Avaya Bridging User Manual

Configuring Bridging Services
Router Software Version 10.0
Site Manager Software Version 4.0
Part No. 112950 Rev. A
January 1996
Copyright © 1988–1996 Bay Networks, Inc.
All rights reserved. Printed in the USA. January 1996. The information in this document is subject to change without notice. The statements, configurations, technical data, and
recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Bay Networks, Inc.
The software described in this document is furnished under a license agreement and may only be used in accordance with the terms of that license. A summary of the Software License is included in this document.
Restricted Rights Legend
Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
Notice for All Other Executive Agencies
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer software, the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth in the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.
Trademarks of Bay Networks, Inc.
ACE, AFN, BCN, BLN, BN, CN, FRE, LN, Optivity, SynOptics, SynOptics Communications, Wellfleet and the Wellfleet logo are registered trademarks and AN, ANH, ASN, BaySIS, BayStack, BCNX, BLNX, BNX, EZ Internetwork, EZ LAN, FN, PathMan, PhonePlus, PPX, Quick2Config, RouterMan, SPEX, Bay Networks, Bay Networks Press, the Bay Networks logo and the SynOptics logo are trademarks of Bay Networks, Inc.
Third-Party T rademarks
All other trademarks and registered trademarks are the property of their respective owners.
Statement of Conditions
In the interest of improving internal design, operational function, and/or reliability, Bay Networks, Inc. reserves the right to make changes to the products described in this document without notice.
Bay Networks, Inc. does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.
Portions of the code in this software product are Copyright © 1988, Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms of such portions are permitted, provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that such portions of the software were developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products deri ved from such portions of the software without specific prior written permission.
SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
In addition, the program and information contained herein are licensed only pursuant to a license agreement that contains restrictions on use and disclosure (that may incorporate by reference certain limitations and notices imposed by third parties).
Bay Networks Software License
Note:
This is Bay Networks basic license document. In the absence of a software license agreement specifying varying terms, this license — or the license included with the particular product — shall govern licensee’s use of Bay Networks software.
This Software License shall govern the licensing of all software provided to licensee by Bay Networks (“Software”). Bay Networks will provide licensee with Software in machine-readable form and related documentation (“Documentation”). The Software provided under this license is proprietary to Bay Networks and to third parties from whom Bay Networks has acquired license rights. Bay Networks will not grant any Software license whatsoev er , either explicitly or implicitly, except by acceptance of an order for either Software or for a Bay Networks product (“Equipment”) that is packaged with Software. Each such license is subject to the following restrictions:
1. Upon delivery of the Software, Bay Networks grants to licensee a personal, nontransferable, none xclusiv e license to use the Software with the Equipment with which or for which it was originally acquired, including use at any of licensee’s facilities to which the Equipment may be transferred, for the useful life of the Equipment unless earlier terminated by default or cancellation. Use of the Software shall be limited to such Equipment and to such facility. Software which is licensed for use on hardware not offered by Bay Networks is not subject to restricted use on any Equipment, however, unless otherwise specified on the Documentation, each licensed copy of such Software may only be installed on one hardware item at any time.
2. Licensee may use the Software with backup Equipment only if the Equipment with which or for which it was acquired is inoperative.
3. Licensee may make a single copy of the Software (but not firmware) for safekeeping (archives) or backup purposes.
4. Licensee may modify Software (but not firmware), or combine it with other software, subject to the provision that those portions of the resulting software which incorporate Software are subject to the restrictions of this license. Licensee shall not make the resulting software available for use by any third party.
5. Neither title nor ownership to Software passes to licensee.
6. Licensee shall not provide, or otherwise make available, any Software, in whole or in part, in any form, to any third party. Third parties do not include consultants, subcontractors, or agents of licensee who have licensee’s permission to use the Software at licensee’s facility, and who have agreed in writing to use the Software only in accordance with the restrictions of this license.
7. Third-party owners from whom Bay Networks has acquired license rights to software that is incorporated into Bay Networks products shall have the right to enforce the provisions of this license against licensee.
8. Licensee shall not remove or obscure any copyright, patent, trademark, trade secret, or similar intellectual property or restricted rights notice within or affixed to any Software and shall reproduce and affix such notice on any backup copy of Software or copies of software resulting from modification or combination performed by licensee as permitted by this license.
4401 Great America Parkway, Santa Clara, CA 95054
8 Federal Street, Billerica, MA 01821
Bay Networks, Inc.
Bay Networks Software License
9. Licensee shall not reverse assemble, reverse compile, or in any way reverse engineer the Software. [Note: For licensees in the European Community, the Softw are Directiv e dated 14 May 1991 (as may be amended from time to time) shall apply for interoperability purposes. Licensee must notify Bay Networks in writing of any such intended examination of the Software and Bay Networks may provide review and assistance.]
10. Notwithstanding any foregoing terms to the contrary, if licensee licenses the Bay Networks product “Site Manager,” licensee may duplicate and install the Site Manager product as specified in the Documentation. This right is granted solely as necessary for use of Site Manager on hardware installed with licensee’s network.
11. This license will automatically terminate upon improper handling of Software, such as by disclosure, or Bay Networks may terminate this license by written notice to licensee if licensee fails to comply with any of the material provisions of this license and fails to cure such failure within thirty (30) days after the receipt of written notice from Bay Networks. Upon termination of this license, licensee shall discontinue all use of the Software and return the Software and Documentation, including all copies, to Bay Networks.
12. Licensee’s obligations under this license shall survive expiration or termination of this license.
(continued)
4401 Great America Parkway, Santa Clara, CA 95054
8 Federal Street, Billerica, MA 01821
Bay Networks, Inc.

About This Guide

If you are responsible for configuring and managing Bay Networks routers, you should read this guide to learn how to customize Bay Networks router software for bridging services.
This guide,
Transparent bridging services (Chapter 1)
Source routing bridge services (Chapter 2)
NetBIOS services (Chapter 3)
Translation bridge services (Chapter 4)
Native mode LAN (NML) services (Chapter 5)

Audience

Written for system and network managers, this guide presents information on how to configure the Bay Networks implementation of bridging interfaces to suit your environment.

Before Y ou Begin

Before using this guide, you must complete the following procedures:
Create and save a configuration file that has at least one bridging interface.
Retrieve the configuration file in local, remote, or dynamic mode.
Configuring Bridging Services
, offers details on configuring
Reboot the router with the configuration file. Refer to
Configuring Routers
for instructions.
xvii
Configuring Bridging Services

Bay Networks Customer Support

Bay Networks provides live telephone technical support to our distributors, resellers, and service-contracted customers from two U.S. and three international support centers. If you have purchased your Bay Networks product from a distributor or authorized reseller, contact the technical support staff of that distributor or reseller for assistance with installation, configuration, troubleshooting, or integration issues.
Customers also have the option of purchasing direct support from Bay Networks through a variety of service programs. The programs include priority access telephone support, on-site engineering assistance, software subscription, hardware replacement, and other programs designed to protect your investment.
To purchase any of these support programs, including PhonePlus™ for 24-hour telephone technical support, call 1-800-2LANWAN. Outside the U.S. and Canada, call (408) 764-1000. You can also receive information on support programs from your local Bay Networks field sales office, or purchase Bay Networks support directly from your reseller. Bay Networks provides several methods of receiving support and information on a nonpriority basis through the following automated systems.

CompuServe

xviii
Bay Networks maintains an active forum on CompuServ e. All you need to join us online is a computer, a modem, and a CompuServe account. We also recommend using the CompuServe Information Manager software, available from CompuServe.
The Bay Networks forum contains libraries of technical and product documents designed to help you manage and troubleshoot your Bay Networks products. Software agents and patches are available, and the message boards are monitored by technical staff and can be a source for problem solving and shared experiences.
Customers and resellers holding Bay Networks service contracts can visit the special libraries to acquire advanced levels of support documentation and software.
To open an account and receive a local dial-up number, call CompuServe at 1-800-524-3388 and ask for Representative No. 591.
In the United Kingdom, call Freephone 0800-289378.
In Germany, call 0130-37-32.
In Europe (except for the United Kingdom and Germany), call
Outside the U.S., Canada, and Europe, call (614) 529-1349 and ask for
Once you are online, you can reach our forum by typing the command GO BAYNETWORKS at any ! prompt.

InfoFACTS

InfoFACTS is the Bay Networks free 24-hour fax-on-demand service. This automated system contains libraries of technical and product documents designed to help you manage and troubleshoot your Bay Networks products. The system can return a fax copy to the caller or to a third party within minutes of being accessed.

W orld Wide Web

The World Wide Web (WWW) is a global information system for file distribution and online document viewing via the Internet. You need a direct connection to the Internet and a Web Browser (such as Mosaic or Netscape).
About This Guide
(44) 272-760681.
Representative No. 591, or consult your listings for an office near you.
Bay Networks maintains a WWW Home Page that you can access at http:// www.baynetworks.com. One of the menu items on the Home Page is the Customer Support Web Server, which offers technical documents, software agents, and an E-mail capability for communicating with our technical support engineers.

How to Get Help

For additional information or advice, contact the Bay Networks Technical Response Center in your area:
United States 1-800-2LAN-WAN Valbonne, France (33) 92-966-968 Sydney, Australia (61) 2-903-5800 Tokyo, Japan (81) 3-328-005
xix
Configuring Bridging Services
.

Conventions

This section describes the conventions used in this guide. angle brackets (< >) Indicate that you choose the text to enter based on the
arrow character (➔) Separates menu and option names in instructions.
description inside the brackets. Do not type the brackets when entering the command. Example: if command syntax is
192.32.10.12
Example: Protocols
<ip_address>
AppleTalk identifies the
, you enter
ping
AppleTalk option in the Protocols menu.
ping
bold text
Indicates text that you need to enter and command
dinfo
names in text. Example: Use the
command.
brackets ([ ]) Indicate optional elements. You can choose none, one,
or all of the options.
italic text
Indicates variable values in command syntax descriptions, new terms, file and directory names, and book titles.
quotation marks (“ ”) Indicate the title of a chapter or section within a book.
screen text
ellipsis points Horizontal (. . .) and vertical ellipsis points indicate
Indicates data that appears on the screen. Example:
Bay Networks Trap Monitor Filters
.
()
.
Set
omitted information.
vertical line (|) Indicates that you enter only one of the parts of the
command. The vertical line separates choices. Do not type the vertical line when entering the command.
Example: If the command syntax is
show at routes show at routes
nets
|
, you enter either
show at nets
or
, but not both.
xx

Ordering Bay Networks Publications

To purchase additional copies of this document or other Bay Networks publications, order by part number from Bay Networks Press™ at the following numbers. You may also request a free catalog of Bay Networks Press product publications.
Phone: 1-800-845-9523 FAX - U.S./Canada: 1-800-582-8000 FAX - International: 1-916-939-1010

Acronyms

APE all-paths explorer frame ARE all-routes explorer frame ARP Address Resolution Protocol BPDU Bridge Protocol Data Unit CUGID closed user group ID DA destination address DLCI data link connection identifier DLSw data link switching DSAP destination service access point FCS frame check sequence FDDI Fiber Distributed Data Interface IEEE Institute of Electrical and Electronic Engineers IP Internet Protocol IPX Internet Packet Exchange LLC logical link control LNM LAN Network Manager MAC media access control MIB Management Information Base MTU Maximum Transmission Unit NetBIOS Network Basic Input/Output System NML Native Mode LAN OUI organizationally unique identifier
About This Guide
xxi
Configuring Bridging Services
PPP Point-to-Point Protocol RFC Request for Comments RIF Routing Information Field SA source address SAP service access point SMDS Switched Multimegabit Data Services SNAP Subnetwork Access Protocol SR source routing SRF specifically routed frame SSAP session service access point STE spanning tree explorer frame TB transparent bridging XNS Xerox Network System
xxii
Using Transparent Bridge Services
This chapter contains information on the following topics:
The transparent bridge, including an overview of the transparent bridge and details on how the spanning tree algorithm works
Enabling bridge service and spanning tree on an interface
Transparent bridge parameters, including information on how to edit the parameters using Configuration Manager.
Deleting the bridge and spanning tree from the router

Transparent Bridge Overview

Chapter 1
Transparent bridges are data-link layer relay devices that connect two or more networks. They use media access control (MA C) source and destination addresses to relay frames between connected networks.
Note:
We use the terms
throughout this chapter.
The transparent bridge provides three primary services:
Learns the addresses of endstations on connected networks
Forwards or drops frames based on knowledge it acquires about endstation addresses or user-configured filters
Ensures a loop-free topology throughout the extended network, using the spanning tree algorithm
bridge
and
transparent bridge
interchangeably
1-1
Configuring Bridging Services
A transparent bridge also provides some translation services, converting frames for bridging between Ethernet/802.3 LANs and Fiber Distributed Data Interface (FDDI) LANs. Refer to “The Translation Process” later in this chapter for details on translation services.

How the Bridge Works

The bridge receives and examines every frame transmitted on the networks to which it is attached. It learns endstation addresses by reading the source address of the endstation that transmitted the frame and noting which LAN interface received the frame. The bridge enters this information into a data structure called
forwarding table
the For example, in Figure 1-1, if Node 2 transmits a frame onto the network for the
first time, the bridge receives the frame and makes an update to its forwarding table. The bridge notes that Node 2 is in the direction of LAN A.
, which the bridge constantly updates.
Forwarding Table
Node MAC Addr LAN
1-2
00:00:A2:00:00:01 00:00:A2:00:00:02
00:00:A2:00:00:03 00:00:A2:00:00:04
LAN A
Bridge
Node 1
MAC Address=
00:00:A2:00:00:01
Node 2
MAC Address=
00:00:A2:00:00:02 00:00:A2:00:00:03
Figure 1-1. Forwarding Table Update
A A
B B
MAC Address=
Update
Node 3
LAN B
Node 4
MAC Address=
00:00:A2:00:00:04
Using Transparent Bridge Services
The bridge then forwards (relays to another network) or drops (discards) the frame based on the forwarding table entries. When the bridge receives a frame, it compares the frame’s destination address with addresses in the forwarding table. One of these situations results:
If the frame’s destination address is on the same LAN as its source address, the bridge discards the frame; all nodes on that LAN already received this frame.
If the frame’s destination address is on a different LAN than its source address, the bridge
forwards
the frame to that LAN.
If there is no match for the frame’s destination address in the forwarding table, the bridge forwards the frame to all networks except the one that received the frame. This is called flooding.
If the frame is destined for the bridge (for example, a spanning tree frame), the bridge forwards the frame to the appropriate bridge entity and processes it internally .
Note:
If a frame is forwarded or flooded to a LAN using a different data-link level protocol, the bridge translates the frame to the appr opriate frame format before transmission.

The T ranslation Process

The transparent bridge translates frames for bridging between Ethernet/802.3 LANs and FDDI LANs. When the transparent bridge receives Ethernet/802.3 frames destined for an FDDI LAN, it reformats those frames to the FDDI MAC frame format. The transparent bridge sets the original MAC frame type in the logical link control (LLC) header. Therefore, if the frame passes through a second, FDDI-to-Ethernet/802.3 bridge, that bridge can translate the frame back to its original format.
The bridge translates all Ethernet MAC frames to FDDI MAC and IEEE 802.2 LLC/Subnetwork Access Protocol (SNAP) encapsulation, as specified by RFC
1042. Protocols that adhere to RFC 1042 include DECnet Phase IV, Novell, AppleTalk Phase I and II, Xerox Network System (XNS), Internet Package Exchange (IPX), and Internet Protocol (IP).
Figure 1-2 shows the format and values of the LLC and SNAP headers of these frames after translation.
1-3
Configuring Bridging Services
DSAP SSAP Control OUI Protocol Type
0 xAA 0 xAA 03 000000 (OriginalType)
Figure 1-2. RFC 1042 Encapsulation
AppleTalk Address Resolution Protocol (ARP) frames (Ethernet frames with a protocol type equal to 80F3) require special translation by the Bridge Tunnel Service.
Figure 1-3 illustrates the LLC and SNAP headers of the AppleT alk ARP outbound frame after the Bridge Tunnel Service translation.
DSAP SSAP Control OUI Protocol Type
0 xAA 0 xAA 03 0000F8 80F3
SNAP LLC
SNAP LLC
1-4
Key
SNAP = Subnetwork Access Protocol LLC = logical link control DSAP = destination service access point SSAP = session service access point OUI = organizationally unique identifier
Figure 1-3. Bridge Tunnel Service Encapsulation
The bridge translates all IEEE 802.2 LLC frames by removing the length field. Protocols in this category include AppleTalk Phase 2, Novell Proprietary, and IP.
Figures 1-4 and 1-6 illustrate different LAN configurations and show how Bridge A translates different types of frames originating on LAN 1 for transmission across the FDDI LAN. Figure 1-5 shows how Bridge B translates frames transmitted from the FDDI LAN to LAN 2.
Using Transparent Bridge Services
Ethernet LAN1 Ethernet LAN2
Bridge A
Bridge B
FDDI LAN
Ethernet to FDDI Translation
Through Bridge A to FDDI LANFrom Ethernet LAN
DA DA SASA
TYPE
=80F3
DATA FCS
SNAP LLC OUI
AA AA 03 00 00 00
Bridge A
• Extracts addressing information from the Ethernet header.
• Incorporates address information into newly generated FDDI MAC header.
• Encapsulates Ethernet data according to RFC 1042.
• Recalculates frame check sequence (FCS).
Ethernet (AppleTalk ARP) to FDDI Translation
From Ethernet LAN
DA SA
TYPE =80F3
DATA FCS
Through Bridge A to FDDI LAN
DA SA
SNAP LLC OUI
AA AA 03 00 00 F8
TYPE
=80F3
TYPE
=80F3
DATA
FCSDATA
FCS
Bridge A
• Extracts addressing information from the Ethernet header.
• Incorporates address information into newly generated FDDI MAC header.
• Encapsulates Ethernet data within an IEEE 802.2H-defined SNAP header that has an organizationally unique identifier (OUI) of 0000F8.
• Recalculates FCS.
Figure 1-4. Ethernet to FDDI Translation
1-5
Configuring Bridging Services
Ethernet LAN1 Ethernet LAN2
Bridge A
Bridge B
FDDI LAN
FDDI to Ethernet Translation
From FDDI LAN
DA SA
SNAP LLC OUI
AA AA 03 00 00 00 =80F3
TYPE
FCSDATA
Through Bridge B to Ethernet LAN
Bridge B
• Extracts addressing information from the FDDI header.
• Incorporates address information into newly generated Ethernet MAC header.
• Removes RFC 1042 from Ethernet data.
• Recalculates frame check sequence (FCS).
FDDI to Ethernet (AppleTalk ARP) Translation
From FDDI LAN
DA SA
SNAP LLC OUI
AA AA 03 00 00 F8
TYPE
=80F3
DATA
FCS
Through Bridge B to Ethernet LAN
DA SA
DA SA
TYPE =80F3
TYPE =80F3
DATA FCS
DATA FCS
Bridge B
• Extracts addressing information from the FDDI header.
• Incorporates address information into newly generated Ethernet MAC header.
• Removes Ethernet data from an IEEE 802.2H-defined SNAP header that has an organizationally unique identifier (OUI) of 0000F8.
• Recalculates FCS.
Figure 1-5. FDDI to Ethernet Translation
1-6
Using Transparent Bridge Services
Ethernet LAN1 Ethernet LAN2
Bridge A Bridge B
FDDI LAN
802.3 to FDDI Translation
Through Bridge A to FDDI LANFrom 802.3 LAN
DA SA LEN DSAP SSAP CTL DATA FCS DA SA DSAP SSAP CTL DATA FCS
Bridge A
• Extracts addressing information from the 802.3 header.
• Incorporates address information into newly generated FDDI MAC header with no length (LEN) field.
• Encapsulates 802.3 data within FDDI frame.
• Recalculates FCS.
Figure 1-6. Ethernet/802.3 to FDDI Translation
The translation process from the FDDI LAN to Ethernet/802.3 LAN (the process Bridge B performs in Figures 1-5 and 1-6) is a mirror image of the translation process occurring on Bridge A, with one exception: the bridge translates an AppleTalk ARP frame that originates on the FDDI LAN and is destined for an Ethernet/802.3 LAN as shown in Figure 1-7.
1-7
Configuring Bridging Services
AppleTalk ARP frame originating on FDDI LAN
DA SA
SNAP LLC OUI
AA AA 03 = 00 00 00
Through Bridge B to 802.3 LAN
DA SA
SNAP LLC OUI
LEN
AA AA 03 = 00 00 00
Bridge B
• Extracts addressing information from the FDDI MAC header
• Incorporates address information into newly generated 802.3 header
• Adds a length field
• Encapsulates FDDI data according to RFC 1042
• Recalculates FCS
Figure 1-7. AppleTalk ARP (Originating on FDDI) to 802.3 Translation

Spanning T ree Algorithm

TYPE
=80F3
TYPE
=80F3
DATA
FCS
DATA FCS
1-8
The spanning tree algorithm ensures the existence of a loop-free topology in networks that contain parallel bridges. (Refer to
Standard 802.1d Media Access Contr ol (MAC) Bridges
Source Routing Appendix to IEEE
for details on the spanning tree algorithm.) A loop occurs when there are alternate routes between hosts. If there is a loop in an extended network, bridges may forward traffic indefinitely, which can result in increased traffic and degradation in network performance.
Figure 1-8 shows an example of a network containing a loop: two parallel bridges, Bridge 1 and Bridge 2, connect LANs A and B.
IF 9
BR 4
Using Transparent Bridge Services
LAN C
ES K
IF 5
ES J
IF 2
BR 2BR 1
IF 3
IF 6
LAN B
IF 1
IF 8
LAN A
Figure 1-8. Parallel Bridge Topology
When Endstation J initially sends a frame to Endstation K, both Bridge 1 and Bridge 2 read the frame. Since this is the first frame sent between J and K, there is no forwarding table entry for J or K on either of the bridges. Each bridge updates its forwarding table to indicate that Endstation J is in the direction of LAN A. Then, each bridge floods the frame: Bridge 1 forwards the frame over Interface 1 and Bridge 2 forwards the frame over Interface 2. Bridge 2 also forwards the frame over Interface 3; however, to simplify the example, we do not trace this frame.
LAN D
Key
IF = Interface BR = Bridge
ES = Endstation
IF 7
IF 4
BR 3
1-9
Configuring Bridging Services
Next, Endstation K receives tw o copies of the frame, resulting in an inefficient use of the available bandwidth. More serious, however, is the effect of duplicate frames on the two bridges. The frame flooded by Bridge 1 onto Interface 1 is ultimately read by Bridge 2 on Interface 2. When Bridge 2 reads this frame, it updates its forwarding table to indicate that Endstation J is in the direction of LAN B. Similarly, Bridge 1 reads the frame flooded by Bridge 2 and updates its forwarding table to show that Endstation J is in the direction of LAN B. Consequently , the forwarding tables of both bridges are no w corrupted and neither bridge can properly forward a frame to Endstation J.
You can avoid this problem by implementing the spanning tree algorithm, which produces a logical tree topology out of any arrangement of bridges. The result is that a single path exists between any two endstations on an extended netw ork. The spanning tree algorithm also provides a high degree of fault tolerance. It allows the network to automatically reconfigure the spanning tree topology if there is a bridge or data-path failure.
The spanning tree algorithm requires five values to derive the spanning tree topology. The first, a multicast address specifying all bridges on the extended network, is media-dependent and is automatically determined by the software. You assign the remaining four values, which are
1-10
Network-unique identifier for each bridge on the extended network
Unique identifier for each bridge/LAN interface (called a port)
Priority specifying the relative priority of each port
Cost for each port After you assign these values, bridges multicast and process the formatted frames
(called Bridge Protocol Data Units, or BPDUs) to derive a single loop-free topology throughout the extended network. The bridges exchange BPDU frames quickly, minimizing the time that service is unavailable between hosts.
In constructing a loop-free topology, the bridges within the extended network follow these steps:
1.
Elect a root bridge.
The bridge with the lowest priority value becomes the root bridge and serves as the root of the loop-free topology. If priority values are equal, the bridge with the lowest bridge MAC address becomes the root bridge.
IF 3
Bridge A
Using Transparent Bridge Services
2.
Determine path costs.
The path cost is the cost of the path to the root bridge offered by each bridge port.
3.
Select a root port and elect a designated bridge on each LAN.
Each bridge designates the port that offers the lowest-cost path to the root bridge as the root port. In the event of equal path costs, the bridge examines the paths’ interfaces to the root bridge. The port (interface) of the path with the lowest interface priority to the root bridge becomes the root port. For example, Figure 1-9 shows how Bridge A determines its root port.
Given:
Root Bridge
IF 1
IF 2
LAN A
LAN B
IF 4
Path costs from IF 3 to root bridge and from IF 4 to root bridge are equal.
---------AND-------­IF 1 = priority 1
IF 2 = priority 2 IF 3 = priority 3 IF 4 = priority 4
Then:
IF 3 becomes root port because IF 1’s priority is lower than IF 2’s
priority.
Figure 1-9. Root Port Determination (Equal Path Costs)
If the paths’ interfaces to the root bridge are also equal, then the root port is the port on the bridge with the lowest priority value (Figure 1-10).
1-11
Configuring Bridging Services
Given: Path costs from IF 3 to root bridge and
from IF 4 to root bridge are equal.
---------AND-------­IF 1 = priority 1
IF 2 = priority 1 IF 3 = priority 3 IF 4 = priority 2
Then:
IF 4 becomes root port because it has a higher priority than IF 3.
Same priority
IF 3
Bridge A
Root Bridge
IF 1
IF 2
LAN A
LAN B
IF 4
Figure 1-10. Root Port Determination (Equal Path Costs and Root Interface Priorities)
The spanning tree algorithm selects a bridge on each LAN as the designated bridge. The root port of this bridge has the lowest-cost path to the root bridge. All bridges turn off (set to blocking state) all of the lines except for the single line that is the shortest-cost path to the root and any line attached to the LANs for which the bridge serves as a designated bridge.
1-12
4.
Elect a designated port.
The spanning tree algorithm selects the port that connects the designated bridge to the LAN as the designated port. If there is more than one such port, the spanning tree algorithm selects the port with the lowest priority as the designated port. This port, which carries all extended network traffic to and from the LAN, is in the forwarding state.
Thus, the spanning tree algorithm removes all redundant ports (ports providing parallel connections) from service (places in the blocking state). If there is a topological change or a bridge or data-path failure, the algorithm derives a new spanning tree that may move some ports from the blocking to the forwarding state.
For example, in Figure 1-8, if all path costs are equal and Bridge 2 has the lowest­bridge priority (followed by Bridge 3, Bridge 4, and Bridge 1), the spanning tree algorithm may block Bridge 1/Interface 8 and Bridge 4/Interface 9 from service.
Figure 1-11 shows the resulting logical topology, which provides a loop-free topology with only a single path between any two hosts.
BR 2
Using Transparent Bridge Services
LAN B LAN A
IF 1
BR 4BR 1
Given: All path costs are equal.
Interface (IF) number denotes its priority.
----And----
BR 2 = priority 1 BR 3 = priority 2
BR 4 = priority 3 BR 1 = priority 4
IF 2 IF 3
IF 5
Then: Bridge 1/Interface 1 is blocked.
Bridge 4/Interface 5 is blocked.
Result: Loop-free topology
is created.
IF 6
LAN D
IF 7
BR 3
IF 8
LAN C
Figure 1-11. Spanning Tree (Loop-Free) Logical Topology
It is very important to configure the spanning tree parameters correctly. Consider the typical flow of traffic so that the logical topology that results from the spanning tree algorithm is appropriate for the network.
If, in the network shown in Figure 1-8, a majority of traffic originates on LAN A and is destined for LAN D, it is not practical to set the spanning tree parameters as shown in Figure 1-12. This figure illustrates an inefficient spanning tree topology for this network because the traffic from LAN A must traverse Bridge 1, LAN B, and Bridge 2 to get to LAN D. LAN B is then congested with unnecessary traffic.
1-13
Configuring Bridging Services
BR 4
IF 5 IF 9
LAN B LAN C
BR 1
Given:
All path costs are equal.
Interface (IF) number
denotes its priority.
----And---­BR 4 = priority 1
BR 3 = priority 2 BR 2 = priority 3 BR 1 = priority 4
Figure 1-12. Inefficient Spanning Tree Topology

Filtering Frames

IF 1
IF 8
LAN A
IF 2
BR 2
IF 3
LAN D
Then:
Bridge 2/Interface 2 is blocked.
Bridge 3/Interface 7 is blocked.
Result: Inefficient spanning
tree topology is created.
IF 7
BR 3
1-14
You use filters mainly for security reasons. They enable the bridge to relay or drop a particular frame based on user-selectable fields within each of the four encapsulation methods supported by the bridge. These encapsulation methods are
Ethernet
IEEE 802.2 LLC
IEEE 802.2 LLC with SNAP header
Novell proprietary
Using Transparent Bridge Services
Refer to filters and how to configure them for the bridge.
Configuring Traffic Filters and Protocol Prioritization

Enabling Bridge Service

This section describes how to enable bridge service and, optionally, spanning tree on an interface. It assumes you have read
1. Opened a configuration file.
2. Specified router hardware if this is a local mode configuration file.
3. Selected the link or net module connector on which you are enabling bridge
service, or configured a WAN circuit if this connector requires one.

Enabling Bridge Service on an Interface

To enable bridge service without spanning tree, select Bridge from the Select Protocols menu and click on OK. The Select Protocols menu appears after you either select a link or net module connector, or finish configuring a WAN circuit.
When you enable bridge service without spanning tree, you need not specify any configuration information, because Configuration Manager supplies default values for the bridge parameters. The protocol pop-up window for the next enabled protocol appears, or, if only bridge is enabled on this circuit, the Bay Networks Configuration Manager window appears. To edit the default values for the bridge parameters, refer to “Editing Bridge Parameters” for instructions.
Configuring Routers
for details about
and that you have

Enabling Spanning Tree on an Interface

To enable spanning tree on an interface, use the following procedure.
1. From the Select Protocols menu, select the Spanning Tree option that is
directly under the Bridge option.
Note that the Configuration Manager also selects the Bridge option because this Spanning Tree protocol cannot run without Bridge enabled.
2. Click on OK.
The Spanning Tree Autoconfiguration window appears (Figure 1-13).
1-15
Configuring Bridging Services
When you enable spanning tree service, you need only configure the Bridge Priority and Bridge MAC Address parameters. The Configuration Manager supplies default values for the remaining parameters. If you want to edit the default values, see “Editing Bridge Parameters” later in this section.
Note: Because the spanning tree is global (that is, it runs across all Bridge
circuits), the Configuration Manager only displays the Spanning Tree Autoconfiguration window the first time you specify Spanning Tree for the Bridge. If you have previously specified Spanning Tree for source routing, this window will not appear. To change the parameter settings at a later time, r efer to the “Editing Bridge Parameters” section.
3. Configure the parameters, using the descriptions that follow as a guide.
4. When you have configured the required parameters, click on OK.
A pop-up window prompts
Do you want to edit the Spanning Tree Interface Details?
5. Click on Cancel to enable default Spanning Tree service and display the
next protocol-specific pop-up window, or click on OK to edit the default spanning tree values.
1-16
(Refer to “Editing Bridge Parameters” for instructions.)
Using Transparent Bridge Services
Figure 1-13. Spanning Tree Autoconfiguration Window
Parameter: Bridge Priority
Default: 128
Range: 0 to 65535
Function: Combined with the Bridge MAC Address parameter, assigns a 64-bit
bridge ID to the router. This parameter supplies the most significant 16 bits of the bridge ID, while Bridge MAC Address supplies the remaining (least significant) 48 bits.
The spanning tree uses the bridge ID to select the root bridge. In selecting the root bridge, the spanning tree chooses the bridge with the lowest bridge ID number. Thus, the lower the value you set for this parameter, the more likely it is that the router will be selected as the root bridge.
Instructions: Enter a decimal value from 0 to 65535.
MIB Object ID: 1.3.6.1.4.1.18.3.5.1.2.1.5
1-17
Configuring Bridging Services
Parameter: Bridge MAC Address
Default: Defaults to a unique MAC address that the router automatically creates
based on the router’s backplane ID.
Options: Any valid 48-bit MAC-level address
Function: Combined with the Bridge Priority parameter, assigns a 64-bit bridge ID
to the router. Bridge Priority supplies the most significant 16 bits of the bridge ID, while this parameter supplies the remaining (least significant) 48 bits.
The spanning tree uses the bridge ID to select the root bridge. In selecting the root bridge, the spanning tree chooses the bridge with the lowest bridge ID number. Thus, the lo wer the setting of Bridge Priority, the more likely it is that the router will be selected as the root bridge. In the event of equal Bridge Priority values, the value of this parameter determines the bridge’s priority.
Instructions: Enter a 48-bit MAC address expressed as a 12-digit hexadecimal value.
We recommend that you set this parameter to the MAC address of one of the router’s spanning tree ports, preferably the one with the lowest priority.
MIB Object ID: 1.3.6.1.4.1.18.3.5.1.2.1.5

Editing Bridge Parameters

Once you configure a circuit to support the bridge and, optionally, the spanning tree algorithm, you use Configuration Manager to edit the bridge and spanning tree parameters.
This section provides information on how to access and edit these parameters.
Note: If you enable the spanning tree algorithm for your network, the
algorithm reconverges if you dynamically change any of the parameters described in the following sections.
You access all bridge parameters from the Configuration Manager window (Figure 1-14). (Refer to Using Site Manager Software guide for details on accessing this window.)
1-18
Using Transparent Bridge Services
Figure 1-14. Configuration Manager Window
For each bridge and spanning tree parameter, this section provides information about default settings, valid parameter options, the parameter function, instructions for setting the parameter, and the Management Information Base (MIB) object ID.
Technician Interface lets you modify parameters by issuing commands that specify the MIB object ID. This process is equivalent to modifying parameters using Site Manager. For more information about using the Technician Interface to access the MIB, refer to Using Technician Interface Software.
Caution: The Technician Interface does not verify that the value you enter for
a parameter is valid. Entering an invalid value can corrupt your configuration.

Editing Bridge Global Parameters

To edit the bridge global parameters:
1. Select ProtocolsBridgeGlobal from the Configuration Manager
window (refer to Figure 1-14).
set and commit
1-19
Configuring Bridging Services
The Edit Bridge Global Parameters window appears (Figure 1-15).
Figure 1-15. Edit Bridge Global Parameters Window
Edit the parameters, using the descriptions in the next section as a guide.
2.
3. Click on OK to save your changes and exit the window.
Site Manager returns you to the Configuration Manager window.

Bridge Global Parameter Descriptions

Use these parameter descriptions as a guide when you configure the parameters in the Edit Bridge Global Parameters window (refer to Figure 1-15).
Parameter: Enable
Default: Enable
Options: Enable
Function: Enables or disables bridging on the entire router.
Instructions: Set to Disable if you w ant to disable bridging for all circuits on the router.
MIB Object ID: 1.3.6.1.4.1.18.3.5.1.1.1.1.2
1-20
| Disable
Loading...
+ 162 hidden pages