Page 3
Contents Contents Safety instructions About this Manual Network Topology vs. Redundancy Protocols Network topologies 1.1.1 Meshed topology 1.1.2 Ring topology Redundancy Protocols Media Redundancy Protocol (MRP) Network Structure Reconfiguration time Advanced mode Prerequisites for MRP Example Configuration Parallel Redundancy Protocol (PRP) Implementation LRE Functionality PRP Network Structure...
Page 4
Contents Spanning Tree Basics 5.1.1 The tasks of the STP 5.1.2 Bridge parameters 5.1.3 Bridge Identifier 5.1.4 Root Path Cost 5.1.5 Port Identifier 5.1.6 Max Age and Diameter Rules for Creating the Tree Structure 5.2.1 Bridge information 5.2.2 Setting up the tree structure Examples 5.3.1 Example of determining the root path 5.3.2 Example of manipulating the root path...
Page 5
Safety instructions Safety instructions WARNING UNCONTROLLED MACHINE ACTIONS To avoid uncontrolled machine actions caused by data loss, configure all the data transmission devices individually. Before you start any machine which is controlled via data transmission, be sure to complete the configuration of all data transmission devices. Failure to follow these instructions can result in death, serious injury, or equipment damage.
Page 6
Safety instructions UM RedundConfig HiOS-2E EES Release 4.0 07/2014...
Page 7
About this Manual About this Manual The “GUI” reference manual contains detailed information on using the graphical interface to operate the individual functions of the device. The “Command Line Interface” reference manual contains detailed informa- tion on using the Command Line Interface to operate the individual functions of the device.
Page 8
About this Manual The Industrial HiVision network management software provides you with additional options for smooth configuration and monitoring: ActiveX control for SCADA integration Auto-topology discovery Browser interface Client/server structure Event handling Event log ...
Page 9
The designations used in this manual have the following meanings: List Work step Subheading Link Cross-reference with link Note: A note emphasizes an important fact or draws your attention to a dependency. ASCII representation in the graphical user interface Courier Execution in the Graphical User Interface Execution in the Command Line Interface...
Page 10
Bridge A random computer Configuration Computer Server PLC - Programmable logic controller I/O - Robot UM RedundConfig HiOS-2E EES Release 4.0 07/2014...
Page 11
Network Topology vs. Redundancy Protocols 1 Network Topology vs. Redundancy Protocols When using Ethernet, an important prerequisite is that data packets follow a single (unique) path from the sender to the receiver. The following network topologies support this prerequisite: Line topology ...
Page 12
Network Topology vs. Redundancy 1.1 Network topologies Protocols 1.1 Network topologies 1.1.1 Meshed topology For networks with star or tree topologies, redundancy procedures are only possible in connection with physical loop creation. The result is a meshed topology. Figure 2: Meshed topology: Tree topology with physical loops For operating in this network topology, the device provides you with the following redundancy protocols: ...
Page 13
Network Topology vs. Redundancy 1.1 Network topologies Protocols 1.1.2 Ring topology In networks with a line topology, you can use redundancy procedures by connecting the ends of the line. This creates a ring topology. Figure 3: Ring topology: Line topology with connected ends For operating in this network topology, the device provides you with the following redundancy protocols: ...
Page 14
Network Topology vs. Redundancy 1.2 Redundancy Protocols Protocols 1.2 Redundancy Protocols For operating in different network topologies, the device provides you with the following redundancy protocols: Redundancy Network topology Comments protocol Ring Uninterrupted availability. On the path from the sender to the receiver, HSR transports the data packets in both directions via a ring.
Page 15
Media Redundancy Protocol (MRP) 2 Media Redundancy Protocol (MRP) Since May 2008, the Media Redundancy Protocol (MRP) has been a stan- dardized solution for ring redundancy in the industrial environment. MRP is compatible with redundant ring coupling, supports VLANs, and is distinguished by very short reconfiguration times.
Page 16
Media Redundancy Protocol (MRP) 2.1 Network Structure 2.1 Network Structure The concept of ring redundancy allows the construction of high-availability, ring-shaped network structures. With the help of the RM (Ring Manager) function, the two ends of a backbone in a line structure can be closed to a redundant ring. The ring manager keeps the redundant line open as long as the line structure is intact.
Page 17
Media Redundancy Protocol (MRP) 2.2 Reconfiguration time 2.2 Reconfiguration time If a line section fails, the ring manager changes the MRP-Ring back into a line structure. You define the maximum time for the reconfiguration of the line in the ring manager. Possible values for the maximum delay time: •...
Page 18
Media Redundancy Protocol (MRP) 2.3 Advanced mode 2.3 Advanced mode For times even shorter than the guaranteed reconfiguration times, the device provides the advanced mode. The advanced mode speeds up the link failure recognition when the ring participants inform the ring manager of interrup- tions in the ring via link-down notifications.
Page 19
Media Redundancy Protocol (MRP) 2.4 Prerequisites for MRP 2.4 Prerequisites for MRP Before setting up an MRP-Ring, make sure that the following conditions are fulfilled: All ring participants support MRP. The ring participants are connected to each other via the ring ports. Apart from the device’s neighbors, no other ring participants are connected to the respective device.
Page 20
Media Redundancy Protocol (MRP) 2.5 Example Configuration 2.5 Example Configuration A backbone network contains 3 devices in a line structure. To increase the availability of the network, you convert the line structure to a redundant ring structure. Devices from different manufacturers are used.All devices support MRP.
Page 21
Media Redundancy Protocol (MRP) 2.5 Example Configuration Port type Bit rate Autonegotiation Port setting Duplex (automatic configuration) 100 Mbit/s 100 Mbit/s full duplex (FDX) Optical 100 Mbit/s 100 Mbit/s full duplex (FDX) Table 2: Port settings for ring ports Note: You configure optical ports without support for autonegotiation (auto- matic configuration) with 100 Mbit/s full duplex (FDX).
Page 22
Media Redundancy Protocol (MRP) 2.5 Example Configuration Note: Configure all the devices of the MRP-Ring individually. Before you connect the redundant line, you must have completed the configuration of all the devices of the MRP-Ring. You thus avoid loops during the configuration phase.
Page 23
Media Redundancy Protocol (MRP) 2.5 Example Configuration Switch MRP on on all devices in the network: Open the dialog. Switching > L2-Redundancy > MRP Define the desired ring ports. Figure 8: Defining the ring ports In the Command Line Interface you first define an additional parameter, the MRP domain ID.
Page 24
Media Redundancy Protocol (MRP) 2.5 Example Configuration Activate the ring manager. For the other devices in the ring, leave the setting as Off. Figure 9: Activating the ring manager Defines the device as the ring manager. Do not mrp domain modify mode activate the ring manager on any other device.
Page 25
Media Redundancy Protocol (MRP) 2.5 Example Configuration Select the checkbox in the "Advanced Mode" field. Figure 10: Activating the advanced mode Activates the advanced mode. mrp domain modify advanced-mode enabled UM RedundConfig HiOS-2E EES Release 4.0 07/2014...
Page 26
Media Redundancy Protocol (MRP) 2.5 Example Configuration In the "Ring Recovery" field, select the value 200ms. Figure 11: Defining the time for the ring recovery Defines 200ms as the max. delay time for the mrp domain modify reconfiguration of the ring. recovery-delay 200ms Note: If selecting 200 ms for the ring recovery does not provide the ring stability necessary to meet the requirements of your network, you select...
Page 27
Media Redundancy Protocol (MRP) 2.5 Example Configuration Switch the operation of the MRP-Ring on. Figure 12: Switching on the MRP function Click on “Set” to save the changes. Activates the MRP-Ring. mrp domain modify operation enable When all the ring participants are configured, close the line to the ring. To do this, you connect the devices at the ends of the line via their ring ports.
Page 28
Media Redundancy Protocol (MRP) 2.5 Example Configuration The "Operation" field shows the operating state of the ring port. Possible values: forwarding Port is switched on, connection exists. blocked Port is blocked, connection exists. disabled Port is disabled. ...
Page 29
Media Redundancy Protocol (MRP) 2.5 Example Configuration The "Information" field shows messages for the redundancy configura- tion and the possible causes of errors. The following messages are possible if the device is operating as a ring client or a ring manager: ...
Page 30
Media Redundancy Protocol (MRP) 2.5 Example Configuration If applicable, integrate the MRP ring into a VLAN: In the "VLAN ID" field, define the MRP VLAN ID. The MRP VLAN ID determines in which of the configured VLANs the device transmits the MRP packets.
Page 31
Parallel Redundancy Protocol (PRP) 3 Parallel Redundancy Protocol (PRP) Unlike ring redundancy protocols, PRP uses 2 separate LANs for uninter- rupted availability. On the path from the sender to the receiver, PRP sends 2 data packets in parallel via the 2 mutually independent LANs. The receiver processes the first data packet received and discards the second data packet of the pair.
Page 32
Parallel Redundancy Protocol (PRP) 3.1 Implementation 3.1 Implementation When the upper protocol layers send a data packet, the PRP interface creates a “twin packet” from the original packet. The PRP interface then transmits 1 data packet of the pair to each participating LAN simultaneously. The packets traverse different LANs and therefore have different run times.
Page 33
Parallel Redundancy Protocol (PRP) 3.2 LRE Functionality 3.2 LRE Functionality Each Double Attached Node implementing PRP (DANP) has 2 LAN ports that operate in parallel. The Link Redundancy Entity (LRE) connects the upper protocol layers with every individual port. DANP 1 DANP 2 hard real-time hard real-time...
Page 34
Parallel Redundancy Protocol (PRP) 3.2 LRE Functionality The device allows you to view the received supervision packet entries. The entries in the Switching > L2-Redundancy > PRP > DAN/VDAN Table helpful for detecting redundancy and connection problems. For example, in an index when the "Last Seen B"...
Page 35
Parallel Redundancy Protocol (PRP) 3.3 PRP Network Structure 3.3 PRP Network Structure PRP uses 2 independent LANs. The topology of each of these LANs is arbi- trary, and ring, star, bus and meshed topologies are possible. The main advantage of PRP is zero recovery time with an active (transit) LAN.
Page 36
Parallel Redundancy Protocol (PRP) 3.3 PRP Network Structure Terminal devices that connect directly to a device in the (transit) LAN are SANs (Single Attached Nodes). SANs connected to a LAN have no redun- dancy. To use the PRP redundant network, connect the SAN to the PRP network via a RedBox.
Page 37
Parallel Redundancy Protocol (PRP) 3.4 Connecting RedBoxes and DANPs to a PRP network 3.4 Connecting RedBoxes and DANPs to a PRP network DANPs have 2 interfaces for the connection to the PRP network. A RedBox is a DANP that contains additional switch ports. Use the switch ports to inta- grate one or more SANs into the PRP network redundantly.
Page 38
Parallel Redundancy Protocol (PRP) 3.5 Example Configuration 3.5 Example Configuration The following example uses a simple PRP network with 4 devices. Verify that the LAN A and LAN B ports contain 100 Mbit/s optical SFP interfaces. Connect Port A to LAN A and the Port B to LAN B. VDAN 1 VDAN 2 RedBox 1...
Page 39
Parallel Redundancy Protocol (PRP) 3.5 Example Configuration Perform the following steps on both the RedBox 1 and DANP 1 devices. Open the Switching > L2-Redundancy > PRP > Configuration dialog. Perform the following step in the "Supervision Packet Receiver" frame: ...
Page 40
Parallel Redundancy Protocol (PRP) 3.5 Example Configuration Note: If you deactivate the PRP function, then deactivate either Port “A“ or “B“ to help prevent network loops. Switch to the privileged EXEC mode. enable Switch to the Configuration mode. configure Disable the option. no mrp operation Disable the option.
Page 41
Parallel Redundancy Protocol (PRP) 3.6 PRP and Port Mirroring 3.6 PRP and Port Mirroring The transceivers send traffic to the LRE, which separates the traffic. The LRE forwards the data frames to PRP Port A and the control frames to PRP Port B of the switch.
Page 42
Parallel Redundancy Protocol (PRP) 3.6 PRP and Port Mirroring UM RedundConfig HiOS-2E EES Release 4.0 07/2014...
Page 43
High-availability Seamless Redun- dancy (HSR) 4 High-availability Seamless Redundancy (HSR) As with PRP, an HSR ring also offers zero recovery time. HSR is suited for applications that demand high availability and short reaction times. For example, protection applications for electrical station automation and control- lers for synchronized drives which require constant connection.
Page 44
High-availability Seamless Redun- 4.1 Implementation dancy (HSR) 4.1 Implementation HSR Redundancy Boxes (RedBox) use 2 Ethernet ports operating in parallel to connect to a ring. An HSR RedBox operating in this configuration is a Doubly Attached Node implementing the HSR protocol (DANH). A standard ethernet device connected to the HSR ring through an HSR RedBox is a Virtual DANH (VDANH).
Page 45
High-availability Seamless Redun- 4.2 HSR Network Structure dancy (HSR) 4.2 HSR Network Structure An HSR Network consists of a ring, where each HSR device performs a specific role in the network. An HSR device for example, connects standard ethernet devices to an HSR ring, or PRP LANs to an HSR ring. 4.2.1 Connecting SANs to an HSR Network Standard ethernet devices, such as maintenance laptops or printers, have 1...
Page 46
High-availability Seamless Redun- 4.2 HSR Network Structure dancy (HSR) DANH 1 DANH 2 RedBox 1 VDANH 1 VDANH 2 Figure 20: Connecting a VDANH to an HSR network SAN Device Connection Example Configuration A simple HSR network consists of 3 HSR devices as seen in the previous figure.
Page 47
High-availability Seamless Redun- 4.2 HSR Network Structure dancy (HSR) The device sends either its own HSR supervision packets exclusively, or sends both its own supervision packets and packets of connected devices. After installing new HSR devices, deactivate this function to maintain a clear overview of the HSR supervision packets on remote devices.
Page 48
High-availability Seamless Redun- 4.2 HSR Network Structure dancy (HSR) To update the table entries, click "Reload". The device detects errors and displays them according to MIB Managed Objects and the respective link. Open the dialog Switching > L2-Redundancy > HSR > Statistics to view the quality of the traffic that traverses the device.
Page 49
High-availability Seamless Redun- 4.2 HSR Network Structure dancy (HSR) Show node table. show hsr node-table Show proxy node table. show hsr proxy-node-table 4.2.2 HSR and PRP network connections When connecting PRP networks to an HSR network, the HSR device uses 2 interfaces to connect to the HSR ring.
Page 50
High-availability Seamless Redun- 4.2 HSR Network Structure dancy (HSR) SAN B1 SAN B2 RedBox 1 LAN B LAN A PRP Network 1 DANH 1 DANH 2 RedBox 1 VDANH 1 VDANH 2 Figure 21: Connecting a PRP network to an HSR network HSR Redboxes use 2 interfaces for the HSR ring.
Page 51
High-availability Seamless Redun- 4.2 HSR Network Structure dancy (HSR) PRP Network Connection Example Configuration The following example configures a simple HSR network with 3 HSR devices as shown in the previous figure. Use the HSR RedBox configured in the previous example to connect the standard ethernet devices to the HSR ring.
Page 52
High-availability Seamless Redun- 4.2 HSR Network Structure dancy (HSR) To analyze received HSR supervision packets, activate the "Eval- uate Supervision Packets"checkbox in the "Supervision Packet Receiver" frame. To transmit HSR supervision packets from this device, activate "Active"in the "Supervision Packet Transmitter" frame. ...
Page 53
High-availability Seamless Redun- 4.2 HSR Network Structure dancy (HSR) Another possibility is to use the following CLI commands to configure the HSR devices 1 and 2. Switch to the privileged EXEC mode. enable Switch to the Configuration mode. configure Disable the option. no mrp operation Disable the option.
Page 54
High-availability Seamless Redun- 4.2 HSR Network Structure dancy (HSR) hsr instance 1 redbox-id id1b Enable the device to process traffic destine for LAN B of the PRP network 1. Enable evaluation of received supervision hsr instance 1 supervision packets. evaluate Enable supervision packet transmission.
Page 55
Spanning Tree 5 Spanning Tree Note: The Spanning Tree Protocol is a protocol for MAC bridges. For this reason, the following description uses the term bridge for Switch. Local networks are getting bigger and bigger. This applies to both the geographical expansion and the number of network participants.
Page 56
Spanning Tree If the device working as the root is inoperable and another device takes over its function, the Max Age setting of the new root bridge determines the maximum number of devices allowed in a branch. Note: The RSTP standard dictates that all the devices within a network work with the (Rapid) Spanning Tree Algorithm.
Page 57
Spanning Tree 5.1 Basics 5.1 Basics Because RSTP is a further development of the STP, all the following descriptions of the STP also apply to the RSTP. 5.1.1 The tasks of the STP The Spanning Tree Algorithm reduces network topologies built with bridges and containing ring structures due to redundant links to a tree structure.
Page 58
Spanning Tree 5.1 Basics 5.1.2 Bridge parameters In the context of Spanning Tree, each bridge and its connections are uniquely described by the following parameters: Bridge Identifier Root Path Cost for the bridge ports, Port Identifier 5.1.3 Bridge Identifier The Bridge Identifier consists of 8 bytes.
Page 59
Spanning Tree 5.1 Basics 5.1.4 Root Path Cost Each path that connects 2 bridges is assigned a cost for the transmission (path cost). The Switch determines this value based on the transmission speed (see table 3). It assigns a higher path cost to paths with lower transmission speeds.
Page 60
Spanning Tree 5.1 Basics a. Bridges that conform with IEEE 802.1D 1998 and only support 16-bit values for the path costs should use the value 65,535 (FFFFH) for path costs when they are used in conjunction with bridges that support 32-bit values for the path costs. 5.1.5 Port Identifier The port identifier consists of 2 bytes.
Page 61
Spanning Tree 5.1 Basics 5.1.6 Max Age and Diameter The “Max Age” and “Diameter” values largely determine the maximum expansion of a Spanning Tree network. Diameter The number of connections between the devices in the network that are furthest removed from each other is known as the network diameter. Diameter = 7 Root-Bridge Figure 25: Definition of diameter...
Page 62
Spanning Tree 5.1 Basics MaxAge Every STP-BPDU contains a “MessageAge” counter. When a bridge is passed through, the counter increases by 1. Before forwarding a STP-BPDU, the bridge compares the “MessageAge” counter with the “MaxAge” value defined in the device: ...
Page 63
Spanning Tree 5.2 Rules for Creating the Tree Structure 5.2 Rules for Creating the Tree Structure 5.2.1 Bridge information To determine the tree structure, the bridges need more detailed information about the other bridges located in the network. To obtain this information, each bridge sends a BPDU (Bridge Protocol Data Unit) to the other bridges.
Page 64
Spanning Tree 5.2 Rules for Creating the Tree Structure If there are multiple paths with the same root path costs, the bridge further away from the root decides which port it blocks. For this purpose, it uses the bridge identifiers of the bridge closer to the root. The bridge blocks the port that leads to the bridge with the numerically higher ID (a numerically higher ID is the logically worse one).
Page 65
Spanning Tree 5.2 Rules for Creating the Tree Structure Determine root path Equal Path with lowest path costs? path costs = root path Path with highest Equal priority in priority (numerically bridge identification? lower value) in bridge identification = root path Use the bridge with lowest MAC address = designated bridge...
Page 66
Spanning Tree 5.3 Examples 5.3 Examples 5.3.1 Example of determining the root path You can use the network plan (see figure 28) to follow the flow chart (see figure 27) for determining the root path. The administrator has specified a priority in the bridge identification for each bridge.
Page 67
Spanning Tree 5.3 Examples Root Bridge P-BID = 16 384 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 P-BID = 32 768 MAC 00:01:02:03:04:06 Port 3 MAC 00:01:02:03:04:05 Port 1 Priority of the bridge identifikation (BID) P-BID = BID without MAC Address P-BID = 32 768...
Page 68
Spanning Tree 5.3 Examples 5.3.2 Example of manipulating the root path You can use the network plan (see figure 29) to follow the flow chart (see figure 27) for determining the root path. The Administrator has performed the following: – Left the default value of 32,768 (8000H) for every bridge apart from bridge 1 and bridge 5, and –...
Page 70
Spanning Tree 5.3 Examples 5.3.3 Example of manipulating the tree structure The Management Administrator soon discovers that this configuration with bridge 1 as the root bridge (see on page 66 “Example of determining the root path”) is invalid. On the paths from bridge 1 to bridge 2 and bridge 1 to bridge 3, the control packets which the root bridge sends to all other bridges add up.
Page 71
Spanning Tree 5.4 The Rapid Spanning Tree Protocol 5.4 The Rapid Spanning Tree Protocol The RSTP uses the same algorithm for determining the tree structure as STP. RSTP merely changes parameters, and adds new parameters and mechanisms that speed up the reconfiguration if a link or bridge becomes inoperable.
Page 72
Spanning Tree 5.4 The Rapid Spanning Tree Protocol Edge port Every network segment with no additional RSTP bridges is connected with exactly one designated port. In this case, this designated port is also an edge port. The distinction of an edge port is the fact that it does not receive any RST BPDUs (Rapid Spanning Tree Bridge Protocol Data Units).
Page 73
Spanning Tree 5.4 The Rapid Spanning Tree Protocol BID = 16 384 BID = 20 480 BID = 24 576 BID = 40 960 BID = 28 672 BID = 32 768 Priority of the bridge identifikation (BID) P-BID Port 2 = BID without MAC Address Root path Port 1...
Page 74
Spanning Tree 5.4 The Rapid Spanning Tree Protocol 5.4.2 Port states Depending on the tree structure and the state of the selected connection paths, the RSTP assigns the ports their states. STP port state Administrative RSTP Active topology bridge port operational Port state (port role)
Page 75
Spanning Tree 5.4 The Rapid Spanning Tree Protocol 5.4.3 Spanning Tree Priority Vector To assign roles to the ports, the RSTP bridges exchange configuration infor- mation with each other. This information is known as the Spanning Tree Priority Vector. It is part of the RSTP BPDUs and contains the following infor- mation: ...
Page 76
Spanning Tree 5.4 The Rapid Spanning Tree Protocol Address table: With STP, the age of the entries in the FDB determines the updating of communication. RSTP immediately deletes the entries in those ports affected by a reconfiguration. Reaction to events: Without having to adhere to any time specifications, RSTP immediately reacts to events such as connection interruptions, connection reinstate- ments, etc.
Page 77
Spanning Tree 5.5 Configuring the device 5.5 Configuring the device RSTP configures the network topology completely independently. The device with the lowest bridge priority automatically becomes the root bridge. However, to define a specific network structure regardless, you specify a device as the root bridge.
Page 78
Spanning Tree 5.5 Configuring the device Open the Switching > L2-Redundancy > Spanning Tree > Global dialog. Activate the function. Figure 32: Switching the function on Click "Set" to save the changes. Switch to the privileged EXEC mode. enable Switch to the Configuration mode.
Page 79
Spanning Tree 5.5 Configuring the device Now connect the redundant lines. Define the settings for the device that takes over the role of the root bridge. In the "Priority"field you enter a numerically lower value. The bridge with the numerically lowest bridge ID has the highest priority and becomes the root bridge of the network.
Page 80
Spanning Tree 5.5 Configuring the device After saving, the dialog shows the following information: – The "Bridge is Root" checkbox is marked. – The "Root Port" field shows the value 0.0. – The "Root Path Cost" field shows the value 0. Figure 34: Device is operating as root bridge Displays the parameters for checking.
Page 81
Spanning Tree 5.5 Configuring the device If applicable, change the values in the "Forward Delay [s]" and "Max Age" fields. – The root bridge transmits the changed values to the other devices. Figure 35: Changing Forward Delay and Max Age ...
Page 82
Spanning Tree 5.5 Configuring the device Note: If possible, do not change the value in the “Hello Time” field. Check the following values in the other devices: – Bridge ID (bridge priority and MAC address) of the corresponding device and the root bridge. –...
Page 83
Spanning Tree 5.6 Guards 5.6 Guards The device allows you to activate various protection functions (guards) on the device ports. The following protection functions help protect your network from incorrect configurations, loops and attacks with STP-BPDUs: BPDU Guard – for manually defined terminal device ports (edge ports) You activate this protection function globally in the device.
Page 84
Spanning Tree 5.6 Guards If a designated port receives an STP-BPDU with better path information to the root bridge, the device discards the STP-BPDU and sets the trans- mission state of the port to discarding instead of root. If there are no STP-BPDUs with better path information to the root bridge, after 2 x Hello Time the device resets the state of the port to a value according to the port role.
Page 85
Spanning Tree 5.6 Guards If the protection function is activated, the device ignores Topology Change flags in received STP-BPDUs. This does not change the content of the address table (FDB) of the device port. However, additional infor- mation in the BPDU that changes the topology is processed by the device. ...
Page 86
Spanning Tree 5.6 Guards 5.6.1 Activating the BPDU Guard Open the Switching > L2-Redundancy > Spanning Tree > Global dialog. Mark the "BPDU Guard" checkbox. Figure 37: Activating the BPDU Guard Click "Set" to save the changes. Switch to the privileged EXEC mode.
Page 87
Spanning Tree 5.6 Guards Open the Switching > L2-Redundancy > Spanning Tree > Port dialog. Switch to the "CIST" tab. For terminal device ports, mark the checkbox in the "Admin Edge Port"column. Figure 38: dialog, Switching > L2-Redundancy > Spanning Tree > Port "CIST"...
Page 88
Spanning Tree 5.6 Guards If an edge port receives an STP-BPDU, the device behaves as follows: The device deactivates this port. In the dialog, "Configuration" tab, the checkbox Basic Settings > Port in the "Port on" column is not marked for this port. ...
Page 89
Spanning Tree 5.6 Guards To reset the status of the device port to the value forwarding, you proceed as follows: If the device port is still receiving BPDUs: – Remove the manual definition as an edge port. – Deactivate the BPDU Guard ...
Page 90
Spanning Tree 5.6 Guards 5.6.2 Activating Root Guard / TCN Guard / Loop Guard Open the Switching > L2-Redundancy > Spanning Tree > Port dialog. Switch to the "Guards" tab. For designated ports, select the checkbox in the "Root Guard" column.
Page 91
Spanning Tree 5.6 Guards Switch to the privileged EXEC mode. enable Switch to the Configuration mode. configure Switches to the interface mode. interface x/y Switches the Root Guard on at the designated spanning-tree guard-root port. Switches on the TCN Guard on the port that spanning-tree guard-tcn receives STP-BPDUs with a Topology Change flag.
Page 92
Spanning Tree 5.6 Guards UM RedundConfig HiOS-2E EES Release 4.0 07/2014...
Page 93
Link Aggregation 6 Link Aggregation Link Aggregation using the single switch method helps you overcome 2 limitations with ethernet links, namely bandwidth, and redundancy. The first problem that the Link Aggregation Group (LAG) function helps you with is bandwidth limitations of individual ports. LAG allows you to combine 2 or more links in parallel, creating 1 logical link between 2 devices.
Page 94
Link Aggregation Figure 41: dialog Switching > L2-Redundancy > Link Aggregation UM RedundConfig HiOS-2E EES Release 4.0 07/2014...
Page 95
Link Aggregation 6.1 Methods of Operation 6.1 Methods of Operation The device operates on the Single Switch method. The Single Switch method provides you an inexpensive way to grow your network. The single switch method states that you need 1 device on each side of a link to provide the physical ports.
Page 96
Link Aggregation 6.1 Methods of Operation Static and Dynamic Links The device allows you to set up static and dynamic links. Static Links - The administrator sets up and maintains the links manu- ally. For example, when a link fails and there is a media converter between the devices, the media converter continues forwarding traffic on the link causing the link to fail.
Page 97
Link Aggregation 6.2 Link Aggregation Example 6.2 Link Aggregation Example Connect multiple workstations using one aggregated link group between switch 1 and 2. By aggregating multiple links, higher speeds are achievable without a hardware upgrade. Switch 1 Switch 2 Port 5 Port 5 Server 2 Server 1...
Page 98
Link Aggregation 6.2 Link Aggregation Example UM RedundConfig HiOS-2E EES Release 4.0 07/2014...
Page 99
Link Backup 7 Link Backup Link Backup provides a redundant link for traffic on Layer 2 devices. When the device detects an error on the primary link, then the device transfers traffic to the backup link. You typically use Link Backup in service-provider or enterprise networks.
Page 100
Link Backup Figure 43: "Link Backup" dialog UM RedundConfig HiOS-2E EES Release 4.0 07/2014...
Page 101
Link Backup 7.1 Fail Back Description 7.1 Fail Back Description Link Backup also allows you to set up a Fail Back option. When you activate the fail back function and the primary link returns to normal operation, the device first blocks traffic on the backup port and then forwards traffic on the primary port.
Page 102
Link Backup 7.2 Example Configuration 7.2 Example Configuration In the example network below, you connect ports 2/3 and 2/4 on switch A to the uplink switches B and C. When you set up the ports as a Link Backup pair, 1 of the ports forwards traffic and the other port is in the blocking mode. The primary, port 2/3 on switch A, is the active port and is forwarding traffic to port 1 on switch B.
Page 103
Link Backup 7.2 Example Configuration In the "Create" window, from the "Primary Port" drop-down menu select 2/3 and from the "Backup Port" drop-down menu select 2/4. Click "OK". In the "Description" textbox, enter Link_Backup_1 as the name for the backup pair.
Page 104
Readers’ Comments A Readers’ Comments What is your opinion of this manual? We are always striving to provide as comprehensive a description of our product as possible, as well as important information that will ensure trouble-free operation. Your comments and suggestions help us to further improve the quality of our documentation.
Page 105
Readers’ Comments Suggestions for improvement and additional information: General comments: Sender: Company / Department: Name / Telephone no.: Street: Zip code / City: e-mail: Date / Signature: Dear User, Please fill out and return this page as a fax to the number +49 (0)7127 14-1600 or ...
Page 106
Readers’ Comments UM RedundConfig HiOS-2E EES Release 4.0 07/2014...
Page 107
Index B Index Advanced Mode 18, 20 Path costs 59, 63 Alternate port 72, 85 Port Identifier 58, 60 Port mirroring and PRP Port number Backup port 72, 85 Port priority (Spanning Tree) BPDU Port roles (RSTP) BPDU guard 83, 86 Port-State Bridge Identifier 14, 31...
Page 108
Index UM RedundConfig HiOS-2E EES Release 4.0 07/2014...
Page 109
Contact our support at https://hirschmann-support.belden.eu.com You can contact us in the EMEA region at Tel.: +49 (0)1805 14-1538 E-mail: hac.support@belden.com in the America region at Tel.: +1 (717) 217-2270 E-mail: inet-support.us@belden.com in the Asia-Pacific region at ...
Page 110
Further Support With the Hirschmann Competence Center, you have decided against making any compromises. Our client-customized package leaves you free to choose the service components you want to use. Internet: http://www.hicomcenter.com UM RedundConfig HiOS-2E EES Release 4.0 07/2014...
Page 111
Further Support UM RedundConfig HiOS-2E EES Release 4.0 07/2014...
Need help?
Do you have a question about the HIRSCHMANN HiOS-2E EES and is the answer not in the manual?
Questions and answers