All rights reserved. Printed in the USA. January 1996.
The information in this document is subject to change without notice. The statements, configurations, technical data, and
recommendations in this document are believed to be accurate and reliable, but are presented without express or implied
warranty. Users must take full responsibility for their applications of any products specified in this document. The
information in this document is proprietary to Bay Networks, Inc.
The software described in this document is furnished under a license agreement and may only be used in accordance with the
terms of that license. A summary of the Software License is included in this document.
Restricted Rights Legend
Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
Notice for All Other Executive Agencies
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer software, the
rights of the United States Government regarding its use, reproduction, and disclosure are as set forth in the Commercial
Computer Software-Restricted Rights clause at FAR 52.227-19.
Trademarks of Bay Networks, Inc.
ACE, AFN, BCN, BLN, BN, CN, FRE, LN, Optivity, SynOptics, SynOptics Communications, Wellfleet and the Wellfleet
logo are registered trademarks and AN, ANH, ASN, BaySIS, BayStack, BCNX, BLNX, BNX, EZ Internetwork, EZ LAN,
FN, PathMan, PhonePlus, PPX, Quick2Config, RouterMan, SPEX, Bay Networks, Bay Networks Press, the Bay Networks
logo and the SynOptics logo are trademarks of Bay Networks, Inc.
Third-Party T rademarks
All other trademarks and registered trademarks are the property of their respective owners.
Statement of Conditions
In the interest of improving internal design, operational function, and/or reliability, Bay Networks, Inc. reserves the right to
make changes to the products described in this document without notice.
Bay Networks, Inc. does not assume any liability that may occur due to the use or application of the product(s) or circuit
layout(s) described herein.
SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE.
In addition, the program and information contained herein are licensed only pursuant to a license agreement that contains
restrictions on use and disclosure (that may incorporate by reference certain limitations and notices imposed by third parties).
Bay Networks Software License
Note:
This is Bay Networks basic license document. In the absence of a
software license agreement specifying varying terms, this license — or the
license included with the particular product — shall govern licensee’s use of
Bay Networks software.
This Software License shall govern the licensing of all software provided to licensee by Bay Networks (“Software”).
Bay Networks will provide licensee with Software in machine-readable form and related documentation
(“Documentation”). The Software provided under this license is proprietary to Bay Networks and to third parties from
whom Bay Networks has acquired license rights. Bay Networks will not grant any Software license whatsoev er , either
explicitly or implicitly, except by acceptance of an order for either Software or for a Bay Networks product
(“Equipment”) that is packaged with Software. Each such license is subject to the following restrictions:
1.Upon delivery of the Software, Bay Networks grants to licensee a personal, nontransferable, none xclusiv e license
to use the Software with the Equipment with which or for which it was originally acquired, including use at any
of licensee’s facilities to which the Equipment may be transferred, for the useful life of the Equipment unless
earlier terminated by default or cancellation. Use of the Software shall be limited to such Equipment and to such
facility. Software which is licensed for use on hardware not offered by Bay Networks is not subject to restricted
use on any Equipment, however, unless otherwise specified on the Documentation, each licensed copy of such
Software may only be installed on one hardware item at any time.
2.Licensee may use the Software with backup Equipment only if the Equipment with which or for which it was
acquired is inoperative.
3.Licensee may make a single copy of the Software (but not firmware) for safekeeping (archives) or backup
purposes.
4.Licensee may modify Software (but not firmware), or combine it with other software, subject to the provision
that those portions of the resulting software which incorporate Software are subject to the restrictions of this
license. Licensee shall not make the resulting software available for use by any third party.
5.Neither title nor ownership to Software passes to licensee.
6.Licensee shall not provide, or otherwise make available, any Software, in whole or in part, in any form, to any
third party. Third parties do not include consultants, subcontractors, or agents of licensee who have licensee’s
permission to use the Software at licensee’s facility, and who have agreed in writing to use the Software only in
accordance with the restrictions of this license.
7.Third-party owners from whom Bay Networks has acquired license rights to software that is incorporated into
Bay Networks products shall have the right to enforce the provisions of this license against licensee.
8.Licensee shall not remove or obscure any copyright, patent, trademark, trade secret, or similar intellectual
property or restricted rights notice within or affixed to any Software and shall reproduce and affix such notice on
any backup copy of Software or copies of software resulting from modification or combination performed by
licensee as permitted by this license.
4401 Great America Parkway, Santa Clara, CA 95054
8 Federal Street, Billerica, MA 01821
Bay Networks, Inc.
Bay Networks Software License
9.Licensee shall not reverse assemble, reverse compile, or in any way reverse engineer the Software. [Note: For
licensees in the European Community, the Softw are Directiv e dated 14 May 1991 (as may be amended from time
to time) shall apply for interoperability purposes. Licensee must notify Bay Networks in writing of any such
intended examination of the Software and Bay Networks may provide review and assistance.]
10. Notwithstanding any foregoing terms to the contrary, if licensee licenses the Bay Networks product “Site
Manager,” licensee may duplicate and install the Site Manager product as specified in the Documentation. This
right is granted solely as necessary for use of Site Manager on hardware installed with licensee’s network.
11. This license will automatically terminate upon improper handling of Software, such as by disclosure, or Bay
Networks may terminate this license by written notice to licensee if licensee fails to comply with any of the
material provisions of this license and fails to cure such failure within thirty (30) days after the receipt of written
notice from Bay Networks. Upon termination of this license, licensee shall discontinue all use of the Software
and return the Software and Documentation, including all copies, to Bay Networks.
12. Licensee’s obligations under this license shall survive expiration or termination of this license.
(continued)
4401 Great America Parkway, Santa Clara, CA 95054
8 Federal Street, Billerica, MA 01821
Bay Networks, Inc.
About This Guide
If you are responsible for configuring and managing Bay Networks routers, you
should read this guide to learn how to customize Bay Networks router software
for bridging services.
This guide,
•Transparent bridging services (Chapter 1)
•Source routing bridge services (Chapter 2)
•NetBIOS services (Chapter 3)
•Translation bridge services (Chapter 4)
•Native mode LAN (NML) services (Chapter 5)
Audience
Written for system and network managers, this guide presents information on how
to configure the Bay Networks implementation of bridging interfaces to suit your
environment.
Before Y ou Begin
Before using this guide, you must complete the following procedures:
•Create and save a configuration file that has at least one bridging interface.
•Retrieve the configuration file in local, remote, or dynamic mode.
Configuring Bridging Services
, offers details on configuring
•Reboot the router with the configuration file.
Refer to
Configuring Routers
for instructions.
xvii
Configuring Bridging Services
Bay Networks Customer Support
Bay Networks provides live telephone technical support to our distributors,
resellers, and service-contracted customers from two U.S. and three international
support centers. If you have purchased your Bay Networks product from a
distributor or authorized reseller, contact the technical support staff of that
distributor or reseller for assistance with installation, configuration,
troubleshooting, or integration issues.
Customers also have the option of purchasing direct support from Bay Networks
through a variety of service programs. The programs include priority access
telephone support, on-site engineering assistance, software subscription, hardware
replacement, and other programs designed to protect your investment.
To purchase any of these support programs, including PhonePlus™ for 24-hour
telephone technical support, call 1-800-2LANWAN. Outside the U.S. and
Canada, call (408) 764-1000. You can also receive information on support
programs from your local Bay Networks field sales office, or purchase Bay
Networks support directly from your reseller. Bay Networks provides several
methods of receiving support and information on a nonpriority basis through the
following automated systems.
CompuServe
xviii
Bay Networks maintains an active forum on CompuServ e. All you need to join us
online is a computer, a modem, and a CompuServe account. We also recommend
using the CompuServe Information Manager software, available from
CompuServe.
The Bay Networks forum contains libraries of technical and product documents
designed to help you manage and troubleshoot your Bay Networks products.
Software agents and patches are available, and the message boards are monitored
by technical staff and can be a source for problem solving and shared experiences.
Customers and resellers holding Bay Networks service contracts can visit the
special libraries to acquire advanced levels of support documentation and
software.
To open an account and receive a local dial-up number, call CompuServe at
1-800-524-3388 and ask for Representative No. 591.
•In the United Kingdom, call Freephone 0800-289378.
•In Germany, call 0130-37-32.
•In Europe (except for the United Kingdom and Germany), call
•Outside the U.S., Canada, and Europe, call (614) 529-1349 and ask for
Once you are online, you can reach our forum by typing the command GO
BAYNETWORKS at any ! prompt.
InfoFACTS
InfoFACTS is the Bay Networks free 24-hour fax-on-demand service. This
automated system contains libraries of technical and product documents designed
to help you manage and troubleshoot your Bay Networks products. The system
can return a fax copy to the caller or to a third party within minutes of being
accessed.
W orld Wide Web
The World Wide Web (WWW) is a global information system for file distribution
and online document viewing via the Internet. You need a direct connection to the
Internet and a Web Browser (such as Mosaic or Netscape).
About This Guide
(44) 272-760681.
Representative No. 591, or consult your listings for an office near you.
Bay Networks maintains a WWW Home Page that you can access at http://
www.baynetworks.com. One of the menu items on the Home Page is the
Customer Support Web Server, which offers technical documents, software
agents, and an E-mail capability for communicating with our technical support
engineers.
How to Get Help
For additional information or advice, contact the Bay Networks Technical
Response Center in your area:
United States 1-800-2LAN-WAN
Valbonne, France (33) 92-966-968
Sydney, Australia (61) 2-903-5800
Tokyo, Japan (81) 3-328-005
xix
Configuring Bridging Services
.
Conventions
This section describes the conventions used in this guide.
angle brackets (< >)Indicate that you choose the text to enter based on the
arrow character (➔)Separates menu and option names in instructions.
description inside the brackets. Do not type the
brackets when entering the command. Example: if
command syntax is
192.32.10.12
Example: Protocols
<ip_address>
➔
AppleTalk identifies the
, you enter
ping
AppleTalk option in the Protocols menu.
ping
bold text
Indicates text that you need to enter and command
dinfo
names in text. Example: Use the
command.
brackets ([ ])Indicate optional elements. You can choose none, one,
or all of the options.
italic text
Indicates variable values in command syntax
descriptions, new terms, file and directory names, and
book titles.
quotation marks (“ ”)Indicate the title of a chapter or section within a book.
screen text
ellipsis pointsHorizontal (. . .) and verticalellipsis points indicate
Indicates data that appears on the screen. Example:
Bay Networks Trap Monitor Filters
.
()
.
Set
omitted information.
vertical line (|)Indicates that you enter only one of the parts of the
command. The vertical line separates choices. Do not
type the vertical line when entering the command.
Example: If the command syntax is
show at routes
show at routes
nets
|
, you enter either
show at nets
or
, but not both.
xx
Ordering Bay Networks Publications
To purchase additional copies of this document or other Bay Networks
publications, order by part number from Bay Networks Press™ at the following
numbers. You may also request a free catalog of Bay Networks Press product
publications.
APEall-paths explorer frame
AREall-routes explorer frame
ARPAddress Resolution Protocol
BPDUBridge Protocol Data Unit
CUGIDclosed user group ID
DAdestination address
DLCIdata link connection identifier
DLSwdata link switching
DSAPdestination service access point
FCSframe check sequence
FDDIFiber Distributed Data Interface
IEEEInstitute of Electrical and Electronic Engineers
IPInternet Protocol
IPXInternet Packet Exchange
LLClogical link control
LNMLAN Network Manager
MACmedia access control
MIBManagement Information Base
MTUMaximum Transmission Unit
NetBIOSNetwork Basic Input/Output System
NMLNative Mode LAN
OUIorganizationally unique identifier
About This Guide
xxi
Configuring Bridging Services
PPPPoint-to-Point Protocol
RFCRequest for Comments
RIFRouting Information Field
SAsource address
SAPservice access point
SMDSSwitched Multimegabit Data Services
SNAPSubnetwork Access Protocol
SRsource routing
SRFspecifically routed frame
SSAPsession service access point
STEspanning tree explorer frame
TBtransparent bridging
XNSXerox Network System
xxii
Using Transparent Bridge Services
This chapter contains information on the following topics:
•The transparent bridge, including an overview of the transparent bridge and
details on how the spanning tree algorithm works
•Enabling bridge service and spanning tree on an interface
•Transparent bridge parameters, including information on how to edit the
parameters using Configuration Manager.
•Deleting the bridge and spanning tree from the router
Transparent Bridge Overview
Chapter 1
Transparent bridges are data-link layer relay devices that connect two or more
networks. They use media access control (MA C) source and destination addresses
to relay frames between connected networks.
Note:
We use the terms
throughout this chapter.
The transparent bridge provides three primary services:
•Learns the addresses of endstations on connected networks
•Forwards or drops frames based on knowledge it acquires about endstation
addresses or user-configured filters
•Ensures a loop-free topology throughout the extended network, using the
spanning tree algorithm
bridge
and
transparent bridge
interchangeably
1-1
Configuring Bridging Services
A transparent bridge also provides some translation services, converting frames
for bridging between Ethernet/802.3 LANs and Fiber Distributed Data Interface
(FDDI) LANs. Refer to “The Translation Process” later in this chapter for details
on translation services.
How the Bridge Works
The bridge receives and examines every frame transmitted on the networks to
which it is attached. It learns endstation addresses by reading the source address
of the endstation that transmitted the frame and noting which LAN interface
received the frame. The bridge enters this information into a data structure called
forwarding table
the
For example, in Figure 1-1, if Node 2 transmits a frame onto the network for the
first time, the bridge receives the frame and makes an update to its forwarding
table. The bridge notes that Node 2 is in the direction of LAN A.
, which the bridge constantly updates.
Forwarding Table
Node MAC AddrLAN
1-2
00:00:A2:00:00:01
00:00:A2:00:00:02
00:00:A2:00:00:03
00:00:A2:00:00:04
LAN A
Bridge
Node 1
MAC Address=
00:00:A2:00:00:01
Node 2
MAC Address=
00:00:A2:00:00:0200:00:A2:00:00:03
Figure 1-1.Forwarding Table Update
A
A
B
B
MAC Address=
Update
Node 3
LAN B
Node 4
MAC Address=
00:00:A2:00:00:04
Using Transparent Bridge Services
The bridge then forwards (relays to another network) or drops (discards) the frame
based on the forwarding table entries. When the bridge receives a frame, it
compares the frame’s destination address with addresses in the forwarding table.
One of these situations results:
•If the frame’s destination address is on the same LAN as its source address,
the bridge discards the frame; all nodes on that LAN already received this
frame.
•If the frame’s destination address is on a different LAN than its source
address, the bridge
forwards
the frame to that LAN.
•If there is no match for the frame’s destination address in the forwarding
table, the bridge forwards the frame to all networks except the one that
received the frame. This is called flooding.
•If the frame is destined for the bridge (for example, a spanning tree frame),
the bridge forwards the frame to the appropriate bridge entity and processes it
internally .
Note:
If a frame is forwarded or flooded to a LAN using a different data-link
level protocol, the bridge translates the frame to the appr opriate frame format
before transmission.
The T ranslation Process
The transparent bridge translates frames for bridging between Ethernet/802.3
LANs and FDDI LANs. When the transparent bridge receives Ethernet/802.3
frames destined for an FDDI LAN, it reformats those frames to the FDDI MAC
frame format. The transparent bridge sets the original MAC frame type in the
logical link control (LLC) header. Therefore, if the frame passes through a second,
FDDI-to-Ethernet/802.3 bridge, that bridge can translate the frame back to its
original format.
The bridge translates all Ethernet MAC frames to FDDI MAC and IEEE 802.2
LLC/Subnetwork Access Protocol (SNAP) encapsulation, as specified by RFC
1042. Protocols that adhere to RFC 1042 include DECnet Phase IV, Novell,
AppleTalk Phase I and II, Xerox Network System (XNS), Internet Package
Exchange (IPX), and Internet Protocol (IP).
Figure 1-2 shows the format and values of the LLC and SNAP headers of these
frames after translation.
1-3
Configuring Bridging Services
DSAPSSAPControlOUIProtocol Type
0 xAA0 xAA03000000(OriginalType)
Figure 1-2.RFC 1042 Encapsulation
AppleTalk Address Resolution Protocol (ARP) frames (Ethernet frames with a
protocol type equal to 80F3) require special translation by the Bridge Tunnel
Service.
Figure 1-3 illustrates the LLC and SNAP headers of the AppleT alk ARP outbound
frame after the Bridge Tunnel Service translation.
DSAPSSAPControlOUIProtocol Type
0 xAA0 xAA030000F880F3
SNAP LLC
SNAP LLC
1-4
Key
SNAP = Subnetwork Access Protocol
LLC = logical link control
DSAP = destination service access point
SSAP = session service access point
OUI = organizationally unique identifier
Figure 1-3.Bridge Tunnel Service Encapsulation
The bridge translates all IEEE 802.2 LLC frames by removing the length field.
Protocols in this category include AppleTalk Phase 2, Novell Proprietary, and IP.
Figures 1-4 and 1-6 illustrate different LAN configurations and show how Bridge
A translates different types of frames originating on LAN 1 for transmission
across the FDDI LAN. Figure 1-5 shows how Bridge B translates frames
transmitted from the FDDI LAN to LAN 2.
Using Transparent Bridge Services
Ethernet LAN1Ethernet LAN2
Bridge A
Bridge B
FDDI LAN
Ethernet to FDDI Translation
Through Bridge A to FDDI LANFrom Ethernet LAN
DADASASA
TYPE
=80F3
DATAFCS
SNAP LLCOUI
AAAA03000000
Bridge A
• Extracts addressing information from the Ethernet header.
• Incorporates address information into newly generated FDDI MAC header.
• Encapsulates Ethernet data according to RFC 1042.
• Recalculates frame check sequence (FCS).
Ethernet (AppleTalk ARP) to FDDI Translation
From Ethernet LAN
DA SA
TYPE
=80F3
DATAFCS
Through Bridge A to FDDI LAN
DASA
SNAP LLCOUI
AAAA030000F8
TYPE
=80F3
TYPE
=80F3
DATA
FCSDATA
FCS
Bridge A
• Extracts addressing information from the Ethernet header.
• Incorporates address information into newly generated FDDI MAC header.
• Encapsulates Ethernet data within an IEEE 802.2H-defined SNAP header that has
an organizationally unique identifier (OUI) of 0000F8.
• Recalculates FCS.
Figure 1-4.Ethernet to FDDI Translation
1-5
Configuring Bridging Services
Ethernet LAN1Ethernet LAN2
Bridge A
Bridge B
FDDI LAN
FDDI to Ethernet Translation
From FDDI LAN
DASA
SNAP LLCOUI
AAAA03000000 =80F3
TYPE
FCSDATA
Through Bridge B to Ethernet LAN
Bridge B
• Extracts addressing information from the FDDI header.
• Incorporates address information into newly generated Ethernet MAC header.
• Removes RFC 1042 from Ethernet data.
• Recalculates frame check sequence (FCS).
FDDI to Ethernet (AppleTalk ARP) Translation
From FDDI LAN
DASA
SNAP LLCOUI
AAAA030000F8
TYPE
=80F3
DATA
FCS
Through Bridge B to Ethernet LAN
DA SA
DA SA
TYPE
=80F3
TYPE
=80F3
DATAFCS
DATAFCS
Bridge B
• Extracts addressing information from the FDDI header.
• Incorporates address information into newly generated Ethernet MAC header.
• Removes Ethernet data from an IEEE 802.2H-defined SNAP header that has an
organizationally unique identifier (OUI) of 0000F8.
• Recalculates FCS.
Figure 1-5.FDDI to Ethernet Translation
1-6
Using Transparent Bridge Services
Ethernet LAN1Ethernet LAN2
Bridge ABridge B
FDDI LAN
802.3 to FDDI Translation
Through Bridge A to FDDI LANFrom 802.3 LAN
DASA LEN DSAP SSAPCTLDATAFCSDASADSAP SSAPCTLDATAFCS
Bridge A
• Extracts addressing information from the 802.3 header.
• Incorporates address information into newly generated FDDI MAC header with no length (LEN) field.
• Encapsulates 802.3 data within FDDI frame.
• Recalculates FCS.
Figure 1-6.Ethernet/802.3 to FDDI Translation
The translation process from the FDDI LAN to Ethernet/802.3 LAN (the process
Bridge B performs in Figures 1-5 and 1-6) is a mirror image of the translation
process occurring on Bridge A, with one exception: the bridge translates an
AppleTalk ARP frame that originates on the FDDI LAN and is destined for an
Ethernet/802.3 LAN as shown in Figure 1-7.
1-7
Configuring Bridging Services
AppleTalk ARP frame originating on FDDI LAN
DA SA
SNAP LLCOUI
AA AA 03= 00 00 00
Through Bridge B to 802.3 LAN
DA SA
SNAP LLCOUI
LEN
AA AA 03= 00 00 00
Bridge B
• Extracts addressing information from the FDDI MAC header
• Incorporates address information into newly generated 802.3 header
• Adds a length field
• Encapsulates FDDI data according to RFC 1042
• Recalculates FCS
Figure 1-7.AppleTalk ARP (Originating on FDDI) to 802.3 Translation
Spanning T ree Algorithm
TYPE
=80F3
TYPE
=80F3
DATA
FCS
DATAFCS
1-8
The spanning tree algorithm ensures the existence of a loop-free topology in
networks that contain parallel bridges. (Refer to
Standard 802.1d Media Access Contr ol (MAC) Bridges
Source Routing Appendix to IEEE
for details on the spanning
tree algorithm.) A loop occurs when there are alternate routes between hosts. If
there is a loop in an extended network, bridges may forward traffic indefinitely,
which can result in increased traffic and degradation in network performance.
Figure 1-8 shows an example of a network containing a loop: two parallel bridges,
Bridge 1 and Bridge 2, connect LANs A and B.
IF 9
BR 4
Using Transparent Bridge Services
LAN C
ES K
IF 5
ES J
IF 2
BR 2BR 1
IF 3
IF 6
LAN B
IF 1
IF 8
LAN A
Figure 1-8.Parallel Bridge Topology
When Endstation J initially sends a frame to Endstation K, both Bridge 1 and
Bridge 2 read the frame. Since this is the first frame sent between J and K, there is
no forwarding table entry for J or K on either of the bridges. Each bridge updates
its forwarding table to indicate that Endstation J is in the direction of LAN A.
Then, each bridge floods the frame: Bridge 1 forwards the frame over Interface 1
and Bridge 2 forwards the frame over Interface 2. Bridge 2 also forwards the
frame over Interface 3; however, to simplify the example, we do not trace this
frame.
LAN D
Key
IF = Interface
BR = Bridge
ES = Endstation
IF 7
IF 4
BR 3
1-9
Configuring Bridging Services
Next, Endstation K receives tw o copies of the frame, resulting in an inefficient use
of the available bandwidth. More serious, however, is the effect of duplicate
frames on the two bridges. The frame flooded by Bridge 1 onto Interface 1 is
ultimately read by Bridge 2 on Interface 2. When Bridge 2 reads this frame, it
updates its forwarding table to indicate that Endstation J is in the direction of
LAN B. Similarly, Bridge 1 reads the frame flooded by Bridge 2 and updates its
forwarding table to show that Endstation J is in the direction of LAN B.
Consequently , the forwarding tables of both bridges are no w corrupted and neither
bridge can properly forward a frame to Endstation J.
You can avoid this problem by implementing the spanning tree algorithm, which
produces a logical tree topology out of any arrangement of bridges. The result is
that a single path exists between any two endstations on an extended netw ork. The
spanning tree algorithm also provides a high degree of fault tolerance. It allows
the network to automatically reconfigure the spanning tree topology if there is a
bridge or data-path failure.
The spanning tree algorithm requires five values to derive the spanning tree
topology. The first, a multicast address specifying all bridges on the extended
network, is media-dependent and is automatically determined by the software.
You assign the remaining four values, which are
1-10
•Network-unique identifier for each bridge on the extended network
•Unique identifier for each bridge/LAN interface (called a port)
•Priority specifying the relative priority of each port
•Cost for each port
After you assign these values, bridges multicast and process the formatted frames
(called Bridge Protocol Data Units, or BPDUs) to derive a single loop-free
topology throughout the extended network. The bridges exchange BPDU frames
quickly, minimizing the time that service is unavailable between hosts.
In constructing a loop-free topology, the bridges within the extended network
follow these steps:
1.
Elect a root bridge.
The bridge with the lowest priority value becomes the root bridge and serves
as the root of the loop-free topology. If priority values are equal, the bridge
with the lowest bridge MAC address becomes the root bridge.
IF 3
Bridge A
Using Transparent Bridge Services
2.
Determine path costs.
The path cost is the cost of the path to the root bridge offered by each bridge
port.
3.
Select a root port and elect a designated bridge on each LAN.
Each bridge designates the port that offers the lowest-cost path to the root
bridge as the root port. In the event of equal path costs, the bridge examines
the paths’ interfaces to the root bridge. The port (interface) of the path with
the lowest interface priority to the root bridge becomes the root port. For
example, Figure 1-9 shows how Bridge A determines its root port.
Given:
Root
Bridge
IF 1
IF 2
LAN A
LAN B
IF 4
Path costs from IF 3 to root bridge and
from IF 4 to root bridge are equal.
---------AND-------IF 1 = priority 1
IF 2 = priority 2
IF 3 = priority 3
IF 4 = priority 4
Then:
IF 3 becomes root port because
IF 1’s priority is lower than IF 2’s
priority.
Figure 1-9.Root Port Determination (Equal Path Costs)
If the paths’ interfaces to the root bridge are also equal, then the root port is
the port on the bridge with the lowest priority value (Figure 1-10).
1-11
Configuring Bridging Services
Given:
Path costs from IF 3 to root bridge and
from IF 4 to root bridge are equal.
---------AND-------IF 1 = priority 1
IF 2 = priority 1
IF 3 = priority 3
IF 4 = priority 2
Then:
IF 4 becomes root port because it has
a higher priority than IF 3.
Same
priority
IF 3
Bridge A
Root
Bridge
IF 1
IF 2
LAN A
LAN B
IF 4
Figure 1-10. Root Port Determination (Equal Path Costs and Root Interface Priorities)
The spanning tree algorithm selects a bridge on each LAN as the designated
bridge. The root port of this bridge has the lowest-cost path to the root bridge.
All bridges turn off (set to blocking state) all of the lines except for the single
line that is the shortest-cost path to the root and any line attached to the LANs
for which the bridge serves as a designated bridge.
1-12
4.
Elect a designated port.
The spanning tree algorithm selects the port that connects the designated
bridge to the LAN as the designated port. If there is more than one such port,
the spanning tree algorithm selects the port with the lowest priority as the
designated port. This port, which carries all extended network traffic to and
from the LAN, is in the forwarding state.
Thus, the spanning tree algorithm removes all redundant ports (ports providing
parallel connections) from service (places in the blocking state). If there is a
topological change or a bridge or data-path failure, the algorithm derives a new
spanning tree that may move some ports from the blocking to the forwarding
state.
For example, in Figure 1-8, if all path costs are equal and Bridge 2 has the lowestbridge priority (followed by Bridge 3, Bridge 4, and Bridge 1), the spanning tree
algorithm may block Bridge 1/Interface 8 and Bridge 4/Interface 9 from service.
Figure 1-11 shows the resulting logical topology, which provides a loop-free
topology with only a single path between any two hosts.
BR 2
Using Transparent Bridge Services
LAN BLAN A
IF 1
BR 4BR 1
Given:
All path costs are equal.
Interface (IF) number
denotes its priority.
----And----
BR 2 = priority 1
BR 3 = priority 2
BR 4 = priority 3
BR 1 = priority 4
IF 2 IF 3
IF 5
Then:
Bridge 1/Interface 1 is blocked.
Bridge 4/Interface 5 is blocked.
Result:
Loop-free topology
is created.
IF 6
LAN D
IF 7
BR 3
IF 8
LAN C
Figure 1-11. Spanning Tree (Loop-Free) Logical Topology
It is very important to configure the spanning tree parameters correctly. Consider
the typical flow of traffic so that the logical topology that results from the
spanning tree algorithm is appropriate for the network.
If, in the network shown in Figure 1-8, a majority of traffic originates on LAN A
and is destined for LAN D, it is not practical to set the spanning tree parameters as
shown in Figure 1-12. This figure illustrates an inefficient spanning tree topology
for this network because the traffic from LAN A must traverse Bridge 1, LAN B,
and Bridge 2 to get to LAN D. LAN B is then congested with unnecessary traffic.
You use filters mainly for security reasons. They enable the bridge to relay or drop
a particular frame based on user-selectable fields within each of the four
encapsulation methods supported by the bridge. These encapsulation methods are
•Ethernet
•IEEE 802.2 LLC
•IEEE 802.2 LLC with SNAP header
•Novell proprietary
Using Transparent Bridge Services
Refer to
filters and how to configure them for the bridge.
Configuring Traffic Filters and Protocol Prioritization
Enabling Bridge Service
This section describes how to enable bridge service and, optionally, spanning tree
on an interface. It assumes you have read
1. Opened a configuration file.
2. Specified router hardware if this is a local mode configuration file.
3. Selected the link or net module connector on which you are enabling bridge
service, or configured a WAN circuit if this connector requires one.
Enabling Bridge Service on an Interface
To enable bridge service without spanning tree, select Bridge from the Select
Protocols menu and click on OK. The Select Protocols menu appears after you
either select a link or net module connector, or finish configuring a WAN circuit.
When you enable bridge service without spanning tree, you need not specify any
configuration information, because Configuration Manager supplies default values
for the bridge parameters. The protocol pop-up window for the next enabled
protocol appears, or, if only bridge is enabled on this circuit, the Bay Networks
Configuration Manager window appears. To edit the default values for the bridge
parameters, refer to “Editing Bridge Parameters” for instructions.
Configuring Routers
for details about
and that you have
Enabling Spanning Tree on an Interface
To enable spanning tree on an interface, use the following procedure.
1.From the Select Protocols menu, select the Spanning Tree option that is
directly under the Bridge option.
Note that the Configuration Manager also selects the Bridge option because
this Spanning Tree protocol cannot run without Bridge enabled.
2.Click on OK.
The Spanning Tree Autoconfiguration window appears (Figure 1-13).
1-15
Configuring Bridging Services
When you enable spanning tree service, you need only configure the Bridge
Priority and Bridge MAC Address parameters. The Configuration Manager
supplies default values for the remaining parameters. If you want to edit the
default values, see “Editing Bridge Parameters” later in this section.
Note: Because the spanning tree is global (that is, it runs across all Bridge
circuits), the Configuration Manager only displays the Spanning Tree
Autoconfiguration window the first time you specify Spanning Tree for the
Bridge. If you have previously specified Spanning Tree for source routing, this
window will not appear. To change the parameter settings at a later time, r efer
to the “Editing Bridge Parameters” section.
3.Configure the parameters, using the descriptions that follow as a guide.
4.When you have configured the required parameters, click on OK.
A pop-up window prompts
Do you want to edit the Spanning Tree Interface Details?
5.Click on Cancel to enable default Spanning Tree service and display the
next protocol-specific pop-up window, or click on OK to edit the default
spanning tree values.
1-16
(Refer to “Editing Bridge Parameters” for instructions.)
Using Transparent Bridge Services
Figure 1-13. Spanning Tree Autoconfiguration Window
Parameter:Bridge Priority
Default:128
Range:0 to 65535
Function:Combined with the Bridge MAC Address parameter, assigns a 64-bit
bridge ID to the router. This parameter supplies the most significant 16
bits of the bridge ID, while Bridge MAC Address supplies the remaining
(least significant) 48 bits.
The spanning tree uses the bridge ID to select the root bridge. In selecting
the root bridge, the spanning tree chooses the bridge with the lowest
bridge ID number. Thus, the lower the value you set for this parameter,
the more likely it is that the router will be selected as the root bridge.
Instructions:Enter a decimal value from 0 to 65535.
MIB Object ID:1.3.6.1.4.1.18.3.5.1.2.1.5
1-17
Configuring Bridging Services
Parameter:Bridge MAC Address
Default:Defaults to a unique MAC address that the router automatically creates
based on the router’s backplane ID.
Options:Any valid 48-bit MAC-level address
Function:Combined with the Bridge Priority parameter, assigns a 64-bit bridge ID
to the router. Bridge Priority supplies the most significant 16 bits of the
bridge ID, while this parameter supplies the remaining (least significant)
48 bits.
The spanning tree uses the bridge ID to select the root bridge. In selecting
the root bridge, the spanning tree chooses the bridge with the lowest
bridge ID number. Thus, the lo wer the setting of Bridge Priority, the more
likely it is that the router will be selected as the root bridge. In the event of
equal Bridge Priority values, the value of this parameter determines the
bridge’s priority.
Instructions:Enter a 48-bit MAC address expressed as a 12-digit hexadecimal value.
We recommend that you set this parameter to the MAC address of one of
the router’s spanning tree ports, preferably the one with the lowest
priority.
MIB Object ID:1.3.6.1.4.1.18.3.5.1.2.1.5
Editing Bridge Parameters
Once you configure a circuit to support the bridge and, optionally, the spanning
tree algorithm, you use Configuration Manager to edit the bridge and spanning
tree parameters.
This section provides information on how to access and edit these parameters.
Note: If you enable the spanning tree algorithm for your network, the
algorithm reconverges if you dynamically change any of the parameters
described in the following sections.
You access all bridge parameters from the Configuration Manager window
(Figure 1-14). (Refer to Using Site Manager Software guide for details on
accessing this window.)
1-18
Using Transparent Bridge Services
Figure 1-14. Configuration Manager Window
For each bridge and spanning tree parameter, this section provides information
about default settings, valid parameter options, the parameter function,
instructions for setting the parameter, and the Management Information Base
(MIB) object ID.
Technician Interface lets you modify parameters by issuing
commands that specify the MIB object ID. This process is equivalent to
modifying parameters using Site Manager. For more information about using the
Technician Interface to access the MIB, refer to Using Technician Interface Software.
Caution: The Technician Interface does not verify that the value you enter for
a parameter is valid. Entering an invalid value can corrupt your
configuration.
Editing Bridge Global Parameters
To edit the bridge global parameters:
1.Select Protocols➔Bridge➔Global from the Configuration Manager
window (refer to Figure 1-14).
set and commit
1-19
Configuring Bridging Services
The Edit Bridge Global Parameters window appears (Figure 1-15).
Figure 1-15. Edit Bridge Global Parameters Window
Edit the parameters, using the descriptions in the next section as a guide.
2.
3.Click on OK to save your changes and exit the window.
Site Manager returns you to the Configuration Manager window.
Bridge Global Parameter Descriptions
Use these parameter descriptions as a guide when you configure the parameters in
the Edit Bridge Global Parameters window (refer to Figure 1-15).
Parameter:Enable
Default:Enable
Options:Enable
Function:Enables or disables bridging on the entire router.
Instructions:Set to Disable if you w ant to disable bridging for all circuits on the router.
MIB Object ID:1.3.6.1.4.1.18.3.5.1.1.1.1.2
1-20
| Disable
Loading...
+ 162 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.