Fastpath Configuration Guide v1.1 PDF
Fastpath Configuration Guide v1.1 PDF
Fastpath Configuration Guide v1.1 PDF
FASTPATH
Configuration Guide
Customer Service
Contact Information: Kontron Canada, Inc. Kontron Modular Computer GmbH
4555 Ambroise-Lafortune Sudetenstrasse 7
Boisbriand, Québec, Canada 87600 Kaufbeuren
J7H 0A4 Germany
Tel: (450) 437-5682 +49 (0) 8341 803 333
(800) 354-4223
Fax: (450) 437-8053 +49 (0) 8341 803 339
E-mail: support@ca.kontron.com support-kom@kontron.com
ii Configuration Guide
www.kontron.com
Table of Contents
Revision History .................................................................................................................. ii
Customer Service ................................................................................................................ ii
Proprietary Note ................................................................................................................vii
Trademarks .....................................................................................................................vii
About This Document ..........................................................................................................vii
Kontron Support for Switch Software .....................................................................................viii
Audience ....................................................................................................................viii
Organization .....................................................................................................................ix
Additional Documentation ....................................................................................................ix
Advisory Conventions ...........................................................................................................ix
Typographical Conventions .................................................................................................... x
About Fastpath Software Modules ........................................................................................... x
Two Year Warranty ...............................................................................................................xi
www.kontron.com
2.2.2 CLI Examples ................................................................................................ 20
2.3 IGMP Proxy ......................................................................................................... 22
2.3.1 CLI examples ................................................................................................ 22
2.4 Link Aggregation/Port-channels .............................................................................. 23
2.4.1 CLI Example ................................................................................................. 23
2.5 Port Mirroring ..................................................................................................... 25
2.5.1 Overview ...................................................................................................... 25
2.5.2 CLI Examples ................................................................................................ 26
2.6 Port Security ....................................................................................................... 27
2.6.1 Overview ...................................................................................................... 27
2.6.2 Operation .................................................................................................... 28
2.6.3 CLI Examples ................................................................................................ 28
2.7 Link Layer Discovery Protocol .................................................................................. 29
2.7.1 CLI Examples ................................................................................................ 29
2.8 Denial of Service Attack Protection ........................................................................... 30
2.8.1 Overview ...................................................................................................... 30
2.8.2 CLI Examples ................................................................................................ 31
2.9 DHCP Filtering ..................................................................................................... 31
2.9.1 Overview ...................................................................................................... 31
2.9.2 Limitations .................................................................................................. 31
2.9.3 CLI Examples ................................................................................................ 32
2.10Configuring Spanning Tree Protocol .......................................................................... 33
2.10.1 Configuring Spanning Tree Protocol ................................................................... 33
iv Configuration Guide
www.kontron.com
4.2.2 MAC ACLs ..................................................................................................... 68
4.2.3 IP ACLs ........................................................................................................ 68
4.2.4 ACL Configuration Process ................................................................................ 69
4.2.5 IP ACL CLI Examples ....................................................................................... 69
4.2.6 MAC ACL CLI Examples ..................................................................................... 70
4.3 RADIUS .............................................................................................................. 73
4.3.1 RADIUS Configuration Example ......................................................................... 73
4.4 TACACS+ ............................................................................................................. 75
4.4.1 TACACS+ Configuration Example ........................................................................ 75
5. IPv6 ............................................................................................................. 77
5.1 Overview ............................................................................................................ 77
5.2 Interface Configuration ......................................................................................... 77
5.2.1 CLI Example ................................................................................................. 78
5.3 DHCPv6 ............................................................................................................. 80
5.3.1 CLI Examples ................................................................................................ 81
7. Multicast ...................................................................................................... 91
7.1 Overview ............................................................................................................ 91
7.2 IGMP Configuration .............................................................................................. 91
7.2.1 CLI Example ................................................................................................. 92
7.3 IGMP Proxy ......................................................................................................... 92
7.3.1 CLI Examples ................................................................................................ 92
7.4 MLD .................................................................................................................. 94
7.4.1 CLI Example ................................................................................................. 94
7.5 DVMRP .............................................................................................................. 94
7.5.1 CLI Example ................................................................................................. 95
7.6 PIM .................................................................................................................. 96
7.6.1 PIM-SM ....................................................................................................... 96
7.6.2 PIM-DM ....................................................................................................... 98
v Configuration Guide
www.kontron.com
List of Figures
Figure 1-1: Log Files Key ......................................................................................................... 10
Figure 2-1: VLAN Example Network Diagram ................................................................................ 17
Figure 2-2: LAG/Port-channel Example Network Diagram ................................................................ 23
Figure 3-1: Port Routing Example Network Diagram....................................................................... 38
Figure 3-2: VLAN Routing Example Network Diagram ..................................................................... 40
Figure 3-3: RIP for VLAN Routing Example Network Diagram ............................................................ 42
Figure 3-4: VRRP Example Network Configuration ......................................................................... 46
Figure 3-5: OSPF Example Network Diagram: Border Router ............................................................. 51
Figure 3-6: OSPF Configuration—Stub Area and NSSA Area .............................................................. 53
Figure 3-7: OSPF Configuration—Virtual Link................................................................................ 55
Figure 3-8: Port Routing Example Network Diagram....................................................................... 58
Figure 3-9: Forwarding Without ECMP ........................................................................................ 61
Figure 3-10:Next Hop with Two Static Routes................................................................................ 61
Figure 4-1: FASTPATH with 802.1x Network Access Control .............................................................. 64
Figure 4-2: IP ACL Example Network Diagram ............................................................................... 67
Figure 4-3: RADIUS Servers in a FASTPATH Network........................................................................ 73
Figure 4-4: FASTPATH with TACACS+ ........................................................................................... 74
Figure 5-1: IPv6 Example ........................................................................................................ 77
Figure 5-2: DHCPv6 Prefix Delegation Scenario............................................................................. 79
Figure 6-1: CoS Mapping and Queue Configuration........................................................................ 83
Figure 6-2: CoS Configuration Example System Diagram ................................................................. 84
Figure 6-3: DiffServ Internet Access Example Network Diagram ........................................................ 86
Figure 6-4: DiffServ VoIP Example Network Diagram ...................................................................... 88
vi Configuration Guide
www.kontron.com
Preface
Proprietary Note
This document contains information proprietary to Kontron AG. It may not be copied or transmitted by any
means, disclosed to others, or stored in any retrieval system or media without the prior written consent of
Kontron AG or one of its authorized agents.
The information contained in this document is, to the best of our knowledge, entirely correct. However, Kon-
tron AG cannot accept liability for any inaccuracies or the consequences thereof, or for any liability arising
from the use or application of any circuit, product, or example shown in this document.
Kontron AG reserves the right to change, modify, or improve this document or the product described herein,
as seen fit by Kontron AG without further notice.
Trademarks
Kontron AG and the Kontron logo are trade marks owned by Kontron AG, Germany. In addition, this document
may include names, company logos and trademarks, which are registered trademarks and, therefore, propri-
etary to their respective owners.
www.kontron.com
Preface
Audience
The information in this guide is intended for any of the following individuals:
• System administrators who are responsible for configuring and operating a network using FASTPATH
software
• Software engineers who are integrating FASTPATH software into a router or switch product
• Level 1 and/or Level 2 Support providers
To obtain the greatest benefit from this guide, you should have an understanding of the base software and
should have read the specification for your networking device platform. You should also have basic know-
ledge of Ethernet and networking concepts.
www.kontron.com
Preface
Organization
This document is organized as follows:
• Chapter 1: “System Configuration” on page 1 describes how to configure basic system and port set-
tings, use system interfaces and utilities, and create and use CLI scripts.
• Chapter 2: “Switching Configuration” on page 16 provides configuration scenarios for switching, in-
cluding creating virtual LANs, IGMP snooping interfaces, STP and port security.
• Chapter 3: “Routing Configuration” on page 38 provides configuration scenarios for layer 3 features
such as VLAN routing, OSPF, and RIP.
• Chapter 4: “Device Security” on page 65 provides information on creating access control lists and con-
figuring RADIUS and TACACS+ servers.
• Chapter 5: “IPv6” on page 77 describes configuring and using IPv6-enabled interfaces in a mixed IPv6/
IPv4 network.
• Chapter 6: “Quality of Service” on page 82 provides configuration scenarios for class-of-service queue-
ing and differentiated services.
• Chapter 7: “Multicast” on page 91 describes IGMP, MLD, DVMRP and PIM.
Additional Documentation
The following documentation provides additional information about FASTPATH software:
• The FASTPATH CLI Reference manual of the corresponding product describes the commands available
from the command-line interface (CLI) for managing, monitoring, and configuring the switch.
Advisory Conventions
This section describes the conventions this document uses.
CAUTION
This symbol provides information about critical aspects of the config-
uration, combinations of settings, events or procedures that can
adversely affect network connectivity, security and so on.
Note...
This symbol and title emphasize aspects the reader should read through carefully
for his or her own advantage.
ix Configuration Guide
www.kontron.com
Preface
Typographical Conventions
This guide uses the typographical conventions described in the table below.
x Configuration Guide
www.kontron.com
Preface
xi Configuration Guide
www.kontron.com
System Configuration
1. System Configuration
This chapter provides configuration scenarios for the following features:
• Traceroute
• Configuration Scripting
• Outbound Telnet
• Pre-Login Banner
• Simple Network Time Protocol (SNTP)
• Syslog
• Port Description
• Storm Control
• Cable Test
Note...
For information on setting up the hardware and serial or TFTP connection, refer
to the product User Guide.
1.1 Traceroute
Use Traceroute to discover the routes that packets take when traveling on a hop-by-hop basis to their desti-
nation through the network.
• Maps network routes by sending packets with small Time-to-Live (TTL) values and watches the ICMP
time-out announcements
• Command displays all L3 devices
• Can be used to detect issues on the network
• Tracks up to 20 hops
• Default UPD port uses 33343 unless modified in the traceroute command
1 Configuration Guide
www.kontron.com
System Configuration
1 10.254.24.1 40 ms 9 ms 10 ms
2 10.254.253.1 30 ms 49 ms 21 ms
3 63.237.23.33 29 ms 10 ms 10 ms
4 63.144.4.1 39 ms 63 ms 67 ms
5 63.144.1.141 70 ms 50 ms 50 ms
6 205.171.21.89 39 ms 70 ms 50 ms
7 205.171.8.154 70 ms 50 ms 70 ms
8 205.171.8.222 70 ms 50 ms 80 ms
9 205.171.251.34 60 ms 90 ms 50 ms
10 209.244.219.181 60 ms 70 ms 70 ms
11 209.244.11.9 60 ms 60 ms 50 ms
12 4.68.121.146 50 ms 70 ms 60 ms
13 4.79.228.2 60 ms 60 ms 60 ms
14 216.115.96.185 110 ms 59 ms 70 ms
15 216.109.120.203 70 ms 66 ms 95 ms
16 216.109.118.74 78 ms 121 ms 69 ms
1.2.1 Overview
Configuration scripting:
• Provides scripts that can be uploaded and downloaded to the system.
• Provides flexibility to create command configuration scripts.
2 Configuration Guide
www.kontron.com
System Configuration
1.2.2 Considerations
• Total number of scripts stored on the system is limited by NVRAM/FLASH size.
• Application of scripts is partial if script fails. For example, if the script executes five of ten commands
and the script fails, the script stops at five.
• Scripts cannot be modified or deleted while being applied.
• Validation of scripts checks for syntax errors only. It does not validate that the script will run.
Are you sure you want to delete the configuration script(s)? (y/n) y
3 Configuration Guide
www.kontron.com
System Configuration
Are you sure you want to apply the configuration script? (y/n) y
Configuration Saved!
Mode.........................TFTP
Set TFTP Server IP...........192.168.77.52
TFTP Path...................../
TFTP Filename................running-config.scr
Data Type....................Config Script
Source Filename..............running-config.scr
4 Configuration Guide
www.kontron.com
System Configuration
5 Configuration Guide
www.kontron.com
System Configuration
IP Address...............................192.168.77.151
Subnet Mask..............................255.255.255.0
Default Gateway......................... 192.168.77.127
Burned In MAC Address................... 00:10:18.82.04:E9
Locally Administered MAC Address.........00:00:00:00:00:00
MAC Address Type.........................Burned In
Network Configuration Protocol Current...DHCP
Management VLAN ID...................... 1
Web Mode................................ Enable
Java Mode .............................. Disable
6 Configuration Guide
www.kontron.com
System Configuration
Mode.......................................... TFTP
Set TFTP Server IP.............................192.168.77.52
TFTP Path......................................./
TFTP Filename..................................banner.txt
Data Type......................................Cli Banner
Note...
The command “no clibanner” removes the banner from the switch.
7 Configuration Guide
www.kontron.com
System Configuration
SNTP Servers
------------
8 Configuration Guide
www.kontron.com
System Configuration
IP Address: 81.169.155.234
Address Type: IPV4
Priority: 1
Version: 4
Port: 123
Last Update Time: MAY 18 04:59:13 2005
Last Attempt Time: MAY 18 11:59:33 2005
Last Update Status: Other
Total Unicast Requests: 1111
Failed Unicast Requests: 361
9 Configuration Guide
www.kontron.com
System Configuration
1.6 Syslog
1.6.1 Overview
Syslog:
• Allows you to store system messages and/or errors.
• Can store to local files on the switch or a remote server running a syslog daemon.
• Provides a method of collecting message logs from many systems.
A B C D E F G H I
A. Priority
B. Timestamp
C. Stack ID
D. Component Name
E. Thread ID
F. File Name
G. Line Number
H Sequence Number
I. Message
10 Configuration Guide
www.kontron.com
System Configuration
11 Configuration Guide
www.kontron.com
System Configuration
logging ?
logging host ?
exit
12 Configuration Guide
www.kontron.com
System Configuration
Interface.......0/10
ifIndex.........10
Description.....Test
MAC Address.....00:00:00:01:00:02
Bit Offset Val..10
13 Configuration Guide
www.kontron.com
System Configuration
1.8.1.2 Example #2: Set Multicast Storm Control for All Interfaces
(Ethernet Fabric) #Config
(Ethernet Fabric) (Config) #storm-control multicast all ?
1.8.1.3 Example #3: Set Unicast Storm Control for All Interfaces
(Ethernet Fabric) #Config
(Ethernet Fabric) (Config) #storm-control unicast all
(Ethernet Fabric) (Config) #storm-control unicast all level 5
(Ethernet Fabric) (Config) #exit
Note...
The cable test feature is supported only for copper cable. it is not supported for
optical fiber cable.
14 Configuration Guide
www.kontron.com
System Configuration
In privileged exec mode, you enter cablestatus followed by the slot/port number of the port you want to
test. One of the following statuses are returned:
• Normal: The cable is working correctly.
• Open: The cable is disconnected or there is a faulty connector.
• Short: There is an electrical short in the cable.
• Cable Test Failed: The cable status could not be determined. The cable may in fact be working.
The command may also return a cable length estimate if this feature is supported by the PHY for the current
link speed. The length is displayed as a range between the shortest estimated length and the longest esti-
mated length. Note that if the link is down and a cable is attached to a 10/100 Ethernet adapter, then the
cable status may display as Open or Short because some Ethernet adapters leave unused wire pairs untermi-
nated or grounded. Unknown is displayed if the cable length could not be determined.
If the port has an active link while the cable test is run, the link can go down for the duration of the test. The
test may take several seconds to run.
15 Configuration Guide
www.kontron.com
Switching Configuration
2. Switching Configuration
This chapter provides configuration scenarios for the following features:
• Virtual LANs
• IGMP Snooping
• IGMP Proxy
• Link Aggregation/Port-channels
• Port Mirroring
• Port Security
• Link Layer Discovery Protocol
• Denial of Service Attack Protection
• DHCP Filtering
• Configuring Spanning Tree Protocol
16 Configuration Guide
www.kontron.com
Switching Configuration
Layer 3 Switch
Port 0/4
Port 0/1
Port 0/2 VLAN 3
VLAN 2 Port 0/3
VLAN 2 + 3
VLAN 3
VLAN 2 VLAN 3
17 Configuration Guide
www.kontron.com
Switching Configuration
192.168.10.10 255.255.255.0 2
18 Configuration Guide
www.kontron.com
Switching Configuration
19 Configuration Guide
www.kontron.com
Switching Configuration
2.2.1 Overview
The IGMP feature:
• Uses Version 3 of IGMP
• Includes snooping, which can be enabled per VLAN
Admin Mode...............................Enable
Multicast Control Frame Count............0
Interfaces Enabled for IGMP Snooping.....0/10
Vlans enabled for IGMP snooping..........20
Slot/Port......................................0/10
IGMP Admin Mode................................Enable
Interface Mode.................................Disable
IGMP Version...................................3
Query Interval (secs)..........................125
Query Max Response Time (1/10 of a second).....100
Robustness.....................................2
Startup Query Interval (secs)..................31
Startup Query Count............................2
Last Member Query Interval (1/10 of a second)..10
Last Member Query Count........................2
20 Configuration Guide
www.kontron.com
Switching Configuration
Slot/Port...................................... 0/2
IGMP Admin Mode................................ Disable
Interface Mode................................. Disable
IGMP Version................................... 3
Query Interval (secs).......................... 125
Query Max Response Time (1/10 of a second)..... 100
Robustness..................................... 2
Startup Query Interval (secs) ................. 31
Startup Query Count............................ 2
Last Member Query Interval (1/10 of a second).. 10
Last Member Query Count........................ 2
21 Configuration Guide
www.kontron.com
Switching Configuration
or
(Ethernet Fabric)# configure
(Ethernet Fabric) (Config)# interface 0/1
(Ethernet Fabric) (Config) (interface 0/1)# set igmp proxy-report interfacemode
(Ethernet Fabric) (Config) (interface 0/1)# set igmp proxy-report interfacemode vlan-
aware
(Ethernet Fabric) (Config) (interface 0/1)# exit
(Ethernet Fabric) (Config)# exit
22 Configuration Guide
www.kontron.com
Switching Configuration
23 Configuration Guide
www.kontron.com
Switching Configuration
Server
Subnet 3
Port 0/2 Port 0/3
LAG_10 LAG_10
Layer 3 Switch
Port 0/8 Port 0/9
LAG_20 LAG_20
Layer 2 Switch
Subnet 2 Subnet 3
Use the show port-channel all command to show the logical interface ids you will use to identify the port-
channels in subsequent commands. Assume that lag_10 is assigned id 1/1 and lag_20 is assigned id 1/2.
(Ethernet Fabric) #show port-channel all
Port- Link
Log. Channel Adm. Trap STP Mbr Port Port
Intf Name Link Mode Mode Mode Type Ports Speed Active
------ ------------- ----- ---- ---- ------ ------- ------ --------- ------
1/1 lag_10 Down En. En. Dis. Dynamic
1/2 lag_20 Down En. En. Dis. Dynamic
24 Configuration Guide
www.kontron.com
Switching Configuration
At this point, the LAGs could be added to the default management VLAN.
2.5.1 Overview
Port mirroring selects network traffic from specific ports for analysis by a network analyzer, while allowing
the same traffic to be switched to its destination. You can also configure how traffic is mirrored on a source
port. Packets received on the source port, transmitted on a port, or both received and transmitted, can be
mirrored to the destination port.
You can configure many switch ports as source ports and one switch port as a destination port.
Note...
The traffic on the destination port is restricted to a dedicated bandwidth, so in
case the aggregated bandwidth of the source ports is higher then the one of the
destination port, you may loos packets.
25 Configuration Guide
www.kontron.com
Switching Configuration
26 Configuration Guide
www.kontron.com
Switching Configuration
2.5.2.4 Example #4: Show the Status of the Source and Destination Ports
Use this command for a specific port. The output shows whether the port is the mirror or the probe port,
what is enabled or disabled on the port, etc.
(Ethernet Fabric) #show port 0/7
2.6.1 Overview
Port Security:
• Allows for limiting the number of MAC addresses on a given port.
• Packets that have a matching MAC address (secure packets) are forwarded; all other packets (unsecure
packets) are restricted.
• Enabled on a per port basis.
• When locked, only packets with allowable MAC address will be forwarded.
• Supports both dynamic and static.
• Implement two traffic filtering methods. These methods can be used concurrently.
• Dynamic Locking: User specifies the maximum number of MAC addresses that can be learned
on a port. The maximum number of MAC addresses is platform (product) dependent. After the
limit is reached, additional MAC addresses are not learned. Only frames with an allowable
source MAC address are forwarded.
• Static Locking: User manually specifies a list of static MAC addresses for a port. Dynamically
locked addresses can be converted to statically locked addresses.
27 Configuration Guide
www.kontron.com
Switching Configuration
2.6.2 Operation
Port Security:
• Helps secure network by preventing unknown devices from forwarding packets.
• When link goes down, all dynamically locked addresses are ‘freed.’
• If a specific MAC address is to be set for a port, set the dynamic entries to 0, then only allow packets
with a MAC address matching the MAC address in the static list.
• Dynamically locked MAC addresses are aged out if another packet with that address is not seen within
the age-out time. The user can set the time-out value.
• Dynamically locked MAC addresses are eligible to be learned by another port.
• Static MAC addresses are not eligible for aging.
• Dynamically locked addresses can be converted to statically locked addresses.
28 Configuration Guide
www.kontron.com
Switching Configuration
29 Configuration Guide
www.kontron.com
Switching Configuration
2.8.1 Overview
Denial of Service:
• Spans two categories:
• Protection of the host running FASTPATH
• Protection of the network
• Protects against the exploitation of a number of vulnerabilities which would make the host or network
unstable
• Compliant with Nessus. Broadcom tested FASTPATH with Nessus version 2.0.10. Nessus is a widely used
vulnerability assessment tool.
• FASTPATH software provides a number of features that help a network administrator protect networks
against DoS attacks.
30 Configuration Guide
www.kontron.com
Switching Configuration
2.9.1 Overview
DHCP filtering provides security by filtering untrusted DHCP messages. An untrusted message is a message
that is received from outside the network or firewall, and that can cause traffic attacks within network.
You can use DHCP Filtering as a security measure against unauthorized DHCP servers. A known attack can
occur when an unauthorized DHCP server responds to a client that is requesting an IP address. The unauthor-
ized server can configure the gateway for the client to be equal to the IP address of the server. At that point,
the client sends all of its IP traffic destined to other networks to the unauthorized machine, giving the
attacker the possibility of filtering traffic for passwords or employing a ‘man-in-the-middle’ attack.
DHCP filtering works by allowing the administrator to configure each port as a trusted or untrusted port. The
port that has the authorized DHCP server should be configured as a trusted port. Any DHCP responses
received on a trusted port will be forwarded. All other ports should be configured as untrusted. Any DHCP (or
BootP) responses received on the ingress side will be discarded.
2.9.2 Limitations
• Port Channels (LAGs): If an interface becomes a member of a LAG, DHCP filtering is no longer opera-
tionally enabled on the interface. Instead, the interface follows the configuration of the LAG port. End
user configuration for the interface remains unchanged. When an interface is no longer a member of a
LAG, the current end user configuration for that interface automatically becomes effective.
• Mirroring: If an interface becomes a probe port, DHCP filtering can no longer become operationally en-
abled on the interface. End user configuration for the interface remains unchanged. When an interface
no longer acts as a probe port, the current end user configuration for that interface automatically be-
comes effective.
• Operation without DHCP Relay: On platforms in which the DHCP relay feature is not included, hardware
support must be available for the DHCP Filtering feature to operate.
• DHCP Relay: When DHCP Filtering is administratively enabled, the DHCP relay function must check
whether a port is trusted before a DHCP (or BootP) response is forwarded on the port. If the port is un-
trusted, the response is dropped. The forwarding of DHCP or BootP request is unaffected.
31 Configuration Guide
www.kontron.com
Switching Configuration
• If DHCP Filtering is administratively disabled, the operation of the DHCP relay function is unaffected.
• If hardware support is available for DHCP Filtering, DHCP Filtering may be enabled both routing and
non-routing interfaces.
• If hardware support is unavailable, DHCP Filtering may be enabled only on routed interfaces and only
on interfaces enabled for DHCP relay.
Interface Trusted
----------- ----------
0/1 No
0/2 No
0/3 No
0/4 No
0/5 No
0/6 No
0/7 No
0/8 No
0/9 No
0/10 No
0/11 Yes
0/12 No
0/13 No
0/14 No
0/15 No
32 Configuration Guide
www.kontron.com
Switching Configuration
Note...
For two bridges to be in the same region, the force version should be 802.1S and
their configuration name, digest key, and revision level should match. For more
information about regions and their effect on network topology, refer to the IEEE
802.1Q standard.
Note...
Spanning tree protocols are disabled by default for the entire switch and for indi-
vidual ports. When you enable spanning tree protocol operation on the switch,
you must also enable it on individual ports for it to be fully activated. When span-
ning tree protocol operation is disabled, the switch does not forward BPDU mes-
sages.
The example commands assume that you begin in Privileged EXEC mode.
33 Configuration Guide
www.kontron.com
Switching Configuration
34 Configuration Guide
www.kontron.com
Switching Configuration
Priority specified was converted to 28672 (according to IEEE 802.1s) and stored
successfully.
35 Configuration Guide
www.kontron.com
Switching Configuration
Priority specified was converted to 112 (according to IEEE 802.1s) and store
successfully.
The conversion occurred because the port priority must be a multiple of 16.
36 Configuration Guide
www.kontron.com
Switching Configuration
Note...
The digest key is generated based on the association of VLANs to different
instances. To ensure the digest key is same, the mapping of VLAN to instance
must be the same on each switch in the region. For example, if VLAN 10 is associ-
ated with instance 10 on one switch, you must associate VLAN 10 and instance 10
on the other switches.
Change the name so that all the bridges that want to be part of the same region can form the region.
(Ethernet Fabric) (Config) #spanning-tree configuration name broadcom
Make the MST ID 10 bridge the root bridge by lowering the priority.
(Ethernet Fabric) (Config) #spanning-tree mst priority 10 16384
Change the priority of MST ID 20 to ensure the other bridge is the root bridge.
(Ethernet Fabric) (Config) #spanning-tree mst priority 20 61440
On the non-root bridge change the priority to force port 0/2 to be the root port.
(Ethernet Fabric) (Config) (Interface 0/2) #spanning-tree mst 20 port-priority 64
(Ethernet Fabric) (Config) (Interface 0/2) #exit
37 Configuration Guide
www.kontron.com
Routing Configuration
3. Routing Configuration
This chapter describes configuration scenarios and instructions for the following routing features:
• Port Routing
• VLAN Routing
• Virtual Router Redundancy Protocol
• Proxy Address Resolution Protocol (ARP)
• OSPF
• Routing Information Protocol
• Route Preferences
• Loopback Interfaces
38 Configuration Guide
www.kontron.com
Routing Configuration
After you’ve issued the routing configuration commands, the following functions are active:
• IP Forwarding: responsible for forwarding received IP packets.
• ARP: responsible for maintaining the ARP Table used to correlate IP and MAC addresses. The table con-
tains both static entries and entries dynamically updated based on information in received ARP frames.
• Routing Table Object: responsible for maintaining the common routing table used by all registered
routing protocols.
You can then activate RIP or OSPF, used by routers to exchange route information, on top of IP Routing. RIP
is most often used in smaller networks, while OSPF is most often used for larger and more complex topolo-
gies.
Su b n et 3
La ye r 3 Sw itch P o rt 0/3
a ctin g a s a ro u te r 19 2 .1 30 .3.1
P o rt 0/5
Po rt 0 /2
1 92 .64 .4.1
1 92 .15 0 .2.2
Su b n et 2 Su b n e t 5
39 Configuration Guide
www.kontron.com
Routing Configuration
40 Configuration Guide
www.kontron.com
Routing Configuration
Layer 3 Switch
Physical
Port 0/1
VLAN 20
Next, specify the VLAN ID assigned to untagged frames received on the ports.
(Ethernet Fabric) #config
(Ethernet Fabric) (Config) #interface 0/1
(Ethernet Fabric) (Config) (Interface 0/1) #vlan pvid 10
(Ethernet Fabric) (Config) (Interface 0/1) #exit
(Ethernet Fabric) (Config) #interface 0/2
(Ethernet Fabric) (Config) (Interface 0/2) #vlan pvid 10
(Ethernet Fabric) (Config) (Interface 0/2) #exit
(Ethernet Fabric) (Config) #interface 0/3
(Ethernet Fabric) (Config) (Interface 0/3) #vlan pvid 20
(Ethernet Fabric) (Config) (Interface 0/3) #xit
(Ethernet Fabric) (Config) #exit
41 Configuration Guide
www.kontron.com
Routing Configuration
3.2.1.2 Example 2: Set Up VLAN Routing for the VLANs and the Switch.
The following code sequence shows how to enable routing for the VLANs:
(Ethernet Fabric) #vlan database
(Ethernet Fabric) (Vlan) #vlan routing 10
(Ethernet Fabric) (Vlan) #vlan routing 20
(Ethernet Fabric) (Vlan) #exit
(Ethernet Fabric) #show ip vlan
This returns the logical interface IDs that will be used instead of slot/port in subsequent routing commands.
Assume that VLAN 10 is assigned ID 2/1 and VLAN 20 is assigned ID 2/2.
Enable routing for the switch:
(Ethernet Fabric) (Config) #config
(Ethernet Fabric) (Config) #ip routing
(Ethernet Fabric) (Config) #exit
The next sequence shows an example of configuring the IP addresses and subnet masks for the virtual router
ports.
(Ethernet Fabric) (Config) #config
(Ethernet Fabric) (Config) #interface 2/1
(Ethernet Fabric) (Config) (Interface 2/1) #ip address 192.150.3.1 255.255.255.0
(Ethernet Fabric) (Config) (Interface 2/1) #exit
(Ethernet Fabric) (Config) #interface 2/2
(Ethernet Fabric) (Config) (Interface 2/2) #ip address 192.150.4.1 255.255.255.0
(Ethernet Fabric) (Config) (Interface 2/2) #exit
(Ethernet Fabric) (Config) #exit
42 Configuration Guide
www.kontron.com
Routing Configuration
Layer 3 Switch
Physical
Port 0/1
VLAN 20
43 Configuration Guide
www.kontron.com
Routing Configuration
The next sequence configures the IP address and subnet mask for a non-virtual router port.
(Ethernet Fabric) #config
(Ethernet Fabric) (Config) #interface 0/5
(Ethernet Fabric) (Config) (Interface 0/5) #ip address 192.150.5.1 255.255.255.0
(Ethernet Fabric) (Config) (Interface 0/5) #exit
(Ethernet Fabric) (Config) #exit
This last step enables RIP for the VLAN router ports. Authentication will default to none, and no default
route entry will be created.
(Ethernet Fabric) #config
(Ethernet Fabric) (Config) #interface 2/1
(Ethernet Fabric) (Config) (Interface 2/1) #ip rip
(Ethernet Fabric) (Config) (Interface 2/1) #exit
(Ethernet Fabric) (Config) #interface 2/2
(Ethernet Fabric) (Config) (Interface 2/2) #ip rip
(Ethernet Fabric) (Config) (Interface 2/2) #exit
(Ethernet Fabric) (Config) #exit
44 Configuration Guide
www.kontron.com
Routing Configuration
45 Configuration Guide
www.kontron.com
Routing Configuration
3.2.3.1.2 Example 6: Specify the Router ID and Enable OSPF for the Switch
(Ethernet Fabric) #config
(Ethernet Fabric) (Config) #router ospf
(Ethernet Fabric) (Config-router) #network 192.150.3.0 0.0.0.255 area 2
(Ethernet Fabric) (Config-router) #network 192.150.4.0 0.0.0.255 area 3
(Ethernet Fabric) (Config-router) #router-id 192.150.9.9
(Ethernet Fabric) (Config-router) #enable
(Ethernet Fabric) (Config-router) #exit
(Ethernet Fabric) (Config) #exit
Set the OSPF priority and cost for the VLAN and physical router ports:
(Ethernet Fabric) #config
(Ethernet Fabric) (Config) #interface 2/1
(Ethernet Fabric) (Config) (Interface 2/1) #ip ospf priority 128
(Ethernet Fabric) (Config) (Interface 2/1) #ip ospf cost 32
(Ethernet Fabric) (Config) (Interface 2/1) #exit
(Ethernet Fabric) (Config) #interface 2/2
(Ethernet Fabric) (Config) (Interface 2/2) #ip ospf priority 255
(Ethernet Fabric) (Config) (Interface 2/2) #ip ospf cost 64
(Ethernet Fabric) (Config) (Interface 2/2) #exit
(Ethernet Fabric) (Config) #exit
46 Configuration Guide
www.kontron.com
Routing Configuration
Port 0/2
192.150.2.1
Virtual Router ID 20
Virtual Addr. 192.150.2.1
Layer 2 Switch
Hosts
Configure the IP addresses and subnet masks for the port that will participate in the protocol:
(Ethernet Fabric) #configure
(Ethernet Fabric) (Config) #interface 0/2
(Ethernet Fabric) (Config) (interface 0/2) #routing
(Ethernet Fabric) (Config) (interface 0/2) #ip address 192.150.2.1 255.255.255.0
(Ethernet Fabric) (Config) (interface 0/2) #exit
47 Configuration Guide
www.kontron.com
Routing Configuration
Assign virtual router IDs to the port that will participate in the protocol:
(Ethernet Fabric) #configure
(Ethernet Fabric) (Config) #interface 0/2
(Ethernet Fabric) (Config) (interface 0/2) #ip vrrp 20
Specify the IP address that the virtual router function will recognize. Note that the virtual IP address on port
0/2 is the same as the port’s actual IP address, therefore this router will always be the VRRP master when it is
active. The priority default is 255.
(Ethernet Fabric) (Config) (interface 0/2) #ip vrrp 20 ip 192.150.2.1
Configure the IP addresses and subnet masks for the port that will participate in the protocol:
(Ethernet Fabric) #config
(Ethernet Fabric) (Config) #interface 0/4
(Ethernet Fabric) (Config) (interface 0/4) #routing
(Ethernet Fabric) (Config) (interface 0/4) #ip address 192.150.4.1 255.255.255.0
(Ethernet Fabric) (Config) (interface 0/4) #exit
Assign virtual router IDs to the port that will participate in the protocol:
(Ethernet Fabric) #config
(Ethernet Fabric) (Config) #interface 0/4
(Ethernet Fabric) (Config) (interface 0/4) #ip vrrp 20
Specify the IP address that the virtual router function will recognize. Since the virtual IP address on port 0/4
is the same as Router 1’s port 0/2 actual IP address, this router will always be the VRRP backup when Router
1 is active.
(Ethernet Fabric) (Config) (interface 0/4) #ip vrrp 20 ip 192.150.2.1
Set the priority for the port. The default priority is 100.
(Ethernet Fabric) (Config) (interface 0/4) #ip vrrp 20 priority 254
48 Configuration Guide
www.kontron.com
Routing Configuration
3.4.1 Overview
• Proxy ARP allows a router to answer ARP requests where the target IP address is not the router itself but
a destination that the router can reach.
• If a host does not know the default gateway, proxy ARP can learn the first hop.
• Machines in one physical network appear to be part of another logical network.
• Without proxy ARP, a router responds to an ARP request only if the target IP address is an address con-
figured on the interface where the ARP request arrived.
49 Configuration Guide
www.kontron.com
Routing Configuration
3.5 OSPF
Larger networks typically use the Open Shortest Path First (OSPF) protocol instead of RIP. To the administra-
tor of a large and/or complex network, OSPF offers several benefits:
• Less network traffic:
• Routing table updates are sent only when a change has occurred.
• Only the part of the table that has changed is sent.
• Updates are sent to a multicast, not a broadcast, address.
• Hierarchical management: allows the network to be subdivided.
FASTPATH supports OSPFv2, which is used on IPv4 networks and OSPFv3, which has enhancements for han-
dling 128-bit IPv6 addresses. The protocols are configured separately within FASTPATH software, but their
functionality is largely similar for IPv4 and IPv6 networks. The following description applies to both proto-
cols, except where noted.
50 Configuration Guide
www.kontron.com
Routing Configuration
51 Configuration Guide
www.kontron.com
Routing Configuration
Interface 0/4
Area 3
Interface 0/3 192.64.4.1
192.130.3.1
Area 2
52 Configuration Guide
www.kontron.com
Routing Configuration
Note...
In OSPFv2, you can also enable OSPF on an interface in global configuration
mode by associating a network interface, identified by a network IP address and
wildcard mask, with an area. The following example is equivalent to defining
interface 0/4 in area 2, as in the previous example:
(Ethernet Fabric) #config
(Ethernet Fabric) (Config) #router ospf
(Ethernet Fabric) (Config) #network 192.164.4.0 0.0.0.255 area 2
53 Configuration Guide
www.kontron.com
Routing Configuration
Note...
OSPFv2 and OSPFv3 can operate concurrently on a network and on the same
interfaces (although they do not interact). This example configures both proto-
cols simultaneously.
AS-1 AS-2
10.1.2.2/24
3000:1:2::/64 eu64 Router B – ABR (5.5.5.5) 10.2.3.2
I/F1 I/F5 3000:2:3::/64
/F 17 10.2.4.2
3000:2:4::/64
IR (5.4.0.0)
Configure Router A: Router A is a backbone router. It links to an ASBR (not defined here) that routes traffic
outside the AS.
Globally enable IPv6 and IPv4 routing:
(Ethernet Fabric) #configure
(Ethernet Fabric) (Config) #ipv6 unicast-routing
(Ethernet Fabric) (Config) #ip routing
Configure IP address and enable OSPF on interfaces 6 and 12 and enable IPv6 OSPF on the interfaces. (OSPF
is enabled on the IPv4 interface in the next code group.)
(Ethernet Fabric) (Config) #interface 0/6
(Ethernet Fabric) (Config) (interface 0/6) #routing
(Ethernet Fabric) (Config) (interface 0/6) #ip address 10.2.3.3 255.255.255.0
(Ethernet Fabric) (Config) (interface 0/6) #ipv6 address 3000:2:3::/64 eui64
(Ethernet Fabric) (Config) (interface 0/6) #ipv6 ospf
(Ethernet Fabric) (Config) (interface 0/6) #exit
54 Configuration Guide
www.kontron.com
Routing Configuration
Define an OSPF router. Enable OSPF for IPv4 on the two interfaces by globally defining the range of IP
addresses associated with each interface, and then associating those ranges with Area 0:
(Ethernet Fabric) (Config) #ipv6 router ospf
(Ethernet Fabric) (Config-rtr) #router-id 3.3.3.3
(Ethernet Fabric) (Config-rer) #exit
(Ethernet Fabric) (Config) #router ospf
(Ethernet Fabric) (Config-router) #router-id 3.3.3.3
(Ethernet Fabric) (Config-router) #network 10.2.3.0 0.0.0.255 area 0.0.0.0
(Ethernet Fabric) (Config-router) #network 10.3.100.0 0.0.0.255 area 0.0.0.0
(Ethernet Fabric) (Config-router) #exit
(Ethernet Fabric) (Config) #exit
On interfaces 1, 5, and 17, configure IPv4 and IPv6 addresses and enable OSPF on the interfaces. For IPv6,
associate interface 1 with Area 1 and interface 17 with Area 2. (OSPF is enabled on the IPv4 interface in the
next code group.)
(Ethernet Fabric) (Config) #interface 0/1
(Ethernet Fabric) (Config) (interface 0/1) #routing
(Ethernet Fabric) (Config) (interface 0/1) #ip address 10.1.2.2 255.255.255.0
(Ethernet Fabric) (Config) (interface 0/1) #ipv6 address 3000:1:2::/64 eui64
(Ethernet Fabric) (Config) (interface 0/1) #ipv6 ospf
(Ethernet Fabric) (Config) (interface 0/1) #ipv6 ospf areaid 1
(Ethernet Fabric) (Config) (interface 0/1) #exit
(Ethernet Fabric) (Config) #interface 0/5
(Ethernet Fabric) (Config) (interface 0/5) #routing
(Ethernet Fabric) (Config) (interface 0/5) #ip address 10.2.3.2 255.255.255.0
(Ethernet Fabric) (Config) (interface 0/5) #ipv6 address 3000:2:3::/64 eui64
(Ethernet Fabric) (Config) (interface 0/5) #ipv6 ospf
(Ethernet Fabric) (Config) (interface 0/5) #exit
(Ethernet Fabric) (Config) #interface 0/17
(Ethernet Fabric) (Config) (interface 0/17) #routing
(Ethernet Fabric) (Config) (interface 0/17) #ip address 10.2.4.2 255.255.255.0
(Ethernet Fabric) (Config) (interface 0/17) #ipv6 address 3000:2:4::/64 eui64
(Ethernet Fabric) (Config) (interface 0/17) #ipv6 ospf
(Ethernet Fabric) (Config) (interface 0/17) #ipv6 ospf areaid 2
(Ethernet Fabric) (Config) (interface 0/17) #exit
For IPv4: Define an OSPF router. Define Area 1 as a stub. Enable OSPF for IPv4 on interfaces 1, 5, and 17 by
globally defining the range of IP addresses associated with each interface, and then associating those
ranges with Areas 1, 0, and 17, respectively. Then, configure a metric cost to associate with static routes
when they are redistributed via OSPF:
(Ethernet Fabric) (Config) #router ospf
(Ethernet Fabric) (Config-router) #router-id 2.2.2.2
(Ethernet Fabric) (Config-router) #area 0.0.0.1 stub
(Ethernet Fabric) (Config-router) #area 0.0.0.2 nssa
(Ethernet Fabric) (Config-router) #network 10.1.2.0 0.0.0.255 area 0.0.0.1
55 Configuration Guide
www.kontron.com
Routing Configuration
For IPv6: Define an OSPF router. Define Area 1 as a stub and area 2 as a Not-So-Stubby-Area (NSSA). Config-
ure a metric cost to associate with static routes when they are redistributed via OSPF:
(Ethernet Fabric) (Config) #ipv6 router ospf
(Ethernet Fabric) (Config-rtr) #router-id 2.2.2.2
(Ethernet Fabric) (Config-rtr) #area 0.0.0.1 stub
(Ethernet Fabric) (Config-rtr) #area 0.0.0.2 nssa
(Ethernet Fabric) (Config-rtr) #redistribute static metric 105 metric-type 1
(Ethernet Fabric) (Config-rtr) #exit
(Ethernet Fabric) (Config) #exit
Area 2 (0.0.0.2)
IR (5.3.0.0)
10.1.101.1
I/F 11 3000:1:101::/64 Area 0 (0.0.0.0) - backbone
Router C - ABR (5.5.5.5) I/F 1
10.1.2.1/24
3000:1:2::/64 10.2.3.3/24
3000:2:3::/64
Router A - backbone (3.3.3.3)
10.1.2.2/24
I/F 5
3000:1:2::/64 eui64
I/F 7
Router B - ABR (4.4.4.4) I/F 2 10.2.3.2
3000:2:3::/64
Virtual Link
Area 1 (0.0.0.1)
Configure Router A: Router A is a backbone router. Configuration steps are similar to those for Router A in
the previous example.
(Ethernet Fabric) #configure
(Ethernet Fabric) (Config) #ipv6 unicast-routing
(Ethernet Fabric) (Config) #ip routing
(Ethernet Fabric) (Config) #exit
(Ethernet Fabric) (Config) #ipv6 router ospf
(Ethernet Fabric) (Config-rtr) #router-id 3.3.3.3
(Ethernet Fabric) (Config-rtr) #exit
(Ethernet Fabric) (Config) #interface 0/5
(Ethernet Fabric) (Config) (interface 0/5) #routing
(Ethernet Fabric) (Config) (interface 0/5) #ip address 10.2.3.3 255.255.255.0
56 Configuration Guide
www.kontron.com
Routing Configuration
Configure Router B: Router B is a ABR that directly connects Area 0 to Area 1. In addition to the configura-
tion steps described in the previous example, we define a virtual link that traverses Area 1 to Router C
(5.5.5.5).
(Ethernet Fabric) #configure
(Ethernet Fabric) (Config) #ipv6 unicast-routing
(Ethernet Fabric) (Config) ip routing
(Ethernet Fabric) (Config) #interface 0/2
(Ethernet Fabric) (Config) (interface 0/2) #routing
(Ethernet Fabric) (Config) (interface 0/2) #ip address 10.2.3.2 255.255.255.0
(Ethernet Fabric) (Config) (interface 0/2) #ipv6 address 3000:2:3::/64 eui64
(Ethernet Fabric) (Config) (interface 0/2) #ipv6 ospf
(Ethernet Fabric) (Config) (interface 0/2) #exit
(Ethernet Fabric) (Config) #interface 0/7
(Ethernet Fabric) (Config) (interface 0/7) #routing
(Ethernet Fabric) (Config) (interface 0/7) #ip address 10.1.2.2 255.255.255.0
(Ethernet Fabric) (Config) (interface 0/7) #ipv6 address 3000:1:2::211:88FF:FE2A:3CB3/
64 eui64
(Ethernet Fabric) (Config) (interface 0/7) #ipv6 ospf
(Ethernet Fabric) (Config) (interface 0/7) #ipv6 ospf areaid 1
(Ethernet Fabric) (Config) (interface 0/7) #exit
(Ethernet Fabric) (Config) #router ospf
(Ethernet Fabric) (Config-router) #router-id 4.4.4.4
(Ethernet Fabric) (Config-router) #area 0.0.0.1 virtual-link 5.5.5.5
(Ethernet Fabric) (Config-router) #network 10.2.3.0 0.0.0.255 area 0.0.0.0
(Ethernet Fabric) (Config-router) #network 10.1.2.0 0.0.0.255 area 0.0.0.1
(Ethernet Fabric) (Config-router) #exit
(Ethernet Fabric) (Config) #ipv6 router ospf
(Ethernet Fabric) (Config-rtr) #router-id 4.4.4.4
(Ethernet Fabric) (Config-rtr) #area 0.0.0.1 virtual-link 5.5.5.5
(Ethernet Fabric) (Config-rtr) #exit
(Ethernet Fabric) (Config) #exit
Configure Router C: Router C is a ABR that enables a virtual link from the remote Area 2 in the AS to Area 0.
In addition to the configuration steps described for Router C in the previous example, we define a virtual
link that traverses Area 1 to Router B (4.4.4.4).
(Ethernet Fabric) #configure
(Ethernet Fabric) (Config) #ipv6 unicast-routing
(Ethernet Fabric) (Config) #ip routing
(Ethernet Fabric) (Config) #interface 0/1
(Ethernet Fabric) (Config) (interface 0/1) #routing
(Ethernet Fabric) (Config) (interface 0/1) #ip address 10.1.2.1 255.255.255.0
(Ethernet Fabric) (Config) (interface 0/1) #ipv6 address 3000:1:2::/64 eui64
(Ethernet Fabric) (Config) (interface 0/1) #ipv6 ospf
(Ethernet Fabric) (Config) (interface 0/1) #ipv6 ospf areaid 1
(Ethernet Fabric) (Config) (interface 0/1) #exit
(Ethernet Fabric) (Config) #interface 0/11
(Ethernet Fabric) (Config) (interface 0/11) #routing
(Ethernet Fabric) (Config) (interface 0/11) #ip address 10.1.101.1 255.255.255.0
(Ethernet Fabric) (Config) (interface 0/11) #ipv6 address 3000:1:101::/64 eui64
57 Configuration Guide
www.kontron.com
Routing Configuration
58 Configuration Guide
www.kontron.com
Routing Configuration
S u b n e t 3
La y e r 3 S w itch P o rt 0 /3
a ctin g a s a ro u te r 1 9 2 .1 3 0 .3 .1
P o rt 0 /5
P o rt 0 /2
1 9 2 .6 4 .4 .1
1 9 2 .1 5 0 .2 .2
S u b n e t 2 S u b n e t 5
59 Configuration Guide
www.kontron.com
Routing Configuration
3.6.2.4 Example #4. Enable RIP for ports 0/2 and 0/3
This command sequence enables RIP for ports 0/2 and 0/3. Authentication defaults to none, and no default
route entry is created. The commands specify that both ports receive both RIP-1 and RIP-2 frames, but send
only RIP-2 formatted frames.
(Ethernet Fabric) #config
(Ethernet Fabric) (Config) #interface 0/2
(Ethernet Fabric) (Config) (interface 0/2) #ip rip
(Ethernet Fabric) (Config) (interface 0/2) #ip rip receive version both
(Ethernet Fabric) (Config) (interface 0/2) #ip rip send version rip2
(Ethernet Fabric) (Config) (interface 0/2) #exit
(Ethernet Fabric) (Config) #interface 0/3
(Ethernet Fabric) (Config) (interface 0/3) #ip rip
(Ethernet Fabric) (Config) (interface 0/3) #ip rip receive version both
(Ethernet Fabric) (Config) (interface 0/3) #ip rip send version rip2
(Ethernet Fabric) (Config) (interface 0/3) #exit
(Ethernet Fabric) (Config) #exit
60 Configuration Guide
www.kontron.com
Routing Configuration
3.7.1.1 Example 1
The following commands configure the administrative preference for the RIP:
(Ethernet Fabric) #Config
(Ethernet Fabric) (Config) #router rip
(Ethernet Fabric) (Config-router) #distance rip 130
(Ethernet Fabric) (Config-router) #exit
(Ethernet Fabric) #Config
For OSPF, an additional parameter identifies the type of OSPF route that the preference value applies to:
(Ethernet Fabric) (Config) #router ospf
(Ethernet Fabric) (Config-router) #distance ospf ?
3.7.1.2 Example 2
By default, static routes are assigned a preference value of 1. The following command changes this default:
(Ethernet Fabric) #Config
(Ethernet Fabric) (Config) #ip route distance 20
(Ethernet Fabric) (Config) #exit
3.7.2.1 Example 1
In this example, two static routes are defined to the same destination but with different next hops and dif-
ferent preferences (25 and 30). The route with the higher preference will only be used when the preferred
route is unavailable:
(Ethernet Fabric) #Config
(Ethernet Fabric) (Config) #ip route 10.25.67.0 255.255.255.0 10.25.22.2 25
(Ethernet Fabric) (Config) #ip route 10.25.67.0 255.255.255.0 10.25.21.0 30
(Ethernet Fabric) (Config) #exit
3.7.2.2 Example 2
Similarly, you can create two default routes—one preferred and the other used as a backup. In this example,
the preference values 1 and 10 are assigned:
(Ethernet Fabric) #Config
(Ethernet Fabric) (Config) #ip route default 10.25.67.2 1
(Ethernet Fabric) (Config) #ip route default 10.25.67.7 10
(Ethernet Fabric) (Config) #exit
61 Configuration Guide
www.kontron.com
Routing Configuration
Network D
Next hop 2
Link B
Router A Router B
With ECMP, Router A can forward traffic to some destinations in Network D via Link A and traffic to other des-
tinations in Network D via Link B, thereby taking advantage of the bandwidth of both links. A hash algorithm
is applied to the destination IP addresses to provide a mechanism for selecting among the available ECMP
paths.
ECMP routes may be configured statically or learned dynamically. If a user configures multiple static routes
to the same destination but with different next hops, then those routes will be treated as a single route with
two next hops. For example, given the network in Figure 3-10, if the user configures the following two static
routes on Router A, the routing table will contain a single route to 20.0.0.0/8:
10.1.1.2
20.0.0.0/8
10.1.2.2
Router A Router B
Routing protocols can also be configured to compute ECMP routes. For example, referring to Figure 3-10, if
OSPF were configured in on both links connecting Router A and Router B, and if Router B advertised its con-
nection to 20.0.0.0/8, then Router A could compute an OSPF route to 20.0.0.0/8 with next hops of 10.1.1.2
and 10.1.2.2.
62 Configuration Guide
www.kontron.com
Routing Configuration
Static and dynamic routes are all included in a single combined routing table. This routing table accepts
ECMP routes; however, the routing table will not combine routes from different sources to create ECMP
routes. Referring to Figure 3-10, assume OSPF is configured on only one of the links between Router A and
Router B. Then, on Router A, assume that OSPF reports to the routing table a route to 20.0.0.0/8 with a next
hop of 10.1.1.2. If the user also configures a static route to 20.0.0.0/8 with a single next hop of 10.1.2.2, the
routing table will not combine the OSPF and static routes into a single route to 20.0.0.0/8 with two next
hops. All next hops within an ECMP route must be provided by the same source.
An ECMP route contains only next hops whose paths to the destination are of equal cost. Referring to
Figure 3-10, if OSPF were configured on all links, but Router A's interface to the 10.1.1.x network had an
OSPF link cost of 5 and its interface to the 10.1.2.x network had an OSPF link cost of 10, then OSPF would use
only 10.1.1.2 as the next hop to 20.0.0.0/8.
3.7.3.1 Example 1
In the following example, two static routes to the same destination are configured to use different next
hops (e.g., for load balancing purposes). Note that the preference metric is not specified, so both routes
assume the default static route preference of 1.
(Ethernet Fabric) #Config
(Ethernet Fabric) (Config) #ip route 20.0.0.0 255.0.0.0 10.1.1.2
(Ethernet Fabric) (Config) #ip route 20.0.0.0 255.0.0.0 10.1.2.2
(Ethernet Fabric) (Config) #exit
The following command adds a third route with a preference value of 5. This route will be used only when the
first two are unreachable:
(Ethernet Fabric) (Config) #ip route 20.0.0.0 255.0.0.0 10.1.3.2 5
Loopbacks are typically used for device management purposes. A client can use the loopback interface to
communicate with the router through various services such as telnet and SSH. The address on a loopback
behaves identically to any of the local addresses of the router in terms of the processing of incoming pack-
ets. This interface provides the source address for sent packets and can receive both local and remote pack-
ets.
63 Configuration Guide
www.kontron.com
Routing Configuration
You can create a loopback interface in the Global Config mode by assigning it a unique ID from 0 to 7:
(Ethernet Fabric) #Config
(Ethernet Fabric) (Config) #interface loopback 0
You can view the interface configuration from the Privileged Exec mode:
(Ethernet Fabric) #show interface loopback 0
To delete a loopback interface, enter the following from the Global Config mode:
(Ethernet Fabric) #Config
(Ethernet Fabric) (Config) #no interface loopback 0
64 Configuration Guide
www.kontron.com
Device Security
4. Device Security
This chapter describes configuration scenarios for the following features:
• 802.1x Network Access Control
• Access Control Lists (ACLs)
• RADIUS
• TACACS+
Completion of an authentication exchange requires all three roles. FASTPATH supports the authenticator role
only, in which the PAE is responsible for communicating with the supplicant. The authenticator PAE is also
responsible for submitting information received from the supplicant to the authentication server in order for
the credentials to be checked, which determines the authorization state of the port. Depending on the out-
come of the authentication process, the authenticator PAE then controls the authorized/unauthorized state
of the controlled Port.
Authentication can be handled locally or via an external authentication server. Two are: Remote Authentica-
tion Dial-In User Service (RADIUS) or Terminal Access Controller Access Control System (TACACS+).
RADIUS supports an accounting function to maintain data on service usages. Under RFC 2866, an extension
was added to the RADIUS protocol giving the client the ability to deliver accounting information about a user
to an accounting server. Exchanges to the accounting server follow similar guidelines as that of an authenti-
cation server but the flows are much simpler. At the start of service for a user, the RADIUS client that is con-
figured to use accounting sends an accounting start packet specifying the type of service that it will deliver.
Once the server responds with an acknowledgement, the client periodically transmits accounting data. At
the end of service delivery, the client sends an accounting stop packet allowing the server to update speci-
fied statistics. The server again responds with an acknowledgement.
65 Configuration Guide
www.kontron.com
Device Security
If a user, or supplicant, attempts to communicate via the switch on any interface except interface 0/1, the
system challenges the supplicant for login credentials. The system encrypts the provided information and
transmits it to the RADIUS server. If the RADIUS server grants access, the system sets the 802.1x port state
of the interface to authorized and the supplicant is able to access network resources.
(Ethernet Fabric) #config
(Ethernet Fabric) (Config)#radius server host auth 10.10.10.10
(Ethernet Fabric) (Config)#radius server key auth 10.10.10.10
Enter secret (16 characters max): secret
Enter secret (16 characters max): secret
(Ethernet Fabric) (Config)radius server host acct 10.10.10.10
(Ethernet Fabric) (Config)radius server key acct 10.10.10.10
Enter secret (16 characters max): secret
Enter secret (16 characters max): secret
(Ethernet Fabric) (Config)radius accounting mode
(Ethernet Fabric) (Config)#authentication login radiusList radius
(Ethernet Fabric) (Config)#dot1x defaultlogin radiusList
(Ethernet Fabric) (Config)#dot1x system-auth-control
(Ethernet Fabric) (Config)#interface 0/1
(Ethernet Fabric) (Config) (interface 0/1)#dot1x port-control force-authorized
(Ethernet Fabric) (Config) (interface 0/1)#exit
(Ethernet Fabric) (Config)#exit
66 Configuration Guide
www.kontron.com
Device Security
4.2.1 Overview
Access Control Lists (ACLs) are a collection of permit and deny conditions, called rules, that provide security
by blocking unauthorized users and allowing authorized users to access specific resources.
ACLs can also provide traffic flow control, restrict contents of routing updates, and decide which types of
traffic are forwarded or blocked. Normally ACLs reside in a firewall router or in a router connecting two inter-
nal networks.
ACL support features include Flow-based Mirroring and ACL Logging.
• Flow-based mirroring is the ability to mirror traffic that matches a permit rule to a specific physical port or LAG.
Flow-based mirroring is similar to the redirect function, except that in flow-based mirroring a copy of the
permitted traffic is delivered to the mirror interface while the packet itself is forwarded normally through the
device. You cannot configure a given ACL rule with mirror and redirect attributes.
• ACL Logging provides a means for counting the number of “hits” against an ACL rule. When you configure ACL
Logging, you augment the ACL deny rule specification with a ‘log’ parameter that enables hardware hit count
collection and reporting. FASTPATH uses a fixed five minute logging interval, at which time trap log entries are
written for each ACL logging rule that accumulated a non-zero hit count during that interval. You cannot
configure the logging interval.
Using ACLs to mirror traffic is called flow-based mirroring since the traffic flow is defined by the ACL classi-
fication rules. This is in contrast to port mirroring, where all traffic encountered on a specific interface is
replicated on another interface.
You can set up ACLs to control traffic at Layer 2, Layer 3, or Layer 4. MAC ACLs operate on Layer 2. IP ACLs
operate on Layers 3 and 4.
4.2.1.1 Limitations
There are limitations with respect to ACLs. These limitations are platform dependent.
• Maximum number of ACLs.
• You can configure mirror or redirect attributes for a given ACL rule, but not both.
• Some hardware platforms do not support MAC ACLs and IP ACLs on the same interface.
• A hardware platform may support a limited number of counter resources, so it may not be possible to log every
ACL rule. You can define an ACL with any number of logging rules, but the number of rules that are actually
logged cannot be determined until the ACL is applied to an interface. Furthermore, hardware counters that
become available after an ACL is applied are not retroactively assigned to rules that were unable to be logged
(the ACL must be un-applied then re-applied). Rules that are unable to be logged are still active in the ACL for
purposes of permitting or denying a matching packet.
• The order of the rules is important: when a packet matches multiple rules, the first rule takes precedence. Also,
once you define an ACL for a given port, all traffic not specifically permitted by the ACL is denied access.
67 Configuration Guide
www.kontron.com
Device Security
• VLAN ID
• Ethertype
4.2.3 IP ACLs
IP ACLs classify for Layers 3 and 4.
Each ACL is a set of up to ten rules applied to inbound traffic. Each rule specifies whether the contents of a
given field should be used to permit or deny access to the network, and may apply to one or more of the fol-
lowing fields within a packet:
• Destination IP with wildcard mask
• Destination L4 Port
• Every Packet
• IP DSCP
• IP Precedence
• IP TOS
• Protocol
• Source L4 port
68 Configuration Guide
www.kontron.com
Device Security
Layer 3 Switch
Port 0/2
ACL 179
Layer 2 Switch
69 Configuration Guide
www.kontron.com
Device Security
4.2.5.1 Example #1: Create ACL 179 and Define an ACL Rule
After the mask has been applied, it permits packets carrying TCP traffic that matches the specified Source IP
address, and sends these packets to the specified Destination IP address.
(Ethernet Fabric) #config
(Ethernet Fabric) (Config)#access-list 179 permit tcp 192.168.77.0 0.0.0.255
192.168.77.3 0.0.0.0
4.2.5.2 Example #2: Define the Second Rule for ACL 179
Define the rule to set similar conditions for UDP traffic as for TCP traffic.
(Ethernet Fabric) (Config)#access-list 179 permit udp 192.168.77.0 0.0.0.255
192.168.77.3 0.0.0.255
Ethernet Fabric) (Config)#exit
4.2.5.3 Example #3: Apply the rule to Inbound Traffic on Port 0/2
Only traffic matching the criteria will be accepted.
Ethernet Fabric) (Config)#interface 0/2
Ethernet Fabric) (Config)(interface 0/2)#ip access-group 179 in
Ethernet Fabric) (Config)(interface 0/2)#exit
70 Configuration Guide
www.kontron.com
Device Security
71 Configuration Guide
www.kontron.com
Device Security
72 Configuration Guide
www.kontron.com
Device Security
Rule Number: 1
Action......................................... deny
Destination MAC Address........................ 00:11:22:33:44:55
Destination MAC Mask........................... 00:00:00:00:FF:FF
Log............................................ TRUE
4.3 RADIUS
Making use of a single database of accessible information—as in an Authentication Server—can greatly sim-
plify the authentication and management of users in a large network. One such type of Authentication
Server supports the Remote Authentication Dial In User Service (RADIUS) protocol as defined by RFC 2865.
For authenticating users prior to access, the RADIUS standard has become the protocol of choice by adminis-
trators of large accessible networks. To accomplish the authentication in a secure manner, the RADIUS client
and RADIUS server must both be configured with the same shared password or “secret”. This “secret” is used
to generate one-way encrypted authenticators that are present in all RADIUS packets. The “secret” is never
transmitted over the network.
RADIUS conforms to a secure communications client/server model using UDP as a transport protocol. It is
extremely flexible, supporting a variety of methods to authenticate and statistically track users. RADIUS is
also extensible, allowing for new methods of authentication to be added without disrupting existing func-
tionality.
As a user attempts to connect to a functioning RADIUS supported network, a device referred to as the Net-
work Access Server (NAS) or switch/router first detects the contact. The NAS or user-login interface then
prompts the user for a name and password. The NAS encrypts the supplied information and a RADIUS client
transports the request to a pre-configured RADIUS server. The server can authenticate the user itself, or
make use of a back-end device to ascertain authenticity. In either case a response may or may not be forth-
coming to the client. If the server accepts the user, it returns a positive result with attributes containing
configuration information. If the server rejects the user, it returns a negative result. If the server rejects the
client or the shared “secrets” differ, the server returns no result. If the server requires additional verifica-
tion from the user, it returns a challenge, and the request process begins again.
73 Configuration Guide
www.kontron.com
Device Security
When a user attempts to log in, the switch prompts for a username and password. The switch then attempts
to communicate with the primary RADIUS server at 10.10.10.10. Upon successful connection with the server,
the login credentials are exchanged over an encrypted channel. The server grants or denies access, which
the switch honors, and either allows or does not allow the user to access the switch. If neither of the two
servers can be contacted, the switch searches its local user database for the user.
(Ethernet Fabric) # config
(Ethernet Fabric) (Config)#radius server host auth 10.10.10.10
(Ethernet Fabric) (Config)#radius server key auth 10.10.10.10
Enter secret (16 characters max): secret1
Enter secret (16 characters max): secret1
(Ethernet Fabric) (Config)#radius server host auth 11.11.11.11
(Ethernet Fabric) (Config)#radius server key auth 11.11.11.11
Enter secret (16 characters max): secret2
Enter secret (16 characters max): secret2
(Ethernet Fabric) (Config)#radius server primary 10.10.10.10
(Ethernet Fabric) (Config)#authentication login radiusList radius local
(Ethernet Fabric) (Config)#users defaultlogin radiusList
(Ethernet Fabric) (Config)#exit
74 Configuration Guide
www.kontron.com
Device Security
4.4 TACACS+
TACACS+ (Terminal Access Controller Access Control System) provides access control for networked devices
via one or more centralized servers. Similar to RADIUS, this protocol simplifies authentication by making use
of a single database that can be shared by many clients on a large network. TACACS+ is based on the TACACS
protocol described in RFC1492. TACACS+ uses TCP to ensure reliable delivery and a shared key configured on
the client and daemon server to encrypt all messages.
After you configure TACACS+ as the authentication method for user login, the NAS (Network Access Server)
prompts for the user login credentials and requests services from the FASTPATH TACACS+ client. The client
then uses the configured list of servers for authentication, and provides results back to the NAS. You can
configure the TACACS+ server list with one or more hosts defined via their network IP address. You can also
assign each a priority to determine the order in which the TACACS+ client will contact them. TACACS+ con-
tacts the server when a connection attempt fails or times out for a higher priority server.
You can configure each server host with a specific connection type, port, timeout, and shared key, or you can
use global configuration for the key and timeout.
Like RADIUS, the TACACS+ server can do the authentication itself, or redirect the request to another back-
end device. All sensitive information is encrypted and the shared secret is never passed over the network; it
is used only to encrypt the data.
75 Configuration Guide
www.kontron.com
Device Security
When a user attempts to log into the switch, the NAS or switch prompts for a username and password. The
switch attempts to communicate with the highest priority configured TACACS+ server at 10.10.10.10. Upon
successful connection with the server, the switch and server exchange the login credentials over an
encrypted channel. The server then grants or denies access, which the switch honors, and either allows or
does not allow the user to gain access to the switch. If neither of the two servers can be contacted, the
switch searches its local user database for the user.
(Ethernet Fabric) # config
(Ethernet Fabric) (Config)#tacacs-server host 10.10.10.10
(Ethernet Fabric) (Tacacs)#key tacacs1
(Ethernet Fabric) (Tacacs)#exit
(Ethernet Fabric) (Config)#tacacs-server host 11.11.11.11
(Ethernet Fabric) (Tacacs)#key tacacs2
(Ethernet Fabric) (Tacacs)#priority 2
(Ethernet Fabric) (Tacacs)#exit
(Ethernet Fabric) (Config)#authentication login tacacsList tacacs local
(Ethernet Fabric) (Config)#users defaultlogin tacacsList
(Ethernet Fabric) (Config)#exit
76 Configuration Guide
www.kontron.com
IPv6
5. IPv6
This chapter includes the following sections:
• Overview
• Interface Configuration
• DHCPv6
5.1 Overview
There are many conceptual similarities between IPv4 and IPv6 network operation. Addresses still have a net-
work prefix portion (subnet) and a device interface specific portion (host). While the length of the network
portion is still variable, most users have standardized on using a network prefix length of 64 bits. This leaves
64 bits for the interface specific portion, called an Interface ID in IPv6. Depending upon the underlying link
addressing, the Interface ID can be automatically computed from the link (e.g., MAC address). Such an auto-
matically computed Interface ID is called an EUI64 identifier.
IPv6 packets on the network are of an entirely different format than traditional IPv4 packets and are also
encapsulated in a different EtherType (contained within the L2 header to indicate which L3 protocol is
used). In order to route these packets across L3 requires an infrastructure equivalent to and parallel to that
provided for IPv4.
Note...
FASTPATH also implements OSPFv3 for use with IPv6 networks. These configura-
tion scenarios are included with the OSPFv2 scenarios in chapter 3, section
„OSPF“.
77 Configuration Guide
www.kontron.com
IPv6
While optional in IPv4, router advertisement is mandatory in IPv6. Router advertisements specify the net-
work prefix(es) on a link which can be used by receiving hosts, in conjunction with an EUI64 identifier, to
auto configure a host’s address. Routers have their network prefixes configured and may use EUI64 or man-
ually configured interface IDs. In addition to one or more global addresses, each IPv6 interface also has an
auto-configured link-local address which is:
• Allocated from part of the IPv6 unicast address space
• Not visible off the local link
• Not globally unique
Next hop addresses computed by routing protocols are usually link-local.
During a transition period, a global IPv6 Internet backbone may not be available. The solution of this is to
tunnel IPv6 packets inside IPv4 to reach remote IPv6 islands. When a packet is sent over such a link, it is
encapsulated in IPv4 in order to traverse an IPv4 network and has the IPv4 headers removed at the other end
of the tunnel.
Device 1
(Ethernet Fabric) # config
(Ethernet Fabric) (Config) #ip routing
(Ethernet Fabric) (Config) #ipv6 unicast-routing
(Ethernet Fabric) (Config) #router ospf
(Ethernet Fabric) (Config-router) #router-id 1.1.1.1
(Ethernet Fabric) (Config-router) #exit
78 Configuration Guide
www.kontron.com
IPv6
Device 2
(Ethernet Fabric) # config
(Ethernet Fabric) (Config) #ip routing
(Ethernet Fabric) (Config) #ipv6 unicast-routing
(Ethernet Fabric) (Config) #router ospf
(Ethernet Fabric) (Config-router) #router-id 2.2.2.2
(Ethernet Fabric) (Config-router) #exit
79 Configuration Guide
www.kontron.com
IPv6
5.3 DHCPv6
DHCP is generally used between clients (e.g., hosts) and servers (e.g., routers) for the purpose of assigning
IP addresses, gateways, and other networking definitions such as DNS, NTP, and/or SIP parameters. How-
ever, IPv6 natively provides for autoconfiguration of IP addresses through IPv6 Neighbor Discovery Protocol
(NDP) and through the use of Router Advertisement messages. Thus, the role of DHCPv6 within the network
is different than that of DHCPv4 in that it is less relied upon for IP address assignment.
DHCPv6 server and client interactions are described by RFC 3315 [6]. There are many similarities between
DHCPv6 and DHCPv4 interactions and options, but the messages and option definitions are sufficiently dif-
ferent such that there is no DHCPv4 to DHCPv6 migration or interoperability.
DHCPv6 incorporates the notion of the "stateless" server, where DHCPv6 is not used for IP address assign-
ment to a client; rather, it only provides other networking information such as DNS, NTP, and/or SIP informa-
tion. The stateless server behavior is described by RFC 3736 [7], which simply contains descriptions of the
portions of RFC 3315 that are necessary for "stateless" server behavior. In order for a router to drive a
DHCPv6 client to utilize stateless DHCPv6, the "other stateful configuration" option must be configured for
neighbor discovery on the corresponding IPv6 router interface. This, in turn, causes DHCPv6 clients to send
the DHCPv6 "Information Request" message in response. A DHCPv6 server then responds by providing only
networking definitions such as DNS domain name and server definitions, NTP server definitions, and/or SIP
definitions.
RFC 3315 also describes DHCPv6 Relay Agent interactions, which are very much like DHCPv4 Relay Agents.
Additionally, there is a DHCPv6 Relay Agent Option Internet draft [9], which employs very similar capabili-
ties as those described by DHCPv4 Relay Agent Option in RFC 2132.
With the larger address space inherent to IPv6, addresses within a network can be allocated more effectively
in a hierarchical fashion. DHCPv6 introduces the notion of "prefix delegation" as described in RFC 3633 [8]
as a way for routers to centralize and delegate IP address assignment. The following diagram depicts a typi-
cal network scenario where prefix delegation is used.
Host
DHCPv6
Client
CPE Router
PE Router DHCPv6
DHCPv6 DHCPv6 Server
PD Server PD to Client
DHCPv6
Host
Server
DHCPv6
Client
In Figure 5-2, the PE router acts as Prefix Delegation server and defines one or more "general" prefixes to
delegate to a CPE router acting as a Prefix Delegation client. The CPE router then can then allocate more spe-
cific addresses within the given general prefix range to assign to its local router interfaces. The CPE router
can in turn use the given general prefix in allocating and assigning addresses to host machines that may be
utilizing IPv6 auto-address configuration or acting as DHCPv6 clients.
80 Configuration Guide
www.kontron.com
IPv6
81 Configuration Guide
www.kontron.com
Quality of Service
6. Quality of Service
This chapter includes the following sections:
• Class of Service Queuing
• Differentiated Services
82 Configuration Guide
www.kontron.com
Quality of Service
83 Configuration Guide
www.kontron.com
Quality of Service
Ingress
4 4
(untagged)
5 5
6 5
packet D 7 6
UserPri =6 port default
priority- > traffic class
2 1
Egress
Q5 D A weighted 20%
Q4 weighted10%
Q3 weighted 5%
Q2 weighted 5%
Q1 C weighted 0%
Q0 weighted 0%
Continuing this example, you configured the egress Port 0/8 for strict priority on queue 6, and a set a
weighted scheduling scheme for queues 5-0. Assuming queue 5 has a higher weighting than queue 1 (rela-
tive weight values shown as a percentage, with 0% indicating the bandwidth is not guaranteed), the queue
service order is 6 followed by 5 followed by 1. Assuming each queue unloads all packets shown in the dia-
gram, the packet transmission order as seen on the network leading out of Port 0/8 is B, A, D, C. Thus, packet
B, with its higher user precedence than the others, is able to work its way through the device with minimal
delay and is transmitted ahead of the other packets at the egress port.
84 Configuration Guide
www.kontron.com
Quality of Service
Server
You will configure the ingress interface uniquely for all cos-queue and VLAN parameters.
(Ethernet Fabric) #config
interface 0/10
classofservice trust dot1p
classofservice dot1p-mapping 6 3
vlan priority 2
exit
interface 0/8
cos-queue min-bandwidth 0 0 5 5 10 20 40
cos-queue strict 6
exit
exit
You can also set traffic shaping parameters for the interface. If you wish to shape the egress interface for a
sustained maximum data rate of 80 Mbps (assuming a 100Mbps link speed), you would add a simple config-
uration line expressing the shaping rate as a percentage of link speed.
(Ethernet Fabric) #config
interface 0/8
traffic-shape 80
exit
exit
85 Configuration Guide
www.kontron.com
Quality of Service
86 Configuration Guide
www.kontron.com
Quality of Service
Internet
Layer 3 Switch
Port 0/5
Outbound
Finance
Marketing Test Development
Source IP
Source IP
172.16.10.0
172.16.40.0
255.255.255.0
255.255.255.0
Source IP Source IP
172.16.20.0 172.16.30.0
255.255.255.0 255.255.255.0
Create a DiffServ class of type “all” for each of the departments, and name them. Define the match criteria—
Source IP address—for the new classes.
class-map match-all finance_dept
match srcip 172.16.10.0 255.255.255.0
exit
87 Configuration Guide
www.kontron.com
Quality of Service
Create a DiffServ policy for inbound traffic named 'internet_access', adding the previously created depart-
ment classes as instances within this policy. This policy uses the assign-queue attribute to put each depart-
ment's traffic on a different egress queue. This is how the DiffServ inbound policy connects to the CoS queue
settings established below.
policy-map internet_access in
class finance_dept
assign-queue 1
exit
class marketing_dept
assign-queue 2
exit
class test_dept
assign-queue 3
exit
class development_dept
assign-queue 4
exit
exit
Attach the defined policy to interfaces 0/1 through 0/4 in the inbound direction
interface 0/1
service-policy in internet_access
exit
interface 0/2
service-policy in internet_access
exit
interface 0/3
service-policy in internet_access
exit
interface 0/4
service-policy in internet_access
exit
Set the CoS queue configuration for the (presumed) egress interface 0/5 such that each of queues 1, 2, 3
and 4 get a minimum guaranteed bandwidth of 25%. All queues for this interface use weighted round robin
scheduling by default. The DiffServ inbound policy designates that these queues are to be used for the
departmental traffic through the assign-queue attribute. It is presumed that the switch will forward this
traffic to interface 0/5 based on a normal destination address lookup for internet traffic.
interface 0/5
cos-queue min-bandwidth 0 25 25 25 25 0 0
exit
exit
88 Configuration Guide
www.kontron.com
Quality of Service
Port 0/2
Layer 3 Switch
Operating as
Router 1
Port 0/3
Internet
Layer 3 Switch
Operating as
Router 2
89 Configuration Guide
www.kontron.com
Quality of Service
Create a DiffServ classifier named 'class_voip' and define a single match criterion to detect UDP packets.
The class type "match-all" indicates that all match criteria defined for the class must be satisfied in order
for a packet to be considered a match.
class-map match-all class_voip
match protocol udp
exit
Create a second DiffServ classifier named 'class_ef' and define a single match criterion to detect a DiffServ
code point (DSCP) of 'EF' (expedited forwarding). This handles incoming traffic that was previously marked
as expedited elsewhere in the network.
class-map match-all class_ef
match ip dscp ef
exit
Create a DiffServ policy for inbound traffic named 'pol_voip', then add the previously created classes
'class_ef' and 'class_voip' as instances within this policy.
This policy handles incoming packets already marked with a DSCP value of 'EF' (per 'class_ef' definition), or
marks UDP packets per the 'class_voip' definition) with a DSCP value of 'EF'. In each case, the matching
packets are assigned internally to use queue 5 of the egress port to which they are forwarded.
policy-map pol_voip in
class class_ef
assign-queue 5
exit
class class_voip
mark ip-dscp ef
assign-queue 5
exit
exit
90 Configuration Guide
www.kontron.com
Multicast
7. Multicast
7.1 Overview
IP Multicasting enables a network host (or multiple hosts) to send an IP datagram to multiple destinations
simultaneously. The initiating host sends each multicast datagram only once to a destination multicast
group address, and multicast routers forward the datagram only to hosts who are members of the multicast
group. Multicast enables efficient use of network bandwidth, as each multicast datagram needs to be trans-
mitted only once on each network link, regardless of the number of destination hosts. Multicasting contrasts
with IP unicasting, which sends a separate datagram to each recipient host.
Hosts must have a way to identify their interest in joining any particular multicast group, and routers must
have a way to collect and maintain group memberships: these functions are handled by the IGMP protocol in
IPv4. In IPv6, multicast routers use the Multicast Listener Discover (MLD) protocol to maintain group mem-
bership information.
Multicast routers must also be able to construct a multicast distribution tree that enables forwarding multi-
cast datagrams only on the links that are required to reach a destination group member. Protocols such as
DVMRP, and PIM handle this function.
This chapter describes the following multicast protocols:
• IGMP Configuration
• IGMP Proxy
• MLD
• DVMRP
• PIM
91 Configuration Guide
www.kontron.com
Multicast
A multicast router must also have a way to determine how to efficiently forward multicast packets. The infor-
mation gathered by IGMP is provided to a multicast routing protocol (DVMRP, PIM-DM, and PIM-SM) config-
ured on the router to ensure that multicast packets are delivered to all networks where there are interested
receivers. Refer to those sections for configuration instructions.
92 Configuration Guide
www.kontron.com
Multicast
The value of the unsolicited report interval can range from 1 to 260 seconds. The default is 1 second. Use
this command from the Interface mode.
• Use the following command to display interface parameters when IGMP Proxy is enabled:
(Ethernet Fabric) #show ip igmp-proxy interface
• Use this command to display information about multicast groups that IGMP proxy reported. It displays
a table of entries with the following as the fields of each column.
(Ethernet Fabric) #show ip igmp-proxy groups
• Use the following command to display information about multicast groups that IGMP proxy reported.
It displays a table of entries with the following as the fields of each column:
(Ethernet Fabric) #show ip igmp-proxy groups detail
93 Configuration Guide
www.kontron.com
Multicast
7.4 MLD
Multicast Listener Discovery (MLD) protocol enables IPv6 routers to discover the presence of multicast listen-
ers, the nodes who wish to receive the multicast data packets, on its directly-attached interfaces. On IPv6
multicast routers, MLD replaces the functionality performed by IGMP on IPv4 networks.
MLD discovers which multicast addresses are of interest to its neighboring nodes and provides this informa-
tion to the active multicast routing protocol that makes decisions on the flow of multicast data packets.
The Multicast router sends General Queries periodically to request multicast address listeners information
from systems on an attached network. These queries are used to build and refresh the multicast address lis-
tener state on attached networks. Multicast listeners respond to these queries by reporting their multicast
addresses listener state and their desired set of sources with Current-State Multicast address Records in the
MLD2 Membership Reports. The Multicast router also processes unsolicited Filter-Mode-Change records and
Source-List-Change Records from systems that want to indicate interest in receiving or not receiving traffic
from particular sources.
The FASTPATH implementation of MLD v2 supports the multicast router portion of the protocol (i.e., not the
listener portion). It is backward-compatible with MLD v1.
After configuring MLD, you must also enable a multicast routing protocol, which the router uses make multi-
cast routing decisions based on the information collected through MLD. See PIM-SM or PIM-DM.
7.5 DVMRP
The Distance Vector Multicast Routing Protocol (DVMRP) is one of several multicast routing protocols you can
configure on a FASTPATH router (PIM-SM and PIM-DM are the others). Note that only one multicast routing
protocol (MRP) can be operational on a router at any time.
DVMRP is an interior gateway protocol; i.e., it is suitable for use within an autonomous system, but not
between different autonomous systems.
94 Configuration Guide
www.kontron.com
Multicast
DVMRP is based on RIP: it forwards multicast datagrams to other routers in the AS and constructs a forward-
ing table based on information it learns in response. More specifically, it uses this sequence.
• A new multicast packet is forwarded to the entire multicast network, with respect to the time-to-live
(TTL) of the packet.
• The TTL restricts the area to be flooded by the message.
• All routers that do not have members on directly-attached subnetworks send back Prune messages to
the upstream router.
• The branches that transmit a prune message are deleted from the delivery tree.
• The delivery tree which is spanning to all the members in the multicast group, is constructed in the form
of a DVMRP forwarding table.
1. OSPF configuration is added as a unicast protocol for illustration purposes; static unicast routing could also be configured.
95 Configuration Guide
www.kontron.com
Multicast
7.6 PIM
Protocol Independent Multicast (PIM) is a standard multicast routing protocol that provides scalable inter-
domain multicast routing across the Internet, independent of the mechanisms provided by any particular
unicast routing protocol.
PIM has two types:
• PIM-Dense Mode (PIM-DM)
• PIM-Sparse Mode (PIM-SM)
7.6.1 PIM-SM
PIM-SM is used to efficiently route multicast traffic to multicast groups that may span wide area networks
where bandwidth is a constraint.
PIM-SM uses shared trees by default and implements source-based trees for efficiency; it assumes that no
hosts want the multicast traffic unless they specifically ask for it. It creates a shared distribution tree cen-
tered on a defined "rendezvous point" (RP) from which source traffic is relayed to the receivers. Senders
first send the multicast data to the RP, which in turn sends the data down the shared tree to the receivers.
Shared trees centered on an RP do not necessarily provide the shortest, most optimal path. In such cases,
PIM-SM provides a means to switch to more efficient source-specific trees. A data threshold rate is config-
ured to determine when to switch from shared-tree to source-tree.
PIM-SM uses a Bootstrap Router (BSR), which advertises information to other multicast routers about the RP.
In a given network, a set of routers can be administratively enabled as candidate bootstrap routers. If it is
not apparent which router should be the BSR, the candidates flood the domain with advertisements. The
router with the highest priority is elected. If all the priorities are equal, then the candidate with the highest
IP address becomes the BSR.
PIM-SM is defined in RFC 4601.
1. OSPF configuration is added as a unicast protocol for illustration purposes; static unicast routing could also be configured.
96 Configuration Guide
www.kontron.com
Multicast
1. OSPF configuration is added as a unicast protocol for illustration purposes; static unicast routing could also be configured.
97 Configuration Guide
www.kontron.com
Multicast
7.6.2 PIM-DM
PIM-DM protocol is a simple, protocol-independent multicast routing protocol. It uses existing unicast rout-
ing table and join/prune/graft mechanism to build a tree. PIM-DM creates source-based shortest-path dis-
tribution trees making use of Reverse Path Forwarding (RPF).
PIM-DM cannot be used to build a shared distribution tree, as PIM-SM can. PIM-DM assumes that when a
sender starts sending data, all downstream routers and hosts want to receive a multicast datagram. PIM-DM
initially floods multicast traffic throughout the network. Routers that do not have any downstream neigh-
bors send back Prune messages that instruct the upstream router to remove that multicast route from its for-
warding table. In addition to the Prune messages, PIM-DM makes use of two more messages: Graft and
Assert. Graft messages are used whenever a new host wants to join the group. Assert messages are used to
shut off duplicate flows onto the same multi-access network.
To minimize the repeated flooding of datagrams and subsequent pruning associated with a particular
source-group (S,G) pair, PIM-DM uses a State Refresh message. This message is sent by the router(s) directly
connected to the source and is propagated throughout the network. When received by a router on its RPF
interface, the State Refresh message causes an existing prune state to be refreshed. State Refresh messages
are generated periodically by the router directly attached to the source.
PIM-DM is appropriate for:
• Densely distributed receivers
• A ratio of few senders-to-many receivers (due to frequent flooding)
• High volume of multicast traffic
• Constant stream of traffic
1. OSPF configuration is added as a unicast protocol for illustration purposes; static unicast routing could also be configured.
98 Configuration Guide
www.kontron.com
Multicast
1. OSPF configuration is added as a unicast protocol for illustration purposes; static unicast routing could also be configured.
99 Configuration Guide
www.kontron.com