Cisco CMTS Router Layer 2 and VPN Features Configuration Guide First Published: February 14, 2008 Last Modified: July 11, 2012

Total Page:16

File Type:pdf, Size:1020Kb

Cisco CMTS Router Layer 2 and VPN Features Configuration Guide First Published: February 14, 2008 Last Modified: July 11, 2012 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide First Published: February 14, 2008 Last Modified: July 11, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-27608-01 © Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 EtherChannel for the Cisco Cable Modem Termination System 1 Prerequisites for EtherChannel on the Cisco CMTS 2 Restrictions for EtherChannel on the Cisco CMTS 3 Information About EtherChannel on the Cisco CMTS 3 Introduction to EtherChannel on the Cisco CMTS 3 Cisco FastEtherChannel (FEC) and GigabitEtherChannel (GEC) on the Cisco uBR7246VXR Router 4 Cisco GigabitEtherChannel (GEC) on the Cisco uBR10012 Router 4 How to Configure EtherChannel on the Cisco CMTS 5 Configuring FEC or GEC EtherChannel on the Cisco CMTS 5 Troubleshooting Tips 7 What to Do Next 7 Verifying EtherChannel on the Cisco CMTS 8 Configuration Examples for EtherChannel on the Cisco CMTS 8 Additional References 11 Feature Information for EtherChannel on the Cisco CMTS 14 CHAPTER 2 Link Aggregation Control Protocol (IEEE 802.3ad) Support for Cisco uBR10012 Routers 15 LACP Feature Advantages 16 LACP Feature Limitations 18 LACP Feature Components 18 Configuring LACP Service Components 19 Configuring a Port Channel Virtual Interface 19 Configuring LACP Port Priority 20 Configuring LACP System Priority 21 Configuring LACP 1:1 Link Redundancy 22 Configuring Minimum Active Bundled LACP Ports 22 Configuring Maximum Active Bundled LACP Ports 23 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide OL-27608-01 iii Contents Configuring LACP 24 Additional References 25 Feature Information for LACP services 26 CHAPTER 3 Cisco uBR7200 Series MPLS VPN Cable Enhancements 27 Feature Overview 28 Benefits 30 Restrictions 31 Supported Platforms 32 Prerequisites 32 Other Important Information 32 Configuration Tasks 33 Creating VRFs for each VPN 33 Defining Subinterfaces on a Virtual Bundle Interface and Assigning VRFs 34 Configuring Cable Interface Bundles 35 Configuring Subinterfaces and MPLS VPNs on a Virtual Bundle Interface 36 Configuring MPLS in the P Routers in the Provider Core 36 Verifying the MPLS VPN Configuration 37 Configuration Examples 37 Subinterface Configuration Example 37 Cable Interface Bundling Example 38 Subinterface Definition on Virtual Bundle Example 38 Cable Interface Bundle Master Configuration Example 39 PE Router Configuration Example 39 P Router Configuration Example 42 Command Reference 44 Additional References 44 Feature Information for Cisco uBR7200 Series MPLS VPN Cable Enhancements 45 CHAPTER 4 Generic Routing Encapsulation on the Cisco CMTS Routers 47 Prerequisites for Generic Routing Encapsulation 48 Important Notes about Configuring GRE 49 Restrictions for Generic Routing Encapsulation 49 Information About Generic Routing Encapsulation 49 Tunneling 49 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide iv OL-27608-01 Contents Generic Routing Encapsulation Overview 50 How to Configure Generic Routing Encapsulation 50 Additional References 54 Feature Information for Generic Routing Encapsulation 55 CHAPTER 5 L2VPN Support over Cable 57 Prerequisites for L2VPN Support over Cable 58 Restrictions for L2VPN Support over Cable 59 VPN ID Restrictions 60 Information About L2VPN Support over Cable 60 Point-to-Point L2VPN Forwarding Mode 61 L2VPN Encodings in the CM Configuration File 62 Supported L2VPN Encodings 62 SNMPv3 Interface 63 DOCSIS-L2VPN-MIB 63 Voice-Call Support on L2VPN CM 64 How to Configure L2VPN Support over Cable 65 Configuring the Ethernet Network System Interface 65 Preparing the DOCSIS Configuration File for L2VPN Support 66 Manual Switchover Command Line Interface 66 Verifying L2VPN Support over Cable 66 Enabling Voice-Call on a L2VPN CM 69 Verifying Dynamic Service Flows 69 Configuration Examples for L2VPN over Cable 70 Example: Specifying the Ethernet NSI Interface 70 Example: Enabling Voice Call Support on MPLS L2VPN 70 Example: Enabling Voice Call Support on 802.1q L2VPN 71 Example: Enabling Voice Call Support on CLI-based L2VPN 72 Additional References 72 Feature Information for L2VPN Support over Cable 74 CHAPTER 6 MPLS Pseudowire for Cable L2VPN 77 Prerequisites for MPLS Pseudowire for Cable L2VPN 78 Restrictions for MPLS Pseudowire for Cable L2VPN 79 Information About MPLS Pseudowire for Cable L2VPN 79 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide OL-27608-01 v Contents How MPLS Transports Layer 2 Packets 80 Supported Ethernet Encapsulation on UNI 82 MPLS Pseudowire 82 Bundle254 Interface 82 Ingress Process 83 Egress Process 83 MPLS Pseudowire Control Plane Process 83 L2VPN Pseudowire Redundancy 83 MPLS Pseudowire Provisioning Methods 84 Static Provisioning Method for MPLS Pseudowires 84 Dynamic Provisioning Method for MPLS Pseudowires 84 Cisco-Specific L2VPN TLVs 87 How to Enable MPLS on a Cisco CMTS Router 91 Configuring an LDP Router ID 91 Configuring MPLS on a Gigabit Ethernet Interface 93 Configuring an MPLS Label Distribution Protocol 94 Enabling the Cisco CMTS Support for MPLS Pseudowire for Cable L2VPN 95 How to Provision MPLS Pseudowires 95 Dynamic Provisioning of MPLS Pseudowires 95 Static Provisioning of MPLS Pseudowires 96 How to Configure L2VPN Pseudowire Redundancy 97 Configuring the Backup Pseudowire 97 Configuring Backup Delay 99 Performing Manual Switchover 100 Troubleshooting Tips 101 Configuration Examples for MPLS Pseudowire for Cable L2VPN 101 Configuration Example for Static Provisioning of MPLS Pseudowires 101 Configuration Examples for Dynamic Provisioning of MPLS Pseudowires 101 BSOD Specification-Based MPLS Pseudowire Provisioning: Example 101 Type-4 MPLS Pseudowire Provisioning Using the CM Configuration File: Example 103 Type-5 MPLS Pseudowire Provisioning Using the CM Configuration File: Example 105 Configuration Examples for L2VPN Pseudowire Redundancy 105 Example: Configuring Backup Pseudowire Peer and VC ID 106 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide vi OL-27608-01 Contents Example: Configuring Backup Delay 106 Example: L2VPN Backup MPLS Pseudowire Provisioning Using the CM Configuration File 106 Verifying the MPLS Pseudowire Configuration 107 Additional References 110 Feature Information for MPLS Pseudowire for Cable L2VPN 112 CHAPTER 7 Point-to-Point Protocol over Ethernet Termination on the Cisco CMTS 115 Prerequisites for PPPoE Termination 116 Restrictions for PPPoE Termination 116 Information About PPPoE Termination 117 Feature Overview 117 Benefits 118 How to Configure the PPPoE Termination Feature 119 Enabling VPDN Operations on the Cisco CMTS 119 Configuring a Virtual Template on the Cisco CMTS 121 Configuring a VPDN Group for PPPoE Sessions 124 Configuring a VPDN Group for L2TP Tunnel Initiation on the Cisco CMTS 127 Enabling PPPoE on a Cable Interface 130 Configuring a Cisco Router as LNS 131 Clearing PPPoE Sessions 134 Enabling SNMP Traps for Active PPPoE Sessions 135 Monitoring the PPPoE Termination Feature 136 Configuration Examples for PPPoE Termination 136 PPPoE Termination on a Cisco CMTS without L2TP Tunneling 137 PPPoE Termination on a Cisco CMTS with L2TP Tunneling 138 PPPoE Client Configuration on a Cisco Router 139 PPPoE Configuration for the L2TP Network Server 140 Additional References 141 Feature Information for PPPoE Termination 142 CHAPTER 8 Service Flow Mapping to MPLS-VPN on the Cisco CMTS 145 Prerequisites for Mapping Service Flows to MPLS-VPN 146 Restrictions for Mapping Service Flows to MPLS-VPN 148 Information About Mapping Service Flows to MPLS-VPN 148 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide OL-27608-01 vii Contents MPLS QoS via TLV for non-L2VPN Service Flow 150 VoIP SFID Mapping 150 Prerequisites for VOIP SFID Mapping 150 Restrictions for VOIP SFID Mapping 151 How to Configure the Service Flow Mapping to MPLS-VPN feature 151 Creating a DOCSIS Configuration File 151 Mapping Dynamic Service Flows 153 Configuring MPLS QoS via TLV for non-L2VPN Service Flow 155 Restrictions for Configuring MPLS QoS via TLV 155 Traffic Class for MPLS Imposition Packets 156 Traffic Classification for MPLS Disposition Packets 156 Using Vendor-Specific TLVs with AToM L2VPN and MPLS L3VPN 156 Monitoring and Maintaining Examples for Service Flow Mapping to MPLS-VPN Feature 157 Displaying CMs and CPE devices 157 Displaying SID and MPLS Mappings 158 Displaying Service Flow Configurations 159 Configuration Examples 162 Example: DOCSIS Configuration File 162 Example: MPLS VPN Interface Configuration 163 Example: Upstream Service Flow Marking TLV 164 Example: Downstream Packet Classification TLV 164 Example: MPLS QoS Configuration File 164 Additional References 166 Feature Information for Service Flow Mapping to MPLS-VPN on the Cisco CMTS Routers 169 CHAPTER 9 Transparent LAN Service over Cable 171 Prerequisites for Transparent LAN Service over Cable 172 Restrictions for Transparent LAN Service over Cable 172 Information About Transparent LAN Service over Cable 173 Feature Overview 173 Transparent LAN Service and Layer 2 Virtual Private Networks 173 IEEE 802.1Q Mapping 174 Overview 174 Cisco CMTS Router Layer 2 and VPN Features Configuration Guide viii OL-27608-01 Contents Details of IEEE 802.1Q Mapping 174 Benefits 175 How to Configure the Transparent LAN Service over Cable 175 Configuring IEEE 802.1Q VLAN Mapping 176 Enabling and Configuring Layer 2 Tunneling for IEEE 802.1Q Mapping 176 Creating the IEEE 802.1Q VLAN Bridge
Recommended publications
  • Ieee 802.1 for Homenet
    IEEE802.org/1 IEEE 802.1 FOR HOMENET March 14, 2013 IEEE 802.1 for Homenet 2 Authors IEEE 802.1 for Homenet 3 IEEE 802.1 Task Groups • Interworking (IWK, Stephen Haddock) • Internetworking among 802 LANs, MANs and other wide area networks • Time Sensitive Networks (TSN, Michael David Johas Teener) • Formerly called Audio Video Bridging (AVB) Task Group • Time-synchronized low latency streaming services through IEEE 802 networks • Data Center Bridging (DCB, Pat Thaler) • Enhancements to existing 802.1 bridge specifications to satisfy the requirements of protocols and applications in the data center, e.g. • Security (Mick Seaman) • Maintenance (Glenn Parsons) IEEE 802.1 for Homenet 4 Basic Principles • MAC addresses are “identifier” addresses, not “location” addresses • This is a major Layer 2 value, not a defect! • Bridge forwarding is based on • Destination MAC • VLAN ID (VID) • Frame filtering for only forwarding to proper outbound ports(s) • Frame is forwarded to every port (except for reception port) within the frame's VLAN if it is not known where to send it • Filter (unnecessary) ports if it is known where to send the frame (e.g. frame is only forwarded towards the destination) • Quality of Service (QoS) is implemented after the forwarding decision based on • Priority • Drop Eligibility • Time IEEE 802.1 for Homenet 5 Data Plane Today • 802.1Q today is 802.Q-2011 (Revision 2013 is ongoing) • Note that if the year is not given in the name of the standard, then it refers to the latest revision, e.g. today 802.1Q = 802.1Q-2011 and 802.1D
    [Show full text]
  • TR-221: Technical Specifications for MPLS in Mobile Backhaul Networks
    TECHNICAL REPORT TR-221 Technical Specifications for MPLS in Mobile Backhaul Networks Issue: 1 Amendment 2 Issue Date: September 2017 © The Broadband Forum. All rights reserved. Technical Specifications for MPLS in Mobile Backhaul Networks TR-221 Issue 1 Amendment 2 Notice The Broadband Forum is a non-profit corporation organized to create guidelines for broadband network system development and deployment. This Technical Report has been approved by members of the Forum. This Technical Report is subject to change. This Technical Report is copyrighted by the Broadband Forum, and all rights are reserved. Portions of this Technical Report may be copyrighted by Broadband Forum members. Intellectual Property Recipients of this Technical Report are requested to submit, with their comments, notification of any relevant patent claims or other intellectual property rights of which they may be aware that might be infringed by any implementation of this Technical Report, or use of any software code normatively referenced in this Technical Report, and to provide supporting documentation. Terms of Use 1. License Broadband Forum hereby grants you the right, without charge, on a perpetual, non-exclusive and worldwide basis, to utilize the Technical Report for the purpose of developing, making, having made, using, marketing, importing, offering to sell or license, and selling or licensing, and to otherwise distribute, products complying with the Technical Report, in all cases subject to the conditions set forth in this notice and any relevant patent and other intellectual property rights of third parties (which may include members of Broadband Forum). This license grant does not include the right to sublicense, modify or create derivative works based upon the Technical Report except to the extent this Technical Report includes text implementable in computer code, in which case your right under this License to create and modify derivative works is limited to modifying and creating derivative works of such code.
    [Show full text]
  • IEEE 802.11Be Multi-Link Operation: When the Best Could Be to Use Only a Single Interface
    IEEE 802.11be Multi-Link Operation: When the Best Could Be to Use Only a Single Interface Alvaro´ L´opez-Ravent´os Boris Bellalta Dept. Information and Communication Technologies Dept. Information and Communication Technologies Universitat Pompeu Fabra (UPF) Universitat Pompeu Fabra (UPF) Barcelona, Spain Barcelona, Spain [email protected] [email protected] Abstract—The multi-link operation (MLO) is a new feature can find the most disruptive updates. We refer to the adoption proposed to be part of the IEEE 802.11be Extremely High of multi-link communications, which represents a paradigm Throughput (EHT) amendment. Through MLO, access points shift towards concurrent transmissions. Although under the and stations will be provided with the capabilities to transmit and receive data from the same traffic flow over multiple radio multi-link label we find the multi-AP coordination and the interfaces. However, the question on how traffic flows should be multi-band/multi-channel operation features, this article is distributed over the different interfaces to maximize the WLAN focused on the analysis of the latter one. performance is still unresolved. To that end, we evaluate in this Upon its current version, the IEEE 802.11 standard already article different traffic allocation policies, under a wide variety defines two MAC architectures for supporting the multi- of scenarios and traffic loads, in order to shed some light on that question. The obtained results confirm that congestion-aware band/multi-channel operation. However, both designs present policies outperform static ones. However, and more importantly, a common limitation: MAC service data units (MSDUs) the results also reveal that traffic flows become highly vulnerable belonging to the same traffic flow can not be transmitted to the activity of neighboring networks when they are distributed across different bands [4].
    [Show full text]
  • MR52 Datasheet
    MR52 Datasheet MR52 Dual-band 802.11ac Wave 2 access point with separate radios dedicated to security, RF management, and Bluetooth High performance 802.11ac MR52 and Meraki cloud Wave 2 wireless management: A powerful The Cisco Meraki MR52 is a cloud-managed 4x4:4 802.11ac combo Wave 2 access point with MU-MIMO support. Designed for next- generation deployments in offices, schools, hospitals, shops, Management of the MR52 is through the Meraki cloud, with an and hotels, the MR52 offers high performance, enterprise-grade intuitive browser-based interface that enables rapid deployment security, and simple management. without time-consuming training or costly certifications. Since the MR52 is self-configuring and managed over the web, it can The MR52 provides a maximum of 2.5 Gbps* aggregate frame be deployed at a remote location in a matter of minutes, even rate with concurrent 2.4 GHz and 5 GHz radios. A dedicated without on-site IT staff. third radio provides real-time WIDS/WIPS with automated RF optimization, and a fourth integrated radio delivers Bluetooth 24x7 monitoring via the Meraki cloud delivers real-time alerts Low Energy (BLE) scanning and Beaconing. if the network encounters problems. Remote diagnostic tools enable immediate troubleshooting over the web so that With the combination of cloud management, high performance distributed networks can be managed with a minimum of hassle. hardware, multiple radios, and advanced software features, the MR52 makes an outstanding platform for the most demanding The MR52’s firmware is automatically kept up to date via the of uses - including high-density deployments and bandwidth or cloud.
    [Show full text]
  • Ds-Ruckus-R710.Pdf
    R710 Indoor 802.11ac Wave 2 4x4:4 Wi-Fi Access Point DATA SHEET Bandwidth-hungry voice and video applications. Internet of Things (IoT) connections. An explosion of new devices and content. With these kinds of demands, organizations in every industry need more from their Wi-Fi. But with hundreds of devices and nonstop wireless noise and interference, busy indoor spaces can make challenging wireless environments. The Ruckus R710 is a premier indoor access point, delivering industry-leading performance and reliability in the most demanding high-density locations. With BENEFITS data rates up to 800Mbps (2.4GHz) and 1.733Gbps (5GHz), the R710 delivers the highest available throughput for Wi-Fi clients. STUNNING WI-FI PERFORMANCE Provide a great user experience no matter The R710 delivers reliable, high-performance connectivity in schools, universities, how challenging the environment with public venues, hotels, conference centers, and other busy indoor spaces. The BeamFlex+™ adaptive antenna technology perfect choice for data-intensive streaming multimedia applications, it delivers and a library of 4K+ directional antenna picture-perfect HD-quality IP video, while supporting voice and data applications patterns. with stringent quality-of-service requirements. SERVE MORE DEVICES Connect more devices simultaneously with The R710 802.11ac Wave 2 Wi-Fi AP incorporates patented technologies found only four MU-MIMO spatial streams and in the Ruckus Wi-Fi portfolio. concurrent dual-band 2.4/5GHz radios while enhancing non-Wave 2 device • Extended coverage with patented BeamFlex+ utilizing multi-directional performance. antenna patterns. AUTOMATE OPTIMAL THROUGHPUT • Improve throughput with ChannelFly, which dynamically finds less congested ChannelFly™ dynamic channel technology Wi-Fi channels to use.
    [Show full text]
  • A 24Port 10G Ethernet Switch
    A 24-port 10G Ethernet Switch (with asynchronous circuitry) Andrew Lines 1 Agenda Product Information Technical Details Photos 2 Tahoe: First FocalPoint Family Member The lowest-latency feature-rich 10GE switch chip Tahoe · 10G Ethernet switch - 24 Ports · Line rate performance - 240Gb/s bandwidth SPI CPU JTAG LED - 360M frames/s - Full-speed multicast Frame Processor · Fully-integrated single chip (Scheduler) - 1MB frame memory - 16K MAC addresses ® ® · Lowest latency Ethernet ) 4) s s - -4 X X - 200ns with copper cables u u (C (C x x I I ™ U U e e · Rich Feature Set RapidArray A X XA N N (packet storage) - Extensive layer 2 features · Flexible SERDES interfaces - 10G XAUI (CX-4) - 1G SGMII Asynchronous Blocks 3 Tahoe Hardware Architecture Modular architecture, centralized control SPI CPU JTAG LED Interface Interface Interface Interface Management Frame Control LCI Lookup Handler Stats RX Port Logic Scheduler TX Port Logic P M M P Ser Ser C A A C Des Des S C C S Switch Element Data Path ® ® s s ™ u u x RapidArray x e (1MB Shared Memory) e N N RX Port Logic TX Port Logic P M M P Ser Ser C A A C Des Des S C C S 4 Tahoe Chip Plot Fabricated in TSMC 0.13um Ethernet Port Logic - SerDes RapidArray Memory - PCS - 1MB shared - MAC Nexus Crossbars - 1.5Tb/s total - 3ns latency Scheduler - Highly optimized - High event rate MAC Table - 16K addresses Management Frame Control - CPU interface - Frame handler - JTAG - Lookup - EEPROM interface - Statistics - LEDs 5 Bridge Features Robust set of layer-2 features · General Bridge Features · Security - 16K MAC entries - 802.1x; MAC Address Security - STP: multiple, rapid, standard · Monitoring - Learning and Ageing - Rich monitoring terms - Multicast GMRP and IGMPv3 · logical combination of terms · VLAN Tag (IEEE 802.1Q-2003) · Src Port, Dst Port, VLAN, - Add / Remove tags Traffic Type, Priority, Src - Per port association default MA, Dst MA, etc.
    [Show full text]
  • MPLS Layer-2 Vpns • MPLS Traffic Engineering • Summary
    Understanding MPLS BRKMPL - 1101 Khurram Waheed Systems Engineer #clmel Session Goals • Understand the problems MPLS is addressing • Understand major MPLS technology components • Understand typical MPLS applications • Understand benefits of deploying MPLS BRKMPL-1101 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Agenda • Introduction • MPLS Basics • MPLS Layer-3 VPNs • MPLS Layer-2 VPNs • MPLS Traffic Engineering • Summary BRKMPL-1101 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Introduction Why Multi-Protocol Label Switching? • SP/Carrier perspective – Reduce costs (CAPEX/OPEX); consolidate networks and maximise utilisation of resources. – Consolidated network for multiple Layer-2/3 services over same infrastructure – Support increasingly stringent SLAs (Voice + Video etc.) • Enterprise/end-user perspective – Campus/LAN – Need for network segmentation (users, applications, etc.) BRKMPL-1101 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public What is MPLS? Brief Summary • It’s all about labels … • Use the best of both worlds – Layer-2: efficient forwarding and traffic engineering – Layer-3: flexible and scalable • MPLS forwarding plane – Use of labels for forwarding Layer-2/3 data traffic – Labeled packets are switched; instead of routed • Leverage layer-2 forwarding efficiency • MPLS control/signalling plane – Use of existing IP control protocols extensions + new protocols to exchange label information • Leverage layer-3 control protocol flexibility and scalability BRKMPL-1101 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public MPLS Basics Topics Basics of MPLS Signalling and Forwarding • MPLS Reference Architecture Service (Clients) • MPLS Labels Layer-3 VPNs Layer-2 VPNs • MPLS Signalling and Forwarding Operations Transport IP/MPLS (LDP/RSVP-TE/BGP) MPLS Forwarding BRKMPL-1101 © 2015 Cisco and/or its affiliates.
    [Show full text]
  • Cisco Small Business 300 Series Managed Switches Administration
    ADMINISTRATION GUIDE Cisco Small Business 300 Series Managed Switch Administration Guide Release 1.3.5 Contents Table of Contents Chapter 1: Getting Started 1 Starting the Web-based Configuration Utility 1 Quick Start Device Configuration 4 Interface Naming Conventions 5 /Window Navigation 7 Chapter 2: Status and Statistics 11 System Summary 11 Viewing Ethernet Interfaces 11 Viewing Etherlike Statistics 13 Viewing 802.1X EAP Statistics 14 Health 15 Managing RMON 15 View Log 23 Chapter 3: Administration: System Log 24 Setting System Log Settings 24 Setting Remote Logging Settings 26 Viewing Memory Logs 28 Chapter 4: Administration: File Management 30 System Files 30 Upgrade/Backup Firmware/Language 33 Download/Backup Configuration/Log 37 Configuration Files Properties 42 Copy/Save Configuration 43 Auto Configuration via DHCP 44 Cisco Small Business 300 Series Managed Switch Administration Guide 1 Contents Chapter 5: Administration 51 Device Models 51 System Settings 53 Management Interface 55 User Accounts 55 Defining Idle Session Timeout 55 Time Settings 56 System Log 56 File Management 56 Rebooting the Device 56 Health 58 Diagnostics 59 Discovery - Bonjour 59 Discovery - LLDP 59 Discovery - CDP 60 Ping 60 Chapter 6: Administration: Time Settings 62 System Time Options 63 SNTP Modes 64 Configuring System Time 65 Chapter 7: Administration: Diagnostics 73 Testing Copper Ports 73 Displaying Optical Module Status 75 Configuring Port and VLAN Mirroring 77 Viewing CPU Utilization and Secure Core Technology 78 Chapter 8: Administration: Discovery
    [Show full text]
  • GS12 Standalone Fully Managed Gigabit Ethernet Switch
    GE Intelligent Platforms GS12 Standalone Fully Managed Gigabit Ethernet Switch Features The GS12 is a rugged, fully managed, stand- Onboard built-in test (BIT) ensures the GS12 • Fully, rugged standalone alone Gigabit Ethernet switch providing can be easily linked with other boards to Gigabit Ethernet Switch twelve 10/100/1000BaseT Ethernet ports. provide integrated system level health Aimed at out-of-the-chassis applications – monitoring and diagnostics. • 12-port fully managed 10/100/1000BaseT the networking of multiple subsystems, for (Gigabit) Ethernet switch. example – the GS12 has comprehensive The switch management may be accessed • 1x 10/100BaseT management port management capabilities that include via in-band management through the 1G • Layer 2/3 switching with advanced VLANs, Link Aggregation, Spanning Tree, ports, or via out-of-band management. support for VLANs, QoS and IPv6 IPv4, IPv6, Traffic Policing, Quality of Service Out-of-band management of the switch is • 24 Gbits/sec non-blocking switch fabric (QoS) functionality such as guaranteed accessible via 10/100 BaseT Ethernet port with full wirespeed performance Bandwidth allocation and prioritization. or a RS232 serial port, available on the front • Configuration through Web interface panel D38999 connectors. • Unmanaged version also available Connection to the light-weight, space- • Conduction cooled efficient, conduction-cooled GS12 is via the The GS12 has comprehensive network • Supports IPv6 switching/routing rugged front panel connectors, which meet management capabilities. MIL-STD-810F requirements for humidity, • Remote management support, salt spray and dust. Configuration of the switch is via a (Telnet, SSH and SNMP) comprehensive and intuitive web interface, • 2x RS232 communication ports Featuring non-blocking shared memory command line interface or SNMP.
    [Show full text]
  • Network Virtualization Using Shortest Path Bridging (802.1Aq) and IP/SPB
    avaya.com Network Virtualization using Shortest Path Bridging and IP/SPB Abstract This White Paper discusses the benefits and applicability of the IEEE 802.1aq Shortest Path Bridging (SPB) protocol which is augmented with sophisticated Layer 3 routing capabilities. The use of SPB and the value to solve virtualization of today’s network connectivity in the enterprise campus as well as the data center are covered. This document is intended for any technically savvy network manager as well as network architect who are faced with: • Reducing time to service requirements • Less tolerance for network down time • Network Virtualization requirements for Layer 2 (VLAN-extensions) and Layer 3 (VRF-extensions) • Server Virtualization needs in data center deployments requiring a large set of Layer 2 connections (VLANs) • Traffic separation requirements in campus deployments for security purposes as well as robustness considerations (i.e. contractors for maintenance reasons needing access to their equipment or guest access needs) • Multi-tenant applications such as airports, governments or any other network with multiple discrete (legal) entities that require traffic separation WHITE PAPER 1 avaya.com Table of Contents 1. Introduction ........................................................................................................................ 3 2. Benefits of SPB ................................................................................................................... 4 2.1 Network Service Enablement ............................................................................................................
    [Show full text]
  • Bandwidth Aggregation Across Multiple Smartphone Devices
    BANDWIDTH AGGREGATION ACROSS MULTIPLE SMARTPHONE DEVICES A Thesis Presented to the Faculty of California Polytechnic State University San Luis Obispo In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science by Bradley Raymond Zeller January 2014 c 2014 Bradley Raymond Zeller ALL RIGHTS RESERVED ii COMMITTEE MEMBERSHIP TITLE: Bandwidth Aggregation Across Multiple Smartphone Devices AUTHOR: Bradley Raymond Zeller DATE SUBMITTED: January 2014 COMMITTEE CHAIR: Phillip Nico, Ph.D. Professor of Computer Science COMMITTEE MEMBER: John Bellardo, Ph.D. Professor of Computer Science COMMITTEE MEMBER: Foaad Khosmood, Ph.D. Professor of Computer Science iii ABSTRACT Bandwidth Aggregation Across Multiple Smartphone Devices Bradley Raymond Zeller Smartphones now account for the majority of all cell phones in use today [23]. Ubiquitous Internet access is a valuable feature offered by these devices and the vast majority of smartphone applications make use of the Internet in one way or another. However, the bandwidth offered by these cellular networks is often much lower than we typically experience on our standard home networks, leading to a less-than-optimal user experience. This makes it very challenging and frustrating to access certain types of web content such as video streaming, large file downloads, loading large webpages, etc. Given that most modern smartphones are multi-homed and are capable of ac- cessing multiple networks simultaneously, this thesis attempts to utilize all available network interfaces in order to achieve the aggregated bandwidth of each to improve the overall network performance of the phone. To do so, I implement a bandwidth aggregation system for iOS that combines the bandwidths of multiple devices located within close proximity of each other.
    [Show full text]
  • LAN Aggregation
    CHAPTER 3 LAN Aggregation Objectives Upon completion of this chapter, you will be able to answer the following questions: n What is link aggregation? n What are the commands to configure EtherChannel? n What is EtherChannel technology? n What are the methods to troubleshoot link aggregation with EtherChannel? Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary. Port Aggregation Protocol (PAgP) page 122 PAgP auto page 127 Link Aggregation Control Protocol LACP active page 129 (LACP) page 122 LACP passive page 129 PAgP desirable page 127 03_SNCG_3282_r2a.indd 121 2/12/14 3:19 PM 122 Scaling Networks Companion Guide Introduction (3.0.1.1) Link aggregation is the ability to create one logical link using multiple physical links between two devices. This allows load sharing among the physical links, rather than having STP block one or more of the links. EtherChannel is a form of link aggrega­ tion used in switched networks. This chapter describes EtherChannel and the methods used to create an Ether­ Channel. An EtherChannel can be manually configured or can be negotiated by using the Cisco­proprietary protocol Port Aggregation Protocol (PAgP) or the IEEE 802.3ad–defined protocol Link Aggregation Control Protocol (LACP). The configuration, verification, and troubleshooting of EtherChannel are discussed. Class Activity 3.0.1.2: Imagine This It is the end of the work day. In your small­ to medium­sized business, you are try­ ing to explain to the network engineers about EtherChannel and how it looks when it is physically set up.
    [Show full text]