Page 1
Lenovo Flex System CN4093 10Gb Converged Scalable Switch Application Guide For Lenovo Network Operating System 8.3...
Page 2
Note: Before using this information and the product it supports, read the general information in the Safety information and Environmental Notices and User Guide documents on the Lenovo Documentation CD and the Warranty Information document that comes with the product.
Preface The Lenovo Flex System Fabric CN4093 10Gb Converged Scalable Switch Application Guide describes how to configure and use the Lenovo N/OS 8.3 software on the Lenovo Flex System CN4093 10Gb Converged Scalable Switch (referred to as CN4093 throughout this document).
Page 22
LAN port that has point-to-point connection characteristics. This feature prevents access to ports that fail authentication and authorization and provides security to ports of the CN4093 that connect to blade servers. ...
Page 23
(BGP) concepts and features supported in Lenovo N/OS. Chapter 30, “OSPF,” describes key Open Shortest Path First (OSPF) concepts and their implemented in Lenovo N/OS, and provides examples of how to configure your switch for OSPF support. Chapter 31, “Protocol Independent Multicast,”...
Page 24
Appendix A, “Glossary,” describes common terms and concepts used throughout this guide. Appendix B, “Getting help and technical assistance,” describes how to get help. Appendix C, “Notices,” provides trademark and other compliance information. CN4093 Application Guide for N/OS 8.3...
Additional References Additional information about installing and configuring the CN4093 is available in the following guides: Lenovo Flex System CN4093 10Gb Converged Scalable Switch Installation Guide Lenovo Flex System CN4093 10Gb Converged Scalable Switch Command Reference for Lenovo Network Operating System 8.3 ...
Select only one of the listed options. Do not type the vertical bar. AaBbCc123 Click the Save button. This block type depicts menus, buttons, and other controls that appear in Web browsers and other graphical interfaces. CN4093 Application Guide for N/OS 8.3...
In all cases, administration requires that the switch hardware is properly installed and turned on. (see the Lenovo Flex System CN4093 10Gb Converged Scalable Switch Installation Guide). Chassis Management Module The CN4093 10Gb Converged Scalable Switch is an integral subsystem within the overall Lenovo Flex System.
You can establish a connection to the CLI in any of the following ways: Serial connection via the serial port on the CN4093 (this option is always avail- able) Telnet connection over the network ...
The CN4093 uses port 66 (MGT1) to communicate with the chassis management module(s). Even when the CN4093 is in a factory default configuration, you can use the 1Gb Ethernet port on each CMM to configure and manage the CN4093. For more information about using the chassis management module, see the Lenovo Flex System CN4093 10Gb Converged Scalable Switch Installation Guide.
Using Secure Shell Although a remote network administrator can manage the configuration of a CN4093 via Telnet, this method does not provide a secure connection. The Secure Shell (SSH) protocol enables you to securely log into another device over a network to execute commands remotely.
SecureCRT 5.0 (Van Dyke Technologies, Inc.) Putty beta 0.60 Note: The Lenovo N/OS implementation of SSH supports version 2.0 and supports SSH client version 2.0. Using SSH with Password Authentication By default, the SSH feature is enabled. For information about enabling and using SSH for switch access, see “Secure Shell and Secure Copy”...
Using a Web Browser The switch provides a Browser-Based Interface (BBI) for accessing the common configuration, management and operation features of the CN4093 through your Web browser. You can access the BBI directly from an open Web browser window. Enter the URL using the IP address of the switch interface (for example, http://<IPv4 or IPv6...
When a client (such as a web browser) connects to the switch, the client is asked to accept the certificate and verify that the fields match what is expected. Once BBI access is granted to the client, the BBI can be used as described in the Lenovo N/OS BBI Quick Guide.
Access Control—Configure Access Control Lists to filter IP packets. Virtualization – Configure VMready for virtual machine (VM) support. For information on using the BBI, refer to the Lenovo N/OS BBI Quick Guide. CN4093 Application Guide for N/OS 8.3...
2, and version 3 support for access through any network management software, such as IBM Director. To access the SNMP agent on the CN4093, the read and write community strings on the SNMP manager should be configured to match those on the switch.
DHCP is described in RFC 2131, and the DHCP relay agent supported on the CN4093 is described in RFC 1542. DHCP uses UDP as its transport protocol. The client sends messages to the server on port 67 and the server sends messages to the client on port 68.
During switch startup, if the switch fails to get the configuration file, a message can be recorded in the SYSLOG server. The CN4093 supports requesting of a SYSLOG server IP address from the DHCP server as described in RFC 2132, option 7. DHCP SYSLOG server request option is enabled by default.
Switch Login Levels To enable better switch management and user accountability, three levels or classes of user access have been implemented on the CN4093. Levels of access to CLI, Web management functions, and screens increase as needed to perform various switch management tasks.
Secure FTP Lenovo N/OS supports Secure FTP (SFTP) to the switch. SFTP uses Secure Shell (SSH) to transfer files. SFTP encrypts both commands and data, and prevents passwords and sensitive information from being transmitted openly over the network. All file transfer commands include SFTP support along with FTP and TFTP support.
When in boot strict mode, the switch uses Secure Sockets Layer (SSL)/Transport Layer Security (TLS) 1.2 protocols to ensure confidentiality of the data to and from the switch. By default, HTTP, Telnet, and SNMPv1 and SNMPv2 are disabled on the CN4093. Before enabling strict mode, ensure the following: ...
Page 44
Secure NTP does not comply with Acceptable NIST SP 800-131A specification. When in strict mode, secure NTP is dis- abled. However, it can be enabled, if required. SHA-256 or higher RSA/DSA 2048 or higher CN4093 Application Guide for N/OS 8.3...
Acceptable Cipher Suites The following cipher suites are acceptable (listed in the order of preference) when the CN4093 10Gb Converged Scalable Switch is in compatibility mode: Table 5. List of Acceptable Cipher Suites in Compatibility Mode Cipher ID Key Authenticati...
Power ITEs and High-Availability features do not comply with NIST SP 800-131A specification. The CN4093 will not discover Platform agents/Common agents that are not in strict mode. Web browsers that do not use TLS 1.2 cannot be used. ...
For more details, see the Lenovo Flex System CN4093 10Gb Converged Scalable Switch Command Reference for Lenovo N/OS 8.3. CN4093 Application Guide for N/OS 8.3...
Chapter 2. Initial Setup To help with the initial process of configuring your switch, the Lenovo N/OS software includes a Setup utility. The Setup utility prompts you step-by-step to enter all the necessary information for basic configuration of the switch.
Enter n to abort Setup, or y to restart the Setup program at the beginning. Restarting Setup You can restart the Setup utility manually at any time by entering the following command at the administrator prompt: CN 4093(config)# setup CN4093 Application Guide for N/OS 8.3...
If you decide not to configure VLANs during this session, you can configure them later using the configuration menus, or by restarting the Setup facility. For more information on configuring VLANs, see the Lenovo N/OS Application Guide. Next, the Setup utility prompts you to input basic system information.
Page 52
9. Turn Spanning Tree Protocol on or off at the prompt: Spanning Tree: Current Spanning Tree Group 1 setting: ON Turn Spanning Tree Group 1 OFF? [y/n] Enter y to turn off Spanning Tree, or enter n to leave Spanning Tree on. CN4093 Application Guide for N/OS 8.3...
Page 54
To keep the current setting, press <Enter>. 6. The system prompts you to configure the next port: Enter port (INTA1-C14, EXT1-22): When you are through configuring ports, press <Enter> without specifying any port. Otherwise, repeat the steps in this section. CN4093 Application Guide for N/OS 8.3...
IP interfaces are used for defining the networks to which the switch belongs. Up to 128 IP interfaces can be configured on the CN4093 10Gb Converged Scalable Switch (CN4093). The IP address assigned to each IP interface provides the switch with an IP presence on your network.
Routing on more complex networks, where subnets may not have a direct presence on the CN4093, can be accomplished through configuring static routes or by letting the switch learn routes dynamically.
Optional Setup for Telnet Support Note: This step is optional. Perform this procedure only if you are planning on connecting to the CN4093 through a remote Telnet connection. 1. Telnet is enabled by default. To change the setting, use the following command: CN 4093(config)# no access telnet CN4093 Application Guide for N/OS 8.3...
Chapter 3. Switch Software Management The switch software image is the executable code running on the CN4093. A version of the image comes pre-installed on the device. As new versions of the image are released, you can upgrade the software running on your switch. To get...
Loading New Software to Your Switch The CN4093 can store up to two different switch software images (called image1 and image2) as well as special boot software (called boot). When you load new software, you must specify where it is placed: either into image1, image2 or boot.
The system prompts you to confirm your request. Once confirmed, the switch will reboot to use the new software. Loading Software via BBI You can use the Browser-Based Interface to load software onto the CN4093. The software image to load can reside in one of the following locations: ...
To boot in recovery mode press R. For more details see “Boot Recovery Mode” on page To restart the boot process from the beginning, press Q. To exit the Boot Management menu, press E. The booting process continues. CN4093 Application Guide for N/OS 8.3...
11. If the file is a software image, enter an image number: Install image as image 1 or 2 (hit return to just boot image): After the procedure is complete, the Recovery Mode menu will be re-displayed. CN4093 Application Guide for N/OS 8.3...
Page 67
Netmask : 255.255.255.128 Gateway : 10.241.6.66 Configuring management port....... Installing image CN4093-8.3.1.0_OS.img from TFTP server 10.72.97.135 Extracting images ... Do *NOT* power cycle the switch. Installing Application: Image signature verified. Install image as image 1 or 2 (hit return to just boot image): 2...
Change the baud rate back to 9600 bps, hit the <ENTER> key 9. Press <Enter> to start installing the image. If the file is a software image, enter the image number: Install image as image 1 or 2 (hit return to just boot image): CN4093 Application Guide for N/OS 8.3...
Note: After the test is completed, the switch will be put in low security mode. This mode will allow you to install unofficial images on the switch. To revert to normal security mode, you must reboot the switch or press P again in the Recovery Mode menu. CN4093 Application Guide for N/OS 8.3...
Chapter 4. Securing Administration This chapter discusses different methods of securing local and remote administration on the CN4093 10Gb Converged Scalable Switch (CN4093): “Changing the Switch Passwords” on page 73 “Secure Shell and Secure Copy” on page 74 ...
CN4093 over a network to execute management commands. SCP is typically used to copy files securely from one machine to another. SCP uses SSH for encryption of data on the network. On a CN4093, SCP is used to download and upload the switch configuration via secure channels.
putcfg_apply is done. The putcfg_apply and putcfg_apply_save commands are provided because extra apply and save commands are usually required after a putcfg; however, an SCP session is not in an interactive mode. CN4093 Application Guide for N/OS 8.3...
When the SSH server is first enabled and applied, the switch automatically generates the RSA host key and stores it in FLASH memory. To configure RSA host key, first connect to the CN4093 through the console port (commands are not available via external Telnet connection), and enter the following command to generate it manually.
If RADIUS authentication is used, the user password on the Radius server will override the user password on the CN4093. Also note that the password change command modifies only the user switch password on the switch and has no effect on the user password on the Radius server.
“Strong Passwords” on page 79). Then use the following command: CN 4093(config)# access user strong-password lockout After multiple failed login attempts, the switch locks the user account if lockout has been enabled on the switch. CN4093 Application Guide for N/OS 8.3...
AMM management port. If required, the functionality of new static IP configuration can also be disabled by turning off Protected Mode (CN 4093(config)# no protected-mode enable) and turning it back on (CN 4093(config)# protected-mode enable). CN4093 Application Guide for N/OS 8.3...
A client, in this case, the switch The CN4093—acting as the RADIUS client—communicates to the RADIUS server to authenticate and authorize a remote administrator using the protocol definitions specified in RFC 2138 and 2866. Transactions between the client and the RADIUS server are authenticated using a shared key that is not sent over the network.
Configuring RADIUS on the Switch Use the following procedure to configure Radius authentication on your CN4093. 1. Turn RADIUS authentication on, then configure the Primary and Secondary RADIUS servers. CN 4093(config)# radius-server primary-host 10.10.1.1 CN 4093(config)# radius-server secondary-host 10.10.1.2 2. Configure the RADIUS secret.
(other than management ports). PASSW0RD Administrator The super-user Administrator has complete access to all menus, information, and configuration (USERID) commands on the switch, including the ability to change both the user and administrator passwords. CN4093 Application Guide for N/OS 8.3...
Secure backdoor provides access to the switch when the RADIUS servers cannot be reached. The default CN4093 setting for backdoor and secure backdoor access is disabled. Backdoor access is always enabled on the console port. Irrespective of backdoor being enabled or not, you can always access the switch via the console port by using noradius as radius username.
TACACS+ Authentication Lenovo N/OS supports authentication, authorization, and accounting with networks using the Cisco Systems TACACS+ protocol. The CN4093 functions as the Network Access Server (NAS) by interacting with the remote client and initiating authentication and authorization sessions with the TACACS+ access server.
Lenovo N/OS supports ASCII inbound login to the device. PAP, CHAP and ARAP login methods, TACACS+ change password requests, and one-time password authentication are not supported.
If the authentication and authorization is not performed via TACACS+, there are no TACACS+ accounting messages sent out. You can use TACACS+ to record and track software login access, configuration changes, and interactive commands. The CN4093 supports the following TACACS+ accounting attributes: protocol (console/telnet/ssh/http) ...
Command arguments are not sent for authorization. Only executed commands are logged. Invalid commands are checked by Lenovo N/OS, and are not sent for authoriza- tion or logging. Authorization is performed on each leaf-level command separately. If the user issues multiple commands at once, each command is sent separately as a full path.
TACACS+ Password Change Lenovo N/OS supports TACACS+ password change. When enabled, users can change their passwords after successful TACACS+ authorization. Use the following command to enable or disable this feature: CN 4093(config)# [no] tacacs-server password-change Use the following commands to change the password for the primary and...
If the user-account name is John, the following is an example DN: uid=John,ou=people,dc=domain,dc=com Configuring the LDAP Server CN4093 user groups and user accounts must reside within the same domain. On the LDAP server, configure the domain to include CN4093 user groups and user accounts, as follows: ...
CN 4093(config)# ldap-server timeout 10 (enter the timeout period in seconds) 5. You may change the default LDAP attribute (uid) or add a custom attribute. For instance, Microsoft’s Active Directory requires the cn (common name) attribute. CN 4093(config)# ldap-server attribute username <1-128 alpha-numeric characters> CN4093 Application Guide for N/OS 8.3...
LAN port that has point-to-point connection characteristics. It prevents access to ports that fail authentication and authorization. This feature provides security to ports of the CN4093 10Gb Converged Scalable Switch (CN4093) that connect to blade servers.
Authentication Server: requesting identity information from the client, forwarding that information to the Authentication Server for validation, relaying the server’s responses to the client, and authorizing network access based on the results of the authentication exchange. The CN4093 acts as an Authenticator. ...
The RADIUS authentication server chooses an EAP-supported authentication algorithm to verify the client’s identity, and sends an EAP-Request packet to the client via the CN4093 authenticator. The client then replies to the RADIUS server with an EAP-Response containing its credentials.
The attribute must be untagged (the Tag field must be 0). 65 Tunnel-Medium- Only 802 (type 6) is currently Type supported (for 802.1X RADIUS VLAN assignment). The attribute must be untagged (the Tag field must be 0). CN4093 Application Guide for N/OS 8.3...
For example, if a CN4093 is connected to another CN4093, and if 802.1X is enabled on both switches, the two connected ports must be configured in force-authorized mode.
Each filter defines the conditions that must match for inclusion in the filter, and also the actions that are performed when a match is made. Lenovo N/OS 8.3 supports the following ACLs: IPv4 ACLs Up to 256 ACLs are supported for networks that use IPv4 addressing.
Destination IPv4 address and subnet mask Type of Service value IP protocol number or name as shown in Table Table 12. Well-Known Protocol Types Number Protocol Name icmp igmp ospf vrrp CN4093 Application Guide for N/OS 8.3...
Once classified using ACLs, the identified packet flows can be processed differently. For each ACL, an action can be assigned. The action determines how the switch treats packets that match the classifiers assigned to the ACL. CN4093 ACL actions include the following: ...
The redundant entries are ignored. Individual ACLs The CN4093 supports up to 256 ACLs. Each ACL defines one filter rule for matching traffic criteria. Each filter rule can also include an action (permit or deny the packet). For example:...
You can configure the ACL to re-mark a packet as follows: Change the DSCP value of a packet, used to specify the service level that traffic should receive. Change the 802.1p priority of a packet. CN4093 Application Guide for N/OS 8.3...
Enable access control list statistics tcp-udp TCP and UDP filtering options The CN4093 supports up to 128 VMAPs. Individual VMAP filters are configured in the same fashion as regular ACLs, except that VLANs cannot be specified as a filtering criteria (unnecessary, since the VMAP are assigned to a specific VLAN or associated with a VM group VLAN).
Use the following command to view the MACL configuration: CN 4093(config)# show access-control macl 1 MACL 1 profile : Enabled IPv4 - DST IP : 1.1.1.1/255.255.255.0 TCP/UDP - DST Port : 111/0xffff Action : Permit Statistics : Enabled CN4093 Application Guide for N/OS 8.3...
Note: Basic VLANs can be configured during initial switch configuration (see “Using the Setup Utility” in the CN4093 Lenovo N/OS 8.3 Command Reference). More comprehensive VLAN configuration can be done from the Command Line Interface (see “VLAN Configuration” as well as “Port Configuration” in the CN4093 Lenovo N/OS 8.3 Command Reference).
Frames received in one VLAN can only be forwarded within that VLAN, and multicast, broadcast, and unknown unicast frames are flooded only to ports in the same VLAN. The CN4093 automatically supports jumbo frames. This default cannot be manually configured or disabled. The CN4093 10Gb Converged Scalable Switch (CN4093) supports jumbo frames with a Maximum Transmission Unit (MTU) of 9,216 bytes.
VLANs and Port VLAN ID Numbers VLAN Numbers Lenovo N/OS supports up to 4095 VLANs per switch. Even though the maximum number of VLANs supported at any given time is 4095, each can be identified with any number between 1 and 4094. VLAN 1 is the default VLAN for the external ports and the internal blade ports.
Note: The sample output that appears in this document might differ slightly from that displayed by your system. Output varies based on the type of blade chassis unit that you are using and the firmware versions and options that are installed. CN4093 Application Guide for N/OS 8.3...
VLAN Tagging/Trunk Mode Lenovo N/OS software supports 802.1Q VLAN tagging, providing standards-based VLAN support for Ethernet systems. Tagging places the VLAN identifier in the frame header of a packet, allowing each port to belong to multiple VLANs. When you add a port to multiple VLANs, you also must enable tagging on that port.
Page 123
Port 5 is configured as a tagged member of VLAN 2, and port 7 is configured as an untagged member of VLAN 2. Note: The port assignments in the following figures are general examples and are not meant to match any specific CN4093. Figure 3. Port-based VLAN assignment Port 1...
Page 124
Figure 5. 802.1Q tag assignment Port 1 Port 2 Port 3 Tagged member PVID = 2 of VLAN 2 Tagged packet 802.1Q Switch Data B efore Port 6 Port 7 Port 8 Untagged member of VLAN 2 BS45013A CN4093 Application Guide for N/OS 8.3...
By default, ingress tagging is disabled. To enable ingress tagging on a port, use the following commands: CN 4093(config)# interface port <number> CN 4093(config-if)# tagpvid-ingress Limitations Ingress tagging cannot be configured with the following features/configurations: vNIC ports VMready ports UFP ports Management ports CN4093 Application Guide for N/OS 8.3...
VLAN Topologies and Design Considerations By default, the Lenovo N/OS software is configured so that tagging is disabled on all external ports and on all internal ports. By default, the Lenovo N/OS software is configured so that all internal ports are members of VLAN 1.
IP subnet as Server 2 and PC 5. The associated external switch port has tagging disabled. PC #3 A member of VLAN 1, this PC can only communicate with Server 2 and PC 5. The associated external switch port has tagging disabled. CN4093 Application Guide for N/OS 8.3...
VLAN. For example, if you delete PVLAN 1 from VLAN 2, port EXT1 remains a member of VLAN 2. When you delete a port from a VLAN, the port is deleted from all corresponding PVLANs. CN4093 Application Guide for N/OS 8.3...
Consider the following guidelines when you configure protocol-based VLANs: Each port can support up to 8 VLAN protocols. The CN4093 can support up to 16 protocols simultaneously. Each PVLAN must have at least one port assigned before it can be activated.
Private VLANs can control traffic within a VLAN domain, and provide port-based security for host servers. Lenovo N/OS supports Private VLAN configuration as described in RFC 5517. Use Private VLANs to partition a VLAN domain into sub-domains. Each...
Chapter 9. Ports and Link Aggregation (LAG) LAGs can provide super-bandwidth, multi-link connections between the CN4093 10Gb Converged Scalable Switch (CN4093) and other LAG-capable devices. A LAG is a group of ports that act together, combining their bandwidth to create a single, larger virtual link.
A Reboot is required for the new settings to take effect. Note: Upgrade 1 and Upgrade 2 can be independently installed in any order. You can choose to install any one upgrade or both. CN4093 Application Guide for N/OS 8.3...
Port EXT7, EXT8, EXT9, EXT10 - 10G Mode 4. Reset the switch. CN 4093(config)# reload Remove the configured port from QSFP+ mode to reset the ports to 10GbE mode. CN 4093(config)# no boot qsfp-40Gports ext3 CN4093 Application Guide for N/OS 8.3...
Figure 9. Link Aggregation Group (LAG) Switch 1 Switch 2 LAGs are also useful for connecting a CN4093 to third-party devices that support link aggregation, such as Cisco routers and switches with EtherChannel technology (not ISL aggregation technology) and Sun's Quad Fast Ethernet Adapter.
All LAG members must be in the same Spanning Tree Group (STG) and can belong to only one Spanning Tree Group (STG). However if all ports are tagged, then all LAG ports can belong to multiple STGs. CN4093 Application Guide for N/OS 8.3...
Figure 10. LAG Configuration Example Application Switch Application Switch LAG 3: Ports 2, 12, and 22 Lenovo Blade LAG 1: Ports EXT1, EXT2, and EXT3 Switch Lenovo Blade Chassis Prior to configuring each switch in the preceding example, you must connect to the appropriate switch’s Command Line Interface (CLI) as the administrator.
Page 144
CN 4093(config)# portchannel 3 port 2,12,22 CN 4093(config)# portchannel 3 enable LAG 1 (on the CN4093) is now connected to LAG 3 on the Application Switch. Note: In this example, a CN4093 and an application switch are used. If a...
Traffic in a LAG is statistically distributed among member ports using a hash process where various address and attribute bits from each transmitted frame are recombined to specify the particular LAG port the frame will use. The CN4093 uses the RTAG7 model for LAG hashing.
Page 146
Note: For MPLS packets, Layer 4 port information is excluded from the hash calculation. Instead, other IP fields are used, along with the first two MPLS labels. The CN4093 supports the following FCoE hashing options: CN 4093(config)# portchannel thash fcoe cntag-id...
LACP LAG fails, traffic is reassigned dynamically to the remaining link or links of the dynamic LAG. The CN4093 supports up to 16 ports in a single LACP LAG. It also supports a total of 64 LACP LAGs. Note: LACP implementation in Lenovo N/OS does not support the Churn machine, an option used to detect if the port is operable within a bounded time period between the actor and the partner.
LACP provides for the controlled addition and removal of physical links for the link aggregation. LACP Modes Each port in the CN4093 can have one of the following LACP modes. off (default) The user can configure this port in to a regular static LAG.
4. Optionally allow member ports to individually participate in normal data traffic if no LACPDUs are received. CN 4093(config-if)# no lacp suspend-individual CN 4093(config-if)# exit 5. Set the link aggregation as static, by associating it with LAG ID 65: CN 4093(config-if)# portchannel 65 lacp key 100 CN4093 Application Guide for N/OS 8.3...
When multiple paths exist between two points on a network, Spanning Tree Protocol (STP), or one of its enhanced variants, can prevent broadcast loops and ensure that the CN4093 10Gb Converged Scalable Switch (CN4093) uses only the most efficient network path.
PVRST mode is based on RSTP to provide rapid Spanning Tree convergence, but supports instances of Spanning Tree, allowing one STG per VLAN. PVRST mode is compatible with Cisco R-PVST/R-PVST+ mode. PVRST is the default Spanning Tree mode on the CN4093. See “PVRST Mode” on page 153 for details.
Spanning Tree automatically sets up another active path on the network to sustain network operations. Lenovo N/OS PVRST mode is based on IEEE 802.1w RSTP. Like RSTP, PVRST mode provides rapid Spanning Tree convergence. However, PVRST mode is enhanced for multiple instances of Spanning Tree. In PVRST mode, each VLAN may be automatically or manually assigned to one of 127 available STGs, with each STG acting as an independent, simultaneous instance of STP.
When determining which port to use for forwarding and which port to block, the CN4093 uses information in the BPDU, including each bridge ID. A technique based on the “lowest root cost” is then computed to determine the most efficient path for forwarding.
(via either external ports or internal Inter-Switch Links). Figure 11. Spanning Tree Blocking a Switch-to-Switch Link Enterprise Routing Switches Switch 1 Switch 2 Blocks Link Server Server Server Server CN4093 Application Guide for N/OS 8.3...
Page 157
In this case, it is desired that STP block the link between the blade switches, and not one of the CN4093 uplinks or the Enterprise switch LAG. During operation, if one CN4093 experiences an uplink failure, STP will activate...
However, in the first network, since a single instance of Spanning Tree is running on all the ports of the CN4093, a physical loop is assumed to exist, and one of the VLANs is blocked, impacting connectivity even though no actual loop exists.
Tagged ports can belong to more than one STG, but untagged ports can belong to only one STG. When a tagged port belongs to more than one STG, the egress BPDUs are tagged to distinguish the BPDUs of one STG from those of another STG. CN4093 Application Guide for N/OS 8.3...
Switch C receives this BPDU on port 8 and is identified as participating in VLAN 3, STG 3. Since Switch C has no additional ports participating in STG 3, this BPDU is not forwarded to any additional ports and Switch A remains the designated root. CN4093 Application Guide for N/OS 8.3...
1. Set the Spanning Tree mode on each switch to PVRST. CN 4093(config)# spanning-tree mode pvrst Note: PVRST is the default mode on the CN4093. This step is not required unless the STP mode has been previously changed, and is shown here merely as an example of manual configuration.
Page 164
VLAN 3 is automatically removed from STG 1. By default VLAN 1 remains in STG 1. Switch D does not require any special configuration for multiple Spanning Trees. Switch D uses default STG 1 only. CN4093 Application Guide for N/OS 8.3...
VLANs. MSTP was originally defined in IEEE 802.1s (2002) and was later included in IEEE 802.1Q (2003). In MSTP mode, the CN4093 supports up to 32 instances of Spanning Tree, corresponding to STGs 1-32, with each STG acting as an independent, simultaneous instance of STP.
MSTP Configuration Examples MSTP Configuration Example 1 This section provides steps to configure MSTP on the CN4093. 1. Configure port and VLAN membership on the switch. 2. Configure Multiple Spanning Tree region parameters and set the mode to MSTP.
Page 174
For instance, in VLAG Peer C, a regular LAG is employed for the downlink connection to VLAG Peer B because only one of the VLAG Peer C switches is involved. CN4093 Application Guide for N/OS 8.3...
PVRST/MSTP with one VLAG instance belonging to multiple VLANs/STGs: Maximum of 20 VLAG instances Note: VLAG is not supported in RSTP mode. Each type of aggregation can contain up to 16 member ports, depending on the port type and availability. CN4093 Application Guide for N/OS 8.3...
Make sure you configure the VLAG peer (VLAG Peer 2) using the same ISL aggregation type (dynamic or static), the same VLAN and the same STP mode and tier ID used on VLAG Peer 1. CN4093 Application Guide for N/OS 8.3...
Make sure you configure the VLAG peer (VLAG Peer 2) using the same ISL aggregation type (dynamic or static), the same VLAN for vLAG ports and vLAG ISL ports, and the same STP mode and tier ID used on VLAG Peer 1. CN4093 Application Guide for N/OS 8.3...
Configuring Health Check We strongly recommend that you configure the CN4093 to check the health status of its VLAG peer. Although the operational status of the VLAG peer is generally determined via the ISL connection, configuring a network health check provides an alternate means to check peer status in case the ISL links fail.
Ports on switches A and B connecting to switches C and D: ports 10, 11 Ports on switch B connecting to switch E: ports 15, 16 Ports on switch B connecting to switch F: ports 17, 18 CN4093 Application Guide for N/OS 8.3...
Page 194
CN 4093(config-if)# lacp mode active CN 4093(config-if)# exit 7. Configure ISL between switches C and D, and between E and F as shown in Step 1. 8. Configure the Switch G as shown in Step 2. CN4093 Application Guide for N/OS 8.3...
Meter Re-Mark Queue The CN4093 uses the Differentiated Services (DiffServ) architecture to provide QoS functions. DiffServ is described in IETF RFC 2474 and RFC 2475. With DiffServ, you can establish policies for directing traffic. A policy is a traffic-controlling mechanism that monitors the characteristics of the traffic (for example, its source, destination, and protocol) and performs a controlling action on the traffic when certain characteristics are matched.
Page 196
The CN4093 can classify traffic by reading the DiffServ Code Point (DSCP) or IEEE 802.1p priority value, or by using filters to match specific criteria. When network traffic attributes match those specified in a traffic pattern, the policy instructs the CN4093 to perform specified actions on each packet that passes through it.
Set the COS queue ACL Metering and Re-Marking You can define a profile for the aggregate traffic flowing through the CN4093 by configuring a QoS meter (if desired) and assigning ACL Groups to ports. When you add ACL Groups to a port, make sure they are ordered correctly in terms of precedence.
You can configure the ACL to re-mark a packet as follows: Change the DSCP value of a packet, used to specify the service level traffic should receive. Change the 802.1p priority of a packet. CN4093 Application Guide for N/OS 8.3...
QoS policies are built by applying a set of rules to packets, based on the DSCP value, as they hop through the network. The CN4093 default settings are based on the following standard PHBs, as defined in the IEEE standards: ...
DF, CS0 DSCP Re-Marking and Mapping The CN4093 can re-mark the DSCP value of ingress packets to a new value, and set the 802.1p priority value, based on the DSCP value. You can view the settings by using the following command:...
Using 802.1p Priorities to Provide QoS Lenovo N/OS provides Quality of Service functions based on the priority bits in a packet’s VLAN header. (The priority bits are defined by the 802.1p standard within the IEEE 802.1q VLAN header.) The 802.1p bits, if present in the packet, specify the priority that should be given to packets during forwarding.
Queuing and Scheduling The CN4093 can be configured to have either 2 or 8 output Class of Service (COS) queues per port, into which each packet is placed. Each packet’s 802.1p priority determines its COS queue, except when an ACL action sets the COS queue of the packet.
The following commands configure the control plane protection (CoPP) feature: Configure a queue for a protocol: CN 4093(config)# qos protocol-packet-control packet-queue-map <0-47> <protocol> Set the bandwidth for the queue, in packets per second: CN 4093(config)# qos protocol-packet-control rate-limit-packet-queue <0-47> <1-10000> CN4093 Application Guide for N/OS 8.3...
“ISCLI Stacking Commands” on page 237 Stacking Overview A hybrid stack is a group of eight switches: two CN4093 10Gb Converged Scalable Switches and six EN4093R 10Gb Scalable Switches. A stack can also be formed with just two CN4093 10Gb Converged Scalable Switches.
Stacking Requirements Before Lenovo N/OS switches can form a stack, they must meet the following requirements: Switches in a hybrid stack must be of the model CN4093 10Gb Converged Scalable Switch or EN4093R 10Gb Scalable Switch. In a hybrid stack, the EN4093R switches cannot act as Backup switches. You must use only the CN4093 10Gb Converged Scalable switches as the Master switch and Backup switch.
When this occurs, one Master switch will automatically be chosen as the active Master for the entire stack. The selection process is designed to promote stable, predictable stack operation and minimize stack reboots and other disruptions. CN4093 Application Guide for N/OS 8.3...
8 of them can forward networking traffic, the rest having the data links disabled. Note: Do not merge hybrid stacks if the total number of CN4093 switches exceeds two units. Although all switches which are configured for stacking and joined by stacking...
It is recommended that asnum 1 and csnum 1 be used for identifying the Master switch. By default, csnum 1 is assigned to the Master. If csnum 1 is not available, the lowest available csnum is assigned to the Master. CN4093 Application Guide for N/OS 8.3...
Although any VLAN (except VLAN 1) may be defined for stack traffic, it is highly recommended that the default, VLAN 4090 as shown in the following example, be reserved for stacking. CN 4093(config)# boot stack vlan 4090 4. On each switch, designate the stacking links. CN4093 Application Guide for N/OS 8.3...
Management IP address on the backup switch, must be in the same subnet. Note: In case of a stack split, the floating IP cannot be used anymore due to duplicate IP address issue. CN4093 Application Guide for N/OS 8.3...
To define a Member switch as a Backup (optional) which will assume the Master role if the Master switch fails, execute the following command: CN 4093(config)# stack backup <csnum> -or- CN 4093(config)# stack bind CN4093 Application Guide for N/OS 8.3...
Master. For example, if the new image is loaded into image 1 on the Master switch, the Master will push the same firmware to image 1 on each Member switch. CN4093 Application Guide for N/OS 8.3...
Converting a EN4093R Stack to a Hybrid Stack Use the following procedure to install software on a stack of EN4093R switches that will be combined with CN4093 switches to form a hybrid stack (up to two CN4093 and up to six EN4093R switches): 1.
1. Make sure the new switch meets the stacking requirements on page 212. 2. Place the new switch in its determined place according to the CN4093 10Gb Converged Scalable Switch Installation Guide. 3. Connect to the ISCLI of the new switch (not the stack interface) 4.
CN 4093(config)# stack switch-number <csnum> bind <asnum> -or- CN 4093(config)# stack bind Note: If replacing the Master switch, the Master will not assume control from the Backup unless the Backup is rebooted or fails. CN4093 Application Guide for N/OS 8.3...
Page 234
<severity> configures the severity of logs to be sent to the console. To configure the severity of syslogs written to flash, use the command: CN 4093(config)# logging buffer severity <severity (0-7)> where <severity> configures the severity of logs to be written to flash. CN4093 Application Guide for N/OS 8.3...
ISCLI Stacking Commands Stacking-related ISCLI commands are listed here. For details on specific commands, see the CN4093 10Gb Converged Scalable Switch Command Reference. [no] boot stack enable boot stack higig-trunk <port alias or number> boot stack mode {master|member} [<asnum>|master|backup|all] ...
Virtualization allows resources to be allocated in a fluid manner based on the logical needs of the data center, rather than on the strict, physical nature of components. The following virtualization features are included in Lenovo N/OS 8.3 on the CN4093 10Gb Converged Scalable Switch (CN4093): ...
Page 240
NIC or to a Converged Network Adapter (CNA). UFP provides a switch fabric component to control the NIC. For details on this feature, see “Unified Fabric Port” on page 341. Lenovo N/OS virtualization features provide a highly-flexible framework for allocating and managing switch resources. CN4093 Application Guide for N/OS 8.3...
INTA1 VNIC VNIC A CN4093 with Lenovo N/OS 8.3 supports the Emulex Virtual Fabric Adapter (VFA) 2-port 10Gb LOM and Emulex Virtual Fabric Adapter (Fabric Mezz) for Lenovo Flex System to provide the following vNIC features: Up to four vNICs are supported on each internal switch port.
Physical NIC (PNIC) mode, in which case vNIC features are non-applicable. vNIC IDs on the Switch Lenovo N/OS 8.3 supports up to four vNICs attached to each internal switch port. Each vNIC is provided its own independent virtual pipe on the port.
Page 244
INTAx.2 Bay 4 INTAx.3 Bay 4 INTAx.4 Table 24. vNIC ID Correlation PCIe NIC Port Switch Slot vNIC vNIC ID Function ID Pipe Second ASIC Bay 3 INTBx.1 Bay 3 INTBx.2 Bay 3 INTBx.3 CN4093 Application Guide for N/OS 8.3...
Effectively, each vNIC group is a VLAN, which you can assign by configuring the VLAN to the vNIC group. You must enable the tag configuration on the uplink port. For details, see “vNIC Groups in Shared Mode” on page 251. CN4093 Application Guide for N/OS 8.3...
Bandwidth Metering Lenovo N/OS 8.3 supports bandwidth metering for vNIC traffic. By default, each of the four vNICs on any given port is allowed an equal share (25%) of NIC capacity when enabled. However, you may configure the percentage of available switch port bandwidth permitted to each vNIC.
Lenovo N/OS 8.3 supports up to 32 independent vNIC groups. To enforce group boundaries, each vNIC group is assigned its own unique VLAN. The VLAN configured for the vNIC group will be automatically assigned to member vNICs, ports and LAGs and should not be manually configured for those elements.
NIC strips outer tag Inbound Packet Within the CN4093, all Layer 2 switching for packets within a vNIC group is based on the outer vNIC group VLAN. The CN4093 does not consider the regular, inner VLAN ID (if any) for any VLAN-specific operation.
NIC strips outer tag Inbound Packet Within the CN4093, all Layer 2 switching for packets within a vNIC group is based on the outer vNIC group VLAN. The CN4093 does not consider the regular, inner VLAN ID (if any) for any VLAN-specific operation.
Switch To avoid disrupting vNICs that have not lost their external uplinks, N/ OS 8.3 and the Emulex Virtual Fabric Adapter for Lenovo Flex System provide vNIC-aware failover. In the dedicated mode, when a vNIC group’s external uplink ports fail, the switch cooperates with the affected NIC to prompt failover only on the appropriate vNICs.
Other enabled vNICs (INTA2.1, INTA2.2, and INTA3.2) are permitted the default bandwidth of 25% (2.5Gbsp) on their respective ports. All remaining vNICs are disabled (by default) and are automatically allocated 0 bandwidth. CN4093 Application Guide for N/OS 8.3...
Page 256
CN 4093(vnic-group-config)# exit Once VLAN 1000 and 1774 are configured for vNIC groups, they will not be available for regular configuration. Note: vNICs are not supported simultaneously on the same switch ports as VMready. CN4093 Application Guide for N/OS 8.3...
Emulex Virtual Fabric Adapter The N/ OS vNIC feature works with standard network applications like iSCSI as previously described. However, the Emulex Virtual Fabric Adapter for Lenovo Flex System expects iSCSI traffic to occur only on a single vNIC pipe. When using the Emulex Adapter 2, only vNIC pipe 2 may participate in iSCSI.
FCoE Using the Emulex VFA Similar to the iSCSI application, when using the Emulex VFA for Lenovo chassis systems, FCoE traffic is expected to occur only on vNIC pipe 2. In this case, the additional vNIC configuration for FCoE support is minimal.
VMs can even migrate between host hypervisors, moving to different physical hosts while maintaining their virtual identity and services. The Lenovo N/OS 8.3 VMready feature supports up to 4096 VEs in a virtualized data center environment. The switch automatically discovers the VEs attached to switch ports, and distinguishes between regular VMs, Service Console Interfaces, ®...
The elements within a VM group automatically share certain group-level settings. Lenovo N/OS 8.3 supports up to 4096 VM groups. There are two different types: Local VM groups are maintained locally on the switch. Their configuration is not ...
Distributed VM Groups Distributed VM groups allow configuration profiles to be synchronized between the CN4093 and associated hypervisors and VEs. This allows VE configuration to be centralized, and provides for more reliable VE migration across hypervisors. Using distributed VM groups requires a virtualization management server. The management server acts as a central point of access to configure and maintain multiple hypervisors and their VEs (VMs, virtual switches, and so on).
VLAN, VMs, or port members). Any VM group number currently configured for a local VM group (see “Local VM Groups” on page 260) cannot be converted and must be deleted before it can be used for a distributed VM group. CN4093 Application Guide for N/OS 8.3...
VMcheck The CN4093 primarily identifies virtual machines by their MAC addresses. An untrusted server or a VM could identify itself by a trusted MAC address leading to MAC spoofing attacks. Sometimes, MAC addresses get transferred to another VM, or they get duplicated.
CN 4093# virt vmware dvswitch add <datacenter name> <dvSwitch name> [<dvSwitch-version>] Prerequisites Before adding a vDS on the CN4093, ensure the following: VMware vCenter is fully installed and configured and includes a “bladevm” administration account and a valid SSL certificate.
Migrating to vDS You can migrate VMs to the vDS using vCenter. The migration may also be accomplished using the operational commands on the CN4093 available in the following CLI menus: For VMware vDS operations: CN 4093# virt vmware dvswitch ?
Note: By default, the vCenter includes only a self-signed SSL certificate. If using the default certificate, the noauth option is required. Once the vCenter configuration has been applied on the switch, the CN4093 will connect to the vCenter to collect VE information.
Deleting the assigned vCenter prevents synchronizing the configuration between the CN4093 and VEs. VEs already operating in distributed VM groups will continue to function as configured, but any changes made to any VM profile or distributed VM group on the switch will affect only switch operation;...
(the administrator must assign uplinks using VMware management tools. VMware Operational Commands The CN4093 may be used as a central point of configuration for VMware virtual switches and port groups using the VMware operational menu, available with the following ISCLI privileged EXEC commands:...
TCP and UDP filtering options Lenovo N/OS 8.3 supports up to 128 VMAPs. Individual VMAP filters are configured in the same fashion as regular ACLs, except that VLANs cannot be specified as a filtering criteria (unnecessary, since VMAPs are assigned to a specific VLAN or associated with a VM group VLAN).
When txrate is specified, the switch automatically selects an available ACL for internal use with bandwidth control. Optionally, if automatic ACL selection is not desired, a specific ACL may be selected. If there are no unassigned ACLs available, txrate cannot be configured. CN4093 Application Guide for N/OS 8.3...
CN4093. VM Policy Bandwidth Control is configured per VE, and can be set independently for transmit and receive traffic. Bandwidth policies are enforced by the CN4093. VE traffic that exceeds configured levels is dropped by the switch upon ingress (for txrate) or before egress (for rxrate).
UUID of all VMware hosts, providing an essential overview of the data center: CN 4093# show virt vmware hosts UUID Name(s), IP Address --------------------------------------------------------------- 00a42681-d0e5-5910-a0bf-bd23bd3f7800 172.16.41.30 002e063c-153c-dd11-8b32-a78dd1909a00 172.16.46.10 00f1fe30-143c-dd11-84f2-a8ba2cd7ae00 172.16.44.50 0018938e-143c-dd11-9f7a-d8defa4b8300 172.16.46.20 CN4093 Application Guide for N/OS 8.3...
--------------------------------------------------------------------- MAC Address 00:50:56:9c:21:2f Port Type Virtual Machine VM vCenter Name halibut VM OS hostname localhost.localdomain VM IP Address 172.16.46.15 VM UUID 001c41f3-ccd8-94bb-1b94-6b94b03b9200 Current VM Host 172.16.46.10 Vswitch vSwitch0 Port Group BNT_Default VLAN ID CN4093 Application Guide for N/OS 8.3...
Chapter 17. FCoE and CEE This chapter provides conceptual background and configuration examples for using Converged Enhanced Ethernet (CEE) features of the CN4093 10Gb Converged Scalable Switch, with an emphasis on Fibre Channel over Ethernet (FCoE) solutions. The following topics are addressed in this chapter: ...
Fibre Channel Node Port Virtualized (NPV) switch may perform the FCF function. Although it may be possible to use an external FCF device, this chapter focuses on using the built-in Fibre Channel features of the CN4093 itself. CN4093 Application Guide for N/OS 8.3...
Network Adapter (CNA) known in Fibre Channel as an Ethernet Node (ENode). Note: The figure also shows a non-FCoE LAN server connected to the CN4093 using a CNA. This allows the LAN server to take advantage of some CEE features that are useful even outside of an FCoE environment.
Turning CEE On or Off By default on the CN4093, CEE is turned off. To turn CEE on or off, use the following ISCLI configuration mode commands: CN 4093(config)# [no] cee enable CAUTION: Turning CEE on will automatically change some 802.1p QoS and 802.3x standard...
Effects on 802.1p Quality of Service While CEE is off (the default), the CN4093 allows 802.1p priority values to be used for Quality of Service (QoS) configuration (see “Quality of Service” on page 195). 802.1p QoS default settings are shown in...
If flow control is required on additional priorities on any given port, consider using standard flow control on that port, so that regardless of which priority traffic becomes congested, a flow control frame is generated. CN4093 Application Guide for N/OS 8.3...
The following are required for implementing the FIP snooping bridge feature: The CN4093 must be connected to the Fibre Channel network through a FCF such as a Lenovo Rackswitch G8264CS, another Lenovo CN4093 10Gb Converged Scalable Switch or a Cisco Nexus 5000 Series Switch.
ETS or DCBX configurations, the switch will display an error. Global FIP Snooping Settings By default, the FIP snooping feature is turned off for the CN4093. The following commands are used to turn the feature on or off: CN 4093(config)# [no] fcoe fips enable Note: FIP snooping requires CEE to be turned on (see “Turning CEE On or Off”...
When an FCoE connection logs out, or times out (if ACL timeout is enabled), the related ACLs will be automatically removed. FCoE-related ACLs are independent of manually configured ACLs used for regular Ethernet purposes. FCoE ACLs generally have a higher priority over standard ACLs. CN4093 Application Guide for N/OS 8.3...
“Turning CEE On or Off” on page 282). 4. Turn global FIP snooping on: CN 4093(config)# fcoe fips enable 5. Disable FIP snooping on all non-FCoE external ports: CN 4093(config)# no fcoe fips port INTA2-EXT21 enable CN4093 Application Guide for N/OS 8.3...
LAN application. Note: For any given port, only one flow control method can be implemented at any given time: either PFC or standard IEEE 802.3x flow control. CN4093 Application Guide for N/OS 8.3...
Port-by-port PFC configuration is desirable in most mixed environments where some CN4093 ports are connected to CEE-capable (FCoE) switches, gateways, and Converged Network Adapters (CNAs), and other CN4093 ports are connected to non-CEE Layer 2/Layer 3 switches, routers and Network Interface Cards (NICs).
In this example, PFC is to facilitate lossless traffic handling for FCoE (priority value 3) and a business-critical LAN application (priority value 4). Assuming that CEE is off (the CN4093 default), the example topology shown in Table 29 on page 294 can be configured using the following commands: 1.
802.1p priority values may be assigned by the administrator for a variety of purposes. However, when CEE is turned on, the CN4093 sets the initial default values for ETS configuration as follows: Figure 33.
Note: The default assignment of 802.1p priority values on the CN4093 changes depending on whether CEE is on or off. See “Turning CEE On or Off” on page 282 for details.
Note: The total bandwidth allocated to PGID 0 through 7 must equal exactly 100%. Reducing the bandwidth allocation of any group will require increasing the allocation to one or more of the other groups (see “Allocating Bandwidth” on page 299). CN4093 Application Guide for N/OS 8.3...
Note: DCBX may be configured to permit sharing or learning PFC configuration with or from external devices. This example assumes that PFC configuration is being performed manually. See “Data Center Bridging Capability Exchange” on page 302 for more information on DCBX. CN4093 Application Guide for N/OS 8.3...
DCBX provides two main functions on the CN4093: Peer information exchange The switch uses DCBX to exchange information with connected CEE devices. For normal operation of any FCoE implementation on the CN4093, DCBX must remain enabled on all ports participating in FCoE. Peer configuration negotiation...
When this flag is set for a particular feature, the switch settings will be transmit to the remote CEE peer. If the peer is capable of the feature, and willing to accept the CN4093 settings, it will be automatically reconfigured to match the switch. The willing flag ...
All other ports are disabled or are connected to non-CEE devices. In this example, the CN4093 acts as the central point for CEE configuration. FCoE-related ports will be configured for advertising CEE capabilities, but not to accept external configuration. Other LAN ports that use CEE features will also be configured to advertise feature settings to remote peers, but not to accept external configuration.
Figure 34 on page 306, a Fibre Channel network is connected to the CN4093 on port EXT22. The FCoE-enabled CN4093 is internally connected to a blade server (ENode) through an FCoE-enabled CNA on port INTA1. An internal FCF bridges the networks.
Page 308
309. Although VLAN properties for Fibre Channel and FCoE can be configured together, the additional Fibre Channel elements for this configuraiton are included at the end of this example in order to focus on the FCoE steps. 14. Save the configuration. CN4093 Application Guide for N/OS 8.3...
Chapter 18. Fibre Channel This chapter describes how to configure the CN4093 for use with Fibre Channel networks. Ethernet vs. Fibre Channel As a converged switch, the CN4093 10Gb Converged Scalable Switch provides simultaneous support of Ethernet and Fibre Channel networks.
NPV Gateway As a Node Port Virtualized (NPV) gateway, the CN4093 can act as a Fibre Channel collector, connecting numerous Fibre Channel end-point devices (known as nodes) for uplink to a Fibre Channel full fabric switch, performing stateless FC/FCoE encapsulation and decapsulation.
Fibre Channel IDs, enforces port security among zones, and informs neighboring devices of network changes. When acting as a full-fabric switch, the CN4093 can be connected to NPV gateways or directly to Fibre Channel nodes. In full-fabric mode, the CN4093 can be connected directly to another full fabric CN4093 or a Lenovo RackSwitch G8264CS through Fibre Channel ISL.
Note: Use only the ISCLI or BBI to configure Fibre Channel. Lenovo N/OS CLI is not supported. After configuring Fibre Channel, save any subsequent configurations only in ISCLI or BBI. If Lenovo N/OS CLI is used to save any switch configuration, the Fibre Channel configuration will be lost.
CN 4093(config)# [no] system port <low port>-<high port> type fc Fibre Channel VLANs On the CN4093, each Fibre Channel network connected to the switch must be assigned its own VLAN. For each VLAN used with Fibre Channel, following properties must be defined: ...
Full fabric mode The CN4093 supports up to 12 Fibre Channel VLANs at any given time. Only one mode can be active on any specific VLAN at a given time, and only one VLAN can operate in full fabric mode.
NPV Gateway As a Node Port Virtualized (NPV) gateway, the CN4093 can act as a Fibre Channel collector, connecting numerous Fibre Channel end-point devices (known as nodes) for uplink to a Fibre Channel full fabric switch, performing stateless FC/FCoE encapsulation and decapsulation. For more details, see “NPV Gateway”...
Other CNAs (such as Qlogic) store FCF information and try to login to the same FCF (uplink), so they are not balanced. Servers with AIX Operating Systems also can't be load-balanced for this reason. CN4093 Application Guide for N/OS 8.3...
311. Full Fabric Zoning The CN4093 supports Fibre Channel zones and zonesets for VLANs operating in full fabric mode. In NPV gateway mode, zoning is controlled by the upstream full fabric switch and is not configurable in the NPV gateway VLAN.
Page 318
Fibre Channel initiators and targets. The CN4093 supports up the 64 zones per zoneset, each with up to 20 member devices. However, when an FC alias is used, only 10 devices can be members of a zone.
Set contains Zones that are not included in the Zone Set is the merge of the Adjacent Zone Set. local Zones plus the Adjacent Zones. E-ports cannot be used to form stack LAG links. CN4093 Application Guide for N/OS 8.3...
Limitations Lenovo N/OS supports ISL distance up to 3 kms. E_ports can be configured only on Lenovo Flex System CN4093 10Gb Converged Scalable Switch and Lenovo RackSwitch G8264CS. E_ports cannot interoperate with the switches from other vendors. ...
Lenovo N/OS provides a programming interface using the SMI-S to ease interoperability in a multivendor SAN environment. In this release, only limited support is provided. The CN4093 switch must be operating in full fabric mode. An embedded SMI-S agent runs on the CN4093 and includes standard profiles as specified in the SMI-S.
Zones and zonesets apply only to a VLAN in full fabric mode. Up to 4 zonesets may be configured, but only 1 can be active at any given time. The CN4093 supports up the 64 zones per zoneset, each with up to 20 member devices.
Page 324
1. Specify which Omni Ports are directly connected to Fibre Channel devices: CN 4093(config)# system port ext11-ext12 type fc Note: On the CN4093, FC devices can be connected only to Omni Ports. Omni Ports connected to FCoE devices are considered part of the Ethernet network and should be left to operate in Ethernet mode.
Server Zone1 Lenovo Chassis In this example network, the CN4093 acts as the full fabric switch for the Fibre Channel network in two zones. Note: Although up to 12 Fibre Channel VLANs can be configured on the switch at any given time, only one can operate in full fabric mode. The rest may be configured as NPV gateways.
Page 326
CN 4093(config-zone)# member pwwn 20:34:00:80:e5:18:b3:58 CN 4093(config-zone)# member pwwn 20:34:00:80:e5:28:31:13 CN 4093(config-zone)# exit CN 4093(config)# zoneset name City1 CN 4093(config-zoneset)# member Zone1 CN 4093(config-zoneset)# member Zone2 CN 4093(config-zoneset)# exit CN 4093(config)# zoneset activate name City1 CN4093 Application Guide for N/OS 8.3...
Fibre Channel Standard Protocols Supported Following table lists the standard FC protocols supported on the CN4093 10Gb Converged Scalable Switch. Table 32. FC Protocols Supported Protocol Fibre Channel FCoE ∙ T11 FCoE Initialization Protocol (FIP) (FC-BB-5) Fibre Channel forwarding (FCF)
NIC (vNIC) configuration information is available to EVB devices. This information is generally not available to an 802.1Q bridge. Lenovo N/OS EVB features are compliant with the IEEE 802.1Qbg Authors Group Draft 0.2. For a list of documents on this feature, see: http://www.ieee802.org/1/pages/802.1bg.html.
VSIDB. The VSIDB operates in the following sequence: 1. Define VSI types in the VSIDB. The VSIDB exports the database when the CN4093 sends a request. 2. Create a VM. Specify VSI type for each VM interface. See the SNSC, FSM, or Lenovo System Networking Distributed Switch 5000V guide for details on how to specify the VSI type.
Manual RR and EVB profile cannot be configured on a port at the same time. Note: If a port is a member of an isolated VLAN, the manual reflective relay will not work. See “Private VLANs” on page 133 for more information on isolated VLANs. CN4093 Application Guide for N/OS 8.3...
Configuring EVB in Stacking Mode A stack is a group of up to eight CN4093 10Gb Converged Scalable Switch switches with Lenovo N/OS that work together as a unified system. The switches in a stack are interconnected by a stack LAG in a local ring topology.
"vm: VSI Type ID 100 Associated mac 00:50:56:b6:c0:ff on port 6, ignore 1 mismatched ACL" Unsupported features The following features are not supported on ports configured with EVB: LAG/VLAG vNIC VMready CN4093 Application Guide for N/OS 8.3...
You must configure the static multicast ARP entry only at the Layer 2/Layer 3 or Router node, and not at the Layer 2-only node. Lenovo N/OS supports a maximum of 20 static multicast ARP entries. Note: If you use the ACL profile or IPMC-OPT profile, an ACL entry is consumed for each Static Multicast ARP entry that you configure.
Limitations You must configure the ARP only in the Layer 2/Layer 3 node or the router node but not in the Layer 2-only node. Lenovo N/OS cannot validate if the node is Layer 2-only. The packet is always forwarded to all the ports as specified in the Multicast MAC address configuration.
VMReady Local Group configuration is not supported by UFP. If QoS ETS mode is used, a FCoE vPort must be configured with priority 3. UFP vPorts cannot be aggregated to form a LAG/vLAG client. CN4093 Application Guide for N/OS 8.3...
Note: ETS mode requires Converged Enhanced Ethernet (CEE) to be enabled globally. This mode functions with the ETS feature available on the CN4093. You must first define the ETS characteristics of the CN4093. Assign each vPort to the desired traffic class by assigning a system class priority. The Data Center Bridging...
Using UFP with Other CN4093 10Gb Converged Scalable Switch Features UFP works with other CN4093 features, as described with limitations and details. Layer 2 Failover UFP failover can be configured with auto-monitoring or manual monitoring. In auto-monitoring, a vPort is automatically associated with a Failover trigger if it has any VLAN in common with the monitor ports.
For more information on private VLANs, see “Private VLANs” on page 133 VMReady Configuring with UFP and VMReady, the CN4093 can support up to 32 VMGroups with UFP vPorts in auto mode. VMReady is supported only on a vPort which is configured in auto-VLAN mode.
11. Verify the virtual machine settings. CN4093(config)# show virt vm 12. Add the virtual machine associated with the vPort to the VMGroup. CN4093(config)# virt vmgroup 1 vm 1 13. Verify the VMGroup associations. CN4093(config)# show virt vm Example 4: Auto-VLAN Mode with Edge Virtual Bridging Following is an example configuration of UFP vPorts in auto mode.
CN4093(config_ufp_vport)# exit 8. Configure tagging of ingress frames with the port’s VLAN ID on external port 1. CN4093(config)# interface port EXT1 CN4093(config-if)# tagpvid-ingress CN4093(config-if)# no vlan dot1q tag native CN4093(config-if)# switchport access vlan 4000 CN4093(config-if)# exit Example 6: FCoE Mode Following is an example configuration of UFP vPorts in FCoE mode.
Follow this procedure to configure 8 vPorts for a single UFP port with ETS bandwidth provisioning mode. 1. Configure each individual vPort of a specific port: CN4093(config)# ufp port INTA10 vport 1 CN4093(config_ufp_vport)# network mode access CN4093(config_ufp_vport)# network default-vlan 101...
Ingress VLAN tagging is disabled on all SPAR ports. PVID/Native VLAN is based on any VLAN defined in SPAR. CN 4093(config)# interface port <num> CN 4093(config-if)# switchport trunk native vlan <VLAN number> CN4093 Application Guide for N/OS 8.3...
Layer 2 failover features can be configured on SPAR ports. However, the Layer 2 failover Auto Monitor (AMON) option is not supported. Only the Layer 2 failover Manual Monitor (MMON) option can be used when all ports defined within the trigger belong to the same SPAR. CN4093 Application Guide for N/OS 8.3...
A VLAN assigned to a SPAR cannot be used for any other switch application. Similarly, VLAN used by any other switch application cannot be assigned to a SPAR. SPAR member ports cannot be members of any other VLAN. CN4093 Application Guide for N/OS 8.3...
Page 370
9. Create local domain 3, assign VLAN 30, and specify the SPAR ports that are members of the that VLAN. CN 4093(config-spar)# domain local 3 vlan 30 CN 4093(config-spar)# domain local 3 member INTA11-INTA14 CN 4093(config-spar)# domain local 3 enable 10. Enable SPAR 2. CN 4093(config-spar)# enable CN4093 Application Guide for N/OS 8.3...
“Dynamic Host Configuration Protocol” on page 381 IP Routing Benefits The CN4093 uses a combination of configurable IP switch interfaces and IP routing options. The switch IP routing capabilities provide the following benefits: Connects the server IP subnets to the rest of the backbone network.
Page 374
Layer 2 switching. With Layer 3 IP routing in place on the CN4093, routing between different IP subnets can be accomplished entirely within the switch. This leaves the routers free to handle inbound and outbound traffic for this group of subnets.
(CLI) as the administrator. Note: For details about accessing and using any of the menu commands described in this example, see the Lenovo N/OS Command Reference. 1. Assign an IP address (or document the existing one) for each router and client workstation.
Page 376
CN 4093(config)# ip gateway 1 address 205.21.17.1 enable CN 4093(config)# ip gateway 2 address 205.21.17.2 enable 5. Verify the configuration. CN 4093(config)# show interface ip Examine the resulting information. If any settings are incorrect, make the appropriate changes. CN4093 Application Guide for N/OS 8.3...
Page 378
CN 4093(config-ip-if)# exit 4. Verify the configuration. CN 4093(config)# show vlan CN 4093(config)# show interface information CN 4093(config)# show interface ip Examine the resulting information. If any settings are incorrect, make the appropriate changes. CN4093 Application Guide for N/OS 8.3...
BOOTP Relay Agent Configuration To enable the CN4093 to be the BOOTP forwarder, you need to configure the BOOTP server IP addresses on the switch, and enable BOOTP relay on the interface(s) on which the BOOTP requests are received.
CN 4093(config)# ip bootp-relay bcast-domain <1-10> server <1-5> address <IPv4 address> CN 4093(config)# ip bootp-relay bcast-domain <1-10> enable As with global relay agent servers, domain-specific BOOTP/DHCP functionality may be assigned on a per-interface basis. CN4093 Application Guide for N/OS 8.3...
IP configuration parameters it needs to operate in the TCP/IP network. In the DHCP environment, the CN4093 acts as a relay agent. The DHCP relay feature enables the switch to forward a client request for an IP address to two BOOTP servers with IP addresses that have been configured on the switch.
VLAN to send the server response to the client. DHCP Relay Agent Configuration To enable the CN4093 to be the BOOTP forwarder, you need to configure the DHCP/BOOTP server IP addresses on the switch. Generally, you should configure the switch IP interface on the client side to match the client’s subnet, and configure VLANs to separate client and server subnets.
Border Gateway Protocol for IPv6 (BGP) Routing Information Protocol for IPv6 (RIPng) Most other Lenovo N/OS 8.3 features permit IP addresses to be configured using either IPv4 or IPv6 address formats. However, the following switch features support IPv4 only: ...
In most implementations, the interface identifier is derived from the switch's MAC address, using a method called EUI-64. Most Lenovo N/OS 8.3 features permit IP addresses to be configured using either IPv4 or IPv6 address formats. Throughout this manual, IP address is used in places where either an IPv4 or IPv6 address is allowed.
FF02::1:FF00:0000/104 with the low-order 24 bits of the unicast or anycast address. The following well-known multicast addresses are pre-defined. The group IDs defined in this section are defined for explicit scope values, as follows: FF00:::::::0 through FF0F:::::::0 CN4093 Application Guide for N/OS 8.3...
Address configuration is based on the receipt of Router Advertisement messages that contain one or more Prefix Information options. Lenovo N/OS 8.3 supports stateless address configuration. Stateless address configuration allows hosts on a link to configure themselves with link-local addresses and with addresses derived from prefixes advertised by local routers.
CN 4093(config)# interface ip <interface number> CN 4093(config-ip-if)# [no] ipv6 nd ? CN 4093(config-ip-if)# exit To add or remove entries in the static neighbor cache, use the following command path: CN 4093(config)# [no] ip neighbors ? CN4093 Application Guide for N/OS 8.3...
-u 2001:2:3:4:0:0:0:142 TFTP The TFTP commands support both IPv4 and IPv6 addresses. Link-local addresses are not supported. The FTP commands support both IPv4 and IPv6 addresses. Link-local addresses are not supported. CN4093 Application Guide for N/OS 8.3...
IPsec Protocols The Lenovo N/OS implementation of IPsec supports the following protocols: Authentication Header (AH) AHs provide connectionless integrity and data origin authentication for IP packets, and provide protection against replay attacks. In IPv6, the AH protects the AH itself, the Destination Options extension header after the AH, and the IP payload.
Using IPsec with the CN4093 IPsec supports the fragmentation and reassembly of IP packets that occurs when data goes to and comes from an external device. The Lenovo Flex System CN4093 10Gb Converged Scalable Switch acts as an end node that processes any fragmentation and reassembly of packets but does not forward the IPsec traffic.
2. Set the DES encryption algorithm. CN 4093(config-ikev2-prop)# encryption {3des|aes-cbc|des} (default: 3des) 3. Set the authentication integrity algorithm type. CN 4093(config-ikev2-prop)# integrity {md5|sha1} (default: sha1) 4. Set the Diffie-Hellman group. CN 4093(config-ikev2-prop)# group {1|2|5|14|24} (default: 2) CN4093 Application Guide for N/OS 8.3...
One of the following: esp-des | esp-3des | encryption method esp-aes-cbc | esp-null One of the following: esp-sha1 | esp-md5 | integrity algorithm none One of the following: ah-sha1 | ah-md5 | none AH authentication algorithm CN4093 Application Guide for N/OS 8.3...
The outbound AH key code, in hexadecimal outbound AH IPsec SPI A number from 256-4294967295 outbound ESP cipher key The outbound ESP key code, in hexadecimal outbound ESP SPI A number from 256-4294967295 CN4093 Application Guide for N/OS 8.3...
In a routed environment, routers communicate with one another to keep track of available routes. Routers can learn about available routes dynamically using the Routing Information Protocol (RIP). Lenovo N/OS software supports RIP version 1 (RIPv1) and RIP version 2 (RIPv2) for exchanging TCP/IPv4 route information with other routers.
Lenovo N/OS supports using clear password for RIPv2. RIPv2 in RIPv1 Compatibility Mode Lenovo N/OS allows you to configure RIPv2 in RIPv1compatibility mode, for using both RIPv2 and RIPv1 routers within a network. In this mode, the regular routing updates use broadcast UDP data packet to allow RIPv1 routers to receive those packets.
RIP Features Lenovo N/OS provides the following features to support RIPv1 and RIPv2: Poison Reverse Simple split horizon in RIP omits routes learned from one neighbor in updates sent to that neighbor. That is the most common configuration used in RIP, with the Poison Reverse feature disabled.
For maximum security, RIPv1 messages are ignored when authentication is enabled (interface ip <x>/ ip rip auth type/password); otherwise, the routing information from authenticated messages is propagated by RIPv1 routers in an unauthenticated manner. CN4093 Application Guide for N/OS 8.3...
Page 414
For those RIP learnt routes within the garbage collection period, that are routes phasing out of the routing table with metric 16, use the following command: CN 4093# show ip rip routes Locally configured static routes do not appear in the RIP Routes table. CN4093 Application Guide for N/OS 8.3...
IPv4 Multicast source that provides the data streams and the clients that want to receive the data. The CN4093 10Gb Converged Scalable Switch (CN4093) can perform IGMP Snooping, or act as an IGMP Relay (proxy) device. Note: Lenovo N/OS 8.3 does not support IPv6 for IGMP.
The switch then sends a Proxy Leave packet to the Mrouter in order to update it. If the FastLeave option is enabled on a VLAN, the multicast path is terminated immediately and the Leave packet is directly forwarded to the Mrouter. CN4093 Application Guide for N/OS 8.3...
IGMP Groups The CN4093 supports a maximum of 3072 IGMP entries, on a maximum of 1024 (1022 in stacking mode) VLANs. One IGMP entry is allocated for each unique join request, based on the VLAN and IGMP group address only (regardless of the port).
IGMP Snooping Configuration Example This section provides steps to configure IGMP Snooping on the CN4093, using the Command-Line Interface (CLI). 1. Configure port and VLAN membership on the switch. 2. Add VLANs to IGMP Snooping and enable IGMP Snooping. CN 4093(config)# ip igmp snoop vlan 1 CN 4093(config)# ip igmp snoop enable 3.
A static multicast router (Mrouter) can be configured for a particular port on a particular VLAN. A total of 128 static Mrouters can be configured on the CN4093. Both internal and external ports can accept a static Mrouter. Note: When static Mrouters are used, the switch will continue learning dynamic Mrouters via IGMP snooping.
IGMP Relay The CN4093 can act as an IGMP Relay (or IGMP Proxy) device that relays IGMP multicast messages and traffic between an Mrouter and end stations. IGMP Relay allows the CN4093 to participate in network multicasts with no configuration of the various multicast routing protocols, so you can deploy it in the network with minimal effort.
1 action deny CN 4093(config) ip igmp profile 1 enable 3. Assign the IGMP filter to a port. CN 4093(config) interface port 3 CN 4093(config-if)# ip igmp profile 1 CN 4093(config-if)# ip igmp filtering CN4093 Application Guide for N/OS 8.3...
General Query: Sent periodically to learn multicast address listeners from an attached link. CN4093 uses these queries to build and refresh the Multicast Address Listener state. General Queries are sent to the link-scope all-nodes multicast address (FF02::1), with a multicast address field of 0, and a maximum response delay of query response interval.
Query to verify if, for a specified multicast address, there are hosts still listening to a specific set of sources. CN4093 supports MLD versions 1 and 2. Note: MLDv2 operates in version 1 compatibility mode when, in a specific network, not all hosts are configured with MLDv2.
When the other querier present timer expires, it regains the Querier state and starts sending general queries. Note: When MLD Querier is enabled on a VLAN, the switch performs the role of an MLD Querier only if it meets the MLD Querier election criteria. CN4093 Application Guide for N/OS 8.3...
MLD Capacity and Default Values Table 36 lists the maximum and minimum values of the CN4093 variables. Table 36. CN4093 Capacity Table Variable Maximum Value IPv6 Multicast Entries IPv6 Interfaces for MLD Table 37 lists the default settings for MLD features and variables.
BGP is defined in RFC 1771. CN4093 10Gb Converged Scalable Switches (CN4093s) can advertise their IP interfaces and IPv4 addresses using BGP and take BGP feeds from as many as BGP router peers.
IPv4 space represented in the route being advertised. For example, if you advertise 192.204.4.0/24, you are declaring that if another router sends you data destined for any address in 192.204.4.0/24, you know how to carry that data to its destination. CN4093 Application Guide for N/OS 8.3...
442. Lenovo N/OS allows you to configure 32 route maps. Each route map can have up to eight access lists. Each access list consists of a network filter. A network filter defines an IPv4 address and subnet mask of the network that you want to include in the filter.
Page 438
Select the peer router and then add the route map to the incoming route map list, CN 4093(config-router-bgp)# neighbor 1 route-map in <1-32> or to the outgoing route map list. CN 4093(config-router-bgp)# neighbor 1 route-map out <1-32> 8. Exit Router BGP mode. CN 4093(config-router-bgp)# exit CN4093 Application Guide for N/OS 8.3...
Route Aggregation Example” on page 444. Redistributing Routes In addition to running multiple routing protocols simultaneously, Lenovo N/OS software can redistribute information from one routing protocol to another. For example, you can instruct the switch to use BGP to re-advertise static routes. This applies to all of the IP-based routing protocols.
AS. When BGP sends that update to another AS, the metric is reset to 0. Unless otherwise specified, the router compares metric attributes for paths from external neighbors that are in the same AS. CN4093 Application Guide for N/OS 8.3...
When the same network is learned via more than one BGP peer, BGP uses its policy for selecting the best route to that network. The BGP implementation on the CN4093 uses the following criteria to select a path when the same route is received from multiple peers.
IP: 200.200.200.11 IP: 200.200.200.10 On the CN4093, one peer router (the secondary one) is configured with a longer AS path than the other, so that the peer with the shorter AS path will be seen by the switch as the primary default gateway. ISP 2, the secondary peer, is configured with a metric of “3,”...
46, you have two peer routers: an internal and an external peer router. Configure the CN4093 to redistribute the default routes from AS 200 to AS 135. At the same time, configure for route aggregation to allow you to condense the number of routes traversing from AS 135 to AS 200.
Chapter 30. OSPF Lenovo N/OS supports the Open Shortest Path First (OSPF) routing protocol. The Lenovo N/OS implementation conforms to the OSPF version 2 specifications detailed in Internet RFC 1583, and OSPF version 3 specifications in RFC 5340. The following sections discuss OSPF support for the CN4093 10Gb Converged Scalable Switch (CN4093): ...
Backbone (NSSA) External LSA Routes ASBR Stub Area, NSSA, ABR = Area Border Router or Transit Area ASBR = Autonomous System Connected to Backbone Boundary Router via Virtual Link Non-OSPF Area RIP/BGP AS CN4093 Application Guide for N/OS 8.3...
For each route removed from the route table, if the route has already been sent to an adjacency, an update message containing the route to withdraw is sent. CN4093 Application Guide for N/OS 8.3...
OSPFv2 Implementation in Lenovo N/OS Lenovo N/OS supports a single instance of OSPF and up to 2K routes on the network. The following sections describe OSPF implementation in Lenovo N/OS: “Configurable Parameters” on page 452 “Defining Areas” on page 453 ...
“Virtual Links” on page 457). Up to three OSPF areas can be connected to the CN4093 with Lenovo N/OS software. To configure an area, the OSPF number must be defined and then attached to a network interface on the switch. The full process is explained in the following sections.
“area 0.0.0.2” represents OSPF area 2 and can be specified directly on the CN4093 as “area-id 0.0.0.2”. On the CN4093, using the last octet in the area ID, “area 1” is equivalent to “area-id 0.0.0.1”. Note: Although both types of area ID formats are supported, be sure that the area IDs are in the same format throughout an area.
Backup Designated Router (BDR) is elected in case the DR fails. DR and BDR elections are made through the hello process. The election can be influenced by assigning a priority value to the OSPF interfaces on the CN4093. The command is as follows: CN 4093(config-ip-if)# ip ospf priority <priority value (0-255)>...
Each CN4093 acting as an ABR automatically inserts a default route into each attached area. In simple OSPF stub areas or NSSAs with only one ABR leading...
<router ID> is the IP address of the virtual neighbor (nbr), the routing device at the target endpoint. Another router ID is needed when configuring a virtual link in the other direction. To provide the CN4093 with a router ID, see the following section,...
OSPF allows packet authentication and uses IP multicast when sending and receiving packets. Routers participate in routing domains based on pre-defined passwords. Lenovo N/OS supports simple password (type 1 plain text passwords) and MD5 cryptographic authentication. This type of authentication allows a password to be configured per area.
5. Configure MD5 key for the virtual link between Area 2 and Area 0 on switch 2 and switch 4. CN 4093(config-router-ospf)# message-digest-key 2 md5-key test 6. Assign MD5 key ID to OSPF virtual link on switches 2 and 4. CN 4093(config-router-ospf)# area-virtual-link 1 message-digest-key 2 CN 4093(config-router-ospf)# exit CN4093 Application Guide for N/OS 8.3...
Host Routes for Load Balancing Lenovo N/OS implementation of OSPF includes host routes. Host routes are used for advertising network device IP addresses to external networks, accomplishing the following goals: ABR Load Sharing As a form of load balancing, host routes can be used for dividing OSPF traffic among multiple ABRs.
The following OSPF features are not supported in this release: Summarizing external routes Filtering OSPF routes Using OSPF to forward multicast routes Configuring OSPF on non-broadcast multi-access networks (such as frame relay, X.25, or ATM) CN4093 Application Guide for N/OS 8.3...
OSPFv2 Configuration Examples A summary of the basic steps for configuring OSPF on the CN4093 is listed here. Detailed instructions for each of the steps is covered in the following sections: 1. Configure IP interfaces. One IP interface is required for each desired network (range of IP addresses) being assigned to an OSPF area on the switch.
Page 464
CN 4093(config-ip-if)# ip ospf enable CN 4093(config-ip-if)# exit 6. Attach the network interface to the stub area. CN 4093(config)# interface ip 2 CN 4093(config-ip-if)# ip ospf area 1 CN 4093(config-ip-if)# ip ospf enable CN 4093(config-ip-if)# exit CN4093 Application Guide for N/OS 8.3...
Network Note: OSPFv2 supports IPv4 only. IPv6 is supported in OSPFv3 (see “OSPFv3 Implementation in Lenovo N/OS” on page 471). Configuring OSPF for a Virtual Link on Switch #1 1. Configure IP interfaces on each network that will be attached to the switch.
Interface 2 for the stub area network on 10.10.24.0/24 CN 4093(config)# interface ip 1 CN 4093(config-ip-if)# ip address 10.10.12.2 255.255.255.0 enable CN 4093(config-ip-if)# exit CN 4093(config)# interface ip 2 CN 4093(config-ip-if)# ip address 10.10.24.1 255.255.255.0 enable CN 4093(config-ip-if)# exit CN4093 Application Guide for N/OS 8.3...
Page 467
CN 4093(config)# router ospf CN 4093(config-router-ospf)# enable 4. Define the backbone. This version of Lenovo N/OS requires that a backbone index be configured on the non-backbone end of the virtual link as follows: CN 4093(config-router-ospf)# area 0 area-id 0.0.0.0 CN 4093(config-router-ospf)# area 0 enable 5.
36.128.254.x 10.10.7.0/24 36.128.192.0/18 Network Network Note: You can specify a range of addresses to prevent advertising by using the hide option. In this example, routes in the range 36.128.200.0 through 36.128.200.255 are kept private. CN4093 Application Guide for N/OS 8.3...
Use the following commands to verify the OSPF configuration on your switch: show ip ospf show ip ospf neighbor show ip ospf database database-summary show ip ospf routes Refer to the Lenovo N/OS Command Reference for information on the preceding commands. CN4093 Application Guide for N/OS 8.3...
Although OSPFv2 and OSPFv3 are very similar, they represent independent features on the CN4093. They are configured separately, and both can run in parallel on the switch with no relation to one another, serving different IPv6 and IPv4 traffic, respectively.
CN 4093(config-ip-if)# OSPFv3 Limitations Lenovo N/OS 8.3 does not currently support the following OSPFv3 features: Multiple instances of OSPFv3 on one IPv6 link. OSPFv3 Configuration Example The following example depicts the OSPFv3 equivalent configuration of “Example 3: Summarizing Routes”...
Page 474
CN 4093(config-router-ospf)# area-range 2 area 0 CN 4093(config-router-ospf)# area-range 2 hide CN 4093(config-router-ospf)# exit This differs from OSPFv2 only in that the OSPFv3 command path is used, and the address and prefix are specified in IPv6 format. CN4093 Application Guide for N/OS 8.3...
Lenovo N/OS supports Protocol Independent Multicast (PIM) in Sparse Mode (PIM-SM) and Dense Mode (PIM-DM). Note: Lenovo N/OS 8.3 does not support IPv6 for PIM. The following sections discuss PIM support for the CN4093 10Gb Converged Scalable Switch: “PIM Overview” on page 477 ...
PIM-SM, but uses broadcasts that can consume more bandwidth in establishing and optimizing routes. The following PIM modes and features are not currently supported in Lenovo N/OS 8.3: Hybrid Sparse-Dense Mode (PIM-SM/DM). Sparse Mode and Dense Mode may ...
CN 4093(config)# [no] ip pim enable Defining a PIM Network Component The CN4093 can be attached to a maximum of two independent PIM network components. Each component represents a different PIM network, and can be defined for either PIM-SM or PIM-DM operation. Basic PIM component configuration is performed using the following commands: CN 4093(config)# ip pim component <1-2>...
To change the VLAN, first disable PIM on the interface. PIM Neighbor Filters The CN4093 accepts connection to up to 24 PIM interfaces. By default, the switch accepts all PIM neighbors attached to the PIM-enabled interfaces, up to the maximum number (72 neighbors).
CN 4093(config-ip-if)# ip pim dr-priority <value (0-4294967294)> CN 4093(config-ip-if)# exit Note: A value of 0 (zero) specifies that the CN4093 will not act as the DR. This setting requires the CN4093 to be connected to a peer that has a DR priority setting of 1 or higher in order to ensure that a DR will be present in the network.
IGMP Query feature globally, as well as on each VLAN where it is needed. If the switch is connected to multicast receivers and/or hosts, be sure to enable IGMP snooping globally, as well as on each VLAN where PIM receivers are attached. CN4093 Application Guide for N/OS 8.3...
Note: In the following example, since the receivers and sources are connected in different areas, the border router must be configured for the IPMC traffic to be forwarded. Lenovo N/OS supports only partial configuration of PIM border router. Figure 55. Network with both PIM-DM and PIM-SM Components...
Chapter 32. Basic Redundancy Lenovo N/OS 8.3 includes various features for providing basic link or device redundancy: “Aggregation for Link Redundancy” on page 491 “Hot Links” on page 492 Aggregation for Link Redundancy Multiple switch ports can be combined together to form robust, high-bandwidth LAGs to other devices.
(FDB) over the active interface, so that other devices on the network can learn the new path. The Hot Links FBD update option uses the station update rate to determine the rate at which to send FDB packets. CN4093 Application Guide for N/OS 8.3...
Auto Monitoring LAG Links Layer 2 Failover can be enabled on any LAG in the CN4093, including LACP LAGs. LAGs can be added to failover trigger groups. Then, if some specified number of trigger links fail, the switch disables all the internal ports in the switch (unless VLAN Monitor is turned on).
Auto Monitor Configurations Figure 57 is a simple example of Layer 2 Failover. One CN4093 is the primary and the other is used as a backup. In this example, all external ports on the primary switch belong to a single LAG, with Layer 2 Failover enabled and Failover Limit set to 2.
To view the state of any port, use one of the following commands: CN 4093# show interface link (View port link status) CN 4093# show interface port <x> spanning-tree stp <x> (View port STP status) CN 4093# show lacp information (View port LACP status) CN4093 Application Guide for N/OS 8.3...
A maximum of two LACP keys can be added per trigger. Management ports, FC ports and stacking ports cannot be monitored. Control ports for different triggers must not overlap. Monitor ports may overlap. CN4093 Application Guide for N/OS 8.3...
The following procedure pertains to the configuration shown in Figure 1. Configure Network Adapter Teaming on the servers. 2. Define a LAG on the CN4093. CN 4093(config)# portchannel 1 port EXT1,EXT2,EXT3 enable 3. Configure Failover parameters. CN 4093(config)# failover trigger 1 enable CN 4093(config)# failover trigger 1 limit <0-1024>...
Chapter 34. Virtual Router Redundancy Protocol The CN4093 10Gb Converged Scalable Switch (CN4093) supports IPv4 high-availability network topologies through an enhanced implementation of the Virtual Router Redundancy Protocol (VRRP). Note: Lenovo N/OS 8.3 does not support IPv6 for VRRP. The following topics are discussed in this chapter: “VRRP Overview”...
Within a virtual router, the VRRP routers not selected to be the master are known as virtual router backups. Should the virtual router master fail, one of the virtual router backups becomes the master and assumes its responsibilities. CN4093 Application Guide for N/OS 8.3...
Lenovo N/OS high availability configurations are based on VRRP. The implementation of VRRP includes proprietary extensions. The Lenovo N/OS implementation of VRRP supports the following modes of high availability: Active-Active—based on proprietary Lenovo N/OS extensions to VRRP ...
Master to Standby. Each VRRP advertisement can include up to 128 addresses. All virtual routers are advertised within the same packet, conserving processing and buffering resources. CN4093 Application Guide for N/OS 8.3...
Lenovo N/OS Extensions to VRRP This section describes VRRP enhancements that are implemented in Lenovo N/OS. Lenovo N/OS supports a tracking function that dynamically modifies the priority of a VRRP router, based on its current state. The objective of tracking is to have, whenever possible, the master bidding processes for various virtual routers in a LAN converge on the same switch.
Note: There is no shortcut to setting tracking parameters. The goals must first be set and the outcomes of various configurations and scenarios analyzed to find settings that meet the goals. CN4093 Application Guide for N/OS 8.3...
CN4093 1 on port EXT1. Return traffic uses default gateway 1 (192.168.1.1). If the link between CN4093 1 and the Layer 2 switch fails, CN4093 2 becomes the Master because it has a higher priority. Traffic is forwarded to CN4093 2, which forwards it to CN4093 1 through port EXT4.
4. Enable tracking on ports. Set the priority of Virtual Router 1 to 101, so that it becomes the Master. CN 4093(config-vrrp)# virtual-router 1 track ports CN 4093(config-vrrp)# virtual-router 1 priority 101 CN 4093(config-vrrp)# virtual-router 2 track ports CN 4093(config-vrrp)# exit CN4093 Application Guide for N/OS 8.3...
Chapter 35. Link Layer Discovery Protocol The Lenovo N/OS software support Link Layer Discovery Protocol (LLDP). This chapter discusses the use and configuration of LLDP on the switch: “LLDP Overview” on page 522 “Enabling or Disabling LLDP” on page 523 ...
The administrator can allow any given port to transmit only, receive only, or both transmit and receive LLDP information. The LLDP information to be distributed by the CN4093 ports, and that which has been collected from other LLDP stations, is stored in the switch’s Management Information Base (MIB).
Enabling or Disabling LLDP Global LLDP Setting By default, LLDP is enabled on the CN4093. To turn LLDP off or on, use the following command: (Turn LLDP on or off globally) CN 4093(config)# [no] lldp enable Transmit and Receive Control The CN4093 can also be configured to transmit or receive LLDP information on a port-by-port basis.
Minimum Interval In addition to sending LLDP information at scheduled intervals, LLDP information is also sent when the CN4093 detects relevant changes to its configuration or status (such as when ports are enabled or disabled). To prevent the CN4093 from sending multiple LLDP packets in rapid succession when port status is in flux, a transmit delay timer can be configured.
CN 4093(config-if)# exit In addition to sending LLDP information at scheduled intervals, LLDP information is also sent when the CN4093 detects relevant changes to its configuration or status (such as when ports are enabled or disabled). To prevent the CN4093 from sending multiple trap notifications in rapid succession when port status is in flux, a global trap delay timer can be configured.
CN4093 port from their MIB. In addition, if LLDP is fully disabled on a port (using admstat disabled) and later re-enabled, the CN4093 will temporarily delay resuming LLDP transmissions on the port in order to allow the port LLDP information to stabilize. The...
Page 528
Table 39. LLDP Optional Information Types (continued) Type Description Default dcbx Data Center Bridging Capability Enabled Exchange Protocol (DCBX) for the port. Select all optional LLDP information for Disabled inclusion or exclusion. CN4093 Application Guide for N/OS 8.3...
System Capabilities Supported/Enabled Remote Management Address The CN4093 stores the collected LLDP information in the MIB. Each remote LLDP-capable device is responsible for transmitting regular LLDP updates. If the received updates contain LLDP information changes (to port state, configuration, LLDP MIB structures, deletion), the switch will set a change flag within the MIB for convenient notification to SNMP-based management systems.
Page 530
Port Id : 23 Port Description : EXT7 System Name System Description : Lenovo Flex System CN4093 10Gb Converged Scalable Switch, Lenovo N/OS: version 8.3, boot image: version 6.9.1.14 System Capabilities Supported : bridge, router System Capabilities Enabled : bridge, router...
Page 531
: 56 Port Description : EXT14 System Name : CFC System Description : Lenovo Flex System CN4093 10Gb Converged Scalable Switch, Lenovo Networking OS: version 7.8.0.48, Boot image: version 7.8.0.48 System Capabilities Supported : bridge, router System Capabilities Enabled : bridge, router...
MIB. Remote devices can also intentionally set their LLDP time-to-live to 0, indicating to the switch that the LLDP information is invalid and should be immediately removed. CN4093 Application Guide for N/OS 8.3...
Lenovo Director. SNMP Version 1 To access the SNMP agent on the CN4093, the read and write community strings on the SNMP manager should be configured to match those on the switch. The read and write community strings on the switch can be changed using the following commands: CN 4093(config)# snmp-server read-community <1-32 characters>...
Default Configuration Lenovo N/OS has four SNMPv3 users by default. All the four users have access to all the MIBs supported by the switch: User 1 name is adminmd5 (password adminmd5). Authentication used is MD5. Privacy protocol used is DES.
Note: Audit logging is enabled by default and cannot be disabled. The audit logs are accessed remotely via SNMPv3 hosts. Use the following commands to locally manage the logs: CN 4093(config)# show sal reverse (Display most recent logs first) CN 4093(config)# clear sal (Clear audit logs) CN4093 Application Guide for N/OS 8.3...
CN 4093(config)# snmp-server target-parameters 10 user-name v1only CN 4093(config)# snmp-server target-parameters 10 message snmpv1 Note: Lenovo N/OS 8.3 supports only IPv4 addresses for SNMP trap hosts. 5. Use the community table to specify which community string is used in the trap.
SNMP GET operation and “private” for SNMP SET operation. The community string can be modified only through the Command Line Interface (CLI). Detailed SNMP MIBs and trap definitions of the Lenovo N/OS SNMP agent are contained in the following Lenovo N/OS enterprise MIB document: GbScSE-10G-L2L3.mib...
Page 545
The Lenovo N/OS SNMP agent supports the following generic traps as defined in RFC 1215: ColdStart WarmStart LinkDown LinkUp AuthenticationFailure The SNMP agent also supports two Spanning Tree traps as defined in RFC 1493: ...
Page 546
Signifies that the teaming control is down but teardown is blocked. altSwTeamingCtrlError Signifies error, action is undefined. altSwLACPPortBlocked Signifies that LACP is operationally down on a port, and traffic is blocked on the port. CN4093 Application Guide for N/OS 8.3...
Page 547
Table 40. Lenovo N/OS-Supported Enterprise SNMP Traps (continued) Trap Name Description altSwLACPPortUnblocked Signifies that LACP is operationally up on a port, and traffic is no longer blocked on the port. altSwLFDPortErrdisabled Signifies that a port is error-disabled due to excessive link flaps.
Page 548
Indicates that the sending agent has transitioned to “Backup” state. vrrpCurCfgVirtRtrIndx is the VRRP virtual router table index referenced in vrrpCurCfgVirtRtrTable. The range is from 1 to vrrpVirtRtrTableMaxSize. vrrpCurCfgVirtRtrAddr is the VRRP virtual router IP address. CN4093 Application Guide for N/OS 8.3...
Page 549
Table 40. Lenovo N/OS-Supported Enterprise SNMP Traps (continued) Trap Name Description altSwVrrpAuthFailure Signifies that a packet has been received from a router whose authentication key or authentication type conflicts with this router's authentication key or authentication type. Implementation of this trap is optional.
Page 550
Signifies that the master has sent a FORCE DETACH message to a member. altVMGroupVMotion Signifies that a virtual machine has moved from a port to another. altVMGroupVMOnline Signifies that an advance provisioned virtual machine has came online. CN4093 Application Guide for N/OS 8.3...
Load a new Switch image (boot or running) from a FTP/TFTP/SFTP server Load a previously saved switch configuration from a FTP/TFTP/SFTP server Save the switch configuration to a FTP/TFTP/SFTP server Save a switch dump to a FTP/TFTP/SFTP server CN4093 Application Guide for N/OS 8.3...
3. If you are using an SFTP/FTP server, enter a username: Set agTransferUserName.0 "MyName" 4. If you are using an SFTP/FTP server, enter a password: Set agTransferPassword.0 "MyPassword" 5. Initiate the transfer. To save a dump file, enter 5: Set agTransferAction.0 "5" CN4093 Application Guide for N/OS 8.3...
Uniform Resource Locator (URL) pointing to the service desired, and other information, such as server load, needed by the User Agent. For more details on SLP configuration, see the Lenovo Flex System CN4093 10Gb Converged Scalable Switch Command Reference for Lenovo N/OS 8.3.
FoD website to purchase an Authorization Code. You will need to provide the unique ID (UID) of the specific CN4093 where the key will be installed. The UID is the last 12 characters of the CN4093 serial number.
Licenses keys are based on the unique CN4093 device serial number and are non-transferable. In the event that the CN4093 must be replaced, a new activation key must be acquired and installed. When the replacement is handled through Lenovo Service and Support, your original license will be transferred to the serial number of the replacement unit and you will be provided a new license key.
Removing a license key reverts the port mapping to the default settings for the remaining licensing level. To manually revert the port mapping to the default settings use the following command: CN4093(config)# default boot port-map CN4093 Application Guide for N/OS 8.3...
Page 564
3. View RMON history for the port. CN 4093(config)# show rmon history RMON History group configuration: Index IFOID Interval Rbnum Gbnum ----- ----------------------- -------- ----- ----- 1.3.6.1.2.1.2.2.1.1.1 Index Owner ----- ---------------------------------------------- rmon port 1 history CN4093 Application Guide for N/OS 8.3...
Note: Lenovo N/OS 8.3 does not support IPv6 for sFLOW. sFlow Statistical Counters The CN4093 can be configured to send network statistics to an sFlow analyzer at regular intervals. For each port, a polling interval of 5 to 60 seconds can be configured, or 0 (the default) to disable this feature.
CN 4093(config-if)# sflow sampling <sampling rate>(Data sampling rate) Specify a sampling rate between 256 and 65536 packets, or 0 to disable. By default, the sampling rate is 0 (disabled) for each port. 4. Save the configuration. CN4093 Application Guide for N/OS 8.3...
Chapter 41. Port Mirroring The Lenovo N/OS port mirroring feature allows you to mirror (copy) the packets of a target port, and forward them to a monitoring port. Port mirroring functions for all layer 2 and layer 3 traffic on a port. This feature can be used as a troubleshooting tool or to enhance the security of your network.
Port Mirroring Behavior This section describes the composition of monitored packets in the CN4093, based on the configuration of the ports. Packets mirrored at port egress are mirrored prior to VLAN tag processing and may have a different PVID than packets that egress the port toward their actual network destination.
Page 576
Gratuitous ARP the Layer 2 devices attached to the switch would not know that the MAC address had moved in the network. For a more detailed description, refer to RFC 2338. CN4093 Application Guide for N/OS 8.3...
Lenovo to assist you. Use this information to obtain additional information about Lenovo and Lenovo products, and determine what to do if you experience a problem with your Lenovo system or optional device. Note: This section includes references to IBM web sites and information about obtaining service.
Page 578
Electronic Service Request. You can solve many problems without outside assistance by following the troubleshooting procedures that Lenovo provides in the online help or in the Lenovo product documentation. The Lenovo product documentation also describes the diagnostic tests that you can perform. The documentation for most systems, operating systems, and programs contains troubleshooting procedures and explanations of error messages and error codes.
Web sites. The materials at those Web sites are not part of the materials for this Lenovo product, and use of those Web sites is at your own risk.
Page 580
Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. CN4093 Application Guide for N/OS 8.3...
Trademarks Lenovo, the Lenovo logo, Flex System, System x, NeXtScale System, and X-Architecture are trademarks of Lenovo in the United States, other countries, or both. Intel and Intel Xeon are trademarks of Intel Corporation in the United States, other countries, or both.
(TBW). A device that has exceeded this limit might fail to respond to system-generated commands or might be incapable of being written to. Lenovo is not responsible for replacement of a device that has exceeded its maximum guaranteed number of program/erase cycles, as documented in the Official Published Specifications for the device.
Recycling Information Lenovo encourages owners of information technology (IT) equipment to responsibly recycle their equipment when it is no longer needed. Lenovo offers a variety of programs and services to assist equipment owners in recycling their IT products. For information on recycling Lenovo products, go to: http://www.lenovo.com/recycling...
If Lenovo determines that the levels of particulates or gases in your environment have caused damage to the device, Lenovo may condition provision of repair or replacement of devices or parts on implementation of appropriate remedial measures to mitigate such environmental contamination.
Properly shielded and grounded cables and connectors must be used to meet FCC emission limits. Lenovo is not responsible for any radio or television interference caused by using other than recommended cables and connectors or by unauthorized changes or modifications to this equipment.
Grenzwerte der Klasse A der Norm gemäß Richtlinie. Um dieses sicherzustellen, sind die Geräte wie in den Handbüchern beschrieben zu installieren und zu betreiben. Des Weiteren dürfen auch nur von der Lenovo empfohlene Kabel angeschlossen werden. Lenovo übernimmt keine Verantwortung für die Einhaltung der Schutzanforderungen, wenn das Produkt ohne Zustimmung der Lenovo verändert bzw.
Dieses Gerät ist berechtigt, in Übereinstimmung mit dem Deutschen EMVG das EG-Konformitätszeichen - CE - zu führen. Verantwortlich für die Konformitätserklärung nach Paragraf 5 des EMVG ist die Lenovo (Deutschland) GmbH, Meitnerstr. 9, D-70563 Stuttgart. Informationen in Hinsicht EMVG Paragraf 4 Abs. (1) 4: Das Gerät erfüllt die Schutzanforderungen nach EN 55024 und EN 55022 Klasse...
Page 592
50 IBM Director 535 failover 495 IBM DirectorSNMP overview 506 IBM Director 37 FC-BB-5 280 ICMP 104 FCC Class A notice 586 FCC, Class A 586 FCF 258 detection mode 287 CN4093 Application Guide for N/OS 8.3...
Page 596
507 overview 503 virtual interface router 504 virtual router ID numbering 510 vrid 504 VSI 329 VSI Database, See VSIDB. VSI Discovery and Configuration Protocol, See VDP. VSIDB 330 willing flag (DCBX) 303 CN4093 Application Guide for N/OS 8.3...
Page 598
Part Number: 00MY375 Printed in USA (IP) P/N: 00MY375...