password: switch
- Below the General section, click on SNMP, and enter the following parameters:
SNMP Version: SNMPv3
Timeout (msec): 5000
Retry count: 3
User Name: snmpuserv3
Auth & Priv Protocol: SHA+DES
Auth Password: Superuser01=
Confirm Auth Password: Superuser01=
Priv Password: Superuser01=
Confirm Priv Password: Superuser01=
- Click on the box to select the Training profile from Choose Discovery Profiles
- Click on “+” to move it to the right
18
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
- Click Create and select the ranges from the list (click on the box) and select Discover Now.
- The discovery process will start. Click on Finish when the discovery is completed.
- You should see the discovered devices in the Managed Devices window. You can also find additional
information about the status of the switch, its IP address, the type of switch discovered, and the
firmware version used.
- On the top right, click on Map Level Action and then on New map
- Select and Add all the discovered switches to this map (click on the square and then “+”) or use add item
icone (> or >>)
19
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
- Arrange the switches according to the initial diagram so all the links are displayed
If a link is not being shown in the map, select the switch and look for the Operations window
on the right. Select Poll Device or Poll Link and then wait for a moment to synchronize.
- Left click on a switch to see the various options. From the menu on the right you have the capability to
manage your switches.
Your network can now be managed and monitored from the OmniVista 2500 NMS platform.
20
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
- Create the VLAN 110 on the 6900-A from the OmniVista 2500 web page:
> Select CONFIGURATION > VLANS > VLAN
> Click on Create VLAN by Devices button
1. Devices Selection
> VLAN IDs: 110
> VLAN(s) Description: SERVERS
> Click on the Add/Remove Devices
> Select the 6900-A (192.168.254.1), then click on > to add it as selected
> Click on OK
> Click on Next
2. VLAN Configuration
> Check that Admin Status = Enabled
> Click on Next
5. Review
> Review the information
> Click on Create
- Check that the VLAN and IP interface are now displayed in the 6900-A:
sw1 (6900-A) -> show vlan
Total 8 interfaces
Flags (D=Directly-bound)
Name IP Address Subnet Mask Status Forward Device Flags
--------------------------------+---------------+---------------+------+-------+---------+------
EMP-CHAS1 10.4.21.1 255.255.255.0 UP NO EMP
EMP-CMMA-CHAS1 0.0.0.0 0.0.0.0 DOWN NO EMP
Loopback 127.0.0.1 255.255.255.255 UP NO Loopback
Loopback0 192.168.254.1 255.255.255.255 UP YES Loopback0
int_100 192.168.100.1 255.255.255.0 UP YES vlan 100
int_110 192.168.110.1 255.255.255.0 DOWN NO vlan 110
int_212 172.16.12.1 255.255.255.0 UP YES vlan 212
int_217 172.16.17.1 255.255.255.0 UP YES vlan 217
- For the next lab, configure the following IP address for the Client 1
Client 1:
IP address = 192.168.110.51
Subnet mask = 255.255.255.0
Default Gateway = 192.168.110.1
Preferred DNS Server = 10.0.0.51
Before command (route not known on 6860-A table) After command route available (distribute via 0SPF)
22
OmniVista 2500 NMS-E Access & OmniSwitches Basic Features
OMNISWITCH R8
ACCESS CONTROL LISTS (ACL)
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• Network group
• MAC group Policy Based Mirroring ICMP Policies
• Service group * Mirror traffic based on QoS
* Filtering
* Prioritizing
• Port group policies
* Rate limiting traffic (security)
Access Guardian
* User Network Profile
policy condition
Global Parameters
Setting Up Policies
Configuration Examples
Monitoring Policies
ACCESS CONTROL LISTS (ACL)
Step by Step
Global Parameters
Description Command/keyword
By default, QoS is enabled on the switch. If QoS policies are qos enable/disable
configured and applied, the switch attempts to classify and
apply relevant policy actions
* By default, flows that do not match any policies are accepted on the switch
PACKET CLASSIFICATION
Configuration Examples
Layer 2 ACL
Allows all bridged traffic except for traffic matching the source MAC address and VLAN 5
-> policy condition Cond-Deny-Host1 source mac D4:85:64:EC:33:EF source vlan 5
-> policy action Act-deny-Host1 disposition deny
-> policy rule Rule-Deny-Host1 condition Cond-Deny-Host1 action Act-deny-Host1 log
-> qos apply
Layer 3 ACL
Deny traffic from source IP address included in netgroup1
-> policy network group netgroup1 192.168.82.0 mask 255.255.255.0 192.60.83.0
-> policy condition lab1 source network group netgroup1
-> policy action deny_traffic disposition deny
-> policy rule lab_rule1 condition lab1 action deny_traffic precedence 65535
-> qos apply
ACCESS CONTROL LISTS (ACL)
Step by Step
Configuration Examples
Layer 3 ACL
Drop the Traffic with a source IP address of 192.68.82.0, a source IP port of 23, using
protocol 6 on the switch
Allows all bridged traffic except for traffic matching the source MAC address and VLAN 5
-> policy condition addr2 source ip 192.68.82.0 destination tcp-port 23
-> policy action Block disposition deny
-> policy rule FilterL31 condition addr2 action Block
Layer 3 ACL
Flows coming into the switch destined for any of the specified IP in GroupA is allowed
on the switch
-> policy network group GroupA 192.60.22.1 192.60.22.2 192.60.22.0
-> policy condition cond7 destination network group GroupA
-> policy action Ok disposition accept
-> policy rule FilterL32 condition cond7 action Ok
ACCESS CONTROL LISTS (ACL)
Step by Step
Monitoring Policies
• Done by creating a port group called UserPorts and adding the ports to that group
-> qos user-port {filter | shutdown} {spoof|bgp|bpdu|rip|ospf|vrrp|dvmrp|pim|isis|dhcpserver|dns-reply}
• Profiles can be configured to drop additional traffic such as RIP, OSPF,VRRP, DHCP, DNS,… or BPDUs
• To configure filtering of spoof, rip, ospf , bgp packets
-> policy port group UserPorts 1/1-24 2/1-24 3/1/1 4/1/1
-> qos user-port filter spoof rip ospf bgp
• Drops all defined traffic seen on ports 1/1/1-24 in the UserPorts group
• Port Disable rule
• Used to administratively disable an interface when matching a policy rule
-> policy condition c1 source tcp port 1-1023
-> policy action a1 port-disable
-> policy rule r1 condition c1 action a1
-> policy port groups UserPorts 1/1/1
• To shutdown port 1/1/1 when packet with source tcp port 1-1023 is received
ADVANCED ACL SECURITY FEATURES
• ICMP drop rules
• Allows for configuring rules to drop ICMP requests and replies (Pings)
-> policy condition pingEchoRequest source vlan 10 icmptype 8
-> policy action drop disposition drop
-> policy rule noping10 condition pingEchoRequest action drop
• ARP ACLs
• Source IP address examination in the header of ARP packets
• Directed Broadcasts
• IP datagram sent to broadcast address of subnet the user is not on
• Generates large number of responses to a spoofed host
-> ip directed-broadcast disable
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Access Control Lists (ACLs)
How to
✓ Setting up Access Control Lists (ACLs) on the OmniSwitches R8
Contents
1 Introduction .................................................................................... 2
1.1. Retrieving client’s information ................................................................... 2
2 Filtering L2 traffic ............................................................................ 3
3 Using the ICMP Filter ......................................................................... 3
4 Filtering HTTP & FTP Traffic ................................................................ 4
4.1. Filtering the FTP Traffic (OmniSwitch 6360 VC) ............................................... 4
4.1.1. Checking the access to the FTP Server .................................................................. 4
4.1.2. Testing the FTP Access .................................................................................... 4
4.2. Filtering the HTTP Traffic ......................................................................... 5
4.3. Filtering the HTTP Traffic ......................................................................... 5
4.4. Testing the Configuration ......................................................................... 5
5 Configuring User ports Security ............................................................. 6
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Access Control Lists (ACLs)
1 Introduction
2 Filtering L2 traffic
- First, reset the ACL/QoS configuration to its default settings:
sw5 (6360-A) -> qos reset
sw5 (6360-A) -> qos flush
sw5 (6360-A) -> qos apply
- Launch a permanent ping from the Client 5 to the database server (192.168.110.51):
Client 5 Client 9
- Check that you don’t have FTP access from the Client 5 (employee, VLAN 20), but it is still working fine
from the Client 9 (contractor, VLAN 30):
sw5 (6360-A) -> policy rule deny_http_contractor condition httpfromvlan30 action deny precedence 65535
sw5 (6360-A) -> qos apply
- Check that you don’t have HTTP access from the Client 9 (contractor, VLAN 30), but it is still working
fine from the Client 5 (employee, VLAN 20):
/ Client 5 Client 9
HTTP
6
Access Control Lists (ACLs)
- To prevent IP source address spoofing, add ports to the port group called UserPorts:
Notes
This port group does not need to be used in a condition or rule to be effective on flows and only applies to
routed traffic. Ports added to the UserPorts group will block spoofed traffic while still allowing normal traffic
on the port
- To avoid any loop in the network, any user access port used will be blocked if a Spanning Tree frame is
received:
sw5 (6360-A) -> qos user-port shutdown bpdu
OMNISWITCH R8
ACCESS GUARDIAN
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
VLAN INTERNET
30 ONLY
GUEST
Policy List
Policy List
ACL QoS ACL QoS Restrict the network access based on the
location of the user/device
VLAN NO HR,
20 FINANCE DB Chassis/Slot/Port on which the user is attached
Period Switch Name on which the user is attached
EMPLOYEE Location
Switch Location String, identifying a group of
MEDIUM MEDIUM Switches
BWDTH PRIORITY
Specifies the days and times during
which a device can access the network
OVERVIEW
Example: Access control via UNP - Campus
Students can be authenticated via
Admin and teachers use 802.1X
either 802.1X or MAC based
authentication
Admin
Teacher Student
802.1X - Supplicant Non - Supplicant
No No
802.1X MAC
No Auth
enabled ? Enabled?
Yes
No
Supplicant? Yes
Yes
Same branch as
802.1x 802.1x
No
Server Down Alternate
UNP Profile UNP Profile
Default
UNP Profile
Configure ports
Bridge Port
-> unp {port chassis/slot/port1[-port2] | linkagg agg_id1[-agg_id2]} port-type bridge
-> unp {port chassis/slot/port1[-port2] | linkagg agg_id[-agg_id2]} 802.1x-authentication
-> unp {port chassis/slot/port1[-port2] | linkagg agg_id[-agg_id2]} mac-authentication MAC or 802.1x
or
Classification rules
UNP profile
Example
VLAN ID
VLAN ID
Policy List
ACL QoS
Example
-> unp policy validity-location ALE-Brest port 1/1/10 Location
-> unp policy validity-location ALE-Brest port 1/1/1-5
Period
CONFIGURATION STEPS
Step by Step
VLAN ID
Policy List
ACL QoS
Example
unp policy validity-period “Office-Time” Location
unp policy validity-period “Office-Time” days MONDAY
Period
unp policy validity-period “Office-Time” days MONDAY time-zone CET
unp policy validity-period “Office-Time” hours 9:00 to 17:00
CONFIGURATION STEPS
Step by Step
UNP profile
Assigns existing QoS policy rules to the specified QoS policy list VLAN ID
ACL QoS
Example
-> unp profile employee qos-policy-list deny_employees location-policy ALE-Brest period-policy Office-Time
-> unp profile employee map vlan 20
CONFIGURATION STEPS
L2 Authentication
Step by Step UNP Port
No No
802.1X MAC
No Auth
enabled ? Enabled?
Yes No Yes
Configure supplicant device classification policies Supplicant? Classification
Rules
Yes
-> unp port chassis/slot/port 802.1X- Same branch as
authentication [pass-alternate profile_name] 802.1x 802.1x
-> unp port chassis/slot/port mac- Timeout UNP Profile UNP Selection
authentication [pass-alternate profile_name]
Not valid
UNP Classification
No UNP
Rules
UNP Profile
Block Block
Block
ACCESS GUARDIAN -CONFIGURATION STEPS
Step by Step Name
UNP Template Properties
802.1x authentication
802.1x authentication tx-period Specify the configuration parameters that
802.1x authentication max_req could be enabled on the UNP port/linkagg
802.1x authentication supp-timeout
UNP profile Templates Pass-alternate UNP-profile
Mac-authentication
Mac-authentication pass-alternate
UNP-Template
UNP-profile
Allow-eap
802.1x MAC authent. Classification
authent.
Group-id
Parameters AAA-profile
Bypass
Classification Default Failure-policy
Rules UNP Profile
VLAN
Policy List
Example
-> unp port-template 802.1X-template
Alternate AAA Profile
UNP Profile -> unp port-template 802.1x-template 802.1x-authentication
-> unp port-template 802.1x-template 802.1x-authentication pass-alternate corporate
VLAN Authentication -> unp port 2/1/1 port-template 802.1x-template
Policy List Accounting
-> aaa profile ap-1
-> aaa profile ap-1 device-authentication mac rad1 rad2
-> aaa profile ap-1 device-authentication 802.1x rad1 rad2
-> unp port 1/1/5 aaa-profile ap-1
AAA Profile
-> unp port 1/2/1-5 aaa-profile ap-1
802.1x authentication AAA profiles to define a custom, pre-defined AAA -> unp linkagg 10 aaa-profile ap-1
Captive-portal authentication configuration that can be applied to a specific set -> unp linkagg 2-5 aaa-profile ap-1
Mac authentication of UNP ports or through a Captive Portal profile.
Radius authentication/accounting servers
Syslog servers
CONFIGURATION STEPS
Step by Step
Configure a server as a RADIUS server on the switch
-> aaa radius-server my_radius host 192.168.100.102 key alcatel-lucent
UNP Port
Teacher Configure the switch “my_radius” for 802.1X device authentication /server accounting
802.1X -> aaa authentication 802.1x my_radius -> aaa accounting 802.1x my_radius
enabled ?
Yes
Create the required VLANs
no
-> vlan 10 admin-state disable name vlan10-block
Supplicant? Mac Auth
-> vlan 20 admin-state enable name vlan20-corporate
Yes no
Create the required UNP profile and map the profile to VLAN 10 and 20
802.1x
-> unp profile corporate -> unp profile def_unp
Classification -> unp profile corporate map vlan 20 -> unp profile def_unp map vlan 10
Pass Fail no Enable UNP on ports that will connect to user devices
-> unp port 1/1/1 port-type bridge
RADIUS Filter-Id
Default
UNP Profile
Set the default UNP profile on the port
UNP Profile Block -> unp port 1/1/1 default-profile def_unp
Configure the template and define an alternate UNP profile to use if the RADIUS server
Alternate does not return a UNP profile
UNP Profile
-> unp port-template 802.1x-template 802.1x-authentication
-> unp port-template 802.1x-template 802.1x-authentication pass-alternate corporate
Assign the port template to a UNP port
Block -> unp port 1/1/1 port-template 802.1x-template
CONFIGURATION STEPS
Step by Step
Monitoring
Display information about ports configured for 802.1X
show unp chassis/slot/port config
Display a list of all users (supplicants) for one or more 802.1X ports
show unp user chassis/slot/port
Display a list of all non-802.1X users (non-supplicants) learned on one or more 802.1X ports
show unp user chassis/slot/port
Display the Access Guardian status of all users learned on 802.1X ports
show unp user details chassis/slot/port
Monitoring
Displays Access Guardian 802.1X device classification policies configured
for 802.1X ports
show unp classification profile
Display the Access Guardian status of all users learned on 802.1X ports
Show unp user
AUTHENTICATION SERVER CONFIGURATION
AUTHENTICATION SERVER CONFIGURATION
Step by Step
Enable the MAC authentication session timer to determine the amount of time the user session
remains active after a successful login (the default time is set to 12 hours).
aaa mac session-timeout enable
Example
ip service source-ip loopback0 radius
Configures the policy for classifying the device when the authentication server is
not reachable.
unp auth-server-down-timeout seconds
Sets re-authentication time for the device to authenticate again with the RADIUS
server when it is classified according to the auth-server-down policy.
show unp global configuration
Auth Server Down Profile1 = ag_SrvDownPrf,
Auth Server Down Timeout = 60,
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Access Guardian
How to
✓ Configure the Access Guardian on OmniSwitch
Contents
1 Introduction .................................................................................... 2
2 Configuring the Access Guardian on the 6360 VC......................................... 3
3 Managing the Access Guardian feature on the 6360 VC ................................. 4
3.1. Declaring the RADIUS Server ...................................................................... 4
3.2. Creating the Policies ............................................................................... 4
3.3. Creating the Policy Lists ........................................................................... 4
3.4. Creating the User Network Profiles .............................................................. 5
3.5. Configuring the User Ports ........................................................................ 5
3.6. Testing the Configuration ......................................................................... 5
3.7. Testing the Radius Configuration................................................................. 5
3.8. Testing the Access Guardian ...................................................................... 6
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Access Guardian
1 Introduction
During this lab, we will configure the Access Guardian feature on the access switches, the 6360 VC.
Use ACL rules created in the previous lab and apply it in UNP Profiles.
The authentication of the network users will be done via a RADIUS server. On our infrastructure, the RADIUS
server is installed on a virtual machine (name: AAA Training Server), and its IP address is 192.168.100.102.
Once authenticated, a Universal Network Profile (UNP) will be applied to the network users. More
information about the UNP profiles to create is provided in the following pages of this lab.
3
Access Guardian
Notes:
@MAC Auth: as there are no MAC addresses configured on the RADIUS server, the user will be blocked from
accessing the network via a MAC address authentication.
During this lab, we will use the policies (ACLs) on the 6360 VC configured in the ACLs lab, and apply them to
the employee or contractor once authenticated:
- Create a policy list to deny the HTTP access for the contractors (VLAN 30):
sw5 (6360-A) -> policy list deny_contractors type unp enable
sw5 (6360-A) -> policy list deny_contractors rules deny_http_contractor
Notes:
A supplicant user (that seeks to authenticate) is authenticated by the RADIUS Server which sends
back the UNP profile name as Filter-Id attibutes (UNP-employee or UNP-contractor).
Client 5
Open the Networks
Connections and right-click
on the Pod connection
Click on Properties
Tips
If the Authentication tab is not available, click on the Start button, Run…, type services.msc and
click Ok. Look for Wired AutoConfig service and start it. Now the Authentication should be
available
7
Access Guardian
- On client 5
- Go back to the network connection Pod properties, then disable 802.1x on the network interface (from
authentication tab of the LAN connection properties)
- As there are not any MAC addresses configured on the RADIUS server, then the user is blocked from
accessing the network.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
LLDP PDUs
Extensions optional fields
• 802.1: Vlan name, port vlan
• 802.3: MAC Phy
• MED: Power and Capability
• Inventory Management
• Network Policy
MEDIA ENDPOINT DEVICES (LLDP-MED)
NETWORK
POLICY
LOCATION ID
EXTENDED
POWER-VIA-MDI
INVENTORY
CONFIGURATION
• Enabling LLDP PDU flow on a port, slot, or all ports on a switch
-> lldp {slot/port | slot | chassis} lldpdu {tx | rx | tx-and-rx | disable}
• Inventory management
IP Phone
LLDP-MED
Mobile Tag versus 802.1Q Tag
1/1/20 1/1/4
151.1.1.0 151.1.1.0
IP Phone 31001
• Configuring a local Network Policy on the switch for a specific application type
-> lldp network-policy policy_id application { voice | voice-signaling | guest-voice
| guest-voice-signaling | softphone-voice | video-conferencing | streaming-video |
video-signaling } vlan { untagged | priority-tag | vlan-id } l2-priority 802.1p_value
dscp dscp_value
1 OS6860-A 7
1/1/20 1/1/4
151.1.1.0 151.1.1.0
IP Phone 31001
2
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Link Layer Discovery Protocol
How to
✓ This lab is designed to familiarize you with the Link Layer Discovery
Protocol (LLDP).
Contents
1 Topology ........................................................................................ 2
2 Configure LLDP ................................................................................ 2
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Link Layer Discovery Protocol
1 Topology
Link Layer Discovery Protocol (LLDP) is a standard that provides a solution for the configuration issues
caused by expanding networks. LLDP supports the network management software used for complete
network management. LLDP is implemented as per the IEEE 802.1AB standard.
The exchanged information, passed as LLDPDU, is in TLV (Type, Length, Value) format. The information
available to the network management software must be as new as possible; hence, remote device
information is periodically updated.
Notes
LLDP is enabled by default in reception and transmission
2 Configure LLDP
- To control per port notification status about a change in a remote device associated to a port, use the
following command:
sw5 (6360-A) -> lldp port 1/1/3 notification enable
sw5 (6360-A) -> lldp port 2/1/3 notification enable
sw5 (6360-A) -> lldp port 1/1/4 notification enable
sw5 (6360-A) -> lldp port 2/1/4 notification enable
Tips
LLDP is configured at port level (or NI or chassis), but not at linkagg level.
3
Link Layer Discovery Protocol
- To control per port management TLV to be incorporated in the LLDPDUs, use the following command
sw5 (6360-A) -> lldp port 1/1/3 tlv management port-description enable
sw5 (6360-A) -> lldp port 2/1/3 tlv management port-description enable
sw5 (6360-A) -> lldp port 1/1/4 tlv management port-description enable
sw5 (6360-A) -> lldp port 2/1/4 tlv management port-description enable
sw7 (6860-A) -> lldp port 1/1/3 tlv management port-description enable
sw7 (6860-A) -> lldp port 1/1/4 tlv management port-description enable
sw7 (6860-A) -> lldp port 1/1/23 tlv management port-description enable
sw7 (6860-A) -> lldp port 1/1/24 tlv management port-description enable
sw8 (6860-B) -> lldp port 1/1/3 tlv management port-description enable
sw8 (6860-B) -> lldp port 1/1/4 tlv management port-description enable
sw8 (6860-B) -> lldp port 1/1/23 tlv management port-description enable
sw8 (6860-B) -> lldp port 1/1/24 tlv management port-description enable
- Verify the LLDP per port statistics by entering the following command:
sw7 (6860-A) -> show lldp statistics
Chas/ LLDPDU LLDPDU LLDPDU LLDPDU LLDPDU TLV TLV Device
Slot/Port Tx TxLenErr Rx Errors Discards Unknown Discards Ageouts
----------+----------+----------+----------+----------+----------+----------+----------+----------
1/1/1 65 0 0 0 0 0 0 0
1/1/3 65 0 65 0 0 0 0 0
1/1/4 66 0 64 0 0 0 0 0
1/1/5 65 0 65 0 0 0 0 0
1/1/6 65 0 65 0 0 0 0 0
1/1/23 65 0 64 0 0 0 0 0
1/1/24 64 0 63 0 0 0 0 0
[truncated]
- The commands below specify the switch to control per port management TLVs to be incorporated in the
LLDPDUs. This will allow to have additional information such as system description, name, capabilities and
management IP address of neighbouring devices.
5
Link Layer Discovery Protocol
[truncated]
Tips
Compare the output of this command with the same command that was entered before
OMNISWITCH R8
M U LT I C A S T I N T R O D U C T I O N
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module, you will be
able to understand and setup the following
features:
• Multicast overview
• IP Multicast Switching (IPMS)
• Internet Group Management Protocol (IGMP)
• Configuration and Monitoring
• Layer 2 Static Multicast & IGMP Relay and
Throttling
• Storm Control & Load balancing multicast on
Link Aggregation
MULTICAST - OVERVIEW
• Similar to broadcast traffic • Unicast sends one packet per destination
• Like selective broadcast • Multicast sends one packet for many
• Only those that request the traffic get it destinations
• Allows a one to many communication rather
than one to one
Unicast
Multicast
MULTICAST - ADVANTAGES & USE
• Conserves Bandwidth
• Uses for multicast
• Resource discovery (OSPF, RIP2, Bootp)
• VLC for video netcasting
• Multipoint file transfer (Starburst Com.)
• Redundant systems (parallel databases)
• Ghosting Software
• Information distribution in data warehousing
MULTICAST - GROUP
• Multicast group
• Set of receivers for a multicast transmission
• Identified by a multicast address
• A user that wants to receive multicast transmissions joins the corresponding multicast group, and
becomes a member of that group
• After a user joins, the network builds the necessary routing paths so that the user receives
the data sent to the multicast group
MULTICAST - ADDRESSING
• Based on Class “D” IP address values
• From 224.0.0.0 to 239.255.255.255
• Allocated by sending application MAC address derived from IP address
• Least Significant 23 bits of IP address mapped onto MAC address
• IP MultiCast address 224.1.2.3 = 01:00:5E:01:02:03
224.0.0.xxx – Routing protocols and other low level topology discovery and maintenance protocols
Well-Known Class D Address examples
……… (http://www.iana.org/assignments/multicast-addresses)
MULTICAST - ROUTING
• Multicast router knows who wants traffic
Network
• Finds out who is sending the traffic
Backbone
• Delivers traffic only to those who want it
Video
• Routers communicate with each other and users Server
to gather the information Multicast
Switching
• Send traffic where it needs to go
IGMP
• Multicast Routing deals with networks, not Join
switch ports
• If one host on a network joins that group, all hosts
on that network receive the traffic
• In the switch, a network=router port=a VLAN, so
the traffic is broadcast on all ports of each SUBNET
network
MULTICAST - SWITCHING - IPMS
• Only the client which join a multicast group
received the multicast packet, and the multicast
packet stream will not flood to other ports Network
Backbone
where no client joins
• More efficient than multicast routing Video
Server
• NI Tables contain: Multicast
• IP Source Address Switching
• IGMP v3
IGMP Query Group (v2 only)
• Membership query
• V3 Membership report (Explicit Host
Tracking)
• V2 Leave group
IGMP Source-Specific Join (v3 only) • V2 Membership report
• V2 Leave group
• V1 Membership report
IGMP - USEFUL TECHNICAL DETAILS
• IGMP is a protocol confined to the local segment of the LAN
• Is never forwarded by any router and thus always has a Time-To-Live (TTL) of 1
• IGMP Host Membership Queries are sent to the "All Systems on this Subnet" class D address
(224.0.0.1)
• IGMP "Leave Group" messages are sent to the "All Routers on this Subnet" class D address
(224.0.0.2)
IPV6 MULTICAST - OVERVIEW
• Multicast Listener Discovery (MLD)
• Used by IPv6 systems (hosts and routers)
• Reporting of IPv6 multicast group memberships to any neighboring multicast routers
• Similar to IGMP for IPv4
• MLD messages are sent with
• Link-local IPv6 Source address
• Hop limit of one
• IPv6 Destination address FF02:0:0:0:0:0:0:16
• MLD Version 1
• Forwarding by IPv6 multicast destination addresses
• MLD Version 2
• Forwarding by source IPv6 addresses and IPv6 multicast destination addresses
• OmniSwitch version supported
• MLDv1 and MLDv2
IPMS
MULTICAST - SWITCHING VS. ROUTING DECISION
• Port list is a combination of hosts and peer routers
• Destination Slot/Port can be is a downstream router or a client
• Destination port could be in same or different VLAN
• If in same VLAN, switch packet
• Use IPMS forwarding table to forward packets to ports
• If in different VLAN, route packet
• Use DVMRP/PIM forwarding table to deliver packets to downstream routers
• Change source MAC address to router port MAC address
• Send packet on destination port
• IPMS
• Intercepts IGMP packets to track membership by port rather than by network
• Two sets of information are combined to tell switches how to forward/route traffic
• Performance is significantly improved because forwarding decisions are made by hardware
• Forwarding tables created by DVMRP, PIM-SM, PIM-DM and IPMS
HOW DOES MULTICAST SWITCHING WORK?
• IP Multicast Switching
• Based on the IGMP query and report messages
that are snooped, the switch forwards multicast
traffic only to the ports that requested it
Group Port Src IP Vlan
226.0.0.4 1/5/22 1.1.1.2 2
• Forwarding Tables created by IGMP Snooping 228.1.1.1 1/2/4 2.2.2.3 34
1/5/22
Without multicast switching, multicast traffic would be forwarded to the entire VLAN
HOW DOES MULTICAST SWITCHING WORK?
• By maintaining this multicast forwarding table, the switch dynamically forward multicast
traffic only to those interfaces that want to receive it as nominal unicast forwarding does
Forward Mcast
traffic to port on
which the join
Video L3 Multicast message was
Server Switch received
Without multicast switching, multicast traffic would be forwarded to the entire VLAN
CONFIGURING IPMS
• The minimum configuration
-> ip multicast admin-state enable
• VLAN • Count
• Number of IGMP membership requests made
• VLAN associated with the IP multicast group
• Life
• Port
• Life time of the IGMP group membership
• Slot and port number of the IP multicast group
IPMS MONITORING
IGMP Neighbor Table Entries
-> show ip multicast neighbor
Total 2 Neighbors
Ingress Egress
Group Address Host Address Tunnel Address VLAN Port VLAN Port
---------------+---------------+---------------+-----+-----+-----+-----
225.0.0.101 192.168.100.10 0.0.0.0 1 2/1/1 1 1/2/24
225.0.0.102 192.168.100.10 0.0.0.0 1 2/1/1 1 1/2/24
• Static multicast MAC addresses maintained in the Source Learning MAC address table
• Assigns the multicast address 01:25:9a:5c:2f:10 to port 1/1/24 in VLAN 20
-> mac-learning vlan 20 port 1/1/24 multicast mac-address 01:25:9a:5c:2f:10
• Assigns a static multicast MAC address to link aggregate ID 2 associated with VLAN 455
-> mac-learning vlan 455 linkagg 2 multicast mac-address 01:95:2A:00:3E:4c
IGMP - RELAY
• IGMP Forwarding to Specific Host in L3 Create the helper address
Environment -> ip multicast helper-address 11.107.61.132
• Actions
• None. Disables the maximum group limit configuration
• Drop. Drops the incoming membership request
• Replace. Replaces an existing membership with the incoming membership request
STORM CONTROL
• Configuration of different thresholds for each type of storm/flood traffic
• Broadcast
• Multicast
• Unknown Unicast
• Thresholds configuration
• rate % num: rate in % of the port speed
• rate mbps num: rate in true mbits per sec
• rate pps num: rate in packet per sec
interfaces {slot chassis/slot| port chassis/slot/port[-port2]} flood-limit {bcast | mcast | uucast | all}
rate {pps pps_num| mbps mbps_num | cap% cap_num | enable | disable | default} [low-threshold low_num]
• Configures the action on a single port, a range of ports, when the port reaches the storm
violated state
interfaces {slot chassis/slot| port chassis/slot/port[-port2]} flood-
limit {bcast | mcast | uucast | all} action {shutdown | trap | default}
LOAD BALANCING MULTICAST ON LINK AGGREGATION
• Multicast traffic is by default forwarded through the primary port of the Link Aggregation
Group
• Option to enable hashing for non-unicast traffic, which will load balance the non-unicast
traffic across all ports in the Link Aggregation
• If non-ucast option is not specified, link aggregation will only load balance unicast packets
• Enables or disables initial packet buffering for IPv4 and IPV6 multicast flows on the
specified VLAN or globally on the switch.
-> ip multicast [vlan vlan_id[-vlan_id2]] initial-packet-buffer admin-state {enable | disable}
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Multicast switching
How to
✓ This lab is designed to familiarize you with the IP multicast switching
capability on the OmniSwitch family of products
Contents
1 Toplogy ......................................................................................... 2
2 IP Multicast Switching ........................................................................ 3
2.1. Without IPMS enable ............................................................................... 3
2.2. IP Multicast Switching (IPMS) enable ............................................................ 5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Multicast switching
1 Toplogy
Multicast switching is used to efficiently handle multicast traffic by forwarding multicast packets only to the
switch ports that need to receive them
- The configuration for multicast switching is simple, requiring only that the switches be bridged together.
A multicast stream(s) will then be started at the multicast server
- For this lab, we will have 3 clients connected on the same VLAN.
- Check vlan 30 members on 6360-A
- Get IP addresses from the clients (ipconfig /all) retrieved from dhcp server.
Client 8:
Client 9:
Client 10:
2 IP Multicast Switching
- Open the “send” application from the client's desktop 8. And fill up as below the tool window.
This tool generates multicast IP packets, with Destination IP address (multicast group) 231.1.1.5 on
stream01.
- Click on start
- As the packets are sent check the counters on the VLAN 30 interfaces of 6360-A :
Chassis/Slot/Port : 1/1/2
Operational Status : up,
Port-Down/Violation Reason: None,
Last Time Link Changed : Tue Jul 6 02:14:48 2021,
Number of Status Change : 1,
Type : Ethernet,
SFP/XFP : N/A,
Interface Type : Copper,
EPP : Disabled,
Link-Quality : N/A,
MAC address : 94:24:e1:7c:82:25,
BandWidth (Megabits) : 100, Duplex : Full,
Autonegotiation : 1 [ 1000-F 100-F 100-H 10-F 10-H ],
Long Frame Size(Bytes) : 1552,
Inter Frame Gap(Bytes) : 12,
loopback mode : N/A,
Rx :
Bytes Received : 4020, Unicast Frames : 21,
Broadcast Frames: 2, M-cast Frames : 0,
UnderSize Frames: 0, OverSize Frames: 0,
Lost Frames : 0, Error Frames : 0,
CRC Error Frames: 0, Alignments Err : 0,
Tx :
Bytes Xmitted : 49924, Unicast Frames : 18,
Broadcast Frames: 13, M-cast Frames : 705,
UnderSize Frames: 0, OverSize Frames: 0,
Lost Frames : 0, Collided Frames: 0,
Error Frames : 0, Collisions : 0,
Late collisions : 0, Exc-Collisions : 0
- As you can see in the capture below, by default multicast traffic is flooded on all the port on the same
VLAN as the source.
- Next, enable IP Multicast Switching (IPMS). With IPMS enabled only ports with devices that requested to
see the stream will have it forwarded. Without it, multicast traffic would be treated as a broadcast and
sent to all ports in the VLAN.
• Open the “send” application from the client's desktop 6. And fill up as below the tool window.
This tool generates multicast IP packets, with Destination IP address (multicast group) 233.1.1.5.
- On 6860--B enable Multicast Querying (the switch where the multicast server is connected to):
- Open the “receive” application from the client's desktop 9 to subscribe to multicast traffic.( IP address
(multicast group) 233.1.1.5)
Ingress Egress
Group Address Host Address Tunnel Address Vlan/Service Vlan/Service Interface
---------------+---------------+---------------+--------------+--------------+----------------------
Group Address Source Address Vlan/Service Interface Mode Static Count Life
---------------+---------------+--------------+----------------------+--------+-------+------+-----
231.1.1.5 0.0.0.0 vlan 30 1/1/2 exclude no 3 254
239.255.255.250 0.0.0.0 vlan 30 1/1/2 exclude no 3 227
239.255.255.250 0.0.0.0 vlan 30 2/1/1 exclude no 3 226
239.255.255.250 0.0.0.0 vlan 30 2/1/2 exclude no 4 231
Total 4 Groups
Group Address Source Address Vlan/Service Interface Mode Static Count Life
---------------+---------------+--------------+----------------------+--------+-------+------+-----
239.255.255.250 0.0.0.0 vlan 20 0/78 exclude no 7 239
239.255.255.250 0.0.0.0 vlan 30 1/1/1 exclude no 7 245
231.1.1.5 0.0.0.0 vlan 30 0/8 exclude no 5 245
239.255.255.250 0.0.0.0 vlan 30 0/8 exclude no 14 245
Ingress Egress
Group Address Host Address Tunnel Address Vlan/Service Vlan/Service Interface
---------------+---------------+---------------+--------------+--------------+----------------------
Group Address Source Address Vlan/Service Interface Mode Static Count Life
---------------+---------------+--------------+----------------------+--------+-------+------+-----
239.255.255.250 0.0.0.0 vlan 20 0/7 exclude no 6 196
OMNISWITCH R8
D I S TA N C E V E C T O R M U LT I C A S T R O U T I N G P R O T O C O L
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
Server
Flood
Flood Prune
Prune
Traffic
GRAFT
• Grafting:
• Adding a branch to multicast traffic delivery
• If new IGMP membership requests are received, the router sends a “graft” message
• Graft is only used after a prune
• Waits for “graft ack”
If no ack, re-send
• When prune times out, upstream router starts flooding traffic again (7200 sec.)
• Router receives message, duplicates and sends it to local subscribers, and sends it on (if necessary)
New Tree
Graf
t
Graft
Route Exchange
Client
R3
• Summary of the show commands used for verifying the DVMRP configuration
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNISWITCH R8
P R O T O C O L I N D E P E N D E N T M U LT I C A S T ( P I M )
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
C1
NEIGHBOR DISCOVERY & DESIGNATED ROUTER
• Neighbor Discovery
• PIM Hello
PIM
• Periodic multicast group address packet router
(224.0.0.13= ALL-PIM-ROUTERS group)
PIM Hello
• TTL= 1
• Default = 30 seconds
PIM Hello
• Designated Router (DR) PIM Hello
PIM Join R3
Multicast Traffic
Client
R4
PIM-SM - SPT SWITCHOVER
• Once the multicast traffic goes along the SPT, Server
the last-hop router generates a PIM prune R1 Register-Stop R2
message towards the RP. RP
172.39.2.2
Prune
• The RP stops sending multicast traffic along the
RPT and generates a Register-Stop message that PIM Prune
R3
is sent to the first-hop router Multicast Traffic
Prune
Client
• The first-hop router stops the encapsulation of
the multicast traffic that was sent to the RP and R4
forwards the traffic along the SPT.
RP-SET 5
4
RP Group
Client Server
Client
Client
PIM-DM
-> ip load pim
-> ip pim interface <interface_name >
-> ip pim dense group group_address/prefix_length [[no] override] [priority priority]
-> ip pim dense admin-state enable
PIM-SM - ADVANCED CONFIGURATION
• Candidate Bootstrap Routers (C-BSRs)
-> ip pim cbsr 192.168.3.1 priority 0
• Highest Priority value (0 to 255, default=64) –> Highest IP address
• Static RP
-> ip pim static-rp group_address/prefix_length rp_address [[no] override] [priority priority]
• Interface
• Designated Router (DR)
• Highest Priority value (default=1) –> Highest IP address
-> ip pimsm interface int_name dr-priority priority
• Stub
• Specifies to not send any PIM packets via this interface, and to ignore received PIM packets
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
PIM-SM
How to
✓ This lab is designed to familiarize you with the PIM-SM capability on an
OmniSwitch.
Contents
1 Topology ........................................................................................ 2
2 PIM-SM Configuration ......................................................................... 5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
PIM-SM
1 Topology
Protocol-Independent Multicast (PIM) is an IP multicast routing protocol that uses routing information
provided by unicast routing protocols such as RIP and OSPF. PIM is “protocol-independent” because it does
not rely on any particular unicast routing protocol.
3
PIM-SM
- In the multicast switching lab, all requesting devices in the same VLAN received the multicast stream.
Now let’s move the receivers into different VLANs. This will require the multicast traffic to be routed in
order to reach each receiver. PIM-SM gives us the capability to route multicast traffic.
- A multicast router is by default an IGMP querier, we can disable the querier forwarding on both 6860
- On the 6900, check that OSPF still runs properly and that all client vlans are reachable:
2 PIM-SM Configuration
- Enable PIM-SM in the core routers:
Total 3 Interfaces
Total 3 Interfaces
Total 5 Interfaces
Total 5 Interfaces
Total 2 Neighbors
Total 2 Neighbors
Total 3 Neighbors
Total 3 Neighbors
- Manage the client 1, client 6 and 9 to send and receive multicast traffic as indicated in the tables below.
Example:
Total 1 (S,G)
Source Address Group Address RPF Interface Upstream Neighbor UpTime Flags
---------------+---------------+--------------------------------+-----------------+--------------+--------
192.168.20.70 231.10.10.10 int_217 172.16.17.7 00h:00m:48s ST
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
OR
VRF 1
VRF 2
VRF 3
VRF - VIRTUAL ROUTING AND FORWARDING
VRF - VIRTUAL ROUTING AND FORWARDING
• VRF Interaction With Other Features
VRF Aware. Switch applications that are configurable independently and separately within one or more VRF instances. All VRF aware
applications can be enabled or disabled on each VRF instance
Default VRF. Switch applications that are VRF aware but only use the default VRF instance when IP connectivity is needed; these applications
are not supported across multiple VRF instances.
Non-VRF Aware. Switch applications that have no association with any VRF instance, even the default instance. Note that configuration of this
type of application is only allowed when the default instance is the active CLI context
VRF - VIRTUAL ROUTING AND FORWARDING
• Provides the ability to configure separate • When an IP packet for customer A is
routing instances on the same switch. received on a PE; the VRF A determines how
• Segments layer 3 traffic. to route the packet trough the provider
• Each Provider Edge (PE) maintains more backbone so that it reaches the intended
than one routing table, in addition to the customer A destination
default routing instance. Customer A
Site 2
VRF A VRF B
Customer B
VRF B
Service Provider
Site 1
IP Network
Customer A
Provider Site 3
Customer C Edge 1
Site 1 VRF C VRF B
Provider
Edge 3
VRF C Customer B
Site 2
VRF - VIRTUAL ROUTING AND FORWARDING
VRF
OR Customer
Per VRF QoS
VRF Edge
VRF 1
VRF 2
VRF 3
VRRP
DHCP Server 1
VRRP
DHCP Server 2
Enterprise class MPLS
VRRP
DHCP Server 3
Provider
Edge
VRF - CLI COMMANDS
• Creating a VRF Instance • Assigning IP Interfaces to a VRF Instance
-> vrf create vrpIpOne -> vrf IpOne
IpOne: -> IpOne: -> ip interface intf100 address 100.1.1.1/24 vlan 100
IpOne: ->
• Selecting a VRF Instance
IpOne: -> vrf IpTwo • Removing a VRF Instance
IpTwo: -> -> no vrf IpTwo
Total Number of Virtual Routers: 3 Note: VRF names are case sensitive
• Once a VLAN is associated with a specific VRF instance, configuring an interface for that
VLAN within the context of any other instance, is not allowed
• For example, if the first IP interface configured for VLAN 100 was associated with the VRF IpOne
instance, then any subsequent IP interface configuration for VLAN 100 is only allowed within the
context of the IpOne instance
• Use of Duplicate VLAN numbers is not supported
• VRF CLI context is used to determine the association between a specific routing
configuration and a VRF instance
VRF ROUTE LEAK
• VRF Route Leak forwards routes from one VRF routing table to another VRF routing table,
allowing routing from one VRF to a gateway in another VRF.
• Route maps are used to import and export routes from the VRFs to the GRT.
200.1.1.0
GRT
200.1.1.0
VRF 192.168.130.160
VRF 1
10.255.11.160
192.168.130.0 172.20.0.0
10.255.11.0 172.21.0.0
VRF 2 172.20.0.0 192.168.140.0
172.21.0.0 10.255.12.0
VRF 3 192.168.1.0 192.168.1.0
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Multiple VRF
How to
✓ Configure the Multiple VRF feature in Release 8
Contents
1 Topology ........................................................................................ 2
2 Configuring the Multiple VRF ................................................................ 2
2.1. Configure two VRF on 6900: ...................................................................... 2
2.2. VRF route leaking between two different networks ........................................... 5
2.3. VRF route-leak to leak the routes between 'default' VRF and a another VRF .............. 7
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Multiple VRF
1 Topology
Multiple Virtual Routing and Forwarding (VRF) provides a mechanism for segmenting Layer 3 traffic into
virtual routing domains (instances) on the same switch. Each routing instance independently maintains its
own routing and forwarding table, peer, and interface information.
- Create two vlan and untagged them on port 1/1/ and 1/1/12
o Client 4:
- Ping each other to test connection between them. What happens and why?
----------------------------------------------------------------------------------------------------------------------------- -
----------------------------------------------------------------------------------------------------------------------------- -
5
Multiple VRF
Manage VRF route leaking between two different networks which are present in different VRF's
We will not be able to ping an IP interface of another VRF instance from one VRF instance within the same switch even
the leaked routes are existed. This is due to security reason
However, clients in two different VRF's can ping each other using the route-map filtering option
In this ipone, using rout-map ("vlan190") local route (192.168.190.0/24) is exported to GRT. Only those FDB
(Forwarding Routing Database) routes that match the conditions of the route map are exported to GRT.
And allowing leaked route 192.168.200.0/24 to ingress in the VRF1 using the route-map " vlan200".
ipone::sw1 (6900-A) -> ip route-map "vlan190" sequence-number 50 match ip-address 192.168.190.0/24 redist-
control all-subnets permit
ipone::sw1 (6900-A) -> ip route-map "vlan200" sequence-number 50 match ip-address 192.168.200.0/24 redist-
control all-subnets permit
In this vrf “ iptwo “, using rout-map (vlan200) local route (192.168.200.0/24) is exported to GRT. Only those FDB
(Forwarding Routing Database) routes that match the conditions of the route map are exported to GRT.
And allowing leaked route 192.168.190.0/24 to ingress in the VRF” iptwo” using the route-map " vlan190".
2.3. VRF route-leak to leak the routes between 'default' VRF and a another VRF
- Ping from client 1 ping 192.168.100.102 and do the same from client 4.
- With this above configuration only the client1 should be able to ping the 192.168.100.102.
OMNISWITCH R8
MACSEC
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
MACsecDynamic
Host (MACsec) Mode Using EAP
MACSEC OVERVIEW
AOS Switches – MACsec Platform Support
OmniSwitch 6560
OmniSwitch 6465
OS6465T-12 and
Not supported on ports 11 and 12.
OS6465T-P12
Note: 128-bit platforms (e.g. 6465 or 6860E) in the access-layer can work
with the 6900-X48E supporting both 128 and 256-bit in the distribution/core.
MACSEC OVERVIEW
• MACsec Licensing Requirement
• MACsec feature requires a site license, this license can be generated free of cost
G e t o r g e n e r a t e R a n d o m Ke y s Switch A Switch B
C r e a t e s e c u r i ty k e y s Static SA Mode
( b o t h s w i t c h e s)
C r e a t e k e y - c h a in
( b o t h s w i t c h e s)
Up to 4 manually configured SA
A s s o c i a te s e c u r i ty k e y t o k e y - c h a i n keys are used to secure traffic
on the point-to-point link
( b o t h s w i t c h e s) between two nodes
C o n f ig u r e s c i - tx / sc i - r x f o r a p o r t w i t h
k e y - c h a in E n a b l i n g o p t i o n “ e n c r y pt io n ” * MACsec - Static mode is not supported on OS6860N.
if any and enable MACSEC for the port
( b o t h s w i t c h e s)
MACSEC CONFIGURATION Switch A Switch B
G e t R a n d o m Ke y s p r e - s h a r e d k e y
C r e a t e s e c u r i ty k e y s
C r e a t e k e y - c h a in
A s s o c i a te s e c u r i ty k e y t o k e y - c h a i n
C o n f ig u r e d y n a m ic m o d e / p o r t w i t h
k e y - c h a in E n a b l i n g o p t i o n “ e n c r y pt io n ”
if any and enable MACSEC for the port
MACSEC CONFIGURATION
• MACsec Mode Dynamic (Using EAP) – how it works
• IEEE 802.1X authenticates the endpoint and transmits the necessary cryptographic keying material
to both sides
• Endpoint undergoes authentication and the he switch relays the RADIUS server response and sniffs
the Master key to program it on the connected port.
C r e a t e n e c e ss a r y U N P Pr o f i l e
f o r l e a r n i n g s u p p l ic a n t
C o n f ig u r e R a d i u s S e r v e r u s e d
f o r 8 0 2 . 1 x - a u th e n ti c a ti o n
If Successful Radius
Auth returns UNP-
Profile “employee“
which ap the vlan
MONITORING COMMANDS
• Show command
show interfaces capability
show configuration snapshot macsec
show interfaces macsec [<chassis>/<slot>/<port1>[-<port2>]]
show interfaces macsec static [<chassis>/<slot>/<port>[-<port2>]]
show interfaces macsec dynamic [<chassis>/<slot>/<port>[-<port2>]]
show interfaces macsec dynamic details [<chassis>/<slot>/<port>[-<port2>]]
show interfaces macsec statistics [ <chassis>/<slot>/<port>]
MACSEC SECURITY ADMIN USER ACCOUNT
• How It Works
• MACSec feature is now part of the security domain when creating a new user account to configure
the switch
• This allows the user to issue a MACSec security command compared to basic admin
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Macsec
How to
✓ This lab is designed to familiarize you with the MACsec feature
Contents
1 Overview ....................................................................................... 3
2 Topology ........................................................................................ 4
3 Prerequisite For switch 8 type 6860N ...................................................... 5
3.1. Initialize both switches ............................................................................ 5
3.2. Check available port for MACsec capability .................................................... 5
3.3. Check available licence MACsec capability on 6860 -A ....................................... 6
3.4. Check available licence MACsec capability on 6860 -B........................................ 6
3.5. Implement a link between switches ............................................................. 7
4 Dynamic SA Mode – Switch-to-Switch links for swith 6860N............................. 8
4.1. Configure keychain 1 with pre-shared Master key ............................................. 8
4.2. Configure keys and keychain and associate them in both switches ......................... 8
4.3. Monitor Macsec implementation ................................................................. 9
5 Prequisites - Configure For 6860 Swith 8 type 6860 or a 6860e ...................... 10
5.1. Initialize both switches ........................................................................... 10
5.2. Check available port for MACsec capability ................................................... 10
5.3. Check available licence MACsec capability .................................................... 11
5.4. Implement a link between switches ............................................................ 11
6 Dynamic SA Mode – Switch-to-Switch links .............................................. 12
6.1. Configure keychain 1 with pre-shared Master key ............................................ 12
6.2. Configure keys and keychain and associate them in both switches ........................ 12
6.3. Monitor Macsec implementation ................................................................ 13
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Macsec
7 Appendix. .................................................................................... 14
7.1. Static SA Mode – Switch-to-Switch links ...................................................... 14
7.1.1. Configure the keys and keychains ............................................................... 14
7.1.2. Configure keys and keychain and associate them in both switches ........................ 14
7.1.3. Configure sci-tx/sci-rx for a port ............................................................... 15
7.1.4. Monitor Macsec implementation ................................................................ 15
7.1.5. Remove MACsec configuration ................................................................... 16
7.2. MACsec Mode Dynamic (Using EAP) - Management steps .................................. 17
3
Macsec
Implementation
1 Overview
MACSec provides point-to-point security on Ethernet links between directly connected nodes.
- IEEE standard (802.1AE-2006) for encryption over Ethernet. Encrypt and authenticate all traffic in a LAN
with GCM-AES-128.
Using MACSec prevents DoS attacks, intrusion, wire-tapping, masquerading, etc. MACSec can be used to secure
most of the traffic on Ethernet links – LLDP frames, LACP frames, DHCP/ARP packets, etc
MACSec-enabled links are secured by matching security keys. Data integrity checks are done. Optionally, traffic
can also be encrypted, if enabled by user configuration
Three modes are In AOS OmniSwitch :
- Static SA Mode – Switch-to-Switch links
- Dynamic SA Mode – Switch-to-Switch links
- Dynamic SA Mode – Host-to-Switch links
We are going to cover the second mode in this lab.
- Only dynamic mode is available on 6860N.
- Host-to-Switch links is not covered as Native Window supplicant doesn’t seem to support MACSec.
- Nevertheless two examples of configuration step are given at the end of the lab in appendix.
4
Macsec
2 Topology
Depending on the POD LAN you use, we have two types of switches.On most PODs, we have a 6860N for
switch 8.
On PODs also used for stellar courses, we have a 6860 model instead of a 6860N.
We can't use port 25 on the 6860N as we can on the 6860 for MACsec. In 6860N model we need to use port 27.
We, therefore, ask you to check the type of 6860 switch you have available before configuring the
appropriate ports.
Example with 6860N
sw8 (6860-B) -> sh chassis
Local Chassis ID 1 (Master)
Model Name: OS6860N-P24Z,
Module Type: 0x60e220b,
Description: 12G 12 MG POE 4 25G,
Part Number: 904300-90,
Hardware Revision: 02,
Serial Number: JSZ223501680,
Manufacture Date: Aug 30 2022,
Admin Status: POWER ON,
Operational Status: UP,
Number Of Resets: 77,
MAC Address: 94:24:e1:e8:b4:13
Notes
We are going to Create a "User-defined directories" call “labmacsec” and boot both switches on it for this lab.
At the end of the lab, we are going to restart to working directory to retrieve initial configuration.
5
Macsec
- Create a User-defined directories “labmacsec” and boot the switches from the new user-defined
directory (labmacsec):
- Type the following to create a user defined directory, copy the contents of the labinit directory to it and
once the switch boots, verify that it booted from the “labmacsec” directory:
sw8 (6860-B)
-> mkdir labmacsec
sw8 (6860-B)
-> cp labinit/*.* labmacsec
sw8 (6860-B)
-> ls labmacsec
sw8 (6860-B)
->reload from labmacsec no rollback-timeout
Confirm Activate (Y/N): y
sw8 (6860-B) ->show running-directory
- Create the license.dat file and copy the License to it, then apply.
- Create the license.dat file and copy the License to it, then apply.
- To begin, let’s create a new VLAN and assign an IP address to that VLAN as done previously
hex-key 0x000102030405060708090a0b0c0d0e0f
keyed-name 0x000102030405060708090a0b0c0d0eff
4.2. Configure keys and keychain and associate them in both switches
- Configure keys
sw7 (6860-A) -> security key 1 algorithm aes-cmac-128 hex-key 0x000102030405060708090a0b0c0d0e0f keyed-
name 0x000102030405060708090a0b0c0d0eff
sw8 (6860-B) -> security key 1 algorithm aes-cmac-128 hex-key 0x000102030405060708090a0b0c0d0e0f keyed-
name 0x000102030405060708090a0b0c0d0eff
- Create key-chain
sw7 (6860-A) -> security key-chain 1
- Configure dynamic mode on port with the above key-chain with Session time (10 min) and Exchange data
(received or transmitted) between the MACSEC endpoints to 20G.
sw7 (6860-A) -> interfaces port 1/1/27 macsec mode dynamic key-chain 1 encryption
sw7 (6860-A) -> interfaces 1/1/27 macsec key-rotation max-session-time 10
sw7 (6860-A) -> interfaces 1/1/27 macsec key-rotation max-exchange-data 20
sw7 (6860-A) -> interfaces port 1/1/27 macsec admin-state enable
sw8 (6860-B) -> interfaces port 1/1/27 macsec mode dynamic key-chain 1 encryption
sw8 (6860-B) -> interfaces 1/1/27 macsec key-rotation max-session-time 10
sw8 (6860-B) -> interfaces 1/1/27 macsec key-rotation max-exchange-data 20
sw8 (6860-B) -> interfaces port 1/1/27 macsec admin-state enable
-
sw8 (6860-B) -> show interfaces macsec dynamic key-rotation
- At the end of this lab, restore both switches to initial configuration by restarting them from "working
directory".
- Create a User-defined directories “labmacsec” and boot the switches from the new user-defined
directory (labmacsec):
- Type the following to create a user defined directory, copy the contents of the WORKING directory to it
and once the switch boots, verify that it booted from the “labmacsec” directory:
sw8 (6860-B)
->mkdir labmacsec
sw8 (6860-B)
->cp labinit/*.* labmacsec
sw8 (6860-B)
->ls labmacsec
sw8 (6860-B)
->reload from labmacsec no rollback-timeout
Confirm Activate (Y/N): y
sw8 (6860-B) ->show running-directory
- To begin, let’s create a new VLAN and assign an IP address to that VLAN as done previously
hex-key 0x000102030405060708090a0b0c0d0e0f
keyed-name 0x000102030405060708090a0b0c0d0eff
6.2. Configure keys and keychain and associate them in both switches
- Configure keys
sw7 (6860-A) ->
security key 1 algorithm aes-cmac-128 hex-key 0x000102030405060708090a0b0c0d0e0f keyed-name
0x000102030405060708090a0b0c0d0eff
sw8 (6860-B) -> security key 1 algorithm aes-cmac-128 hex-key 0x000102030405060708090a0b0c0d0e0f keyed-
name 0x000102030405060708090a0b0c0d0eff
- Create key-chain
sw7 (6860-A) -> security key-chain 1
sw8 (6860-B) -> interfaces port 1/1/25 macsec mode dynamic key-chain 1
- At the end of this lab, restore both switches to initial configuration by restarting them from "working
directory".
7 Appendix.
7.1.2. Configure keys and keychain and associate them in both switches
o In this example, we used key generated above. If you generate new keys, do not forget to
replace it below in command line
sw7 (6860-A) -> security key 1 algorithm aes-gcm-128 encrypt-key ef68850d93b82fb494843f66f5864cc5
Tips
Up to 4 manually configured SA keys are used to secure traffic on the point-to-point link between two nodes)
- Create key-chain
sw7 (6860-A) -> security key-chain 1
sw7 (6860-A) -> security key-chain 2
- Configure sci-tx/sci-rx for a port with the above key-chain. Enabling option “encryption” if any and
enable MACSEC for the port
sw7 (6860-A)-> interface 1/1/25 macsec admin-state enable sci-tx key-chain 1 encryption sci-rx key-chain 2 encryption
sw8 (6860-B)-> interface 1/1/25 macsec admin-state enable sci-tx key-chain 2 encryption sci-rx key-chain 1 encryption
Tips
//Example for “no” format:
// Un-configure macsec sci-tx params
-> no interface 1/1/25 macsec sci-tx key-chain
-> no interface 1/1/25 macsec sci-tx encryption
-> no interface 1/1/25 macsec sci-tx
- This part is not working on remote lab as MACsec are not available on Window XP/7 client host. This is a n
example of management step.
- Create necessary UNP Profile for learning supplicant. If Successful Radius Auth returns UNP-Profile
“employee" which ap the vlan 30
vlan 30
unp profile “employee“
unp profile “employee” map vlan 30
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
Ring 1
• Fast recovery times (~50 ms)
• Dedicated Protocol
• APS (Automatic Protection Switching)
RPL Owner
RPL Protection Link
Blocked RPL port
RING FAILURE
• Failure! (Ring Mode: Protection) 1
4
RPL Owner
RPL Protection Link
Unblocked RPL port
2 2
SF (Signal Fail) SF (Signal Fail)
3 3
R-APS MESSAGE R-APS MESSAGE
RECOVERY
• Recovered Link 1
• Other nodes unblock their ring ports (Ring Mode: Idle) 6 NR/RB (No Request)
5
RPL Owner
6 6
NR (No Request) NR (No Request)
2 2
LADDERED RINGS (ERPV2)
A B
• Laddered rings are composed of:
• A Main ring Main
• One or more Subtending ring(s) Ring
A B C D
Main Subtended
Ring Ring
C D E F
ETHERNET RING PROTOCOL (ERP)
Specifications
ERP CONFIGURATION
ERP CONFIGURATION
Step by Step
ERP Ring
1/1 1/2
3 4
1/4 1/3
ERP CONFIGURATION
Step by Step
ERP Ring
1/1 1/2
3 4
1/4 1/3
RPL Port
ERP CONFIGURATION
Step by Step
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Ethernet Ring Protection
How to
✓ Create an ERP Ring and check its behavior
Contents
1 Topology ........................................................................................ 2
2 Configure ERPv2 ring ......................................................................... 3
2.1. Initialize switches .................................................................................. 3
2.2. Configure VLANs on the switches ................................................................ 3
2.3. Configure the ERP on all switches................................................................ 4
2.4. Make the physical connections according to the lab diagram ................................ 5
2.5. Check the ERP Ring 1 setup by performing some show commands. ......................... 5
3 Lab Check ...................................................................................... 7
3.1. Connect clients to switches ....................................................................... 7
3.2. Test the feature .................................................................................... 8
4 ERP Sub ring 2 configuration ................................................................ 8
4.1. Connect clients to switches ...................................................................... 10
4.2. Test the feature ................................................................................... 11
5 Access - Core resiliency .................................................................... 11
5.1. VRRP Verification .................................................................................. 12
6 Restore ....................................................................................... 13
6.1. Switch At the end of this lab, restore the four switches
to initial configuration by restarting them from "working directory". ..................... 13
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Ethernet Ring Protection
1 Topology
Ethernet Ring Protection (ERP) is a protection switching mechanism for Ethernet ring topologies, such as
multi-ring and ladder networks. This implementation of ERP uses the Automatic Protection Switching (APS)
protocol to coordinate the prevention of network loops within a bridged Ethernet ring.
ERP is used to prevent formation of loops which would fatally affect the network operation and service
availability.
Configuring ERP requires several steps. These steps are outlined here and more described in relevant
OmniSwitch AOS Release Network Configuration Guides.
- For this lab, you will learn how to configure the ring network (including a major ring and a sub ring)
parameters through the Command Line Interface (CLI).
3
Ethernet Ring Protection
- Create a User-defined directories “labERP” and boot the switches from the new user-defined directory
labERP):
- Type the following to create a user defined directory, copy the contents of the labinit directory to it and
once the switch boots, verify that it booted from the “labERP” directory:
sw8 (6860-B)
-> mkdir labERP
sw8 (6860-B)
-> cp labinit/*.* labERP
sw8 (6860-B)
-> ls labERP
sw8 (6860-B)
->reload from labERP no rollback-timeout
Confirm Activate (Y/N): y
sw8 (6860-B) ->show running-directory
Notes: VLAN 1001 is the Service VLAN for ERP Ring 1, VLAN 20 and 30 are Protected VLAN.
Service VLAN is used for the transmission and reception of R-APS Channel (tagged R-APS
messages) and the ETH CCM (tagged CCM) for a given ring.
- On 6860-A, tag Vlan 1001, VLAN 20 and 30 to the assigned ring ports 1/1/3 and 1/1/27:
sw7 (6860-A) -> vlan 1001 members port 1/1/3 tagged
sw7 (6860-A) -> vlan 1001 members port 1/1/27 tagged
sw7 (6860-A) -> vlan 20 members port 1/1/3 tagged
sw7 (6860-A) -> vlan 20 members port 1/1/27 tagged
sw7 (6860-A) -> vlan 30 members port 1/1/3 tagged
sw7 (6860-A) -> vlan 30 members port 1/1/27 tagged
- On 6860-B, tag Vlan 1001, VLAN 20 and 30 to the assigned ring ports 1/1/3 and 1/1/27:
sw8 (6860-B) -> vlan 1001 members port 1/1/3 tagged
sw8 (6860-B) -> vlan 1001 members port 1/1/27 tagged
sw8 (6860-B) -> vlan 20 members port 1/1/3 tagged
sw8 (6860-B) -> vlan 20 members port 1/1/27 tagged
sw8 (6860-B) -> vlan 30 members port 1/1/3 tagged
sw8 (6860-B) -> vlan 30 members port 1/1/27 tagged
- On 6360-A, tag Vlan 1001, tag VLAN 20 and 30 to the assigned ring ports 1/1/3 and 1/1/27:
sw5 (6360-A) -> vlan 1001 members port 1/1/3 tagged
sw5 (6360-A) -> vlan 1001 members port 1/1/27 tagged
sw5 (6360-A) -> vlan 20 members port 1/1/3 tagged
sw5 (6360-A) -> vlan 20 members port 1/1/27 tagged
sw5 (6360-A) -> vlan 30 members port 1/1/3 tagged
sw5 (6360-A) -> vlan 30 members port 1/1/27 tagged
- On 6360-B , tag Vlan 1001, VLAN 20 and 30 to the assigned ring ports 1/1/3 and 1/1/27:
sw5 (6360-A) -> erp-ring 1 port1 1/1/3 port2 1/1/27 service-vlan 1001 level 2
sw5 (6360-A) -> erp-ring 1 enable
Notes
- For ERP Ring 1, the RPL owner is switch 6360-B. Each ring must have its own RPL
- Mandatory parameters for ring creation are a unique ring ID, two physical or logical ports, Service
VLAN and MEG level.
- The maximum number of rings per node that can be created depends on switch model (refer to the
latest AOS Network Configuration guide)
- A maximum number of 16 nodes per ring is recommended.
- Physical switch ports and logical link aggregate ports can be configured as ERP ring ports.
2.5. Check the ERP Ring 1 setup by performing some show commands.
- On all nodes, check the ERP setup:
- Example:
Notes
ERP Ring States:
- idle: the RPL port is blocking, indicating that the topology is stable. the node is performing normally.
- Protection: on link failure, NI down, or node down of erp nodes. The RPL node is now forwarding and
the ring is said to be protected.
- Pending: The node is recovering from failure. When a node is in pending state, the WTR timer will be
running. All nodes are in pending state till WTR timer expiry.
7
Ethernet Ring Protection
3 Lab Check
- Client 7:
- On 6860-A:
- Client 6:
- On 6360-B:
- Client 8:
- On 6860-B:
- Client 9:
- On 6360-A:
- Re-connect (enable) the link in ERP Ring 1. Check status of ERP ring. What happens?
.................................................................................................................
.................................................................................................................
sw3 (6560-A) -> erp-ring 2 port1 1/1/5 port2 1/1/6 service-vlan 1002 level 2
sw3 (6560-A) -> erp-ring 2 enable
Ring Ring Ring Ring Serv WTR Guard MEG Ring Ring Ring Remote
ID Port1 Port2 Status VLAN Timer Timer Level State Node Profile System ID
(min) (csec)
----------+--------+--------+---------+-----+-----+------+-----+-----------+--------+--------+------------
---
2 1/1/5 1/1/6 enabled 1002 5 50 2 idle non-rpl N/A
N/A
Ring Ring Ring Ring Serv WTR Guard MEG Ring Ring Ring Remote
ID Port1 Port2 Status VLAN Timer Timer Level State Node Profile System ID
(min) (csec)
----------+--------+--------+---------+-----+-----+------+-----+-----------+--------+--------+------------
---
1 1/1/3 1/1/27 enabled 1001 5 50 2 idle non-rpl N/A
N/A
2 1/1/5 - enabled 1002 1 50 2 idle rpl N/A
N/A
Ring Ring Ring Ring Serv WTR Guard MEG Ring Ring Ring Remote
ID Port1 Port2 Status VLAN Timer Timer Level State Node Profile System ID
(min) (csec)
----------+--------+--------+---------+-----+-----+------+-----+-----------+--------+--------+------------
---
1 1/1/27 1/1/3 enabled 1001 1 50 2 idle rpl N/A
N/A
2 1/1/6 - enabled 1002 5 50 2 idle non-rpl N/A
N/A
- Client 3:
- On 6560-A:
- Client 5:
- On 6360-A:
- Re-connect (enable) the link in ERP Ring 1. Check status of ERP ring. What happens?
.................................................................................................................
.................................................................................................................
6 Restore
6.1. Switch At the end of this lab, restore the four switches to initial configuration by restarting
them from "working directory".
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
This type of data isolation improves security and simplifies system configuration
PRIVATE VLAN - VLAN TYPES
• PVlan divides the broadcast domain into sub-domains
Secondary VLAN
Primary VLAN • VLAN associated with the Primary
VLAN
• VLAN referred as Private VLAN − Same primary vlan IP space
− Same primary vlan SPT state
• 2 Vlan types
PVLAN
Isolated Vlan
Community Vlan
PVLAN
◼ Ports C1,C2,C3 are UNP ports whose client is assigned to Community vlan 103
◼ Ports C4,C5 are UNP ports whose client is assigned to Community vlan 102
Phone community
Private VLAN 100 VLAN 103
ISL
All private VLANs tagged
Community
100,101,102,103
VLAN 102 Community
C4 C5 VLAN 103
C3
I1 I2
Isolated
VLAN 101 Switch 1 Switch 2
Switch 3
Promiscuous
C1 C2 port
Community
VLAN 103 OV 2500
IP services and
internet
Phone community
VLAN 103
PRIVATE VLAN – SPECIFICATIONS
PRIVATE VLAN – CONFIGURATION EXAMPLE
pvlan 100 admin-state enable
pvlan 100 secondary 101 type community
pvlan 100 secondary 103 type isolated
pvlan
pvlan
100
101
members port 1/1/20 untagged
members port 1/1/1 untagged
PVLAN 100
1/1/20
pvlan 101 members port 1/1/15 untagged
pvlan 103 members port 1/1/16-17 untagged
1/1/17
Primary
Vlan
1/3/12
Isolated Vlan 103
Community Vlan 101
2/1-2
pvlan 100 admin-state enable
pvlan 100 secondary 101 type community
pvlan 100 secondary 103 type isolated
pvlan 100 members port 1/3/20 untagged
pvlan 100 members linkagg 1 isl PVLAN 100 1/1/20
pvlan 101 members port 1/3/1 untagged
pvlan 101 members port 1/3/12 untagged 1/1/17
1/1/15
pvlan 103 members port 1/3/14-15 untagged 1/1/1
1/1/16
• If the first MAC address is learned on a UNP port is classified into a UNP
Community VLAN, the port is designated as a community port. PVLAN
• If the first MAC address learned on the a UNP port is classified into
any standard VLAN (non-PVLAN), then the UNP port cannot be
Isolated Vlan
designated as an isolated or community port. Community Vlan
UNP
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Private VLAN
How to
✓ Setup the Private VLAN feature on the OmniSwitch
Contents
1 Objective ....................................................................................... 2
2 Private VLAN Overview ....................................................................... 2
3 Lab Diagram .................................................................................... 2
4 Create a User-defined directories labPVLAN .............................................. 3
5 Configuring Link aggregation between 6860’s ............................................ 3
6 Configuring the Private VLAN................................................................ 4
6.1. Configuring the Private VLAN ..................................................................... 4
6.2. Configuring the PC Clients ........................................................................ 4
7 Testing the Configuration .................................................................... 4
7.1. Testing the Community VLAN ..................................................................... 4
7.2. Testing the Isolated VLAN ......................................................................... 5
8 Deleting the Configuration ................................................................... 5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Private VLAN
Implementation
1 Objective
This lab is designed to familiarize you with the concept of Private VLAN (PVLAN). This feature provides the
ability to isolate Layer 2 data between devices that are on the same VLAN. This type of data isolation
improves security and simplifies system configuration.
3 Lab Diagram
3
Private VLAN
- Create a User-defined directories “labPVLAN” and boot the switches from the new user-defined directory
(labPVLAN):
- Type the following to create a user defined directory, copy the contents of the labinit directory to it and
once the switch boots, verify that it booted from the “labPVLAN” directory:
- Configure a Primary VLAN 250 on both switches and assign the link aggregation group 78 as an Inter-
Switch-Link for this VLAN:
sw7 (6860-A) -> pvlan 250 admin-state enable
sw7 (6860-A) -> pvlan 250 members linkagg 78 isl
- Check that the Secondary VLAN’s are associated to the Primary VLAN:
6860 -> show pvlan mapping
Primary Secondary
VLAN VLAN Type
----------+----------+------------
250 251 Community
250 252 Isolated
- Move ports 1/1/1 on both switches to VLAN 251 which is the Community VLAN:
6860 -> pvlan 251 members port 1/1/1 untagged
This command should be successful as both PC’s now belong to the same community VLAN. Remember
that all the ports that are part of the same community VLAN can communicate between each other.
- Now, let’s check the Isolated VLAN by moving both ports to VLAN 252:
6860 -> no pvlan 251 members port 1/1/1
6860 -> pvlan 252 members port 1/1/1 untagged
This command should not work because both PC’s now belong to the same Isolated VLAN. Remember that
in an Isolated VLAN hosts cannot communicate between each other.
- When the tests are completed, delete the PVLAN configuration with the following commands:
6860 -> no pvlan 252 members port 1/1/1
6860 -> no pvlan 250 members linkagg 78
6860 -> no pvlan 250
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
AS AS
ISP
IGP EGP
BGP4
• Border Gateway Protocol • Used to:
• Current version: 4 • See the Internet Network (received IP routes)
• Exterior routing protocol used to make policy • Advertise our own network (announce IP routes)
routing decisions between autonomous systems • Influence the inbound traffic flow
(AS) • Influence the outbound traffic flow
• Standardized: RFC 4271
• Listens on port 179 / TCP
• Optional authentication IGP
• MD5: adds an option to TCP AS 100
(digest based on pseudo Header + header + data + AS 999
shared password)
BGP IGP
• Point-to-point over directly connected
interfaces or Multi-hop between non-adjacent
routers BGP
BGP
• Routing information is exchanged in BGP Update
messages AS 1
IGP
AS DEFINITION
• Autonomous Systems OSPF
OSPF
• An autonomous system (AS) is a set of routers
that are under a single technical administration OSPF
OSPF
• Normally, use a single interior gateway protocol OSPF
and a common set of metrics to propagate
routing information within the set of routers
• To other ASs, an AS appears to have a single,
coherent interior routing plan and presents a
consistent picture of what destinations are Destination reachable
reachable through it
194.10.10.0 /24
• Identified by AS number (1-65535) Private ASNs 194.12.10.0 /23
194.13.10.0 /24
from 64512-65535 Etc….
BGP PEERING AND BGP NEIGHBORS
• Internal BGP Neighbor • External BGP Neighbor
• A router that falls under the administrative control • A router whose administrative and policy control is
of a single AS and is assumed to follow a consistent outside of your AS
policy with other BGP speakers of that AS • Send and receive BGP information to or from
• Internal BGP neighbors are reachable by static other AS
routes, internal routing protocol, or directly
connected
BGP
BGP
OSPF RIP
BGP
IBGP peering
• Peering
• Two routers with a BGP connection are neighbors or EBGP peering
peers
• Peers can be external (EBGP) or internal (IBGP)
• No need of direct connection between IBGP peers
• EBGP peers are usually directly connected
BGP PEER/NEIGHBOR
• No dynamic discovery • Connection State
• (Selective) Route exchange • Idle – waiting for incoming connection TCP port 179
• Connect – setting up a TCP session
• Keepalive mechanism
• Active – unable to create a TCP session
• 4 four message types • OpenSent - sending out its OPEN message
• Open • OpenConfirm – waiting for the KEEPALIVE message
• Keepalive • Established – BGP session is up
• Update
• Notification
AS 54
AS 4
BGP ROUTE INFORMATION
• Path Vector Protocol
• BGP advertisement is made of:
• Prefix
• Attribute
AS 25
R2
192.168.1.0
R1
AS 54
R3
AS 4
BGP UPDATE
• Between BGP neighbors
• To advertise new route/prefix
• To withdraw previously advertised route/prefix
AS 25
AS 54 192.168.1.0
R1 R3
BGP UPDATE
BGP ATTRIBUTE (1)
• Part of the update message
• Variable length
• Can be:
• Well-known mandatory
• Well-known discretionary
• Optional transitive
• Optional nontransitive
AS 25
AS 54 192.168.1.0
R1 R3
BGP ATTRIBUTES OVERVIEW
AS-PATH ATTRIBUTE
• Well-known mandatory attribute
AS 25
• List of traversed ASes R1 192.168.1.0
R2
AS 54 R3
AS 401
R4
AS 23 R5
AS 4
192.168.1.0 AS ( 23,401,54,25)
NEXT-HOP ATTRIBUTE (1)
• Well-known mandatory attribute
• IP address of the next node towards destination
R1
R3
10.1.1.2
R2
10.1.1.3
AS 25
192.168.1.0
NEXT-HOP ATTRIBUTE (2)
• IBGP conserves the next hop attribute learned over EBGP
• When BGP Synchronization if off, “next-hop-self” can act as a workaround to validate the BGP path
R3 R1
10.1.1.2/24
R2
AS 25
10.1.1.3/24 192.168.1.0
ORIGIN ATTRIBUTE
• Well-known mandatory attribute
AS 54 AS 250
172.18.0.0
R1 172.18.0.0 /8
Local pref = 200
AS 3400
AS 100
R2
172.18.0.0 /8
Local pref = 100
BGP LOCAL PREFERENCE METRIC
AS 600
198.100.28.1
Chicago
198.101.24.0
Atlanta
200.100.50.1
AS 300 AS 500
Local
Preference = 200
ATOMIC AGGREGATE ATTRIBUTE
• Well-known discretionary attribute
• CIDR support (Only BGP 4)
• Informs that routes are aggregated
AS 54 AS 650 AS 20
AS 10 150.215.30.0 /28
MULTI EXIT DISCRIMINATOR (MED)ATTRIBUTE
• Optional non-transitive attribute
• Specify a most preferred path to an AS
AS 54 172.18.0.0/16
R1 MED = 100
R4
R2
172.18.0.0/16
172.18.0.0/16
MED = 200 R3 AS 250
BGP MULTI-EXIT DISCRIMINATOR
• Inbound Metric
• Meaning: “How I prefer receiving the traffic from you”
• When two autonomous systems have multiple links with each other, the MED (Multi-Exit
Discriminator) informs the other AS of recommended entrance points
• Lower MED value is preferred
• Default setting for MED = 0
• Metric is non-transitive
• Only shared between two autonomous systems
• Passed from one AS to a second AS
• When the second AS advertises the networks from the first AS, MED value is set back to 0 before
leaving second AS
BGP MULTI-EXIT DISCRIMINATOR
AS 100
MED for
198.100.28.1
198.101.24.0 = 300
AS 200
MED for
198.101.24.0
198.101.24.0 = 100
200.100.50.1
200.100.50.1
AS 300 AS 100
Router B
AS 200
198.101.24.0 198.101.24.0 /21 ISP A
198.101.25.0
198.101.26.0
198.101.27.0
198.101.28.0
198.101.29.0
198.101.30.0
198.101.31.0 Router A
198.101.24.0 /21 Internet
COMMUNITY ATTRIBUTE
• Optional transitive attribute
• Permits to tag routes with an indicator
• Filtering can be implemented based on tags
Community Action
• Define AS
-> ip bgp autonomous-system 100
• Create a BGP peer entry
-> ip bgp neighbor 100.10.1.1
• Create Peer relationship with authentication
-> ip bgp neighbor 100.10.1.1 > remote-as
-> ip bgp neighbor < 100.10.1.1 > md5 key
-> ip bgp neighbor < 100.10.1.1 > status enable
-> show ip bgp neighbors
Nbr address As Admin state Oper state BgpId
--------------+----+-----------+------------+-------------
192.40.4.29 3 enabled estab 192.40.4.29
192.40.4.121 5 disabled idle 0.0.0.0
BGP PEER SESSION WITH LOOPBACK0
• BGP peering is based on the Loopback0 IP interface address of the peering router
• binding the source (i.e., outgoing IP interface for the TCP connection) to its own configured Loopback0
interface
• Loopback0 IP interface address can be used for both Internal and External BGP peer sessions
-> ip bgp neighbor 100.10.1.1 update-source Loopback0
• ebgp-multihop parameter
• For EBGP sessions, if the External peer router is multiple hops away
-> ip bgp neighbor 100.10.1.1 ebgp-multihop
BGP SPLIT HORIZON
Routes learned via IBGP should never be
Propagated to other IBGP peers
R1 AS 4
R5
R3
R2
AS 4
R4
BGP SYNCHRONIZATION
R4
R1 EBGP peers
AS 54
172.31.0.0
IBGP
R5 peers
EBGP peers R3
10.3.0.0 AS 4
R2 23.0.0.0/8
Route-map example
If BGP update matches aspath-list
If prefix-list = <value>
Set network local_preference = <value>
BGP POLICY MATCHING FLOWCHART
Match ?
ip bgp policy aspath-list 1
Yes
policy ip bgp policy prefix-list 2
Denied->
Action?
ip bgp policy community-list 3 Evaluation
stopped
-> ip bgp policy community-list commfilter 600:1 < action permit / match-type exact /priority 3
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
BGP
How to
✓ Configure a BGP connection
Contents
1 Topology ........................................................................................ 2
2 Create a User-defined directory ............................................................ 3
3 Lab Prerequisites .............................................................................. 3
3.1. Configure VLANs on all switches ................................................................. 3
3.2. Configure ospf on all switches .................................................................... 4
3.3. “WAN” Configuration .............................................................................. 6
3.4. WAN Connectivity .................................................................................. 6
3.5. BGP Connectivity ................................................................................... 6
3.6. Redistributing Routes .............................................................................. 7
3.7. Gathering Routing Information ................................................................... 8
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
BGP
1 Topology
3
BGP
- Type the following to create a user defined directory, copy the contents of the labinit directory to it and
once the switch boots, verify that it booted from the “labbgp” directory:
3 Lab Prerequisites
- On Switch 6900-A:
- On Switch 6900-B:
- On Switch 6860-A:
- On Switch 6860-B:
- On Switch 6900-A:
- On Switch 6860-A:
- On Switch 6900-B:
- On Switch 6860-B:
With the commands above, we have now two independent networks (two AS), each network runs an
separate IGP protocol (here we use ospf) within its AS.
Next, configure BGP to advertise routes between each of two Autonomous Systems.
6
BGP
We are using the network 192.168.12.0/24 between the switches 1 and 2, and network
192.168.34.0/24 between the switches 3 and 4. The network should be complete and up now.
- On Switch 6900-A:
- On Switch 6900-B:
- On Switch 6860-A:
- On Switch 6860-B:
The commands above created an AS identifier for each switch. Additionally, the switch’s BGP neighbor
was configured using its neighbor’s IP address as well as its neighbor’s AS identifier.
By now ‘show ip bgp neighbors’ should display all your neighbors in an established operational state. You
will talk iBGP with neighbours in your AS and eBGP with neighbors outside your AS.
At this point you have only the routes from your AS network, type the following on all switches to check
the routing table:
all-> show ip ospf routes
all-> show ip bgp routes
all-> show ip routes
Please notice that, at this step, there are no routes from the AS100 advertised to the AS200.
Total 8 routes
Dest Address Gateway Addr Age Protocol
------------------+-------------------+----------+-----------
127.0.0.1/32 127.0.0.1 00:35:16 LOCAL
192.168.10.0/24 192.168.10.254 00:13:03 LOCAL
192.168.12.0/24 192.168.12.1 00:12:30 LOCAL
192.168.13.0/24 192.168.13.1 00:10:39 LOCAL
192.168.20.0/24 192.168.12.2 00:00:26 EBGP
192.168.24.0/24 192.168.12.2 00:00:26 EBGP
192.168.30.0/24 192.168.13.3 00:09:54 OSPF
192.168.40.0/24 192.168.12.2 00:00:26 EBGP
- At the end of this lab, restore the four switches to initial configuration by restarting them from "working
directory".
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• Unused links:
• loop-free topology by disabling network links
• inefficient bandwidth use
• low Return on Investment (ROI)
• Sub-optimal paths:
• A single tree, the traffic always must pass through the ‘Root’ bridge bridges
• May need to traverse a sub-optimal route transiting the root-bridge
• Lack of a coordinated control plane
• Flooding: Ethernet’s “flood and learn” address learning floods unknown-unicast traffic until the destination
address is learned from return traffic
• MAC Learning: All nodes in the LAN learn all end-device MAC addresses thus posing a scalability challenge
• Slow convergence:
• Typical convergence times are in the order of seconds.
• Transient loops may form, resulting in packet drops, link saturation, and session timeouts
SPB-M VS STP
Data path with Spanning Tree +
-
Link redundancy
Centralized Root Bridge
- Convergence time
- High @MAC tables
- Scalability
- High number of unused links
Inefficient routes 1
MACs
Source 1
….
Source100
Destination-2
Root Bridge
Source
3
Destination-1
OS6860E/N
• Network requirements
• Fast reconvergence IEEE standard (802.1aq)
• Increase bandwidth utilization
• Reduce latency SPB-M provides following advantages
• High availability • All network links are use with no loops
• Security • Spanning Tree Protocol replacement
• Uses the shortest path end to end
• 100’s ms convergence times
• Applications requirements • Natively protect failures and reroute
• Fast network reconvergence • End-point provisioning
• High bandwidth • Mesh topologies
• Low latency • Deterministic traffic flows
• Symmetrical and congruent paths
• Address isolation through mac-in-mac
• OAM capabilities
• Flexible and scalable service separation
• Traffic separation
SPB-M VS STP +
+
Link redundancy
No Centralized Root Bridge
PBB
encapsulation
at the edges
2
MAC’s Source1-
Source100 learning
All the links are
restricted to the edges
usable
3 PBB encapsulation
at the edges Destination-1
SHORTEST PATH BRIDGING
Control and Data Planes IEEE 802.1aq
Access
Bridge
Access
Bridge
No learning of Access LAN @MAC and Edge network @MACs dynamically learnt
paths accross core SPB-M switches and propagated accross SPB-M core
SPB - DATA FORWARDING
Payload SA = Source MAC address
DA = Destination MAC address
Ethertype (IP) C-VID = Customer VlanID
C-VID I-SID = Service ID
B-VID = Backbone VID
Ethertype 802.1q
B-DA = Backbone DA
00:01 B-SA = Backbone SA
00:02
I-SID
Ethertype 802.1ah
B-VID
Ethertype 802.1 ad
00:03
Payload Payload
00:04
Ethertype (IP) Ethertype (IP)
00:01 00:01
00:02 Tunnel 00:02
MAC :00:03 Identifiers MAC :00:04
BCB BCB
BCB
Customer VLAN (CVLAN)
A traditional VLAN with MAC learning C-VID
& flooding where users connect to BVLAN
802.1Q 1001
ISID
SAP 1001 BEB BVLAN ISID
Access
ISID 1001
SAP Node
SAP
1002
Access 1002
ISID SAP
Node
BEB 1002
BCB
SPB Access Port
BCB
Where the customer traffic
ingresses or egresses Service
A flooding domain
for customer traffic
Service Access Point (SAP)
Used to specify what type of CVLAN traffic is
allowed to enter/exit from/to the SPB network BCB Service Instance Identifier
BCB BCB ISID
Associate a traffic to a SPB service based on Vlan-TAG 1001
Backbone services instance identifier
BCB SAP
SDP ID SDP ID
Service I-SID 66 I-SID 66 Service
SAP SAP
I-SID 66 I-SID 66
I-SID 77 I-SID 77
SPB-M
DEMUX BACKBONE DEMUX
Service I-SID 66 I-SID 66 Service
SAP SAP
I-SID 77 I-SID 77
I-SID 77 I-SID 77
SPB – VIRTUAL PRIVATE NETWORK
Building 1
BEB
DC
Building 2
CMAC :00:01 / IP.1 BEB BEB
I-SID1 – Video CMAC :00:02/ IP.2
BCB BCB
CMAC :00:20 / IP.20
BEB
Building 3
AUTOMATED PROVISIONING
INTO SPB VIRTUAL CONTAINERS
Separate Departments
Administration
Communication
Facilities
Security
A Virtual Department
Department
Private Network for
PrivateDepartment
Network
Private
Private
every Network
Network
department
Private Network
Separate Storage
Separate Computing
SPB – IP ROUTING
Routing L3 traffic over a L2 SPBM backbone network
Access
Subnet 2
Bridge
Routing to CVLANs
IP interfaces
attached to an end
of the SPB-M tunnel Subnet 3
ISID
VRF
VRF
BVLAN
VPN-Lite
No need IGP in the
Core/Aggregation for routing DC
Building 1
IP
IP
IP
IP L3 routing advertisements
sent through SPB BVLAN Run routing protocols
Routing to CVLANs IP on L3 VPN IP interfaces
interfaces attached to an Building 2
end of the SPB-M tunnel
IP
IP
“Default Gateway”
Point To Point routing
SPB-M network acts as a physical network Multi-point routing
native to IPv4/IPv6 formats
L3/IP-VPN
• Routing L3 traffic over a L2 SPBM backbone network
L3/IP-VPN
DC
Building 1
IP
IP
IP
IP
L3 routes exchanged via ISIS/SPB TLV
No need to run routing protocols
on L3 VPN IP interfaces
Building 2
IP
IP
ISIS-SPB protocol acts as an IP-IGP protocol
Routes can be selectively imported into ISIS- SPB
and advertised across the SPB-M domain
SPB DEPLOYMENT IN LAN NETWORK
DC
Core
Backbone Core Bridge (BCB) role ALE Switch
Learns BEB addresses proposal
BCB BCB
IS-IS SPB for paths OS9900
PBB for data plane OS6900
L3 routing
Aggregation
Backbone edge bridge (BEB) role
VLAN to I-SID ALE Switch
proposal
IS-IS for MAC learning BEB BEB BEB BEB OS9900
IS-IS for SPB paths OS6900
PBB for data plane OS6860E/N
Loopback Detection Feature
ALE Switch
Access proposal
IEEE 802.1Q VLAN on uplinks (port or LAG) OS6360
STP towards BEB OS6450
OS6465
OS6560
BUM TRAFFIC FORWARDING METHODS
• Head-End (default mode)
• Customer BUM traffic is encapsulated in the corresponding destination unicast B-MAC address and
send to ALL destinations
VM VM VM
OS6900 OS6900
VM
• Tandem
• Customer BUM traffic is a special B-MAC Destination Address that encodes the source of the traffic
and send out
VM VM VM
OS6900 OS6900
VM
Tandem
Head-End
10005
SAP
SAP 1/1/1:1000 ISID 1000
10006
MCAST
SAP ISID 1000 SDP
Dynamic
Querier
Q • Prevents flooding SAPs and SDPs 10007
SAP 1/1/3:1000
• IPv4 and IPv6(MLD)
• IGMP/MLD snooping and proxy per service
• Spoofing, zapping, robustness controls
• Querier forwarding
• Zero based queries
• Flood unknown controls
SPB BENEFITS IN THE CAMPUS
Manageability
• Management
• Out of Band (EMP or port)
• In Band Map VLAN to ISID
• Standard VLAN
• Inline
• Spanning Tree Replacement
Advantages • SPB iFab Technology
• Automated SPB-M (L2) domains creation
• SPB-M auto-discovery of I-SID, BEB services
• UNP based auto-provisioning at BEB of VLAN-ISID
• Simpler than MPLS
https://www.al-enterprise.com/en/solutions/shortest-path-bridging
SPB - SPECIFICATIONS
SPB – VCLASS
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Shortest Path Bridging
Architecture guide
Tech Brief
Shortest Path Bridging Architecture guide
Table of Contents
Tech Brief
Shortest Path Bridging Architecture guide 2
14. Management................................................................................................................... 43
15. Operation and Maintenance...................................................................................... 45
15.1 Connectivity Fault Management: 802.1ag.................................................. 45
15.2 Network performance: Service Assurance Agent ................................... 47
15.3 Network maintenance......................................................................................... 48
16. Service attachment redundancy............................................................................. 48
17. Loop avoidance and suppression........................................................................... 51
18. General design guidelines.......................................................................................... 52
18.1 BVLANs..................................................................................................................... 52
18.2 VLAN-to-Service mapping................................................................................. 52
18.3 Virtual Chassis....................................................................................................... 53
18.4 Link Aggregation................................................................................................... 53
18.5 Link Metric.............................................................................................................. 54
18.6 QoS............................................................................................................................. 54
19. Security guidelines....................................................................................................... 54
19.1 Management VRF.................................................................................................. 55
19.2 MACSec..................................................................................................................... 55
19.3 NAC............................................................................................................................ 55
19.4 Router authentication......................................................................................... 55
20. Conclusion........................................................................................................................ 56
Tech Brief
Shortest Path Bridging Architecture guide 3
1. About this architecture guide
1.1 Purpose
The purpose of this architecture guide is to present SPB (802.1aq) networking concepts along
with design and deployment guidelines. It does not attempt to cover every aspect, nor every
possible architecture option, only the most common, validated and recommended architectures.
You are encouraged to refer to the Alcatel-Lucent Operating Software (AOS) documentation for
additional details, options and guidelines.
1.2 Audience
The intended audience for this document includes customer and business partner networking
professionals involved in the design and deployment of enterprise networks.
1.3 Glossary
AG Access Guardian
CP Control Plane
DP Data Plane
Tech Brief
Shortest Path Bridging Architecture guide 4
MSTP IEEE 802.1s Multiple Spanning Tree Protocol
1.4 References
[1] IP/IPVPN services with IEEE 802.1aq SPB networks - draft-unbehagen-spb-ip-ipvpn-00.txt
[2] Alcatel-Lucent OmniSwitch® Template Based Provisioning with Alcatel-Lucent OmniVista®
2500 Network Management System (NMS)
[3] Network infrastructure security best practices
Tech Brief
Shortest Path Bridging Architecture guide 5
Figure 1. The problems with STP
Inefficient
routes
Destination 2 MACs
M1 ... M100
Source
Root bridge
Destination 1
In addition to STP’s weaknesses, Ethernet’s scalability beyond the LAN is limited by its lack of
a coordinated control plane and use of a flat (as opposed to hierarchical) address space. Legacy
Ethernet networks present the following challenges:
• Flooding: Ethernet’s “flood and learn” address learning floods unknown-unicast traffic until
the destination address is learned from return traffic
• MAC Learning: All nodes in the LAN learn all end-device MAC addresses thus posing a
scalability challenge
3. Introducing SPB
802.1aq Shortest Path Bridging (SPB) is an IEEE networking standard whose primary focus was
addressing the challenges in STP. But SPB is much more than STP’s evolution: SPB provides
MPLS-like VPN services but is significantly simpler to deploy and maintain. And unlike MPLS,
which requires a “stack” of protocols (for example: LDP, OSPF, MP-BGP, among others), SPB relies
on a single protocol to provide this functionality: IS-IS (Intermediate System to Intermediate
System). IS-IS is the only control plane protocol required to build a multi-path topology, perform
address learning, and carry VPN routes across the backbone. Alcatel-Lucent Enterprise’s
Intelligent Fabric (iFab) brings further simplification by automating network node provisioning,
client device attachment, and dynamic service instantiation. Because of this simplicity and
automation, an ALE-powered SPB solution offers high-end services for a lower total cost of
ownership (TCO). Let’s analyse SPB’s benefits in further detail.
Tech Brief
Shortest Path Bridging Architecture guide 6
3.1 Scalable, fast-converging, multi-path fabric
Figure 2. Addressing STP’s challenges
Multiple
shortest
paths
Destination 2 MACs
PBB M1 ... M100
encapsulation
at the edges
PBB
encapsulation
at the edges 2
SPB’s loop-free topology is built by a link-state routing protocol running Dijkstra’s Shortest
Path First (SPF) algorithm: IS-IS. With IS-IS, no network link is disabled, all paths are available
and traffic between any pair of nodes follows the shortest path. In addition, with MAC-in-MAC
encapsulation, backbone nodes do not learn any end-device MAC addresses, thus increasing
the network scalability and stability. With IS-IS and MAC-in-MAC encapsulation, SPB creates an,
any-to-any, scalable and fast-converging “fabric” supporting multiple active optimal paths for
both bridged and routed traffic.
3.2 Multi-tenancy
SPB natively supports multi-tenancy: The physical network is partitioned into multiple virtual
“slices” referred to as VPNs, “containers” or “communities”. Customers, or IoT device groups,
segregated into different VPNs are isolated and do not interfere with one another. In fact, they
can use overlapping address space without conflict. Inter-VPN communication, if needed, is
tightly controlled by firewall policies. This multi-tenancy capability makes SPB suitable for use
cases such as smart cities, transportation, higher education, video surveillance or data centres,
to name a few. SPB’s scalability is not limited to 4096 tenants because its service identifier, the
ISID, is a 24-bit field which can differentiate up to 16M services.
Figure 3. Multi-tenancy
Tech Brief
Shortest Path Bridging Architecture guide 7
3.3 Dynamic service instantiation
SPB services do not need to be statically bound to a switch port. SPB is tightly integrated with
Alcatel-Lucent Enterprise’s classification and Network Admission Control (NAC) framework
known as Access Guardian (AG). Upon connection, end devices can be classified (for example;
based on the MAC OUI or IoT “fingerprint” rules) or authenticated (for example; through 802.1x
or MAC) against a RADIUS server. The appropriate service is dynamically instantiated according
to the device or user classification, or role attribute returned by the RADIUS server. In the same
manner, this user-to-service binding is removed when the user/device disconnects. This dynamic
service instantiation has the following advantages:
• User/Device mobility: The network configuration dynamically adapts to mobile users and
devices or Virtual Machines (VMs) migrations without need for Move, Add or Change requests
• Increased security: Services are instantiated on an as-needed basis only, and for authenticated
devices/users only, if applicable. This association is maintained for as long as the user/device
remains connected and/or authenticated, and is brought down on disconnection/log-off. These
ephemeral services are inherently more secure: they cannot be scanned, DoSd, or otherwise
hacked, while they’re not active.
• Device templates: This dynamic instantiation of network services easily lends itself into
template-based configuration of network nodes. Edge nodes can all share the same base
configuration template and dynamically adjust the service configurations on the fly.
3.5 Micro-segmentation
Firewalls filter and control communication between different VPN “tenants” or “containers”.
But, how do you secure communication within the same VPN? For instance, if one device were
compromised, how do you prevent lateral movement to other resources within the same VPN?
When users/devices are dynamically bound to a service, they are also mapped to a User Network
Profile (UNP). The UNP is a set of Access Control Lists (ACLs) and Quality of Service (QoS) policies
which are applied to the device/user according to the device category or user role. Let’s take
CCTV cameras as an example: ACLs contained in the UNP can allow communication between
the camera and surveillance servers but at the same time block camera-to-camera communication,
preventing the spread of malware, “pivoting” and other hacking techniques which rely on
lateral movement.
Tech Brief
Shortest Path Bridging Architecture guide 8
Figure 4. Micro-segmentation
Audio/visual profile
Authenticate ✓ Container
Classify ✓ Quality
Auto provision ✓ Security
Authenticate ✓ Container
Classify ✓ Quality
Auto provision ✓ Security
Security profile
Authenticate ✓ Container
Classify ✓ Quality
Auto provision ✓ Security
The SPB data plane utilizes IEEE 802.1ah Provider Backbone Bridging (PBB), aka MAC-in-MAC,
encapsulation. The PBB header includes de following fields:
B-VID: Or Backbone VLAN (BVLAN) ID. A VLAN that serves as a transport VLAN for the SPB
service instances and to connect SPB bridges together through SPT sets. Unlike the standard
VLAN domain which uses “flood and learn” or source learning in the DP to populate the FDB,
the BVLAN domain’s FDB is pre-populated by the CP.
ISID: Service Instance Identifier. The ISID is a 24-bit number that designates the service instance,
tenant, container or VPN. Different SPB services are assigned different ISIDs and isolated from
one another. Each SPB service or ISID is bound to a BVLAN.
B-SA and B-DA: Or Backbone source and destination MAC addresses. The MAC addresses associated
with SPB nodes (BMACs). Within the SPB backbone, traffic is forwarded based on the destination
BMAC (B-DA). Inner customer MACs are not learnt or used for forwarding within the backbone.
Tech Brief
Shortest Path Bridging Architecture guide 9
Ethertype: 0x88E7
Upon entering the SPB domain, the PBB header is wrapped around the incoming frame which
can be un-tagged, single-tagged (IEEE 802.1q) or double-tagged (IEEE 802.1ad). Figure 5
illustrates the case of a double-tagged (Q-in-Q) frame. Note that MAC and BMAC addresses
are shortened to 2 bytes for simplicity in this diagram.
Payload
Ethertype (IP)
C-VID
Ethertype 802.1q
S-VID
Ethertype 802.1ad
Payload 00:01 Payload
BEB: An SPB switch positioned at the edge of the PBB network that learns and encapsulates
(adds an 802.1ah backbone header to) “customer” frames for transport across the backbone
network. The BEB interconnects the customer network space with PBB network space.
BCB: An SPB node that resides inside the PBB network core. The BCB employs the same BVLAN
on two or more network ports. This BVLAN does not terminate on the switch itself; traffic
received on an SPB network port is switched to other SPB network ports. As a result, the BCB
does not have to learn any of the customer MAC addresses. It mainly serves as a transit bridge
for the PBB network.
Within the SPB domain, that is, between BEB and BCB nodes, frame forwarding depends entirely
on the outer PBB 802.1ah header (BMAC and BVLAN) and not on the inner header or “customer”
MAC addresses (CMAC). In fact, the SPB backbone nodes do not learn CMACs and this makes
SPB networks more scalable and stable (CMACs are not learnt and therefore do not need to be
flushed and re-learnt when they change or move).
The DP implements an additional loop mitigation mechanism by which a node will not accept
unexpected frames from their neighbours. This additional loop mitigation mechanism is faster
during topology changes. In summary, SPB implements two loop avoidance mechanisms: loop
prevention and loop mitigation.
Tech Brief
Shortest Path Bridging Architecture guide 10
5. The Control Plane: RFC 6329 IS-IS Equal-cost trees
As stated earlier, the role of the CP is to populate the FDB tables used by the DP. SPB uses IS-IS,
or Intermediate System to Intermediate System (ISO/IEC 10589:2002); a well-known, proven
and widely-deployed protocol, particularly in service-provider backbones. IS-IS is responsible
for topology and service discovery. IS-IS is an extensible link-state protocol which implements
Dijkstra’s Shortest Path algorithm for path computation. IS-IS extensions for SPB are described
in RFC 6329 and include a new Network Layer Protocol Identifier (NLPID), as well as a set of
Type-Length-Values (TLVs). In a nutshell, these extensions add support for multiple topologies,
allowing load sharing over multiple equal-cost paths, and service-membership discovery, or in
other words: Communicating what services are enabled on each SPB node.
Unlike STP which creates a single tree rooted at the root bridge, in SPB networks, every node
builds a topology tree rooted on itself. This is the key reason why, in an SPB network, traffic
between any pair of nodes always travels along the shortest path. When using STP, traffic
between two nodes does not necessarily travel over the shortest path unless one of the two
nodes involved is the root bridge. This is illustrated in figure 7 in which B1 is the root bridge.
Traffic between nodes B5 and B2 for instance, none of which is the root bridge, cannot use the
direct single-hop path because that link is disabled by STP. Traffic between these two nodes
must take a 3-hop detour traversing the root bridge.
B2 B2
B1 B5 B1 B5
B3 B3
B4 B4
Path B5 to B2 = B5 – B3 – B1 – B2 Path B5 to B2 = B5 – B2
In contrast, when using SPB, no link is disabled: each node is the root of its own tree. Nodes B2
and B5 can simply communicate over the direct single-hop path while at the same time they can
communicate with other nodes over different paths (for example; between B4 and B5). SPB’s
support for multiple trees and multiple active paths unlocks utilization of bandwidth in optimal
paths that would otherwise be wasted, increasing throughput and reducing latency.
An SPB network supports up to 16 BVLANs and each node builds a SPF tree for each BVLAN.
Load balancing is accomplished by mapping different tenant services (ISIDs) to different BVLANs.
Service traffic between any node pair uses a single path and this path only changes if the
topology changes, for instance, on node or link failure and subsequent path re-computation. In
other words: SPB networks do not balance loads on a packet-by-packet basis like IP networks
do. Provided the physical topology supports multiple shortest paths (same cost and same hop
Tech Brief
Shortest Path Bridging Architecture guide 11
count) between two nodes, different BVLANs can build different trees and services mapped to
those BVLANs can use different paths. And, those paths will remain the same for as long as the
topology remains the same. An important property of SPB networks is that network paths are
deterministic and frames are delivered in the order they were sent. This property is important
for certain applications such as storage and real-time application traffic.
B1 B3 B5 B1 B3 B5 B1 B3 B5
B4 B4 B4
B1 B3 B5 B1 B3 B5 B1 B3 B5
B4 B4 B4
The trees shown in figure 8 are SPB’s equal-cost trees (ECTs). Each node builds a tree per
BVLAN and the cost to reach other nodes is the same across all BVLANs. The ECT-ID is a number
assigned to each BVLAN at the time of BVLAN creation and is used for tie breaking during path
computation. Assigning different ECT-IDs to different BVLANs helps those BVLANs build different
trees, provided the underlying topology supports multiple equal-cost, or shortest paths.
Another important property of SPB networks is path symmetry. If you closely examine the
picture above, you will notice that the path from node X to node Y is identical to the path from
node Y to node X. Path symmetry is key to Operations and Maintenance (OAM). For instance,
one-way delay calculations can be easily derived from roundtrip delay measurements. Note
that this is not the case for other IP-based technologies such as MPLS in which the reverse
path may differ.
Tech Brief
Shortest Path Bridging Architecture guide 12
Figure 9. Symmetric paths, per-BVLAN load balancing
B2 B2 B2
B1 B3 B5 B1 B3 B5 B1 B3 B5
B4 B4 B4
The result of IS-IS path computation for each BVLAN and node is the FDB which is used by the
data plane for frame forwarding. Figure 10 shows BEB5’s unicast FDB. The multicast FDB will
be discussed in Section 7.
B2 BVID A B1 Port 1
BVID B B1 Port 2
BVID C B1 Port 3
BVID A B2 Port 1
B1 B3 B5
BVID B B2 Port 1
BVID C B2 Port 1
BVID A B3 Port 2
BVID B B3 Port 2
BVID C B3 Port 2
BVID A B4 Port 3
B4
BVID B B4 Port 3
BVID C B4 Port 3
ISID 66
B2
B4
ISID 66
Tech Brief
Shortest Path Bridging Architecture guide 13
In each BEB node there are two kinds of virtual ports:
Service Access Point: The SAP is a UNI-side logical port which binds a physical port and specific
customer traffic types (untagged, single-tagged, double-tagged or all) to an SPB service. Multiple
SAPs can be associated to the same physical port thus multiplexing and mapping different
customer traffic encapsulations to different SPB services.
Service Distribution Point: The SDP is an NNI-side logical port which binds an SPB service to
a far-end BEB on which the service is instantiated. SDPs are dynamically created in the CP and
only for those far-end BEBs with SAPs for the specific service.
Let’s look at figure 12. In this diagram, B5 terminates 2 SPB services: One is associated to
ISID 66 and the other to ISID 77. There are two SAP ports, one for each service. SAP 1:1 is
defined on port 1, matches traffic tagged with VLAN 1, and binds it to service 66. SAP 2:2
is defined on port 2, matches traffic tagged with VLAN 2, and binds it to ISID 77.
ISID 66 is also enabled on nodes B1, B2 and B4 while ISID 77 is also enabled on node B1.
ISID 66 ISID 66
P
SD
ISID 77 ISID 77
B4
ISID 66
It should be noted that while BMAC address learning is performed in the CP (for example; not
through “flood and learn”) CMAC address learning is performed in the BEB’s DP through flood
and learn. Near-end CMACs are bound to SAP ports and far-end CMACs are bound to SDP ports.
BCB nodes have neither SAP nor SDP ports and therefore do not learn any CMACs.
Let’s expand this example by adding some end customer sites and CMACs associated to those
customers. We will keep using 2-byte MAC addresses for simplicity. In figure 13, near-end CMAC
addresses are bound to SAP ports while far-end CMAC addresses are bound to SDP ports. Within
the service domain, a BEB performs CMAC source address learning like a standard Ethernet
switch, except there is no “flooding” of BUM traffic. BUM traffic is discussed in the next section.
ISID 66
B2
MAC G:G
SD
Tech Brief
Shortest Path Bridging Architecture guide 14
7. BUM traffic
SPB supports 3 BUM (broadcast, unknown unicast, and multicast) traffic replication and
forwarding methods:
Head-end: In this mode, BUM traffic received on a SAP port is replicated at the ingress BEB and
converted to multiple unicast frames: A replica is created for every other BEB in the same ISID
and these replicas have the BEB BMACs as the B-DA and are forwarded using the unicast FDB.
For this reason, Head-End replication can be inefficient in terms of bandwidth consumption but
is efficient in terms of resource usage because it does not require a separate tree. However,
Head-end replication can be optimal in some circumstances, particularly when combined with
IGMP Snooping. Head-end replicated BUM traffic simply uses the unicast FDB and therefore
travels along the same path. This property is known as congruency.
BCB2 BEB3
BCB6 BCB5
Tandem (S,G): In this mode, a separate multicast SPT and FDB are created. The multicast SPT is also
congruent with the unicast SPT however the B-DAs in the multicast FDB are multicast addresses
constructed as a combination of ISID and source BEB BMAC. When a BUM frame is received on a
BEB, it is MAC-in-MAC encapsulated with this special BMAC as the B-DA and forwarded according
to the multicast FDB. A B node can use the unicast FDB to check if it is in the SPT between a source
BEB and other BEBs in the same ISID. If the B node happens to be in the SPT, it will populate the
multicast FDB such that the frame is replicated and forwarded as needed, to other BEBs connecting
the same service (ISID). Tandem Replication is very efficient in terms of bandwidth use because it
will only send a single replica on any given link; however, it is less efficient in terms of resource
use because it requires an additional SPT and multicast FDB per ISID.
Tech Brief
Shortest Path Bridging Architecture guide 15
Tandem (*,G): In this mode, a separate multicast tree is created. This tree is not a Shortest Path
tree and is not congruent with the unicast SPT. A multicast (*,G) is created for every BVLAN using
Tandem (*,G) multicast replication. This (*,G) tree is similar to a Spanning Tree and is rooted at one
B node according to the bridge priority. In this mode, there is a single tree for the BVLAN and not
one tree for every node. Therefore, traffic will not generally follow the shortest path. This mode
is a compromise between bandwidth and resource usage, however, it can be a good option when
all traffic is sourced or destined towards the root bridge.
If you observe this topology, you will notice that it provides up to 3 shortest paths, for example,
between nodes BEB-1 and BEB-3, or between nodes BEB-2 and BEB-4. To take advantage of
those 3 diverse paths for traffic load balancing, we need to create a minimum of 3 BVLANs. In
this example, we will however, dedicate one BVLAN purely for control traffic and therefore we
will create a total of 4 BVLANs. However, it should be noted that this is not strictly necessary,
the control BVLAN can also be used for services.
Tech Brief
Shortest Path Bridging Architecture guide 16
Figure 16. Sample backbone topology
BEB2
1/
A 1/
49 50
1/ A
1/
1/1/54A
A 1/
BEB1 49 1/1/50A 1/
49 BEB3
1/
1/ A
1/1/54A 1/1/49A 1/1/52A 1/1/54A
1/
BCB
1/ A
50 1/1/53A 49
1/
A 1/
1/1/54A
1/ A
1/ 49
50 1/
A 1/
BEB4
Tech Brief
Shortest Path Bridging Architecture guide 17
Snippet 5. BCB backbone configuration
Through this configuration, VLANs 4000 through 4003 are defined as SPB backbone VLANs and
will therefore not use any form of spanning tree protocol. AOS automatically assigns a different
ECT-ID to each BVLAN and this maximises the chance that different BVLANs will create different
SPTs, up to the maximum number of shortest paths supported by the physical topology. Nodes
will exchange IS-IS “Hello” messages over the control BVLAN (such as, 4000 in this example) and
form point-to-point adjacencies. LSPs are exchanged, a topology database is created and one SPT
is built for each BVLAN.
In the “show spb isis interface” command output we can observe three interfaces are SPB-IS-
IS enabled for L1 adjacencies. All three interfaces are both administratively and operationally
up. By default, the link metric is 10 regardless of link speed. “Hello” messages are sent at nine
second intervals and adjacencies are declared lost if no “Hello” message is received for three
consecutive intervals (for example; 27 seconds).
In the “show spb isis nodes” command output we can observe all discovered SPB IS-IS nodes
including the local node. For each node, we can see the system or host name, the system ID
(the BMAC), as well as the source ID and the bridge priority. The source ID is a 20-bit identifier
which designates the node as the origin of BUM traffic and is derived from the system ID’s least
significant bytes. The source ID is relevant when using tandem BUM replication. The bridge
priority is 16-bit identifier and is used as a tie breaker during path computation.
Tech Brief
Shortest Path Bridging Architecture guide 18
Snippet 8. “show SPB isis adjacency”
In the “show spb isis adjacency” command output we can observe all SPB IS-IS adjacencies
established by the local node. For each adjacency, we can see the system or host name,
the system ID (the BMAC), as well as type (always L1 for SPB IS-IS), the state, the hold timer
(number of seconds until the adjacency is declared lost if no “Hello” messages are received)
and the interface over which the adjacency is formed.
In the “show spb isis bvlans” command output we can observe, for each configured BVLAN, the
ECT algorithm in use and whether the BVLAN is in use and has services mapped to it. So far, we
have not configured any service, therefore the only BVLAN in use is the control BVLAN, which is
used for IS-IS CP messaging. We can also observe the number of ISIDs mapped to the BVLAN. For
services using tandem BUM replication, we can observe whether this is (S,G), which is the default,
or (*,G). Note that while the choice of head-end versus tandem replication is done on a per-service
basis, the choice between (S,G) and (*,G) tandem replication is done on a per-BVLAN basis. Lastly,
the root bridge BMAC is shown only for those BVLANs using (*,G) tandem replication.
Tech Brief
Shortest Path Bridging Architecture guide 19
In the “show spb isis unicast-table” command output we can observe, for each node, the
outbound interface used when sending unicast traffic to that node. Note that the outbound
interface can be different for different BVLANs because different BVLANs can build different
SPTs. For example, the path to BEB-3 goes through interface 1/1/49A in the case of BVLAN
4000, interface 1/1/54A in the case of BVLANs 40001 and 4002, and interface 1/1/50A in the
case of BVLAN 4003.
In the “show spb isis spb bvlan” command output we can observe, for a given BVLAN, the
outbound interface, the next hop node, as well as the SPB metric and total number of hops
required to reach a destination node. We can observe in this output that traffic destined towards
BEB-3 will transit BEB-2 in the case of BVLAN 4000, BCB in the case of BVLANs 4001 and 4002,
and BEB-4 in the case of BVLAN 4003.
9. L2 services
A L2 service refers to a type of VPN service connecting multiple sites in a single any-to-any
bridging domain. In this section, we continue building upon the previous example and create a
L2 service on top of the previously created backbone configuration.
Services need only be created on BEBs, not on BCBs, and only on those BEBs where the service
needs to be delivered. Creating an SPB service entails the following tasks:
• Creating a service and associating the service to an IS-IS and BVLAN – the specified BVLAN’s
SPF will be used for the service traffic
• Defining a Service Access Port (SAP)
• Defining SAPs matching specific customer traffic
Tech Brief
Shortest Path Bridging Architecture guide 20
Figure 17. L2 service
Site 2
1/1/48
BEB2
BEB1 BEB3
1/1/48 1/1/54A 1/1/48
ISID 1001
BVLAN 4001
Site 1 Site 3
BEB4
1/1/48
Site 4
With regard to figure 17, we provide BEB configurations in the snippets that follow.
As well, please note:
• The service number is only locally significant and can differ across different BEBs
• The ISID number is globally significant and must match across all BEBs connecting
a given service
• The BVLAN that the service is mapped must also match across all BEBs connecting
a given service
• Different services can be mapped to different BVLANs to achieve traffic load balancing
Tech Brief
Shortest Path Bridging Architecture guide 21
In the four configuration snippets above we can observe the following:
• Service 1 is associated to ISID 1001 and mapped to BVLAN 4001’s SPF tree
• Port 1/1/48 is defined as a SAP
• A SAP is defined on port 1/1/48 mapping untagged traffic (:0) to service 1
In the “show service spb” command output we can observe, for a given BEB, the locally defined
SPB services, their administrative and operational status, the number of (local) SAPs and (remote)
SDPs along with the ISID and BVLAN number that the service is mapped to. We can also observe
the multicast replication mode, which is head-end by default. The multicast replication mode can
be changed to tandem on a per-service basis.
In the “show service spb” command output we can observe that, by definition, a BCB does not
have locally defined services.
In the “show spb isis services” command output we can observe SPB services known to the node
along with their ISID and BVLAN number and the node name, and BMACs that the service is
enabled on. We should note that these services are learnt thanks to the IS-IS CP. A “*” denotes
that the service also matches a service locally created on the BEB.
Tech Brief
Shortest Path Bridging Architecture guide 22
Snippet 19. “show spb isis services” – BCB view
In the “show spb isis services” command output we can observe the same output now from the
perspective of a BCB. We should note that a BCB is still aware of all existing services with the
IS-IS CP.
The “show service spb” command output provides some additional details about a given SPB
service. We can highlight the following:
• RemoveIngressTag: As explained in section 3, by default, a PBB frame includes all the frame’s
original tags. However, we can choose to remove those tags with the “service service_id
remove-ingress-tag enable” command.
• VLAN Translation: A given service may require different encapsulations on different SAPs.
For instance, a server may tag traffic with a specific VLAN while client devices may require
untagged SAPs. In such situation, VLAN translation can be enabled to allow both devices
to communicate. We should note that VLAN translation must be enabled both at service
level with the command “service service_id vlan-translation enable” and on the SAP with
the command “service access port vlan-xlation enable”.
• Allocation Type: Services can be either statically or dynamically created. We will cover
dynamic service creation in section 13.3.
Tech Brief
Shortest Path Bridging Architecture guide 23
In the “show service access” command output we can observe, for a given BEB, the list of SAPs
along with their type (manual or dynamic), the number of defined SAPs and whether VLAN
translation is enabled or not. We will cover dynamic SAP creation in section 12.2. We can also
observe the L2Profile assigned to the SAP. The L2Profile defines how L2 control protocol frames
received on a SAP will be handled. Traffic can be peered, dropped, or tunnelled. Default L2
profile settings are shown in Table 2. Additional L2 profiles can be created with the command
“service l2profile name stp action 802.1x action 802.3ad action mvrp action gvrp action amap
action 802.1ab action” and assigned to the SAP with the command “service access l2profile
name”. We will cover unp SAPs and profiles in section 12.2.
In the “show service spb ports” command output, we can observe local (SAP) as well remote
(SDP) ports for a given service. For each port, we can see administrative and operational status,
the system ID (BMAC) and BVLAN, as well as the system name and associated local interface. SDP
ports will always display a “*” next to them because SDP ports are always dynamically created
by the IS-IS CP. The name of an SDP is a combination of a dynamically generated number,
followed by a colon and the service number.
Tech Brief
Shortest Path Bridging Architecture guide 24
Snippet 23. “show service mesh-sdp spb”
In the “show service mesh-sdp spb” command output we can observe far-end SDPs for each
service along with the ISID number and the far-end system ID (BMAC), BVLAN, system name
and associated interface.
In the “show mac-learning domain spb” command output we can observe the list of CMAC
addresses learnt in the SPB domain along with the service number and ISID, as well as the
interface (SAP or SDP) port that the CMAC address is bound to.
In the “show mac-learning domain spb” command output we can observe the same output now
from the point of view of a BCB node. As expected, BCB nodes do not learn any CMACs.
Tech Brief
Shortest Path Bridging Architecture guide 25
10. Routing concepts
Before delving into L3 services, which are covered in the next section, we need to discuss certain
routing concepts in relation to SPB. The Alcatel-Lucent OmniSwitch® product line has supported
SPB since AOS 7.3.1, released in 2012. Since then, multiple SPB-enabled platforms have been
launched and each new platform incorporated new advancements in ASICs.
First generation ASICs were not capable of routing and performing MAC-in-MAC encapsulation in
a single-pass operation. Consequently, routing between IP interfaces associated to two different
SPB services, or to a VLAN and an SPB service, had to traverse the switch fabric twice. This
required an external physical loopback connecting two different switch ports: one port in the
VLAN domain and another SAP in the SPB domain. IP interfaces could only be associated to a
VLAN, not directly to an SPB service. It should be noted that these physical loopbacks can be
either physical ports or linkaggs. When using VC, linkagg member ports can span different units
in the VC for redundancy. We refer to this as two-pass routing with external physical loopback.
Newer generation ASICs support a concept similar to an external physical loopback without
requiring a cable connection. One or more physical ports’ bandwidth is dedicated to the
loopback function without requiring a cable to be attached. Multiple ports can be dedicated to
this function for additional bandwidth and redundancy. When using multiple ports, ports are
configured as a linkagg and, when using VC, linkagg member ports can span different units in
the VC. We refer to this as two-pass routing with internal front-panel loopback. One additional
difference between the internal front-panel loopback and the external physical loopback
described in the previous paragraph is that the internal front-panel loopback is a single logical
port, not two ports (a VLAN port and a SAP) as in the case of the external physical loopback.
However, even in the single logical port, there is a “VLAN” function and a “SAP” function. This
will become clearer when looking at the configuration snippets later in this section.
Latest generation ASICs support integrated routing and bridging in the SPB domain in the exact
same manner as in the VLAN domain. This means that IP interfaces can be associated to an
SPB service directly and traffic can be routed between two SPB services or between a VLAN
and an SPB service in a single-pass operation without loopbacks. We refer to this as single-pass
inline routing.
VLAN 1
Figure 18 provides a physical view of these routing options. The leftmost diagram represents a
switch supporting single-pass inline routing. This example shows a bridge with 2 SPB services,
designated by their ISIDs, and one VLAN. IP interfaces are represented by dots. As we can see,
the IP interfaces are bound to either VLANs or services and the switch performs inter-VLAN,
inter-Service or inter-VLAN-Service routing directly in a single operation.
Tech Brief
Shortest Path Bridging Architecture guide 26
The diagram in the middle illustrates the case of two-pass routing with a physical hairpin. In this
diagram, you can observe that IP interfaces are bound to VLAN 1 and VLAN 11, but not directly
to the service. The external physical loopback cable creates the link between the service and the
“dummy” VLAN, VLAN 11 in this example, where the IP interface resides. This external physical
loopback is configured with a SAP-side, where SAPs are defined for each service requiring
routing, and a VLAN-side, where dummy VLANs mapping to those services are tagged.
The right diagram illustrates the case of two-pass routing with internal front-panel loopback.
In this diagram, the dotted line represents an imaginary physical external loopback, which is
not required. In addition to not requiring an external physical loopback cable, the front-panel
loopback requires a minimum of one port only. CLI configuration is different between physical
external loopback and front-panel internal loopback. However, the concepts are very similar.
You should still think about the front-panel internal loopback port or ports as having a SAP
function and a VLAN function all in one port or linkagg.
11
VLAN 1
VLAN 1
VLAN
ISID 1 VLAN + SAP
VLAN port SAP port all in one port
VLAN 1
Figure 19 provides a logical representation of these options. The left diagram represents the
case of single-pass or inline routing. In these products, routing and bridging functions are fully
integrated in the service domain in the exact same manner as they are integrated in the VLAN
domain. For this reason, these products are represented with a router icon.
The diagram in the middle represents the case of two-pass routing with an external physical
loopback. In these products, routing and bridging functions are separate and represented by
router and bridge icons. You can observe that the router function, where dots representing IP
interfaces exist, connects to the bridge function using a VLAN port and a SAP.
The right diagram illustrates the case of two-pass routing with internal front-panel loopback.
As you can see, this case is almost the same to the case of two-pass routing with an external
physical loopback from a logical standpoint. However, the routing function attaches to the
bridging function using a single port or group of ports. This front-panel loopback port or group
of ports still performs a SAP function and a VLAN function. In addition, this connection between
routing and bridging functions is created internally in the switch ASIC and does not require an
external cable.
Tech Brief
Shortest Path Bridging Architecture guide 27
The configuration snippet 26 shows that, in products supporting single-pass or inline routing,
IP interfaces can be bound to services just like they can be bound to VLANs. The switch simply
performs routing in the same domain (VLAN or Service) or between different domains (VLAN
and Service). Note that the backbone and service configuration is not shown in this example.
The configuration snippet 27 shows the equivalent configuration for products supporting two-
pass routing with external physical loopback. Since IP interfaces cannot be bound to a service
directly, we create 2 additional “dummy” VLANs to bind these interfaces to. VLAN 11 will be
associated to service 1 and VLAN 12 will be associated to service 2. The external physical
loopback uses port 1/1/1 as VLAN port and port 1/1/2 as SAP. When creating the IP interfaces
bound to those dummy VLANs, we use the rtr-port option. This prevents those VLANs from
being bound to other ports and disables STP on those VLANs. Note that as explained previously,
linkaggs can be used instead of single ports and linkagg member ports can span diverse units in
a VC for redundancy.
The configuration snippet 28 shows the equivalent configuration for products supporting two-
pass routing with internal front-panel loopback. Firstly, port 1/1/51A is designated as the front-
panel loopback port. Dummy VLANs are created and SAPs linking those dummy VLANs to their
associated services are defined on the loopback port. When creating the IP interfaces bound
to the dummy VLANs, we use the rtr-port option and reference the loopback port. Once again,
the example shows the case of single front-panel loopback port but linkaggs can be used for
additional bandwidth and resiliency in the case of VC.
Tech Brief
Shortest Path Bridging Architecture guide 28
11. L3 services
A L3 service refers to a type of VPN service connecting multiple sites in a single any-to-any
routing domain. Different sites utilize different subnets and require routing to communicate.
For multi-tenancy, and to keep different customers isolated at L3, each customer service is
associated to its own VRF instance.
BEB1 BEB2
10.0.1.0/24 10.0.2.0/24
.254 .254
.1 .2
Site 1 Site 2
10.0.0.0/24
SPB Service A
VRF A
10.0.3.0/24 10.0.4.0/24
.254 .254
.3 .4
Site 3 Site 4
BEB3 BEB4
Figure 20 illustrates an example of a L3 Service connecting four of customer A’s sites: Sites 1 through
4. You will notice that each site uses a different subnet and therefore, inter-site routing is required.
BEB nodes connecting customer sites are represented with router icons for simplicity. These BEBs
have a “LAN”-facing interface which acts as the local site default gateway, as well as a “WAN”-facing
interface to reach remote sites. All “WAN” interfaces are bound to a single SPB service and are on the
same “WAN” subnet. Lastly, all the LAN and WAN IP interfaces associated to customer A are bound
to the same customer A VRF to provide L3 isolation between different customers.
SPB-based L3 VPN services rely on edge routing: Routing is only performed at ingress and egress
BEBs and bridged between these. At L3, the WAN represents a single L3 hop regardless of the
number of intermediate L2 hops (BCBs) in between. SPB simply bridges traffic from ingress BEB
to egress BEB along the shortest path.
Up to this point, we have only described the DP. What about the CP? At the CP level, L3 VPN
services come in two variants: VPN Lite and L3 VPN. Let’s elaborate on these two variants.
BEB1 BEB2
10.0.1.0/24 10.0.2.0/24
.254 .254
.1 .2
Site 1 Site 2
SPB Service A
VRF A
OSPF area 0
10.0.0.0/24
10.0.3.0/24 10.0.4.0/24
.254 .254
.3 .4
Site 3 Site 4
BEB3 BEB4
Tech Brief
Shortest Path Bridging Architecture guide 29
We should highlight that, in a VPN Lite type of L3 service, the L2 SPB service simply provides
L2 connectivity to the “WAN” IP interfaces. Continuing with OSPF as an example, this means that
OSPF is configured as usual. Also, since all WAN IP interfaces are connected to a single L2 SPB
service, in the case of OSPF, a DR/BDR election will take place as usual.
11.2 L3 VPN
SPB L3 VPN leverages the existing SPB IS-IS instance to carry customer VPN routes without
requiring an additional routing protocol such as OSPF. This is accomplished with additional
IS-IS TLVs extensions. We should note that each customer or tenant is still associated to its
own VRF and IS-IS TLVs reference the customer’s ISID to preserve L3 isolation between different
customers or tenants. This mechanism is described in an IETF draft [1]. Refer to figure 22.
For those familiar with MPLS or EVPN, those technologies rely on an IGP (for example; OSPF or
IS-IS) for backbone node reachability, and MP-BGP (RFC 4760) for customer VPN route transport.
In SPB L3 VPN, IS-IS can play both of those roles; backbone node reachability and customer VPN
route transport. Using a single protocol instead of two, results in a network that is simpler to
deploy and operate.
In addition, when comparing SPB and MPLS, SPB BEB nodes play a role similar to MPLS PE nodes
while SPB BCB nodes are similar to MPLS P nodes. In particular, SPB BCB nodes do not learn any
customer VPN routes and require no VRFs to be created on them. VRFs need only be created on
BEB nodes and customer VPN routes are only learnt on the BEBs that those customers connect to.
BEB1 BEB2
10.0.1.0/24 10.0.2.0/24
.254 .254
.1 .2
Site 1 Site 2
SPB Service A
VRF A
SPB IS-IS
10.0.0.0/24
10.0.3.0/24 10.0.4.0/24
.254 .254
.3 .4
Site 3 Site 4
BEB3 BEB4
Unlike the case of a VPN Lite, an SPB L3 VPN does not require the addition of any routing
protocol. Customer’s VRF routes are exported to the SPB IS-IS instance, associated to the
customer’s ISID, and bound to the WAN IP as a gateway address. Far-end BEBs will import those
routes into their local VRF routing table. Therefore, those routes will point to the WAN IP address
as next-hop. We should note that this mechanism is applicable and identical for both IPv4 and
IPv6. This is illustrated in figure 23 from the perspective of BEB-1. We should note that route-
maps can be used for fine-grained route filtering.
BEB1
10.0.1.0/24
.254
.1 SPB Service A
VRF A
Site 1 SPB IS-IS
10.0.0.0/24
Import far-end SPB IS-IS routes associated with the customer’s ISID
into the customer’s VRF and set the far-end WAN IP address as next hop
Tech Brief
Shortest Path Bridging Architecture guide 30
A L3 VPN service builds upon a L2 service and involves the following steps:
• Creating an L2 SPB service
• Creating a tenant VRF
• Creating LAN-side and WAN-side IP interfaces on the tenant VRF. LAN-side IP interfaces
normally reside on a VLAN. WAN-side IP interfaces can reside directly on the SPB services
itself on products supporting single-pass inline routing, or on a “dummy” VLAN on products
requiring external physical or internal front-panel loopback.
• Binding the WAN IP interface to the L2 SPB service’s ISID
• Route import/export between local VRF routing table and SPB IS-IS ISID instance
Let’s go back to the sample topology used for L2 services in section 9 and configure a L3 VPN
service so we can have a look at the configuration. We will look at devices supporting internal
front-panel loopback.
Site 2
192.168.22.0/24
1/1/48
.254
BEB2
.2
BEB4
.254
1/1/48
Site 4
192.168.24.0/24
We will now provide configuration snippets for all BEBs. Like their L2 counterpart, L3 VPN
services require no configuration on BCBs. Let’s provide some details about this example:
• Customer sites connect to their local BEB though interface 1/1/48
• LAN-side, or site default-gateway IP interfaces are bound to VLAN 3001, which is the default
VLAN on port 1/1/48
• Port 1/1/54A is designated as a loopback port
• WAN-side IP interfaces are bound to dummy VLAN 3100
Tech Brief
Shortest Path Bridging Architecture guide 31
Snippet 29. L3 VPN example – BEB-1
Tech Brief
Shortest Path Bridging Architecture guide 32
Snippet 32. L3 VPN example – BEB-4
Having created the L3 VPN service on all nodes, we can now proceed to verify it with show
commands. Let’s start by verifying correct route import and export. Snippet 33 shows routes in
BEB-1’s VRF “Customer_A”. Both local LAN and WAN subnets are LOCAL routes while far-end LAN
subnets are IMPORT routes whose next hop gateway address is the WAN address of the remote BEB.
Snippet 34 shows arp entries in BEB-1’s VRF “Customer_A”. Far-end WAN gateway addresses are
dynamically learnt.
In addition to these L3-related verification steps, all steps covered in section 9 can be used to
verify the underlying L2 service.
Tech Brief
Shortest Path Bridging Architecture guide 33
11.3 VPN Lite versus L3 VPN
Having presented VPN Lite and L3 VPN, we can now discuss the pros and cons and provide
guidelines to help you choose one versus the other.
With such compelling arguments in favour of L3 VPN, you may wonder why anyone would
choose to use VPN Lite instead. The reason is that, while L3 VPN is the recommended option
within the SPB domain, L3 VPN relies on SPB IS-IS and cannot directly interoperate with external
networks. This is where VPN Lite comes in. VPN Lite can be configured on border BEB nodes
linking the SPB domain to external, non-SPB capable networks. These border BEB nodes use L3
VPN to communicate with other BEB nodes and VPN Lite to interoperate with external non-SPB
nodes through common routing protocols such as OSPF or BGPv4.
In short, L3 VPN is recommended within the SPB domain and VPN Lite is needed only on border
nodes connecting to the outside world.
Figure 25 shows the same familiar diagram that we have been using so far, but now with two
customers, A and B. Each customer is associated to its own ISID (1002 for Customer A and
1003 for Customer B) and VRF (Customer_A and Customer_B) on BEBs 1 through 4. Routes
are propagated across the backbone as explained in section 11.2.
Let’s now imagine that these customers need to also access some shared services and Internet
access. An additional L3_VPN is created on BEB1 and BEB2, the “border” BEBs. These are
the nodes that those shared services are accessed through. The “shared_services” L3VPN is
associated to its own ISID (1004) and VRF (shared_services). Note that this L3VPN need not
be stretched to BEBs 2 and 4.
BEB1 and BEB2 can exchange routes with external entities, such as the firewalls, using a
standard protocol, such as BGP4. Those routes can be leaked to customer A’s and B’s VRFs. In
turn, customer A’s and B’s VRF routes can be leaked to the “shared_services” VRF. As a pre-
requisite, customer A’s and B’s address space must not overlap with each other nor with the
shared services.
Tech Brief
Shortest Path Bridging Architecture guide 34
Snippet 35. Route leaking
Snippet 35 provides the commands required to accomplish this on the border BEBs, BEB1
and BEB2.
Customer B Customer B
Site 1 Site 2
Customer B Customer B
Site 3 Site 4
Customer A Customer A
BEB3 BEB4
Site 3 Site 4
Tech Brief
Shortest Path Bridging Architecture guide 35
13. Automation
Up to this point, we have explained SPB concepts and configured the SPB backbone and
services manually. However, AOS incorporates features that can build both the SPB backbone
and services automatically. In this section, we will explain the various mechanisms that make a
near zero-touch SPB network possible. A factory-default Alcatel-Lucent OmniSwitch has these
mechanisms enabled by default and will automatically attempt to create an SPB backbone
and services as explained in the subsequent subsections, unless these automation features are
explicitly disabled. This set of features is sometimes referred to as “Intelligent Fabric” or “iFab”
for short. In this section, we provide a simplified, high-level overview of these features. For a
detailed description, please refer to the Alcatel-Lucent OmniSwitch Switch Management Guide.
13.1 Auto-Fabric
Figure 26 is a simplified view of a factory-default OmniSwitch bootup process. For a more
detailed flow chart, please refer to the Alcatel-Lucent OmniSwitch Switch Management Guide.
Auto-VC
Succeeds
with AF Auto-IP
Fails or disabled
succeeds with Auto-RCD STOP As soon as IP
AF enabled interface is up
if AF is enabled
Link flap
13.1.2 Auto-VC
On bootup, and in absence of the vcsetup.cfg file, an OmniSwitch uses LLDP to detect other
VC-compatible nodes connected to the default auto-VFL ports. Default auto-VFL ports depend
on the product family. Some families such as the Alcatel-Lucent OmniSwitch® 6860 Stackable
LAN Switch have 2 designated VFL ports which default to this role. In other families such as
the Alcatel-Lucent OmniSwitch® 6900 Stackable LAN Switch, which support VC of up to 6 units,
the last 5 VFL-eligible ports default to auto-VFL ports. If other products in the same family are
detected at the other end, they will attempt to automatically create a VC. A Master node will
be chosen through an election mechanism and non-Master nodes will reboot. Since this process
creates a vcsetup.cfg file on all involved nodes, auto-VC will not kick-in in subsequent node
reboot events.
Tech Brief
Shortest Path Bridging Architecture guide 36
13.1.3 Auto-RCD
Next, and in absence of a vcboot.cfg file, an OmniSwitch attempts to obtain an IP address
through DHCP on any of its operational non-VFL ports. It will try this using the untagged default
VLAN and tagged VLAN 127 and it will retry three times. If the switch succeeds in obtaining
an IP address, and depending on the DHCP options in the lease, the switch will subsequently
attempt to fetch an instruction file from a TFTP server or it will contact the Alcatel-Lucent
OmniVista® 2500 Network Management System. Next, the switch will attempt to download
firmware and vcboot.cfg from either an FTP/SFTP server or OmniVista. If the switch succeeds
at obtaining its firmware and configuration, it will reboot and load its configuration. Depending
on the configured options, the switch may or may not continue with the subsequent stages.
Please refer to the AOS Switch Management Guide and to [2] for further details.
13.1.4 Auto-LACP
All non-VFL ports are auto-LACP enabled by default. Auto-LACP kicks in on a factory-default
switch or a non-factory-default switch, unless explicitly disabled. Auto-LACP can be disabled
globally or only on specific ports.
During the auto-LACP stage, a switch uses LLDP to identify switches connected to auto-
LACP-enabled ports. Any LACP-compatible ports linking the same pair of switches will be
automatically added to a linkagg. Even if there is only a single link connecting two nodes, it
will still be configured as a linkagg because this allows additional links to be added later on
without requiring configuration changes. For instance, by creating a linkagg of 1 member port
and by referencing the (logical) linkagg as opposed to the (physical) port in other configuration
commands, those configuration commands do not need to change when additional member
ports are added to the linkagg. This is a best practice.
Note that, even if the remote switch is not an OmniSwitch, but is (manually) configured for LACP,
the OmniSwitch detects LACP PDUs and automatically configures its side of the linkagg. This
simplifies deployment even when 3rd party switches are used.
13.1.5 Auto-SPB
All non-VFL ports and linkaggs are auto-SPB enabled by default. Auto-SPB kicks in on a factory-
default switch or a non-factory-default switch, unless explicitly disabled. Auto-SPB can be
disabled globally or only on specific ports or linkaggs.
Auto-SPB also uses LLDP to detect presence of SPB-capable switches. When an SPB-capable
switch is detected, the switch will attempt to configure the port or linkagg as an SPB backbone
interface. When doing so it will use certain defaults.
On switches running AOS release 8.7R1 and later these defaults are:
• BVLANs 4000 through 4003 are created and mapped to ECT IDs 1 through 4 respectively
• BVLAN 4000 is designated as the control BVLAN
If the switch succeeds in establishing at least one SPB adjacency, all remaining non-VFL and
non-SPB backbone ports are automatically configured as auto UNP access ports, unless explicitly
disabled. Please refer to section 13.3 for details on auto UNP access ports.
13.1.6 Auto-MVRP
Auto-MVRP is enabled on factory-default switches. On switches booting from a vcboot.cfg
file however, this feature needs to be explicitly enabled. When auto-MVRP is enabled, and
if the switch fails to establish any SPB adjacency, MVRP will be enabled on all remaining
and operational non-VFL ports. This enables the dynamic instantiation of VLANs learnt from
neighbouring switches.
Tech Brief
Shortest Path Bridging Architecture guide 37
13.1.7 Auto-IP
The Auto-IP features runs in parallel with other features described in this section and, when
enabled, it kicks-in as soon as an IP interface is created. Auto-IP listens for routing protocol
(OSPFv2, OSPFv3 or IS-IS) “Hello” packets from neighbour devices and automatically creates local
routing configuration matching parameters in the received “Hello” packets such that an adjacency
can be formed. For example, reception of an OSPF “Hello” packet with area 1, Hello timer of
5 and Dead timer of 20 will result in matching configuration on the local device such that the
two devices become neighbours and an adjacency is established.
Let’s analyse the sample configuration in snippet 36 . This example refers to the case of L2
Services in which any required routing, such as default gateway, DHCP relay, is performed on a
central node, which can be a switch or a Firewall. Either way, service and SAP configuration on
the central L3 device is static. Dynamic configuration is useful at the edge nodes where client
devices are added, moved, and changed on a regular basis.
Six UNP profiles named “EMPLOYEE”, “IoT”, “GUEST”, “WLAN”, “CCTV”, and “RESTRICTED” are
created, each mapping to a different ISID. There are a total of four BVLANs, 4000 through 4003.
BVLAN 4000 is reserved as control BVLAN and therefore services can be mapped to BVLANs
4001 through 4003. As a result, each BVLAN carries traffic for two different services. These
UNP profiles use head-end replication and have VLAN translation enabled; these are default
behaviours which are explained elsewhere in this document.
So far, this describes the services but does not describe how ports or client devices will be
mapped to those services. This mapping can be either static or dynamic. Let’s start by analysing
the dynamic case. Ports 1/1/10 through 1/1/16 are defined as UNP “access” ports. This means
that they map traffic to an SPB service, as opposed to a UNP “bridge” port which maps traffic to
a VLAN. These ports utilise the “SAMPLE_FLOW” port template. This template is defined such that:
• 802.1x supplicants are authenticated against the “UPAM” radius server. If successful, the
radius server returns a “filter-id” attribute which matches one of the locally defined UNPs
(for example; EMPLOYEE, IoT, among others).
• As a fall-back mechanism for non-802.1x capable devices, such devices can use MAC
authentication. If successful, the radius server also returns a “filter-id” attribute which
matches one of the locally defined UNPs (for example; EMPLOYEE, IoT, among others).
• In both 802.1x or MAC authentication cases, it may happen that the radius server does not
return a “filter-id” or that the returned “filter-id” value does not match any of the locally
defined UNPs. In such case, those devices are bound to a “RESTRICTED” UNP.
• The RESTRICTED UNP is also defined as the default UNP which is used in case of
authentication failure. When bound to this RESTRICTED UNP, devices will receive an IP address
through DHCP but will be very limited in their access to network resources. This is controlled
at the central L3 node or firewall. This allows for these devices to have minimal network
connectivity such that they can be onboarded (for example a digital certificate can be applied)
and they can successfully authenticate next time they connect.
With this configuration in place, devices connected to ports 1/1/10 through 1/1/16 will be
authenticated and dynamically bound to an SPB service according to their type or user identity.
This means that the SPB service will automatically adapt and change as devices connect,
disconnect, move, or otherwise change without manual intervention.
Tech Brief
Shortest Path Bridging Architecture guide 38
In some cases, it may be necessary to statically bind these UNP services to a port. This is
particularly useful if authentication is not used or when the device is a “silent” device. A “silent”
device is a device that does not transmit traffic for extended periods of time because it goes into
power-save mode for instance. These periods of inactivity can result in a loss of service binding,
thus making the device effectively unreachable (for example for a WAKE-ON-LAN packet). This
problem can be avoided by statically binding the UNP profile to the port. We have applied static
UNP binding to ports 1/1/5 through 1/1/9 such that the service is statically bound to those ports
even if the device disconnects or stops communicating for extended periods of time.
It should be noted that statically binding a SAP, as opposed to a UNP, also offers a solution to
the silent device problem. However, by statically binding a UNP instead of a SAP, the exact
same UNP constructs can be used for both silent and non-silent devices. This results in a more
standardized configuration which is easier to create and maintain with fewer mistakes when
configurations need to change. This is considered a best practice.
Tech Brief
Shortest Path Bridging Architecture guide 39
Let’s analyse the L3 Service case for this example. What this means is that, rather than routing
at a centralized switch or firewall, edge routing is performed. Furthermore, let’s consider the case
of devices which attach to a standard VLAN port (for example not a SAP) and BEBs supporting
front-end-panel loopback routing. Since VLAN-to-Service mapping happens at the loopback
port, in this case we need to create bridge-type (VLAN) UNPs instead of access-type UNPs.
The SPB configuration will be statically defined. Configuration snippets are split in three parts
for convenience. Snippet 37 contains the VLAN-domain part of the configuration, snippet 38
contains the IP-domain part of the configuration, and snippet 39 contains the Service-domain
part of the configuration.
We should note that devices placed in the “RESTRICTED” role do not normally need to
communicate with other such devices. However, the configuration snippet allows for all routes
in the RESTRICTED VRF to be imported. This can be modified with the addition of a route-map
permitting routes to a central BEB or firewall only. Furthermore, a policy list can be attached t
o the RESTRICTED UNP definition such that those devices can only communicate with certain
head-end resources and can only use certain ports or applications. We will leave this exercise
for you to complete.
Tech Brief
Shortest Path Bridging Architecture guide 40
Snippet 38. Dynamic SAPs – L3 services – IP Domain
Tech Brief
Shortest Path Bridging Architecture guide 41
13.3 Dynamic Services
In the preceding section, we explained how SAPs can be dynamically configured to accommodate
mobile users and devices, and highly dynamic environments. This same mechanism is applicable
to VMs in a data centre. As VMs are created, turned-on or off, or migrated from one hypervisor
to another, SAPs can be automatically and dynamically created to adapt to those events on the
fly without network manager intervention.
For instance, classification rules can match VM traffic based on the VLAN tag (configured in the
hypervisor) and create the required SAPs dynamically and automatically. This is a best practice
compared to statically enabling all possible SAPs on all access ports because it reduces the
broadcast domain footprint to only the required ports, thus eliminating unnecessary broadcast
traffic and MAC learning.
However, with the features that we have described so far, even if the SAPs can dynamically
adapt, this would require that the service UNP be manually created. In certain scenarios, the
network administrator does not know the required parameters beforehand. For instance, the
server manager may create, change, and delete VLANs on the hypervisor’s vswitch on a regular
basis. It may be tempting to pre-provision services for all 4096 VLANs. But this is a poor practice
as it creates an unnecessary load on the control plane.
The best practice for that type of environment is to use AOS’ Dynamic Services feature. With
Dynamic Services, UNPs can be dynamically created, on the fly, based on the VLAN tag seen on
UNP ports. This feature is enabled by default on factory-default switches.
Upon receiving a frame on a UNP access port, the OmniSwitch automatically creates a dynamic
SAP and a dynamic UNP profile defining the SPB service that traffic will be mapped to. Snippet
40 provides an example of such a dynamically created UNP profile. The profile in the snippet is
created upon reception of traffic tagged with VLAN 101. How does the AOS select the ISID and
BVLAN to be used in the newly created service? It uses the formulas below where ‘%’ denotes
the “modulo” division: the reminder of the integer division.
• ISID Number = Base Service Number + Domain ID + (VLAN Number % Service Modulo)
• BVLAN Index = ISID Number % (Total number of BVLANs)
By default:
• Base Service Number = 10,000,000
• Domain ID = 0
• Service Modulo = 512
Let’s also assume that BVLANs 4000-4003 are created and calculate the ISID and BVLAN
number manually.
ISID Number = 10,000,000 + 0 + (101 % 512) = 10,000,000 + 101 = 10,000,101
BVLAN Index = 10,000,101 % 4 = 1
The formula does not provide the BVLAN number directly but the BVLAN index: the position
in a BVLAN array sorted in ascending order where the lowest numbered BVLAN is in position 0
and the highest numbered BVLAN is in position N-1. Therefore, in our example, with BVLANs
4000-4003, BVLAN index 1 maps to BVLAN 4001.
Tech Brief
Shortest Path Bridging Architecture guide 42
It is important to understand that with 4096 possible VLAN tags, using the default Service
Modulo of 512 can result in up to 8 different VLAN tags being mapped to the same service. This
is not the desired outcome most of the time because it will result in different VLAN traffic being
bridged in the same L2 domain. To ensure L2 isolation, we can change the Service Modulo to
4096 as shown in Snippet 41.
Let’s now focus on another parameter used in the ISID calculation formula: Domain ID. The
Domain ID is useful in a multi-tenanted environment. For example, let’s consider a network
providing services to three different customers: A, B, and C. These customers can use multiple
VLANs and some of those VLANs may overlap. How do you ensure customer traffic isolation
in the SPB domain? Isolation is achieved by creating a Domain ID for each customer and by
the mapping customer’s UNI ports to the Domain. The example in Snippet 42 illustrates this
configuration. Domains 1 through 3 are created for customers A through C. Ports 1/1/1-10
connecting customer A’s devices are mapped to domain 1, ports 1/1/11-21 connecting customer
B’s devices are mapped to domain 2, and so on. This configuration preserves customer isolation
even when services and SAPs are dynamically and automatically configured on the fly in
response to VLAN tags in incoming traffic.
Lastly, the Base Service Number (BSN) enables manual and dynamic service coexistence without
conflict. Dynamically created services map to ISIDs greater than or equal to the BSN. Manually
created services should use ISID numbers lower than the BSN.
14. Management
As explained in section 3.6, SPB IS-IS is not an IP protocol. BCB nodes do not require IP
interfaces. BEB nodes supporting L2 services only do not require IP interfaces either. BEB nodes
require IP interfaces only when supporting an L3 service (for example, L3 VPN or VPN Lite).
However, all SPB nodes whether BCB or BEB, require IP interfaces for management purposes.
Tech Brief
Shortest Path Bridging Architecture guide 43
no loopback of any kind is required. The management network or stations attach to one or
more gateway nodes through VLAN-domain interfaces. We should note that IP interfaces
created on the control BVLAN do not support configuration of any routing protocol or function
(for example, OSPF or VRRP) and do not rely on ARP for IP-to-MAC resolution because there
are no broadcasts on the SPB domain. IP-to-MAC mapping is resolved through IS-IS TLVs. IS-IS
TLVs also carry management routes through the SPB backbone. VLAN-domain and SPB-domain
management routes can be cross-redistributed at gateways nodes. The “spb-mgmt” protocol is
associated to SPB-domain management routes.
BEB1 BEB3
1/1/1 BCB
1/1/1
BEB2 BEB4
Let’s examine the in-band management example in figure 27. In this example, nodes BEB-1 and
BEB-2 are gateways nodes linking the SPB-management domain and the VLAN-management
domain. The VLAN-management subnet is 172.16.0.0/24 and the SPB-management subnet is
172.16.1.0/24. OSPF is used in the Management network. Nodes BEB-1 and BEB-2 redistribute
routes between OSPF and SPB-MGMT protocols. Route maps prevent circular route redistribution
between these two protocols.
Tech Brief
Shortest Path Bridging Architecture guide 44
Snippet 45. In-band management – BEB-3
OAM is supported at the BVLAN level, refer to figure 28. Virtual MEPs must be configured for
all BVLANs and BEBs and, optionally, also for BCBs (such that a L2 PING or L2 trace test can be
initiated from any node to any other node). MIPs are automatically created and do not need to
be explicitly configured.
Since there is no CCM function to map system names, link trace commands and output will
reference the BMACs.
MIP
MIP
(V) SPBM (V)
V V
MEP MEP
MEP MEP
MIP
Tech Brief
Shortest Path Bridging Architecture guide 45
OAM is also supported at the VLAN level or between L2 access switches connected to BEBs over
SAP UNIs. This is useful in a L2 deployment for testing end-to-end service connectivity between
sites. OAM at the VLAN level must be set at a higher maintenance domain level than BVLAN OAM.
Figure 29 shows a practical example of how OAM can be used to verify connectivity between
BEBs by means of Loopback message (LBM) and loopback reply (LBR) and checking the route
with link trace message (LTM) and link trace reply (LTR).
LBM
(V) (V)
MEP MEP
BEB BCB BCB BEB
LBR
LTM
Configuration Snippet 48 provides a sample OAM configuration for service BVLANs 4001-4003.
Tech Brief
Shortest Path Bridging Architecture guide 46
Snippet 49 provides sample configuration and output for an L2 trace test. As shown in the
snippet, the trace provides, among other elements, BMACs for all transit nodes as well as
ingress and egress interfaces used.
Tech Brief
Shortest Path Bridging Architecture guide 47
Snippet 51. Service Assurance Agent stats
Setting the overload state on the node will signal other nodes not to use it as a transit node and
use alternate paths instead. This is similar to increasing the metric on all the links but is a much
quicker way of achieving this outcome. Note, however, once the overload state is enabled on a
node no traffic will transit through the node even if there are no alternative paths.
The overload state can be set indefinitely (until removed) or it can revert after a timer expires.
Without graceful restart, a VC master or CMM takeover event would require neighbour nodes
to tear down and re-establish adjacencies with the restarting node and re-build the topology
database, resulting in some disruption to traffic flows.
When graceful restart is enabled, and with the help of a neighbour node, the node undergoing
a takeover will announce this condition to its neighbours by setting the RR (restart request) in
a TLV message and continue using its existing FDB while restarting. The neighbour nodes will
maintain their adjacencies with the restarting node during this process and send their complete
LSP database information to the restarting node once the process is complete.
This makes the transition a much smoother process because disruption to traffic forwarding is
minimized and the topology database is re-built in a much shorter time.
We start by highlighting that the simplest way of achieving redundant CE to BEB attachment
is to use VC at the BEB and to attach the CE device to the BEB through a LAG. This redundancy
option is applicable to any service type (L2 or L3).
Tech Brief
Shortest Path Bridging Architecture guide 48
We will now present alternate redundancy options other than VC+LAG.
Let’s start with L2 Services in figure 30 below. We can consider the following options:
• Non-redundant: The CE is attached to a single BEB through a single link. Link, BEB or CE
failure will result in loss of service to the site
• Redundant links: The CE is attached to a single BEB through a link aggregate (LAG). This adds
protection from single-link failure. Note that fibre runs should use diverse physical paths to
protect against fibre cuts which would typically interrupt both links otherwise.
• Redundant links and nodes: The CE is attached to two different BEBs through two different
links. This adds protection from BEB failure. When possible, both links should use physically
diverse paths such that link failure events are not correlated. Dual-Home Link (DHL) is a high
availability feature that provides fast failover without implementing Spanning Tree or Link
Aggregation. Please refer to the “AOS 8 Network Configuration Guide” for further details.
• Fully redundant: This option adds CE device redundancy. MSTP (Multiple Spanning Tree
Protocol) can be used to avoid loops in this redundant connection. By default, SPB floods STP
BPDUs messaging over SPB services. When using MSTP, different sites must use different
MSTP regions to avoid creating a large MSTP region spanning all sites.
Note that Virtual Chassis (VC) can be combined with all the options above to increase resiliency.
SPB SPB
BEB
SPB SPB
DHL MSTP
Let’s now continue with L3 services. We can distinguish two sub-variants: L3 CE and L2 CE. A L3
CE can exchange routes with the BEBs by using any supported routing protocol as well as static
or default routes. A L2 CE on the other hand will completely delegate routing to the BEB, which
will act as a default gateway for local devices. These two sub-variants are illustrated in figure 31
and figure 32. Note that hairpins, when required, are not shown for simplicity.
Tech Brief
Shortest Path Bridging Architecture guide 49
Figure 31. L3 Service attachment - L3 CE
SPB SPB
BEB
Routing
protocol
SPB SPB
Routing
protocol Routing
protocol
You may notice that the case of L3 Service attachment with a L2 CE is almost identical to the
case of L2 Service attachment. However, since the routing function is delegated to the BEB,
VRRP is required when CEs attach to redundant BEBs. This requires access VLANs to be extended
across both BEBs. If BEBs are directly connected, the access VLANs can be simply tagged on the
link interconnecting both BEBs. However, if there is no direct connection between the BEB pair,
a dedicated SPB service can be created to this effect.
In addition, note that when using a L2 CE in a L3 Service, there is no routing protocol between CE
and BEB. In such a case, the associated VRF can be configured as a “low profile” VRF. Low profile
VRFs have routing capabilities restricted to static and/or imported routes, which is sufficient for
such a situation. Low profile VRFs take up less BEB resources than “max profile” VRFs allowing
for creation of more VRFs on the BEB.
As in the case of L2 Service attachment, all options can be combined with VC and LAG.
SPB SPB
BEB
SPB SPB
VRRP VRRP
DHL
MSTP
Tech Brief
Shortest Path Bridging Architecture guide 50
17. Loop avoidance and suppression
In the CP, loops are avoided with IS-IS, a link-state routing protocol. In the DP, a node will not
accept unexpected frames from its neighbours.
However, short-lived transient loops may form in the event of a topology change and until
network convergence is attained. Loops pose a serious threat to the network stability.
In the DP, SPB incorporates an additional loop mitigation technique to detect and break these
transient loops:
• Reverse-path Forwarding Check (RPFC): RPFC exploits SPB’s symmetry and congruence
properties. RPFC verifies that incoming traffic’s source BMAC is indeed reachable over the
ingress interface according to the local FDB and discards non-conforming frames.
In addition, the SPB backbone must be protected from loops that may be created due to failures
and misconfiguration at the VLAN-domain access layer. By default, SAPs forward STP BPDUs
allowing redundantly-attached VLAN-domain access layer to use STP for loop prevention.
There is always a chance however that STP may be misconfigured, fail, or not be enabled at all.
Configuration faults in customer networks can result in loops spanning both the SPB backbone
and customer access network. This can result in broadcast storms. To protect the SPB backbone
from broadcast storms, loops involving SAPs must be detected and broken.
AOS supports an additional loop mitigation mechanism to detect and break access layer loops:
Loopback Detection (LBD). LBD can detect and protect the backbone network from forwarding
loops created at the VLAN-domain customer-access layer. LBD operates in addition to other
mechanisms such as DHL or STP. When a loop is detected, the port is disabled and goes into a
shutdown state. A trap is sent and the event is logged.
The switch periodically sends out LBD frames from LBD-enabled ports and concludes that the
port is looped back if it receives the frame on any of the LBD-enabled ports.
LBD can be used on both VLAN UNI and SAP UNI ports. In the case of SAP UNI ports, LBD frames
will be sent on all SAPs because different access VLANs may have different logical topologies.
However, if a loop is detected on a SAP, the entire physical port will be shut down.
Figure 33 illustrates situations in which LBD can detect and break loops.
Port in switch with highest Port in switch with highest Port in switch with highest
BridgeID is shut down BridgeID is shut down PortID is shut down
By default, LBD is disabled for the switch and on all service-access ports. Enable LBD globally
on the switch and in specific service-access ports or linkaggs as shown in Snippet 52.
Tech Brief
Shortest Path Bridging Architecture guide 51
Snippet 52. Loopback detection
AOS incorporates storm control through flood rate limiting of broadcast, multicast and unknown
unicast traffic. A high threshold rate is configured in megabits-per-second (mbps), packets-per-
second (pps), or as a percentage of the port speed. When the threshold value is reached, packets
are dropped or, the port is shutdown. Storm control is enabled by default with pre-defined rates.
Please refer to the AOS Network Configuration Guide for further details.
18.1 BVLANs
As described in section 5, SPB networks load balance traffic on a per-service basis. This load
balancing is achieved by mapping different services to different BVLANs. An SPB network
supports up to 16 BVLANs, however, most real-world physical topologies do not support 16
equal-cost-paths. There is no advantage in creating more BVLANs than the number of equal-cost-
paths in the physical topology. Moreover, since a SPT must be computed for each BVLAN, having
more BVLANs than equal-cost-paths in the physical topology creates an additional unnecessary
load in the CP which results in increased resource utilization and convergence times.
In short: Only create as many BVLANs as there are equal-cost-paths in the physical topology. As
of AOS 8.7R1 and later releases, only four BVLANs are created by default when using auto-SPB.
Mapping different VLANs to the same SPB service makes inter-VLAN bridging possible, thus
defeating the purpose of having different VLANs in the first place.
In addition, there is a risk of having duplicate MAC addresses. In theory, there should be no
duplicate MAC addresses; in reality, it can happen, particularly in virtualized environments.
Duplicate MAC addresses in different VLANs do not collide, however, if these VLANs are mapped
to the same SPB service and the client devices are connected to different SAPs, those MACs will
be constantly learned, re-learned and flushed. This is known as a “mac-move” and should be
avoided to maintain stability. To avoid mac-move, we strongly recommend mapping different
VLANs to different SPB services (ISIDs). This will require one SAP and ISID per access VLAN.
There are some situations in which mapping different VLANs to the same SPB service (ISID) is
acceptable, but we will not elaborate on those situations.
In short: As a general guideline, map different VLANs to different SPB services by using specific
SAPs for each VLAN.
Tech Brief
Shortest Path Bridging Architecture guide 52
18.3 Virtual Chassis
Virtual chassis (VC) is a feature that combines multiple “stackable” switches into a single logical
“virtual chassis” such that each physical switch becomes a virtual “slot” in the virtually modular
chassis. A virtual chassis is a single logical entity managed as one device and with single control
and management planes.
Virtual chassis provides many benefits such as network architecture and management
simplification. VC greatly simplifies redundant service attachment. Customer CE access devices
can be dual-homed to diverse slots in a BEB through a link aggregate. This eliminates the need
to configure other L2 or L3 redundancy mechanisms such as DHL or VRRP.
When using virtual chassis in the SPB backbone, logical link aggregates (LAGs) are recommended
to interconnect the VC to all its SPB neighbours such that one member (physical) port connects
to every slot in the VC as seen in figure 34. This is not mandatory but is recommended and will
improve the network convergence time in the event of slot failure because the need to update
tables during the control plane takeover is greatly reduced. In addition, dual homing nodes to
a VC reduces the need to forward traffic across the VFL because traffic forwarding in a LAG
prioritizes the use of local linkagg member ports over remote (across the VFL) member ports.
BxB
BxB BxB
BxB
BxB BxB
In a LAG, traffic is load balanced across member ports in one of two ways:
• MAC hash (brief mode)
• IP + TCP/UDP port hash (extended mode)
However, SPB backbone ports use MAC-in-MAC encapsulation which means MAC addresses are
the BMACs of BEB and BCB nodes while IP addresses and port numbers are not visible to the
hashing logic. In most cases this does not create enough entropy and the load will not be spread
evenly across all different physical links.
Since AOS 8.3.1R01, a “tunnel-protocol” option can be selected such that the hashing can use
CMACs or IP addresses + TCP/UDP ports.
It is recommended that this option be enabled on all SPB nodes using LAG. The choice of MAC
(brief) or IP+TCP/UDP ports (extended) is a global setting which will apply to all LAGs. Please
refer to the AOS Command Line Interface Guide for further details.
Tech Brief
Shortest Path Bridging Architecture guide 53
18.5 Link Metric
SPB uses the link metric as a measure of a link’s cost to reach another node. By default, all link
metrics are set to 10 regardless of link speed. The link metric is an integer in the 1-16M range.
The link metric can be adjusted to influence the SPT calculations. For instance, the metric can be
changed to reflect the link speed. It should be noted that the metric must be adjusted on both
sides of a link. Nodes will become adjacent even when the metrics are different, but the highest
metric will be used in the SPT calculations.
Changing the link metric to reflect the link speed will help steer traffic towards links with
higher capacity and away from lower capacity ones, making the best use of the total available
bandwidth and improving performance. Table 3 shows a way in which the metric can be set to
be inversely proportional to the link speed.
100G 1000
50G 2000
40G 2500
25G 4000
10G 10000
1G 100000
100M 1000000
18.6 QoS
In an SPB network, traffic is classified at the SAP and the classification does not change as traffic
traverses the backbone and until it exits through another SAP at the destination BEB.
Trusted SAPs copy CoS markings from the incoming VLAN tag onto the BVLAN tag. If incoming
traffic is not tagged, then the port’s default priority is used. Un-trusted SAPs set the CoS
markings to a user-defined value.
No further classification based on inner L2-L4 conditions is possible within the SPB backbone
due to the MAC-in-MAC encapsulation.
When using an external or two-pass routing (external physical or internal front-panel loopback),
the standard VLAN port must best set to trust and use CoS and not DSCP to preserve CoS
markings end-to-end.
Tech Brief
Shortest Path Bridging Architecture guide 54
19.1 Management VRF
As explained in section 3.6, SPB relies on a non-IP protocol for path computation. For this reason,
BCB nodes and BEB nodes supporting L2 services only do not require an IP address. The only
case in which an SPB node requires an IP address is the case of a BEB node supporting a L3
service or feature such as L3 VPN, VPN Lite, or VRRP, among others.
We have covered different SBP management options in section 14. Management IP addresses
can be bound to:
• The EMP port, in case of OOBM
• To a standard VLAN port, in the case of OOBM
• The control BVLAN, in the case of in-band management
• A Management SPB service, directly in the case of products supporting single-pass
inline routing
• A Management SPB service, indirectly in the case of products supporting external physical
or internal front-panel loopback
We want to point out that no matter what management option is chosen, management IP
addresses should use a different VRF from the VRF used for service or customer traffic. This
is already the case when using the EMP port for OOBM. One possibility is creating a dedicated
management VRF and enabling the required management protocols on this VRF as shown in
Snippet 43 through Snippet 47.
Another possibility is using the default VRF for management, under the condition of not using
it for anything other than management.
19.2 MACSec
Data integrity and confidentiality must be protected while in transit through the network.
MACSec is an IEEE standard (802.1AE) which provides point-to-point authentication and optional
encryption between MACSec-capable devices such as switches. MACSec can prevent various
threats such as man-in-the-middle, sniffing, spoofing, and playback attacks.
Because MACSec operates at the MAC layer, it transparently secures all upper layer traffic
transiting through MACSec-enabled links. This includes both application-layer data, as well
as control-plane and management-plane communication. In addition, unlike IPSec, MACSec is
implemented in hardware at wire-speed and does not introduce additional latency or bandwidth
limitations.
19.3 NAC
In section 13.2, we explained how users and devices can be dynamically mapped to their
services based on their identity. Enabling authentication on every front-panel port ensures only
authorized users and devices can access network services. One additional benefit of creating
dynamic SAPs through NAC is that no service is instantiated on a BEB until an authorized user
successfully authenticates and is mapped to the service: The service is instantiated on demand.
This is an additional layer of security compared to static SAPs because no service is connected
if no authorized user is connected. It is clearly more difficult to hack, attack, or otherwise disrupt
a service when it is not even connected.
Tech Brief
Shortest Path Bridging Architecture guide 55
This creates an opportunity for a bad actor to inject malicious routes and poison the routing
table to carry out DoS, MITM, or other attacks.
This risk can be mitigated by enabling routing protocol authentication (e.g. MD5 for OSPF or BGP).
20. Conclusion
Shortest Path Bridging is a powerful technology yet simple when compared to others such as
MPLS or EVPN. SPB is broadly supported across the Alcatel-Lucent OmniSwitch portfolio with
products in multiple formats, from stackable to modular chassis and even industrial-grade
ruggedized variants. This product breadth, coupled with SPB’s service-oriented framework,
results in a network architecture that can deliver the required service to the right location
with minimal network configuration changes, or even in a fully automated manner.
www.al-enterprise.com The Alcatel-Lucent name and logo are trademarks of Nokia used under license
by ALE. To view other trademarks used by affiliated companies of ALE Holding, visit: www.al-enterprise.
com/en/legal/trademarks-copyright. All other trademarks are the property of their respective owners.
The information presented is subject to change without notice. Neither ALE Holding nor any of
its affiliates assumes any responsibility for inaccuracies contained herein. © Copyright 2021 ALE
International, ALE USA Inc. All rights reserved in all countries. DID21040501EN (April 2021)
CONSOLE CONNECTIONS
ALE NETWORK PRODUCTS
OS6900 CONSOLE
Console Server
Serial to USB
USB A RJ45 to DB9 Female
console
Straight UTP cable
OS6900 T20/T40/X20/X40
@ 9600 Baud Rate OS6900-USB-RJ45
Console Server
Serial to USB
Serial to USB
Console Server
RJ45 to DB9 Female
OS6900 RJ45
console RJ45 to DB9 Female
Straight UTP cable
V72/C32/X48C6/T48C6/V48C8
@ 115200 Baud Rate
Comes in the box
Male-Male DB9 Adapter
* Connections to Console servers may need Straight or Roll-over UTP cable depending on Console Server model
OS6900 CONSOLE
USB A
console
Console Roll-over Adapter
OS6900 T20/T40/X20/X40
@ 9600 Baud Rate OS6900-USB-RJ45
Comes in the box Console Roll-over cable with USB Type A
RJ45
Console Roll-over Adapter
OS6900 X72/Q32 console
OR
@ 9600 Baud Rate
Console Roll-over cable with USB Type C
OS6900 RJ45
console
V72/C32/X48C6/T48C6/V48C8
@ 115200 Baud Rate
OS6860 CONSOLE
Console Server
Serial to USB
Micro USB RJ45 to DB9 Female
console
Straight UTP cable
OS6860/OS6860E
@ 9600 Baud Rate OS6860-RS232CBL
Needs to be
ordered separately
OS6860N
@ 115200 Baud Rate RJ45 to DB9 Female
Straight UTP cable
* Connections to Console servers may need Straight or Roll-over UTP cable depending on Console Server model
OS6860 CONSOLE Comes in the box Requires installation of a driver on PC
https://www.silabs.com/developers/usb-to-uart-bridge-vcp-drivers
OS6860-RS232CBL
Needs to be
ordered OR
separately
Serial to USB
OS6900-USB-RJ45RJ45 to DB9 Female
Legacy/New Switches Straight UTP cable
6850
6855
6865 Console Roll-over Adapter
9900
10K Console Roll-over cable with USB Type C
* Connections to Console servers may need Straight or Roll-over UTP cable depending on Console Server model
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch AOS R6
Link Aggregation
How to
✓ This lab is designed to familiarize you with Static link aggregation.
Contents
1 Topology ........................................................................................ 2
2 Link Aggregation – Static option ............................................................ 2
2.1. Create a Static Link Aggregation ................................................................. 2
2.2. Test the configuration ............................................................................. 3
3 Lab Check ...................................................................................... 4
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Link Aggregation
1 Topology
Link Aggregation provides the ability to combine multiple physical ports into a single logical port for added
throughput and redundancy; this can be done statically using OmniChannel or dynamically using the IEEE
802.3ad (LACP) protocol.
Notes
In this example, 5 represents the aggregate identifier and 2 is the maximum number of ports in the aggregate
- Check to see what you have done; notice the operational status is DOWN.
- Type:
-> show linkagg
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
5 Static 40000005 2 ENABLED DOWN 0 0
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
5 Static 40000005 2 ENABLED DOWN 0 2
Notes
Ports don't necessarily have to be the same on both ends of the link.
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
5 Static 40000005 2 ENABLED UP 2 2
Notes
6450-A already an IP address assigned to vlan 1 from previous lab
4
Link Aggregation
Notes
There’s no link between 6860 and 6450, so it’s not possible to make a ping between them.
- To demonstrate the redundancy capabilities, experiment with removing a link and monitor the results of
your pings tests
Tips
You can use the command ping <dest_ip_address> count <number> to send more than 6 pings.
To break a ping sequence, press the key CTRL+C
To simulate a link failure, you can bring down the corresponding interface :
interface slot/port admin down (6450)
- We will now perform a similar configuration exercise using the IEEE 802.3ad standard (LACP). Before
proceeding remove the static link aggregation group you created. You can either return your switch to
factory default or remove them manually. Note that you cannot delete a link aggregation group if there
are ports still associated with it:
6450 -> no static linkagg 5
ERROR: LAERR53 Static aggregate not empty deletion failed
- Ensure the link aggregation groups are removed on both switches as described above. There is no need to
disconnect the physical connections to continue to the next lab section.
3 Lab Check
Objectif
✓ This lab is designed to familiarize you with the OmniSwitch 6560 Virtual
Chassis feature (VC) and its configuration.
Contents
1 Configuring a Virtual Chassis of 2 OmniSwitchs 6560 .................................... 2
2 Monitoring the Virtual Chassis ............................................................... 4
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
6560 Virtual Chassis
- Assign a globally unique chassis identifier to the switch and enable the switch to operate in virtual chassis
mode, on both 6560:
6560-A -> show virtual-chassis topology
6560-A -> virtual-chassis chassis-id 1 configured-chassis-id 1
6560-A -> virtual-chassis chassis-group 1
6560-A -> show virtual-chassis topology
- Manage the 6560-A to be the master chassis, assign a highest chassis priority to it:
6560-A -> virtual-chassis configured-chassis-priority 200
- Configure a virtual fabric link (VFL) and member ports for the VFL:
6560-A -> virtual-chassis auto-vf-link-port 1/1/25
6560-A -> virtual-chassis auto-vf-link-port 1/1/26
6560-A -> write memory
VFL is an aggregate of high-speed ports used, between the peers, for inter-chassis traffic and control data
through the IPC-VLAN
- Vérifier que les liens virtuel fabric link (vfl) ont bien été créés :
6560-A -> show virtual-chassis vf-link
6560-A -> show virtual-chassis vf-link member-port
Notes
At the end of Chassis role election process, the Slave chassis will reboot to initialize its parameters and chassis
status.
4
6560 Virtual Chassis
- If the status of the OS6560 is not “Running”, check that the System Ready is set to Yes with the command:
6560-A -> debug show virtual-chassis topology
Local Chassis: 1
Oper Config Oper System
Chas Role Status Chas ID Pri Group MAC-Address Ready
-----+------------+-------------------+--------+-----+------+------------------+-------
1 Master Running 1 200 1 2c:fa:a2:aa:32:a1 Yes
2 Slave Running 2 100 1 2c:fa:a2:a2:f1:9d Yes
Notes
The chassis role determines which switch is the master of the Virtual Chassis.
The Master and Slave roles are only active when the operational status of the virtual-chassis feature is up for
both chassis.
Notes
The “Is Primary” field defines the primary port of the virtual fabric link.
5
6560 Virtual Chassis
- Verify the consistency of system-level mandatory parameters between the two chassis:
Notes
The two chassis in the same Virtual-Chassis group must maintain identical configuration and operational
parameters.
- Although the prompt is the same, you are now connected to the secondary VC. Type the following:
Local Chassis: 2
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 200 1 2c:fa:a2:05:cd:71
2 Slave Running 2 100 1 2c:fa:a2:05:cd:a9
- Look at the Local Chassis parameter. Now it says 2, which means you are connected to the secondary VC.
log
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
N N
boot.cfg VC Mode
Standalone Mode exists? • Auto VFL
Y N • Auto Chassis ID
AUTO VFL FEATURE – AUTO VFL PORTS
Auto VFL process runs only on port explicitly configured
as auto VFL port in vcsetup.cfg or runtime configuration
1 Auto VFL Detection Process
Y
Auto VFL Ports Automatically detect whether an
10G and 40G auto VFL port can become VFL
No copper
vcsetup.cfg
exists
2 OS6900-X / T
Assign VFL ID automatically • Last 5 ports of each chassis
Assign VFL ID OS6900: id= 0, 1, 2, 3, 4, 5 • Including ports in expansion slots
• Regardless of SFP+/QSFP presence on those ports
OS6900-Q32
3 • Last 5 ports of each chassis
Aggregate Auto VFL ports in aggregate • In case of 4x10G splitter cables is used
Aggregate
• Ports with 4x10G splitter is counted as 4 ports
multiple auto
• Ports with 40G QSFP are counted as 1 port
VFL ports
• Ports with no SFP+/QSFP are counted as 1 port
AUTO-VC - AUTO-CHASSIS ID
• Auto Chassis ID selection only occurs when there is no vcsetup.cfg
• Master selection is then run based on lowest MAC address
• Upon receiving their new chassis ID, non master units reboot and apply their new ID
• In case of a new chassis insertion, Master Chassis assigns the chassis id of the new member
vcsetup.cfg
! Virtual Chassis Manager:
virtual-chassis chassis-id 1 configured-chassis-id 1
virtual-chassis vf-link-mode auto
virtual-chassis auto-vf-link-port 1/1/31A
virtual-chassis auto-vf-link-port 1/1/32A
virtual-chassis auto-vf-link-port 1/1/32B
virtual-chassis auto-vf-link-port 1/1/32C
virtual-chassis auto-vf-link-port 1/1/32D
virtual-chassis chassis-id 1 chassis-group 77
INTELLIGENT FABRIC
AUTOMATIC REMOTE CONFIGURATION
2-Auto-Predefined config template
• RCL is run after Auto VC, and before the rest of Auto Fabric
• May result in no Auto Fabric being run depending on the RCL result
• May be used to enhance Auto Fabric
• The linkagg created by the RCL will be retained for use later and not modified by regular Auto
Linkagg
• RCL tries 6 times, 3 each on VLAN 1 and 127 to get DHCP and download instruction file
• To cancel RCL, run command “auto-config-abort”
• At the end of RCL, if a vcboot.cfg is downloaded, the box will be reset
• Auto Fabric will only run if the config file has the commands to do so
INTELLIGENT FABRIC - AUTOMATIC FABRIC PROTOCOLS
3- Auto-LACP
4- Auto-Routing
5- Auto-SPB Fabric
6- Auto-Network Profiling
7- Auto-MVRP
AUTO-DISCOVERY - AUTO-LACP
3- Auto-LACP
• LLDP enhancement
• Propriatery TLV used to detect the peer and, in return, receive peer’s system ID
• If LACP negotiation succeeds, form a link aggregation on a detected set of ports
vcboot.cfg
! SPB-ISIS:
• SPB configuration !spb isis bvlan 4000 ect-id 1
spb isis bvlan 4001 ect-id 2
• To apply a set of default SPB Backbone port spb isis bvlan 4002 ect-id 3
spb isis bvlan 4003 ect-id 4
configuration on a port or aggregate (configured spb isis bvlan 4004 ect-id 5
during LACP phase) spb isis bvlan 4005 ect-id 6
spb isis bvlan 4006 ect-id 7
• Network port configuration spb isis bvlan 4007 ect-id 8
spb isis bvlan 4008 ect-id 9
• If adjacencies not formed during 4 Hello intervals spb isis bvlan 4009 ect-id 10
spb isis bvlan 4010 ect-id 11
(4x9 sec) – NOT a part of SPB spb isis bvlan 4011 ect-id 12
spb isis bvlan 4012 ect-id 13
spb isis bvlan 4013 ect-id 14
spb isis bvlan 4014 ect-id 15
• Default SPB configuration spb isis bvlan 4015 ect-id 16
spb isis control-bvlan 4000
• BVLANs 4000-4015 mapped to ECT-IDs 1-16 spb isis interface linkagg 127
spb isis admin-state enable
respectively -> show vlan
6- Auto-Network Profiling
• Access port configuration
• User profiles creation
• Single service
• Defines a single service SAP binding that will accept
untagged frames
• Auto VLAN service
• Automatically generate SAP bindings for the VLANs
concerned by the traffic coming on port as well as a
default untagged service by default
AUTO-NETWORK PROFILING - LOOPBACK DETECTION
• Eliminate the formation of data loops that are created by people attaching networks or
devices to multiple access ports that offer an open path for data to flow between the
access ports
• Edge loop detection available on service access interfaces and LACP links
• Even in case of the absence of other loop-detection mechanisms like STP/RSTP/MSTP
• LBD transmits periodic proprietary Multicast MAC frames on the LBD enabled ports
• Loop detected when receive the frame back on any of the Loop-back detection enabled port
• Port is disabled (forced down)
• Error Log is issued
• SNMP trap
• Can be re-enabled by user
AUTO-NETWORK PROFILING - LOOPBACK DETECTION
• Loop Back Detection for SPB-M access ports
• LBD frames extended for Service Access ports
• ISID
• Detect loops on a per ISID basis
• Topology of services and VLANs vary from access port to access port
• More LBD frames may be sent per port depending on SAP binding
1/1 2/1
1/1 2/1
AOS Switch with OS6900 OS6900
AOS Switch with OS6900 OS6900
Loopback-detection Loopback-detection enable
enable 1/2 1/3
1/2 2/2
• 1/2 and 1/3 are SAP ports having same ISID and path cost
• 1/2 and 2/2 are SAP ports having same ISID and path cost • Loopback-detection is enabled with option ‘service-access’ on ports 1/2
• Loopback-detection is enabled with option ‘service-access’ on ports and 1/3
1/2 and 2/2 • Traffic loops through 1/2 and 1/3
• Traffic loops through 1/2 and 2/2 • Port 1/3 is shutdown as this interface has higher port identifier, since
• Port 2/2 is shutdown in case B has higher bridge identifier, since 1/2 1/2 and 1/3 has equal path costs
and 2/2 has equal path costs
AUTO-DISCOVERY - AUTO MVRP
7- Auto-MVRP
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Intelligent Fabric
How to
✓ Configure the Intelligent Fabric on the 6900 and 6860
Contents
1 Basic Network Diagram ....................................................................... 2
2 Lab Preparation ............................................................................... 3
2.1. OmniSwitches not used in the configuration ................................................... 3
2.2. OmniSwitches 6900 and 6860-A Configuration ................................................. 3
3 Auto-VC ......................................................................................... 4
4 Auto-LACP ...................................................................................... 9
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Intelligent Fabric
The objective of this lab is to achieve automatically the following topology with the Intelligent Fabric.
The Auto-VC feature will automatically create the virtual chassis between the two OmniSwitches 6900 and
the Auto-LACP feature will create the aggregation “127” from the OmniSwitch 6860 to the virtual chassis.
3
Intelligent Fabric
2 Lab Preparation
The OmniSwitches not used in the configuration are the Switches 3, 4, 5, 6 and 8.
These Switches should not interact with the three OmniSwitches used in the topology.
To do so, launch the script “reset SW#” (replace # by the Switch number) for each Switch not used in the
topology: 3, 4, 5, 6 and 8.
Shutdown all the user ports of the Switches 3, 4, 5, 6 and 8 with the command :
The auto-VC (auto-Virtual Chassis) process will be triggered when the Switch is powered on (or reloaded) and
no config file is located in on the switch.
In order to match these requirements, all the configuration files (*.cfg) will be deleted from the flash
memory of these three Switches. The three Switches will then be restarted.
Open a terminal for each Switch (6900-A,6900-B and 6860-A). Log in with the default login and password
(admin / switch).
Notes:
The command “-> rm /flash/…/*.cfg” will delete all configuration files for a stand-alone switch
(boot.cfg) or an already configured virtual chassis (vcboot.cfg and vcsetup.cfg).
4
Intelligent Fabric
3 Auto-VC
One of the Auto-fabric feature is the Auto-VC (Automatic Virtual Chassis). The Auto-Fabric is enabled by
default on the 6900 and 6860(E).
Auto-VC allows device that have no existing Virtual Chassis (VC) configuration (no config file) to form a VC
with compatible devices without user configuration.
In our case, a Virtual Chassis will be configured automatically between the two OS6900.
The following actions are performed by the Auto-VC feature:
- Auto VFL Ports: Virtual Fabric Link (VFL) Detection Process – Automatically detect whether an auto VFL
port can become VFL. Without a config file (no vcsetup.cfg and no boot.cfg) the last 5 ports of each
chassis are designed as auto VFL port.
- Auto Chassis ID: Both chassis start with a chassis ID 1 and then begins negotiation. The chassis with the
lowest MAC address is elected Master (Chassis ID 1) and the other chassis will get the chassis ID 2.
During the reload of the Switches, take a look at the terminal of your two OS6900. You will notice these
lines:
Starting 6900 Boot Process
Mount /dev/sda1
FS is EXT2
Do you want to disable auto-configurations on this switch [Y/N]?
Preparing Flash...
Without an input from the user, the Switch will use the default value “Yes” and will activate the auto-Fabric.
If you don’t want to use the auto-fabric feature, enter “N” when this message is displayed.
- Wait for the switch to reboot. You will then see auto-fabric messages displayed in the terminal.
***********************
* *
* Welcome To Rlab LAN *
* Pod 20 Switch 1 *
* 6900-A *
* *
***********************
(none) login:
Thu Feb 9 10:36:19 : capManCmm Chass info message:
+++ CMM: INFO: early NI discover slot 1 waiting module type
- The MAC address of the remote 6900 is discovered. The negotiation process starts and elects the remote
6900 as the new Master, because the remote 6900 has the lowest MAC address.
- As the local chassis has not been elected as the Master and act as the Slave, it’s chassis ID is changed
(Chassis ID 2).
...
- As the local chassis is not the Master, its chassis ID changed and so, the chassis must restart in order to
apply its new chassis ID.
- This whole process, between the manual reboot and the automatic reboot should last for about 5
minutes.
- The MAC address of the remote 6900 is discovered. The negotiation process starts and elects the local
6900 as the new Master, because the local 6900 has the lowest MAC address.
- The local chassis has been elected as the Master, it’s chassis ID is set to 1.
Thu Feb 9 10:38:51 : vc_licManager licMgr error message:
+++ alaAfnInstallLicenseFromMaster: Unable to open afnId.txt.
- The remote 6900 is unreachable through the VFL link 1/0, so the local 6900 considers the Virtual Chassis
“Down” for the moment.
- Please wait around 3 minutes after the automatic reboot of the Slave 6900.
7
Intelligent Fabric
- You can check the terminal of the Slave 6900 after its automatic reboot:
- When the Slave 6900 has completed its reboot, it will go into a Virtual Chassis “Init” state. It will then
contact the Master and act as the Slave running in the Virtual Chassis.
The two 10G ports of each chassis (2/1 and 2/2) have been elected as VFL ports and are contained in the
same VFL Group.
4 Auto-LACP
- One other Auto-fabric feature is the Auto-LACP (Automatic Link Aggregation Protocol).
- Auto-LACP uses enhanced LLDP packets in order to detect the peer and in return, receive peer’s system
ID.
- If two ports at least are detected, the LACP negotiation will start and the aggregation link is formed.
- If the Switch 7 has been rebooted at the same time than the two Switches 6900, it will reach a ready
state long before the 6900 Virtual Chassis is established.
- The auto-LACP will be configured automatically around 5 minutes after the establishment of the auto-
VC. If you want to speed up the discovery process, you could use the following command to force the
auto-LACP to be discovered :
- Compared to the Auto-VC, the Auto-LACP does not generate logs in the console.
- You can still get some logs from the swlog file.
- Enter the following command and check the time and date of the switch
- Display the swlog file with a timestamp. Replace mm/dd/yyyy and hh:mm:ss by the start time and date of
the 6860-A (its last reboot).
- Enter the following commands on the 6860 and the Master 6900:
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
127 Dynamic 40000127 16 ENABLED UP 2 2
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
127 Dynamic 40000127 16 ENABLED UP 2 2
-
- As you can see, the Aggregation Link has been automatically created. The aggregation ID has the same
value on both switch (6860-A and the VC of 6900). The ports that belong to the aggregation are also the
same.
OMNISWITCH R8
ANYCAST RP
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
Server
• RFC Register
RP2
“Loopback1” 10.10.10.1
RP2
• Uses a single statically defined RP address
(set on a Loopback interface) Register
RP1
• Senders and Receivers exchange messages “Loopback1”
10.10.10.1
with the nearest RP
• Determined by the Unicast routing table (IGP).) Register Register
Client Client
Receiver 1 Receiver 2
ANYCAST RP
• Hardware Requirements
Set of router that will act as RPs for the Anycast -RP address
The group address range that the Anycast-RPs will be ip pim static-rp 231.0.0.0/8 10.10.10.1 ip pim static-rp 231.0.0.0/8 10.10.10.1
responsible for
Sw1 RP1 Sw7 RP2
Sw8 Non-RP
Loopback0 : 192.168.254.8
All other PIM routers that are NOT participating in the Anycast-RP set will still have the
PIM configuration defining the RP, but will not have the anycast-rp specific configuration
Sw8 Non-RP
ip pim static-rp 231.0.0.0/8 10.10.10.1
Loopback0 : 192.168.254.7
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Anycast RP
How to
✓ This lab is designed to familiarize you with the Anycast capability on an
OmniSwitch.
Contents
1 Topology ........................................................................................ 2
2 PIM-SM Configuration ......................................................................... 4
3 Lab Check ...................................................................................... 8
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Anycast RP
1 Topology
Protocol-Independent Multicast (PIM) is an IP multicast routing protocol that uses routing information
provided by unicast routing protocols such as RIP and OSPF. PIM is “protocol-independent” because it does
not rely on any particular unicast routing protocol.
3
Anycast RP
- In the multicast switching lab, all requesting devices in the same VLAN received the multicast stream.
Now let’s move the receivers into different VLANs. This will require the multicast traffic to be routed in
order to reach each receiver. PIM-SM gives us the capability to route multicast traffic.
- As we will route the traffic, we don’t need the querier configured on 6450-A (but we still need to
forward querying) :
-
- Also, a multicast router is by default an IGMP querier, we can disable the querier forwarding on both
6860
- On the 6900, check that OSPF still runs properly and that all client vlans are reachable :
2 PIM-SM Configuration
- Enable PIM-SM in the core routers :
- Configure Anycast-RP on three.These routers will be used as the RP. The RP address will be 10.10.10.1,
which will be configured on a Loopback1 interface on the three routers.
- OSPF is configured on these routers so this Loopback1 address is advertised in OSPF to all routers in the
network. Different PIM routers in the network will either reach one if these three routers for the RP
depending on the best path metric.
- On the three routers, configure the Anycast-RP address 10.10.10.1. The 231.0.0.0/8 specifies the group
address range that the Anycast-RPs will be responsible for.
-
6900 -> ip pim static-rp 231.0.0.0/8 10.10.10.1
Note: This static configuration should exist on all PIM routers in the PIM domain, not just those routers
that are participating in the Anycast-RP set.
Next you need to define something called the RP set. This is the set of all routers which would act as
the RP. You need to have a LoopbackX interface on each prospective RP router, which is different than
the LoopbackX that is being used as the RP address.
In our previous configuration, we defined the Loopback0 is defined on all routers with IP address
192.168.254.X/32. This Loopback0 address is already used as the Router ID for OSPF.
Configuration defining the Anycast-RP set must be the same on all routers participating in Anycast-RP
- One thing to note here is that you need to define your own IP address as well as all remote IP addresses
in this RP set so the configuration for the Anycast-RP set will be the same on all RPs in the Anycast-RP
set.
Total 5 Interfaces
Interface Name IP Address Designated Hello J/P Oper BFD
Router Interval Interval Status Status
--------------------------------+---------------+---------------+--------+--------+--------+--------
int_20 192.168.20.7 192.168.20.8 30 60 enabled disabled
int_30 192.168.30.7 192.168.30.8 30 60 enabled disabled
int_170 192.168.170.7 192.168.170.7 30 60 enabled disabled
int_217 172.16.17.7 172.16.17.7 30 60 enabled disabled
int_278 172.16.78.7 172.16.78.8 30 60 enabled disabled
6
Anycast RP
Total 5 Interfaces
Interface Name IP Address Designated Hello J/P Oper BFD
Router Interval Interval Status Status
--------------------------------+---------------+---------------+--------+--------+--------+--------
int_20 192.168.20.8 192.168.20.8 30 60 enabled disabled
int_30 192.168.30.8 192.168.30.8 30 60 enabled disabled
int_180 192.168.180.8 192.168.180.8 30 60 enabled disabled
int_218 172.16.18.8 172.16.18.8 30 60 enabled disabled
int_278 172.16.78.8 172.16.78.8 30 60 enabled disabled
Total 2 Neighbors
- Manage the client 1 , client 5 and 10 to send and receive multicast traffic as indicated in the tables
below.
Use the application multicast tool from the desktop to do it.
Total 3 (S,G)
Source Address Group Address RPF Interface Upstream Neighbor UpTime Flags
---------------+---------------+--------------------------------+-----------------+-----------+--------
192.168.110.50 231.1.1.1 int_110 00h:18m:46s STL
192.168.20.50 231.5.5.5 int_217 172.16.17.7 00h:00m:07s ST
192.168.30.50 231.10.10.10 int_217 172.16.17.7 00h:00m:31s ST
Total 3 (S,G)
Source Address Group Address RPF Interface Upstream Neighbor UpTime Flags
---------------+---------------+--------------------------------+-----------------+-----------+--------
192.168.110.50 231.1.1.1 int_217 172.16.17.1 00h:00m:05s SR
192.168.20.50 231.5.5.5 int_20 192.168.20.8 00h:03m:04s ST
192.168.30.50 231.10.10.10 int_30 192.168.30.8 00h:03m:01s ST
Total 3 (S,G)
Source Address Group Address RPF Interface Upstream Neighbor UpTime Flags
---------------+---------------+--------------------------------+-----------------+-----------+--------
192.168.110.50 231.1.1.1 int_218 172.16.18.1 00h:00m:19s ST
192.168.20.50 231.5.5.5 int_20 00h:03m:12s STL
192.168.30.50 231.10.10.10 int_30 00h:03m:15s STL
3 Lab Check
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
192.168.0.3 192.168.0.9
192.168.0.5
192.168.0.8
• Benefits:
• Cost savings: no costly hardware upgrade to servers
• Scalability: allows up to 16 clusters per switch
• Reliability: provides load-sharing and redundancy
• Flexibility: QoS may be applied to servers
CHARACTERISTICS
• Virtual IP address
• Must be an address in the same subnet as the servers
• SLB cluster automatically creates a proxy ARP for the VIP with the switch’s MAC address
• Designed to work at IP layer or bridge
• Capability to specify if SLB is enforced at L2 or L3
• Distribution based on wire-rate load balancing
• Load balancing is based on L3/L4 information
• Using IPSA and IPDA pairs (optionally UDP/TCP ports)
• Policies for server load balancing can be assigned for the purpose of applying ACLs
• Servers can belong to multiple clusters
• Servers can be distributed on several Nis
• All servers must be part of the same VLAN/subnet. Servers do not need to be physically
connected to the SLB switch/router, they can be connected through L2 switches for that
SLB VLAN.
CONFIGURATION
• Create a loopback adapter in the server
• Define the Virtual IP address to the loopback adapter
• Enable SLB globally
-> ip slb admin-state enable
• policy condition, action and rule are automatically created
• Configure the SLB cluster
-> ip slb cluster Web vip 128.241.130.204
• Assign physical servers to the SLB cluster
-> ip slb server ip 128.241.130.127 cluster Web
-> ip slb server ip 128.241.130.109 cluster Web
• Modify optional parameters, if necessary
• SLB traffic distribution algorithm
• Load balance hashing control algorithm
• Health monitoring
DISTRIBUTION ALGORITHM
• Default
• Round-robin based on IPSA, SLB-VIP and a random generated number of the SLB-MAC
• Alternative
• Weighted Round Robin (WRR)
• SLB cluster distributes traffic according to the relative “weight” a server has within an SLB cluster
• Aggregate weight of all servers should not exceed 32
-> ip slb server ip <ip-addr> cluster <clstr> admin-state <enable | disable> probe <probe> weight <weight>
Cluster
192.168.100.102
Weight = 3
192.168.100.109
Weight = 2
192.168.100.99
Weight = 1
192.168.100.200
192.168.100.103
Weight = 0
BACKUP SERVER SCENARIO
-> ip slb cluster cl1 vip 192.168.100.200
-> ip slb server ip 192.168.100.102 cluster cl1 weight 1
-> ip slb server ip 192.168.100.99 cluster cl1 weight
Cluster cl1
192.168.100.102
Weight = 1
192.168.100.200 192.168.100.99
Weight = 0
• If Server 192.168.100.102 goes down, Server 192.168.100.99 will start receiving all the
traffic
WEIGHTED ROUND ROBIN
-> ip slb cluster cl1 vip 192.168.100.200
-> ip slb server ip 192.168.100.99 cluster cl1 weight 1
-> ip slb server ip 192.168.100.109 cluster cl1 weight 2
-> ip slb server ip 192.168.100.102 cluster cl1 weight 3
-> ip slb server ip 192.168.100.103 cluster cl1 weight 0 => use for backup
Cluster cl1
Server A: 192.168.100.102
Weight = 3
Server B:192.168.100.109
Weight = 2
Server C: 192.168.100.99
Weight = 1
192.168.100.200
Server D: 192.168.100.103
Weight = 0
• Server A handles three times the traffic of Server C, and Server B twice the traffic of
Server C.
• Server D is a backup server
HASHING CONTROL ALGORITHM
• Hashing Control AA Source Destination AA
AA Address Address AA
• Control over the hashing mode
• Link Aggregation
• ECMP Server #
• Server Load Balancing
Brief Mode
• Two hashing algorithms available
• Brief Mode:
• UDP/TCP ports not included
• Only Source IP and destination IP addresses are
considered
-> hash-control brief Switch Default Hasing Mode
AA Source Destination UDP/TCP AA
9900 extended AA Address Address Port AA
• Extended 6900 brief
• UDP/TCP ports to be included 6860 extended
in the hashing algorithm
• Result in more efficient
6865 extended Server #
load balancing 6560 extended
Extended Mode
-> hash-control extended [udp-tcp-port | no] 6465 brief
6360 brief
CLUSTER MODES
• SLB Cluster VIP
• Traffic destined to the Virtual IP of the Server Farm
• Each server is also configured with a Loopback Interface for the Virtual IP
• A server can be configured with more than one VIP
• Therefore, a server can belong to more than one SLB cluster
VLAN 10
IP@ 10.0.0.254 Server 10.0.0.1
10
L3 Network
Route to reach VIP Server 10.0.0.3
Switch
SLB enabled L2 switch
Proxy ARP to 10.0.0.250 is used in a bridged network and will force the
bridged packet to be routed
Bridging in VLAN 10
QOS CONDITION MODE
• Configuring QoS Condition SLB cluster in a Routed network
-> ip slb cluster <cluster_name> condition <condition name> L3
-> policy condition cond1 source port 1/1 destination tcp port 80
-> ip slb cluster Firewall condition cond1 L3
-> ip slb server ip 10.0.0.1 cluster WebServer
-> ip slb server ip 10.0.0.2 cluster WebServer
Cluster « Firewall »
Access the VIP
VLAN 10
IP@ 10.0.0.254 Server 10.0.0.1
Server 10.0.0.2
VLAN
1/1 10
L3 Network
Switch
Route to reach VIP
SLB enabled
Bridged Network
The server must be configure to receive packet with a destination MAC address
that is different than the MAC address of the server (i.e. promiscuous mode)
HEALTH MONITORING
• Health Monitoring of the servers based on
• Ethernet link state detection
• IPv4 ICMP ping
• Content Verification Probe
• 20 probes per switch
• Basic Probe - PING
• Application probes: ftp, http, https, mail (imap, imaps, pop, pops, smtp), nntp)
• Custom probes - tcp, udp
• Can specify interval, time-out, and retries
• Server States
• Disabled server has been administratively disabled by the user
• No Answer server has not responded to ping requests from the switch
• Link Down bad connection to the server
• Discovery switch is pinging a physical server
• In Service server can be used for client connections
• Retrying switch is making another attempt to bring up the server
SERVER LOAD BALANCING - PROBE CONFIGURATION
• Creating SLB Probes
-> ip slb probe <probe_name> {ftp | http | https | imap | imaps | nntp | ping |
pop | pops | smtp | tcp | udp}
• Options
• Probe timeout (ms) and Period (sec)
• TCP/UDP Port
• URL / User Name / Password
• sent to a server as credentials for an HTTP(S) GET operation
• Send
• An ASCII string sent to a server to invoke a response
• Expect
• An ASCII string used to compare a response from a server
-> ip slb probe http_test http
-> ip slb probe http http_test period 10
-> ip slb cluster C1 vip 192.168.160.201
-> ip slb server ip 192.160.160.4 cluster C1 weight 2 probe http_test
-> ip slb server ip 192.160.160.4 cluster C1 weight 4 probe http_test
PROBE CONFIGURATION • http / https
• USERNAME
• URL
• ping • TIMEOUT
• TIMEOUT • STATUS
• RETRIES • RETRIES
• PORT • PORT
• PERIOD • PERIOD
• PASSWORD
• EXPECT
• tcp / udp
• TIMEOUT
• SSL
• SEND
• RETRIES
• PORT
• ftp / imap / imaps / pop / pops / smtp / nntp
• PERIOD
• TIMEOUT
• NO
• RETRIES
• EXPECT
• PORT
• PERIOD
SPECIFICATIONS
AOS specification
APPENDIX
ADDING AND CONFIGURING LOOPBACK ADAPTER
Appendix
ON WINDOWS SERVER
• Device Manager > Add Legacy Hardware
• Install the hardware that I manually select from a list (Advanced)
• Network adapters
• Microsoft > Microsoft KM-Test Loopback Adapter (Win 2k12)
• Microsoft > Microsoft Loopback Adapter (Win 2k8 r2)
• Starting with Windows Server 2008, Microsoft has implemented a strong host model which
disallowed the host to receive packets on an interface not assigned as the destination IP
address. To configure weak host mode, enter the following commands:
netsh interface ipv4 set interface <LAN Interface Name> weakhostreceive=enabled
netsh interface ipv4 set interface <Loopback Interface Name> weakhostreceive=enabled
netsh interface ipv4 set interface <Loopback Interface Name> weakhostsend=enabled
Appendix
ON LINUX SERVER
• Add Loopback adapter
ifconfig lo:1 <VIPAddress> broadcast <VIPAddress> netmask 255.255.255.255
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch R8
Server Load Balancing
How to
✓ This lab is designed to familiarize you with the server load balancing
feature on OmniSwitches.
Contents
1 Topology ........................................................................................ 1
2 Server Load Balancing configuration ....................................................... 1
2.1. Client Configuration ................................................................................ 1
2.2. Client VLAN configuration ......................................................................... 1
2.3. Loopback interface creation on clients ......................................................... 1
2.4. SLB configuration ................................................................................... 2
2.5. Demonstrate SLB ................................................................................... 3
2.6. SLB Load Balancing – Self Guided Section ....................................................... 3
3 Summary ........................................................................................ 4
4 Lab Check ...................................................................................... 4
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
1
Server Load Balancing
1 Topology
Virtual Chassis
192.168.110.0 192.168.110.0
1/2/1-2 2/2/1-2
1/1/1 2/1/1
OS6900-A 1 OS6900-B 2
1/1/5 1/1/6 2/1/6 2/1/5 Client 2 VLAN 110
Client 1 VLAN 110
You can now check client 2 connectivity by pinging its gateway interface.
(This creates a Server Load Balancing cluster with the virtual IP address of 192.168.20.100). We will now
assign servers to the cluster.
sw1 (6900-A) -> ip slb server ip 192.168.110.101 cluster WorldWideWeb
The previous commands added two servers to the cluster named WorldWideWeb. Let’s view some of the SLB
configuration parameters. Type the following:
sw1 (6900-A) -> show ip slb
Admin status : Enabled,
Operational status : In Service,
Number of clusters = 1
You will see that one of the servers has a flow associated with it. Change the ip address of the client 5 and
connect again to the vip web server, you should be associated with another one.
3 Summary
This lab introduced the configuration of the Server Load Balancing feature of an OmniSwitch. Load
balancing can be used to distribute traffic over multiple servers. This is done using a virtual IP address for
all client requests;
4 Lab Check
- What is an advantage of configuring SLB?
.........................................................................................................................
.........................................................................................................................
- What is the purpose of the Virtual IP address?
.........................................................................................................................
.........................................................................................................................
- What is the purpose of the MS Loopback Adapter?
.........................................................................................................................
.........................................................................................................................
OMNISWITCH R8
A O S O M N I S W I T C H - U P G R A D E S O F T WA R E I M A G E
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
From BPWS
UPGRADE SOFTWARE IMAGE
Step by step
Note: If there are any issues after upgrading the switch can be rolled back to the previous certified version
UPGRADE SOFTWARE IMAGE
Step by step
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNISWITCH R8
A C C E S S G U A R D I A N - C A P T I V E P O R TA L
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
http://www.alcatel-lucent.com
• Useful for guest or contractor to temporarily gaining controlled network access to the
enterprise network
• Integrated with the rest of the policies
CAPTIVE PORTAL - ANOTHER ACCESS GUARDIAN POLICY
Supplicant?
Yes No
MAC No
802.1X authentication
auth
Pass Fail Pass Fail
Captive
RADIUS Profile RADIUS Profile Portal
Captive Portal Captive Portal Captive Portal Captive Portal Pass Fail
Group mobility Captive Portal Group mobility Group mobility Group mobility
Profile Profile
Block
Block
Policies can be interchanged
Some policies (Captive portal, Profile, Block) are terminal policies (cannot be followed by other policies)
Captive Portal policy will start a new authentication branch
“Fail” branches will only classify devices into non-authenticated Profiles
CAPTIVE PORTAL - EXAMPLE
Supplicant?
Yes No
Captive
MAC
802.1X Portal
auth
Radius Profile
• Logo
• Welcome text
• Background image
• Company policy file
• Customizable banner image
• Associated Help pages
R8
/flash/switch/captive_portal/custom_files
/assets My Company Welcome text message
/images/logo.jpg
/pages/cportal_policy.pdf
/scripts/cportal_scripts.js
/styles/cportal_style.css
/templates
cportal_login.html
cportal_redirect.html
cportal_status.html
error404.html
qmr_quarantined.html
unauth.html
CAPTIVE PORTAL - CUSTOMIZATION
• URL redirection
• capability of redirecting the user to a
• Redirection URL upon successful authentication
• Redirection URL upon failure/bypass authentication (not supported in R8)
• Configuration
-> unp profile profile_name captive-portal-authentication
• AAA Profile
• Specifies the default AAA profile for the port Template
• Default Edge-Profile
• When template is attached to UNP port/linkagg any existing default profile is overridden
• Pass-alternate
• If classification does not return a valid UNP then the pass-alternate is assigned
ACCESS GUARDIAN - APPLICATION EXAMPLE
SUPPLICANT/NON-SUPPLICANT WITH CAPTIVE PORTAL
AUTHENTICATION
• Corporate supplicant device • Guest non-supplicant device
• Passes 802.1X authentication • Fails 802.1X authentication
• Assigned a UNP-corporate • Fails MAC authentication
• Corporate user with non-supplicant, • Get temporary UNP-captive_portal
non-corporate device • Captive Portal assign UNP-guest after successful
authentication
• Does not trigger 802.1X authentication
• Fails MAC authentication • Allowed devices
• Get temporary UNP-captive_portal • Passes MAC authentication
• Captive Portal assign UNP-corporate after • Assigned a UNP-allowed_devices
successful authentication
• Guest supplicant device
• Fails 802.1X authentication
• Get temporary UNP-captive_portal
• Captive Portal assign UNP-guest after successful
authentication
SUPPLICANT/NON-SUPPLICANT WITH CAPTIVE PORTAL
AUTHENTICATION
Yes No
Supplicant?
MAC
802.1X auth
Fail Pass
Pass Fail
UNP_Corporate
UNP_devices
Captive
Portal
Pass Fail
UNP_Guest
UNP_Corporate
Block
SUPPLICANT/NON-SUPPLICANT WITH CAPTIVE PORTAL
AUTHENTICATION
1. Configure a RADIUS Server
-> aaa radius-server radius_server host 10.2.3.4 hash-key secret
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNISWITCH R8
IS-IS
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
00:d0:95:f3:c8:ba
Area 49.0002
Area 49.0003
L1/L2
L1
L1 L1/L2
49.0002.00D0.9501.0102.00 49.0003.00D0.9501.0104.00
IS-IS — PACKET FORMAT
• DIS
• The IS in a LAN that is designated to perform additional duties. In particular, the DIS generates
link-state PDUs on behalf of the LAN, and treats the LAN as a pseudo node.
• Pseudo node
• When a broadcast subnetwork has n connected ISs, the broadcast subnetwork itself is considered to
be a pseudo node. The pseudo node has links to each of the n ISs and each of the ISs has a single
link to the pseudo node (rather than n-1 links to each of the other ISs). Link-state PDUs are
generated on behalf of the pseudo node by the DIS.
IS-IS - HELLO PACKET FORMAT
L1 L1/L2 L2
L1 L1 L2
IS-IS — PACKET EXCHANGE
• Interface configuration
-> ip isis level-capability level-1
-> ip isis level-capability level-2
-> ip isis level-capability level-1/2
-> ip isis vlan 10 level-capability level-1/2
• Monitoring
-> show isis status
-> show ip isis vlan
-> show ip isis vlan detail
-> show ip isis route
-> show ip isis spf
-> show ip isis adjacency
IS-IS - AREA TYPES
Area 01 Area 02
L1 L1/L2 L1/L2
L1 L1
L1
Area 04
Area 03 L1/L2
L1/L2
L1 L1 L1
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNISWITCH R8
INTERNET OF THINGS (IOT)
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
OmniSwitch®
Signature
DB
DP enable UNP
OVERVIEW
• IoT (Internet of Things) device profiling allows network administrators to support and
manage smartphones, tablets and other devices connecting to the network.
• IoT device profiling uses DHCP FingerPrinting and MAC OUI to identify IoT devices.
AAA Radius
OmniSwitch®
Employee DB
Contacts DB
Internet
OVERVIEW
• MAC OUI: allows devices to be recognized by identifying their MAC addresses.
• DHCP FingerPrinting: allows to track the devices on the network and block those are not
allowed access. It also helps in analyzing the future growth by accessing the trending
information.
OmniSwitch®
DP
interface
DP enable
IoT Device Profiling
Example:
Microsoft Windows XP option 55
DHCP client request 1,15,3,6,44,46,47,31,33,249,43
DHCP option 55 (the parameter request list) Apple iPhone
and option 60 (the vendor identifier) 1,3,6,15,119,78,79,95,252
Or
[Mac Vendors]
DEVICE PROFILING STEPS
Signature • Collect signature and various packet meta data
collector required for IoT device identification
Device
• Maintain a database of identified IoT
devices and un-identified IoT devices Unknown
Known
Device DB
Device DB for qualitative and quantitative
analysis.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OMNISWITCH R8
SIP SNOOPING
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OBJECTIVES
Upon completion this module,
you will be able to:
• Calculate QOS metric values of delay, jitter, round trip time, R factor and MOS values of
media streams from its corresponding RTCP.
• Raise trap when any of QOS metrics cross user defined threshold.
• By default, the SIP packets forwarded by hardware are not subject to any specific QOS
treatment.
• The packets are treated as normal packets and follow the same QOS treatment according
to qos port or policy rules configuration.
OVERVIEW
Video
Voice
freed up Video
Voice
• SIP packets are identified based on string value at the beginning of UDP payload.
• SIP responses always have SIP/2.0 at the beginning.
• SIP requests have their name at the beginning.
• SIP packets are identified by doing lookup at starting of UDP payload.
• SIP/2.0
• INVITE
• ACK
• PRACK
• UPDATE
• BYE
• SIP Snooping supports a 4 byte lookup, only “INVI” lookup will be done instead of complete
INVITE.
OmniSwitch AOS Release 8 Network Configuration Guide ---> Chapter: Configuring SIP Snooping
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
END OF TRAINING EVALUATIONS
C L A S S R O O M S E S S I O N O R V I RT U A L C L A S S S E S S I O N
YOUR FEEDBACKS ARE
IMPORTANT!
• Search for the training course by the reference provided by your instructor
ACCESS TO THE ONLINE EVALUATION SURVEY (2/2)
• From the session, select Evaluate in the dropdown menu and follow the instructions
OR
• From the curriculum, select Open Curriculum
• Then select Evaluate in the dropdown menu associated to the session and follow the
instructions
THANK YOU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Find a Course
Browse our catalog available on https://enterprise-education.csod.com/ to find your training path
and course detail.
Feedback
In order to improve the quality of the documentation, please report any feedback and address to:
Alcatel-Lucent Enterprise
115-225 rue Antoine de Saint-Exupéry
ZAC Prat Pip – Guipavas
29806 BREST CEDEX 9 – France
FAX: (33) 2 98 28 50 03