1.01B Dragon PTN Ethernet Services
Total Page:16
File Type:pdf, Size:1020Kb
User Manual Basic Configuration Dragon PTN Ethernet Services Dragon PTN Ethernet Services Technical Support Release 01 05/2020 https://hirschmann-support.belden.eu.com The naming of copyrighted trademarks in this manual, even when not specially indicated, should not be taken to mean that these names may be considered as free in the sense of the trademark and tradename protection law and hence that they may be freely used by anyone. © 2020 Hirschmann Automation and Control GmbH Manuals and software are protected by copyright. All rights reserved. The copying, reproduction, translation, conversion into any electronic medium or machine scannable form is not permitted, either in whole or in part. An exception is the preparation of a backup copy of the software for your own use. The performance features described here are binding only if they have been expressly agreed when the contract was made. This document was produced by Hirschmann Automation and Control GmbH according to the best of the company's knowledge. Hirschmann reserves the right to change the contents of this document without prior notice. Hirschmann can give no guarantee in respect of the correctness or accuracy of the information in this document. Hirschmann can accept no responsibility for damages, resulting from the use of the network components or the associated operating software. In addition, we refer to the conditions of use specified in the license contract. You can get the latest version of this manual on the Internet at the Hirschmann product site (www.hirschmann.com). Hirschmann Automation and Control GmbH Stuttgarter Str. 45-51 72654 Neckartenzlingen Germany 2 Dragon PTN Ethernet Services Release 01 05/2020 Contents 1. INTRODUCTION ......................................................................................................... 9 1.1 General ....................................................................................................... 9 1.2 Manual References ...................................................................................... 9 2. ETHERNET ................................................................................................................ 10 2.1 General ..................................................................................................... 10 2.2 Configure Service ....................................................................................... 10 2.3 Modify Service ........................................................................................... 24 2.4 Delete Service ........................................................................................... 24 2.5 Troubleshooting ........................................................................................ 24 2.6 Monitoring ................................................................................................ 25 3. TRAFFIC ENGINEERING ............................................................................................. 28 3.1 General ..................................................................................................... 28 3.2 Classification ............................................................................................. 28 3.3 Policing and Shaping .................................................................................. 29 3.4 Queueing and Scheduling ........................................................................... 45 3.5 Monitoring ................................................................................................ 52 4. ETHERNET SERVICES ON L2/L3 IFMS ......................................................................... 57 4.1 General ..................................................................................................... 57 4.2 Service Types on L2/L3 IFMs....................................................................... 57 4.3 VLAN Based: Single VLAN with Local Service ............................................... 60 4.4 VRF Ports (Only L3 IFM) ............................................................................. 62 4.5 Back End Ports (BEn) .................................................................................. 63 4.6 L2VPN ....................................................................................................... 64 4.7 L3VPN ....................................................................................................... 65 4.8 Bandwidth Optimization Group.................................................................. 66 4.9 Detailed Examples ..................................................................................... 75 5. PROTOCOLS ............................................................................................................. 85 5.1 General ..................................................................................................... 85 5.2 Protocol Interaction: MRP (=Media Redundancy Protocol) .......................... 86 5.3 Layer 2: IGMP Snooping ............................................................................. 92 5.4 Layer 2: MSTP (=Multiple Spanning Tree Protocol) ...................................... 95 5.5 Layer 3: IGMP .......................................................................................... 102 5.6 Layer 3: PIM ............................................................................................ 104 5.7 Layer 3: OSPF (=Open Shortest Path First) ................................................ 108 5.8 Layer 3: Static Routing ............................................................................. 115 5.9 Layer 3: Virtual Router, VRF ..................................................................... 117 5.10 Layer 3: VRRP (=Virtual Router Redundancy Protocol) .............................. 122 5.11 Layer 3: DHCP Relay ................................................................................. 127 5.12 Security: IP ACL (= IP Access Control List) .................................................. 130 Dragon PTN Ethernet Services 3 Release 01 05/2020 5.13 Security: MAC ACL (= MAC Access Control List) ......................................... 134 6. POWER OVER ETHERNET (POE) ............................................................................... 137 6.1 General ................................................................................................... 137 6.2 Connect PoE Hardware ............................................................................ 137 6.3 Configure PoE .......................................................................................... 138 6.4 PoE Configuration Rules ........................................................................... 139 6.5 PoE Status ............................................................................................... 140 7. LAYER2: LINK AGGREGATION/LAG (=LINK AGGREGATION GROUP) .......................... 141 7.1 Prerequisites ........................................................................................... 141 7.2 General ................................................................................................... 141 7.3 Configuration .......................................................................................... 142 8. LOOPBACK INTERFACE ........................................................................................... 146 8.1 Prerequisites ........................................................................................... 146 8.2 General ................................................................................................... 146 8.3 Configuration .......................................................................................... 146 9. TRAFFIC CONTROL / SECURITY ................................................................................ 147 9.1 E-Tree...................................................................................................... 147 9.2 Storm Control on Ethernet LAN Port ......................................................... 148 9.3 BPDU Guard on Ethernet LAN Port ........................................................... 150 9.4 Sticky MAC .............................................................................................. 151 9.5 MAC Limit ............................................................................................... 153 9.6 Static MAC Table ..................................................................................... 154 9.7 MAC Monitor .......................................................................................... 156 9.8 MAC ACL (=MAC Access Control List) ........................................................ 157 9.9 IP ACL (=IP Access Control List) ................................................................. 157 10. ABBREVIATIONS .................................................................................................... 157 List of figures Figure 1 Ethernet Application/Service Example .......................................................................... 10 Figure 2 Service Creation in Tunnels ........................................................................................... 11 Figure 3 Service Via Combined Tunnels ...................................................................................... 11 Figure 4 Create Services .............................................................................................................. 12 Figure 5 Service Type: Ethernet .................................................................................................