DELL Force10 Interoperability Guide
Total Page:16
File Type:pdf, Size:1020Kb
DELL Force10 Interoperability Guide Interoperability Guide on Key Features Dell │ Force10 Force10 Marketing Team July 2012 Dell Networking Confidential Internal use only THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND. © 2010 Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the express written permission of Dell Inc. is strictly forbidden. For more information, contact Dell. Dell, the DELL logo, and the DELL badge, PowerConnect, and PowerVault are trademarks of Dell Inc. Symantec and the SYMANTEC logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the US and other countries. Microsoft, Windows, Windows Server, and Active Directory are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. July 2012 Page ii Dell Networking Confidential Internal use only Contents Introduction ................................................................................................................ 2 Purpose of This Document ............................................................................................. 2 VTP........................................................................................................................... 3 Spanning Tree Protocols ................................................................................................ 4 PVST (FTOS) and PVST+ (IOS) ..................................................................................... 5 Switch Configuration ............................................................................................... 5 Convergence Test: .................................................................................................. 7 Results: ................................................................................................................ 7 RSTP and RPVST+ ................................................................................................... 8 Switch Configuration ............................................................................................... 8 Convergence Test: ................................................................................................ 10 Results: .............................................................................................................. 10 MSTP ................................................................................................................. 11 Implementation Note .................................................................................................. 11 Miscellaneous ...................................................................................................... 12 Port Channels ............................................................................................................ 12 Figures Figure 1 : VTP Basic Test Setup .......................................................................... 3 Figure 2: Port Channel FTOS Screenshot .............................................................. 4 Figure 3 : Dell Force 10 and Cisco Catalyst 6509 PVST+ Test Setup .............................. 5 Figure 4 : RSTP and PVST+ Setup ................................... Error! Bookmark not defined. Figure 5 : S4810_1 Configuration ........................................................................ 8 Figure 6 : S4810_2 Configuration ....................................................................... 9 Figure 7 : Catalyst 6509 Configuration ................................................................. 9 Figure 8 : Port Channel Setup ........................................................................... 12 Figure 9 : Port Channel Configuration ................................................................. 12 Tables Table 1 : Dell Force 10 vs. Cisco Features Page 1 Dell Networking Confidential Internal use only Introduction Vendors influence network architectures through features and functionality found in the equipment they manufacture, leading to the overall look and feel of the network. For example, some vendor- driven networks require a 3-tier model with core, distribution and access. Although this has been the prevalent design in the past 10 years or so, the overall increase in capex and opex expenses due to the number of switches at network layer has remained on par. Such design deserves another look. The proprietary nature of the protocols and features locked customers to one particular vendor, with some forced interdependencies of some features. Customers were forced to use proprietary features by the vendor-created dependencies between protocols. For example, early Cisco IP phones rely on CDP to collect network information and use a Cisco-proprietary PoE standard, not the IEEE standard. The Dell Force10 philosophy always has bucked this approach. Instead, buy less and build best-of- breed open and converged networks has been the model. Force10 allows for a 2-tier model of core/distribution and access. Less equipment means lower capex and opex expenses as well as a lower number of networking points of failure. Customers can design their networks with standards- based protocols and features without the need to worry about whether features will be disabled / unsupported. We have the confidence to allow our customers to build interoperable, multi-vendor networks based on standards. Inter-dependent features are based on standards. Customers can change features/products without worrying about changing their network design or architecture. Purpose of This Document The purpose of this document is to help Dell Force10 SEs and customers integrate Dell Force10 equipment into legacy Cisco networks. Table 1 : Dell Force 10 vs. Cisco Features Cisco Proprietary Dell Force10 Standard Notes Feature Feature Available? PVST+, RPVST PVST No Full interoperability IEEE CDP LLDP Higher scalability & extensibility with LLDP 802.1AB IEEE VTP GVRP Extensible - built on top of GARP 802.1p IEEE ISL 802.1Q ISL has greater header overhead 802.1D Extension 802.1X + Mac- Cisco supports 802.1X + Mac-Auth-Bypass VMPS of IEEE Auth Bypass** extension 802.1X RFC 1112, CGMP IGMP Cisco supports IGMP on all platforms 2236 Page 2 Dell Networking Confidential Internal use only Force10 recommends OSPF EIGRP OSPF Yes Cisco also supports OSPF IEEE PAgP LACP Cisco supports LACP 802.3ad HSRP VRRP RFC 2238 Cisco supports VRRP Netflow sFlow RFC 3176 More scalable IEEE Cisco switches and new IP phones support Cisco POE IEEE 802.3af 802.3af the IEEE standard VTP Force10 systems can operate in VTP transparent mode, passing traffic on untagged VLANs. Thus, Force10 systems can co-exist with VTP-enabled networks. Force10 recommends deploying the standards-based GVRP protocol. VTP packets are passed untagged. Therefore, depending on the configuration, the FTOS native VLAN or portmode hybrid capability may be required to pass such packets. The portmode hybrid command sets a physical port or port-channel to accept both tagged and untagged frames. FTOS Release 7.7.1.0 introduces native VLAN capability on physical interfaces, and FTOS Release 8.2.1.0 extends this to port-channel interfaces. In other words, starting with these releases, FTOS transparently bridges VTP packets over physical and port-channel interfaces, allowing VTP to run between devices connected to an FTOS switch/router. Figure 1 : VTP Basic Test Setup In this sample configuration, port-channel 1 and port-channel 2 are added to VLAN 100 as tagged, while remaining in VLAN 1 as untagged. Untagged traffic arrives at port-channel 1 and is flooded out Gigabit Ethernet interface 6/47 or port-channel 2. Page 3 Dell Networking Confidential Internal use only Figure 2: Port Channel FTOS Screenshot FTOS Configuration interface Port-channel 1 no ip address portmode hybrid switchport channel-member GigabitEthernet 6/0 no shutdown ! interface Port-channel 2 no ip address portmode hybrid switchport channel-member GigabitEthernet 6/47 no shutdown ! interface vlan 100 tagged port-channel 1-2 E-Series#show vlan Codes: * - Default VLAN, G - GVRP VLANs, P - Primary, C - Community, I - Isolated Q: U - Untagged, T – Tagged x - Dot1x untagged, X - Dot1x tagged G - GVRP tagged, M - Vlan-stack NUM Status Description Q Ports * 1 Active U Po1(Gi 6/0) U Po2(Gi 6/47) 100 Active T Po1(Gi 6/0) T Po2(Gi 6/47) Spanning Tree Protocols Dell Force 10 switches running FTOS support the different standard based spanning tree flavors such as MSTP, RSTP, and PVST. These three different spanning tree variations are fully compatible with other proprietary spanning tree extensions such as MST, PVST+, and RPVST+ The following section is divided into several scenarios: • PVST (FTOS) and PVST+ (IOS) • PVST (FTOS) and RPVST (IOS) • RSTP and RPVST+ • MSTP In our next revision, we aim to have two Catalyst 6509’s acting as root and backup root with dual homed connections from the S4810’s. For now, the results obtained using the configuration on figure 3, are clear enough to give us an idea of how the different spanning tree modes interact with each other. Page 4 Dell Networking Confidential Internal use only PVST (FTOS) and PVST+ (IOS)