Belden Hirschmann Rail Switch Power Lite User Manual

Belden Hirschmann Rail Switch Power Lite User Manual

Redundancy configuration

Advertisement

Quick Links

User Manual

Redundancy Configuration

Rail Switch Power Lite (RSPL)
UM RedundConfig RSPL
Technical Support
Release 2.0 02/2013
https://hirschmann-support.belden.eu.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Hirschmann Rail Switch Power Lite and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Belden Hirschmann Rail Switch Power Lite

  • Page 1: User Manual

    User Manual Redundancy Configuration Rail Switch Power Lite (RSPL) UM RedundConfig RSPL Technical Support Release 2.0 02/2013 https://hirschmann-support.belden.eu.com...
  • Page 2 The naming of copyrighted trademarks in this manual, even when not specially indicated, should not be taken to mean that these names may be considered as free in the sense of the trademark and tradename protection law and hence that they may be freely used by anyone. ©...
  • Page 3: Table Of Contents

    Contents Contents About this Manual Network Topology vs. Redundancy Protocols Network topologies 1.1.1 Meshed topology 1.1.2 Ring topology Redundancy Protocols Media Redundancy Protocol (MRP) Network Structure Reconfiguration time Advanced mode Prerequisites for MRP Example Configuration Spanning Tree Basics 3.1.1 The tasks of the STP 3.1.2 Bridge parameters 3.1.3 Bridge Identifier 3.1.4 Root Path Cost...
  • Page 4 Contents 3.4.3 Spanning Tree Priority Vector 3.4.4 Fast reconfiguration 3.4.5 STP compatibility mode Configuring the device Guards 3.6.1 Activating the BPDU Guard 3.6.2 Activating Root Guard / TCN Guard / Loop Guard Readers’ Comments Index Further Support UM RedundConfig RSPL Release 2.0 02/2013...
  • Page 5: About This Manual

    About this Manual About this Manual The “GUI” reference manual contains detailed information on using the graphical interface to operate the individual functions of the device. The “Command Line Interface” reference manual contains detailed information on using the Command Line Interface to operate the individual functions of the device.
  • Page 6 About this Manual The Industrial HiVision Network Management Software provides you with additional options for smooth configuration and monitoring:  Simultaneous configuration of multiple devices  Graphical user interface with network layout  Auto-topology discovery  Event log  Event handling ...
  • Page 7: Key

    The designations used in this manual have the following meanings:  List Work step  Subheading  Link Cross-reference with link Note: A note emphasizes an important fact or draws your attention to a dependency. ASCII representation in user interface Courier Execution in the Graphical User Interface Execution in the Command Line Interface...
  • Page 8 Bridge A random computer Configuration Computer Server PLC - Programmable logic controller I/O - Robot UM RedundConfig RSPL Release 2.0 02/2013...
  • Page 9: Network Topology Vs. Redundancy Protocols

    Network Topology vs. Redundancy Protocols 1 Network Topology vs. Redundancy Protocols When using Ethernet, an important prerequisite is that data packets follow a single (unique) path from the sender to the receiver. The following network topologies support this prerequisite:  Line topology ...
  • Page 10: Network Topologies

    Network Topology vs. Redundancy 1.1 Network topologies Protocols 1.1 Network topologies 1.1.1 Meshed topology For networks with star or tree topologies, redundancy procedures are only possible in connection with physical loop creation. The result is a meshed topology. Figure 2: Meshed topology: Tree topology with physical loops For operating in this network topology, the device provides you with the following redundancy protocols: ...
  • Page 11: Ring Topology

    Network Topology vs. Redundancy 1.1 Network topologies Protocols 1.1.2 Ring topology In networks with a line topology, you can use redundancy procedures by connecting the ends of the line. This creates a ring topology. Figure 3: Ring topology: Line topology with connected ends For operating in this network topology, the device provides you with the following redundancy protocols: ...
  • Page 12: Redundancy Protocols

    Network Topology vs. Redundancy 1.2 Redundancy Protocols Protocols 1.2 Redundancy Protocols For operating in different network topologies, the device provides you with the following redundancy protocols: Redundancy Network topology Comments protocol Ring The switching time can be selected and is practically independent of the number of devices.
  • Page 13: Media Redundancy Protocol (Mrp)

    Media Redundancy Protocol (MRP) 2 Media Redundancy Protocol (MRP) Since May 2008, the Media Redundancy Protocol (MRP) has been a standardized solution for ring redundancy in the industrial environment. MRP is compatible with redundant ring coupling, supports VLANs, and is distinguished by very short reconfiguration times.
  • Page 14: Network Structure

    Media Redundancy Protocol (MRP) 2.1 Network Structure 2.1 Network Structure The concept of ring redundancy allows the construction of high-availability, ring-shaped network structures. With the help of the RM (Ring Manager) function, the two ends of a backbone in a line structure can be closed to a redundant ring. The ring manager keeps the redundant line open as long as the line structure is intact.
  • Page 15: Reconfiguration Time

    Media Redundancy Protocol (MRP) 2.2 Reconfiguration time 2.2 Reconfiguration time If a line section fails, the ring manager changes the MRP-Ring back into a line structure. You define the maximum time for the reconfiguration of the line in the ring manager. Possible values for the maximum delay time: •...
  • Page 16: Advanced Mode

    Media Redundancy Protocol (MRP) 2.3 Advanced mode 2.3 Advanced mode For times even shorter than the guaranteed reconfiguration times, the device provides the advanced mode. The advanced mode speeds up the link failure recognition when the ring participants inform the ring manager of interruptions in the ring via link-down notifications.
  • Page 17: Prerequisites For Mrp

    Media Redundancy Protocol (MRP) 2.4 Prerequisites for MRP 2.4 Prerequisites for MRP Before setting up an MRP-Ring, make sure that the following conditions are fulfilled:  All ring participants support MRP.  The ring participants are connected to each other via the ring ports. Apart from the device’s neighbors, no other ring participants are connected to the respective device.
  • Page 18: Example Configuration

    Media Redundancy Protocol (MRP) 2.5 Example Configuration 2.5 Example Configuration A backbone network contains 3 devices in a line structure. To increase the availability of the network, you convert the line structure to a redundant ring structure. Devices from different manufacturers are used.All devices support MRP.
  • Page 19 Media Redundancy Protocol (MRP) 2.5 Example Configuration Port type Bit rate Autonegotiation Port setting Duplex (automatic configuration) 100 Mbit/s 100 Mbit/s full duplex (FDX) 1 Gbit/s Optical 100 Mbit/s 100 Mbit/s full duplex (FDX) Optical 1 Gbit/s Table 2: Port settings for ring ports Note: You configure optical ports without support for autonegotiation (automatic configuration) with 100 Mbit/s full duplex (FDX) or 1000 Mbit/s full duplex (FDX).
  • Page 20 Media Redundancy Protocol (MRP) 2.5 Example Configuration Note: Configure all the devices of the MRP-Ring individually. Before you connect the redundant line, you must have completed the configuration of all the devices of the MRP-Ring. You thus avoid loops during the configuration phase.
  • Page 21 Media Redundancy Protocol (MRP) 2.5 Example Configuration  Switch MRP on on all devices in the network:  Open the dialog. Redundancy:MRP  Define the desired ring ports. Figure 8: Defining the ring ports In the Command Line Interface you first define an additional parameter, the MRP domain ID.
  • Page 22 Media Redundancy Protocol (MRP) 2.5 Example Configuration  Activate the ring manager. For the other devices in the ring, leave the setting as Off. Figure 9: Activating the ring manager Defines the device as the ring manager. Do not mrp domain modify mode activate the ring manager on any other device.
  • Page 23 Media Redundancy Protocol (MRP) 2.5 Example Configuration  Select the checkbox in the "Advanced Mode" field. Figure 10: Activating the advanced mode Activates the advanced mode. mrp domain modify advanced-mode enabled UM RedundConfig RSPL Release 2.0 02/2013...
  • Page 24 Media Redundancy Protocol (MRP) 2.5 Example Configuration  In the "Ring Recovery" field, select the value 200ms. Figure 11: Defining the time for the ring recovery Defines 200ms as the max. delay time for the mrp domain modify reconfiguration of the ring. recovery-delay 200ms Note: If selecting 200 ms for the ring recovery does not provide the ring stability necessary to meet the requirements of your network, you select...
  • Page 25 Media Redundancy Protocol (MRP) 2.5 Example Configuration  Switch the operation of the MRP-Ring on. Figure 12: Switching on the MRP function  Click on “Set” to save the changes. Activates the MRP-Ring. mrp domain modify operation enable UM RedundConfig RSPL Release 2.0 02/2013...
  • Page 26 Media Redundancy Protocol (MRP) 2.5 Example Configuration  When all the ring participants are configured, close the line to the ring. To do this, you connect the devices at the ends of the line via their ring ports.  Check the messages from the device: Displays the parameters for checking.
  • Page 27 Media Redundancy Protocol (MRP) 2.5 Example Configuration The "Information" field shows messages for the redundancy configuration and the possible causes of errors. The following messages are possible if the device is operating as a ring client or a ring manager: ...
  • Page 28 Media Redundancy Protocol (MRP) 2.5 Example Configuration  If applicable, integrate the MRP ring into a VLAN:  Change the value in the "VLAN" field. Figure 15: Changing the VLAN ID  If the MRP-Ring is not assigned to a VLAN (link in this example), leave the VLAN ID as 0.
  • Page 29: Spanning Tree

    Spanning Tree 3 Spanning Tree Note: The Spanning Tree Protocol is a protocol for MAC bridges. For this reason, the following description uses the term bridge for Switch. Local networks are getting bigger and bigger. This applies to both the geographical expansion and the number of network participants.
  • Page 30 Spanning Tree If the device working as the root is inoperable and another device takes over its function, the Max Age setting of the new root bridge determines the maximum number of devices allowed in a branch. Note: The RSTP standard dictates that all the devices within a network work with the (Rapid) Spanning Tree Algorithm.
  • Page 31: Basics

    Spanning Tree 3.1 Basics 3.1 Basics Because RSTP is a further development of the STP, all the following descriptions of the STP also apply to the RSTP. 3.1.1 The tasks of the STP The Spanning Tree Algorithm reduces network topologies built with bridges and containing ring structures due to redundant links to a tree structure.
  • Page 32: Bridge Parameters

    Spanning Tree 3.1 Basics 3.1.2 Bridge parameters In the context of Spanning Treee, each bridge and its connections are uniquely described by the following parameters:  Bridge Identifier  Root Path Cost for the bridge ports,  Port Identifier 3.1.3 Bridge Identifier The Bridge Identifier consists of 8 bytes.
  • Page 33: Root Path Cost

    Spanning Tree 3.1 Basics 3.1.4 Root Path Cost Each path that connects 2 bridges is assigned a cost for the transmission (path cost). The Switch determines this value based on the transmission speed (see table 3). It assigns a higher path cost to paths with lower transmission speeds.
  • Page 34: Port Identifier

    Spanning Tree 3.1 Basics a. Bridges that conform with IEEE 802.1D 1998 and only support 16-bit values for the path costs should use the value 65,535 (FFFFH) for path costs when they are used in conjunction with bridges that support 32-bit values for the path costs. 3.1.5 Port Identifier The port identifier consists of 2 bytes.
  • Page 35: Max Age And Diameter

    Spanning Tree 3.1 Basics 3.1.6 Max Age and Diameter The “Max Age” and “Diameter” values largely determine the maximum expansion of a Spanning Tree network. Diameter  The number of connections between the devices in the network that are furthest removed from each other is known as the network diameter. Diameter = 7 Root-Bridge Figure 19: Definition of diameter...
  • Page 36 Spanning Tree 3.1 Basics MaxAge  Every STP-BPDU contains a “MessageAge” counter. When a bridge is passed through, the counter increases by 1. Before forwarding a STP-BPDU, the bridge compares the “MessageAge” counter with the “MaxAge” value defined in the device: ...
  • Page 37: Rules For Creating The Tree Structure

    Spanning Tree 3.2 Rules for Creating the Tree Structure 3.2 Rules for Creating the Tree Structure 3.2.1 Bridge information To determine the tree structure, the bridges need more detailed information about the other bridges located in the network. To obtain this information, each bridge sends a BPDU (Bridge Protocol Data Unit) to the other bridges.
  • Page 38: Setting Up The Tree Structure

    Spanning Tree 3.2 Rules for Creating the Tree Structure 3.2.2 Setting up the tree structure  The bridge with the smallest number for the bridge identifier is called the root bridge. It is (or will become) the root of the tree structure. ...
  • Page 39 Spanning Tree 3.2 Rules for Creating the Tree Structure Determine root path Equal Path with lowest path costs? path costs = root path Path with highest Equal priority in priority in bridge bridge identification? identification = root path Use the bridge with lowest MAC address = designated bridge Path with highest...
  • Page 40: Examples

    Spanning Tree 3.3 Examples 3.3 Examples 3.3.1 Example of determining the root path You can use the network plan (see fig. 22) to follow the flow chart (see fig. 21) for determining the root path. The administrator has specified a priority in the bridge identification for each bridge.
  • Page 41 Spanning Tree 3.3 Examples Root Bridge P-BID = 16 384 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 MAC 00:01:02:03:04:06 Port 3 MAC 00:01:02:03:04:05 Port 1 Priority of the bridge identifikation (BID) P-BID = BID without MAC Address P-BID = 32 768...
  • Page 42: Example Of Manipulating The Root Path

    Spanning Tree 3.3 Examples 3.3.2 Example of manipulating the root path You can use the network plan (see fig. 23) to follow the flow chart (see fig. 21) for determining the root path. The Administrator has performed the following: – Left the default value of 32,768 (8000H) for every bridge apart from bridge 1 and bridge 5, and –...
  • Page 43 Spanning Tree 3.3 Examples Root Bridge P-BID = 16 384 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 P-BID = 28 672 Priority of the bridge identifikation (BID) P-BID = BID without MAC Address P-BID = 32 768 Root path Interrupted path...
  • Page 44: Example Of Manipulating The Tree Structure

    Spanning Tree 3.3 Examples 3.3.3 Example of manipulating the tree structure The Management Administrator soon discovers that this configuration with bridge 1 as the root bridge (see on page 40 “Example of determining the root path”) is invalid. On the paths from bridge 1 to bridge 2 and bridge 1 to bridge 3, the control packets which the root bridge sends to all other bridges add up.
  • Page 45: The Rapid Spanning Tree Protocol

    Spanning Tree 3.4 The Rapid Spanning Tree Protocol 3.4 The Rapid Spanning Tree Protocol The RSTP uses the same algorithm for determining the tree structure as STP. RSTP merely changes parameters, and adds new parameters and mechanisms that speed up the reconfiguration if a link or bridge becomes inoperable.
  • Page 46 Spanning Tree 3.4 The Rapid Spanning Tree Protocol  Edge port Every network segment with no additional RSTP bridges is connected with exactly one designated port. In this case, this designated port is also an edge port. The distinction of an edge port is the fact that it does not receive any RST BPDUs (Rapid Spanning Tree Bridge Protocol Data Units).
  • Page 47 Spanning Tree 3.4 The Rapid Spanning Tree Protocol BID = 16 384 BID = 20 480 BID = 24 576 BID = 40 960 BID = 28 672 BID = 32 768 Priority of the bridge identifikation (BID) P-BID Port 2 = BID without MAC Address Root path Port 1...
  • Page 48: Port States

    Spanning Tree 3.4 The Rapid Spanning Tree Protocol 3.4.2 Port states Depending on the tree structure and the state of the selected connection paths, the RSTP assigns the ports their states. STP port state Administrative RSTP Active topology bridge port operational Port state (port role)
  • Page 49: Spanning Tree Priority Vector

    Spanning Tree 3.4 The Rapid Spanning Tree Protocol 3.4.3 Spanning Tree Priority Vector To assign roles to the ports, the RSTP bridges exchange configuration information with each other. This information is known as the Spanning Tree Priority Vector. It is part of the RSTP BPDUs and contains the following information: ...
  • Page 50: Stp Compatibility Mode

    Spanning Tree 3.4 The Rapid Spanning Tree Protocol  Address table: With STP, the age of the entries in the FDB determines the updating of communication. RSTP immediately deletes the entries in those ports affected by a reconfiguration.  Reaction to events: Without having to adhere to any time specifications, RSTP immediately reacts to events such as connection interruptions, connection reinstatements, etc.
  • Page 51: Configuring The Device

    Spanning Tree 3.5 Configuring the device 3.5 Configuring the device RSTP configures the network topology completely independently. The device with the lowest bridge priority automatically becomes the root bridge. However, to define a specific network structure regardless, you specify a device as the root bridge.
  • Page 52 Spanning Tree 3.5 Configuring the device  Open the dialog. Redundancy:Spanning Tree:Global  Activate the function. Figure 26: Switching the function on  Click on "Set" to save the changes. Switch to the privileged EXEC mode. enable Switch to the Configuration mode. configure Switches Spanning Tree on.
  • Page 53 Spanning Tree 3.5 Configuring the device  Now connect the redundant lines.  Define the settings for the device that takes over the role of the root bridge.  In the "Priority" field you enter a numerically lower value. The root bridge receives the numerically lowest bridge priority of all the devices in the network.
  • Page 54 Spanning Tree 3.5 Configuring the device After saving, the dialog shows the following information: – The "Bridge is Root" checkbox is selected. – The "Root Port" field shows the value 0.0. – The "Root Path Cost" field shows the value 0. Figure 28: Device is operating as root bridge Displays the parameters for checking.
  • Page 55 Spanning Tree 3.5 Configuring the device  If applicable, change the values in the "Forward Delay" and "Max Age" fields. – The root bridge transmits the changed values to the other devices. Figure 29: Changing Forward Delay and Max Age ...
  • Page 56 Spanning Tree 3.5 Configuring the device  Check the following values in the other devices: – Bridge ID (bridge priority and MAC address) of the corresponding device and the root bridge. – Number of the device port that leads to the root bridge. –...
  • Page 57: Guards

    Spanning Tree 3.6 Guards 3.6 Guards The device allows you to activate various protection functions (guards) on the device ports. The following protection functions help protect your network from incorrect configurations, loops and attacks with STP-BPDUs:  BPDU Guard – for manually defined terminal device ports (edge ports) You activate this protection function globally in the device.
  • Page 58 Spanning Tree 3.6 Guards  Root Guard – for designated ports You activate this protection function separately for every device port. If a designated port receives an STP-BPDU with better path information to the root bridge, the device discards the STP-BPDU and sets the transmission state of the port to discarding instead of root.
  • Page 59 Spanning Tree 3.6 Guards  TCN Guard – for ports that receive STP-BPDUs with a Topology Change flag You activate this protection function separately for every device port. Hacker If the protection function is activated, the device ignores Topology Change flags in received STP-BPDUs. This does not change the content of the address table (FDB) of the device port.
  • Page 60 Spanning Tree 3.6 Guards  Loop Guard – for root, alternate and backup ports You activate this protection function separately for every device port. This protection function prevents the transmission status of a port from unintentionally being changed to forwarding if the port does not receive any more STP-BPDUs.
  • Page 61: Activating The Bpdu Guard

    Spanning Tree 3.6 Guards 3.6.1 Activating the BPDU Guard  Open the dialog. Redundancy:Spanning Tree:Global  Select the "BPDU Guard" checkbox. Figure 31: Activating the BPDU Guard  Click on “Set” to save the changes. Switch to the privileged EXEC mode. enable Switch to the Configuration mode.
  • Page 62 Spanning Tree 3.6 Guards  Open the dialog. Redundancy:Spanning Tree:Port  Switch to the "CIST" tab.  For terminal device ports, select the checkbox in the "Admin Edge Port" column. Figure 32: Port dialog, "CIST" tab  Click on “Set” to save the changes. Switches to the interface mode.
  • Page 63 Spanning Tree 3.6 Guards If an edge port receives an STP-BPDU, the device behaves as follows:  The device deactivates this port. In the dialog, the checkbox Basic Configuration:Port Configuration in the "Port on" column is not selected for this port. ...
  • Page 64: Activating Root Guard / Tcn Guard / Loop Guard

    Spanning Tree 3.6 Guards 3.6.2 Activating Root Guard / TCN Guard / Loop Guard  Open the dialog. Redundancy:Spanning Tree:Port  Switch to the "Guards" tab.  For designated ports, select the checkbox in the "Root Guard" column.  For ports that receive STP-BPDUs with a Topology Change flag, select the checkbox in the "TCN Guard"...
  • Page 65 Spanning Tree 3.6 Guards Switch to the privileged EXEC mode. enable Switch to the Configuration mode. configure Switches to the interface mode. interface x/y Switches the Root Guard on at the designated spanning-tree guard-root port. Switches on the TCN Guard on the port that spanning-tree guard-tcn receives STP-BPDUs with a Topology Change flag.
  • Page 66: A Readers' Comments

    Readers’ Comments A Readers’ Comments What is your opinion of this manual? We are always striving to provide as comprehensive a description of our product as possible, as well as important information that will ensure trouble-free operation. Your comments and suggestions help us to further improve the quality of our documentation.
  • Page 67 Readers’ Comments Suggestions for improvement and additional information: General comments: Sender: Company / Department: Name / Telephone no.: Street: Zip code / City: e-mail: Date / Signature: Dear User, Please fill out and return this page  as a fax to the number +49 (0)7127 14-1600 or ...
  • Page 68 Readers’ Comments UM RedundConfig RSPL Release 2.0 02/2013...
  • Page 69: B Index

    Index B Index Port-State Advanced Mode 16, 18 Protection functions (guards) Alternate port 46, 60 Rapid Spanning Tree 10, 11, 12, 45 Backup port 46, 60 Reconfiguration BPDU Reconfiguration time (MRP) BPDU guard 57, 61 Redundancy Bridge Identifier Redundant connections Bridge Protocol Data Unit Ring Ring manager...
  • Page 70 Index UM RedundConfig RSPL Release 2.0 02/2013...
  • Page 71: C Further Support

    Contact our support at https://hirschmann-support.belden.eu.com You can contact us in the EMEA region at  Tel.: +49 (0)1805 14-1538  E-mail: hac.support@belden.com in the America region at  Tel.: +1 (717) 217-2270  E-mail: inet-support.us@belden.com in the Asia-Pacific region at ...
  • Page 72 Further Support With the Hirschmann Competence Center, you have decided against making any compromises. Our client-customized package leaves you free to choose the service components you want to use. Internet: http://www.hicomcenter.com UM RedundConfig RSPL Release 2.0 02/2013...
  • Page 73 Further Support UM RedundConfig RSPL Release 2.0 02/2013...

Table of Contents