* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Configuring IP Routing
Survey
Document related concepts
Parallel port wikipedia , lookup
Point-to-Point Protocol over Ethernet wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Computer network wikipedia , lookup
Spanning Tree Protocol wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
Serial digital interface wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wake-on-LAN wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Virtual LAN wikipedia , lookup
Routing in delay-tolerant networking wikipedia , lookup
Transcript
Part No. 321712-B Rev 03 June 2006 4655 Great America Parkway Santa Clara, CA 95054 Configuring IP Routing and Multicast Operations using Device Manager Ethernet Routing Switch 1600 Series, Software Release 2.1 *321712-B* Rev 03 2 Copyright © 2005-2006 Nortel Networks. All rights reserved. The information in this document is subject to change without notice. The statements, configurations, technical data, and recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks. The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of that license. The software license agreement is included in this document. Trademarks *Nortel, Nortel Networks, the Nortel logo, and the Globemark are trademarks of Nortel Networks. All other products or services may be trademarks, registered trademarks, service marks, or registered service marks of their respective owners. The asterisk after a name denotes a trademarked item. Restricted rights legend Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013. Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer software, the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth in the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19. Statement of conditions In the interest of improving internal design, operational function, and/or reliability, Nortel Networks reserves the right to make changes to the products described in this document without notice. Nortel Networks does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein. Portions of the code in this software product may be Copyright © 1988, Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms of such portions are permitted, provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that such portions of the software were developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from such portions of the software without specific prior written permission. SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. In addition, the program and information contained herein are licensed only pursuant to a license agreement that contains restrictions on use and disclosure (that may incorporate by reference certain limitations and notices imposed by third parties). Nortel Networks software license agreement This Software License Agreement (“License Agreement”) is between you, the end-user (“Customer”) and Nortel Networks Corporation and its subsidiaries and affiliates (“Nortel Networks”). PLEASE READ THE FOLLOWING 321712-B Rev 03 3 CAREFULLY. YOU MUST ACCEPT THESE LICENSE TERMS IN ORDER TO DOWNLOAD AND/OR USE THE SOFTWARE. USE OF THE SOFTWARE CONSTITUTES YOUR ACCEPTANCE OF THIS LICENSE AGREEMENT. If you do not accept these terms and conditions, return the Software, unused and in the original shipping container, within 30 days of purchase to obtain a credit for the full purchase price. “Software” is owned or licensed by Nortel Networks, its parent or one of its subsidiaries or affiliates, and is copyrighted and licensed, not sold. Software consists of machine-readable instructions, its components, data, audio-visual content (such as images, text, recordings or pictures) and related licensed materials including all whole or partial copies. Nortel Networks grants you a license to use the Software only in the country where you acquired the Software. You obtain no rights other than those granted to you under this License Agreement. You are responsible for the selection of the Software and for the installation of, use of, and results obtained from the Software. 1. Licensed Use of Software. Nortel Networks grants Customer a nonexclusive license to use a copy of the Software on only one machine at any one time or to the extent of the activation or authorized usage level, whichever is applicable. To the extent Software is furnished for use with designated hardware or Customer furnished equipment (“CFE”), Customer is granted a nonexclusive license to use Software only on such hardware or CFE, as applicable. Software contains trade secrets and Customer agrees to treat Software as confidential information using the same care and discretion Customer uses with its own similar information that it does not wish to disclose, publish or disseminate. Customer will ensure that anyone who uses the Software does so only in compliance with the terms of this Agreement. Customer shall not a) use, copy, modify, transfer or distribute the Software except as expressly authorized; b) reverse assemble, reverse compile, reverse engineer or otherwise translate the Software; c) create derivative works or modifications unless expressly authorized; or d) sublicense, rent or lease the Software. Licensors of intellectual property to Nortel Networks are beneficiaries of this provision. Upon termination or breach of the license by Customer or in the event designated hardware or CFE is no longer in use, Customer will promptly return the Software to Nortel Networks or certify its destruction. Nortel Networks may audit by remote polling or other reasonable means to determine Customer’s Software activation or usage levels. If suppliers of third party software included in Software require Nortel Networks to include additional or different terms, Customer agrees to abide by such terms provided by Nortel Networks with respect to such third party software. 2. Warranty. Except as may be otherwise expressly agreed to in writing between Nortel Networks and Customer, Software is provided “AS IS” without any warranties (conditions) of any kind. NORTEL NETWORKS DISCLAIMS ALL WARRANTIES (CONDITIONS) FOR THE SOFTWARE, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OF NON-INFRINGEMENT. Nortel Networks is not obligated to provide support of any kind for the Software. Some jurisdictions do not allow exclusion of implied warranties, and, in such event, the above exclusions may not apply. 3. Limitation of Remedies. IN NO EVENT SHALL NORTEL NETWORKS OR ITS AGENTS OR SUPPLIERS BE LIABLE FOR ANY OF THE FOLLOWING: a) DAMAGES BASED ON ANY THIRD PARTY CLAIM; b) LOSS OF, OR DAMAGE TO, CUSTOMER’S RECORDS, FILES OR DATA; OR c) DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES (INCLUDING LOST PROFITS OR SAVINGS), WHETHER IN CONTRACT, TORT OR OTHERWISE (INCLUDING NEGLIGENCE) ARISING OUT OF YOUR USE OF THE SOFTWARE, EVEN IF NORTEL NETWORKS, ITS AGENTS OR SUPPLIERS HAVE BEEN ADVISED OF THEIR POSSIBILITY. The foregoing limitations of remedies also apply to any developer and/or supplier of the Software. Such developer and/or supplier is an intended beneficiary of this Section. Some jurisdictions do not allow these limitations or exclusions and, in such event, they may not apply. 4. General a. If Customer is the United States Government, the following paragraph shall apply: All Nortel Networks Software available under this License Agreement is commercial computer software and commercial computer software documentation and, in the event Software is licensed for or on behalf of the United States Government, the respective rights to the software and software documentation are governed by Nortel Networks standard commercial license in accordance with U.S. Federal Regulations at 48 C.F.R. Sections 12.212 (for non-DoD entities) and 48 C.F.R. 227.7202 (for DoD entities). Configuring IP Routing and Multicast Operations using Device Manager 4 b. Customer may terminate the license at any time. Nortel Networks may terminate the license if Customer fails to comply with the terms and conditions of this license. In either event, upon termination, Customer must either return the Software to Nortel Networks or certify its destruction. c. Customer is responsible for payment of any taxes, including personal property taxes, resulting from Customer’s use of the Software. Customer agrees to comply with all applicable laws including all applicable export and import laws and regulations. d. Neither party may bring an action, regardless of form, more than two years after the cause of the action arose. e. The terms and conditions of this License Agreement form the complete and exclusive agreement between Customer and Nortel Networks. f. This License Agreement is governed by the laws of the country in which Customer acquires the Software. If the Software is acquired in the United States, then this License Agreement is governed by the laws of the state of New York. 321712-B Rev 03 5 Contents Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Text Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Related information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 How to get help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Finding the latest updates on the Nortel web site . . . . . . . . . . . . . . . . . . . . . . . . . 26 Getting help from the Nortel web site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Getting help over the phone from a Nortel Solutions Center . . . . . . . . . . . . . . . . . 26 Getting help from a specialist using an Express Routing Code . . . . . . . . . . . . . . . 27 Getting help through a Nortel distributor or reseller . . . . . . . . . . . . . . . . . . . . . . . . 27 Chapter 1: IP routing and multicast concepts. . . . . . . . . . . . . . . . . . . . . . . 29 Overview of IP routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 IP addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Subnet addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Supernet addressing and CIDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Virtual routing between VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Black hole static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Alternative routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 IP filtering and route policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Accept policies (in filters) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Announce policies (out filters) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Prefix list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Per-VLAN routing control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 BootP/DHCP relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Differences between DHCP and BootP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Summary of DHCP relay operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Configuring IP Routing and Multicast Operations using Device Manager 6 Contents Forwarding DHCP packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Multiple BootP/DHCP servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Address Resolution Protocol (ARP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Routing Information Protocol (RIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 RIP operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 RIP metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Virtual Router Redundancy Protocol (VRRP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Initializing VRRP routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Basic VRRP configuration steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Configuring the virtual router master . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Configuring the virtual router backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Enabling the switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Critical IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 VRRP and Split-MLT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Open Shortest Path First (OSPF) Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 OSPF routing algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Autonomous system and areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Backbone area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Stub area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Neighbor adjacencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 OSPF routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Router types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 OSPF interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 OSPF and IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 OSPF packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Link state advertisements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 AS external routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 OSPF virtual links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Specifying ASBRs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Circuitless IP (CLIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 321712-B Rev 03 Contents 7 UDP forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Overview of IP multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Multicast addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 IP Multicast address ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 IP to Ethernet multicast MAC mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Internet Group Management Protocol (IGMP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 IGMP queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 IGMP host reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Host leave messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Fast-leave feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 IGMP Snoop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Static mrouter port and non-querier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 IGMP proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 IGMP versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 IGMP RFCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Protocol Independent Multicast-Sparse Mode (PIM-SM) . . . . . . . . . . . . . . . . . . . . . . . 77 PIM-SM concepts and terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 PIM-SM domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Designated router (DR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Rendezvous-Point (RP) router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Bootstrap router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Shared trees and shortest-path trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Shared trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Shortest-path trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Join/prune messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Register and register-stop messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Receiver joining group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Receiver leaving group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Source sending packets to group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Required elements for PIM-SM operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 PIM-SM simplified example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 PIM-SM static source groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Multicast access control feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Multicast access control policy types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Configuring IP Routing and Multicast Operations using Device Manager 8 Contents denyRX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 denyBoth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Specifying host addresses and masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Multicast MAC filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Chapter 2: Configuring IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Router Interface Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Assigning an IP Address to a Virtual Routing Port . . . . . . . . . . . . . . . . . . . . . . . . 92 Globally Enabling IP Routing Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Enabling IP Forwarding Globally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Enabling Alternative Routes Globally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Alternative Routes Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Globally Enabling Alternative Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 IP Router Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Configuring the Router IP Protocol Stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Viewing IP Address Router Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Managing the System Routing Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 IP Static Route Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Creating IP Static Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Creating a Static Default Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Creating a Black Hole Static Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Deleting a Static Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Configuring CLIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Creating a CLIP interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Enabling OSPF on a CLIP interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Enabling PIM on a CLIP interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Deleting a CLIP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Configuring IP Route Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Configuring ICMP Router Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Enabling ICMP Router Discovery Globally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Viewing the ICMP Router Discovery Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Configuring Router Discovery on a VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Chapter 3: Configuring ARP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Viewing and Managing ARP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Static ARP Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 321712-B Rev 03 Contents 9 IP, VLAN—ARP tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Chapter 4: Configuring BootP/DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 BootP/DHCP relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Configuring BootP/DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Chapter 5: Configuring IP Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Configuring the Prefix List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Creating and Editing a Route Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Configuring Policy Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Configuring an OSPF Accept Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Configuring an OSPF Redistribution Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Configuring Filtering Policies on a RIP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 Deleting Filtering Policies on a RIP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 Chapter 6: Configuring VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Configuration Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Enabling VRRP Globally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Configuring VRRP for the Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Configuring VRRP Secondary Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Configuring VRRP on a VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Viewing VRRP Interface Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Configuring the Fast Advertisement Interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 Configuring the Fast Advertisement Interval on a VLAN . . . . . . . . . . . . . . . . . . . 159 Chapter 7: Configuring RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Enabling and Configuring Global RIP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Enabling and Configuring RIP on a VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 RIP Supply and Listen Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 RIP Versioning Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 RIP Send Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 RIP Interface Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Viewing RIP Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Chapter 8: Configuring OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Viewing General OSPF Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Configuring IP Routing and Multicast Operations using Device Manager 10 Contents Enabling or Disabling OSPF on a Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Manually Initiating an SPF Run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Configuring OSPF Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Viewing OSPF Interface Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Creating an OSPF Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Changing an OSPF Interface Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Configuring OSPF NBMA Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 Adding NBMA Neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Viewing OSPF Neighbor Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Managing an OSPF VLAN interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Assigning an IP address to a VLAN Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Configuring OSPF on a VLAN interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Graphing OSPF Interface Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Managing OSPF Area Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Viewing OSPF Area Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Creating a Stub Area or NSSAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Creating a Virtual Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Managing an Automatic Virtual Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Configuring a Manual Virtual Link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Viewing Virtual Links on Neighboring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Configuring Router Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Specifying ASBRs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Configuring Metric Speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Configuring Global Default Metric Speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Managing Metrics with the Peer Layer Interface . . . . . . . . . . . . . . . . . . . . . . . . . 208 Viewing Stub Area Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 Viewing Advertisements in the link state database . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Viewing the External Link State Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 Inserting OSPF Area Aggregate Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Configuring an OSPF Redistribution Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 Chapter 9: Configuring UDP Forwarding. . . . . . . . . . . . . . . . . . . . . . . . . . 219 Creating UDP Protocol Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 Configuring Forwarding Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Creating UDP Forwarding Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 321712-B Rev 03 Contents 11 Applying UDP Forwarding Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 Chapter 10: Configuring IGMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Configuring IGMP on a VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 IGMP Snooping on a VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Enabling IGMP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Global IGMP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Viewing IGMP Cache Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 IGMP Interface Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Multicast Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Viewing IGMP Snoop Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Viewing IGMP Dynamic Group Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 IGMP Static Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 Multicast Access Control Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 Viewing IGMP Sender Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Chapter 11: Configuring Multicast MAC Filtering . . . . . . . . . . . . . . . . . . . 247 Configuring Layer 2 Multicast MAC Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Chapter 12: Configuring PIM-SM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Configuration Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Enabling PIM-SM Globally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Enabling PIM on a VLAN Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Viewing and Editing PIM Interface parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Viewing PIM-SM Neighbor Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Viewing RP Set Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 Configuring a Candidate RP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Viewing the Current Bootstrap Router (BSR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 Chapter 13: Configuring Multicast Routes . . . . . . . . . . . . . . . . . . . . . . . . 265 Viewing Route Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 Viewing Next Hop Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Viewing and Editing Interface Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 Configuring Static Source Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 Configuration Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 Viewing and Editing Static Source Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 Configuring IP Routing and Multicast Operations using Device Manager 12 Contents Adding a Static Source Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 Deleting a Static Source Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 Troubleshooting Multicast Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Prunes Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Sources dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Egress VLANs dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 321712-B Rev 03 13 Figures Figure 1 Network and host boundaries in IP address classes . . . . . . . . . . . . . . . . 31 Figure 2 Class C address supernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Figure 3 IP Routing Between VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Figure 4 DHCP operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Figure 5 Forwarding DHCP packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Figure 6 Configuring multiple BootP/DHCP servers . . . . . . . . . . . . . . . . . . . . . . . . 42 Figure 7 Hop count or metric in RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Figure 8 VRRP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Figure 9 VRRP Configuration with Split-MLT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Figure 10 Virtual link between ABRs through a transit area . . . . . . . . . . . . . . . . . . . 61 Figure 11 CLIP (loopback) Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Figure 12 Multicast distribution tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Figure 13 Multicast IP address to MAC address mapping . . . . . . . . . . . . . . . . . . . . 69 Figure 14 Static mrouter port and non-querier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Figure 15 IGMPv1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Figure 16 IGMPv2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Figure 17 Shared tree and shortest-path tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Figure 18 PIM-SM simplified example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Figure 19 Data flow using denyRX policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Figure 20 Data flow using denyBoth policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Figure 21 IP dialog box—Globals tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Figure 22 VLAN dialog box—Basic tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Figure 23 IP, VLAN dialog box—IP Address tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Figure 24 IP, VLAN, Insert IP Address dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Figure 25 IP dialog box—Addresses tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Figure 26 IP dialog box—Routes tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Figure 27 IP dialog box—Static Routes tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Figure 28 IP, Insert Static Routes dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Figure 29 IP dialog box—Circuitless IP tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Configuring IP Routing and Multicast Operations using Device Manager 14 Figures Figure 30 IP, Insert Circuitless dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Figure 31 Circuitless OSPF dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Figure 32 Circuitless PIM dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Figure 33 IP dialog box—Route Preference tab . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Figure 34 IP dialog box—Router Discovery tab . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Figure 35 IP, VLAN dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Figure 36 IP, VLAN—Router Discovery tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Figure 37 IP dialog box—ARP tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Figure 38 IP, Insert ARP dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Figure 39 IP, Insert ARP, VLAN port selection dialog box . . . . . . . . . . . . . . . . . . . . 122 Figure 40 IP, VLAN dialog box—ARP tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Figure 41 DHCP dialog box—Globals tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Figure 42 Insert Globals dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Figure 43 Policy dialog box—Prefix List tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Figure 44 Policy, Insert Prefix List dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Figure 45 Policy dialog box—Route Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Figure 46 Policy, Insert Route Policy dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Figure 47 Policy Dialog—Applying Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Figure 48 Policy Dialog—OSPF Accept tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Figure 49 Policy, Insert OSPF Accept Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Figure 50 Policy Dialog—OSPF Redistribute tab . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Figure 51 Policy, Insert OSPF Redistribute dialog box . . . . . . . . . . . . . . . . . . . . . . 141 Figure 52 Policy dialog box—RIP In/Out Policy tab . . . . . . . . . . . . . . . . . . . . . . . . 143 Figure 53 VRRP dialog box—Globals tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Figure 54 VRRP dialog box—Interface tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Figure 55 VRRP dialog box—Secondary Feature tab . . . . . . . . . . . . . . . . . . . . . . 152 Figure 56 VLAN dialog box—Basic tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Figure 57 IP, VLAN dialog box—VRRP tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Figure 58 IP, VLAN, Insert VRRP dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Figure 59 VRRP Stats dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 Figure 60 RIP dialog box—Globals tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Figure 61 IP, VLAN dialog box—RIP tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Figure 62 RIP dialog box—Interface tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Figure 63 RIP dialog box—Interface Advance tab . . . . . . . . . . . . . . . . . . . . . . . . . 173 Figure 64 RIP dialog box—Status tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 321712-B Rev 03 Figures Figure 65 15 OSPF dialog box—General tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Figure 66 Force SPF run dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Figure 67 OSPF dialog box—Interfaces tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Figure 68 OSPF Insert Interfaces dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Figure 69 Neighbors tab—NBMA manually-configured neighbors . . . . . . . . . . . . . 187 Figure 70 OSPF dialog box—Neighbors tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Figure 71 OSPF, Insert Neighbors dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Figure 72 VLAN dialog box—Basic tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Figure 73 VLAN dialog box—IP Address tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Figure 74 VLAN, Insert IP Address dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Figure 75 VLAN dialog box—OSPF tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Figure 76 OSPF Stats Default dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Figure 77 OSPF dialog box—Areas tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Figure 78 OSPF dialog box—Virtual If tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Figure 79 OSPF, Insert Virtual If dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Figure 80 OSPF dialog box—Virtual Neighbor tab . . . . . . . . . . . . . . . . . . . . . . . . . 205 Figure 81 OSPF dialog box—Hosts tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Figure 82 OSPF, Insert Hosts dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Figure 83 OSPF dialog box—If Metrics tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Figure 84 OSPF dialog box—Stub Area Metrics tab . . . . . . . . . . . . . . . . . . . . . . . 210 Figure 85 OSPF dialog box—Link State Database tab . . . . . . . . . . . . . . . . . . . . . . 211 Figure 86 OSPF dialog box—Ext. Link State DB tab . . . . . . . . . . . . . . . . . . . . . . . 212 Figure 87 OSPF dialog box—Area Aggregate tab . . . . . . . . . . . . . . . . . . . . . . . . . 214 Figure 88 OSPF, Insert Area Aggregate dialog box . . . . . . . . . . . . . . . . . . . . . . . . 214 Figure 89 Policy dialog box—Redistribute tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Figure 90 Policy, Insert OSPF Redistribute dialog box . . . . . . . . . . . . . . . . . . . . . . 217 Figure 91 UdpForwarding dialog box—Protocols tab . . . . . . . . . . . . . . . . . . . . . . . 220 Figure 92 UdpForwarding, Insert Protocol dialog box . . . . . . . . . . . . . . . . . . . . . . . 220 Figure 93 UdpForwarding dialog box—Forwardings tab . . . . . . . . . . . . . . . . . . . . . 221 Figure 94 UdpForwarding, Insert Forwardings dialog box . . . . . . . . . . . . . . . . . . . 222 Figure 95 UdpForwarding dialog box—Forwarding Lists tab . . . . . . . . . . . . . . . . . 223 Figure 96 UdpForwarding, Insert Forwarding Lists dialog box . . . . . . . . . . . . . . . . 224 Figure 97 UdpForwarding dialog box—Broadcast Interfaces tab . . . . . . . . . . . . . . 225 Figure 98 UdpForwarding, Insert Broadcast Interfaces dialog box . . . . . . . . . . . . . 225 Figure 99 IP, VLAN dialog box—IGMP tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Configuring IP Routing and Multicast Operations using Device Manager 16 Figures Figure 100 IGMP dialog box—Global tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Figure 101 IGMP dialog box—Global tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Figure 102 IGMP dialog box—Cache tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Figure 103 IGMP dialog box—Interface tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Figure 104 IGMP dialog box—Multicast Router Discovery tab . . . . . . . . . . . . . . . . . 237 Figure 105 IGMP dialog box—Snoop tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Figure 106 IGMP dialog box—Groups tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Figure 107 IGMP dialog box—Static tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Figure 108 IGMP, Insert Static dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Figure 109 IGMP dialog box—Access tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Figure 110 IGMP, Insert Access dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Figure 111 IGMP dialog box—Sender tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Figure 112 VLAN dialog box—Basic tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Figure 113 Bridge, VLAN dialog box—FDB Aging tab . . . . . . . . . . . . . . . . . . . . . . . 248 Figure 114 Bridge, VLAN dialog box—Multicast tab . . . . . . . . . . . . . . . . . . . . . . . . . 249 Figure 115 Bridge, VLAN, Insert Multicast dialog box . . . . . . . . . . . . . . . . . . . . . . . 249 Figure 116 PIM dialog box—Globals tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Figure 117 IP VLAN dialog box I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Figure 118 IP VLAN dialog box—PIM tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 Figure 119 PIM dialog box—Interfaces tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Figure 120 PIM dialog box—Neighbors tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Figure 121 PIM dialog box—RP Set tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 Figure 122 PIM dialog box—Candidate RP tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 Figure 123 PIM dialog box—Insert Candidate RP dialog box . . . . . . . . . . . . . . . . . . 262 Figure 124 PIM dialog box—Current BSR tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 Figure 125 Multicast dialog box—Routes tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 Figure 126 Multicast dialog box—Next Hops tab . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Figure 127 Multicast dialog box—Interfaces tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 Figure 128 Multicast dialog box—Static Source Group tab . . . . . . . . . . . . . . . . . . . 270 Figure 129 Multicast, Insert Static Source Group dialog box . . . . . . . . . . . . . . . . . . 271 Figure 130 Multicast dialog box—Mroute-HW tab . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Figure 131 Prunes dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Figure 132 Sources dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Figure 133 Egress VLANs Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 321712-B Rev 03 17 Tables Table 1 IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Table 2 Subnet masks for Class B and Class C IP addresses . . . . . . . . . . . . . . . 32 Table 3 Router types in an OSPF network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Table 4 IP dialog box—Globals tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Table 5 IP dialog box—Addresses tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Table 6 IP dialog box—Routes tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Table 7 IP dialog box—Static Routes tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Table 8 IP dialog box—Circuitless IP tab and Insert Circuitless dialog box fields 109 Table 9 Circuitless OSPF dialog box fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Table 10 Circuitless PIM dialog box fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Table 11 IP dialog box—Route Preference tab fields . . . . . . . . . . . . . . . . . . . . . . 113 Table 12 IP dialog box—Router Discovery tab fields . . . . . . . . . . . . . . . . . . . . . . 115 Table 13 IP, VLAN—Router Discovery tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Table 14 IP dialog box—ARP tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Table 15 Globals tab and Insert Globals dialog box fields . . . . . . . . . . . . . . . . . . 127 Table 16 Policy, Insert Prefix List dialog box fields . . . . . . . . . . . . . . . . . . . . . . . . 132 Table 17 Policy, Insert Route Policy dialog box fields . . . . . . . . . . . . . . . . . . . . . . 136 Table 18 Applying Policy tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Table 19 Policy, Insert OSPF Accept Dialog fields . . . . . . . . . . . . . . . . . . . . . . . . 140 Table 20 Policy, Insert OSPF Redistribute dialog box fields . . . . . . . . . . . . . . . . . 142 Table 21 Policy dialog box—RIP In/Out Policy tab fields . . . . . . . . . . . . . . . . . . . . 144 Table 22 Globals tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Table 23 Interface tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Table 24 Secondary Feature tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Table 25 IP, VLAN, Insert VRRP dialog box fields . . . . . . . . . . . . . . . . . . . . . . . . . 156 Table 26 VRRP Stats Dialog Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 Table 27 RIP dialog box—Globals tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Table 28 IP, VLAN dialog box—RIP tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Table 29 RIP supply and listen settings and switch action . . . . . . . . . . . . . . . . . . 170 Configuring IP Routing and Multicast Operations using Device Manager 18 Tables Table 30 RIP dialog box—Interface tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Table 31 RIP send modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Table 32 RIP dialog box—Interface Advance tab fields . . . . . . . . . . . . . . . . . . . . . 174 Table 33 RIP dialog box—Status tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Table 34 General tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 Table 35 OSPF dialog box—Interfaces tab fields . . . . . . . . . . . . . . . . . . . . . . . . . 183 Table 36 Neighbors tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Table 37 OSPF Stats Default fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Table 38 Areas tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Table 39 OSPF dialog box—Virtual If tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Table 40 OSPF dialog box—Virtual Neighbor tab fields . . . . . . . . . . . . . . . . . . . . 205 Table 41 Host tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Table 42 If Metrics tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Table 43 Stub Area Metrics tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 Table 44 Link State Database tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Table 45 Ext. Link State DB tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Table 46 Area Aggregate tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Table 47 Policy, Insert OSPF Redistribute dialog box fields . . . . . . . . . . . . . . . . . 218 Table 48 UdpForwarding dialog box—Protocols tab fields . . . . . . . . . . . . . . . . . . 221 Table 49 UdpForwarding dialog box—Forwardings tab fields . . . . . . . . . . . . . . . . 222 Table 50 UdpForwarding dialog box—Forwarding Lists tab fields . . . . . . . . . . . . . 224 Table 51 UdpForwarding dialog box—Broadcast Interfaces tab fields . . . . . . . . . 226 Table 52 IGMP tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Table 53 Cache tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Table 54 IGMP dialog box—Interface tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Table 55 Multicast Router Discovery fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Table 56 Snoop tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Table 57 Group tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 Table 58 IGMP, Insert Static dialog box fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 Table 59 Access tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Table 60 Sender tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 Table 61 Bridge, VLAN dialog box—Multicast tab fields . . . . . . . . . . . . . . . . . . . . 250 Table 62 PIM Globals tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Table 63 VLAN PIM tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 Table 64 PIM Interfaces tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 321712-B Rev 03 Tables 19 Table 65 PIM Neighbors tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Table 66 PIM RP Set tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Table 67 PIM Candidate RP tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 Table 68 Current BSR tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 Table 69 Routes tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Table 70 Next Hops tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 Table 71 Multicast dialog box—Interfaces tab fields . . . . . . . . . . . . . . . . . . . . . . . 268 Table 72 Static Source Group tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 Table 73 Mroute-HW tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Table 74 Prunes tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Table 75 Sources tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Table 76 Egress VLANs tab fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Configuring IP Routing and Multicast Operations using Device Manager 20 Tables 321712-B Rev 03 21 Preface The Ethernet Routing Switch 1600 Series is a fixed port, hardware-based Layer 3 routing switch that is available in three models: • • • the Ethernet Routing Switch 1612G with 12 Small Form Factor (SFP) GBICs, which provides small to medium aggregation the Ethernet Routing Switch 1624G with 24 SFP GBICs, which provides small to medium aggregation the Ethernet Routing Switch 1648T with 48 10/100 ports and 4 SFP GBICs, which provides small edge concentration The Ethernet Routing Switch 1600 Series Layer 3 routing switch can reside in the wiring closet (1648T) and in the data center or network core (1612G and 1624G): • • The Ethernet Routing Switch 1648T provides Layer 3 functionality in the wiring closet. The Ethernet Routing Switch 1612G and 1624G provide gigabit Ethernet ports for wiring closet aggregation, as well as high-speed connections for servers and power users. These aggregation devices typically reside in the network core or data center, but can be placed anywhere. This guide provides instructions for the configuration and management of IP routing and multicast operations using the Java Device Manager (JDM). Java Device Manager (Device Manager) is a graphical user interface (GUI) used to configure and manage Ethernet Routing Switches. You install it on a management station in the network. For instructions about installing and starting Device Manager on a Windows*, UNIX*, or Linux* platform, refer to Installing and Using Device Manager (316857-C). Configuring IP Routing and Multicast Operations using Device Manager 22 Preface Before You Begin This guide is intended for network administrators who have the following background: • • • • basic knowledge of networks, Ethernet bridging, and IP routing familiarity with networking concepts and terminology basic knowledge of data switch management basic knowledge of network topologies Before using this guide, you must complete the following procedures. For a new switch: 1 Install the switch. For installation instructions, see Installing the Ethernet Routing Switch 1600 Series Switch (316860-D). 2 Connect the switch to the network. Ensure that you are running the latest version of Nortel Ethernet Routing Switch 1600 Series software. For information about upgrading the Ethernet Routing Switch 1600 Series, see Upgrading to Ethernet Routing Switch 1600 Series Software Release 2.1 (321327-B). 321712-B Rev 03 Preface 23 Text Conventions This guide uses the following text conventions: angle brackets (< >) Enter text based on the description inside the brackets. Do not type the brackets when entering the command. Example: If the command syntax is ping <ip_address>, you enter ping 192.32.10.12 bold text Objects such as window names, dialog box names, and icons, as well as user interface objects such as buttons, tabs, and menu items. bold Courier text Command names, options, and text that you must enter. Example: Use the dinfo command. Example: Enter show ip {alerts|routes}. braces ({}) Required elements in syntax descriptions where there is more than one option. You must choose only one of the options. Do not type the braces when entering the command. Example: If the command syntax is show ip {alerts|routes}, you must enter either show ip alerts or show ip routes, but not both. brackets ([ ]) Optional elements in syntax descriptions. Do not type the brackets when entering the command. Example: If the command syntax is show ip interfaces [-alerts], you can enter either show ip interfaces or show ip interfaces -alerts. ellipsis points (. . . ) Repeat the last element of the command as needed. Example: If the command syntax is ethernet/2/1 [<parameter> <value>]... , you enter ethernet/2/1 and as many parameter-value pairs as needed. Configuring IP Routing and Multicast Operations using Device Manager 24 Preface italic text Variables in command syntax descriptions. Also indicates new terms and book titles. Where a variable is two or more words, the words are connected by an underscore. Example: If the command syntax is show at <valid_route>, valid_route is one variable and you substitute one value for it. plain Courier text Command syntax and system output, for example, prompts and system messages. Example: Set Trap Monitor Filters separator ( > ) Menu paths. Example: Protocols > IP identifies the IP command on the Protocols menu. vertical line ( | ) Options for command keywords and arguments. Enter only one of the options. Do not type the vertical line when entering the command. Example: If the command syntax is show ip {alerts|routes}, you enter either show ip alerts or show ip routes, but not both. 321712-B Rev 03 Preface 25 Related information This section lists information sources that relate to this document. Publications Refer to the following publications for information about Ethernet Routing Switch 1600 Series, Software Release 2.1: • • • • • • • • • • • • • • • • • Installing the Ethernet Routing Switch 1600 Series Switch (316860-D) Upgrading to Ethernet Routing Switch 1600 Series Software Release 2.1 (321327-B) Quick Start Guide (321819-A) Getting Started (321821-A) Installing and Using Device Manager (316857-C) Configuring IP Routing and Multicast Operations using the CLI (321711-B) Configuring QOS and Filters using the CLI and Device Manager (321822-A) Configuring and Managing Security using Device Manager (321713-B) Configuring and Managing Security using the CLI (321714-B) Configuring VLANs, Spanning Tree, and Static Link Aggregation using the CLI (321717-B) Configuring VLANs, Spanning Tree, and Static Link Aggregation using Device Manager (321718-B) CLI Command Line Reference for the Ethernet Routing Switch 1600 Series (316862-D) Network Design Guidelines (321823-A) Configuring Network Management using the CLI and Device Manager (321816-A) Managing Platform Operations (321817-A) System Messaging Platform Reference Guide (321820-A) Release Notes for the Ethernet Routing Switch 1600 Series, Software Release 2.1 (316859-J) Configuring IP Routing and Multicast Operations using Device Manager 26 Preface How to get help This section explains how to get help for Nortel products and services. Finding the latest updates on the Nortel web site The content of this documentation was current at the time the product was released. To check for updates to the latest documentation and software for the Ethernet Routing Switch 1600 Series, click one of the following links: Latest Software Takes you directly to the Nortel page for Ethernet Routing Switch 1600 Series software Latest Documentation Takes you directly to the Nortel page for Ethernet Routing Switch 1600 Series documentation Getting help from the Nortel web site The best way to get technical support for Nortel products is from the Nortel Technical Support web site: www.nortel.com/support This site provides quick access to software, documentation, bulletins, and tools to address issues with Nortel products. From this site, you can: • • • • download software, documentation, and product bulletins search the Technical Support Web site and the Nortel Knowledge Base for answers to technical issues sign up for automatic notification of new software and documentation for Nortel equipment open and manage technical support cases Getting help over the phone from a Nortel Solutions Center If you do not find the information you require on the Nortel Technical Support web site, and you have a Nortel support contract, you can also get help over the phone from a Nortel Solutions Center. 321712-B Rev 03 Preface 27 In North America, call 1-800-4NORTEL (1-800-466-7835). Outside North America, go to the following web site to obtain the phone number for your region: www.nortel.com/callus Getting help from a specialist using an Express Routing Code To access some Nortel Technical Solutions Centers, you can use an Express Routing Code (ERC) to quickly route your call to a specialist in your Nortel product or service. To locate the ERC for your product or service, go to: www.nortel.com/erc Getting help through a Nortel distributor or reseller If you purchased a service contract for your Nortel product from a distributor or authorized reseller, contact the technical support staff for that distributor or reseller. Configuring IP Routing and Multicast Operations using Device Manager 28 Preface 321712-B Rev 03 29 Chapter 1 IP routing and multicast concepts This chapter provides conceptual information for the Ethernet Routing Switch 1600 Series IP routing and multicast features. It includes the following topics: • • • • • • • • • • • • • “Overview of IP routing”page 30 “BootP/DHCP relay”page 40 “Address Resolution Protocol (ARP)”page 43 “Routing Information Protocol (RIP)”page 43 “Virtual Router Redundancy Protocol (VRRP)”page 47 “Open Shortest Path First (OSPF) Protocol”page 52 “Circuitless IP (CLIP)”page 63 “UDP forwarding”page 64 “Overview of IP multicast”page 65 “Internet Group Management Protocol (IGMP)”page 71 “Protocol Independent Multicast-Sparse Mode (PIM-SM)”page 77 “Multicast access control feature”page 87 “Multicast MAC filtering”page 90 Configuring IP Routing and Multicast Operations using Device Manager 30 Overview of IP routing This section provides an overview of IP routing and includes the following topics: • • • • • • • “IP addressing” on page 30 “Virtual routing between VLANs” on page 34 “Static routes” on page 35 “Black hole static routes” on page 36 “Alternative routes” on page 37 “IP filtering and route policies” on page 38 “Per-VLAN routing control” on page 39 IP addressing An IP version 4 address consists of 32 bits expressed in a dotted-decimal format (x.x.x.x). The IP version 4 address space is divided into classes with classes A, B, and C reserved for unicast addresses and accounting for 87.5 percent of the 32-bit IP address space. Class D is reserved for multicast addressing. Table 1 lists the breakdown of IP address space by address range and mask. Table 1 IP addresses Class Address range Mask Number of addresses A 1.0.0.0 - 126.0.0.0 255.0.0.0 126 B 128.0.0.0 - 191.0.0.0 255.255.0.0 63 * 255 C 192.0.0.0 - 223.0.0.0 255.255.255.0 31 * 255 * 255 D 224.0.0.0 - 239.0.0.0 To express an IP address in dotted-decimal notation, each octet of the IP address is converted to a decimal number and the numbers are separated by decimal points. For example, the 32-bit IP address 10000000 00100000 00001010 10100111 is expressed as 128.32.10.167 in dotted-decimal notation. Each IP address class, when expressed in binary, has a different boundary point between the network and host portions of the address, as illustrated in Figure 1 on page 31. The network portion is a network number field from 8 through 24 bits. The remaining 8 through 24 bits identify a specific host on the network. 321712-B Rev 03 31 Figure 1 Network and host boundaries in IP address classes Class A bit # 0 7 8 31 0 Network portion Class B bit # Host portion 01 15 16 31 10 Network portion Class C bit # Host portion 012 23 24 31 110 Network portion Host portion 9750EA This section includes the following topics: • • “Subnet addressing” “Supernet addressing and CIDR” on page 33 Subnet addressing The concept of subnetworks (or subnets) extends the IP addressing scheme by allowing an organization to use one IP address range for multiple networks. Subnets are two or more physical networks that share a common network-identification field (the network portion of the 32-bit IP address). A subnet address is created by increasing the network portion to include a subnet address, thus decreasing the host portion of the IP address. For example, in the address 128.32.10.0, the network portion is 128.32, while the subnet is found in the first octet of the host portion (10). A subnet mask is applied to the IP address and identifies the network and host portions of the address. Configuring IP Routing and Multicast Operations using Device Manager 32 Table 2 illustrates how subnet masks used with Class B and Class C addresses can create differing numbers of subnets and hosts. This example includes using the zero subnet, which is permitted on a 1600 Series switch. Table 2 Subnet masks for Class B and Class C IP addresses Number of bits Subnet mask Number of subnets Number of hosts per subnet (recommended) Class B 2 255.255.192.0 2 16 382 3 255.255.224.0 6 8 190 4 255.255.240.0 14 4 094 5 255.255.248.0 30 2 046 6 255.255.252.0 62 1 022 7 255.255.254.0 126 510 8 255.255.255.0 254 254 9 255.255.255.128 510 126 10 255.255.255.192 1 022 62 11 255.255.255.224 2 046 30 12 255.255.255.240 4 094 14 13 255.255.255.248 8 190 6 14 255.255.255.252 16 382 2 Class C 1 255.255.255.128 0 126 2 255.255.255.192 2 62 3 255.255.255.224 6 30 4 255.255.255.240 14 14 5 255.255.255.248 30 6 6 255.255.255.252 62 2 Variable-length subnet masking (VLSM) is the ability to divide your intranet into pieces that match your requirements. Routing is based on the longest matching subnet mask/network. Routing Information Protocol (RIPv2) and Open Shortest Path First (OSPF) are routing protocols that support VLSM. 321712-B Rev 03 33 Supernet addressing and CIDR A supernet is a group of networks identified by contiguous network addresses. IP service providers can assign customers blocks of contiguous addresses to define supernets as needed. Supernetting allows for the addressing of an entire block of Class C addresses and avoids using large routing tables to track the addresses. Each supernet has a unique supernet address that consists of the upper bits shared by all of the addresses in the contiguous block. For example, consider the Class C addresses shown in Figure 2. By adding the mask 255.255.128.0 to IP address 192.32.128.0, you aggregate the addresses 192.32.128.0 through 192.32.255.255, and 128 Class C addresses use a single routing advertisement. In the bottom half of Figure 2, you use 192.32.0.0/17 to aggregate the 128 addresses (192.32.0.0/24 to 192.32.127.0/24). Figure 2 Class C address supernet 128 Class C Networks 192.32.128.0 255.255.128.0 192.32.127.0/24 192.32.126.0/24 192.32.0.0/17 192.32.2.0/24 192.32.1.0/24 192.32.0.0/24 9577EA Configuring IP Routing and Multicast Operations using Device Manager 34 Another example is the block of addresses 192.32.0.0 to 192.32.7.0. The supernet address for this block is 11000000 00100000 00000, with the 21 upper bits shared by the 32-bit addresses. A complete supernet address consists of an address/mask pair: • • The address is the first 32-bit IP address in the contiguous block. In this example, the address is 11000000 00100000 00000000 00000000 (192.32.0.0 in dotted-decimal notation). The mask is a 32-bit string containing a set bit for each bit position in the supernet part of the address. The mask for the supernet address in this example is 11111111 11111111 11111000 00000000 (255.255.248.0 in dotted-decimal notation). The complete supernet address in this example is 192.32.0.0/21. The supernet address is also referred to as the classless interdomain routing (CIDR) address. Although classful routing prohibits using an address mask with the IP address, CIDR allows you to create networks of various sizes using the address mask. VLSM also allows for the division of address space, but the division is not seen outside the network. With CIDR, addresses are used by routers outside the network. Virtual routing between VLANs The Ethernet Routing Switch 1600 Series supports wire-speed IP routing between VLANs. As shown in Figure 3 on page 35, although VLAN 1 and VLAN 2 are on the same switch, for traffic to flow from VLAN 1 to VLAN 2, the traffic must be routed. When routing is configured on a VLAN, an IP address is assigned to the VLAN and this acts as a virtual router interface address for the VLAN. It is called a virtual router interface because it is not associated with any particular port. The VLAN IP address can be reached through any of the VLAN ports, and frames are routed from the VLAN through the gateway’s IP address. Routed traffic can be forwarded to another VLAN within the switch. 321712-B Rev 03 35 Figure 3 IP Routing Between VLANs When Spanning Tree Protocol is enabled in a VLAN, the spanning tree convergence must be stable before the routing protocol begins. This requirement can lead to an additional delay in the forwarding of IP traffic. Because a given port can belong to multiple VLANs (some of which are configured for routing on the switch and some of which are not), there is no longer a one-to-one correspondence between the physical port and the router interface. As with any IP address, virtual router interface addresses are also used for device management. For SNMP or Telnet management, any virtual router interface address can be used to access the switch as long as routing is enabled on the VLAN. For more information about virtual routing configuration, refer to “Configuring IP Routing” on page 91. Static routes In order for data to traverse from one end of the network to the other, each device needs a routing table that lists how to get to the various destinations, or routes. There are two primary ways to generate routes: • • static routes, which are configured by the network administrator dynamically learned routes, which are produced when a routing protocol is run on network equipment Static routes are user-defined routes that specify the path for the router to forward traffic. Static routes do not update automatically. Configuring IP Routing and Multicast Operations using Device Manager 36 On the Ethernet Routing Switch 1600 Series, any route can be configured as a static route. Static routes can also be configured with a next hop that is not directly connected, but that hop must be reachable. Otherwise, the static route is not enabled. A default static route can be used to specify a route to all networks for which there are no explicit routes in the routing table. This route is, by definition, a route with the prefix length of zero (see RFC 1812). Note: To create a default static route, the destination address and subnet mask must be set to 0.0.0.0. Static routes are a resource-efficient way to: • • • help keep data flowing in the network provide a commonly used method to configure the default route (that is, a route with network address 0.0.0.0 and network mask 0.0.0.0) provide an effective way to manually control the routing table, particularly if the network administrator does not want traffic flowing according to the dynamic routing protocols For more information about configuring static routes, refer to “Configuring IP Routing” on page 91. Black hole static routes A black hole static route is a route with an invalid next-hop, such that the data packets destined to this network are dropped by the switch (see also, “Static routes” on page 35). While aggregating or injecting routes to other routers, the router itself may not have a path to the aggregated destination. In such cases, the result is a “black hole” and a routing loop. To avoid such loops, a black hole static route can be configured to the destination it is advertising. A preference value can be configured for a black hole route. This value must be configured appropriately so that when the black hole route must be used, it is elected as the best route. 321712-B Rev 03 37 Before adding a black hole static route, a check is performed to ensure that there is no other static route to that identical destination in an enabled state. If such a route exists, the black hole route cannot be added and an error message displays. If there is a black hole route enabled, another static route to that destination cannot be added. Delete or disable the black hole route prior to adding a regular static route to that destination. For more information about configuring black hole static routes, refer to “Configuring IP Routing” on page 91. Alternative routes Routers may have several routes to the same destination network through several protocols. In the Ethernet Routing Switch 1600 Series software, if the alternative route feature is enabled, it stores all of these alternative routes sorted in order of network mask, cost, and route preference. The best, or first one listed, is the best route and is used by the hardware. The rest of the routes are referred to as alternative routes. To avoid traffic interruption, alternative routes can be globally enabled on the switch. If the best route becomes unavailable, the next best route from the alternative route list can then replace the best route. In the Ethernet Routing Switch 1600 Series, both the active routing table and the configured static route table are maintained. In the event a route is configured with the same network address, mask, and cost values from multiple sources, route preferences are taken into consideration to select the best route added to the forwarding database. Route preferences can be set for static routes and routing protocols. When configuring a static route on the Ethernet Routing Switch 1600 Series, a preference for the route can be specified. To modify the preference for a static route, disable the route before editing the configuration, and then reenable the route. Note: Changing route preferences is a process-oriented operation that can affect system performance and network reachability while performing the procedures. Therefore, Nortel recommends that changing preferences for static routes or routing protocols must only be done when configuring routes or before enabling routing protocols. Configuring IP Routing and Multicast Operations using Device Manager 38 On the Ethernet Routing Switch 1600 Series, default preferences are assigned to all standard routing protocols. The default preference can be modified for a protocol to make the priority higher or lower than other protocols. When the preference for a protocol is changed, if all best routes remain best routes, only the local route tables are changed. However, if changing the protocol preference causes best routes to no longer be best routes, neighboring route tables may be affected. In addition, the preference value can be modified for dynamic routes through route filtering and IP policies, and the route preference overrides the global preference for the protocol. With this alternative mechanism, the behavior of specific routes can have a different preference rather than acquiring the global protocol preference. For a static route, an individual route preference can be specified that overrides the global static route preference. The preference value can be anything between 0 and 255, with 0 reserved for local routes and 255 representing an unreachable route. For more information about configuring alternative routes, refer to “Configuring IP Routing” on page 91. IP filtering and route policies The Ethernet Routing Switch 1600 Series can apply a number of filters to IP traffic to manage, accept, and announce policies for routing table information. The filtering process relies on the IP prefix lists in the common routing table manager infrastructure. An IP route policy and its attributes can be defined globally, and then the policy applied individually to interfaces and protocols. This section includes the following topics: • • • 321712-B Rev 03 “Accept policies (in filters)” on page 39 “Announce policies (out filters)” on page 39 “Prefix list” on page 39 39 Accept policies (in filters) The Ethernet Routing Switch 1600 Series applies accept policies (in filters) to incoming traffic to determine whether or not to add the route to the routing table. For RIP, accept policies are applied to all incoming route information. Announce policies (out filters) The Ethernet Routing Switch 1600 Series applies announce policies (out filters) to outgoing advertisements to neighbors and peers in the protocol domain. These polices are used to determine whether or not to announce specific route information. Out filtering applies to RIP updates. Prefix list The prefix list is a list of networks used by route policies to define an action. One or more IP prefix lists can be created and applied to any IP route policy. Before the advent of prefix lists, some protocols used two databases for different types of policies: the address-list database, and the netlist database. A prefix list combines these two databases: • • A prefix list with a 32-bit mask is equivalent to an address. A prefix list with a mask less than 32 bits can be used as a network. For more information about configuring filters and prefix lists, refer to “Configuring IP Routing” on page 91. Per-VLAN routing control Routing capabilities on specified switch ports can be enabled or disabled when the port is part of a routed VLAN. In the Ethernet Routing Switch 1600 Series, an IP address is assigned to the port-based or IP protocol-based VLANs. To enable routing on a VLAN, perform the following steps: 1 Create a VLAN to which you can assign the port. 2 Assign an IP address to the VLAN. Configuring IP Routing and Multicast Operations using Device Manager 40 For more information about configuring per-port routing, refer to “Configuring IP Routing” on page 91. BootP/DHCP relay The Dynamic Host Configuration Protocol (DHCP) is an extension of the Bootstrap Protocol (BootP) and provides host configuration information to the workstations on a dynamic basis. To lower administrative overhead, network managers prefer to configure a small number of DHCP servers in a central location. It is necessary for routers to support the BootP/DHCP relay function so that hosts can access configuration information from servers several router hops away. Differences between DHCP and BootP The following differences between DHCP and BootP are specified in RFC 2131 and include functions that BootP does not address: • • DHCP defines mechanisms through which clients can be assigned a network address for a finite lease (providing reuse of IP addresses). DHCP provides the mechanism for clients to acquire all of the IP configuration parameters needed to operate. DHCP uses the BootP message format defined in RFC 951. A packet is classified as DHCP if the first four octets in the options field are 99, 130, 83, 99, and the fifth octet is 53. The first four octets are referred to as the Magic Cookie, while the fifth is the DHCP message type code. The remainder of the options field consists of a list of tagged parameters that are called options (RFC 2131). Summary of DHCP relay operation BootP/DHCP clients (workstations) generally use UDP/IP broadcasts to determine their IP addresses and configuration information. If such a host is on a network or a subnet segment (or VLAN) that does not include a DHCP server, the UDP broadcasts are by default not forwarded to the server located on a different network segment or VLAN. The Ethernet Routing Switch 1600 Series can be configured to overcome this issue by forwarding the broadcasts to the server 321712-B Rev 03 41 through virtual router interfaces. The router interfaces can be configured to forward DHCP broadcasts to other locally connected network segments or directly to the server’s IP address. DHCP must be enabled on a per-routable-interface basis. Figure 4 shows an end station connected to subnet 1, corresponding to VLAN 1. The Ethernet Routing Switch 1600 Series connects two subnets by means of the virtual routing function. When the end station generates a DHCP request as a limited UDP broadcast to the IP address of all 1s (that is, 255.255.255.255) with the DHCP relay function configured, the Ethernet Routing Switch 1600 Series forwards DHCP requests to subnet 2 or to the host address of the DHCP server, depending on the configuration. Figure 4 DHCP operation Forwarding DHCP packets In the example shown in Figure 5, the agent address is 10.10.1.254. To configure the Ethernet Routing Switch 1600 Series to forward DHCP packets from the end station to the server, use 10.10.2.1 as the server address. Figure 5 Forwarding DHCP packets Configuring IP Routing and Multicast Operations using Device Manager 42 All BootP broadcast packets, including DHCP packets that appear on the VLAN 1 router interface (10.10.1.254), are forwarded to the DHCP server. In this case, the DHCP packets are forwarded as unicast to the DHCP server’s IP address. To forward BootP/DHCP packets as broadcast packets to VLAN 2, specify the IP address of the switch VLAN 2 router interface (10.10.2.254) as the server address. Multiple BootP/DHCP servers Most enterprise networks use multiple BootP/DHCP servers for fault tolerance. With the Ethernet Routing Switch 1600 Series, you can configure the switch to forward BootP/DHCP requests to multiple servers. If a DHCP client is connected to a routable interface, to configure DHCP requests to be sent to multiple routable interfaces or multiple server IP addresses, enable DHCP on the client (agent address) and then enable DHCP from the client to each of the interfaces or IP addresses (server addresses). In the example shown in Figure 6, two DHCP servers are located on two different subnets. To configure the Ethernet Routing Switch 1600 Series to forward the copies of the BootP/DHCP packets from the end station to both servers, specify the switch (10.10.1.254) as the agent address. Then, enable DHCP to each of the DHCP servers by entering 10.10.2.1 and 10.10.3.1 as the server addresses. Figure 6 Configuring multiple BootP/DHCP servers 321712-B Rev 03 43 Address Resolution Protocol (ARP) Network stations using the IP protocol need both a physical address and an IP address to transmit a packet. In situations where the station knows only the network host’s IP address, the Address Resolution Protocol (ARP) enables the network station to determine a network host’s physical address by binding a 32-bit IP address to a 48-bit MAC address. A network station can use ARP across a single network only, and the network hardware must support physical broadcasts. If a network station wants to send a packet to a host but knows only the host’s IP address, the network station uses ARP to determine the host’s physical address, as follows: 1 The network station broadcasts a special packet, called an ARP request, that asks the host at the specified IP address to respond with its physical address. 2 All network hosts receive the broadcast request. 3 Only the specified host responds with its hardware address. 4 The network station then maps the host IP address to the host physical address and saves the results in an address-resolution cache for future use. 5 The network station ARP table displays the associations of the known MAC address to IP address. Static ARP entries can be created, and individual ARP entries can be deleted. Routing Information Protocol (RIP) Routing Information Protocol (RIP) is a standard, dynamic routing protocol based on the Bellman-Ford (or distance vector) algorithm. It is used as an Interior Gateway Protocol (IGP). Using RIP, routers can exchange information to compute routes through an IPv4-based network. RIP is defined in RFC 1058 for RIP version 1 and RFC 2453 for RIP version 2. The most significant difference between the two versions is that RIP version 2 supports subnet masks. Configuring IP Routing and Multicast Operations using Device Manager 44 RIP operation RIP uses User Datagram Protocol (UDP) data packets to exchange routing information. Each router maintains a routing table, which lists the optimal route to every destination in the system. Each router advertises its routing information by sending a routing information update at regular intervals. Neighboring routers use this information to recalculate their routing tables and retransmit the routing information. For RIP version 1, no mask information is exchanged; the natural mask is always applied by the router receiving the update. For RIP version 2, mask information is always included. If a router does not receive an update from another router within a timeout period, it deletes the routes served by the nonupdating router from its routing table. However, it keeps these routes temporarily in a garbage list and continues to advertise them for a holddown period, so that neighbors know that the routes are unreachable. If a valid update for a garbage route is received within the holddown period, the router adds the route back into its routing table. If no update is received, the router completely deletes all garbage list entries for the nonupdating router. To prevent routing loops and to promote fast convergence, RIP uses the mechanisms of split horizon, with or without poisoned reverse, and triggered updates. Simple split horizon means that IP routes learned from a neighbor are not advertised back in updates to that neighbor. Split horizon with poisoned reverse means that these routes are advertised back to the neighbor, but they are “poisoned” with a metric of 16, which represents infinite hops in the network. The receiver neighbor therefore ignores this route. Triggered updates means that a router is required to send update messages whenever it changes the metric for a route, even if it is not yet time for a regular update message. RIP supports the following standard behavior: • • • • • • • 321712-B Rev 03 periodic RIP updates about effective best routes garbage collection split horizon with or without poisoned reverse triggered update for changed RIP routes unicast to the specific query requestor broadcast or multicast of regular and triggered updates subnet mask (RIP version 2) 45 • • • • routing table update based on the received RIP message global update timer Hold Down Timer and timeout timer per device and per interface cost per device and per interface The Ethernet Routing Switch 1600 Series implementation of RIP also supports the following features: • • in and out routing policies auto-aggregation (also known as auto-summarization) of groups of adjacent routes into single entries Many RIP features are configurable. The actual behavior of the protocol depends on the feature configurations. Note: In the Ethernet Routing Switch 1600 Series, RIP is configurable only for VLANs. RIP metrics RIP is known as a distance vector protocol. The vector is the network number and next hop, and the distance is the cost associated with the network number. RIP identifies network reachability based on cost, and cost is defined as hop count. The distance from one router to the next is considered to be one hop. This cost or hop count is known as the metric (Figure 7 on page 46). Configuring IP Routing and Multicast Operations using Device Manager 46 Figure 7 Hop count or metric in RIP A directly connected network has a metric of zero. An unreachable network has a metric of 16. Therefore, 15 hops or 15 routers is the highest possible metric between any two networks. Limitations RIP has the following limitations: • • • The protocol is limited to networks whose longest path is 15 hops. The protocol depends on counting to infinity to resolve certain unusual situations. The protocol uses fixed metrics (the hop number) to compare alternative routes, as opposed to real-time parameters such as measured delay, reliability, or load. RIP does not support addressless links. For more information about configuring RIP, see “Configuring RIP” on page 161. 321712-B Rev 03 47 Virtual Router Redundancy Protocol (VRRP) Because end stations are often configured with a static default gateway IP address, a loss of the default gateway router causes a loss of connectivity to the remote networks. The Virtual Router Redundancy Protocol (VRRP) is designed to eliminate the single point of failure that can occur when the single static default gateway router for an end station is lost. VRRP introduces the concept of a virtual IP address (transparent to users) shared between two or more routers connecting a common subnet to the enterprise network. With the virtual IP address as the default gateway on end hosts, VRRP provides dynamic default gateway redundancy in the event of failure. (With the Ethernet Routing Switch 8300 Series Switch, only one IP address can be assigned to any virtual router interface.) VRRP uses the following terms: • • • • • VRRP router — a router running the VRRP protocol Virtual router — the abstract object managed by VRRP that is assigned the virtual IP address and that acts as the default router for a set of IP addresses across a common LAN. Each virtual router is assigned a virtual router ID. Virtual router master — the VRRP router that assumes responsibility for forwarding packets sent to the IP address associated with the virtual router. The master router also responds to packets sent to the virtual router IP address and answers ARP requests for this IP address. Virtual router backup — the router or routers that can serve as the failover router if the master router becomes unavailable. If the master router fails, an election process provides a dynamic transition of forwarding responsibility to a new master router. Priority — an 8-bit value assigned to all VRRP routers. A higher value represents a higher priority for election to the master router. You can set the priority to a value from 1 to 254. When a master router fails, an election process takes place among the backup routers to dynamically re-assign the role of the master router. Configuring IP Routing and Multicast Operations using Device Manager 48 VLAN With the Ethernet Routing Switch 1600 Series, VRRP can only be configured at the VLAN level. To configure two or more routers to share a virtual router, the routers must first belong to the same VLAN. Initializing VRRP routers When you initialize a VRRP router, if there are no other VRRP routers enabled in the VLAN, then the initialized router assumes the role of the master router. When additional routers are enabled in the VLAN, an election process takes place among them to elect a master, based on their priority. The master router functions as the forwarding router for the IP address associated with the virtual router. It responds to ARP requests for the IP address, forwards packets with a destination MAC address equal to the virtual router MAC address, and accepts only packets addressed to the IP address associated with the virtual router. In the backup state, a VRRP router monitors the availability and state of the master router. It does not respond to ARP requests and must discard packets with a MAC address equal to the virtual router MAC address. It does not accept packets addressed to IP addresses associated with the virtual router. If a shutdown occurs, it transitions back to the initialize state. If the master router fails, the backup router with the highest priority assumes the role of the master router. It sends the VRRP advertisement and ARP request as described in the preceding paragraphs and transitions to the controlling state. Note: Nortel recommends against setting the virtual router IP address to an IP address that is owned by a local router. If a VRRP router is initialized and it is the owner of the virtual IP address, its priority is automatically set to 255, and this value cannot be modified. As a result, the router transitions to the master router state, and remains in that state until it fails. As a result, your ability to manually alter the master or backup router state is restricted. 321712-B Rev 03 49 Basic VRRP configuration steps If you have a router A that you want to assign as the master router, and a router B that you want to assign as the backup router, you can configure them for VRRP as follows: Configuring the virtual router master To configure router A as the virtual router master: 1 On router A, create a VLAN, for example, VLAN 10. 2 Assign an IP address to the VLAN for routing. 3 Configure VRRP properties for VLAN 10 on router A: a Assign a virtual router ID. For example, VRID 1. b Set the virtual router IP address to a previously unassigned IP address. Note: Nortel recommends against assigning a locally owned IP address as the virtual router IP address. c Set the priority to a value above the priority of the backup router, for example, 200. Configuring the virtual router backup To configure router B as the virtual router backup: 1 On router B, create a matching VLAN; in this case, VLAN 10. 2 Assign a local IP address to the VLAN for routing. 3 Configure VRRP properties for VLAN 10 on router B. a Assign the same virtual router ID as on router A. In this case, VRID 1. b Set the IP address to match the VRRP IP address configured for router A. c Set the priority to a value below the priority of Router A, for example, 100. Configuring IP Routing and Multicast Operations using Device Manager 50 Enabling the switches When you enable VRRP on both of these switches, an election process takes place, and because router A has the higher priority, it is elected the master router. It then assumes responsibility for the configured virtual router IP address. Figure 8 shows Virtual router 1 (VRID 1) configured with router A as the master router and router B as the backup master router. In this configuration, VRRP provides the end hosts a redundant default gateway to the external networks. Figure 8 VRRP Configuration Corporate network Critical IP for Router A Critical IP for Router B VRID =1 VLAN = 10 Router A Master router for VRID 1 Router B Backup router for VRID 1 Default gateway = VRID 1 Legend Ethernet Routing Switch 1600 11013fa Critical IP address Within a VRRP VLAN, it is possible for one link to go down, while the remaining links in the VLAN remain operational. Because the VRRP VLAN continues to function, a virtual router associated with that VLAN does not register a master router failure. 321712-B Rev 03 51 As a result, if the local router IP interface connecting the virtual router to the external network fails, this does not automatically trigger a master router failover. The critical IP address resolves this issue. If the critical IP address fails, it triggers a failover of the master router. Therefore, you can specify the local router IP interface uplink from the VRRP router to the network as the critical IP address. This ensures that, if the local uplink interface fails, VRRP initiates a master router failover to one of the backup routers. In Figure 8, the local network uplink interface on router A is shown as the critical IP address for router A. As well, the similar network uplink is shown as the critical IP address for router B. Router B also requires a critical IP address for cases when it assumes the role of the master router. With the support of VRRP, and the support of the critical IP interface linked to VRRP, the Ethernet Routing Switch 1600 Series enables customers to build more reliable small core networks, providing support for converged applications, like voice and multimedia. VRRP and Split-MLT The standard implementation of VRRP allows only one active master switch per IP subnet. All other VRRP interfaces in a network are in backup mode. However, a deficiency occurs when VRRP-enabled switches use Split-MLT. If VRRP switches are aggregated into two Split-MLT switches, the end host traffic is load-shared on all uplinks to the aggregation switches (based on the MLT traffic distribution algorithm). However, VRRP normally has only one active routing interface enabled. All other VRRP routers are in backup mode. Therefore, all traffic that reaches the backup VRRP router is forwarded over the Inter Switch Trunk (IST) link towards the master VRRP router. In this case, the IST link might not have enough bandwidth to carry all the aggregated traffic. You can overcome this issue by assigning the backup router as the master backup router. The master backup router is a backup router that is permitted to actively load-share the routing traffic with a master router. Configuring IP Routing and Multicast Operations using Device Manager 52 When the master backup router is enabled, the incoming host traffic can be forwarded over the Split-MLT links as normal. Figure 9 shows a sample VRRP configuration with Split-MLT. As Router B is configured as the backup master, routing traffic is load-shared between the two devices. Figure 9 VRRP Configuration with Split-MLT Corporate network With Router B configured as the Backup Master, routing traffic is shared between the two devices Critical IP for Router A Critical IP for Router B Router A Router B IST Master router for VRID 1 SMLT SMLT Backup router, set as the Backup Master for VRID 1 MLT Default gateway = VRID 1 Legend Etthernet Routing Switch 1600 Open Shortest Path First (OSPF) Protocol The Open Shortest Path First (OSPF) Protocol is an Interior Gateway Protocol (IGP) that distributes routing information between routers belonging to a single autonomous system (AS). Intended for use in large networks, OSPF is a link-state protocol that supports IP subnetting, IP Type of Service (TOS)-based routing, and the tagging of externally-derived routing information. 321712-B Rev 03 53 Overview In an OSPF network, each router maintains a link-state database that describes the topology of the autonomous system (AS). The database contains the local state for each router in the AS, including the router’s usable interfaces and reachable neighbors. Each router periodically checks for changes in its local state and shares any changes detected by flooding link-state advertisements (LSAs) throughout the AS. Routers synchronize their topological databases based on the sharing of information from LSAs. From the topological database, each router constructs a shortest-path tree, with itself as the root. The shortest-path tree gives the optimal route to each destination in the AS. Routing information from outside the AS appears on the tree as leaves. OSPF routes IP traffic based solely on the destination IP address and subnet mask, and IP Type of Service (TOS) contained in the IP packet header. Benefits In large networks OSPF offers the following benefits: • Fast convergence In the event of topological changes, OSPF recalculates routes quickly. • Minimal routing protocol traffic Unlike distance vector-routing protocols such as RIP, OSPF generates a minimum of routing protocol traffic. • Load sharing OSPF provides support for equal-cost multipath routing. If several equal-cost routes to a destination exist, traffic is distributed equally among them. • Type of Service Separate routes can be calculated for each IP Type of Service. Configuring IP Routing and Multicast Operations using Device Manager 54 OSPF routing algorithm A separate copy of the OSPF routing algorithm runs in each area. Routers that are connected to multiple areas run multiple copies of the algorithm. The sequence of processes governed by the routing algorithm is as follows: 1 When a router starts, it initializes the OSPF data structures and then waits for indications from lower-level protocols that its interfaces are functional. 2 A router then uses the Hello Protocol to discover neighbors. On point-to-point and broadcast networks, the router dynamically detects its neighbors by sending hello packets to the multicast address AllSPFRouters. On non-broadcast multiaccess networks, some configuration information is required in order to discover neighbors. 3 On all multiaccess networks (broadcast or non-broadcast), the Hello Protocol also elects a designated router (DR) for the network. 4 The router attempts to form adjacencies with some of its neighbors. On multiaccess networks, the DR determines which routers become adjacent. This behavior does not occur if a router is configured as a passive interface, because passive interfaces do not form adjacencies. 5 Adjacent neighbors synchronize their topological databases. 6 The router periodically advertises its link-state, and also does so when its local state changes. LSAs include information about adjacencies enabling quick detection of dead routers on the network. 7 LSAs are flooded throughout the area, ensuring that all routers in an area have exactly the same topological database. 8 From this database each router calculates a shortest-path tree, with itself as root. This shortest-path tree, in turn, yields a routing table for the protocol. Autonomous system and areas The AS can be subdivided into areas that group together contiguous networks, routers connected to these networks, and attached hosts. Each area has its own topological database that is invisible from outside the area. Routers within an area know nothing of the detailed topology of other areas. Subdividing the AS into areas significantly reduces the amount of routing protocol traffic as compared to treating the entire AS as a single link-state domain. 321712-B Rev 03 55 A router can be attached to more than one area, maintaining a separate topological database for each area to which it is connected. Two routers within the same area maintain an identical topological database for that area. Each area is assigned a unique area ID and the area ID 0.0.0.0 is reserved for the backbone area. Packets are routed in the AS based on their source and destination addresses. If the source and destination of a packet reside in the same area, intra-area routing is used. If the source and destination of a packet reside in different areas inter-area routing is used. Intra-area routing protects the area from bad routing information because no routing information obtained from outside the area can be used. Inter-area routing must pass through the backbone area, which is described in the following section. Backbone area The backbone area consists of the following network types: • • Networks and attached routers that are not contained in any other area Routers that belong to multiple areas The backbone is usually contiguous, but it is possible to create a non-contiguous area by configuring virtual links. Virtual links can be configured between any two backbone routers that have an interface to a common non-backbone area. Virtual links belong to the backbone and use intra-area routing only. Virtual links are described on page 61. The backbone is responsible for distributing routing information between areas. The topology of the backbone area is invisible to other areas, while it knows nothing of the topology of those areas. In inter-area routing, a packet travels along three contiguous paths in a point-to-multipoint configuration, as follows: 1 An intra-area path from the source to an area border router (ABR) 2 A backbone path between the source and destination areas 3 Another intra-area path to the destination. Configuring IP Routing and Multicast Operations using Device Manager 56 The OSPF routing algorithm finds the set of such paths that has the smallest cost. The topology of the backbone dictates the backbone paths used between areas. Inter-area paths are selected by examining the routing table summaries for each connected ABR. The OSPF behavior has been modified according to OSPF standards so that OSPF routes cannot be learned through an area border router (ABR) unless it is connected to the backbone or through a virtual link. Stub area A stub area is configured at the edge of the OSPF routing domain and has only one ABR. A stub area does not receive LSAs for routes outside its area, reducing the size of its link-state database. A packet destined outside the stub area is routed to the ABR, which examines it before forwarding the packet to its destination. The network behind a passive interface is treated as a stub area, and does not form adjacencies. It is advertised into the OSPF area as an internal route. Neighbors In an OSPF network, any two routers that have an interface to the same network are neighbors. Routers use the Hello Protocol to discover their neighbors and maintain neighbor relationships. On a broadcast or point-to-point network, the Hello Protocol dynamically discovers neighbors. The Hello Protocol provides bidirectional communication between neighbors. Periodically OSPF routers send out hello packets over all interfaces. Included in these hello packets is the following information: • • • • The router priority The router Hello Timer and Dead Timer values A list of routers that have sent this router hello packets on this interface The router choice for designated router (DR) and backup designated router (BDR) Bidirectional communication is determined when one router discovers itself listed in the hello packet of a neighbor. 321712-B Rev 03 57 Neighbor adjacencies Neighbors may form an adjacency for the purpose of exchanging routing information. When two routers form an adjacency, they go through a database exchange process to synchronize their topological databases. When their databases are synchronized, the routers are said to be fully adjacent. Bandwidth is conserved because, from this point on, only routing change information is passed between the adjacent routers. OSPF routers To limit the amount of routing protocol traffic, the Hello Protocol elects a designated router (DR) and a backup designated router (BDR) on each multiaccess network. Instead of neighboring routers forming adjacencies and swapping link-state information with each other (which on a large network can mean a lot of routing protocol traffic), all routers on the network form adjacencies with the DR and the BDR only and send link-state information to them. The DR redistributes this information to every other adjacent router. When operating in backup mode, the BDR receives link-state information from all routers on the network and listens for acknowledgements. If the DR fails, the BDR can transition quickly to the role of DR because its routing tables are up-to-date. Configuring IP Routing and Multicast Operations using Device Manager 58 Router types Routers in an OSPF network can take on different roles depending on how they are configured. Table 3 describes the router types you can configure in an OSPF network. Table 3 Router types in an OSPF network Router Type Description AS boundary router (ASBR) A router attached at the edge of an OSPF network is called an AS boundary router (ASBR). An ASBR generally has one or more interfaces that run an inter-domain routing protocol. In addition, any router distributing static routes or RIP routes into OSPF is considered an ASBR. The ASBR forwards external routes into the OSPF domain. In this way, routers inside the OSPF network learn about destinations outside their domain. Area border router (ABR) A router attached to two or more areas inside an OSPF network is considered an area border router (ABR). ABRs play an important role in OSPF networks by condensing the amount of OSPF information that is disseminated. Internal router (IR) A router that has interfaces only within a single area inside an OSPF network is considered an internal router (IR). Unlike ABRs, IRs have topological information only about the area in which they are contained. Designated router (DR) In a broadcast network a single router is elected to be the designated router (DR) for that network. A DR assumes the responsibility of making sure all routers on the network are synchronized with one another and also advertises that network to the rest of the AS. Backup designated router (BDR) A backup designated router (BDR) is elected in addition to the designated router (DR) and, in the event of failure of the DR, assumes its role quickly. OSPF interfaces An OSPF interface, or link, is configured on an IP interface. In the Ethernet Routing Switch 1600 Series, an IP interface is a logical interface configured on a VLAN (multiple ports). The state information associated with the interface is obtained from the underlying lower level protocols and the routing protocol itself. 321712-B Rev 03 59 OSPF and IP OSPF runs on top of IP, which means that an OSPF packet is sent with an IP data packet header. The protocol field in the IP header is set to 89, which identifies it as OSPF, distinguishing it from other packets that use an IP header. A destination in an OSPF route advertisement is expressed as an IP address and a variable-length mask. Taken together, the address and the mask indicate the range of destinations to which the advertisement applies. The ability to specify a range of networks allows OSPF to send one summary advertisement that represents multiple destinations. For example, a summary advertisement for the destination 128.185.0.0 with a mask of 255.255.0.0 describes a single route to destinations 128.185.0.0 to 128.185.255.255. OSPF packets All OSPF packets start with a 24-octet header that contain information about the OSPF version, the packet type and length, the ID of the router transmitting the packet, and the ID of the OSPF area from which the packet is sent. An OSPF packet can be one of the following types: • Hello packets Hello packets are transmitted between neighbors and are never forwarded. The Hello Protocol requires routers to send hello packets to neighbors at predefined hello intervals. If hello packets are not received by a neighbor router within the specified dead interval, the neighbor router declares the other router dead. • Database description (DD) packets DD packets are exchanged when a link is first established between neighboring routers that synchronize their link state databases. • Link state request packets Link state request packets describe one or more link state advertisements that a router is requesting from its neighbor. Routers send link state requests if the information received in DD packets from a neighbor is not consistent with its own link state database. • Link state update packets Configuring IP Routing and Multicast Operations using Device Manager 60 Link state update packets contain one or more link state advertisements, and are sent following a change in network conditions. • Link state acknowledgement packets Link state acknowledgement packets are sent to acknowledge receipt of link state updates, containing the headers of the link state advertisements that were received. Link state advertisements OSPF does not require each router to send its entire routing table to its neighbors. Instead, each OSPF router floods only link-state change information in the form of link-state advertisements (LSAs) throughout the area or AS. LSAs in OSPF are one of the following five types: • Router links advertisement A router links advertisement is flooded only within the area and contains information about neighbor routers and the LANs to which the router is attached. A backbone router can flood router link advertisements within the backbone area. • Network links advertisement A network links advertisement is generated by a DR on a LAN, listing all routers on that LAN and flooding only within the area. A backbone DR can flood network links advertisements within the backbone area. • Network summary link advertisement A network summary link advertisement is flooded into an area by an ABR that describes networks that are reachable outside the area. An ABR attached to two areas will generate a different network summary link advertisement for each of these areas. ABRs also generate area summary link advertisements containing information about destinations within an area, which are flooded to the backbone area. • ASBR summary link advertisement An ASBR summary link advertisement describes the cost of the path to an ASBR from the router generating the advertisement. • 321712-B Rev 03 AS external link advertisement 61 An AS external link advertisement is sent by an ASBR to describe the cost of the path to a destination outside the AS from the ASBR generating the advertisement. This information is flooded to all routers in the AS. AS external routes OSPF considers the following routes to be AS external (ASE) routes: • • • • • A route to a destination outside the AS A static route A default route A route derived by RIP A directly connected network not running OSPF OSPF virtual links On an OSPF network, an Ethernet Routing Switch 1600 Series that is acting as an ABR must be connected directly to the backbone. If no physical connection is available, a virtual link can be established, which you can configure manually. Figure 10 shows how to configure a virtual link between the ABR in area 2.2.2.2 and the ABR in area 0.0.0.0. Figure 10 Virtual link between ABRs through a transit area Configuring IP Routing and Multicast Operations using Device Manager 62 To configure a virtual link between the ABRs in Area 1 and Area 3, define Area 2 as the transit area between the other two areas, and identify switch S2 as the neighbor router through which switch S2 must send information to reach the backbone via switch S1. Specifying ASBRs ASBRs advertise non-OSPF routes into OSPF domains so that they can be passed along throughout the OSPF routing domain. A router can function as an ASBR if one or more of its interfaces is connected to a non-OSPF network (for example, RIP or EGP). To conserve resources, you may want to limit the number of ASBRs in your network or specifically control which routers perform as ASBRs to control traffic flow. 321712-B Rev 03 63 Circuitless IP (CLIP) Circuitless IP (CLIP) is a virtual (or loopback) interface that is not associated with any physical port. The CLIP interface is used to provide uninterrupted connectivity to the switch as long as there is an actual path to reach the device. In most environments, the router has multiple alternative paths to peers, but frequent port up and port down events cause the TCP session to reset. To minimize communication disruptions, specify a CLIP interface to form the peer relationship with neighbors. Figure 11 is an example of a configuration in which router R1 (IP address 195.39.1.1/30) has been configured with a loopback interface (CLIP 1, IP address 195.39.128.1/32) and router R2 (IP address 195.39.1.2/30) has also been configured with a loopback interface (CLIP 2, IP address 195.39.128.2/32). As long as there is a physical path from R1 to R2, the virtual link between CLIP 1 and CLIP 2 is not interrupted. Figure 11 CLIP (loopback) Configuration The CLIP interface functions like any other IP interface. The network associated with the CLIP interface is treated as a local network attached to the device. This route always exists and the circuit is always up because there is no physical attachment. The switch advertises this route to other routers in the domain. Configuring IP Routing and Multicast Operations using Device Manager 64 When a CLIP interface is created, the system software programs a local route with the CPU as destID. All packets that are destined to the CLIP interface address are processed by the CPU. Any other packets with destination addresses associated with this network (but not to the interface address) are treated like packets from any unknown host. Almost any routing protocol can be configured on the CLIP interface. However, the CLIP feature primarily benefits protocols involving session-based communication. Note: PIM over CLIP is not supported in this release. For more information about configuring CLIP, refer to “Configuring IP Routing” on page 91. UDP forwarding Some network applications, such as the NetBIOS name service, rely on a UDP broadcast to request a service or locate a server for an application. If a host is on a network, subnet segment, or VLAN that does not include a server for the service, UDP broadcasts are, by default, not forwarded to the server located on a different network segment or VLAN. This problem is resolved by forwarding the broadcasts to the server through physical or virtual router interfaces. UDP forwarding is a general mechanism for selectively forwarding limited UDP broadcasts received on an IP interface out to other router IP interfaces as a rebroadcast or to a configured IP address. • • If the address is that of a server, the packet is sent as a unicast packet to this address. If the address is that of an interface on the router, the frame is rebroadcast. When a UDP broadcast is received on a router interface, it must meet the following criteria if it is to be considered for forwarding: • • 321712-B Rev 03 be a MAC-level broadcast be an IP limited broadcast 65 • • be for the specified UDP protocol have a TTL value of at least 2 The forwarding policy specifies how to retransmit UDP broadcasts for each interface and protocol: to a unicast host address, or to a broadcast address. For more information about using Device Manager to configure UDP forwarding, refer to “Configuring UDP Forwarding” on page 219. Overview of IP multicast This section provides an overview of IP multicast and includes the following topics: • • • “Multicast addresses” on page 67 “IP Multicast address ranges” on page 67 “IP to Ethernet multicast MAC mapping” on page 68 IP multicast transmits messages to multiple recipients at the same time. This one-to-many delivery mechanism is similar to broadcasting, except multicasting transmits to specific groups and broadcasting transmits to everybody. Since multicast transmits only one stream of data to the network where it is replicated to many receivers, multicasting saves a considerable amount of bandwidth. IP multicast provides services such as the delivery of information to multiple destinations with a single transmission and the solicitation of servers by clients. IP multicast services benefit applications such as video conferencing, dissemination of datagram information, and dissemination of mail or news to a large number of recipients. Multicast protocols use different techniques to discover delivery paths. A Distribution Tree is a set of multicast routers and subnetworks through which the group members receive traffic from a source. The tree’s source depends on the algorithm used by the multicast protocol. Figure 12 is an example of a simple distribution tree, where S is the multicast source and the arrows indicate the multicast broadcast procedure. Configuring IP Routing and Multicast Operations using Device Manager 66 Figure 12 Multicast distribution tree S 9580EA Reverse path forwarding in multicast is based on the concept that a multicast distribution tree must be built based on the shortest path from the source to each network and subnetwork containing active receivers. When a datagram arrives on an interface, the router determines the reverse path to the source of the datagram by examining the routing table of known network sources. If the datagram is not on the optimal path to source, it is discarded. Multicast host groups and their group members enable the IP multicast router to transmit just to those groups interested in receiving the traffic. The Ethernet Routing Switch 1600 Series uses the Internet Group Membership Protocol (IGMP) to learn the existence of host group members on their directly attached subnets. A router communicates with the hosts on a local network by sending IGMP queries. The Ethernet Routing Switch 1600 Series supports IGMP snoop and can act as a querier if PIM is enabled. For more information, see “IGMP queries” on page 72 and “Multicast addresses” on page 67. IGMP is described in more detail in page 71. Multicast traffic forwarding transmits frames to all interfaces and subnets on which IGMP reports have been received for the multicast group indicated in the destination IP address. Multicast packets forwarded within the same VLAN remain unchanged. Packets are not forwarded to networks with no members of the multicast group indicated in the destination IP address. The group member is the VLAN port on which the IGMP receiver exists, so the traffic is forwarded only to such VLAN ports, and not to all VLAN ports. For more information, see “IGMP Snoop” on page 73. 321712-B Rev 03 67 Multicast addresses Each multicast host group is assigned a unique multicast address. To reach all members of the group, a sender uses the multicast address as the destination address of the datagram. An IP version 4 multicast address is a Class D address (the high-order bits are set to 1110) from 224.0.0.0 to 239.255.255.255. These addresses are assigned statically for use by permanent groups and dynamically for use by transient groups. Note: On the 1600 Series switch, 24-bit subnets, like 224.0.0.0/24 and 224.128.0.0/24 must not be used for multicast data traffic. This restriction applies to the entire multicast address range from 224.0.0.0/8 to 239.128.0.0/8. The Ethernet Routing Switch 1600 Series uses multicast MAC addresses to switch IP multicast data at Layer 2. Thus, several IP multicast addresses can map to the same multicast MAC address. The subsections that follow explain IP multicast addressing in more detail. IP Multicast address ranges IP multicast utilizes D class addresses, which range from 224.0.0.0 to 239.255.255.255. Although subnet masks are commonly used to configure IP multicast address ranges, the concept of subnets does not exist for multicast group addresses. Consequently, the usual unicast conventions where you reserve the all 0s subnets, all 1s subnets, all 0s host addresses, and all 1s host addresses does not apply when dealing with the IP multicast range of addresses. Addresses from 224.0.0.0 through 224.0.0.255 are reserved by IANA for link-local network applications. Packets with an address in this range are not forwarded by multicast capable routers by design. For example, OSPF uses both 224.0.0.5 and 224.0.0.6 and VRRP uses 224.0.0.18 to communicate across a local broadcast network segment. Configuring IP Routing and Multicast Operations using Device Manager 68 IANA has also reserved the range of 224.0.1.0 through 224.0.1.255 for well-known applications. These addresses are assigned by IANA to specific network applications. For example, the Network Time Protocol (NTP) uses 224.0.1.1 and Mtrace uses 224.0.1.32. RFC 1700 contains a complete list of these reserved numbers. Multicast addresses in the 232.0.0.0/8 (232.0.0.0 to 232.255.255.255) range are reserved only for source-specific multicast applications, such as one-to-many applications. While this is the publicly reserved range for SSM applications, private networks can use other address ranges for SSM. Finally, addresses in the range 239.0.0.0/8 (239.0.0.0 to 239.255.255.255) are administratively scoped addresses, meaning they are reserved for use in private domains and must not be advertised outside that domain. This multicast range is analogous to the 10.0.0.0/8, 172.16.0.0/20, and 192.168.0.0/16 private address ranges in the unicast IP space. Technically, a private network can only assign multicast addresses from 224.0.2.0 through 238.255.255.255 to applications that are publicly accessible on the Internet. Multicast applications that are not publicly accessible can be assigned addresses in the 239.0.0.0/8 range. IP to Ethernet multicast MAC mapping Like IP, Ethernet has a range of multicast MAC addresses that natively support Layer 2 multicast capabilities. While IP has a total of 28 addressing bits available for multicast addresses, Ethernet has only 23 addressing bits assigned to IP multicast. Ethernet’s multicast MAC address space is much larger than 23 bits, but only a subrange of that larger space has been allocated to IP multicast by the IEEE. Because of this difference, 32 IP multicast addresses map to one Ethernet multicast MAC address. IP multicast addresses map to Ethernet multicast MAC addresses by placing the low-order 23 bits of the IP address into the low-order 23 bits of the Ethernet multicast address 01:00:5E:00:00:00. Thus, more than one multicast address maps to the same Ethernet address (Figure 13). For example, all 32 addresses 224.1.1.1, 224.129.1.1, 225.1.1.1, 225.129.1.1, 239.1.1.1, 239.129.1.1 map to the same 01:00:5E:01:01:01 multicast MAC address. 321712-B Rev 03 69 Figure 13 Multicast IP address to MAC address mapping 224.0.0.0 224.0.0.1 224.0.0.2 . . . . . . 0100.5E00.0000 224.127.255.255 . . . . . . 224.128.0.0 28 Bits 224.128.0.1 224.128.0.2 0100.5E00.0001 0100.5E00.0002 23 Bits 0100.5E7F.FFFF . . . . . . 224.255.255.255 225.0.0.0 . . . . . . Most Ethernet switches handle Ethernet multicast by mapping a multicast MAC address to multiple switch ports in the MAC address table. Therefore, when designing the group addresses for multicast applications, take care to efficiently distribute streams only to hosts that are receivers. The Ethernet Routing Switch 1600 Series switches IP multicast data based on the IP multicast address and not the MAC address and thus, does not have this issue. As an example, consider two active multicast streams using addresses 239.1.1.1 and 239.129.1.1. Suppose two Ethernet hosts, receiver A and receiver B, are connected to ports on the same switch and only want the stream addressed to 239.1.1.1. Suppose also that two other Ethernet hosts, receiver C and receiver D, are also connected to the ports on the same switch as receiver A and B and wish to receive the stream addressed to 239.129.1.1. If the switch utilizes the Ethernet multicast MAC address to make forwarding decisions, then all four receivers receive both streams, even though each host only wants one or the other stream. This increases the load on both the hosts and the switch. To avoid this extra load, Nortel recommends that you manage the IP multicast group addresses used on the network. Configuring IP Routing and Multicast Operations using Device Manager 70 At the same time, however, it is worth noting that the Ethernet Routing Switch 1600 Series does forward IP multicast packets based on multicast MAC addresses when bridging VLANs at layer 2. Thus, the Ethernet Routing Switch 1600 Series does not encounter this problem. Instead, it internally maps IP multicast group addresses to the ports that contain group members. When an IP multicast packet is received, the lookup is based on IP group address, regardless of whether the VLAN is bridged or routed. Be aware that, while the Ethernet Routing Switch 1600 Series does not suffer from the problem described in the previous example, other switches in the network might. This is particularly true of pure Layer 2 switches. In a network that includes non-Ethernet Routing Switch 1600 Series equipment, the easiest way to ensure that this issue does not arise is to use only a consecutive range of IP multicast addresses corresponding to the lower order 23 bits of that range. For example, use an address range from 239.0.2.0 through 239.127.255.255. A group address range of this size can still easily accommodate the addressing needs of even the largest private enterprise. 321712-B Rev 03 71 Internet Group Management Protocol (IGMP) This section provides an overview of Internet Group Management Protocol (IGMP) and includes the following topics: • • • • • • • “IGMP queries” on page 72 “IGMP host reports” on page 72 “Host leave messages” on page 73 “Fast-leave feature” on page 73 “IGMP Snoop” on page 73 “IGMP proxy” on page 75 “IGMP versions” on page 75 IGMP is a protocol used by IP multicast routers to learn the existence of host group members on their directly attached subnets. With IGMP, hosts can communicate their desired group memberships to their local querier router, and receive any datagrams sent to this router and targeted to a group with a specific IP multicast address. A router communicates with the hosts on a local network by sending IGMP queries. Hosts respond by issuing IGMP reports. IGMP has the following characteristics: • • A host can register group memberships with the local querier router to receive any datagrams sent to this router and targeted to a group with a specific IP multicast address. A router can learn the existence of group members on networks to which it is directly attached. The router periodically sends a general query message to each of its local networks. Any host that is a member of any multicasting group identifies itself by sending a response. Configuring IP Routing and Multicast Operations using Device Manager 72 IGMP queries When there are multiple IGMP routers on a network, the router with the lowest IP address is elected to send queries. This elected querier periodically sends host membership queries (also known as general queries) to its attached local subnets. The Ethernet Routing Switch 1600 Series can act as a querier if PIM is enabled. The Ethernet Routing Switch 1600 supports IGMPv1 and IGMPv2 queries. IGMP host reports A host that receives a membership query from a local router can respond with a host membership report, one report for each joined multicast group. A host that receives a query delays its reply by a random interval and listens for a reply from any other host in the same host group. Consider a network that includes two host members—host A and host B—of the same multicast group. The router sends out a host membership query on the local network. Both host A and host B receive the query and listen on the network for a host membership report. Host B’s delay timer expires first, so it responds to the query with a membership report. Hearing the response, host A does not send a report of its own for the same group. Each query from a router to a host includes a Maximum Response Time field. IGMP inserts a value—n—into this field specifying the maximum time, in tenths of a second, within which the host must issue a reply. The host uses this value to calculate a random value between 0 and n tenths of a second for the period that it waits before sending a response. This is true for IGMP version 2. For IGMP version 1, this field is set to 0 but defaults to a value of 100, that is, 10 seconds. If at least one host on the local network specifies that it is a member of a given group, the router forwards all datagrams bearing the group’s multicast address to that network. Upon initialization, the host may immediately issue a report for each of its supported multicast groups. The router accepts and processes these asynchronous reports the same way it accepts requested reports. 321712-B Rev 03 73 After hosts and routers are in a steady state, they communicate in a way that minimizes the exchange of queries and reports. The designated routers set up a path between the IP Multicast stream source and the end stations and periodically query the end stations about whether or not to continue participation. As long as any client continues to participate, all clients, including nonparticipating end stations on the switch port, receive the IP Multicast stream. Host leave messages When an IGMP version 2 host leaves a group and it was the host that issued the most recent report, it issues a leave group message. The multicast router on the network issues a group-specific query to determine whether there are other group members on the network. If no host responds to the query, the router assumes that no members belonging to that group exist on that interface. Fast-leave feature The 1600 Series switches support a fast-leave feature that is useful for applications such as multicast-based TV distribution. Fast-leave relies on an alternative leave process in which the switch stops sending traffic for the group immediately after receiving a leave message, without issuing a query to check if other group members are present on the network. Fast-leave alleviates the network from additional bandwidth demand when changing TV channels. For information about configuring fast leave, refer to “Configuring IGMP” on page 227. IGMP Snoop The Ethernet Routing Switch 1600 Series can provide IP multicast capability as a Layer 2 switch. When functioning as a Layer 2 switch, it supports IGMPv1 and IGMPv2 to prune group membership per port within a VLAN. This feature is called IGMP snoop and you can use it to optimize the multicast data flow for a group within a VLAN to only those ports that are members of the group. Configuring IP Routing and Multicast Operations using Device Manager 74 The switch builds a database of group members by listening to IGMP reports from each port. It suppresses the reports heard by not forwarding them out to ports other than the one receiving the report, forcing the members to continuously send their own reports. The switch relays group membership from the hosts to the multicast routers. It forwards queries from multicast routers to all port members of the VLAN. Furthermore, it forwards multicast data only to the participating group members and to the multicast routers within the VLAN. For IGMP snooping to function properly on a VLAN of Layer 2 switching devices, the VLAN must be linked to a Layer 3 multicast-enabled device like the Ethernet Routing Switch 1600 or Ethernet Routing Switch 8600. Static mrouter port and non-querier IGMP snoop considers the port on which the IGMP query is received as the active IGMP multicast router (mrouter) port. An IGMP router acts as non-querier if the VLAN has another IGMP router with a lower IP address. Non-queriers do not send an IGMP query. IGMP snoop is not aware of non-querier IGMP routers. Therefore, configure ports connected to the non-querier as the static mrouter port for the IGMP snoop interface. For example, when you enable IGMP snoop on VLAN 10, mrouter1 is the IGMP querier because it has a lower IP address than the other multicast router in VLAN 10. Mrouter 2 is then considered the non-querier. In Figure 14, VLAN 10 on the 1600 Series switch has port member 1/5, 1/6 connected to IGMP routers. In this example, IGMP router 1 is the querier because it has a lower IP address than IGMP router 2. Figure 14 Static mrouter port and non-querier IGMP router 1 IGMP router 2 192.16.0.2 192.16.0.1 1/5 1/6 Ethernet Routing Switch 1600 321712-B Rev 03 75 For more information about configuring IGMP snoop, refer to “Configuring IGMP” on page 227. IGMP proxy When configured with IGMP proxy function, a 1600 Series switch receives multiple reports for the same multicast group, but does not transmit each report to the multicast upstream router. Instead, the switch forwards the first report to the querier and suppresses the rest. If there is new information that another multicast group has been added or that a query has been received since the last report was transmitted upstream, then the report is forwarded to the multicast router ports. For information about configuring IGMP proxy, see “Configuring IGMP” on page 227. IGMP versions The 1600 Series switches support IGMPv1 and IGMPv2. The versions are backward compatible and they can all exist together on a multicast network. Both IGMPv1 and IGMPv2 support multicast with the difference being that IGMPv2 supports an IGMP leave message to allow a quick leave from a multicast group. With IGMPv1, there is no IGMP leave message. The following describes the main purpose for each version: • IGMPv1 provides the support for IP multicast routing. IGMPv1 specifies the mechanism for communicating IP multicast group membership requests from a host to its locally attached routers. Figure 15 shows an example of how IGMPv1 works. Configuring IP Routing and Multicast Operations using Device Manager 76 Figure 15 IGMPv1 Querier General Query X X Suppressed Suppressed REPORT 11040fz In this example: • — the host leaves a group — the router sends three general queries (60 seconds apart) for IGMP records — if no IGMP report is received for the group, the group times out — in a worst case scenario, a group timeout lasts three minutes IGMPv2 extends the features in IGMPv1 by quickly reporting group membership termination to the routing protocol. This feature is important for multicast groups with highly volatile group membership. Figure 16 on page 76 shows an example of how IGMPv2 works. Figure 16 IGMPv2 Querier Group-specific query to 239.1.1.1 X Leave to 224.0.0.2 X Suppressed 239.1.1.1 11040fy In this example: — the host sends a leave message to 224.0.0.2 — the router sends a group-specific query to 239.1.1.1 — no IGMP report is received 321712-B Rev 03 77 — group 239.1.1.1 times out IGMP RFCs For additional information about IGMP, see the following RFCs: • • • • For IGMPv1, refer to RFC 1112. For IGMPv2, refer to RFC 2236. For IGMP MIBs, refer to RFC 2933 For IANA considerations for IPv4, refer to RFC 3328 Protocol Independent Multicast-Sparse Mode (PIM-SM) Protocol Independent Multicast-Sparse Mode (PIM-SM), as defined in RFC 2362, was designed to support multicast groups spread out across large areas of a company or the Internet. Unlike dense mode protocols, such as DVMRP, that initially flood multicast traffic to all routers over an entire internetwork, PIM-SM sends multicast traffic only to routers that have specifically joined a multicast group. This technique reduces traffic flow over WAN links and overhead costs for processing unwanted multicast packets. Dense-mode protocols use a “flood-and-prune” technique, which is efficient where receivers are densely populated. However, for sparsely populated networks, PIM-SM is more efficient because it sends multicast traffic only to those routers that belong to a specific multicast group and that choose to receive the traffic. PIM-SM is independent of any specific unicast routing protocol, but it does require the presence of a unicast routing protocol, such as RIP or OSPF. PIM-SM uses the information from the unicast routing table to create and maintain multicast trees that enables PIM-enabled routers to communicate. Configuring IP Routing and Multicast Operations using Device Manager 78 PIM-SM concepts and terminology Typically, a PIM-SM network consists of several multipoint data streams, each targeted to a small number of LANs in the internetwork. For example, customers whose networks consist of multiple hosts on different LANs can use PIM-SM to simultaneously access a video data stream, such as a video teleconference, on a different subnet. Note: In some cases, PIM stream initialization can take several seconds. Hosts A host can be a source, a receiver, or both. • • A source, also known as a sender, sends multicast data to a multicast group. A receiver receives multicast data from one or several sources sending data to a multicast group. PIM-SM domain PIM-SM operates in a domain of contiguous routers that have PIM-SM enabled. Each PIM-SM domain requires the following routers: • • • Designated router (DR) Rendezvous-point (RP) router Bootstrap router (BSR) Although a PIM-SM domain can have only one active RP router and one active BSR, you can configure additional routers as candidate RP routers and as candidate BSRs. Candidate routers provide backup protection in case the primary RP or BSR router fails. 321712-B Rev 03 79 Designated router (DR) The designated router (DR) is the router with the highest IP address on a LAN designated to perform the following tasks: • • • Sends register messages to the rendezvous-point (RP) router on behalf of directly connected sources. Sends join/prune messages to the RP router on behalf of directly connected receivers. Maintains information about the status of the active RP router for local sources in each multicast group. Note: The DR is not a required configuration and switches act automatically as such for directly attached sources and receivers. Rendezvous-Point (RP) router PIM-SM builds a shared multicast distribution tree within each domain, and the rendezvous point (RP) is at the root of this shared tree. Although the RP can be physically located anywhere on the network, it should be as close to the source as possible. There is only one active RP router for a multicast group. The RP router is where receivers meet new sources. Sources use the RP to identify themselves to other routers on the network; receivers use the RP to learn about new sources. The RP performs the following tasks: • • • Registers a source that wants to announce itself and send data to group members Joins a receiver that wants to receive data for the group Forwards data to group Configuring IP Routing and Multicast Operations using Device Manager 80 Candidate rendezvous-point router You can configure a set of routers as candidate rendezvous-point (C-RP) routers that serve as backup to the RP router. If an RP fails, all the routers in the domain apply the same algorithm to elect a new RP from the group of C-RPs. To make sure that the routers have a complete list of C-RPs, the C-RP periodically sends unicast advertisement messages to the bootstrap router (BSR). The most common implementation is to configure a PIM-SM router as both a candidate RP and a candidate BSR. Bootstrap router The BSR receives RP router advertisement messages from the candidate RPs. The BSR adds the RP router with its group prefix to the RP set. Only one BSR exists for each PIM-SM domain. The BSR periodically sends bootstrap messages containing the complete RP set to all routers in the domain. The BSR ensures that all PIM-SM routers learn to which RP router to send join/prune and register packets. Candidate bootstrap router Within a PIM-SM domain, you can configure a small set of routers as candidate BSRs (C-BSRs). The candidate BSR with the highest configured priority becomes the BSR for the domain. If two candidate BSRs have equal priority, the candidate with the higher IP address becomes the BSR. If you add a new candidate BSR with a higher priority to the domain, it automatically becomes the new BSR. Shared trees and shortest-path trees In a PIM-SM domain, shared trees and shortest-path trees are used to deliver data packets to group members. This section describes both trees. Shared trees Group members in a PIM-SM domain receive the first packet of data from sources across a shared tree. A shared tree consists of a set of paths that connect all members of a multicast group to the RP. PIM creates a shared tree when sources and receivers send messages toward the RP. 321712-B Rev 03 81 Shortest-path trees After receiving a certain number of packets from the RP, the DR switches from a shared tree to a shortest-path tree (SPT). Switching to a shortest-path tree creates a direct route between the receiver and the source. The 1600 Series implementation switches to the SPT when it receives the first packet from the RP. Figure 17 shows a shared tree and a shortest-path tree. Figure 17 Shared tree and shortest-path tree Source S LAN DR Shared-tree path Shortest-path tree (SPT) R DR RP Receiver Last-hop router Shared-tree path Key R PIM router RP Rendezvouspoint router DR Designated router for LAN Ethernet Routing Switch 1600 Configuring IP Routing and Multicast Operations using Device Manager 82 Join/prune messages The DR sends join/prune messages from a receiver toward a group’s RP to either join the shared tree or remove (prune) a branch from it. A single message contains both a join and a prune list. This list includes a set of source addresses indicating the shortest-path trees or the shared trees that the host wants to join. The DR sends join and prune messages hop by hop to each PIM router on the path to the source or the RP. Register and register-stop messages The DR sends register messages to the RP for a directly connected source. The register message informs the RP of a new source, causing the RP to send join/prune messages back toward the source’s DR and forwards the data down the RP tree after it gets the data natively. When the receiver DR gets the first packet, it switches to the shortest-path tree (SPT) and continues receiving data through the SPT path. The DR stops sending encapsulated packets to the RP after receiving a register-stop message. This traffic stops without any delay because the RP sends a register-stop message immediately after receiving the first multicast data packet, and joins the shortest-path tree. Receiver joining group The following steps describe how a receiver joins a multicast group: 1 A receiver multicasts an IGMP host membership message to the group that it wants to join. 2 When the DR (normally the PIM router with the highest IP address for that VLAN) receives the IGMP message for a new group, the DR looks up the associated active RP. 3 After determining the RP router for the group, the DR creates a (*,G) route entry in the multicast forwarding table and sends a (*,G) join to the RP. When the DR receives data packets from the RP, the DR switches to shortest path, creates an (S,G) entry in the multicast forwarding table and sends (S,G) join to the source. 4 All intermediate routers along the path to the source create the (S,G) entry. 321712-B Rev 03 83 5 The DR receives data from the data source using the SPT. Receiver leaving group Before it leaves a multicast group, a receiver sends an IGMP leave message to the DR. If all directly connected members of a multicast group leave or time out and no downstream members remain, the DR sends a prune message upstream and PIM-SM deletes the route entry after that entry times out. Source sending packets to group The following steps describe how a source sends multicast packets to a group: 1 A source directly attached to a VLAN bridges the multicast data to the DR. The DR for the VLAN (the router with the highest IP address) encapsulates each packet in a register message and sends a unicast message directly to the RP router to distribute to the multicast group. 2 If a downstream group member chooses to receive multicast traffic, the RP router sends a join/prune message towards the source DR and forwards the data down the RP tree after it gets the data natively. 3 When the receiver DR gets the first packet, it switches to the shortest-path tree (SPT) and continues receiving data through the SPT path. 4 If no downstream members want to receive multicast traffic, the RP router sends a register-stop message to the DR for the source. The DR starts the register suppression timer upon receiving the first register-stop message. During the register suppression timeout period (the default is 60 seconds), the following events occur: • • The source’s DR sends a probe packet to the RP router before the register suppression timer expires. The probe packet prompts the RP router to determine whether any new downstream receivers have joined the group. If no new receivers have joined the group, the RP router sends another register-stop message to the source’s DR, and its register suppression timer restarts. Configuring IP Routing and Multicast Operations using Device Manager 84 • When the RP router no longer responds with a register-stop message to the source DR probe message, the register suppression timer expires and the DR sends encapsulated multicast packets to the RP router. The RP router uses this method to tell the DR that new members have joined the group. The RP sends a register-stop message to the DR immediately after receiving the first multicast data packet Required elements for PIM-SM operation For PIM-SM to operate, a number of elements must be present in the PIM-SM domain including the following: • • • 321712-B Rev 03 An underlying unicast routing protocol must be enabled for the switch to provide routing table information to PIM-SM In a PIM-SM domain, an active BSR must be in place to send bootstrap messages to all PIM-V2 configured switches and routers to enable them to learn group-to-RP mapping. If several BSRs are configured in a network, an active BSR is elected based on priority and IP address (if priority is equal, the BSR with the higher IP address is elected). An RP must be in place in the PIM-SM domain to perform the following tasks: — To manage one or several IP Multicast groups — To become the root for the shared tree to these groups — To accept join messages from receiver switches for groups that it manages 85 — If there is more than one RP that have groups in common, the RPs “elect” an active RP based on priority and IP address (if priority is equal, the RP with the higher IP address is elected) Note: If two IGMP routers are active in the same VLAN, the router with the lowest IP address is elected as the querier. Any Layer 2 snoop-enabled switches exchange IGMP information with this querier. However, if the same two routers are then enabled with PIM, the router with the highest IP address is elected as the PIM DR. In this case, the Layer 2 hosts still attempt to communicate with the lower IP querier, but the host reports cannot reach the PIM domain. To communicate properly with the PIM-enabled routers, the Layer 2 switch must send IGMP reports to the non-querier (the PIM DR). To work around this issue, enable Multicast Router Discovery on the switch and routers. With Multicast Router Discovery enabled, the Layer 2 switch learns all multicast router ports (ports connected to any Layer 3 multicast routers). Therefore, the switch sends IGMP reports to all Layer 3 multicast routers (including the PIM DR and non-DR). PIM-SM simplified example Figure 18 shows a simplified example of a PIM-SM configuration. Configuring IP Routing and Multicast Operations using Device Manager 86 Figure 18 PIM-SM simplified example Source S Receiver R for G RP for G S1 S2 S4 S3 BSR Legend Ethernet Routing Switch 1600 In the sample configuration, the following events occur: 1 The BSR distributes RP information to all switches in the network 2 R sends a report to S4. 3 Acting on this report, S4 sends (*,G) join to RP 4 S starts sending data to G 5 The DR (S1 in this example) encapsulates the data which it unicasts to RP (S2) in register messages 6 S2 de-capsulates the data which it forwards to S4 7 S4 forwards the data to R 8 S4 joins S1 because it now knows the source 9 S1 starts forwarding to S4. When S4 receives data from S1, it prunes the stream from the RP. Note: Figure 18 is a simplified example and is not the best design for a network if the source and receiver are placed as shown. In general, RPs are placed as close to sources as possible. 321712-B Rev 03 87 PIM-SM static source groups Static source groups enable you to configure static source-group entries in the PIM-SM multicast routing table. PIM-SM cannot prune these entries from the distribution tree. Multicast access control feature Multicast access control operates with standard existing multicast protocols, and allows for the configuration of an IP multicast-enabled VLAN with an access-control policy that consists of several IP multicast groups. This feature is particularly useful when it is necessary to restrict access to certain multicast streams and protect multicast streams from spoofing (injecting data to the existing streams). For example, in a television distribution application, a filter and a multicast access policy must be applied to each channel (multicast group). If a television channel is to be added or removed from a package, the multicast access policy for each VLAN is modified. Multicast access policies contain an ID and a name (for example, PremiumChannels), the IP multicast addresses, and the subnet mask to be used. It is important to note that multicast access control is not a regular filtering configuration and is specifically designed for multicast streams. It relies on handling multicast control and initial data to prevent hosts from sending or receiving specified multicast streams and it does not consume any filters. You can configure and dynamically change multicast access control to support configuration changes without having to restart any protocol. This allows for changes to the access capabilities of a given user dynamically. Note that multicast access control functionality is applicable to any IP multicast application where controlling user access is required. Thus, it can be used in financial and other enterprise applications, such as multicast-based videoconferencing. Multicast access control policy types 1600 Series switches support two types of multicast access control policies: Configuring IP Routing and Multicast Operations using Device Manager 88 • • denyRX denyBoth The rx policy controls the receivers and egress interface for a group. denyRX The denyRX access policy is used to prevent a matching group from receiving IGMP reports from the matching receiver on the interface where the denyRX access policy is configured. For example, in Figure 19 on page 88, a denyRX access policy is configured on VLAN 2, preventing IGMP reports sent by Receiver 1 from being received on VLAN 2. The denyRX policy denies a multicast group access to a specific VLAN or receiver. Figure 19 Data flow using denyRX policy denyBoth The denyBoth access policy is used to prevent a matching IP address from both sending multicast traffic to, and receiving IGMP reports from, a matching receiver on an interface where the denyBoth policy is configured. This policy can be used to eliminate all multicast activity for a receiver or source in a specific multicast group. For example, in Figure 20, a denyBoth access policy is configured on VLAN 2, preventing IGMP reports sent by Receiver 2 from being received by VLAN 2, and preventing multicast traffic sent by Sender 2 from being forwarded from VLAN 2. The denyBoth policy prevents certain VLANs from participating in any activity involving the specified multicast groups. 321712-B Rev 03 89 Figure 20 Data flow using denyBoth policy Specifying host addresses and masks When configuring multicast access policies, specify the host (IP) address and host (subnet) mask of the host that is being filtered (that is, the host that is sending multicast traffic). The host subnet mask can be used to restrict access to a portion of the host’s network. For example, when the host subnet mask is configured as 255.255.255.255, the full host address is used. To restrict access to a portion of the host’s network, use a subnet mask such as 255.255.255.0. Access control is then applied to the specified subnet only. Note: For denyboth access control, group addresses must be the same as host addresses. The denyboth access control type applies to all hosts that are transmitting and receiving for that group. For information about configuring multicast access control, refer to “Configuring IGMP” on page 227. Configuring IP Routing and Multicast Operations using Device Manager 90 Multicast MAC filtering Some network applications rely on a Layer 2 multicast MAC mechanism to send a frame to multiple hosts for processing. Mirroring is one such application. With the multicast MAC filtering feature, MAC multicast flooding can be directed to a specific set of ports. Note: Multicast MAC filtering can be configured only for local addresses to a switch. This feature cannot be used as a means to route traffic between switches. Basically, the multicast MAC is defined as any MAC address in which the least significant bit of the most significant byte is set to 1. The multicast MAC filtering feature is available for Layer 2. (This filtering does not apply to BPDUs.) In Layer 2, a multicast MAC address generally floods to all ports in the VLAN. With multicast MAC filtering, a separate flooding domain can be defined for a given multicast MAC address, which is a subset of the ports on a VLAN. The maximum number of multicast MAC addresses that can be configured is 100. Depending upon the overall configuration of the switch this may be limited to fewer addresses. To perform multicast MAC filtering, create the VLAN normally and then manually define a flooding domain (that is, MAC address and port list) for a specific multicast address. When specifying the multicast MAC flooding domain, indicate which ports or Multilink Trunks (MLTs) to be considered for multicast traffic. The actual flooding is then based on whether the specified ports are active members in the VLAN. For more detailed information, see “Configuring Multicast MAC Filtering” on page 247. 321712-B Rev 03 91 Chapter 2 Configuring IP Routing This section describes how to use the JDM to configure and manage basic IP routing tasks. It discusses the basic IP router interface configuration required before any routing protocols, such as ARP, can be configured. For conceptual information about interface configuration and router management, refer to “IP routing and multicast concepts” on page 29. This section includes the following topics: • • • • • • • “Router Interface Types” on page 91 “Globally Enabling IP Routing Features” on page 94 “IP Router Management” on page 97 “IP Static Route Table” on page 101 “Configuring CLIP” on page 108 “Configuring IP Route Preferences” on page 112 “Configuring ICMP Router Discovery” on page 114 Router Interface Types The Ethernet Routing Switch 1600 Series supports virtual router interfaces. Virtual router interfaces correspond to routing on a virtual port that is associated with a VLAN. With a virtual router interface, the 1600 Series switch can route IP traffic to, and from, a VLAN. Because a given port can belong to multiple VLANs (some of which are configured for routing on the switch and some of which are not), there is no longer a one-to-one correspondence between the physical port and the router interface. Configuring IP Routing and Multicast Operations using Device Manager 92 Chapter 2 Configuring IP Routing For VLAN routing, the router interface for the VLAN is called a virtual router interface because the IP address is assigned to an interface on the routing entity in the switch. This initial interface has a one-to-one correspondence with a VLAN on any given switch. To continue, refer to: • “Assigning an IP Address to a Virtual Routing Port” Assigning an IP Address to a Virtual Routing Port To specify an IP address for a virtual routing port: 1 From the Device Manager menu bar, select IP Routing > IP. The IP dialog box appears with the Globals tab displayed (Figure 21). Figure 21 IP dialog box—Globals tab 2 Select the forwarding option button from the Forwarding section. 3 Click Apply. 321712-B Rev 03 Chapter 2 Configuring IP Routing 93 4 Click Close. 5 From the Device Manager menu bar, choose VLAN > VLANs. The VLAN dialog box appears with the Basic tab displayed (Figure 22). Figure 22 VLAN dialog box—Basic tab 6 Select a VLAN. The IP button is enabled. 7 Click IP. The IP, VLAN dialog box appears with the IP Address tab displayed (Figure 23). Figure 23 IP, VLAN dialog box—IP Address tab Configuring IP Routing and Multicast Operations using Device Manager 94 Chapter 2 Configuring IP Routing 8 Click Insert. The IP, VLAN, Insert IP Address dialog box appears (Figure 24). Figure 24 IP, VLAN, Insert IP Address dialog box 9 Enter the IP address and net mask. Note: Only one IP address can be assigned to any router interface. Attempting to assign a second IP address returns an invalid IP address error. The Ethernet Routing Switch 1600 Series can support IP addresses for up to 512 VLANs. 10 Click Insert. The new IP address and net mask appears in the IP, VLAN, Insert IP Address dialog box. Globally Enabling IP Routing Features This section describes how to enable IP routing features globally, and contains the following topics: • • “Enabling IP Forwarding Globally” on page 94 “Enabling Alternative Routes Globally” on page 96 Enabling IP Forwarding Globally In Device Manager, the IP address of any physical or virtual router interface can be used for IP-based network management (SNMP, Telnet, and Web). 321712-B Rev 03 Chapter 2 Configuring IP Routing 95 To enable IP forwarding: 1 From the Device Manager menu bar, choose IP Routing > IP. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 2 Select the forwarding option button in the Forwarding section. 3 Click Apply. Table 4 describes the Globals tab fields. Table 4 IP dialog box—Globals tab fields Field Description Forwarding Sets the switch for forwarding (routing) or not-forwarding. The default is forwarding. DefaultTTL Sets the default Time-To-Live (TTL) value for a routed packet. TTL indicates the maximum number of seconds elapsed before a packet is discarded. Enter an integer between 1 and 255. The default value of 255 is inserted in the TTL field whenever one is not supplied in the datagram header. ReasmTimeout The maximum number of seconds that received fragments are held while they are waiting for reassembly at this entity. The default is 30 seconds. This is a read-only field. ARPLifeTime The lifetime of an ARP entry within the system, global to the switch. The default value is 360 minutes. The range is 1 through 32 767 minutes. ICMPUnreachableMsgEnable If checked, enables the generation of ICMP net unreachable messages if the destination network is not reachable from this router. These messages assist in determining if the routing switch is reachable over the network. The default is disabled (not checked). RouteDiscoveryEnable If checked, enables the ICMP Router Discovery feature. The default is disabled (not checked). Configuring IP Routing and Multicast Operations using Device Manager 96 Chapter 2 Configuring IP Routing Table 4 IP dialog box—Globals tab fields (continued) Field Description AlternativeEnable Globally enables or disables the alternative-route feature. For more information about alternative routes, see Chapter 1, “IP routing and multicast concepts,” on page 29. Note: If the alternative-route parameter is disabled, all existing alternative routes are removed. When the parameter is enabled, all alternative routes are added back. AllowMoreSpecificNonLocalRoute Enable Enables or disables allowing a more specific non-local route to go into the routing table. The default is disabled. UdpCheckSumEnable Enables or disables the UDP checksum calculation. The default is enabled. Enabling Alternative Routes Globally This section describes how to enable alternative routes globally. The following topics are included in this section: • • “Alternative Routes Overview” on page 96 “Globally Enabling Alternative Routes” on page 97 Alternative Routes Overview Routers may have several routes to the same destination network through several protocols. In the Ethernet Routing Switch 1600 Series software, if the alternative route feature is enabled, the software stores all of these alternative routes and sorts them in the following order: • • • network mask cost route preference The best, or first one listed, is the best route and is used by the hardware. The remaining routes are referred to as alternative routes. 321712-B Rev 03 Chapter 2 Configuring IP Routing 97 To avoid traffic interruption, alternative routes can be enabled globally on the switch. If the best route becomes unavailable, the next best route from the alternative route list can replace the best route. In the Ethernet Routing Switch 1600 Series, both the active routing table and the configured static route table are maintained. For more information about alternative routes, refer to “IP routing and multicast concepts” on page 29. Globally Enabling Alternative Routes To enable alternative routes globally, follow this procedure: 1 From the Device Manager menu bar, choose IP Routing > IP. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 2 Select the AlternativeEnable check box. If the alternative route parameter is disabled, all existing alternative routes are removed. When the parameter is enabled, all alternative routes are re-added. 3 Click Apply. Table 4 on page 95 describes the Globals tab fields. IP Router Management In Device Manager, most of the dialog boxes related to managing the IP router are found under the IP Routing menu. This section includes the following topics: • • • “Configuring the Router IP Protocol Stack” “Viewing IP Address Router Interfaces” on page 98 “Managing the System Routing Table” on page 99 Configuring IP Routing and Multicast Operations using Device Manager 98 Chapter 2 Configuring IP Routing Configuring the Router IP Protocol Stack The IP dialog box contains parameters for configuring the router’s IP protocol stack. To configure the router’s IP protocol stack, choose IP Routing > IP from the Device Manager menu bar. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). Table 4 on page 95 describes the Globals tab fields. Viewing IP Address Router Interfaces IP addresses and their associated router interfaces can be viewed on the IP dialog Addresses tab. To view this tab, use this procedure: 1 From the Device Manager menu bar, choose IP Routing > IP. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 2 Click the Addresses tab. The Addresses tab appears (Figure 25). Figure 25 IP dialog box—Addresses tab 321712-B Rev 03 Chapter 2 Configuring IP Routing 99 Table 5 describes the Addresses tab fields. Table 5 IP dialog box—Addresses tab fields Field Description Interface The IP router interface. IpAddress The IP address of the router interface. Net Mask The subnet mask of the router interface. BcastAddrFormat The IP broadcast address format used on this interface; that is, whether zero (0) or one (1) is used for the broadcast address. The Ethernet Routing Switch 1600 Series uses 1. ReasmMaxSize The Maximum Transmit Unit (MTU) size of the interface. VlanId A value that uniquely identifies the virtual LAN associated with this entry. This value corresponds to the lower 12 bits in the IEEE 802.1Q VLAN tag. BrouterPort This field always displays as False since brouter ports are not supported on the Ethernet Routing Switch 1600 Series. Managing the System Routing Table The System Routing Table can be managed through the Device Manager. To manage the System Routing Table, follow this procedure: 1 From the Device Manager menu bar, choose IP Routing > IP. Note: Exercise caution when managing the System Routing Table as changes in the table can have effects on other aspects of switch performance. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). Configuring IP Routing and Multicast Operations using Device Manager 100 Chapter 2 Configuring IP Routing 2 Click the Routes tab. The Routes tab appears (Figure 26). Figure 26 IP dialog box—Routes tab Table 6 describes the Routes tab fields. Table 6 IP dialog box—Routes tab fields Field Description Dest The destination IP network of this route. An entry with a value of 0.0.0.0 is considered a default route. Multiple routes to a single destination can appear in the table, but access to such multiple entries is dependent on the table access mechanisms defined by the network management protocol in use. Mask Indicates the network mask to be logically ANDed with the destination address before being compared to the value in the ipRouteDest field. NextHop The IP address of the next hop of this route. AltSequence The alternative route sequence. The value of 0 denotes the best route. HopOrMetric The primary routing metric for this route. The semantics of this metric are specific to different routing protocols. Interface The IP router interface for this route. Proto The routing mechanism through which this route was learned: • local = directly learned • netmgmt = a static route Age The number of seconds since this route was last updated or otherwise determined to be correct. 321712-B Rev 03 Chapter 2 Configuring IP Routing 101 Table 6 IP dialog box—Routes tab fields (continued) Field Description PathType The type of route: • direct • indirect • alternative • best • unresolved Note that the values direct and indirect refer to the notion of direct and indirect routing in the IP architecture. Pref The preference value. IP Static Route Table The Static Route Table is separate from the System Routing Table that the router uses to make forwarding decisions. The Static Route Table is used to change static routes directly. Although the tables are separate, the Static Route Table Manager entries are automatically reflected in the System Routing Table if the next hop address in the static route is reachable, and if the static route is enabled. The Static Route table is indexed by three attributes: • • • Destination Network Destination Mask Next Hop The maximum number of entries is 1 000. Static routes are inserted using the Static Route Table, and deleted by using either the Static Route Table or the System Routing Table. Note: Only active static routes with a best route preference are displayed in the System Routing Table. A static route is active only if the route is enabled and the next hop address is reachable (for example, if there is a valid ARP entry for the next hop). Configuring IP Routing and Multicast Operations using Device Manager 102 Chapter 2 Configuring IP Routing Multiple routes can be entered (for example, multiple default routes) that have different costs, and the lowest-cost route that is reachable is used in the routing table. Note that, if you enter multiple next hops for the same route with the same cost, the software does not replace the existing route. If identical routes with the same cost and a different next hop are entered, the first route is used. However, if that first route becomes unreachable, the second route (with a different next hop) is activated with no loss of connectivity. Static routes that are configured for the management port are applied with the network’s natural mask. Because traffic that originates from the switch refers to these routes before checking the IP routing table, the switch management traffic may be incorrectly forwarded out the management port even though a more specific route exists in the routing table. For more in-depth information about static routes, refer to “IP routing and multicast concepts” on page 29. This section includes the following topics: • • • • “Creating IP Static Routes” on page 102 “Creating a Static Default Route” on page 105 “Creating a Black Hole Static Route” on page 106 “Deleting a Static Route” on page 107 Creating IP Static Routes You can use the IP Static Routing Table Manager feature to directly change static routes. The Static Route Table is separate from the System Routing Table, which the router uses to make forwarding decisions. Although the tables are separate, entries in the Static Routing Table Manager are automatically reflected in the System Routing Table if the next hop address in the static route is reachable and the static route is enabled. Static routes provide a way to route traffic from an Ethernet Routing Switch 1600 Series to other devices in the network, like the Ethernet Routing Switch 8600. To create a static route, follow this procedure: 1 321712-B Rev 03 From the Device Manager menu bar, choose IP Routing > IP. Chapter 2 Configuring IP Routing 103 The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 2 Click the Static Routes tab. The Static Routes tab appears (Figure 27). Figure 27 IP dialog box—Static Routes tab 3 Click Insert. The IP, Insert Static Routes dialog box appears (Figure 28). Figure 28 IP, Insert Static Routes dialog box 4 Type the desired IP address in the Dest field. 5 Type the desired subnet mask in the Mask field. 6 Type the IP address of the router through which the specified route is accessible in the NextHop field. Configuring IP Routing and Multicast Operations using Device Manager 104 Chapter 2 Configuring IP Routing 7 Type the desired metric value in the Metric field. 8 Type the desired route preference value in the Preference field. 9 Enable the static route by selecting the Enable check box. 10 Select the LocalNextHop check box to activate the static route only if the switch has a local route to the network. If unselected, the static route is activated if the switch has either a local or dynamic route to the network. 11 Click Insert. The new route appears in the Static Routes tab. Table 7 describes the fields in the IP dialog box, Static Routes tab. Table 7 IP dialog box—Static Routes tab fields Field Description Dest The static route destination. Mask The route mask. NextHop The next hop in the static route. The next hop is the IP address of the router through which the specified route is accessible. When creating a black hole static route, set this field to 255.255.255.255. Metric The primary routing metric for this route. If this metric is not used, set the value to 1. IfIndex The route index of the Next Hop. Preference The routing preference used for an alternative-route if one is configured. Enable Sets whether the configured static route is available on the port. The default is enable. Note: If a static route is disabled, it must be enabled before it can be added to the system routing table. Status Status of the route. LocalNextHop True indicates that the static route becomes active only if the switch has a local route to the network. False indicates that the static route becomes active if the switch has a local route or a dynamic route to the network. 321712-B Rev 03 Chapter 2 Configuring IP Routing 105 Creating a Static Default Route The default route is used to specify a route to all networks for which there are no explicit routes in either the Forwarding Information Base or the routing table. This route is a route with a prefix length of zero (refer to RFC 1812 for further information). The routing switch can be configured with the default route statically, or it can be learned through a dynamic routing protocol. Note: When creating a static default route, ensure that the destination address and subnet mask are set to 0.0.0.0. Create a static default route by using the following procedure: 1 From the Device Manager menu bar, choose IP Routing > IP. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 2 Click the Static Routes tab. The Static Routes tab appears (see Figure 27 on page 103). 3 Click Insert. The IP, Insert Static Routes dialog box appears (see Figure 28 on page 103). 4 Type 0.0.0.0 in the Dest field. 5 Type 0.0.0.0 in the Mask field. 6 Type the IP address of the router through which this route is accessible in the NextHop field. 7 Type the desired metric value in the Metric field. 8 Click Insert. The default route record is created in the routing table. Configuring IP Routing and Multicast Operations using Device Manager 106 Chapter 2 Configuring IP Routing Creating a Black Hole Static Route While aggregating or injecting routes to other routers, a router may not have a route to the aggregated destination, which causes what is known as a black hole. To avoid routing loops, a black hole static route can be configured to the destination it advertises. A black hole route is a route with an invalid next hop so that the data packets destined to this network are dropped by the switch. Note: To create a black hole static route, the NextHop field must be set to 255.255.255.255. To create a black hole static route, do the following: 1 From the Device Manager menu bar, choose IP Routing > IP. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 2 Click the Static Routes tab. The Static Routes tab appears (see Figure 27 on page 103). 3 Click Insert. The IP, Insert Static Routes dialog box appears (see Figure 28 on page 103). 4 Type the desired IP address in the Dest field. 5 Type the desired subnet mask in the Mask field. 6 Type 255.255.255.255 in the NextHop field. 7 Type the desired metric value in the Metric field. 8 Type the desired routing preference in the Preference field. 9 Select the Enable check box. 10 Click Insert. The black hole static route record is created in the routing table. 321712-B Rev 03 Chapter 2 Configuring IP Routing 107 Deleting a Static Route The Device Manager provides the ability to remove unwanted or unused static routes. As with all procedures that involve removing configurations from the switch, ensure that deleting a static route will not adversely affect other aspects of switch performance. To delete a static route, follow this procedure: 1 From the Device Manager menu bar, choose IP routing> IP. The IP dialog box appears with the Globals tab displayed. 2 Click the Static Routes tab. The Static Routes tab appears (see Figure 27 on page 103). 3 Select the static route to be deleted by clicking in a column in that row. 4 Click Delete. The static route is removed from the Static Routes tab. 5 Click Close. Configuring IP Routing and Multicast Operations using Device Manager 108 Chapter 2 Configuring IP Routing Configuring CLIP This section describes how to configure the circuitless IP (CLIP) feature. A maximum of 32 CLIP interfaces can be configured on each device. This section includes the following topics: • • “Creating a CLIP interface” on page 108 “Deleting a CLIP Interface” on page 111 For conceptual information about the CLIP feature, refer to “IP routing and multicast concepts” on page 29. Creating a CLIP interface To create a CLIP interface, follow this procedure: 1 From the Device Manager menu bar, choose IP routing > IP. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 2 Click the Circuitless IP tab. The Circuitless IP tab appears (Figure 29). Figure 29 IP dialog box—Circuitless IP tab 3 Click Insert. The IP, Insert Circuitless dialog box appears (Figure 30). 321712-B Rev 03 Chapter 2 Configuring IP Routing 109 Figure 30 IP, Insert Circuitless dialog box 4 Specify an integer value to identify the CLIP interface in the Interface field. 5 Enter the IP address of the interface in the IP Address field. 6 Enter the subnet mask of the interface in the Net Mask field. 7 Click Insert. The new interface is created and appears in the Circuitless IP tab (see Figure 29 on page 108). Table 8 describes the fields on the Circuitless IP tab and IP, Insert Circuitless dialog box. Table 8 IP dialog box—Circuitless IP tab and Insert Circuitless dialog box fields Field Description Interface The CLIP identification number you assign to the interface. The range is 1 to 32. IP Address The IP address of the interface you are specifying as circuitless. Net Mask The network mask address of the interface you are specifying as circuitless. Enabling OSPF on a CLIP interface To enable OSPF on a CLIP interface: 1 From the Circuitless IP tab, select the desired interface, and click OSPF. The Circuitless OSPF dialog box appears. Configuring IP Routing and Multicast Operations using Device Manager 110 Chapter 2 Configuring IP Routing Figure 31 Circuitless OSPF dialog box 2 Select the Enable option. 3 In the AreaId field, enter the CLIP IP interface area. 4 Click Apply. 5 Click Close. Table 9 describes the fields on the Circuitless OSPF dialog box. Table 9 Circuitless OSPF dialog box fields Field Description Enable Enables and disables OSPF on the CLIP interface. AreaId Specifies the CLIP IP interface area. Enabling PIM on a CLIP interface To enable PIM on a CLIP interface: 1 From the Circuitless IP tab, select the desired interface, and click PIM. The Circuitless PIM dialog box appears. 321712-B Rev 03 Chapter 2 Configuring IP Routing 111 Figure 32 Circuitless PIM dialog box 2 Select the Enable option. 3 Click Apply. 4 Click Close. Table 10 describes the fields on the Circuitless PIM dialog box. Table 10 Circuitless PIM dialog box fields Field Description Enable Enables and disables PIM on the interface. Mode Specifies the PIM mode (read-only). Deleting a CLIP Interface To delete a CLIP interface, follow this procedure: 1 From the Device Manager menu bar, choose IP routing > IP. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 2 Click the Circuitless IP tab. The Circuitless IP tab appears (see Figure 29 on page 108). 3 In the Interface column, select the CLIP number of the interface to be deleted. Configuring IP Routing and Multicast Operations using Device Manager 112 Chapter 2 Configuring IP Routing 4 Click Delete. The interface is deleted from the list of interfaces. Configuring IP Route Preferences The Route Preference tab displays the protocol and the default and configured IP global route preference information. The Route Preference tab is used to edit IP route preference entries. Using this tab, default route preferences can be overridden and a protocol preference value can be substituted for routes learned for a specific protocol. Note: Changing route preferences is a process-oriented operation that can affect system performance and network reachability while performing the procedures. Therefore, if you change default preferences for routing protocols, Nortel recommends that you do so before enabling the protocols. To edit an IP route preference, do the following: 1 From the Device Manager menu bar, select IP Routing > IP. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 2 Click the Route Preference tab. The Route Preference tab appears (Figure 33). 321712-B Rev 03 Chapter 2 Configuring IP Routing 113 Figure 33 IP dialog box—Route Preference tab 3 Double-click the Configured field that corresponds with the desired protocol and type a new preference value. 4 Click Apply. Table 11 describes the Route Preference tab dialog box fields. Table 11 IP dialog box—Route Preference tab fields Field Description Protocol The Ethernet Routing Switch 1600 Series supports the following protocols: • local • static • ospfIntra • ospfInter • rip • ospfExternal1 • ospfExternal2 Default The default preference value for the given protocol. Configured Changes the default preference value for the given protocol. Configuring IP Routing and Multicast Operations using Device Manager 114 Chapter 2 Configuring IP Routing Configuring ICMP Router Discovery ICMP router discovery specifies an extension to enable hosts attached to multicast or broadcast networks to discover the IP addresses of their neighboring routers. This section includes the following topics: • • • “Enabling ICMP Router Discovery Globally” on page 114 “Viewing the ICMP Router Discovery Table” on page 114 “Configuring Router Discovery on a VLAN” on page 116 Enabling ICMP Router Discovery Globally To enable ICMP router discovery globally, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > IP. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 2 Select the RouteDiscoveryEnable check box. 3 Click Apply. Viewing the ICMP Router Discovery Table To view the ICMP router discovery table, do the following: 1 From the Device Manager menu bar, select IP Routing > IP. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 321712-B Rev 03 Chapter 2 Configuring IP Routing 115 2 Click the Router Discovery tab. The Router Discovery tab appears (Figure 34). Figure 34 IP dialog box—Router Discovery tab 3 Edit the fields provided to configure the router discovery parameters. 4 Click Apply. Table 12 describes the Router Discovery tab fields. Table 12 IP dialog box—Router Discovery tab fields Item Description Interface VLAN ID or the port. AdvAddress The IP destination address to be used for broadcast or multicast router advertisements sent from the interface. The accepted values are: • 224.0.0.1 – the all-systems multicast address • 255.255.255.255 – the limited broadcast address The default is 255.255.255.255. AdvFlag Indicates whether (true) or not (false) the address is to be advertised on the interface. The default is true (advertise address). AdvLifetime The TTL value (in seconds) of router advertisements sent from the interface. The range is no less than the MaxAdvInterval and no greater than 9 000 seconds. The default is 1 800 seconds. Configuring IP Routing and Multicast Operations using Device Manager 116 Chapter 2 Configuring IP Routing Table 12 IP dialog box—Router Discovery tab fields (continued) Item Description MaxAdvInterval The maximum time (in seconds) between sending unsolicited broadcast or multicast router advertisements from the interface. The range is no less than 4 seconds and no greater than 1 800 seconds. The default is 600 seconds. MinAdvInterfal The minimum time (in seconds) between sending unsolicited broadcast or multicast router advertisements from the interface. The range is no less than 3 seconds and no greater than the MaxAdvInterval. The default is 450 seconds. PreferenceLevel Specifies the preference assigned to the address as a default router address, relative to other router addresses on the same subnet. A higher number indicates greater preference. The range is -2 147 483 648 to 2 147 483 647. The default is 0. Configuring Router Discovery on a VLAN To configure router discovery on a VLAN, follow this procedure: 1 From the Device Manager menu bar, choose VLAN > VLANs. The VLAN dialog box appears with the Basic tab displayed. 2 321712-B Rev 03 Select the VLAN ID to be configured for router discovery. Several buttons on the bottom of the dialog box become available. Chapter 2 Configuring IP Routing 117 3 Click IP. The IP, VLAN dialog box appears with the IP Address tab displayed (Figure 35). Figure 35 IP, VLAN dialog box 4 Click the Router Discovery tab. The IP, VLAN—Router Discovery tab appears (Figure 36). Figure 36 IP, VLAN—Router Discovery tab 5 Edit the provided fields to configure the router discovery parameters. 6 Click Apply. Configuring IP Routing and Multicast Operations using Device Manager 118 Chapter 2 Configuring IP Routing Table 13 describes the IP, VLAN— Router Discovery tab fields. Table 13 IP, VLAN—Router Discovery tab fields Field Description AdvAddress The IP destination address to be used for broadcast or multicast router advertisements sent from the interface. The accepted values are: • 224.0.0.1—the all-systems multicast address • 255.255.255.255—the limited broadcast address The default is 255.255.255.255. AdvFlag Indicates whether (true) or not (false) the address is to be advertised on the interface. The default is true (advertise address). AdvLifetime The TTL value (in seconds) of router advertisements sent from the interface. The range is no less than the MaxAdvInterval and no greater than 9 000 seconds. The default is 1 800 seconds. MaxAdvInterval The maximum time (in seconds) between sending unsolicited broadcast or multicast router advertisements from the interface. The range is no less than 4 seconds and no greater than 1 800 seconds. The default is 600 seconds. MinAdvInterval The minimum time (in seconds) between sending unsolicited broadcast or multicast router advertisements from the interface. The range is no less than 3 seconds and no greater than the MaxAdvInterval. The default is 450 seconds. PreferenceLevel Specifies the preference assigned to the address as a default router address, relative to other router addresses on the same subnet. A higher number indicates greater preference. The range is -2 147 483 648 to 2 147 483 647. The default is 0. 321712-B Rev 03 119 Chapter 3 Configuring ARP Network stations using the IP protocol need both a physical address and an IP address to transmit a packet. In situations where the station knows only the network host IP address, the Address Resolution Protocol (ARP) enables the network station to determine the physical address of a network host by binding a 32-bit IP address to a 48-bit MAC address. A network station can use ARP across a single network only and the network hardware must support physical broadcasts. If a network station wants to send a packet to a host but knows only the host IP address, the network station uses ARP to determine the physical address of the host. For conceptual information about ARP management, refer to “IP routing and multicast concepts” on page 29. The following information describes how to configure ARP on your Ethernet Routing Switch 1600 Series. To configure the Ethernet Routing Switch 1600 Series to communicate with devices that do not respond to ARP requests, configure a static ARP entry. If an ARP entry is not to be aged out, a static ARP entry can also be used. A static ARP entry maps the device IP address to the corresponding MAC address. When configuring a static ARP entry on the Ethernet Routing Switch 1600 Series, a match between the IP address and MAC address is assigned to a particular port of a VLAN. This section contains the following topics: • • • “Viewing and Managing ARP” on page 120 “Static ARP Entries” on page 121 “IP, VLAN—ARP tab” on page 123 Configuring IP Routing and Multicast Operations using Device Manager 120 Chapter 3 Configuring ARP Viewing and Managing ARP Device Manager has the capability to view and manage the MAC/IP address associations known and learned by the switch. In addition, ARP entries can be manually added to the ARP list (static ARP entries). To access the switch ARP entry listing, follow this procedure: 1 From the Device Manager menu bar, choose IP Routing > IP. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 2 Click the ARP tab. The IP dialog box—ARP tab appears (Figure 37). Figure 37 IP dialog box—ARP tab 321712-B Rev 03 Chapter 3 Configuring ARP 121 Table 14 describes the IP dialog box—ARP tab fields. Table 14 IP dialog box—ARP tab fields Field Description Interface The router interface for this ARP entry. MacAddress The media-dependent physical address (that is, the Ethernet address). IpAddress The IP address corresponding to the media-dependent physical address. Type Type of ARP entry: • local—a locally configured ARP entry • static—a statically configured ARP entry • dynamic—a learned ARP entry Static ARP Entries Static ARP entries are used to manually associate an IP address with a MAC address. Static ARP entries are used in instances where the dynamic learning of ARP associations is neither possible (a device does not respond to ARP requests) or undesirable (an ARP entry must be persistent). To create static ARP entries, follow this procedure: 1 From the Device Manager menu bar, choose IP Routing > IP. The IP dialog box appears with the Globals tab displayed (see Figure 21 on page 92). 2 Click the ARP tab. The IP dialog box—ARP tab appears (see Figure 37 on page 120). Configuring IP Routing and Multicast Operations using Device Manager 122 Chapter 3 Configuring ARP 3 Click Insert. The IP, Insert ARP dialog box appears (Figure 38). Figure 38 IP, Insert ARP dialog box 4 Select a valid VLAN for the static ARP entry from the Port in VLAN list. A port selection dialog box appears (Figure 39). Figure 39 IP, Insert ARP, VLAN port selection dialog box Select the desired port and click OK. The VLAN and port information is displayed in the Interface field. 5 Type the device IP address in the IpAddress field. 6 Type the device MAC address in the MacAddress field. 7 Click Insert. 321712-B Rev 03 Chapter 3 Configuring ARP 123 IP, VLAN—ARP tab The IP, VLAN—ARP tab (Figure 40) is accessible through the IP, VLAN dialog box (see Figure 23 on page 93). The IP, VLAN—ARP tab is designed for Proxy ARP configuration. However, as Proxy ARP is not supported in the current release of Ethernet Routing Switch 1600 Series software, do not attempt to perform configurations using the IP, VLAN—ARP tab. Figure 40 IP, VLAN dialog box—ARP tab Note: Proxy ARP is not supported in the current release of Ethernet Routing Switch 1600 Series software. Do not attempt any Proxy ARP configurations using the IP, VLAN—ARP tab. Configuring IP Routing and Multicast Operations using Device Manager 124 Chapter 3 Configuring ARP 321712-B Rev 03 125 Chapter 4 Configuring BootP/DHCP This section describes how to use the Device Manager for the configuration and management of BootP/DHCP relay. For conceptual information about these topics, refer to “IP routing and multicast concepts” on page 29. This section contains the following topics: • • “BootP/DHCP relay” “Configuring BootP/DHCP” on page 125 BootP/DHCP relay Dynamic Host Configuration Protocol (DHCP), an extension of the Bootstrap Protocol (BootP), is used to dynamically provide host configuration information to network devices. To lower administrative overhead, network managers prefer to configure a small number of DHCP servers in a central location. Using few DHCP servers requires the routers connecting to the subnet or bridge (or VLANs) domains to support the BootP/DHCP relay function so that hosts can get the configuration information from servers several router hops away. Configuring BootP/DHCP Use the DHCP Globals tab when enabling the DHCP behavior globally on an Ethernet Routing Switch 1600 Series. To globally enable BOOTP/DHCP, perform the following procedure: Configuring IP Routing and Multicast Operations using Device Manager 126 Chapter 4 Configuring BootP/DHCP 1 From the Device Manager menu bar, select IP Routing > DHCP. The DHCP dialog box appears with the Globals tab displayed (Figure 41). Figure 41 DHCP dialog box—Globals tab 2 Click Insert. The Insert Globals dialog box is displayed (Figure 42). Figure 42 Insert Globals dialog box 3 Using the fields provided, enter the global DHCP/Bootp parameters. Table 15 outlines the fields on this screen. 4 Click Insert. The Globals tab is updated with the new DHCP/Bootp entry. 321712-B Rev 03 Chapter 4 Configuring BootP/DHCP 127 Table 15 outlines the fields on the Insert Globals dialog box and Globals tab. Table 15 Globals tab and Insert Globals dialog box fields Field Description AgentAddr IP address of the input interface (agent) on which the relaying of received BootP/DHCP packets must be enabled. ServerAddr This parameter is either the IP address of the BootP/ DHCP server or the address of another local interface of the switch. • If it is the address of the BootP/DHCP server, then the request is unicast to the server’s address. • If the address is one of the IP addresses of an interface on the switch, then the BootP/DHCP requests will be broadcast out of that local interface. Enable Select this check box to enable this DHCP/Bootp entry. Mode Select the mode for this entry to use. The choices are: • bootp • dhcp • both Configuring IP Routing and Multicast Operations using Device Manager 128 Chapter 4 Configuring BootP/DHCP 321712-B Rev 03 129 Chapter 5 Configuring IP Policies In the Ethernet Routing Switch 1600 Series, there is a single database of route policies that can be used by protocols such as RIP for any type of filtering purpose. For conceptual information about route policies, see “IP routing and multicast concepts” on page 29. A policy is identified by a name or an ID. Each policy can have several sequence numbers. The sequence number acts as an implicit preference; a lower sequence number is preferred. A policy name can be assigned when the policy is created. When a policy is created using the CLI, an automated algorithm internally generates the policy identification number. When the same task is accomplished in the Device Manager, this value can be manually assigned. If a field in a policy is not configured, it appears as 0 or any when it is displayed in Device Manager. This indicates that the switch ignores the field in the match criteria. Note: Each policy sequence number contains a set of fields. Only a subset of those fields is used when the policy is applied in different contexts. For example, if the set-preference field has been set for a policy, the field is used only when the policy is applied for accept purposes. This field is ignored when the policy is applied for announce purposes. Configuring IP Routing and Multicast Operations using Device Manager 130 Chapter 5 Configuring IP Policies A policy can be configured so that it applies to one purpose only. For example, RIP Announce can be configured on a given RIP interface. In this case, all sequence numbers under the given policy apply to that filter. Note: Before a route policy can be configured, a prefix list must be defined. Refer to “Configuring the Prefix List” on page 130 for further information. This section includes the following topics: • • • • “Configuring the Prefix List” on page 130 “Creating and Editing a Route Policy” on page 132 “Configuring Filtering Policies on a RIP Interface” on page 142 “Deleting Filtering Policies on a RIP Interface” on page 144 Configuring the Prefix List The prefix list is a list of networks used by route policies to define an action. One or more IP prefix lists can be created and applied to any IP route policy. Before the creation of prefix lists, some protocols used two databases for different types of policies: the address-list database, and the netlist database. A prefix list combines these two databases with the following outcomes: • • A prefix list with a 32-bit mask is equivalent to an address. A prefix list with a mask less than 32 bits can be used as a network. When the MaskLenFrom field is configured to be less than the MaskLenTo field, it can also be used as a range. These fields are used during prefix list creation and are found in the Prefix List tab of the Policy dialog (see Figure 43 on page 131). For more information about prefix lists, refer to “IP routing and multicast concepts” on page 29. 321712-B Rev 03 Chapter 5 Configuring IP Policies 131 To set up or edit a route policy prefix list, follow this procedure: 1 From the Device Manager menu bar, choose IP Routing > Policy. The Policy dialog box appears with the Prefix List tab displayed (Figure 43). Figure 43 Policy dialog box—Prefix List tab 2 Click Insert. The Policy, Insert Prefix List dialog box appears (Figure 44). Figure 44 Policy, Insert Prefix List dialog box 3 Using the provided fields, configure the prefix list. 4 Click Insert. Configuring IP Routing and Multicast Operations using Device Manager 132 Chapter 5 Configuring IP Policies Table 16 describes the Policy, Insert Prefix List dialog box fields. Table 16 Policy, Insert Prefix List dialog box fields Field Description ID Specifies the list identifier. The range is 1 to 2 147 483 647. Prefix Specifies the IP address. PrefixMaskLen Specifies the length of the prefix mask. Note: You must enter the full 32-bit mask in order to exact a full match of a specific IP address (for example, when creating a policy to match on next-hop). Name Names or renames the specified prefix list. The name length can be from 1 to 64 characters. MaskLenFrom Specifies the lower bound of the mask length. The default is the mask length. MaskLenUpto Specifies the higher bound of the mask length. The default is the mask length. Note: Lower bound and higher bound mask lengths together can define a range of networks. Creating and Editing a Route Policy Route policies can be configured for RIP In and Out purposes. When a route policy is created using Device Manager, the ID of the policy is manually created. When the same task is performed in the CLI, the policy ID number is automatically generated. Note: Changing route preferences is a process-oriented operation that can affect system performance and network reachability while performing the procedures. Therefore, if you change a prefix list or routing protocol, Nortel recommends that you do so before enabling the protocols. 321712-B Rev 03 Chapter 5 Configuring IP Policies 133 To create or edit a route policy, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > Policy. The Policy dialog box appears with the Prefix List tab displayed (see Figure 43 on page 131). 2 Click the Route Policy tab. The Route Policy tab appears (Figure 45). The dialog box is wide. If all fields do not fully display on your screen, use the scroll bar above the buttons to scroll across and display all fields on the tab. Figure 45 Policy dialog box—Route Policy tab Configuring IP Routing and Multicast Operations using Device Manager 134 Chapter 5 Configuring IP Policies 3 Click Insert. The Policy, Insert Route Policy dialog box appears (Figure 46). Figure 46 Policy, Insert Route Policy dialog box 4 Enter a number to identify the policy in the Id field. 5 Enter a number to identify the specific policy within a route policy group in the SequenceNumber field. The sequence number acts as an implicit preference; a lower sequence number is preferred. 6 Enter a name for the policy in the Name field. 7 Select the Enable check box to activate the policy. 8 In the Mode section, select the permit option button to allow a route or deny to ignore the route. 9 Select the desired policy protocols in the MatchProtocol section. 321712-B Rev 03 Chapter 5 Configuring IP Policies 135 10 The MatchNetwork, MatchIpRouteSource, MatchNextHop, and MatchInterface fields specify the criteria the policy uses to match against the contents of a prefix list. None of these fields are mandatory for policy creation. Up to four prefix lists can be selected for each match criterion. a To match the destination network, click the ellipse button next to the MatchNetwork field. The MatchNetwork list box appears, displaying valid prefix list selections. b In the MatchNetwork list box, select the prefix list used to match the destination network. To select multiple prefix lists, or to deselect a prefix list, Ctrl+click the selections. c Click Ok. d Configure the MatchIPRouteSource, MatchNextHop, and MatchInterface parameters in the same way. 11 In the MatchMetric field, type the value to match against metric of the incoming route. 12 In the SetRoutePreference field, type the route preference value to be assigned to any routes that match this policy. 13 In the SetMetric field, type the metric value to be announced for any routes that match this policy. 14 To replace the destination network of any routes that match this policy with a new destination derived from a specified prefix list, do the following: a Click the ellipse button next to the SetInjectList field. The SetInjectNetList list box appears. b Select the applicable prefix list. c Click Ok. 15 In the SetMask field, type the network mask of the route that matches this policy. 16 Click Insert. Configuring IP Routing and Multicast Operations using Device Manager 136 Chapter 5 Configuring IP Policies Table 17 describes the Policy, Insert Route Policy dialog box fields. Table 17 Policy, Insert Route Policy dialog box fields Field Description Id The ID of the policy. The range is 1 to 64. SequenceNumber A second index used to identify a specific policy within a route policy group. The range is 1 to 65 535. Name Names or renames a policy. This command changes the name field for all sequence numbers under the given policy. Enable Indicates whether this policy sequence number is enabled or disabled. If disabled, the policy sequence number is ignored. Mode Specifies the action to be taken when a policy is selected for a specific route. Select permit (allow the route) or deny (ignore the route). MatchProtocol If configured, matches the protocol through which the route is learned. This field is used only for RIP announce policies. The options are: • direct • static • RIP • ospf • any MatchNetwork If configured, the switch matches the destination network against the contents of the specified prefix list. Click the ellipse button and choose from the list in the MatchNetwork dialog box. You can select up to four entries. To deselect an entry, use the CTRL key. MatchIpRouteSource If configured, matches the source IP address for RIP routes against the contents of the specified prefix list. This option is ignored for all other route types. Click the ellipse button and choose from the list in the MatchIPRouteSource dialog box. You can select up to four entries. To deselect an entry, use the CTRL key. MatchNextHop If configured, matches the next hop IP address of the route against the contents of the specified prefix list. This field is used only for RIP routes and ignored for all other types of route. Click the ellipse button and choose from the list in the MatchNextHop dialog box. You can select up to four entries. To deselect an entry, use the CTRL key. 321712-B Rev 03 Chapter 5 Configuring IP Policies 137 Table 17 Policy, Insert Route Policy dialog box fields (continued) Field Description MatchInterface If configured, the switch matches the IP address of the received interface against the contents of the specified prefix list. This field is used only for RIP routes and ignored for all other types of route. When the MatchInterface parameter is used in a RIP-In policy, it is used to match against the interface on which the route is received. When the parameter is used in a RIP-Out policy, it is used to match against the next-hop of the route to be advertised. Click the ellipse button and choose from the list in the MatchInterface dialog box. You can select up to four entries. To deselect an entry, use the CTRL key. MatchMetric If configured, the switch matches the metric of the incoming advertisement or existing route against the specified value. The range is 0 to 65 535. If the value is 0, then this field is ignored. The default is 0. SetRoutePreference If set to greater than zero, specifies the route preference value to be assigned to the route that matches this policy. If set to zero, the global preference value is used. The range is 0 to 255. The default is 0. This field applies only to accept policies. SetMetric If configured, the switch sets the metric value for the route while announcing. The default-import-metric is 0. If the default is configured, the original cost of the route is advertised into OSPF; for RIP, the original cost of the route or the default value is used. SetInjectNetList If configured, the switch replaces the destination network of the route that matches this policy with the contents of the specified prefix list. Click the ellipse button and choose from the list in the Set Inject NetList dialog box. SetMask If configured, the switch sets the mask of the route that matches this policy. This field is used only for RIP accept policies. Configuring Policy Application The Applying Policy tab is used to set which type of policies will applied to the switch. To configure policy application, follow this procedure: Configuring IP Routing and Multicast Operations using Device Manager 138 Chapter 5 Configuring IP Policies 1 Select IP Routing > Policy from the Device Manager menu. The Policy dialog box appears with the Prefix List tab selected. 2 Select the Applying Policy tab. This tab is illustrated in Figure 47. Figure 47 Policy Dialog—Applying Policy tab 3 Using the check boxes provided, select policy types to be applied to the switch. Table 18 describes the fields on this tab. Table 18 Applying Policy tab fields Field Description RoutePolicyApply When selected, allows the configuration change in a route policy to take effect. This keeps the switch from attempting to apply the changes one-by-one after each configuration change. RedistributeApply When selected, allows the configuration changes in the policy to take effect for an OSPF Redistribute context. This keeps the switch from attempting to apply the changes one-by-one after each configuration change. OspfInFilterApply When selected, allows the configuration change in a route policy or a prefix list to take effect in an OSPF accept context. This keeps the switch from attempting to apply the changes one-by-one after each configuration change. 4 321712-B Rev 03 Click Apply. Chapter 5 Configuring IP Policies 139 Configuring an OSPF Accept Policy To define an OSPF Accept policy, perform the following procedure: 1 Select IP Routing > Policy from the Device Manager menu. The Policy dialog will open with the Prefix List tab selected. 2 Select the OSPF Accept tab. The OSPF Accept tab appears (Figure 48). Figure 48 Policy Dialog—OSPF Accept tab 3 Click Insert. The Policy, Insert OSPF Accept dialog box appears (Figure 49). Figure 49 Policy, Insert OSPF Accept Dialog Configuring IP Routing and Multicast Operations using Device Manager 140 Chapter 5 Configuring IP Policies 4 Using the fields provided, enter the information for the OSPF Accept policy. Table 19 describes the fields on this dialog and the OSPF Accept tab. Table 19 Policy, Insert OSPF Accept Dialog fields Field Description AdvertisingRtr The IP address of the advertising router. Enable Enables or disables the policy. MetricType The metric type for this policy. PolicyName The name of the policy. 5 Click Insert. The OSPF Accept tab is updated with the new policy. Configuring an OSPF Redistribution Policy A redistribution entry for OSPF can be configured to announce routes of a certain source type, for example, static, RIP, or direct. If a route policy field is not configured for a redistribute entry, then the default action is taken on the basis of metric, metric-type, and subnet configured. This is called basic redistribution. Otherwise, use the route policy specified to perform detailed redistribution. If no redistribution entry is configured, no external LSA is generated for non-OSPF routes. Note: Changing OSPF Redistribute contexts is a process-oriented operation that can affect system performance and network reachability while performing the procedures. Therefore, Nortel recommends that if the default preferences are to be changed for an OSPF Redistribute context, do so before enabling the protocols. OSPF redistribution policies can be configured in two locations in the Device Manager: 1 IP Routing > OSPF > Redistribute tab 2 IP Routing > Policy > OSPF Redistribute tab 321712-B Rev 03 Chapter 5 Configuring IP Policies 141 Although the following procedure details using the IP Routing > Policy > OSPF Redistribute tab, the steps are the same in the IP Routing > OSPF > Redistribute tab. To set up or edit an OSPF redistribute policy perform the following tasks: 1 From the Device Manager menu bar select IP Routing >Policy. The Policy dialog box appears with Prefix List tab selected. 2 Select the OSPF Redistribute tab. The OSPF Redistribute tab appears (Figure 50). Figure 50 Policy Dialog—OSPF Redistribute tab 3 Click Insert. The Policy, Insert OSPF Redistribute dialog box appears (Figure 51). Figure 51 Policy, Insert OSPF Redistribute dialog box 4 Edit the fields provided. 5 Click Insert. Configuring IP Routing and Multicast Operations using Device Manager 142 Chapter 5 Configuring IP Policies Table 20 describes the Policy, Insert OSPF Redistribute dialog box fields. Table 20 Policy, Insert OSPF Redistribute dialog box fields Field Description RouteSource Select the route source protocol for the redistribution entry. Enable Enables (or disables) an OSPF redistribute entry for a specified source type. You can also enable or disable this feature in the OSPF Redistribute tab of the Policy dialog box by clicking in the field and selecting enable or disable from the pulldown menu. Metric Set the OSPF route redistribution metric for basic redistribution. The value can be a range between 0 to 65 535. If configured as 0, the original cost of the route is used. MetricType Set the OSPF route redistribution metric type. The default is Type 2. You can also select your entry in the OSPF Redistribution tab of the Policy dialog box by clicking in the field and selecting any, type1, or type2 from the pulldown menu. Subnets Allows or suppresses external subnet routes while being redistributed into an OSPF domain. You can also select your entry in the OSPF Distribution tab of the Policy dialog box by clicking in the field and selecting allow or deny from the pulldown menu. RoutePolicy Sets the route policy by name to be used for the detailed redistribution of external routes from a specified source into an OSPF domain. Click the ellipse button and choose from the list in the Route Policy dialog box (Figure 51 on page 141). To deselect an entry, use the ALT key. Configuring Filtering Policies on a RIP Interface Inbound filtering, or accept policies, can be configured on a RIP interface. The switch uses the accept policy to determine whether to learn a route on the interface. The accept policy specifies the parameters of the route when it is added to the routing table. 321712-B Rev 03 Chapter 5 Configuring IP Policies 143 Outbound filtering, or announce policies, can also be configured on a RIP interface. The announce policy determines whether to advertise a route from the routing table on the interface. It also specifies the parameters of the advertisement. Note: Policies must be created before they can be applied. Refer to “Creating and Editing a Route Policy” on page 132 for further information. To configure inbound or outbound filtering on a RIP interface, follow this procedure: 1 From the Device Manager menu bar, choose IP Routing > Policy. The Policy dialog box appears with the Prefix List tab displayed (see Figure 43 on page 131). 2 Click the RIP In/Out Policy tab. The RIP In/Out Policy tab appears (Figure 52). Figure 52 Policy dialog box—RIP In/Out Policy tab 3 Double-click in the InPolicy or OutPolicy field of the interface you wish to configure. The InPolicy or OutPolicy list box appears, displaying preconfigured policies. 4 Select the applicable policy and click Ok. The policy is added and the Rip In/Out Policy tab is updated. Configuring IP Routing and Multicast Operations using Device Manager 144 Chapter 5 Configuring IP Policies 5 Click Apply. Note: RIP In and Out policies can also be configured from the VLAN configuration menu. Refer to “Enabling and Configuring RIP on a VLAN” on page 165 for further information. Table 21 describes the Policy dialog box—RIP In/Out Policy tab fields. Table 21 Policy dialog box—RIP In/Out Policy tab fields Field Description Address The IP address of the RIP interface. Interface The interface ID. InPolicy Double-click in the InPolicy name field and select the policy name to be applied from the PolicyName dialog box. The policy determines which routes are learned on this interface. The policy also specifies the parameters of the route when it is added to the routing table. Note: You can also configure an interface’s RIP accept policy on the IP, VLAN dialog box—RIP tab (see “Enabling and Configuring RIP on a VLAN” on page 165). OutPolicy Double-click in the OutPolicy name field and select the policy name to be applied from the PolicyName dialog box. The policy determines which routes are advertised from the routing table on the interface. The policy also specifies the parameters of the advertisement. Note: You can also configure an interface’s RIP announce policy on the IP, VLAN dialog box—RIP tab (see “Enabling and Configuring RIP on a VLAN” on page 165). Deleting Filtering Policies on a RIP Interface To delete a RIP In/Out Policy, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > Policy. The Policy dialog box appears with the Prefix List tab displayed (see Figure 43 on page 131). 2 Select the RIP In/Out Policy tab. The RIP In/Out Policy tab appears (see Figure 52 on page 143). 321712-B Rev 03 Chapter 5 Configuring IP Policies 145 3 Double-click in the InPolicy or OutPolicy field of the interface to be configured. The InPolicy or OutPolicy list box appears, displaying preconfigured policies. 4 Press CTRL + the left mouse button on the desired policy to delete. 5 Click Ok. The policy is removed from that interface and the Rip In/Out Policy tab is updated. 6 Click Apply. Configuring IP Routing and Multicast Operations using Device Manager 146 Chapter 5 Configuring IP Policies 321712-B Rev 03 147 Chapter 6 Configuring VRRP End stations are often configured with a static default gateway IP address. Loss of the default gateway router can have catastrophic results. Virtual Router Redundancy Protocol (VRRP), RFC 2338, is designed to eliminate this single point of failure in a routed environment by introducing the concept of a virtual IP address (transparent to users) shared between two or more routers connecting the common subnet to the enterprise network. With the virtual IP address as the default gateway on end hosts, VRRP provides a dynamic default gateway redundancy in the event of a failure. In the current implementation of VRRP, there can be only one active master switch per IP subnet. All other VRRP interfaces in a network are in backup mode. If VRRP and other IP routing protocols (for example, OSPF) are configured on the same IP physical interface, selecting the interface address as the VRRP virtual IP address (logical IP address) is not supported. Use a separate dedicated IP address for VRRP. Use the Hold Down Timer to modify the behavior of the VRRP failover mechanism so that the router has enough time to detect and update the OSPF or RIP routes. This timer delays the preemption of the master over the backup, when the master becomes available. Note: Nortel recommends that all routers are set to the identical number of seconds for the Hold Down Timer. In addition, the preemption of the master over the backup can be manually forced before the delay timer expires. This section describes configuring and managing VRRP in Device Manager. For conceptual information regarding VRRP, refer to “IP routing and multicast concepts” on page 29. Configuring IP Routing and Multicast Operations using Device Manager 148 Chapter 6 Configuring VRRP This section contains the following topics: • • • • • • “Configuration Prerequisites” on page 148 “Enabling VRRP Globally” on page 148 “Configuring VRRP for the Interface” on page 149 “Configuring VRRP Secondary Features” on page 152 “Configuring VRRP on a VLAN” on page 154 “Configuring the Fast Advertisement Interval” on page 159 Configuration Prerequisites Before VRRP configurations can take effect, the following steps must be taken: • • Assign an IP address to the interface Enable VRRP globally Enabling VRRP Globally To enable VRRP globally: 1 Select IP Routing > VRRP from the Device Manager menu bar. The VRRP dialog box appears with the Globals tab displayed (Figure 53). Figure 53 VRRP dialog box—Globals tab 2 321712-B Rev 03 Select the SendTrap and PingVirtualAddrEnable check boxes as appropriate. Chapter 6 Configuring VRRP 149 3 Click Apply. Table 22 describes the Globals tab fields. Table 22 Globals tab fields Field Description SendTrap Indicates whether the VRRP-enabled router generates SNMP traps for events defined in this MIB: • Enabled—SNMP traps are sent • Disabled—no traps are sent PingVirtualAddrEnable Used to configure whether this device responds to pings directed to a virtual router's IP address. Configuring VRRP for the Interface VRRP parameters can be configured and managed for the routing interface. To configure the VRRP interface, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > VRRP. The VRRP dialog box appears with the Globals tab displayed (Figure 53 on page 148). 2 Select the Interface tab. The Interface tab appears (Figure 54). The Interface tab contains a large number of fields and all fields may not display at once. Use the scroll bars located above the dialog buttons to view all fields. Figure 54 VRRP dialog box—Interface tab 3 Edit the desired fields in the appropriate interface. 4 Click Apply. Configuring IP Routing and Multicast Operations using Device Manager 150 Chapter 6 Configuring VRRP Table 23 describes the fields in the Interface tab. Table 23 Interface tab fields Field Description VrId A number that uniquely identifies a virtual router on a given VRRP router. The virtual router acts as the default router for one or more assigned addresses (1 to 255). Interface Interface of the VRRP router. IpAddr The assigned IP addresses that a virtual router is responsible for backing up. VirtualMacAddr MAC address of the virtual router interface. State The state of the virtual router interface: • initialize—waiting for a startup event • backup—monitoring availability and state of the master router • master—functioning as the forwarding router for the virtual router IP address Control Whether VRRP is enabled or disabled for the VLAN. Priority Priority value to be used by this VRRP router. Set a value from 1 to 255, where 255 is reserved for the router that owns the IP addresses associated with the virtual router. The default is 100. MasterIpAddr The IP address of the physical interface of the master virtual router that has the responsibility of forwarding packets sent to the virtual IP address associated with the virtual router. FastAdvertisementEnable Enables or disables the Fast Advertisement Interval. When disabled, the regular advertisement interval is used. Default is disable. AdvertisementInterval The time interval (in seconds) between sending advertisement messages. Set from 1 to 255 seconds with a default of 1 second. Only the master router sends advertisements. VirtualRouterUpTime The time interval (in hundredths of a second) since the virtual router was initialized. FastAdvertisementInterval Sets the Fast Advertising Interval, the time interval between sending VRRP advertisement messages. The interval can be between 200 and 1 000 milliseconds, and it must be the same on all participating routers. The default is 200. The values must be entered in multiples of 200 milliseconds. VirtualRouterUpTime 321712-B Rev 03 This is the time interval, in hundredths of a second since this virtual router was initialized. Chapter 6 Configuring VRRP 151 Table 23 Interface tab fields (continued) Field Description CriticalIpAddrEnable Sets the IP interface on the local router to enable or disable the backup. CriticalIPAddr An IP interface on the local router configured so that a change in its state would cause a role switch in the virtual router (for example, from master to backup) in case the interface stops responding. Configuring IP Routing and Multicast Operations using Device Manager 152 Chapter 6 Configuring VRRP Configuring VRRP Secondary Features To configure the VRRP secondary features, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > VRRP. The VRRP dialog box appears with the Globals tab displayed (Figure 53 on page 148). 2 Select the Secondary Features tab. The Secondary Features tab appears (Figure 55). Figure 55 VRRP dialog box—Secondary Feature tab 3 Select the HoldDownTimer field for the desired interface and enter the timer value in seconds. Note: The HoldDownState field displays active when the Hold Down Timer is counting down and preemption will occur; it displays dormant when preemption is not pending. When the Hold Down Timer is active, the HoldDownTimeRemaining field displays the seconds remaining before preemption. Note: Use the OperAction field to manually override the delay timer and to force preemption. When this field is clicked, an arrow appears. Click the field and a list appears. Choose preemption to preempt the timer, or choose none to allow the timer to keep working. Note: Use the BackUpMaster field to enable or disable the backup master feature. 321712-B Rev 03 Chapter 6 Configuring VRRP 153 4 Click Apply. Table 24 describes the fields in the Secondary Feature tab. Table 24 Secondary Feature tab fields Field Description VrId A number that uniquely identifies a virtual router on a given VRRP router. The virtual router acts as the default router for one or more assigned addresses (1 to 255). HoldDownTimer The time interval (in seconds) a router is delayed for the following conditions: • The VRRP Hold Down Timer is executed when the switch transitions from Init to backup to master. This occurs only on a switch bootup. • The VRRP Hold Down Timer is NOT executed under the following condition: In a non-bootup condition the Backup switch becomes the master after the Master Downtime Interval. (3 * hello interval), if the master VR goes down. • The VRRP Hold Down Timer also applies to the VRRP BackupMaster feature. HoldDownState Status is active when the Hold Down Timer is counting down and preemption will occur; the text box displays dormant when preemption is not pending. HoldDownTimeRemaining The seconds remaining before preemption. OperAction Use the action list to manually override the delay timer and force preemption: • preemption—preempt the timer • none—allow the timer to keep working BackUpMaster Indicates if the VRRP backup master is enabled or disabled. This option is not recommended for non Split-MLT ports. BackUpMastrState Displays the BackupMaster operational state. When VRRP is enabled on a switch in a master state, the BackUpMaster state is DOWN. When VRRP is enabled on a switch that is in a backup state, the BackUpMaster state is UP. States: • up: in BackupMaster state • down: original state Configuring IP Routing and Multicast Operations using Device Manager 154 Chapter 6 Configuring VRRP Configuring VRRP on a VLAN Before VRRP can be configured on a VLAN, it must first be enabled globally. VRRP can only be configured on a VLAN if the VLAN has been assigned an IP address. To configure VRRP on a VLAN follow this procedure: 1 From the Device Manager menu bar, select VLAN > VLANs. The VLAN dialog box appears with the Basic tab displayed (Figure 56). Figure 56 VLAN dialog box—Basic tab 321712-B Rev 03 Chapter 6 Configuring VRRP 155 2 Select a VLAN by clicking in a column of the appropriate row. 3 Click IP. The IP, VLAN dialog box appears with the IP Address tab displayed. 4 Select the VRRP tab. The VRRP tab appears (Figure 57). Figure 57 IP, VLAN dialog box—VRRP tab 5 Click Insert. The IP, VLAN, Insert VRRP dialog box appears (Figure 58). Figure 58 IP, VLAN, Insert VRRP dialog box 6 Using the fields provided, configure VRRP for the VLAN. 7 Click Insert. Configuring IP Routing and Multicast Operations using Device Manager 156 Chapter 6 Configuring VRRP Table 25 describes the IP, VLAN, Insert VRRP dialog box fields. Table 25 IP, VLAN, Insert VRRP dialog box fields Field Description VrId A number that uniquely identifies a virtual router on a given VRRP router. The virtual router acts as the default router for one or more assigned addresses (1 to 255). IpAddr IP address of the virtual router interface. Control Whether VRRP is enabled or disabled for the VLAN. Priority Priority value to be used by this VRRP router. Set a value from 1 to 255, where 255 is reserved for the router that owns the IP addresses associated with the virtual router. The default is 100. FastAdvertisementEnable Enables or disables the Fast Advertisement Interval. When disabled, the regular advertisement interval is used. Default is disable. AdvertisementInterval The time interval (in seconds) between sending advertisement messages. Set from 1 to 255 seconds with a default of 1 second. Only the master router sends advertisements. FastAdvertisementInterval Sets the Fast Advertising Interval, the time interval between sending VRRP advertisement messages. The interval can be between 200 and 1 000 milliseconds, and it must be the same on all participating routers. The default is 200. The values must be entered in multiples of 200 milliseconds. CriticalIpAddrEnable Sets the IP interface on the local router to enable or disable the backup. CriticalIpAddr Indicates if the user-defined critical IP address is enabled. There is no effect if a user-defined IP address does not exist. • No—use the default IP address (0.0.0.0) 321712-B Rev 03 Chapter 6 Configuring VRRP 157 Table 25 IP, VLAN, Insert VRRP dialog box fields Field Description HoldDownTimer The time interval (in seconds) a router is delayed for the following conditions: • The VRRP Hold Down Timer is executed when the switch transitions from Init to backup to master. This occurs only on a switch bootup. • The VRRP Hold Down Timer is NOT executed under the following condition: In a non-bootup condition, the Backup switch becomes master after the Master Downtime Interval. (3 * hello interval), if the master VR goes down. • The VRRP Hold Down Timer also applies to the VRRP BackupMaster feature. OperAction Use the action list to manually override the delay timer and force preemption: • preemptHoldDownTimer—preempt the timer • none—allow the timer to keep working BackUpMaster Enables or disables the VRRP backup master switch. Viewing VRRP Interface Statistics To view VRRP interface statistics, perform the following procedure: 1 Select VLAN > VLANS from the Device Manager menu. The VLAN dialog will open with the Basic tab selected. 2 Choose a VLAN by selecting a column in the appropriate row of the Basic tab. 3 Click IP. The IP, VLAN dialog will open with the IP Address tab selected. 4 Select the VRRP tab. 5 Choose a VRRP entry by selecting a column in the appropriate row of the VRRP tab. 6 Click Graph. Configuring IP Routing and Multicast Operations using Device Manager 158 Chapter 6 Configuring VRRP The VRRP Stats dialog box appears. This dialog box is illustrated in Figure 59. Figure 59 VRRP Stats dialog box Table 26 describes the fields on this dialog. Table 26 VRRP Stats Dialog Fields Fields Description BecomeMaster The total number of times that this virtual router's state has transitioned from BACKUP to MASTER. AdvertiseRcvd The total number of VRRP advertisements received by this virtual router. ChecksumErrors The total number of VRRP packets received with an invalid checksum value. VersionErrors The total number of VRRP packets received with an invalid version number. VrIdErrors The total number of VRRP packets received with an invalid VRID for this virtual router. AdvertiseIntervalErrors The total number of VRRP advertisement packets received for which the advertisement interval is different than the one configured for the local virtual router. 321712-B Rev 03 Chapter 6 Configuring VRRP 159 Table 26 VRRP Stats Dialog Fields (continued) Fields Description PasswdSecurityViolations The total number of VRRP packets received that do not pass the simple text password authentication check. HmacSecurityViolations The total number of VRRP packets received that do not pass the HMAC-MD5-96 authentication check. IpTtlErrors The total number of VRRP packets received by the virtual router with an IP TTL (Time-To-Live) not equal to 255. PriorityZeroPktsRcvd The total number of VRRP packets received by the virtual router with a priority of 0. PriorityZeroPktsSent The total number of VRRP packets sent by the virtual router with a priority of 0. InvalidTypePktsRcvd The number of VRRP packets received by the virtual router with an invalid value in the type field. AddressListErrors The number of packets received where the address list does not match the locally configured list for the virtual router. UnknownAuthType The number of packets received with an unknown authentication type. AuthTypeErrors The number of packets received with an Auth Type not equal to the locally configured authentication method. Configuring the Fast Advertisement Interval The following sections discuss the configuration of the Fast Advertisement Interval on a VLAN. Configuring the Fast Advertisement Interval on a VLAN To configure the Fast Advertisement Interval on a VLAN, follow this procedure: 1 From the Device Manager menu bar, select VLAN > VLANs. The VLAN dialog box appears with the Basic tab displayed (Figure 56 on page 154). 2 Select a VLAN by clicking in a column of the desired row. 3 Click IP. Configuring IP Routing and Multicast Operations using Device Manager 160 Chapter 6 Configuring VRRP The IP, VLAN dialog box appears with the IP Address tab displayed. 4 Select the VRRP tab. 5 Click Insert. The IP, VLAN, Insert VRRP dialog box appears (Figure 58 on page 155). 6 Select the enable option button in the FastAdvertisementEnable area. 7 In the AdvertisementInterval field, enter an interval in seconds. 8 Click Insert. Refer to Table 25 on page 156 for a description of the VRRP Insert fields. 321712-B Rev 03 161 Chapter 7 Configuring RIP In a routed environment, routers communicate with one another to keep track of available routes. Routers can learn about available routes dynamically using the Routing Information Protocol (RIP). RIP is a standard routing protocol based on the Bellman-Ford (or distance vector) algorithm. It is used as an Interior Gateway Protocol (IGP). For conceptual information about RIP, refer to “IP routing and multicast concepts” on page 29. The Ethernet Routing Switch 1600 Series supports the use of RIP to exchange information with other routers to compute routes through an IPv4-based network. By default, RIP is disabled globally and on every interface. RIP must be configured globally and on the interface in order for a RIP configuration to take effect. Note: In the Ethernet Routing Switch 1600 Series, RIP is configurable only for VLANs. There is no brouter port on the Ethernet Routing Switch 1600 Series. The basic steps for enabling and configuring RIP are: 1 Enable and configure RIP globally. Refer to “Enabling and Configuring Global RIP Parameters” on page 163 for this procedure. 2 Create and configure the IP interfaces. Refer to “Router Interface Types” on page 91 for this procedure. 3 Enable and configure RIP on the IP interfaces. Refer to “Enabling and Configuring RIP on a VLAN” on page 165 for this procedure. Configuring IP Routing and Multicast Operations using Device Manager 162 Chapter 7 Configuring RIP 4 Configure RIP send and receive versions on the IP interfaces. Refer to “RIP Versioning Configuration” on page 170 for this procedure. Note: RIP can be configured on IP interfaces even when it is disabled globally. This means RIP can be configured on the interfaces before it is enabled on the switch. This section includes the following topics: • • • • • 321712-B Rev 03 “Enabling and Configuring Global RIP Parameters” on page 163 “Enabling and Configuring RIP on a VLAN” on page 165 “RIP Versioning Configuration” on page 170 “RIP Interface Management” on page 173 “Viewing RIP Statistics” on page 175 Chapter 7 Configuring RIP 163 Enabling and Configuring Global RIP Parameters In the Ethernet Routing Switch 1600 Series, the global RIP parameters are used by all router interfaces using RIP. To enable and configure global RIP parameters, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > RIP. The RIP dialog box appears with the Globals tab displayed (Figure 60). Figure 60 RIP dialog box—Globals tab 2 Select enable from the Operation section to globally enable RIP. 3 Enter a value in seconds in the UpdateTime field or accept the default of 30 seconds. 4 Enter a value in seconds in the HoldDownTime field or accept the default of 120 seconds. 5 Enter a value in seconds in the TimeOutInterval field or accept the default value of 180 seconds. 6 Enter a value in the DefImportMetric field or accept the default value of 8. Configuring IP Routing and Multicast Operations using Device Manager 164 Chapter 7 Configuring RIP 7 Click Apply. Note: RIP can be configured on interfaces before it is globally enabled. This means RIP interfaces can be configured before it is enabled on the switch. Table 27 describes the RIP dialog box—Globals tab fields. Table 27 RIP dialog box—Globals tab fields Field Description Operation Enables or disables RIP operation on the switch. The default is disabled. UpdateTime Sets the RIPupdate timer. The value of the update timer is the time interval (in seconds) between regular RIP updates. The range is 1 to 2 147 483 647, and the default is 30 seconds. The global UpdateTime parameter sets the update timer for the VLAN interfaces. The UpdateTime value must be less than the timeout interval. RouteChanges Reports the number of route changes made to the IP routing database by RIP. Refreshing an aged route is not considered a change. Queries Reports the number of responses sent to RIP queries from other systems. HoldDownTime Sets the RIP Hold Down Timer. The value of the Hold Down Timer is the length of time (in seconds) that RIP continues to advertise a network after determining that it is unreachable. The range is 0 to 360, and the default is 120 seconds. The global HoldDownTime parameter sets the default value of the Hold Down Timer for the VLAN interfaces. 321712-B Rev 03 Chapter 7 Configuring RIP 165 Table 27 RIP dialog box—Globals tab fields (continued) Field Description TimeOutInterval Sets the RIP timeout interval. The range is 15 to 259 200. The default value is set indirectly by the global UpdateTime parameter. By default, the timeout timer is set at 6 times the update timer, in accordance with the RFC specification. With a default global UpdateTime of 30 seconds, the default TimeOutInterval is 180 seconds. Configure the TimeOutInterval only if you want to break the relationship with the update timer. For example, if you have set the global UpdateTime parameter to a very short interval in order to minimize the problem of fast convergence, the associated default TimeOutInterval may be too short. In this case, configure the TimeOutInterval manually. The global TimeOutInterval parameter sets the default value of the timeout timer for the VLAN interfaces. The timeout interval must be greater than the UpdateTime. DefImportMetric Sets the value of the default metric to apply to routes imported into the RIP domain. This is the metric used for routes not learned through RIP if a route policy does not specify a metric for a particular protocol, such as OSPF. The range is 0 to 15, and the default is 8. Use a value of 0 for deconfiguration. Enabling and Configuring RIP on a VLAN In the Ethernet Routing Switch 1600 Series, RIP global parameters supply the defaults used by all other router interfaces. The RIP update timer and DefImportMetric parameters are global settings that are not configurable per interface. All other global parameters can be overridden by interface parameter settings. In addition to being enabled globally on the switch, RIP must be enabled separately on each participating interface. To enable and configure RIP on a VLAN, do the following: 1 From the Device Manager menu bar, choose VLAN > VLANs. The VLAN dialog box appears with the Basic tab displayed (see Figure 22 on page 93). Configuring IP Routing and Multicast Operations using Device Manager 166 Chapter 7 Configuring RIP 2 Select a VLAN by clicking in a column of the desired row. 3 Click IP. The IP, VLAN dialog box appears with the IP Address tab displayed (see Figure 23 on page 93). 4 Select the RIP tab. The IP, VLAN dialog box—RIP tab appears (Figure 61). Figure 61 IP, VLAN dialog box—RIP tab 5 Select the Enable check box to enable RIP on the interface. 6 To set RIP Supply, Listen, and Poison parameters, select the enable or disable option buttons. 7 To enable the DefaultSupply, DefaultListen, TriggeredUpdateEnable, AutoAggregateEnable, and AdvertiseWhenDown parameters, select the applicable check boxes. 321712-B Rev 03 Chapter 7 Configuring RIP 167 8 To apply a RIP In or Out policy: a Click the ellipse button next to the InPolicy or OutPolicy field as applicable. The InPolicy or OutPolicy list box appears, displaying preconfigured policies. Refer to “Configuring Filtering Policies on a RIP Interface” on page 142 for policy creation procedures. 9 b Select a policy. Only one policy can be selected. To change which policy to apply, simply select the new policy. To deselect a policy (so that no policy is applied), press CTRL + the left mouse button on the selected policy. c Click Ok. In the Cost field, type the metric for the interface. 10 In the HolddownTime field, enter a value to set the Hold Down Timer. 11 In the TimeoutInterval field, enter a value to set the timeout timer. The timeout interval must be greater than the global RIP update interval. 12 Click Apply. Table 28 describes the IP, VLAN dialog box—RIP tab. Table 28 IP, VLAN dialog box—RIP tab fields Field Description Enable If selected, enables RIP on the interface. The default is false (disabled). Supply Specifies that the routing switch advertises RIP routes through the interface. The default is enable. Listen Specifies that the routing switch learns RIP routes through this interface. The default is enable. Configuring IP Routing and Multicast Operations using Device Manager 168 Chapter 7 Configuring RIP Table 28 IP, VLAN dialog box—RIP tab fields (continued) Field Description Poison Specifies whether or not RIP routes on the interface learned from a neighbor are advertised back to the neighbor. • If disabled, split horizon is invoked, and IP routes learned from an immediate neighbor are not advertised back to the neighbor. • If enabled, the RIP updates sent to a neighbor from which a route is learned are “poisoned” with a metric of 16. Therefore, the receiver neighbor ignores this route because the metric 16 indicates infinite hops in the network. The default is disable. DefaultSupply Specifies whether or not the interface sends RIP advertisements for the default route, if one exists in the routing table. The default is false (disabled). DefaultListen Specifies whether or not the interface listens for RIP updates for the default route learned through RIP. The default is false (disabled). TriggeredUpdateEnable Enables or disables automatic triggered updates for RIP on this interface. The default is false (disabled). AutoAggregateEnable Enables or disables automatic route aggregation on the interface. When enabled, the router switch automatically aggregates routes to their natural mask when they are advertised on an interface in a network of a different class. Routes with different metrics can be aggregated. RIP uses the out metric associated with the first route found in the routing table that is to be aggregated. Automatic route aggregation can be enabled only in RIP2 mode or RIP1 compatibility mode. The default is false (disabled). AdvertiseWhenDown Specifies whether or not the network on this interface is advertised as up, even if the port is down. The default is false (disabled). Note: When you configure a VLAN without any link and enable AdvertiseWhenDown, it does not advertise the route until the port is active. Then the route is advertised even when the link is down. To disable advertising based on link states, disable AdvertiseWhenDown. InPolicy Click the ellipse button or double-click in the InPolicy name field and select the policy name to be applied from the PolicyName dialog box. The policy determines which routes are learned on this interface. The policy also specifies the parameters of the route when it is added to the routing table. 321712-B Rev 03 Chapter 7 Configuring RIP 169 Table 28 IP, VLAN dialog box—RIP tab fields (continued) Field Description OutPolicy Click the ellipse button or double-click in the OutPolicy name field and select the policy name to be applied from the PolicyName dialog box. The policy determines which routes are advertised from the routing table on the interface. The policy also specifies the parameters of the advertisement. Cost Indicates the RIP cost (metric) for this interface. Enter an integer value between 1 and 15. The default is 1. HolddownTime Sets the RIP Hold Down Timer for the interface. The value of the Hold Down Timer is the length of time (in seconds) that RIP continues to advertise a network after determining that it is unreachable. Enter an integer value between 0 and 360. The default value is set by the global holddown parameter, which has a default of 120 seconds. The interface timer setting overrides the global parameter. However, if you subsequently reset the global parameter, the global setting then overrides the interface timer setting. TimeoutInterval Sets the RIP timeout interval for the interface. Enter an integer value between 15 and 259 200. The default value is set indirectly by the global update time parameter. By default, the timeout timer is set at 6 times the update timer, in accordance with the RFC specification. With a default global update timer setting of 30 seconds, the default timeout interval is 180 seconds. Configure the timeout parameter on the interface only if you want to break the relationship with the update timer. For example, if you have set the global update parameter to a very short interval in order to minimize the problem of fast convergence, the associated default timeout may be too short. In this case, configure the interface timeout interval manually. The interface timer setting overrides the global parameter. However, if you subsequently reset the global parameter, the global setting then overrides the interface timer setting. The TimeoutInterval must be greater than the global UpdateTime value. Configuring IP Routing and Multicast Operations using Device Manager 170 Chapter 7 Configuring RIP RIP Supply and Listen Settings Table 29 shows the relationship between switch action and the RIP supply and listen settings. Table 29 RIP supply and listen settings and switch action RIP supply settings RIP listen settings Listen Defaultlisten Switch action Supply Default-supply Disabled Disabled Sends no RIP updates. Enabled Disabled Sends RIP updates for all routes except the default route. Disabled Enabled Sends RIP updates for the default route only (default route must exist in the routing table). Enabled Enabled Sends RIP updates including the default route (if it exists). Disabled Disabled Does not listen for RIP updates. Enabled Disabled Listens for all RIP updates except the default route. Disabled Enabled Listens only for RIP updates of the default route. Enabled Enabled Listens for all RIP updates including the default route (if it exists). RIP Versioning Configuration Interfaces can be configured to use different RIP versions when sending or receiving RIP updates. Note: The AuthType and AuthKey parameters are not supported. 321712-B Rev 03 Chapter 7 Configuring RIP 171 To configure RIP versioning, follow this procedure: 1 From the menu bar, choose IP Routing > RIP. The RIP dialog box appears with the Globals tab displayed (see Figure 60 on page 163). 2 Select the Interface tab. The RIP dialog box—Interface tab appears (Figure 62). Figure 62 RIP dialog box—Interface tab 3 Set the Send or Receive fields by double-clicking the applicable field and selecting a value from the provided list. 4 Click Apply. Table 30 describes the RIP dialog box—Interface tab fields. Table 30 RIP dialog box—Interface tab fields Field Description Address The IP address of the router interface. Domain The value inserted into the Routing Domain field of all RIP packets sent on this interface. The default is 0. AuthType The type of authentication used on this interface. AuthKey The value to be used as the Authentication Key whenever the corresponding instance of rip2IfConfAuthType has a value other than noAuthentication. Configuring IP Routing and Multicast Operations using Device Manager 172 Chapter 7 Configuring RIP Table 30 RIP dialog box—Interface tab fields (continued) Field Description Send Indicates which version of RIP updates the router sends on this interface: • DoNotSend—no RIP updates sent on this interface • ripVersion1—RIP broadcast updates compliant with RFC 1058 • rip1Compatible—compatible with RIP version 1 (RIP version 2 updates are broadcast using RFC 1058 route subsumption rules) • ripVersion2—multicast RIP updates compliant with RFC 2453 The default is rip1Compatible. Refer to “RIP Send Modes” on page 172 for more information. Receive Indicates which versions of RIP updates are to be accepted on this interface: • rip1 (complies with RFC 1058) • rip2 (complies with RFC 2453) • rip1OrRip2 (both versions of RIP) The default is rip1OrRip2. Note: rip2 and rip1OrRip2 imply reception of multicast packets. RIP Send Modes Table 31 describes the RIP send modes supported on the Ethernet Routing Switch 1600 Series. RIP send modes can be configured on all VLAN interfaces. Table 31 RIP send modes Mode Description Result rip1 Broadcasts RIP updates that are compliant with RFC 1058. • • • • rip1comp Broadcasts RIP-2 updates using RFC 1058 route subsumption rules. This is the default mode. • • • • 321712-B Rev 03 Destination MAC is a broadcast, ff-ff-ff-ff-ff-ff Destination IP is a broadcast for the network (for example, 192.1.2.255) RIP update is formed as a RIP-1 update, no network mask included RIP version = 1 Destination MAC is a broadcast, ff-ff-ff-ff-ff-ff Destination IP is a broadcast for the network (for example, 192.1.2.255) RIP update is formed as a RIP-2 update, including network mask RIP version = 2 Chapter 7 Configuring RIP 173 Table 31 RIP send modes (continued) Mode Description Result rip2 RIP-2 updates are multicast. • • • • notsend No RIP updates are sent on the interface. Destination MAC is a multicast, 01-00-5e-00-00-09 Destination IP is the RIP-2 multicast address, 224.0.0.9 RIP update is formed as a RIP-2 update, including network mask RIP version = 2 None RIP Interface Management To view and edit RIP configuration on the interface, follow this procedure: 1 From the Device Manager menu bar, choose IP Routing > RIP. The RIP dialog box appears with the Globals tab displayed (see Figure 60 on page 163). 2 Click the Interface Advance tab. The Interface Advance tab appears (Figure 63). If all fields do not fully display on the screen, use the scroll bar above the buttons to scroll across and display all fields on the tab. Figure 63 RIP dialog box—Interface Advance tab 3 Double-click in any field to display a list or dialog box from which alternative parameter settings can be selected. 4 Click Apply. Configuring IP Routing and Multicast Operations using Device Manager 174 Chapter 7 Configuring RIP Table 32 describes the RIP dialog box—Interface Advance tab fields. Table 32 RIP dialog box—Interface Advance tab fields Field Description Address Displays the IP address of the interface. Interface Displays the interface identification. Enable Displays whether RIP is enabled or disabled on the interface. Supply Displays whether the switch is enabled (true) or disabled (false) to send out RIP updates on this interface. Listen Displays whether the switch is enabled (true) or disabled (false) to learn routes on this interface. Poison Displays whether or not RIP routes on the interface learned from a neighbor are advertised back to the neighbor. If disabled (false), split horizon is invoked and IP routes learned from an immediate neighbor are not advertised back to the neighbor. If enabled (true), the RIP updates sent to a neighbor from which a route is learned are “poisoned” with a metric of 16. Therefore, the receiver neighbor ignores this route because the metric 16 indicates infinite hops in the network. DefaultSupply Displays whether advertisement of a default route is enabled (true) or disabled (false) on this interface. This command takes effect only if a default route exists in the routing table. DefaultListen Displays whether the switch is enabled (true) or disabled (false) to accept the default route learned through RIP on this interface. TriggeredUpdate Displays whether the switch is enabled (true) or disabled (false) to send out RIP updates on this interface. AutoAggregate Displays whether automatic route aggregation is enabled (true) or disabled (false) on this interface. When enabled, the switch automatically aggregates routes to their natural mask when they are advertised on an interface. InPolicy Indicates the policy that determines whether to learn a route on this interface. The policy also specifies the parameters of the route when it is added to the routing table. OutPolicy Indicates the policy that determines whether to advertise a route from the routing table on this interface. The policy also specifies the parameters of the advertisement. Cost Indicates the RIP cost (metric) for this interface. Enter a value between1 to 15. The default is 1. 321712-B Rev 03 Chapter 7 Configuring RIP 175 Table 32 RIP dialog box—Interface Advance tab fields (continued) Field Description Holddown Time Indicates the value of the RIP Hold Down Timer for the interface. The value of the Hold Down Timer is the length of time (in seconds) that RIP continues to advertise a network after determining that it is unreachable. Enter an integer value between 0 and 360. The default value is set by the global holddown parameter, which has a default of 120 seconds. The interface timer setting overrides the global parameter and does not change if the global parameter is changed. TimeoutInterval Indicates the RIP timeout interval for the interface. Enter an integer value between 15 and 259 200. The default value is set indirectly by the global update time parameter. By default, the timeout timer is set at 6 times the update timer, in accordance with the RFC specification. With a default global update timer setting of 30 seconds, the default timeout interval is 180 seconds. The default interface timeout setting changes when the global update time parameter is changed. Configure the timeout parameter on the interface only if you want to break the relationship with the update timer. For example, if you have set the global update parameter to a very short interval in order to minimize the problem of fast convergence, the associated default timeout may be too short. In this case, configure the interface timeout interval manually. Viewing RIP Statistics To view the RIP statistics, follow this procedure: 1 From the Device Manager menu bar, choose IP Routing > RIP. The RIP dialog box appears with the Globals tab displayed (see Figure 60 on page 163). 2 Select the Status tab. The Status tab appears (Figure 64). Configuring IP Routing and Multicast Operations using Device Manager 176 Chapter 7 Configuring RIP Figure 64 RIP dialog box—Status tab Table 33 describes the RIP dialog box—Status tab fields. Table 33 RIP dialog box—Status tab fields Field Description Address The IP address of the interface. RcvBadPackets The number of RIP response packets received by the RIP process that were subsequently discarded for any reason. (Example: A version 0 packet or an unknown command type.) RcvBadRoutes The number of routes, in valid RIP packets, that were ignored for any reason. (Example: Unknown address family or invalid metric.) SentUpdates The number of triggered RIP updates actually sent on this interface. This field explicitly does not include full updates sent containing new information. 321712-B Rev 03 177 Chapter 8 Configuring OSPF The Open Shortest Path First (OSPF) protocol is a link-state protocol. The state of a link, or interface on a router, is a description of that interface and its relationship to its neighboring routers. The link-state description includes, for example, the IP address of the interface, the mask, the type of network it is connected to, the routers connected to that network, and so on. The collection of all these link-states form the link-state database. OSPF uses this link-state database to build and calculate the shortest path to all known destinations. Note: OSPF parameters can only be configured on an interface that has an IP address assigned to it. For conceptual information about OSPF management, refer to “IP routing and multicast concepts” on page 29. This section contains the following concepts: • • • • • • • • • • • “Viewing General OSPF Information” on page 178 “Enabling or Disabling OSPF on a Router” on page 180 “Manually Initiating an SPF Run” on page 181 “Configuring OSPF Interfaces” on page 182 “Managing an OSPF VLAN interface” on page 191 “Managing OSPF Area Information” on page 197 “Creating a Virtual Link” on page 201 “Specifying ASBRs” on page 207 “Configuring Metric Speed” on page 208 “Viewing Stub Area Metrics” on page 210 “Viewing Advertisements in the link state database” on page 211 Configuring IP Routing and Multicast Operations using Device Manager 178 Chapter 8 Configuring OSPF • • • “Viewing the External Link State Database” on page 212 “Inserting OSPF Area Aggregate Ranges” on page 213 “Configuring an OSPF Redistribution Policy” on page 216 Viewing General OSPF Information To view general OSPF information: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65). Figure 65 OSPF dialog box—General tab 321712-B Rev 03 Chapter 8 Configuring OSPF 179 Table 34 describes the General tab fields. Table 34 General tab fields Field Description RouterID The Router ID, which in OSPF has the same format as an IP address but identifies the router independent of other routers in the OSPF domain. AdminStat The administrative status of OSPF in the router. The value enabled denotes that the OSPF process is active on at least one interface; disabled disables it on all interfaces.The default is disabled. VersionNumber Current version number of OSPF. AreaBdrRtrStatus A flag to note if this router is an area border router (ABR). Note: AreaBdrRtrStatus value must be true to create a virtual router interface. ASBdrRtrStatus When the ASBdrRtrStatus option is selected, the router is configured as an autonomous system boundary router (ASBR). ExternLsaCount The number of external (LS type 5) link state advertisements in the link state database. ExternLsaCksumSum The 32-bit unsigned sum of the LS checksums of the external link state advertisements contained in the link state database. This sum is used to determine if there has been a change in a router’s link state database and to compare the link state databases of two routers. OriginateNewLsas The number of new link state advertisements that have been originated. This number is incremented each time the router originates a new LSA. RxNewLsas The number of link state advertisements received that are determined to be new instantiations. This number does not include newer instantiations of self-originated link state advertisements. 10MbpsPortDefaultMetric Indicates the default cost to be applied to the 10 Mb/s interface (port). The default is 100. 100MbpsPortDefaultMetric Indicates the default cost to be applied to the 100 Mb/s interface (port). The default is 10. 1000MbpsPortDefaultMetric Indicates the default cost to be applied to the 1 000 Mb/s interface (port). The default is 1. 1000MbpsPortDefaultMetric Indicates the default cost to be applied to the 10 000 Mb/s interface (port). The default is 1. TrapEnable Indicates whether or not to enable traps relating to the OSPF. The default is false. Configuring IP Routing and Multicast Operations using Device Manager 180 Chapter 8 Configuring OSPF Table 34 General tab fields (continued) Field Description AutoVirtLinkEnable Enables or disables automatic creation of virtual links. The default is false. SpfHoldDownTime Changes the OSPF hold-down timer value (3 to 60 seconds). The default is 10 seconds. OspfAction Initiates a new SPF run to update the routing table. The default is none. LastSpfRun Used to indicate the time (SysUpTime) since the last SPF calculated by OSPF. Enabling or Disabling OSPF on a Router When configuring an interface for the OSPF protocol, OSPF must first be enabled globally and the interface assigned an IP address. After these two tasks have been completed, OSPF can be configured on the interface. To enable or disable OSPF globally on a router, perform the following task: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 In the AdminStat area, select the enabled option button to activate OSPF, or disabled to deactivate OSPF. 3 Click Apply. The OSPF protocol is enabled (or disabled) on this router. Table 34 on page 179 describes the General tab fields. 321712-B Rev 03 Chapter 8 Configuring OSPF 181 Manually Initiating an SPF Run From the OSPF General tab (IP Routing > OSPF) an SPF, or Dijkstra, run can be manually initiated to immediately update the OSPF link-state database. This is useful in such instances as: • • A deleted OSPF-learned route needs to be immediately restored. As a debug mechanism when the routing table’s entries and the link-state database are out of sync. To force an SPF run, perform the following procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 In the OSPF Action area, select the runSpf option button. 3 Click Apply. Device Manager displays a prompt confirming the SPF run request (Figure 66). Figure 66 Force SPF run dialog box 4 Click Yes to confirm the forced SPF run. The router performs the SPF run and the OSPF link state database is updated. Table 34 on page 179 describes the General tab fields. Configuring IP Routing and Multicast Operations using Device Manager 182 Chapter 8 Configuring OSPF Configuring OSPF Interfaces An OSPF interface, or link, is configured on an IP interface. In the Ethernet Routing Switch 1600 Series, an IP interface can be either a single link (brouter port) or a logical interface configured on a VLAN (multiple ports). The state information associated with the interface is obtained from the underlying lower-level protocols and the routing protocol itself. Before OSPF can be configured on a router interface, it must first be enabled globally on the router and the interface must be assigned an IP address. When an OSPF interface is enabled, it is designated as one of the following types: • • • broadcast (active) non-broadcast multiaccess (NBMA) passive Note: When an OSPF interface is enabled, the interface type cannot be changed. The interface must first be disabled and then the type can be changed and re-enabled. If it is an NBMA interface, the manually configured neighbors must first be deleted. This section includes the following topics: • • • • “Viewing OSPF Interface Information” on page 182 “Creating an OSPF Interface” on page 185 “Changing an OSPF Interface Type” on page 187 “Configuring OSPF NBMA Interfaces” on page 188 Viewing OSPF Interface Information To view OSPF interface information, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 321712-B Rev 03 Chapter 8 Configuring OSPF 183 2 Select the Interfaces tab. The OSPF dialog box—Interfaces tab appears (Figure 67). The Interfaces tab contains a large number of fields and all fields may not be viewable at once. Use the scroll bars located above the dialog buttons to view all fields. Figure 67 OSPF dialog box—Interfaces tab Table 35 describes the OSPF dialog box—Interfaces tab fields. Table 35 OSPF dialog box—Interfaces tab fields Field Description IpAddress IP address of the current OSPF interface AddressLessIf Designates whether an interface has an IP address. Interfaces with an IP address = 0 Interfaces without IP address = ifIndex AreaId Dotted decimal value to designate the OSPF area name. For VLANs, keeping the default area setting on the interface causes the LSDB to be inconsistent. Note: The area name is not related to an IP address. You can use any value for the OSPF area name (for example, 1.1.1.1 or 200.200.200.200). AdminStat Current administrative state of the OSPF interface (enabled or disabled). State Current DR state of the OSPF interface (DR, BDR, OtherDR) Configuring IP Routing and Multicast Operations using Device Manager 184 Chapter 8 Configuring OSPF Table 35 OSPF dialog box—Interfaces tab fields Field Description Rtrpriority OSPF priority for the interface during the election process for the designated router. The interface with the highest priority number is the designated router. The interface with the second-highest priority becomes the backup designated router. If the priority is 0, the interface cannot become the designated router or the backup. The priority is used only during election of the designated router and backup designated router. The range is 0 to 255. The default is 1. DesignatedRouter IP address of the router elected by the Hello Protocol to send link state advertisements on behalf of the NBMA network. BackupDesignatedRouter IP address of the router elected by the Hello Protocol to send link state advertisements on behalf of the NBMA network if the designated router fails. Type Type of OSPF interface (broadcast, nbma, or passive) AuthType Type of authentication required for the interface. • none = No authentication required. • simple password = All OSPF updates received by the interface must contain the authentication key specified in the interface AuthKey field. • MD5 authentication = All OSPF updates received by the interface must contain the md5 key. AuthKey Key (up to 8 characters) required when simple password authentication is specified in the interface AuthType field. HelloInterval Length of time, in seconds, between hello packets. This value must be the same for all routers attached to a common network. The default is 10 seconds. Note: When you change the Hello interval values, you must save the configuration file and reboot the switch for the values to be restored and checked for consistency. TransitDelay Length of time, in seconds, between 1 and 3 600, required to transmit an LSA update packet over the interface. RetransInterval Length of time, in seconds, between 1 and 3 600, required between LSA retransmissions. RtrDeadInterval Interval used by adjacent routers to determine if the router has been removed from the network. This interval must be identical on all routers on the subnet and a minimum of four times the Hello Interval. To avoid interpretability issues, the RtrDeadInterval value for the OSPF interface needs to match with the RtrDeadInterval value for the OSPF virtual interface.The default is 40 seconds. 321712-B Rev 03 Chapter 8 Configuring OSPF 185 Table 35 OSPF dialog box—Interfaces tab fields Field Description PollInterval Length of time, in seconds, between hello packets sent to an inactive OSPF router. Events Number of state changes or error events that have occurred through all interfaces. Creating an OSPF Interface To create an OSPF interface, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Interfaces tab. The Interfaces tab appears (Figure 67 on page 183). 3 Click Insert. The OSPF, Insert Interfaces dialog box appears (Figure 68 on page 186). Configuring IP Routing and Multicast Operations using Device Manager 186 Chapter 8 Configuring OSPF Figure 68 OSPF Insert Interfaces dialog box 4 Select the IP address for the interface from the IP Address list. 5 In the Type area, select the option button that represents the type of OSPF interface to create (broadcast, NBMA, or passive). 6 Designate a router priority by entering a value in the RtrPriority field. 7 Designate values for the HelloInterval, RtrDeadInterval, or PollInterval by typing them into the appropriate fields. 8 Define interface authentication by selecting either the none, simplePassword, or md5 option button in the AuthType area. If simplePassword is chosen, type a password of up to eight characters in the AuthKey field. 9 Click Insert. 10 Click Apply. 321712-B Rev 03 Chapter 8 Configuring OSPF 187 Changing an OSPF Interface Type When an OSPF interface is enabled, the interface type cannot be changed. The interface must first be disabled, the type changed, and the interface reenabled. Additionally, if it is an NBMA interface, the manually configured neighbors must first be deleted. To change an OSPF interface, type follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 If the interface is an NBMA interface, the manually configured neighbors must first be deleted. To delete the manually configured neighbors, do the following: a Select the Neighbors tab (Figure 69). Figure 69 Neighbors tab—NBMA manually-configured neighbors b Select the neighbors with a value of permanent in the ospfNbmaNbrPermanence column. c Click Delete. The manually-configured neighbors are deleted. 3 Select the Interfaces tab. The Interfaces tab appears (Figure 67 on page 183). 4 To disable the interface, select the AdminStat field, and select disabled from the list. 5 Click Apply. Configuring IP Routing and Multicast Operations using Device Manager 188 Chapter 8 Configuring OSPF The interface is disabled. 6 To change the interface type, select the Type field, and select the new interface type (broadcast, passive, or nbma) from the list. 7 Click Apply. The interface type is changed. 8 To enable the interface, select the AdminStat field, and choose enabled from the list. 9 Click Apply. The interface is enabled as the new type. Configuring OSPF NBMA Interfaces In contrast to a broadcast network, where some OSPF protocol packets are multicast (sent to AllSPFRouters and AllDRouters), NBMA packets are replicated and sent to each neighboring router as unicast. NBMA networks drop all OSPF packets with destination addresses AllSPFRouters and AllDRouters. Because the NBMA network does not broadcast, a list of neighbors and their priorities must be manually configured for all routers in the network that are eligible to become the DR (those with a positive, non-zero router priority). Before you begin this configuration, identify the following: • • • • • • Specific interfaces to be included in the NBMA network IP address for each interface Router priority for each interface HelloInterval for the network RtrDeadInterval for the network PollInterval for the network After this information has been gathered, the interfaces can be configured and neighbors added for each interface that is eligible to become the DR (those with a positive, non-zero router priority). 321712-B Rev 03 Chapter 8 Configuring OSPF 189 This section includes the following topics: • • “Adding NBMA Neighbors” on page 189 “Viewing OSPF Neighbor Information” on page 190 Adding NBMA Neighbors An NBMA interface that has a positive, non-zero router priority is eligible to become the DR for the NBMA network and is configured with the identification of all attached routers, their IP addresses, and their router priorities. To add neighbors for an OSPF NBMA interface, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Interfaces tab. The Interfaces tab appears (Figure 67 on page 183). 3 Select an NBMA interface with a positive, non-zero router priority. 4 Select the Neighbors tab. The Neighbors tab appears (Figure 70). Figure 70 OSPF dialog box—Neighbors tab 5 Click Insert. The OSPF, Insert Neighbors dialog box appears (Figure 71). Configuring IP Routing and Multicast Operations using Device Manager 190 Chapter 8 Configuring OSPF Figure 71 OSPF, Insert Neighbors dialog box 6 Enter the IP address and priority for the neighbor. 7 Click Insert. The neighbor is added to the Neighbors tab. 8 Repeat step 6 for all neighbors. 9 Click Apply. The neighbors are configured for this NBMA interface. 10 To configure neighbors for other NBMA interfaces eligible to become DR (those with a positive, non-zero router priority), repeat Steps 1-8. The neighbors are configured for the NBMA network. Viewing OSPF Neighbor Information Two routers that have interfaces to a common network are called neighbors and appear on each other’s Neighbors tab. Neighbor relationships are maintained, and usually dynamically discovered, by OSPF’s Hello Protocol. The exception is that, in an NBMA network, permanent neighbors are manually configured on each router eligible to become the DR. To view the OSPF neighbors, do the following: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Neighbors tab. The Neighbors tab appears (Figure 70 on page 189). 321712-B Rev 03 Chapter 8 Configuring OSPF 191 Table 36 describes the Neighbors tab fields. Table 36 Neighbors tab fields Field Descriptions IpAddr The neighbor IP address. AddressLessIndex On an interface having an IP address, zero. On addressless interfaces, the corresponding value of ifIndex in the Internet standard MIB. On row creation, this value is derived from the instance. Rtrld The router ID of the neighboring router, which in OSPF has the same format as an IP address but identifies the router independent of its IP address. Options A bit mask corresponding to the neighbor’s options field. Priority Assignment of preferential treatment to place the transmitted packets in queues and possible selection of the priority field in the data-link header when the packet is forwarded. State The OSPF Interface state. Events The number of state changes or error events that have occurred between the OSPF router and the neighbor router. LSRetransQLen The number of elapsed seconds between advertising retransmissions of the same packet to a neighbor. ospfNbmaNbrPermanence Indicates whether the neighbor is a manually-configured NBMA neighbor. HelloSuppressed This variable indicates whether Hellos to a neighbor are being suppressed. Managing an OSPF VLAN interface From the VLAN dialog box, an IP address can be assigned to an OSPF port and specific OSPF interface configurations can be made. When configuring an interface for the OSPF protocol, first enable OSPF globally on the router and then assign an IP address. For instructions about globally enabling OSPF, refer to “Enabling or Disabling OSPF on a Router” on page 180. This section includes the following topics: • • “Assigning an IP address to a VLAN Interface” on page 192 “Configuring OSPF on a VLAN interface” on page 193 Configuring IP Routing and Multicast Operations using Device Manager 192 Chapter 8 Configuring OSPF • “Graphing OSPF Interface Statistics” on page 193 Assigning an IP address to a VLAN Interface To assign an IP address to a VLAN interface, follow this procedure: 1 From the Device Manager menu bar, select VLAN > VLANs. The VLAN dialog box appears with the Basic tab displayed (Figure 72). Figure 72 VLAN dialog box—Basic tab 2 Select a VLAN by clicking in a column of the desired row. 3 Click IP. The IP VLAN dialog box appears with the IP Address tab displayed (Figure 73). Figure 73 VLAN dialog box—IP Address tab 4 Click Insert. The VLAN, Insert IP Address dialog box appears (Figure 74). 321712-B Rev 03 Chapter 8 Configuring OSPF 193 Figure 74 VLAN, Insert IP Address dialog box 5 In the IpAddress field, type the interface IP Address. 6 Enter the subnet mask in the Net Mask field or press the Tab key to have one automatically calculated and inserted. 7 Click Insert. The IP Address is assigned to the selected VLAN interface. Configuring OSPF on a VLAN interface To enable and configure OSPF on a VLAN interface, follow these steps: 1 From the Device Manager menu bar, select VLAN > VLANs. The VLAN dialog box appears with the Basic tab displayed (Figure 72 on page 192). 2 Select a VLAN by clicking in a column of the appropriate row. 3 Click IP. The IP, VLAN dialog box appears with the IP Address tab displayed (Figure 73 on page 192). 4 Select the OSPF tab. The OSPF tab appears (Figure 75). Configuring IP Routing and Multicast Operations using Device Manager 194 Chapter 8 Configuring OSPF Figure 75 VLAN dialog box—OSPF tab 5 In the IfType area, select the option button that corresponds to the type of interface to create (broadcast, nbma, or passive). 6 Select the Enable check box. 7 Designate a router priority in the DesigRtrPriority field. 8 Designate values for the HelloInterval, RtrDeadInterval, and PollInterval fields. 9 Enable authentication for the interface by selecting either the simplePassword or md5 option buttons in the AuthType area. If simplePassword is chosen, type a password of up to eight characters in length in the AuthKey field. 10 Click Apply. OSPF is configured for the VLAN. Graphing OSPF Interface Statistics To graph OSPF statistics on a VLAN interface, perform the following procedure: 321712-B Rev 03 Chapter 8 Configuring OSPF 195 1 Select VLAN > VLANS from the Device Manager menu. The VLAN dialog box appears with the Basic tab selected. 2 Select a VLAN from those listed on the Basic tab by clicking in a column of the applicable row. 3 Click IP. The IP, VLAN dialog box appears with the IP Address tab selected. 4 Select the OSPF tab. 5 Click Graph. Note: OSPF statistics are not available if OSPF is not enabled on the switch. Access to these statistics are only available after the Enable check box on the OSPF tab is selected. The OSPF Stats Default dialog box appears. This tab is illustrated in Figure 76. Configuring IP Routing and Multicast Operations using Device Manager 196 Chapter 8 Configuring OSPF Figure 76 OSPF Stats Default dialog Table 37 describes the fields on this dialog. Table 37 OSPF Stats Default fields Field Description VersionMismatches Indicate the number of version mismatches received by this interface. AreaMismatches Indicates the number of area mismatches received by this interface. AuthTypeMismatches Indicates the number of AuthType mismatches received by this interface. AuthFailures Indicates the number of Authentication failures. NetMaskMismatches Indicates the number of NetMask mismatches received by this interface. HelloIntervalMismatches Indicates the number of HelloInterval mismatches received by this interface. 321712-B Rev 03 Chapter 8 Configuring OSPF 197 Table 37 OSPF Stats Default fields (continued) Field Description DeadIntervalMismatches Indicates the number of DeadInterval mismatches received by this interface. OptionMismatches Indicates the number of Option mismatches received by this interface. RxHellos Indicates the number of hello packets received by this interface. RxDBDescrs Indicates the number of database descriptor packets received by this interface. RxLSUpdates Indicates the number of link state update packets received by this interface. RxLSReqs Indicates the number of link state request packets received by this interface. RxLSAcks Indicates the number of link state acknowledge packets received by this interface. TxHellos Indicates the number of hello packets transmitted by this interface. TxDBDescrs Indicates the number of database descriptor packets transmitted by this interface. TxLSUpdates Indicates the number of link state update packets transmitted by this interface. TxLSReqs Indicates the number of link state request packets transmitted by this interface. TxLSAcks Indicates the number of link state acknowledge packets transmitted by this interface. Managing OSPF Area Information With OSPF, collections of contiguous networks and hosts can be grouped together. Such a group, together with the routers having interfaces to any of the included networks, is called an area. Each area runs a separate copy of the basic link-state routing algorithm. This means that each area has its own link-state database. This section includes the following topics: • “Viewing OSPF Area Information” on page 199 Configuring IP Routing and Multicast Operations using Device Manager 198 Chapter 8 Configuring OSPF • 321712-B Rev 03 “Creating a Stub Area or NSSAs” on page 200 Chapter 8 Configuring OSPF 199 Viewing OSPF Area Information To view information about OSPF areas, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Areas tab The Areas tab appears (Figure 77). Notice that the backbone ID is always displayed as 0.0.0.0. Figure 77 OSPF dialog box—Areas tab Table 38 describes the Areas tab fields. Table 38 Areas tab fields Field Description AreaId A 32-bit integer uniquely identifying an area. Area ID 0.0.0.0 is used for the OSPF backbone. For VLANs, keeping the default area setting on the interface causes the LSDB to be inconsistent. ImportAsExtern The area’s support for importing AS external link state advertisements. Can be importExternal (default), importNotExternal, or importNssa (not-so-stubby area). SpfRuns Used to indicate the number of SPF calculations performed by OSPF. AreaBdrRtrCount The total number of area border routers reachable within this area. The value, initially zero, is calculated in each SPF Pass. Configuring IP Routing and Multicast Operations using Device Manager 200 Chapter 8 Configuring OSPF Table 38 Areas tab fields (continued) Field Description AsBdrRtrCount The total number of autonomous system border routers reachable within this area. The value, initially zero, is calculated in each SPF Pass. AreaLsaCount The total number of link state advertisements in this area’s link state database, excluding AS External LSAs. AreaLsaCksumSum The 32-bit unsigned sum of the link state advertisements. This sum excludes external (LS type 5) link state advertisements. The sum is used to determine if there has been a change in a router’s link state database and to compare the link state database of two routers. AreaSummary The area's support for summary advertisements in a stub area. In instances where summary advertisements into the stub area are enabled, the OSPF administrative status must also be toggled to complete the task. ActiveifCount The number of active interfaces in this area. Creating a Stub Area or NSSAs A stub area does not receive advertisements for external routes, which reduces the size of the link state database. A stub area has only one area border router. Any packets destined outside the area are simply routed to that area border exit point, examined by the area border router, and forwarded to a destination. A not-so-stubby area (NSSA) also prevents the flooding of AS-External Link State advertisements into the area by replacing them with a default route. The added feature of NSSAs is the ability to import small stub (non-OSPF) routing domains into OSPF. To create a stub area or NSSA, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Areas tab. The Areas tab appears (Figure 77 on page 199). 321712-B Rev 03 Chapter 8 Configuring OSPF 201 3 Click in the ImportAsExtern field and use the list to select either importExternal, ImportNoExternal, or importNssa. 4 Click Apply. Table 38 on page 199 describes the Areas tab fields. Creating a Virtual Link When using OSPF with the Ethernet Routing Switch 1600 Series, the router needs to be connected directly to the backbone. If the router is not directly connected, a virtual link must be created, either manually or automatically. When automatic virtual linking is enabled, it acts as insurance. A virtual link is created for vital traffic paths in the OSPF configuration if something goes wrong, such as when an interface cable providing connection to the backbone (either directly or indirectly) becomes disconnected from the switch. Specifying automatic virtual linking ensures that a link is created via another switch. When automatic virtual linking is enabled, it is always ready to create a virtual link. If automatic virtual linking uses more network resources than is desired, creating a manual virtual link may be the better solution. This approach conserves resources while having specific control of where virtual links are placed in the OSPF configuration. OSPF behavior has been modified according to OSPF standards so that OSPF routes cannot be learned through an area border router (ABR) unless it is connected to the backbone or through a virtual link. This section includes the following topics: • • • • “Managing an Automatic Virtual Link” on page 201 “Configuring a Manual Virtual Link” on page 202 “Viewing Virtual Links on Neighboring Devices” on page 204 “Configuring Router Hosts” on page 205 Managing an Automatic Virtual Link To specify that virtual links be created automatically, follow this procedure: Configuring IP Routing and Multicast Operations using Device Manager 202 Chapter 8 Configuring OSPF 1 Select IP Routing > OSPF from the Device Manager menu bar. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the AutoVirtLinkEnable check box. By default, this feature is set to false, and virtual links are not created automatically. 3 Click Apply. Configuring a Manual Virtual Link To manually configure a virtual link, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Virtual If tab. The Virtual If tab appears (Figure 78). Figure 78 OSPF dialog box—Virtual If tab 3 Click Insert. The OSPF, Insert Virtual If dialog box appears (Figure 79). 321712-B Rev 03 Chapter 8 Configuring OSPF 203 Figure 79 OSPF, Insert Virtual If dialog box 4 Specify the area identification of the transit area in the AreaID field. The transit area is the common area between two ABRs. 5 Specify the neighbor identification in the Neighbor field. The neighbor identification is the IP router identification of the ABR that the other ABR needs to go through to get to the backbone. 6 Specify the other field values as appropriate for the virtual link. 7 Click Insert. To verify that the virtual link is active, refresh the Virtual If tab and check the State field. If the State field displays point to point, the virtual link is active. If the State column displays down, the virtual link is configured incorrectly. Table 40 describes the Virtual If tab fields. Table 39 OSPF dialog box—Virtual If tab fields Field Description AreaId The Transit Area Id that the virtual link traverses. Neighbor The router ID of the virtual neighbor. TransitDelay The estimated number of seconds it takes to transmit a link- state update packet over this interface. Configuring IP Routing and Multicast Operations using Device Manager 204 Chapter 8 Configuring OSPF Table 39 OSPF dialog box—Virtual If tab fields (continued) Field Description Retrans Interval The number of seconds between link-state advertisements and retransmissions for adjacencies belonging to this interface. This value is also used when retransmitting database descriptions and link-state request packets. Set this value to be well over the expected round- trip time. HelloInterval The length of time, in seconds, between the Hello packets that the router sends on the interface. This value must be the same for the virtual neighbor. RtrDeadInterval The length of time, in seconds, that must elapse following receipt of the last Hello packet from this router before a neighbor can declare this router down. Set this value to some multiple of the Hello interval. This value must be the same for the virtual neighbor. State The OSPF virtual interface states. Events The number of state changes or error events on this Virtual Link. AuthType The authentication type specified for a virtual interface. Additional authentication types may be assigned locally. AuthKey If Authentication Type is a simple password, the device will left adjust and zero fill to 8 octets. Note that unauthenticated interfaces need no authentication key and simple password authentication cannot use a key of more than 8 octets. Viewing Virtual Links on Neighboring Devices Use the Virtual Neighbors tab to view the area and virtual link configuration for neighboring devices. To view the virtual neighbor, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Virtual Neighbors tab. The Virtual Neighbors tab appears (Figure 80). 321712-B Rev 03 Chapter 8 Configuring OSPF 205 Figure 80 OSPF dialog box—Virtual Neighbor tab Table 40 describes the Virtual Neighbors tab fields. Table 40 OSPF dialog box—Virtual Neighbor tab fields Field Description Area The subnetwork in which the virtual neighbor resides. RtrId A 32-bit integer (represented as a type IpAddress) uniquely identifying the neighboring router in the autonomous system. IpAddr The IP address of the virtual neighboring router. Options A bit mask corresponding to the neighbor’s options field. State The OSPF interface state. Events The number of state changes or error events that have occurred between the OSPF router and the neighbor router. LsRetransQLen The number of elapsed seconds between advertising retransmissions of the same packet to a neighbor. HelloSuppressed This field indicates whether or not Hellos are being suppressed to the neighbor. Configuring Router Hosts It is possible to specify which hosts are directly attached to the router and the metrics and types of service that can be advertised for them. To configure router hosts, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. Configuring IP Routing and Multicast Operations using Device Manager 206 Chapter 8 Configuring OSPF The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Hosts tab. The Hosts tab appears (Figure 81). Figure 81 OSPF dialog box—Hosts tab 3 Click Insert. The Insert Hosts dialog box appears (Figure 82). Figure 82 OSPF, Insert Hosts dialog box 4 Enter an IP address for the host in the IpAddress field and a metric for the host in the Metric field. 5 Click Insert. The Hosts tab is updated with the new host entry. 321712-B Rev 03 Chapter 8 Configuring OSPF 207 Table 41 describes the Hosts tab fields. Table 41 Host tab fields Field Description IpAddress The IP address of the host used to represent a point of attachment in a TCP/IP internetwork. TOS The type of service of the route being configured. Metric The metric advertised to other areas. The value indicates the distance from the OSPF router to any network in the range. AreaID Area where the host is found. By default, the area that is submitting the OSPF interface is in 0.0.0.0. Specifying ASBRs ASBRs advertise non-OSPF routes into OSPF domains so that they can be passed along throughout the OSPF routing domain. A router can function as an ASBR if one or more of its interfaces is connected to a non-OSPF network (for example, RIP, or EGP). To conserve resources, it may be advisable to limit the number of ASBRs in the network or to specifically control which routers perform as ASBRs to control traffic flow. To specify a router ASBR function, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the ASBdrRtrStatus check box to designate the router as an ASBR or deselect it to remove that status. 3 Click Apply. Configuring IP Routing and Multicast Operations using Device Manager 208 Chapter 8 Configuring OSPF Configuring Metric Speed The metric speed can be configured globally or for specific ports and interfaces on the network. In addition, redistribution options between non-OSPF interfaces and OSPF interfaces can be configured. This section includes the following topics: • • “Configuring Global Default Metric Speed” on page 208 “Managing Metrics with the Peer Layer Interface” on page 208 Configuring Global Default Metric Speed To change the default metric speed on specific port types: 1 Select IP Routing > OSPF from the Device Manager menu bar. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Change the metric value in one or all of the following fields: • • • • 3 10MbpsPortDefaultMetric (default = 100) 100MbpsPortDefaultMetric (default = 10) 1000MbpsPortDefaultMetric (default = 1) 10000MbpsPortDefaultMetric (default = 1) Click Apply. Managing Metrics with the Peer Layer Interface The If Metrics tab indicates the metrics associated with the peer layer interface. To specify the metric speed, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 321712-B Rev 03 Select the If Metrics tab. Chapter 8 Configuring OSPF 209 The If Metrics tab appears (Figure 83). Figure 83 OSPF dialog box—If Metrics tab 3 Specify a new metric speed in the Value field. 4 Click Apply. Table 42 describes the If Metrics tab fields. Table 42 If Metrics tab fields Field Description IpAddress The Internet Protocol address of the device used to represent a point of attachment in a TCP/IP internetwork. AddressLessIf For the purpose of easing the instancing of addressed and addressless interfaces. This variable takes the value 0 on interfaces with IP addresses and the corresponding value of ifIndex for interfaces having no IP address. TOS Type of service is a mapping to the IP type of service flags, as defined in the IP forwarding table MIB. Value The value advertised to other areas indicating the distance from the OSPF router to any network in the range. Status Active or not active. Not configurable. Configuring IP Routing and Multicast Operations using Device Manager 210 Chapter 8 Configuring OSPF Viewing Stub Area Metrics The Stub Area Metrics tab contains the set of metrics that are advertised by a default area border router into a stub area. To view the set of stub area metrics, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Stub Area Metrics tab. The Stub Area Metrics tab appears (Figure 84). Figure 84 OSPF dialog box—Stub Area Metrics tab Table 43 describes the Stub Area Metrics tab fields. Table 43 Stub Area Metrics tab fields Field Description AreaID The 32-bit identifier for the stub area. On creation, it can be derived from the instance. TOS The type of service associated with the metric. On creation, it can be derived from the instance. Metric The metric value applied at the indicated type of service. By default, it equals the lowest metric value at the type of service among the interfaces to other areas. Status Active or not active. Not configurable. 321712-B Rev 03 Chapter 8 Configuring OSPF 211 Viewing Advertisements in the link state database To view the advertisements of the areas throughout the link state database, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Link State Database tab. The Link State Database tab appears (Figure 85). Figure 85 OSPF dialog box—Link State Database tab Table 44 describes the Link State Database tab fields. Table 44 Link State Database tab fields Field Description AreaId A 32-bit integer uniquely identifying an area. Area ID 0.0.0.0 is used for the OSPF backbone. Type Displays the type of link advertisement by which the current link was discovered by the switch: • Router link (RTRLink) • Network link (NETLink) • Summary link (Summary) • Autonomous System link (ASSummary) Lsid The Link State ID is an LS type-specific field containing either a router ID or an IP address. It identifies the piece of the routing domain that is being described by the advertisement. Configuring IP Routing and Multicast Operations using Device Manager 212 Chapter 8 Configuring OSPF Table 44 Link State Database tab fields (continued) Field Description RouterId A 32-bit integer uniquely identifying the router in the autonomous system. Sequence The sequence number is a signed 32-bit integer that identifies old and duplicate link state advertisements. Age The age, in seconds, of the link state advertisement. Checksum This field is the checksum of the complete contents of the advertisement, excepting the age field. The age field is excepted so that an advertisement’s age can be incremented without updating the checksum. The checksum used is the same that is used for ISO connectionless datagrams. It is commonly referred to as the Fletcher checksum. Viewing the External Link State Database To view the characteristics of the external link state database, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Ext. Link State Database tab. The Ext. Link State Database tab appears (Figure 86). Figure 86 OSPF dialog box—Ext. Link State DB tab 321712-B Rev 03 Chapter 8 Configuring OSPF 213 Table 45 describes the Ext. Link State Database tab fields. Table 45 Ext. Link State DB tab fields Field Description Type Displays the type of link advertisements by which the current link was discovered by the switch: • AS External Route (asExternalLink) Lsid The Link State ID is an LS type-specific field containing either a router ID or an IP address. It identifies the piece of the routing domain that is being described by the advertisement. RouterId A 32-bit integer uniquely identifying the router in the autonomous system. Sequence The sequence number is a signed 32-bit integer that identifies old and duplicate link state advertisements. Age The age in seconds of the link state advertisement. Checksum This field is the checksum of the complete contents of the advertisement, excepting the age field. The age field is excepted so that an advertisement’s age can be incremented without updating the checksum. The checksum used is the same that is used for ISO connectionless datagrams. It is commonly referred to as the Fletcher checksum. Advertisement Hex representation of the entire link state advertisement, including the header. Inserting OSPF Area Aggregate Ranges To insert OSPF area aggregate ranges, perform the following procedure: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Area Aggregate tab. The Area Aggregate tab appears (Figure 87). Configuring IP Routing and Multicast Operations using Device Manager 214 Chapter 8 Configuring OSPF Figure 87 OSPF dialog box—Area Aggregate tab 3 Click Insert. The OSPF, Insert Area Aggregate dialog box appears (Figure 88). Figure 88 OSPF, Insert Area Aggregate dialog box 4 Enter the area identification in the AreaID field. 5 Select either the summaryLink or nssaExternalLink option buttons in the LsdbType area to determine the link state database type. 6 Select either the advertiseMatching, doNotAdvertiseMatching, or advertiseDoNotAggregate option buttons in the Effect area. 7 In the AdvertiseMetric field, enter a cost value to advertise for the OSPF area range. 8 Click Insert. 321712-B Rev 03 Chapter 8 Configuring OSPF 215 Table 46 describes the Area Aggregate tab fields. Table 46 Area Aggregate tab fields Field Description AreaID The area in which the address is found. LsdbType One of the following: • summaryLink— aggregated summary link • nssaExternalLink —not-so-stubby area link IP Address The IP Address of the Net or Subnet indicated by the range. Mask Network mask for the area range. Effect One of the following: • advertiseMatching—advertise the aggregate summary LSA with same LSID. • doNotAdvertiseMatching—suppress all networks that fall within the entire range. • advertiseDoNotAggregate—advertise individual networks. AdvertiseMetric Changes the advertised metric cost value of the OSPF area range. Enter an integer value in the range 0 and 65 535, which represents the metric cost value for the OSPF area range. Configuring IP Routing and Multicast Operations using Device Manager 216 Chapter 8 Configuring OSPF Configuring an OSPF Redistribution Policy A redistribute entry for OSPF can be configured to announce routes of a certain source type, for example, static, RIP, or direct. If a route policy field is not configured for a redistribute entry, then the default action is taken on the basis of metric, metric-type, and subnet configured. This is called basic redistribution. Otherwise, use the route policy specified to perform detailed redistribution. If no redistribution entry is configured, no external LSA is generated for non-OSPF routes. Note: Changing OSPF Redistribute contexts is a process-oriented operation that can affect system performance and network reachability while performing the procedures. Therefore, Nortel recommends that if the default preferences are to be changed for an OSPF Redistribute context, do so before enabling the protocols. OSPF redistribution policies can be configured in two locations in the Device Manager: 1 IP Routing > OSPF > Redistribute tab 2 IP Routing > Policy > OSPF Redistribute tab Although the following procedure details using the IP Routing > OSPF > Redistribute tab, the steps are the same in the IP Routing > Policy > OSPF Redistribute tab. To set up or edit an OSPF redistribute policy, perform the following tasks: 1 From the Device Manager menu bar, select IP Routing > OSPF. The OSPF dialog box appears with the General tab displayed (Figure 65 on page 178). 2 Select the Redistribute tab. The Redistribute tab appears (Figure 89). 321712-B Rev 03 Chapter 8 Configuring OSPF 217 Figure 89 Policy dialog box—Redistribute tab 3 Click Insert. The Policy, Insert OSPF Redistribute dialog box appears (Figure 90). Figure 90 Policy, Insert OSPF Redistribute dialog box 4 Edit the fields provided. 5 Click Insert. Configuring IP Routing and Multicast Operations using Device Manager 218 Chapter 8 Configuring OSPF Table 47 describes the Policy, Insert OSPF Redistribute dialog box fields. Table 47 Policy, Insert OSPF Redistribute dialog box fields Field Description RouteSource Select the route source protocol for the redistribution entry. Enable Enables (or disables) an OSPF redistribute entry for a specified source type. You can also enable or disable this feature in the OSPF Redistribute tab of the Policy dialog box by clicking in the field and selecting enable or disable from the menu. Metric Set the OSPF route redistribution metric for basic redistribution. The value can be a range between 0 to 65 535. If configured as 0, the original cost of the route is used. MetricType Set the OSPF route redistribution metric type. The default is Type 2. You can also select your entry in the OSPF Redistribution tab of the Policy dialog box by clicking in the field and selecting any, type1, or type2 from the pulldown menu. Subnets Allows or suppresses external subnet routes while being redistributed into an OSPF domain. You can also select your entry in the OSPF Distribution tab of the Policy dialog box by clicking in the field and selecting allow or deny from the menu. RoutePolicy Sets the route policy by name to be used for the detailed redistribution of external routes from a specified source into an OSPF domain. Click the ellipse button and choose from the list in the Route Policy dialog box (Figure 90 on page 217). To deselect an entry, use the ALT key. 321712-B Rev 03 219 Chapter 9 Configuring UDP Forwarding UDP forwarding is a feature that selectively forwards UDP broadcasts received on an IP interface to either router IP interfaces (as a rebroadcast) or to a configured IP address. Generally speaking, the following steps must be performed to enable UDP forwarding on an Ethernet Routing Switch 1600 Series: 1 Create UDP protocol entries for each port receiving UDP broadcasts. 2 Create UDP forwarding entries for each protocol by specifying a destination IP address. 3 Create a UDP forwarding policy, by specifying one or more UDP forwarding entries. 4 Apply the UDP forwarding policy to a local interface. For conceptual information about UDP forwarding, refer to “IP routing and multicast concepts” on page 29. This section covers the following topics: • • • • “Creating UDP Protocol Entries” on page 219 “Configuring Forwarding Entries” on page 221 “Creating UDP Forwarding Policies” on page 223 “Applying UDP Forwarding Policies” on page 225 Creating UDP Protocol Entries Only ports that have configured UDP protocol entries are eligible for UDP forwarding. To create UDP protocol entries, follow this procedure: Configuring IP Routing and Multicast Operations using Device Manager 220 Chapter 9 Configuring UDP Forwarding 1 Select IP Routing > UDP Forwarding from the Device Manager menu bar. The UdpForwarding dialog box appears with the Protocols tab displayed (Figure 91). Figure 91 UdpForwarding dialog box—Protocols tab 2 Click Insert. The UdpForwarding, Insert Protocols dialog box appears (Figure 92). Figure 92 UdpForwarding, Insert Protocol dialog box 3 Enter the applicable port in the PortNumber field. 4 Type a name that describes the port function in the Name field. A unique name must be provided when creating a protocol, and this name cannot be modified later. To change the name of a UDP protocol, delete the protocol entry and then recreate it with the new name. 5 321712-B Rev 03 Click Insert. Chapter 9 Configuring UDP Forwarding 221 Table 48 describes the UdpForwarding dialog box—Protocols tab fields. Table 48 UdpForwarding dialog box—Protocols tab fields Field Description PortNumber The port number for the protocol. The range is 1 to 65 535. Name A descriptive name for the protocol. Configuring Forwarding Entries After you specify a UDP protocol entry, create a forwarding entry to specify the destination IP address for UDP broadcasts. The system automatically assigns a unique ID number for each forwarding entry. To configure forwarding entries, follow this procedure: 1 Select IP Routing > UDP Forwarding from the Device Manager menu bar. The UdpForwarding dialog box appears with the Protocols tab displayed (see Figure 91 on page 220). 2 Select the Forwardings tab. The Forwardings tab appears (Figure 93). Figure 93 UdpForwarding dialog box—Forwardings tab 3 Click Insert. The UdpForwarding, Insert Forwardings dialog box appears (Figure 94). Configuring IP Routing and Multicast Operations using Device Manager 222 Chapter 9 Configuring UDP Forwarding Figure 94 UdpForwarding, Insert Forwardings dialog box 4 Select the applicable entry in the DestPort field. 5 Enter the destination IP address in the DestAddr field. 6 Click Insert. Table 49 describes the UdpForwarding dialog box—Forwardings tab fields. Table 49 UdpForwarding dialog box—Forwardings tab fields Field Description DestPort The original destination port number. UDP broadcast packets sent to this port number are automatically forwarded to a new destination IP address. The destination port number must exist as a protocol before the forwarding entry is created. DestAddr The forwarding destination IP address for UDP broadcasts. The IP address is any IP server address or subnet broadcast address. The process used to forward a UDP broadcast depends on the type of IP address used. • If the IP address is a routable interface address on the router, then the frame is rebroadcast as a limited broadcast. • If the IP address is a server, then the received broadcast packet is sent as a unicast packet to this address. • If the IP address is a subnet broadcast address, then the received broadcast packet is routed as a subnet broadcast packet. Id The unique identification number assigned to each UDP forwarding entry. The system automatically assigns this number. NumFwd Packets The number of UDP broadcast packets forwarded using this forwarding entry. This is a read-only parameter. 321712-B Rev 03 Chapter 9 Configuring UDP Forwarding 223 Table 49 UdpForwarding dialog box—Forwardings tab fields (continued) Field Description NumDrop Packets TtlExpired The number of UDP broadcast packets dropped because the TTL expired. This is a read-only parameter. NumDrop Packets DestUnreach The number of UDP broadcast packets dropped because the forwarding IP address specified in the forwarding entry was unreachable. This is a read-only parameter. Creating UDP Forwarding Policies UDP forwarding policies are lists of forwarding entries that are applied to an interface. To configure UDP forwarding policies, do the following: 1 Select IP Routing > UDP Forwarding from the Device Manager menu bar. The UdpForwarding dialog box appears with the Protocols tab displayed (see Figure 91 on page 220). 2 Select the Forwarding Lists tab. The Forwarding Lists tab appears (Figure 95). Figure 95 UdpForwarding dialog box—Forwarding Lists tab 3 Click Insert. The UdpForwarding, Insert Forwarding Lists dialog box appears (Figure 96). Configuring IP Routing and Multicast Operations using Device Manager 224 Chapter 9 Configuring UDP Forwarding Figure 96 UdpForwarding, Insert Forwarding Lists dialog box 4 Enter a unique number for the UDP forwarding policy in the Id field. 5 Enter a unique name for the UDP forwarding policy in the Name field. 6 List the UDP forwarding entries to include in this list in the FwdIdList field. There are two ways to add multiple forwarding entries in this policy. • • 7 Manually enter multiple forwarding entries by typing each unique ID separated by commas. Automatically enter multiple forwarding entries by clicking the ellipse (...) button to select IDs from a list of existing forwarding entries. Click Insert. Table 50 describes the UdpForwarding dialog box—Forwarding Lists tab fields. Table 50 UdpForwarding dialog box—Forwarding Lists tab fields Field Description Id A unique identifier for the UDP forwarding policy. The range is 1 to 1 000. Name Identifies the UDP forwarding policy in the table. FwdIdList A list of one or more UDP forwarding entry IDs on this list, separated by commas. 321712-B Rev 03 Chapter 9 Configuring UDP Forwarding 225 Applying UDP Forwarding Policies To apply UDP forwarding policies to an interface, follow this procedure: 1 Select IP Routing > UDP Forwarding from the Device Manager menu bar. The UdpForwarding dialog box appears with the Protocols tab displayed (see Figure 91 on page 220). 2 Select the Broadcast Interfaces tab. The Broadcast Interfaces tab appears (Figure 97). Figure 97 UdpForwarding dialog box—Broadcast Interfaces tab 3 Click Insert. The UdpForwarding, Insert Broadcast Interfaces dialog box appears (Figure 98). Figure 98 UdpForwarding, Insert Broadcast Interfaces dialog box 4 Enter the IP address of a local interface in the LocalIfAddr field. Click the Addr button to select from a list of all existing local interfaces. Configuring IP Routing and Multicast Operations using Device Manager 226 Chapter 9 Configuring UDP Forwarding 5 Enter the ID of an existing forwarding list to use in the UdpPortFwdListId field. Click the IdList button to select from a list of all existing forwarding lists. 6 Enter the maximum TTL value for UDP broadcasts on this interface in the MaxTtl field. 7 Enter the IP address to use as a broadcast mask for this interface in the BroadCastMask field. 8 Click Insert. Table 51 describes the UdpForwarding dialog box—Broadcast Interfaces tab fields. Table 51 UdpForwarding dialog box—Broadcast Interfaces tab fields Field Description LocalIfAddr The IP address of the local interface that can receive UDP/TCP broadcast packets. This IP address must be a routable interface IP address. UdpPortFwd ListId The UDP forwarding policy ID applied to the local interface. A UDP forwarding policy can be used by any number of interfaces. The range is 1 to 100. MaxTtl The maximum TTL value for a forwarded broadcast packet. This value restricts the number of routers a forwarded broadcast can traverse before it expires. The acceptable range is 1 to 16. The default is 4. NumRxPkts Number of UDP/TCP broadcasts received. NumFwdPkts Number of UDP/TCP broadcasts forwarded. NumDropPkts MaxTtlExpired Number of UDP/TCP broadcasts dropped because the TTL value expired. NumDropPkts DestUnreach Number of UDP/TCP broadcasts dropped because the destination IP address was unreachable. NumDropPkts UnknownPort Number of UDP/TCP broadcasts dropped due to unknown UDP protocol. BroadCast Mask The IP address used for a broadcast mask for this interface. 321712-B Rev 03 227 Chapter 10 Configuring IGMP Internet Group Management Protocol (IGMP) is used by hosts to report their multicast group memberships to neighbor multicast routers. For more information about IGMP concepts and terminology, refer to “IP routing and multicast concepts” on page 29. This section includes the following topics: • • • • • • • • • • • “Configuring IGMP on a VLAN” on page 227 “IGMP Snooping on a VLAN” on page 230 “Global IGMP Configuration” on page 231 “Viewing IGMP Cache Information” on page 231 “IGMP Interface Table” on page 233 “Multicast Router” on page 236 “Viewing IGMP Snoop Information” on page 238 “Viewing IGMP Dynamic Group Information” on page 240 “IGMP Static Information” on page 241 “Multicast Access Control Configuration” on page 243 “Viewing IGMP Sender Entries” on page 245 Configuring IGMP on a VLAN To configure IGMP on a VLAN, follow this procedure: 1 From the Device Manager menu bar, select VLAN > VLANs. The VLAN dialog box appears with the Basic tab displayed (see Figure 22 on page 93). Configuring IP Routing and Multicast Operations using Device Manager 228 Chapter 10 Configuring IGMP 2 Select a VLAN by clicking in a column of the desired row. 3 Click IP. The IP, VLAN dialog box appears with the IP Address tab displayed (see Figure 23 on page 93). 4 Select the IGMP tab. The IGMP tab appears (Figure 99). Figure 99 IP, VLAN dialog box—IGMP tab 5 Using the fields provided, set the desired IGMP parameters. 6 Click Apply. 321712-B Rev 03 Chapter 10 Configuring IGMP 229 Table 52 describes the fields in the IGMP tab. Table 52 IGMP tab fields Field Description QueryInterval The frequency (in seconds) at which IGMP host query packets are transmitted on the interface. The range is from 1 to 65 535, and the default is 125. QueryMaxResponseTime The maximum response time (in 1/10 seconds) advertised in IGMPv2 general queries on this interface. This field is a read-only field and is not configurable in the Ethernet Routing Switch 1600 Series. Robustness This parameter allows tuning for the expected packet loss of a network. This value is equal to the number of expected query packet losses per serial query interval, plus 1. If a network is expected to lose query packets, increase the robustness value. The range is from 2 to 255, and the default is 2. The default value of 2 means that one query per query interval may be dropped without the querier aging out. SnoopEnable Enables snoop. ProxySnoopEnable Enables proxy snoop. Version The version of IGMP (1 or 2) that you want to configure on this interface. For IGMP to function correctly, all routers on a LAN must use the same version. The default is version 2. FastLeaveEnable Enables fast leave on the interface. FastLeavePortMembers The set of ports that are enabled for fast leave. SnoopMRouterPorts The set of ports in this interface that statically configures non-query IGMP router ports. You do not have to configure this parameter if there is only one multicast router on that interface (VLAN). Note: The values for the IGMP parameters, QueryInterval, Robustness, and Version, must be the same as those configured on the interface (VLAN) of the multicast router. Configuring IP Routing and Multicast Operations using Device Manager 230 Chapter 10 Configuring IGMP IGMP Snooping on a VLAN The Ethernet Routing Switch 1600 Series can provide IP multicast capability as a Layer 2 switch. Functioning as a Layer 2 switch, it supports IGMPv1 and IGMPv2 to prune group membership per port within a VLAN. This feature is called IGMP snoop and it provides optimization of the multicast data flow for a group within a VLAN to only those ports that are members of the group. The switch builds a database of group members by listening to IGMP reports from each port. It suppresses the reports heard by not forwarding them out to ports other than the one receiving the report, forcing the members to continuously send their own reports. The switch relays group membership from the hosts to the multicast routers. It forwards queries from multicast routers to all port members of the VLAN. Furthermore, it forwards multicast data only to the participating group members and to the multicast routers within the VLAN. Enabling IGMP Snooping To enable IGMP snooping, do the following: 1 From the Device Manager menu bar, select VLAN > VLANs. The VLAN dialog box appears with the Basic tab displayed (see Figure 22 on page 93). 2 Select a VLAN by clicking in a column of the desired row. 3 Click IP. The IP, VLAN dialog box appears with the IP Address tab displayed (see Figure 23 on page 93). 4 Select the IGMP tab. The IGMP tab appears (see Figure 99 on page 228). 5 Select the SnoopEnable check box. 6 Select the ProxySnoopEnable check box. 7 Click Apply. 321712-B Rev 03 Chapter 10 Configuring IGMP 231 Global IGMP Configuration The Global tab is used to access global IGMP configuration parameters. To configure these parameters, perform the following: 1 Select IP Routing > IGMP from the Device Manager menu. The IGMP dialog box appears with the Global tab displayed (Figure 100). Figure 100 IGMP dialog box—Global tab 2 Enable or disable the generation of IGMP traps by selecting either the enable or disable check box in the GenerateTrap area. 3 Click Apply. Viewing IGMP Cache Information To view IGMP cache information, do the following: 1 Select IP Routing > IGMP from the Device Manager menu. The IGMP dialog box appears with the Globals tab displayed (Figure 101). Configuring IP Routing and Multicast Operations using Device Manager 232 Chapter 10 Configuring IGMP Figure 101 IGMP dialog box—Global tab 2 Select the Cache tab. The Cache tab appears (Figure 102). 321712-B Rev 03 Chapter 10 Configuring IGMP 233 Figure 102 IGMP dialog box—Cache tab Table 53 describes the Cache tab fields. Table 53 Cache tab fields Field Description Address The IP multicast group address for which this entry contains information. IfIndex The interface from which the corresponding multicast group address is heard. LastReporter The IP address of the source of the last membership report received for this IP multicast group address on this interface. If no membership report has been received, the object has the value 0.0.0.0. ExpiryTime The amount of time (in seconds) remaining before this entry is aged out. Version1Host Timer The time remaining until the local router assumes that there are no longer any IGMP version 1 members on the IP subnet attached to the interface. Upon hearing any IGMPv1 membership report, this value is reset to the group membership timer. When the time remaining is nonzero, the local router ignores any IGMPv2 leave messages for this group that it receives on this interface. IGMP Interface Table Use the Interface tab to view or edit the IGMP interface table. When a particular interface does not have an IP address, that interface entry does not appear in the IGMP table. To view or edit the IGMP interface table, do the following: Configuring IP Routing and Multicast Operations using Device Manager 234 Chapter 10 Configuring IGMP 1 From the Device Manager menu bar, choose IP Routing > IGMP. The IGMP dialog box appears with the Globals tab displayed (see Figure 101 on page 232). 2 Select the Interface tab. The Interface tab appears (Figure 103). The Interface tab has a large number of fields on it. Use the scroll bar located above the dialog buttons to view all fields. Figure 103 IGMP dialog box—Interface tab 321712-B Rev 03 Chapter 10 Configuring IGMP 235 Table 54 describes the Interface tab fields. Table 54 IGMP dialog box—Interface tab fields Field Description IfIndex The interface on which IGMP is enabled. QueryInterval The frequency (in seconds) at which IGMP host query packets are transmitted on the interface. The range is from 1 to 65 535, and the default is 125. Status Indicates whether or not the interface is active. Note that it becomes active if there are any active (that is, forwarding) ports on the interface. If the VLAN has no port members or if all of the port members are disabled, the status is notInService. Version The version of IGMP (1 or 2) that you want to configure on this interface. For IGMP to function correctly, all routers on a LAN must use the same version. The default is version 2. OperVersion The version of IGMP currently running on this interface. Querier The address of the IGMP querier on the IP subnet to which this interface is attached. QueryMaxResponseTime The maximum response time (in 1/10 seconds) advertised in IGMPv2 general queries on this interface. This field is a read-only field and is not configurable in the Ethernet Routing Switch 1600 Series. WrongVersionQueries The number of queries received with an IGMP version that does not match the interface. IGMP requires that all routers on a LAN be configured to run the same version of IGMP. If any queries are received with the wrong version, it indicates a version mismatch. Joins The number of times a group membership has been added on this interface; that is, the number of times an entry for this interface has been added to the cache table. This number gives an indication of the amount of IGMP activity over time. Robustness Tuning for the expected packet loss of a network. This value is equal to the number of expected query packet losses per serial query interval, plus 1. If a network is expected to lose query packets, increase the robustness value. The range is from 2 to 255, and the default is 2. The default value of 2 means that one query per query interval may be dropped without the querier aging out. Configuring IP Routing and Multicast Operations using Device Manager 236 Chapter 10 Configuring IGMP Table 54 IGMP dialog box—Interface tab fields (continued) Field Description OtherQuerierPresent Timeout The length of time that must pass before a multicast router decides that there is no other router that can be the querier. If the local router is the querier, the value is 0. FlushAction • • • • RouterAlertEnable When enabled, this parameter instructs the router to process packets not directly addressed to it. Note: To maximize your network performance, Nortel recommends that you set this parameter according to the version of IGMP currently in use. • IGMPv1—Disable • IGMPv2—Enable • IGMPv3—Disable (not supported in the Ethernet Routing Switch 1600 Series) none flushGrpMem flushMrouter flushSender Note: The values for the IGMP parameters, QueryInterval, Robustness, and Version, must be the same as those configured on the interface (VLAN) of the multicast router. Multicast Router To manage and configure multicast router discovery, perform the following procedure: 1 From the Device Manager menu, select IP Routing > IGMP. The IGMP dialog box appears with the Globals tab displayed (see Figure 101 on page 232). 2 321712-B Rev 03 Select the Multicast Router Discovery tab (Figure 104). Chapter 10 Configuring IGMP 237 Figure 104 IGMP dialog box—Multicast Router Discovery tab 3 In the fields provided, make the configuration changes necessary. 4 Click Apply. Table 55 outlines the fields on this tab. Table 55 Multicast Router Discovery fields Field Description Interface The IGMP interface. MrdiscEnable Enables or disables multicast router discovery. DiscoveredRouterPorts The discovered router ports on this interface. MaxAdvertiseInterval The maximum interval (in seconds) between successive advertisements. This is an integer value between 2 and 180. MinAdvertiseInterval The minimum interval (in seconds) between successive advertisements. This is an integer value between 3 and 180. MaxInitialAdvertiseInterval The maximum interval (in seconds) between successive initial advertisements. This is an integer value between 2 and 180. MinInitialAdvertiseInterval The minimum interval (in seconds) between successive advertisements. This is an integer value between 3 and 180. NeighborDeadInterval The interval (in seconds) that can pass before a neighbor is declared dead. This is an integer value between 2 and 180. Configuring IP Routing and Multicast Operations using Device Manager 238 Chapter 10 Configuring IGMP Viewing IGMP Snoop Information To view information about IGMP snooping: 1 From the Device Manager menu bar, select IP Routing > IGMP. The IGMP dialog box appears with the Globals tab displayed (see Figure 101 on page 232). 2 Select the Snoop tab. The Snoop tab appears (Figure 105). Figure 105 IGMP dialog box—Snoop tab Table 56 describes the Snoop tab fields. Table 56 Snoop tab fields Field Description Interface The VLAN ID for the VLAN. SnoopEnable Enables (true) or disables (false) IGMP snooping. IGMP snooping works only when a multicast router exists in the VLAN. ProxySnoopEnable Indicates whether or not the IGMP report proxy feature is enabled. When this feature is enabled, reports are forwarded from hosts to the multicast router once per group per query interval or when there is new group information. When this feature is disabled, all reports from different hosts are forwarded to multicast routers, and more than one group report may be forwarded for the same multicast group per query interval. The default is enabled. FastLeaveEnable Enable or disable FastLeave for this port. 321712-B Rev 03 Chapter 10 Configuring IGMP 239 Table 56 Snoop tab fields (continued) Field Description FastLeavePortMembers The set of ports that are enabled for FastLeave. SnoopMRouterPorts Ports that have been configured as multicast router ports. Such ports are directly attached to a multicast router so the multicast data and group reports are forwarded to the router. Caution: Configure this field only when there are multiple multicast routers that are not directly attached to one another but are directly attached to the VLAN (technically an invalid configuration). If multicast routers have a route between them (the valid configuration) and this field is configured, a multicast loop forms. SnoopActiveMRouter Ports Active multicast router ports are ports directly attached to a multicast router. These ports include the querier port and all ports in the forwarding state that were configured by the user as well as those that were dynamically learned via receiving queries. SnoopMRouterExpiration Time remaining before the multicast router is aged out. If the switch does not receive any queries before this time expires, it flushes out all group memberships known to the VLAN. The Query Max Response Interval (obtained from the queries received) is used as the timer resolution. Configuring IP Routing and Multicast Operations using Device Manager 240 Chapter 10 Configuring IGMP Viewing IGMP Dynamic Group Information To view information about IGMP dynamic groups, perform the following procedure: 1 From the Device Manager menu bar, select IP Routing > IGMP. The IGMP dialog box appears with the Globals tab displayed (see Figure 101 on page 232). 2 Select the Groups tab. The Groups tab appears (Figure 106). Figure 106 IGMP dialog box—Groups tab 321712-B Rev 03 Chapter 10 Configuring IGMP 241 Table 57 describes the Groups tab fields. Table 57 Group tab fields Field Description IpAddress Multicast group address (Class D) that members can join. A group address can be the same for many incoming ports. InPort The member port for the group. This is the port on which group traffic is forwarded. Members Specifies the IP address of the IGMP receiver (host or IGMP reporter). Expiration Time left before the group report expires on this port. This variable is updated upon receiving a group report. IGMP Static Information Some sources do not join a multicast group before transmitting a multicast stream. When this is the case, and if there are no other group members joined in the VLAN, the data is flooded to all VLAN ports. A static entry can be created to forward multicast data streams to a particular set of ports within the VLAN. When the entry is created, multicast data streams are always forwarded to the multicast router within the VLAN, in addition to the ports configured for this static entry. Note: IGMP snoop can guarantee delivery of only local multicast data. It does not guarantee delivery of remote multicast data. A port cannot be configured as a static receiver in an IGMP snoop-enabled VLAN that does not contain at least one dynamic receiver port and have multicast data forwarded. To add members to the IGMP snoop group, perform the following procedure: 1 From the Device Manager menu bar, select IP Routing > IGMP. The IGMP dialog box appears with the Globals tab displayed (see Figure 101 on page 232). 2 Select the Static tab. Configuring IP Routing and Multicast Operations using Device Manager 242 Chapter 10 Configuring IGMP The Static tab appears (Figure 107). Figure 107 IGMP dialog box—Static tab 3 Click Insert. The IGMP, Insert Static dialog box appears (Figure 108). Figure 108 IGMP, Insert Static dialog box 4 In the IfIndex field, enter the router interface for the IGMP entry. This can be done manually or by clicking the VLAN . . . button and selecting a VLAN from the list. 5 Enter the group address in the GrpAddr field. 6 In the MemberPorts field, click the ellipsis (...) button to display the IgmpStaticMemberPorts dialog box. Select the member ports by doing the following: 7 a Select the desired ports from the provided list. b Click OK. In the NotAllowedToJoin field, click the ellipsis (...) button to display the IgmpStaticNotAllowedToJoin dialog box. Select those ports not allowed to join this group by doing the following: a 321712-B Rev 03 Select the desired ports from the provided list. Chapter 10 Configuring IGMP 243 b 8 Click OK. Click Insert. Table 58 describes the fields in the IGMP, Insert Static dialog box. Table 58 IGMP, Insert Static dialog box fields Field Description Ifndex The interface on which the IGMP entry is enabled. Vlan Id The VLAN to which you wish to flood multicast data. GrpAddr Enter the multicast group address of the multicast stream. MemberPorts The ports to which you want to redirect the multicast stream for this multicast group. The ports must be member ports of the VLAN. NotAllowedToJoin The ports that do not receive the multicast stream for this multicast group. Multicast Access Control Configuration To configure multicast access control for a selected IGMP interface or VLAN, perform the following tasks: 1 From the Device Manager menu bar, select IP Routing > IGMP. The IGMP dialog box appears with the Globals tab displayed (Figure 101 on page 232). 2 Select the Access tab. The Access tab appears (Figure 109). Configuring IP Routing and Multicast Operations using Device Manager 244 Chapter 10 Configuring IGMP Figure 109 IGMP dialog box—Access tab 3 Click Insert. The IGMP, Insert Access dialog box appears (Figure 110). Figure 110 IGMP, Insert Access dialog box 4 Enter the router interface on which the IGMP entry is enabled by manually entering the interface in the IfIndex field or clicking the VLAN button and selecting one from the list. 5 Enter the group address in the GrpAddr field. 6 Enter the host network in the HostNetwork field. 7 Enter the host subnet mask in the HostMask field. 8 Select the host mode in the Mode area. 9 Click Insert. 10 Click Close. 321712-B Rev 03 Chapter 10 Configuring IGMP 245 Table 59 describes the Access tab fields Table 59 Access tab fields Field Description IfIndex Indicates the interface on which the IGMP entry is enabled. GrpAddr Indicates the group address on which multicast access control is configured. HostNetwork Indicates the IP address of a host for which this entry contains information. HostMask Indicates the subnet mask of a host for which this entry contains information. Mode Specifies the action of the access policy. The options are: • denyRX—denies IP multicast received traffic. • denyBOTH—denies both IP multicast transmitted and received traffic. Viewing IGMP Sender Entries To view IGMP sender entries, perform the following tasks: 1 From the Device Manager menu bar, select IP Routing > IGMP. The IGMP dialog box appears with the Globals tab displayed (Figure 101 on page 232). 2 Select the Sender tab. The Sender tab appears (Figure 111). Figure 111 IGMP dialog box—Sender tab Configuring IP Routing and Multicast Operations using Device Manager 246 Chapter 10 Configuring IGMP Table 60 describes the Sender tab fields. Table 60 Sender tab fields Field Description GrpAddr The IP multicast group address. IfIndex The VLAN interface index. MemberAddr The source IP address of the group traffic sender. Action Used to flush an entry or a group. TPort The port on which traffic is received. State The state, either filtered on non-filtered. Filtered implies the traffic is blocked, probably due to an access control policy. 321712-B Rev 03 247 Chapter 11 Configuring Multicast MAC Filtering With Multicast Media Access Control (MAC) filtering, you can create a smaller flooding domain inside a VLAN. For a particular VLAN, you specify a multicast MAC address and a subset of ports. When clients send data to that designated MAC address, only that subset of ports receive the traffic. The Ethernet Routing Switch 1600 Series uses MAC address information to switch Layer 2 IP multicast traffic. Mapping of IP to MAC addresses is not a one-to-one mapping; hence, several IP addresses can be mapped to the same MAC address. Take this fact into consideration when configuring Multicast Access control policies applicable to specific IP addresses, since the policy is applied on the mapped MAC address, which also covers other IP multicast addresses. This section describes how to configure Layer 2 multicast MAC filtering. For more information about Multicast MAC filtering concepts, refer to “IP routing and multicast concepts” on page 29. Configuring IP Routing and Multicast Operations using Device Manager 248 Chapter 11 Configuring Multicast MAC Filtering Configuring Layer 2 Multicast MAC Filtering To configure the MAC address for Layer 2 multicast flooding: 1 From the Device Manager menu bar, select VLAN > VLANs. The VLAN dialog box appears with the Basic tab displayed (Figure 112). The Basic tab displays all defined VLANs, their configurations, and their current status. Figure 112 VLAN dialog box—Basic tab 2 Select a VLAN by clicking in a column in the desired row. 3 Click Bridge. The Bridge dialog box appears with the FDB Aging tab displayed (Figure 113). Figure 113 Bridge, VLAN dialog box—FDB Aging tab 321712-B Rev 03 Chapter 11 Configuring Multicast MAC Filtering 249 4 Select the Multicast tab. The Multicast tab appears (Figure 114). Figure 114 Bridge, VLAN dialog box—Multicast tab 5 Click Insert. The Bridge, VLAN, Insert Multicast dialog box appears (Figure 115). Figure 115 Bridge, VLAN, Insert Multicast dialog box 6 In the Address field, type the MAC address for the multicast flooding domain. 7 Click the ellipsis (...) button next to the ForwardingPorts field and choose from the list of ports in the BridgeStaticMulticastForwardingPorts dialog box. 8 Click the ellipsis (...) next to the MltIds field and choose from the list that appears in the MltIds dialog box. 9 Click Insert. Configuring IP Routing and Multicast Operations using Device Manager 250 Chapter 11 Configuring Multicast MAC Filtering Table 61 describes the Bridge, VLAN, Insert Multicast fields. Table 61 Bridge, VLAN dialog box—Multicast tab fields Item Description MacAddress The MAC address for the multicast-flooding domain.* VlanId The VLAN identifier. ForwardingPorts The ports to be included in the multicast-flooding domain. MltIds The MLTs to be included in the multicast-flooding domain. NumMltIds The number of MLTs included in the multicast-flooding domain. * WARNING: When you enter a multicast MAC address that falls in the IP multicast range, the following message appears: This MAC address falls in the reserved range for IP multicast. Problems may occur if you have IP multicast configured on this interface. Do not use any MAC addresses 01:00:5e:00:00:XX corresponding to the 224.0.0.x reserved IP address range. 321712-B Rev 03 251 Chapter 12 Configuring PIM-SM The Ethernet Routing Switch 1600 Series supports the sparse mode of Protocol Independent Multicast (PIM-SM). PIM-SM supports multicast groups spread out across large areas of a company or the Internet. PIM-SM does not maintain its own, or depend upon, a specific multicast protocol to maintain unicast routing tables. PIM-SM uses the routing table information from any underlying unicast routing protocol, such as RIP or OSPF. PIM-SM sends one stream of data to the network where it is replicated to all interested receivers. Instead of using a push model, PIM-SM uses a pull model, in which receivers pull down multicast traffic. For sparsely populated networks, PIM-SM is more efficient than dense-mode protocols because it sends multicast traffic only to those routers that belong to a specific multicast group and that choose to receive the traffic. The Ethernet Routing Switch 1600 Series supports the following for PIM-SM: • • RP functionality BSR functionality For more information about PIM-SM concepts and terminology, refer to “IP routing and multicast concepts” on page 29. This section contains the following topics: • • • • “Configuration Prerequisites” on page 252 “Enabling PIM-SM Globally” on page 252 “Enabling PIM on a VLAN Interface” on page 255 “Viewing and Editing PIM Interface parameters” on page 257 Configuring IP Routing and Multicast Operations using Device Manager 252 Chapter 12 Configuring PIM-SM • • • • “Viewing PIM-SM Neighbor Parameters” on page 259 “Viewing RP Set Parameters” on page 260 “Configuring a Candidate RP” on page 261 “Viewing the Current Bootstrap Router (BSR)” on page 263 Configuration Prerequisites Before configuring PIM-SM, prepare the router as follows: 1 Configure an IP interface. 2 Configure a unicast protocol (RIP or OSPF) globally and on the interfaces on which PIM-SM is to be configured. PIM-SM requires a unicast protocol to use in order to multicast traffic within the network when performing the Reverse Path Forwarding (RFP) check. PIM-SM uses the information from the unicast routing table to create and maintain the shared and shortest multicast tree that enables PIM-enabled routers to communicate. The unicast routing table must contain a route to every multicast source in the network as well as routes to PIM entities like the RPs and BSR. 3 To configure PIM-SM on an Ethernet Routing Switch 1600 Series switch, the following configurations are required: — Enable PIM-SM globally. — Enable PIM-SM on individual interfaces. — Configure one or several RPs for the groups that will be used by a multicast application in the network. — Configure one or several BSRs to propagate RP information to all switches in the network. Enabling PIM-SM Globally IGMP is required for PIM-SM. When PIM-SM is enabled globally and on a particular interface, the IGMP parameters take effect. 321712-B Rev 03 Chapter 12 Configuring PIM-SM 253 To enable PIM-SM globally, follow this procedure: 1 From the Device Manager menu bar, select IP Routing > PIM. The PIM dialog box appears with the Globals tab displayed (Figure 116). Figure 116 PIM dialog box—Globals tab 2 Select the Enable check box. 3 Click Apply. Table 62 describes the Globals tab fields. Table 62 PIM Globals tab fields Field Description Mode Configures the mode on the routing switch: the only valid value is sm (sparse mode). Enable Enables or disables PIM. JoinPruneInterval Specifies how long to wait (in seconds) before the PIM router sends out the next join/prune message to its upstream neighbors. The range is from 1 to 18 724, and the default is 60 seconds. Configuring IP Routing and Multicast Operations using Device Manager 254 Chapter 12 Configuring PIM-SM Table 62 PIM Globals tab fields (continued) Field Description RegisterSuppTimer Specifies how long (in seconds) the DR suppresses sending registers to the RP. The timer starts when the DR receives a Register Stop message from the RP. The range is from 5 to 65 535, and the default is 60 seconds. UniRouteChgTimeOut Specifies how often (in seconds) the switch polls the routing table manager (RTM) for unicast routing information updates to be used by PIM. The range is from 2 to 65 535, and the default is 5 seconds. Note: Lowering this value increases how often the switch polls the RTM. This may affect the switch’s performance, especially when there is a lot of traffic flowing through the switch. DiscardDataTimeOut Specifies how long (in seconds) to discard data until the join message is received from the RP. An ipmc discard record is created after a register packet is sent until the timer expires or when a join message is received. The range is from 5 to 65 535, and the default is 60 seconds. CRPADVTimeOut Specifies how often (in seconds) that routers configured as candidate RPs send C-RP advertisement messages. When this timer expires, the C-RP sends an advertisement message to the elected BSR. The range is from 5 to 26 214, and the default is 60 seconds. BootStrapPeriod Specifies the interval (in seconds) that the elected BSR waits between originating bootstrap messages. The range is from 5 to 32 757, and the default is 60 seconds. 321712-B Rev 03 Chapter 12 Configuring PIM-SM 255 Enabling PIM on a VLAN Interface Before enabling PIM on a VLAN, it must first be enabled globally. Refer to “Enabling PIM-SM Globally” on page 252 for further information. To enable PIM on a VLAN, perform the following procedure: 1 From the Device Manager menu bar, select VLAN > VLANs. The VLAN dialog box appears with the Basic tab displayed. 2 Select a VLAN by clicking in a column of the appropriate row. 3 Click IP. The IP, VLAN dialog box appears with the IP Address tab displayed (Figure 117). Figure 117 IP VLAN dialog box I 4 Select the PIM tab. The PIM tab appears (Figure 118). Configuring IP Routing and Multicast Operations using Device Manager 256 Chapter 12 Configuring PIM-SM Figure 118 IP VLAN dialog box—PIM tab 5 Select the Enable check box. 6 Click Apply. Table 63 describes the PIM tab fields. Table 63 VLAN PIM tab fields Field Description Enable Enables (true) or disables (false) PIM. Mode Displays the mode currently running on the routing switch. The only valid mode is Sparse. This is a read-only field. HelloInterval Specifies how long to wait (in seconds) before the PIM router sends out the next hello message to neighboring routers. The default is 30 seconds. JoinPruneInterval Specifies how long to wait (in seconds) before the PIM router sends out the next join/prune message to its upstream neighbors. The default is 60 seconds. CBSRPreference Sets your preference for this local interface to become a Candidate BSR. The Candidate BSR with the highest BSR-priority and address is referred to as the preferred BSR. The default is -1, which indicates that the current interface is not a Candidate BSR. 321712-B Rev 03 Chapter 12 Configuring PIM-SM 257 Viewing and Editing PIM Interface parameters To view or edit PIM parameters for a port, perform the following procedure: 1 From the Device Manager menu bar, select IP Routing > PIM. The PIM dialog box appears with the Globals tab displayed. 2 Select the Interfaces tab. The PIM dialog box, Interfaces tab appears (Figure 119). Figure 119 PIM dialog box—Interfaces tab 3 Edit any fields, if applicable. 4 Click Apply. Table 64 describes the Interfaces tab fields. Table 64 PIM Interfaces tab fields Field Description IfIndex Interface Index. Address The IP address of the PIM interface. NetMask The network mask for the IP address of the PIM interface. Mode The configured mode of this interface. The only valid mode is Sparse. This is a read-only field. DR The router with the highest IP address on a LAN designated to perform these tasks. Configuring IP Routing and Multicast Operations using Device Manager 258 Chapter 12 Configuring PIM-SM Table 64 PIM Interfaces tab fields (continued) Field Description HelloInterval Specifies how long to wait (in seconds) before the PIM switch sends out the next hello message to neighboring switches. The default is 30 seconds. JoinPruneInterval Specifies how long to wait (in seconds) before the PIM switch sends out the next join/prune message to its upstream neighbors. The default is 60 seconds. CBSRPreference Sets your preference for this local interface to become a Candidate BSR. The Candidate BSR with the highest BSR-priority and address is referred to as the preferred BSR. The default is -1, which indicates that the current interface is not a Candidate BSR. OperState Indicates the status of PIM on this interface: enabled or disabled. 321712-B Rev 03 Chapter 12 Configuring PIM-SM 259 Viewing PIM-SM Neighbor Parameters To view PIM-SM neighbor parameters, do the following: 1 From the Device Manager menu bar, select IP Routing > PIM. The PIM dialog box appears with the Globals tab displayed (Figure 116 on page 253). 2 Select the Neighbors tab. The Neighbors tab appears (Figure 120). Figure 120 PIM dialog box—Neighbors tab Table 65 describes the Neighbors tab fields. Table 65 PIM Neighbors tab fields Field Description Address The IP address of the PIM neighbor for which this entry contains information. IfIndex The slot/port number or VLAN ID of the interface used to reach this PIM neighbor. UpTime The elapsed time since this PIM neighbor last became a neighbor of the local router. ExpiryTime The time remaining before this PIM neighbor times out. Configuring IP Routing and Multicast Operations using Device Manager 260 Chapter 12 Configuring PIM-SM Viewing RP Set Parameters RP Set is a list of rendezvous point addresses. The bootstrap router (BSR) constructs this list from C-RP advertisements and then distributes it to all PIM routers in the BSR PIM domain. To view the RP Set parameters, use this procedure: 1 From the Device Manager menu bar, select IP Routing > PIM. The PIM dialog box appears with the Globals tab displayed (Figure 116 on page 253). 2 Select the RP Set tab. The RP Set tab appears (Figure 121). Figure 121 PIM dialog box—RP Set tab 321712-B Rev 03 Chapter 12 Configuring PIM-SM 261 Table 66 describes the RP Set tab fields. Table 66 PIM RP Set tab fields Field Description GroupAddress The IP address of the multicast group. When combined with the group mask, it identifies the prefix that the local router uses to advertise itself as a C-RP. GroupMask The address mask of the multicast group. When combined with the group address, it identifies the prefix that the local router uses to advertise itself as a C-RP. Address The IP address of the C-RP. HoldTime The time specified in a C-RP advertisement that the BSR uses to time out the RP. When the BSR receives an advertisement for the RP, it restarts the timer. If no advertisement arrives before the timer expires, the BSR removes that RP from the RP set. ExpiryTime The time remaining before this C-RP times out. Configuring a Candidate RP The following procedure describes how to add a candidate rendezvous point (C-RP) to the RP Set. To configure a C-RP, do the following: 1 From the Device Manager menu bar, select IP Routing > PIM. The PIM dialog box appears with the Globals tab displayed (Figure 116). 2 Select the Candidate RP tab. The Candidate RP tab appears (Figure 122). Configuring IP Routing and Multicast Operations using Device Manager 262 Chapter 12 Configuring PIM-SM Figure 122 PIM dialog box—Candidate RP tab 3 Click Insert. The PIM, Insert Candidate dialog box appears (Figure 123). Figure 123 PIM dialog box—Insert Candidate RP dialog box 4 Enter values for the GroupAddress, GroupMask, and InterfaceAddress fields. 5 Click Insert. 321712-B Rev 03 Chapter 12 Configuring PIM-SM 263 Table 67 describes the Candidate RP tab fields. Table 67 PIM Candidate RP tab fields Field Description GroupAddress The IP address of the multicast group. When combined with the group mask, it identifies the prefix that the local router uses to advertise itself as a C-RP. GroupMask The address mask of the multicast group. When combined with the group address, it identifies the prefix that the local router uses to advertise itself as a C-RP. Address The IP address of the C-RP. This address has to be one of the local PIM-SM enabled interfaces. You can use the GroupMask value to configure a Candidate RP for several groups in one configuration. For example, in a Candidate RP configuration with a GroupAddress value of 224.0.0.0 and a GroupMask of 240.0.0.0, you can configure the Candidate RP for a multicast range from 224.0.0.0 to 239.255.255.255. Viewing the Current Bootstrap Router (BSR) PIM-SM cannot run without a bootstrap router (BSR). Although a PIM-SM domain can have only one active BSR, additional routers can be configured as candidate BSRs (C-BSRs). A C-BSR provides backup protection in case the primary BSR fails. To display information about the current bootstrap router, do the following: 1 From the Device Manager menu bar, select IP Routing > PIM. The PIM dialog box appears with the Globals tab displayed (Figure 116 on page 253). 2 Select the Current BSR tab. The Current BSR tab appears (Figure 124). Configuring IP Routing and Multicast Operations using Device Manager 264 Chapter 12 Configuring PIM-SM Figure 124 PIM dialog box—Current BSR tab Table 68 describes the Current BSR tab fields. Table 68 Current BSR tab fields Field Description Address The IP address of the current BSR for the local PIM domain. FragmentTag A randomly generated number that distinguishes fragments belonging to different Bootstrap messages. Fragments belonging to the same Bootstrap message carry the same Fragment Tag. HashMask The mask used in the hash function to map a group to one of the C-RPs from the RP-Set. The hash-mask allows a small number of consecutive groups (e.g., 4) to always hash to the same RP. Priority The priority of the current BSR. The Candidate BSR (C-BSR) with the highest BSR-priority and address (referred to as the preferred BSR) is elected as the BSR for the domain. Bootstrap Timer When the Bootstrap Timer expires, the BSR sends out Bootstrap messages. 321712-B Rev 03 265 Chapter 13 Configuring Multicast Routes This section describes the configuration and management of Layer 3 IP Multicast protocol interfaces. This section contains the following topics: • • • • • • “Viewing Route Information” on page 265 “Viewing Next Hop Information” on page 266 “Viewing and Editing Interface Information” on page 268 “Configuring Static Source Groups” on page 268 “Troubleshooting Multicast Routes” on page 272 “Viewing and Editing Static Source Groups” on page 270 Viewing Route Information To view multicast route information, select IP Routing > Multicast from the Device Manager menu. The Multicast dialog box appears with the Routes tab selected (Figure 125). Figure 125 Multicast dialog box—Routes tab Configuring IP Routing and Multicast Operations using Device Manager 266 Chapter 13 Configuring Multicast Routes Table 125 describes the fields on this tab. Table 69 Routes tab fields Field Description Group The IP multicast group address for which this entry contains multicast routing information. Source The network address which, when combined with the corresponding route SourceMask value, identifies the sources for which this entry contains multicast routing information. SourceMask The network mask which, when combined with the corresponding route Source value, identifies the sources for which this entry contains multicast routing information. UpstreamNeighbor The address of the upstream neighbor (for example, RPF neighbor) from which IP datagrams from these sources to this multicast address are received or 0.0.0.0 if the network is local. Interface The port number or VLAN ID on which IP datagrams sent by these sources to this multicast address are received. ExpiryTime The amount of time remaining before this entry is aged out. The value 0 indicates that the entry is not subject to aging. Protocol The routing protocol through which this route was learned. Viewing Next Hop Information To view Next Hop information, select IP Routing > Multicast from the Device Manager menu and select the Next Hops tab from the Multicast dialog box (Figure 126). Figure 126 Multicast dialog box—Next Hops tab 321712-B Rev 03 Chapter 13 Configuring Multicast Routes 267 Table 70 describes the fields on this tab. Table 70 Next Hops tab fields Field Description Group The IP multicast group for which this entry specifies a next hop on an outgoing interface. Source The network address which, when combined with the corresponding next hop SourceMask value, identifies the source for which this entry specifies a next hop on an outgoing interface. SourceMask The network mask which, when combined with the corresponding next hop Source value, identifies the source for which this entry specifies a next hop on an outgoing interface. OutInterface The port number or VLAN ID for the outgoing interface for this next hop. Address The address of the next hop specific to this entry. For most interfaces, it is identical to the next hop group. NBMA interfaces, however, may have multiple next hop addresses out a single outgoing interface. State An indication of whether or not the outgoing interface and next hop represented by this entry is currently being used to forward IP datagrams. A value of forwarding indicates it is currently being used; pruned indicates it is not being used. ExpiryTime The minimum amount of time remaining before this entry is aged out. The value 0 indicates that the entry is not subject to aging. ClosestMemberHops The minimum number of hops between this router and any member of this IP Multicast group reached via this next hop on this outgoing interface. Any IP Multicast datagrams for the group that have a TTL less than this number of hops are not forwarded to this next hop. Protocol The routing protocol through which this next hop was learned. Configuring IP Routing and Multicast Operations using Device Manager 268 Chapter 13 Configuring Multicast Routes Viewing and Editing Interface Information To view and edit multicast interface information, select IP Routing > Multicast from the Device Manager menu and select the Interfaces tab from the Multicast dialog box (Figure 127). Figure 127 Multicast dialog box—Interfaces tab Table 71 describes the fields on this tab. Table 71 Multicast dialog box—Interfaces tab fields Field Description Interface The slot/port number or VLAN ID for which this entry contains information. Ttl The datagram time to live (TTL) threshold for the interface. Any IP multicast datagrams with a TTL less than this threshold are not forwarded out the interface. The default value of 1 means that all multicast packets are forwarded out the interface. Protocol The routing protocol running on this interface. Configuring Static Source Groups Static source groups enable the configuration of static source group entries in the PIM multicast routing table. PIM cannot prune these entries from the distribution tree. In other words, even if there are no receivers in the group, the multicast stream for a static source-group entry stays active. 321712-B Rev 03 Chapter 13 Configuring Multicast Routes 269 Configuration Considerations The Ethernet Routing Switch 1600 Series supports static source groups using PIM-SM. For conceptual information about PIM and static source groups, refer to “IP routing and multicast concepts” on page 29. Note: Before configuring a static source group, PIM must first be globally enabled. Refer to “Enabling PIM-SM Globally” on page 255 for further information. After configuring static source groups, keep the following points in mind: • • • The maximum number of static source groups cannot exceed 1 024. Disabling PIM causes the switch to deactivate all of the static source groups. These groups are reenabled when PIM is reenabled. In PIM-SM configurations, the static source group feature works for both specific source addresses and subnet addresses. When the network mask is configured as 255.255.255.255, the full source address is used to match the (S,G), which is the specific source case. When the network mask field is configured as a subnet mask for the source, only the source subnet is used to match (S,G)s. Configuring IP Routing and Multicast Operations using Device Manager 270 Chapter 13 Configuring Multicast Routes Viewing and Editing Static Source Groups To view and edit static source groups, select IP Routing > Multicast from the Device Manager menu and select the Static Source Group tab on the Multicast dialog box (Figure 128). Figure 128 Multicast dialog box—Static Source Group tab Table 72 describes the fields on this tab. Table 72 Static Source Group tab fields Field Description GroupAddress The multicast group IP address for this static source-group entry. SourceSubnet The multicast source address for this static source-group entry. SrcSubnetMask The source subnet mask for this static source-group entry. 321712-B Rev 03 Chapter 13 Configuring Multicast Routes 271 Adding a Static Source Group Use the following procedure to add a new static source group. Attempting to create a duplicate of an existing source group entry will result in an error. Perform the following procedure to create a new static source group: 1 From the Device Manager menu, select IP Routing > Multicast. The Multicast dialog box appears with the Routes tab displayed. 2 Select the Static Source Group tab. 3 Click Insert. The Multicast, Insert Static Source Group dialog box appears (Figure 129). Figure 129 Multicast, Insert Static Source Group dialog box 4 Enter the group address, source subnet, and source subnet mask in the provided fields. An explanation of these values can be found in Table 72 on page 270. 5 Click Insert. Deleting a Static Source Group To delete a static source group, perform the following procedure: 1 From the Device Manager menu, select IP Routing > Multicast. The Multicast dialog box appears with the Routes tab displayed. 2 Select the Static Source Group tab. 3 Select the desired group address value. Configuring IP Routing and Multicast Operations using Device Manager 272 Chapter 13 Configuring Multicast Routes 4 Click Delete. Troubleshooting Multicast Routes The Mroute-HW tab provides an exact hardware view of existing IP multicast records and information about sender and receiver ports for every stream. In addition to this information, data is also provided on prunes, sources, and egress VLANs in dialog boxes accessible from this tab. This section describes the procedure necessary to perform multicast route troubleshooting. To perform multicast route troubleshooting, follow these steps: 1 From the Device Manager menu, select IP Routing > Multicast. The Multicast dialog box appears with the Routes tab displayed. 2 Select the Mroute-HW tab. This tab is illustrated in Figure 130 on page 273. 3 To view information about prunes, sources, or egress VLANs, do the following: a Select a row by clicking in it. b The Prunes, Sources, and Egress VLANs buttons are enabled. c Click the desired button. Refer to the following topics for further information about prunes, sources, or Egress VLANs: • • • 321712-B Rev 03 “Prunes Dialog” on page 273 “Sources dialog box” on page 274 “Egress VLANs dialog box” on page 275 Chapter 13 Configuring Multicast Routes 273 Figure 130 Multicast dialog box—Mroute-HW tab Table 73 describes the fields on this tab. Table 73 Mroute-HW tab fields Field Description GroupAddress The IP multicast group address for the multicast stream. Subnet The network address of the source subnet that has sources sending IP multicast traffic to the GroupAddress. Note: There can be several sources sending to that Group. You can use the Source tab to view these sources. Invlan The ingress VLAN ID where the traffic emanates for the multicast stream. Pruned True indicates that the multicast stream has been pruned back. False indicates it has not. Prunes Dialog The Prunes dialog displays all of the prunes received for the group address in the multicast stream selected from the Mroute-HW table. Refer to “Troubleshooting Multicast Routes” on page 272 for the procedure to access this dialog box. This dialog box is illustrated in Figure 131. Configuring IP Routing and Multicast Operations using Device Manager 274 Chapter 13 Configuring Multicast Routes Figure 131 Prunes dialog box Table 74 describes the fields in this dialog box. Table 74 Prunes tab fields Field Description Neighbor The IP address of the downstream neighbor from whom the prune has been received. Prune Timer The time left for the neighboring downstream router to send the graft message. Sources dialog box The Sources dialog box displays all the sources on the subnet that are sending to the particular group selected in the Mroute-HW table. Refer to “Troubleshooting Multicast Routes” on page 272 for the procedure to access this dialog box. This dialog box is illustrated in Figure 132. Figure 132 Sources dialog box 321712-B Rev 03 Chapter 13 Configuring Multicast Routes 275 Table 75 describes the fields in this dialog box. Table 75 Sources tab fields Field Description Source Address The IP addresses of the sources on this particular subnet sending traffic to the multicast group for the selected entry in the Mroute-HW table. Ingress Port The corresponding ingress port in the multicast stream selected from the Mroute-HW table. Egress VLANs dialog box The Egress VLANs dialog box displays the egress VLANs for the streams corresponding to the selected entry in the Mroute-Hw entry. Refer to “Troubleshooting Multicast Routes” on page 272 for the procedure to access this dialog box. This dialog box is illustrated in Figure 133. Figure 133 Egress VLANs Dialog Table 76 describes the fields in this dialog box. Table 76 Egress VLANs tab fields Field Description Egress Vlan All the egress VLANs for the particular multicast stream selected from the Mroute-HW table. Egress Vlan Ports The corresponding ports for the particular multicast stream selected from the Mroute-HW table. Configuring IP Routing and Multicast Operations using Device Manager 276 Chapter 13 Configuring Multicast Routes 321712-B Rev 03 277 Index Numbers 10000MbpsPortDefaultMetric field OSPF General tab 179 1000MbpsPortDefaultMetric field OSPF General tab 179 100MbpsPortDefaultMetric field OSPF General tab 179 10MbpsPortDefaultMetric field OSPF General tab 179 Interface tab 150 IP, VLAN, Insert VRRP dialog box 156 Age field Ext. Link State DB tab 213 Link State Database tab 212 Routes tab 100 alternative routes, enabling 96 AltSequence field Routes tab 100 announce policies 39 Area field 205 A accept policies 39 AreaBdrRtrCount field OSPF Areas tab 199 ActiveCount field OSPF Areas tab 200 AreaBdrRtrStatus field OSPF General tab 179 Addr field Addresses tab 99 AreaID field 203 Area Aggregate tab 215 Host tab 207 Address Resolution Protocol See ARP. Addresses tab accessing 98 fields 99 AreaId field Link State Database tab 211 OSPF Interfaces tab 183 Stub Area Metrics tab 210 AddressLessIf field 209 OSPF Interfaces tab 183 AreaLSACksumSum field OSPF Areas tab 200 AddressLessIndex field OSPF Neighbors tab 191 AreaSummary field OSPF Areas tab 200 AdminStat field OSPF General tab 179 OSPF Interfaces tab 183 ARP address-resolution cache 43 IP address 43 MAC address 43 managing 120 request 43 static entries 43 Advertise Metric field 215 Advertisement field 213 AdvertisementInterval field Configuring IP Routing and Multicast Operations using Device Manager 278 Index table 43 viewing 120 ARP tab accessing 120 fields 121 C candidate bootstrap router 80 candidate RP router 80 ASBdrRtCount field OSPF Areas tab 200 Checksum field Ext. Link State DB tab 213 Link State Database fields 212 ASBdrRtrStatus checkbox OSPF General tab 179 Circuitless IP tab fields 109 ASBR, specifying 207 CLIP interface configuring 108 AuthKey field OSPF Interfaces tab 184 AuthType field OSPF Interfaces tab 184 automatic route aggregation 174 automatic virtual link 201 AutoVirtLinkEnable checkbox OSPF General tab 180 configuration Vrrp on a VLAN 148, 154 configuring route preferences 112 router discovery 114 configuring multicast MAC filtering using the DM 247 AutoVirtLinkEnable field 202 Control field Interface tab 150 IP, VLAN, Insert VRRP dialog box 156 B conventions, text 23 BackupDesignatedRouter OSPF Interfaces tab 184 CriticalIPAddr field Interface tab 151 BackUpMaster field 153 IP,VLAN, Insert VRRP dialog box 157 CriticalIpAddr field IP, VLAN, Insert VRRP dialog box 156 BackUpMastrState field 153 CriticalIpAddrEnable field 156 Interface tab 151 BcastAddr field 99 black hole routes 106 black hole static routes 36 BootP broadcast packets 42 message format 40 BootP/DHCP relay overview 125 C-RP configuring 261 D DefImportMetric field RIP Globals tab 165 deleting, L2/L2 static routes 107 Bootstrap Protocol. See BootP designated router OSPF 56 bootstrap router 80 designated router. See DR BSR, viewing 263 DesignatedRouter field Bootstrap Protocol. See BootP 321712-B Rev 03 Index 279 RoutePref tab 113 OSPF Interfaces tab 184 Dest field IP, Insert Static Routes dialog box 104 Routes tab 100 Static Routes tab 104 DHCP assigning network addresses 40 IP address 42 message type 40 multiple servers 42 packet forwarding 41 relay operation 40 servers 40 UDP/IP broadcasts 40 virtual router interface 41 distribution tree 65 DR (designated router), describing 79 Dynamic Host Configuration Protocol. See DHCP filtering 38 deleting 144 inbound/outbound traffic on a RIP interface 142 G Globals tab accessing 94, 148 fields 95, 97, 98, 149 H Hello Protocol 56 Hello Suppressed OSPF Neighbors tab 191 HelloInterval field OSPF Interfaces tab 184 Virtual Neighbor tab 204 HelloSuppressed field 205 E HoldDownState field 153 Effect field 215 Enable field IP, Insert Static Routes dialog box 104 Static Routes tab 104 Events field 204 OSPF Interfaces tab 185 OSPF Neighbors tab 191 Virtual Neighbor tab 205 ExternalSACksumSum field OSPF General tab 179 HoldDownTime field RIP Globals tab 164 HoldDownTimer field IP, VLAN, Insert VRRP dialog box 157 Secondary Feature tab 153 HoldDownTimeRemaining field 153 HopOrMetric field 100 host addresses and masks, specifying 89 I ExternLsaCount field OSPF General tab 179 F FastAdvertisementEnable field 150 IP, VLAN, Insert VRRP dialog box 156 FastAdvertisementInterval field 150 IP, VLAN, Insert VRRP dialog box 156 ICMP router discovery configuring 114 configuring on a VLAN 116 enabling 114 viewing the router discovery table 114 Id field OSPF Areas tab 199 IfIndex field fields Configuring IP Routing and Multicast Operations using Device Manager 280 Index IP, Insert Static Routes dialog box 104 Static Routes tab 104 IGMP cache information 231 description 71, 75 elected querier 72 fast leave feature 73 host leave message 73 host reports 72 interface table 233 maximum response time 72 proxy 75 queries 72 snoop 73 snooping 230 static entry 241 versions 75 IGMP Device Manager commands FastLeaveEnable 229 FastLeavePortMembers 229 FlushAction 236 Join messages 235 LastReporter 233 NotAllowedToJoin 243 OtherQuerierPresentTimeout 236 ProxySnoopEnable 229 QueryInterval 229 QueryMaxResponseTime 229 Robustness 229 RouterAlertEnable 236 SnoopEnable 229 SnoopMRouterPorts 229 Version 229 Version1Host Timer 233 WrongVersionQueries 235 IGMPv1 host reports 72 Interface field ARP tab 121 Interface tab 150 Routes tab 100 Interface tab accessing 149 fields 150 Interior Gateway Protocol (IGP) 52 IP address assigning to a VLAN 92 IP configuration dialog box, accessing 98 IP forwarding, enabling 94 IP router, managing 97 IP routes 99 IP routing address classes 30 address, in dotted-decimal notation 30 BootP/DHCP relay 40 CIDR (classless interdomain routing) address 34 connectivity protocols 43 multicast addresses 30 OSPF benefits 53 OSPF description 52 unicast addresses 30 IP static routes, creating 102 IP, Insert Circuitless dialog box fields 109 IP, Insert Static Route dialog box accessing 103 IP, Insert Static Routes dialog box fields 104 IP, VLAN RIP tab fields 167 Insert ARP dialog box 122 IpAddr field Interface tab 150 IP, VLAN Insert VRRP dialog box 156 OSPF Neighbors tab 191 Virtual Neighbor tab 205 Insert ARP port selection dialog box 122 IpAddress field IGMPv2 host reports 72 in filters 39 321712-B Rev 03 Index 281 Metrics tab 209 Static Routes tab 104 Stub Area Metrics tab 210 ARP tab 121 Host tab 207 If Metrics tab 209 OSPF Interfaces tab 183 metric speed, OSPF 208 Metric Type field 210 L MetricType field 142, 218 LastSpfRun field OSPF General tab 180 Mroute-HW tab 272 LocalNextHop field IP, Insert Static Routes dialog box 104 Static Routes tab 104 LSACount field OSPF Areas tab 200 LsdbType field 215 LSID field Ext. Link State DB tab 213 Link State Database tab 211 LSRetransQLen field 205 OSPF Neighbors tab 191 M MAC filtering configuring Layer 2 multicast 248 MAC filtering Device Manager commands Address 250 ForwardingPorts 250 MltIds 250 VlanId 250 MacAddress field ARP tab 121 manual virtual link 61 Mask field Area Aggregate tab 215 IP, Insert Static Routes dialog box 104 Routes tab 100 Static Routes tab 104 MasterIpAddr field 150 Metric field 142, 218 Host tab 207 IP, Insert Static Routes tab 104 multicast address range 67 class D address 67 distribution tree 65 interfaces 268 next hops 266 PIM-SM 77 PIM-SM domain 78 PIM-SM hosts 78 reverse path 66 routes 265 static source group 268 stream 241 multicast access control configuring 243 overview of 87 policy types denyBOTH 88 denyRX 88 tab fields 245 Multicast Device Manager commands ClosestMemberHops 267 ExpiryTime 266 Group 266 Interface 266 Protocol 266 Source 266 SourceMask 266 static source group 268 UpstreamNeighbor 266 Multicast dialog box- Mroute-HW tab 273 Multicast dialog box- Mroute-HW tab- Egress VLANs tab 275 Configuring IP Routing and Multicast Operations using Device Manager 282 Index Multicast dialog box- Mroute-HW tab- Prunes tab 274 Multicast dialog box- Mroute-HW tab- Sources tab 274 multicast MAC filtering. See MAC filtering Multicast Router Discovery Protocol 90 N Neighbor field Virtual Neighbor tab 203 NetMask field Addresses tab 99 NextHop field IP, Insert Static Route dialog box 104 Routes tab 100 Static Routes tab 104 O Open Shortest Path First (OSPF) Protocol. See OSPF Open Shortest Path First. See OSPF OperAction field 157 Secondary Feature tab 153 Operation field RIP Globals tab 164 Options field OSPF Neighbors tab 191 VIrtual Neighbor tab 205 OriginateNewLSas field OSPF General tab 179 OSPF 177 adjacent routers 57 area border router (ABR) 58 areas 54 AS boundary router (ASBR) 58, 62 AS external link advertisement 60 AS external routes 61 ASBR summary link advertisement 60 autonomous system external (ASE) routes 61 backbone area 55 321712-B Rev 03 backup designated router (BDR) 56, 58 benefits 53 database description (DD) packets 59 definition 177 description 52 designated router (DR) 56, 58 hello packets 59 Hello Protocol 56 implementation ASBR 207 creating a virtual link 201 stub area 200 interfaces description 58 internal router (IR) 58 IP 59 link state acknowledgements 60 link state advertisements 60 link state request packets 59 link state update packets 59 link-state database 53 link-state information 57 neighbor adjacencies 57 neighbors 56 network links advertisement 60 network summary link advertisement 60 packets 59 route advertisement 59 router links advertisement 60 router types 58 routing algorithm 54 specifying ASBRs 62 stub area 56 variable-length mask 59 virtual link 61 virtual links 61 OSPF Accept policy 141, 216 OSPF Area dialog box 199 OSPF Neighbors dialog box 190 OspfAction field OSPF General tab 180 ospfImportASExtern field OSPF Areas tab 199 Index 283 ospfNbmaNbrPermanence field OSPF Neighbors tab 191 out filters 39 P Path Type field Routes tab 101 PIM C-RP configuring 261 DR showing 257 enabling on a VLAN using Device Manager 255 neighbor parameters 259 viewing and editing interface parameters using Device Manager 257 viewing current BSR 263 viewing RP Set parameters 260 PIM Device Manager commands DR showing 257 ExpiryTime 259 HoldTime 261 UpTime 259 PIM-SM BSR (bootstrap router), description 80 C-BSR (candidate bootstrap router), description 80 configuration prerequisites 252 C-RP (candidate RP), description 80 description 77 domain 78 DR (designated router), description 79 enabling globally 252 hosts 78 IGMP, configuring with 252 join/prune messages 82 OSPF, configuring with 252 receiver join process 82 receiver leave process 83 register messages 82 register-stop messages 82 required elements 84 Reverse Path Forwarding 252 RIP, configuring with 252 RP (rendezvous-point), description 79 shared tree 80 shortest-path tree 81 source sending packets to group 83 PingVirtualAddress field 149 poisoned reverse, RIP 44 policies OSPF Accept 141, 216 Policy, Insert Prefix List dialog box fields 132 Policy, Insert Route Policy dialog box fields 136 PollInterval field OSPF Interfaces tab 185 port selection dialog box, Insert ARP 122 Preference field IP, Insert Static Routes dialog box 104 Static Routes tab 104 prefix list, configuring 130 priority OSPF 184 Priority field Interface tab 150 IP, VLAN, Insert VRRP dialog box 156 OSPF Neighbors tab 191 Proto field 100 Protocol Independent Multicast-Sparse Mode. See PIM-SM Q Queries field RIP Globals tab 164 Configuring IP Routing and Multicast Operations using Device Manager 284 Index R RcvBadPackets field 176 RcvBadRoutes field 176 ReasmMaxSize field Addresses tab 99 rendezvous-point router 79 Retrans Interval field VIrtual Neighbor tab 204 RetransInterval field OSPF Interfaces tab 184 Reverse Path Forwarding 252 reverse path multicast 66 UDP 44 RIP Globals tab fields 164 RIP In/Out Policy tab accessing 143 fields 144 RIP Interface Advance tab accessing 173 fields 174 RIP interface status 175 RIP Interface tab accessing 170 fields 171 RIP changing interface configuration 173 configuring version 170 deleting inbound/outbound filtering policies 144 enabling 163 enabling on an interface 165 filtering inbound/outbound traffic 142 interface configuration 165 managing 170 managing global settings 163 RcvBadPackets counter 176 RcvBadRoutes counter 176 send modes 172 supply and listen settings 170 triggered updates counter 176 viewing 163 RIP status RcvBadPackets field 176 RcvBadRoutes 176 SentUpdates 176 RIP (Routing Information Protocol) about 43 advertisements 44 distance vector protocol 45 garbage list 44 holddown 44 hop count 45 metric 45 poisoned reverse 44 routing table 44 split horizon 44 triggered updates 44 RoutePolicy field 142, 218 321712-B Rev 03 RIP Status tab fields 176 RIP tab accessing 163, 170 route policies creating 132 editing 132 overview 129 route preferences configuring 112 RouteChanges field RIP Globals tab 164 RoutePref tab fields 113 router interfaces 91 RouterID field Ext. Link State DB tab 213 Link State Database tab 212 OSPF General tab 179 routes alternative 96 black hole 106 Index 285 Virtual Neighbor tab 205 Routes tab accessing 99 fields 100 static ARP entries 121 static default routes, definition 105 RouteSource field 142, 218 Routing Information Protocol. See RIP 43 routing policies accept 39 announce 39 Static Route tab fields 104 static routes 35 black hole static routes 36 deleting 107 overview 101 routing tables IP 99 Static Routes tab accessing 102 RP Set parameters 260 static routes, creating 102 RtrDeadInterval field OSPF Interfaces tab 184 Virtual Neighbor tab 204 RtrId field OSPF Neighbors tab 191 Virtual Neighbor tab 205 static source group adding a new group 271 configuration considerations 269 definition 268 deleting a group 271 Status field If Metrics tab 209 IP, Insert Static Routes dialog box 104 Static Routes tab 104 Rtrpriority field OSPF Interfaces tab 184 RxNewLSas field OSPF General tab 179 STP spanning tree convergence 35 S stub area, creating 200 Secondary Features tab accessing 152 send modes, RIP 172 subnet mask 31 variable-length 32 SendTrap field 149 Subnets field 142, 218 SentUpdates 176 supernet address/mask pair 34 classless interdomain routing (CIDR) address 34 contiguous network addresses 33 Sequence field Ext. Link State DB tab 213 Link State Database tab 212 SpfHoldDownTime checkbox OSPF General tab 180 SpfRuns field OSPF Areas tab 199 supply and listen settings, RIP 170 T split horizon, RIP 44 State field 150, 204 OSPF Interfaces tab 183 OSPF Neighbors tab 191 text conventions 23 time to live, setting 95 TimeOutInterval field Configuring IP Routing and Multicast Operations using Device Manager 286 Index fields 221 RIP Globals tab 165 TOS field Host tab 207 IF Metrics tab 209 Stub Area Metrics tab 210 TransitDelay field OSPF Interfaces tab 184 Virtual Neighbor tab 203 UpdateTime field RIP Globals tab 164 V VersionNumber field OSPF General tab 179 TrapEnable checkbox OSPF General tab 179 VirtIf 202 triggered updates RIP 44 virtual router interfaces 91 Type field ARP tab 121 Ext. Link State DB tab 213 Link State Database tab 211 OSPF Interfaces tab 184 VirtualMacAddr field 150 U VLANs VRRP 148, 154 UDP RIP 44 UDP Forwarding 64 UDP forwarding accessing Forwarding Lists tab 223 applying policies 225 creating UDP protocols 219 forwarding entries 221 policies 223 UDP protocols creating 219 UdpForwarding Broadcast Interfaces tab accessing 225 fields 226 UdpForwarding dialog box accessing 219 UdpForwarding Forwarding Lists tab fields 224 UdpForwarding Forwardings tab fields 222 UdpForwarding Protocols tab 321712-B Rev 03 virtual link, creating 201 Virtual Router Redundancy Protocol. See VRRP VirtualRouter UpTime field 150 VirtualRouterUpTime field 150 VLAN RIP tab accessing 165 VrId field 150, 153 Vrid field 156 VRRP 148, 154 configuring 148, 149, 152 overview 147