EXT-XOSS&Rv23-SG-v1.1 (Extended)
EXT-XOSS&Rv23-SG-v1.1 (Extended)
The console port on a switch may be either a RJ45 or a DB9 connector with the settings are 9600, 8,
N, 1, Xon/Xoff
In addition to Local Management there are various configuration and management options for all
Extreme switches, which vary by switch product family.
Additionally EXOS supports clients for RADIUS, TACACS+, Syslog, SNTP and FTP.
Extreme Management Center provides a collection of software tools and a suite of plugin
applications that can help you configure and manage networks of varying complexity. Each is designed
to facilitate specific network management tasks while sharing data and providing common controls
and a consistent user interface.
Together, they provide comprehensive remote management support for all Extreme intelligent
network management devices as well as any SNMP MIB-I or MIB-II manageable devices.
(pending-AAA) login:
Authentication Service (AAA) on the master node is now available for login Password policies are
disabled by default.
Privilege level
“#” indicates administrator level access
“>” indicates user level access
Scheduled Reboot
reboot time [month | day | year | hour | minutes | seconds]
To download or upload a file including configuration files, script files and policy files:
tftp get/put [ ip-address | host-name] { vr vr_name } { block-size block_size } remote-file local-file}
{force-overwrite}
The internal VLAN ID is not significant outside of the switch. The value used for the internal VLAN ID
starts at 4094 and decrements for each VLAN added. If a VLAN ID is used to configure an 802.1Q
tagged VLAN that has already been assigned to an untagged VLAN, the switch automatically assigns
another internal VLAN ID to the untagged VLAN.
VLAN IDs must be consistent from switch to switch. VLAN names are locally significant to the switch’s
configuration and are ignored when using 802.1Q tagged ports. Different VLAN names can be used
from switch to switch for the same VLAN ID but it is recommended to ensure the names are the same
across all switches.
You can create a custom protocol filter by using the “create protocol” command. You then add the
relevant filter entries by entering the configure protocol command. Existing protocol filters can also
be edited using this command.
Unknown traffic: When a frame’s destination MAC address is not in the VLAN’s forwarding database
(FDB), it will be forwarded out of every port on the VLAN’s egress list with the frame format that is
specified.
Learned traffic: When a frame’s destination MAC address is in the VLAN’s forwarding database, it will
be forwarded out of the learned port
To disable a VLAN:
disable [ {vlan} vlan_name | vlan vlan_list] (This command disables the forwarding function
for the specified VLAN(s))
The clear fdb command also has a number of command qualifiers that allow you to clear specific FDB
entries as follows:
Example:
disable flooding unicast ports 24
disable flooding broadcast ports 24
show port 24 info detail
Note: In large networks the application of limit learning using Blackhole entries can quickly use up
FDB entries. A full FDB can have an impact on switch performance. To alleviate this, use the action
stop-learning command qualifier.
The “limit” for a specific virtual port (port/VLAN combination) can be removed by entering the
configure port command, specifying the port, vlan and the keyword unlimited-learning as shown in
the example below:
configure port 24 vlan default unlimited-learning
To unconfigure Lock-Learning:
conf port 24 vlan default unlock-learning
Note: When you unconfigure the lock learning feature on a virtual port, and if the configuration was
previously saved with the lock learning feature enabled, the “locked” entries will still remain in the
startup configuration. To prevent unwanted locked entries being loaded on boot up, the configuration
should be saved.
Rapid Spanning Tree Protocol (RSTP) as 802.1w. RSTP provides significantly faster spanning
tree convergence after a topology change, introducing new convergence behaviors and bridge
port roles to do this. RSTP was designed to be backwards-compatible with standard STP.
The Multiple Spanning Tree Protocol (MSTP), originally defined in IEEE 802.1s maps one or more
VLANs to multiple spanning tree domains. Administrators can define alternate paths within a
spanning tree and each spanning tree domain can be assign different root bridges, thereby load
sharing VLAN traffic across multiple redundant links. VLANs must be assigned to a so-called multiple
spanning tree instance (MSTI). Switches are first assigned to an MST region, then VLANs are mapped
against or assigned to this MST. A Common Spanning Tree (CST) is an MST to which several VLANs are
mapped, this group of VLANs is called MST Instance (MSTI). CSTs are backward compatible with the
STP and RSTP standard. A MST that has only one VLAN assigned to it is a Internal Spanning Tree (IST)
These settings satisfy most requirements. Autoedge allows a port defined as adminedge FALSE to
discover in a short period of time that it is an edge port. The only time it is necessary to set
adminedge to TRUE is when the attached user device cannot tolerate the several seconds required for
auto-detection to detect the port as a user/edge port and move it to forwarding. Setting an ISL to
adminedge TRUE should be avoided because it can lead to transient data loops.
Blocking: Actively preventing traffic from using this path. Still receiving BPDUs, so continuing to
monitor for management and STA information.
Listening: Continuing to block traffic while waiting for protocol information to determine whether to
go back to the blocking state or continue to the learning state. Listens to BPDUs to ensure no loops
occur on the network.
802.1s allows network administrators to assign VLAN traffic to unique paths. Some or all of the
switches in a LAN participate in two or more spanning trees with each VLAN belonging to one of the
spanning tree instances. An advantage of MST is that MST is built on top of 802.1w Rapid
Reconfiguration with its decreased time for re-spans within the network.
Root Port: The one port that a bridge uses to connect to the Root Bridge. This port is elected as the
Root Port due to its least “path-cost” to Root.
Alternate Port: Any redundant upstream port that provides an alternate path to the Root Bridge
(other than the Root Port).
Designated Port: Any downstream port that provides a path to the Root Bridge.
Edge Port: A port that has no other bridges connected to this port (i.e. User Port). This is
automatically configured by the Bridge Detection State Machine (802.1t Clause 18).
Backup Port: A port that acts as a redundant Designated Port for a LAN segment.
Master Port: The Bridge Port that is the CIST Root Port for the CIST Regional Root, Provides
connectivity from the Region to the CIST Root that lies outside the Region, this Port Role only exists
within the context of the MSTIs
Note: If you do not specify log, the ELRP result is immediately displayed
You must create and configure one control VLAN for each EAPS domain which transports the EAPS
control traffic. A control VLAN cannot belong to more than one EAPS domain. If the domain is active,
you cannot delete the domain or modify the configuration of the control VLAN. The control VLAN
must NOT be configured with an IP address.
In addition, only ring ports may be added to this control VLAN. No other ports can be members of this
VLAN. Failure to observe these restrictions can result in a loop in the network. The ring ports of the
control VLAN must be tagged.
When a Hello Packet transmitted from the Master’s egress port (Primary or Secondary) is received on
the Master’s ingress port, the Domain transitions to the “Complete” state, at which point the Master
blocks it’s secondary ports for all Protected VLANs for that Domain.
Note: The secondary port can be configured to transmit EAPS hello packets instead of the primary
port.
Each switch (node) will examine the hello packet and then forward the packet to its neighbor switch
through the ring port that did not receive the packet. EAPS packets are sent with an 802.1p value of 7
(QP8)
Note: A Controller or Partner can also perform the role of master or transit node within its EAPS
domain. Typically the controller and partner nodes are distribution or core switches.
Blocks protected VLAN communications on all segment ports except the active-open port
Note: When a controller goes into or out of the blocking state, the controller sends a flush-fdb
message to flush the FDB in each of the switches in its segments. In a network with multiple EAPS
ports in the blocking state, the flush-fdb message gets propagated across the boundaries of the EAPS
domains.
Link aggregation makes multiple physical links appear as a single logical link to protocols such as
Spanning Tree, EAPS and OSPF. For Spanning Tree those redundant links within the aggregation will
not be blocked. This is accomplished by positioning link aggregation as an optional sub-layer in the
Data Link Layer of the OSI Model (explained in more detail later in this module), presenting itself as a
single MAC address to MAC clients in the Network layer.
Link aggregation should be viewed as a network configuration option that is primarily used in network
connections that require higher data rate than can be provided by single links, such as between
switches or between switches and servers. It can also be used to increase the reliability of critical
links.
Switch-to-switch connections: This is the most common scenario. Multiple ports on a switch are
joined to form an aggregated link. Aggregation of multiple links achieves higher speed connections
between switches without hardware upgrade. If two switches are connected, each using four 10 Gbps
links, and one of those links fails between the two switches, data traffic is maintained through the
other links in the link aggregation group. Note that such a configuration reduces the number of ports
available for connection to other network devices or end stations. Thus, aggregation implies a trade-
off between port usage and additional capacity for a given device pair.
Switch-to-station (server or router) connections: Many server platforms can saturate a single 100
Mbps link. Thus, link capacity limits overall system performance. You can aggregate switch-to-station
connections to improve performance. Better performance can be achieved without upgrade to
servers or switches.
Port-Based Link Aggregation: Packets are distributed based on the physical source port on which the
packet was received
To create a dynamic 4 port LAG for ports 1 through to 4 with the L3 address based algorithm:
enable sharing 1 grouping 1-4 algorithm address-based l3 lacp
To create a dynamic 4 port LAG for port 2, 4, 6 and 8 with the address based algorithm:
enable sharing 2 grouping 2,4,6,8 algorithm address-based custom
Establishing the status of TCP connectivity is based on standard TCP socket connections. As long as
the switch can establish a TCP connection to the target switch and TCP port, the connection is
considered up.
The TCP connection will retry based on the configured frequency (default = 10 secs) and miss (default
= 3) settings.
A typical use case for this application is when a user wishes to connect each member link to a Security
Server to validate traffic. Each member link of the Health Check LAG is connected to an individual
Security Server. The LAG is added to a VLAN on the same subnet as the Security Server IP addresses
they wish to monitor. Each member port is configured to monitor a particular IP address and TCP port.
To configure the LAG port 1 to use a TCP health check to a Web Server:
configure sharing health-check member-port 6 add track-tcp 172.16.11.100
Hash polarization (upstream and downstream traffic sharing the same link on both switches)
can be prevented by choosing different load sharing algorithms on neighboring switches in
different layers. With CRC-16 or CRC-32, a cyclic redundancy checksum of the selected header
fields is used instead of using a simple XOR. This can help with load sharing of artificial flows
created by some testing equipment or applications. Additionally a CRC seed value can be
used to introduce pseudo randomness to load sharing the flows. The last 4 bytes of the
Switch’s MAC address is used as the seed by default.
Each switch synchronizes state information over the ISC to its peer including MLAG link state, MAC
FDB and IP Multicast FDB information.
Note: You must configure the ISC VLAN with an IP address for control communication between MLAG
peers. You cannot enable IP forwarding on this VLAN. The ISC is exclusively used for inter-MLAG peer
control traffic and should not be provisioned to carry any user data traffic. Customer data traffic
however can traverse the ISC port using other user VLANs.
Each port on the router is called an interface. Each configured interface defines the boundary of a LAN
segment, and layer 3 broadcast domain. Router interfaces are assigned Layer 3 addresses (typically
IP) and associated masks to define the network address. Routers use MAC addresses to address
packets over Layer 2 infrastructures.
Routers are capable of switching packets between different physical networks, based upon network
layer addressing. They do not flood MAC-layer broadcasts from one attached network to another, and
are protocol dependent (IP to IP; IPX to IPX). They support packet fragmentation (the disassembly of
lager packets into smaller packets) when required, and they support multiple Physical and Mac-layer
packet encapsulation types, which gives them the ability to translate from one layer 2 technology to
another, (for example, Ethernet to Packet-over-SONET).
Routers are used when communication is needed between VLANs and multiple active forwarding
paths between systems is required.
Step 2:
PC-A formulates a packet for PC-B, and forwards it to Router A.
Step 4:
Router A examines its routing table. It finds the outgoing interface and next-hop address that the
destination network (10.2.1.0) is reachable through. The next-hop address belongs to the next router
that the packet will be forwarded to, (in this case Router B).
Step 5:
If necessary, Router A ARPs for Router B’s MAC address. Router A then encapsulates the packet in a
new Layer 2 envelope, and forwards it to Router B.
Step 7:
Router C checks its Routing Table and discovers the 10.2.1.0/24 network is directly connected to it
Step 8:
Router C ARPs for PC-B, creates a Layer 2 envelope for the packet and forwards it to PC-B
Static routes can be used to reach networks that are not advertised by routing protocols and do not
have dynamic route entries in the routing tables. Static routes can also be used for security reasons,
to create routes that are not advertised by the router.
Static routes are configured manually and remain part of the configuration which if saved and the
switch is rebooted, are immediately available when the switch completes has fully booted. Static
routes are never aged out of the routing table, however, the Bidirectional Forwarding Detection (BFD)
feature can be used to bring down static routes when the host link fails.
Without BFD, static routes always remain operationally active because there is no dynamic routing
protocol to report network changes.
This can lead to a black hole situation, where data is lost for an indefinite duration. Because upper
layer protocols are unaware that a static route is not working, they cannot switch to alternate routes
and continue to use the static route.
With BFD, a static route is marked operationally inactive if the BFD session goes down. Upper layer
protocols can detect that the static route is down and take the appropriate action.
A default route is a type of static route that identifies the default router interface to which all packets
are routed when the routing table does not contain a route to the packet destination. A default route
Older dynamic routes aged out of the routing tables when an update for the network is not received
for a period of time, as determined by the routing protocol.
Once a routing protocol is configured, dynamic routes automatically updated as the network changes.
You can also configure black hole routes—traffic to these destinations is silently dropped.
The criteria for choosing from multiple routes with the longest matching network mask is set by
choosing the relative route priorities.
Without IP route sharing, each IP route entry in the routing tables lists a destination subnet and the
next-hop gateway that provides the best path to that subnet. Every time a packet is forwarded to a
particular destination, it uses the same next-hop gateway.
With IP route sharing, the router can use up to 2, 4, 8, 16, or 32 next-hop gateways (depending on the
platform and feature configuration) for each route in the routing tables. When multiple next-hop
gateways lead to the same destination and ECMP is enabled, the switch can use any of those
gateways for packet forwarding. IP route sharing provides route redundancy and can provide better
throughput when routes are overloaded.
EXOS routers support a separate ECMP table. The gateways in the ECMP table can be defined with
static routes and OSPF (up to 64-way), or they can be learned through the BGP, or IS-IS protocols (up
to 8-way).
To display the routes from a specific protocol or origin enter the command:
show iproute origin <origin>
To display the routes from the OSPF protocol enter the command:
show iproute origin ospf
All ExtremeXOS switches are Layer 3 capable and are able to forward packets between different
physical networks (VLANs) based upon network-layer addressing.
The Port Isolation feature blocks accidental and intentional inter-communication between different
devices residing on different physical ports. Previously, this kind of security was obtained through the
access-list module, but this can be complicated to manage and can be resource intensive. This feature
provides a much simpler blocking mechanism without the use of ACL hardware. A set of physical or
load-share ports can be selected that will be deemed isolated - once isolated, the ports cannot
communicate with other isolated ports, but can communicate with any other ports.
Match Operators
You can also use the operators <, <=, >, and >= to specify match conditions. For example, the match
condition, source-port > 190, will match packets with a source port greater than 190. Be sure to use a
space before and after an operator.
Action Modifiers
The above table lists a selection of action modifiers such as count, qosprofile and meter. The count
action increments the counter named in the condition. The qosprofile action forwards the packet to
the specified QoS profile; The meter action modifier associates a rule entry with an ACL meter for rate
limiting. For a full list of action modifiers refer to Chapter 18 of the ExtremeXOS Concepts Guide.
Note: Often an ingress ACL policy will have a rule entry at the end of the ACL with no match
conditions. This entry will match any packets.
For egress ACLs, if a rule entry does not contain any match condition, no packets will match. Unlike
ingress ACLs, for egress ACLs you must specify either a source or destination address, instead of
writing a rule with no match conditions.
An individual switch or module cannot be configured to operate in a mixed wide and single mode.
However, a BlackDiamond 8800 chassis or a SummitStack can have a mixture of modules/stack
members and switches with some of them operating in a single mode and some in a wide mode.
A number of slices and rules are used by features present on the switch. You consume these
resources when the feature is enabled so the availability of resources depends on the type and
number of features and protocols that are enabled on a switch. Below is a list of the most common
features and their resource consumption. For a detailed list, refer to the ExtremeXOS Concepts Guide.
• dot1p examination - enabled by default - 1 slice, 8 rules per chip
• IGMP snooping - enabled by default - 2 slice, 2 rules
• VLAN without IP configured - 2 rules - 2 slices
• IP interface - disabled by default - 2 slices, 3 rules (plus IGMP snooping rules above)
• VLAN QoS - disabled by default - 1 slice, n rules (n VLANs)
• Port QoS - disabled by default - 1 slice, 1 rule
• VRRP - 2 slices, 2 rules
• EAPS - 1 slice, 1 rule (master), n rules (transit - n domains)
• ESRP - 2 slices, 2 rules
• ESRP Aware - 1 slice, 1 rule
• IPv6 - 2 slices, 3 rules
• Netlogin - 1 slice, 1 rule
• VLAN Mirroring - 1 slice, n rules (n VLANs)
Note: ACLs applied to a VLAN are actually applied to all ports on the switch, without regard to VLAN
membership. The result is that resources are consumed per chip on BlackDiamond 8000 a-, c-, e- xl-,
and xm series modules and Summit family switches.
To escape the input mode and return to the command mode, press the Escape key.
There are several commands that can be used from the command mode:
dd - To delete the current line
yy - To copy the current line
p - To paste the line copied
:w - To write (save) the file
:q - To quit the file if no changes were made
:q! - To forcefully quit the file without saving changes
:wq - To write and quit the file
The output from the show access-list command shows the actual VLAN the ACL is bound to (notice
that the ACL is bound to all ports as indicated by the asterisk “*”). It also shows whether the policy is
ingress or egress and how many rules are contained in the policy.
User-created access-list names are not case sensitive. The match conditions, actions, and action
modifiers are the same as those that are available for ACL policy files. In contrast to the ACL policy file
entries, dynamic ACLs are created directly in the CLI.
More than one dynamic ACL can be applied to an interface, and the precedence among the dynamic
ACLs can be configured when adding the dynamic ACL via the CLI. By default, the priority among
dynamic ACLs is established by the order in which they are configured.
Note: Dynamic ACLs have a higher precedence than ACLs applied using a policy file.
To configure a non-permanent dynamic ACL, enter the create access-list command specifying the rule
name, conditions and actions then add the non-permanent command option. The above example can
be configured as follows:
create access-list permitTelnet "protocol tcp; destination-port 23“_”permit”_non-permanent
VRRP specifies an election protocol that dynamically assigns responsibility for a virtual router to one
of the VRRP routers on a LAN.
The VRRP router controlling the IP address(es) associated with a virtual router is called the Master,
and forwards packets sent to these IP addresses.
The election process provides dynamic fail-over in the forwarding responsibility should the Master
become unavailable.
Any of the virtual router's IP addresses on a LAN can then be used as the default first hop router by
end-hosts.
Load sharing can also be implemented by configuring multiple VRRP routers across multiple IP
routers, each IP router being the master of a different virtual router.
VRID are converted into Hex when being added to the VIP MAC address, so an appreciation of Hex
numbering is required to decode VRRP MAC addresses to VRID mappings.
If the virtual router IP address is the same as the interface (VLAN) address owned by a VRRP router,
then the router owning the address becomes the master. The master sends an advertisement to all
other VRRP routers declaring its status, and assumes responsibility for forwarding packets associated
with its virtual router ID (VRID). If the virtual router IP address is not owned by any of the VRRP
routers, then the routers compare their priorities and the higher-priority owner becomes the master.
If priority values are the same, then the VRRP router with the higher IP address is selected as the
master.
Host ARP
Host ARP performs according to the following rules:
When a host sends an ARP request for one of the VR IP addresses, the master VR returns the virtual
MAC address (00-00-5e-00-01-VRID).
The backup VR must not respond to the ARP request for one of the VR IP addresses.
If the master VR is the IP address owner, when a host sends an ARP request for this address, the
master VR must respond with the virtual MAC address, not the real physical MAC address.
For other IP addresses, the VRRP router must respond with the real physical MAC address, regardless
of master or backup.
Gratuitous ARP
Behaves in the following manner on a VRRP router:
Each VR sends gratuitous ARP when it becomes the master with virtual IP and MAC addresses. One
gratuitous ARP is issued per VR IP address.
To make the switch learn the correct VR MAC address, the VR master sends gratuitous ARP for every
virtual IP address in the corresponding VR every 10 seconds.
Proxy ARP
If used, the VRRP master router must bind the virtual MAC address to remote IP destination
addresses in proxy ARP replies.
VRRP Scaling
From ExtremeXOS release 22.1, the maximum number of unique VRID numbers per switch has been
increased to 255 on the Summit X770, X670-G2, X460-G2, X450-G2 and ExtremeSwitching X440-G2,
X620, X870, X690, X590. Older releases support support 31 or 7 unique VRIDs only depending on the
software version and switch model.
Note: For backwards compatibility in a mixed environment, VRIDs should be re-used wherever
possible to reduce the number of unique VRIDs.
The OSPF protocol was developed by the OSPF working group of the Internet Engineering Task Force.
It has been designed expressly for the internet environment, including explicit support for IP
subnetting, TOS-based routing and the tagging of externally-derived routing information. OSPF also
provides for the authentication of routing updates, and utilizes IP multicast when sending/receiving
the updates. In addition, much work has been done to produce a protocol that responds quickly to
topology changes, yet involves small amounts of routing protocol traffic.
Each area runs a separate copy of the basic shortest-path-first routing algorithm. This means that
each area has its own topological database.
The topology of an area is invisible from the outside of the area. Conversely, routers internal to a
given area know nothing of the detailed topology external to the area. This isolation of knowledge
enables the protocol to effect a marked reduction in routing traffic as compared to treating the entire
autonomous system as a single SPF domain.
With the introduction of areas, it is no longer true that all routers in the AS have an identical
topological database. A router actually has a separate topological database for each area to which it is
connected. Routers connected to multiple areas are called area border routers. Two routers belonging
to the same area have, for that area, identical area topological databases.
Routing in the autonomous system takes place on two levels, depending on whether the source and
destination of a packet reside in the same area (intra-area routing is used) or different areas (inter-
area routing is used). In intra-area routing, the packet is routed solely on information obtained within
the area; no routing information obtained from outside the area can be used. This protects intra-area
routing from the injection of bad routing information.
The backbone must be contiguous. Each router's interface that is configured in Area 0 must be
reachable via other routers where each interface in the path is configured as being in Area 0.
However, it is possible to define areas in such a way that the backbone is no longer contiguous--where
the continuity between routers is broken. In this case, you must establish backbone continuity by
configuring virtual links. Virtual links are useful when the backbone area is either purposefully
partitioned or when restoring inadvertent breaks in backbone continuity.
As a result of OSPF using area based routing, the positioning of routers with respect to these areas
represents a critical element in an OSPF routing environment.
Summary-LSAs allow routers in the interior of an area to dynamically learn about destinations in other
areas, so they can to select the best path when forwarding packets to these destinations.
In addition:
• AS-external-LSAs are not flooded into Stub Areas
• Routing to external designations from Stub Areas are based on Default Routes originated by a Stub
Area’s ABR.
• Summary LSAs can also use the Default Route for Inter-area routing.
Criteria:
• Stub areas must not have an ASBR
• Stub areas should have one ABR or if more than one, accept non-optimal routing paths to the
External AS
• No Virtual Links allowed in a stub area
To demonstrate on a broadcast LAN how database updates occur using a DR and BDR, Router5
receives a new LSA (perhaps you configure a new VLAN to participate in OSPF). It installs the LSA in its
database, and then floods the LSA, (LS Update) to the DR and BDR (using 224.0.0.6 (AllDRouters) so
only these routers receive the update.
The Designated Router then sends the LS Update back on to the LAN segment using address 224.0.0.5
(AllSFPRouters). All the routers hear and process the update. Router2 and Router5 update their
timers; Router3 and Router4 add the LSA to their Link State Database.
All the routers stop passing data traffic, run Dijkstra’s Algorithm to recomputed their Shortest Path
Trees, reconverge, and begin passing traffic again.
This would result in the router not processing OSPF packets during this time frame. As long as the
router is turned on and running, the loopback will never go away, so when a router interface goes
down it won’t affect the other routers in the network.
OSPF packet type 2, exchanged when an adjacency being initiated, describes topology database, and
multiple packets may be used to describe a database.
OSPF packet type 3, requests pieces of the topological database from neighbor routers. These
messages are exchanged after a router discovers (by examining database-description packets) that
parts of its topological database are out of date. Type 3 packets allow the router to come to full
adjacency with the Designated Router.
OSPF packet type 4, implement the flooding of LSAs, several LSA may be included within a single
packet, response to Link State request packets, performs the database update, and acknowledged by
Link State Acknowledgement packets.
OSPF packet type 5, performs flooding acknowledgement for LSA’s, sent either multicast to
AllSPFRouters, AllDRouters or unicast, packet format is similar to Data Description packets, and packet
body consists of a list of LSA headers.
Opaque LSAs
Opaque LSAs are a generic OSPF mechanism used to carry auxiliary information in the OSPF database.
Opaque LSAs are most commonly used to support OSPF traffic engineering.
Not-So-Stubby-Areas
Not-so-stubby-areas (NSSAs) are similar to the existing OSPF stub area configuration option but have
external routes originating from an ASBR.
BFD Overview
Bidirectional Forwarding Detection (BFD) is a hello protocol that provides the rapid detection of
failures in the path and informs the clients (routing protocols) to initiate the route convergence.
To summarize a certain range of IP addresses within an area and export them out as a single address:
configure ospf area 1.2.3.4 add range 10.1.2.0/24 advertise type-3
The cost metric is inserted for all BGP, IS-IS, RIP-learned, static, and direct routes injected into OSPF. If
the cost metric is set to 0, the cost is inserted from the route. The tag value is used only by special
routing applications. Use 0 if you do not have specific requirements for using a tag. The tag value in
this instance has no relationship with 802.1Q VLAN tagging.
The same cost, type, and tag values can be inserted for all the export routes, or a policy can be used
for selective insertion.
When a policy is associated with the export command, the policy is applied on every exported route.
The exported routes can also be filtered using a policy.
Other protocols such as OSPF, RIP2 as well as other application based protocols such as Session
Announcement Protocol (SAP) and Session Description Protocol (SDP) use multicast to announce and
learn the existence other routers or other multimedia conferences on the network.
The illustration shows a partial list of reserved link-local multicast addresses and the network protocol
or function to which they are assigned. There are more than 48 link-local reserved multicast
addresses assigned as well as also additional reserved addresses such as those for Source Specific
Multicast and Internetwork Control Block addresses.
For the current complete list of link-local reserved addresses, visit the following URL:
http://www.iana.org/assignments/multicast-addresses
Routers implement IGMP to allow hosts to signal to the network their desire to receive multicast
traffic for a specific group. This enables the routers to learn about the presence of group members on
their directly attached subnetworks.
This receiver-initiated join process has excellent scaling properties since, as the multicast group
increases in size, it becomes ever more likely that a new group member is able to locate a nearby
branch of the multicast distribution tree.
A Server has no direct IGMP involvement, as it does not receive a multicast stream and only sends a
multicast stream.
IGMP query messages are addressed to the all-hosts group address (224.0.0.1) and have a Time to
Live (TTL) value of 1. The router periodically multicasts an IGMP membership query to the “all hosts”
multicast group, on the local subnetwork. All hosts that support IGMP are automatically members of
the all hosts group and accept packets address to the all hosts group.
The default query interval is 60 seconds for IGMPv1 and 125 seconds for IGMPv2
Querier Election
In a multi-access network there may be more than one router that is IGMP enabled. Only one
multicast querier (router) can exist for each LAN at a time. So, there needs to be an election to
determine which router becomes the IGMP querier.
IGMP v1 does not have an election mechanism and relies on the routing protocol to select a
designated router.
IGMP v2 uses a General Query message on start-up. When routers receive the General Query
messages they compare the source IP address with their own. The router with the lowest IP address is
elected the IGMP querier. General query messages are sent to the all-routers multicast group using
address 224.0.0.2.
Note: When a host is no longer interested in receiving the multicast stream and it only supports
IGMPv1, the switch stops sending the multicast stream to that host after the IGMP Snooping host
timer expires (240 seconds by default). The switch responds by sending an IGMP query to all ports in
the VLAN to detect if there are other interested hosts.
PIM snooping addresses this flooding behavior by efficiently replicating multicast traffic only onto
ports which routers advertise the PIM join requests. The application for this feature is for connecting
PIM Autonomous Systems usually within an Internet Exchange’s ISP peering network. PIM snooping
does not require PIM to be enabled. A discussion on PIM snooping is beyond the scope of this course.
When a host wants a multicast stream, it sends an IGMP Join message with the (*,G) information to
its Querier Router. The router adds the interface on which it receives the Join to the outgoing
interface list in its multicast routing table, and forwards the Join to the Rendezvous Point.
The Rendezvous Point processes the Join, and adds the interface upon which the Join arrived to
outgoing interfaces for this group in its multicast routing table.
If the Rendezvous Point is currently part of the Shortest Path Tree (SPT) for this multicast group and
thus is currently receiving the multicast stream, it immediately begins to forward the stream out that
interface. If the RP is not currently receiving the multicast stream, the Join process ends here. Note
that it is possible for the two routers involved to have interfaces that are outgoing interfaces for the
multicast group, without having multicast actually flowing.
At this point, the multicast source begins sending multicast packets to the RP.
When you enable PIM ECMP load splitting based on group address, the RPF interface for each (*, G)
or (S,G) state is selected based on the hash derived from the group address.
When you enable PIM ECMP load splitting based on source-group address, the RPF interface for each
(*, G) or (S,G) state is selected among the equal cost paths based on the hash derived from the source
and group addresses among the equal cost paths based on the hash derived from the group address.
When you enable PIM ECMP load splitting based on source-group-next hop address, the RPF interface
for each (*, G) or (S,G) state is selected among the equal cost paths based on the hash derived from
the source, group and next hop addresses.
PIM-SSM only builds source-based shortest path trees. Where PIM-SM always joins a shared tree first
and then switches to the source tree, SSM eliminates the need for starting with a shared tree by
immediately joining a source through the shortest path tree. This behavior means that PIM-SSM
does not require an RP or BSR. Members of an SSM group can only receive from a single source. This
is ideal for applications like TV channel distribution, and for certain banking and trade applications,
but rules out SSM for applications such as multicast VoIP teleconferencing.
The Internet Assigned Numbers Authority (IANA) has reserved addresses for PIM-SSM in the
232.0.0.0/8 range for IPv4 and in the ff3x:0000/32 range, where (x = 4,5,8, or E), for IPv6. SSM
recognizes packets in this range and controls the behavior of multicast routing devices and hosts that
use one of these addresses. In PIM-SSM, an IP datagram is transmitted by a source S to an SSM
destination address G, and receivers can receive this datagram by subscribing to channel (S,G).
A channel is a source-group (S,G) pair where S is the source sending to the multicast group and G is an
SSM group address. SSM defines channels on a per-source basis. In SSM, each channel is associated
with one and only one source.
In a mixed PIM-SM and PIM-SSM configuration you configure the RP and BSR only for the PIM-SM
group address range. PIM-SSM does not use Rendezvous Points or Boot Strap Routers.
Enable IGMPv3 on all PIM-SSM interfaces and enable IGMP querying on the PIM-SSM receiver
This feature allows you to overcome the length limit on the custom stacking cables used with
dedicated or native stack ports. For example, Summit family switches on different floors in a building
or in different buildings on a campus can be connected to form a stack using standard Ethernet cables.
The SummitStack-V feature also allows you to stack switches that have no native stacking ports but do
have at least two Ethernet ports, which can be configured to support either data communications or
the stacking protocol.
When these dual-purpose ports are configured to support stacking, they are called alternate stack
ports to distinguish them from the native stack ports that use custom cables.
Master Node Role: A node that is elected as the master (or primary) runs all of the configured control
protocols such as OSPF, RIP, Spanning Tree and EAPS. The master node controls all data ports on itself,
the backup node, and all standby nodes. The master node issues specific programming commands
over the control path to the backup or standby nodes to accomplish this purpose.
Backup Node Role: The node that is operating in the backup node role takes over the master node
role if the master node fails. The master node keeps the backup node databases in synchronization
with its own database in preparation for this event. Upon transfer of role, the backup node becomes
the master node and begins operating with the databases it has previously received. This allows all
other nodes in the stack to continue operating even after the master node fails.
Standby Node Role: A node that is executing the standby node role is prepared to become a backup
node in the event that the backup node becomes the master node. When becoming a backup node,
the new master node synchronizes all of its databases to the new backup node. As a standby node,
most databases are not synchronized, except for those few that directly relate to hardware
programming.
Example: If the path between unit 4 and unit 1 fails, unit 4 would know that an available path to unit
1 existed through units 3 and 2.
Note: When stacking cables are connected, the stacked units exchange information until they
determine stack topology, this occurs whether or not stacking is enabled;
• All units then broadcast discovery packets
• The CPU on each unit processes the discovery packets
• Each unit then increments hop count in the discovery packets and forwards packets.
• The units determine that the topology is a ring when a packet with own MAC address is received.
Some switch models have more memory and support additional features. If the stack configuration
includes switches that are more capable than others, the stack will try to select the most-capable
backup node.
Extreme Management Center provides a collection of software tools and a suite of plugin
applications that can help you configure and manage networks of varying complexity. Each is designed
to facilitate specific network management tasks while sharing data and providing common controls
and a consistent user interface.
Together, they provide comprehensive remote management support for all Extreme intelligent
network management devices as well as any SNMP MIB-I or MIB-II manageable devices.
Note: This is the default URL, the web ports may be changed using the Administration Options.
You can also access these apps by launching the XMC Java based applications.
The Java based applications are still required as not all functionality within the Extreme Management
Center are available yet in the web based management platform.
The Search Log tab displays a log of the progress of the search and notifies you of unsupported
devices.
The Results tab displays the results of the Compass search. You can customize table settings and find,
filter, sort, print, and export the information in the Search Log and Results tabs. Access these Table
Tools through a right-click on a column heading or anywhere in the table body.
Here a search was done for a specific IP address belonging to a device that is part of group virtual
network.
Compass works by polling various MIBs on each device in the group that is selected for the search and
then displays the results.
The Active column indicates that the user has been seen recently on the indicate last seen port, this is
typically from one of the dot1* MIBs.
You can also view historical summary breakout of critical device functions; such as end-system events
received, authentication requests, captive portal statistics, agents connected, etc.
Management Center uses these credentials for scripting and management of specific devices.
For example, to backup firmware may use scripting to perform task on the ExtremeXOS devices and
Wireless Manager uses the CLI to retrieve configuration and configure the devices.
Creating a rule that scans your network range for devices with “public/public” can help with finding
unsecure devices.
If you model with Ping only, you can see if the device is up or down but that’s it.
Seed Address means that the system will also try to discover neighbors to discovered IP addresses.
All Devices - contains all the devices in the Extreme Management Center database.
Grouped By - contains multiple subgroups:
• Chassis - contains subgroups for specific chassis in your network
• Contact - contains subgroups based on the system contact
• Device Types - contains subgroups for the specific product families and device types in your
network
• IP - contains subgroups based on the IP subnets in your network
• Location - contains subgroups based on the system location
• Sites – the Site the devices belong to
• User Device Groups – Device Groups manually created by the user
• Wireless Controllers
When a device or device group is selected from the left panel, the Devices tab shows a table listing
information about your selection.
You can also access FlexViews, view your interface and VLAN information and access DeviceView from
this screen.
The left-panel device summary view (shown above with labels) is displayed in each DeviceView
report.
Note: FlexView interface statistics will only be displayed if Statistics Collection is enabled.
At the moment the current switches that support ExtremeXOS 21 and above are as follows:
Summit X440-G2
Summit X450-G2
Summit X460-G2
Summit X670-G2
ExtremeSwitching X590
ExtremeSwitching X620
ExtremeSwitching X690
ExtremeSwitching X770
ExtremeSwitching X870
For the latest information, view the online EXOS Compatibility Matrix at the following link:
https://www.extremenetworks.com/support/compatibility-matrices/summit-extremeswitching-and-
e4g-components-extremexos-software-support/