Summary of Contents for Cabletron Systems SMARTSWITCH ROUTER 9032578-05
Page 1
SmartSwitch Router User Reference Manual 9032578-05...
Page 2
Printed in the United States of America Changes Cabletron Systems, Inc., reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult Cabletron Systems, Inc., to determine whether any such changes have been made.
Regulatory Compliance Information Regulatory Compliance Information This product complies with the following: Safety UL 1950; CSA C22.2, No. 950; 73/23/EEC; EN 60950; IEC 950 Electromagnetic FCC Part 15; CSA C108.8; 89/336/EEC; EN 55022; EN 61000-3-2 Compatibility (EMC) EN 61000-3-3; EN 50082-1, AS/NZS 3548; VCCI V-3 Regulatory Compliance Statements FCC Compliance Statement This device complies with Part 15 of the FCC rules.
Regulatory Compliance Statements Industry Canada Compliance Statement This digital apparatus does not exceed the Class A limits for radio noise emissions from digital apparatus set out in the Radio Interference Regulations of the Canadian Department of Communications. Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de la class A prescrites dans le Règlement sur le brouillage radioélectrique édicté...
Safety Information: Class 1 Laser Transceivers This product may use Class 1 laser transceivers. Read the following safety information before installing or operating this product. The Class 1 laser transceivers use an optical feedback loop to maintain Class 1 operation limits. This control loop eliminates the need for maintenance checks or adjustments.
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems, Inc. (“Cabletron”) that sets forth your rights and obligations with respect to the Cabletron software program (“Program”) in the package.
Page 7
EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, OR IN THE DURATION OR LIMITATION OF IMPLIED WARRANTIES IN SOME INSTANCES, THE ABOVE LIMITATION AND EXCLUSIONS MAY NOT APPLY TO YOU. SmartSwitch Router User Reference Manual Cabletron Systems, Inc. Program License Agreement...
Page 8
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems Sales and Service, Inc. (“Cabletron”) that sets forth your rights and obligations with respect to the Cabletron software program (“Program”) in the package.
Page 9
ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, OR IN THE DURATION OR LIMITATION OF IMPLIED WARRANTIES IN SOME INSTANCES, THE ABOVE LIMITATION AND EXCLUSIONS MAY NOT APPLY TO YOU. SmartSwitch Router User Reference Manual Cabletron Systems Sales and Service, Inc. Program License Agreement...
Page 10
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems Limited (“Cabletron”) that sets forth your rights and obligations with respect to the Cabletron software program (“Program”) in the package.
Page 11
EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, OR IN THE DURATION OR LIMITATION OF IMPLIED WARRANTIES IN SOME INSTANCES, THE ABOVE LIMITATION AND EXCLUSIONS MAY NOT APPLY TO YOU. SmartSwitch Router User Reference Manual Cabletron Systems Limited Program License Agreement...
Mr. Ronald Fotino Full Name Principal Compliance Engineer Title Rochester, NH, USA Location Addendum 89/336/EEC 73/23/EEC Cabletron Systems, Inc. 35 Industrial Way PO Box 5005 Rochester, NH 03867 Mr. J. Solari Cabletron Systems Limited Nexus House, Newbury Business Park London Road, Newbury...
About This Manual ... 1 Related Documentation..1 Document Conventions...1 Chapter 1: Introduction ... 3 Configuration Files ..3 Using the Command Line Interface ...4 Command Modes...4 User Mode...4 Enable Mode...4 Configure Mode ...5 Boot PROM Mode...5 Getting Help with CLI Commands ...5 Line Editing Commands ...7 Displaying and Changing Configuration Information...9 Port Names...
Page 14
Contents MAC-address-based VLANs... 23 Protocol-based VLANs... 23 Subnet-based VLANs ... 23 Multicast-based VLANs... 24 Policy-based VLANs ... 24 SSR VLAN Support... 24 VLANs and the SSR... 24 Ports, VLANs, and L3 Interfaces ... 25 Access Ports and Trunk Ports (802.1Q support)... 25 Explicit and Implicit VLANs...
Page 15
Enabling Cell Scrambling ...45 Cell Mapping ...46 Selecting the Cell Mapping Format...46 Creating a Non-Zero VPI ...47 Setting the Bit Allocation for VPI...47 Displaying ATM Port Information ...48 ATM Sample Configuration 1 ...52 Configuring an Interface on an Ethernet Port ...53 Creating a Virtual Channel...53 Defining an ATM Service Class ...53 Applying an ATM Service Class...54...
Page 19
Importing a Selected Subset of Routes from All RIP Peers Accessible Over Example 2: Importing from OSPF ...184 Importing a Selected Subset of OSPF-ASE Routes ...186 Examples of Export Policies ...187 Example 1: Exporting to RIP ...187 Exporting a Given Static Route to All RIP Interfaces ...188 Exporting a Given Static Route to a Specific RIP Interface ...189 Exporting All Static Routes Reachable Over a Given Interface to a Specific Exporting Aggregate-Routes into RIP ...191...
Page 21
Virtual IP Address Ranges ...242 Session and Netmask Persistence...243 Web Caching...244 Configuring Web Caching ...244 Creating the Cache Group...244 Specifying the Client(s) for the Cache Group (Optional)...245 Redirecting HTTP Traffic on an Interface ...245 Configuration Example ...246 Other Configurations ...246 Bypassing Cache Servers ...246 Proxy Server Redundancy ...247 Distributing Frequently-Accessed Sites Across Cache Servers...247...
Page 22
Contents Editing ACLs Offline ... 264 Maintaining ACLs Using the ACL Editor ... 265 Using ACLs ... 266 Applying ACLs to Interfaces... 266 Applying ACLs to Services... 267 Applying ACLs to Layer-4 Bridging Ports... 267 Using ACLs as Profiles ... 268 Using Profile ACLs with the IP Policy Facility...
Page 23
Layer-2 and Layer-3 & Layer-4 Flow Specification...292 Precedence for Layer-3 Flows ...293 SSR Queuing Policies...293 Traffic Prioritization for Layer-2 Flows ...293 Configuring Layer-2 QoS...294 802.1p Priority Mapping ...294 Creating and Applying a New Priority Map...295 Removing or Disabling Per-Port Priority Map...295 Displaying Priority Map Information...296 Traffic Prioritization for Layer-3 &...
Page 25
Defining the Type and Location of a PPP Interface ...346 Setting up a PPP Service Profile...346 Applying a Service Profile to an Active PPP Port...347 Configuring Multilink PPP Bundles ...347 Compression on MLP Bundles or Links...347 Monitoring PPP WAN Ports...348 PPP Port Configuration ...348 WAN Configuration Examples ...350 Simple Configuration File...350...
Page 26
Contents xxvi SmartSwitch Router User Reference Manual...
About This Manual This manual provides information and procedures for configuring the SmartSwitch Router (SSR) software. If you have not yet installed the SSR, use the instructions in the SmartSwitch Router Getting Started Guide to install the chassis and perform basic setup tasks, then return to this manual for more detailed configuration information.
Page 28
Preface Convention [x] or [<italics>] or [x <italics>] x|y|z|<italics> or [x|y|z|<italics>] {x|y|z|<italics>} Description Keywords and arguments within a set of square brackets are optional. Keywords or arguments separated by vertical bars indicate a choice. Select one keyword or argument. Braces group required choices. Select one keyword or argument.
This chapter provides information that you need to know before configuring the SmartSwitch Router (SSR). If you have not yet installed the SSR, use the instructions in the SmartSwitch Router Getting Started Guide to install the chassis and perform basic setup tasks, then return to this manual for more detailed configuration information.
Chapter 1: Introduction Using the Command Line Interface Note: The SSR provides both a graphical user interface (CoreWatch) and a command line interface (CLI) to configure and manage the SSR. In this manual, example configurations show how to use the CLI commands to configure the SSR. Using CoreWatch is described in the CoreWatch User’s Manual.
(PROM) mode. You should then reboot the SSR (enter the command reboot at the boot PROM prompt) to restart the system. If the system fails to reboot successfully, please call Cabletron Systems Technical Support to resolve the problem.
Page 32
Chapter 1: Introduction you are. For example, if you are at the User mode prompt, enter a question mark (?) as shown in the following example to list the commands available in User mode: ssr> ? aging dvmrp enable exit file help igmp...
without typing the subsystem name in each time. For example, if you are configuring several entries for the IP routing table, you can simply enter ip at the CLI Configure prompt. The prompt changes to indicate that the context for the commands to be entered has changed to that of the IP subsystem.
Page 34
Chapter 1: Introduction Table 1. CLI Line Editing Commands Command Ctrl-k Kill line from cursor to end of line Ctrl-l Refresh current line Ctrl-m Carriage return (executes command) Ctrl-n Next command from history buffer Ctrl-o None Ctrl-p Previous command from history buffer Ctrl-q None Ctrl-r...
Table 1. CLI Line Editing Commands Command “<string>” Opaque strings may be specified using double quotes. This prevents interpretation of otherwise special CLI characters. Displaying and Changing Configuration Information The SSR provides many commands for displaying and changing configuration information. For example, the CLI allows for the “disabling” of a command in the active configuration.
Page 36
Chapter 1: Introduction Table 2. Commands to Display and Change Configuration Information Erase commands in scratchpad. Erase startup configuration. Negate one or more commands by line numbers. Negate commands that match a specified command string. Save scratchpad to active configuration. Save active configuration to startup.
Port Names The term port refers to a physical connector on a line card installed in the SSR. The figure below shows eight 10 Base-T/100 Base-TX ports on a line card. SSR-HTX12-08 Offline Online 10 BASE-T/100 BASE-TX ports Each port in the SSR is referred to in the following manner: <type>.<slot-number>.<port-number>...
Page 38
Chapter 1: Introduction Table 3. Port Numbers for Line Cards Line Card 1000 Base LLX Quad Serial WAN HSSI WAN SONET (OC-3c) SONET (OC-12c) ATM (OC-3) 16-slot 100 Base TX For example, the port name et.2.8 refers to the port on the Ethernet line card located in slot 2, connector 8, while the port name gi.3.2 refers to the port on the Gigabit Ethernet line card located in slot 3, connector 2.
Hot Swapping Overview This chapter describes the hot swapping functionality of the SSR. Hot swapping is the ability to replace a line card or Control Module while the SSR is operating. Hot swapping allows you to remove or install line cards without switching off or rebooting the SSR. Swapped-in line cards are recognized by the SSR and begin functioning immediately after they are installed.
Chapter 2: Hot Swapping Line Cards and Control Modules Hot Swapping Line Cards The procedure for hot swapping a line card consists of deactivating the line card, removing it from its slot in the SSR chassis, and installing a new line card in the slot. Deactivating the Line Card To deactivate the line card, do one of the following: •...
Removing the Line Card To remove a line card from the SSR: Make sure the Offline LED on the line card is lit. : Do not remove the line card unless the Offline LED is lit. Doing so can cause the Warning SSR to crash.
Chapter 2: Hot Swapping Line Cards and Control Modules Hot Swapping a Secondary Control Module If you have a secondary Control Module installed on the SSR, you can hot swap it with another Control Module or line card. : You can only hot swap an inactive Control Module. You should never remove the Warning active Control Module from the SSR.
You can also use the system hotswap out command in the CLI to deactivate the Control Module. For example, to deactivate the secondary Control Module in slot CM/1, enter the following command in Enable mode: ssr# system hotswap out slot 1 After you enter this command, the Offline LED on the Control Module lights, and messages appear on the console indicating the Control Module is inoperative.
Chapter 2: Hot Swapping Line Cards and Control Modules Hot Swapping a Switching Fabric Module (SSR 8600 only) The SSR 8600 has slots for two Switching Fabric Modules. While the SSR 8600 is operating, you can install a second Switching Fabric Module. If two Switching Fabric Modules are installed, you can hot swap one of them.
Removing the Switching Fabric Module To remove the Switching Fabric Module: Loosen the captive screws on each side of the Switching Fabric Module. Pull the metal tabs on the Switching Fabric Module to free it from the connectors holding it in place in the chassis. Carefully remove the Switching Fabric Module from its slot.
Page 46
Chapter 2: Hot Swapping Line Cards and Control Modules SmartSwitch Router User Reference Manual...
Bridging Overview The SmartSwitch Router provides the following bridging functions: • Compliance with the IEEE 802.1d standard • Compliance with the IGMP multicast bridging standard • Wire-speed address-based bridging or flow-based bridging • Ability to logically segment a transparently bridged network into virtual local-area networks (VLANs), based on physical ports or protocol (IP or IPX or bridged protocols like Appletalk) •...
Chapter 3: Bridging Configuration Guide Bridging Modes (Flow-Based and Address-Based) The SSR provides the following types of wire-speed bridging: Address-based bridging - The SSR performs this type of bridging by looking up the destination address in an L2 lookup table on the line card that receives the bridge packet from the network.
• Multicast based • Policy based Detailed information about these types of VLANs is beyond the scope of this manual. Each type of VLAN is briefly explained in the following subsections. Port-based VLANs Ports of L2 devices (switches, bridges) are assigned to VLANs. Any traffic received by a port is classified as belonging to the VLAN to which the port belongs.
Chapter 3: Bridging Configuration Guide Multicast-based VLANs Multicast-based VLANs are created dynamically for multicast groups. Typically, each multicast group corresponds to a different VLAN. This ensures that multicast frames are received only by those ports that are connected to members of the appropriate multicast group.
the SSR as a result of creating L3 interfaces for IP and/or IPX. However, these implicit VLANs do not need to be created or configured manually. The implicit VLANs created by the SSR are subnet-based VLANs. Most commonly, an SSR is used as a combined switch and router. For example, it may be connected to two subnets S1 and S2.
Chapter 3: Bridging Configuration Guide For example, if port 1 belongs to VLAN IPX_VLAN for IPX, VLAN IP_VLAN for IP and VLAN OTHER_VLAN for any other protocol, then an IP frame received by port 1 is classified as belonging to VLAN IP_VLAN. Trunk ports (802.1Q) are usually used to connect one VLAN-aware switch to another.
Page 53
The corresponding bridge tables for address-based and flow-based bridging are shown below. As shown, the bridge table contains more information on the traffic patterns when flow-based bridging is enabled compared to address-based bridging. Address-Based Bridge Table A (source) B (source) C (destination) With the SSR configured in flow-based bridging mode, the network manager has “per flow”...
Chapter 3: Bridging Configuration Guide Configuring Spanning Tree Note: Some commands in this facility require updated SSR hardware. Please refer to Appendix A The SSR supports per VLAN spanning tree. By default, all the VLANs defined belong to the default spanning tree. You can create a separate instance of spanning tree using the following command: Create spanning tree for a VLAN.
Setting the Bridge Priority You can globally configure the priority of an individual bridge when two bridges tie for position as the root bridge, or you can configure the likelihood that a bridge will be selected as the root bridge. The lower the bridge's priority, the more likely the bridge will be selected as the root bridge.
Chapter 3: Bridging Configuration Guide Adjusting Bridge Protocol Data Unit (BPDU) Intervals You can adjust BPDU intervals as described in the following sections: • Adjust the Interval between Hello BPDUs • Define the Forward Delay Interval • Define the Maximum Idle Interval Adjusting the Interval between Hello Times You can specify the interval between hello time.
To change the default interval setting, enter the following command in Configure mode: Change the amount of time a bridge will wait to hear BPDUs from the root bridge for default spanning tree. Change the amount of time a bridge will wait to hear BPDUs from the root bridge for a particular instance of spanning tree.
Chapter 3: Bridging Configuration Guide Configuring VLANs for Bridging The SSR allows you to create VLANs for AppleTalk, DECnet, SNA, and IPv6 traffic as well as for IP and IPX traffic. You can create a VLAN for handling traffic for a single protocol, such as a DECnet VLAN.
Monitoring Bridging The SSR provides display of bridging statistics and configurations contained in the SSR. To display bridging information, enter the following commands in Enable mode. Show IP routing table. Show all MAC addresses currently in the l2 tables. Show l2 table information on a specific port.
Chapter 3: Bridging Configuration Guide Creating a non-IP/non-IPX VLAN In this example, SNA, DECnet, and AppleTalk hosts are connected to et.1.1 and et.2.(1-4). You can associate all the ports containing these hosts to a VLAN called ‘RED’ with the VLAN ID 5. First, create a VLAN named ‘RED’...
Overview This chapter explains how to configure and monitor SmartTRUNKs on the SSR. A SmartTRUNK is Cabletron Systems’ technology for load balancing and load sharing. For a description of the SmartTRUNK commands, see the “smarttrunk commands” section of the SmartSwitch Router Command Line Interface Reference Manual.
Chapter 4: SmartTRUNK Configuration Guide Configuring SmartTRUNKs To create a SmartTRUNK: Create a SmartTRUNK and specify a control protocol for it. Add physical ports to the SmartTRUNK. Specify the policy for distributing traffic across SmartTRUNK ports. This step is optional; by default, the SSR distributes traffic to ports in a round-robin (sequential) manner.
To add ports to a SmartTRUNK, enter the following command in Configure mode:: Create a SmartTRUNK that will be connected to a device that supports the DEC Hunt Group control protocol. Specify Traffic Distribution Policy (Optional) The default policy for distributing traffic across the ports in a SmartTRUNK is “round- robin,”...
Chapter 4: SmartTRUNK Configuration Guide Example Configurations The following shows a network design based on SmartTRUNKs. R1 is an SSR operating as a router, while S1 and S2 are SSRs operating as switches. st.1 Cisco 7500 10.1.1.1/24 10.1.1.2/24 Router to-cisco The following is the configuration for the Cisco 7500 router: interface port-channel 1 ip address 10.1.1.1 255.255.255.0...
Page 65
The following is the SmartTRUNK configuration for the SSR labeled ‘R1’ in the diagram: smarttrunk create st.1 protocol no-protocol smarttrunk create st.2 protocol huntgroup smarttrunk create st.3 protocol huntgroup smarttrunk add ports et.1(1-2) to st.1 smarttrunk add ports et.2(1-2) to st.2 smarttrunk add ports et.3(1-2) to st.3 interface create ip to-cisco address-netmask 10.1.1.2/24 port st.1 interface create ip to-s1 address-netmask 11.1.1.2/24 port st.2...
ATM Configuration ATM Overview This chapter provides an overview of the Asynchronous Transfer Mode (ATM) features available for the SmartSwitch Router. ATM is a cell switching technology used to establish multiple connections over a physical link, and configure each of these connections with its own traffic parameters.
Service Class Definition channel having its own traffic parameters. The name “virtual” implies that the connection is located in silicon instead of a physical wire. Refer to Definition” on page 43 virtual channel. Creating a Virtual Channel To create a virtual channel, enter the following command in Configure mode: Creates a virtual channel.
Creating a Service Class Definition To create a service class definition, enter the following command in Configure mode: Creates a service class definition. The following is a description of the parameters used to create a service class definition: service <string> Specifies a name for the service class definition. The maximum length is 32 characters.
Service Class Definition cells/sec). This is the same as PCR, but is expressed in kbits/sec, and therefore may be a more convenient form. However, since the natural unit for ATM is cells/sec, there may be a difference in the actual rate because the kbit/sec value may not be an integral number of cells.
port <port list> Specifies the port, in the format: media.slot.port.vpi.vci media Specifies the media type. This is at for ATM ports. slot Specifies the slot number where the module is installed. port Specifies the port number. Specifies the Virtual Path Identifier. This parameter identifies the virtual path.
Cell Mapping The following is a description of the parameters used to enable cell scrambling: port <port list> Specifies the port, in the format: media.slot.port. Specify all-ports to enable cell scrambling on all ports. media Specifies the media type. This is at for ATM ports. Specifies the slot number where the module is installed.
Creating a Non-Zero VPI The Virtual Path Identifier defines a virtual path, a grouping of virtual channels transmitting across the same physical connection. The actual number of virtual paths and virtual channels available on an ATM port depends upon how many bits are allocated for the VPI and VCI, respectively.
Displaying ATM Port Information Displaying ATM Port Information There are a variety of ATM statistics that can be accessed through the command line interface. The atm show commands can only be used in Enable mode. To display information about the VPL configurations on an ATM port: Displays the VPL configurations on an ATM port.
Page 75
To display information about the service definition on an ATM port: Displays the service definition on an ATM port. The following is an example of the information that is displayed with the command listed above: ssr# atm show service all ubr-default Service Class: Peak Bit Rate:...
Page 76
Displaying ATM Port Information To display information about the port settings on an ATM port: Displays the port setting configurations on an ATM port. The following is an example of the information that is displayed with the command listed above (for a PDH PHY interface): ssr(atm-show)# port-settings at.9.1 Port information for Slot 9, Port 1: Port Type:...
Page 77
• VC Mode • Service Definition The following is an example of the information that is displayed with the command listed above (for a SONET PHY interface): ssr(atm-show)# port-settings at.8.1 Port information for Slot 8, Port 1: Port Type: Xmt Clock Source: VC Mode: Service Definition: ubr-default Service Class:...
ATM Sample Configuration 1 ATM Sample Configuration 1 Consider the following network configuration: SSR 1 at.1.1 et.2.1 11.1.1.1/24 VLAN A Subnet 11.1.1.0 The network shown consists of two SmartSwitch Routers, VLAN A, and VLAN B. Both SSRs have an ATM module with two ATM ports. Also both SSRs contain a 10/100 TX Ethernet module.
Configuring an Interface on an Ethernet Port There are two separate VLANs in this network, VLAN A and VLAN B. VLAN A is connected to Ethernet port et.2.1 on SSR1, and VLAN B is connected to Ethernet port et.1.1 on SSRSSR2. Apply an interface on both Ethernet ports.
ATM Sample Configuration 1 Applying an ATM Service Class After defining a service class on SSR1 and SSR2, apply them to the VC connection we created earlier. The following command line applies the service class ‘cbr1m’ to the VC (vpi=0, vci=100) on ATM port at.1.1 of SSR1: ssr1(config)# atm apply service cbr1m port at.1.1.0.100 The following command line applies the service class ‘cbr1m’...
Page 81
Creating an IP route allows the interfaces on the ATM ports to act as gateways to any subnet. Traffic from VLAN A reaches the Ethernet port on SSR1 and is automatically directed to the gateway address (interface on the ATM port for SSR2). Then the traffic travels through the VC and arrives at the Ethernet port connected to VLAN B.
Packet-over-SONET Overview This chapter explains how to configure and monitor packet-over-SONET (PoS) on the SSR. See the sonet commands section of the SmartSwitch Router Command Line Interface Reference Manual for a description of each command. PoS requires installation of the OC-3c or OC-12c PoS line cards in an SSR 8000 or an SSR 8600.
Chapter 6: Packet-over-SONET Configuration Guide Configuring IP Interfaces for PoS Links Configuring IP interfaces for PoS links is generally the same as for WANs and for LANs. You assign an IP address to each interface and define routing mechanisms such as OSPF or RIP as with any IP network.
Create a point-to-point interface with the interface create command, specifying the IP address and netmask for the interface on the SSR and the peer address of the other end of the connection: interface create ip pos11 address-netmask 20.11.11.20/24 peer-address 20.11.11.21 port so.13.1 When you create the point-to-point interface as shown above, the SSR creates an implicit VLAN called “SYS_L3_<interface-name>.”...
Chapter 6: Packet-over-SONET Configuration Guide Note: In APS terminology, bridge means to transmit identical traffic on both the working and protecting lines, while switch means to select traffic from either the protecting line or the working line. • Unidirectional switching, where one set of line terminating equipment (LTE) can switch the line independent of the other LTE.
To manage the working and protecting PoS interfaces, enter the following commands in Configure mode: Prevent a working interface from switching to a protecting port. This command can only be applied to a port configured as a protecting port. Force a switch to the specified port. This command can be applied to either the working or protecting port.
Chapter 6: Packet-over-SONET Configuration Guide • Signal failure BER threshold of 10 failure is associated with a “hard” failure. Signal fail is determined when any of the following conditions are detected: loss of signal (LOS), loss of frame (LOF), line alarm indication bridge and selector signal (AIS-L), or the BER threshold exceeds the configured rate.
Example Configurations This section shows example configurations for PoS links. APS PoS Links Between SSRs The following example shows APS PoS links between two SSRs, router A and router B. Router so.7.1 so.7.2 The following is the configuration for router A: interface create ip pos21 address-netmask 20.11.11.21/24 peer-address 20.11.11.20 type point-to-point port so.7.1 sonet set so.7.1 protection 1+1 protected-by so.7.2...
Chapter 6: Packet-over-SONET Configuration Guide PoS Link Between the SSR and a Cisco Router The following example shows a PoS link between an SSR, router A, and a Cisco 12000 series Gigabit Switch Router, router B. The MTU on both routers is configured for same size of 9216 octets.
Bridging and Routing Traffic Over a PoS Link The following example shows how to configure a VLAN ‘v1’ that includes the PoS ports on two connected SSRs, router A and router B. Bridged or routed traffic is transmitted over the PoS link. Router int1 1.1.1.1/8...
DHCP Overview The Dynamic Host Configuration Protocol (DHCP) server on the SSR provides dynamic address assignment and configuration to DHCP capable end-user systems, such as Windows 95/98/NT and Apple Macintosh systems. You can configure the server to provide a dynamic IP address from a pre-allocated pool of IP addresses or a static IP address.
Chapter 7: DHCP Configuration Guide Configuring DHCP By default, the DHCP server is not enabled on the SSR. You can selectively enable DHCP service on particular interfaces and not others. To enable DHCP service on an interface, you must first define a DHCP scope. A scope consists of a pool of IP addresses and a set of parameters for a DHCP client.
Table 5. Client Parameters Parameter netbios-name-server netbios-node-type netbios-scope To define the parameters that the DHCP server gives the clients, enter the following command in Configure mode: Define client parameters. Configuring a Static IP Address To define a static IP address that the DHCP server can assign to a client with a specific MAC address, enter the following command in Configure mode: Define static IP address for a particular MAC address.
Chapter 7: DHCP Configuration Guide Configuring DHCP Server Parameters You can configure several “global” parameters that affect the behavior of the DHCP server itself. To configure global DHCP server parameters, enter the following commands in Configure mode: Specify a remote location to back up the lease database.
DHCP Configuration Examples The following configuration describes DHCP configuration for a simple network with just one interface on which DHCP service is enabled to provide both dynamic and static IP addresses. Create an IP VLAN called ‘client_vlan’. vlan create client_vlan ip Add all Fast Ethernet ports in the SSR to the VLAN ‘client_vlan’.
Chapter 7: DHCP Configuration Guide Specify a remote lease database on the TFTP server 10.1.89.88. dhcp global set lease-database tftp://10.1.89.88/lease.db 10. Specify a database update interval of every 15 minutes. dhcp global set commit-interval 15 Configuring Secondary Subnets In some network environments, multiple logical subnets can be imposed on a single physical segment.
Include ‘scope2’ in the superscope ‘super1’. dhcp scope2 attach superscope super1 Since there are multiple pools of IP addresses, the pool associated with ‘scope1’ is used first since ‘scope1’ is applied to the interface before ‘scope2’. Clients that are given an address from ‘scope1’...
Chapter 7: DHCP Configuration Guide Define the address pool for ‘scope2’. dhcp scope2 define pool 10.2.1.40-10.2.1.50 Create a superscope ‘super1’ that includes ‘scope1’. dhcp scope1 attach superscope super1 Include ‘scope2’ in the superscope ‘super1’. dhcp scope2 attach superscope super1 For clients on the secondary subnet, the default gateway is 10.2.1.1, which is also the secondary address for the interface ‘clients’.
Page 101
Chapter 7: DHCP Configuration Guide Define the address pool for ‘scope1’. dhcp scope1 define pool 10.5.1.10-10.5.1.20 SmartSwitch Router User Reference Manual...
The SSR supports standards-based TCP, UDP, and IP. This chapter describes how to configure IP interfaces and general non-protocol-specific routing parameters. IP Routing Protocols The SSR supports standards-based unicast and multicast routing. Unicast routing protocol support includes Interior Gateway Protocols and Exterior Gateway Protocols. Multicast routing protocols are used to determine how multicast data is transferred in a routed environment.
Chapter 8: IP Routing Configuration Guide Exterior Gateway Protocols are used to transfer information between different “autonomous systems”. The SSR supports the following Exterior Gateway Protocol: • Border Gateway Protocol (BGP) Version 3, 4 (RFC 1267, 1771). Configuring BGP for the SSR is described in Multicast Routing Protocols IP multicasting allows a host to send traffic to a subset of all hosts.
Configuring IP Interfaces to Ports You can configure an IP interface directly to a physical port. Each port can be assigned multiple IP addresses representing multiple subnets connected to the physical port. For example, to assign an IP interface ‘RED’ to physical port et.3.4, enter the following: ssr(config)# interface create ip RED address-netmask 10.50.0.0/255.255.0.0 port et.3.4 To configure a secondary address of 10.23.4.36 with a 24-bit netmask (255.255.255.0) on the...
Chapter 8: IP Routing Configuration Guide Configuring Jumbo Frames Certain SSR line cards support jumbo frames (frames larger than the standard Ethernet frame size of 1518 bytes). See on line cards. To transmit frames of up to 65535 octets, you increase the maximum transmission unit (MTU) size from the default of 1500.
Configuring Address Resolution Protocol (ARP) The SSR allows you to configure Address Resolution Protocol (ARP) table entries and parameters. ARP is used to associate IP addresses with media or MAC addresses. Taking an IP address as input, ARP determines the associated MAC address. Once a media or MAC address is determined, the IP address/media address association is stored in an ARP cache for rapid retrieval.
Chapter 8: IP Routing Configuration Guide When you enable packets to be dropped for hosts with unresolved MAC addresses, the SSR will still attempt to periodically resolve these MAC addresses. By default, the SSR sends ARP requests at 30-second intervals to try to resolve up to 50 dropped entries. To change the interval for sending ARP requests for unresolved entries to 45 seconds: ssr# arp set unresolve-timer 45 To change the number of unresolved entries that the SSR attempts to resolve to 75:...
Specifying IP Interfaces for RARP The rarpd set interface command allows you to specify which interfaces the SSR’s RARP server responds to when sent RARP requests. You can specify individual interfaces or all interfaces. To cause the SSR’s RARP server to respond to RARP requests from interface int1: ssr(config)# rarpd set interface int1 Defining MAC-to-IP Address Mappings...
Chapter 8: IP Routing Configuration Guide Monitoring RARP You can use the following commands to obtain information about the SSR’s RARP configuration: Display the interfaces to which the RARP server responds. Display the existing MAC-to-IP address mappings Display RARP statistics. Configuring DNS Parameters The SSR can be configured to specify DNS servers, which supply name services for DNS requests.
• BOOTP/DHCP (port 67 and 68) • DNS (port 37) • NetBIOS Name Server (port 137) • NetBIOS Datagram Server (port 138) • TACACS Server (port 49) • Time Service (port 37) To forward UDP broadcast packets received on interface int1 to the host 10.1.4.5 for the six default UDP services: ssr(config)# ip helper-address interface int1 10.1.4.5 To forward UDP broadcast packets received on interface int2 to the host 10.2.48.8 for...
Chapter 8: IP Routing Configuration Guide Configuring Denial of Service (DOS) By default, the SSR installs flows in the hardware so that packets sent as directed broadcasts are dropped in hardware, if directed broadcast is not enabled on the interface where the packet is received.
The following example displays the contents of the routing table. It shows that some of the route entries are for locally connected interfaces (“directly connected”), while some of the other routes are learned from RIP. ssr# ip show routes Destination ----------- 10.1.0.0/16 10.2.0.0/16...
Page 114
Chapter 8: IP Routing Configuration Guide To start router discovery on the SSR, enter the following command in Configure mode: ssr(config)# rdisc start The rdisc start command lets you start router discovery on the SSR. When router discovery is started, the SSR multicasts or broadcasts periodic router advertisements on each configured interface.
Page 115
To display router discovery information: ssr# rdisc show all Task State: <Foreground NoResolv NoDetach> Send buffer size 2048 at 812C68F8 Recv buffer size 2048 at 812C60D0 Timers: RouterDiscoveryServer Priority 30 RouterDiscoveryServer_SSR2_SSR3_IP <OneShot> last: 10:17:21 next: 10:25:05 Task RouterDiscoveryServer: Interfaces: Interface SSR2_SSR3_IP: Group 224.0.0.1: Interface policy: Interface SSR2_SSR3_IP* MaxAdvInt 10:00...
Chapter 8: IP Routing Configuration Guide Configuration Examples Assigning IP/IPX Interfaces To enable routing on the SSR, you must assign an IP or IPX interface to a VLAN. To assign an IP or IPX interface named ‘RED’ to the ‘BLUE’ VLAN, enter the following command: ssr(config)# interface create ip RED address-netmask 10.50.0.1/255.255.0.0 vlan BLUE You can also assign an IP or IPX interface directly to a physical port.
VRRP Overview This chapter explains how to set up and monitor the Virtual Router Redundancy Protocol (VRRP) on the SSR. VRRP is defined in RFC 2338. End host systems on a LAN are often configured to send packets to a statically configured default router.
Chapter 9: VRRP Configuration Guide Basic VRRP Configuration Figure 5 shows a basic VRRP configuration with a single virtual router. Routers R1 and R2 are both configured with one virtual router ( Router R2 serves as the Backup. The four end hosts are configured to use 10.0.0.1/16 as the default route.
In VRRP, the router that owns the IP address associated with the virtual router is the Master. Any other routers that participate in this virtual router are Backups. In this configuration, Router R1 is the Master for virtual router 10.0.0.1/16, the IP address associated with virtual router Configuration for Router R2 The following is the configuration file for Router R2 in 1: interface create ip test address-netmask 10.0.0.2/16 port et.1.1...
Chapter 9: VRRP Configuration Guide Master for VRID=1 Backup for VRID=2 Interface Addr. = 10.0.0.1/16 VRID=1; Addr. = 10.0.0.1/16 VRID=2; Addr. = 10.0.0.2/16 Default Route = 10.0.0.1/16 In this configuration, half the hosts use 10.0.0.1/16 as their default route, and half use 10.0.0.2/16.
On line 5, Router R1 associates IP address 10.0.0.2/16 with virtual router However, since Router R1 does not own IP address 10.0.0.2/16, it is not the default Master for virtual router VRID=2 Configuration of Router R2 The following is the configuration file for Router R2 in 1: interface create ip test address-netmask 10.0.0.2/16 port et.1.1 2: ip-redundancy create vrrp 1 interface test 3: ip-redundancy create vrrp 2 interface test...
Page 122
Chapter 9: VRRP Configuration Guide Master for VRID=1 1st Backup for VRID=2 1st Backup for VRID=3 VRID=1 10.0.0.1/16 Default Route = 10.0.0.1/16 In this configuration, Router R1 is the Master for virtual router Backup for virtual routers Router R1 would assume the IP addresses associated with virtual routers VRID=3 Router R2 is the Master for virtual router , and the secondary Backup for virtual router...
Configuration of Router R1 The following is the configuration file for Router R1 in 1: interface create ip test address-netmask 10.0.0.1/16 port et.1.1 2: ip-redundancy create vrrp 1 interface test 3: ip-redundancy create vrrp 2 interface test 4: ip-redundancy create vrrp 3 interface test 5: ip-redundancy associate vrrp 1 interface test address 10.0.0.1/16 6: ip-redundancy associate vrrp 2 interface test address 10.0.0.2/16 7: ip-redundancy associate vrrp 3 interface test address 10.0.0.3/16...
Chapter 9: VRRP Configuration Guide The following table shows the priorities for each virtual router configured on Router R1. Virtual Router – IP address=10.0.0.1/16 VRID=1 – IP address=10.0.0.2/16 VRID=2 – IP address=10.0.0.3/16 VRID=3 Configuration of Router R2 The following is the configuration file for Router R2 in 1: interface create ip test address-netmask 10.0.0.2/16 port et.1.1 2: ip-redundancy create vrrp 1 interface test 3: ip-redundancy create vrrp 2 interface test...
Note: Since 100 is the default priority, line 9, which sets the priority to 100, is actually unnecessary. It is included for illustration purposes only. Configuration of Router R3 The following is the configuration file for Router R3 in 1: interface create ip test address-netmask 10.0.0.3/16 port et.1.1 2: ip-redundancy create vrrp 1 interface test 3: ip-redundancy create vrrp 2 interface test 4: ip-redundancy create vrrp 3 interface test...
Chapter 9: VRRP Configuration Guide Setting the Backup Priority As described in “Multi-Backup Configuration” on page router takes over when the Master router goes down by setting the priority for the Backup routers. To set the priority for a Backup router, enter the following command in Configure mode: To specify 200 as the priority used by virtual router 1 on interface int1: ssr(config)# ip-redundancy set vrrp 1 interface int1 priority 200...
Setting an Authentication Key By default, no authentication of VRRP packets is performed on the SSR. You can specify a clear-text password to be used to authenticate VRRP exchanges. To enable authentication, enter the following command in Configure mode To authenticate VRRP exchanges on virtual router 1 on interface int1 with a password of ‘yago’: ssr(config)# ip-redundancy set vrrp 1 interface int1 auth-type text auth-key yago Note:...
Chapter 9: VRRP Configuration Guide ip-redundancy show The ip-redundancy show command reports information about a VRRP configuration. To display information about all virtual routers on interface int1: ssr# ip-redundancy show vrrp interface int1 VRRP Virtual Router 100 - Interface int1 ------------------------------------------ Uptime State...
To display VRRP statistics for virtual router 100 on interface int1: ssr# ip-redundancy show vrrp 1 interface int1 verbose VRRP Virtual Router 100 - Interface int1 ------------------------------------------ Uptime State Priority Virtual MAC address Advertise Interval Preempt Mode Authentication Primary Address Associated Addresses Stats: Number of transitions to master state...
Page 130
Chapter 9: VRRP Configuration Guide The skew-time depends on the Backup router's configured priority: Skew-time = ( (256 - Priority) / 256 ) Therefore, the higher the priority, the faster a Backup router will detect that the Master is down. For example: –...
RIP Overview This chapter describes how to configure the Routing Information Protocol (RIP) on the SmartSwitch Router. RIP is a distance-vector routing protocol for use in small networks. RIP is described in RFC 1723. A router running RIP broadcasts updates at set intervals. Each update contains paired values where each pair consists of an IP network address and an integer distance to that network.
Chapter 10: RIP Configuration Guide Enabling and Disabling RIP To enable or disable RIP, enter one of the following commands in Configure mode. Enable RIP. Disable RIP. Configuring RIP Interfaces To configure RIP in the SSR, you must first add interfaces to inform RIP about attached interfaces.
Page 133
RIP Parameter Authentication Update interval To change RIP parameters, enter the following commands in Configure mode. Set RIP Version on an interface to RIP V1. Set RIP Version on an interface to RIP V2. Specify that RIP V2 packets should be multicast on this interface.
Chapter 10: RIP Configuration Guide Enable acceptance of RIP routes that have a metric of zero. Enable poison revers, as specified by RFC 1058. Configuring RIP Route Preference You can set the preference of routes learned from RIP. To configure RIP route preference, enter the following command in Configure mode. Set the preference of routes learned from RIP.
Show RIP information on the specified interface. Show RIP interface policy information. Show detailed information of all RIP packets. Show detailed information of all packets received by the router. Show detailed information of all packets sent by the router. Show detailed information of all request received by the router.
OSPF Overview Open Shortest Path First Routing (OSPF) is a shortest path first or link-state protocol. The SSR supports OSPF Version 2.0, as defined in RFC 1583. OSPF is an interior gateway protocol that distributes routing information between routers in a single autonomous system.
Chapter 11: OSPF Configuration Guide • Type 1 ASE • Type 2 ASE Intra-area paths have destinations within the same area. Inter-area paths have destinations in other OSPF areas. Both types of Autonomous System External (ASE) routes are routes to destinations external to OSPF (and usually external to the AS). Routes exported into OSPF ASE as type 1 ASE routes are supposed to be from interior gateway protocols (e.g., RIP) whose external metrics are directly comparable to OSPF metrics.
• Add IP interfaces to OSPF areas. • Configure OSPF interface parameters, if necessary. • Add IP networks to OSPF areas. • Create virtual links, if necessary. Enabling OSPF OSPF is disabled by default on the SSR. To enable or disable OSPF, enter one of the following commands in Configure mode. Enable OSPF.
Chapter 11: OSPF Configuration Guide Default Cost of an OSPF Interface The default cost of an OSPF interface is calculated using its bandwidth. A VLAN that is attached to an interface could have several ports of differing speeds. The bandwidth of an interface is represented by the highest bandwidth port that is part of the associated VLAN.
Specify the number of seconds required to transmit a link state update on an OSPF interface. Specify the time a neighbor router will listen for OSPF hello packets before declaring the router down. Disable IP multicast for sending OSPF packets to neighbors on an OSPF interface.
Chapter 11: OSPF Configuration Guide Add a stub host to an OSPF area. Add a network to an OSPF area for summarization. Configuring OSPF Area Parameters The SSR allows configuration of various OSPF area parameters, including stub areas, stub cost and authentication method. Information about routes which are external to the OSPF routing domain is not sent into a stub area.
To configure virtual links, enter the following commands in the Configure mode. Create a virtual link. Set virtual link parameters. Configuring Autonomous System External (ASE) Link Advertisements Because of the nature of OSPF, the rate at which ASEs are flooded may need to be limited. The following parameters can be used to adjust those rate limits.
Chapter 11: OSPF Configuration Guide • Point-to-Point. A point-to-point interface can be a serial line using PPP. By default, an IP interface associated with a serial line that is using PPP is treated as an OSPF point- to-point network. If an IP interface that is using PPP is to be treated as an OSPF broadcast network, then use the type broadcast option of the interface create command.
Page 145
• ospf show commands allow you to display detailed versions of the various OSPF tables. The ospf show commands can only display OSPF tables for the router on which the commands are being entered. To display OSPF information, enter the following commands in Enable mode. Show IP routing table.
Chapter 11: OSPF Configuration Guide Shows information about all valid next hops mostly derived from the SPF calculation. Show OSPF statistics. Shows information about OSPF Border Routes. Show OSPF timers. Show OSPF virtual-links. OSPF Configuration Examples For all examples in this section, refer to the configuration shown in The following configuration commands for router R1: •...
ospf add interface 140.1.3.1 to-area 140.1.0.0 ospf add interface 130.1.1.1 to-area backbone Exporting All Interface & Static Routes to OSPF Router R1 has several static routes. We would export these static routes as type-2 OSPF routes. The interface routes would be redistributed as type-1 OSPF routes. Create a OSPF export destination for type-1 routes since we would like to redistribute certain routes into OSPF as type 1 OSPF-ASE routes.
Page 148
Chapter 11: OSPF Configuration Guide Router R1 would like to redistribute its OSPF, OSPF-ASE, RIP, Static and Interface/Direct routes into RIP. Enable RIP on interface 120.190.1.1/16. rip add interface 120.190.1.1 rip set interface 120.190.1.1 version 2 type multicast Create a OSPF export destination for type-1 routes. ip-router policy create ospf-export-destination ospfExpDstType1 type 1 metric 1 Create a OSPF export destination for type-2 routes.
Page 149
Create a RIP export destination. ip-router policy create rip-export-destination ripExpDst 10. Create OSPF export source. ip-router policy create ospf-export-source ospfExpSrc type OSPF 11. Create OSPF-ASE export source. ip-router policy create ospf-export-source ospfAseExpSrc type OSPF- 12. Create the Export-Policy for redistributing all interface, RIP, static, OSPF and OSPF- ASE routes into RIP.
Page 150
140.1.5/24 140.1.1.2/24 A r e a 140.1.0.0 140.1.4/24 140.1.1.1/24 130.1.1.1/16 140.1.3.1/24 140.1.2.1/24 190.1.1.1/16 120.190.1.1/16 120.190.1.2/16 202.1.2.2/16 160.1.5.2/24 Figure 8. Exporting to OSPF A r e a B a c k b o n e 130.1.1.3/16 160.1.5.2/24 150.20.3.1/16 150.20.3.2/16 A r e a 150.20.0.0...
BGP Overview The Border Gateway Protocol (BGP) is an exterior gateway protocol that allows IP routers to exchange network reachability information. BGP became an internet standard in 1989 (RFC 1105) and the current version, BGP-4, was published in 1994 (RFC 1771). BGP is typically run between Internet Service Providers.
Chapter 12: BGP Configuration Guide The SSR BGP Implementation The SSR routing protocol implementation is based on GateD 4.0.3 code (http://www.gated.org). GateD is a modular software program consisting of core services, a routing database, and protocol modules supporting multiple routing protocols (RIP versions 1 and 2, OSPF version 2, BGP version 2 through 4, and Integrated IS-IS).
Setting the Autonomous System Number An autonomous system number identifies your autonomous system to other routers. To set the SSR’s autonomous system number, enter the following command in Configure mode. Set the SSR’s autonomous system number. The autonomous-system <num1> parameter sets the AS number for the router. Specify a number from 1–65534.
Page 154
Chapter 12: BGP Configuration Guide where: peer-group <number-or-string> Is a group ID, which can be a number or a character string. type Specifies the type of BGP group you are adding. You can specify one of the following: external In the classic external BGP group, full policy checking is applied to all incoming and outgoing advertisements.
Adding and Removing a BGP Peer There are two ways to add BGP peers to peer groups. You can explicitly add a peer host, or you can add a network. Adding a network allows for peer connections from any addresses in the range of network and mask pairs specified in the bgp add network command.
Page 156
Chapter 12: BGP Configuration Guide ( aspath_regexp ) Parentheses group subexpressions. An operator, such as * or ? works on a single element or on a regular expression enclosed in parentheses. An AS-path operator is one of the following: aspath_term {m,n} A regular expression followed by {m,n} (where m and n are both non-negative integers and m <= n) means at least m and at most n repetitions.
AS-Path Regular Expression Examples To import MCI routes with a preference of 165: ip-router policy create bgp-import-source mciRoutes aspath-regular- expression "(.* 3561 .*)" origin any sequence-number 10 ip-router policy import source mciRoutes network all preference 165 To import all routes (.* matches all AS paths) with the default preference: ip-router policy create bgp-import-source allOthers aspath-regular- expression "(.*)"...
Chapter 12: BGP Configuration Guide The following is an example: # insert two instances of the AS when advertising the route to this peer bgp set peer-host 194.178.244.33 group nlnet as-count 2 # insert three instances of the AS when advertising the route to this # peer bgp set peer-host 194.109.86.5 group webnet as-count 3 Notes on Using the AS Path Prepend Feature...
• BGP Multi-Exit Discriminator (MED) attribute • EBGP aggregation • Route reflection BGP Peering Session Example The router process used for a specific BGP peering session is known as a BGP speaker. A single router can have several BGP speakers. Successful BGP peering depends on the establishment of a neighbor relationship between BGP speakers.
Page 160
Chapter 12: BGP Configuration Guide Figure 9 illustrates a sample BGP peering session. AS-1 SSR1 10.0.0.1/16 The CLI configuration for router SSR1 is as follows: interface create ip et.1.1 address-netmask 10.0.0.1/16 port et.1.1 # Set the AS of the router ip-router global set autonomous-system 1 # Set the router ID ip-router global set router-id 10.0.0.1...
The gated.conf file for router SSR1 is as follows: autonomoussystem 1 ; routerid 10.0.0.1 ; bgp yes { The CLI configuration for router SSR2 is as follows: interface create ip et.1.1 address-netmask 10.0.0.2/16 port et.1.1 ip-router global set autonomous-system 2 ip-router global set router-id 10.0.0.2 bgp create peer-group pg2w1 type external autonomous-system 1 bgp add peer-host 10.0.0.1 group pg2w1...
Chapter 12: BGP Configuration Guide An IGP, like OSPF, could possibly be used instead of IBGP to exchange routing information between EBGP speakers within an AS. However, injecting full Internet routes (50,000+ routes) into an IGP puts an expensive burden on the IGP routers. Additionally, IGPs cannot communicate all of the BGP attributes for a given route.
Page 163
Chapter 12: BGP Configuration Guide Figure 10 shows a sample BGP configuration that uses the Routing group type. AS-64801 10.12.1.1/30 10.12.1.6/30 Cisco lo0 172.23.1.25/30 OSPF 10.12.1.5/30 10.12.1.2/30 SSR4 SSR1 IBGP 172.23.1.10/30 172.23.1.5/30 lo0 172.23.1.26/30 SSR6 172.23.1.6/30 172.23.1.9/30 Figure 10. Sample IBGP Configuration (Routing Group Type) SmartSwitch Router User Reference Manual...
Page 164
Chapter 12: BGP Configuration Guide In this example, OSPF is configured as the IGP in the autonomous system. The following lines in the router SSR6 configuration file configure OSPF: # Create a secondary address for the loopback interface interface add ip lo0 address-netmask 172.23.1.26/30 ospf create area backbone ospf add interface to-SSR4 to-area backbone ospf add interface to-SSR1 to-area backbone...
The following lines on the Cisco router set up IBGP peering with router SSR6. router bgp 64801 ! Disable synchronization between BGP and IGP no synchronization neighbor 172.23.1.26 remote-as 64801 ! Allow internal BGP sessions to use any operational interface for TCP ! connections neighbor 172.23.1.26 update-source Loopback0 IBGP Internal Group Example...
Page 166
Chapter 12: BGP Configuration Guide Figure 11 illustrates a sample IBGP Internal group configuration. 16.122.128.8/24 AS-1 16.122.128.1/24 SSR1 17.122.128.1/24 Figure 11. Sample IBGP Configuration (Internal Group Type) The CLI configuration for router SSR1 is as follows: ip-router global set autonomous-system 1 bgp create peer-group int-ibgp-1 type internal autonomous-system 1 bgp add peer-host 16.122.128.2 group int-ibgp-1 bgp add peer-host 16.122.128.8 group int-ibgp-1...
Page 167
The gated.conf file for router SSR1 is as follows: autonomoussystem 1 ; routerid 16.122.128.1 ; bgp yes { traceoptions aspath detail packets detail open detail update ; group type internal peeras 1 The CLI configuration for router SSR2 is as follows: ip-router global set autonomous-system 1 bgp create peer-group int-ibgp-1 type internal autonomous-system 1 bgp add peer-host 16.122.128.1 group int-ibgp-1...
Chapter 12: BGP Configuration Guide The configuration for router C1 (a Cisco router) is as follows: router bgp 1 no synchronization network 16.122.128.0 mask 255.255.255.0 network 17.122.128.0 mask 255.255.255.0 neighbor 16.122.128.1 remote-as 1 neighbor 16.122.128.1 next-hop-self neighbor 16.122.128.1 soft-reconfiguration inbound neighbor 16.122.128.2 remote-as 1 neighbor 16.122.128.2 next-hop-self neighbor 16.122.128.2 soft-reconfiguration inbound...
Page 169
This sample configuration shows External BGP peers, SSR1 and SSR4, which are not connected to the same subnet. AS-64800 SSR1 16.122.128.1/16 Legend: The CLI configuration for router SSR1 is as follows: bgp create peer-group ebgp_multihop autonomous-system 64801 type external bgp add peer-host 18.122.128.2 group ebgp_multihop ! Specify the gateway option, which indicates EBGP multihop.
Page 170
Chapter 12: BGP Configuration Guide The gated.conf file for router SSR1 is as follows: autonomoussystem 64800 ; routerid 0.0.0.1 ; bgp yes { traceoptions state ; group type external peeras 64801 static { 18.122.0.0 masklen 16 The CLI configuration for router SSR2 is as follows: interface create ip to-R1 address-netmask 16.122.128.3/16 port et.1.1 interface create ip to-R3 address-netmask 17.122.128.3/16 port et.1.2 # Static route needed to reach 18.122.0.0/16...
The gated.conf file for router SSR3 is as follows: static { 16.122.0.0 masklen 16 The CLI configuration for router SSR4 is as follows: bgp create peer-group ebgp_multihop autonomous-system 64801 type external bgp add peer-host 18.122.128.2 group ebgp_multihop ! Specify the gateway option, which indicates EBGP multihop. Set the ! gateway option to the address of the router that has a route to the ! peer.
Page 173
AS-64901 AS-64900 100.200.12.20/24 100.200.13.1/24 Figure 13. Sample BGP Configuration (Well-Known Community) The Community attribute can be used in three ways: In a BGP Group statement: Any packets sent to this group of BGP peers will have the communities attribute in the BGP packet modified to be this communities attribute value from this AS.
Page 174
Chapter 12: BGP Configuration Guide Figure 13, router SSR11 has the following configuration: # Create an optional attribute list with identifier color1 for a community # attribute (community-id 160 AS 64901) ip-router policy create optional-attributes-list color1 community-id 160 autonomous-system 64901 # Create an optional attribute list with identifier color2 for a community # attribute (community-id 155 AS 64901) ip-router policy create optional-attributes-list color2 community-id 155...
Page 176
Chapter 12: BGP Configuration Guide Figure 13, router SSR10 has the following configuration: # Create an optional attribute list with identifier color1 for a community # attribute (community-id 160 AS 64902) ip-router policy create optional-attributes-list color1 community-id 160 autonomous-system 64902 # Create an optional attribute list with identifier color2 for a community # attribute (community-id 155 AS 64902) ip-router policy create optional-attributes-list color2 community-id 155...
Page 177
The community attribute may be a single community or a set of communities. A maximum of 10 communities may be specified. The community attribute can take any of the following forms: • Specific community The specific community consists of the combination of the AS-value and community •...
Chapter 12: BGP Configuration Guide Notes on Using Communities When originating BGP communities, the set of communities that is actually sent is the union of the communities received with the route (if any), those specified in group policy (if any), and those specified in export policy (if any). When receiving BGP communities, the update is only matched if all communities specified in the optional-attributes-list option of the ip-router policy create command are present in the BGP update.
Page 179
SSR12. Because local preference is exchanged between the routers within the AS, all traffic from AS 64901 is sent to SSR13 as the exit point. 10.200.12.1/24 SSR10 SSR12 Figure 14. Sample BGP Configuration (Local Preference) The following sections explain how to configure the local preference using the local-pref and the set-pref options.
Chapter 12: BGP Configuration Guide Using the local-pref Option For router SSR12’s CLI configuration file, local-pref is set to 194: bgp set peer-group as901 local-pref 194 For router SSR13, local-pref is set to 204. bgp set peer-group as901 local-pref 204 Using the set-pref Option The formula used to compute the local preference is as follows: Local_Pref = 254 –...
For example, in their CLI configuration files: bgp set peer-group as901 set-pref 100 • The value of the set-pref option should be consistent with the import policy in the network. The metric value should be set high enough to avoid conflicts between BGP routes and IGP or static routes.
Chapter 12: BGP Configuration Guide Routers SSR4 and SSR6 inform router C1 about network 172.16.200.0/24 through External BGP (EBGP). Router SSR6 announced the route with a MED of 10, whereas router SSR4 announces the route with a MED of 20. Of the two EBGP routes, router C1 chooses the one with a smaller MED.
Router SSR8 has the following CLI configuration: interface add ip xleapnl address-netmask 212.19.192.2/24 interface create ip hobbygate address-netmask 212.19.199.62/24 port et.1.2 interface create ip xenosite address-netmask 212.19.198.1/24 port et.1.7 interface add ip lo0 address-netmask 212.19.192.1/30 bgp create peer-group webnet type external autonomous system 64901 bgp add peer-host 194.109.86.5 group webnet # Create an aggregate route for 212.19.192.0/19 with all its subnets as # contributing routes...
Page 184
Chapter 12: BGP Configuration Guide Figure 17 shows a sample configuration that uses route reflection. AS-64900 SSR8 EBGP Peer AS-64901 SSR9 IBGP Cluster Client SSR10 Figure 17. Sample BGP Configuration (Route Reflection) In this example, there are two clusters. Router SSR10 is the route reflector for the first cluster and router SSR11 is the route reflector for the second cluster.
Page 185
Router SSR11 has router SSR12 and router SSR13 as client peers and router SSR10 as non- client peer. The following line in router SSR11’s configuration file specifies it to be a route reflector bgp set peer-group rtr11 reflector-client Even though the IBGP Peers are not fully meshed in AS 64901, the direct routes of router SSR14, that is, 192.68.222.0/24 in AS 64902 (which are redistributed in BGP) do show up in the route table of router SSR8 in AS64900, as shown below: *********************************************...
Chapter 12: BGP Configuration Guide Notes on Using Route Reflection • Two types of route reflection are supported: – By default, all routes received by the route reflector from a client are sent to all internal peers (including the client’s group, but not the client itself). –...
Route Import and Export Policy Overview The SSR family of routers supports extremely flexible routing policies. The SSR allows the network administrator to control import and export of routing information based on criteria including: • Individual protocol • Source and destination autonomous system •...
Chapter 13: Routing Policy Configuration Guide Preference Preference is the value the SSR routing process uses to order preference of routes from one protocol or peer over another. Preference can be set using several different configuration commands. Preference can be set based on one network interface over another, from one protocol over another, or from one remote gateway over another.
Import Policies Import policies control the importation of routes from routing protocols and their installation in the routing databases (Routing Information Base and Forwarding Information Base). Import Policies determine which routes received from other systems are used by the SSR routing process. Every import policy can have up to two components: •...
Chapter 13: Routing Policy Configuration Guide It is only possible to restrict the importation of OSPF ASE routes when functioning as an AS border router. Like the other interior protocols, preference cannot be used to choose between OSPF ASE routes. That is done by the OSPF costs. Route-Filter This component specifies the individual routes which are to be imported or restricted.
The routes to be exported can be identified by their associated attributes: • Their protocol type (RIP, OSPF, BGP, Static, Direct, Aggregate). • Interface or the gateway from which the route was received. • Autonomous system from which the route was learned. •...
Chapter 13: Routing Policy Configuration Guide A route will match the most specific filter that applies. Specifying more than one filter with the same destination, mask, and modifiers generates an error. There are three possible formats for a route filter. Not all of these formats are available in all places.
Route aggregation is also used by regional and national networks to reduce the amount of routing information passed around. With careful allocation of network addresses to clients, regional networks can just announce one route to regional networks instead of hundreds. Aggregate routes are not actually used for packet forwarding by the originator of the aggregate route, but only by the receiver (if it wishes).
Chapter 13: Routing Policy Configuration Guide Route-Filter This component specifies the individual routes that are to be aggregated or summarized. The preference to be associated with these routes can also be explicitly specified using this component. The contributing routes are ordered according to the aggregation preference that applies to them.
Many protocols allow the specification of two authentication keys per interface. Packets are always sent using the primary keys, but received packets are checked with both the primary and secondary keys before being discarded. Authentication Keys and Key Management An authentication key permits the generation and verification of the authentication field in protocol packets.
Chapter 13: Routing Policy Configuration Guide The from-proto parameter specifies the protocol of the source routes. The values for the from-proto parameter can be rip, ospf, bgp, direct, static, aggregate and ospf-ase. The to- proto parameter specifies the destination protocol where the routes are to be exported. The values for the to-proto parameter can be rip, ospf and bgp.
Redistributing RIP into RIP The SSR routing process requires RIP redistribution into RIP if a protocol is redistributed into RIP. To redistribute RIP into RIP, enter the following command in Configure mode: To redistribute RIP into RIP. Redistributing RIP into OSPF RIP routes may be redistributed to OSPF.
Chapter 13: Routing Policy Configuration Guide To redistribute aggregate routes, enter one of the following commands in Configure mode: To redistribute aggregate routes into RIP. To redistribute aggregate routes into OSPF. Simple Route Redistribution Examples Example 1: Redistribution into RIP For all examples given in this section, refer to the configurations shown in page 181.
!++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ! RIP Box Level Configuration !++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ rip start rip set default-metric 2 !++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ! RIP Interface Configuration. Create a RIP interfaces, and set ! their type to (version II, multicast). !++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ rip add interface to-r41 rip add interface to-r42 rip add interface to-r6 rip set interface to-r41 version 2 type multicast rip set interface to-r42 version 2 type multicast...
Chapter 13: Routing Policy Configuration Guide • Specify the static routes configured on the router • Determine its OSPF configuration !++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ! Create the various IP interfaces. !++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ interface create ip to-r2 et.1.2 interface create ip to-r3 interface create ip to-r41 address-netmask interface create ip to-r42 address-netmask interface create ip to-r6 !+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++...
In the configuration shown in Version 2 on network 120.190.0.0/16, connecting routers R1 and R2. Router R1 would like to export all RIP, interface, and static routes to OSPF. ip-router policy redistribute from-proto rip to-proto ospf ip-router policy redistribute from-proto direct to-proto ospf ip-router policy redistribute from-proto static to-proto ospf Router R1 would also like to export interface, static, RIP, OSPF, and OSPF-ASE routes into RIP.
Page 202
Chapter 13: Routing Policy Configuration Guide routes to be exported can be identified by their associated attributes, such as protocol type, interface or the gateway from which the route was received, and so on. • Route Filter - This component provides the means to define a filter for the routes to be distributed.
Creating an Export Destination To create an export destination, enter one the following commands in Configure mode: Create a RIP export destination. Create an OSPF export destination. Creating an Export Source To create an export source, enter one of the following commands in Configure mode: Create a RIP export source.
Chapter 13: Routing Policy Configuration Guide To create route import policies, enter the following command in Configure mode: Create an import policy. The <imp-src-id> is the identifier of the import-source that determines the source of the imported routes. If no routes from a particular source are to be imported, then no additional parameters are required.
Creating an Aggregate Route Route aggregation is a method of generating a more general route, given the presence of a specific route. The routing process does not perform any aggregation unless explicitly requested. Aggregate-routes can be constructed from one or more of the following building blocks: •...
Chapter 13: Routing Policy Configuration Guide The <filter-id> is the identifier of the route-filter associated with this aggregate. If there is more than one route-filter for any aggregate-destination and aggregate-source combination, then the ip-router policy aggr-gen destination <aggr-dest-id> source <aggr- src-id>...
Page 208
Chapter 13: Routing Policy Configuration Guide The following configuration commands for router R1: • Determine the IP address for each interface. • Specify the static routes configured on the router. • Determine its RIP configuration. !++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ! Create the various IP interfaces. !++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ interface create ip to-r2 interface create ip to-r3...
Importing a Selected Subset of Routes from One RIP Trusted Gateway Router R1 has several RIP peers. Router R41 has an interface on the network 10.51.0.0. By default, router R41 advertises network 10.51.0.0/16 in its RIP updates. Router R1 would like to import all routes except the 10.51.0.0/16 route from its peer R41.
Chapter 13: Routing Policy Configuration Guide Example 2: Importing from OSPF Due to the nature of OSPF, only the importation of ASE routes may be controlled. OSPF intra-and inter-area routes are always imported into the SSR routing table with a preference of 10.
Page 211
Figure 19. Exporting to OSPF 140.1.5/24 140.1.1.2/24 A r e a 140.1.0.0 140.1.4/24 140.1.1.1/24 130.1.1.1/16 140.1.3.1/24 140.1.2.1/24 190.1.1.1/16 120.190.1.1/16 120.190.1.2/16 202.1.2.2/16 160.1.5.2/24 A r e a B a c k b o n e 130.1.1.3/16 160.1.5.2/24 150.20.3.1/16 150.20.3.2/16 A r e a 150.20.0.0...
Chapter 13: Routing Policy Configuration Guide The following configuration commands for router R1: • Determine the IP address for each interface • Specify the static routes configured on the router • Determine its OSPF configuration !++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ! Create the various IP interfaces. !++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ interface create ip to-r2 interface create ip to-r3...
Examples of Export Policies Example 1: Exporting to RIP Exporting to RIP is controlled by any of protocol, interface or gateway. If more than one is specified, they are processed from most general (protocol) to most specific (gateway). It is not possible to set metrics for exporting RIP routes into RIP. Attempts to do this are silently ignored.
Create a Direct export source since we would like to export direct/interface routes. ip-router policy create direct-export-source directExpSrc Create the export-policy redistributing the statically created default route, and all (RIP, Direct) routes into RIP. ip-router policy export destination ripExpDst source statExpSrc network default ip-router policy export destination ripExpDst source ripExpSrc network all...
Chapter 13: Routing Policy Configuration Guide Exporting All Static Routes Reachable Over a Given Interface to a Specific RIP- Interface In this case, router R1 would export/redistribute all static routes accessible through its interface 130.1.1.1 to its RIP-interface 140.1.1.1 only. Create a RIP export destination for interface with address 140.1.1.1, since we intend to change the rip export policy for interface 140.1.1.1 ip-router policy create rip-export-destination ripExpDst141...
Exporting Aggregate-Routes into RIP In the configuration shown in Version 1 on network 130.1.0.0/16, connecting routers R1 and R3. Router R1 desires to announce the 140.1.1.0/24 and 140.1.2.0/24 networks to router R3. RIP Version 1 does not carry any information about subnet masks in its packets. Thus it would not be possible to announce the subnets (140.1.1.0/24 and 140.1.2.0/24) into RIP Version 1 without aggregating them.
Chapter 13: Routing Policy Configuration Guide Create the Export-Policy redistributing all (RIP, Direct) routes and the aggregate route 140.1.0.0/16 into RIP. ip-router policy export destination ripExpDst130 source aggrExpSrc network 140.1.0.0/16 ip-router policy export destination ripExpDst130 source ripExpSrc network all ip-router policy export destination ripExpDst130 source directExpSrc network all Example 2: Exporting to OSPF It is not possible to create OSPF intra- or inter-area routes by exporting routes from the...
!++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ! Create the various IP interfaces. !++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ interface create ip to-r2 interface create ip to-r3 interface create ip to-r41 address-netmask interface create ip to-r42 address-netmask interface create ip to-r6 !+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ! Configure default routes to the other subnets reachable through R2. !+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ip add route 202.1.0.0/16 gateway 120.1.1.2 ip add route 160.1.5.0/24 gateway 120.1.1.2...
Chapter 13: Routing Policy Configuration Guide Create a Direct export source since we would like to export interface/direct routes. ip-router policy create direct-export-source directExpSrc Create the Export-Policy for redistributing all interface routes and static routes into OSPF. ip-router policy export destination ospfExpDstType1 source directExpSrc network all ip-router policy export destination ospfExpDstType2 source statExpSrc network all...
Page 221
Create a RIP export source. ip-router policy export destination ripExpDst source ripExpSrc network all Create a Static export source. ip-router policy create static-export-source statExpSrc Create a Direct export source. ip-router policy create direct-export-source directExpSrc Create the Export-Policy for redistributing all interface, RIP and static routes into OSPF.
Page 222
Chapter 13: Routing Policy Configuration Guide 12. Create the Export-Policy for redistributing all interface, RIP, static, OSPF and OSPF- ASE routes into RIP. ip-router policy export destination ripExpDst source statExpSrc network all ip-router policy export destination ripExpDst source ripExpSrc network all ip-router policy export destination ripExpDst source directExpSrc network all ip-router policy export destination ripExpDst source ospfExpSrc...
IP Multicast Overview Multicast routing on the SSR is supported through DVMRP and IGMP. IGMP is used to determine host membership on directly attached subnets. DVMRP is used to determine forwarding of multicast traffic between SSRs. This chapter: • Provides an overview of the SSR’s implementation of the Internet Group Management Protocol (IGMP) •...
Chapter 14: Multicast Routing Configuration Guide The SSR allows per-interface control of the host query interval and response time. Query interval defines the time between IGMP queries. Response time defines the time the SSR will wait for host responses to IGMP queries. The SSR can be configured to deny or accept group membership filters.
Configuring IGMP You configure IGMP on the SSR by performing the following configuration tasks: • Creating IP interfaces • Setting global parameters that will be used for all the interfaces on which DVMRP is enabled • Configuring IGMP on individual interfaces. You do so by enabling and disabling IGMP on interfaces and then setting IGMP parameters on the interfaces on which IGMP is enabled •...
Chapter 14: Multicast Routing Configuration Guide To configure the host response wait time, enter the following command in Configure mode: Configure the IGMP host response wait time. Configuring Per-Interface Control of IGMP Membership You can configure the SSR to control IGMP membership on a per-interface basis. An interface can be configured to be allowed or not allowed membership to a particular group.
• Configuring DVMRP on individual interfaces. You do so by enabling and disabling DVMRP on interfaces and then setting DVMRP parameters on the interfaces on which DVMRP is disabled • Defining DVMRP tunnels, which IP uses to send multicast traffic between two end points Starting and Stopping DVMRP DVMRP is disabled by default on the SSR.
Chapter 14: Multicast Routing Configuration Guide Configuring the DVMRP Routing Metric You can configure the DVMRP routing metric associated with a set of destinations for DVMRP reports. The default metric is 1. To configure the DVMRP routing metric, enter the following command in Configure mode: Configure the DVMRP routing metric.
To prevent the SSR from forwarding any data destined to a scoped group on an interface, enter the following command in the Configure mode: Configure the DVMRP scope. Configuring a DVMRP Tunnel The SSR supports DVMRP tunnels to the MBONE (the multicast backbone of the Internet).
Chapter 14: Multicast Routing Configuration Guide Shows all IGMP group memberships on a port basis. Show all IGMP timers. Show information about multicasts registered by IGMP. Show IGMP status on a VLAN. Show all multicast Source, Group entries. Show all interfaces running multicast protocols (IGMP, DVMRP).
Overview You can configure the SSR to route IP packets according to policies that you define. IP policy-based routing allows network managers to engineer traffic to make the most efficient use of their network resources. IP policies forward packets based on layer-3 or layer-4 IP header information. You can define IP policies to route packets to a set of next-hop IP addresses based on any combination of the following IP header fields: •...
Chapter 15: IP Policy-Based Forwarding Configuration Guide ISPs. You can also create IP policies to select service providers based on various traffic types. Configuring IP Policies To implement an IP policy, you first create a profile for the packets to be forwarded using an IP policy.
For example, the following command creates an IP policy called “p1” and specifies that packets matching profile “prof1” are forwarded to next-hop gateway 10.10.10.10: ssr(config)# ip-policy p1 permit acl prof1 next-hop-list 10.10.10.10 You can also set up a policy to prevent packets from being forwarded by an IP policy. For example, the following command creates an IP policy called “p2”...
Chapter 15: IP Policy-Based Forwarding Configuration Guide Setting Load Distribution for Next-Hop Gateways You can specify up to four next-hop gateways in an ip-policy statement. If you specify more than one next-hop gateway, you can use the ip-policy set command to control how the load is distributed among them and to check the availability of the next-hop gateways.
IP Policy Configuration Examples This section presents some examples of IP policy configurations. The following uses of IP policies are demonstrated: • Routing traffic to different ISPs • Prioritizing service to customers • Authenticating users through a firewall • Firewall load balancing Routing Traffic to Different ISPs Sites that have multiple Internet service providers can create IP policies that cause different user groups to use different ISPs.
Chapter 15: IP Policy-Based Forwarding Configuration Guide The following is the IP policy configuration for the Policy Router in interface create ip user-a address-netmask 10.50.1.1/16 port et.1.1 interface create ip user-b address-netmask 11.50.1.1/16 port et.1.2 acl user-a-http acl user-a permit ip 10.50.0.0/16 207.31.0.0/16 any any 0 acl user-b permit ip 11.50.0.0/16 any any any 0 ip-policy net-a permit acl user-a-http next-hop-list 100.1.1.1 action...
Traffic from the premium customer is load balanced across two next-hop gateways in the high-cost, high-availability network. If neither of these gateways is available, then packets are forwarded based on dynamic routes learned via routing protocols. Traffic from the standard customer always uses one gateway (200.1.1.1). If for some reason that gateway is not available, packets from the standard customer are dropped.
Chapter 15: IP Policy-Based Forwarding Configuration Guide Packets from users defined in the “contractors” group are sent through a firewall. If the firewall cannot be reached packets from the contractors group are dropped. Packets from users defined in the “full-timers” group do not have to go through the firewall. The following is the IP policy configuration for the Policy Router in interface create ip mls0 address-netmask 10.50.1.1/16 port et.1.1 acl contractors permit ip 10.50.1.0/24 any any any 0...
The following is the configuration for Policy Router 1 in vlan create firewall vlan add ports et.1.(1-5) to firewall interface create ip firewall address-netmask 1.1.1.5/16 vlan firewall acl firewall permit ip any any any 0 ip-policy p1 permit acl firewall next-hop-list “1.1.1.1 1.1.1.2 1.1.1.3 1.1.1.4”...
Page 242
Chapter 15: IP Policy-Based Forwarding Configuration Guide For example, to display information about an active IP policy called “p1”, enter the following command in Enable mode: ssr# ip-policy show policy-name p1 -------------------------------------------------------------------------------- IP Policy name : p1 Applied Interfaces : int1 Load Policy : first available Source IP/Mask...
Page 243
11. The sequence in which the statement is evaluated. IP policy statements are listed in the order they are evaluated (lowest sequence number to highest). 12. The rule to apply to the packets matching the profile: either permit or deny 13.
Page 244
Chapter 15: IP Policy-Based Forwarding Configuration Guide SmartSwitch Router User Reference Manual...
Overview Note: Some commands in this facility require updated SSR hardware. Please refer to Appendix A Network Address Translation (NAT) allows an IP address used within one network to be translated into a different IP address used within another network. NAT is often used to map addresses used in a private, local intranet to one or more addresses used in the public, global Internet.
Chapter 16: Network Address Translation Configuration Guide The SSR allows you to create the following NAT address bindings: • Static, one-to-one binding of inside, local address or address pool to outside, global address or address pool. A static address binding does not expire until the command that defines the binding is negated.
Setting NAT Rules Static You create NAT static bindings by entering the following command in Configure mode. Enable NAT with static address binding. Dynamic You create NAT dynamic bindings by entering the following command in Configure mode. Enable NAT with dynamic address binding.
Chapter 16: Network Address Translation Configuration Guide Managing Dynamic Bindings As mentioned previously, dynamic address bindings expire only after a period of non-use or when they are manually deleted. The default timeout for dynamic address bindings is 1440 minutes (24 hours). You can manually delete dynamic address bindings for a specific address pool or delete all dynamic address bindings.
The default timeout for DNS dynamic address bindings is 30 minutes. You can change this timeout by entering the following command in Configure mode: Specify the timeout for DNS bindings. NAT and ICMP Packets NAT translates addresses embedded in the data portion of the following types of ICMP error messages: •...
Chapter 16: Network Address Translation Configuration Guide Monitoring NAT To display NAT information, enter the following command in Enable mode. Display NAT information. Configuration Examples This section shows examples of NAT configurations. Static Configuration The following example configures a static address binding for inside address 10.1.1.2 to outside address 192.50.20.2: Outbound: Translate source 10.1.1.2 to 192.50.20.2 Inbound: Translate destination 192.50.20.2 to 10.1.1.2...
Using Static NAT Static NAT can be used when the local and global IP addresses are to be bound in a fixed manner. These bindings never get removed nor time out until the static NAT command itself is negated. Static binding is recommended when you have a need for a permanent type of binding.
Chapter 16: Network Address Translation Configuration Guide Next, define the interfaces to be NAT “inside” or “outside”: nat set interface 10-net inside nat set interface 192-net outside Then, define the NAT dynamic rules by first creating the source ACL pool and then configuring the dynamic bindings: acl lcl permit ip 10.1.1.0/24 nat create dynamic local-acl-pool lcl global-pool 192.50.20.0/24...
Dynamic NAT with IP Overload (PAT) Configuration The following example configures a dynamic address binding for inside addresses 10.1.1.0/24 to outside address 192.50.20.0/24: Outbound: Translate source pool 10.1.1.0/24 to global pool 192.50.20.1-192.50.20.3 10.1.1.4 IP network 10.1.1.0/24 10.1.1.2 10.1.1.3 The first step is to create the interfaces: interface create ip 10-net address-netmask 10.1.1.1/24 port et.2.1 interface create ip 192-net address-netmask 192.50.20.1/24 port et.2.2 Next, define the interfaces to be NAT “inside”...
Chapter 16: Network Address Translation Configuration Guide the pools and the SSR automatically chooses a free global IP from the global pool for the local IP. Dynamic bindings are removed when the flow count goes to zero or the timeout has been reached.
Using Dynamic NAT with DNS When a client from outside sends a query to the static global IP address of the DNS server, NAT will translate the global IP address to the local IP address of the DNS server. The DNS server will resolve the query and respond with a reply.
Chapter 16: Network Address Translation Configuration Guide Then, define the NAT dynamic rules by first creating the source ACL pool and then configuring the dynamic bindings: acl lcl permit ip 10.1.1.0/24 nat create dynamic local-acl-pool lcl global-pool 192.50.20.0/24 matching- if 192-net nat create dynamic local-acl-pool lcl global-pool 210.50.20.0/24 matching- if 201-net Using Dynamic NAT with Matching Interface Redundancy...
Overview Accessing information on websites for both work or personal purposes is becoming a normal practice for an increasing number of people. For many companies, fast and efficient web access is important for both external customers who need to access the company websites, as well as for users on the corporate intranet who need to access Internet websites.
Chapter 17: Web Hosting Configuration Guide Load Balancing Note: Load balancing requires updated SSR hardware. Please refer to details. You can use the load balancing feature on the SSR to distribute session load across a group of servers. If you configure the SSR to provide load balancing, client requests that go through the SSR can be redirected to any one of several predefined hosts.
redirects the request to the actual server address and port. Server selection is done according to the specified policy. To add servers to the server group, enter the following command in Configure mode: Add load balancing servers to a specific server group. Add range of load balancing servers to a range of server groups.
Page 260
Chapter 17: Web Hosting Configuration Guide directed to the same load balancing server (for example, the server with IP address 10.1.1.1). • Sticky persistence: a binding is determined by matching the source and destination IP addresses only. This allows all requests from a client to the same virtual address to be directed to the same load balancing server.
Optional Group or Server Operating Parameters There are several commands you can specify that affect the operating parameters of individual servers or the entire group of load balancing servers. In many cases, there are default parameter values and you only need to specify a command if you wish to change the default operation.
Chapter 17: Web Hosting Configuration Guide Verifying Servers and Applications The SSR automatically performs the following types of verification for the attached load balancing servers/applications: • Verifies the state of the server by sending a ping to the server at 5-second intervals. If the SSR does not receive a reply from a server after four ping requests, the server is considered to be “down.”...
Verifying Extended Content You can also have the SSR verify the content of an application on one or more load balancing servers. For this type of verification, you specify the following: • A string that the SSR sends to a single server or to the group of load balancing servers. The string can be a simple HTTP command to get a specific HTML page.
Chapter 17: Web Hosting Configuration Guide To set the status of a load balancing server, enter the following command in Enable mode: Set status of load balancing server. Load Balancing and FTP File Transfer Protocol (FTP) packets require special handling with load balancing, because the FTP PORT command packets contain IP address information within the data portion of the packet.
To specify the timeout for load balancing mappings, enter the following command in Configure mode: Specify the timeout for source- destination mappings. Displaying Load Balancing Information To display load balancing information, enter the following commands in Enable mode: Show the groups of load balancing servers.
Chapter 17: Web Hosting Configuration Guide Web Hosting with One Virtual Group and Multiple Destination Servers In the following example, a company web site is established with a URL of www.ctron.com. The system administrator configures the networks so that the SSR forwards web requests among four separate servers, as shown below.
Web Hosting with Multiple Virtual Groups and Multiple Destination Servers In the following example, three different servers are used to provide different services for a site. 10.1.1.1 www.quick.com 10.1.1.2 10.1.1.3 ftp.quick.com smtp.quick.com Domain Name www.quick.com ftp.quick..com smtp.quick.com The network shown above can be created with the following load-balance commands: load-balance create group-name quick-www virtual-ip 207.135.89.16 virtual-port 80 protocol tcp load-balance create group-name quick-ftp virtual-ip 207.135.89.16 virtual-port 21...
Chapter 17: Web Hosting Configuration Guide Virtual IP Address Ranges ISPs who provide web hosting services for their clients require a large number of virtual IP addresses (VIPs). The load-balance create vip-range-name and load-balance add host- to-vip-range commands were created specifically for this. An ISP can create a range of VIPs for up to an entire class C network with the load-balance create vip-range-name command.
The network shown in the previous example can be created with the following load- balance commands: load-balance create vip-range-name mywwwrange 207.135.89.16-207.135.89.50 virtual-port 80 protocol tcp load-balance add host-to-vip-range 10.1.1.16-10.1.1.50 vip-range-name mywwwrange port 80 load-balance add host-to-vip-range 10.1.2.16-10.1.2.50 vip-range-name mywwwrange port 80 Session and Netmask Persistence In the following example, traffic to a company web site (www.ctron.com) is distributed between two separate servers.
Chapter 17: Web Hosting Configuration Guide Web Caching Web caching provides a way to store frequently accessed Web objects on a cache of local servers. Each HTTP request is transparently redirected by the SSR to a configured cache server. When a user first accesses a Web object, that object is stored on a cache server. Each subsequent request for the object uses this cached object.
Specifying the Client(s) for the Cache Group (Optional) You can explicitly specify the hosts whose HTTP requests are or are not redirected to the cache servers. If you do not explicitly specify these hosts, then all HTTP requests are redirected to the cache servers. To specify the clients or non-clients for the cache group, enter the following commands in Configure mode: Define hosts whose requests are...
Chapter 17: Web Hosting Configuration Guide Configuration Example In the following example, a cache group of seven local servers is configured to store Web objects for users in the local network: Cache1 s2 Servers: 186.89.10.51 186.89.10.55 s1 Servers: 176.89.10.50 176.89.10.51 176.89.10.52 176.89.10.53 176.89.10.54...
which HTTP requests are not redirected to the cache servers, enter the following command in Configure mode: Define destination sites to which HTTP requests are sent directly. Proxy Server Redundancy Some networks use proxy servers that receive HTTP requests on a non-standard port number (i.e., not port 80).
Page 274
Chapter 17: Web Hosting Configuration Guide Show caching policy information. Show cache server information. web-cache show cache-name web-cache show servers cache |all SmartSwitch Router User Reference Manual <cache-name> |all <cache-name>...
IPX Routing Overview The Internetwork Packet Exchange (IPX) is a datagram connectionless protocol for the Novell NetWare environment. You can configure the SSR for IPX routing and SAP. Routers interconnect different network segments and by definitions are network layer devices. Thus routers receive their instructions for forwarding a packet from one segment to another from a network layer protocol.
Chapter 18: IPX Routing Configuration Guide this information is immediately broadcast to any neighboring routers. Routers also send periodic RIP broadcast packets containing all routing information known to the router. The SSR uses IPX RIP to create and maintain a database of internetwork routing information.
Configuring IPX RIP & SAP This section provides an overview of configuring various IPX parameters and setting up IPX interfaces. IPX RIP On the SSR, RIP automatically runs on all IPX interfaces. The SSR will keep multiple routes to the same network having the lowest ticks and hop count. Static routes can be configured on the SSR using the CLI’s ipx add route command.
Chapter 18: IPX Routing Configuration Guide Configuring IPX Interfaces and Parameters This section provides an overview of configuring various IPX parameters and setting up IPX interfaces. Configuring IPX Addresses to Ports You can configure one IPX interface directly to a physical port. To configure an IPX interface to a port, enter the following command in Configure mode: Configure an IPX interface to a physical port.
Specifying IPX Encapsulation Method The SmartSwitch Router supports four encapsulation types for IPX. You can configure encapsulation type on a per-interface basis. • Ethernet II: The standard ARPA Ethernet Version 2.0 encapsulation, which uses a 16- bit protocol type code (the default encapsulation method) •...
Chapter 18: IPX Routing Configuration Guide Configuring Static Routes In a Novell NetWare network, the SSR uses RIP to determine the best paths for routing IPX. However, you can add static RIP routes to RIP routing table to explicitly specify a route.
To create an IPX access control list, perform the following task in the Configure mode: Create an IPX access control list. Once an IPX access control list has been created, you must apply the access control list to an IPX interface. To apply an IPX access control list, enter the following command in Configure mode: Apply an IPX access control list.
Chapter 18: IPX Routing Configuration Guide Creating an IPX GNS Access Control List IPX GNS access control lists control which SAP services the SSR can reply with to a get nearest server (GNS) request. To create an IPX GNS access control list, enter the following command in Configure mode: Create an IPX GNS access control list.
Monitoring an IPX Network The SSR reports IPX interface information and RIP or SAP routing information. To display IPX information, enter the following command in Enable mode: Show a RIP entry in the IPX RIP table. Show a SAP entry in the IPX SAP table. Show IPX interface information.
This chapter explains how to configure and use Access Control Lists (ACLs) on the SSR. ACLs are lists of selection criteria for specific types of packets. When used in conjunction with certain SSR functions, ACLs allow you to restrict Layer-3/4 traffic going through the router.
Chapter 19: Access Control List Configuration Guide ACL Basics An ACL consists of one or more rules describing a particular type of IP or IPX traffic. ACLs can be simple, consisting of only one rule, or complicated with many rules. Each rule tells the SSR to either permit or deny packets that match selection criteria specified in the rule.
Page 287
These selection criteria are specified as fields of an ACL rule. The following syntax description shows the fields of an IP ACL rule: <name> permit|deny ip <tos-mask> [accounting] Note: The acl permit|deny ip command restricts traffic for all IP-based protocols, such as TCP, UDP, ICMP, and IGMP.
Chapter 19: Access Control List Configuration Guide How ACL Rules are Evaluated For an ACL with multiple rules, the ordering of the rules is important. When the SSR checks a packet against an ACL, it goes through each rule in the ACL sequentially. If a packet matches a rule, it is forwarded or dropped based on the permit or deny keyword in the rule.
With the implicit deny rule, this ACL actually has three rules: acl 101 permit ip 1.2.3.4/24 any any any acl 101 permit ip 4.3.2.1/24 any nntp any acl 101 deny any any any any any If a packet comes in and doesn't match the first two rules, the packet is dropped. This is because the third rule (the implicit deny rule) matches all packets.
Chapter 19: Access Control List Configuration Guide you would have to create an ACL to allow responses from each specific outside host. If the number of outside hosts that internal users need to access is large or changes frequently, this can be difficult to maintain. To address this problem, the SSR can be configured to accept outside TCP responses into the internal network, provided that the TCP connection was initiated internally.
Suppose the following ACL commands are stored in a file on some hosts: no acl * acl 101 deny tcp 10.11.0.0/16 10.12.0.0/16 acl 101 permit tcp 10.11.0.0 any acl 101 apply interface int12 input The first command, no acl *, negates all commands that start with the keyword, “acl”. This tells the SSR to remove the application and the definition of any ACL.
Chapter 19: Access Control List Configuration Guide If you edit and save changes to an ACL that is currently being used or applied to an interface, the changes will take effect immediately. There is no need to remove the ACL from the interface before making changes and reapply it after changes are made.
application). Note that for an external agent to modify or remove an applied ACL from an interface, the acl-policy enable external command must be in the configuration. In general, you should try to apply ACLs at the inbound interfaces instead of the outbound interfaces.
Chapter 19: Access Control List Configuration Guide Like ACLs that are applied to interfaces, ACLs that are applied to Layer 4 bridging ports can be applied to either inbound or outbound traffic. For each port, only one ACL can be applied for the inbound direction and one for the outbound direction.
• Unlike with other kinds of ACLs, there is no implicit deny rule for Profile ACLs. • Only certain ACL rule parameters are relevant for each configuration command. For example, the configuration command to create NAT address pools for dynamic bindings (the nat create dynamic command) only looks at the source IP address in the specified ACL rule.
Chapter 19: Access Control List Configuration Guide criteria (in this case, flows from source address 1.2.2.2). Then you use a rate-limit command to specify what happens to packets that match the selection criteria (in this example, drop them if their bandwidth usage exceeds 10 Mbps). The following commands illustrate this example.
Once you have defined a Profile ACL, you can then use the nat create dynamic command to bind the range of IP addresses defined in the local profile to a range in network 192.50.20.0/24. ssr(config)# nat create dynamic local-acl-pool local global-pool 192.50.20.10/24 “Network Address Translation Configuration Guide”...
Chapter 19: Access Control List Configuration Guide Redirecting HTTP Traffic to Cache Servers You can use a Profile ACL to specify which HTTP traffic should always (or never) be redirected to the cache servers. (By default, when Web caching is enabled, all HTTP traffic from all hosts is redirected to the cache servers unless you specify otherwise.) For example, you can specify that packets with a source address of 10.10.10.10 and a destination address of 1.2.3.4 always are sent to the Internet and never to the cache...
Enabling ACL Logging To see whether incoming packets are permitted or denied because of an ACL, you can enable ACL logging. You can enable logging when applying the ACL or you can enable logging for a specific ACL rule. The following commands define an ACL and apply the ACL to an interface, with logging enabled for the ACL: acl 101 deny ip 10.2.0.0/16 any any any acl 101 permit ip any any any any...
Chapter 19: Access Control List Configuration Guide Monitoring ACLs The SSR provides a display of ACL configurations active in the system. To display ACL information, enter the following commands in Enable mode. Show all ACLs. Show a specific ACL. Show an ACL on a specific interface. Show ACLs on all IP interfaces.
Security Overview The SSR provides security features that help control access to the SSR and filter traffic going through the SSR. Access to the SSR can be controlled by: • Enabling RADIUS • Enabling TACACS • Enabling TACACS Plus • Password authentication Traffic filtering on the SSR enables: •...
Chapter 20: Security Configuration Guide Configuring SSR Access Security This section describes the following methods of controlling access to the SSR: • RADIUS • TACACS • TACACS Plus • Passwords Configuring RADIUS You can secure login or Enable mode access to the SSR by enabling a Remote Authentication Dial-In Service (RADIUS) client.
Monitoring RADIUS You can monitor RADIUS configuration and statistics within the SSR. To monitor RADIUS, enter the following commands in Enable mode: Show RADIUS server statistics. Show all RADIUS parameters. Configuring TACACS In addition, Enable mode access to the SSR can be made secure by enabling a Terminal Access Controller Access Control System (TACACS) client.
Chapter 20: Security Configuration Guide Configuring TACACS Plus You can secure login or Enable mode access to the SSR by enabling a TACACS Plus client. A TACACS Plus server responds to the SSR TACACS Plus client to provide authentication. You can configure up to five TACACS Plus server targets on the SSR. A timeout is set to tell the SSR how long to wait for a response from TACACS Plus servers.
Monitoring TACACS Plus You can monitor TACACS Plus configuration and statistics within the SSR. To monitor TACACS Plus, enter the following commands in Enable mode: Show TACACS Plus server statistics. Show all TACACS Plus parameters. Configuring Passwords The SSR provides password authentication for accessing the User and Enable modes. If TACACS is not enabled on the SSR, only local password authentication is performed.
Chapter 20: Security Configuration Guide A secure filter shuts down access to the SSR based on MAC addresses. All packets received by a port are dropped. When combined with static entries, however, these filters can be used to drop all received traffic but allow some frames to go through. Configuring Layer-2 Address Filters If you want to control access to a source or destination on a per-MAC address basis, you can configure an address filter.
Configuring Layer-2 Port-to-Address Lock Filters Port address lock filters allow you to bind or “lock” specific source MAC addresses to a port or set of ports. Once a port is locked, only the specified source MAC address is allowed to connect to the locked port and the specified source MAC address is not allowed to connect to any other ports.
Chapter 20: Security Configuration Guide Configuring Layer-2 Secure Port Filters Secure port filters block access to a specified port. You can use a secure port filter by itself to secure unused ports. Secure port filters can be configured as source or destination port filters.
Monitoring Layer-2 Security Filters The SSR provides display of Layer-2 security filter configurations contained in the routing table. To display security filter information, enter the following commands in Enable mode. Show address filters. Show port address lock filters. Show secure port filters. Show static entry filters.
Chapter 20: Security Configuration Guide Destination filter: No one from the engineering group (port et.1.1) should be allowed to access the finance server. All traffic destined to the finance server's MAC will be dropped. filters add address-filter name finance dest-mac AABBCC:DDEEFF vlan 1 in-port-list et.1.1 Flow filter: Only the consultant is restricted access to one of the finance file servers.
Note: If the consultant’s MAC is detected on a different port, all of its traffic will be blocked. Example 2 : Secure Ports Source secure port: To block all engineers on port 1 from accessing all other ports, enter the following command: filters add secure-port name engineers direction source vlan 1 in-port-list et.1.1 To allow ONLY the engineering manager access to the engineering servers, you must...
Chapter 20: Security Configuration Guide Layer-4 Bridging and Filtering Layer-4 bridging is the SSR’s ability to use layer-3/4 information to perform filtering or QoS during bridging. As described in ports to filter traffic using MAC addresses. Layer-4 bridging adds the ability to use IP addresses, layer-4 protocol type, and port number to filter traffic in a bridged network.
Creating a Port-Based VLAN for Layer-4 Bridging The ports to be used in Layer-4 Bridging must all be on the same VLAN. To create a port- based VLAN, enter the following command in Configure mode: Create a port-based VLAN. For example, to create a port-based VLAN called “blue” with an ID of 21, enter the following command in Configure Mode: ssr(config)# vlan create blue port-based id 21 Placing the Ports on the Same VLAN...
Chapter 20: Security Configuration Guide In the example in Figure 25 on page for e-mail (SMTP) traffic, but not for Web (HTTP) traffic — and allow e-mail, Web, and FTP traffic between the engineers and the file server, you would create ACLs that allow only SMTP traffic on the port to which the consultants are connected and allow SMTP, HTTP, and FTP traffic on the ports to which the engineers are connected.
Page 315
• If you use a SmartTRUNK in a with Layer-4 Bridging VLAN, the SSR maintains the packet order on a per-flow basis, rather than per-MAC pair. This means that for traffic between a MAC pair consisting of more than one flow, the packets may be disordered if they go through a SmartTRUNK.
QoS Configuration QoS & Layer-2/Layer-3/Layer-4 Flow Overview The SSR allows network managers to identify traffic and set Quality of Service (QoS) policies without compromising wire speed performance. The SSR can guarantee bandwidth on an application by application basis, thus accommodating high-priority traffic even during peak periods of usage.
Chapter 21: QoS Configuration Guide Within the SSR, QoS policies are used to classify Layer-2, Layer-3, and Layer-4 traffic into the following priority queues (in order from highest priority to lowest): • Control (for router control traffic; the remaining classes are for normal data flows) •...
Precedence for Layer-3 Flows A precedence from 1 - 7 is associated with each field in a flow. The SSR uses the precedence value associated with the fields to break ties if packets match more than one flow. The highest precedence is 1 and the lowest is 7. Here is the default precedence of the fields: •...
Chapter 21: QoS Configuration Guide If a port operates in flow-bridging mode, you can be more specific and configure priorities for frames that match both a source AND a destination MAC address and a VLAN ID. You can also specify a list of ports to apply the policy. The VLAN ID in the QoS configuration must match the VLAN ID assigned to the list of ports to which the QoS policy is applied.
You can create one or more priority maps that are different from the default priority map and then apply these maps to some or all ports of the SSR. The new priority mapping replaces the default mappings for those ports to which they are applied. Creating and Applying a New Priority Map To specify a priority map on a per-port basis, enter the following commands in Configure mode:...
Chapter 21: QoS Configuration Guide configured to use the default priority map only. If the commands to create and apply priority maps exist in the active configuration, they will remain in the configuration but be ineffective. To disable the use of priority maps, enter the following command in Configure mode: Disable use of per- port priority maps on the SSR.
Setting an IP QoS Policy To set a QoS policy on an IP traffic flow, enter the following command in Configure mode: Set an IP QoS policy. For example, the following command assigns control priority to any traffic coming from the 10.10.11.0 network: ssr(config)# qos set ip xyz control 10.10.11.0/24 Specifying Precedence for an IP QoS Policy...
Chapter 21: QoS Configuration Guide Specifying Precedence for an IPX QoS Policy To specify the precedence for an IPX QoS policy, enter the following command in Configure mode: Specify precedence for an IPX QoS policy. Configuring SSR Queueing Policy The SSR queuing policy is set on a system-wide basis. The SSR default queuing policy is strict priority.
Weighted Random Early Detection (WRED) Random Early Detection (WRED) alleviates traffic congestion issues by selectively dropping packets before the queue becomes completely flooded. WRED parameters allow you to set conditions and limits for dropping packets in the queue. To enable WRED on input or output queues of specific ports, enter the following command in Configure mode: Enable WRED on input or output queue of specified...
Chapter 21: QoS Configuration Guide For example, setting the ToS field to 0010 specifies that a packet will be routed on the most reliable paths. Setting the ToS field to 1000 specifies that a packet will be routed on the paths with the least delay.
Page 327
are rewritten to the <tos-precedence-rewrite> value and the lower five bits are rewritten to the <tos-rewrite> value. For example, the following command will rewrite the ToS Precedence field to 7 if the ToS Precedence field of the incoming packet is 6: ssr(config)# qos set ip tosp6to7 low any any any any 222 any any 224 7 In the above example, the <tos>...
Chapter 21: QoS Configuration Guide Monitoring QoS The SSR provides display of QoS statistics and configurations contained in the SSR. To display QoS information, enter the following commands in Enable mode: Show all IP QoS flows. Show all IPX QoS flows. Show all Layer-2 QoS flows.
Limiting Traffic Rate Note: Some commands in this facility require updated SSR hardware. Please refer to Appendix A Rate limiting provides the ability to control the usage of a fundamental network resource, bandwidth. It allows you to limit the rate of traffic that flows through the specified interfaces, thus reserving bandwidth for critical applications.
Chapter 21: QoS Configuration Guide To enable aggregate rate limiting mode on the SSR, enter the following command in Configure mode: Enable aggregate rate limiting mode on the SSR. To change the rate limiting mode on the SSR back to per-flow mode, negate the above command.
To define a port rate limit policy, enter one of the following commands in Configure mode: Define a port rate limit policy to limit incoming traffic on a port. Define a port rate limit policy to limit outgoing traffic on a port. Note that for output port policies, the only action that you can specify if traffic exceeds the specified rate is to drop packets.
Chapter 21: QoS Configuration Guide To define an aggregate rate limit policy and apply the policy to an interface, enter the following commands in Configure mode: Define an aggregate rate limit policy. Apply an aggregate rate limit policy to an interface. Note: You cannot use non-IP ACLs for aggregate rate limit policies.
Traffic from two interfaces, ‘ipclient1’ with IP address 1.2.2.2 and ‘ipclient2’ with IP address 3.1.1.1, is restricted to 10 Mbps for each flow with the following configuration: vlan create client1 ip vlan create backbone ip vlan create client2 ip vlan add ports et.1.1 to client1 vlan add ports et.1.2 to client2 vlan add ports et.1.8 to backbone interface create ip ipclient1 vlan client1 address-netmask 1.1.1.1/8...
Chapter 21: QoS Configuration Guide Displaying Rate Limit Information To show information about rate limit policies, enter the following command in Enable mode: Show rate limit policy information. rate-limit show all | policy-type <name> policy-name | interface <port> <name> {port-level } | rate-limiting- mode SmartSwitch Router User Reference Manual...
Performance Monitoring Overview The SSR is a full wire-speed layer-2, 3 and 4 switching router. As packets enter the SSR, layer-2, 3, and 4 flow tables are populated on each line card. The flow tables contain information on performance statistics and traffic forwarding. Thus the SSR provides the capability to monitor performance at Layer 2, 3, and 4.
Page 336
Chapter 22: Performance Monitoring Guide Show information about the master MAC table. Show information about a particular MAC address. Show info about multicasts registered by IGMP. Show whether IGMP is on or off on a VLAN. Show info about MACs registered by the system.
Configuring the SSR for Port Mirroring The SSR allows you to monitor activity with port mirroring. Port mirroring allows you to monitor the performance and activities of ports on the SSR or for traffic defined by an ACL through just a single, separate port. While in Configure mode, you can configure your SSR for port mirroring with a simple command line like the following: Configure Port Mirroring.
RMON Overview You can employ Remote Network Monitoring (RMON) in your network to help monitor traffic at remote points on the network. With RMON, data collection and processing is done with a remote probe, namely the SSR. The SSR also includes RMON agent software that communicates with a network management station via SNMP.
1 : port flow-bridging et.5.(3-8) 2 : interface add ip en0 address-netmask 10.50.6.9/16 3 : system set contact "usama" 4 : system set location Cabletron Systems 5 : system set name "ssr" 6 : rmon set ports all-ports 7 : rmon set lite default-tables yes...
RMON Groups The RMON MIB groups are defined in RFCs 1757 (RMON 1) and 2021 (RMON 2). On the SSR, you can configure one or more levels of RMON support for a set of ports. Each level—Lite, Standard, or Professional—enables different sets of RMON groups (described later in this section).
Chapter 23: RMON Configuration Guide Standard RMON Groups This section describes the RMON groups that are enabled when you specify the Standard support level. The Standard RMON groups are shown in the table below. Table 11. Standard RMON Groups Group Host Host Top N Matrix...
Table 12. Professional RMON Groups Group Application Layer Matrix (and Top N) Network Layer Matrix (and Top N) Address Map User History Control Tables Many RMON groups contain both control and data tables. Control tables specify what statistics are to be collected. For example, you can specify the port for which statistics are to be collected and the owner (name, phone, or IP address) for that port.
Chapter 23: RMON Configuration Guide A row in the control table is created for each port on the SSR, with the owner set to “monitor”. If you want, you can change the owner by using the appropriate rmon command. See the section “Configuring RMON Groups” in this chapter for more the command to configure a specific group.
following command: ssr# rmon show al-matrix et.5.5 RMON II Application Layer Host Table Index: 500, Port: et.5.5, Inserts: 4, Deletes: 0, Owner: monitor SrcAddr DstAddr ------- ------- 10.50.89.88 15.15.15.3 10.50.89.88 15.15.15.3 10.50.89.88 15.15.15.3 10.50.89.88 15.15.15.3 Configuring RMON Groups As mentioned previously, control tables in many RMON groups specify the data that is to be collected for the particular RMON group.
Page 346
Chapter 23: RMON Configuration Guide To configure the Filter group, you must configure both the Channel and Filter control tables. To configure the Etherstats group. To configure the Event group. To configure the History group. To configure the Application Layer and Network Layer Host groups.
To configure the Protocol Distribution group. To configure the User History group, you must configure the group of objects to be monitored and apply the objects in the group to the User History control table. Configuration Examples This section shows examples of configuration commands that specify an event that generates an SNMP trap and the alarm condition that triggers the event.
Chapter 23: RMON Configuration Guide • Samples taken at 300 second (5 minute) intervals. • A “Startup” alarm generation condition instructing the SSR to generate an alarm if the sample is greater than or equal to the rising threshold or less than or equal to the falling threshold.
To display the RMON 2 Address Map table. To show Network Layer Host logs. To show Application Layer Host logs. To show Network Layer Matrix logs. To show Application Layer Matrix logs. To show all Network Layer Matrix Top N. To show all Application Layer Matrix Top N.
Creating RMON CLI Filters To create RMON CLI filters, use the following CLI command in Configure mode: Creates an RMON CLI filter. Using RMON CLI Filters To see and use RMON CLI filters, use the following CLI command in User or Enable mode: Displays RMON CLI filters.
Page 352
Chapter 23: RMON Configuration Guide Check the following fields on the rmon show status command output: ssr# rmon show status RMON Status ----------- * RMON is ENABLED * RMON initialization successful. +--------------------------+ | RMON Group Status +-------+--------+---------+ | Group | Status | Default | +-------+--------+---------+ | Lite On |...
Allocating Memory to RMON RMON allocates memory depending on the number of ports enabled for RMON, the RMON groups that have been configured, and whether or not default tables have been turned on or off. Enabling RMON with all groups (Lite, Standard, and Professional) with default tables uses approximately 300 Kbytes per port.
Page 354
Chapter 23: RMON Configuration Guide To set the amount of memory allocated to RMON, use the following CLI command in User or Enable mode: Specifies the total amount of Mbytes of memory allocated to RMON. <number> rmon set memory SmartSwitch Router User Reference Manual...
Overview The Lightweight Flow Accounting Protocol (LFAP) agent, defined in RFC 2124, is a TCP- oriented protocol used to push accounting information collected on the SSR to a Flow Accounting Server (FAS). The LFAP agent uses ACLs to determine the IP traffic on which accounting information will be collected.
Chapter 24: LFAP Configuration Guide Cabletron’s Traffic Accounting Services Cabletron’s Accounting Services consists of the following components: • LFAP agent on the SSR that collects application flow accounting information and sends it to the Cabletron FAS. You can configure the SSR to collect information on an entire interface or on a specific host-to-host application flow.
Page 357
attempts to connect to it via TCP first. If the connection fails, then the next configured FAS is tried. A FAS can be configured as the primary FAS for one group of SSRs and the secondary FAS for another group of SSRs. Note: The Traffic Accountant is not designed to reconcile duplicate data records.
Chapter 24: LFAP Configuration Guide Monitoring the LFAP Agent on the SSR The lfap show commands display information about the configuration of the LFAP agent on the SSR and its current status. Use the following commands in Enable mode to view LFAP agent information: Command lfap show configuration...
This chapter provides an overview of Wide Area Network (WAN) applications as well as an overview of both Frame Relay and PPP configuration for the SSR. In addition, you can view an example of a multi-router WAN configuration complete with diagram and configuration files in WAN Overview On the SmartSwitch Router, Wide Area Network (WAN) routing is performed over a...
Chapter 25: WAN Configuration Guide Using the same approach, a PPP high-speed serial interface (HSSI) WAN port located at router slot 3, port 2 would be identified as “hs.3.2”. Configuring WAN Interfaces Configuring IP & IPX interfaces for the WAN is generally the same as for the LAN. You can configure IP/IPX interfaces on the physical port or you can configure the interface as part of a VLAN for WAN interfaces.
The following command line displays an example for a VLAN: interface create ip IPWAN address-netmask 10.50.1.1/16 peer-address 10.50.1.2 vlan BLUE Mapped Addresses Mapped peer IP/IPX addresses are very similar to static addresses in that InArp is disabled for Frame Relay and the address negotiated in IPCP/IPXCP is ignored for PPP. Mapped addresses are most useful when you do not want to specify the peer address using the interface create command.
Chapter 25: WAN Configuration Guide The following command line displays an example for a VLAN: interface create ip IPWAN address-netmask 10.50.1.1/16 vlan BLUE Forcing Bridged Encapsulation WAN for the SSR has the ability to force bridged packet encapsulation. This feature has been provided to facilitate seamless compatibility with Cisco routers, which expect bridged encapsulation in certain operating modes.
Average Packet Size In most cases, the larger the packet size, the better the potential compression ratio. This is due to the overhead involved with compression, as well as the compression algorithm. For example a link which always deals with minimum size packets may not perform as well as a link whose average packet size is much larger.
Chapter 25: WAN Configuration Guide The following command line displays an example for PPP: ppp set payload-compress port se.4.2 Packet Encryption Packet encryption allows data to travel through unsecured networks. You can enable packet encryption for PPP ports, however, both ends of a link must be configured to use packet encryption.
Source Filtering and ACLs Source filtering and ACLs can be applied to a WAN interface; however, they affect the entire module, not an individual port. For example, if you want to apply a source MAC address filter to a WAN serial card located in slot 5, port 2, your configuration command line would look like the following: ssr(config)# filters add address-filter name wan1 source-mac 000102:030405 vlan 2 in-port-list se.5...
Chapter 25: WAN Configuration Guide works with IP Precedence or priority, as defined in the qos configuration command line, to provide preferential traffic handling for higher-priority traffic. The CLI commands related to RED in both the Frame Relay and PPP protocol environments allow you to set maximum and minimum threshold values for each of the low-, medium-, and high-priority categories of WAN traffic.
Permanent Virtual Circuits (PVCs) WAN interfaces can take advantage of connections that assure a minimum level of available bandwidth at all times. These standing connections, called Permanent Virtual Circuits (PVCs), allow you to route critical packet transmissions from host to peer without concern for network congestion significantly slowing, let alone interrupting, your communications.
Chapter 25: WAN Configuration Guide Setting up a Frame Relay Service Profile Once you have defined the type and location of your Frame Relay WAN interface(s), you can configure your SSR to more efficiently utilize available bandwidth for Frame Relay communications.
Monitoring Frame Relay WAN Ports Once you have configured your frame relay WAN interface(s), you can use the CLI to monitor status and statistics for your WAN ports. The following table describes the monitoring commands for WAN interfaces, designed to be used in Enable mode: Display a particular frame relay service profile Display all available frame relay...
Page 370
Chapter 25: WAN Configuration Guide • Committed information rate (CIR) of 20 million bits per second • Leave high-, low-, and medium-priority queue depths set to factory defaults • Random Early Discard (RED) disabled • RMON enabled The command line necessary to set up a service profile with the above attributes would be as follows: ssr(config)# frame-relay define service profile1 Bc 2000000 Be 10000000 becn-adaptive-shaping 65 cir 20000000 red off rmon on...
Point-to-Point Protocol (PPP) Overview Because of its ability to quickly and easily accommodate IP and IPX protocol traffic, Point- to-Point Protocol (PPP) routing has become a very important aspect of WAN configuration. Using PPP, you can set up router-to-router, host-to-router, and host-to-host connections.
Chapter 25: WAN Configuration Guide WAN interfaces, then apply a service profile to the desired interface(s). Examples of this process are displayed in Defining the Type and Location of a PPP Interface To configure a PPP WAN port, you need to first define the type and location of one or more PPP WAN ports on your SSR.
Note: If it is necessary to specify a value for Bridging, IP, and/or IPX, you must specify all three of these values at the same time. You cannot specify just one or two of them in the command line without the other(s). Applying a Service Profile to an Active PPP Port Once you have created one or more PPP service profiles, you can specify their use on one or more active PPP ports on the SSR.
Chapter 25: WAN Configuration Guide processing by MLP. If compression is enabled on a link, the packets will be compressed after the MLP processing. In general, choose bundle compression over link compression whenever possible. Compressing packets before they are “split” by MLP is much more efficient for both the compression algorithm and the WAN card.
Page 375
Suppose you wish to set up a service profile called “profile2” that includes the following characteristics: • Bridging enabled • Leave high-, low-, and medium-priority queue depths set to factory defaults • IP and IPX enabled • Sending of LCP Echo Requests disabled •...
Chapter 25: WAN Configuration Guide WAN Configuration Examples Simple Configuration File The following is an example of a simple configuration file used to test frame relay and PPP WAN ports: port set hs.5.1 wan-encapsulation frame-relay speed 45000000 port set hs.5.2 wan-encapsulation ppp speed 45000000 interface create ip fr1 address-netmask 10.1.1.1/16 port hs.5.1.100 interface create ip ppp2 address-netmask 10.2.1.1/16 port hs.5.2 interface create ip lan1 address-netmask 10.20.1.1/16 port et.1.1...
Multi-Router WAN Configuration The following is a diagram of a multi-router WAN configuration encompassing three subnets. From the diagram, you can see that R1 is part of both Subnets 1 and 2; R2 is part of both Subnets 2 and 3; and R3 is part of subnets 1 and 3. You can click on the router label (in blue) to jump to the actual text configuration file for that router: PPP wan-encaps.
Chapter 25: WAN Configuration Guide Router R1 Configuration File The following configuration file applies to Router R1. ---------------------------------------------------------------------- Configuration for ROUTER R1 ---------------------------------------------------------------------- port set hs.7.1 wan-encapsulation frame-relay speed 45000000 port set hs.3.1 wan-encapsulation frame-relay speed 45000000 port set hs.3.2 wan-encapsulation ppp speed 45000000 port set et.1.* duplex full frame-relay create vc port hs.7.1.106 frame-relay create vc port hs.3.1.103...
rip add interface all rip set interface all version 2 rip set auto-summary enable rip start system set name R2 arp add 20.20.20.12 exit-port et.1.1 mac-addr 000202:020200 Router R3 Configuration File The following configuration file applies to Router R3. ---------------------------------------------------------------------- Configuration for ROUTER R3 ---------------------------------------------------------------------- port set se.2.1 wan-encapsulation frame-relay speed 1500000...
Chapter 25: WAN Configuration Guide port set et.1.* duplex full frame-relay create vc port se.6.1.304 vlan create s1 id 200 vlan add ports se.6.1.304,se.6.3 to s1 interface create ip s1 address-netmask 100.100.100.4/16 vlan s1 rip add interface all rip set interface all version 2 rip set interface all xmt-actual enable rip set broadcast-state always rip set auto-summary enable...
Page 381
Chapter 25: WAN Configuration Guide port set hs.3.1 wan-encapsulation frame-relay speed 45000000 frame-relay create vc port hs.3.1.106 frame-relay define service CIRforR1toR6 cir 45000000 bc 450000 frame-relay apply service CIRforR1toR6 ports hs.3.1.106 vlan create BridgeforR1toR6 port-based id 106 interface create ip FRforR1toR6 address-netmask 100.100.100.6/16 vlan BridgeforR1toR6 interface create ip lan1 address-netmask 60.60.60.6/16 port et.15.1 vlan add ports hs.3.1.106 to BridgeforR1toR6...
Page 382
Chapter 25: WAN Configuration Guide SmartSwitch Router User Reference Manual...
Introduction Some of the features in firmware versions 3.0 and 3.1 are only supported on certain line cards. The following sections list SSR line cards and the firmware features that are supported on each card. SSR 8000/8600 Line Cards This section describes the following categories of SSR line cards: •...
Appendix A: New Features Supported on Line Cards The following table lists the line cards available for the SSR 8000/8600 prior to the 3.0 firmware release and the supported features. Line Card Part Number SSR-HTX12-08 SSR-HTX22-08 SSR-HFX11-08 SSR-HFX21-08 SSR-HFX29-08 SSR-GSX11-02 SSR-GSX21-02 SSR-GLX19-02 SSR-GLX29-02...
In addition, these cards support all pre-3.0 firmware features. All cards, except for the gigabit Ethernet cards, also support WFQ. The following table lists the line cards introduced for the SSR 8000/8600 with the 3.0 firmware release and the supported features. Line Card Part Number SSR-HTX12-08-AA...
Page 386
Appendix A: New Features Supported on Line Cards Pre-3.0 Line Card Part Firmware Number Features SSR-POS21-04 (POS OC-3c MMF) SSR-POS29-04 (POS OC-3c SMF) SSR-POS31-02 (POS OC-12c MMF) SSR-POS39-02-IR (POS OC-12cSMF- SSR-ATM29-02 (ATM OC-3c) SSR-ATM31-02 (ATM OC-12c MMF) SSR-ATM39-02-IR (ATM OC-12c SMF- SSR-HTX32-16 (16 port 10/100 TX) SSR-GSX31-02...
SSR 2000 Line Cards The following table lists the line cards available for the SSR 2000 and the supported features: Line Card Part Number Standard Chassis Configurations: SSR-2-B SSR-2-PKG SSR-2-WAN SSR-2-GSX Line Cards Available Prior to the 3.0 Firmware Release (Non-AA Revision): SSR-2-TX SSR-2-FX SSR-2-SX...
Appendix A: New Features Supported on Line Cards SSR-2-SX-AA SSR-2-LX-AA SSR-2-LX70-AA SSR-2-SER-AA SSR-2-SERC-AA SSR-2-SERCE-AA New Features that Require Specific Line Cards T-series line cards, -AA revision line cards, and non -AA revision line cards can be used in the same chassis. Version 3.0 and later firmware can detect the revision number of each line card, and when configuring features that require -AA or T-series line cards, the system checks to see if the line card revision matches.
Page 389
Appendix A: New Features Supported on Line Cards SmartSwitch Router User Reference Manual...
Appendix A: New Features Supported on Line Cards When multiple routers are connected together, only the router using Network Address Translation requires the -AA or T-series line card. In Diagram 2, only Router W requires the -AA or T-series line card since it is the only router performing translation to the global Internet.
When load balancing is implemented in a single system, the ports that attach to both incoming and outgoing interfaces must reside on -AA or T-series line cards. If the servers are load-sharing across multiple networks, ports assigned to the interfaces must also reside on -AA or T-series line cards.
Appendix A: New Features Supported on Line Cards When a VLAN spans across multiple SSRs with 802.1Q trunk ports, the requirements for -AA or T-series line cards depend on how layer 4 bridging is deployed. In Diagram 4, yellow and blue VLANs are created across multiple SSRs and are interconnected through an 802.1Q trunk port.
on SSR C since SSR C does not have a -AA or T-series line card. SSR C would drop all SNA traffic since its module would not recognize SNA traffic. QoS Rate Limiting There are three types of rate limiting supported on the SSR: •...
Appendix A: New Features Supported on Line Cards ToS Rewrite The ToS rewrite command allows a network administrator to change the value in the ToS octet (which includes both the Precedence or ToS fields) in each IP packet. The SSR looks at every IP packet coming into the interface, and if a packet matches the defined parameters (Source IP, Destination IP, Source Port, Destination Port, or ToS Octet), the SSR rewrites the ToS Octet to a specific value.
Weighted Random Early Detection (WRED) Weighted Random Early Detection (WRED) algorithms can alleviate traffic congestion. WRED allows you to set conditions and limits for the selective dropping of packets on input or output queues of specific ports before the queues become completely flooded. The ports on which WRED are enabled must reside on T-series line cards.
Appendix A: New Features Supported on Line Cards Multiple IPX Encapsulation WRED Aggregate rate limiting Port rate limiting Jumbo frame support *. 10/100 T-series line cards do not support jumbo frames. Identifying a Line Card ATM, packet-over-SONET, and 16-port 10/100 BASE-TX line cards are T-series line cards introduced with the 3.1 firmware release.
“Non -AA” Line Card D1.2 or less G2.1.1 or less I2.0 or less O2.0 or less Example 2: ssr# system show hardware verbose Slot CM/1, Module: 10/100-TX Rev. 1.0 Service String: 2_D1.2_0.512_I2.0_2_O2.0_0.512 The above Service String shows a “non -AA” 10/100 Base TX line card. Example 3: ssr# system show hardware verbose Slot CM/1, Module: 10/100-TX Rev.
Page 398
Appendix A: New Features Supported on Line Cards SmartSwitch Router User Reference Manual...
Need help?
Do you have a question about the SMARTSWITCH ROUTER 9032578-05 and is the answer not in the manual?
Questions and answers