slxr-18 1 00-L2guide
slxr-18 1 00-L2guide
Extreme SLX-OS
Layer 2 Switching Configuration Guide,
18r.1.00
9036645-00 Rev AA
March 2020
Copyright © 2018 Extreme Networks, Inc. All Rights Reserved.
Legal Notice
Extreme Networks, Inc. reserves the right to make changes in specifications and other information contained in this document and its
website without prior notice. The reader should in all cases consult representatives of Extreme Networks to determine whether any such
changes have been made.
The hardware, firmware, software or any specifications described or referred to in this document are subject to change without notice.
Trademarks
Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of Extreme Networks, Inc. in the United
States and/or other countries.
All other names (including any product names) mentioned in this document are the property of their respective owners and may be
trademarks or registered trademarks of their respective companies/owners.
Software Licensing
Some software files have been licensed under certain open source or third-party licenses. End-user license agreements and open source
declarations can be found at: www.extremenetworks.com/support/policies/software-licensing
Support
For product support, phone the Global Technical Assistance Center (GTAC) at 1-800-998-2408 (toll-free in U.S. and Canada) or
+1-408-579-2826. For the support phone number in other countries, visit: http://www.extremenetworks.com/support/contact/
Link Aggregation.............................................................................................................................................................................................................. 17
Link aggregation overview...................................................................................................................................................................................................................17
LAG load sharing........................................................................................................................................................................................................................... 18
Link Aggregation Control Protocol......................................................................................................................................................................................... 22
LAG distribution process and conditions...................................................................................................................................................................................... 22
Configuring and managing Link Aggregation....................................................................................................................................................................22
VLANs.................................................................................................................................................................................................................................37
802.1Q VLAN overview......................................................................................................................................................................................................................37
Configuring VLANs................................................................................................................................................................................................................................37
Configuring a VLAN..................................................................................................................................................................................................................... 37
Configuring a switchport interface.......................................................................................................................................................................................... 37
Configuring the switchport interface mode.........................................................................................................................................................................38
Configuring the switchport access VLAN type................................................................................................................................................................. 38
Configuring a VLAN in trunk mode....................................................................................................................................................................................... 39
Configuring a native VLAN on a trunk port........................................................................................................................................................................ 39
Enabling VLAN tagging for native traffic............................................................................................................................................................................. 40
Displaying the status of a switchport interface.................................................................................................................................................................. 41
Displaying the switchport interface type.............................................................................................................................................................................. 41
Verifying a switchport interface running configuration................................................................................................................................................... 42
Displaying VLAN information...................................................................................................................................................................................................42
Enabling Layer 3 routing for VLANs.............................................................................................................................................................................................. 43
VLAN statistics.........................................................................................................................................................................................................................................44
Enabling statistics on a VLAN..................................................................................................................................................................................................44
Displaying statistics for VLANs............................................................................................................................................................................................... 44
Logical Interfaces...........................................................................................................................................................................................................149
Logical interfaces overview.............................................................................................................................................................................................................. 149
LIFs and bridge domains........................................................................................................................................................................................................ 149
Configuration considerations................................................................................................................................................................................................. 149
Topology Groups............................................................................................................................................................................................................269
Topology Groups..................................................................................................................................................................................................................................269
Master VLAN, member VLANs, and bridge-domains........................................................................................................................................................ 269
Control ports and free ports............................................................................................................................................................................................................ 270
Configuration considerations.......................................................................................................................................................................................................... 270
Configuring a topology group.........................................................................................................................................................................................................270
Configuring a master VLAN...................................................................................................................................................................................................271
Adding member VLANs..........................................................................................................................................................................................................271
Adding member bridge-domains........................................................................................................................................................................................272
Replacing a master VLAN...................................................................................................................................................................................................... 272
Displaying topology group information...................................................................................................................................................................................... 273
Loop Detection...............................................................................................................................................................................................................275
LD protocol overview......................................................................................................................................................................................................................... 275
Strict mode.................................................................................................................................................................................................................................... 275
Loose mode..................................................................................................................................................................................................................................276
Conventions
This section discusses the conventions used in this guide.
NOTE
A Note provides a tip, guidance, or advice, emphasizes important information, or provides a reference to related information.
ATTENTION
An Attention statement indicates a stronger note, for example, to alert you when traffic might be interrupted or the device might
reboot.
CAUTION
A Caution statement alerts you to situations that can be potentially hazardous to you or cause damage to hardware,
firmware, software, or data.
DANGER
A Danger statement indicates conditions or situations that can be potentially lethal or extremely hazardous to you. Safety
labels are also attached directly to products to warn of these conditions or situations.
Format Description
bold text Identifies command names.
Identifies variables.
Format Description
Courier font Identifies CLI output.
Convention Description
bold text Identifies command names, keywords, and command options.
italic text Identifies a variable.
[] Syntax components displayed within square brackets are optional.
Training
Extreme Networks offers product training courses, both online and in person, as well as specialized certifications. For more information,
visit www.extremenetworks.com/education/.
Getting Help
If you require assistance, contact Extreme Networks using one of the following methods:
Extreme Portal Search the GTAC (Global Technical Assistance Center) knowledge base, manage support cases and service
contracts, download software, and obtain product licensing, training, and certifications.
The Hub A forum for Extreme Networks customers to connect with one another, answer questions, and share ideas and
feedback. This community is monitored by Extreme Networks employees, but is not intended to replace specific
guidance from GTAC.
Call GTAC For immediate support: 1-800-998-2408 (toll-free in U.S. and Canada) or +1 408-579-2826. For the support
phone number in your country, visit: www.extremenetworks.com/support/contact
Before contacting Extreme Networks for technical support, have the following information ready:
• Your Extreme Networks service contract number and/or serial numbers for all involved Extreme Networks products
• A description of the failure
• A description of any action(s) already taken to resolve the problem
• A description of your network environment (such as layout, cable type, other relevant environmental information)
• Network load at the time of trouble (if known)
• The device history (for example, if you have returned the device before, or if this is a recurring problem)
• Any related RMA (Return Material Authorization) numbers
1. Go to www.extremenetworks.com/support/service-notification-form.
2. Complete the form with your information (all fields are required).
3. Select the products for which you would like to receive notifications.
NOTE
You can modify your product selections or unsubscribe at any time.
4. Click Submit.
Providing Feedback to Us
Quality is our first concern at Extreme Networks, and we have made every effort to ensure the accuracy and completeness of this
document. We are always striving to improve our documentation and help you work better, so we want to hear from you! We welcome all
feedback but especially want to know about:
• Content errors or confusing or conflicting information.
• Ideas for improvements to our documentation so you can find the information you need faster.
• Broken links or usability issues.
If you would like to provide feedback to the Extreme Networks Information Development team, you can do so in two ways:
• Use our short online feedback form at https://www.extremenetworks.com/documentation-feedback/.
• Email us at documentation@extremenetworks.com.
Please provide the publication title, part number, and as much detail as possible, including the topic heading and page number if
applicable, as well as your suggestions for improvement.
Although many different software and hardware configurations are tested and supported by this release, documenting all possible
configurations and scenarios is beyond the scope of this document.
To obtain information about other releases, refer to the documentation specific to that release.
MPLS Yes
Packet buffer memory per interface module 12GB (BR-SLX9850-10Gx72S-M)
36GB (BR-SLX9850-100Gx36CQ-M)
8GB (BR-SLX9850-10Gx72S-D)
24GB (BR-SLX9850-100Gx36CQ-D)
8GB (BR-SLX9850-100Gx12CQ-M)
Endpoint tracking The endpoint tracking feature minimizes the configuration and Endpoint tracking on page 53
management of VLANs on switches in the data center.
Layer 3 routing on an MCT Layer 3 routing is supported for IPv4 and IPv6 BGP, OSPF, Layer 3 routing over MCT on page 118
bridge domain and IS-IS routing protocols on an MCT bridge domain (BD).
Multiple VLAN Registration MVRP is a Layer 2 protocol that allows the dynamic Multiple VLAN Registration Protocol (MVRP) on
Protocol (MVRP) propagation of VLAN information from device to device page 131
Routing over VPLS (VEoVPLS) VEoVPLS is enchanced to support Routing over VPLS on page 185
• OSPF (V2 and V3)
• ISIS
• VRRP and VRRPE
Loop detection Loop detection for VLAN Loop detection for VLAN on page 285
To configure links to form a LAG, the physical links must be of the same speed. Link aggregation can be done by statically configuring
the LAG, or by dynamically configuring the LAG using the IEEE 802.1AX Link Aggregation Control Protocol (LACP).
When queuing traffic from multiple input sources to the same output port, all input sources are given the same weight, regardless of
whether the input source is a single physical link or a trunk with multiple member links.
NOTE
The LAG or LAG interface is also referred to as a port-channel in the SLX 9850 platform.
The SLX 9850 platform supports the following LAG scalability configuration:
• The default profile supports 256 LAGs (64 ports per LAG)
• The Lag-profile-1 profile supports 512 LAGs (32 ports per LAG)
NOTE
The following example enables the lag hardware profile for scaling to 512. The user has to save and reload to activate a new
profile. Use the same procedure to revert to the default profile.
1. Define where to start the picking headers for the key generation using the lag hash hdr-start <fwd |term> command.
• fwd— start from the header that is used for the forwarding of the packet (inner header). This is the default option.
• term— start from the last terminated header (outer header), that is the header below forwarding header. In the case of
switching traffic, there would not be any header below forwarding header, thus hashing will not be visible.
2. Configure the number of headers to be considered for LAG hashing using the lag hash hdr-count <count> command. The
default value is 1. There can be a maximum of 3 headers based on the first header selected using the command in the previous
step.
The following options provide other LAG configurations to achieve specific tasks.
• Configure hash rotate using the lag hash rotate <rotate-number> command to provide different options for randomness of
hashing. The number can be between 0 and 15. The default value is 3.
• Configure hash normalize by using the lag hash normalize command if there is a need to use the same hash in both directions.
The normalize option is disabled by default.
• Allow the source port to be included in the hashing configuration using the lag hash srcport command. The source port is not
used for hashing by default.
• To skip the entire MPLS label stack and pick only the BOS label for hashing, use the lag hash bos <start | skip>. The command
default is If MPLS header is used for hashing, it will use all labels including BOS label for hashing.
– start— start from BOS. This is the default option.
– skip— hash from header next to BOS.
• Enter the lag hash pwctrlword skip command to skip password control word in the hashing configuration.
• The following MPLS transit node LSR hashing configuration options are available when using the lag hash speculate-mpls
command. The default option is using the MPLS labels.
– enable— Enables Speculative MPLS.
– inner-eth— Enables inner ethernet header hash for L2VPN.
– inner-ip-raw— Enables inner IPv4 header hash for L2VPN raw mode.
– inner-ip-tag— Enables inner IPv4 header hash for L2VPN tag mode.
– inner-ipv6-raw— Enables inner IPv6 header hash for L2VPN raw mode.
– inner-ipv6-tag— Enables inner IPv6 header hash for L2VPN tag mode.
• Select the fields to be used for LAG hashing per-header type by entering the [no] lag hash protocol-type packet-fields-to-be-
used-for-hashing command.
• Select the protocol header type using one of the following commands. By default, all the header parameters are enabled as
shown here. You can disable or enable a parameter only one at any given instant.
NOTE
Using the no form of the following commands will mask a certain field in the configuration and that field will not be
used for load-balance hashing.
– Ethernet headers. (By default, all the header parameters are enabled as shown here. You can disable or enable a parameter
only one at any given instant.) :
› [no] load-balance hash ethernet <sa-mac>
› [no] load-balance hash ethernet <da-mac>
› [no] load-balance hash ethernet <etype>
› [no] load-balance hash ethernet <vlan>
– IPv4 and L4 headers: [no] load-balance hash ip < src-ip > <dst-ip > < protocol > < src-l4-
port> < dst-l4-port >
– IPv6 and L4 headers: [no] load-balance hash ipv6 < ipv6-src-ip > < ipv6-dst-ip> < ipv6-next-
hdr> <ipv6-src-l4-port> < ipv6-dst-l4-port>
– MPLS: [no] load-balance hash mpls < label1 > <label2> < label3>
Layer 2/ Layer 3 packet • Ethernet DA, SA, Etype, Vlan- • Ethernet destination address, source address, ethernet type, VLAN
load balancing id ID load balancing
• IPv4/v6 dst IP, src IP • IPv4/v6 destination address, source address load balancing
• L4 Src-Port, Dst-Port • Layer 4 source and destination port-based load balancing
Hash Settings
hdr-start:FWD, hdr-count:1, bos-start:0, bos-skip:0, skip-cw:0
normalize:0, rotate:3, include_src_port:0, Disable: L2 0, ipv4 0, ipv6 0, mpls 0
mpls_speculate: Enabled
load-balance-type hash-based
This hashing scheme is supported only with the "Layer 2 Optimized" Tcam profile and when the feature is enabled by default in this
profile. When the profile tcam layer2-optimised-1 configuration is activated, the "Error: Operation not supported in the current hardware
TCAM profile" message is displayed for the following commands as these functionalities are already taken care of by this enhanced
hashing scheme:
Hash Settings
hdr-start:FWD, hdr-count:3, bos-start:0, bos-skip:0, skip-cw:0
normalize:0, rotate:3, include_src_port:0, Disable: L2 0, ipv4 0, ipv6 0, mpls 0
mpls_speculate: Enabled
load-balance-type hash-based
For comparison, the following displays the show port-channel load-balance command output for a non layer 2 optimized profile:
Hash Settings
mpls_speculate:Enabled
load-balance-type hash-based
2. Enter the interface port-channel command to create a new port channel interface at the global configuration level.
NOTE
The port-channel interface ranges from 1 to 512.
After creating a new port channel, you can do "no shutdown" or "shutdown" to bring up or down the port-channel as follows.
2. Enter the no interface port-channel command to delete an existing port channel interface at the global configuration level.
NOTE
The port-channel interface ranges from 1 to 512.
The following example deletes the existing port channel interface 30.
2. Enter the interface port-channel command to add a port channel interface at the global configuration level.
5. Add a port to the port channel interface as a dynamic (using LACP), active or passive mode.
The following example is for a static LAG configuration with the mode ON.
The following example adds a port 1/5 to the existing dynamic port channel interface 30 with the mode active.
NOTE
Run the no shutdown command to bring the above interface online.
device(conf-if-eth-1/5)# no shutdown
2016/10/18-03:47:15, [NSM-1019], 528, M2 | Active | DCE, INFO, SLX, Interface Ethernet 1/5 is
administratively up.2016/10/18-03:47:15, [NSM-1001], 529, M2 | Active | DCE, INFO, SLX, Interface
Ethernet 1/5 is online.
The following example adds a port 1/5 to the existing dynamic port channel interface 30 with the mode passive.
device(conf-if-eth-1/5)# no channel-group
The following example deletes a port 1/5 from the existing port channel interface 30.
This configuration allows a port-channel to operate at a certain minimum bandwidth at all times. If the bandwidth of the port-channel
drops below the minimum number, then the port-channel is declared operationally DOWN even though it has operationally UP
members.
3. Configure the minimum number of LAG member links at the port-channel interface configuration mode.
device(conf-Port-channel-30)# minimum-links 5
NOTE
The number of links ranges from 1 to 64. The default minimum links is 1.
The following example sets min-link 5 to the existing port channel interface 30.
The system priority value must be a number in the range of 1 through 65535. The higher the number, the lower the priority. The default
priority is 32768.
To configure the global LACP system priority, perform the following steps:
2. Enter the interface port-channel command to add a port channel interface at the global configuration level.
3. Configure the interface ethernet command and add the port to the port-channel interface.
NOTE
The LACP port priority value ranges from 1 to 65535. The default value is 32768.
To configure the LACP timeout period on an interface, perform the following steps:
Since the destination address of the PDU is a multicast MAC, the frame will be flooded on the VLAN. If the VLAN on which the LACP
PDU is received is a regular VLAN, the PDU will be flooded on the VLAN. If the VLAN on which the PDU is received is a service
delimiter for a bridge domain, the LACP PDU is flooded on the bridge domain accordingly.
LACP PDU forwarding is supported only on physical interfaces and static port channel interfaces. LACP PDUs cannot be forwarded if
they are received on a LACP based dynamic port channel. LACP PDU forwarding enabled on a static port channel applies to all the
member ports. If LACP is enabled on a port, it overrides the LACP PDU forwarding configuration and the PDUs are trapped in the CPU.
2. Enter the interface port-channel command to add a port channel interface at the global configuration level.
2. Specify the physical interface on which LACP PDU forwarding needs to enabled.
1. Use the show port-channel summary command to display brief information of all port-channels.
2. Use the show port-channel detail command to display detailed information of all the port-channels.
Static Aggregator: Po 2
Aggregator type: Standard
Number of Ports: 2
Member ports:
Eth 2/126
Eth 4/126
LACP Aggregator: Po 10
Aggregator type: Standard
Actor System ID – 0x8000,76-8e-f8-0a-98-00
Admin Key: 0010 – Oper Key 0010
Receive link count: 2 – Transmit link count: 2
Individual: 0 – Ready: 1
Partner System ID – 0x8000,76-8e-f8-0a-68-00
Partner Oper Key 0010
Number of Ports: 2
Member ports:
Link: Eth 2/4 (0x18820016) sync: 1 *
Link: Eth 2/18 (0x18890084) sync: 1
3. Use the show port-channel number command to display detailed information of a specific port-channel interface
Enter the show lacp sys-id command to display LACP information for the system ID and priority.
Before displaying the LACP port-channel information, it is recommended that you create a port-channel interface in a LAG to generate
details.
Enter the show lacp counters command to display LACP statistics for a port-channel.
Enter the clear lacp LAG_group_number counters command to clear the LACP counter statistics for the specified LAG group
number.
Enter the clear lacp counter command to clear the LACP counter statistics for all LAG groups.
Troubleshooting LACP
To troubleshoot problems with your LACP configuration, use the following troubleshooting tips.
If a standard IEEE 802.1AX-based dynamic trunk is configured on a link and the link is not able to join the LAG, do the following:
• Make sure that both ends of the link are configured as standard for the trunk type.
• Make sure that both ends of the link are not configured for passive mode. They must be configured as active /active, active /
passive, or passive /active.
• Make sure that the port-channel interface is in the administrative "up" state by ensuring that the no shutdown command was
entered on the interface on both ends of the link.
• Make sure that the links that are part of the LAG are connected to the same neighboring switch.
• Make sure that the system ID of the switches connected by the link is unique. You can verify this by entering the show lacp sys-
id command on both switches.
• Make sure that LACPDUs are being received and transmitted on both ends of the link and that there are no error PDUs. You can
verify this by entering the show lacp counters number command and looking at the receive mode (rx) and transmit mode (tx)
statistics. The statistics should be incrementing and should not be at zero or a fixed value. If the PDU rx count is not
incrementing, check the interface for possible CRC errors by entering the show interface link-name command on the
neighboring switch. If the PDU tx count is not incrementing, check the operational status of the link by entering the show
interface link-name command and verifying that the interface status is "up."
When a link has problem, the show port-channel command displays the following message:
If a static trunk is configured on a link and the link is not able to join the LAG, do the following:
• Make sure that both ends of the link are configured as standard for trunk type and verify that the mode is "on."
• Make sure that the port-channel interface is in the administrative "up" state by ensuring that the no shutdown command was
entered on the interface on both ends of the link.
UDLD protocol detects and blocks broken unidirectional links in the network. This is done through the exchange of UDLD protocol data
units (PDU) between devices on a physical link. Both ends of the link must support the same proprietary UDLD protocol to detect the
unidirectional link condition.
A unidirectional link is assumed when the UDLD stops receiving UDLD PDUs from the other end of the link. The device then blocks the
physical link. The physical link will still be up but the line protocol will be down. UDLD PDUs continue to be transmitted and received on
the link.
UDLD is disabled by default. To use the UDLD protocol, the protocol must first be enabled globally and then on each individual physical
port. When enabled globally and on a physical port, the device starts transmitting UDLD PDUs periodically on the port.
In the previous figure, STP detects that the port on Switch D that is connected to Switch C should be put into a blocked state. Therefore,
no data traffic gets transmitted or received on this port. Data traffic remains blocked as long as Switch D receives bridge protocol data
units (BPDUs) from both switches C and B.
If the link between Switch C and Switch D becomes unidirectional (for reasons such as hardware failure or incorrect cabling) in the
direction from D to C, Switch D ages out the status that it was receiving BPDUs from Switch C. This eventually causes STP to put the
port in a forwarding state, thus allowing all data traffic. This creates a loop for all BUM traffic that enters the network. BUM traffic can go
from Switch B to Switch D to Switch C to Switch A, and then back to Switch B.
To prevent this loop from forming, UDLD can be used to detect that the link between Switch C and Switch D has become unidirectional.
Configuring UDLD
Complete the following steps to configure basic UDLD on your device.
2. Enable the UDLD protocol and enter protocol UDLD configuration mode.
device(config-udld)# hello 20
This changes the interval at which UDLD PDUs are transmitted. The default interval, in counts of one hundred milliseconds
is 500 ms.
device(config-udld)# multiplier 8
This changes the timeout multiplier value to affect the UDLD PDU timeout interval. The UDLD timeout interval is the product of
the hello time interval at the other end of the link and the timeout multiplier value.
When the remote is Multi-Service IronWare or FastIron devices, the timeout equals local hello interval × multiplier value.
5. Return to global configuration mode.
device(config-udld)# exit
8. Repeat the preceding step for each port on which you wish to enable UDLD.
NOTE
When the UDLD protocol is enabled on one end of a link, the timeout period might elapse before the UDLD protocol
is enabled on the other end of the link. In this case, the link becomes temporarily blocked. When the UDLD protocol is
enabled at the other end of the link and a UDLD PDU is received, UDLD automatically unblocks the link.
device(config-if-eth-5/1)# end
NOTE
The show interface command also indicates whether UDLD is enabled.
A VLAN contains end stations that have a common set of requirements that are independent of physical location. You can group end
stations in a VLAN even if they are not physically located in the same LAN segment. VLANs are typically associated with IP subnetworks
and all the end stations in a particular IP subnet belong to the same VLAN. Traffic between VLANs must be routed. VLAN membership
is configurable on a per-interface basis.
Configuring VLANs
The following sections discuss working with VLANs on Extreme devices.
Configuring a VLAN
Follow this procedure to configure a VLAN in the Extreme device at the global configuration level.
2. Enter the vlan command to create a topology group at the global configuration level.
device(config)# vlan 5
device(config-vlan-5)#
NOTE
The no vlan command removes the existing VLAN instance from the device.
device(conf-if-eth-0/1)# switchport
device(conf-if-eth-0/1)# switchport
4. Enter the switchport mode command to configure the switchport interface in trunk mode.
NOTE
The default mode is access. Enter the switchport mode access command to set the mode as access.
NOTE
Before you change the switch port mode from switchport mode access with an explicit switchport access vlan to switchport
mode trunk-no-default-native, you must enter the no switchport command on the interface level, and then enter the
switchport command to set the interface as a switchport. Now you can configure the switchport mode trunk-no-default-
native command.
Ensure that reserved VLANs are not used. Use the no switchport access vlan command to set the default VLAN as the access VLAN.
device(conf-if-eth-0/1)# switchport
4. Enter the switchport access vlan command to set the mode of the interface to access and specify a VLAN.
device(conf-if-eth-0/1)# switchport
4. Enter the switchport trunk allowed vlan command to set the mode of the interface to trunk and add a VLAN.
The example sets the mode of a port-channel interface to trunk and allows all VLANs.
device(conf-if-eth-0/1)# switchport
4. Enter the switchport trunk native-vlan command to set native VLAN characteristics to access and specify a VLAN.
This example removes the configured native VLAN on the Ethernet interface.
The following table describes the acceptable frame types, as well as system behavior, for tagged native VLAN, untagged native VLAN,
and no native VLAN.
TABLE 4 Acceptable frame types and system behavior for native VLANs
Tagged native VLAN Untagged native VLAN No native VLAN
Configuration switchport trunk tag native-vlan no switchport trunk tag native-vlan switchport mode trunk-no-default-
(Default) and Globally: vlan dot1q or Global config: no vlan dot1q tag native
tag native native
Acceptable frame type VLAN-tagged only All (tagged and untagged) VLAN-tagged only
Receive untagged Drop Forward/flood in native VLAN Drop
Receive tagged on native VLAN Forward/flood in native VLAN Forward/flood in native VLAN Drop
Transmit on native VLAN Tagged with native VLAN Untagged packet Will not forward on native VLAN
device(conf-if-eth-0/1)# switchport
4. Enter the switchport trunk tag native-vlan command to enable tagging for native traffic data VLAN characteristics on a specific
interface.
This example enables tagging for native traffic data on a specific Ethernet interface.
Enter the show interface switchport to display the detailed Layer 2 information for all interfaces.
The example displays the detailed Layer 2 information for a port-channel interface.
Enter the show running-config interface to display the running configuration information for a specific interface.
This example displays the running configuration information for a port-channel interface.
2. Create a VLAN.
3. Create a virtual Ethernet (VE), assign an IP address and mask, and enable the interface.
A VE interface can exist without a VLAN configuration, but it must be provisioned in the VLAN in order to be used.
4. Enter the router-interface command and specify the VLAN.
VLAN statistics
Devices gather statistics for all ports and port channels on configured VLANs.
Use the statistics command in the VLAN configuration mode to enable statistics on a VLAN.
NOTE
Statistics has to be manually enabled for a specific VLAN, since it is not enabled by default for
VLANs.
device(config)# vlan 5
device(config-vlan-5)#
3. Enter the statistics command to enable statistics for all ports and port channels on configured VLANs.
device(config-vlan-5)# statistics
NOTE
Use the no statistics command to disable statistics on VLANs.
device(config-vlan-5)# no statistics
Enter the show statistics vlan command to view the statistics for all ports and port channels on all configured VLANs.
Vlan 10 Statistics
Interface RxPkts RxBytes TxPkts TxBytes
eth 0/1 821729 821729 95940360 95940360
eth 0/2 884484 885855 95969584 95484555
po 1 8884 8855 9684 9955
Vlan 20 Statistics
Vlan 10 Statistics
Interface RxPkts RxBytes TxPkts TxBytes
eth 0/1 821729 821729 95940360 95940360
eth 0/2 884484 885855 95969584 95484555
po 1 8884 8855 9684 9955
Enter the clear statistics vlan command to clear the statistics for all ports and port channels on all configured VLANs.
VE route-only mode
By default, physical ports and port-channels (LAG ports) support both Layer 2 switching and Layer 3 routing. VE route-only mode
enables these ports to act exclusively as a Layer 3 virtual Ethernet (VE) interface, dropping all ingress packets that require Layer 2
switching.
The MAC learning of dropped packets is not affected by this feature. ARP requests (broadcast), LACP, and BPDU packet processing are
also not affected. The following table lists the effects of this mode on a variety of features.
2. Create a VLAN.
device(conf-if-eth-1/2)# switchport
7. Enter the route-only command to enable Layer 3 routing exclusively on the port.
device(conf-if-eth-1/2)# route-only
Use the no route-only command to revert to default Layer 2 and Layer 3 behavior.
8. Enable the interface and exit to global configuration mode.
device(conf-if-eth-1/2)# no shutdown
device(conf-if-eth-1/2)# exit
11. Enter virtual Ethernet (VE) configuration mode and specify the VLAN.
2. Create a VLAN.
device(config-Port-channel-1)# switchport
8. Enter the route-only command top enable Layer 3 routing exclusively on the port.
device(config-Port-channel-1)# route-only
Use the no route-only command to revert to default Layer 2 and Layer 3 behavior.
9. Enable the interface and exit to global configuration mode.
device(config-Port-channel-1)# no shutdown
device(config-Port-channel-1)# exit
11. Enter virtual Ethernet (VE) configuration mode and specify the VLAN.
A virtual routing interface is a logical routing interface that the Extreme device uses to route Layer 3 protocol traffic between protocol-
based VLANs. It is a logical port on which you can configure Layer 3 routing parameters.
For example, to enable a Extreme device to route IP traffic from one IP protocol VLAN to another, you must configure a virtual routing
interface on each IP protocol VLAN, then configure the appropriate IP routing parameters on each of the virtual routing interfaces.
NOTE
Only one router VE interface can be mapped to a VLAN. The VLAN ID and the VE ID need not be the same.
NOTE
For a discussion of this feature for Layer 3, refer to the "DHCPv4" chapter in the Extreme SLX-OS Layer 3 Configuration
Guide.
Overview
It is advantageous to have DHCP relay agent support when DHCP clients and servers are not on the same subnet. DHCP broadcast
requests are relayed by the DHCP relay agent to the DHCP server. The DHCP replies are unicasted to the DHCP relay agent, which in
turn relays them back to the DHCP client.
For Layer 3, relay agents populate the GIADDR (global IP address) field and also append the "Relay Agent Information" option. DHCP
servers use this option for assigning the IP address and other parameters.
In some network configurations that have Layer 2 devices between the DHCP client and the DHCP relay agent, it is better to have Layer
2 relay agents running on Layer 2 devices. This places the agents in a better position to append the Relay Agent Information option
because they are closer to the DHCP clients. These agents also broadcast the DHCP messages. (A Layer 3 relay agent, on the other
hand, relays the information to the DHCP server.)
Option 82
When this Layer 2 feature is enabled on a VLAN, the Option 82 information is inserted by the Layer 2 relay agent before the DHCP
messages are broadcasted further. This information allows the DHCP server to select an IP address or other parameter. The DHCP
server echos Option 82 in the reply packets. The DHCP Layer 2 relay agent validates and removes Option 82 and sends the response
to the DHCP client.
82 N i1 i2 i3 i4 ... iN
NOTE
The length N represents the total number of octets in the Agent Information Field. The Agent Information field consists of a
sequence of SubOpt/Length/Value tuples for each suboption.
The following table lists the circuit ID suboptions that are added by the relay agent.
2 68
NOTE
The circuit ID is a combination of the VLAN ID and the interface description string. If the interface description is not configured,
the default string “Extreme" is used in the circuit ID.
The following table lists the remote ID suboptions that are added by the relay agent.
2 8
• The Layer 2 relay agent uses the Relay Agent Information option to find out whether it had appended Option 82 to the request
message.
• The Layer 2 relay agent removes Option 82 from the packet received from the DHCP server after this option is validated, and
then it forwards the message to the interface identified by the Relay Agent Information option.
The following figure illustrates multiple DHCP servers and clients on the same subnet.
The following figure illustrates a DHCP server on another subnet with clients and one Layer 3 relay agent.
FIGURE 4 DHCP server on another subnet with clients and one Layer 3 relay agent
device(config)# vlan 10
4. To verify the running configuration on the VLAN, enter the show running-config command and specify the VLAN.
5. To verify the configuration on the switch, enter the show ip dhcp relay option command.
You can use the interface keyword in the above command to specify an interface.
6. To disable this feature, enter the no t2 relay agent information option command.
Endpoint tracking
The endpoint tracking feature minimizes the configuration and management of VLANs on switches in the data center.
Overview
Statically provisioning VLANs in a data center network has the following drawbacks:
• Managing VLANs on top-of-rack (TOR) switches is tedious for the administrator.
• Having VLANs provisioned ahead of time increases the size of the active topology for control protocols such as STP and RSTP,
increasing convergence times.
• Flood (unknown unicast, broadcast) traffic can unnecessarily eat up bandwidth on the TOR-to-EOR (end of row) links.
• For the case when the virtual machine (VM) sends or receives tagged traffic, flood traffic can consume CPU cycles on every
server that is connected to the network.
• The dynamic VLAN feature allows SLX-OS to create, prune, and open VLANs on the switch dynamically as they are needed by
the VMs. This enables the VLAN to follow the VM as it migrates between servers in the data center.
The endpoint tracking feature also authorizes the VM. When a VM (and MAC address) is authorized, SLX-OS dynamically creates the
VLAN that is required for the VM to send traffic. If a VM shuts down or is moved, its VLAN is pruned to preserve bandwidth. In this way
the network responds to changes in the VM network.
As a RADIUS Access response, only one VSA attribute is provided, for Egress-vlan. The Egress-vlan VSA format has sub-type 216 and
a value field of type integer. The format is shown below.
For MAC reauthentication, RADIUS sends a Change of Authorization (CoA) of Code 43 with the VSA. This has a sub-type of 1 and the
Value field is the string "subscriber:command=reauthenticate". The format is shown below.
NOTE
For configuration details, refer to the "VLANs" chapter in this
guide.
The following illustrates the use of the endpoint-tracking enable command in switchport trunk mode.
By default, reauthentication for each session on the port is disabled. However, you can optionally set a timer value for reauthentication, by
means of the endpoint-tracking enable reauth-period command, as in the following example.
1. The source MAC lookup fails to find a matching entry in hardware and the packet is sent to the CPU for Layer 2 learning with a
tag in place of the IVID.
2. When received by the CPU, the wire tag information is stored as a VLAN, and the MAC address is sent for authentication.
3. If authentication is successful and the RADIUS VLAN assignment matches the wire tag, or if there is no VLAN assignment from
RADIUS, VLAN creation is triggered and the egress VIF is set for the port to allow forwarding and flooding.
Verifying configurations
A variety of show commands are available to verify the configuration of endpoint tracking, as described in the following table.
show mac-address-table endpoint-tracking authenticated Displays authenticated MAC addresses that are learned on all ports that
are enabled for endpoint tracking.
show mac-address-table endpoint-tracking authentication-failed Displays nonauthenticated MAC addresses that are learned on all ports
that are enabled for endpoint tracking.
show mac-address-table endpoint-tracking authenticated interface Displays authenticated MAC addresses that are learned on a specific port
that is enabled for endpoint tracking.
show mac-address-table endpoint-tracking authentication-failed Displays nonauthenticated MAC addresses that are learned on a specific
interface port that is enabled for endpoint tracking.
show vlan brief Displays all dynamically created VLANs and port/VLAN membership.
MAC reauthentication
MAC reauthentication lets the RADIUS server send unsolicited messages to SLX-OS, to relearn the MAC address of the VM. Note the
following:
• SLX-OS stores the CoA request identifier and uses the same identifier in the response (ACK/NAK).
• A RADIUS reauthentication request without calling-station-id is returned with a NAK.
• A RADIUS reauthentication request with a calling-station-id that is not present in the switch is returned with a NAK.
• A RADIUS request with a different vendor-id is silently ignored by the switch.
MCT support
A VLAN that is created dynamically on one MCT peer node is communicated to other peer node. Similarly, if a cluster client edge port
(CCEP) port becomes part of a VLAN dynamically on one MCT peer node, this is communicated to the other peer node. The receiving
MCT peer node, depending on the message, creates a dynamic VLAN or dynamic port VLAN membership.
The dynamic deletion of a VLAN or port VLAN membership is triggered by the last local MAC deletion. In addition, similar to the
addition case, this information is also communicated to the peer.
NOTE
If MVRP is enabled on an MCT node, you must configure the interface enabled for endpoint tracking with MVRP applicant
mode as non-participant through the mvrp applicant-mode non-participant command in interface configuration mode. Refer
to MVRP with endpoint tracking on page 141 in this document. Also, if you observe an MVRP flap, configure MVRP timers to
higher values on the ICL interfaces. For details, refer to the timer command.
VLANs on each node are extended through common Virtual Network Instance (VNI) 5000. The MAC addresses of local hosts are
learned on access points, and MAC addresses are learned on VXLAN tunnels. A split-horizon topology is supported. All nodes
participating in the VLAN must be connected through VXLAN tunnels, because there is no tunnel-to-tunnel flooding of broadcast,
unknown unicast, and multicast (BUM) traffic.
In this topology, Devices 1, 2, and 3 are VXLAN Layer 2 gateway devices. On Device 3, tunnel 1 and tunnel 2 are mapped to VLAN 5.
VLAN 5 has two hosts, MAC 3 and MAC 4. Device 3 is connected to two other hosts, Device 1 and Device 2, which connect to hosts
MAC 1 and MAC 2, respectively, through VXLAN tunnels 1 and 2, respectively. If MAC 3 needs to establish traffic to MAC 1, initially
there will be BUM flooding and upon a response from MAC 1, MAC 1 is learned through tunnel 1. Subsequent traffic goes directly from
MAC 3 to Device 1 on tunnel 1. Traffic in the reverse direction comes from Device 1, is decapsulated, and goes to MAC 3.
2. Enter the overlay-gateway command, specify the name of a gateway, and enter VXLAN overlay gateway configuration mode.
5. Enter the map bridge-domain command and specify a bridge domain and VNI.
7. Enter the site command, specify a site name, and enter VXLAN overlay gateway site configuration mode.
This mode configures a VXLAN tunnel to the site node. Only regular VTEPs are supported; logical VTEPs are not supported.
8. Enter the ip address command and specify an IP address.
10. Enter the extend bridge-domain add command and specify a bridge domain.
device(config-overlay-gw-GW1-site-mysite1)# activate
12. In privileged EXEC mode, enter the show overlay-gateway command to confirm the gateway configuration.
13. In privileged EXEC mode, enter the show tunnel command to confirm the tunnel configuration.
14. In privileged EXEC mode, enter the show vlan command to confirm the VLAN configuration.
15. In privileged EXEC mode, enter the show mac-addfress-table command to confirm the MAC configuration.
Since a bridge domain supports different port and VLAN endpoints, all of its traffic can be extended to a remote node through one VNI.
Also, VXLAN gateway support to bridge domains enables VLAN translation of traffic on both sides of the network. The local VLANs can
use different VLAN tags on either side of the network and map to the same VNI.
NOTE
Only point-to-multipoint bridge domains are supported to extend over VXLAN tunnels. Point-to-point bridge domains are not
supported.
You can extend the bridge domain under a site configuration. You can configure the bridge domain to VNI mapping automatically with
auto mode where the bridge domain to the VNI is mapped implicitly. For example, VLANs 1 through 4096 are mapped to VNI 1
through 4090, respectively, and the bridge domain 1 is mapped to 4097. You can also configure the bridge domain to a VNI map
manually, similarly to that of a VLAN.
NOTE
The default tagging mode for a bridge domain is raw mode.
Follow these steps configure a VXLAN Layer 2 gateway to support bridge domains.
2. Create a VXLAN overlay gateway and access the overlay gateway configuration mode.
6. Create a remote Layer 2 extension site in a VXLAN overlay gateway and access site configuration mode.
device(config-site-bd1)# exit
device(config-overlay-gateway-gateway1)# activate
To configure RFC-compliant mode, configure the bridge domain in raw mode as shown in the following example.
pw-profile test
vc-mode raw
bridge-domain 10 p2mp
pw-profile test
Then extend the bridge domain in the overlay gateway, as shown in the following example.
overlay-gateway gateway1
type layer2-extension
ip interface loopback 1
map bridge-domain 10 vni 999
site vcs1
ip address 10.67.67.1
extend bridge-domain add 10
NOTE
An SLX-OS device supports RFC-compliant mode with the bridge domain-based VXLAN service only.
NOTE
This mode does not interoperate with RFC-compliant mode.
This mode is supported for VLAN-based VXLAN service and bridge domain-based VXLAN service with tag mode.
To configure enhanced payload tag transport mode, configure the bridge domain in tagging mode as shown in the following example.
pw-profile test
vc-mode tag
bridge-domain 10 p2mp
pw-profile test
Then extend the bridge domain in the overlay gateway, as shown in the following example.
overlay-gateway gateway1
type layer2-extension
ip interface Loopback 1
map bridge-domain 10 vni 999
site vcs1
ip address 10.67.67.1
extend bridge-domain add 10
The BGP session between the cluster peers must be configured with an encapsulation of MPLS. The BGP session with the remote peers
must be configured with an encapsulation of VXLAN.
The LVTEP control plane uses MCT Control Plane Designated Forwarder Election among the cluster peers. BGP VXLAN tunnels that
are discovered automatically are treated as cluster client end points (CCEPs).
The following table shows Ethernet Segment Identifier (ESI) values for the VXLAN tunnels.
ESI type 0
Destination IP address (DIP) 4 bytes
Source IP address (SIP 4 bytes
The ESI label is allocated globally for the LVTEP and is the same for all LVTEP tunnels. The tunnel operational status that is used for
LVTEP tunnels is the same as that used for cluster clients.
For BGP EVPN deployment, MAC addresses that are learned on the LVTEP VXLAN tunnels are not synchronized between the cluster
peers. However, for static LVTEP, the data-plane MAC addresses that are learned on the CCEPs of the LVTEP tunnel are synchronized
between the cluster peers.
NOTE
LVTEP is supported only with the TCAM profile VxlanExtended, as configured by the profile tcam vxlan-ext command in
hardware configuration mode. It is not supported in other TCAM profiles.
All the show commands that apply to MCT clients also apply to tunnel cluster clients.
Example topology
The following figure illustrates a basic LVTEP topology for the data plane, with cluster nodes supporting remote peers and client end
points (CEPs) and cluster client end points (CCEPs).
Packet formats
The following tables describe the supporting packet formats.
The preceding packet format is used between the remote peers for both unicast and BUM traffic.
The preceding packet format is used between the cluster peers for unicast traffic.
The above packet format is used between the cluster peers for BUM traffic when the traffic is received on the CEP interface.
The above packet format is used between the cluster peers for BUM traffic when the traffic is received on the CCEP Interface. This
applies to both the Layer 2 CCEP interface or the tunnel CCEP interface. The ESI label distinguishes whether the interface is a Layer 2
CCEP interface or a tunnel CCEP interface.
NOTE
For PWE (unicast/multicast) encapsulation, the MPLS tunnel label is present if and only if the peers are not directly connected
over an ICL link and there is an MPLS transit router between them. For directly connected ICL peers, there is only the EVPN
unicast/multicast encapsulation, with or without an ESI label, and there is no MPLS tunnel label.
Deploy to No Deploy
2. Undeploy (or remove) the cluster configuration on both the cluster nodes.
3. Change the loopback address on both the cluster nodes to be different from the LVTEP loopback address.
No Deploy to Deploy
2. Change the loopback address on both the cluster nodes to a common LVTEP loopback address that is different from the
previous loopback address.
For the static LVTEP, the behavior is the same as that for the Layer 2 CCEP, where the MAC addresses are synced between the cluster
peers. When a BGP session or tunnel down event occurs, the MAC addresses point to the corresponding MCT EVPN PWE and are
forwarded to the cluster peer; they are not flooded on the corresponding VLAN/BD.
NOTE
This behavior differs from that for a Layer 2 CCEP and EVPN MPLS, where the nodes operate in loose/strict mode when the
ICL link goes down.
The attachment circuit (AC) port is configured with a tag protocol identifier (TPID) that is different from that of the incoming traffic; the
port is also configured with an untagged VLAN. All the traffic coming in on this port is treated as untagged traffic. The following figure
illustrates this topology.
The untagged VLAN configured on the AC port is extended through the EVPN. All the traffic arriving on this untagged VLAN is bundled
with a single Virtual Network Identifier (VNI). The MAC addresses are learned on the untagged VLAN that is configured on that port,
irrespective of the VLAN tag of the incoming packet. As all the traffic on this port is mapped to a single flooding domain, MAC addresses
on this VLAN must be unique.
device(conf-if-eth-1/1)# switchport
device(conf-if-eth-1/1)# switchport mode access
device(conf-if-eth-1/1)# switchport access vlan 200
device(conf-if-eth-1/1)# tag-type 9100
The following example illustrates a configuration with a bridge domain (BD) logical interface (LIF) on an Ethernet port.
device(conf-if-eth-1/1)# switchport
device(conf-if-eth-1/1)# switchport mode trunk-no-default-native
device(conf-if-eth-1/1)# logical-interface ethernet 1/1.1 untagged vlan 200
device(conf-if-eth-1/1)# tag-type 9100
Configure the appropriate TCAM profile for this feature. Refer to Configuring TCAM profiles to support LVTEP on page 78.
1. Configure multiple loopback interfaces to support BGP neighbor address-family and the LVTEP IP address.
a) Enter global configuration mode.
c) Configure a loopback interface with OSPF area 0 and an IP address, and enable the interface to support BGP neighbor
address-family.
interface Loopback 2
ip ospf area 0
ip address 6.7.100.67/32
no shutdown
2. In global configuration mode, create two VLANs to support a pair of logical interfaces (LIFs) and BDs.
device(conf-if-eth-0/5)# switchport
device(conf-if-eth-0/5)# no shutdown
The VLAN in the LIF configuration is for VLAN tag classification. This example shows a dual-tagged LIF being configured.
The expected packet that enters through this port must be dual-tagged, without VLAN 10 and the inner VLAN 1, in order
to be classified as a packet received for this LIF.
g) (Optional) By default, the administrative state of the LIF is "no shutdown." To remove the port from participating in any data
traffic without having to shut down the physical interface, enter the no form of the shutdown (LIF) command.
device(conf-if-eth-lif-0/5.1)# no shutdown
h) Repeat Step 3e through Step 3g for the second logical interface, and specify a second inner VLAN.
Logical interfaces representing BD endpoints must be created before they can be bound to a BD. For further information,
refer to Logical Interfaces.
c) Ensure that local switching is enabled for BD 1.
device(config-bridge-domain-1)# local-switching
device(config-bridge-domain-1)# bpdu-drop-enable
A default pseudowire (PW) profile is automatically configured, with the following defaults:
bridge-domain 2 p2mp
logical-interface ethernet 0/5.2
pw-profile default
bpdu-drop-enable
local-switching
device(config-overlay-gw-gw1)# activate
6. In global configuration mode, enable EVPN configuration mode and configure the EVPN instance.
a) Enter default EVPN configuration mode.
device(config)# evpn
c) Enable the auto-generation of a route distinguisher (RD) for the default EVPN instance.
device(config-evpn-default)# rd auto
device(config)# cluster c1 1
device(config-cluster-1)# client-isolation-loose
By default, the node with the lower peer IP address is set to the client-isolation mode of loose. Note that loose mode is
recommended for LVTEP. This mode ensures that both cluster nodes forward traffic received from the remote peer when
the ICL link is down. Without this default configuration, one node becomes loose and one becomes strict (as a result of the
peer IP address configuration). The node that becomes strict is not able to forward traffic to the CCEP, because the CCEP
links are shut down.
c) Specify a virtual Ethernet (VE) interface through which to reach the MCT cluster peer.
device(config-cluster-1)# peer-interface ve 2
device(config-cluster-1)# deploy
b) Specify the autonomous system number (ASN) for the AS in which the remote neighbor resides.
c) Configure the BGP device to communicate with a neighbor through a specified interface, in this case loopback 1.
d) Repeat the above two substeps for the other peer address, as in the following example.
10. Enable the L2VPN address-family configuration mode to configure a variety of BGP EVPN options.
a) Enable L2VPN address-family configuration mode and enter BGP EVPN configuration mode.
c) Enable the exchange of information with BGP neighbors and peer groups.
d) Repeat the above two substeps for the other peer, but specify MPLS encapsulation, as in the following example.
11. Repeat the above steps for the other node in the cluster, with modifications as appropriate.
AC LIF
AC LIFs of type untagged, single tagged, and double tagged are supported.
Layer 2 ACLs
Layer 2 end points (leaf) support Layer 2 ACLs.
Rate limiting
Layer 2 end points (leaf) do not support rate limiting.
QoS
QoS behavior is similar to that for a single VTEP gateway. Details are listed in the following tables for DiffServe tunneling uniform and
pipe modes in an overlay network.
VLAN cases (untagged) DSCP 0 and TTL 255 are sent on the tunnel NA
header.
VLAN cases (tagged) Priority Code Point (PCP) is mapped to IP DCSP DSCP is remapped to PCP of L2 traffic.
of VXLAN tunnel and TTL is set to 255.
BD (raw, single tagged) PCP of VLAN is mapped to DSCP and TTL is DCSP is remapped to PCP of VLAN.
set to 255.
BD (raw, double tagged) PCP of outer VLAN is mapped to DSCP and DCSP is remapped to PCP of both inner and
TTL is set to 255. outer VLAN. Original PCP inner VLAN is not
retained.
BD (raw, untagged) DSCP 0 and TTL 255 are sent on the tunnel NA
header
BD (tagged, single tagged) PCP is mapped to DSCP and TTL is set to 255 DSCP is remapped to PCP of L2 traffic.
BD (tagged, double tagged) Outer VLAN PCP is mapped to DSCP and TTL DSCP is remapped to PCP of outer VLAN and
is 255 Inner VLAN header is carried with Inner VLAN of L2 traffic.
original PCP.
BD (tagged, untagged) DSCP 0 and TTL 255 are sent on the tunnel NA
header. Dummy VLAN is added: VLAN ID is BD
ID and PCP is 0.
VLAN cases (untagged) DSCP 0 and TTL 255 are sent on the tunnel NA
header.
VLAN cases (tagged) DSCP 0 and TTL 255 are sent on the tunnel PCP value is set to 0 as inner VLAN is not
header. carried.
BD (raw, single tagged) DSCP 0 and TTL 255 are sent on the tunnel PCP value is set to 0 as inner VLAN is not
header. carried.
BD (raw, double tagged) DSCP 0 and TTL 255 are sent on the tunnel PCP value is set to 0 as inner VLAN is not
header. carried. PCP is cleared for both tags.
BD (raw, untagged) DSCP 0 and TTL 255 are sent on the tunnel NA
header.
BD (tagged, single tagged) DSCP 0 and TTL 255 are sent on the tunnel PCP value is set to zero.
header. VLAN is carried and PCP is carried.
BD (tagged, double tagged) DSCP 0 and TTL 255 are sent on the tunnel PCP value is set to zero.
header. Inner VLAN is carried and PCP is
carried.
BD (tagged, untagged) DSCP 0 and TTL 255 are sent on the tunnel NA
header. Dummy VLAN is added: VLAN ID is BD
ID and PCP is 0.
MTU
MTU behavior is similar to that for a single VTEP gateway.
The following table summarizes this behavior for VLANs and BDs.
Statistics
The LVTEP tunnel CCEP supports statistics. For BUM traffic, although the traffic is suppressed (through split horizon), it is still accounted
for as part of the statistics. This behavior is the same as existing single VTEP behavior.
Nondefault TPID
The Tag Protocol Identifier (TPID) is a 16-bit field that identifies the frame as an IEEE 802.1Q-tagged frame. The TPID is set to the
default value of 0x8100, but the user can change this value.
The TPID field is located at the same position as the EtherType/length field in untagged frames, and is thus used to distinguish the frame
from untagged frames. If you require support for dual tagging or provider backbone bridge (PBB), the outer TPID of the packet must be
configured to a value different from the default.
The raw pass-through support for an untagged LIF requires you to configure the interface TPID to a value that allows it to treat all traffic
received on that port as untagged. You can configure the TPID on port and LAG interfaces.
ATTENTION
When the tag type is changed on interface, the interface is brought down first, causing all learned MAC addresses to be
flushed.
High availability (HA) MM failover supports the TPID feature. The TPID configuration is automatically synchronized to the standby
module if a standby MM is installed on an SLX-OS device.
Hardware limitations
The TPID feature has the following limitations:
• Tagging: The TPID configuration is supported for an outer tag. If dual-tagging needs to be supported on the interface, the inner
tag must be 0x8100.
• TPID: Up to four TPIDS are supported system-wide. One is used by default (TPID = 0x8100) and cannot be changed.
• LSP FRR: Hardware support for LSP FRR is available only for TPID 0x8100. If you require a label switched path with fast
reroute (LSP FRR) configuration, note that none of the routable interfaces (whether a router port or a LIF of a VE) can have any
nondefault TPID configuration, because FRR always assumes that the link layer has the default TPID of 0x8100.
• OpenFlow: If OpenFlow is enabled while the default TCAM profile is used, then no TPID can be configured. This restriction is
also enforced in the opposite direction; if any port has TPID configured, then OpenFlow cannot be enabled while the default
profile is used.
NOTE
The LSP FRR limitation is for any tag-type configured in the device. You can configure either FRR or tag-type on any interface
in the device, as in the following example.
device(config-router-mpls-lsp-to-avalanche-1)# frr
%Error: Not allowed, when a non-default TPID (tag-type) is configured on any port-channel or physical
interfaces.
device(config-router-mpls-lsp-to-avalanche-1)#
By default, all interfaces in the system have default TPID value of 0x8100.
d) Enter the show interface ethernet command to confirm the configuration.
device(conf-if-eth-1/1)# no tag-type
By default, all interfaces in the system have default TPID value of 0x8100.
d) Enter the show interface port-channel command to confirm the configuration.
ATTENTION
This profile must be applied to all LVTEP configurations in this
chapter.
2. In hardware configuration mode, enter the profile tcam command and specify vxlan-ext.
show cluster
device# show cluster 1
Cluster c1 1
================
Cluster State: Deployed
Client Isolation Mode: Loose
DF Hold Time: 3
Configured Member Vlan Range: 11-12
Active Member Vlan Range: 11-12
Configured Member BD Range: 1-2
Active Member BD Range: 1-2
No. of Peers: 1
No. of Clients: 1
Peer Info:
==========
Peer IP: 7.7.100.7, State: Up
Peer Interface: Ethernet 0/50
ICL Tunnel Type: MPLS, State: Up
Client Info:
============
Name Id ESI Interface Local/Remote State
---- ---- ----------- --------- ------------------
tu61441 513 0:0:8:8:64:8:6:7:64:43 Tunnel 61441 Up / Up
Please note that 5.5.100.5 (Node-id 2) is this node, 4.4.100.4 (Node-id 1) is remote node
show tunnel
device# show tunnel 61441
Tunnel 61441, mode VXLAN, node-ids 1
Ifindex 0x7c00f001, Admin state up, Oper state up
Overlay gateway "gw1", ID 1
Source IP 6.7.100.67 ( Loopback 2 ), Vrf default-vrf
Destination IP 8.8.100.8
Configuration source BGP-EVPN
MAC learning BGP-EVPN
Tunnel QOS mode UNIFORM
Active next hops on node 1:
IP: 10.6.8.8, Vrf: default-vrf
Egress L3 port: Ve 3, Outer SMAC: 609c.9f5a.3d15
Outer DMAC: 609c.9f5a.4515, ctag: 0
BUM forwarder: yes
A VXLAN L2 gateway can interconnect tenants in the same subnet through the VXLAN configuration. The following figure illustrates a
simple use case where a packet is sent from VM1. If it is a BUM packet, Leaf-A floods through the packet to all the VTEPs in the same
VXLAN segment, until the MAC table at Leaf-A is populated with corresponding entries through mechanisms such as EVPN. Meanwhile,
the known unicast packet is forwarded in unicast mode to the corresponding VTEP only. At Leaf-A, the Traffic Class/802.1p marking of
the tenant frame determines the DSCP of the added IP header, and the IP header is followed by the VXLAN header. At terminating leaf
nodes, the DSCP of the IP header is ignored and the Traffic Class/802.1p marking of the tenant frame is thereby exposed, and the
original tenant frame is used to determine the QoS policy for switching the frame to the destination VM.
NOTE
For information about QoS configuration on VXLAN L3 gateways and on VLAN L2 and L3 gateway interconnections, refer to
"QoS for VXLAN Layer 3 gateways" and "QoS for VXLAN Layer 2 and Layer 3 gateway interconnections".
MCT Overview
Multi-Chassis Trunking (MCT) is trunking that initiates at a single MCT-unaware server or switch and terminates at two MCT-aware
switches. MCT allows the links to the two MCT-aware switches to appear to a downstream device as if they are coming from a single
device on a single Link Aggregation (LAG) trunk interface or physical port.
NOTE
The SLX-OS device does not support Layer 2 protocols over MCT. You must provide a loop-free topology.
NOTE
MCT does not support any variant of Spanning Tree Protocol (STP). STP is disabled by default and must not be enabled with
MCT.
In a datacenter network environment, LAG trunks provide link level redundancy and increased capacity. However, they do not provide
switch-level redundancy. If the switch connected to the LAG trunk fails, the entire trunk loses network connectivity.
With MCT, member links of the LAG trunk are connected to two MCT-aware devices. A configuration between the devices enable data
flow and control messages between them to establish a logical Inter-Chassis Link (ICL). In this model, if one MCT device fails, a data
path remains through the other device.
SLX-OS Layer 2 MCT is based on RFC 7432 (BGP Ethernet VPN). The MP-BGP EVPN extension is the control plane on the SLX-OS
device to perform both MAC synchronization and cluster management. MAC synchronization between the MCT peers synchronizes the
MAC tables between the MCT nodes for node resiliency and faster convergence.
For the data plane, the SLX-OS device supports the MPLS forwarding mechanism to leverage MPLS LER functionality.
SLX-OS MCT provides Layer 3 protocol support for IPv4 and IPv6 BGP, OSPF, and IS-IS through a VLAN or bridge domain VE
interface. The VE over MCT interface MAC address is synchronized to the MCT peer through BGP by using an EVPN MAC route.
SLX-OS supports MCT over VPLS or VLL Layer 2 VPN services, Multicast, or IPv4 or IPv6 Virtual Routing Redundancy Protocol
(VRRP) and VRRP Extended (VRRP-E). For more information on Multicast over MCT, see the Extreme SLX-OS IP Multicast
Configuration Guide.
MCT terminology
Before implementing MCT in your network, you must understand some key terms and definitions.
MCT peer devices A pair of SLX-OS device configured as peers. The LAG interface is spread across two MCT peer devices and acts
as the single logical endpoint to the MCT client.
NOTE
MCT is supported across the same chassis type only; for example, SLX-9850 <---> SLX-9850.
MCT client The MCT client is the device that connects with the MCT peer devices. It can be a switch or an endpoint server host
in the single-level MCT topology or another pair of MCT switches in a multi-tier MCT topology.
MP-BGP EVPN extension The control plane for Layer 2 MCT on the SLX-OS device.
MCT Cluster Client Edge Port (CCEP) A port on one of the MCT peer devices that is a member of the LAG interface to the MCT client. To have a running
MCT instance, at least one Link Aggregation Interface is needed with a member port on each peer device. While
there is a LAG on the client device, CCEP on the MCT device can be a LAG or a physical port.
MCT Cluster Edge Port (CEP) A port on MCT peer device that a member of a MCT VLAN and is not a Cluster Client Edge Port.
MCT VLANs VLANs on which MCT clients are operating. These VLANs are explicitly configured in the MCT configuration.
When the client interface is a port channel and LACP is running on the port channel, MCT supports an automatically generated
ESI value, as defined in RFC 7432. This ESI is encoded as type 1, as follows:
– 1-byte ESI type = 1
– 9-byte ESI value = 6-byte LACP system MAC address of the client followed by the 2-byte LACP port key, and then a 1-
byte 0x00
• MP-BGP route distinguisher (RD)—Encoded using RD type 1 as defined in RFC 4364 that consists of the following subfields:
– 4-byte administrator subfield that is set with the 4-byte router ID
– 2-byte assigned number subfield that is encoded with the all zeros for the Ethernet segment (ES) route, client ID for the
Ethernet Auto-Discovery route, and EVPN ID (VLAN ID) for MAC and multicast routes.
• MP-BGP EVPN capability—When a BGP session is brought up to a MCT peer, BGP indicates to the peer that it is EVPN
capable using BGP capability advertisement with the following information:
– Capability code = 1 (MP-BGP)
– AFI = 25 (L2VPN)
– SAFI = 70 (EVPN)
If a BGP session already existed to the same peer, the existing BGP session is flapped to allow the advertisement of the EVPN
capability.
• MP-BGP EVPN route types—Includes Ethernet Auto-Discovery (A-D), MAC/IP Advertisement, Inclusive Multicast Ethernet
Tag, and Ethernet Segment routes.
• MPLS Label Assignment—Statically assigned label ranges for ESI label, EVPN unicast label and EVPN BUM label.
– The ESI label is generated based on the start ESI label value plus the client ID.
– EVPN unicast or BUM label is generated based on the start unicast or BUM label plus the VLAN ID.
• Designated forwarder—A PE in a set of multi-homing PEs connected to the same Ethernet segment that is elected for sending
BUM traffic to a client for a VLAN ID on an Ethernet segment.
1 Ethernet Auto-Discovery (for each Mass MAC address withdraw and Designated forwarder election.
Ethernet Segment only) The PE can advertise multiple Ethernet A-D routes for each deployed client
interface. Each A-D route has a maximum of 128 route targets (RTs).
When the client interface goes down, the PE withdraws the Ethernet A-D route
which is served as a trigger for the remote PE to remove all MAC addresses
learned over the affected client interface instead of withdrawing an individual
MAC address.
2 MAC/IP Advertisement MAC synchronization of the MAC addresses between two MCT peers.
Type 2 MAC/IP routes are also referred as ARP and Neighbor Discovery
(ARP/ND) routes. ARP/ND addresses that are learned on the VLAN or bridge
domain are automatically exported into BGP. Then BGP advertises the ARP
routes to all of its EVPN peers. ARP/ND resolution is dependent on the MAC
address. ARP/ND entries for Virtual IP and IP address configured on VE
interfaces are automatically advertised.
For more information on Type 5 route, refer to Extreme SLX-OS Layer 3 Routing
Configuration Guide.
To elect a designated forwarder (DF) for a VLAN ID on an Ethernet segment, each PE exchanges its router IP address with its multi-
homing PEs through the Ethernet Segment route. The following algorithm uses the IP address to select the DF.
1. Upon the discovery of a new ES, a PE advertises the ES route and waits a default of three seconds for its peer to advertise the
ES route.
2. When the timer expires, the PE builds a sorted list of PE IP addresses including its own address connected to the same ES.
3. The PE with the ordinal number that equals (V mod N) is elected the DF. V is the VLAN ID and N is the number of PEs.
4. When the ES link fails, the PE withdraws its ES route which triggers the selection process to select a new DF. When a PE node
failure occurs, DF election is also triggered when the PE is up and down.
NOTE
DF election is triggered only after the client is deployed on both MCT devices.
For an SLX-OS device, it advertises one label for all the MACs learned within a bridge domain.
NOTE
This traffic forwarding is also applicable for MCT VPLS and MCT VLL. For MCT VLL, there are no CEP ports. There is no
EVPN label. Only the MPLS label is involved for communication between cluster peers. For each bridge domain, the
forwarding rules are defined based on the DF role.
For SLX-OS device, it advertises one multicast label for each EVPN instance.
Since source port suppression is based on the DF election result, PE2 suppresses copies to be sent to CE_A and CE_B because e1/1
and e1/2 are not elected as DF for ESI 100 and 200 respectively.
In the following figure, source port suppression is done based on the ESI label carried in the packet itself.
For traffic received from CE_B on PE2 that is flooded to PE1, PE1 sends a copy to CE1 and CE_A on e1/1. However, it suppresses a
copy to be sent to CE_B. The suppression is done because the copy received from PE2 carried an ESI label that PE1 previously
advertised to PE2 for ESI 200.
MAC management
Each MAC entry maintains information about all the owners of the MAC entry who learned and advertised it. The information about each
owner is maintained in the form of the MAC database (MDB).
A MDB entry contains peer and client information with the cost. A local MAC entry has cost 0 and MAC addresses learned from an MCT
peer has a cost of 1. The MDB entry with the lowest cost is chosen as the filtering database (FDB).
In MCT topologies, MAC addresses can be learned either on local CCEP or CEP interfaces, or from the remote MCT node. If the same
MAC is learned from both MCT nodes, then MAC entries learned locally have higher priority than the one learned from the remote peer.
For remote MAC addresses, aging is disabled, and they can only be deleted when delete notifications are received from the remote node
that advertised it before for learning.
The MCT static MAC addresses configured on a local node are advertised to remote MCT node for learning. While advertising the MAC
using the BGP MAC advertisement route, it uses the MAC mobility extended-community route to identify the MAC as static using the
sticky MAC field. On the remote node, when MAC advertisement is received for a static MAC address, the sticky MAC information is
saved along with the MAC entry.
When an MCT static MAC address is deleted, a BGP MAC withdrawal route is sent to the remote peer to delete the MAC entry from its
database.
When a CEP interface is down and if any static MAC entries are present, MAC Delete messages are sent to the remote node to flush the
entries.
When a CCEP interface is down and if any static MAC entries are associated with the client, the MAC addresses are moved to point to
the remote MCT peer. The MAC addresses are moved back to the CCEP when the interface comes back up.
On a local MCT node, when a cluster is UP and you configure a static MAC on a CEP or CCEP interface, the node synchronizes the
MAC address to the remote MCT node. The remote node processes the MAC address and adds it to the FDB. On the remote MCT
node, you can configure the same MAC as the static MAC address for the client 1 CCEP interface since it is configured on the same
client CCEP interface. No additional static MAC configurations on the remote node are required since the same MAC are already part of
the local MCT node.
When the cluster is down on the local and remote MCT nodes, both nodes are independent as clusters that can be independently
configured with the static MAC addresses for the CEP or CCEP interface. However, when the cluster is brought up, the static MAC
addresses are synchronized from both nodes and the addresses on the remote node are rejected since the local configuration takes
precedence. The misconfiguration remains until you correct it.
MAC learning
MAC learning over CEP interfaces is like basic Layer 2 learning and the EVPN MAC advertisement route is sent to the cluster peer to
synchronize the learned MAC address. MAC learning over CCEP interfaces is two-step process in which the MAC entry is added into the
MDB first. The best MAC entry is chosen and installed into the FDB and the EVPN MAC advertisement route is sent to the cluster peer
for synchronization of the learned MAC address.
MAC movement
A MAC address is considered to be moved when the same MAC address is received on a different interface with same VLAN. In MCT, a
MAC movement is allowed on both local and remote nodes.
Local dynamic MAC move from CEP1 to the On local node MCT1, the MAC address is updated to point to the new CEP2 interface.
CEP2 edge interface on MCT1.
There is no MAC route update required to the remote MCT node. As on the remote node, the MAC
always point towards the MCT peer for all EVPN MAC addresses.
Local dynamic MAC move from CEP1 edge On local node MCT1, the MAC address is updated to point to the new client interface CCEP1.
interface to the CCEP1 client interface on
A MAC update route is sent with the new ESI of client 1.
MCT1.
The remote node updates the MAC address to point to the CCEP of client 1.
CCEP1 interface (client 1) to CCEP2 interface On local node MCT1, the MAC address is updated to point to the new client interface CCEP2.
(client 2) on MCT1.
A MAC update is sent with the new ESI of client 2 to the remote node.
The remote node updates the MAC address to point to the CCEP of client 2.
Local dynamic MAC move from CCEP1 On local node MCT1, the MAC address is updated to point to the new edge interface CEP1.
interface (client 1) to CEP1 edge interface on
A MAC update is sent with the new ESI 0 to the remote node.
MCT1.
The remote node MCT2 updates the MAC address pointing to the MCT1 node.
For a MAC learned on a CEP port locally On the MCT2 node for the EVPN MAC learned from MCT1, it is considered as a MAC move when
(MCT1). Dynamic MAC move to a CEP port on it is learned on a CEP port. The MAC is updated as local on MCT2 and now points to the Dynamic
the remote node (MCT2) on the CEP port on MCT2 instead of pointing to MCT1 node
MCT2 sends an updated MAC to MCT1. MCT1 updates the MAC as remote and points to the
MCT2 .
For a MAC learned on a CEP port locally On the MCT2 node for the EVPN MAC learned from MCT1, it is considered as a MAC move when
(MCT1). Dynamic MAC move to CCEP1 on the same MAC is learned on a CCEP1 port. The MAC is updated as CCL on MCT2 and now points
MCT2. to the local CCEP1 port on MCT2 instead of pointing to the MCT1 node.
MCT2 sends a CCL MAC updated to MCT1. MCT1 updates the MAC as CCR and point to the
CCEP1 port.
For a MAC CCL learned on a CCEP1 port On the MCT2 node for the CCR MAC learned from MCT1 for client 1, it is considered as a MAC
locally (MCT1). Dynamic MAC move to CCEP2 move when the same MAC is learned on client 2 over the CCEP2 port. The MAC is updated as
on remote MCT2 node. CCL on MCT2 and now points to the local CCEP2 port on MCT2 instead of pointing to CCEP1.
From MCT2, it sends a CCL MAC updated to MCT1. MCT1 updates the MAC as CCR and points
to the CCEP2 port.
NOTE
This LSP is a non-CSPF LSP.
Upon receiving the cluster deploy update, MPLS is enabled on the peer interface and the RSVP LSP is created with a default template
with a unique auto-generated name, MCT_peer-ipaddr_peer-interface-index. A random number suffix is generated if this name is
already in use in the user configurations. You can see the LSP by using the show mpls lsp command.
NOTE
If you enable STP on MCT nodes, each node acts as an independent (not interconnected) STP switch. This situation
results in STP state flap at the node connected to the CCEP port, because it receives two different Bridge Protocol
Data Units (BPDU) on that CCEP port
• SLX-OS supports dynamic and static LAG between the MCT PE and CE.
• SLX-OS uses Ethernet segment identifier (ESI) type 0 (static LAG) and type 1 (dynamic LAG). Consider the following for ESI
type 0:
– Configure the 9-byte ESI value that is used to form a globally unique 10-byte integer ESI.
– Configure the same 9-byte ESI value for each client on both MCT devices.
• SLX MCT configurations (Layer 2 or Layer 3) do not require the Advance Feature license.
Peer considerations
• For both MCT peers, the MCT peer address must match the peer's BGP router ID (loopback address).
• You must configure the same client ID on both MCT peers for the link or CCEP that is connected to the same client.
• Layer 3 connectivity should allow a BGP session to be established between MCT peers.
• SLX MCT peers must be physically connected to each other.
• You must configure and activate a BGP EVPN neighbor as the peer interface.
• (Required) Prevent native VLAN traffic from going across the ICL by disabling the default native VLAN on the ICL trunk port
between the MCT peers. To prevent native VLAN traffic, use the switchport mode trunk-no-default-native command from
interface configuration mode. For example:
• MCT MPLS interfaces are automatically created when you configure MCT without the use of router MPLS. By design,
automatically created MCT MPLS interfaces do not offer FRR (fast reroute) protection, because it is difficult to remove the FRR
configuration from outside of MPLS.
NOTE
You need an Advance Feature license if you want to enable FRR for non-MCT paths
VLAN considerations
• To avoid traffic looping, consider these guidelines:
– Overlay EVPN VLANs or BDs must not be natively configured on the peer interface (underlay interface).
– If you use a VE as a peer interface, use the corresponding VLAN for underlay alone and do not extend it into the EVPN
domain.
• The peer interface is in a separate control VLAN that is not used for MCT members
• If you configure an MCT port channel for multiple VLAN or VE interfaces, use static routes instead of OSPF ECMP.
– For example, you have two VE interfaces, VE 10 (an MCT VLAN) and VE 20 (a non-MCT VLAN). When OSPF is
configured on the interfaces, the route to the BGP router-id (or MCT) peer address is through the interfaces. If you then
configure BGP BFD and BGP EVPN sessions between the MCT peers for faster recovery, BFD flaps continuously.
Flapping occurs because OSPF does per-packet load balancing of BGP BFD packets, which are not reassembled
properly.
– As a best practice, configure a static route for MCT peers through the MCT VLAN (VE 10 in this example). A static route
has a lower administrative distance than OSPF and places only one route in the routing table.
LACP considerations
• When the client interface is a port channel on which LACP is running, MCT supports an automatically generated ESI value, as
defined in RFC 7432.
• To ensure that two MCT peers send the same system ID and key but a different port ID to each client, you must configure the
same cluster ID and client ID on both nodes. The system ID is derived by appending a cluster ID to the MCT base system ID,
which is a device-defined value.
LSP considerations
LSP is automatically created when a cluster is deployed. No user configuration is required.
• The SLX-OS device uses the peer interface to set up the MPLS data path automatically. The LSP is the outgoing peer interface
and has an MCT prefix when it is displayed by the show mpls lsp command.
• The configured peer interface must be the best next hop to reach the MCT peer. If not, the automatically created LSP fails to
come up.
• The automatically created LSP can co-exist with other explicit MPLS configurations. You can configure more LDPs and RSVP
LSPs, but not with the same name as the automatically created LSP.
• When co-existence occurs on the device:
– As part of the MCT cluster configuration, the MPLS daemon automatically creates and signals the RSVP LSP with the
default template and a unique auto-generated name.
– If you create an MCT LSP with the same name as an existing LSP, then the MCT LSP is created with a similar name but
with a different number suffix to make it unique. For example: MCT_20.21.22.23_9876543_123456.
– You cannot create an LSP with same name as an existing MCT LSP. The attempted configuration is rejected with an error
message.
– When the router port or the VE interface is MPLS-enabled from the MCT configuration, you cannot disable the router port
or the VE interface. The configuration to disable the router port or the VE interface from the CLI is rejected with an error
message.
– You can disable MPLS with the no router mpls command. Upon command execution, the automatically created LSP and
the MPLS-enabled peer-interface configuration are disabled and re-enabled.
• An automatically created LSP is restricted to using the configured MCT peer interface as its next hop connection to the MCT
peer. The IGP shortest path between the two peers must match the configured MCT peer interface. Otherwise, the LSP remains
operationally down.
– For example, suppose there are two paths between the MCT peers, eth 1/1 and eth 1/2, and the node configuration for
the two peers is symmetrical. Furthermore, the user has configured eth 1/1 as the MCT peer interface.
– If the IGP SPF path between the two peers uses eth 1/1 as the next hop link, then the LSP becomes operational and uses
eth 1/1 as the next hop interface. If the IGP cost of eth 1/1 increases such that eth 1/2 is selected by the IGP SPF
calculation, then the LSP remains operationally down.
– You can use eth 1/2 as a normal MPLS interface. Do not use eth 1/1 (which is the MCT interface) for normal MPLS
purposes.
Before configuring a BGP EVPN peer, ensure you configure a loopback interface.
You also create an EVPN instance to add the bridge domains and VLANs associated with the MCT cluster.
3. Configure the EVPN peer with the autonomous system number (ASN).
device(config-bgp-router)# exit
For more information on the bridge domain configuration, see the Bridge Domain chapter.
11. Configure the VLANs.
12. Enable auto-generation of a route distinguisher (RD) for this EVPN instance.
device(config-evpn-myinstance)# rd auto
13. Enable the auto-generation of the import and export route-target community attributes and ignore the autonomous system (AS)
number.
Configuring MCT
Configure the local and remote MCT cluster and cluster clients.
NOTE
The peer interface is in a separate VLAN that is not an MCT member. Do not configure VLANs and bridge domains configured
under EVPN on the trunk port between the MCT peers.
The peer IP address must be the remote peer's router ID. This address corresponds with the neighbor in BGP EVPN address
family configuration for the peer.
4. Configure the peer interface.
device(config-cluster-1)# peer-interface Ve 10
The peer interface should be a valid Layer 3 interface. You should configure the peer interface before deploying the
configuration.
5. Deploy the cluster.
device(config-cluster-1)# deploy
The MPLS LSP is created when the cluster is deployed and is removed when the cluster in undeployed.
6. Create the client for the cluster and access cluster client configuration mode.
On both MCT nodes, you must configure the same client ID.
7. Configure the interface to the cluster client instance.
You must configure the same value on both MCT nodes to create the MCT client LAG.
device(config-cluster-client-200)# deploy
10. After configuring the local MCT cluster and client, configure the remote MCT cluster and client.
1. Verify that the MCT node that is peer to the node being taken offline is in loose client-isolation mode.
3. Disable the MCT clients from the MCT node that you will take offline, as shown in the following example.
4. Isolate the MCT node that you will take offline from the core of the network by shutting down all uplink interfaces.
NOTE
Do not write the configuration changes made in the previous steps to the startup-configuration
file.
To bring the MCT node back online, perform one of the following actions.
• If you upgraded or downgraded the device, select the coldboot option under the firmware download menu.
• For any other reason, execute the reload system command. Since the changed configuration was not saved, the reload reverts
the configuration changes that had taken the MCT node offline.
By default, client-isolation mode is based on the peer IP address. The node with the lower peer IP address is set to the client-isolation
mode of loose, while the node with the higher peer IP address is set to the client-isolation mode of strict. You can override this behavior
by configuring strict client-isolation mode on both nodes.
Use the client-isolation strict command to configure the strict mode on both nodes, as shown in the following example.
Use the client-isolation loose command to configure the loose mode on both nodes, as shown in the following example.
By default, the hold time is three seconds. Use the designated-forwarder-hold-time command to change the time in seconds from 1 to
60 seconds, as shown in the following example.
device(config-cluster-1)# designated-forwarder-hold-time 35
device(config-cluster-1)# client-interfaces-shutdown
The following example shows how to configure an auto-generated ESI for the cluster client.
To display the EVPN neighbor information, use show ip bgp neighbors command. This information includes the peer configured for the
EVPN address family, the undeplyed MCT cluster, and the negotiation of the EVPN address family.
Cluster MCT1 1
==============
Cluster State: Deploy
Client Interfaces Shutdown: FALSE
Client Isolation Mode: Loose
DF Hold Time: 3
Configured Member Vlan Range: 2, 4-7
Active Member Vlan Range: 2, 4-7
Peer Info:
----------
Peer IP: 10.1.1.1, State: Up
Peer Interface: Ve 20
ICL Tunnel Type: MPLS, State: Up
Client Info:
------------
Name Id ESI Interface Local/Remote State
access1 100 0:11:22:33:80:0:0:0:0:0 Ethernet 1/8 Up/UP
access2 200 0:11:22:33:81:0:0:0:0:0 Port-Channel 3 Dep/UnDep
access3 300 0:11:22:33:82:0:0:0:0:0 Eth 2/3 Up/Down
NOTE
When you delete an IP router ID that is used as the neighbor ID and IP address on an MCT peer, the show cluster command
on the MCT peer devices displays inconsistent cluster states.
The following example displays client 100 information for cluster 10.
The MAC Type for an MCT cluster displays the following information:
• The MAC address over the CEP AC endpoints or the VPLS PW are learned and treated as EVPN local MAC addresses over a
singled-homed edge node. These local addresses are learned as EVPN and displayed as Dynamic. Corresponding MAC
addresses synchronized to the remote MCT node are displayed as EVPN. The EVPN MAC addresses are programmed
pointing to the MCT PW.
• For the client MAC behavior, MAC addresses are learned as CCL on the local MCT node and CCR on the remote MCT node
pointing to the CCEP interface.
• The VPLS MCT MAC on active PWs are learned as Dynamic and the corresponding MAC addresses are learned as EVPN on
remote MCT node.
• Static MAC addresses configured on CEP AC endpoints are learned as Static. The corresponding remote MAC addresses are
learned as EVPN-Sticky in the remote node.
• For static MAC addresses over client interfaces, Static-CCL and CCR are displayed.
You can also view the MAC entries for a specific client.
Only the local MAC entries are deleted from the current node. Individual MAC withdrawal flush messages are sent through the EVPN.
However, BGP still batches multiple routes to the remote node.
When the remote MCT peer receives the MAC withdrawal message, it only deletes the remote MAC entry. To clear MAC addresses on
both nodes, you must issue clear mac-address-table commands on both MCT nodes.
NOTE
For more information on VPLS and VLL, refer to the "VPLS and VLL Layer 2 VPN services" chapter.
For VPLS MCT, a point-to-multipoint (p2mp) bridge domain is added to the MCT cluster. For VLL MCT, a point-to-point (p2p) bridge
domain is added to the MCT cluster. The VPLS or VLL horizon is added as a pseudowire (PW) client.
VLL MCT supports PW redundancy. At any point of time, one active-active PW path exists to reach the destination. The node on which
the PW is active is called the active node. The endpoint traffic coming from the standby node traverses through the MCT PW session to
the active node for that instance and the active MCT node takes care of the forwarding to the remote VPLS or VLL peer.
NOTE
For SLX-OS, the MCT cluster requires both nodes to be on SLX-OS devices. However, an SLX-OS MCT cluster that connects
to a Extreme MLX cluster through VPLS or VLL is supported.
The bridge domain is mapped to an EVPN instance. For each BD, the default EVPN ID is the BD ID plus 4,096. A user configured
EVPN ID is not supported. The EVPN ID for the VLAN is the VLAN ID.
For VPLS or VLL MCT, the physical and LAG CCEP operate in active/active multi-homing mode. However, the PW operates in active/
standby mode.
The designated forwarder (DF) state of the PW ESI represents the active PW node state for a VPLS or VLL instance. The DF election
process for the PW ESI is the same as the Layer 2 ESI process. However, for VLL MCT in the following dynamic cases, VLL does not
change its role and is driven through the PW horizon client.
• If the local endpoint is down, the remote endpoint is up.
• If the active-active PW is down on the active node, the active-active PW is up on the standby node.
Status TLV support is enabled through a VLL instance if one of the following is true.
• VLL is configured with two remote peers.
• The VLL endpoint is a MCT client CCEP port.
To support PW redundancy, configure two VLL peers under one VLL instance. One PW is for each VLL peer. Among these PWs, an
active-active PW is selected and used for traffic flow to the remote side. An active-active PW is selected based on the local and remote
PW redundancy preferences. A remote PW redundancy preference is received by the PW status TLV. When the bit is set, it indicates PW
forwarding standby. When the bit is cleared, it indicates PW forwarding active.
When the PW is in active operational state, the data plane objects (such as LIF or MGID, or cross-connect for VLL) is created and be
programmed into the hardware. When the PW is in standby operational state, the data plane is programmed as if this PW is down.
NOTE
The SLX-OS PW state table is the same as the Extreme NetIron VPLS-MCT or VLL-MCT PW state table to ensure
compatibility when facing an MLX MCT cluster over a VPLS or VLL connection.
NOTE
This topology is for only one BD. Since the DF state is selected per BD, another BD can use a different PE as the active
node.
When VLL MCT is activated, only one PW is operationally active between the MCT clusters, as represented by the solid line. The standby
PWs are represented by the dotted lines.
The ICL link between the MCT nodes is a BGP EVPN connection. It is not a spoke PW.
NOTE
VLL MCT does not use MAC learning. BUM traffic handling is not required. It uses cross-connect instead of VSI. VLL MCT
does not use the EVPN label.
CE1->PE1->PW2->PE4->CE2
CE1->PE2->ICL[Split Horizon PW or ICL]->PE1->PW2->PE4->CE2
CE1 -> PE2 -> [Split Horizon PW or ICL] -> PE1 -> PW2 -> PE4 -> CE2
NOTE
For active-active PW link protection when the PW redundancy status changes, the device relies on the MPLS configuration.
There should not be a case where PW2 is down and PW4 is up. The MPLS configuration ensure that both PW2 and PW4 are
UP or DOWN. When PW2 is not active-active due to a role change on PE4, PW1 will become active-active.
NOTE
This topology is for only one BD. Since the DF state is selected per BD, another BD can use a different PE as the active
node.
When VPLS MCT is activated, only one PW is operationally active between the MCT clusters, as represented by the solid line. The
standby PWs are represented by the dotted lines.
The ICL link between the MCT nodes is a BGP EVPN connection. It is not a spoke PW.
The following figure shows the BUM packet flow after an MCT PE switch-over event.
NOTE
VPLS MCT does not support PW link protection.
For MCT remote MAC addresses, aging is disabled, and they can only be deleted when delete notifications are received from the remote
MCT node that advertised it before for learning.
VPLS MAC addresses that are learned locally are classified as Dynamic, and the corresponding VPLS MAC addresses that are learned
remotely are classified as EVPN.
MAC learning
MAC addresses learned from the PW on the active PE triggers EVPN MAC synchronization message that are sent to the peer. The PW
ESI is used in this MAC route. VPLS CR MAC addresses point to the active MCT node since no local forwarding path on the standby PE
traffic is expected to be switched by the active MCT node.
MAC aging
When the VPLS MAC ages on the active node, the MAC address is locally flushed and the EVPN MAC withdrawal route is sent to
remote MCT node to flush the MAC.
The following table describes the allowed VPLS MAC movements in MCT.
Local dynamic MAC move from PW A to PW B On local node MCT1, the MAC address is updated to point to the new PW interface.
on MCT1.
There is no MAC route update required to the remote MCT node. As on the remote node, the MAC
always point towards the MCT peer for all VPLS addresses.
Local dynamic MAC move from PW to the On local node MCT1, the MAC address is updated to point to the new client interface CCEP1.
Layer 2 CCEP1 client interface on MCT1.
A MAC update route is sent with the new ESI of client 1.
The remote node updates the MAC address to point to the CCEP of client 1.
For a MAC learned on a PW locally (MCT1). On the MCT2 node for the EVPN MAC learned from MCT1, it is considered as a MAC move when
Dynamic MAC move to CCEP1 on MCT2. the same mac is learned on a CCEP1 port. The MAC is updated as CCL on MCT2 and now points
to the local CCEP1 port on MCT2 instead of pointing to the MCT1 (PW) node.
MCT2 sends a CCL MAC update to MCT1. MCT1 updates the MAC as CCR and points to the
CCEP1 port.
For a MAC CCL learned on a CCEP1 port On the MCT2 node for the CCR MAC learned from MCT1 for client 1, it is considered as a MAC
locally (MCT1). Dynamic MAC move to the PW move when the same MAC is learned on the PW. The MAC is updated as the Dynamic on MCT2
on the remote MCT2 node. and now points to the PW on MCT2 instead of pointing to CCEP1.
From MCT2, it sends a Dynamic MAC update to MCT1. MCT1 updates the MAC to point to
MCT2.
Local dynamic MAC move from PW (MCT1) to On local node MCT1, the MAC address is updated to point to the new interface CEP1.
CEP1 client interface on MCT1.
A MAC advertise route is sent with ESI 0 to the remote MCT node.
The remote node MCT2 updates the MAC address to point to the MCT1 node.
For a MAC learned as EVPN on a PW locally On the MCT2 node for the EVPN MAC learned from MCT1, it is considered as a MAC move when
(MCT1). Dynamic MAC move to CEP on MCT2. the same mac is learned on the CEP port. The MAC is updated as Dynamic on MCT2 and points to
the local CEP1 port.
From MCT2, it sends a Dynamic MAC updated to MCT1. MCT1 updates the MAC as EVPN and
points to the MCT2 node.
MCT2 sends a Dynamic MAC updated to MCT1 with the ESI of the PW client, MCT1 now should
updated the MAC point to the MCT2.
For information on configuring VLL or VPLS bridge domains, refer to the "VPLS and VLL Layer 2 VPN services" chapter.
Create an EVPN instance to add the bridge domains and VLANs associated with the MCT cluster. For information on creating the BGP
peer, refer to Configuring the BGP EVPN peer on page 101.
For information on configuring the MCT cluster and client, refer to Configuring MCT on page 102. Their full configuration is provided in
the example after the steps.
3. Create the PW client for the cluster and access PW cluster client configuration mode.
device(config-cluster-1)# client-pw
Only one instance of the PW client represents all VPLS or VLL PWs over all bridge domains.
4. Set the 9-octet Ethernet Segment ID (ESI) value which is used to uniquely identify the PW client.
device(config-cluster-client-pw)# deploy
6. After configuring the local MCT cluster and PW client, configure the remote MCT cluster and PW client.
The following example is the steps in the previous configuration with the additional configuration of the MCT cluster and client.
Peer Info:
==========
Peer IP: 10.38.38.38, State: Up
Peer Interface: Ethernet 3/1
ICL Tunnel Type: MPLS, State: Up
Client Info:
============
Name Id ESI Interface Local/Remote State
---- ---- ----------- --------- ------------------
c3 3 a:b:1:2:3:0:0:0:0:0 Port-channel 100 Up / Up
Client-PW 34816 a:b:c:d:0:0:0:0:0:0 PW Up / Up
The following example displays only PW client and its bridge-domain information on the MCT cluster.
The following example displays the multicast and unicast labels, and forwarding state for the cluster member bridge domain.
Un-tagged Ports:
Total VPLS peers: 2 (2 Operational):
VC id: 501, Peer address: 10.9.9.9 , State: Operational , uptime: 1
hr 40 min 51 sec
Load-balance: True , Cos Enabled: False,
Tunnel cnt: 4
rsvp p101 (cos_enable:False cos_value:0)
rsvp p102 (cos_enable:False cos_value:0)
rsvp p103 (cos_enable:False cos_value:0)
rsvp p104 (cos_enable:False cos_value:0)
Assigned LSPs count:4 Assigned LSPs:p101 p102 p103 p104
Local VC lbl: 988042, Remote VC lbl: 985332,
Local VC MTU: 1500, Remote VC MTU: 1500,
Local VC-Type: 5, Remote VC-Type: 5
VC id: 501, Peer address: 56.56.56.56 , State: Operational , uptime: 1
hr 40 min 13 sec
Load-balance: True , Cos Enabled: False,
Tunnel cnt: 1
rsvp q101 (cos_enable:False cos_value:0)
Assigned LSPs count:0 Assigned LSPs:
Local VC lbl: 988043, Remote VC lbl: 986039,
Local VC MTU: 1500, Remote VC MTU: 1500,
Local VC-Type: 5, Remote VC-Type: 5
Displaying MAC address information for a VPLS bridge domain on an MCT cluster
The following example displays the MAC address table for bridge domain of an MCT cluster.
The following example displays all the MAC addresses learned from other VPLS PE nodes over MCT bridge domains.
All devices are on the same VE and receive protocol Hello packets. Over the ICL link, the following packets are flooded:
• Hello and multicast packets from PE1 and PE2
• ARP and ND6 packets
Configuration considerations
You must first create the VE interface for the MCT VLAN or bridge domain on the MCT pair.
For routes learned over Layer 3 protocols, the next-hop IP address is usually the peer IP address and not necessarily the MCT router
address.
To bind the VE interface to an MCT VLAN or bridge domain, use the router-interface ve command under VLAN or bridge-domain
configuration mode, respectively. The following example shows how to bind VE 200 to bridge domain 2.
NOTE
MPLS cannot be enabled for a VE over an MCT VLAN interface.
PE1:
router ospf
area 0
vlan 2
router-interface Ve 200
interface Ve 200
ipv6 address 2001::1/64
ip address 10.2.2.1/24
ip ospf area 0
ipv6 ospf area 0
!
no shutdown
!
PE2:
router ospf
area 0
vlan 2
router-interface Ve 200
interface Ve 200
ipv6 address 2001::2/64
ip address 10.2.2.2/24
ip ospf area 0
ipv6 ospf area 0
!
no shutdown
!
CE_A:
router ospf
area 0
vlan 2
router-interface Ve 200
interface Ve 200
ipv6 address 2001::10/64
ip address 10.2.2.10/24
ip ospf area 0
ipv6 ospf area 0
!
no shutdown
!
PE1:
router ospf
area 0
interface Ve 200
ipv6 address 2001::1/64
ip address 10.2.2.1/24
bridge-domain 2 p2mp
router-interface Ve200
logical-interface ethernet 0/1.2
pw-profile default
bpdu-drop-enable
local-switching
!
ip ospf area 0
ipv6 ospf area 0
!
no shutdown
!
PE2:
router ospf
area 0
interface Ve 200
ipv6 address 2001::2/64
ip address 10.2.2.2/24
bridge-domain 2 p2mp
router-interface Ve200
logical-interface ethernet 0/1.2
pw-profile default
bpdu-drop-enable
local-switching
!
ip ospf area 0
ipv6 ospf area 0
!
no shutdown
!
CE_A:
router ospf
area 0
interface Ve 200
ipv6 address 2001::10/64
ip address 10.2.2.10/24
bridge-domain 2 p2mp
router-interface Ve200
logical-interface ethernet 0/1.2
pw-profile default
bpdu-drop-enable
local-switching
!
ip ospf area 0
ipv6 ospf area 0
!
no shutdown
!
The MCT device that acts as the Virtual Routing Redundancy Protocol (VRRP) and VRRP Extended (VRRP-E) backup router performs
as a Layer 2 switch to pass the packets to the VRRP or VRRP-E master router for forwarding. Through MAC synchronization, the VRRP
or VRRP-E backup router learns the virtual MAC (VMAC) on the Inter-Chassis Link (ICL) represented by the MPLS cloud in the diagram.
The data traffic and control traffic both pass through the ICL MPLS cloud link from the backup router. If VRRP-E short path forwarding is
enabled, the backup router can forward the packets directly, instead of sending them to the master.
NOTE
Short path forwarding is only supported on VRRP-E.
In the diagram below, when an ARP request from the S1 switch device is sent through the direct link to the VRRP or VRRP-E backup
router (PE2), a broadcast packet is sent to the VRRP/E master router (PE1) for processing through the ICL (MPLS cloud). When the ARP
request is received by the PE1 device, PE1 sends a reply through the direct link to S1. If the ARP reply was received before the MAC
address for the MCT on S1 is learned, the reply packet may be flooded to both the Customer Client Edge Port (CCEP) ports and ICL
ports.
Using VRRP or VRRP-E, data traffic received from a client device on a backup router is Layer 2 switched to the master device. If VRRP-
E short path forwarding is enabled, traffic received on the backup device may be forwarded by the backup if the route to the destination
device is shorted than through the master device.
PE1 configuration
The following example configures the OSPF, BGP, and MPLS protocols with cluster configuration for MCT for the PE1 router in the
diagram. A VRRP-E priority value of 110 (higher than the device at PE2) allows the PE1 device to assume the role of VRRP-E master.
ip router-id 10.19.19.19
router ospf
area 0
router bgp
local-as 100
PE2 configuration
The following example configures the OSPF, BGP, and MPLS protocols with cluster configuration for MCT for the PE2 router in the
diagram. A VRRP-E priority value of 80 (lower than the device at PE1) allows the PE2 device to assume the role of a VRRP-E backup
device.
ip router-id 10.32.32.32
router ospf
area 0
router bgp
local-as 100
neighbor 10.19.19.19 remote-as 100
neighbor 10.19.19.19 update-source loopback 100
address-family ipv4 unicast
!
address-family ipv6 unicast
!
address-family l2vpn evpn
neighbor 10.19.19.19 encapsulation mpls
neighbor 10.19.19.19 activate
!
!
interface Ethernet 2/3
ip address 10.1.8.32/24
no shutdown
ip ospf area 0
!
router mpls
mpls-int Ethernet 2/3
lsp to19
to 10.19.19.19
enable
!
vlan 100
!
interface Ethernet 2/7
switchport
switchport mode trunk-no-default-native
switchport trunk allow vlan add 100
no shutdown
!
evpn myinstance
vlan add 100
rd auto
route-target both auto ignore-as
!
cluster c1 1
peer 10.19.19.19
deploy
client c1 1
esi 01:02:03:04:05:06:07:08:09
client-interface Ethernet 2/7
deploy
!
vlan 100
router-interface Ve 100
!
protocol vrrp-extended
interface Ve 100
ip proxy-arp
ip address 10.2.3.5/24
vrrp-extended-group 1
priority 80
short-path-forwarding
virtual-ip 10.2.3.4
no shutdown
!
interface Ve 100
ipv6 address fe80::1:1 link-local
ipv6 address 3313::3/64
ipv6 vrrp-extended-group 1
virtual-ip 3313::1
Another variation of this use case is when the aggregation layer is a virtual cluster of switches which is transparent to SLX-OS devices in
the core layer.
An MVRP-aware device can exchange VLAN configuration information with other MVRP-aware devices, prune unnecessary broadcast
and unknown unicast traffic, and dynamically create and manage VLANs on the devices. These devices form a reachability tree that is a
subset of an active topology. To avoid any information loop, the forwarding ports of base spanning tree form the active topology.
NOTE
It is not mandatory to enable any of the STP variants before configuring MVRP if the topology is already Layer 2 loop free
where MVRP can still function effectively.
MVRP on the device propagates the configured VLANs to all MVRP participants to declare it over their respective MVRP-enabled ports.
The device initiates a join event information which is placed inside an MVRP data unit (MVRPDU). The MVRPDU is transmitted as
untagged Ethernet frame and is sent out as an advertisement through all ports wherever a declaration is made. The advertisement is
transmitted only when the port's spanning tree state is forwarding.
Similarly, if a VLAN is removed from a port, MVRP on the device propagates a leave event to all MVRP participants which removes the
registration and declaration for the VLAN and then sends out a leave message over their respective MVRP enabled ports. The receiving
node mimics this behavior and, through this method, the removal of the VLAN configuration is communicated to the entire topology.
VLAN registration occurs only on ports of intermediate nodes where the MVRP advertisement is received. Each registration acts as a
pointer towards the source of the VLAN declaration. If the VLAN configuration on a device changes, MVRP automatically changes the
VLAN configurations of the affected devices. Using VLAN pruning, MVRP avoids unnecessary flooding and provides solution for better
resource utilization and bandwidth conservation.
• The interface must be configured in 'switchport access mode' only on the edge ports of the SLX-OS device where MVRP
selects statically configured VLANs for propagation. The interfaces connecting the devices on the SLX devices should be only
configured in 'switchport trunk mode' where MVRP dynamincally configures the VLANs. MVRPDUs received on ports
configured in access mode are dropped; VLANs are neither learned nor propagated.
• MVRP can be learned for all allowed configurable VLANs, up to 4090 VLANs in number.
• MVRP can be enabled on all physical and PO interfaces without any CLI restrictions.
• A maximum of 2k dynamic VLANs are supported on each MVRP-enabled interface. However, the MVRP timer values require
adjustment to less aggressive values based on the number of MVRP-enabled interfaces, VLANs to be learned dynamically on
each associated interface, load on the system, and the topology.
If MVRP is scaled to an extent with the default timer settings that are too aggressive, the device may become unresponsive and
severe performance impact could occur. Extreme recommends that you increase the MVRP timer values to values that are less
aggressive for effective MVRP operation.
• If you manually configure a VLAN that is currently a dynamically-learned VLAN, the VLAN is converted to the Static type and
the device initiates an appropriate Syslog message. Though the VLAN is Static in type, its member switch ports are of the
Dynamic type (dynamically learned).
If you configure a Static VLAN on a MVRP-enabled dynamically-learned switch port, the ports are configured to the Static type
and the device initiates an appropriate Syslog message.
You cannot delete a Static VLAN with Dynamic ports through the CLI until all Dynamic ports are converted to Static.
• The device supports MVRP in compliance to the 802.1ak standard along with the following:
– Hitless Failover (i.e., HA)
– GVRP objects in the Dot1q Bridge MIB (Only SNMP Read operations are supported)
– Interoperability with ExtremeRouting MLX Series, ExtremeRouting CER Series, and ExtremeSwitching CES Series devices
• The device also supports the following Layer 2 features with MVRP:
– Spanning Tree Protocol (STP)
– Rapid Spanning Tree Protocol (RSTP)
– Common Internal Spanning Tree (CIST)
– Multi Chassis Trunking (MCT)
– Endpoint tracking (EP)
• The following features are not supported with MVRP:
– PVST and PVST+
– RPVST and RPVST+
– MSTIs for MSTP
– MVRP over any ring protocols
– MVRP with topology groups
device(config)# vlan 10
device(config-vlan-10)#
device(config-vlan-10)# exit
device(config-mvrp)#
device(config-mvrp)# exit
device(conf-if-eth-1/1)# switchport
Trunk mode makes the port linkable to other switches and routers.
9. Add the VLAN to the interface as tagged.
device(conf-if-eth-1/1)# no shutdown
NOTE
You cannot configure a static VLAN as forbidden. If a VLAN is configured in the forbidden list and then it is configured as a
static VLAN on the device, this VLAN is implicitly removed from the forbidden list.
device(config-mvrp)#
device(config-mvrp)# exit
device(conf-if-eth-1/1,2)#
device(conf-if-eth-1/1,2)# no shutdown
device(conf-if-eth-1/1,2)# exit
device(config-Port-channel-10)# switchport
device(config-Port-channel-10)# no shutdown
You can configure global timer settings or settings for each interface that overrides the global timer settings. If the network radius is large
or the expected system load is higher normally, Extreme recommends that you change the timer values to higher numbers as
appropriate for the MVRP operation to reduce the MVRP PDU exchanges and processing by the NSM.
3. Set the global MVRP join, leave and leave-all timers values that will be applied implicitly on all the MVRP-enabled interfaces.
In this step, the join timer is set to 40 centiseconds (cs), the leave timer is set to 200 cs, and the leave-all timer is set to 2000
cs.
4. Access global configuration mode.
device(config-mvrp)# exit
5. To set the timers for an individual interface, access the configuration mode for the interface.
This step is for an Ethernet interface. You can also change the settings for a port-channel interface.
6. Configure the timers for the interface.
The following example provides the steps for setting the MVRP timers globally and for an interface.
• The deployment of MVRP and endpoint tracking is similar to MVRP configured on edge ports.
• MVRP and endpoint tracking are supported together in MCT deployments.
• MVRP and endpoint tracking work as independent features or can work together.
• MVRP will advertise the endpoint tracking VLANs, similar to static VLANs.
• MVRP state machines treat the endpoint tracking VLANs the same way as a static VLANs with regards to its FSM states.
• The dynamic VLANs assigned by endpoint tracking and by MVRP can have an impact on each other similar to CLI driven static
VLANs with MVRP VLANs. The dynamic VLANs assigned by endpoint tracking are displayed in operational show commands
for MVRP, same as in the case of static VLANs. In case of conflict, the following rules apply:
– The static VLAN has the highest precedence, followed by the endpoint tracking VLAN and MVRP VLANs.
– When endpoint tracking creates a VLAN and MVRP also tries to create a dynamic VLAN with the same VLAN ID in the
system, MVRP recognizes that an endpoint tracking-enabled VLAN already exists and adds ports dynamically to it; as in
case of a static VLAN.
– If the RADIUS server deletes the endpoint tracking VLAN, the system deletes the VLAN and, if required, MVRP
reprograms it to ensure that it is cleaned up across the network and no false instances remains for this VLAN.
– When MVRP withdraws a VLAN, it has no impact on the endpoint tracking created VLAN, similar to a static VLAN.
NOTE
If MVRP is enabled on an MCT node, you must configure the interface enabled for endpoint tracking with MVRP applicant
mode as non-participant through the mvrp applicant-mode non-participant command in interface configuration mode. Refer
to Endpoint tracking on page 53 in this document. Also, if you observe an MVRP flap, configure MVRP timers to higher values
on the ICL interfaces. For details, refer to the timer command.
With MCT, member links of the LAG trunk are connected to two MCT-aware devices. A configuration between the devices enable data
flow and control messages between them to establish a logical Inter-Chassis Link (ICL). In this model, if one MCT device fails, a data
path remains through the other device. The following figure shows switch level redundancy provided by MCT between MCT clients
through MCT peers.
For more information on MCT and terminology, refer to the MCT chapter.
Consider the example, as shown in the previous figure, where Layer 2 Switch-1 and Layer 2 Switch-2 are CCEP clients and Layer 2
Switch-3 and Layer 2 Switch-4 are CEP clients. SLX-1 and SLX-2 are MCT peers with Ethernet port 1/3 on them being the ICL
interfaces and PO 6 on them being the CCEP interfaces.
When MVRP over MCT is implemented on the device and the CCEP client is connected to both MCT peers registered through LAG,
MVRP applies the dynamic VLANs on both MCT devices for the CCEP client interfaces. Also, the MVRPDU is propagated onto other
MVRP-enabled interfaces except the ICL interface to avoid the formation of a loop. The MVRPDU transmission to the CCEP clients is
performed by either of the two MCT peers based on the master derived from the BGP loopback IP.
In the case of the CEP client, the connected interface in the MCT device is with the MVRP dynamic VLANs advertised by the CEP client
and the peer MCT device has the same dynamic VLANs replicated. The BGP EVPN pseudowire automatically handles the data traffic on
the ICL when the VLAN is configured on both MCT peers this way.
Common Transport Protocol (CTP) communicates between MCT peers and carries MVRPDUs to ensure that the MCT peers configured
with MVRP dynamic VLANs do not form a loop and dynamic VLANs are not added to the ICL interface.
1. Ensure that the MCT cluster configuration is completed and the cluster is up.
vlan 2
router-interface Ve 2
!
3. The following VLAN 4089 configuration is a predefined VLAN to be configured on either MCT peers’ corresponding CCEP
interface to ensure that the cluster client is always up. Each CCEP interface must be associated with a unique VLAN.
vlan 4089
!
4. The following EVPN configuration defines the VLANs on each of the cluster peers for the data path to work seamlessly for the
configured VLANs on either node. Extreme recommends that you define VLANs 1 through 2K (the maximum VLANs
supported for MVRP) under the EVPN configuration on both cluster peers for seamless data traffic flow on the ICL link. VLAN
4089, associated with the CCEP interface, also needs to be part of the EVPN configuration.
evpn default
route-target both auto ignore-as
rd auto
vlan add 3-2000,4089-4090
!
5. MVRP must be enabled globally. Global timers must be configured to the following values on the cluster nodes.
protocol mvrp
timer join 20 leave 300 leave-all 3000
6. MVRP must be enabled on the ICL interface (physical or port-channel interface) and the following MVRP timer values are
configured on it for MVRP to work seamlessly on the ICL link.
NOTE
The recommended timer values on the ICL link must be a minimum of 20 centiseconds (cs) for the join timer, 2000
cs for the leave timer, and 6000 cs for the leave-all timer. The reason for this recommendation is that multiple CEP
and CCEP clients would be connected to either MCT nodes. Only one leave timer would be associated with an
interface for all VLANs advertised by the CEP and CCEP clients. Configuring a shorter leave timer would mean a
faster timeout for the dynamic VLANs which would trigger a leave timer expiry on the ICL link. Frequent leave timer
expiry in the ICL link would result in MVRP protocol flaps and VLAN synchronization issues. This is best avoided by
configuring the recommended timer values.
If the End-Point tracking feature is enabled with MVRP on MCT peers, the recommended timer values on the ICL link
must be minimum of a minimum of 20 cs for the join timer, 5000 cs for the leave timer, and 15000 cs for the leave-
all timer.
If a forbidden VLAN list is configured on the CEP or EP interface, the VLANs are not honored for this interface to
avoid traffic flow for the forbidden VLAN for the CEP or EP client. But the VLANs may be propagated to the other
MVRP-enabled ports since other connected CEP or EP clients may be interested in advertising a particular VLAN
through MVRP over the ICL.
7. MVRP must be enabled on the corresponding CCEP port-channel interface and the unique VLAN 4089 needs to be
associated with the CCEP interface on either cluster nodes.
NOTE
The mvrp enable configuration must always be present on the corresponding CCEP interfaces on both MCT devices.
Configuring it on one MCT peer and not on the other one can cause instability in the network.
If a forbidden VLAN list is configured on an CCEP interface on an MCT device, the corresponding CCEP interface on
the other MCT device should have the same configuration.
8. MVRP must be enabled on the required CEP interfaces (physical or port-channel interface).
NOTE
On the client devices acting as access switches, the MVRP timer values can remain at the MVRP default timer values.
You must ensure that timer values on the client devices are less than the global timers configured on the MCT peers
to avoid MVRP protocol flaps.
If the endpoint tracking feature is operating with MVRP, then the recommended timer values on the ICL interface are a
minimum of 20 cs for the join timer, 5000 cs for the leave timer, and 15000 cs for the leave-all timer.
• For all the other clients connected to the MCT peers, the recommended values are the default timer values.
The following examples provide the recommended configuration for SLX-1 and SLX-2.
router ospf
area 0
!
interface Loopback 1
ip ospf area 0
ip address 11.12.13.14/32
no shutdown
!
interface Ve 2
ip ospf area 0
ip proxy-arp
ip address 1.1.1.1/20
no shutdown
!
interface Ethernet 1/1
channel-group 5 mode on type standard
no shutdown
!
interface Ethernet 1/2
shutdown
!
interface Ethernet 1/3
switchport
switchport mode trunk
switchport trunk allowed vlan add 2
switchport trunk tag native-vlan
mvrp enable
mvrp timer join 20 leave 5000 leave-all 15000
no shutdown
!
interface Ethernet 1/9
channel-group 6 mode on type standard
no shutdown
!
interface Port-channel 5
switchport
switchport mode trunk
switchport trunk allowed vlan add 100
switchport trunk tag native-vlan
mvrp enable
no shutdown
!
interface Port-channel 6
switchport
switchport mode trunk
switchport trunk allowed vlan add 101
switchport trunk tag native-vlan
mvrp enable
no shutdown
!
cluster MCT 1
peer 15.16.17.18
deploy
client c1 1
client-interface Port-channel 5
esi 01:02:03:04
deploy
!
client c2 2
client-interface Port-channel 6
esi 02:03:04:05
deploy
!
!
router mpls
mpls-interface ve 2
ldp-enable
!
lsp toll
to 15.16.17.18
enable
!
!
router ospf
area 0
!
interface Loopback 1
ip ospf area 0
ip address 15.16.17.18/32
no shutdown
!
interface Ve 2
ip ospf area 0
ip proxy-arp
ip address 1.1.1.2/20
no shutdown
!
interface Ethernet 1/1
channel-group 5 mode on type standard
no shutdown
!
interface Ethernet 1/3
switchport
switchport mode trunk
switchport trunk allowed vlan add 2
switchport trunk tag native-vlan
mvrp enable
mvrp timer join 20 leave 5000 leave-all 15000
no shutdown
!
!
interface Port-channel 6
switchport
switchport mode trunk
switchport trunk allowed vlan add 101
switchport trunk tag native-vlan
mvrp enable
no shutdown
!
cluster MCT 1
peer 11.12.13.14
deploy
client c1 1
client-interface Port-channel 5
esi 01:02:03:04
deploy
!
client c2 2
client-interface Port-channel 6
esi 02:03:04:05
deploy
!
!
router mpls
mpls-interface ve 2
ldp-enable
!
lsp to11
to 11.12.13.14
enable
!
!
This feature facilitates the support of future forwarding technologies without the need to modify code design in various software
components.
A forwarding interface is also known as "main interface." It can be a physical port, a port-channel (Link Aggregation Group, or LAG), a
pseudowire (PW), a tunnel, and so on. A logical interface can also be thought of as a subinterface configuration on top of a main interface.
NOTE
Currently the only LIFs that require explicit user configuration are attachment circuit (AC)
LIFs.
Configuration considerations
The following are some common rules to consider in configuring logical interfaces:
• By default, when the LIF is created it is configured as "no shutdown."
• By default, when the LIF is created, it is "tagged" unless it is explicitly configured with the "untagged" option.
• Allowed LIF service instance ID ranges are from 1 through 12288.
• An LIF service instance ID has no correlation to the VLAN ID of the LIF.
• Each physical/LAG-based LIF must have an associated VLAN configured or else it will not be usable when the user attempts to
add it to a service (such as VPLS, Layer 2). Such a configuration request to add the LIF to a service will be rejected.
• Once the LIF is associated with a Layer 2 service, its VLAN value cannot be changed or deleted unless it is first removed from
the associated service. In case the LIF is not yet associated to a service, the user is free to remove the VLAN configuration or
change the VLAN assignment.
• The no option to the logical-interface command can be applied at any time.
• The "untagged" configuration is allowed for only one LIF under the same physical port or LAG. If one LIF is already configured
as untagged, all subsequent attempts on the same physical port or LAG are rejected.
• Once the "untagged" option is selected, it will only have one VLAN as the next classification option. There is no dual-tag
support for the untagged case.
• In order to configure an untagged LIF, the main interface must be configured as "switchport mode trunk-no-default-native". If it
is configured set to regular trunk mode, the native VLAN is already associated with a regular Layer 2 VLAN LIF and no explicit
untagged LIF can be configured on that interface.
• Once the LIF is associated with a service (Layer 2) such as a bridge domain, its "untagged/tagged" configuration cannot be
changed. The service instance or its current VLAN classification must be deleted by the user first and then added back with the
proper "untagged/tagged" option.
• VLANs 4091 through 4095 are reserved VLANs and these should not be used as the VLAN ID for either the inner or outer
VLAN of the LIF.
• The VLAN specified under the LIF ensures that such a VLAN is not already configured under the switchport command for a
regular Layer 2 allowed VLAN.
If the interface is already configured as "switchport access," then it is not allowed to be configured with LIF. The reverse condition is also
not allowed: the interface cannot be changed to mode access if a LIF is still configured under the main interface.
Refer to the Usage Guidelines for the logical-interface command for complete details.
device(conf-if-eth-2/6)# switchport
d) Enter the switchport mode trunk-no-default-native command to enable an explicit untagged LIF to be configured.
device(conf-if-eth-2/6)# no shutdown
f) Enter the logical-interface command, specify a service instance, and enter LIF configuration mode.
g) (Optional) Enter the name command to facilitate the management of the LIF.
h) Enter the vlan command with the inner-vlan option to specify an interface and create dual-tag VLANs.
i) Alternatively, enter the untagged vlan command to specify that the LIF is to receive untagged packets.
device(conf-if-eth-lif-2/6.120)# no shutdown
k) (Optional) For convenience, you can also enter up to two options in a single command line, as in the following examples.
2. To configure a port-channel, configure the basic LIF parameters and options as in Step 1.
a) Specify a port-channel, set its mode to "trunk-no-default-native," and specify a logical interface service instance.
A bridge domain is a generic broadcast domain that is not tied to a specific transport technology. Bridge domains support a wide range
of service endpoints including regular L2 endpoints and L2 endpoints over L3 technologies.
Bridge domains switch packets between a range of different endpoint types; for example, attachment circuit (AC) endpoints, Virtual
Private LAN Service (VPLS) endpoints, Virtual Leased Line (VLL) endpoints, and tunnel endpoints.
The following are examples of bridge-domain capable services:
• VPLS—with multiple AC endpoints and pseudowire (PW) logical interfaces (LIFs)
• Local VPLS—with multiple AC endpoints
• VLL—with one AC endpoint and one PW endpoint
• VLL—with two AC endpoints
A bridge domain that is created for a VPLS application is also referred to as a VPLS instance.
Statistics must be manually enabled for a specific bridge domain, since statistics for bridge domains are not enabled by default.
Use the statistics command in bridge domain configuration mode to enable statistics on a bridge domain.
NOTE
• The statistics reported are not real-time statistics since they depend upon the load on the system.
• Enabling statistics on a bridge domain has a heavy impact on data traffic.
• For optimum utilization of the statistics resources in the hardware, statistics on a bridge domain are not enabled by
default.
Before configuring a bridge domain, configure any logical interface that is to be bound to the bridge domain. Logical interfaces that
represent bridge-domain endpoints must be created before they are bound to a bridge domain. For further information on configuration
of logical interfaces, refer to Logical Interfaces.
There is an example at the end of this task that shows all the configuration steps in order.
By default, the bridge-domain service type is multipoint (p2mp). In this example, bridge domain 5 is configured as a point-to-
point service (p2p).
3. NOTE
Logical interfaces representing bridge-domain endpoints must be created before they can be bound to a bridge
domain. For further information, refer to Logical Interfaces.
Bind the logical interfaces for attachment circuit endpoints to the bridge domain.
In this example, port channel logical interface 2.200 is bound to bridge domain 5.
5. (Optional) Enable local switching for bridge domain 5.
device(config-bridge-domain-5)# local-switching
device(config-bridge-domain-5)# bpdu-drop-enable
The following example creates bridge domain 5. It binds ethernet and port-channel logical interfaces to the bridge domain. It configures
local switching, and enables dropping of L2 BPDUs.
Bridge-domain 1
-------------------------------
Bridge-domain 2
-------------------------------
Bridge-domain Type: mp , VC-ID: 100
Number of configured end-points: 5 , Number of Active end-points: 4
VE if-indx: NA, Local switching: FALSE, bpdu-drop-enable:FALSE
PW-profile: profile_1, mac-limit: 262144
Number of Mac’s learned:90000, Static-mac count: 10,
VLAN: 100, Tagged ports: 2(1 up), Un-tagged ports: 0 (0 up)
Tagged ports: eth 2/10, eth 1/10
Un-tagged ports:
VLAN: 150, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged ports: eth 1/5
Un-tagged ports:
Bridge-domain 3
-------------------------------
Bridge-domain Type: mp , VC-ID: 200
Number of configured end-points: 5 , Number of Active end-points: 4
VE if-indx: 120793855, Local switching: FALSE, bpdu-drop-enable:FALSE
PW-profile: 2, mac-limit: 262144
Number of Mac’s learned:90000, Static-mac count: 10,
Local switching: TRUE,
VLAN: 500, Tagged ports: 2(2 up), Un-tagged ports: 2 (1 up)
Tagged ports: eth 11/6, eth 4/3
Un-tagged ports:
• Enter the show bridge-domain command specifying the bridge-domain ID to display information about a specific bridge
domain. The following example displays information about bridge domain 501.
Bridge-domain 501
-------------------------------
Bridge-domain Type: MP , VC-ID: 501
Number of configured end-points: 2 , Number of Active end-points: 2
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
PW-profile: default, mac-limit: 0
VLAN: 501, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged Ports: eth 1/6.501
Un-tagged Ports:
Total VPLS peers: 1 (1 Operational):
The following example shows information about a bridge domain (501) in which the load-balance option is configured for the
peer device 10.9.9.9.
Bridge-domain 501
-------------------------------
Bridge-domain Type: MP , VC-ID: 501
Number of configured end-points: 2 , Number of Active end-points: 2
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
PW-profile: default, mac-limit: 0
VLAN: 501, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged Ports: eth 1/6.501
Un-tagged Ports:
Total VPLS peers: 1 (1 Operational):
The following example shows information about bridge domain 501 in which the load-balance option and four assigned label-
switched paths (p101, p102, p103, and p104) are configured for the peer device 10.9.9.9.
Bridge-domain 501
-------------------------------
Bridge-domain Type: MP , VC-ID: 501
Number of configured end-points: 2 , Number of Active end-points: 2
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
PW-profile: default, mac-limit: 0
VLAN: 501, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged Ports: eth 1/6.501
Un-tagged Ports:
Total VPLS peers: 1 (1 Operational):
• Enter the show bridge-domain brief command to display summary information about all configured bridge domains.
NOTE
By default statistics are disabled on bridge domains. After enablement, statistics should be disabled when no longer needed
because the collection of statistical information has a heavy impact on data traffic.
2. Enter the bridge-domain command to create a bridge domain at the global configuration level.
device(config)# bridge-domain 3
3. Enter the statistics command to enable statistics for all the logical interfaces and peers in the bridge domain.
device(config-bridge-domain-3)# statistics
NOTE
When statistics are no longer needed, use the no statistics command to disable statistics on the bridge domain.
• Enter the show statistics bridge-domain command to display statistics for all logical interfaces and peers on all configured
bridge domains.
• Enter the show statistics bridge-domain command specifying a bridge-domain ID to view the statistics for a specific bridge
domain. The following example displays statistics for bridge-domain ID 1.
• Enter the clear statistics bridge-domain command specifying the bridge-domain ID to clear the statistics for a specific bridge
domain. The following example shows how to clear statistics for bridge domain ID 1.
VPLS overview
Virtual Private LAN Service (VPLS) is a Layer 2 Virtual Private Network (L2 VPN) architecture that provides multipoint Ethernet LAN
services.
VPLS provides transparent LAN services across provider edge (PE) devices using Internet Protocol (IP) or Multiprotocol Label Switching
(MPLS) as the transport technology.
Because it emulates LAN switching, VPLS is considered to be a L2 service that operates over Layer 3 (L3) clouds.
VPLS provides point-to-multipoint (p2mp) functionality while VLL is a special type of VPLS deployment that performs point-to-point
(p2p) switching.
The following figure shows a VPLS topology in which switched packets traverse a network.
FIGURE 21 VPLS topology with switching between attachment circuits (ACs) and network core
AC1 and AC2 represent L2 connectivity between customer edge (CE) and provider edge (PE) devices.
Pseudowire is a circuit emulation infrastructure that extends L2 connectivity from CE1 to CE2 by way of PE1 and PE2. The tunnel is
typically a L3 tunnel on which a L2 circuit is emulated.
In the case of a packet flowing from CE1 to CE2, the packet enters PE1 from CE1 after the forwarding database (FDB) is used to
determine the destination MAC address. Then, a virtual connection (VC) label is imposed prior to encapsulation with the tunnel
forwarding information, and the packet is sent out onto the wire towards the network core.
Essentially, the topology in the preceding figure shows a L2 VPN enabling the transport of L2 traffic between two or more native
Ethernet networks through an underlying Multiprotocol Label Switching (MPLS) provider network. Customer edge (CE) is the last mile
and provider edge (PE) is the first mile node for packets transported towards the provider network. The provider intermediary network is
an emulated switch (LAN) or wire (LINE) to the CE. The attachment circuit (AC) represents the logical link between the CE and PE.
An AC may be a port, IEEE 802.1q or IEEE 802.1ad (QinQ)) for Ethernet VPNs. A pseudowire (PW) or emulated wire is used as a
transport mechanism to tunnel frames between PEs. A PW is characterized by a circuit identifier, which identifies the destination PE.
MPLS tunnels and paths are established by using routing protocols. PW circuits are established by using signaling.
The following figure shows a VPLS topology where switching occurs between two local AC endpoints. This implementation of VPLS
does not use VC labels or a pseudowire.
The following figure shows a common VPLS deployment; an enterprise LAN service. The CE devices represent customer edge devices
while the PE devices represent provider edge devices.
VLL
Virtual Leased Line (VLL) is a Layer 2 Virtual Private Network (L2 VPN) architecture that provides point-to-point Ethernet line or Virtual
Private Wire Services (VPWS).
VLL provides point-to-point (p2p) connectivity between two access networks or endpoints. Typically, a VLL is used to connect two sites
that are geographically apart.
CE1 and CE2 are the customer edge devices in geographically separate sites.
Pseudowire (PW) is a circuit emulation infrastructure that extends L2 connectivity from CE1 to CE2 by way of PE1 and PE2. The tunnel
is typically a L3 tunnel on which a L2 circuit is emulated.
An AC endpoint is a L2 link between a PE device and a CE device. The AC endpoint can be an untagged port, or a tagged port with one
or more VLANs. AC endpoints with different VLAN tags can be configured in a single VPLS instance.
A VLL instance interconnects two AC endpoints through a pseudowire, while a VPLS instance forms a full mesh interconnection between
multiple AC endpoints through multiple PWs.
Both regular port and port-channel interfaces can be used to form port-vlan, untagged port-vlan, and port-vlan-vlan endpoints.
VPLS service endpoints are represented by logical interfaces (LIFs). By using LIFs, features that apply to regular interfaces, such as QoS,
can be applied to VPLS service endpoints.
Local switching
The forwarding behavior of AC endpoints in a VPLS instance is controlled by the switching-mode configuration for local endpoints.
When local switching is enabled, traffic is switched and flooded among AC endpoints in addition to between ACs and PWs. When local
switching is disabled, the flooding between AC endpoints is suppressed.
When an unknown unicast packet is received on an AC endpoint and local switching is enabled, the packet is flooded to all other AC
endpoints and PW endpoints in the VPLS instance. When local switching is disabled, the unknown packet is only flooded to the PW
endpoints in the domain.
Regardless of the local switching configuration, an unknown unicast packet that is received on a PW endpoint is flooded to all AC
endpoints.
In a VPLS instance that does not have a PW peer and where all endpoints are AC endpoints (Local VPLS), local switching must be
enabled.
To avoid receipt of traffic with different VLAN tags on local endpoints, it is recommended that local switching is disabled in a bridge
domain where the PW profile is configured with the VC mode option of raw-passthrough. Raw passthorugh mode is designed to
forward packets between two VPLS peer devices and is not intended for use with local switching.
Pseudowires
A pseudowire (PW) is a virtual circuit (VC) formed between two provider edge (PE) devices that connects peering Virtual Private LAN
Services (VPLS) PE nodes.
An Ethernet pseudowire is logically viewed as an L2 nexthop (VC label) that is reachable through an L3 nexthop (LDP label).
The frames from an AC endpoint packet are sent through an ingress pseudowire interface (which abstracts the transport path and packet
encapsulations) towards the remote PE. An egress pseudowire interface then abstracts the packet received from a remote PE and hands
it over to the corresponding AC end-point.
Pseudowire operation
The pseudowire setup process establishes the reachability of VPLS bridge domain endpoints across an IP or MPLS cloud.
Raw At VC label imposition, when a tagged packet is received on a tagged AC endpoint, the VLAN tag is removed before it is
sent out on the wire. When an untagged packet is received on an untagged AC endpoint it is encapsulated as is and sent
out on the wire.
Raw-passthrough Enables interoperation with third-party devices. When a packet that is destined for a remote peer is received on either a
tagged or untagged AC endpoint, it is encapsulated in an MPLS header and sent on to the MPLS cloud without adding
or removing VLAN tags. When a packet that is destined for a local endpoint is received on either a tagged or untagged
AC endpoint, the MPLS header is removed before sending it on to the local endpoint; VLAN tags in the original packet
are not changed in any way.
Tagged At VC label imposition, when a tagged packet is received on a tagged AC endpoint, the packet is encapsulated as is and
sent out on the wire. When a packet is from a dual-tagged AC endpoint, the outer VLAN tag is removed and only the
inner VLAN TAG is sent out on the wire. When an untagged packet is received on an untagged AC endpoint, a dummy
tag is added and it is sent out on the wire.
The VC mode is agreed by PE peer devices during the pseudowire signaling process.
A single VPLS instance can have a mixture of tagged and untagged endpoints.
When the VC mode is changed on a device, the PWs are torn down are re-established except in the cases of a change from raw to raw-
passthrough or a change from raw-passthrough to raw. The traffic impact is minimal (because PWs are not torn down and re-
established) when the VC mode is changed from raw to raw-passthrough (or vice versa).
VC mode is configured by specifying the vc-mode option for the pw-profile command.
NOTE
When a pseudowire profile is attached to a bridge domain, on which routing is enabled (by using the router-interface
command), you are not allowed to change the pseudowire profile vc-mode configuration to raw.
PW statistics
Pseudowire (PW) statistics are supported for both the ingress (packet going out over the PW) and egress (packet received on the VC-
Label of the PW) provider edge (PE) devices.
PW statistics are enabled or disabled per bridge domain and apply to all the PWs that are part of the bridge domain. The logical
interfaces for inbound and outbound statistics are shared resources. Hence, the corresponding PW is operational only when these
hardware resources are available.
PW statistics are configured using the statistics command in bridge domain configuration mode. For further information about enabling
statistics on a bridge domain, refer to Bridge Domains.
PW control word
To ensure that a PW operates correctly over an MPLS PSN, the PW traffic is normally transported over a single network path, even when
equal-cost multiple-paths (ECMPs) exist between the ingress and egress PW provider edge (PE) devices. Transporting PW traffic over a
single network prevents misordered packet delivery to the egress PE device.
Because the standard MPLS label stack does not contain an explicit protocol identifier, label switching routers (LSRs) in ECMP
implementations may examine the first nibble after the MPLS label stack to determine if a labeled packet is an IP packet. When the
source MAC address of an Ethernet frame that is carried over a PW (without a control word present) begins with 0x4 or 0x6, it could be
mistaken for an IPv4 or IPv6 packet. Depending on the configuration and topology of the MPLS network, this misinterpretation could
lead to a situation in which all packets for a specific PW do not follow the same path and may increase out-of-order frames on the
specific PW, or cause packets to follow a different path than actual traffic.
PW control word (RFC 4385) enables all packets for a specific PW to follow the same path over an MPLS PSN.
The first 4 bits are set to 0 to indicate PW data and distinguish a PW packet from an IP packet. The next 12 bits are reserved.
The last 16 bits carry a PW-specific sequence number that guarantees ordered frame delivery. A sequence number value of 0 indicates
that the sequence number check algorithm is not used.
NOTE
PW control word is a nonconfigurable, global system
value.
The following figure shows the operation of PW control word in a PW over MPLS network configuration.
• The ingress device (PE1) initiates the PW setup, including the capability to transmit and receive PW control word by using the
new interface parameter TLV.
• The egress device (PE4) signals a control word-handling capability.
• When PE1 receives traffic from the customer edge device (CE1), it pushes the label stack onto the traffic control word and
forwards the packet to P2.
• P2 uses the field immediately after the bottom of the MPLS label stack to identify the payload as non-IP, IPv4 or IPv6 and
forwards the packet to PE4.
• PE4 receives the packet with two labels; the PW label, which identifies the PW, and PW control word, which is discarded without
processing.
Pseudowire (PW) control word is configured by enabling control word for either a PW profile or for PW-related devices in a bridge
domain. To enable control word for a PW profile, use the control-word command in PW profile configuration mode. To enable control
word for PW-related devices in a bridge domain, use the peer command in bridge domain configuration mode.
PW flow label
Some PWs transport high volumes of traffic that comprise multiple separate traffic flows (for example, all packets for the same source-
destination pair for a Transport Control Protocol [TCP] connection is a specific traffic flow).
To avoid latency and jitter, it is important that packets for a specific traffic flow are mapped to the same links along the path to the egress
device.
PWs that carry multiple traffic flows require only the preservation of packet ordering in the context of an individual traffic flow and do not
require the preservation of packet order for all traffic carried on the PW.
In normal cases, routers use source and destination IP addresses, protocol type, and TCP or UDP port numbers as keys in a load-
balancing algorithm to find the appropriate outgoing interface. In MPLS networks, deep packet inspection may be needed for LSRs to
identify such keys.
PW flow label is a mechanism that supports load balancing in an MPLS network, without the need for deep packet inspection by LSRs.
The PW flow label is added to the bottom of the label stack, by the ingress LSR (which has complete information about the packet)
before it pushes the label stack. Transit LSRs can use the entire label stack (including the flow label) as a key for a load-balancing
algorithm.
The PW flow label allows PWs to leverage the availability of, for example, equal-cost multiple-path (ECMP) between LSRs in an MPLS
PSN. The ingress PE device maps individual traffic flows within a PW to the same flow label. Label Distribution Protocol (LDP) uses the
PW flow label to map packets for a specific traffic flow to the same links along the path and to ensure that packets for the specific traffic
flow follow the same path over the MPLS PSN. The PW flow label is discarded at the egress PE device.
NOTE
PW flow label load balancing is not supported when the incoming packet contains more than three
labels.
The following figure shows packet encapsulation when flow label is enabled for PW traffic.
PW flow label is not a reserved value (that is, in the range from 0 through 15). To prevent any processing of flow label at the egress LSR,
the TTL value of the flow label is set to 0.
NOTE
PW flow label is not signaled between PE routers. The flow label is generated locally and pushed to the bottom of the stack by
the ingress LSR.
The following figure, which shows a PW over MPLS network configuration, describes the operation of PW flow label.
• The ingress device (PE1) initiates the PW setup, including the capability to transmit and receive PW flow label by using the new
interface parameter TLV.
• The egress device (PE4) signals a flow label-handling capability.
• When PE1 receives traffic from the customer edge router, it uses a hash algorithm based on the keys (destination MAC address,
source MAC address, and so on) to generate a flow label. It then pushes the label stack onto the flow label (S=1, TTL=0) and
forwards the packet to P2.
• The P2 router uses the bottom label from the stack to ensure that a particular traffic flow (packets for a specific source-
destination pair) follows the same path through transit routers.
• PE4 receives the packet with two labels with the top label being the PW label, which is used to identify the pseudowire, and the
flow label, which is discarded without processing.
NOTE
When load balancing is based only on PW flow label, the transit device (P2) must be configured to include the bottom-of-stack
(BOS) label by using the lag hash bos start command.
Pseudowire (PW) flow label is configured either by enabling flow label either for a PW profile or the bridge domain to which the PW is
attached.
Pseudowire (PW) flow label is configured by enabling flow label for either a PW profile or PW-related devices in a bridge domain. To
enable flow label for a PW profile, use the flow-label command in PW profile configuration mode. To enable flow label for PW-related
devices in a bridge domain, use the peer command in bridge domain configuration mode.
To configure a VPLS or VLL instance, you must complete the following tasks:
• Configure a bridge domain.
• Configure a VC identifier.
• Configure logical interfaces for AC endpoints.
• (Optional) Configure a pseudowire (PW) profile.
• Configure peer IP addresses. Configuring peer IP addresses creates PW endpoints.
NOTE
VPLS (or VLL) configuration is separate from the underlying IP or MPLS configuration. MPLS tunnels need to be brought up
separately. For further information about the configuration of MPLS tunnels, refer to the Extreme SLX-OS MPLS Configuration
Guide for the SLX 9850 Router.
On the ingress label-edge router (LER), the final EXP value for the VC label is not dependant on the CoS value in the VC-peer
configuration.
By default, for traffic flowing from a CE device to a PE device, 3 bits of the PCP field from the incoming Ethernet frame header are
extracted and mapped to an internal CoS value by way of an ingress CoS map. This internal value is then mapped to an outgoing CoS
value by way of an egress CoS map. The outgoing CoS value is then inserted into the EXP field in the outgoing VC label. When incoming
traffic does not have VLAN tag, the default PCP value that is configured on a port is used.
In the case of traffic received from the network core side, by default the EXP field from the incoming VC label is mapped to an internal
CoS value by way of an ingress CoS map. This internal value is then mapped to an outgoing CoS value by way of an egress CoS map.
The outgoing CoS value is then inserted into the PCP field in the Ethernet frame header going out to the CE device.
On the egress LER, the CoS value for the VC-peer configuration is not dependant on the final EXP value for the VC label.
The following table shows ingress and egress behavior for different global, tunnel and PW configuration combinations.
Configuring a PW profile
A pseudowire (PW) emulates a point-to-point connection over a packet-switching network. PW profile configuration defines PW
attributes. After configuration, a PW profile must be attached to a bridge domain.
A pseudowire profile can be shared across multiple bridge domains. Complete the following task to configure a PW profile.
The following example creates a PW profile named pw_example and configures attributes for the profile.
device(config-bridge-domain-501)# end
Bridge-domain 501
-------------------------------
Bridge-domain Type: MP , VC-ID: 501
Number of configured end-points: 2 , Number of Active end-points: 2
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
PW-profile: pw_example, mac-limit: 0
VLAN: 501, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged Ports: eth1/6.501
Un-tagged Ports:
Total VPLS peers: 1 (1 Operational):
The following example shows how to attach a PW profile named pw_example to bridge domain 501.
Before completing the following task, the PW profile on which control word is to be enabled must be configured. An example is provided
at the end of this task that shows all the steps in order.
PW control word configuration enables all packets for a specific PW to follow the same path over the MPLS network supporting, for
example, the optimal transport of Ethernet Protocol Data Units (PDUs) over the network.
device(config-pw-profile-pw_example)# control-word
NOTE
When control word is enabled for a previously configured PW, control word capabilities between PE devices are
activated only after LDP neighbors are cleared by using the clear mpls ldp neighbor command. For further
information on clearing LDP neighbors, refer to Extreme SLX-OS MPLS Configuration Guide.
The following example shows how to configure a PW profile and enable control word for the profile. It then shows how to attach the PW
profile to a bridge domain.
Before completing the following task, the relevant bridge domain must be configured. An example is provided at the end of this task that
shows all the steps in order.
PW control word configuration enables all packets for a specific PW to follow the same path over the MPLS network supporting, for
example, the optimal transport of Ethernet Protocol Data Units (PDUs) over the network.
Perform the following task to configure PW control word for a peer device in a bridge domain.
b) Enter bridge domain configuration mode. The following example shows how to enter configuration mode for bridge
domain 502.
c) Enable control word for a PW-related peer device (10.9.9.9) that is configured on the bridge domain.
device(config-pw-profile-pw_example)# end
Bridge-domain 502
-------------------------------
Bridge-domain Type: MP, VC-ID: 502 MCT Enabled: FALSE
Number of configured end-points: 3, Number of Active end-points: 1
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
MAC Withdrawal: Disabled
PW-profile: default, mac-limit: 0
VLAN: 502, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged Ports: eth0/5.502
Un-tagged Ports:
Total VPLS peers: 2 (0 Operational):
VC id: 502, Peer address: 10.9.9.9, State: Wait for LSP tunnel to Peer, uptime: -
Load-balance: True, Cos Enabled: False,
Tunnel cnt: 0
Assigned LSPs count:2 Assigned LSPs:q502 q752
Local VC lbl: 0, Remote VC lbl: 0,
Local VC MTU: 1500, Remote VC MTU: 0,
Local VC-Type: 5, Remote VC-Type: 0
Local PW preferential Status: Active, Remote PW preferential Status: Active
Local Flow Label Tx: Enabled, Local Flow Label Rx: Enabled
Remote Flow Label Tx: Enabled, Remote Flow Label Rx: Enabled
Local Control Word: Enabled, Remote Control Word: Enabled
The following example shows how to configure a bridge domain on which control word is enabled for a PW-related peer.
Before completing the following task, the PW profile on which flow label is to be enabled must be configured. An example is provided at
the end of this task that shows all the steps in order.
Flow label configuration improves load balancing of PW traffic over an MPLS network, particularly in the context of PWs that transport
high volumes of traffic that are comprised of multiple individual traffic flows (for example, the same source-destination pair for a
Transport Control Protocol (TCP) connection is an individual traffic flow).
device(config-pw-profile-pw_example)# flow-label
The following example shows how to configure a PW profile and enable flow label on the profile. It then shows how to attach the PW
profile to a bridge domain.
device(config)# bridge-domain 5
device(config-bridge-domain-5)# pw-profile pw_example
Prior to completing the following task, the bridge domain on which flow label is to be enabled must be configured. There is an example at
the end of this task that shows all the steps in order.
Flow label configuration improves load balancing of PW traffic over an MPLS network, particularly in the context of PWs that transport
high volumes of traffic that are comprised of multiple individual traffic flows (for example, the same source-destination pair for a
Transport Control Protocol (TCP) connection is an individual traffic flow).
2. Enter bridge domain configuration mode. The following example shows how to enter configuration mode for bridge domain
502.
3. Enable flow label for the PW-related peer devices that are configured on the bridge domain.
Bridge-domain 502
-------------------------------
Bridge-domain Type: MP, VC-ID: 502 MCT Enabled: FALSE
Number of configured end-points: 3, Number of Active end-points: 1
VE if-indx: 0, Local switching: TRUE, bpdu-drop-enable: TRUE
MAC Withdrawal: Disabled
PW-profile: default, mac-limit: 0
VLAN: 502, Tagged ports: 1(1 up), Un-tagged ports: 0 (0 up)
Tagged Ports: eth0/5.502
Un-tagged Ports:
Total VPLS peers: 2 (0 Operational):
VC id: 502, Peer address: 10.9.9.9, State: Wait for LSP tunnel to Peer, uptime: -
Load-balance: True, Cos Enabled: False,
Tunnel cnt: 0
Assigned LSPs count:2 Assigned LSPs:q502 q752
Local VC lbl: 0, Remote VC lbl: 0,
Local VC MTU: 1500, Remote VC MTU: 0,
Local VC-Type: 5, Remote VC-Type: 0
Local PW preferential Status: Active, Remote PW preferential Status: Active
Local Flow Label Tx: Enabled, Local Flow Label Rx: Enabled
Remote Flow Label Tx: Enabled, Remote Flow Label Rx: Enabled
Local Control Word: Enabled, Remote Control Word: Enabled
The following example shows how to configure a bridge domain on which flow label is enabled for the PW-related peers.
You can configure a MAC address for a logical interface for an endpoint in a VPLS instance by completing the following task.
NOTE
Pre-configuration for the static mac is supported. Pre-configured static mac is shown as inactive
mac.
2. Create the logical-interface (LIF) entry associated to a physical or port-channel interface, associate the LIF entry to the VPLS
instance and configure the static mac associated with the LIF entry.
device(config)# exit
• Enter the show mac-address-table bridge-domain command specifying a bridge domain to display information about MAC
addresses for a specific bridge domain.
Prior to completing the following task, the underlying L3 configuration of MPLS tunnels must be completed. In addition, the logical
interfaces to be attached the VPLS instance (bridge domain) should be configured. For information on configuring logical interfaces, refer
to Logical Interfaces.
device(config)# bridge-domain 5
By default, the bridge-domain service type is multipoint. In this example, bridge domain 5 is configured as a multipoint service.
3. Configure a virtual connection identifier for the bridge domain.
device(config-bridge-domain-5)# vc-id 8
4. NOTE
Logical interfaces representing bridge-domain endpoints must be created before they can be bound to a bridge
domain.
Bind the logical interfaces for attachment circuit endpoints to the bridge domain.
In this example, port channel logical interface 2.200 is bound to bridge domain 5.
6. Configure peer IP addresses to create pseudowire (PW) endpoints.
In this example, a peer IP address of 10.15.15.15 is configured under bridge domain 5 and specifies load balancing.
7. Repeat Step 6 to configure more peer IP addresses to create PW endpoints.
In this example, a peer IP address of 10.12.12.12 under bridge domain 5 and specifies two label-switched paths (lsp1 and
lsp2).
8. (Optional) Configure local switching for bridge domain 5.
device(config-bridge-domain-5)# local-switching
9. (Optional) Enable dropping L2 bridge protocol data units (BPDUs) for bridge domain 5.
device(config-bridge-domain-5)# bpdu-drop-enable
device(config-bridge-domain-5)# pw-profile 2
The following example creates bridge domain 5 and configures virtual connection identifier 8 for the bridge domain. It binds ethernet and
port-channel logical interfaces to the bridge domain and configures peer IP addresses under the domain. It configures local switching,
enables dropping of L2 BPDUs, and configures a PW profile for the domain.
Prior to completing the following task, the Ethernet logical interface and pseudowire profiles must be created. There is an example at the
end of this task that shows all the steps in order.
In this example, bridge domain 3 is created as a point-to-point service. By default, the bridge-domain service type is multipoint.
3. Configure a virtual connection identifier for the bridge domain.
4. Bind the logical interfaces for attachment circuit endpoints to the bridge domain.
In this example, the Ethernet logical interface 1/5.15 is bound to bridge domain 3.
5. Configure peer IP addresses to create pseudowire (PW) endpoints.
device(config-bridge-domain-3)# end
The following example shows the creation of a logical interface and a pseudowire profile in addition to the bridge domain and VLL
instance configuration.
FIGURE 29 VPLS configuration with switching between attachment circuits (ACs) and network core
The topology in the preceding figure shows a L2 VPN that enables transport of L2 traffic between two or more native Ethernet networks
through an underlying Multiprotocol Label Switching (MPLS) provider network. Customer edge (CE) is the last mile and provider edge
(PE) is the first mile node for packets transported towards the provider network. The provider intermediary network is an emulated switch
(LAN) or wire (LINE) to the CE. The AC represents the logical link between the CE and PE.
Pseudowire is a circuit emulation infrastructure that extends L2 connectivity from CE1 to CE2 by way of PE1 and PE2. The tunnel is
typically a L3 tunnel on which a L2 circuit is emulated.
The following examples show how to configure the provider edge devices (PE1 and PE2) shown in this topology.
PE1
device# configure terminal
device(config)# bridge-domain 500 p2mp
device(config-bridge-domain-500)# vc-id 501
device(config-bridge-domain-500)# peer 10.9.9.9 load-balance
device(config-bridge-domain-500)# logical-interface ethernet 1/5.1 ! AC1
device(config-bridge-domain-500)# exit
PE2
device# configure terminal
device(config)# bridge-domain 300 p2mp
device(config-bridge-domain-300)# vc-id 501
A MAC address withdrawal message is send with a MAC list Type Length Value (TLV). 200 MAC addresses are bulked and sent in one
Mac TLV message.
NOTE
The MAC withdrawal support is only for explicit MAC addresses in MAC withdrawal TLV. Empty MAC list as well as sending
MAC withdrawal TLV to specific subset of peers will not be supported.
The maximum number of MAC addresses supported is 5000 in a 5 second interval. The remaining MAC in the AC LIF are not sent.
After the 5 second interval, another LIF down event triggers MAC withdrawal message for a new 5 second interval. MAC withdrawal is
supported for both VPLS and MCT-VPLS. MPLS signals the MAC withdraw TLV to all the peers.
The mac-address withdrawal command enables MAC withdrawal on the bridge domain. The no form of the command disables MAC
withdrawal.
Disabling MAC withdrawal on a bridge domain stops sending of MAC withdraw messages. MAC withdraw messages are received at the
receiver end and MAC flush happens even when MAC address withdrawal is not enabled.
2. Enter bridge domain configuration mode. The following example shows how to enter configuration mode for bridge domain 1.
After it is enabled, use the no form of the command to disable MAC address withdrawal.
4. Return to privileged EXEC mode.
device(config-bridge-domain-1)# end
The following example shows how to enable VPLS MAC address withdrawal and then verify the configuration for bridge domain 1.
NOTE
VEoVPLS is not supported for high availability (HA)
configurations.
A VPLS instance on which a VE interface is configured can participate in routing protocols (for example, OSPF and ISIS) and exchange
routes with provider edge (PE) devices on remote customer sites.
In a VPLS configuration:
• Provider core devices are not aware of customer MAC addresses, VC labels, or VPLS instances
• Provider edge devices:
– Learn the MAC addresses of locally connected customer devices (attachment circuit [AC] toward customer edge devices
[CEs])
– Flood broadcast and unknown unicast frames to other PE devices in the virtual private network (VPN)
– Create associations between remote MAC addresses and remote PEs
– Encapsulate or decapsulate Layer 2 packets with VC and MPLS labels, for sending packets through PWs or toward AC
endpoints
By configuring a VE interface on a VPLS instance, VE routing packets can arrive on the VPLS endpoint or from an uplink port. VEoVPLS
also routes packets between the VPLS VE interface and all other IP interfaces outside the VPLS domain that reside on the PE device
including:
• Physical interfaces
Multiple VPLS instances may belong to the same VRF instance; for example, you may configure different VPLS instances to different
sites while hall sites are in the same routing area.
A unicast packet that is to be routed has the PE MAC address in the MAC destination address field and is subjected to Layer 3
processing.
Routing for VPLS packets is the same as routing for non-VPLS packets. The next-hop address obtained from the routing table may be a
VLAN interface, a VPLS endpoint, or a VPLS uplink port.
VE over VPLS:
• Operates with routing over GRE, VXLAN, MCT, L3 VPN, and VRRP
• Supports both IPv4 and IPv6 addressing
• Supports different platform types for VPLS PE nodes, including MLX Series platforms
Routing A virtual Ethernet (VE) interface supports most of the existing functionality of a legacy IP interface or a VE over VLAN
interface:
• When the VE interface is disabled, all packets routed to the interface are dropped.
• When the VE interface is not configured over a VPLS instance, all the routed traffic to the interface is forwarded, at
the Layer-2 level, by VPLS. This forwarding by VPLS, ensures that traffic to the interface does not break existing
routing by way of loopback connections that may already be configured.
Switching The configuration of VE over VPLS has no impact on VPLS Layer 2 switching functionality.
ARP As with ARP, VEoVPLS ARP maintains the relationship between the Layer 2 MAC address and the IP address:
• ARP entries associated with the VEoVPLS interface are resolved on one member of the VPLS instance; that is,
either the local endpoint or remote endpoint (remote VPLS peer).
• ARP broadcast goes out through each endpoint member of the VPLS instance.
• Static ARP is supported for VEoVPLS in the same way that it is supported for VE over VLAN
• Static MAC addresses for local endpoints are supported.
• Static MAC addresses for remote endpoints are not supported.
• ARP Guard is not supported.
ARP DAI Dynamic ARP inspection is not supported for VEoVPLS.
ECMP When a VE interface is configured over a label-switched path (LSP) with a load-balanced-enabled VPLS interface and the
next hop is the pseudowire (PW), ECMP is automatically handled; the Layer 3 FEC points to the PW FEC and interface traffic
is load-balanced across multiple LSPs.
RPF • Loose mode RPF is supported.
• Strict mode RPF is not supported when the packet is coming from the PW tunnel.
TTL handling When the next hop is the PW, TTL value handling for VEoVPLS is the same as MPLS TTL behavior; two TTL modes exist:
• pipe
• uniform (default value)
In uniform mode, the TTL value of the IP packet is decremented and copied to the MPLS header. MPLS TTL is decremented
at each hop. At the LER router, the TTL value is decremented and copied to the IP header before computing the IP
checksum.
In pipe mode, the TTL value of the IP packet is decremented and a constant TTL value of 255 is set in the MPLS header. The
TTL value of the MPLS packet is decremented at each hop. In the LER router, the MPLS header TTL value is discarded and
the inner IP packet TTL value is decremented again before computing the IP checksum.
Traceroute ICMP packets work isimilarly to other IP packets; that is, when the TTL value is 0 or 1, the packets are sent, in
order, to the CPU for sending the TTL Expiry ICMP packet to the source.
VRF VEoVPLS is supported on all VRFs. Routing is supported between both remote and local endpoints of a VPLS VE instance
and other non-VPLS IP interfaces. All IP interfaces must be in the same VRF. Inter-VRF routing is supported based on
leaking routes between VRFs.
When Multi LIF support is not required on AC endpoints in a VPLS instance, you can disable it by using the disallow-oar-ac command
in router interface configuration mode. Disabling OAR on VPLS instances when it is not required helps system scaling of hardware
resources.
Before completing this task, configure the VPLS instance on which routing is to be enabled. An example is provided at the end of this
task that shows all the configuration steps in order.
NOTE
You cannot enable routing on a VPLS instance when the vc-mode option on the PW attached to the instance is set to raw.
device(config)# bridge-domain 5
A bridge domain created for a VPLS application is also known as a VPLS instance.
3. Bind a virtual router interface to the bridge domain and enter router interface configuration mode.
device(config-bridge-domain-5)# router-interface ve 10
Routing is enabled on the VPLS instance by binding a virtual router interface to the bridge domain that was created for the
instance.
4. (Optional) Disallow multiple attachment circuit (AC) endpoints on the virtual router interface.
device(config-router-interface-10)# disallow-oar-ac
By default, multiple AC endpoints are allowed on a port. To help with system scaling of hardware resources when multiple
endpoints are not required, you can disallow them.
5. Return to privileged EXEC mode.
device(config-router-interface-10)# end
bridge-domain 5 p2mp
vc-id 8
peer 10.2.2.1
router-interface ve 10
!
logical-interface ethernet 0/38.99
logical-interface ethernet 0/14.99
pw-profile default
bpdu-drop-enable
local-switching
The following example first shows how to configure a VPLS instance (a bridge domain that is configured for a VPLS application), then
shows how to enable routing on the instance (by binding a virtual router interface to the bridge domain), and finally shows how to disallow
multiple AC endpoints on the virtual router interface.
Configure a VE interface
device# configure terminal
device(config)# interface ve 99
device(config-if-Ve-99)# ip proxy-arp
device(config-if-Ve-99)# ip address 10.1.1.1/24
device(config-if-Ve-99)# no shutdown
device(config-if-Ve-99)# exit
Configure a PW profile
device(config)# pw-profile test1
device(config-pw-test1)# vc-mode tag
device(config-pw-test1)# exit
There are multiple organizations involved in a Metro Ethernet Service: Customers, Service Providers and Operators.
Customers purchase Ethernet Service from Service Providers. Service Providers may utilize their own networks, or the networks of other
Operators to provide connectivity for the requested service. Customers themselves may be Service Providers, for example a Customer
may be an Internet Service Provider which sells Internet connectivity.
The Maintenance Domain (MD) levels are carried on all CFM frames to identify different domains. For example, in the following figure,
some bridges belong to multiple domains. Each domain associates to an MD level.
Each MEP has a direction, down or up. Down MEPs receive CFM PDUs from the LAN and sends CFM PDUs towards the LAN. Up
MEPs receive CFM PDUs from a bridge relay entity and sends CFM PDUs towards the bridge relay entity on a bridge. End stations
support down MEPs only, as they have no bridge relay entities.
CFM Hierarchy
MD levels create a hierarchy in which 802.1ag messages sent by customer, service provider, and operators are processed by MIPs and
MEPs at the respective level of the message. A common practice is for the service provider to set up a MIP at the customer MD level at
the edge of the network, as shown in the figure above, to allow the customer to check continuity of the Ethernet service to the edge of the
network. Similarly, operators set up MIPs at the service provider level at the edge of their respective networks, as shown in the figure
above, to allow service providers to check the continuity of the Ethernet service to the edge of the operators’ networks. Inside an operator
network, all MIPs are at the respective operator level, also shown in the figure above.
An MD is fully connected internally. A Domain Service Access Point associated with an MD has connectivity to every other Domain
Service Access Point in the MD, in the absence of faults.
The domain-name command in Connectivity Fault Management (CFM) protocol configuration mode creates a maintenance domain with
a specified level, name, and ID and enters the specific MD mode specified in the command argument.
The no form of the command removes the specified domain from the CFM protocol configuration mode.
This command changes the Maintenance Domain (MD) mode to the specific MA mode.
2. Set the time interval between two successive Continuity Check Messages (CCMs) that are sent by Maintenance End Points
(MEP) in the specified MA, use the ccm-interval command.
The id field specifies the short MAID format that is carried in the CCM frame. The default time interval is 10 seconds.
3. Add local ports as MEP to a specific maintenance association using the mep command in MA mode.
To configure a CFM packet to a Down MEP, you must sent it out on the port on which it was configured. To configure a
Connectivity Fault Management (CFM) packet to an Up MEP, you must sent it to the entire VLAN for multicast traffic and the
unicast traffic must be sent to a particular port as per the MAC table.
If a remote MEP is not specified, the remote MEP database is built based on the CCM. If one remote MEP never sends CCM,
the failure cannot be detected.
5. Configure the conditions to automatically create MIPs on ports using the mip-policy command, in Maintenance Association
mode.
A MIP can be created on a port and VLAN, only when explicit or default policy is defined for them. For a specific port and
VLAN, a MIP is created at the lowest level. Additionally, the level created should be the immediate higher level than the MEP
level defined for this port and VLAN.
show cfm
Use the show cfm command to display the Connectivity Fault Management (CFM) configuration.
NOTE
For the show cfm command to generate output, you must first enable CFM in protocol configuration
mode.
The following commands display the received port status tlv state at RMEP.
NOTE
For the show cfm command to generate output, you must first enable CFM in protocol configuration
mode.
The IEEE 802.1d Spanning Tree Protocol (STP) runs on bridges and switches that are 802.1d-compliant.
These variants are Rapid STP (RSTP), Multiple STP (MSTP), Per-VLAN Spanning Tree Plus (PVST+), and Rapid-PVST+ (R-PVST+)
When the spanning tree algorithm is run, the network switches transform the real network topology into a spanning tree topology. In an
STP topology any LAN in the network can be reached from any other LAN through a unique path. The network switches recalculate a
new spanning tree topology whenever there is a change to the network topology.
For each LAN, the switches that attach to the LAN select a designated switch that is the closest to the root switch. The designated switch
forwards all traffic to and from the LAN. The port on the designated switch that connects to the LAN is called the designated port. The
switches decide which of their ports is part of the spanning tree. A port is included in the spanning tree if it is a root port or a designated
port.
STP runs one spanning tree instance (unaware of VLANs) and relies on long duration forward-delay timers for port state transition
between disabled, blocking, listening, learning and forwarding states.
The Extreme device supports STP as described in the IEEE 802.1d-1998 specification.
The STP is disabled by default on the Extreme device. Thus, any new VLANs you configure on the Extreme device have STP disabled by
default.
Optional features
The following STP configuration features are optional:
• Root guard
• BPDU guard
• PortFast
STP states
Each Layer 2 interface participating in a spanning tree is in one of five states.
A network topology of bridges typically contains redundant connections to provide alternate paths in case of link failures. The redundant
connections create a potential for loops in the system. As there is no concept of time to live (TTL) in Ethernet frames, a situation may
arise where there is a permanent circulation of frames when the network contains loops. To prevent this, a spanning tree connecting all
the bridges is formed in real time.
BPDUs
To build a spanning tree for the bridge topology, the bridges must exchange control frames called Bridge Protocol data units (BPDUs).
To construct a spanning tree requires knowledge of the all the participants. The bridges must determine the root bridge and compute the
port roles (root, designated, or blocked) with only the information that they have. To ensure that each bridge has enough information, the
bridges use BPDUs to exchange information about bridge IDs and root path costs.
A bridge sends a BPDU frame using the unique MAC address of the port itself as a source address, and a destination address of the
STP multicast address 01:80:C2:00:00:00.
BPDUs are exchanged regularly (every 2 seconds by default) and enable switches to keep track of network changes and to start and stop
forwarding through ports as required.
When a device is first attached to a switch port, it does not immediately forward data. It instead goes through a number of states while it
processes inbound BPDUs and determines the topology of the network. When a host is attached, after a listening and learning delay of
about 30 seconds, the port always goes into the forwarding state. The time spent in the listening and learning states is determined by the
forward delay. However, if instead another switch is connected, the port may remain in blocking mode if it would cause a loop in the
network.
TCN BPDUs
TCN BPDUs are used to inform other switches of port changes.
TCNs are injected into the network by a non-root switch and propagated to the root. Upon receipt of the TCN, the root switch will set a
Topology Change flag in its normal BPDUs. This flag is propagated to all other switches to instruct them to rapidly age out their
forwarding table entries.
For a given link, in conjunction with the configuration rules, a TCN BPDU is sent out as follows:
• On an access port, only a standard IEEE TCN BPDU is sent out. This TCN BPDU corresponds to a topology change in the
access VLAN.
• On a trunk port, if VLAN 1 is allowed (either untagged or untagged), a standard IEEE TCN BPDU is sent for VLAN 1.
• On a trunk port, if the native VLAN is not 1, an untagged TCN BPDU is sent to Cisco or Extreme proprietary MAC address for
that VLAN.
• On a trunk port, a tagged TCN BPDU is sent to Cisco or Extreme proprietary MAC address for a tagged VLAN.
As part of the response to TCN BPDUs, the Topology Change and Topology Change Acknowledgment flags are set in all configuration
BPDUs corresponding to the VLAN for which the TCN was received.
When a topology change is detected on a trunk port, it is similar to detecting topology changes in each VLAN that is allowed on that
trunk port. TCN BPDUs are sent for each VLAN as per the rules.
• Only one form of a standing tree protocol, such as STP or RSTP, can be enabled at a time. You must disable one form of xSTP
before enabling another.
• When any form of STP is enabled globally, that form of STP is enabled by default on all switch ports.
• LAGs are treated as normal links for any form of STP.
• The STP is disabled by default on the SLX device. Thus, any new VLANs you configure on the SLX device have STP disabled
by default.
• PVST/RPVST BPDUs are flooded only if PVST/RPVST is not enabled. STP/RSTP (IEEE) BPDUs are never flooded if STP/
RSTP is not enabled.
The following table lists the switch defaults for the interface-specific configuration.
STP features
The following sections discuss root guard, BPDU guard, and PortFast.
Root guard
Root guard can be used to predetermine a root bridge location and prevent rogue or unwanted switches from becoming the root bridge.
At times it is necessary to protect the root bridge from malicious attack or even unintentional misconfigurations where a bridge device
that is not intended to be the root bridge becomes the root bridge, causing severe bottlenecks in the data path. These types of mistakes
or attacks can be avoided by configuring root guard on ports of the root bridge.
The root guard feature provides a way to enforce the root bridge placement in the network and allows STP and its variants to interoperate
with user network bridges while still maintaining the bridged network topology that the administrator requires. Errors are triggered if any
change from the root bridge placement is detected.
When root guard is enabled on a port, it keeps the port in designated FORWARDING state. If the port receives a superior BPDU, which
is a root guard violation, it sets the port into a DISCARDING state and triggers a Syslog message and an SNMP trap. No further traffic
will be forwarded on this port. This allows the bridge to prevent traffic from being forwarded on ports connected to rogue or wrongly
configured STP or RSTP bridges.
Root guard should be configured on all ports where the root bridge should not appear. In this way, the core bridged network can be cut
off from the user network by establishing a protective perimeter around it.
Once the port stops receiving superior BPDUs, root guard automatically sets the port back to a FORWARDING state after the timeout
period has expired.
BPDU guard
In an STP environment, switches, end stations, and other Layer 2 devices use BPDUs to exchange information that STP will use to
determine the best path for data flow.
In a valid configuration, edge port-configured interfaces do not receive BPDUs. If an edge port-configured interface receives a BPDU, an
invalid configuration exists, such as the connection of an unauthorized device. The BPDU Guard provides a secure response to invalid
configurations because the administrator must manually put the interface back in service.
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain borders and keeps the active
topology predictable by not allowing any network devices behind a BPDU guard-enabled port to participate in STP.
In some instances, it is unnecessary for a connected device, such as an end station, to initiate or participate in an STP topology change.
In this case, you can enable the STP BPDU guard feature on the Extreme device port to which the end station is connected. The STP
BPDU guard shuts down the port and puts it into an "error disabled" state. This disables the connected device's ability to initiate or
participate in an STP topology. A log message is then generated for a BPDU guard violation, and a message is displayed to warn the
network administrator of an invalid configuration.
The BPDU Guard provides a secure response to invalid configurations because the administrator must manually put the interface back in
service with the no shutdown command if error disable recovery is not enabled by enabling the errdisable-timeout command. The
interface can also be automatically configured to be enabled after a timeout. However, if the offending BPDUs are still being received, the
port is disabled again.
Once in an error disable state, the port remains in that state until it is re-enabled automatically or manually.
In STP, RSTP, MSTP, PVST+, or R-PVST+ mode, you can specify the time in seconds it takes for an interface to time out. The range is
from 10 through 1000000 seconds. The default is 300 seconds. By default, the timeout feature is disabled.
PortFast
PortFast allows an interface to transition quickly to the forwarding state.
STP parameters
The following section discusses bridge parameters.
Bridge parameters
These parameters are set in STP, RSTP, MSTP, PVST+, and R-PVST+.
Bridge priority
Use this parameter to specify the priority of a device and to determine the root bridge.
Each device has a unique bridge identifier called the bridge ID. The bridge ID is an 8 byte value that is composed of two fields: a 2 B
bridge priority field and the 6 B MAC address field. The value for the bridge priority ranges from 0 to 61440 in increments of 4096. The
default value for the bridge priority is 32768. You use the bridge-priority command to set the appropriate values to designate a device
as the root bridge or root device. A default bridge ID may appear as 32768.768e.f805.5800. If the bridge priorities are equal, the
device with the lowest MAC address is elected the root.
After you decide what device to designate as the root, you set the appropriate device bridge priorities. The device with the lowest bridge
priority becomes the root device. When a device has a bridge priority that is lower than that of all the other devices, it is automatically
selected as the root.
The root device should be centrally located and not in a "disruptive" location. Backbone devices typically serve as the root because they
usually do not connect to end stations. All other decisions in the network, such as which port to block and which port to put in forwarding
mode, are made from the perspective of the root device.
You may also specify the bridge priority for a specific VLAN. If the VLAN parameter is not provided, the priority value is applied globally
for all per-VLAN instances. However, for the VLANs that have been configured explicitly, the per-VLAN configuration takes precedence
over the global configuration.
Bridge Protocol data units (BPDUs) carry information between devices. All the devices in the Layer 2 network, participating in any variety
of STP, gather information on other devices in the network through an exchange of BPDUs. As the result of exchange of the BPDUs, the
device with the lowest bridge ID is elected as the root bridge
When setting the bridge forward delay, bridge maximum aging time, and the hello time parameters keep in mind that the following
relationship should be kept:
Additionally, you may specify the forward delay for a specific VLAN. If the VLAN parameter is not provided, the bridge forward delay
value is applied globally for all per-VLAN instances. However, for the VLANs that have been configured explicitly, the per-VLAN
configuration takes precedence over the global configuration.
Keeping with the inequality shown above, when configuring the maximum aging time, you must set the value greater than the hello time.
The range of values is 6 through 40 seconds while he default is 20 seconds.
You may specify the maximum aging for a specific VLAN. If the VLAN parameter is not provided, the priority value is applied globally for
all per-VLAN instances. However, for the VLANs that have been configured explicitly, the per-VLAN configuration takes precedence over
the global configuration.
Use the hello-time command to configure the bridge hello time. The range is from 1 through 10 seconds. The default is 2 seconds.
You may also specify the hello time for a specific VLAN. If the VLAN parameter is not provided, the priority value is applied globally for
all per-VLAN instances. However, for the VLANs that have been configured explicitly, the per-VLAN configuration takes precedence over
the global configuration.
These parameters are be set in STP, RSTP, MSTP, PVST+, and R-PVST+.
When the STP BPDU guard disables a port, the port remains in the disabled state unless the port is enabled manually. The parameter
specifies the time in seconds it takes for an interface to time out. The range is from 10 through 1000000 seconds. The default is 300
seconds.
Configuring STP
The following section discusses configuring STP.
You can enable STP or STP with one or more parameters enabled.
For detailed descriptions of the parameters and features, see the sections STP parameters and STP features.
A spanning tree can be disabled by entering the no protocol spanning-tree stp command.
3. Describe or name the STP.
The bridge with the lowest priority number (highest priority) is designated the root bridge . The range of values is 0 through
61440; values can be set only in increments of 4096. The default priority is 32678.
5. Specify the bridge forward delay.
device(config-stp)# forward-delay 20
The forward delay specifies how long an interface remains in the listening and learning states before it begins forwarding all
spanning tree instances. The valid range is from 4 through 30 seconds. The default is 15 seconds.
6. Configure the maximum aging time.
device(config-stp)# max-age 25
This parameter controls the maximum length of time that passes before an interface saves its BPDU configuration information.
You must set the maximum age to be greater than the hello time. The range is 6 through 40 seconds. The default is 20
seconds.
device(config-stp)# hello-time 8
The hello time determines how often the switch interface broadcasts hello BPDUs to other devices. The default is 2 seconds
while the range is from 1 through 10 seconds.
8. Enable the error disable timeout timer.
This parameter enables a timer that brings a port out of the disabled state. By default, the timeout feature is disabled.
9. Set the error disable timeout timer.
When enabled the default is 300 seconds and the range is from 10 through 1000000 seconds.
10. Configure the port channel path cost.
Specifying custom means the path cost changes according to the port channel's bandwidth.
11. Return to privileged EXEC mode.
device(config-stp)# end
Observe that the settings comply with the formula set out in the STP parameter configuration section, as:
(2 × (forward delay - 1)) ≥ maximum age ≥ (2 × (hello time + 1))
For detailed descriptions of the parameters and features, see the sections STP parameters and STP features.
device(conf-if-eth-0/20)# no shutdown
4. Configure the path cost for spanning tree calculations on the interface.
The lower the path cost means a greater chance that the interface becomes the root port. The range is 1 through 200000000.
The default path cost is assigned as per the port speed.
5. Enable BPDU guard on the interface.
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain borders and keeps the
active topology predictable by not allowing any network devices behind a BPDU guard-enabled port to participate in STP.
Root Guard protects the root bridge from malicious attacks and unintentional misconfigurations where a bridge device that is
not intended to be the root bridge becomes the root bridge.
7. Specify an interface link-type.
Specifying a point-to-point link enables rapid spanning tree transitions to the forwarding state. Specifying a shared link disables
spanning tree rapid transitions. The default setting is point-to-point.
8. Specify port priority to influence the selection of root or designated ports.
The range is from 0 through 240 in increments of 16. The default value is 128.
9. Verify the configuration.
NOTE
Observe that the settings comply with the formula set out in the STP parameters section, as:
(2 × (forward delay - 1)) ≥ maximum age ≥ (2 × (hello time + 1))
or in this case: 38 ≥ 25 ≥ 18
10. Save the settings by copying the running configuration to the startup configuration.
The priority values can be set only in increments of 4096. The range is 0 through 61440.
5. Specify the bridge forward delay.
device(config-stp)# forward-delay 20
device(config-stp)# max-age 25
device(config-stp)# hello-time 8
11. Specify port priorities to influence the selection of the root and designated ports.
Root guard lets the device top participate in the STP but only when the device does not attempt to become the root.
13. Return to privileged exec mode.
device(conf-if-eth-0/12)# end
Observe that the settings comply with the formula set out in the STP parameter configuration section, as:
(2 × (forward delay - 1)) ≥ maximum age ≥ (2 × (hello time + 1))
The interval range is from 0 to 1000000 seconds, the default is 300 seconds.
5. Return to privileged EXEC mode.
device(config-stp)# end
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
These commands force a spanning tree renegotiation with neighboring devices on either all interfaces or on a specified interface.
1. Restart the spanning tree migration process on all interfaces.
3. Restart the spanning tree migration process on a specific port channel interface.
device(config)# vlan 10
device(config-vlan-10)# spanning-tree shutdown
device(config-vlan-10)# end
3. Verify the configuration.
NOTE
Shutting down STP on a VLAN is used in this example.
The STP (802.1d) standard was designed at a time when recovering connectivity after an outage within a minute or so was considered
adequate performance. With the advent of Layer 3 switching in LAN environments, bridging competes with routed solutions where
protocols such as OSPF are able to provide an alternate path in less time.
The RSTP can be seen as evolution of STP standard. It provides rapid convergence of connectivity following the failure of bridge, a
bridge port or a LAN. It provides rapid convergence of edge ports, new root ports and port connected through point-to-point links. The
port, which qualifies for fast convergence, is derived from the duplex mode of a port. A port operating in full-duplex will be assumed to
be point-to-point, while a half-duplex port will be considered as a shared port by default. This automatic setting can be overridden by
explicit configuration.
RSTP is designed to be compatible and interoperate with the STP. However, the benefit of the RSTP fast convergence is lost when
interacting with legacy STP (802.1d) bridges since the RSTP downgrades itself to the STP when it detects a connection to a legacy
bridge.
The states for every Layer 2 interface running the RSTP are as follows:
State Action
Learning The interface prepares to participate in frame forwarding.
Forwarding The interface forwards frames.
Discarding The interface discards frames. Ports in the discarding state do not take part in the active topology and do not learn MAC addresses.
NOTE
The STP disabled, blocking, and listening states are merged into the RSTP discarding state.
The RSTP port roles for the interface are also different. The RSTP differentiates explicitly between the state of the port and the role it
plays in the topology. The RSTP uses the root port and designated port roles defined im the STP, but splits the blocked port role into
backup port and alternate port roles:
Backup port Provides a backup for the designated port and can only exist where two or more ports of the switch are connected to the same
LAN; the LAN where the bridge serves as a designated switch.
Alternate port Serves as an alternate port for the root port providing a redundant path towards the root bridge.
Only the root port and the designated ports are part of the active topology; the alternate and backup ports do not participate in it. When
the network is stable, the root and the designated ports are in the forwarding state, while the alternate and backup ports are in the
discarding state. When there is a topology change, the new RSTP port roles allow a faster transition of an alternate port into the
forwarding state.
For more information about spanning trees, see the introductory sections in the 802.1d Spanning Tree Protocol chapter.
RSTP parameters
The parameters you would normally set when you configure STP are applicable to RSTP. Before you configure RSTP see the STP
parameters sections for descriptions of the bridge parameters. the error disable timeout parameter and the port channel path cost
parameter.
There is one parameter that can be configured in RSTP that is not available in STP; the transmit hold count. This parameter configures
the BPDU burst size by specifying the maximum number of BPDUs transmitted per second for before pausing for 1 second. The range
is 1 through 10 while the default is 6. See the section Enabling RSTP and configuring RSTP parameters for the procedure to configure
this parameter.
The edge port and auto edge features can be enabled in RSTP as well. See the section Edge port and automatic edge detection and the
section Configuring RSTP on an interface for descriptions of these features and how they are configured.
From an interface, you can configure a device to automatically identify the edge port. The port can become an edge port if no BPDU is
received. By default, automatic edge detection is disabled.
NOTE
If BPDUs are received on a port fast enabled interface, the interface loses the edge port status unless it receives a shutdown or
no shutdown command.
Configuring RSTP
Enabling and configuring RSTP globally
Follow these steps to enable and configure RSTP.
See the section STP parameters for parameters applicable to all STP variants.
You can enable RSTP or RSTP with one or more parameters enabled. The parameters can be enabled or changed individually by
entering the commands in steps 1 and 2, running the parameter command, verifying the result, and then saving the configuration.
2. Enable RSTP.
The range is 0 through 61440 and the priority values can be set only in increments of 4096.
You can shut down RSTP by entering the shutdown command when in RSTP configuration mode.
4. Configure the bridge forward delay value.
device(conf-rstp)# forward-delay 15
device(conf-rstp)# max-age 20
device(conf-rstp)# hello-time 2
device(config-rstp)# transmit-holdcount 5
This command configures the maximum number of BPDUs transmitted per second.
10. Return to privileged exec mode.
device(conf-rstp)# end
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 28 ≥ 20 ≥ 6.
12. Save the configuration.
You can configure the parameters individually on an interface by doing the following:
For detailed descriptions of the parameters and features, see the sections STP parameters and STP features.
device(conf-if-eth-0/10)# no shutdown
To disable the spanning tree on the interface you use the spanning-tree shutdown command.
4. Specify the port priority on the interface.
The range is from 0 through 240 in increments of 16. The default value is 128.
5. Specify the path cost on the interface.
The lower the path cost means a greater chance that the interface becomes the root port. The range is 1 through 200000000.
The default path cost is assigned as per the port speed.
6. Enable edge port.
If BPDUs are received on a port fast enabled interface, the interface loses the edge port status unless it receives a shutdown or
no shutdown command.
7. Enable BPDU guard on the interface.
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain borders and keeps the
active topology predictable by not allowing any network devices behind a BPDU guard-enabled port to participate in STP.
8. Enable automatic edge detection on the interface.
You use this command to automatically identify the edge port. A port becomes an edge port if it receives no BPDUs. By
default, automatic edge detection is disabled.
9. Enable root guard on the interface.
Root guard protects the root bridge from malicious attacks and unintentional misconfigurations where a bridge device that is not
intended to be the root bridge becomes the root bridge.
10. Specify a link type on the interface.
NOTE
The link type is explicitly configured as point-to-point rather than
shared.
device(conf-if-eth-0/10)# end
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
The forward-delay, hello-time, and max-age parameters are set globally, not on the interface.
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 28 ≥ 20 ≥ 6.
13. Save the configuration.
2. Enable RSTP.
device(conf-if-eth-0/10)# exit
d) Repeat the above steps for all ports that connect to a workstation or PC.
7. Specify port priorities.
a) Enter interface subtype configuration mode.
device(conf-if-eth-0/11)# exit
device(conf-if-eth-0/1)# exit
Observe that the settings comply with the formula set out in the STP parameters section, as follows:
or in this case: 28 ≥ 20 ≥ 6.
10. Save the configuration.
These commands force a spanning tree renegotiation with neighboring devices on either all interfaces or on a specified interface.
3. Restart the spanning tree migration process on a specific port channel interface.
device(config)# vlan 10
device(config-vlan-10)# spanning-tree shutdown
device(config-vlan-10)# end
3. Verify the configuration.
Both the STP and the RSTP build a single logical topology. A typical network has multiple VLANs. A single logical topology does not
efficiently utilize the availability of redundant paths for multiple VLANs. A single logical topology does not efficiently utilize the availability
of redundant paths for multiple VLANs. If a port is set to the blocked state or the discarding state for one VLAN (under the STP or the
RSTP), it is the same for all other VLANs. PVST+ builds on the STP on each VLAN, and R-PVST+ builds on the RSTP on each VLAN.
PVST+ R-PVST+ provide interoperability with Cisco PVST and R-PVST and other vendor switches which implement Cisco PVST or R-
PVST. the PVST+ and R-PVST+ implementations are extensions to PVST and R-PVST, which can interoperate with an STP topology,
including MSTP (CIST), on Extreme and other vendor devices sending untagged IEEE BPDUs.
For more information about spanning trees, see the introductory sections in the Spanning Tree Protocol chapter.
There is one parameter that can be configured in R-PVST+ that is not available in STP or PVST+; the transmit hold count. This parameter
configures the BPDU burst size by specifying the maximum number of BPDUs transmitted per second for before pausing for 1 second.
The range is 1 through 10 while the default is 6. See the section Configuring R-PVST+ for the procedure to configure this parameter.
Across IEEE 802.1q trunks, Extreme switches run PVST+. The goal is to interoperate with standard IEEE STP (or RSTP or MSTP), while
transparently tunneling PVST+ instance BPDUs across the MST region to potentially connect to other Extreme switches across the MST
region.
On trunk ports that allow VLAN 1, PVST+ also sends PVST+ BPDUs to a Cisco-proprietary multicast MAC address (0100.0ccc.cccd) or
Extreme-proprietary multicast MAC address (0304.0800.0700) depending on the configuration. By default, the PVST+ BPDUs are
sent to Extreme-proprietary multicast MAC address on Extreme switches. These BPDUs are tunneled across an MST region. The PVST
+ BPDUs for VLAN 1 are only used for the purpose of consistency checks and that it is only the IEEE BPDUs that are used for building
the VLAN 1 spanning tree. So in order to connect to the CST, it is necessary to allow VLAN 1 on all trunk ports.
For all other VLANs, PVST+ BPDUs are sent on a per-VLAN basis on the trunk ports. These BPDUs are tunneled across an MST
region. Consequently, for all other VLANs, MST region appears as a logical hub. The spanning tree instances for each VLAN in one
PVST+ region map directly to the corresponding instances in another PVST+ region and the spanning trees are calculated using the per-
VLAN PVST+ BPDUs.
Similarly, when a PVST+ region connects to a MSTP region, from the point of view of MSTP region, the boundary bridge thinks it is
connected to a standard IEEE compliant bridge sending STP BPDUs. So it joins the CIST of the MSTP region to the CST of the PVST+
region (corresponding to VLAN 1). The PVST+ BPDUs are tunneled transparently through the MSTP region. So from the Extreme bridge
point of view, the MSTP region looks like a virtual hub for all VLANs except VLAN 1.
The PVST+ BPDUs are sent untagged for the native VLAN and tagged for all other VLANs on the trunk port.
On access ports, Extreme switches run classic version of IEEE STP/RSTP protocol, where the BPDUs are sent to the standard IEEE
multicast address "0180.C200.0000". So if we connect a standard IEEE switch to an access port on the Extreme switch, the spanning
tree instance (corresponding to the access VLAN on that port) of the Extreme switch is joined with the IEEE STP instance on the adjacent
switch.
For introductory information about STP BPDUs, see the section BPDUs on page 200.
BPDUs are sent to a Cisco-proprietary multicast MAC address 0100.0ccc.cccd or Extreme-proprietary multicast MAC address
0304.0800.0700.By default, the PVST+ BPDUs are sent to Extreme-proprietary multicast MAC address on Extreme switches. These
are called SSTP (Single Spanning Tree Protocol) BPDUs. The format of the SSTP BPDU is nearly identical to the 802.1d BPDU after
the SNAP header, except that a type-length-value (TLV) field is added at the end of the BPDU. The TLV has 2 bytes for type (0x0), 2
bytes for length, and 2 bytes for the VLAN ID. See Extreme BPDU PVST+ headers/fields on page 227 and BPDU R-PVST+ header
and field comparisons on page 227 for an outline of the BPDU header content.
Topology Change Notification (TCN) BPDUs are used to inform other switches of port changes. TCNs are injected into the network by a
non-root switch and propagated to the root. Upon receipt of the TCN, the root switch will set a Topology Change flag in its normal
BPDUs. This flag is propagated to all other switches to instruct them to rapidly age out their forwarding table entries.
In PVST+, three types of TCN BPDUs are sent out depending on the type of the link. See Extreme PVST+ TCN BPDU headers/fields on
page 229 and Cisco PVST TCN BPDU headers/fields on page 230.
• Standard IEEE TCN BPDU.
• Untagged TCN BPDU sent to the Cisco/Extreme proprietary MAC address.
• Tagged TCN BPDU sent to the Cisco/Extreme proprietary MAC address.
Header/field Standard IEEE STP/RSTP BPDU R-PVST+ untagged BPDU R-PVST+ tagged BPDU
Type 00 00 00 00
Length 00 02 00 02
Header/field Standard IEEE STP/RSTP BPDU R-PVST+ untagged BPDU R-PVST+ tagged BPDU
VLAN ID 2B 2B
Header/field Standard IEEE STP/RSTP BPDU R-PVST+ untagged BPDU R-PVST+ tagged BPDU
MAC SA 6B 6B 6B
MAC DA 0180C2.000000 (6B) 01000C.CCCCCD (6B) 010002.CCCCCD (6B)
Length 2B 2B -
Type - - 81 00 (2B)
802.1q tag - - 4B
SSAP 42 03 AA 03 AA 03
DSAP 42 AA AA
Cisco OUI - 00 00 0C 00 00 0C
PVST PID - 01 0B 01 0B
LLC 3B + +
SNAP - Yes Yes
IEEE BPDU INFO 35B 35B 35B
TLV - 6B 6B
Pad 00 (1B) 00 (1B)
Type 00 00 00 00
Length 00 02 00 02
VLAN ID 2B 2B
Sent BPDUs
On an 802.1q trunk, the PVST+ enabled switch sends the following BPDUs:
1. For all tagged VLANs on the port on which PVST+ is enabled, 802.1q tagged SSTP BPDUs are sent to the Cisco or Extreme
MAC address. The 802.1q tag contains the VLAN ID. (VLAN 1 could be tagged on the port. In that case a tagged BPDU for
VLAN 1 is sent). The IEEE compliant switches do not consider these BPDUs as a control packet. So they forward the frame as
they would forward to any unknown multicast address on the specific VLAN.
2. If PVST+ is enabled on the untagged (native) VLAN of the port, an untagged SSTP BPDU is sent to the Extreme or Cisco MAC
address on the native VLAN of the trunk. It is possible that the native VLAN on the Extreme or Cisco port is not VLAN 1. This
BPDU is also forwarded on the native VLAN of the IEEE 802.1q switch just like any other frame sent to an unknown multicast
address.
3. In addition to the above SSTP BPDUs, a standard IEEE BPDU (802.1d) is also sent, corresponding to the information of VLAN
1 on the Extreme or Cisco switch. This BPDU is not sent if VLAN 1 is explicitly disabled on the trunk port.
The following table lists the types of BPDUs sent in case of different port types. The numbers in the third column are the VLAN instance
for which these BPDUs are sent/processed.
Allowed VLANs - 1, 100, 200 Extreme or Cisco untagged BPDU (68B) 100
Allowed VLANs - 100, 200 Extreme or Cisco tagged BPDU (72B) 200
For introductory information about STP BPDUs, see the section TCN BPDUs on page 201.
Header/field Standard IEEE STP TCN BPDU PVST+ untagged TCN BPDU PVST+ tagged TCN BPDU
MAC SA 6B 6B 6B
MAC DA 0180C2.000000 (6B) 030408.000700 (6B) 030408.000700 ((6B)
Length 2B 2B -
Type - - 81 00 (2B)
802.1q tag - - 4B
SSAP 42 03 AA 03 AA 03
DSAP 42 AA AA
Cisco OUI - 02 04 08 02 04 08
PVST PID - 01 0B 01 0B
LLC 3B 8B 8B
SNAP 4B Entire BPDU with type = TCN 35B Entire BPDU with type = TCN 35B
Header/field Standard IEEE STP TCN BPDU PVST untagged TCN BPDU PVST tagged TCN BPDU
MAC SA 6B 6B 6B
MAC DA 0180C2.000000 (6B) 01000C.CCCCCD (6B) 01000C.CCCCCD (6B)
Length 2B 2B -
Type - - 81 00 (2B)
802.1q tag - - 4B
SSAP 42 03 AA 03 AA 03
DSAP 42 AA AA
Cisco OUI - 00 00 0C 00 00 0C
PVST PID - 01 0B 01 0B
LLC 3B 8B 8B
SNAP - Yes Yes
IEEE TCN BPDU INFO 4B Entire BPDU with type = TCN 35B Entire BPDU with type = TCN 35B
PortFast
PortFast allows an interface to transition quickly to the forwarding state.
From an interface, you can configure a device to automatically identify the edge port. The port can become an edge port if no BPDU is
received. By default, automatic edge detection is disabled.
Follow these guidelines to configure a port as an edge port:
• When edge port is enabled, the port still participates in a spanning tree.
• A port can become an edge port if no BPDU is received.
• When an edge port receives a BPDU, it becomes a normal spanning tree port and is no longer an edge port.
• Because ports that are directly connected to end stations cannot create bridging loops in the network, edge ports transition
directly to the forwarding state and skip the listening and learning states.
NOTE
If BPDUs are received on a port fast enabled interface, the interface loses the edge port status unless it receives a shutdown or
no shutdown command.
You can enable PVST+ with one or more parameters configured. The parameters can be configured or changed individually by entering
the commands in steps 1 and 2, running the parameter command, verifying the result, and then saving the configuration.
For more information about spanning trees and spanning tree parameters, see the introductory sections in the Spanning Tree Protocol
chapter.
2. Enable PVST+.
Valid values range from 0 through 61440 in increments of 4096. Assigning a lower priority value indicates that the bridge
might become root.
You can shut down PVST+ by entering the shutdown command when in PVST configuration mode.
4. Configure the forward delay parameter.
device(config-pvst)# forward-delay 11
device(config-pvst)# hello-time 2
device(config-pvst)# max-age 7
device(config-pvst)# end
VLAN 100
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 20 ≥7 ≥ 6.
9. Save the configuration.
For more information about configuring PVST+ parameters, see STP parameters on page 204. PVST+, R-PVST+, and other types of
spanning trees share many tasks with STP.
For detailed descriptions of the parameters and features, see the sections STP parameters and STP features.
2. Enable PVST+.
6. Specify the port priority to influence the selection of root or designated ports.
The range is from 0 through 240 in increments of 16. The default value is 128.
7. Configure the path cost for spanning tree calculations on the interface.
The lower the path cost means a greater chance that the interface becomes the root port. The range is 1 through 200000000.
The default path cost is assigned as per the port speed.
8. Configure the path cost for spanning tree calculations a specific VLAN.
The lower the path cost means a greater chance that the interface becomes the root port. The range is 1 through 200000000.
The default path cost is assigned as per the port speed.
9. Enable root guard on the interface.
Root guard protects the root bridge from malicious attacks and unintentional misconfigurations where a bridge device that is not
intended to be the root bridge becomes the root bridge.
10. Enable BPDU guard on the interface.
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain borders and keeps the
active topology predictable by not allowing any network devices behind a BPDU guard-enabled port to participate in STP.
BPDU filtering allows you to avoid transmitting BPDUs on ports that are connected to an end system.
12. Return to privileged EXEC mode.
device(conf-if-eth-0/3)# exit
Observe that the settings comply with the formula set out in the STP parameters section, as:
For detailed descriptions of the parameters and features, see the sections STP parameters and STP features.
2. Enable PVST+.
Valid values range from 0 through 61440 in multiples of 4096. Assigning a lower priority value indicates that the bridge might
become root.
4. Configure the forward delay parameter.
device(config-pvst)# forward-delay 15
device(config-pvst)# hello-time 2
device(config-pvst)# max-age 20
7. Add VLANs.
a) Configure VLAN 100 with a priority of 0.
device(conf-if-eth-0/3)# switchport
device(conf-if-eth-0/3)# exit
device(conf-if-eth-0/4)# switchport
device(conf-if-eth-0/4)# exit
10. To interoperate with switches other than VDX switches in PVST+ mode, you must configure the interface that is connected to
that switch.
a) Enter interface configuration mode for the port that interoperates with a VDX device.
device(conf-if-eth-0/12)# end
VLAN 1
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
VLAN 100
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
Link-type: point-to-point
Received BPDUs: 0; Sent BPDUs: 0
VLAN 201
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
VLAN 301
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Number of topology change(s): 0
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 28 ≥ 20 ≥ 6.
12. Save the configuration.
2. Enable R-PVST+.
Valid priority values range from 0 through 61440 in multiples of 4096. Assigning a lower priority value indicates that the bridge
might become root.
4. Configure the forward delay parameter.
device(config-rpvst)# forward-delay 20
device(config-rpvst)# hello-time 22
device(config-rpvst)# max-age 8
device(config-rpvst)# transmit-holdcount 9
This command configures the maximum number of BPDUs transmitted per second before pausing for 1 second. The range is
1 through 10. The default is 6.
8. Return to privileged exec mode.
device(config-rpvst)# end
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 20 ≥ 7 ≥ 6.
10. Save the configuration.
For more information about configuring parameters, see the section STP parameter configuration.
For detailed descriptions of the parameters and features, see the sections STP parameters and STP features.
2. Enable R-PVST+.
6. Specify the port priority to influence the selection of root or designated ports.
The range of priority values is from 0 through 240 in multiples of 16. The default value is 128.
7. Configure the path cost for spanning tree calculations on the interface.
The lower the path cost means a greater chance that the interface becomes the root port. The range is 1 through 200000000.
The default path cost is assigned as per the port speed.
8. Configure the path cost for spanning tree calculations a specific VLAN.
The lower the path cost means a greater chance that the interface becomes the root port. The range is 1 through 200000000.
The default path cost is assigned as per the port speed.
9. Enable automatic edge detection on the interface.
You use this command to automatically identify the edge port. A port becomes an edge port if it receives no BPDUs. By
default, automatic edge detection is disabled.
10. Enable root guard on the interface.
Root guard protects the root bridge from malicious attacks and unintentional misconfigurations where a bridge device that is not
intended to be the root bridge becomes the root bridge.
11. Enable the spanning tree on the edge port.
If BPDUs are received on a port fast enabled interface, the interface loses the edge port status unless it receives a shutdown or
no shutdown command.
12. Enable BPDU guard on the interface.
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain borders and keeps the
active topology predictable by not allowing any network devices behind a BPDU guard-enabled port to participate in STP.
device(conf-if-eth-0/3)# exit
Observe that the settings comply with the formula set out in the STP parameters section, as:
For detailed descriptions of the parameters and features, see the sections STP parameters and STP features.
2. Enable R-PVST+.
You can shut down R-PVST+ by entering the shutdown command when in rpvst configuration mode.
3. Configure the bridge priority for the common instance.
Valid values range from 0 through 61440 in increments of 4096. Assigning a lower priority value indicates that the bridge
might become root.
4. Configure the forward delay parameter.
device(config-rpvst)# forward-delay 20
device(config-rpvst)# hello-time 8
device(config-rpvst)# max-age 22
device(config-rpvst)# transmit-holdcount 5
This command configures the maximum number of BPDUs transmitted per second. The range of values is 1 through 10.
8. Configure VLANs.
a) Configure VLAN 100 with a priority of 0.
device(conf-if-eth-0/3)# switchport
device(conf-if-eth-0/3)# exit
device(conf-if-eth-0/4)# switchport
device(conf-if-eth-0/4)# exit
11. To interoperate with switches other than VDX switches in R-PVST+ mode, you must configure the interface that is connected to
that switch.
a) Enter interface configuration mode for the port that interoperates with a VDX switch.
device(conf-if-eth-0/12)# end
VLAN 1
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 20; Hello Time: 8; Max Age: 22; Max-hops: 20
Tx-HoldCount 5
Number of topology change(s): 0
VLAN 100
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 20; Hello Time: 8; Max Age: 22; Max-hops: 20
Tx-HoldCount 5
Number of topology change(s): 0
VLAN 201
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 20; Hello Time: 8; Max Age: 22; Max-hops: 20
Tx-HoldCount 5
Number of topology change(s): 0
VLAN 301
Root Bridge Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 20; Hello Time: 8; Max Age: 22; Max-hops: 20
Tx-HoldCount 5
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 28 ≥ 20 ≥ 6.
13. Save the configuration.
These commands force a spanning tree renegotiation with neighboring devices on either all interfaces or on a specified interface.
3. Restart the spanning tree migration process on a specific port channel interface.
device(config)# vlan 10
device(config-vlan-10)# spanning-tree shutdown
device(config-vlan-10)# end
3. Verify the configuration.
NOTE
Shutting down PVST+ on a VLAN is used in this example.
MSTP overview
IEEE 802.1s Multiple STP (MSTP) helps create multiple loop-free active topologies on a single physical topology.
MSTP uses RSTP to group VLANs into separate spanning-tree instance. Each instance has its own spanning-tree topology independent
of other spanning tree instances, which allows multiple forwarding paths, permits load balancing, and facilitates the movement of data
traffic. A failure in one instance does not affect other instances. By enabling the MSTP, you are able to more effectively utilize the physical
resources present in the network and achieve better load balancing of VLAN traffic.
The MSTP evolved as a compromise between the two extremes of the RSTP and R-PVST+, it was standardized as IEEE 802.1s and
later incorporated into the IEEE 802.1Q-2003 standard. The MSTP configures a meshed topology into a loop-free, tree-like topology.
When the link on a bridge port goes up, an MSTP calculation occurs on that port. The result of the calculation is the transition of the port
into either a forwarding or blocking state. The result depends on the position of the port in the network and the MSTP parameters. All the
data frames are forwarded over the spanning tree topology calculated by the protocol.
NOTE
Multiple switches must be configured consistently with the same MSTP configuration to participate in multiple spanning tree
instances. A group of interconnected switches that have the same MSTP configuration is called an MSTP region.
MSTP is backward compatible with the STP and the RSTP.
The Extreme implementation supports up to 32 spanning tree instances in an MSTP enabled bridge that can support up to 32 different
Layer 2 topologies. The spanning tree algorithm used by the MSTP is the RSTP, which provides quick convergence.
By default all configured VLANs including the default VLAN are assigned to and derive port states from CIST until explicitly assigned to
MSTIs.
MST regions
MST regions are clusters of bridges that run multiple instances of the MSTP protocol. Multiple bridges detect that they are in the same
region by exchanging their configuration (instance to VLAN mapping), name, and revision-level. Therefore, if you need to have two
bridges in the same region, the two bridges must have identical configurations, names, and revision-levels. Also, one or more VLANs can
be mapped to one MST instance (IST or MSTI) but a VLAN cannot be mapped to multiple MSTP instances
MSTP regions
MSTP introduces a hierarchical way of managing device domains using regions. Devices that share common MSTP configuration
attributes belong to a region. The MSTP configuration determines the MSTP region where each device resides. The common MSTP
configuration attributes are as follows:
• Alphanumeric configuration name (32 bytes)
• Configuration revision number (2 bytes)
• 4096-element table that maps each of the VLANs to an MSTP instance
Region boundaries are determined by the above attributes. An MSTI is an RSTP instance that operates inside an MSTP region and
determines the active topology for the set of VLANs mapping to that instance. Every region has a CIST that forms a single spanning tree
instance which includes all the devices in the region. The difference between the CIST instance and the MSTP instance is that the CIST
instance operates across the MSTP region and forms a loop-free topology across regions, while the MSTP instance operates only within
a region. The CIST instance can operate using the RSTP only if all the devices across the regions support the RSTP. However, if any of
the devices operate using the STP, the CIST instance reverts to the STP.
Each region is viewed logically as a single STP or a single RSTP bridge to other regions.
NOTE
Extreme supports 32 MSTP instances and one MSTP region.
For more information about spanning trees, see the introductory sections in the Spanning Tree Protocol chapter.
• For two or more switches to be in the same the MSTP region, they must have the same VLAN-to-instance map, the same
configuration revision number, and the same region name.
• MSTP is backward compatible with the STP and the RSTP.
• Only one MSTP region can be configured on a bridge.
• A maximum of 4090 VLANs can be configured across the 32 MSTP instances.
• MSTP and topology groups cannot be configured together.
• MSTP configured over MCT VLANs is not supported.
Each of the steps used to configure and operate MSTP are described in the following:
NOTE
The MSTP Region and Revision global parameters are enabled for interface level parameters as described below.
• Set the MSTP region name — Each switch that is running MSTP is configured with a name. It applies to the switch which can
have many different VLANs that can belong to many different MSTP regions. The default MSTP name is "NULL".
• Set the MSTP revision number — Each switch that is running MSTP is configured with a revision number. It applies to the
switch, which can have many different VLANs that can belong to many different MSTP regions.
• Enabling and disabling Cisco interoperability — While in MSTP mode, use the cisco-interoperability command to enable or
disable the ability to interoperate with certain legacy Cisco switches. If Cisco interoperability is required on any switch in the
network, then all switches in the network must be compatible, and therefore enabled by means of this command. By default the
Cisco interoperability is disabled.
• The parameters you would normally set when you configure STP are applicable to MSTP. Before you configure MSTP
parameters see the sections explaining bridge parameters, the error disable timeout parameter and the port-channel path cost
parameter in the STP section of this guide.
From an interface, you can configure a device to automatically identify the edge port. The port can become an edge port if no BPDU is
received. By default, automatic edge detection is disabled.
NOTE
If BPDUs are received on a port fast enabled interface, the interface loses the edge port status unless it receives a shutdown or
no shutdown command.
BPDU guard
In an STP environment, switches, end stations, and other Layer 2 devices use BPDUs to exchange information that STP will use to
determine the best path for data flow.
In a valid configuration, edge port-configured interfaces do not receive BPDUs. If an edge port-configured interface receives a BPDU, an
invalid configuration exists, such as the connection of an unauthorized device. The BPDU Guard provides a secure response to invalid
configurations because the administrator must manually put the interface back in service.
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain borders and keeps the active
topology predictable by not allowing any network devices behind a BPDU guard-enabled port to participate in STP.
In some instances, it is unnecessary for a connected device, such as an end station, to initiate or participate in an STP topology change.
In this case, you can enable the STP BPDU guard feature on the Extreme device port to which the end station is connected. The STP
BPDU guard shuts down the port and puts it into an "error disabled" state. This disables the connected device's ability to initiate or
participate in an STP topology. A log message is then generated for a BPDU guard violation, and a message is displayed to warn the
network administrator of an invalid configuration.
The BPDU Guard provides a secure response to invalid configurations because the administrator must manually put the interface back in
service with the no shutdown command if error disable recovery is not enabled by enabling the errdisable-timeout command. The
interface can also be automatically configured to be enabled after a timeout. However, if the offending BPDUs are still being received, the
port is disabled again.
Restricted role
Configuring restricted role on a port causes the port not to be selected as root port for the CIST or any MSTI, even if it has the best
spanning tree priority vector.
Restricted role ports are selected as an alternate port after the root port has been selected. It is configured by a network administrator to
prevent bridges external to a core region of the network influencing the spanning tree active topology, possibly because those bridges are
not under the full control of the administrator. It will protect the root bridge from malicious attack or even unintentional misconfigurations
where a bridge device which is not intended to be root bridge, becomes root bridge causing severe bottlenecks in data path. These types
of mistakes or attacks can be avoided by configuring 'restricted-role' feature on ports of the root bridge . This feature is similar to the
"root-guard" feature which is proprietary implementation of Cisco for STP and RSTP but had been adapted in the 802.1Q standard as
"restricted-role". The "restricted-role" feature if configured on an incorrect port can cause lack of spanning tree connectivity.
Restricted TCN
TCN BPDUs are used to inform other switches of port changes.
Configuring "restricted TCN" on a port causes the port not to propagate received topology change notifications and topology changes
originated from a bridge external to the core network to other ports. It is configured by a network administrator to prevent bridges external
to a core region of the network from causing MAC address flushing in that region, possibly because those bridges are not under the full
control of the administrator for the attached LANs. If configured on an incorrect port it can cause temporary loss of connectivity after
changes in a spanning trees active topology as a result of persistent incorrectly learned station location information.
Configuring MSTP
2. Enable MSTP.
This command creates a context for MSTP. MSTP is automatically enabled. All MSTP specific CLI commands can be issued
only from this context. Entering no protocol spanning-tree mstp deletes the context and all the configurations defined within
the context.
3. Specify the region name.
device(config-mstp)# revision 1
6. Specify the maximum hops for a BPDU to prevent the messages from looping indefinitely on the interface.
device(config-mstp)# max-hops 25
Setting this parameter prevents messages from looping indefinitely on the interface. The range is 1 through 40 hops while the
default is 20 .
7. Map VLANs to MSTP instances and set the instance priority.
a) Map VLANs 7 and 8 to instance 1.
This command can be used only after the VLAN is created. VLAN instance mapping is removed from the configuration if the
underlying VLANs are deleted.
8. Configure a bridge priority for the CIST bridge.
device(config-mstp)# forward-delay 15
This command allows you to specify how long an interface remains in the listening and learning states before it begins
forwarding. This command affects all MSTP instances. The range of values is from 4 to 30 seconds with a default of 15
seconds.
11. Configure hello time.
device(config-mstp)# hello-time 2
The hello time determines how often the switch interface broadcasts hello BPDUs to other devices. The range is from 1 through
10 seconds with a default of 2 seconds.
12. Configure the maximum age.
device(config-mstp)# max-age 20
You must set the max-age so that it is greater than the hello-time. The range is 6 through 40 seconds with a default of 20
seconds.
13. Specify the port-channel path cost.
This command allows you to control the path cost of a port channel according to bandwidth.
14. Specify the transmit hold count.
device(config-mstp)# transmit-holdcount 5
The transmit hold count is used to limit the maximum number of MSTP BPDUs that the bridge can transmit on a port before
pausing for 1 second. The range is from 1 to 10 seconds with a default of 6 seconds.
15. Configure Cisco interoperability.
This command enables the ability to interoperate with certain legacy Cisco switches. The default is Cisco interoperability is
disabled.
16. Return to privileged exec mode.
device(config-mstp)# end
Name : kerry
Revision Level : 1
Digest : 0x9357EBB7A8D74DD5FEF4F2BAB50531AA
Instance VLAN
-------- ----
0: 1
1: 7,8
2: 21-23
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 28 ≥ 20 ≥ 6.
18. Save the configuration.
1. Entering the commands in Steps 1 through Step 3 for the target interface
For detailed descriptions of the parameters and features, see the sections STP parameters and STP features.
2. Enable MSTP.
device(conf-if-eth-0/5)# no shutdown
This prevents the port from propagating received TCNs and topology changes originating from a bridge, external to the core
network, to other ports.
7. Enable auto detection of an MSTP edge port.
Enabling this feature allows the system to automatically identify the edge port. The port can become an edge port if no BPDU
is received. By default, automatic edge detection is disabled.
8.
device(conf-if-eth-0/5)# spanning-tree edgeport
Enabling edge port allows the port to quickly transition to the forwarding state. By default, automatic edge detection is disabled.
9. Enable BPDU guard on the port
BPDU guard removes a node that reflects BPDUs back in the network. It enforces the STP domain borders and keeps the
active topology predictable by not allowing any network devices behind a BPDU guard-enabled port to participate in STP.
The path cost range is from 1 to 200000000. Leaving the default adjusts path cost relative to changes in the bandwidth. A
lower path cost indicates greater likelihood of becoming root port.
11. Configure the link type.
The range is from 0 to 240 in increments of 16 with a default of 32. A lower priority indicates greater likelihood of becoming
root port.
13. Return to privileged exec mode.
device(conf-if-eth-0/5)# end
device(config-mstp)# end
CIST Root Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20;
Tx-HoldCount: 6
Number of topology change(s): 0
Name : NULL
Revision Level : 0
Digest : 0xD5FF4C3F6C18E2F27AF3A8300297ABAA
Instance VLAN
-------- ----
0: 1
5: 100
Observe that the settings comply with the formula set out in the STP parameters section, as:
or in this case: 28 ≥ 20 ≥ 6.
6. Save the configuration.
2. Enable MSTP.
device(config-mstp)# revision 1
The priority ranges from 0 through 61440 and the value must be in multiples of 4096.
7. Specify the maximum hops for a BPDU.
device(conf-Mstp)# max-hops 25
device(conf-Mstp)# end
CIST Root Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 20
Configured Forward Delay: 15; Hello Time: 2; Max Age: 20; Max-hops: 25;
Tx-HoldCount: 6
Number of topology change(s): 0
Name : connemara
Revision Level : 1
Digest : 0xD5FF4C3F6C18E2F27AF3A8300297ABAA
Instance VLAN
-------- ----
0: 1,7,8,9
1: 2,3
2: 4-6
NOTE
Observe that the settings comply with the formula set out in the STP parameters section, as:
(2 × (forward delay - 1)) ≥ maximum age ≥ (2 × (hello time + 1))
or in this case: 28 ≥ 20 ≥ 6.
These commands force a spanning tree renegotiation with neighboring devices on either all interfaces or on a specified interface.
3. Restart the spanning tree migration process on a specific port channel interface.
device(config)# vlan 10
device(config-vlan-10)# spanning-tree shutdown
device(config-vlan-10)# end
3. Verify the configuration.
NOTE
Shutting down MSTP on a VLAN is used in this example.
Topology Groups
A topology group is a named set of VLANs and bridge-domains that share a Layer 2 control protocol. Topology groups simplify
configuration and enhance scalability of Layer 2 protocols by allowing you to run a single instance of a Layer 2 protocol on multiple
VLANs and bridge-domains. One instance of the Layer 2 protocol controls all the VLANs and bridge-domains.
You can use topology groups with the following Layer 2 protocols:
• Per VLAN Spanning Tree (PVST+)
• Rapid per VLAN Spanning tree (R-PVST+)
When a Layer 2 topology change occurs, resulting in a change of port state in the master VLAN, the same port state is applied to all the
member VLANs and bridge-domains belonging to the topology group on that port. For example, if you configure a topology group
whose master VLAN contains ports 1/1 and 1/2, a Layer 2 state change on port 1/1 applies to port 1/1 in all the member VLANs and
bridge-domains that contain that port. However, the state change does not affect port 1/1 in VLANs that are not members of the
topology group.
NOTE
Because free ports are not controlled by the master port’s Layer 2 protocol, they are always in the forwarding state.
Configuration considerations
The configuration considerations are as follows:
• You can configure up to 128 topology groups. A VLAN or bridge-domain cannot controlled by more than one topology group.
You can configure up to 4K VLANs or bridge-domain as members of topology group.
• The topology group must contain a master VLAN. The group can also contain individual member VLANs and or member
bridge-domains. You must configure the member VLANs or member bridge-domains before adding them to the topology
group. Bridge-domains cannot be configured as a master VLAN.
• You cannot delete a master VLAN from the topology group when the member VLANs or bridge-domains are in the topology
group.
• The control port membership must match the master VLAN when adding a member VLAN or member bridge-domain.
• If a VLAN enabled with the PVST+ or R-PVST+ protocol is added as a member VLAN of a topology group, the protocol is
disabled. The member VLAN is added to the topology group. If the VLAN is removed from the topology group, the protocol is
disabled, and you must enable the protocol if required.
• Enabling STP on an interface is only allowed if both master VLAN and member VLAN or bridge-domains are configured on
the interface across all topology groups.
• You cannot remove the master VLAN or member VLAN or bridge-domains from an STP enabled interface.
• Topology group configuration is allowed only with PVST+ and R-PVST+ spanning tree configurations.
2. Enter the topology-group command to create a topology group at the global configuration level.
device(config)# topology-group 1
device(conf-topo-group-1)#
NOTE
The no topology-group command deletes an existing topology group.
Before configuring a master VLAN, you should have configured a topology group.
2. Enter the topology-group command to create a topology group at the global configuration level.
device(config)# topology-group 1
device(conf-topo-group-1)#
3. Enter the master-vlan command to configure a master VLAN in the topology group.
NOTE
The no master-vlan command removes an existing master VLAN from the topology group.
Before adding a member VLAN, you should have created a topology group and configured the master VLAN for that group. The VLAN
should not be part of any other topology group. All control ports of master VLAN must also be configured for the member VLAN.
1. Enter the configure terminal command to access global configuration mode.
2. Enter the topology-group command to create a topology group at the global configuration level.
device(config)# topology-group 1
device(conf-topo-group-1)#
3. Enter the master-vlan command to configure a master VLAN in the topology group.
4. Enter the member-vlan command to add member VLANs to the topology group.
NOTE
The member-vlan remove command removes an existing member VLAN from the topology group.
2. Enter the topology-group command to create a topology group at the global configuration level.
device(config)# topology-group 1
device(conf-topo-group-1)#
3. Enter the master-vlan command to configure a master VLAN in the topology group.
4. Enter the member-bridge-domain command to add member bridge-domains to the topology group.
NOTE
The member-bridge-domain remove command removes an existing member bridge-domain from the topology
group.
To avoid temporary loops when the master VLAN is replaced by another VLAN, the following recommendation is made:
• Control ports for both the old and the new master VLAN must match.
• The new master VLAN and the old master VLAN must have same ports in the blocking state to avoid the possibility of
temporary loops.
If the recommendation is not followed, and a new master VLAN is configured with a different convergence, the configuration is still
accepted.
NOTE
The master VLAN replacement is accepted if both the old and the new master VLANs are spanning-tree disabled.
Before displaying the topology group information, you should have configured a topology group and defined the master VLAN.
LD protocol overview
The loop detection (LD) protocol is a Brocade proprietary protocol used to detect and break Layer 2 loops caused by misconfigurations,
thereby preventing packet storms.
Layer 2 networks rely on learning and flooding to build their forwarding databases. Because of the flooding nature of these networks, any
loops can be disastrous as they cause broadcast storms.
ATTENTION
The LD feature should be used only as a tool to detect loops in the network. It should not be used to replace other Layer 2
protocols such as STP.
LD protocol data units (PDUs) are initiated and received on the native device. Loop detection and action on the port state is also done on
the same native device. Intermediate devices in the network must be capable of flooding unknown Layer 2 unicast PDUs on the VLAN
through which they are received.
Strict mode
In what is referred to as strict mode, LD is configured on an interface. If the LD PDU is sent on an interface and received on the same
interface, that port is shut down by LD. Strict mode overcomes specific hardware issues that cause packets to be echoed back to the
input port. The following figure illustrates strict mode.
If the user provides a VLAN, then the PDUs are tagged accordingly. Otherwise PDUs are sent untagged. With a LAG, PDUs are sent out
on the port-channel interface. If Device A has a loop (for example, a LAG is not configured), then the PDU is flooded back to SLX-OS,
which detects the loop. In case of a loop, the port-channel interface is shut down. The following figure illustrates LD on a LAG.
FIGURE 33 LD on a LAG
Loose mode
In what is referred to as loose mode, LD is configured on a VLAN. If a VLAN in the device receives an LD PDU that originated from the
same device on that VLAN, this is considered to be a loop and the receiving port is shut down. In loose mode, LD works at the VLAN
level and takes action at the logical interface (LIF) level. The following figure illustrates loose mode, with LD on a VLAN.
SLX-OS generates the LD PDUs on the VLAN. if Device A has a loop, PDUs are flooded back to SLX-OS, which detects the loop. SLX-
OS then shuts down the receiving LIF of the port on the VLAN.
LD supports 256 instances of loose mode, which means that it can be enabled on 256 VLANs.
LD PDU format
The following figure illustrates the format of the LD PDU in bytes.
Parameter Definition
LD PDU transmission
Each LD-enabled interface or VLAN on a device continually transmits Layer 2 LD PDUs at a 1-second default hello-timer interval, with
the destination MAC address as the multicast address. The multicast MAC address is derived from the system MAC address of the
device with the multicast bit (8) and the local bit (7) set.
For example, if the MAC address is 00E0.5200.1800, then the multicast MAC address is 03E0.5200.1800. In the case of a LAG
port-channel, LD PDUs are sent out one of the ports of the LAG as chosen by hardware.
LD PDU reception
When the LD PDU is received and is generated by the same device, the PDU is processed. If the PDU is generated by another device,
then the PDU is flooded.
If a port is already blocked by any other Layer 2 protocol such as STP, then the LD PDUs are neither sent for LD processing nor flooded
on that port.
LD parameters
This section discusses the various global protocol-level, interface level, and VLAN-level parameters that are used to control and process
LD PDUs.
Protocol level
hello-interval
hello-interval is the rate at which the LD PDUs are transmitted by an LD-enabled interface or VLAN, which is 1000 milliseconds by
default. Lowering the hello-interval below the default increases the PDU transmission rate, providing faster loop detection and also
removing transient loops that last less than one second. On the other hand, increasing the interval above the default (for example, to 100
milliseconds) can increase the steady-state CPU load.
shutdown-time
shutdown-time is the duration after which an interface that is shut down by LD is automatically reenabled. The range is from 0 through
1440 minutes. The default is 0 minutes, which means that the interface is not automatically reenabled.
ATTENTION
Changing this value can cause repeated interface flapping when a loop is persistent in the
network.
raslog-duration
raslog-duration is the interval between RASLog messages when a port is shut down by LD to prevent flooding of these messages. The
range is from 10 through 1440 minutes. The default is 10.
Interface level
In strict mode, the parameters in this section are configurable at the interface level, and the configuration is specific to an interface. The
following figure illustrates strict mode configuration.
shutdown-disable
By default, the device shuts down the interface if a loop is detected. Configuring shutdown-disable means that the interface shutdown is
disabled and LD never brings down such interface. If a loop is already detected by LD and the port is in shutdown state, then configuring
shutdown-disable is not effective until the port is back up.
vlan-association
Although user can enable LD on an interface without specifying a VLAN, the vlan-association keyword is used to specify a VLAN
associated with the interface.
VLAN level
In loose mode, the user can configure LD under a VLAN. In this case, LD PDUs are flooded on the VLAN. The following figure illustrates
loose mode configuration.
LD PDU processing
As long as LD PDUs are not received, there is no loop. If an LD PDU is received, then there is a loop that is present in the network.
If the if-index field in the received LD PDU is valid, then it is considered to be operating in strict mode. If the port on which the LD PDU
was received is same as one encoded in the PDU (with a match for VLAN ID if a VLAN is associated), the port is shut down. For an
MCT, if a strict mode LD PDU is received on an ICL interface, and the PDU is originated by another interface, then the ICL interface is
not shut down. Instead, the sender interface is shut down. In addition, for strict mode the required interfaces should be configured with
LD, or else the PDUs will not get processed
If the if-index field in the received LD PDU is invalid, then it is considered to be operating in loose mode. Based on VLAN ID information
present in the received LD PDU, the receiving LIF is shut down. If the receiving interface is an MCT ICL interface, the LD PDU is
dropped.
In the case of an LD-enabled LAG (port-channel) interface, if the sent LD PDU is received on the port-channel, then the port-channel
interface is shut down.
If the shutdown-disable option is configured for the particular interface, then the port drops the received PDU without processing it.
The re-enablement of the LD shut down port depends on the shutdown-time configuration. For manual recovery, either flap the
interface, by means of the shutdown and no shutdown commands, or clear the loop by means of the clear loop-detection command.
Configuration considerations
On an external switch that is unaware of LD or where LD is not configured, there may be some ACL rules applied to interfaces to permit
traffic from known MAC addresses, and at the last of these rules there is an ACL deny-any rule to block all unknown MAC addresses. If
this interface is part of a loop, LD enabled on SLX-OS will not be able to detect and break the loop.
LD use cases
In an MCT configuration, LD runs independently on both nodes. With loose mode the user must enable loop detection for the same
VLANs on both nodes in the MCT cluster. MCT strict mode and loose mode use cases are detailed below.
Strict mode LD is enabled on the MCT 1 cluster client edge port (CCEP) interface that connects to the Client.
1. MCT 1 generates LD PDUs. 3. If there is a misconfiguration, the Client floods the PDUs, reaching MCT 2.
2. If the Client has the LAG interface configured to support LD, the Client 4. MCT 1 then identifies the interface information encoded in the PDUs,
drops the PDUs and there is no loop. shutting down the interface on which the packets were generated.
1. MCT 1 sends LD PDUs on VLAN x on all the interfaces that are part of the CCEP, client edge port (CEP), and ICL interface.
2. If the Client has LD configured on the LAG interface, then it drops the PDUs and no loop exists. If there is a misconfiguration,
the Client floods the PDUs and they reach MCT 2.
3. MCT 2 floods the PDUs back to MCT 1, where the loop is detected. With loose mode no information about the interface that
transmitted the PDU is encoded in the PDU, so normally the receiving interface is shut down. Because in this case the PDU is
received on the ICL interface, that interface is not shut down.
4. MCT 1 receives the loop detection PDUs on the CCEP interface as well, as the packets were flooded in the VLAN in the
following sequence: MCT 1 > MCT 2 > Client > MCT 1. In this case the receiving CCEP is shut down to break the loop. For
MCT 2 to forward the PDUs in this case it must be the designated forwarder (DF) for that VLAN.
1. Both MCT 1 and MCT 2 will flood the PDUs in VLAN x on all the interfaces that are part of the CCEP, CEP, and ICL interface.
2. Assuming PDUs from MCT 1 take the path MCT 1 > MCT 2 > Node > Client > MCT 1, then the receiving CCEP interface is
shut down. For MCT 2 to forward the PDUs in this case, it must be the DF for that VLAN.
3. Assuming PDUs from MCT 2 take the path MCT 2 > MCT 1 > Client > Node > MCT 2, then the receiving CEP interface is shut
down
4. If PDUs from MCT 2 take the path MCT 2 > Node > Client > MCT 2, then the receiving CCEP interface is shut down.
5. Multiple interfaces can be shut down in this case, depending on the sequence in which loops are detected.
6. In addition, to avoid CCEP interfaces from being shut down over a CEP interface, thje user can configure a CCEP port not to be
shut down.
Configuring LD protocol
Follow these steps to configure loop detection (LD) protocol globally and at the interface and VLAN level.
2. Enter the protocol loop-detection command to enable loop detection, enter Protocol Loop Detect configuration mode, and
configure a variety of global options.
3. (Optional) Enter the hello-interval command to change the hello interval from the default.
4. (Optional) Enter the shutdown-time command to change from the default the interval after which an interface that is shut down
by loop detection (LD) protocol is automatically reenabled.
device(config-loop-detect)# shutdown-tiome 20
5. (Optional) Enter the raslog-duration command to change from default the interval between RASLog messages that are sent
when a port is disabled by the loop detection (LD) protocol.
device(config-loop-detect)# raslog-duration 20
device(conf-if-eth-2/6)# loop-detection
device(config)# vlan 5
device(config-vlan-5)# loop-detection
b) In interface subtype configuration mode, enter the loop-detection vlan command and specify a VLAN. (The VLAN must
already be created.)
9. (Optional) Disable the shutting down of an interface (Ethernet or port-channel) as a result of the loop detection (LD) protocol.
a) In global configuration mode, specify an interface (either an Ethernet interface or a port-channel interface).
10. (Optional) Disable the shutting down of an interface (Ethernet or port-channel) as a result of the loop detection (LD) protocol.
a) In global configuration mode, specify an interface (either an Ethernet interface or a port-channel interface).
11. Confirm the LD configuration, using the show loop-detection command with a variety of options.
a) To display LD information at the system level, enter the show loop-detection command as in the following example.
Packet Statistics:
vlan sent rcvd disable-count
100 100 0 0
Loose Mode:
------------------------
Number of LD instances: 2
Disabled Ports: 2/7
Packet Statistics:
vlan sent rcvd disable-count
100 100 0 0
b) To display ports disabled by LD, enter the show loop-detection disabled-ports command as in the following example.
c) To display global LD configuration values, enter the show loop-detection globals command.
12. Use the clear loop-detection command in privileged EXEC mode with a variety of options to reenable ports that were disabled
by LD and clear the LD statistics.
a) To enable LD-disabled ports and clear LD statistics on all interfaces, enter the clear loop-detection command.
b) To enable LD-disabled ports and clear LD statistics on an Ethernet interface, enter the clear loop-detection interface
ethernet command.
c) To enable LD-disabled ports and clear LD statistics on a port-channel interface, enter the clear loop-detection interface
port-channel command.
d) To enable LD-disabled ports and clear LD statistics on a VLAN, enter the clear loop-detection interface vlan command.
NOTE
Loop detection is not supported for bridge domains (BDs).
When a loop is detected on a VLAN and port, only the LIF of the VLAN on the port is shut down, but the physical port still remains up
and other VLANs on the port are not affected.
The existing LD loose mode configuration commands support loop detection for VLAN tunnels. In LD loose mode, if the VLAN is
mapped to VLAN tunnels and LD is enabled, VLAN tunnels loop detection is supported. Up to 256 LD loose mode instances can be
configured.
If a loop is detected from a VLAN tunnel, the following actions can take place:
• A RASLog is sent and the tunnel VNI LIFs on which the loop is detected is shut down.
• A RASLog is sent but the tunnel LIF is not shut down.
The following example enables loop detection on a VLAN and enters Protocol Loop Detection configuration mode.
The following example enables ports associated with VLAN 8 and clears LD statistics for that VLAN.
The following example displays LD configuration values, including logical interfaces (LIFs), for a VLAN tunnel.
Packet Statistics:
vlan sent rcvd
20 119 1
The following example displays LD configuration values for a VLAN tunnel if LD shutdown is disabled.
Packet Statistics:
vlan sent rcvd
20 10 10
You can control the auto-enable behavior of an LD-disabled logical interface (LIF), by using the shutdown-time command in Protocol
Loopback Detection configuration mode. The following example specifies a shutdown time of 1 minute.
By default the shutdown time is 0, which means that an LD-disabled LIF is never auto-enabled. If the shutdown time is configured with a
nonzero value, the LD-disabled LIF is auto-enabled following the specified shutdown time.
To enable LD-disabled ports and clear LD statistics on all interfaces, use the clear loop-detection command as in the following example.