You've reached the end of your free preview.
Want to read all 164 pages?
Unformatted text preview: Configuration — VLANs and Spanning
Tree
Avaya Virtual Services Platform 9000 3.3
NN46250-500, 04.01
May 2012 © 2012 Avaya Inc. Copyright All Rights Reserved. Except where expressly stated otherwise, no use should be made of
materials on this site, the Documentation, Software, or Hardware
provided by Avaya. All content on this site, the documentation and the
Product provided by Avaya including the selection, arrangement and
design of the content is owned either by Avaya or its licensors and is
protected by copyright and other intellectual property laws including the
sui generis rights relating to the protection of databases. You may not
modify, copy, reproduce, republish, upload, post, transmit or distribute
in any way any content, in whole or in part, including any code and
software unless expressly authorized by Avaya. Unauthorized
reproduction, transmission, dissemination, storage, and or use without
the express written consent of Avaya can be a criminal, as well as a
civil offense under the applicable law. Notice
While reasonable efforts have been made to ensure that the
information in this document is complete and accurate at the time of
printing, Avaya assumes no liability for any errors. Avaya reserves the
right to make changes and corrections to the information in this
document without the obligation to notify any person or organization of
such changes.
Documentation disclaimer
“Documentation” means information published by Avaya in varying
mediums which may include product information, operating instructions
and performance specifications that Avaya generally makes available
to users of its products. Documentation does not include marketing
materials. Avaya shall not be responsible for any modifications,
additions, or deletions to the original published version of
documentation unless such modifications, additions, or deletions were
performed by Avaya. End User agrees to indemnify and hold harmless
Avaya, Avaya's agents, servants and employees against all claims,
lawsuits, demands and judgments arising out of, or in connection with,
subsequent modifications, additions or deletions to this documentation,
to the extent made by End User. Third-party components
Certain software programs or portions thereof included in the Product
may contain software distributed under third party agreements (“Third
Party Components”), which may contain terms that expand or limit
rights to use certain portions of the Product (“Third Party Terms”).
Information regarding distributed Linux OS source code (for those
Products that have distributed the Linux OS source code), and
identifying the copyright holders of the Third Party Components and the
Third Party Terms that apply to them is available on the Avaya Support
Web site: . Link disclaimer Trademarks Avaya is not responsible for the contents or reliability of any linked Web
sites referenced within this site or documentation provided by Avaya.
Avaya is not responsible for the accuracy of any information, statement
or content provided on these sites and does not necessarily endorse
the products, services, or information described or offered within them.
Avaya does not guarantee that these links will work all the time and has
no control over the availability of the linked pages. The trademarks, logos and service marks (“Marks”) displayed in this
site, the Documentation and Product(s) provided by Avaya are the
registered or unregistered Marks of Avaya, its affiliates, or other third
parties. Users are not permitted to use such Marks without prior written
consent from Avaya or such third party which may own the Mark.
Nothing contained in this site, the Documentation and Product(s)
should be construed as granting, by implication, estoppel, or otherwise,
any license or right in and to the Marks without the express written
permission of Avaya or the applicable third party. Warranty
Avaya provides a limited warranty on its Hardware and Software
(“Product(s)”). Refer to your sales agreement to establish the terms of
the limited warranty. In addition, Avaya’s standard warranty language,
as well as information regarding support for this Product while under
warranty is available to Avaya customers and other parties through the
Avaya Support Web site: . Please note that if
you acquired the Product(s) from an authorized Avaya reseller outside
of the United States and Canada, the warranty is provided to you by
said Avaya reseller and not by Avaya. Avaya is a registered trademark of Avaya Inc.
All non-Avaya trademarks are the property of their respective owners,
and “Linux” is a registered trademark of Linus Torvalds.
Downloading Documentation
For the most current versions of Documentation, see the Avaya
Support Web site: . Licenses Contact Avaya Support THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA
WEBSITE, ARE
APPLICABLE TO ANYONE WHO DOWNLOADS, USES AND/OR
INSTALLS AVAYA SOFTWARE, PURCHASED FROM AVAYA INC.,
ANY AVAYA AFFILIATE, OR AN AUTHORIZED AVAYA RESELLER
(AS APPLICABLE) UNDER A COMMERCIAL AGREEMENT WITH
AVAYA OR AN AUTHORIZED AVAYA RESELLER. UNLESS
OTHERWISE AGREED TO BY AVAYA IN WRITING, AVAYA DOES
NOT EXTEND THIS LICENSE IF THE SOFTWARE WAS OBTAINED
FROM ANYONE OTHER THAN AVAYA, AN AVAYA AFFILIATE OR AN
AVAYA AUTHORIZED RESELLER; AVAYA RESERVES THE RIGHT
TO TAKE LEGAL ACTION AGAINST YOU AND ANYONE ELSE
USING OR SELLING THE SOFTWARE WITHOUT A LICENSE. BY
INSTALLING, DOWNLOADING OR USING THE SOFTWARE, OR
AUTHORIZING OTHERS TO DO SO, YOU, ON BEHALF OF
YOURSELF AND THE ENTITY FOR WHOM YOU ARE INSTALLING,
DOWNLOADING OR USING THE SOFTWARE (HEREINAFTER
REFERRED TO INTERCHANGEABLY AS “YOU” AND “END USER”),
AGREE TO THESE TERMS AND CONDITIONS AND CREATE A
BINDING CONTRACT BETWEEN YOU AND AVAYA INC. OR THE
APPLICABLE AVAYA AFFILIATE ( “AVAYA”). Avaya provides a telephone number for you to use to report problems
or to ask questions about your Product. The support telephone number
is 1-800-242-2121 in the United States. For additional support
telephone numbers, see the Avaya Web site: . 2 Configuration — VLANs and Spanning Tree
Comments? [email protected] May 2012 Contents
Chapter 1: Purpose of the document................................................................................ 7
Chapter 2: New in this release........................................................................................... 9
Features.................................................................................................................................................... 9
Other changes........................................................................................................................................... 9
Chapter 3: VLAN fundamentals......................................................................................... 11
Port-based VLANs.................................................................................................................................... 11
Policy-based VLANs................................................................................................................................. 12
SPBM B-VLAN.......................................................................................................................................... 20
VLAN tagging and port types.................................................................................................................... 20
VLAN router interfaces.............................................................................................................................. 23
IP routing and VLANs................................................................................................................................ 23
VLAN implementation............................................................................................................................... 23
VLAN configuration rules.......................................................................................................................... 24
VLAN feature support................................................................................................................................ 25
Microsoft NLB clustering systems............................................................................................................. 25
VLAN MAC-layer filtering database and MAC security............................................................................. 29
Prevention of IP spoofing within a VLAN.................................................................................................. 30
VLAN loop detection and prevention........................................................................................................ 30
Chapter 4: VLAN configuration using ACLI...................................................................... 33
Creating a VLAN....................................................................................................................................... 33
Assigning an IP address to a VLAN.......................................................................................................... 36
Performing a general VLAN action........................................................................................................... 37
Configuring static MAC addresses for a VLAN......................................................................................... 39
Enabling global MAC security................................................................................................................... 40
Limiting MAC address learning................................................................................................................. 41
Configuring auto-learning and allowed MAC addresses........................................................................... 43
Adding or removing ports in a VLAN......................................................................................................... 46
Adding or removing source MAC addresses for a VLAN.......................................................................... 47
Configuring VLAN classification precedence............................................................................................ 47
Configuring NLB support........................................................................................................................... 49
Configuring a tagged port to discard untagged frames............................................................................. 50
Configuring SLPP...................................................................................................................................... 51
Configuring SLPP packet-rx on a port...................................................................................................... 52
Configuring SLPP packet-tx on a VLAN................................................................................................... 54
Viewing SLPP information......................................................................................................................... 56
Viewing SLPP information for a port......................................................................................................... 57
Configuring VLAN loop detection.............................................................................................................. 58
Configuring spoof detection...................................................................................................................... 60
Configuring multiple DSAP and SSAP...................................................................................................... 61
Viewing VLAN information........................................................................................................................ 62
Viewing brouter port information............................................................................................................... 64
Viewing VLAN port member status........................................................................................................... 64
Viewing VLAN source MAC addresses..................................................................................................... 66
Viewing VLAN forwarding database information....................................................................................... 67 Configuration — VLANs and Spanning Tree May 2012 3 Viewing manual edit MAC addresses....................................................................................................... 68
Viewing multicast MAC addresses............................................................................................................ 69
Viewing NLB-mode information................................................................................................................. 70
Viewing port-level MAC security............................................................................................................... 71
Chapter 5: VLAN configuration using EDM...................................................................... 73
Configuring the VLAN feature on a port.................................................................................................... 73
Viewing existing VLANs............................................................................................................................ 75
Viewing ports in the null VLAN.................................................................................................................. 75
Creating a port-based VLAN..................................................................................................................... 76
Configuring an IP address for a VLAN...................................................................................................... 80
Changing VLAN port membership............................................................................................................ 81
Creating a source IP subnet-based VLAN................................................................................................ 82
Creating a protocol-based VLAN.............................................................................................................. 83
Configuring user-defined protocol-based VLANs...................................................................................... 84
Configuring a source MAC address-based VLAN..................................................................................... 86
Configuring source MAC addresses for a source MAC-based VLAN....................................................... 87
Creating an SPBM B-VLAN...................................................................................................................... 88
Configuring advanced VLAN features....................................................................................................... 89
Configuring NLB support........................................................................................................................... 92
Configuring a port to accept tagged or untagged frames.......................................................................... 93
Configuring untagging default VLAN on a tagged port............................................................................. 94
Configuring SLPP globally........................................................................................................................ 94
Configuring the SLPP by VLAN................................................................................................................ 96
Configuring the SLPP by port................................................................................................................... 97
Configuring VLAN loop detection.............................................................................................................. 98
Configuring directed broadcast on a VLAN............................................................................................... 99
Configuring the forwarding database timeout........................................................................................... 100
Viewing VLAN forwarding database information....................................................................................... 101
Viewing the forwarding database for a specific VLAN.............................................................................. 102
Clearing learned MAC addresses by VLAN.............................................................................................. 103
Clearing learned MAC addresses for all VLANs by port........................................................................... 104
Configuring static forwarding..................................................................................................................... 104
Configuring static multicast for a bridge.................................................................................................... 105
Enabling global MAC security................................................................................................................... 106
Configuring multiple DSAPs and SSAPs.................................................................................................. 107
Enabling unknown MAC discard............................................................................................................... 107
Configuring MAC learning parameters...................................................................................................... 108
Configuring MAC address learning........................................................................................................... 110
Modifying auto-learned MAC addresses................................................................................................... 111
Configuring limit learning........................................................................................................................... 112
Chapter 6: Spanning tree fundamentals........................................................................... 115
Rapid Spanning Tree Protocol and Multiple Spanning Tree Protocol....................................................... 116
Chapter 7: Spanning Tree configuration using ACLI....................................................... 121
Configuring Spanning Tree....................................................................................................................... 121
Configuring Rapid Spanning Tree Protocol............................................................................................... 122
Configuring Rapid Spanning Tree Protocol for a port............................................................................... 123
Configuring the Rapid Spanning Tree Protocol version............................................................................ 125 4 Configuration — VLANs and Spanning Tree May 2012 Viewing the global RSTP configuration information.................................................................................. 125
Viewing RSTP statistics............................................................................................................................ 126
Viewing the RSTP status.......................................................................................................................... 126
Viewing the RSTP configuration information............................................................................................. 127
Viewing the RSTP status for a port........................................................................................................... 128
Viewing RSTP information for a selected port.......................................................................................... 129
Viewing the RSTP role......................................................................................
View
Full Document
- Fall '19
- Avaya