(STP) configures the network so that the switch selects the most efficient path when multiple paths exist. Also includes the Rapid Spanning Tree Protocol (RSTP), Per‐VLAN Rapid Spanning Tree Plus (PVRST+), and Multiple Spanning Tree Protocol (MSTP) extensions to STP. Chapter 11, “Virtual Link Aggregation Groups,” describes using Virtual Link Aggregation Groups (vLAG) to form LAGs spanning multiple vLAG‐capable aggregator switches. Chapter 12, “Quality of Service,” discusses Quality of Service (QoS) features, including IP filtering using Access Control Lists (ACLs), Differentiated Services, and IEEE 802.1p priority values. Part 4: Advanced Switching Features Chapter 13, “Stacking,” describes how to implement the stacking feature in the Lenovo Flex System Fabric CN4093 10 Gb Converged Scalable Switch. Chapter 14, “Virtualization,” provides an overview of allocating resources based on the logical needs of the data center, rather than on the strict, physical nature of components. Chapter 15, “Virtual NICs,” discusses using virtual NIC (vNIC) technology to divide NICs into multiple logical, independent instances. Chapter 16, “VMready,” discusses virtual machine (VM) support on the CN4093. Chapter 17, “FCoE and CEE,” discusses using various Converged Enhanced Ethernet (CEE) features such as Priority‐based Flow Control (PFC), Enhanced ...
Chapter 34, “Virtual Router Redundancy Protocol,” describes how the CN4093 supports high‐availability network topologies using Virtual Router Redundancy Protocol (VRRP). Part 7: Network Management Chapter 35, “Link Layer Discovery Protocol,” describes how Link Layer Discovery Protocol helps neighboring network devices learn about each others’ ports and capabilities. Chapter 36, “Simple Network Management Protocol,” describes how to configure the switch for management through an SNMP client. Chapter 37, “Service Location Protocol,” describes the Service Location Protocol (SLP) that allows the switch to provide dynamic directory services. Chapter 38, “System License Keys,” describes how to manage Features on Demand (FoD) licenses and how to allocate bandwidth between physical ports within the installed licenses’ limitations. Part 8: Monitoring Chapter 40, “Remote Monitoring,” describes how to configure the RMON agent on the switch, so that the switch can exchange network monitoring data. Chapter 41, “sFLOW, described how to use the embedded sFlow agent for sampling network traffic and providing continuous monitoring information to a central sFlow analyzer. Chapter 42, “Port Mirroring,” discusses tools how copy selected port traffic to a ...
Typographic Conventions The following table describes the typographic styles used in this book. Table 1. Typographic Conventions Typeface or Meaning Example Symbol ABC123 This type is used for names of View the readme.txt file. commands, files, and directories used within the text. Main# It also depicts on‐screen computer output and prompts. ABC123 Main# sys This bold type appears in command examples. It shows text that must be typed in exactly as shown. <ABC123> This italicized type appears in To establish a Telnet session, command examples as a enter: host# telnet <IP address> parameter placeholder. Replace the indicated text with the appropriate real name or value when using the command. Do not type the brackets. This also shows book titles, Read your User’s Guide ...
The Flex System chassis management module tools for general chassis management A built‐in, text‐based command‐line interface and menu system for access via serial‐port connection or an optional Telnet or SSH session The built‐in Browser‐Based Interface (BBI) available using a standard web‐browser SNMP support for access through network management software such as IBM Director. The specific interface chosen for an administrative session depends on user preferences, as well as the switch configuration and the available client tools. In all cases, administration requires that the switch hardware is properly installed and turned on. (see the Lenovo Flex System Fabric CN4093 10 Gb Converged Scalable Switch Installation Guide). Chassis Management Module The CN4093 10 Gb Converged Scalable Switch is an integral subsystem within the overall Lenovo Flex System. The Flex System chassis also includes a chassis management module (CMM) as the central element for overall chassis management and control. Using the tools available through the CMM, the administrator can configure many of the CN4093 features and can also access other CN4093 administration interfaces. For more information, see “Using the Chassis Management Module” on page Industry Standard Command Line Interface The Industry Standard Command Line Interface (ISCLI) provides a simple, direct method for switch administration. Using a basic terminal, you can issue commands that allow you to view detailed information and statistics about the switch, and to perform any necessary configuration and switch software maintenance. You can establish a connection to the CLI in any of the following ways: ...
Out‐of‐band Management Port 1: 192.168.50.50/24 Remote access using the network requires the accessing terminal to have a valid, routable connection to the switch interface. The client IP address may be configured manually, or an IPv4 address can be provided automatically through the switch using a service such as DHCP or BOOTP relay (see “BOOTP/DHCP Client IP Address Services” on page 40), or an IPv6 address can be obtained using IPv6 stateless address configuration. Note: Throughout this manual, IP address is used in places where either an IPv4 or IPv6 address is allowed. IPv4 addresses are entered in dotted‐decimal notation (for example, 10.10.10.1), while IPv6 addresses are entered in hexadecimal notation (for example, 2001:db8:85a3::8a2e:370:7334). In places where only one type of address is allowed, IPv4 address or IPv6 address is specified. Using the Chassis Management Module The CN4093 is an integral subsystem within the overall Lenovo Flex System. The Flex System chassis includes a chassis management module (CMM) as the central element for overall chassis management and control. The CN4093 uses port 43 (MGT1) to communicate with the chassis management module(s). Even when the CN4093 is in a factory default configuration, you can use the 1Gb Ethernet port on each CMM to configure and manage the CN4093. For more information about using the chassis management module, see the Lenovo Flex System Fabric CN4093 10 Gb Converged Scalable Switch Installation Guide. Factory-Default vs. CMM-Assigned IP Addresses Each CN4093 must be assigned its own Internet Protocol version 4 (IPv4) address, which is used for communication with an SNMP network manager or other transmission control protocol/Internet Protocol (TCP/IP) applications (for example, BOOTP or TFTP). The factory‐default IPv4 address is 10.90.90.x, where x is based on the number of the bay into which the CN4093 is installed. For additional information, see the Installation Guide. The chassis management module assigns an IPv4 address of 192.168.70.1xx, where xx is also based on the number of the bay ...
3. Configure a maximum number of 3 failed public key authentication attempts before the system reverts to password‐based authentication: CN 4093(config)# ssh maxauthattempts 3 Once the public key is configured on the switch, the client can use SSH to login from a system where the private key pair is set up: ssh <switch IP address> Using a Web Browser The switch provides a Browser‐Based Interface (BBI) for accessing the common configuration, management and operation features of the CN4093 through your Web browser. You can access the BBI directly from an open Web browser window. Enter the URL using the IP address of the switch interface (for example, http://<IPv4 or IPv6 address>). When you first access the switch, you must enter the default username and password: USERID; PASSW0RD (with a zero). You are required to change the password after first login. Configuring HTTP Access to the BBI By default, BBI access via HTTP is disabled on the switch. To enable or disable HTTP access to the switch BBI, use the following commands: CN 4093(config)# access http enable (Enable HTTP access) ‐or‐ CN 4093(config)# no access http enable (Disable HTTP access) The default HTTP web server port to access the BBI is port 80. However, you can ...
BBI Summary The BBI is organized at a high level as follows: Context buttons—These buttons allow you to select the type of action you wish to perform. The Configuration button provides access to the configuration elements for the entire switch. The Statistics button provides access to the switch statistics and state information. The Dashboard button allows you to display the settings and operating status of a variety of switch features. Navigation Window—This window provides a menu list of switch features and functions: System—this folder provides access to the configuration elements for the entire switch. Switch Ports—Configure each of the physical ports on the switch. Port‐Based Port Mirroring—Configure port mirroring behavior. Layer 2—Configure Layer 2 features for the switch. RMON Menu—Configure Remote Monitoring features for the switch. Layer 3—Configure Layer 3 features for the switch. QoS—Configure Quality of Service features for the switch. Access Control—Configure Access Control Lists to filter IP packets. Virtualization – Configure VMready for virtual machine (VM) support. For information on using the BBI, refer to the Enterprise NOS BBI Quick Guide. CN4093 Application Guide for N/OS 8.4...
BOOTP/DHCP Client IP Address Services For remote switch administration, the client terminal device must have a valid IP address on the same network as a switch interface. The IP address on the client device may be configured manually, or obtained automatically using IPv6 stateless address configuration, or an IPv4 address may obtained automatically via BOOTP or DHCP relay as discussed below. The CN4093 can function as a relay agent for Bootstrap Protocol (BOOTP) or DHCP. This allows clients to be assigned an IPv4 address for a finite lease period, reassigning freed addresses later to other clients. Acting as a relay agent, the switch can forward a client’s IPv4 address request to up to five BOOTP/DHCP servers. In addition to the five global BOOTP/DHCP servers, up to five domain‐specific BOOTP/DHCP servers can be configured for each of up to 10 VLANs. When a switch receives a BOOTP/DHCP request from a client seeking an IPv4 address, the switch acts as a proxy for the client. The request is forwarded as a UDP Unicast MAC layer message to the BOOTP/DHCP servers configured for the client’s VLAN, or to the global BOOTP/DHCP servers if no domain‐specific BOOTP/DHCP servers are configured for the client’s VLAN. The servers respond to the switch with a Unicast reply that contains the IPv4 default gateway and the IPv4 address for the client. The switch then forwards this reply back to the client. DHCP is described in RFC 2131, and the DHCP relay agent supported on the CN4093 is described in RFC 1542. DHCP uses UDP as its transport protocol. The client sends messages to the server on port 67 and the server sends messages to the client on port 68. BOOTP and DHCP relay are collectively configured using the BOOTP commands and menus on the CN4093. Host Name Configuration The CN4093 supports DHCP host name configuration as described in RFC 2132, option 12. DHCP host name configuration is enabled by default. Host name can be manually configured using the following command: CN 4093(config)# hostname <name> If the host name is manually configured, the switch does not replace it with the ...
Easy Connect Wizard Lenovo EasyConnect (EZC) is a feature designed to simplify switch configuration. A set of predefined configurations can be applied on the switch via ISCLI. By launching the EZC Wizard, you are prompted for a minimal set of input and the tool automatically customizes the switch software. The EZC Wizard allows you to choose one of the following configuration modes: Basic System mode supports settings for hostname, static management port IP, netmask, and gateway. Transparent mode collects server and uplink port settings. vNIC groups are used to define the loop free domains. Note: You can either accept the static defaults or enter a different port list for uplink and/or server ports. Redundant mode refers to VLAG settings. The EZC configuration will be applied immediately. Any existing configuration will be deleted, the current active or running configuration will not be merged or appended to the EZC configuration. For any custom settings that are not included in the predefined configuration sets, the user has to do it manually. Notes: EZC is not available in stacking mode. To support scripting, the feature also has a single‐line format. For more information, please refer to Lenovo Networking ISCLI Reference Guide. Note: To support scripting, the feature also has a single‐line format. For more information, please refer to Lenovo Networking ISCLI Reference Guide. Configuring the Easy Connect Wizard To launch the EZC Wizard, use the following command: CN 4093# easyconnect The wizard displays the available predefined configuration modes. You are ...
Transparent Mode Configuration Example This example shows the parameters available for configuration in Transparent mode: CN 4093# # easyconnect Configure Transparent mode (yes/no)? y Select Uplink Ports (Static Defaults: 17-24)? The following Uplink ports will be enabled: Uplink ports(1G/10G): 17-24 Select Server Ports (Static Defaults: 25-64)? The following Server ports will be enabled: Server ports(1G/10G): 25-64 Pending switch configuration:...
Page 46
Notes: If your selection for a port group contains ports of different speed, the selection is not valid, and you are guided to either select other ports or change the speed of the ports. All unused port are configured as shut down in the configuration dump. You can either accept the static defaults or enter a different port list for ISL, uplink, and/or downlink ports. CN4093 Application Guide for N/OS 8.4...
Page 48
Note: Access to each user level (except admin account) can be disabled by setting the password to an empty value. To disable admin account, use the command: CN 4093(config)# no access user administrator-enable. Admin account can be disabled only if there is at least one user account enabled and configured with administrator privilege. CN4093 Application Guide for N/OS 8.4...
Page 50
5. Enter Q to reboot the switch: Boot Management Menu I - Change booting image C - Change configuration block R - Boot in recovery mode (xmodem download of images to recover switch) Q - Reboot E - Exit Please choose your menu option: q Resetting the board.
Boot Strict Mode The implementations specified in this section are compliant with National Institute of Standards and Technology (NIST) Special Publication (SP) 800‐131A. The CN4093 10 Gb Converged Scalable Switch can operate in two boot modes: Compatibility mode (default): This is the default switch boot mode. This mode may use algorithms and key lengths that may not be allowed/acceptable by NIST SP 800‐131A specification. This mode is useful in maintaining compatibility with previous releases and in environments that have lesser data security requirements. Strict mode: Encryption algorithms, protocols, and key lengths in strict mode are compliant with NIST SP 800‐131A specification. When in boot strict mode, the switch uses Secure Sockets Layer (SSL)/Transport Layer Security (TLS) 1.2 protocols to ensure confidentiality of the data to and from the switch. By default, HTTP, Telnet, and SNMPv1 and SNMPv2 are disabled on the CN4093. Before enabling strict mode, ensure the following: The software version on all connected switches is Enterprise NOS 8.4. NIST Strict compliance is enabled on the Chassis Management Module. The supported protocol versions and cryptographic cipher suites between clients and servers are compatible. For example: if using SSH to connect to the switch, ensure that the SSH client supports SSHv2 and a strong cipher suite that is compliant with the NIST standard. Compliant Web server certificate is installed on the switch, if using BBI. A new self‐signed certificate is generated for the switch (CN 4093(config)# access https generate-certificate). The new certificate is generated using 2048‐bit RSA key and SHA‐256 digest. Protocols that are not NIST SP 800‐131A compliant must be disabled or not ...
Page 54
Table 4. Acceptable Protocols and Algorithms Protocol/Function Strict Mode Algorithm Compatibility Mode Algorithm SNMP SNMPv3 only SNMPv1, SNMPv2, SNMPv3 AES-128-CFB-128/SHA1 DES/MD5, AES-128-CFB-128/SHA1 Note: Following algorithms are accept- able if you choose to support old SNMPv3 factory default users: AES-128-CFB/SHA1 DES/MD5 AES-128-CFB-128/SHA1 SSH/SFTP Host Key SSH-RSA SSH-RSA Key Exchange...
Configuring Strict Mode To change the switch mode to boot strict mode, use the following command: CN 4093(config)# [no] boot strict enable When strict mode is enabled, you will see the following message: Warning, security strict mode limits the cryptographic algorithms used by secure protocols on this switch. Please see the documentation for full details, and verify that peer devices support acceptable algorithms before enabling this mode.
Information Needed for Setup Setup requests the following information: Basic system information Date & time Whether to use Spanning Tree Group or not Optional configuration for each port Speed, duplex, flow control, and negotiation mode (as appropriate) Whether to use VLAN tagging or not (as appropriate) Optional configuration for each VLAN Name of VLAN Which ports are included in the VLAN Optional configuration of IP parameters IP address/mask and VLAN for each IP interface IP addresses for default gateway Whether IP forwarding is enabled or not CN4093 Application Guide for N/OS 8.4...
Setup Part 1: Basic System Configuration When Setup is started, the system prompts: "Set Up" will walk you through the configuration of System Date and Time, Spanning Tree, Port Speed/Mode, VLANs, and IP interfaces. [type Ctrl-C to abort "Set Up"] 1. Enter y if you will be configuring VLANs. Otherwise enter n. If you decide not to configure VLANs during this session, you can configure them later using the configuration menus, or by restarting the Setup facility. For more information on configuring VLANs, see the Enterprise NOS Application Guide. Next, the Setup utility prompts you to input basic system information. 2.
Setup Part 2: Port Configuration Note: When configuring port options for your switch, some prompts and options may be different. 1. Select whether you will configure VLANs and VLAN tagging for ports: Port Config: Will you configure VLANs and Tagging/Trunk-mode for ports? [y/n] If you wish to change settings for VLANs, enter y or enter n to skip VLAN configuration. Note: The sample screens that appear in this document might differ slightly from the screens displayed by your system. Screen content varies based on the type of chassis unit that you are using and the firmware versions and options that are installed. 2. Select the port to configure, or skip port configuration at the prompt: If you wish to change settings for individual ports, enter the number of the port you wish to configure. To skip port configuration, press <Enter> without specifying any port and go to “Setup Part 3: VLANs” on page 66. 3. Configure Gigabit Ethernet port flow parameters. The system prompts: Gig Link Configuration: Port Flow Control: Current Port EXT1 flow control setting: both...
Setup Part 3: VLANs If you chose to skip VLANs configuration back in Part 2, skip to “Setup Part 4: IP Configuration” on page 1. Select the VLAN to configure, or skip VLAN configuration at the prompt: VLAN Config: Enter VLAN number from 2 to 4094, NULL at end: If you wish to change settings for individual VLANs, enter the number of the VLAN you wish to configure. To skip VLAN configuration, press <Enter> without typing a VLAN number and go to “Setup Part 4: IP Configuration” on page 2. Enter the new VLAN name at the prompt: Current VLAN name: VLAN 2 Enter new VLAN name: Entering a new VLAN name is optional. To use the pending new VLAN name, press <Enter>. 3. Enter the VLAN port numbers: Define Ports in VLAN: Current VLAN 2: empty Enter ports one per line, NULL at end:...
5. At the prompt, enter y to enable the IP interface or n to leave it disabled: Enable IP interface? [y/n] 6. The system prompts you to configure another interface: Enter interface number: (1-128) Repeat the steps in this section until all IP interfaces have been configured. When all interfaces have been configured, press <Enter> without specifying any interface number. Default Gateways 1. At the prompt, select an IP default gateway for configuration or skip default gateway configuration: IP default gateways: Enter default gateway number: (1-3, 4) Enter the number for the IP default gateway to be configured. To skip default gateway configuration, press <Enter> without typing a gateway number and go to “IP Routing” on page 2. At the prompt, enter the IPv4 address for the selected default gateway: Current IP address: 0.0.0.0 Enter new IP address: Enter the IPv4 address in dotted decimal notation, or press <Enter> without ...
Setup Part 5: Final Steps 1. When prompted, decide whether to restart Setup or continue: Would you like to run from top again? [y/n] Enter y to restart the Setup utility from the beginning or n to continue. 2. When prompted, decide whether you wish to review the configuration changes: Review the changes made? [y/n] Enter y to review the changes made during this session of the Setup utility. Enter n to continue without reviewing the changes. We recommend that you review the changes. 3. Next, decide whether to apply the changes at the prompt: Apply the changes? [y/n] Enter y to apply the changes or n to continue without applying. Changes are normally applied. 4. At the prompt, decide whether to make the changes permanent: Save changes to flash? [y/n] Enter y to save the changes to flash. Enter n to continue without saving the ...
CAUTION: Although the typical upgrade process is all that is necessary in most cases, upgrading from (or reverting to) some versions of Lenovo Enterprise Network Operating System requires special steps prior to or after the software installation process. Please be sure to follow all applicable instructions in the release notes document for the specific software release to ensure that your switch continues to operate as expected after installing new software.
Loading New Software to Your Switch The CN4093 can store up to two different switch software images (called image1 and image2) as well as special boot software (called boot). When you load new software, you must specify where it is placed: either into image1, image2 or boot. For example, if your active image is currently loaded into image1, you would probably load the new image software into image2. This lets you test the new software and reload the original active image (stored in image1), if needed. CAUTION: When you upgrade the switch software image, always load the new boot image and the new software image before you reset the switch. If you do not load a new boot image, your switch might not boot properly (To recover, see “Recover from a Failed Image Upgrade using TFTP” on page 80 or “Recovering from a Failed Image Upgrade using XModem Download” on page 82). To load a new software image to your switch, you will need the following: The image and boot software loaded on an FTP, SFTP or TFTP server on your net‐ work. Note: Be sure to download both the new boot file and the new image file. The hostname or IP address of the FTP, SFTP or TFTP server Note: The DNS parameters must be configured if specifying hostnames. The name of the new software image or boot file When the software requirements are met, use one of the following procedures to download the new software to your switch. You can use the ISCLI or the BBI to download and activate new software. Loading Software via the ISCLI 1.
Updating Software on vLAG Switches When updating the software and boot images for switches configured with vLAG, first: Make sure that the spanning tree root switch is not one of the vLAG switches Shut down of ports should done under the port configuration Follow the shut down order of the ports a. ISL links b. vLAG links c. vLAG health check (MGT port) Then follow this procedure to update the software on vLAG switches: 1. On Switch 2 (the original Secondary switch), shut down all links ISL, vLAG links, and vLAG HC. This is equivalent to powering off Switch 2. All the traffic will failover to Switch 1 (the original Primary switch.). After the shutdown of links on Switch 2, there will be N‐S traffic loss of around ~0.16 seconds. 2. Upgrade Switch 2 with the new image. Use FTP, STFP, or TFTP to copy the new ENOS and boot images onto the switch. For more details, see “Loading New Software to Your Switch” on page After Switch 2 comes up, vLAG HC will be up and vLAG mismatch will happen with vLAG ports down (since it is still Secondary). The traffic will still be forwarding via Switch 1 (the original Primary switch). 3. On Switch 1 (the original Primary switch), shut down all links ISL, vLAG links, and vLAG HC. This is equivalent to powering off Switch 1 (the original Primary switch) ...
The Boot Management Menu The Boot Management menu allows you to switch the software image, reset the switch to factory defaults, or to recover from a failed software download. You can interrupt the boot process and enter the Boot Management menu from the serial console port. When the system displays Memory Test, press <Shift+B>. The Boot Management menu appears. Boot Management Menu I - Change booting image C - Change configuration block R - Boot in recovery mode (tftp and xmodem download of images to recover switch) Q - Reboot E - Exit Please choose your menu option: The Boot Management menu allows you to perform the following actions: ...
Recover from a Failed Image Upgrade using TFTP Use the following procedure to recover from a failed image upgrade using TFTP: 1. Connect a PC to the console port of the switch. 2. Open a terminal emulator program that supports Telnet protocol (for example, HyperTerminal, SecureCRT or PuTTY) and input the proper host name (IP address) and port to connect to the console port of the switch. 3. Boot the switch and access the Boot Management menu by pressing <Shift+B> while the Memory Test is in progress and the dots are being displayed. 4. Enter Boot Recovery Mode by pressing R. The Recovery Mode menu will appear. 5. To start the recovery process using TFTP, press T. The following message will appear: Performing TFTP rescue. Please answer the following questions (enter 'q' to quit): 6. Enter the IP address of the management port: IP addr : 7.
Recovering from a Failed Image Upgrade using XModem Download Use the following procedure to recover from a failed image upgrade. 1. Connect a PC to the serial port of the switch. 2. Open a terminal emulator program that supports Xmodem download (for example, HyperTerminal, SecureCRT or PuTTY) and select the following serial port characteristics: Speed: 9600 bps Data Bits: 8 Stop Bits: 1 Parity: None Flow Control: None 3. Boot the switch and access the Boot Management menu by pressing <Shift+B> while the Memory Test is in progress and the dots are being displayed. 4. Enter Boot Recovery Mode by pressing R. The Recovery Mode menu will appear. 5. Press X for Xmodem download. You will see the following display: Running xmodem rescue..6. When you see the following message, change the Serial Port speed to 115200 bps: Change the baud rate to 115200 bps and hit the <ENTER> key before initiating the download.
Physical Presence Use the following procedure to enable the installation of unofficial images on the switch: 1. Connect a PC to the console port of the switch. 2. Open a terminal emulator program that supports Telnet protocol (for example, HyperTerminal, SecureCRT or PuTTY) and input the proper host name (IP address) and port to connect to the console port of the switch. 3. Boot the switch and access the Boot Management menu by pressing <Shift+B> while the Memory Test is in progress and the dots are being displayed. 4. Enter Boot Recovery Mode by pressing R. The Recovery Mode menu will appear. 5. To begin the Physical Presence procedure, press P. The following warning message will appear: WARNING: the following test is used to determine physical presence and if completed will put the switch in low security mode. 6. You will be prompted for confirmation: Do you wish to continue y/n? 7.
Changing the Switch Passwords It is recommended that you change the administrator and user passwords after initial configuration and as regularly as required under your network security policies. To change the administrator password, you must login using the administrator password. Note: If you download user and password information to a switch running a version of ENOS earlier than 8.4, or if you revert the switch to a version of ENOS earlier than 8.4, your passwords will not be transferred because the encryption algorithm changed. Changing the Default Administrator Password The administrator has complete access to all menus, information, and configuration commands, including the ability to change both the user and administrator passwords. The default administrator account is USERID. The default password for the administrator account is PASSW0RD (with a zero). To change the administrator password, use the following procedure: 1. Connect to the switch and log in as the administrator. 2. Use the following command to change the administrator password: CN 4093(config)# access user administrator-password <password> Changing the Default User Password The user login has limited control of the switch. Through a user account, you can ...
Configuring SSH/SCP Features on the Switch SSH and SCP are disabled by default. To change the setting, using the following procedures. Note: To use SCP, you must first enable SSH. To Enable or Disable the SSH Feature Begin a Telnet session from the console port and enter the following commands: CN 4093(config)# ssh enable (Turn SSH on) CN 4093(config)# no ssh enable (Turn SSH off) To Enable or Disable SCP Enter the following command to enable or disable SCP: CN 4093(config)# [no] ssh scp-enable Configuring the SCP Administrator Password To configure the SCP‐only administrator password, enter the following command ...
To Copy the Switch Image and Boot Files to the SCP Host Syntax: >> scp [-4|-6] <username>@<switch IP address>:getimg1 <local filename> >> scp [-4|-6] <username>@<switch IP address>:getimg2 <local filename> >> scp [-4|-6] <username>@<switch IP address>:getboot <local filename> Example: >> scp scpadmin@205.178.15.157:getimg1 6.1.0_os.img To Load Switch Configuration Files from the SCP Host Syntax: >>...
End User Access Control Enterprise NOS allows an administrator to define end user accounts that permit end users to perform operation tasks via the switch CLI commands. Once end user accounts are configured and enabled, the switch requires username/password authentication. For example, an administrator can assign a user, who can then log into the switch and perform operational commands (effective only until the next switch reboot). Considerations for Configuring End User Accounts A maximum of 20 user IDs are supported on the switch. Enterprise NOS supports end user support for Console, Telnet, BBI, and SSHv1/v2 access to the switch. If RADIUS authentication is used, the user password on the Radius server will override the user password on the CN4093. Also note that the password change command modifies only the user switch password on the switch and has no effect on the user password on the Radius server. Radius authentication and user password cannot be used concurrently to access the switch. Passwords can be up to 64 characters in length for Telnet, SSH, Console, and Web access. Strong Passwords The administrator can require use of Strong Passwords for users to access the CN4093. Strong Passwords enhance security because they make password guessing more difficult. The following rules apply when Strong Passwords are enabled: Minimum length: 8 characters; maximum length: 64 characters Must contain at least one uppercase alphabet Must contain at least one lowercase alphabet ...
Re-enabling Locked Accounts The administrator can re‐enable a locked account by reloading the switch or by using the following command: CN 4093(config)# access user strong-password clear local user lockout username <user name> However, the above command cannot be used to re‐enable an account disabled by the administrator. To re‐enable all locked accounts, use the following command: CN 4093(config)# access user strong-password clear local user lockout all Listing Current Users The show access user command displays defined user accounts and whether or not each user is currently logged into the switch. CN 4093# show access user Usernames: user - Enabled - offline...
RADIUS Authentication and Authorization Enterprise NOS supports the RADIUS (Remote Authentication Dial‐in User Service) method to authenticate and authorize remote administrators for managing the switch. This method is based on a client/server model. The Remote Access Server (RAS)—the switch—is a client to the back‐end database server. A remote user (the remote administrator) interacts only with the RAS, not the back‐end server and database. RADIUS authentication consists of the following components: A protocol with a frame format that utilizes UDP over IP (based on RFC 2138 and 2866) A centralized server that stores all the user authorization information A client, in this case, the switch The CN4093—acting as the RADIUS client—communicates to the RADIUS server to authenticate and authorize a remote administrator using the protocol definitions specified in RFC 2138 and 2866. Transactions between the client and the RADIUS server are authenticated using a shared key that is not sent over the network. In addition, the remote administrator passwords are sent encrypted between the RADIUS client (the switch) and the back‐end RADIUS server. How RADIUS Authentication Works 1. Remote administrator connects to the switch and provides user name and password. 2. Using Authentication/Authorization protocol, the switch sends request to authentication server. 3. Authentication server checks the request against the user ID database. 4. Using RADIUS protocol, the authentication server instructs the switch to grant or deny administrative access. CN4093 Application Guide for N/OS 8.4...
Supports user‐configurable RADIUS server retry and time‐out values: Time‐out value = 1‐10 seconds Retries = 1‐3 The switch will time out if it does not receive a response from the RADIUS server within 1‐10 seconds. The switch automatically retries connecting to the RADIUS server 1‐3 times before it declares the server down. Supports user‐configurable RADIUS application port. The default is UDP port 1645. UDP port 1812, based on RFC 2138, is also supported. Allows network administrator to define privileges for one or more specific users to access the switch at the RADIUS user database. Switch User Accounts The user accounts listed in Table 7 can be defined in the RADIUS server dictionary file. Table 7. User Access Levels User Account Description and Tasks Performed Password user User The User has no direct responsibility for switch management. He/she can view all switch status information and statistics but cannot make any configuration changes to the switch. oper Operator In addition to User capabilities, the Operator has ...
TACACS+ Authentication Enterprise NOS supports authentication, authorization, and accounting with networks using the Cisco Systems TACACS+ protocol. The CN4093 functions as the Network Access Server (NAS) by interacting with the remote client and initiating authentication and authorization sessions with the TACACS+ access server. The remote user is defined as someone requiring management access to the CN4093 either through a data or management port. TACACS+ offers the following advantages over RADIUS: TACACS+ uses TCP‐based connection‐oriented transport; whereas RADIUS is UDP‐based. TCP offers a connection‐oriented transport, while UDP offers best‐effort delivery. RADIUS requires additional programmable variables such as re‐transmit attempts and time‐outs to compensate for best‐effort transport, but it lacks the level of built‐in support that a TCP transport offers. TACACS+ offers full packet encryption whereas RADIUS offers password‐only encryption in authentication requests. TACACS+ separates authentication, authorization and accounting. How TACACS+ Authentication Works TACACS+ works much in the same way as RADIUS authentication as described on page 100. 1. Remote administrator connects to the switch and provides user name and password. 2. Using Authentication/Authorization protocol, the switch sends request to authentication server. 3. Authentication server checks the request against the user ID database. 4. Using TACACS+ protocol, the authentication server instructs the switch to grant or deny administrative access. During a session, if additional authorization checking is needed, the switch checks with a TACACS+ server to determine if the user is granted permission to use a particular command.f CN4093 Application Guide for N/OS 8.4...
Backdoor The administrator has an option to allow backdoor access via Telnet using the command: CN 4093(config)# tacacs-server backdoor The default value for Telnet access is disabled. The administrator also can enable secure backdoor to allow access if both the primary and the secondary TACACS+ servers fail to respond. The command for this is: CN 4093(config)# tacacs-server secure-backdoor Note: To obtain the TACACS+ backdoor password for your switch, contact your Service and Support line. Accounting Accounting is the action of recording a userʹs activities on the device for the purposes of billing and/or security. It follows the authentication and authorization actions. If the authentication and authorization is not performed via TACACS+, there are no TACACS+ accounting messages sent out. You can use TACACS+ to record and track software login access, configuration changes, and interactive commands. The CN4093 supports the following TACACS+ accounting attributes: protocol (console/telnet/ssh/http) start_time stop_time elapsed_time disc‐cause Note: When using the Browser‐Based Interface, the TACACS+ Accounting Stop records are sent only if the Quit button on the browser is clicked. CN4093 Application Guide for N/OS 8.4...
Page 108
Authorization is performed on each leaf‐level command separately. If the user issues multiple commands at once, each command is sent separately as a full path. Only the following global commands are sent for authorization and logging: diff ping revert telnet traceroute CN4093 Application Guide for N/OS 8.4...
LDAP Authentication and Authorization Enterprise NOS supports the LDAP (Lightweight Directory Access Protocol) method to authenticate and authorize remote administrators to manage the switch. LDAP is based on a client/server model. The switch acts as a client to the LDAP server. A remote user (the remote administrator) interacts only with the switch, not the back‐end server and database. LDAP authentication consists of the following components: A protocol with a frame format that utilizes TCP over IP A centralized server that stores all the user authorization information A client, in this case, the switch Each entry in the LDAP server is referenced by its Distinguished Name (DN). The DN consists of the user‐account name concatenated with the LDAP domain name. If the user‐account name is John, the following is an example DN: uid=John,ou=people,dc=domain,dc=com Configuring the LDAP Server CN4093 user groups and user accounts must reside within the same domain. On the LDAP server, configure the domain to include CN4093 user groups and user accounts, as follows: User Accounts: Use the uid attribute to define each individual user account. User Groups: Use the members attribute in the groupOfNames object class to create the user groups. The first word of the common name for each user group must be equal to the user group names defined in the CN4093, as follows: admin (USERID) oper user ...
Extensible Authentication Protocol over LAN Enterprise NOS can provide user‐level security for its ports using the IEEE 802.1X protocol, which is a more secure alternative to other methods of port‐based network access control. Any device attached to an 802.1X‐enabled port that fails authentication is prevented access to the network and denied services offered through that port. The 802.1X standard describes port‐based network access control using Extensible Authentication Protocol over LAN (EAPoL). EAPoL provides a means of authenticating and authorizing devices attached to a LAN port that has point‐to‐point connection characteristics and of preventing access to that port in cases of authentication and authorization failures. EAPoL is a client‐server protocol that has the following components: Supplicant or Client The Supplicant is a device that requests network access and provides the required credentials (user name and password) to the Authenticator and the Authenticator Server. Authenticator The Authenticator enforces authentication and controls access to the network. The Authenticator grants network access based on the information provided by the Supplicant and the response from the Authentication Server. The Authenticator acts as an intermediary between the Supplicant and the Authentication Server: requesting identity information from the client, forwarding that information to the Authentication Server for validation, relaying the server’s responses to the client, and authorizing network access based on the results of the authentication exchange. The CN4093 acts as an Authenticator. Authentication Server The Authentication Server validates the credentials provided by the Supplicant to determine if the Authenticator should grant access to the network. The Authentication Server may be co‐located with the Authenticator. The CN4093 relies on external RADIUS servers for authentication. Upon a successful authentication of the client by the server, the 802.1X‐controlled port transitions from unauthorized to authorized state, and the client is allowed full access to services through the port. When the client sends an EAP‐Logoff ...
EAPoL Message Exchange During authentication, EAPOL messages are exchanged between the client and the CN4093 authenticator, while RADIUS‐EAP messages are exchanged between the CN4093 authenticator and the RADIUS server. Authentication is initiated by one of the following methods: The CN4093 authenticator sends an EAP‐Request/Identity packet to the client The client sends an EAPOL‐Start frame to the CN4093 authenticator, which responds with an EAP‐Request/Identity frame. The client confirms its identity by sending an EAP‐Response/Identity frame to the CN4093 authenticator, which forwards the frame encapsulated in a RADIUS packet to the server. The RADIUS authentication server chooses an EAP‐supported authentication algorithm to verify the client’s identity, and sends an EAP‐Request packet to the client via the CN4093 authenticator. The client then replies to the RADIUS server with an EAP‐Response containing its credentials. Upon a successful authentication of the client by the server, the 802.1X‐controlled port transitions from unauthorized to authorized state, and the client is allowed full access to services through the controlled port. When the client later sends an EAPOL‐Logoff message to the CN4093 authenticator, the port transitions from authorized to unauthorized state. If a client that does not support 802.1X connects to an 802.1X‐controlled port, the CN4093 authenticator requests the clientʹs identity when it detects a change in the operational state of the port. The client does not respond to the request, and the port remains in the unauthorized state. Note: When an 802.1X‐enabled client connects to a port that is not 802.1X‐controlled, the client initiates the authentication process by sending an EAPOL‐Start frame. When no response is received, the client retransmits the request for a fixed number of times. If no response is received, the client assumes the port is in authorized state, and begins sending frames, even if the port is unauthorized. EAPoL Port States The state of the port determines whether the client is granted access to the network, as follows: ...
Supported RADIUS Attributes The 802.1X Authenticator relies on external RADIUS servers for authentication with EAP. Table 11lists the RADIUS attributes that are supported as part of RADIUS‐EAP authentication based on the guidelines specified in Annex D of the 802.1X standard and RFC 3580. Table 11. Support for RADIUS Attributes # Attribute Attribute Value 1 User‐Name The value of the Type‐Data field 0‐1 from the supplicant’s EAP‐Response/Identity message. If the Identity is unknown (i.e. Type‐Data field is zero bytes in length), this attribute will have the same value as the Calling‐Station‐Id. 4 NAS‐IP‐Address IPv4 address of the authenticator used for Radius communication. 5 NAS‐Port Port number of the authenticator port to which the supplicant is attached. 24 State Server‐specific value. This is 0‐1 0‐1 0‐1 sent unmodified back to the ...
EAPoL Configuration Guidelines When configuring EAPoL, consider the following guidelines: The 802.1X port‐based authentication is currently supported only in point‐to‐point configurations, that is, with a single supplicant connected to an 802.1X‐enabled switch port. When 802.1X is enabled, a port has to be in the authorized state before any other Layer 2 feature can be operationally enabled. For example, the STG state of a port is operationally disabled while the port is in the unauthorized state. The 802.1X supplicant capability is not supported. Therefore, none of its ports can successfully connect to an 802.1X‐enabled port of another device, such as another switch, that acts as an authenticator, unless access control on the remote port is disabled or is configured in forced‐authorized mode. For example, if a CN4093 is connected to another CN4093, and if 802.1X is enabled on both switches, the two connected ports must be configured in force‐authorized mode. Unsupported 802.1X attributes include Service‐Type, Session‐Timeout, and Termination‐Action. RADIUS accounting service for 802.1X‐authenticated devices or users is not currently supported. Configuration changes performed using SNMP and the standard 802.1X MIB will take effect immediately. CN4093 Application Guide for N/OS 8.4...
Summary of Packet Classifiers ACLs allow you to classify packets according to a variety of content in the packet header (such as the source address, destination address, source port number, destination port number, and others). Once classified, packet flows can be identified for more processing. Regular ACLs, and VMaps allow you to classify packets based on the following packet attributes: Ethernet header options (for regular ACLs and VMaps only) Source MAC address Destination MAC address VLAN number and mask Ethernet type (ARP, IPv4, MPLS, RARP, etc.) Ethernet Priority (the IEEE 802.1p Priority) IPv4 header options (for regular ACLs and VMaps only) Source IPv4 address and subnet mask Destination IPv4 address and subnet mask Type of Service value IP protocol number or name as shown in Table Table 12. Well‐Known Protocol Types Number Protocol Name icmp igmp ospf vrrp CN4093 Application Guide for N/OS 8.4...
Summary of ACL Actions Once classified using ACLs, the identified packet flows can be processed differently. For each ACL, an action can be assigned. The action determines how the switch treats packets that match the classifiers assigned to the ACL. CN4093 ACL actions include the following: Pass or Drop the packet Re‐mark the packet with a new DiffServ Code Point (DSCP) Re‐mark the 802.1p field Set the COS queue Assigning Individual ACLs to a Port Once you configure an ACL, you must assign the ACL to the appropriate ports. Each port can accept multiple ACLs, and each ACL can be applied for multiple ports. ACLs can be assigned individually, or in groups. To assign an individual ACL to a port, use the following IP interface commands: CN 4093(config)# interface port <port> CN 4093(config-if)# access-control list <IPv4 ACL number> CN 4093(config-ip)# access-control list6 <IPv6 ACL number> When multiple ACLs are assigned to a port, higher‐priority ACLs are considered ...
ACL Metering and Re-Marking You can define a profile for the aggregate traffic flowing through the switch by configuring a QoS meter (if desired) and assigning ACLs to ports. Note: When you add ACLs to a port, make sure they are ordered correctly in terms of precedence (see “ACL Order of Precedence” on page 124). Actions taken by an ACL are called In‐Profile actions. You can configure additional In‐Profile and Out‐of‐Profile actions on a port. Data traffic can be metered, and re‐marked to ensure that the traffic flow provides certain levels of service in terms of bandwidth for different types of network traffic. Metering QoS metering provides different levels of service to data streams through user‐configurable parameters. A meter is used to measure the traffic stream against a traffic profile which you create. Thus, creating meters yields In‐Profile and Out‐of‐Profile traffic for each ACL, as follows: In‐Profile–If there is no meter configured or if the packet conforms to the meter, the packet is classified as In‐Profile. Out‐of‐Profile–If a meter is configured and the packet does not conform to the meter (exceeds the committed rate or maximum burst rate of the meter), the packet is classified as Out‐of‐Profile. Using meters, you set a Committed Rate in Kbps (1000 bits per second in each Kbps). All traffic within this Committed Rate is In‐Profile. Additionally, you can set a Maximum Burst Size that specifies an allowed data burst larger than the Committed Rate for a brief period. These parameters define the In‐Profile traffic. Meters keep the sorted packets within certain parameters. You can configure a meter on an ACL, and perform actions on metered traffic, such as packet re‐marking. Re-Marking Re‐marking allows for the treatment of packets to be reset based on new network specifications or desired levels of service. You can configure the ACL to re‐mark a packet as follows: Change the DSCP value of a packet, used to specify the service level that traffic should receive. ...
ACL Logging ACLs are generally used to enhance port security. Traffic that matches the characteristics (source addresses, destination addresses, packet type, etc.) specified by the ACLs on specific ports is subject to the actions (chiefly permit or deny) defined by those ACLs. Although switch statistics show the number of times particular ACLs are matched, the ACL logging feature can provide additional insight into actual traffic patterns on the switch, providing packet details in the system log for network debugging or security purposes. Enabling ACL Logging By default, ACL logging is disabled. Enable or disable ACL logging on a per‐ACL basis as follows: CN 4093(config)# [no] access-control list <IPv4 ACL number> log CN 4093(config)# [no] access-control list6 <IPv6 ACL number> log Logged Information When ACL logging is enabled on any particular ACL, the switch will collect information about packets that match the ACL. The information collected depends on the ACL type: For IP‐based ACLs, information is collected regarding Source IP address Destination IP address TCP/UDP port number ...
ACL Configuration Examples ACL Example 1 Use this configuration to block traffic to a specific host. All traffic that ingresses on port EXT1 is denied if it is destined for the host at IP address 100.10.1.1. 1. Configure an Access Control List. CN 4093(config)# access-control list 1 ipv4 destination-ip-address 100.10.1.1 CN 4093(config)# access-control list 1 action deny 2. Add ACL 1 to port EXT1. CN 4093(config)# interface port EXT1 CN 4093(config-if)# access-control list 1 CN 4093(config-if)# exit ACL Example 2 Use this configuration to block traffic from a network destined for a specific host ...
VLAN Maps A VLAN map (VMAP) is an ACL that can be assigned to a VLAN or VM group rather than to a switch port as with regular ACLs. This is particularly useful in a virtualized environment where traffic filtering and metering policies must follow virtual machines (VMs) as they migrate between hypervisors. VMAPs are configured using the following ISCLI command path: CN 4093(config)# access-control vmap <VMAP ID (1‐128)> action Set filter action egress-port Set to filter for packets egressing this port ethernet Ethernet header options ipv4 IP version 4 header options meter ACL metering configuration mirror Mirror options packet-format Set to filter specific packet format types...
Management ACLs Management ACLs (MACLs) filter inbound traffic (traffic heading toward the CPU). MACLs are applied switch‐wide. Traffic can be filtered based on the following: IPv4 source address IPv4 destination address IPv4 protocols TCP/UDP destination or source port Lower MACL numbers have higher priority. Up to 128 MACLs can be configured. Following is an example MACL configuration based on a destination IP address and a TCP‐UDP destination port: CN 4093(config)# access-control macl 1 ipv4 destination-ip-address 1.1.1.1 255.255.255.0 CN 4093(config)# access-control macl 1 tcp-udp destination-port 111 0xffff CN 4093(config)# access-control macl 1 statistics CN 4093(config)# access-control macl 1 action permit CN 4093(config)# access-control macl 1 enable Use the following command to view the MACL configuration: ...
VLANs Overview Setting up virtual LANs (VLANs) is a way to segment networks to increase network flexibility without changing the physical network topology. With network segmentation, each switch port connects to a segment that is a single broadcast domain. When a switch port is configured to be a member of a VLAN, it is added to a group of ports (workgroup) that belong to one broadcast domain. Ports are grouped into broadcast domains by assigning them to the same VLAN. Frames received in one VLAN can only be forwarded within that VLAN, and multicast, broadcast, and unknown unicast frames are flooded only to ports in the same VLAN. The CN4093 automatically supports jumbo frames. This default cannot be manually configured or disabled. The CN4093 10 Gb Converged Scalable Switch (CN4093) supports jumbo frames with a Maximum Transmission Unit (MTU) of 9,216 bytes. Within each frame, 18 bytes are reserved for the Ethernet header and CRC trailer. The remaining space in the frame (up to 9,198 bytes) comprise the packet, which includes the payload of up to 9,000 bytes and any additional overhead, such as 802.1q or VLAN tags. Jumbo frame support is automatic: it is enabled by default, requires no manual configuration, and cannot be manually disabled. Note: Jumbo frames are not supported for traffic sent to switch management interfaces. CN4093 Application Guide for N/OS 8.4...
PVID/Native VLAN Numbers Each port in the switch has a configurable default VLAN number, known as its PVID. By default, the PVID for all non‐management ports is set to 1, which correlates to the default VLAN ID. The PVID for each port can be configured to any VLAN number between 1 and 4094. Use the following CLI commands to view PVIDs: Port information: CN 4093# show interface information (or) CN 4093# show interface trunk Alias Port Tag Type RMON Lrn Fld PVID DESCRIPTION VLAN(s) NVLAN ------- ---- --- ---------- ---- --- --- ------ -------------- ------ INTA1 Internal 4094...
VLAN Tagging/Trunk Mode Enterprise NOS software supports 802.1Q VLAN tagging, providing standards‐based VLAN support for Ethernet systems. Tagging places the VLAN identifier in the frame header of a packet, allowing each port to belong to multiple VLANs. When you add a port to multiple VLANs, you also must enable tagging on that port. Since tagging fundamentally changes the format of frames transmitted on a tagged port, you must carefully plan network designs to prevent tagged frames from being transmitted to devices that do not support 802.1Q VLAN tags, or devices where tagging is not enabled. Important terms used with the 802.1Q tagging feature are: VLAN identifier (VID)—the 12‐bit portion of the VLAN tag in the frame header that identifies an explicit VLAN. Port VLAN identifier (PVID)—a classification mechanism that associates a port with a specific VLAN. For example, a port with a PVID of 3 (PVID =3) assigns all untagged frames received on this port to VLAN 3. Any untagged frames received by the switch are classified with the PVID of the receiving port. Tagged frame—a frame that carries VLAN tagging information in the header. This VLAN tagging information is a 32‐bit field (VLAN tag) in the frame header that identifies the frame as belonging to a specific VLAN. Untagged frames are marked (tagged) with this classification as they leave the switch through a port that is configured as a tagged port. Untagged frame— a frame that does not carry any VLAN tagging information in the frame header. Untagged member—a port that has been configured as an untagged member of a specific VLAN. When an untagged frame exits the switch through an untagged member port, the frame header remains unchanged. When a tagged frame exits the switch through an untagged member port, the tag is stripped and the tagged frame is changed to an untagged frame. Tagged member—a port that has been configured as a tagged member of a specific VLAN. When an untagged frame exits the switch through a tagged member port, the frame header is modified to include the 32‐bit tag associated with the PVID. When a tagged frame exits the switch through a tagged member ...
Page 144
As shown in Figure 4, the untagged packet is marked (tagged) as it leaves the switch through port 5, which is configured as a tagged member of VLAN 2. The untagged packet remains unchanged as it leaves the switch through port 7, which is configured as an untagged member of VLAN 2. Figure 4. 802.1Q tagging (after port‐based VLAN assignment) Tagged member PVID = 2 Port 1 Port 2 Port 3 of VLAN 2 802.1Q Switch CRC* Data (*Recalculated) Port 6 Port 7 Port 8 8100 Priority VID = 2 Untagged memeber of VLAN 2 16 bits 3 bits...
Ingress VLAN Tagging Tagging can be enabled on an ingress port. When a packet is received on an ingress port, and if ingress tagging is enabled on the port, a VLAN tag with the port PVID is inserted into the packet as the outer VLAN tag. Depending on the egress port setting (tagged or untagged), the outer tag of the packet is retained or removed when it leaves the egress port. Ingress VLAN tagging is used to tunnel packets through a public domain without altering the original 802.1Q status. When ingress tagging is enabled on a port, all packets, whether untagged or tagged, will be tagged again. As shown in Figure 7, when tagging is enabled on the egress port, the outer tag of the packet is retained when it leaves the egress port. If tagging is disabled on the egress port, the outer tag of the packet is removed when it leaves the egress port. Figure 7. 802.1Q tagging (after ingress tagging assignment) Untagged packet received on ingress port 802.1Q Switch Port 1 Port 2 Port 3 Tagged member PVID = 2 of VLAN 2 Untagged packet CRC* Data...
Protocol-Based VLANs Protocol‐based VLANs (PVLANs) allow you to segment network traffic according to the network protocols in use. Traffic for supported network protocols can be confined to a particular port‐based VLAN. You can give different priority levels to traffic generated by different network protocols. With PVLAN, the switch classifies incoming packets by Ethernet protocol of the packets, not by the configuration of the ingress port. When an untagged or priority‐tagged frame arrives at an ingress port, the protocol information carried in the frame is used to determine a VLAN to which the frame belongs. If a frame’s protocol is not recognized as a pre‐defined PVLAN type, the ingress port’s PVID is assigned to the frame. When a tagged frame arrives, the VLAN ID in the frame’s tag is used. Each VLAN can contain up to eight different PVLANs. You can configure separate PVLANs on different VLANs, with each PVLAN segmenting traffic for the same protocol type. For example, you can configure PVLAN 1 on VLAN 2 to segment IPv4 traffic, and PVLAN 8 on VLAN 100 to segment IPv4 traffic. To define a PVLAN on a VLAN, configure a PVLAN number (1‐8) and specify the frame type and the Ethernet type of the PVLAN protocol. You must assign at least one port to the PVLAN before it can function. Define the PVLAN frame type and Ethernet type as follows: Frame type—consists of one of the following values: Ether2 (Ethernet II) SNAP (Subnetwork Access Protocol) LLC (Logical Link Control) Ethernet type—consists of a 4‐digit (16 bit) hex value that defines the Ethernet type. You can use common Ethernet protocol values, or define your own values. Following are examples of common Ethernet protocol values: IPv4 = 0800 IPv6 = 86dd ARP = 0806 Port-Based vs. Protocol-Based VLANs Each VLAN supports both port‐based and protocol‐based association, as follows: ...
Configuring PVLAN Follow this procedure to configure a Protocol‐based VLAN (PVLAN). 1. Configure VLAN tagging/trunk mode for ports. CN 4093(config)# interface port 1,2 CN 4093(config-if)# switchport mode trunk CN 4093(config-if)# exit 2. Create a VLAN and define the protocol type(s) supported by the VLAN. CN 4093(config)# vlan 2 CN 4093(config-vlan)# protocol-vlan 1 frame-type ether2 0800 3. Configure the priority value for the protocol. CN 4093(config-vlan)# protocol-vlan 1 priority 2 4. Add member ports for this PVLAN. CN 4093(config-vlan)# protocol-vlan 1 member 1,2 Note: If VLAN tagging is turned on and the port being added to the VLAN has a ...
Configuration Guidelines The following guidelines apply when configuring Private VLANs: Management VLANs cannot be Private VLANs. Management ports cannot be members of a Private VLAN. The default VLAN 1 cannot be a Private VLAN. IGMP Snooping must be disabled on Private VLANs. All VLANs that comprise the Private VLAN must belong to the same Spanning Tree Group. A VLAN pair is a primary VLAN and one associated secondary VLAN (isolated or community). The maximum number of VLAN pairs per port is 16. Configuration Example Follow this procedure to configure a Private VLAN. 1. Select a VLAN and define the Private VLAN type as primary. CN 4093(config)# vlan 700 CN 4093(config-vlan)# private-vlan primary CN 4093(config-vlan)# exit 2. Configure a promiscuous port for VLAN 700. CN 4093(config)# interface port 1 CN 4093(config-if)# switchport mode private-vlan CN 4093(config-if)# switchport private-vlan mapping 700 CN 4093(config-if)# exit 3.
Configuring Port Modes The switch allows you to set the port mode. Select the port mode that fits your network configuration. Switch port modes are available based on the installation license. The following port modes are available: Base Port mode: Fourteen 10Gb internal (1 port x 14 blade servers) Eight 10Gb external Upgrade 1 Port mode: Twenty Eight 10Gb internal (2 ports x 14 blade servers) Eight 10Gb external Two 40Gb external Upgrade 2 Port mode: Forty Two 10Gb internal (3 ports x 14 Blade servers) Fourteen 10Gb external Two 40Gb external Base Port mode is the default. To upgrade the port mode, you must obtain a software license key. The following command sequence is an example of how to upgrade the port mode (e.g. switch SN Y010CM2CN058): CN 4093# software-key Enter hostname or IP address of SFTP/TFTP server: 9.44.143.105 Enter name of file on SFTP/TFTP server: ibm_fod_0019_Y010CM2CN058_anyos_noarch.key...
Configuring QSFP+ Ports QSFP+ ports support both 10GbE and 40GbE, as shown in Table 15. Table 15. QSFP+ Port Numbering Physical Port Number 40GbE mode 10GbE mode Port EXT3 Port EXT3 Ports EXT3‐EXT6 Port EXT7 Port EXT7 Ports EXT7‐EXT10 QSFP+ ports are available only when Upgrade 1 is installed (see “Configuring Port Modes” on page 158). The following procedure allows you to change the QSFP+ port mode. 1. Display the current port mode for the QSFP+ ports. CN 4093# show boot qsfp-port-modes QSFP ports booted configuration: Port EXT3, EXT4, EXT5, EXT6 - 10G Mode Port EXT7, EXT8, EXT9, EXT10 - 10G Mode QSFP ports saved configuration: Port EXT3, EXT4, EXT5, EXT6 - 10G Mode...
Static LAGs When you create and enable a static LAG, the LAG members (switch ports) take on certain settings necessary for correct operation of the aggregation feature. Before Configuring Static LAGs Before you configure your LAG, you must consider these settings, along with specific configuration rules, as follows: Read the configuration rules provided in the section, “Static LAG Configuration Rules” on page 162.” Determine which switch ports are to become LAG members (the specific ports making up the LAG). Ensure that the chosen switch ports are set to enabled. Ensure all member ports in a LAG have the same VLAN configuration. Consider how the existing Spanning Tree will react to the new LAG configuration. See “Spanning Tree Protocols” on page 171 for configuration guidelines. Consider how existing VLANs will be affected by the addition of a LAG. Static LAG Configuration Rules The aggregation feature operates according to specific configuration rules. When creating LAGs, consider the following rules that determine how a LAG reacts in any network topology: All LAGs must originate from one network entity (a single device or multiple devices acting in a stack) and lead to one destination entity. For example, you cannot combine links from two different servers into one LAG. Any physical switch port can belong to only one LAG.
Page 164
1. Connect the switch ports that will be members in the LAG. 2. Configure the LAG using these steps on the CN4093: a. Define a LAG. CN 4093(config)# portchannel 1 port ext1,ext2,ext3 (Add ports to LAG 1) CN 4093(config)# portchannel 1 enable b. Verify the configuration. CN 4093(config)# show portchannel information Examine the resulting information. If any settings are incorrect, make appropriate changes. 3. Repeat the process on the other switch. CN 4093(config)# portchannel 3 port 2,12,22 CN 4093(config)# portchannel 3 enable LAG 1 (on the CN4093) is now connected to LAG 3 on the Application Switch.
Page 166
Layer 3 traffic will then use Layer 2 options for hashing. Ingress port number (disabled by default) CN 4093(config)# portchannel thash ingress Layer 4 port information (disabled by default) CN 4093(config)# portchannel thash l4port When enabled, Layer 4 port information (TCP, UPD, etc.) is added to the hash if available. The L4port option is ignored when Layer 4 information is not included in the packet (such as for Layer 2 packets) or when the useL2 option is enabled. Note: For MPLS packets, Layer 4 port information is excluded from the hash calculation. Instead, other IP fields are used, along with the first two MPLS labels. The CN4093 supports the following FCoE hashing options: CN 4093(config)# portchannel thash fcoe cntag-id CN 4093(config)# portchannel thash fcoe destination-id CN 4093(config)# portchannel thash fcoe fabric-id CN 4093(config)# portchannel thash fcoe originator-id CN 4093(config)# portchannel thash fcoe responder-id CN 4093(config)# portchannel thash fcoe source-id...
To avoid the Actor switch ports (with the same admin key) from aggregating in another LAG, you can configure a LAG ID. Ports with the same admin key (although with different LAG IDs) compete to get aggregated in a LAG. The LAG ID for the LAG is decided based on the first port that is aggregated in the LAG. Ports with this LAG ID get aggregated and the other ports are placed in suspended mode. As per the configuration shown in Table 16, if port 38 gets aggregated first, then the LAG ID of port 38 would be the LAG ID of the LAG. Port 40 would be placed in suspended mode. When in suspended mode, a port transmits only LACP data units (LACPDUs) and discards all other traffic. A port may also be placed in suspended mode for the following reasons: When LACP is configured on the port but it stops receiving LACPDUs from the partner switch. When the port has a different LAG ID because of the partner switch MAC being different. For example: when a switch is connected to two partners. LAG ID can be configured using the following command: CN 4093(config)# portchannel <65‐128> lacp key <adminkey of the LAG> LACP provides for the controlled addition and removal of physical links for the link aggregation. LACP Modes Each port in the CN4093 can have one of the following LACP modes. off (default) The user can configure this port in to a regular static LAG. active The port is capable of forming a LACP LAG. This port sends LACPDU packets to partner system ports. passive The port is capable of forming a LACP LAG. This port only responds to the LACPDU packets sent from a LACP active port.
Configuring LACP Use the following procedure to configure LACP for ports 7, 8 and 9 to participate in a single link aggregation. 1. Configure port parameters. All ports that participate in the LACP LAG must have the same settings, including VLAN membership. 2. Select the port range and define the admin key. Only ports with the same admin key can form a LACP LAG. CN 4093(config)# interface port 7-9 CN 4093(config-if)# lacp key 100 3. Set the LACP mode. CN 4093(config-if)# lacp mode active CN 4093(config-if)# exit 4. Optionally allow member ports to individually participate in normal data traffic if no LACPDUs are received. CN 4093(config-if)# no lacp suspend-individual CN 4093(config-if)# exit 5.
Spanning Tree Protocol Modes Enterprise NOS 8.4 supports the following STP modes: Rapid Spanning Tree Protocol (RSTP) IEEE 802.1D (2004) RSTP allows devices to detect and eliminate logical loops in a bridged or switched network. When multiple paths exist, STP configures the network so that only the most efficient path is used. If that path fails, STP automatically configures the best alternative active path on the network in order to sustain network operations. RSTP is an enhanced version of IEEE 802.1D (1998) STP, providing more rapid convergence of the Spanning Tree network path states on STG 1. See “Rapid Spanning Tree Protocol” on page 185 for details. Per‐VLAN Rapid Spanning Tree (PVRST+) PVRST mode is based on RSTP to provide rapid Spanning Tree convergence, but supports instances of Spanning Tree, allowing one STG per VLAN. PVRST mode is compatible with Cisco R‐PVST/R‐PVST+ mode. PVRST is the default Spanning Tree mode on the CN4093. See “PVRST Mode” on page 173 for details. Multiple Spanning Tree Protocol (MSTP) IEEE 802.1Q (2003) MSTP provides both rapid convergence and load balancing in a VLAN environment. MSTP allows multiple STGs, with multiple VLANs in each. See “Multiple Spanning Tree Protocol” on page 187 for details. Global STP Control By default, the Spanning Tree feature is globally enabled on the switch, and is set for PVRST mode. Spanning Tree (and thus any currently configured STP mode) can be globally disabled or re‐enabled using the following commands: (Globally disable Spanning Tree) CN 4093(config)# spanning-tree mode disable Spanning Tree can be re‐enabled by specifying the STP mode: ...
Bridge Protocol Data Units To create a Spanning Tree, the switch generates a configuration Bridge Protocol Data Unit (BPDU), which it then forwards out of its ports. All switches in the Layer 2 network participating in the Spanning Tree gather information about other switches in the network through an exchange of BPDUs. A bridge sends BPDU packets at a configurable regular interval (2 seconds by default). The BPDU is used to establish a path, much like a hello packet in IP routing. BPDUs contain information about the transmitting bridge and its ports, including bridge MAC addresses, bridge priority, port priority, and path cost. If the ports are tagged, each port sends out a special BPDU containing the tagged information. The generic action of a switch on receiving a BPDU is to compare the received BPDU to its own BPDU that it will transmit. If the priority of the received BPDU is better than its own priority, it will replace its BPDU with the received BPDU. Then, the switch adds its own bridge ID number and increments the path cost of the BPDU. The switch uses this information to block any necessary ports. Note: If STP is globally disabled, BPDUs from external devices will transit the switch transparently. If STP is globally enabled, for ports where STP is turned off, inbound BPDUs will instead be discarded. Determining the Path for Forwarding BPDUs When determining which port to use for forwarding and which port to block, the CN4093 uses information in the BPDU, including each bridge ID. A technique based on the “lowest root cost” is then computed to determine the most efficient path for forwarding. Bridge Priority The bridge priority parameter controls which bridge on the network is the STG root bridge. To make one switch become the root bridge, configure the bridge priority lower than all other switches and bridges on your network. The lower the value, the higher the bridge priority. Use the following command to configure the bridge priority: CN 4093(config)# spanning-tree stp <1‐128>...
Port Path Cost The port path cost assigns lower values to high‐bandwidth ports, such as 10 Gigabit Ethernet, to encourage their use. The cost of a port also depends on whether the port operates at full‐duplex (lower cost) or half‐duplex (higher cost). For example, if a 100‐Mbps (Fast Ethernet) link has a “cost” of 10 in half‐duplex mode, it will have a cost of 5 in full‐duplex mode. The objective is to use the fastest links so that the route with the lowest cost is chosen. A value of 0 (the default) indicates that the default cost will be computed for an auto‐negotiated link or LAG speed. Use the following command to modify the port path cost: CN 4093(config)# interface port <port alias or number> CN 4093(config-if)# spanning-tree stp <1‐128> path-cost <path cost value> CN 4093(config-if)# exit The port path cost can be a value from 1 to 200000000. Specify 0 for automatic path cost. Simple STP Configuration Figure 11 depicts a simple topology using a switch‐to‐switch link between two switches (via either external ports or internal Inter‐Switch Links). Figure 11. Spanning Tree Blocking a Switch‐to‐Switch Link Enterprise Routing Switches Switch 1 Switch 2...
Per-VLAN Spanning Tree Groups PVRST mode supports a maximum of 128 STGs, with each STG acting as an independent, simultaneous instance of STP. Multiple STGs provide multiple data paths which can be used for load‐balancing and redundancy. To enable load balancing between two CN4093s using multiple STGs, configure each path with a different VLAN and then assign each VLAN to a separate STG. Since each STG is independent, they each send their own IEEE 802.1Q tagged Bridge Protocol Data Units (BPDUs). Each STG behaves as a bridge group and forms a loop‐free topology. The default STG 1 may contain multiple VLANs (typically until they can be assigned to another STG). STGs 2‐128 may contain only one VLAN each. Using Multiple STGs to Eliminate False Loops Figure 13 shows a simple example of why multiple STGs are needed. In the figure, two ports on a CN4093 are connected to two ports on an application switch. Each of the links is configured for a different VLAN, preventing a network loop. However, in the first network, since a single instance of Spanning Tree is running on all the ports of the CN4093, a physical loop is assumed to exist, and one of the VLANs is blocked, impacting connectivity even though no actual loop exists. Figure 13. Using Multiple Instances of Spanning Tree Group Switch 1 Switch 2 STG 1 STG 2 False VLAN 1 VLAN 30...
Manually Assigning STGs The administrator may manually assign VLANs to specific STGs, whether or not VASA is enabled. If no VLANs exist (other than default VLAN 1), see “Guidelines for Creating VLANs” on page 180 for information about creating VLANs and assigning ports to them. 2. Assign the VLAN to an STG using one of the following methods: From the global configuration mode: CN 4093(config)# spanning-tree stp <1‐128> vlan <VLAN> Or from within the VLAN configuration mode: CN 4093(config)# vlan <VLAN number> CN 4093(config-vlan)# stg <STG number> CN 4093(config-vlan)# exit When a VLAN is assigned to a new STG, the VLAN is automatically removed from its prior STG. Note: For proper operation with switches that use Cisco PVST+, it is recommended that you create a separate STG for each VLAN. Guidelines for Creating VLANs ...
Switch-Centric Configuration PVRST is switch‐centric: STGs are enforced only on the switch where they are configured. The STG ID is not transmitted in the Spanning Tree BPDU. Each Spanning Tree decision is based entirely on the configuration of the particular switch. For example, in Figure 14, though VLAN 2 is shared by the Switch A and Switch B, each switch is responsible for the proper configuration of its own ports, VLANs, and STGs. Switch A identifies its own port 17 as part of VLAN 2 on STG 2, and the Switch B identifies its own port 8 as part of VLAN 2 on STG 2. Figure 14. Implementing Multiple Spanning Tree Groups Chassis Application Switch A Switch B STG 2 VLAN 2 STG 3 VLAN 3 STG 1 VLAN 1 Application Application Switch C Switch D The VLAN participation for each Spanning Tree Group in Figure 14 on page 182 is ...
Page 184
VLAN 2 is automatically removed from STG 1. By default VLAN 1 remains in STG 1. 4. Configure the following on application switch C: Add port 8 to VLAN 3. Ports 1 and 2 are by default in VLAN 1 assigned to STG 1. CN 4093(config)# vlan 3 CN 4093(config-vlan)# stg 3 CN 4093(config-vlan)# exit CN 4093(config)# interface port 8 CN 4093(config-if)# switchport mode trunk CN 4093(config-if)# exit If VASA is disabled, enter the following command: CN 4093(config)# spanning-tree stp 3 vlan 3 VLAN 3 is automatically removed from STG 1. By default VLAN 1 remains in STG 1.
MSTP Configuration Guidelines This section provides important information about configuring Multiple Spanning Tree Groups: When MSTP is turned on, the switch automatically moves management VLAN 4095 to the CIST. When MSTP is turned off, the switch moves VLAN 4095 from the CIST to Spanning Tree Group 128. When you enable MSTP, you must configure the Region Name. A default version number of 0 is configured automatically. Each bridge in the region must have the same name, version number and VLAN mapping. MSTP Configuration Examples MSTP Configuration Example 1 This section provides steps to configure MSTP on the CN4093. 1. Configure port and VLAN membership on the switch. 2. Configure Multiple Spanning Tree region parameters and set the mode to MSTP. CN 4093(config)# spanning-tree mst configuration (Enter MST configuration mode) CN 4093(config-mst)# name <name> (Define the Region name) CN 4093(config-mst)# revision 100 (Define the Revision level) CN 4093(config-mst)# exit CN 4093(config)# spanning-tree mode mst (Set mode to Multiple Spanning Trees) 3.
Page 194
Figure 17. VLAG Application with Multiple Layers Layer 2/3 Border LACP-capable Routers VLAG 5 VLAG 6 Layer 2 Region VLAG with multiple levels Peers C VLAG 3 VLAG 3 VLAG 4 VLAG VLAG Peers A Peers B VLAG 1 VLAG 2 LACP-capable Switch LACP-capable Server Servers Wherever ports from both peered switches are aggregated to another device, the ...
VLAG Capacities Servers or switches that connect to the VLAG peers using a multi‐port VLAG are considered VLAG clients. VLAG clients are not required to be VLAG‐capable. The ports participating in the VLAG are configured as regular port LAGs on the VLAG client end. On the VLAG peers, the VLAGs are configured similarly to regular port LAGs, using many of the same features and rules. See “Ports and Link Aggregation (LAG)” on page 157 for general information concerning all port LAGs. Each VLAG begins as a regular port LAG on each VLAG‐peer switch. The VLAG may be either a static LAG (portchannel) or dynamic LACP LAG and consumes one slot from the overall port LAG capacity pool. The type of aggregation must match that used on VLAG client devices. Additional configuration is then required to implement the VLAG on both VLAG peer switches. You may configure up to 52 LAGs on the switch, with all types (regular or VLAG, static or LACP) sharing the same pool. The maximum number of configurable VLAG instances is as follows: With STP off: Maximum of 31 VLAG instances With STP on: PVRST/MSTP with one VLAG instance per VLAN/STG: Maximum of 31 VLAG instances PVRST/MSTP with one VLAG instance belonging to multiple VLANs/STGs: Maximum of 20 VLAG instances Note: VLAG is not supported in RSTP mode. Each type of aggregation can contain up to 24 member ports, depending on the port type and availability. CN4093 Application Guide for N/OS 8.4...
Configuring VLAGs When configuring VLAG or making changes to your VLAG configuration, consider the following VLAG behavior: When adding a static Mrouter on VLAG links, ensure that you also add it on the ISL link to avoid VLAG link failure. If the VLAG link fails, traffic cannot be recovered through the ISL. Also, make sure you add the same static entry on the peer VLAG switch for VLAG ports. When you enable VLAG on the switch, if a MSTP region mismatch is detected with the VLAG peer, the ISL will shut down. In such a scenario, correct the region on the VLAG peer and manually enable the ISL. If you have enabled VLAG on the switch, and you need to change the STP mode, ensure that you first disable VLAG and then change the STP mode. When VLAG is enabled, you may see two root ports on the secondary VLAG switch. One of these will be the actual root port for the secondary VLAG switch and the other will be a root port synced with the primary VLAG switch. The LACP key used must be unique for each VLAG in the entire topology. The STG to VLAN mapping on both VLAG peers must be identical. The following parameters must be identically configured on the VLAG ports of both the VLAG peers: VLANs Native VLAN tagging Native VLAN/PVID STP mode BPDU Guard setting STP port setting MAC aging timers Static MAC entries ...
Configure the ISL The ISL connecting the VLAG peers is shared by all their VLAGs. The ISL needs to be configured only once on each VLAG peer. 1. Configure STP if required. Use PVRST or MSTP mode only: CN 4093(config)# spanning-tree mode pvrst 2. Configure the ISL ports and place them into a LAG (dynamic or static): CN 4093(config)# interface port 1-2 CN 4093(config-if)# switchport mode trunk CN 4093(config-if)# lacp mode active CN 4093(config-if)# lacp key 200 CN 4093(config-if)# exit CN 4093(config)# vlag isl adminkey 200 Notes: ...
VLAG Configuration - VLANs Mapped to MSTI Follow the steps in this section to configure VLAG in environments where the STP mode is MSTP and no previous VLAG was configured. Configure the ISL The ISL connecting the VLAG peers is shared by all their VLAGs. The ISL needs to be configured only once on each VLAG peer. Ensure you have the same region name, revision and VLAN‐to‐STG mapping on both VLAG switches. 1. Configure STP: CN 4093(config)# spanning-tree mode mst 2. Configure the ISL ports and place them into a portchannel (dynamic or static): CN 4093(config)# interface port 1-2 CN 4093(config-if)# switchport mode trunk CN 4093(config-if)# lacp mode active CN 4093(config-if)# lacp key 200 CN 4093(config-if)# exit CN 4093(config)# vlag isl adminkey 200 Note:...
Configuring Health Check We strongly recommend that you configure the CN4093 to check the health status of its VLAG peer. Although the operational status of the VLAG peer is generally determined via the ISL connection, configuring a network health check provides an alternate means to check peer status in case the ISL links fail. Use an independent link between the VLAG switches to configure health check. Note: Configuring health check on an ISL VLAN interface or on a VLAG data port may impact the accuracy of the health check status. 1. Configure a management interface for the switch. Note: If the switch does not have a dedicated management interface, configure a VLAN for the health check interface. The health check interface can be configured with an IPv4 or IPv6 address: CN 4093(config)# interface ip 127 CN 4093(config-ip-if)# ip address 10.10.10.1 255.255.255.0 CN 4093(config-ip-if)# enable CN 4093(config-ip-if)# exit Note: Configure a similar interface on VLAG Peer 2. For example, use IP address 10.10.10.2. 2. Specify the IPv4 or IPv6 address of the VLAG Peer: CN 4093(config)# vlag hlthchk peer-ip 10.10.10.2 Note: For VLAG Peer 2, the management interface would be configured as ...
Configure VLAG Peer 2 The VLAG peer (VLAG Peer 2) must be configured using the same ISL aggregation type (dynamic or static), the same VLAN and the same STP mode and Tier ID used on VLAG Switch 1. For each corresponding VLAG on the peer, the port LAG type (dynamic or static), VLAN and STP mode and ID must be the same as on VLAG Switch 1. 1. Configure VLAG tier ID and enable VLAG globally. CN 4093(config)# vlag tier-id 10 CN 4093(config)# vlag enable 2. Configure appropriate routing. CN 4093(config)# router ospf CN 4093(config-router-ospf)# area 1 area-id 0.0.0.1 CN 4093(config-router-ospf)# enable CN 4093(config-router-ospf)# exit Although OSPF is used in this example, static routing could also be deployed. 3. Configure a server‐facing interface. CN 4093(config)# interface ip 3 CN 4093(config-ip-if)# ip address 10.0.1.11 255.255.255.0 CN 4093(config-ip-if)# vlan 100...
Configuring VLAGs in Multiple Layers Figure 21 shows an example of VLAG being used in a multi‐layer environment. Following are the configuration steps for the topology. Figure 21. VLAG in Multiple Layers Layer 2/3 Border LACP-capable Routers VLAG 5 VLAG 6 Layer 2 Region VLAG with multiple levels Peers C Switch A Switch B VLAG 3 VLAG 3 VLAG 4 VLAG VLAG Peers A Switch C...
Page 214
5. Configure ports on Switch A connecting to downstream VLAG switches C and D. CN 4093(config)# vlan 20 CN 4093(config-vlan)# exit CN 4093(config)# interface port 10,11 CN 4093(config-if)# switchport mode trunk CN 4093(config-if)# lacp key 600 CN 4093(config-if)# lacp mode active CN 4093(config-if)# exit CN 4093(config)# vlag adminkey 600 enable Repeat these steps on Switch B for ports connecting to downstream VLAG switch C and D. 6.
Page 216
The CN4093 can classify traffic by reading the DiffServ Code Point (DSCP) or IEEE 802.1p priority value, or by using filters to match specific criteria. When network traffic attributes match those specified in a traffic pattern, the policy instructs the CN4093 to perform specified actions on each packet that passes through it. The packets are assigned to different Class of Service (COS) queues and scheduled for transmission. The basic CN4093 QoS model works as follows: Classify traffic: Read DSCP Read 802.1p Priority Match ACL filter parameters Meter traffic: Define bandwidth and burst parameters Select actions to perform on in‐profile and out‐of‐profile traffic Perform actions: Drop packets Pass packets Mark DSCP or 802.1p Priority Set COS queue (with or without re‐marking) Queue and schedule traffic: Place packets in one of the available COS queues Schedule transmission based on the COS queue weight CN4093 Application Guide for N/OS 8.4...
Metering QoS metering provides different levels of service to data streams through user‐configurable parameters. A meter is used to measure the traffic stream against a traffic profile which you create. Thus, creating meters yields In‐Profile and Out‐of‐Profile traffic for each ACL, as follows: In‐Profile–If there is no meter configured or if the packet conforms to the meter, the packet is classified as In‐Profile. Out‐of‐Profile–If a meter is configured and the packet does not conform to the meter (exceeds the committed rate or maximum burst rate of the meter), the packet is classified as Out‐of‐Profile. Note: Metering is not supported for IPv6 ACLs. All traffic matching an IPv6 ACL is considered in‐profile for re‐marking purposes. Using meters, you set a Committed Rate in Kbps (1000 bits per second in each Kbps). All traffic within this Committed Rate is In‐Profile. Additionally, you can set a Maximum Burst Size that specifies an allowed data burst larger than the Committed Rate for a brief period. These parameters define the In‐Profile traffic. Meters keep the sorted packets within certain parameters. You can configure a meter on an ACL, and perform actions on metered traffic, such as packet re‐marking. Re-Marking Re‐marking allows for the treatment of packets to be reset based on new network specifications or desired levels of service. You can configure the ACL to re‐mark a packet as follows: Change the DSCP value of a packet, used to specify the service level traffic should receive. Change the 802.1p priority of a packet. CN4093 Application Guide for N/OS 8.4...
Per-Hop Behavior The DSCP value determines the Per Hop Behavior (PHB) of each packet. The PHB is the forwarding treatment given to packets at each hop. QoS policies are built by applying a set of rules to packets, based on the DSCP value, as they hop through the network. The CN4093 default settings are based on the following standard PHBs, as defined in the IEEE standards: Expedited Forwarding (EF)—This PHB has the highest egress priority and lowest drop precedence level. EF traffic is forwarded ahead of all other traffic. EF PHB is described in RFC 2598. Assured Forwarding (AF)—This PHB contains four service levels, each with a different drop precedence, as shown below. Routers use drop precedence to determine which packets to discard last when the network becomes congested. AF PHB is described in RFC 2597. Drop Precedence Class 1 Class 2 Class 3 Class 4 AF11 AF21 AF31 AF41 (DSCP 10) (DSCP 18) (DSCP 26) (DSCP 34) Medium AF12 AF22 AF32 AF42 (DSCP 12) (DSCP 20) (DSCP 28)
DSCP Re-Marking Configuration Example 1 The following example includes the basic steps for re‐marking DSCP value and mapping DSCP value to 802.1p. 1. Turn DSCP re‐marking on globally, and define the DSCP‐DSCP‐802.1p mapping. You can use the default mapping. CN 4093(config)# qos dscp re-marking CN 4093(config)# qos dscp dscp-mapping <DSCP value (0‐63)> <new value> CN 4093(config)# qos dscp dot1p-mapping <DSCP value (0‐63)> <802.1p value> 2. Enable DSCP re‐marking on a port. CN 4093(config)# interface port 1 CN 4093(config-if)# qos dscp re-marking CN 4093(config-if)# exit DSCP Re-Marking Configuration Example 2 The following example assigns strict priority to VoIP traffic and a lower priority to ...
Using 802.1p Priorities to Provide QoS Enterprise NOS provides Quality of Service functions based on the priority bits in a packet’s VLAN header. (The priority bits are defined by the 802.1p standard within the IEEE 802.1q VLAN header.) The 802.1p bits, if present in the packet, specify the priority that should be given to packets during forwarding. Packets with a numerically higher (non‐zero) priority are given forwarding preference over packets with lower priority bit value. The IEEE 802.1p standard uses eight levels of priority (0‐7). Priority 7 is assigned to highest priority network traffic, such as OSPF or RIP routing table updates, priorities 5‐6 are assigned to delay‐sensitive applications such as voice and video, and lower priorities are assigned to standard applications. A value of 0 (zero) indicates a “best effort” traffic prioritization, and this is the default when traffic priority has not been configured on your network. The CN4093 can filter packets based on the 802.1p values, and it can assign or overwrite the 802.1p value in the packet. Figure 24. Layer 2 802.1q/802.1p VLAN Tagged Packet DMAC SMAC E Type Data Preamble Priority VLAN Identifier (VID) Ingress packets receive a priority value, as follows: Tagged packets—CN4093 reads the 802.1p priority in the VLAN tag. Untagged packets—CN4093 tags the packet and assigns an 802.1p priority, based on the port’s default priority. Egress packets are placed in a COS queue based on the priority value, and scheduled for transmission based on the scheduling weight of the COS queue.
Control Plane Protection Control plane receives packets that are required for the internal protocol state machines. This type of traffic is usually received at low rate. However, in some situations such as DOS attacks, the switch may receive this traffic at a high rate. If the control plane protocols are unable to process the high rate of traffic, the switch may become unstable. The control plane receives packets that are channeled through protocol‐specific packet queues. Multiple protocols can be channeled through a common packet queue. However, one protocol cannot be channeled through multiple packet queues. These packet queues are applicable only to the packets received by the software and does not impact the regular switching or routing traffic. Packet queue with a higher number has higher priority. You can configure the bandwidth for each packet queue. Protocols that share a packet queue will also share the bandwidth. The following commands configure the control plane protection (CoPP) feature: Configure a queue for a protocol: CN 4093(config)# qos protocol-packet-control packet-queue-map <0‐47> <protocol> Set the bandwidth for the queue, in packets per second: CN 4093(config)# qos protocol-packet-control rate-limit-packet-queue <0‐47> <1‐10000>...
Stacking Overview A hybrid stack is a group of eight switches: two CN4093 10 Gb Converged Scalable Switches and six EN4093R 10Gb Scalable Switches. A stack can also be formed with just two CN4093 10 Gb Converged Scalable Switches. A stack has the following properties, regardless of the number of switches included: The network views the stack as a single entity. The stack can be accessed and managed as a whole using standard switch IP interfaces configured with IPv4 addresses. The CLI for Individual Member switches is available via the Master switch serial console or using remote Telnet/SSH access to the Master. Once the stacking links have been established (see the next section), the number of ports available in a stack equals the total number of remaining ports of all the switches that are part of the stack. The number of available IP interfaces, VLANs, LAGs, LAG Links and other switch attributes are not aggregated among the switches in a stack. The totals for the stack as a whole are the same as for any single switch configured in stand‐alone mode. A maximum of 4095 VLANs are supported in stand‐alone mode, and a maximum of 1024 VLANs are supported in stacking mode. CN4093 Application Guide for N/OS 8.4...
Splitting and Merging One Stack If stack links or Member switches fail, any Member which cannot access either the Master or Backup is considered isolated and will not process network traffic (see “No Backup” on page 239). Members which have access to a Master or Backup (or both), despite other link or Member failures, will continue to operate as part of their active stack. A Member that is isolated due to link failure resets itself. After it is up, if the link failure still exits, the Member stays in isolated state keeping all its data links disabled. Only the management and stacking links are enabled. If the Member was not configured when it went to isolated state, the Master pushes the configuration when the Member joins back the stack. If multiple stack links or stack Member switches fail, thereby separating the Master and Backup into separate sub‐stacks, the Backup automatically becomes an active Master for the partial stack in which it resides. Later, if the topology failures are corrected, the partial stacks will merge, and the two active Masters will come into contact. In this scenario, if both the (original) Master and the Backup (acting as Master) are in operation when the merger occurs, the original Master will reassert its role as active Master for the entire stack. If any configuration elements were changed and applied on the Backup during the time it acted as Master (and forwarded to its connected Members), the Backup and its affected Members will reboot and will be reconfigured by the returning Master before resuming their regular roles. Note: When the Backup becomes a Master, if NTP is enabled from the CMM, configuration changes are made to the Backup (acting as Master) by the CMM. Therefore, in the event of a subsequent merger, the aforementioned reboot and reconfiguration of the Backup and its affected Members will occur. However, if the original Master switch is disrupted (powered down or in the process of rebooting) when it is reconnected with the active stack, the Backup (acting as Master) will retain its acting Master status to avoid disruption to the functioning stack. The deferring Master will temporarily assume a role as Backup. If both the Master and Backup are rebooted, all member switches in the stack will also reboot. When the switches resume operation, they will assume their originally configured roles. If, while the stack is still split, the Backup (acting as Master) is explicitly reconfigured to become a regular Master, then when the split stacks are finally merged, the Master with the lowest MAC address will become the new active ...
Backup Switch Selection An operational stack can have one optional Backup at any given time. Only the Backup specified in the active Master’s configuration is eligible to take over current stack control when the Master is rebooted or fails. The Master automatically synchronizes configuration settings with the specified Backup to facilitate the transfer of control functions. The Backup retains its status until one of the following occurs: The Backup switch is deleted using the following command from the Master: CN 4093(config)# no stack backup The Backup switch is changed using the following command from the Master: CN 4093(config)# stack backup <csnum 1‐8> Note: This will replace the current Backup switch with the configured switch specified through its csnum. Even if the new Backup switch is not attached to the stack when issuing the command, the current Backup switch will loose its role. When the configured switch is attached, the command will take effect and the switch will become the Backup. A new Master assumes operation as active Master in the stack and uses its own configured Backup settings. The active Master is rebooted with the boot configuration set to factory defaults (clearing the Backup setting). Master Failover When the Master switch is present, it controls the operation of the stack and pushes configuration information to the other switches in the stack. If the active Master fails, then the designated Backup (if one is defined in the Master’s configuration) becomes the new acting Master and the stack continues to operate ...
Configuring a Stack When stacking mode is enabled on the switch, the configuration is reset to factory default and the port numbering changes. When a switch mode is changed from stand‐alone to stack or from stack to stand‐alone, the active and backup configuration will be erased. We recommended that you save the configuration to an external device before changing the switch mode. Configuration Overview This section provides procedures for creating a stack of switches. The high‐level procedure is as follows: Configure the stack settings to be available after the next reboot: Choose one Master switch for the entire stack. Set all stack switches to stacking mode. Configure the same stacking VLAN for all switches in the stack. Configure the desired stacking interlinks. Reboot the stack switches. Configure the stack after the reboot: Bind Member switches to the Master. Assign a Backup switch. These tasks are covered in detail in the following sections. Best Configuration Practices The following are guidelines for building an effective switch stack: Always connect the stack switches in a complete ring topology (see Figure 25 on page 242).
Page 242
If using the 2 x 40Gb ports as stacking links, first convert the 40Gb ports from their default 4x10Gb mode of operation to 40Gb mode. See: “Configuring QSFP+ Ports” on page 160. Use the following command to specify the links to be used in the stacking LAG: CN 4093(config)# boot stack higig-trunk <list of port names or aliases> Note: Ports configured as Server ports for use with VMready cannot be designated as stacking links. 5. On each switch, perform a reboot: CN 4093(config)# reload 6. Physically connect the stack LAGs. To create the recommended topology, attach the two designated stacking links in a bidirectional ring. As shown in Figure 25, connect each switch in turn to the next, starting with the Master switch. To complete the ring, connect the last Member switch back to the Master. Figure 25. Example of Stacking Connections Master Switch Member Switches Switch connected in bidirectional Member ring topology Switch Member Switch...
Additional Master Configuration Once the stack links are connected, access the internal management IP interface of the Master switch (assigned by the management system) and complete the configuration. Viewing Stack Connections To view information about the switches in a stack, execute the following command: CN 4093(config)# show stack switch Stack name: STK Local switch: csnum - 74:99:75:21:8c:00 UUID - 98c587636548429aba5010f8c62d4e27 Bay Number Switch Type - 14 (CN4093) Chassis Type - 6 (Flex Enterprise) Switch Mode (cfg) - Member (backup) Priority - 245...
Managing a Stack The stack is managed primarily through the Master switch. The Master switch then pushes configuration changes and run‐time information to the Member switches. Use Telnet or the Browser‐Based Interface (BBI) to access the Master, as follows: Use the management IP address assigned to the Master by the management system. On any switch in the stack, connect to any port that is not part of an active LAG and is a member of a VLAN. To access the stack, use the IP address of any IP interface that is member of the VLAN. Connecting to Stack Switches via the Master From the Master switch, you can connect to any other switch in the stack directly from the ISCLI using the following command: CN 4093# connect <asnum (1‐16)> Rebooting Stacked Switches via the Master Rebooting Stacked Switches using the ISCLI The administrator can reboot individual switches in the stack, or the entire stack using the following commands: CN 4093(config)# reload (Reboot all switches in the stack) CN 4093(config)# reload master...
Upgrading Software in a Stack New Hybrid Stack Use the following procedure to install software on switches that will be used to form a hybrid stack (two CN4093 and up to six EN4093R switches): 1. Install ENOS version 8.4 on each switch and reload the switch. Configure the switches to form a stack. See “Configuring a Stack” on page 240. 3. Reload the switches to establish the stack. Converting a EN4093R Stack to a Hybrid Stack Use the following procedure to install software on a stack of EN4093R switches that will be combined with CN4093 switches to form a hybrid stack (up to two CN4093 and up to six EN4093R switches): 1. Install ENOS version 8.4 on the Master EN4093R switch. 2. Install ENOS version 8.4 on each CN4093 switch. 3. Reload the switches. 4. Configure stacking on the CN4093 switch(es). The CN4093 must be configured as the Master of the hybrid stack. Reload the switch(es) to establish the stack. New Stack Use the following procedure to install software on two CN4093 switches that will be used to form a stack: 1.
Page 250
5. Set the stacking mode. By default, each switch is set to Member mode. However, if the incoming switch has been used in another stacking configuration, it may be necessary to ensure the proper mode is set. If replacing a Member or Backup switch: CN 4093(config)# boot stack mode member If replacing a Master switch: CN 4093(config)# boot stack mode master 6. Configure the stacking VLAN on the new switch, or use the default setting. Although any VLAN may be defined for stack traffic, it is highly recommended that the default, VLAN 4090, be reserved for stacking, as shown in the following command. CN 4093(config)# boot stack vlan 4090 7. Designate the stacking links. Use the following command to specify the links to be used in the stacking LAG: CN 4093(config)# boot stack higig-trunk <list of external port s> 8.
Performing a Rolling Reload or Upgrade You can perform a sequential reload or upgrade, otherwise known as a staggered or rolling reload or upgrade, to avoid the need for an overall outage. With a rolling reload or upgrade, some of the hardware stays up at all times. This approach differs from the traditional image upgrade that requires manual image downloads and install to individual switches, which then requires the entire logical switch reboot. After the firmware is copied to all members of the stack, the rolling reload or upgrade process automatically reboots all switches sequentially in the following order: Backup switch Master switch Configured stack members, from lowest to highest csnum Attached but not configured stack members, from lowest to highest asnum During the rolling firmware reload or upgrade process, there will be continuous connectivity to the upstream network. From the point of view of the stack, it is as though a series of switch and uplink failures are occurring. When the design is cabled and configured properly, the environment redirects traffic. For detailed instructions on upgrading and rebooting, see Chapter 3, “Switch Software Management“. Starting a Rolling Reload To start a rolling reload, use the command: CN 4093(config)# reload staggered [delay <delay>] where delay is an integer from 2 to 20 representing the time delay in minutes ...
Saving Syslog Messages By default, syslog messages on each member of a stack are saved to flash memory on that stack member. You may want to preserve stacking‐related errors. To accomplish this, in console mode, use the following command: CN 4093(config)# [no] logging log stacking The master switch can display the syslog messages originated on any stack member as long as the specified stack element is currently an active member of the stack using the command: CN 4093(config)# show logging [swn <configured‐switch‐number>] [messages| |reverse|severity <0‐7>] where: <configured‐switch‐number> The configured switch number. If no number is supplied, the command applies to the master switch. messages shows last 2000 syslog messages. reverse shows syslog information in reverse priority order. severity <0‐7> shows messages of a specific severity level. For example, to retrieve the last 2000 syslog messages of severity 4 or greater from switch 3, enter: CN 4093(config)# show logging swn 3 severity 4 To retrieve the contents of the log files stored on flash on a specified switch in the ...
Flexible Port Mapping in Stacking Flexible Port Mapping allows administrators to manually enable or disable specific switch ports within the limitations of the installed licenses’ bandwidth. For details, see “Flexible Port Mapping” on page 580. In stacking, there are no overall bandwidth restrictions. Instead, each switch in the stack that supports licensing has bandwidth restrictions determined by its license level. Commands associated with flexible port mapping can only be run from the master switch in the stack and can have an additional parameter: [no] boot port-map <csnum:port number or range> Adds or removes ports of a stack switch to/from the port map by specifying the switch’s configured number and port number or range of ports. For example: CN 4093(config)# boot port-map 3:12 Adds port number 12 of stack configured switch number 3 to the port map. default boot port-map [<csnum>] Resets the port map configuration to the default settings for the whole stack. If a configured switch number is specified, the command will reset the port map configuration only for the selected stack switch. CN4093 Application Guide for N/OS 8.4...
Page 260
Unified Fabric Port (UFP) An architecture that logically subdivides a high‐speed physical link connecting to a server NIC or to a Converged Network Adapter (CNA). UFP provides a switch fabric component to control the NIC. For details on this feature, see “Unified Fabric Port” on page 361. Enterprise NOS virtualization features provide a highly‐flexible framework for allocating and managing switch resources. CN4093 Application Guide for N/OS 8.4...
The following restriction applies to vNICs: vNICs are not supported simultaneously with VM groups (see “VMready” on page 279) on the same switch ports. By default, vNICs are disabled. The administrator can enable vNICs and configure vNIC features on the switch using the standard management options such as the Enterprise NOS CLI, the ISCLI, and the Browser‐based Interface (BBI). To enable the vNIC feature on the switch, use the following command on the vNIC Configuration Menu: CN 4093(config)# vnic enable Note: The Emulex Virtual Fabric Adapter for Lenovo Flex System can also operate in Physical NIC (PNIC) mode, in which case vNIC features are non‐applicable. vNIC IDs on the Switch Enterprise NOS 8.4 supports up to four vNICs attached to each internal switch port. Each vNIC is provided its own independent virtual pipe on the port. On stand‐alone (non‐stacked) switches, each vNIC is identified by port and vNIC number: <port number or alias>.<vNIC pipe number (1‐4)> For example: INTA1.1, INTA1.2, INTA1.3, and INTA1.4 represent the vNICs on port INTA1. INTA2.1, INTA2.2, INTA2.3, and INTA2.4 represent the vNICs on port INTA2, etc. These vNIC IDs are used when adding vNICs to vNIC groups, and are shown in some configuration and information displays. Whenever switches are stacked, the switch csnum ID is also required: <switch csnum>:<port number or alias>.<vNIC pipe number (1‐4)> For example: 2:INTA2.3 refers to port INTA2, vNIC 3, switch number 2. Note: The configuration examples in this chapter depict stand‐alone (non‐stacked) port and vNIC designations. ...
Page 264
Table 22. vNIC ID Correlation PCIe NIC Port Switch Slot vNIC vNIC ID Function ID Pipe Second ASIC Bay 1 INTBx.1 Bay 1 INTBx.2 Bay 1 INTBx.3 Bay 1 INTBx.4 Bay 2 INTBx.1 Bay 2 INTBx.2 Bay 2 INTBx.3 Bay 2 INTBx.4 For Emulex Virtual Fabric Adapter (Fabric Mezz), when adding it with the LOM Card: Table 23. vNIC ID Correlation PCIe NIC Port Switch Slot vNIC vNIC ID...
vNIC Uplink Modes The switch supports two modes for configuring the vNIC uplinks: dedicated mode and shared mode. The default is the dedicated mode. To enable the shared mode, enter the following command: CN 4093(config)# vnic uplink-share In the dedicated mode, only one vNIC group is assigned to an uplink port. This port can be a regular port or a LAG port. The NIC places an outer tag on the vNIC group packets. This outer tag contains the vNIC group VLAN. The uplink NIC strips off the outer tag before sending out the packet. For details, see “vNIC Groups in Dedicated Mode” on page 270. In the shared mode, multiple vNIC groups can be assigned to an uplink port. This port can be a regular port or a LAG port. The vNIC groups share the uplink. You may assign a few vNIC groups to share an uplink and the other vNIC groups to have a single uplink each. In either case, the switch still operates in shared mode. As in the dedicated mode, the NIC places an outer tag on the vNIC group packets. This outer tag contains the vNIC group VLAN. The uplink NIC does not strip off the outer tag. The vNIC group tag defines the regular VLAN for the packet.This behavior is particularly useful in cases where the downstream server does not set any tag. Effectively, each vNIC group is a VLAN, which you can assign by configuring the VLAN to the vNIC group. You must enable the tag configuration on the uplink port. For details, see “vNIC Groups in Shared Mode” on page 271. CN4093 Application Guide for N/OS 8.4...
vNIC Bandwidth Metering Enterprise NOS 8.4 supports bandwidth metering for vNIC traffic. By default, each of the four vNICs on any given port is allowed an equal share (25%) of NIC capacity when enabled. However, you may configure the percentage of available switch port bandwidth permitted to each vNIC. vNIC bandwidth can be configured as a value from 1 to 100, with each unit representing 1% (or 100Mbps) of the 10Gbps link. By default, each vNICs enabled on a port is assigned 25 units (equal to 25% of the link, or 2.5Gbps). When traffic from the switch to the vNIC reaches its assigned bandwidth limit, the switch will drop packets egressing to the affected vNIC. Note: Bandwidth metering drops excess packets when configured limits are reached. Consider using the ETS feature in applications where packet loss is not desirable (see “Enhanced Transmission Selection” on page 352). To change the bandwidth allocation, use the following commands: CN 4093(config)# vnic port <port alias or number> index <vNIC number (1‐4)> CN 4093(vnic-config)# bandwidth <allocated percentage> Note: vNICs that are disabled are automatically allocated a bandwidth value of 0. A combined maximum of 100 units can be allocated among vNIC pipes enabled for any specific port (bandwidth values for disabled pipes are not counted). If more than 100 units are assigned to enabled pipes, an error will be reported when attempting to apply the configuration. The bandwidth metering configuration is automatically synchronized between the switch and vNICs for regular Ethernet and iSCSI traffic. Once configured on the switch, there is no need to manually configure vNIC bandwidth metering limits on the NIC. Note: FCoE vNIC does not use egress metering. ETS and PFC must be enabled to ensure lossless transmission for FCoE traffic. ETS does traffic shaping. You can ...
Groups in Dedicated Mode The vNIC group VLAN ID is placed on all vNIC group packets as an “outer” tag. As shown in Figure 27, the outer vNIC group VLAN ID is placed on the packet in addition to any regular VLAN tag assigned by the network, server, or hypervisor. The outer vNIC group VLAN is used only between the CN4093 and the NIC. Figure 27. Outer and Inner VLAN Tags vNIC-Capable Server Ports with Lenovo Switch Ports without vNICs vNICs OS/Hypervisor Regular NIC attached outer Switching uses outer tag; Switch strips VLAN ID vNIC group VLAN ID...
Teaming Failover For NIC failover in a non‐virtualized environment, when a service group’s external uplink ports fail or are disconnected, the switch disables the affected group’s internal ports, causing the server to failover to the backup NIC and switch. However, in a virtualized environment, disabling the affected internal ports would disrupt all vNIC pipes on those ports, not just those that have lost their external uplinks (see Figure 29). Figure 29. Regular Failover in a Virtualized Environment Primary Lenovo Lenovo Switch Servers Virtual Hypervisor Pipes VNIC vSwitch VNIC VNIC VNIC VM 1 VNIC Group 1 VM 2 EXT1 INTA1 VNIC VNIC VNIC VNIC VNIC...
Configuration Example Consider the following example configuration of vNICs for regular Ethernet traffic: Figure 31. Multiple vNIC Groups Lenovo Switch 1 Lenovo Servers VNIC VNIC VNIC OS or VNIC EXT1 INTA1 Hypervisor VNIC VNIC To Switch 2 VNIC VNIC Group 1 VNIC VNIC VLAN 1000 VNIC VNIC OS or VNIC...
Page 276
4. Add ports, LAGs and virtual pipes to their vNIC groups. CN 4093(config)# vnic vnicgroup 1 (Select vNIC group) CN 4093(vnic-group-config)# vlan 1000 (Specify the VLAN) CN 4093(vnic-group-config)# member INTA1.1 (Add vNIC pipes to the group) CN 4093(vnic-group-config)# member INTA2.1 CN 4093(vnic-group-config)# port INTA4 (Add non‐vNIC port to the group) CN 4093(vnic-group-config)# port EXT1 (Add uplink port to the group CN 4093(vnic-group-config)# failover (Enable vNIC failover for the group) CN 4093(vnic-group-config)# enable (Enable the vNIC group) CN 4093(vnic-group-config)# exit CN 4093(config)# vnic vnicgroup 2 CN 4093(vnic-group-config)# vlan 1774 CN 4093(vnic-group-config)# member INTA1.2...
FCoE Using the Emulex VFA Similar to the iSCSI application, when using the Emulex VFA for Lenovo chassis systems, FCoE traffic is expected to occur only on vNIC pipe 2. In this case, the additional vNIC configuration for FCoE support is minimal. Consider an example where the Fibre Channel network is connected to an FCoE Forwarder (FCF) bridge via bridge port EXT4, and to an ENode on port INT1. 1. The following steps are required as part of the regular FCoE configuration (see “FIP Snooping Configuration” on page 347): a. Disable the FIP Snooping automatic VLAN creation. b. Disable FIP Snooping on all external ports not used for FCoE. FIP snooping should be enabled only on ports connected to an FCF or ENode. c. Turn on CEE and FIP Snooping. d. Manually configure the FCoE ports and VLAN: enable VLAN tagging on all FCoE ports, and place FCoE ports into a supported VLAN. When CEE is turned on and the regular FCoE configuration is complete, FCoE traffic will be automatically assigned to PFC priority 3, and be initially allocated 50% of port bandwidth via ETS. The following steps are specific to vNIC configuration. 2. On the NIC, ensure that FCoE traffic occurs on vNIC pipe 2 only. Refer to your Emulex VFA documentation for details. 3. On the switch, enable the vNIC feature. CN 4093 # vnic enable 4.
VM Group Types VEs, as well as internal ports, external ports, static LAGs and LACP LAGs, can be placed into VM groups on the switch to define virtual communication boundaries. Elements in a given VM group are permitted to communicate with each other, while those in different groups are not. The elements within a VM group automatically share certain group‐level settings. Enterprise NOS 8.4 supports up to 4096 VM groups. There are two different types: Local VM groups are maintained locally on the switch. Their configuration is not synchronized with hypervisors. Distributed VM groups are automatically synchronized with a virtualization management server (see “Assigning a vCenter” on page 288). Each VM group type is covered in detail in the following sections. Local VM Groups The configuration for local VM groups is maintained on the switch (locally) and is not directly synchronized with hypervisors. Local VM groups may include only local elements: local switch ports and LAGs, and only those VEs connected to one of the switch ports or pre‐provisioned on the switch. Local VM groups support limited VE migration: as VMs and other VEs move to different hypervisors connected to different ports on the switch, the configuration of their group identity and features moves with them. However, VE migration to and from more distant hypervisors (those not connected to the CN4093, may require manual configuration when using local VM groups). Configuring a Local VM Group Local VM groups are configured in the VM Group command path: CN 4093(config)# virt vmgroup <VM group number> Use the following ISCLI configuration commands to assign group properties and ...
VM Profiles VM profiles are required for configuring distributed VM groups. They are not used with local VM groups. A VM profile defines the VLAN and virtual switch bandwidth shaping characteristics for the distributed VM group. The switch distributes these settings to the virtualization management server, which in turn distributes them to the appropriate hypervisors for VE members associated with the group. Creating VM profiles is a two part process. First, the VM profile is created as shown in the following command on the switch: CN 4093(config)# virt vmprofile <profile name> Next, the profile must be edited and configured using the following configuration commands: CN 4093(config)# virt vmprofile edit <profile name> ? eshaping <average bandwidth> <burst size> <peak> shaping <average bandwidth> <burst size> <peak> vlan <VLAN number> For virtual switch bandwidth shaping parameters, average and peak bandwidth are specified in kilobits per second (a value of 1000 represents 1 Mbps). Burst size is specified in kilobytes (a value of 1000 represents 1 MB). Note: The bandwidth shaping parameters in the VM profile are used by the hypervisor virtual switch software. To set bandwidth policies for individual VEs, ...
VMcheck The CN4093 primarily identifies virtual machines by their MAC addresses. An untrusted server or a VM could identify itself by a trusted MAC address leading to MAC spoofing attacks. Sometimes, MAC addresses get transferred to another VM, or they get duplicated. The VMcheck solution addresses these security concerns by validating the MAC addresses assigned to VMs. The switch periodically sends hello messages on server ports. These messages include the switch identifier and port number. The hypervisor listens to these messages on physical NICs and stores the information, which can be retrieved using the VMware Infrastructure Application Programming Interface (VI API). This information is used to validate VM MAC addresses. Two modes of validation are available: Basic and Advanced. Use the following command to select the validation mode or to disable validation: CN 4093(config)# [no] virt vmgroup <VM group number> validate {basic|advanced} Basic Validation This mode provides port‐based validation by identifying the port used by a hypervisor. It is suitable for environments in which MAC reassignment or duplication cannot occur. The switch, using the hello message information, identifies a hypervisor port. If the hypervisor port is found in the hello message information, it is deemed to be a trusted port. Basic validation should be enabled when: A VM is added to a VM group, and the MAC address of the VM interface is in the Layer 2 table of the switch. A VM interface that belongs to a VM group experiences a “source miss” i.e. is not able to learn new MAC address. A trusted port goes down. Port validation must be performed to ensure that the port does not get connected to an untrusted source when it comes back up. Use the following command to set the action to be performed if the switch is unable to validate the VM MAC address: CN 4093(config)# virt vmcheck action basic {log|link} log - generates a log link - disables the port...
Virtual Distributed Switch A virtual Distributed Switch (vDS) allows the hypervisor’s NIC to be attached to the vDS instead of its own virtual switch. The vDS connects to the vCenter and spans across multiple hypervisors in a datacenter. The administrator can manage virtual machine networking for the entire data center from a single interface. The vDS enables centralized provisioning and administration of virtual machine networking in the data center using the VMware vCenter server. When a member is added to a distributed VM group, a distributed port group is created on the vDS. The member is then added to the distributed port group. Distributed port groups on a vDS are available to all hypervisors that are connected to the vDS. Members of a single distributed port group can communicate with each other. Note: vDS works with ESX 4.0 or higher versions. To add a vDS, use the command: CN 4093# virt vmware dvswitch add <datacenter name> <dvSwitch name> [<dvSwitch‐version>] Prerequisites Before adding a vDS on the CN4093, ensure the following: VMware vCenter is fully installed and configured and includes a “bladevm” administration account and a valid SSL certificate. A virtual distributed switch instance has been created on the vCenter. The vDS version must be higher or the same as the hypervisor version on the hosts. At least two hypervisors are configured. Guidelines Before migrating VMs to a vDS, consider the following: At any one time, a VM NIC can be associated with only one virtual switch: to the hypervisor’s virtual switch, or to the vDS. Management connection to the server must be ensured during the migration. ...
Virtualization Management Servers The CN4093 can connect with a virtualization management server to collect configuration information about associated VEs. The switch can also automatically push VM group configuration profiles to the virtualization management server, which in turn configures the hypervisors and VEs, providing enhanced VE mobility. One virtual management server must be assigned on the switch before distributed VM groups may be used. Enterprise NOS 8.4 currently supports only the VMware Virtual Center (vCenter). Assigning a vCenter Assigning a vCenter to the switch requires the following: The vCenter must have a valid IPv4 address which is accessible to the switch (IPv6 addressing is not supported for the vCenter). A user account must be configured on the vCenter to provide access for the switch. The account must have (at a minimum) the following vCenter user privileges: Network Host Network > Configuration Virtual Machine > Modify Device Settings Once vCenter requirements are met, the following configuration command can be used on the CN4093 to associate the vCenter with the switch: CN 4093(config)# virt vmware vcspec <vCenter IPv4 address> <username> [noauth] This command specifies the IPv4 address and account username that the switch will use for vCenter access. Once entered, the administrator will be prompted to enter the password for the specified vCenter account.
The host list can include one or more target hosts, specified by host name, IPv4 address, or UUID, with each list item separated by a space. If the virtual switch name is omitted, the administrator will be prompted to select one from a list or to enter a new virtual switch name. Once executed, the requisite port group will be created on the specified virtual switch. If the specified virtual switch does not exist on the target host, it will be created with default properties, but with no uplink connection to a physical NIC (the administrator must assign uplinks using VMware management tools. VMware Operational Commands The CN4093 may be used as a central point of configuration for VMware virtual switches and port groups using the VMware operational menu, available with the following ISCLI privileged EXEC commands: CN 4093# virt vmware ? Distributed port group operations dvswitch VMWare dvSwitch operations export Create or update a vm profile on one host Add a port group to a host scan Perform a VM Agent scan operation now updpg...
VM Policy Bandwidth Control In a virtualized environment where VEs can migrate between hypervisors and thus move among different ports on the switch, traffic bandwidth policies must be attached to VEs, rather than to a specific switch port. VM Policy Bandwidth Control allows the administrator to specify the amount of data the switch will permit to flow to or from a particular VE, without defining a complicated matrix of ACLs or VMAPs for all port combinations where a VE may appear. VM Policy Bandwidth Control Commands VM Policy Bandwidth Control can be configured using the following configuration commands: CN 4093(config)# virt vmpolicy vmbwidth <VM MAC>|<index>|<UUID>| <IPv4 address>|<name> ? txrate <committed rate> <burst> [<ACL number>] (Set the VM to switch rate) rxrate <committed rate> <burst> (Set the VM received bandwidth) bwctrl (Enable bandwidth control) Bandwidth allocation can be defined either for transmit (TX) traffic or receive (RX) traffic. Because bandwidth allocation is specified from the perspective of the VE, ...
If a vCenter is available, more verbose information can be obtained using the following ISCLI privileged EXEC command: CN 4093# show virt vm -v Index MAC Address, Name (VM or Host), Port, Group Vswitch, IP Address @Host (VMs only) VLAN Port Group ----- ------------ ------------------ ----- ----- ---------- 00:50:56:9c:21:2f atom vSwitch0 172.16.46.15 @172.16.46.10 Eng_A 00:50:56:72:ec:86 172.16.46.50 vSwitch0 172.16.46.51 VMkernel...
vCenter VE Details If a vCenter is available, the following ISCLI privileged EXEC command displays detailed information about a specific VE: CN 4093# show virt vmware showvm {<VM UUID>|<VM IPv4 address>|<VM name>} --------------------------------------------------------------------- MAC Address 00:50:56:9c:21:2f Port Type Virtual Machine VM vCenter Name halibut VM OS hostname localhost.localdomain VM IP Address 172.16.46.15 VM UUID 001c41f3-ccd8-94bb-1b94-6b94b03b9200 Current VM Host 172.16.46.10 Vswitch vSwitch0 Port Group BNT_Default...
Figure 32. A Mixed Fibre Channel and FCoE Network FCoE Fibre 802.1p Priority & Usage EXT22 INTA1 Channel 3 FCoE Applications Switch 802.1p Priority & Usage Ethernet INTA2 EXT1 Business-Critical LAN Lenovo Chassis Servers In Figure 32 on page 300, the FCoE network is connected to the Fibre Channel network through an FCoE Forwarder (FCF). The FCF acts as a Fibre Channel gateway to and from the multi‐hop FCoE network. A full‐fabric FC/FCoE switch or a Fibre Channel Node Port Virtualized (NPV) switch may perform the FCF function. Although it may be possible to use an external FCF device, this chapter focuses on using the built‐in Fibre Channel features of the CN4093 itself. CN4093 Application Guide for N/OS 8.4...
Converged Enhanced Ethernet Converged Enhanced Ethernet (CEE) refers to a set of IEEE standards designed to allow different physical networks with different data handling requirements to be converged together, simplifying management, increasing efficiency and utilization, and leveraging legacy investments without sacrificing evolutionary growth. CEE standards were developed primarily to enable Fibre Channel traffic to be carried over Ethernet networks. This required enhancing the existing Ethernet standards to make them lossless on a per‐priority traffic basis, and to provide a mechanism to carry converged (LAN/SAN/IPC) traffic on a single physical link. Although CEE standards were designed with FCoE in mind, they are not limited to FCoE installations. CEE features can be utilized in traditional LAN (non‐FCoE) networks to provide lossless guarantees on a per‐priority basis, and to provide efficient bandwidth allocation based on application needs. Turning CEE On or Off By default on the CN4093, CEE is turned off. To turn CEE on or off, use the following ISCLI configuration mode commands: CN 4093(config)# [no] cee enable CAUTION: Turning CEE on will automatically change some 802.1p QoS and 802.3x standard flow control settings on the CN4093. Read the following material carefully to determine whether you will need to take action to reconfigure expected settings. It is recommended that you backup your configuration prior to turning CEE on. Viewing the file will allow you to manually re‐create the equivalent configuration once CEE is turned on, and will also allow you to recover your prior configuration if you need to turn CEE off. Effects on Link Layer Discovery Protocol When CEE is turned on, Link Layer Discovery Protocol (LLDP) is automatically ...
It is recommended that a configuration backup be made prior to turning CEE on or off. Viewing the configuration file will allow the administrator to manually re‐create the equivalent configuration under the new CEE mode, and will also allow for the recovery of the prior configuration if necessary. Effects on Flow Control When CEE is off (the default), 802.3x standard flow control is enabled on all switch ports by default. When CEE is turned on, standard flow control is disabled on all ports, and in its place, PFC (see “Priority‐Based Flow Control” on page 312) is enabled on all ports for 802.1p priority value 3. This default is chosen because priority value 3 is commonly used to identify FCoE traffic in a CEE environment and must be guaranteed lossless behavior. PFC is disabled for all other priority values. It is recommend that a configuration backup be made prior to turning CEE on or off. Viewing the configuration file will allow the administrator to manually re‐create the equivalent configuration under the new CEE mode, and will also allow for the recovery of the prior configuration if necessary. When CEE is on, PFC can be enabled only on priority value 3 and one other priority. If flow control is required on additional priorities on any given port, consider using standard flow control on that port, so that regardless of which priority traffic becomes congested, a flow control frame is generated. CN4093 Application Guide for N/OS 8.4...
Port Aggregation Enterprise NOS 8.4 supports port aggregation for FCoE connections. Link Aggregation (LAGs) can be used for separate FCoE traffic, or for Ethernet and FCoE traffic. The ports can be grouped as static LAGS or dynamic LACP LAGs. Normal aggregation operations such as creating or enabling a LAG, and adding or removing member ports can be performed. When a port is added to a LAG, FCFs previously detected on the port will be deleted. The deleted FCF may be relearned later. However, this may cause flickering in the network traffic. It is recommended that any LAG changes are made prior to live FCoE traffic. Priority‐based Flow Control (PFC) and Data Center Bridging (DCBX) are configured on a per‐port basis. Each port in a LAG must have the same ETS, PFC and DCBX configuration. When a port ceases to be a LAG member, its configuration does not change. Note: If the ports chosen to be part of a certain LAG do not have the same PFC, ETS or DCBX configurations, the switch will display an error. Global FIP Snooping Settings By default, the FIP snooping feature is turned off for the CN4093. The following commands are used to turn the feature on or off: CN 4093(config)# [no] fcoe fips enable Note: FIP snooping requires CEE to be turned on (see “Turning CEE On or Off” on page 302). When FIP snooping is on, port participation may be configured on a port‐by‐port basis (see below). When FIP snooping is off, all FCoE‐related ACLs generated by the feature are removed from all switch ports. FIP Snooping for Specific Ports When FIP snooping is globally turned on, ports may be individually configured for ...
FCoE Connection Timeout FCoE‐related ACLs and VLANs are added, changed, and removed as FCoE device connection and disconnection are discovered. In addition, the administrator can enable or disable automatic removal of ACLs and VLANs for FCFs and other FCoE connections that timeout (fail or are disconnected) without FIP notification. By default, automatic removal of ACLs upon timeout is enabled. To change this function, use the following CLI command: CN 4093(config)# [no] fcoe fips timeout-acl FCoE ACL Rules When FIP Snooping is enabled on a port, the switch automatically installs the appropriate ACLs to enforce the following rules for FCoE traffic: Ensure that FIP frames from ENodes may only be addressed to FCFs. Flag important FIP packets for switch processing. Ensure no end device uses an FCF MAC address as its source. Each FCoE port is assumed to be connected to an ENode and include ENode‐specific ACLs installed, until the port is either detected or configured to be connected to an external FCF. Ports that are configured to have FIP snooping disabled will not have any FIP or FCoE related ACLs installed. Prevent transmission of all FCoE frames from an ENode prior to its successful completion of login (FLOGI) to the FCF. After successful completion of FLOGI, ensure that the ENode uses only those FCoE source addresses assigned to it by the FCF. After successful completion of FLOGI, ensure that all ENode FCoE source ...
Operational Commands The administrator may use the operational commands to delete FIP‐related entries from the switch. To delete a specific FCF entry and all associated ACLs from the switch, use the following command: CN 4093# no fcoe fips fcf <FCF MAC address> [<VLAN number>] FIP Snooping Configuration In this example, as shown in Figure 32 on page 300, port INTA1 is connected to an ENode, and EXT22 is connected to the Fibre Channel network via an internal FCF (see“Fibre Channel” on page 329). FIP snooping can be configured on these ports using the following CLI commands: 1. Enable VLAN tagging on FCoE ports: CN 4093(config)# interface port INTA1, EXT22 (Select FCoE port) CN 4093(config-if)# switchport mode trunk (Enable VLAN tagging) CN 4093(config-if)# exit (Exit port configuration mode) 2.
Priority-Based Flow Control Priority‐based Flow Control (PFC) is defined in IEEE 802.1Qbb. PFC extends the IEEE 802.3x standard flow control mechanism. Under standard flow control, when a port becomes busy, the switch manages congestion by pausing all the traffic on the port, regardless of the traffic type. PFC provides more granular flow control, allowing the switch to pause specified types of traffic on the port, while other traffic on the port continues. PFC pauses traffic based on 802.1p priority values in the VLAN tag. The administrator can assign different priority values to different types of traffic and then enable PFC for up to two specific priority values: priority value 3, and one other. The configuration can be applied on a port‐by‐port basis, or globally for all ports on the switch. Then, when traffic congestion occurs on a port (caused when ingress traffic exceeds internal buffer thresholds), only traffic with priority values where PFC is enabled is paused. Traffic with priority values where PFC is disabled proceeds without interruption but may be subject to loss if port ingress buffers become full. Although PFC is useful for a variety of applications, it is required for FCoE implementation where storage (SAN) and networking (LAN) traffic are converged on the same Ethernet links. Typical LAN traffic tolerates Ethernet packet loss that can occur from congestion or other factors, but SAN traffic must be lossless and requires flow control. For FCoE, standard flow control would pause both SAN and LAN traffic during congestion. While this approach would limit SAN traffic loss, it could degrade the performance of some LAN applications that expect to handle congestion by dropping traffic. PFC resolves these FCoE flow control issues. Different types of SAN and LAN traffic can be assigned different IEEE 802.1p priority values. PFC can then be enabled for priority values that represent SAN and LAN traffic that must be paused during congestion, and disabled for priority values that represent LAN traffic that is more loss‐tolerant. PFC requires CEE to be turned on (“Turning CEE On or Off” on page 302). When CEE is turned on, PFC is enabled on priority value 3 by default. Optionally, the administrator can also enable PFC on one other priority value, providing lossless handling for another traffic type, such as for a business‐critical LAN application. Note: For any given port, only one flow control method can be implemented at any given time: either PFC or standard IEEE 802.3x flow control. CN4093 Application Guide for N/OS 8.4...
PFC Configuration Example Note: DCBX may be configured to permit sharing or learning PFC configuration with or from external devices. This example assumes that PFC configuration is being performed manually. See “Data Center Bridging Capability Exchange” on page 322 for more information on DCBX. This example is consistent with the network shown in Figure 32 on page 300. In this example, the following topology is used. Table 29. Port‐Based PFC Configuration Switch 802.1p Usage Port Priority Setting EXT1 0‐2 Disabled (not used) Enabled Business‐critical LAN Enabled others (not used) Disabled EXT22 Fiber Channel network Enabled INTA1 FCoE Enabled others (not used) Disabled INTA2 0‐2...
Enhanced Transmission Selection Enhanced Transmission Selection (ETS) is defined in IEEE 802.1Qaz. ETS provides a method for allocating port bandwidth based on 802.1p priority values in the VLAN tag. Using ETS, different amounts of link bandwidth can specified for different traffic types (such as for LAN, SAN, and management). ETS is an essential component in a CEE environment that carries different types of traffic, each of which is sensitive to different handling criteria, such as Storage Area Networks (SANs) that are sensitive to packet loss, and LAN applications that may be latency‐sensitive. In a single converged link, such as when implementing FCoE, ETS allows SAN and LAN traffic to coexist without imposing contrary handling requirements upon each other. The ETS feature requires CEE to be turned on (see “Turning CEE On or Off” on page 302). 802.1p Priority Values Under the 802.1p standard, there are eight available priority values, with values numbered 0 through 7, which can be placed in the priority field of the 802.1Q VLAN tag: 16 bits 3 bits 12 bits Tag Protocol ID (0x8100) Priority C VLAN ID 15 16 Servers and other network devices may be configured to assign different priority values to packets belonging to different traffic types (such as SAN and LAN). ETS uses the assigned 802.1p priority values to identify different traffic types. The ...
Assigning Priority Values to a Priority Group Each priority group may be configured from its corresponding ETS Priority Group, available using the following command: CN 4093(config)# cee global ets priority-group pgid <group number (0‐7, or 15)> priority <priority list> where priority list is one or more 802.1p priority values (with each separated by a comma). For example, to assign priority values 0 through 2: CN 4093(config)# cee global ets priority-group pgid <group number (0‐7, or 15)> priority 0,1,2 Note: Within any specific PGID, the PFC settings (see “Priority‐Based Flow Control” on page 312) should be the same (enabled or disabled) for all priority values within the group. PFC can be enabled only on priority value 3 and one other priority. If the PFC setting is inconsistent within a PGID, a warning message is reported when attempting to apply the configuration. When assigning priority values to a PGID, the specified priority value will be automatically removed from its old group and assigned to the new group when the configuration is applied.
Configuring ETS Consider an example consistent with that used for port‐based PFC configuration (on page 314): Table 30. ETS Configuration Priority Usage PGID Bandwidth LAN (best effort delivery) LAN (best effort delivery) LAN (best effort delivery) SAN (Fibre Channel over Ethernet, with PFC) Business Critical LAN (lossless Ethernet, with PFC) Latency‐sensitive LAN Latency‐sensitive LAN Network Management (strict) unlimited The example shown in Table 30 is only slightly different than the default configuration shown in Figure 33 on page 316. In this example, latency‐sensitive LAN traffic (802.1p priority 5 through 6) are moved from priority group 2 to priority group 3. This leaves Business Critical LAN traffic (802.1p priority 4) in priority group 2 by itself. Also, a new group for network management traffic has been assigned. Finally, the bandwidth allocation for priority groups 1, 2, and 3 are revised. Note: DCBX may be configured to permit sharing or learning PFC configuration with or from external devices. This example assumes that PFC configuration is being performed manually. See “Data Center Bridging Capability Exchange” on page 322 for more information on DCBX. CN4093 Application Guide for N/OS 8.4...
Data Center Bridging Capability Exchange Data Center Bridging Capability Exchange (DCBX) protocol is a vital element of CEE. DCBX allows peer CEE devices to exchange information about their advanced capabilities. Using DCBX, neighboring network devices discover their peers, negotiate peer configurations, and detect misconfigurations. DCBX provides two main functions on the CN4093: Peer information exchange The switch uses DCBX to exchange information with connected CEE devices. For normal operation of any FCoE implementation on the CN4093, DCBX must remain enabled on all ports participating in FCoE. Peer configuration negotiation DCBX also allows CEE devices to negotiate with each other for the purpose of automatically configuring advanced CEE features such as PFC, ETS, and (for some CNAs) FIP. The administrator can determine which CEE feature settings on the switch are communicated to and matched by CEE neighbors, and also which CEE feature settings on the switch may be configured by neighbor requirements. The DCBX feature requires CEE to be turned on (see “Turning CEE On or Off” on page 302). DCBX Settings When CEE is turned on, DCBX is enabled for peer information exchange on all ports. For configuration negotiation, the following default settings are configured: Application Protocol: FCoE and FIP snooping is set for traffic with 802.1p priority 3 PFC: Enabled on 802.1p priority 3 Priority group 0 includes priority values 0 through 2, with bandwidth allocation of 10% Priority group 1 includes priority value 3, with bandwidth allocation of 50% ...
DCBX exchanges information regarding whether PFC is enabled or disabled on the port. The advertise flag is set or reset using the following command: CN 4093(config)# [no] cee port <port alias or number> dcbx pfc advertise The willing flag is set or reset using the following command: CN 4093(config)# [no] cee port <port alias or number> dcbx pfc willing DCBX exchanges information regarding ETS priority groups, including their 802.1p priority members and bandwidth allocation percentages. The advertise flag is set or reset using the following command: CN 4093(config)# [no] cee port <port alias or number> dcbx ets advertise The willing flag is set or reset using the following command: CN 4093(config)# [no] cee port <port alias or number> dcbx ets willing Configuring DCBX Consider an example consistent Figure 32 on page 300 and used with the previous ...
802.1p Priority & Usage EXT22 INTA1 Channel 3 FCoE Applications Switch 802.1p Priority & Usage Ethernet INTA2 EXT1 Business-Critical LAN Lenovo Chassis Servers In Figure 34 on page 326, a Fibre Channel network is connected to the CN4093 on port EXT22. The FCoE‐enabled CN4093 is internally connected to a blade server (ENode) through an FCoE‐enabled CNA on port INTA1. An internal FCF bridges the networks. 1. Configure FCoE ports as trunk ports and add them to FCoE VLAN for FCoE traffic and any Native VLAN (other than the FCoE VLAN) for FIP negotiation: CN 4093(config)# interface port INTA1 (Select FCoE ports) CN 4093(config-if)# switchport mode trunk (Enable VLAN tagging)
Ethernet vs. Fibre Channel As a converged switch, the CN4093 10 Gb Converged Scalable Switch provides simultaneous support of Ethernet and Fibre Channel networks. Ethernet is ubiquitous in modern networks. It is generally quick, easy, and inexpensive to implement. Ethernet is also flexible and dynamic by nature. Devices join and leave a well‐designed Ethernet network with little impact beyond their individual function. Because flux is the norm, Ethernet is classified as a “best effort” delivery protocol. This means that some loss of packets is acceptable, and that with multiple routes often available, packets in a stream may arrive at their destination out of sequence. Ethernet devices are expected to re‐request and resend lost packets, and reassemble data in the proper order at the destination. The Fibre Channel protocol adheres to a very different philosophy. Fibre Channel is most popular in storage networks end‐to‐end stability, reliability, and security are emphasized in favor over low cost and dynamic scalability. In Fibre Channel networks, the connecting ports must be fully authorized to communicate with their well‐defined neighbors. Bandwidth for properly connected devices is tuned to avoid loss due to congestion. Also, routes for traffic are converged in advance, ensuring that only one route is used by any given traffic stream so that packets arrive in their expected sequence. Ethernet and Fibre Channel networks are coming into contact with each other more frequently in modern networks. In some cases, legacy Fibre Channel devices are connected via Ethernet networks using Converged Enhanced Ethernet (CEE), a collection of recent Ethernet features designed to satisfy Fibre Channel delivery expectations. Although not the focus of this chapter, the CN4093 supports CEE and Fibre Channel over Ethernet (FCoE). For details, see “FCoE and CEE” on page 299. Another approach is to use converged switches such as the CN4093 to support direct connection to both Ethernet and Fibre Channel networks. This allows a “best of both worlds” approach, using ubiquitous Ethernet networks for regular traffic, and full connection to Fibre Channel networks for lossless applications and the legacy architecture of established Storage Area Networks. CN4093 Application Guide for N/OS 8.4...
Full-Fabric FC/FCoE Switch As a full fabric FC/FCoE switch, the CN4093 authenticates connecting neighbors, provides Fibre Channel IDs, enforces port security among zones, and informs neighboring devices of network changes. When acting as a full‐fabric switch, the CN4093 can be connected to NPV gateways or directly to Fibre Channel nodes. In full‐fabric mode, the CN4093 can be connected directly to another full fabric CN4093 or a Lenovo RackSwitch G8264CS through Fibre Channel ISL. For further details, see “E‐Ports” on page 341. Limitations In Enterprise NOS 8.4, CN4093 does not support the following Fibre Channel port types: FL ports connecting storage fabric loop devices. CN4093 Application Guide for N/OS 8.4...
Fibre Channel configuration requires that at least one pair of Omni Ports be set to Fibre Channel mode. The mode for Omni Port pairs or ranges can be configured using the following privileged configuration command: CN 4093(config)# [no] system port <low port>-<high port> type fc Fibre Channel VLANs On the CN4093, each Fibre Channel network connected to the switch must be assigned its own VLAN. For each VLAN used with Fibre Channel, following properties must be defined: VLAN number Switch role (NPV mode or full fabric mode) Port membership Fibre Channel ports roles (as uplink ports or node connections) The following commands are used to define a typical VLAN: Set or delete a VLAN CN 4093(config)# [no] vlan <VLAN number> FCoE networks typically use VLAN 1002. If using a different VLAN for FCoE, be sure that any connected servers and FCoE bridge will support your selection. This command initiates VLAN configuration mode. All VLAN‐related Fibre Channel configuration is performed in this mode. Enable or disable the VLAN CN 4093(config-vlan)# [no] shutdown Exit VLAN configuration mode ...
NPV Gateway As a Node Port Virtualized (NPV) gateway, the CN4093 can act as a Fibre Channel collector, connecting numerous Fibre Channel end‐point devices (known as nodes) for uplink to a Fibre Channel full fabric switch, performing stateless FC/FCoE encapsulation and decapsulation. For more details, see “NPV Gateway” on page 331. NPV Port Traffic Mapping Within each VLAN used with Fibre Channel, the physical ports may be used in the following roles: NPV External Interfaces All NPV gateways on the CN4093 must connect to a full fabric switch. The NPV external interface map specifies which Fibre Channel port or ports (Omni Ports set to Fibre Channel mode) are used for this purpose within each Fibre Channel VLAN. At least one Fibre Channel port is required, though two are typically used in order to provide redundancy. The following VLAN configuration command is used to define or remove the uplink: CN 4093(config-vlan)# [no] npv traffic-map external-interface <ports> Fibre Channel over Ethernet node Traffic from Ethernet ports which are properly configured to use CEE and FCoE (see “FCoE and CEE” on page 299) is permitted with no additional configuration. Ethernet Traffic on regular (non‐FCoE) Ethernet ports will be blocked on Fibre Channel VLANs. NPV Disruptive Load-Balancing Every server connected to the NPV gateway logs into an upstream FC switch ...
Full Fabric Mode As a full fabric FC/FCoE switch, the CN4093 authenticates connecting neighbors, provides Fibre Channel IDs, enforces port security among zones, and informs neighboring devices of network changes. For more details, see “Full‐Fabric FC/FCoE Switch” on page 332. Full Fabric Zoning The CN4093 supports Fibre Channel zones and zonesets for VLANs operating in full fabric mode. In NPV gateway mode, zoning is controlled by the upstream full fabric switch and is not configurable in the NPV gateway VLAN. Zoning allows logical grouping of ports and storage devices within a storage area network. Zoning defines access control between groups of servers and storage devices. A SAN typically is divided into zones and zonesets, as described in the following sections. Zones A zone is a logical grouping of end nodes that are permitted to interact with each other. Zones can be grouped into a zonesets, which can be activated or deactivated as a single entity. A zone provides security by restricting access to only those devices that reside within the zone. Zoning also confines change notification floods within each zone. Each zone contains one or more servers and one or more storage devices. Ports and devices in a zone are called zone members. A zone contains one or more zone members. A device can belong to one or more zones. End nodes that are members of a zone can communicate with each other, but they are isolated from nodes in other zones of which they are not a member. Note: Only use the default zoneset with a limited number of FCoE connections or for testing purposes. If you need multiple FCoE connections, it is recommended that you configure well‐defined zoning. If no zone is configured for the device, it resides in the default zone. You can configure the default zone to permit or deny its member devices to communicate with each other. You can specify zone members based on any of the following criteria: pWWN: The port World Wide Number is a unique ID represting a particular end node. The pWWN is a 64‐bit hexadecimal value (for example, ...
Page 340
Repeat as necessary for each member device. c. Exit from zone configuration: CN 4093(config-zone)# exit 3. For each desired zoneset: a. Name (or remove) the zoneset. CN 4093(config)# [no] zoneset name <zoneset name> b. Add (or remove) one or more member zones to the zoneset: CN 4093(config-zoneset)# [no] member <zone name> Repeat as necessary for each member zone. c. Exit from zoneset configuration: CN 4093(config-zone)# exit Activating Zoneset Fibre Channel is intended to operate with minimal disruption. To prevent the various synchronization events that would result if each stage of a live zoning configuration was applied, the cumulative configuration changes for zones and zoneset are held in reserve until explicitly activated by the administrator. When activated, the new zoneset will be synchronized throughout the Fibre Channel fabric for each modified zone. Fibre Channel traffic will be temporarily disrupted in modified zones as changes to the fabric are recognized by the connected devices. Until activation, the previously established zoneset will remain in effect. The basic zoneset commands are as follows: ...
Limitations Enterprise NOS supports ISL distance up to 3 kms. E‐ports can be configured only on Lenovo Flex System Fabric CN4093 10 Gb Converged Scalable Switch and Lenovo RackSwitch G8264CS. E‐ports cannot interoperate with the switches from other vendors. A maximum of eight switches are supported in a Fibre Channel fabric. A maximum of four E‐ports can be configured on a switch. Optimized FCoE Traffic Flow To optimize FCoE traffic flow between FCoE enodes, optimized‐forwarding feature installs appropriate ACL entries for logged‐in nodes. Usually, any FC/FCoE traffic in full fabric mode should go through FC module for Zone check. We can achieve low latency if the Zone check is done on Ethernet switch module for FCoE‐FCoE traffic. Optimized feature is enabled by default in Full fabric mode, and is not applicable to NPV mode. Note: FCoE‐FC and FC‐FC traffic is not optimized. If needed, the administrator can disable optimized‐forwarding feature. Prior to that, disable FIP snooping. Use the following commands: CN 4093(config)# no fcoe fips enable CN 4093(config)# no fcoe optimized-forwarding enable To re‐enable optimized‐forwarding feature, use the following command sequence: CN 4093(config)# no fcoe fips enable...
Example 1: NPV Gateway In this example, the CN4093 operates as an NPV gateway: Figure 35. Using the CN4093 as an NPV Gateway INTA1 FCoE EXT11 Storage Area Lenovo INTA2 FCoE Converged Network Switch INTA3 FCoE EXT12 INTA4 FCoE Full Fabric Switch Lenovo Chassis The switch connects to FCoE node ports to an external Fibre Channel full fabric switch. Because multiple nodes will share the CN4093 uplinks, the network must be configured as an NPV gateway. Note: Up to 12 Fibre Channel VLANs can be configured on the switch at any given time, any or all of which can be configured as NPV gateways. CN4093 Application Guide for N/OS 8.4...
FCoE Zone1 Converged Switch INTA7 FCoE Zone2 Fibre Channel EXT14 INTA8 FCoE Zone2 Server Zone1 Lenovo Chassis In this example network, the CN4093 acts as the full fabric switch for the Fibre Channel network in two zones. Note: Although up to 12 Fibre Channel VLANs can be configured on the switch at any given time, only one can operate in full fabric mode. The rest may be configured as NPV gateways. For instance, the full fabric configuration in this example can be used simultaneously with up to 11 NPV gateways configured as shown in the NPV example on page 346. 1. Specify which Omni Ports will be used for Fibre Channel devices: CN 4093(config)# system port ext13-ext14 type fc Note: On the CN4093, Fibre Channel devices can be connected only to Omni Ports. Omni Ports connected to FCoE devices are considered part of the Ethernet network and should be left to operate in Ethernet mode. 2. Enable tagging/trunk mode for internal ports participating in FCoE:...
EVB Operations Overview The ENOS includes a pre‐standards VSI Type Database (VSIDB) implemented through the System Networking Switch Center (SNSC), the Lenovo Flex System Manager (FSM), or the Lenovo System Networking Distributed Switch 5000V. The VSIDB is the central repository for defining sets of network policies that apply to VM network ports. You can configure only one VSIDB. Note: This document does not include the VSIDB configuration details. Please see the SNSC, FSM, or Lenovo System Networking Distributed Switch 5000V guide for details on how to configure VSIDB. The VSIDB operates in the following sequence: 1. Define VSI types in the VSIDB. The VSIDB exports the database when the CN4093 sends a request. 2. Create a VM. Specify VSI type for each VM interface. See the SNSC, FSM, or Lenovo System Networking Distributed Switch 5000V guide for details on how to specify the VSI type. The hypervisor sends a VSI ASSOCIATE, which contains the VSI type ID, to the switch port after the VM is started. The switch updates its configuration based on the requested VSI type. The switch configures the per‐VM bandwidth using the VMpolicy. The Enterprise NOS supports the following policies for VMs: ACLs Bandwidth metering VSIDB Synchronization The switch periodically checks for VSIDB changes based on the configured interval. You can configure this interval using the following command: CN 4093(config)# virt evb vsidb <number> CN 4093(conf-vsidb)# update-interval <time in seconds>...
Manual Reflective Relay Reflective Relay (RR) is an operation where the switch forwards a frame back to the port on which it arrived if the destination MAC address is on the same port. When an EVB profile is configured on a port, RR is automatically enabled on the port after capability exchange with the peer, using the IEEE802.1QBG protocol. This is the usual mode of operation. When the switch interoperates with devices that do not support IEEE 802.1QBG protocols, RR can be manually configured using the following command: CN 4093(config-if)# reflective-relay force Manual RR and EVB profile cannot be configured on a port at the same time. Note: If a port is a member of an isolated VLAN, the manual reflective relay will not work. See “Private VLANs” on page 153 for more information on isolated VLANs. CN4093 Application Guide for N/OS 8.4...
Page 354
Note: When you connect to a SNSC VSIDB, the port/docpath configuration is as follows: HTTP: Port: 40080 Docpath: snsc/rest/vsitypes HTTPS: Port: 40443 Docpath: snsc/rest/vsitypes When you connect to a 5000v VSIDB, the port/docpath configuration is as follows: Port: 80 Docpath: vsitypes CN4093 Application Guide for N/OS 8.4...
Limitations If both ACL and egress bandwidth metering are enabled, traffic will first be matched with the ACL and will not be limited by bandwidth metering. ACLs based on a source MAC or VLAN must match the source MAC and VLAN of the VM. If not, the policy will be ignored and you will see the following warning message: "vm: VSI Type ID 100 Associated mac 00:50:56:b6:c0:ff on port 6, ignore 1 mismatched ACL" Unsupported features The following features are not supported on ports configured with EVB: LAG/VLAG vNIC VMready CN4093 Application Guide for N/OS 8.4...
Configuring Static Multicast ARP To configure multicast MAC ARP, you must perform the following steps: Configure the static multicast forwarding database (FDB) entry: Since there is no port list specified for static multicast ARP, and the associated MAC address is multicast, you must specify a static multicast FDB entry for the cluster MAC address to limit the multicast domain. If there is no static multicast FDB entry defined for the cluster MAC address, traffic will not be forwarded. Use the following command: CN 4093(config)# mac-address-table multicast <cluster MAC address> <port(s)> Configure the static multicast ARP entry: Multicast ARP static entries should be configured without specifying the list of ports to be used. Use the following command: CN 4093(config)# ip arp <destination unicast IP address> <destination multicast MAC address> vlan <cluster VLAN number> Configuration Example Consider the following example: Cluster unicast IP address: 10.10.10.42 Cluster multicast MAC address: 03:bf:0a:0a:0a:2a Cluster VLAN: 42 List of individual or port LAGs to which traffic should be forwarded: 54 and 56 Following are the steps to configure the static multicast ARP based on the given ...
Limitations You must configure the ARP only in the Layer 2/Layer 3 node or the router node but not in the Layer 2‐only node. Enterprise NOS cannot validate if the node is Layer 2‐only. The packet is always forwarded to all the ports as specified in the Multicast MAC address configuration. If VLAN membership changes for the ports, you must update this static multicast MAC entry. If not, the ports, whose membership has changed, will report discards. ACLs take precedence over static multicast ARP. If an ACL is configured to match and permit ingress of unicast traffic, the traffic will be forwarded based on the ACL rule, and the static multicast ARP will be ignored. CN4093 Application Guide for N/OS 8.4...
UFP Limitations The following limitations apply when configuring UFP: FCoE must be configured only on vPort 2 of the physical NIC for Emulex CNA and on vPort 1 of the physical NIC for Qlogic CNA. For Emulex NIC CN4052, FCoE can be configured on vPort 2 or vPort 3. UFP port in FCoE mode cannot operate with FIP auto‐VLAN feature. VLANs that have member vPorts configured in trunk, access or auto modes cannot have member vPorts configured in tunnel mode or FCoE. vPorts on a physical port must be members of separate VLANs. VLANs 4002‐4009 are reserved for outer tagging. A UFP‐enabled port with no vPorts configured cannot belong to the same VLAN as a UFP‐enabled port that has vPorts configured in trunk, access or auto modes. UFP bandwidth is guaranteed lossless only for unicast traffic. VMready is supported only on a vPort which is configure in auto‐VLAN mode. When a vPort is in auto‐VLAN mode, it can support up to 32 VMGroups. EVB is supported only on a vPort which is configured in auto‐VLAN mode. VMready and EVB cannot be configured on the same physical port. UFP vPorts support up to 1024 VLANs in trunk and auto mode on the switch in standalone mode. Stacking switches have a limitation of 256 VLANs in both auto and trunk mode. When CEE is turned on, FCoE vPort must be used for lossless priority traffic. For loss‐tolerant priority traffic, a non‐FCoE UFP vPort must be used. The lossless property of FCoE vPort is not guaranteed, if lossless and loss‐tolerant traffic are combined. When the vPort is enabled and the channel link state is up, the system does not support changing vPort VLAN type from private/non‐private to ...
Use tunnel mode to send all VM data traffic to an upstream switch, for Layer 2 or Layer 3 processing, in one domain. In such cases, the UFP port or vPort must be in tunnel mode and the upstream switch port must be in 802.1Q trunk mode. Note: Two vPorts on a physical port cannot be members of the same VLAN. Figure 38. Packet pass‐through in Tunnel Mode Server vNICs vPorts Lenovo Switch Ports without vNICs OS/Hypervisor Regular NIC attaches UFP Switching uses outer tag; Switch strips VLAN ID Channel VLAN ID Ignores regular VLAN outer tag...
UFP Bandwidth Provisioning UFP provides two modes of bandwidth provisioning for vPort: Enhanced Transmission Selection (ETS) mode and Strict Bandwidth Provisioning mode. Enhanced Transmission Selection mode Enhanced Transmission Selection (ETS) mode of bandwidth provisioning is useful when an end‐to‐end QoS framework for the entire data center, with bandwidth provisioning for different applications, is desired. ETS mode color marks traffic from point of origination to point of destination. It helps to couple QoS provisioning in the access layer with data center fabric. Note: ETS mode requires Converged Enhanced Ethernet (CEE) to be enabled globally. This mode functions with the ETS feature available on the CN4093. You must first define the ETS characteristics of the CN4093. Assign each vPort to the desired traffic class by assigning a system class priority. The Data Center Bridging Capabilities Exchange (DCBX) and UFP protocols propagate the configured parameters for the vPort to apply appropriate traffic coloring and shaping at the source. When operating in this mode, traffic scheduling and bandwidth allocation behavior on switch egress is driven by the ETS class of traffic. When two vPorts use the same traffic class configuration, the order in which switch schedules traffic at egress depends on the order the traffic arrives at egress buffer. Since bandwidth allocation is derived from traffic class rather than vNIC, switch egress doesn’t differentiate between different vPort traffics. In a virtualized environment, the hypervisor or guest VM may define its own traffic class priority. When configured this way, the priority defined by the OS or Hypervisor takes precedence over vPort‐configured priority. Use the following commands to configure ETS bandwidth provisioning: 1. Enable UFP ETS mode on a specific port: CN 4093(config)# ufp port <port alias or number> qos-mode ets 2.
Using UFP with Other CN4093 10 Gb Converged Scalable Switch Features UFP works with other CN4093 features, as described with limitations and details. Layer 2 Failover UFP failover can be configured with auto‐monitoring or manual monitoring. In auto‐monitoring, a vPort is automatically associated with a Failover trigger if it has any VLAN in common with the monitor ports. Layer 2 failover is not supported on UFP ports in auto mode. For more information on failover, see “Layer 2 Failover” on page 515. For an example configuration, see “Example 8: Layer 2 Failover Configuration” on page 379. Increased VLAN Limits Configured with UFP and VLANs, a vPort can support up to 1024 VLANs. A UFP port supports 1024 VLANs on the switch in standalone mode. For more information on VLAN configuration, see “VLANs” on page 137. Private VLANs It supports the following Private VLAN modes in UFP vPorts: Disabled Trunk Promiscuous Host ...
UFP Configuration Examples Following is an example configuration of UFP vPorts in access mode. Example 1: Access Mode 1. Turn on UFP. CN4093(config)# ufp enable 2. Configure internal port as UFP. CN4093(config)# ufp port INTA1 enable Warning: "Tagging/Trunk-mode" is enabled on UFP port INTA1 3. Configure virtual port. CN4093(config)# ufp port INTA1 vport 1 4. Configure vPort access mode. CN4093(config_ufp_vport)# network mode access 5.
11. Verify the virtual machine settings. CN4093(config)# show virt vm 12. Add the virtual machine associated with the vPort to the VMGroup. CN4093(config)# virt vmgroup 1 vm 1 13. Verify the VMGroup associations. CN4093(config)# show virt vm Example 4: Auto-VLAN Mode with Edge Virtual Bridging Following is an example configuration of UFP vPorts in auto mode. 1. Turn on UFP. CN 4093(config)# ufp enable 2. Configure internal port 1 as UFP. CN4093(config)# ufp port INTA1 enable Warning: "Tagging/Trunk-mode"...
7. Enable the vPort. CN4093(config_ufp_vport)# enable CN4093(config_ufp_vport)# exit 8. Configure tagging of ingress frames with the port’s VLAN ID on external port 1. CN4093(config)# interface port EXT1 CN4093(config-if)# tagpvid-ingress CN4093(config-if)# no vlan dot1q tag native CN4093(config-if)# switchport access vlan 4000 CN4093(config-if)# exit Example 6: FCoE Mode Following is an example configuration of UFP vPorts in FCoE mode. This example is consistent with the network shown in Figure 32 on page 300. 1. Enable CEE. CN4093(config)# cee enable 2.
SPAR Processing Modes SPAR operates in two processing modes. The default mode is pass‐through domain. Local Domain: In local‐domain processing mode, VLAN classification and assignment is based on the user‐defined VLAN. Pass‐through Domain: In pass‐through domain processing mode, VLAN classification and assignment is based on the outer tag, which contains the unique domain VLAN ID of the SPAR. The inner tag with the user‐defined VLAN remains unchanged. Local Domain Processing Each SPAR on a switch has a unique VLAN ID, which separates data between SPARs. If multiple networks share the uplink, the upstream switch port must be configured as a 802.1Q trunk port so it can process multiple VLAN traffic from a SPAR. The SPAR domain uses a single uplink port or LAG shared among all the VLANs. For link redundancy or greater bandwidth, the uplinks can be grouped as static or LACP LAG. If a VLAN is defined on multiple SPARs, the egress port mask is used to prevent communication between the SPARs in the same local domain VLAN. Since port membership of each SPAR is unique, the egress port mask ensures that different SPAR ports in the same local domain VLAN do not communicate with each other. In local domain processing, all SPAR ports must have the following settings: Tagging/Trunk mode must be enabled. Ingress VLAN tagging is disabled on all SPAR ports. PVID/Native VLAN is based on any VLAN defined in SPAR. CN 4093(config)# interface port <num> CN 4093(config-if)# switchport trunk native vlan <VLAN number> CN4093 Application Guide for N/OS 8.4...
Limitations The following limitations apply: UFP and SPAR cannot be configured together. LAGs must first be configured for SPAR before they can be used. Static or Link Aggregation Control Protocol (LACP) LAGs created on the global switch cannot reference any SPAR ports. Use the commands in the following menus to define LAGs in the SPAR context: CN 4093(config)# spar <num> CN 4093(config-spar)# uplink ? adminkey Set lacp trunk for uplink port Set external port for uplink PortChannel Set portchannel for uplink CN 4093(config)# portchannel ? <1-64> PortChannel group <65-128>...
SPAR VLAN Management SPAR VLANs use the same 4000 VLAN space available for other applications/features on the switch. The VLAN ID can be in the range of 2 ‐ 4094. VLAN 1 and the management VLAN 4095 are reserved for the global switch context. A VLAN assigned to a SPAR cannot be used for any other switch application. Similarly, VLAN used by any other switch application cannot be assigned to a SPAR. SPAR member ports cannot be members of any other VLAN. CN4093 Application Guide for N/OS 8.4...
Page 390
3. Set the SPAR to local domain mode. CN 4093(config-spar)# domain mode local 4. Configure SPAR VLAN to 4082. CN 4093(config-spar)# domain default vlan 4082 5. Add server ports INTA11 through INTA14. CN 4093(config-spar)# domain default member INTA11-INTA14 6. Configure the VLANs for SPAR 2. Each SPAR has a set of local domains numbered 1 through 32, each of which identifies an allowed VLAN. The following steps create three local domains: VLAN, 10, 20, and 30 7. Create local domain 1, assign VLAN 10, and specify the SPAR ports that are members of the that VLAN. CN 4093(config-spar)# domain local 1 vlan 10 CN 4093(config-spar)# domain local 1 member INTA11-INTA14 CN 4093(config-spar)# domain local 1 enable 8.
Page 394
Take a closer look at the CN4093 in the following configuration example: Figure 40. Switch‐Based Routing Topology First Floor Second Floor 10/100 Client Subnet 10/100 Client Subnet 100.20.10.2-254 131.15.15.2-254 10 Gbps Server Subnet: 206.30.15.2-254 Primary Default IF#2 IF#3 Router: 205.21.17.1 IF#4 IF#1 10 Gbps Secondary Default Router: 205.21.17.2 The CN4093 connects the Gigabit Ethernet and Fast Ethernet LAGs from various switched subnets throughout one building. Common servers are placed on another subnet attached to the switch. A primary and backup router are attached to the switch on yet another subnet. Without Layer 3 IP routing on the switch, cross‐subnet communication is relayed to the default gateway (in this case, the router) for the next level of routing ...
Page 396
3. Set each server and workstation’s default gateway to the appropriate switch IP interface (the one in the same subnet as the server or workstation). 4. Configure the default gateways to the routers’ addresses. Configuring the default gateways allows the switch to send outbound traffic to the routers: CN 4093(config)# ip gateway 1 address 205.21.17.1 enable CN 4093(config)# ip gateway 2 address 205.21.17.2 enable 5. Verify the configuration. CN 4093(config)# show interface ip Examine the resulting information. If any settings are incorrect, make the appropriate changes. CN4093 Application Guide for N/OS 8.4...
Page 398
Each time you add a port to a VLAN, you may get the following prompt: Port 4 is an untagged port and its current PVID is 1. Confirm changing PVID from 1 to 2 [y/n]? Enter y to set the default Port VLAN ID (PVID) for the port. 3. Add each IP interface to the appropriate VLAN. Now that the ports are separated into three VLANs, the IP interface for each subnet must be placed in the appropriate VLAN. From Table 35, the settings are made as follows: CN 4093(config)# interface ip 1 (Select IP interface 1) CN 4093(config-ip-if)# vlan 2 (Add VLAN 2) CN 4093(config-vlan)# exit CN 4093(config)# interface ip 2 (Select IP interface 2) CN 4093(config-ip-if)# vlan 1...
Domain-Specific BOOTP Relay Agent Configuration Use the following commands to configure up to four domain‐specific BOOTP relay agents for each of up to 10 VLANs: CN 4093(config)# ip bootp-relay bcast-domain <1‐10> vlan <VLAN number> CN 4093(config)# ip bootp-relay bcast-domain <1‐10> server <1‐5> address <IPv4 address> CN 4093(config)# ip bootp-relay bcast-domain <1‐10> enable As with global relay agent servers, domain‐specific BOOTP/DHCP functionality may be assigned on a per‐interface basis. CN4093 Application Guide for N/OS 8.4...
IP address in the server response represents the interface address on the switch that received the client request. This interface address tells the switch on which VLAN to send the server response to the client. DHCP Relay Agent Configuration To enable the CN4093 to be the BOOTP forwarder, you need to configure the DHCP/BOOTP server IP addresses on the switch. Generally, you should configure the switch IP interface on the client side to match the client’s subnet, and configure VLANs to separate client and server subnets. The DHCP server knows from which IP subnet the newly allocated IP address should come. The following figure shows a basic DHCP network example: Figure 42. DHCP Relay Agent Configuration Boston GbESM 20.1.1.1 DHCP Client DHCP Server In CN4093 implementation, there is no need for primary or secondary servers. The client request is forwarded to the BOOTP servers configured on the switch. The use of two servers provide failover redundancy. However, no health checking is supported. Use the following commands to configure the switch as a DHCP relay agent: CN 4093(config)# ip bootp-relay server 1 <IP address> CN 4093(config)# ip bootp-relay server 2 <IP address> CN 4093(config)# ip bootp-relay server 3 <IP address>...
IPv6 Limitations The following IPv6 features are not supported in this release. Dynamic Host Control Protocol for IPv6 (DHCPv6) Border Gateway Protocol for IPv6 (BGP) Routing Information Protocol for IPv6 (RIPng) Most other Enterprise NOS 8.4 features permit IP addresses to be configured using either IPv4 or IPv6 address formats. However, the following switch features support IPv4 only: Default switch management IP address Bootstrap Protocol (BOOTP) and DHCP RADIUS, TACACS+ and LDAP QoS metering and re‐marking ACLs for out‐profile traffic VMware Virtual Center (vCenter) for VMready Routing Information Protocol (RIP) Internet Group Management Protocol (IGMP) Border Gateway Protocol (BGP) Virtual Router Redundancy Protocol (VRRP) sFLOW CN4093 Application Guide for N/OS 8.4...
IPv6 Address Types IPv6 supports three types of addresses: unicast (one‐to‐one), multicast (one‐to‐many), and anycast (one‐to‐nearest). Multicast addresses replace the use of broadcast addresses. Unicast Address Unicast is a communication between a single host and a single receiver. Packets sent to a unicast address are delivered to the interface identified by that address. IPv6 defines the following types of unicast address: Global Unicast address: An address that can be reached and identified globally. Global Unicast addresses use the high‐order bit range up to FF00, therefore all non‐multicast and non‐link‐local addresses are considered to be global unicast. A manually configured IPv6 address must be fully specified. Auto‐configured IPv6 addresses are comprised of a prefix combined with the 64‐bit EUI. RFC 4291 defines the IPv6 addressing architecture. The interface ID must be unique within the same subnet. Link‐local unicast address: An address used to communicate with a neighbor on the same link. Link‐local addresses use the format FE80::EUI Link‐local addresses are designed to be used for addressing on a single link for purposes such as automatic address configuration, neighbor discovery, or when no routers are present. Routers must not forward any packets with link‐local source or destination addresses to other links. Multicast Address Multicast is communication between a single host and multiple receivers. Packets are sent to all interfaces identified by that address. An interface may belong to any number of multicast groups. A multicast address (FF00 ‐ FFFF) is an identifier for a group interface. The multicast address most often encountered is a solicited‐node multicast address using prefix FF02::1:FF00:0000/104 with the low‐order 24 bits of the unicast or anycast address. The following well‐known multicast addresses are pre‐defined. The group IDs defined in this section are defined for explicit scope values, as follows: FF00:::::::0 through FF0F:::::::0 CN4093 Application Guide for N/OS 8.4...
IPv6 Address Auto-configuration IPv6 supports the following types of address auto‐configuration: Stateful address configuration Address configuration is based on the use of a stateful address configuration protocol, such as DHCPv6, to obtain addresses and other configuration options. Stateless address configuration Address configuration is based on the receipt of Router Advertisement messages that contain one or more Prefix Information options. Enterprise NOS 8.4 supports stateless address configuration. Stateless address configuration allows hosts on a link to configure themselves with link‐local addresses and with addresses derived from prefixes advertised by local routers. Even if no router is present, hosts on the same link can configure themselves with link‐local addresses and communicate without manual configuration. CN4093 Application Guide for N/OS 8.4...
Neighbor Discovery The switch uses Neighbor Discovery protocol (ND) to gather information about other router and host nodes, including the IPv6 addresses. Host nodes use ND to configure their interfaces and perform health detection. ND allows each node to determine the link‐layer addresses of neighboring nodes, and to keep track of each neighbor’s information. A neighboring node is a host or a router that is linked directly to the switch. The switch supports Neighbor Discovery as described in RFC 4861. Neighbor Discover messages allow network nodes to exchange information, as follows: Neighbor Solicitations allow a node to discover information about other nodes. Neighbor Advertisements are sent in response to Neighbor Solicitations. The Neighbor Advertisement contains information required by nodes to determine the link‐layer address of the sender, and the sender’s role on the network. IPv6 hosts use Router Solicitations to discover IPv6 routers. When a router receives a Router Solicitation, it responds immediately to the host. Routers uses Router Advertisements to announce its presence on the network, and to provide its address prefix to neighbor devices. IPv6 hosts listen for Router Advertisements, and uses the information to build a list of default routers. Each host uses this information to perform autoconfiguration of IPv6 addresses. Redirect messages are sent by IPv6 routers to inform hosts of a better first‐hop address for a specific destination. Redirect messages are only sent by routers for unicast traffic, are only unicast to originating hosts, and are only processed by hosts. ND configuration for various advertisements, flags, and interval settings is performed on a per‐interface basis using the following command path: CN 4093(config)# interface ip <interface number> CN 4093(config-ip-if)# [no] ipv6 nd ? CN 4093(config-ip-if)# exit To add or remove entries in the static neighbor cache, use the following command ...
Supported Applications The following applications have been enhanced to provide IPv6 support. Ping The ping command supports IPv6 addresses. Use the following format to ping an IPv6 address: ping <host name>|<IPv6 address> [-n <tries (0‐4294967295)>] [-w <msec delay (0‐4294967295)>] [-l <length (0/32‐65500/2080)>] [-s <IP source>] [-v <TOS (0‐255)>] [-f] [-t] To ping a link‐local address (begins with FE80), provide an interface index, as follows: ping <IPv6 address>%<Interface index> [-n <tries (0‐4294967295)>] [-w <msec delay (0‐4294967295)>] [-l <length (0/32‐65500/2080)>] [-s <IP source>] [-v <TOS (0‐255)>] [-f] [-t] ...
IPv6 Configuration This section provides steps to configure IPv6 on the switch. Configuration Guidelines When you configure an interface for IPv6, consider the following guidelines: Support for subnet router anycast addresses is not available. Interface 125/126 are reserved for IPv6 management. A single interface can accept either IPv4 or IPv6 addresses, but not both IPv4 and IPv6 addresses. A single interface can accept multiple IPv6 addresses. A single interface can accept only one IPv4 address. If you change the IPv6 address of a configured interface to an IPv4 address, all IPv6 settings are deleted. A single VLAN can support only one IPv6 interface. Health checks are not supported for IPv6 gateways. IPv6 interfaces support Path MTU Discovery. The CPU’s MTU is fixed at 1500 bytes. Support for jumbo frames (1,500 to 9,216 byte MTUs) is limited. Any jumbo frames intended for the CPU must be fragmented by the remote node. The switch can re‐assemble fragmented packets up to 9k. It can also fragment and transmit jumbo packets received from higher layers. IPv6 Configuration Examples IPv6 Configuration Example 1 The following example uses IPv6 host mode to autoconfigure an IPv6 address for the interface. By default, the interface is assigned to VLAN 1.
IPsec Protocols The Enterprise NOS implementation of IPsec supports the following protocols: Authentication Header (AH) AHs provide connectionless integrity and data origin authentication for IP packets, and provide protection against replay attacks. In IPv6, the AH protects the AH itself, the Destination Options extension header after the AH, and the IP payload. It also protects the fixed IPv6 header and all extension headers before the AH, except for the mutable fields DSCP, ECN, Flow Label, and Hop Limit. AH is defined in RFC 4302. Encapsulating Security Payload (ESP) ESPs provide confidentiality, data origin authentication, integrity, an anti‐replay service (a form of partial sequence integrity), and some traffic flow confidentiality. ESPs may be applied alone or in combination with an AH. ESP is defined in RFC 4303. Internet Key Exchange Version 2 (IKEv2) IKEv2 is used for mutual authentication between two network elements. An IKE establishes a security association (SA) that includes shared secret information to efficiently establish SAs for ESPs and AHs, and a set of cryptographic algorithms to be used by the SAs to protect the associated traffic. IKEv2 is defined in RFC 4306. Using IKEv2 as the foundation, IPsec supports ESP for encryption and/or authentication, and/or AH for authentication of the remote partner. Both ESP and AH rely on security associations. A security association (SA) is the bundle of algorithms and parameters (such as keys) that encrypt and authenticate a particular flow in one direction. CN4093 Application Guide for N/OS 8.4...
Setting up Authentication Before you can use IPsec, you need to have key policy authentication in place. There are two types of key policy authentication: Preshared key (default) The parties agree on a shared, secret key that is used for authentication in an IPsec policy. During security negotiation, information is encrypted before transmission by using a session key created by using a Diffie‐Hellman calculation and the shared, secret key. Information is decrypted on the receiving end using the same key. One IPsec peer authenticates the other peerʹs packet by decryption and verification of the hash inside the packet (the hash inside the packet is a hash of the preshared key). If authentication fails, the packet is discarded. Digital certificate (using RSA algorithms) The peer being validated must hold a digital certificate signed by a trusted Certificate Authority and the private key for that digital certificate. The side performing the authentication only needs a copy of the trusted certificate authorities digital certificate. During IKEv2 authentication, the side being validated sends a copy of the digital certificate and a hash value signed using the private key. The certificate can be either generated or imported. Note: During the IKEv2 negotiation phase, the digital certificate takes precedence over the preshared key. Creating an IKEv2 Proposal With IKEv2, a single policy can have multiple encryption and authentication types, as well as multiple integrity algorithms. To create an IKEv2 proposal: 1. Enter IKEv2 proposal mode. CN 4093(config)# ikev2 proposal 2. Set the DES encryption algorithm. CN 4093(config-ikev2-prop)# encryption {3des|aes-cbc|des} (default: 3des) 3.
Enabling IKEv2 Preshared Key Authentication To set up IKEv2 preshared key authentication: 1. Enter the local preshared key. CN 4093(config)# ikev2 preshare-key local <preshared key, a string of 1‐256 chars> 2. If asymmetric authentication is supported, enter the remote key: CN 4093(config)# ikev2 preshare-key remote <preshared key> <IPv6 host> where the following parameters are used: preshared key A string of 1‐256 characters IPv6 host An IPv6‐format host, such as “3000::1” 3. Set up the IKEv2 identification type by entering one of the following commands: CN 4093(config)# ikev2 identity local address (use an IPv6 address) CN 4093(config)# ikev2 identity local email <email address> CN 4093(config)# ikev2 identity local fqdn <domain name>...
Using a Manual Key Policy A manual policy involves configuring policy and manual SA entries for local and remote peers. To configure a manual key policy, you need: The IP address of the peer in IPv6 format (for example, “3000::1”). Inbound/Outbound session keys for the security protocols. You can then assign the policy to an interface. The peer represents the other end of the security association. The security protocol for the session key can be either ESP or AH. To create and configure a manual policy: 1. Enter a manual policy to configure. CN 4093(config)# ipsec manual-policy <policy number> 2. Configure the policy. CN 4093(config-ipsec-manual)#peer <peer’s IPv6 address> CN 4093(config-ipsec-manual)#traffic-selector <IPsec traffic selector> CN 4093(config-ipsec-manual)#transform-set <IPsec transform set> CN 4093(config-ipsec-manual)#in-ah auth-key <inbound AH IPsec key> CN 4093(config-ipsec-manual)#in-ah auth-spi <inbound AH IPsec SPI> CN 4093(config-ipsec-manual)#in-esp cipher-key <inbound ESP cipher key>...
Using a Dynamic Key Policy When you use a dynamic key policy, the first packet triggers IKE and sets the IPsec SA and IKEv2 SA. The initial packet negotiation also determines the lifetime of the algorithm, or how long it stays in effect. When the key expires, a new key is automatically created. This helps prevent break‐ins. To configure a dynamic key policy: 1. Choose a dynamic policy to configure. CN 4093(config)# ipsec dynamic-policy <policy number> 2. Configure the policy. CN 4093(config-ipsec-dynamic)# peer <peer’s IPv6 address> CN 4093(config-ipsec-dynamic)# traffic-selector <index of traffic selector> CN 4093(config-ipsec-dynamic)# transform-set <index of transform set> CN 4093(config-ipsec-dynamic)# sa-lifetime <SA lifetime, in seconds> CN 4093(config-ipsec-dynamic)# pfs enable|disable where the following parameters are used: ...
Routing Updates RIP sends routing‐update messages at regular intervals and when the network topology changes. Each router “advertises” routing information by sending a routing information update every 30 seconds. If a router doesn’t receive an update from another router for 180 seconds, those routes provided by that router are declared invalid. The routes are removed from the routing table, but they remain in the RIP routes table. After another 120 seconds without receiving an update for those routes, the routes are removed from regular updates. When a router receives a routing update that includes changes to an entry, it updates its routing table to reflect the new route. The metric value for the path is increased by 1, and the sender is indicated as the next hop. RIP routers maintain only the best route (the route with the lowest metric value) to a destination. For more information see The Configuration Menu, Routing Information Protocol Configuration in the Enterprise NOS Command Reference. RIPv1 RIP version 1 uses broadcast User Datagram Protocol (UDP) data packets for the regular routing updates. The main disadvantage is that the routing updates do not carry subnet mask information. Hence, the router cannot determine whether the route is a subnet route or a host route. It is of limited usage after the introduction of RIPv2. For more information about RIPv1 and RIPv2, refer to RFC 1058 and RFC 2453. RIPv2 RIPv2 is the most popular and preferred configuration for most networks. RIPv2 expands the amount of useful information carried in RIP messages and provides a measure of security. For a detailed explanation of RIPv2, refer to RFC 1723 and RFC 2453. RIPv2 improves efficiency by using multicast UDP (address 224.0.0.9) data packets for regular routing updates. Subnet mask information is provided in the routing updates. A security option is added for authenticating routing updates, by using a shared password. Enterprise NOS supports using clear password for RIPv2. RIPv2 in RIPv1 Compatibility Mode Enterprise NOS allows you to configure RIPv2 in RIPv1compatibility mode, for using both RIPv2 and RIPv1 routers within a network. In this mode, the regular routing updates use broadcast UDP data packet to allow RIPv1 routers to receive those packets. With RIPv1 routers as recipients, the routing updates have to carry ...
Authentication RIPv2 authentication uses plain text password for authentication. If configured using Authentication password, then it is necessary to enter an authentication key value. The following method is used to authenticate a RIP message: If the router is not configured to authenticate RIPv2 messages, then RIPv1 and unauthenticated RIPv2 messages are accepted; authenticated RIPv2 messages are discarded. If the router is configured to authenticate RIPv2 messages, then RIPv1 and RIPv2 messages which pass authentication testing are accepted; unauthenticated and failed authentication RIPv2 messages are discarded. For maximum security, RIPv1 messages are ignored when authentication is enabled (interface ip <x>/ ip rip auth type/password); otherwise, the routing information from authenticated messages is propagated by RIPv1 routers in an unauthenticated manner. CN4093 Application Guide for N/OS 8.4...
Page 434
Use the following command to check the current valid routes in the routing table of the switch: CN 4093# show ip route For those RIP learnt routes within the garbage collection period, that are routes phasing out of the routing table with metric 16, use the following command: CN 4093# show ip rip routes Locally configured static routes do not appear in the RIP Routes table. CN4093 Application Guide for N/OS 8.4...
IGMP Snooping IGMP Snooping allows the switch to forward multicast traffic only to those ports that request it. IGMP Snooping prevents multicast traffic from being flooded to all ports. The switch learns which server hosts are interested in receiving multicast traffic, and forwards it only to ports connected to those servers. IGMP Snooping conserves bandwidth. With IGMP Snooping, the switch learns which ports are interested in receiving multicast data, and forwards multicast data only to those ports. In this way, other ports are not burdened with unwanted multicast traffic. The switch can sense IGMP Membership Reports from attached clients and act as a proxy to set up a dedicated path between the requesting host and a local IPv4 Multicast router. After the pathway is established, the switch blocks the IPv4 Multicast stream from flowing through any port that does not connect to a host member, thus conserving bandwidth. The client‐server path is set up as follows: An IPv4 Multicast Router (Mrouter) sends Membership Queries to the switch, which forwards them to all ports in a given VLAN. Hosts that want to receive the multicast data stream send Membership Reports to the switch, which sends a proxy Membership Report to the Mrouter. The switch sets up a path between the Mrouter and the host, and blocks all other ports from receiving the multicast. Periodically, the Mrouter sends Membership Queries to ensure that the host wants to continue receiving the multicast. If a host fails to respond with a Membership Report, the Mrouter stops sending the multicast to that path. The host can send an IGMP Leave packet to the switch, which responds with an IGMP Groups Specific Query in order to check if there are other clients that want to receive the multicast traffic for the group referenced in the Leave packet. If an IGMP Report is not received, the group is deleted from the port and the multicast path is terminated. The switch then sends a Proxy Leave packet to the Mrouter in order to update it. If the FastLeave option is enabled on a VLAN, the multicast path is terminated immediately and the Leave packet is directly forwarded to the Mrouter. CN4093 Application Guide for N/OS 8.4...
IGMP Snooping Configuration Example This section provides steps to configure IGMP Snooping on the CN4093, using the Command‐Line Interface (CLI). 1. Configure port and VLAN membership on the switch. 2. Add VLANs to IGMP Snooping and enable IGMP Snooping. CN 4093(config)# ip igmp snoop vlan 1 CN 4093(config)# ip igmp snoop enable 3. Enable IGMPv3 Snooping (optional). CN 4093(config)# ip igmp snoop igmpv3 enable 4. Enable IGMP. CN 4093(config)# ip igmp enable (Turn on IGMP) 5.
IGMP Relay The CN4093 can act as an IGMP Relay (or IGMP Proxy) device that relays IGMP multicast messages and traffic between an Mrouter and end stations. IGMP Relay allows the CN4093 to participate in network multicasts with no configuration of the various multicast routing protocols, so you can deploy it in the network with minimal effort. To an IGMP host connected to the CN4093, IGMP Relay appears to be an IGMP multicast router (Mrouter). IGMP Relay sends Membership Queries to hosts, which respond by sending an IGMP response message. A host can also send an unsolicited Join message to the IGMP Relay. To a multicast router, IGMP Relay appears as a host. The Mrouter sends IGMP host queries to IGMP Relay, and IGMP Relay responds by forwarding IGMP host reports and unsolicited join messages from its attached hosts. IGMP Relay also forwards multicast traffic between the Mrouter and end stations, similar to IGMP Snooping. You can configure up to two Mrouters to use with IGMP Relay. One Mrouter acts as the primary Mrouter, and one is the backup Mrouter. The CN4093 uses ICMP health checks to determine if the primary and backup mrouters are reachable. Configuration Guidelines Consider the following guidelines when you configure IGMP Relay: IGMP Relay is supported in stand‐alone (non‐stacking) mode only. IGMP Relay and IGMP Snooping/Querier are mutually exclusive—if you enable IGMP Relay, you must turn off IGMP Snooping/Querier. Add VLANs to the IGMP Relay list, using the following command: CN 4093(config)# ip igmp relay vlan <VLAN ID> If IGMP hosts reside on different VLANs, you must: Disable IGMP flooding. CN 4093(config)# vlan <VLAN ID>...
IGMP Querier IGMP Querier allows the switch to perform the multicast router (Mrouter) role and provide Mrouter discovery when the network or virtual LAN (VLAN) does not have a router. When the IGMP Querier feature is enabled on a VLAN, the switch participates in the Querier election process and has the possibility to be elected as Querier for the VLAN. The IGMP querier periodically broadcasts IGMP Queries and listens for hosts to respond with IGMP Reports indicating their IGMP group memberships. If multiple Mrouters exist on a given network, the Mrouters elect one as the querier, which performs all periodic membership queries. The election process can be based on IPv4 address or MAC address. Note: When IGMP Querier is enabled on a VLAN, the switch performs the role of IGMP querier only if it meets the IGMP querier election criteria. IGMP Querier Configuration Example Follow this procedure to configure IGMP Querier. 1. Enable IGMP and configure the source IPv4 address for IGMP Querier on a VLAN. CN 4093(config)# ip igmp enable CN 4093(config)# ip igmp querier vlan 2 source-ip 10.10.10.1 2. Enable IGMP Querier on the VLAN. CN 4093(config)# ip igmp querier vlan 2 enable 3.
Configuring the Range Each IGMP Filter allows you to set a start and end point that defines the range of IPv4 addresses upon which the filter takes action. Each IPv4 address in the range must be between 224.0.0.0 and 239.255.255.255. Configuring the Action Each IGMP filter can allow or deny IPv4 multicasts to the range of IPv4 addresses configured. If you configure the filter to deny IPv4 multicasts, then IGMP Membership Reports from multicast groups within the range are dropped. You can configure a secondary filter to allow IPv4 multicasts to a small range of addresses within a larger range that a primary filter is configured to deny. The two filters work together to allow IPv4 multicasts to a small subset of addresses within the larger range of addresses. Note: Lower‐numbered filters take precedence over higher‐number filters. For example, the action defined for IGMP Filter 1 supersedes the action defined for IGMP Filter 2. IGMP Filtering Configuration Example 1. Enable IGMP filtering on the switch. CN 4093(config) ip igmp filtering 2. Define an IGMP filter with IPv4 information. CN 4093(config) ip igmp profile 1 range 225.0.0.0 226.0.0.0 CN 4093(config) ip igmp profile 1 action deny CN 4093(config)
MLD Terms Following are the commonly used MLD terms: Multicast traffic: Flow of data from one source to multiple destinations. Group: A multicast stream to which a host can join. Multicast Router (Mrouter): A router configured to make routing decisions for multicast traffic. The router identifies the type of packet received (unicast or multicast) and forwards the packet to the intended destination. Querier: An Mrouter that sends periodic query messages. Only one Mrouter on the subnet can be elected as the Querier. Multicast Listener Query: Messages sent by the Querier. There are three types of queries: General Query: Sent periodically to learn multicast address listeners from an attached link. CN4093 uses these queries to build and refresh the Multicast Address Listener state. General Queries are sent to the link‐scope all‐nodes multicast address (FF02::1), with a multicast address field of 0, and a maximum response delay of query response interval. Multicast Address Specific Query: Sent to learn if a specific multicast address has any listeners on an attached link. The multicast address field is set to the IPv6 multicast address. Multicast Address and Source Specific Query: Sent to learn if, for a specified multicast address, there are nodes still listening to a specific set of sources. Supported only in MLDv2. Note: Multicast Address Specific Queries and Multicast Address and Source Specific Queries are sent only in response to State Change Reports, and never in response to Current State Reports. Multicast Listener Report: Sent by a host when it joins a multicast group, or in response to a Multicast Listener Query sent by the Querier. Hosts use these reports to indicate their current multicast listening state, or changes in the multicast listening state of their interfaces. These reports are of two types: Current State Report: Contains the current Multicast Address Listening State ...
How Flooding Impacts MLD When flood option is disabled, the unknown multicast traffic is discarded if no Mrouters are learned on the switch. You can set the flooding behavior by configuring the flood and cpu options. You can optimize the flooding to ensure that unknown IP multicast (IPMC) data packets are not dropped during the learning phase. The flooding options include: flood: Enable hardware flooding in VLAN for the unregistered IPMC; This option is enabled by default. cpu: Enable sending unregistered IPMC to the Mrouter ports. However, during the learning period, there will be some packet loss. The cpu option is enabled by default. You must ensure that the flood and optflood options are disabled. optflood: Enable optimized flooding to allow sending the unregistered IPMC to the Mrouter ports without having any packet loss during the learning period; This option is disabled by default; When optflood is enabled, the flood and cpu settings are ignored. The flooding parameters must be configured per VLAN. Enter the following command to set the flood or cpu options: CN 4093(config)# vlan <VLAN ID> CN 4093(config-vlan)# [no] flood CN 4093(config-vlan)# [no] cpu CN 4093(config-vlan)# [no] optflood MLD Querier An Mrouter acts as a Querier and periodically (at short query intervals) sends ...
Internal Routing Versus External Routing To ensure effective processing of network traffic, every router on your network needs to know how to send a packet (directly or indirectly) to any other location/destination in your network. This is referred to as internal routing and can be done with static routes or using active, internal dynamic routing protocols, such as RIP, RIPv2, and OSPF. Static routes should have a higher degree of precedence than dynamic routing protocols. If the destination route is not in the route cache, then the packets are forwarded to the default gateway which may be incorrect if a dynamic routing protocol is enabled. It is also useful to tell routers outside your network (upstream providers or peers) about the routes you can access in your network. External networks (those outside your own) that are under the same administrative control are referred to as autonomous systems (AS). Sharing of routing information between autonomous systems is known as external routing. External BGP (eBGP) is used to exchange routes between different autonomous systems whereas internal BGP (iBGP) is used to exchange routes within the same autonomous system. An iBGP is a type of internal routing protocol you can use to do active routing inside your network. It also carries AS path information, which is important when you are an ISP or doing BGP transit. The iBGP peers have to maintain reciprocal sessions to every other iBGP router in the same AS (in a full‐mesh manner) in order to propagate route information throughout the AS. If the iBGP session shown between the two routers in AS 20 was not present (as indicated in Figure 43), the top router would not learn the route to AS 50, and the bottom router would not learn the route to AS 11, even though the two AS 20 routers are connected via the Flex System and the Application Switch. Figure 43. iBGP and eBGP AS 11 AS 20 ISP A iBGP eBGP Internet...
What is a Route Map? A route map is used to control and modify routing information. Route maps define conditions for redistributing routes from one routing protocol to another or controlling routing information when injecting it in and out of BGP. For example, a route map is used to set a preference value for a specific route from a peer router and another preference value for all other routes learned via the same peer router. For example, the following commands are used to define a route map: CN 4093(config)# route-map <map number> (Select a route map) CN 4093(config-route-map)# ? (List available commands) A route map allows you to match attributes, such as metric, network address, and AS number. It also allows users to overwrite the local preference metric and to append the AS number in the AS route. See “BGP Failover Configuration” on page 462. Enterprise NOS allows you to configure 32 route maps. Each route map can have up to eight access lists. Each access list consists of a network filter. A network filter defines an IPv4 address and subnet mask of the network that you want to include in the filter. Figure 44 illustrates the relationship between route maps, access lists and network filters. Figure 44. Distributing Network Filters in Access Lists and Route Maps Route Maps Network Filter (rmap) (nwf) Access Lists (alist) Route Map 1...
Page 458
Steps 2 and 3 are optional, depending on the criteria that you want to match. In Step 2, the network filter number is used to match the subnets defined in the network filter. In Step 3, the autonomous system number is used to match the subnets. Or, you can use both (Step 2 and Step 3) criteria: access list (network filter) and access path (AS filter) to configure the route maps. 3. (Optional) Configure the attributes in the AS filter menu. CN 4093(config-route-map)# as-path-list 1 as 1 CN 4093(config-route-map)# as-path-list 1 action deny CN 4093(config-route-map)# as-path-list 1 enable 4. Set up the BGP attributes. If you want to overwrite the attributes that the peer router is sending, then define the following BGP attributes: Specify up to 32 AS numbers that you want to prepend to a matched route and the local preference for the matched route. Specify the metric [Multi Exit Discriminator (MED)] for the matched route. CN 4093(config-route-map)# as-path-preference <AS number> [<AS number>] ... CN 4093(config-route-map)# local-preference <local preference value> CN 4093(config-route-map)# metric <metric value>...
BGP Attributes The following two BGP attributes are discussed in this section: Local preference and metric (Multi‐Exit Discriminator). Local Preference Attribute When there are multiple paths to the same destination, the local preference attribute indicates the preferred path. The path with the higher preference is preferred (the default value of the local preference attribute is 100). Unlike the weight attribute, which is only relevant to the local router, the local preference attribute is part of the routing update and is exchanged among routers in the same The local preference attribute can be set in one of two ways: Using the BGP default local preference method, affecting the outbound direction only. CN 4093(config)# router bgp CN 4093(config_router_bgp)# local-preference <0-4294967294> CN 4093(config_router_bgp)# exit Using the route map local preference method, which affects both inbound and outbound directions. CN 4093(config)# route-map 1 CN 4093(config_route_map)# local-preference <0-4294967294> CN 4093(config_route_map)# enabled CN 4093(config_router_map)# exit CN 4093(config)# router bgp CN 4093(config_router_bgp)# neighbor {<number>/group <number>} route-map ...
BGP Failover Configuration Use the following example to create redundant default gateways for a CN4093 at a Web Host/ISP site, eliminating the possibility, should one gateway go down, that requests will be forwarded to an upstream router unknown to the switch. As shown in Figure 45, the switch is connected to ISP 1 and ISP 2. The customer negotiates with both ISPs to allow the switch to use their peer routers as default gateways. The ISP peer routers will then need to announce themselves as default gateways to the CN4093. Figure 45. BGP Failover Configuration Example ISP 1 ISP 2 Peer 1 Router Peer 2 Router AS 100 AS 200 (Primary) (Secondary) IP:200.200.200.2 IP:210.210.210.2 GbE Switch Module announces routes with Default gateway, Metric = AS path metric of “3”...
Default Redistribution and Route Aggregation Example This example shows you how to configure the switch to redistribute information from one routing protocol to another and create an aggregate route entry in the BGP routing table to minimize the size of the routing table. As illustrated in Figure 46, you have two peer routers: an internal and an external peer router. Configure the CN4093 to redistribute the default routes from AS 200 to AS 135. At the same time, configure for route aggregation to allow you to condense the number of routes traversing from AS 135 to AS 200. Figure 46. Route Aggregation and Default Route Redistribution Aggregate routes 135.0.0.0/8 traversing from AS 135 to AS 200 AS 135 AS 200 Internal peer router 1 10.1.1.4 20.20.20.135 External peer router 2 20.20.20.2 135.110.0.0/16 Switch Module...
Types of OSPF Areas An AS can be broken into logical units known as areas. In any AS with multiple areas, one area must be designated as area 0, known as the backbone. The backbone acts as the central OSPF area. All other areas in the AS must be connected to the backbone. Areas inject summary routing information into the backbone, which then distributes it to other areas as needed. As shown in Figure 47, OSPF defines the following types of areas: Stub Area—an area that is connected to only one other area. External route information is not distributed into stub areas. Not‐So‐Stubby‐Area (NSSA)—similar to a stub area with additional capabilities. Routes originating from within the NSSA can be propagated to adjacent transit and backbone areas. External routes from outside the AS can be advertised within the NSSA but can be configured to not be distributed into other areas. Transit Area—an area that carries data traffic which neither originates nor terminates in the area itself. Figure 47. OSPF Area Types Backbone Area 0 (Also a Transit Area) Internal LSA Virtual Routes Link Stub Area Transit Area Not-So-Stubby Area No External Routes from Backbone...
Neighbors and Adjacencies In areas with two or more routing devices, neighbors and adjacencies are formed. Neighbors are routing devices that maintain information about each others’ health. To establish neighbor relationships, routing devices periodically send hello packets on each of their interfaces. All routing devices that share a common network segment, appear in the same area, and have the same health parameters (hello and dead intervals) and authentication parameters respond to each other’s hello packets and become neighbors. Neighbors continue to send periodic hello packets to advertise their health to neighbors. In turn, they listen to hello packets to determine the health of their neighbors and to establish contact with new neighbors. The hello process is used for electing one of the neighbors as the area’s Designated Router (DR) and one as the area’s Backup Designated Router (BDR). The DR is adjacent to all other neighbors and acts as the central contact for database exchanges. Each neighbor sends its database information to the DR, which relays the information to the other neighbors. The BDR is adjacent to all other neighbors (including the DR). Each neighbor sends its database information to the BDR just as with the DR, but the BDR merely stores this data and does not distribute it. If the DR fails, the BDR will take over the task of distributing database information to the other neighbors. The Link-State Database OSPF is a link‐state routing protocol. A link represents an interface (or routable path) from the routing device. By establishing an adjacency with the DR, each routing device in an OSPF area maintains an identical Link‐State Database (LSDB) describing the network topology for its area. Each routing device transmits a Link‐State Advertisement (LSA) on each of its active interfaces. LSAs are entered into the LSDB of each routing device. OSPF uses flooding to distribute LSAs between routing devices. Interfaces may also be passive. Passive interfaces send LSAs to active interfaces, but do not receive LSAs, hello packets, or any other OSPF protocol information from active interfaces. Passive interfaces behave as stub networks, allowing OSPF routing devices to be aware of devices that do otherwise participate in OSPF (either because they do not support it, or because the administrator chooses to restrict OSPF traffic exchange or transit). When LSAs result in changes to the routing device’s LSDB, the routing device forwards the changes to the adjacent neighbors (the DR and BDR) for distribution to the other neighbors. OSPF routing updates occur only when changes occur, instead of periodically. For ...
OSPFv2 Implementation in Enterprise NOS Enterprise NOS supports a single instance of OSPF and up to 2K routes on the network. The following sections describe OSPF implementation in Enterprise NOS: “Configurable Parameters” on page 472 “Defining Areas” on page 473 “Interface Cost” on page 475 “Electing the Designated Router and Backup” on page 475 “Summarizing Routes” on page 475 “Default Routes” on page 476 “Virtual Links” on page 477 “Router ID” on page 477 “Authentication” on page 478 Configurable Parameters In Enterprise NOS, OSPF parameters can be configured through the Command Line Interfaces (CLI/ISCLI), Browser‐Based Interface (BBI), or through SNMP. For more information, see “Switch Administration” on page 29.” The CLI supports the following parameters: interface output cost, interface ...
Using the Area ID to Assign the OSPF Area Number The OSPF area number is defined in the areaid <IP address> option. The octet format is used to be compatible with two different systems of notation used by other OSPF network vendors. There are two valid ways to designate an area ID: Single Number Most common OSPF vendors express the area ID number as a single number. For example, the Cisco IOS‐based router command “network 1.1.1.0 0.0.0.255 area 1” defines the area number simply as “area 1.” Multi‐octet (IP address): Placing the area number in the last octet (0.0.0.n) Some OSPF vendors express the area ID number in multi‐octet format. For example, “area 0.0.0.2” represents OSPF area 2 and can be specified directly on the CN4093 as “area-id 0.0.0.2”. On the CN4093, using the last octet in the area ID, “area 1” is equivalent to “area-id 0.0.0.1”. Note: Although both types of area ID formats are supported, be sure that the area IDs are in the same format throughout an area. Attaching an Area to a Network Once an OSPF area has been defined, it must be associated with a network. To ...
Default Routes When an OSPF routing device encounters traffic for a destination address it does not recognize, it forwards that traffic along the default route. Typically, the default route leads upstream toward the backbone until it reaches the intended area or an external router. Each CN4093 acting as an ABR automatically inserts a default route into each attached area. In simple OSPF stub areas or NSSAs with only one ABR leading upstream (see Area 1 in Figure 49), any traffic for IP address destinations outside the area is forwarded to the switch’s IP interface, and then into the connected transit area (usually the backbone). Since this is automatic, no further configuration is required for such areas. Figure 49. Injecting Default Routes Backbone Stub Area Stub Area Metric: Metric: Area 0 Area 2 Area 1 IF 1 IF 2 Priority Priority default route Default default route route Metric: ASBR to...
Authentication OSPF protocol exchanges can be authenticated so that only trusted routing devices can participate. This ensures less processing on routing devices that are not listening to OSPF packets. OSPF allows packet authentication and uses IP multicast when sending and receiving packets. Routers participate in routing domains based on pre‐defined passwords. Enterprise NOS supports simple password (type 1 plain text passwords) and MD5 cryptographic authentication. This type of authentication allows a password to be configured per area. We strongly recommend that you implement MD5 cryptographic authentication as a best practice. Figure shows authentication configured for area 0 with the password test. Simple authentication is also configured for the virtual link between area 2 and area 0. Area 1 is not configured for OSPF authentication. Figure 50. OSPF Authentication Area 0 Area 1 Simple authentication key=test Application Switch 2 IF 1 IF 2 Switch 3 Application IF 4 Switch 1 Application IF 3 Switch 5...
Configuring MD5 Authentication Use the following commands to configure MD5 authentication on the switches shown in Figure 1. Enable OSPF MD5 authentication for Area 0 on switches 1, 2, and 3. CN 4093(config-router-ospf)# area 0 authentication-type md5 2. Configure MD5 key ID for Area 0 on switches 1, 2, and 3. CN 4093(config-router-ospf)# message-digest-key 1 md5-key test CN 4093(config-router-ospf)# exit 3. Assign MD5 key ID to OSPF interfaces on switches 1, 2, and 3. CN 4093(config)# interface ip 1 CN 4093(config-ip-if)# ip ospf message-digest-key 1 CN 4093(config-ip-if)# exit CN 4093(config)# interface ip 2 CN 4093(config-ip-if)# ip ospf message-digest-key 1 CN 4093(config-ip-if)# exit...
OSPF Features Not Supported The following OSPF features are not supported in this release: Summarizing external routes Filtering OSPF routes Using OSPF to forward multicast routes Configuring OSPF on non‐broadcast multi‐access networks (such as frame relay, X.25, or ATM) CN4093 Application Guide for N/OS 8.4...
Page 484
Follow this procedure to configure OSPF support as shown in Figure 1. Configure IP interfaces on each network that will be attached to OSPF areas. In this example, two IP interfaces are needed: Interface 1 for the backbone network on 10.10.7.0/24 Interface 2 for the stub area network on 10.10.12.0/24 CN 4093(config)# interface ip 1 CN 4093(config-ip-if)# ip address 10.10.7.1 255.255.255.0 enable CN 4093(config-ip-if)# exit CN 4093(config)# interface ip 2 CN 4093(config-ip-if)# ip address 10.10.12.1 255.255.255.0 enable CN 4093(config-ip-if)# exit Note: OSPFv2 supports IPv4 only. IPv6 is supported in OSPFv3 (see “OSPFv3 Implementation in Enterprise NOS” on page 491).
5. Define the transit area. The area that contains the virtual link must be configured as a transit area. CN 4093(config-router-ospf)# area 1 area-id 0.0.0.1 CN 4093(config-router-ospf)# area 1 type transit CN 4093(config-router-ospf)# area 1 enable CN 4093(config-router-ospf)# exit 6. Attach the network interface to the backbone. CN 4093(config)# interface ip 1 CN 4093(config-ip-if)# ip ospf area 0 CN 4093(config-ip-if)# ip ospf enable CN 4093(config-ip-if)# exit 7.
9. Configure the virtual link. The nbr router ID configured in this step must be the same as the router ID that was configured for switch #1 in Step 2 on page 485. CN 4093(config)# router ospf CN 4093(config-router-ospf)# area-virtual-link 1 area 1 CN 4093(config-router-ospf)# area-virtual-link 1 neighbor-router 10.10.10.1 CN 4093(config-router-ospf)# area-virtual-link 1 enable Other Virtual Link Options You can use redundant paths by configuring multiple virtual links. Only the endpoints of the virtual link are configured. The virtual link path may traverse multiple routers in an area as long as there is a routable path between the endpoints. Example 3: Summarizing Routes By default, ABRs advertise all the network addresses from one area into another ...
8. Use the hide command to prevent a range of addresses from advertising to the backbone. CN 4093(config)# router ospf CN 4093(config-router-ospf)# area-range 2 address 36.128.200.0 255.255.255.0 CN 4093(config-router-ospf)# area-range 2 area 1 CN 4093(config-router-ospf)# area-range 2 hide CN 4093(config-router-ospf)# exit Verifying OSPF Configuration Use the following commands to verify the OSPF configuration on your switch: show ip ospf show ip ospf neighbor ...
Other Internal Improvements OSPFv3 has numerous improvements that increase the protocol efficiency in addition to supporting IPv6 addressing. These improvements change some of the behaviors in the OSPFv3 network and may affect topology consideration, but have little direct impact on configuration. For example: Addressing fields have been removed from Router and Network LSAs. Flexible treatment of unknown LSA types to make integration of OSPFv3 easier. Interface network type can be specified using the command: ipv6 ospf network {broadcast| CN 4093(config-ip-if)# |non-broadcast|point-to-multipoint|point-to-point} For an interface network type that is not broadcast or NBMA, link LSA suppression can be enabled so link LSA is not originated for the interface. Use ipv6 ospf linklsasuppress the command: CN 4093(config-ip-if)# OSPFv3 Limitations Enterprise NOS 8.4 does not currently support the following OSPFv3 features: Multiple instances of OSPFv3 on one IPv6 link. OSPFv3 Configuration Example The following example depicts the OSPFv3 equivalent configuration of “Example 3: Summarizing Routes” on page 488 for OSPFv2.
Page 494
7. Configure route summarization by specifying the starting address and prefix length of the range of addresses to be summarized. CN 4093(config)# ipv6 router ospf CN 4093(config-router-ospf3)# area-range 1 address 36:0:0:0:0:0:0:0 32 CN 4093(config-router-ospf3)# area-range 1 area 0 CN 4093(config-router-ospf3)# area-range 1 enable This differs from OSPFv2 only in that the OSPFv3 command path is used, and the address and prefix are specified in IPv6 format. 8. Use the hide command to prevent a range of addresses from advertising to the backbone. CN 4093(config-router-ospf)# area-range 2 address 36:0:0:0:0:0:0:0 8 CN 4093(config-router-ospf)# area-range 2 area 0 CN 4093(config-router-ospf)# area-range 2 hide CN 4093(config-router-ospf)# exit This differs from OSPFv2 only in that the OSPFv3 command path is used, and the ...
Receiver join requests as well as sender multicast content initially converge at the RP, which generates and distributes multicast routing data for the DRs along the delivery path. As the multicast content flows, DRs use the routing tree information obtained from the RP to optimize the paths both to and from send and receive stations, bypassing the RP for the remainder of content transactions if a more efficient route is available. DRs continue to share routing information with the RP, modifying the multicast routing tree when new receivers join, or pruning the tree when all the receivers in any particular domain are no longer part of the multicast group. Supported PIM Modes and Features For each interface attached to a PIM network component, PIM can be configured to operate either in PIM Sparse Mode (PIM‐SM) or PIM Dense Mode (PIM‐DM). PIM‐SM is used in networks where multicast senders and receivers comprise a relatively small (sparse) portion of the overall network. PIM‐SM uses a more complex process than PIM‐DM for collecting and optimizing multicast routes, but minimizes impact on other IP services and is more commonly used. PIM‐DM is used where multicast devices are a relatively large (dense) portion of the network, with very frequent (or constant) multicast traffic. PIM‐DM requires less configuration on the switch than PIM‐SM, but uses broadcasts that can consume more bandwidth in establishing and optimizing routes. The following PIM modes and features are not currently supported in Enterprise NOS 8.4: Hybrid Sparse‐Dense Mode (PIM‐SM/DM). Sparse Mode and Dense Mode may be configured on separate IP interfaces on the switch, but are not currently supported simultaneously on the same IP interface. PIM Source‐Specific Multicast (PIM‐SSM) Anycast RP PIM RP filters Only configuration via the switch ISCLI is supported. PIM configuration is currently not available using the menu‐based CLI, the BBI, or via SNMP.
Defining an IP Interface for PIM Use Each network attached to an IP interface on the switch may be assigned one of the available PIM components. The same PIM component can be assigned to multiple IP interfaces. The interfaces may belong to the same VLAN, but each interface can belong to only one VLAN. To define an IP interface for use with PIM, first configured the interface with an IPv4 address and VLAN as follows: CN 4093(config)# interface ip <Interface number> CN 4093(config-ip-if)# ip address <IPv4 address> <IPv4 mask> CN 4093(config-ip-if)# vlan <VLAN number> CN 4093(config-ip-if)# enable Note: The PIM feature currently supports only one VLAN for each IP interface. Configurations where different interfaces on different VLANs share IP addresses are not supported. Next, PIM must be enabled on the interface, and the PIM network component ID must be specified: CN 4093(config-ip-if)# ip pim enable CN 4093(config-ip-if)# ip pim component-id <1‐2>...
Additional Sparse Mode Settings Specifying the Rendezvous Point Using PIM‐SM, at least one PIM‐capable router must be a candidate for use as a Rendezvous Point (RP) for any given multicast group. If desired, the CN4093 can act as an RP candidate. To assign a configured switch IP interface as a candidate, use the following procedure. 1. Select the PIM component that will represent the RP candidate: CN 4093(config)# ip pim component <1‐2> 2. Configure the IPv4 address of the switch interface which will be advertised as a candidate RP for the specified multicast group: CN 4093(config-ip-pim-comp)# rp-candidate rp-address <group address> <group address mask> <candidate IPv4 address> The switch interface will participate in the election of the RP that occurs on the Bootstrap Router, or BSR (see “Specifying a Bootstrap Router” on page 503). Alternately, if no election is desired, the switch can provide a static RP, specified using the following command: CN 4093(config-ip-pim-comp)# rp-static rp-address <group address> <group address mask>...
Using PIM with Other Features PIM with ACLs or VMAPs If using ACLs or VMAPs, be sure to permit traffic for local hosts and routers. PIM with IGMP If using IGMP (see “Internet Group Management Protocol” on page 435): IGMP static joins can be configured with a PIM‐SM or PIM‐DM multicast group IPv4 address. Using the ISCLI: CN 4093(config)# ip mroute <multicast group IPv4 address> <VLAN> <port> IGMP Query is disabled by default. If IGMP Querier is needed with PIM, be sure to enable the IGMP Query feature globally, as well as on each VLAN where it is needed. If the switch is connected to multicast receivers and/or hosts, be sure to enable IGMP snooping globally, as well as on each VLAN where PIM receivers are attached. CN4093 Application Guide for N/OS 8.4...
Figure 55. Network with both PIM‐DM and PIM‐SM Components PIM-SM PIM-DM Multicast Multicast 225.1.0.0/16 239.1.0.0/16 PIM Enabled Lenovo Switch IP Interface 11 IP Interface 22 IP 10.10.1.1 IP 10.10.1.2 VLAN 101 VLAN 102 Component 1 Component 2 Media Servers CN4093 Application Guide for N/OS 8.4...
Hot Links Hot Links provides basic link redundancy with fast recovery. Hot Links consists of up to 200 triggers. A trigger consists of a pair of layer 2 interfaces, each containing an individual port, LAG, or LACP adminkey. One interface is the Master, and the other is a Backup. While the Master interface is set to the active state and forwards traffic, the Backup interface is set to the standby state and blocks traffic until the Master interface fails. If the Master interface fails, the Backup interface is set to active and forwards traffic. Once the Master interface is restored, it transitions to the standby state and blocks traffic until the Backup interface fails. You may select a physical port, static LAG, or an LACP adminkey as a Hot Link interface. Only external uplink ports can be members of a Hot Links trigger interface. Forward Delay The Forward Delay timer allows Hot Links to monitor the Master and Backup interfaces for link stability before selecting one interface to transition to the active state. Before the transition occurs, the interface must maintain a stable link for the duration of the Forward Delay interval. For example, if you set the Forward delay timer to 10 seconds using the command: CN 4093(config)# hotlinks trigger <x> forward-delay 10 the switch will select an interface to become active only if a link remained stable for the duration of the Forward Delay period. If the link is unstable, the Forward Delay period starts again. Preemption You can configure the Master interface to resume the active state whenever it becomes available. With Hot Links preemption enabled, the Master interface transitions to the active state immediately upon recovery. The Backup interface immediately transitions to the standby state. If Forward Delay is enabled, the transition occurs when an interface has maintained link stability for the duration of the Forward Delay period. FDB Update Use the FDB update option to notify other devices on the network about updates to ...
Auto Monitoring LAG Links Layer 2 Failover can be enabled on any LAG in the CN4093, including LACP LAGs. LAGs can be added to failover trigger groups. Then, if some specified number of trigger links fail, the switch disables all the internal ports in the switch (unless VLAN Monitor is turned on). When the internal ports are disabled, it causes the NIC team on the affected server blades to failover from the primary to the backup NIC. This process is called a failover event. When the appropriate number of links in a trigger group return to service, the switch enables the internal ports. This causes the NIC team on the affected server blades to fail back to the primary switch (unless Auto‐Fallback is disabled on the NIC team). The backup switch processes traffic until the primary switch’s internal links come up, which can take up to five seconds. VLAN Monitor The VLAN Monitor allows Layer 2 Failover to discern different VLANs. With VLAN Monitor turned on: If enough links in a trigger fail (see “Setting the Failover Limit” on page 518), the switch disables all internal ports that reside in the same VLAN membership as the LAG(s) in the trigger. When enough links in the trigger return to service, the switch enables the internal ports that reside in the same VLAN membership as the LAG(s) in the trigger. If you turn off the VLAN Monitor (CN 4093# no failover vlan), only one failover trigger is allowed. When a link failure occurs on the trigger, the switch disables all internal server‐blade ports. Auto Monitor Configurations Figure 57 is an example of Layer 2 Failover. One CN4093 is the primary and the other is used as a backup. In this example, all external ports on the primary switch ...
Figure 59. Two LAGs, one Failover Trigger Trigger 1 Switch 1 Server 1 Server 2 Internet Server 3 Trigger 1 Server 4 Switch 2 Enterprise Routing Switch VLAN 1: VLAN 2: VLAN Monitor = Off Setting the Failover Limit The failover limit lets you specify the minimum number of operational links required within each trigger before the trigger initiates a failover event. For example, if the limit is two, a failover event occurs when the number of operational links in the trigger is two or fewer. When you set the limit to zero, the switch triggers a failover event only when no links in the trigger are operational. CN4093 Application Guide for N/OS 8.4...
L2 Failover with Other Features L2 Failover works together with Link Aggregation Control Protocol (LACP) and with Spanning Tree Protocol (STP), as described in the next sections. LACP Link Aggregation Control Protocol allows the switch to form dynamic LAGs. You can use the admin key to add up to two LACP LAGs to a failover trigger using automatic monitoring. When you add an admin key to a trigger, any LACP LAG with that admin key becomes a member of the trigger. Note: If you change the LACP system priority on an LACP aggregation, the failover trigger goes down. Spanning Tree Protocol If Spanning Tree Protocol (STP) is enabled on the ports in a failover trigger, the switch monitors the port STP state rather than the link state. A port failure results when STP is not in a Forwarding state (such as Learning, Discarding or No Link). The switch automatically disables the appropriate internal ports, based on the VLAN monitor. When the switch determines that ports in the trigger are in STP Forwarding state, then it automatically enables the appropriate internal ports, based on the VLAN monitor. The switch fails back to normal operation. CN4093 Application Guide for N/OS 8.4...
Configuring Layer 2 Failover Auto Monitor Example The following procedure pertains to the configuration shown in Figure 1. Configure Network Adapter Teaming on the servers. 2. Define a LAG on the CN4093. CN 4093(config)# portchannel 1 port EXT1,EXT2,EXT3 enable 3. Configure Failover parameters. CN 4093(config)# failover trigger 1 enable CN 4093(config)# failover trigger 1 limit <0‐1024> CN 4093(config)# failover trigger 1 amon portchannel 1 4.
VRRP Components Each physical router running VRRP is known as a VRRP router. Virtual Router Two or more VRRP routers can be configured to form a virtual router (RFC 2338). Each VRRP router may participate in one or more virtual routers. Each virtual router consists of a user‐configured virtual router identifier (VRID) and an IPv4 address. Virtual Router MAC Address The VRID is used to build the virtual router MAC Address. The five highest‐order octets of the virtual router MAC Address are the standard MAC prefix (00‐00‐5E‐00‐01) defined in RFC 2338. The VRID is used to form the lowest‐order octet. Owners and Renters Only one of the VRRP routers in a virtual router may be configured as the IPv4 address owner. This router has the virtual router’s IPv4 address as its real interface address. This router responds to packets addressed to the virtual router’s IPv4 address for ICMP pings, TCP connections, and so on. There is no requirement for any VRRP router to be the IPv4 address owner. Most VRRP installations choose not to implement an IPv4 address owner. For the purposes of this chapter, VRRP routers that are not the IPv4 address owner are called renters. Master and Backup Virtual Router Within each virtual router, one VRRP router is selected to be the virtual router master. See “Selecting the Master VRRP Router” on page 525 for an explanation of the selection process. Note: If the IPv4 address owner is available, it will always become the virtual router master. The virtual router master forwards packets sent to the virtual router. It also ...
Failover Methods With service availability becoming a major concern on the Internet, service providers are increasingly deploying Internet traffic control devices, such as application switches, in redundant configurations. Traditionally, these configurations have been hot‐standby configurations, where one switch is active and the other is in a standby mode. A non‐VRRP hot‐standby configuration is shown in the figure below: Figure 60. A Non‐VRRP, Hot‐Standby Configuration Intranet Clients Primary Switch IP: 200.200.200.100 Internet Servers NFS Server Client Switches Secondary Switch IP: 200.200.200.101 While hot‐standby configurations increase site availability by removing single points‐of‐failure, service providers increasingly view them as an inefficient use of network resources because one functional application switch sits by idly until a failure calls it into action. Service providers now demand that vendorsʹ equipment support redundant configurations where all devices can process traffic when they are healthy, increasing site throughput and decreasing user response times when no device has failed. Enterprise NOS high availability configurations are based on VRRP. The implementation of VRRP includes proprietary extensions. The Enterprise NOS implementation of VRRP supports the following modes of high availability: Active‐Active—based on proprietary Enterprise NOS extensions to VRRP ...
Virtual Router Group The virtual router group ties all virtual routers on the switch together as a single entity. By definition, hot‐standby requires that all virtual routers failover as a group, and not individually. As members of a group, all virtual routers on the switch (and therefore the switch itself), are in either a master or standby state. The virtual router group cannot be used for active‐active configurations or any other configuration that require shared interfaces. A VRRP group has the following characteristics: When enabled, all virtual routers behave as one entity, and all group settings override any individual virtual router settings. All individual virtual routers, once the VRRP group is enabled, assume the group’s tracking and priority. When one member of a VRRP group fails, the priority of the group decreases, and the state of the entire switch changes from Master to Standby. Each VRRP advertisement can include up to 128 addresses. All virtual routers are advertised within the same packet, conserving processing and buffering resources. CN4093 Application Guide for N/OS 8.4...
Virtual Router Deployment Considerations Assigning VRRP Virtual Router ID During the software upgrade process, VRRP virtual router IDs will be automatically assigned if failover is enabled on the switch. When configuring virtual routers at any point after upgrade, virtual router ID numbers must be assigned. The virtual router ID may be configured as any number between 1 and 255. Use the following commands to configure the virtual router ID: CN 4093(config)# router vrrp CN 4093(config-vrrp)# virtual-router 1 virtual-router-id <1‐255> Configuring the Switch for Tracking Tracking configuration largely depends on user preferences and network environment. Consider the configuration shown in Figure 61 on page 527. Assume the following behavior on the network: Switch 1 is the master router upon initialization. If switch 1 is the master and it has one fewer active servers than switch 2, then switch 1 remains the master. This behavior is preferred because running one server down is less disruptive than bringing a new master online and severing all active connections in the ...
LLDP Overview Link Layer Discovery Protocol (LLDP) is an IEEE 802.1AB‐2005 standard for discovering and managing network devices. LLDP uses Layer 2 (the data link layer), and allows network management applications to extend their awareness of the network by discovering devices that are direct neighbors of already known devices. With LLDP, the CN4093 can advertise the presence of its ports, their major capabilities, and their current status to other LLDP stations in the same LAN. LLDP transmissions occur on ports at regular intervals or whenever there is a relevant change to their status. The switch can also receive LLDP information advertised from adjacent LLDP‐capable network devices. In addition to discovery of network resources, and notification of network changes, LLDP can help administrators quickly recognize a variety of common network configuration problems, such as unintended VLAN exclusions or mis‐matched port aggregation membership. The LLDP transmit function and receive function can be independently configured on a per‐port basis. The administrator can allow any given port to transmit only, receive only, or both transmit and receive LLDP information. The LLDP information to be distributed by the CN4093 ports, and that which has been collected from other LLDP stations, is stored in the switch’s Management Information Base (MIB). Network Management Systems (NMS) can use Simple Network Management Protocol (SNMP) to access this MIB information. LLDP‐related MIB information is read‐only. Changes, either to the local switch LLDP information or to the remotely received LLDP information, are flagged within the MIB for convenient tracking by SNMP‐based management systems. For LLDP to provide expected benefits, all network devices that support LLDP should be consistent in their LLDP configuration. LLDP - Stacking Mode In stacking mode, LLDP can be configured only on the ports that are not used to create the stack. The LLDP configuration menus on the stacking ports are disabled. When configuring LLDP on a port, use the correct port syntax. See example of port syntax on page 241. CN4093 Application Guide for N/OS 8.4...
LLDP Transmit Features Numerous LLDP transmit options are available, including scheduled and minimum transmit interval, expiration on remote systems, SNMP trap notification, and the types of information permitted to be shared. Note: In stacking mode, only the stack Master transmits LLDP information for all the ports in a stack. The stack MAC address is used as the source address in the LLDP packets. Scheduled Interval The CN4093 can be configured to transmit LLDP information to neighboring devices once each 5 to 32768 seconds. The scheduled interval is global; the same interval value applies to all LLDP transmit‐enabled ports. However, to help balance LLDP transmissions and keep them from being sent simultaneously on all ports, each port maintains its own interval clock, based on its own initialization or reset time. This allows switch‐wide LLDP transmissions to be spread out over time, though individual ports comply with the configured interval. The global transmit interval can be configured using the following command: CN 4093(config)# lldp refresh-interval <interval> where interval is the number of seconds between LLDP transmissions. The range is 5 to 32768. The default is 30 seconds. Minimum Interval In addition to sending LLDP information at scheduled intervals, LLDP information is also sent when the CN4093 detects relevant changes to its configuration or status (such as when ports are enabled or disabled). To prevent the CN4093 from sending multiple LLDP packets in rapid succession when port status is in flux, a transmit delay timer can be configured. The transmit delay timer represents the minimum time permitted between successive LLDP transmissions on a port. Any interval‐driven or change‐driven updates will be consolidated until the configured transmit delay expires. The minimum transmit interval can be configured using the following command: CN 4093(config)# lldp transmission-delay <interval> where interval is the minimum number of seconds permitted between successive ...
Changing the LLDP Transmit State When the port is disabled, or when LLDP transmit is turned off for the port using the admstat command’s rx_only or disabled options (see “Transmit and Receive Control” on page 543), a final LLDP packet is transmitted with a time‐to‐live value of 0. Neighbors that receive this packet will remove the LLDP information associated with the CN4093 port from their MIB. In addition, if LLDP is fully disabled on a port (using admstat disabled) and later re‐enabled, the CN4093 will temporarily delay resuming LLDP transmissions on the port in order to allow the port LLDP information to stabilize. The reinitialization delay interval can be globally configured for all ports using the following command: CN 4093(config)# lldp reinit-delay <interval> where interval is the number of seconds to wait before resuming LLDP transmissions. The range is between 1 and 10. The default is 2 seconds. CN4093 Application Guide for N/OS 8.4...
Page 548
Table 39. LLDP Optional Information Types (continued) Type Description Default dcbx Data Center Bridging Capability Enabled Exchange Protocol (DCBX) for the port. Select all optional LLDP information for Disabled inclusion or exclusion. CN4093 Application Guide for N/OS 8.4...
Page 550
Port Id : 23 Port Description : EXT7 System Name System Description : Lenovo Flex System Fabric CN4093 10 Gb Converged Scalable Switch, Enterprise NOS: version 8.4, boot image: version 6.9.1.14 System Capabilities Supported : bridge, router System Capabilities Enabled...
Page 551
: 56 Port Description : EXT14 System Name : CFC System Description : Lenovo Flex System CN4093 10Gb Converged Scalable Switch, Lenovo Networking OS: version 7.8.0.48, Boot image: version 7.8.0.48 System Capabilities Supported : bridge, router System Capabilities Enabled : bridge, router...
Time-to-Live for Received Information Each remote device LLDP packet includes an expiration time. If the switch port does not receive an LLDP update from the remote device before the time‐to‐live clock expires, the switch will consider the remote information to be invalid, and will remove all associated information from the MIB. Remote devices can also intentionally set their LLDP time‐to‐live to 0, indicating to the switch that the LLDP information is invalid and should be immediately removed. CN4093 Application Guide for N/OS 8.4...
SNMP Version 1 To access the SNMP agent on the CN4093, the read and write community strings on the SNMP manager should be configured to match those on the switch. The read and write community strings on the switch can be changed using the following commands: CN 4093(config)# snmp-server read-community <1‐32 characters> ‐and‐ CN 4093(config)# snmp-server write-community <1‐32 characters> The SNMP manager should be able to reach the management interface or any one of the IP interfaces on the switch. For the SNMP manager to receive the SNMPv1 traps sent out by the SNMP agent on the switch, configure the trap host on the switch with the following command: CN 4093(config)# snmp-server trap-source <trap source IP interface> CN 4093(config)# snmp-server host <IPv4 address> <trap host community string> Note: You can use a loopback interface to set the source IP address for SNMP traps. Use the following command to apply a configured loopback interface: snmp-server trap-source loopback CN 4093(config)# <1‐5>...
Users can be configured to use the authentication/privacy options. The CN4093 support two authentication algorithms: MD5 and SHA, as specified in the following command: CN 4093(config)# snmp-server user <1‐17> authentication-protocol {md5|sha authentication-password ‐or‐ CN 4093(config)# snmp-server user <1‐17> authentication-protocol none User Configuration Example 1. To configure a user with name “admin,” authentication type MD5, and authentication password of “admin,” privacy option DES with privacy password of “admin,” use the following ISCLI commands. CN 4093(config)# snmp-server user 5 name admin CN 4093(config)# snmp-server user 5 authentication-protocol md5 authentication-password Changing authentication password;...
Configuring SNMP Trap Hosts Follow these instructions to configure SNMP trap hosts. SNMPv1 Trap Host Configuration 1. Configure a user with no authentication and password. CN 4093(config)# snmp-server user 10 name v1trap 2. Configure an access group and group table entries for the user. Use the following menu to specify which traps can be received by the user: CN 4093(config)# snmp-server access <user number> In the following example the user will receive the traps sent by the switch. CN 4093(config)# snmp-server access 10 (Access group to view SNMPv1 traps) name v1trap security snmpv1 notify-view iso CN 4093(config)# snmp-server group 10 (Assign user to the access group) security snmpv1 user-name v1trap group-name v1trap...
SNMPv3 Trap Host Configuration To configure a user for SNMPv3 traps, you can choose to send the traps with both privacy and authentication, with authentication only, or without privacy or authentication. This is configured in the access table using the following commands: CN 4093(config)# snmp-server access <1‐32> level CN 4093(config)# snmp-server target-parameters <1‐16> Configure the user in the user table accordingly. It is not necessary to configure the community table for SNMPv3 traps because the community string is not used by SNMPv3. The following example shows how to configure a SNMPv3 user v3trap with authentication only: CN 4093(config)# snmp-server user 11 name v3trap CN 4093(config)# snmp-server user 11 authentication-protocol md5 authentication-password Changing authentication password; validation required: Enter current admin password: <admin. password>...
Page 566
The Enterprise NOS SNMP agent supports the following generic traps as defined in RFC 1215: ColdStart WarmStart LinkDown LinkUp AuthenticationFailure The SNMP agent also supports two Spanning Tree traps as defined in RFC 1493: NewRoot TopologyChange The following are the enterprise SNMP traps supported in Enterprise NOS: Table 40. Enterprise NOS‐Supported Enterprise SNMP Traps Trap Name Description altSwLoginFailure Signifies that someone failed to enter a valid username/password combination. altSwTrapDisplayString specifies whether the login attempt was from CONSOLE or TELNET. In case of TELNET login it also specifies the IP address of the host from which the attempt was made. altSwValidLogin Signifies that a user login has occurred. altSwApplyComplete Signifies that new configuration has ...
Page 568
Table 40. Enterprise NOS‐Supported Enterprise SNMP Traps (continued) Trap Name Description altSwLACPPortUnblocked Signifies that LACP is operationally up on a port, and traffic is no longer blocked on the port. altSwLFDPortErrdisabled Signifies that a port is error‐disabled due to excessive link flaps. altSwVlagInstanceUp Signifies that VLAG instance is up identified in the trap message. altSwVlagInstanceRemoteUp Signifies that VLAG is down but instance on the remote instance is altSwVlagInstanceLocalUp Signifies that VLAG is down but local instance is up. altSwVlagInstanceDown Signifies that VLAG instance is down identified in the trap message. altSwVlagIslUp Signifies that connection between VLAG switches is up. altSwVlagIslDown Signifies that connection between VLAG switches is down. altSwDefGwUp Signifies that the default gateway is alive. ipCurCfgGwIndex is the index of the Gateway in ipCurCfgGwTable. The range for ipCurCfgGwIndex is from 1 to ipGatewayTableMax. ...
Page 570
Table 40. Enterprise NOS‐Supported Enterprise SNMP Traps (continued) Trap Name Description altSwVrrpAuthFailure Signifies that a packet has been received from a router whose authentication key or authentication type conflicts with this routerʹs authentication key or authentication type. Implementation of this trap is optional. vrrpCurCfgIfIndx is the VRRP interface index. This is equivalent to ifIndex in RFC 1213 mib. The range is from 1 to vrrpIfTableMaxSize. vrrpCurCfgIfPasswd is the password for authentication. It is a DisplayString of 0 to 7 characters. altSwNtpNotServer Signifies that the primary or secondary NTP server cannot be reached. altSwNTPUpdateClock Signifies that the system clock is updated with NTP server. altSwECMPGatewayUp Signifies that the ECMP gateway is altSwECMPGatewayDown Signifies that the ECMP gateway is down. altSwOspfRouteUpdated Signifies that an OSPF route update message was received. altSwTempExceedThreshold Signifies that the switch temperature has exceeded ...
Page 572
Table 40. Enterprise NOS‐Supported Enterprise SNMP Traps (continued) Trap Name Description altVMGroupVMVlanChange Signifies that a virtual machine has entered a VLAN, or changed the VLAN. vmCheckSpoofedvm Signifies that a spoofed VM MAC was found. CN4093 Application Guide for N/OS 8.4...
Loading a New Switch Image To load a new switch image with the name “MyNewImage-1.img” into image2, follow the steps below. This example shows an FTP/TFTP/SFTP server at IPv4 address 192.168.10.10, though IPv6 is also supported. 1. Set the FTP/TFTP/SFTP server address where the switch image resides: Set agTransferServer.0 "192.168.10.10" 2. Set the area where the new image will be loaded: Set agTransferImage.0 "image2" 3. Set the name of the image: Set agTransferImageFileName.0 "MyNewImage-1.img" 4. If you are using an SFTP/FTP server, enter a username: Set agTransferUserName.0 "MyName" 5. If you are using an SFTP/FTP server, enter a password: Set agTransferPassword.0 "MyPassword" 6. Initiate the transfer. To transfer a switch image, enter 2 (gtimg): Set agTransferAction.0 "2" Loading a Saved Switch Configuration To load a saved switch configuration with the name “MyRunningConfig.cfg” into ...
Chapter 38. System License Keys License keys determine the number of available ports on the CN4093. Each switch comes with basic license that provides the use of a limited number of physical ports. On top of the basic license, optional upgrade licenses can be installed to expand the number of available ports. Obtaining Activation Keys The upgrade licenses can be acquired using the Lenovo System x Features on Demand (FoD) website: http://www.ibm.com/systems/x/fod/ You can also use the website to review and manage licenses, and to obtain additional help if required. Note: An IBM ID and password are required to log into the FoD website. If you do not yet have an IBM ID, you can register at the website. Activation keys are provided as files that must be uploaded to the CN4093. To acquire an activation key, use the FoD website to purchase an Authorization Code. You will need to provide the unique ID (UID) of the specific CN4093 where the key will be installed. The UID is the last 12 characters of the CN4093 serial number. This serial number is located on the Part Number (PN) label and is also displayed during successful login to the device. When available, download the activation key file from the FoD site. Installing Activation Keys Once FoD activation key files have been acquired, they must be installed on the CN4093. The following example depicts use of the CN4093 Command Line Interface (CLI), but other device interfaces (such as SNMP) may also be used. To install activation keys, complete the following steps: a. Log in to the CN4093. b. At the CLI prompt, enter the following commands: CN4093> enable CN4093# configure terminal CN4093(config)# software-key CN4093(config)# enakey addr <server IP address>...
Flexible Port Mapping Flexible Port Mapping allows administrators to manually enable or disable specific switch ports within the limitations of the installed licenses’ bandwidth. For instance, the FlexSystem may include two compute nodes and a single QSFP+ uplink, while the current license has the INTA1 – INTA14 and EXT1 – EXT10 Ethernet ports enabled by default. To make best use of the available resources, the administrator decides to activate internal ports INTB1, INTB2, INTC1 and INTC2 to provide redundant connections for the two compute nodes and to enable the high speed QSFP+ EXT3 port for the uplink. The total bandwidth required for this operation amounts to 80 Gbps (40 Gbps for the four additional 10 Gbps internal ports and 40 Gbps for the additional external QSFP+ port). The administrator decides to allocate this bandwidth by deactivating 6 internal and 2 external 10 Gbps ports. To implement the above scenario, follow these steps: a. Deactivate the ports required to clear the 80 Gbps required bandwidth: CN4093(config)# no boot port-map INTA9 CN4093(config)# no boot port-map INTA10 CN4093(config)# no boot port-map INTA11 CN4093(config)# no boot port-map INTA12 CN4093(config)# no boot port-map INTA13 CN4093(config)# no boot port-map INTA14 CN4093(config)# no boot port-map EXT9 CN4093(config)# no boot port-map EXT10...
SIOM Overview In networking solutions, a new approach about adopting a security level on Input/Output modules has been developed. This security level encompasses secured authentication management and only allows secure traffic and protocols. IOMs can be classified into two security categories: Legacy Input/Output Modules (LIOMs) LIOMs are not capable of provisioning any security policy setting. All IOMs developed before the SIOM feature was introduced are of type LIOM. Secure Input/Output Modules (SIOMs) SIOMs have security characteristics that allow them to integrate the network assigned security policy. For IOM to be in SIOM mode, both the IOM and the CMM (Chassis Management Module) containing it must be running SIOM‐capable software, and the IOM must have SIOM enabled. In all other cases, the IOM operates in LIOM mode. When the IOM is in SIOM mode, the security characteristics configured on the CMM are sent to the IOM. These characteristics can be divided into the following categories: Policy setting User Account Management Secure LDAP (LDAPS) authentication To see whether SIOM is enabled on the IOM, use the following command: CN 4093(config)# show boot siom Current SIOM setting: disabled Saved SIOM setting: disabled This shows both the current SIOM setting and the saved setting that will be applied ...
Page 584
Overall, in a stacking mode, it takes longer (about 9 minutes) to reload SIOM‐enabled software than a non‐SIOM enabled software. If staggered‐upgrade procedure is used, this duration increases according to the number of switches in the stack. The process of upgrading from non‐SIOM enabled software to SIOM‐enabled software takes about 15 minutes. If a staggered‐upgrade procedure is used, this duration increases according to the number of switches in the stack. If the Master switch gets rebooted, the Backup switch becomes the Master (operation called Master failover) and it will be SIOM provisioned. If the SIOM provisioning occurs for the first time on this switch, it will also reboot for the LIOM to SIOM transition. The new Master will reboot only after the Backup switch (original Master) rejoins the stack. CN4093 Application Guide for ENOS 8.4...
Creating a Policy Setting The policy setting can be either secure (IOM is in secure mode) or legacy (IOM is in legacy mode). In secure mode, only communication protocols that are deemed secure can be used; most protocols that are not deemed secure are disabled. In legacy mode setting, all protocols are allowed (LIOM behavior). To display the current policy setting, enter: CN 4093(config)# show boot security-policy Note: Security policy can be applied only from CMM. You must reboot the IOM for a new policy setting to be applied. Protocols Affected by the Policy Setting This section explains which protocols can and cannot operate in secure mode on the CN4093 10 Gb Converged Scalable Switch. Insecure Protocols When you are in Secure Mode, the following protocols are deemed “insecure” and are disabled: HTTP LDAP Client SNMPv1 SNMPv2 Telnet (server and client) FTP (server and client) ...
Page 588
SNMPv3 IPv6 bootp Notes: Telnet IPv6 and TFTP IPv6 are disabled in Secure Mode. TFTP IPv6 is allowed in Secure Mode for signed image transfers only. CN4093 Application Guide for ENOS 8.4...
Page 590
For more information about these commands, see the Lenovo ISCLI—Industry Standard CLI Command Reference for the Lenovo Flex System Fabric CN4093 10 Gb Converged Scalable Switch. CN4093 Application Guide for ENOS 8.4...
6. Configure the distinguished name (DN) and password (optional). CN 4093(config)# ldap-server binddn dn “<distinguished name> “ CN 4093(config)# ldap-server binddn key “<password> “ If this is not configured, the switch will use user‐provided login credentials to bind. A DN will then be constructed from the userʹs login credentials and then used in the initial BIND attempt. 7. Configure the root DN: CN 4093(config)# ldap-server basedn <root DN name> 8. Configure the user search attribute (optional): CN 4093(config)# ldap-server attribute username <search attribute> If no user search attribute is specified, the default is uid. 9. Configure the group search attribute (optional): CN 4093(config)# ldap-server attribute group <search attribute> If no group search attribute is specified, the default is memberOf.
SIOM Dependencies The following points are relevant to SIOM: The CMM has a Certificate Authority (CA) capable of signing the certificates involved for authenticating the IOM in the SSL and TLS processes and protocols. The correctness of the configuration depends upon the settings on the CMM. This is especially important for NTP and LDAP, which ensure switch operability. For example, if the LDAP client is configured incorrectly, the switch cannot be managed. The Enhanced Configuration and Management (EHCM) module configures the NTP client. Therefore, the NTP client is dependent upon the ECHM module being enabled and functional. Some protocols cannot be changed from enabled to disabled without restarting the switch. The IOM may reboot when switching between the SIOM and LIOM. CN4093 Application Guide for ENOS 8.4...
RMON Group 1–Statistics The switch supports collection of Ethernet statistics as outlined in the RMON statistics MIB, in reference to etherStatsTable. RMON statistics are sampled every second, and new data overwrites any old data on a given port. Note: RMON port statistics must be enabled for the port before you can view RMON statistics. To configure RMON Statistics: 1. Enable RMON on each port where you wish to collect RMON statistics. CN 4093(config)# interface port 23 CN 4093(config-if)# rmon 2. View RMON statistics for the port. CN 4093(config-if)# show interface port 23 rmon-counters ------------------------------------------------------------------ RMON statistics for port 23: etherStatsDropEvents: etherStatsOctets: 7305626 etherStatsPkts: 48686 etherStatsBroadcastPkts: 4380 etherStatsMulticastPkts:...
Page 600
3. View RMON history for the port. CN 4093(config)# show rmon history RMON History group configuration: Index IFOID Interval Rbnum Gbnum ----- ----------------------- -------- ----- ----- 1.3.6.1.2.1.2.2.1.1.1 Index Owner ----- ---------------------------------------------- rmon port 1 history CN4093 Application Guide for N/OS 8.4...
Alarm Example 2 This example configuration creates an RMON alarm that checks icmpInEchos on the switch once every minute. If the statistic exceeds 200 within a 60 second interval, an alarm is generated that triggers event index 5. Configure the RMON Alarm parameters to track ICMP messages. CN 4093(config)# rmon alarm 1 oid 1.3.6.1.2.1.5.8.0 CN 4093(config)# rmon alarm 1 alarm-type rising CN 4093(config)# rmon alarm 1 rising-crossing-index 110 CN 4093(config)# rmon alarm 1 interval-time 60 CN 4093(config)# rmon alarm 1 rising-limit 200 CN 4093(config)# rmon alarm 1 sample delta CN 4093(config)# rmon alarm 1 owner "Alarm for icmpInEchos"...
sFlow Example Configuration 1. Specify the location of the sFlow analyzer (the server and optional port to which the sFlow information will be sent): CN 4093(config)# sflow server <IPv4 address>(sFlow server address) CN 4093(config)# sflow port <service port> (Set the optional service port) CN 4093(config)# sflow enable (Enable sFlow features) By default, the switch uses established sFlow service port 6343. To disable sFlow features across all ports, use the following command: CN 4093(config)# no sflow enable 2. On a per‐port basis, define the statistics polling rate: CN 4093(config)# interface port <port> CN 4093(config-if)# sflow polling <polling rate>(Statistics polling rate) Specify a polling rate between 5 and 60 seconds, or 0 to disable. By default, polling ...
Port Mirroring Behavior This section describes the composition of monitored packets in the CN4093, based on the configuration of the ports. Packets mirrored at port egress are mirrored prior to VLAN tag processing and may have a different PVID than packets that egress the port toward their actual network destination. Packets mirrored at port ingress are not modified. Configuring Port Mirroring The following procedure may be used to configure port mirroring for the example shown in Figure 65 on page 607: 1. Specify the monitoring port, the mirroring port(s), and the port‐mirror direction. CN 4093(config)# port-mirroring monitor-port EXT3 mirroring-port EXT1 in CN 4093(config)# port-mirroring monitor-port EXT3 mirroring-port EXT2 both 2. Enable port mirroring. CN 4093(config)# port-mirroring enable 3.
Page 612
VRID Virtual Router Identifier. In VRRP, a numeric ID is used by each virtual router to create its MAC address and identify its peer for which it is sharing this VRRP address. The VRRP MAC address as defined in the RFC is 00‐00‐5E‐00‐01‐<VRID>. If you have a VRRP address that two switches are sharing, then the VRID number needs to be identical on both switches so each virtual router on each switch knows with whom to share. VRRP Virtual Router Redundancy Protocol. A protocol that acts very similarly to Ciscoʹs proprietary HSRP address sharing protocol. The reason for both of these protocols is so devices have a next hop or default gateway that is always available. Two or more devices sharing an IP interface are either advertising or listening for advertisements. These advertisements are sent via a broadcast message to an address such as 224.0.0.18. With VRRP, one switch is considered the master and the other the backup. The master is always advertising via the broadcasts. The backup switch is always listening for the broadcasts. Should the master stop advertising, the backup will take over ownership of the VRRP IP and MAC addresses as defined by the specification. The switch announces this change in ownership to the devices around it by way of a Gratuitous ARP, and advertisements. If the backup switch didnʹt do the Gratuitous ARP the Layer 2 devices attached to the switch would not know that the MAC address had moved in the network. For a more detailed description, refer to RFC 2338. CN4093 Application Guide for N/OS 8.4...
Page 614
Start the process of determining a solution to your problem by making the pertinent information available to the service technicians. The IBM service technicians can start working on your solution as soon as you have completed and submitted an Electronic Service Request. You can solve many problems without outside assistance by following the troubleshooting procedures that Lenovo provides in the online help or in the Lenovo product documentation. The Lenovo product documentation also describes the diagnostic tests that you can perform. The documentation for most systems, operating systems, and programs contains troubleshooting procedures and explanations of error messages and error codes. If you suspect a software problem, see the documentation for the operating system or program. CN4093 Application Guide for N/OS 8.4...
Page 616
Any performance data contained herein was determined in a controlled environment. Therefore, the result obtained in other operating environments may vary significantly. Some measurements may have been made on development‐level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. CN4093 Application Guide for N/OS 8.4...
Important Notes Processor speed indicates the internal clock speed of the microprocessor; other factors also affect application performance. CD or DVD drive speed is the variable read rate. Actual speeds vary and are often less than the possible maximum. When referring to processor storage, real and virtual storage, or channel volume, KB stands for 1 024 bytes, MB stands for 1 048 576 bytes, and GB stands for 1 073 741 824 bytes. When referring to hard disk drive capacity or communications volume, MB stands for 1 000 000 bytes, and GB stands for 1 000 000 000 bytes. Total user‐accessible capacity can vary depending on operating environments. Maximum internal hard disk drive capacities assume the replacement of any standard hard disk drives and population of all hard‐disk‐drive bays with the largest currently supported drives that are available from Lenovo. Maximum memory might require replacement of the standard memory with an optional memory module. Each solid‐state memory cell has an intrinsic, finite number of write cycles that the cell can incur. Therefore, a solid‐state device has a maximum number of write cycles that it can be subjected to, expressed as total bytes written (TBW). A device that has exceeded this limit might fail to respond to system‐generated commands or might be incapable of being written to. Lenovo is not responsible for replacement of a device that has exceeded its maximum guaranteed number of program/erase cycles, as documented in the Official Published Specifications for the device. Lenovo makes no representations or warranties with respect to non‐Lenovo products. Support (if any) for the non‐Lenovo products is provided by the third party, not Lenovo. Some software might differ from its retail version (if available) and might not include user manuals or all program functionality. CN4093 Application Guide for N/OS 8.4...
Particulate Contamination Attention: Airborne particulates (including metal flakes or particles) and reactive gases acting alone or in combination with other environmental factors such as humidity or temperature might pose a risk to the device that is described in this document. Risks that are posed by the presence of excessive particulate levels or concentrations of harmful gases include damage that might cause the device to malfunction or cease functioning altogether. This specification sets forth limits for particulates and gases that are intended to avoid such damage. The limits must not be viewed or used as definitive limits, because numerous other factors, such as temperature or moisture content of the air, can influence the impact of particulates or environmental corrosives and gaseous contaminant transfer. In the absence of specific limits that are set forth in this document, you must implement practices that maintain particulate and gas levels that are consistent with the protection of human health and safety. If Lenovo determines that the levels of particulates or gases in your environment have caused damage to the device, Lenovo may condition provision of repair or replacement of devices or parts on implementation of appropriate remedial measures to mitigate such environmental contamination. Implementation of such remedial measures is a customer responsibility.. Contaminant Limits Particulate • The room air must be continuously filtered with 40% atmospheric dust spot efficiency (MERV 9) according to ASHRAE Standard 52.2 • Air that enters a data center must be filtered to 99.97% efficiency or greater, using high‐efficiency particulate air (HEPA) filters that meet MIL‐STD‐282. • The deliquescent relative humidity of the particulate contamination must be more than 60% • The room must be free of conductive contamination such as zinc whis‐ kers. Gaseous • Copper: Class G1 as per ANSI/ISA 71.04‐1985 • Silver: Corrosion rate of less than 300 Å in 30 days 1 ...
Federal Communications Commission (FCC) Statement Note: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at his own expense. Properly shielded and grounded cables and connectors must be used to meet FCC emission limits. Lenovo is not responsible for any radio or television interference caused by using other than recommended cables and connectors or by unauthorized changes or modifications to this equipment. Unauthorized changes or modifications could void the user’s authority to operate the equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that might cause undesired operation. Industry Canada Class A Emission Compliance Statement This Class A digital apparatus complies with Canadian ICES‐003. Avis de Conformité à la Réglementation d'Industrie Canada Cet appareil numérique de la classe A est conforme à la norme NMB‐003 du ...
Zulassungsbescheinigung laut dem Deutschen Gesetz über die elektromagnetische Verträglichkeit von Betriebsmitteln, EMVG vom 20. Juli 2007 (früher Gesetz über die elektromagnetische Verträglichkeit von Geräten), bzw. der EMV EU Richtlinie 2014/30/EU (früher 2004/108/EC ), für Geräte der Klasse A. Dieses Gerät ist berechtigt, in Übereinstimmung mit dem Deutschen EMVG das EG‐Konformitätszeichen ‐ CE ‐ zu führen. Verantwortlich für die Konformitätserklärung nach Paragraf 5 des EMVG ist die Lenovo (Deutschland) GmbH, Meitnerstr. 9, D‐70563 Stuttgart. Informationen in Hinsicht EMVG Paragraf 4 Abs. (1) 4: Das Gerät erfüllt die Schutzanforderungen nach EN 55024 und EN 55022 Klasse Nach der EN 55022: „Dies ist eine Einrichtung der Klasse A. Diese Einrichtung kann im Wohnbereich Funkstörungen verursachen; in diesem Fall kann vom Betreiber verlangt werden, angemessene Maßnahmen durchzuführen und dafür aufzukommen.“ Nach dem EMVG: „Geräte dürfen an Orten, für die sie nicht ausreichend entstört sind, nur mit besonderer Genehmigung des Bundesministers für Post und Telekommunikation oder des Bundesamtes für Post und Telekommunikation betrieben werden. Die Genehmigung wird erteilt, wenn keine elektromagnetischen Störungen zu erwarten sind.“ (Auszug aus dem EMVG, Paragraph 3, Abs. 4). Dieses Genehmigungsverfahrenist nach Paragraph 9 EMVG in Verbindung mit der entsprechenden Kostenverordnung (Amtsblatt 14/93) kostenpflichtig. Anmerkung: Um die Einhaltung des EMVG sicherzustellen sind die Geräte, wie in den Handbüchern angegeben, zu installieren und zu betreiben. Japan VCCI Class A Statement This is a Class A product based on the standard of the Voluntary Control Council for Interference (VCCI). If this equipment is used in a domestic environment, radio interference may occur, in which case the user may be required to take corrective actions. CN4093 Application Guide for N/OS 8.4...