Printed in Canada, India, and the United States of America
LEGAL NOTICE
While the information in this document is believed to be accurate and reliable, except as otherwise expressly
agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF
ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are
subject to change without notice.
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
All other trademarks are the property of their respective owners.
ATTENTION
For information about the safety precautions, read "Safety messages" in this guide.
For information about the software license, read "Software license" in this guide.
Page 3
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Contents
About this document.......................................................................................................................1
1 LAN access overview.................................................................................................................1-1
1.1.1 LAN interfaces..................................................................................................................................1-2
1.1.2 Link layer protocols ..........................................................................................................................1-3
1.2.1 Establishing the configuration task ...................................................................................................1-3
1.2.2 Entering the interface view................................................................................................................1-5
1.2.3 Configuring the interface description................................................................................................1-5
1.2.4 Configuring the interval of flow statistics.........................................................................................1-5
1.2.5 Enabling the interface........................................................................................................................1-6
1.2.6 Checking the configuration...............................................................................................................1-7
4.1.1 Origin of the VLAN..........................................................................................................................4-2
4.1.2 Application of a VLAN.....................................................................................................................4-4
4.1.3 Communication between VLANs.....................................................................................................4-6
4.2 Configuring subinterfaces to support communication between VLANs.....................................................4-7
4.2.1 Establishing the configuration task ...................................................................................................4-7
4.2.2 Encapsulating the subinterface with dot1q........................................................................................4-7
4.2.3 Configuring an IP address for the subinterface .................................................................................4-8
4.2.4 Checking the configuration...............................................................................................................4-8
4.3 Maintaining the VLAN................................................................................................................................4-9
4.3.1 Clearing VLAN packet statis ti c s.......................................................................................................4-9
4.3.2 Debugging the VLA N.......................................................................................................................4-9
4.4.1 Example of configuring different VLANs to communicate through routers...................................4-10
4.4.2 Example of configuring VLANs to communicate with non-VLANs through routers.....................4-13
A Glossary .................................................................................................................................... A-1
B Acronyms and Abbreviations ................................................................................................B-1
ii
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Page 5
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Index ................................................................................................................................................ i-1
Issue 5.3 (
30 March 2009)
Nortel Networks Inc.
iii
Page 6
Page 7
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Figures
Figure 3-1 Networking diagram of Ethernet interface configuration ...............................................................3-9
Figure 4-1 Networking diagram of the traditional LAN...................................................................................4-2
Figure 4-2 Networking diagram of the Layer 2 switch.....................................................................................4-3
Figure 4-3 Schematic diagram of VLAN networking ......................................................................................4-4
Figure 4-4 VLAN frame format based on 802.1Q............................................................................................4-5
Figure 4-5 Communication between VLANs through routers..........................................................................4-6
Figure 4-6 Networking diagram of configuring VLANs to communicate through a router...........................4-11
Figure 4-7 Networking diagram of configuring VLANs to communicate with non-VLANs through a router
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Contents
About this document.......................................................................................................................1
Issue 5.3 (
30 March 2009)
Nortel Networks Inc.
i
Page 11
Page 12
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access About this document
About this document
Purpose
This section describes the organization of this document, product version, intended audience,
conventions, and update history.
Related versions
The following table lists the product versions related to this document.
Product name Version
Nortel Secure Router 8000 Series V200R005
Intended audience
This document is intended for the following audience:
z
network engineers
z
network administrators
z
customers who are familiar with network fundamentals
Organization
This document consists of four chapters and is organized as follows.
Issue 5.3 (
Chapter Content
1 LAN access overview This chapter provides a conceptual overview of the physical
2 MAC address table
configuration
30 March 2009)
and logical interfaces and the link layer protocols supported by
the Secure Router 8000 Series.
This chapter describes the fundamentals of the MAC address
table and provides configuration procedures and examples.
Nortel Networks Inc.
1
Page 13
About this document
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Chapter Content
3 Ethernet interface
configuration
4 VLAN configuration This chapter describes the conditions in which a Virtual Local
Appendix A: Glossary;
Appendix B: Acronyms
and abbreviations
Index This section lists important keywords used in this manual to
Conventions
This section describes the symbol and text conventions used in th is document
Symbol conventions
Symbol Description
This chapter describes the significance of the Ethernet network
and provides configuration procedures and examples.
Area Network (VLAN) is used and provides configuration
procedures and examples.
This section collates the glossary and frequently used
acronyms and abbreviations.
help you access information quickly.
General conventions
Convention Description
Times New Roman Normal paragraphs are in Times New Roman font.
Boldface
Indicates a hazard with a high level of risk that, if not avoided,
can result in death or serious injury.
Indicates a hazard with a medium or low level of risk that, if
not avoided, can result in minor or moderate injury.
Indicates a potentially hazardous situation that, if not avoided,
can cause equipment damage, data loss, and performance
degradation, or unexpected results.
Indicates a tip that may help you solve a problem or save time.
Provides additional information to emphasize or supplement
important points of the main text.
Names of files, directories, folders, and users are in boldface.
For example, log on as the user root.
Italic Book titles are in italics.
2
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Page 14
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access About this document
Convention Description
Courier New
Command conventions
Convention Description
Boldface
Italic Command arguments are in italics.
[ ] Items (keywords or arguments) in square brackets [ ] are
{ x | y | ... } Alternative items are grouped in braces and separated by
[ x | y | ... ] Optional alternative items are grouped in square brackets and
{ x | y | ... } * Alternative items are grouped in braces and separated by
&<1-n> The parameter before the ampersand sign (&) can be repeated
Terminal display is in Courier New font.
The keywords of a command line are in boldface.
optional.
vertical bars. You select one item.
separated by vertical bars. You can select one item or no item.
vertical bars. You can select a minimum of one item or a
maximum of all items.
1 to n times.
# A line starting with the number sign (#) contains comments.
GUI conventions
Convention Description
Boldface
> Multilevel menus are in boldface and separated by the
Keyboard operation
Format Description
Key
Key 1+Key 2
Buttons, menus, parameters, tabs, windows, and dialog box
titles are in boldface. For example, click OK.
right-angled bracket sign (>). For example, choose File >
Create > Folder.
Press the key. For example, press Enter and press Tab.
Press the keys concurrently. For example, Ctrl+Alt+A means
press the three keys concurrently.
Issue 5.3 (
30 March 2009)
Nortel Networks Inc.
3
Page 15
About this document
Format Description
Key 1, Key 2 Press the keys in sequence. For example, Alt, A means press
Mouse operation
Action Description
Click Select and release the primary mouse button without moving
Double-click Press the primary mouse button twice quickly without moving
Drag Press and hold the primary mouse button and move the pointer
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
the two keys in sequence.
the pointer.
the pointer.
to a new position.
Update history
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Updates in Issue 01 (2008-06-06)
This is the initial field trial release of this document.
4
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Page 16
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Contents
1 LAN access overview.................................................................................................................1-1
1.1.1 LAN interfaces.....................................................................................................................................1-2
1.1.2 Link layer protocols.............................................................................................................................1-3
1.2.1 Establishing the configuration task ......................................................................................................1-3
1.2.2 Entering the interface view..................................................................................................................1-5
1.2.3 Configuring the interface description...................................................................................................1-5
1.2.4 Configuring the interval of flow statistics............................................................................................1-5
1.2.5 Enabling the interface ..........................................................................................................................1-6
1.2.6 Checking the configuration..................................................................................................................1-7
1.3.2 Debugging the interface.......................................................................................................................1-8
Issue 5.3 (
30 March 2009) Nortel Networks Inc. i
Page 17
Page 18
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Tables
Table 1-1 Command line views and prompts of physical interfaces...................................................................1-2
Table 1-2 Command line views and prompts of logical interfaces.....................................................................1-3
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 1 LAN access overview
1 LAN access overview
About this
chapter
Tle shows the con
he following tabtents of this chapter.
Section Description
1.1 Introductiondescribes local area network (LAN) This section
interfaces and link layer protocols.
1.2 Configuring interface
parameters
1.3 Maintaining interfacesThis section describes how to maintain LAN interfaces.
This section describes how to configure LAN interface
parameters.
Issue 5.3 (
30 March 2009) Nortel Networks Inc. 1-1
Page 21
1 LAN access overview
1.1 Introduction
This chapter describes the concepts of physical and logical interfaces and the link layer
protocols supported by the Nortel Secure Router 8000 Series. This chapter also describes how
to configure LAN interface parameters and maintain LAN interfaces.
For the information about wide area network (WAN) configuration, network layer protocols,
and special functions, see Nortel Secure Router 8000 Series Configuration – WAN Access
(NN46240-503).
The section describes the concepts that you need to know before you configure LAN
interfaces and link layer protocols:
z
LAN interfaces
z
Link layer protocols
1.1.1 LAN interfaces
Interface types
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Routers use two types of interfaces to exchange data and interact with other devices on the
network: physical interfaces and logical interfaces.
z
Physical interfaces have corresponding physical components. They are further divided
into two types.
− Local area network (LAN) interfaces: LAN interfaces are mainly Ethernet interfaces
through which routers exchange
− Wide area network (WAN) interfaces: WAN interfaces include ATM, POS, and
CE1/CT1 interfaces through which routers exchange data with devices of external
networks.
z
Logical interfaces, such as subinterfaces, do not physically exist. They are created
through configuration.
Command views and prompts
The following tables show the command line views and prompts of physical interfaces and
logical interfaces.
Table 1-1 Command line views and prompts of physical interfaces
Interface Command
View
Ethernet
interface
Ethernet
interface view
data with devices in a LAN.
Command Prompt
Run the interface
[Nortel-Ethernet1/0/0]
ethernet 1/0/0
command in the
system view.
Gigabit Ethernet
interface
Gigabit Ethernet
interface view
Run the interface gigabitethernet 1/0/0
[Nortel-GigabitEthernet1/0
/0]
command in the
system view.
1-2 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 22
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 1 LAN access overview
Table 1-2 Command line views and prom pts of logical interfaces
Interface Command
View
Ethernet
subinterface
GigabitEthernet
subinterface
Ethernet
subinterface
view
GigabitEthernet
subinterface
view
1.1.2 Link layer protocols
The link layer provides reliable transmission of data from one site to another. The link layer
receives packets from the network layer and then encapsulates packets into frames to deliver
them to the physical layer.
The Nortel Secure Router 8000 Series supports LAN link layer protocols as follows:
z
The Virtual Local Area Network (VLAN) divides a physical LAN into several logical
subnets, regardless of their physical locations.
z
Data transmission within a VLAN does not interfere with that in other VLANs. This
enhances the network security.
Command Prompt
Run the interface
ethernet 1/0/0.1
command in the
system view.
Run the interface
gigabitethernet
1/0/0.1 command in
the system view
[Nortel-Ethernet1/0/0.1]
[Nortel-Gigabitethernet1/0
/0.1]
1.2 Configuring interface parameters
1.2.1 Establishing the configuration task
Applicable environment
The section describes how to configure the LAN interfaces. With the Nortel Secure Router
8000 Series, you configure and maintain interfaces from the interface views.
The following table describes interface numbering for the Secure Router 8000 Series routers.
Issue 5.3 (
30 March 2009) Nortel Networks Inc. 1-3
Page 23
1 LAN access overview
Table 1-3 Interface num bering
Product Numbering
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
SR8000 routers
Preconfiguration tasks
Before you configure an interface, install the interface card on the router.
Slot:
SR8002, SR8004, and SR8008: numbered from left to right and
from the top down on the front chassis.
z
SR8008: 0 to 8
z
SR8004: 0 to 4
z
SR8002: 0 to 2
SR8012: numbered from left to right and from the bottom up on
the front chassis.
z
SR8012: 1 to 10
Card number: numbered from 0.
If there is no pinch board, the number is fixed 0.
Interface number: numbered from 0.
Marked on each interface board.
Data preparation
To configure an interface, you need the following data.
No. Data
1 Interface type and interface number
2 Description of the interface
3 Interval for traffic statistics on the interface (optional)
Configuration procedures
No. Procedure
1 Entering the interface view
2 Configuring the interface description
3 Configuring the interval of flow statistics
4 Enabling the interface
5 Checking the configuration
1-4 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 24
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 1 LAN access overview
1.2.2 Entering the interface view
Do as follows on the routers:
Step 1 Run:
system-view
The system view appears.
Step 2 Run:
interface interface-type interface-number
The interface view appears.
For an overview of interface numbering, see
Table 1-3.
For detailed information about interface numbering, see Nortel Secure Router 8000 Series – Installation (NN46240-300 or NN46240-301).
----End
1.2.3 Configuring the interface description
Before you configure an interface, you need to understand the networking requirements and
know the following information:
z
how the physical interface is connected
z
the working mode and parameters that are required for the interface
z
the negotiated link layer protocol and working parameters between the interface and the
peer interface
z
the network protocol address supported by the interface
z
the static route or dynamic routing protocol on the interface
z
parameters for packet filtering and Network Address Translation (NAT) if a firewall is
set up on the interface
NOTE
e Secure Router 8000 Series supports the descriptioninterface-description command in the interface
Th
view, which configures the interface description. The description identifies the interface function and is
useful for interface maintenance.
1.2.4 Configuring the interval of flow statistics
Configuring the global interval of flow statistics
Do as follows on the routers:
Step 1 Run:
system-view
The system view appears.
Step 2 Run:
interface traffic sampling-time time global
Issue 5.3 (
30 March 2009) Nortel Networks Inc. 1-5
Page 25
1 LAN access overview
Configuration - LAN Access and MAN Access
This command configures the global interval of flow statistics.
The interval of traffic statistics configured by this command can be applied to each physical interface.
----End
Configuring the interface interval of flow statistics
Do as follows on the routers:
Step 1 Run:
system-view
The system view appears.
Step 2 Run:
interface interface-type interface-number
The specified interface view appears.
Step 3 Run:
Nortel Secure Router 8000 Series
interface traffic sampling-time time
This command configures the interface interval of flow statistics.
z
When the global interval of flow statistics and the interface interval of flow statistics are configured
at the same time, the interface selects the interface interval of flow statistics first.
z
The physical interfaces support the configuration of the interval of flow statistics. For logical
interfaces, the interval of flow statistics uses the default system value and cannot be changed through
configuration.
----End
1.2.5 Enabling the interface
After you configure the interface, enable the interface and note the following:
z
When a physical interface is idle and not connected to cables, shut down the interface to
protect it from interference.
z
After the interface configuration is complete, run the restart command, or run the
shutdown and undo shutdown commands consecutively, to validate the configuration. Running the restart command is the same as running the shutdown and the undo
shutdown commands consecutively.
NOTE
When subinterfaces exist, if you run the shutdown command and the undo shutdown command on the
main interface in succession, the two commands must be used at an interval of at least 15 seconds.
When the interface status or the protocol status changes, the output automatically appears, as
shown in the following example:
%Jan 22 17:24:54 2007 Nortel IFNET/2/UPDOWN:Line protocol on the interface Ethe
rnet1/1/1 turns into UP state
1-6 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 26
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 1 LAN access overview
1.2.6 Checking the configuration
Run the following commands to check the previous configuration.
Action Command
Check the interface running
status and statistics.
| { begin | exclude | include } regular-expression ]
[
display ip interface brief [ interface-type
[ interface-number ] ]
Run the display interface command. If the physical status, link layer protocol status, IP
address, mask, MAC address, and physical parameters of an interface are displayed, the
configuration is successful. For example:
<Nortel> display interface ethernet 2/0/0
Ethernet2/0/0 current state : UP
Line protocol current state : UP
Description : NORTEL, Nortel Series, Ethernet2/0/0 Interface
The Maximum Transmit Unit is 1500 bytes, Hold timer is 10(sec)
Internet Address is 100.1.3.1/24
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 00e0-fc00-8fe1
Run the display ip interface brief command. If the physical status, link layer protocol status,
IP address, loopback status, and description of an interface are displayed, the configuration is
successful. For example:
<Nortel> display ip interface briefgigabitethernet 1/0/0
*down: administratively down
(l): loopback
(s): spoofing
Interface IP Address Physical Protocol Description
GigabitEthernet1/0/0 10.5.40.1 down down Nortel
30 March 2009) Nortel Networks Inc. 1-7
Page 27
1 LAN access overview
1.3 Maintaining interfaces
This section covers the following topics:
z
Clearing interface statistics
z
Debugging the interface
1.3.1 Clearing interface statistics
You cannot restore interface statistics after you clear them. Be sure that you want to clear the
statistics before you use the command.
To clear the statistics, run the following reset command in the user view.
Action Command
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Clear the interface statistics. reset counters interface [ interface-type
1.3.2 Debugging the interface
Debugging affects system performance. After you debug the interface, run the undo
debugging all command to disable debugging.
When a fault occurs on an interface, run the debugging command in the user view to locate
the fault.
For information about the debugging command related to specific interfaces, see the
corresponding maintenance sections in subsequent chap ters in this document.
[ interface-number ] ]
1-8 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 28
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Contents
2 MAC address table configuration...........................................................................................2-1
2.1.1 MAC address table overview...............................................................................................................2-2
2.1.2 Classification of MAC address entries.................................................................................................2-2
2.1.3 MAC address learning limit.................................................................................................................2-2
2.2 Configuring a MAC address table.................................................................................................................2-3
2.2.1 Establishing the configuration task ......................................................................................................2-3
2.2.2 Changing MAC address entries ...........................................................................................................2-3
2.2.3 Setting the aging time of a MAC address table....................................................................................2-4
2.2.4 Checking the configuration..................................................................................................................2-4
2.3 Configuring the MAC address learning limit................................................................................................2-5
2.3.1 Establishing the configuration task ......................................................................................................2-5
2.3.2 Configuring MAC address learning limit rules based on a VSI...........................................................2-6
2.3.3 Checking the configuration..................................................................................................................2-7
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 2 MAC address table configuration
2 MAC address table configuration
About this
chapter
Tle shows the con
he following tabtents of this chapter.
Section Description
2.1 Introductionf the MAC address This section provides an overview o
table.
2.2 Configuring a MAC
address table
2.3 Configuring the MAC ow to configure the MAC address
address learning limit
2.4 Configuration examples
2.5 TroubleshootingThis section describes how to diagnose and remove
This section describes how to configure the basic
functions of a M
Example of configuring a MAC address table.”
See “
This section describes h
learning limit.
See “Example of con
limit based on a VSI.”
This section provides configuration examples for the
MAC address table.
operational faults related to the MAC address table.
AC address table.
figuring the MAC address learning
Issue 5.3 (
30 March 2009) Nortel Networks Inc. 2-1
Page 31
2 MAC address table configuration
2.1 Introduction
This section describes the concepts that you need to know before you configure a MAC
address table:
z
MAC address table overview
z
Classification of MAC address entries
z
MAC address learning limit
2.1.1 MAC address table overview
Each station or server, which is attached to a port on a router, has its own unique MAC
address. The MAC address table of a router contains the MAC addresses of all the devices
that are connected to the router.
Generally, a router automatically creates MAC address tables by learning the source addresses
of the connected devices.
Network administrators can manually bind a MAC address and a port in the table. This can
prevent malicious users with a counterfeit MAC address from logging on to the local device
through other switches.
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
2.1.2 Classification of MAC address entries
MAC address entries are classified into the following three types:
z
Dynamic entries: Dynamic entries are learned and stored on interface boards. Dynamic
entries expire and are lost after hot swapping, interface-board resetting, or router
rebooting.
z
Static entries: Users configure static entries, which are automatically delivered to each
interface board. Static entries do not expire and are not lost after hot swapping,
interface-board resetting, or router rebooting.
z
Blackhole entries: Users configure blackhole entries, which are used to discard frames
containing a specified MAC address and are delivered to each interface board. Blackhole
entries do not expire and are not lost after hot swapping, or interface-board resetting, or
router rebooting.
2.1.3 MAC address learning limit
As a basic feature of Layer 2 forwarding, MAC address learning is automatically performed.
Thus, the learning process, which results in frequent attacks, is difficult to control.
By restricting the quantity of MAC addresses learned, you can control user access because the
MAC address is the basis of Layer 2 forwarding.
The MAC address learning limit controls MAC address learning by:
z
setting the maximum number of MAC addresses to be learned
z
controlling the speed of MAC addresses learning
z
discarding or forwarding packets after the maximum number or speed of MAC address
learning is reached
z
alarming network administrators after the maximum number or speed of MAC address
learning is reached
2-2 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 32
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 2 MAC address table configuration
Currently, you can set the MAC address learning limit on a Virtual Swit ch Instance (VSI).
NOTE
The MAC address learning limit is available only on Layer 2 interfaces, such as Fast Ethernet (FE) and
Gigabit Ethernet (GE), except for the 10GE interface. It is unavailable on other physical interfaces,
logical interfaces, and subinterfaces.
2.2 Configuring a MAC address table
2.2.1 Establishing the configuration task
Applicable environment
To use a MAC address table, you need to configure the basic functions of the MAC address
table.
Preconfiguration tasks
None
Data preparation
To configure a MAC address table, you need the following data.
No. Data
1 MAC address
2 Port number
3 Aging time of the MAC address table
Configuration procedures
No. Procedure
1 Changing MAC address entries (optional)
2 Setting the aging time of a MAC address table (optional)
3 Checking the configuration
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 2 MAC address table configuration
Action Command
Check the aging time of a static MAC
display mac-address aging-time
address entry.
Run the display mac-address command. If MAC addresses, outgoing interfaces, and types of
MAC addresses are displayed, the configuration is successful. For example:
<Nortel> display mac-address 0011-2233-4455 vsi 2
MAC Address VSI ID Port Type Lsp
Generally, the MAC address learning limit is applied to networks that have fixed access users,
but which lack security management, such as a residential-district network or an enterprise
intranet that lacks security control.
After a MAC address learning limit is configured, the MAC address of a new user is not
added into the address table after the limit of access users is reached. The new traffic is
broadcast with limited speed.
Preconfiguration tasks
You need to clear the MAC addresses learned on a port before you configure the MAC
address learning limit.
Data preparation
To configure the MAC address learning limit, you need the following data.
No. Data
1 MAC address learning limit rules
Issue 5.3 (
30 March 2009) Nortel Networks Inc. 2-5
Page 35
Nortel Secure Router 8000 Series
2 MAC address table configuration
Configuration - LAN Access and MAN Access
Configuration procedures
No. Procedure
1 Configuring MAC address learning limit rules based on a VSI (optional)
2 Checking the configuration
NOTE
After the first rule of the MAC address learning limit is configured, the limit is automatically enabled
globally. After the last rule of the MAC address learning limit is removed, the limit is automatically
disabled globally.
2.3.2 Configuring MAC address learning limit rules based on a
VSI
If learned MAC addresses exist on a port, run the undo mac-address dynamic command in
the system view to clear those addresses. Otherwise, MAC address learnin g can no t be
accurately limited.
The MAC address learning limit is implemented on a created VSI. To create a VSI, see Nortel Secure Router 8000 Series Commands Reference (NN46240-500).
Do as follows on all routers:
Step 1 Run:
system-view
The system view appears.
Step 2 Run:
vsi vsi-name [ auto | static ]
The VSI view appears.
Step 3 Run:
mac-limit maximum max rate interval
This command configures the MAC address learning limit rule in the VSI.
Step 4 Run:
mac-limit action { discard | forward }
This command configures the action to take after the address learning limit is reached.
This command configures the alarm function after the address learning limit is reached.
2-6 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 36
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 2 MAC address table configuration
----End
NOTE
Step 3 to Step 5 can be combined to form one command: mac-limit { action { discard | forward } |
alarm { disable | enable } | maximum max rate interval } *.
2.3.3 Checking the configuration
Run the following commands to check the previous configuration.
Action Command
Check MAC address
learning limit rules.
display mac-limit [ vsi vsi-name | interface-type
interface-number ]
Run the display mac-limit command to view the number of limit rules, the maximum number
of MAC address learning, the learning rate, the action performed, and whether to alarm after
the limit is reached. For example:
<Nortel> display mac-limit
MAC Limit is enabled
Total MAC Limit rule count : 2
PORT VLAN/VSI Maximum Rate(ms) Action Alarm
Example of configuring the MAC address learning limit based on a VSI
2.4.1 Example of configuring a MAC address table
Networking requirements
To prevent a MAC address entry in a user’s MAC address table from aging, configure the
entry as a static entry. Configure the aging time of other dynamic entries to 500 seconds.
Configuration roadmap
The configuration roadmap is as follows:
z
Configure the static address entry.
z
Configure the aging time.
Issue 5.3 (
30 March 2009) Nortel Networks Inc. 2-7
Page 37
2 MAC address table configuration
Data preparation
To complete the configuration, you need the following data:
z
The MAC address of the user is 0011-2233-4455.
z
The name of the VSI to which the interface belongs is vsi2.
z
The port is GE 1/0/0.
z
The aging time is 500 seconds.
Configuration procedure
Step 1 Configure the static MAC address entry.
[Nortel] mac-address static 0011-2233-4455 gigabitethernet 1/0/0 vsi vsi2
Step 2 Set the aging time of dynamic entries to 500 seconds.
2.4.2 Example of configuring the MAC address learning limit
based on a VSI
Networking requirements
To enhance security, configure the MAC address learning limit on VSI vsi1.
Configuration roadmap
The configuration roadmap is as follows:
z
Configure the limit rules.
z
Enable the MAC address learning limit feature.
Configuration procedure
# Configure the maximum number of MAC addresses that can be learned to 100, and
configure the maximum rate for learning a MAC address to 50 milliseconds (ms) on VSI vsi1.
2-8 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 38
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 2 MAC address table configuration
<Nortel> system-view
[Nortel] vsi vsi1
[Nortel-vsi-vsi1] mac-limit maximum 100 rate 50
[Nortel-vsi-vsi1] quit
# Check whether the configuration is valid.
[Nortel] display mac-limit
MAC Limit is enabled
Total MAC Limit rule count : 1
[Nortel] display mac-limit vsi vsi1
Vsi1 MAC limit:
Maximum MAC count 100, rate 50(ms)
Action: discard, Alarm: enable
Configuration files
#
sysname Nortel
#
vsi vsi1
#
vsi vsi1
mac-limit maximum 100 rate 50
#
return
2.5 Troubleshooting
Fault description
The mac-address command fails to add a MAC address entry.
Fault analysis
The possible causes are as follows:
z
The MAC address is a multicast address.
z
The configured nondynamic entries exceed 1024.
Troubleshooting procedure
Step 1 Check whether the configured MAC address is a multicast address. Multicast address entries
are not allowed in a MAC address table.
Issue 5.3 (
30 March 2009) Nortel Networks Inc. 2-9
Page 39
2 MAC address table configuration
Step 2 Use the display mac-address command to check whether the configured nondynamic entries
exceed 1024. The system allows a maximum of 1024 nondynamic entries. For the Secure
Router 8000 Series, the maximum number of MAC addresses that can be learned is 64 K.
----End
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
2-10 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 40
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Figures
Figure 3-1 Networking diagram of Ethernet interface configuration.................................................................3-9
Issue 5.3 (
30 March 2009) Nortel Networks Inc. iii
Page 43
Page 44
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 3 Ethernet interface configuration
3 Ethernet interface configuration
About this
chapter
Tle lists the conten
he following tabts of this chapter.
Section Describes
3.1 Introductionn provides an overview of Ethernet interface This sectio
concepts.
3.2 Configuring Ethernet
interfaces
3.3 Maintaining Ethernet es how to debug the Ethernet
interfaces
3.4 Configuration examples of configuring the
3.5 TroubleshootingThis section describes how to diagnose and remove faults
This section describes how to configure the Ethern
interface.
See “Example of configuring an Ethernet interface.”
This section describ
interface.
This section provides an example
Ethernet interface.
related to the Ethernet interface.
et
Issue 5.3 (
30 March 2009) Nortel Networks Inc. 3-1
Page 45
3 Ethernet interface configuration
Configuration - LAN Access and MAN Access
3.1 Introduction
This section describes the concepts that you need to know before you configure an Ethernet
interface:
z
Introduction to Ethernet interfaces
z
Classification of Ethernet interfaces
3.1.1 Introduction to Ethernet interfaces
Because it is flexible, simple, and easy to deploy, the Ethernet is an important form of local
area network (LAN) networking technology.
3.1.2 Classification of Ethernet interfaces
At present, the LAN interfaces supported by the Secure Router 8000 Series are the Ethernet
interfaces, including the traditional Ethernet electrical interface, Fast Ethernet interface, and
Gigabit Ethernet interface. The Secure Router 8000 Series supports the Layer 2 features of the
Ethernet interface. The following list des cribes the three Ether net interf aces:
Nortel Secure Router 8000 Series
z
The traditional Ethernet interface complies with 10Base-T specifications and can work at
the speed of 10 megabits per second (Mbit/s).
z
The Fast Ethernet (FE) interface complies with 100Base-TX specifications and is
compatible with 10Base-T specifications.
z
The Gigabit Ethernet (GE) interface complies with 1000Base-TX specifications and is
compatible with 10Base-T and 100Base-TX specifications.
Ethernet electrical interfaces can work in either full-duplex mode or half-duplex mode, and
they support autonegotiation. In autonegotiation mode, they negotiate with other network
devices for the most suitable workin g mode and speed, which simplifies system configuration
and management.
NOTE
z
This chapter explains the configuration of the FE and GE interfaces. The configuration of traditional
Ethernet interface is simple and similar to that of the FE interface.
z
Ethernet subinterfaces are applied in a Virtual Local Area Network (VLAN). For information about
Ethernet subinterfaces, see Chapter 4, “VLAN Configuration.”
3.2 Configuring Ethernet interfaces
3.2.1 Establishing the configuration task
Applicable environment
To configure the Ethernet to transmit data packets, you must configure Ethernet interfaces.
When you configure an Ethernet interface, you must assign an IP address to it. For other
parameters, you can use default values. If you have to change the values, keep them consistent
with the peer device.
3-2 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 46
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 3 Ethernet interface configuration
Preconfiguration tasks
None
Data preparation
To configure an Ethernet interface, you need the following data.
No. Data
1 Interface number
2 IP address and mask of the Ethernet interface
3 Maximum Transmission Unit (MTU) of the Ethernet interface
Configuration procedures
No. Procedure
1 Assigning an IP address to an Ethernet interface
2 Configuring the MTU of an Ethernet interface (optional)
3 Configuring the working mode of an Ethernet electrical interface (optional)
4 Configuring the speed of an Ethernet electrical interface(optional)
5 Configuring the loopback function of an Ethernet interface (optional)
6 Configuring the preamble length for packets sent by the Ethernet interface
7 Checking the configuration
3.2.2 Assigning an IP address to an Ethernet interface
ip address ip-address { mask | mask-length } [ sub ]
This command configures the IP address of the Ethernet interface.
30 March 2009) Nortel Networks Inc. 3-3
Page 47
3 Ethernet interface configuration
----End
For more information about IP address configuration, see Nortel Secure Router 8000 Series
Configuration – IP Services (NN46249-504).
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
When you configure two or more IP addresses on an Ethernet interfac
the first IP address are indicated by the key word sub.
3.2.3 Config
uring the MTU of an Ethernet interface
The MTU is
physica
NO
z
z
measured in bytes. The MTU range of Ethernet interfaces depends on the
l devices. By default, the MTU is 1500 bytes.
TE
After you change the MTU by using the mtu command on an interface, you need to restart the
interface to validate the newly configured value. To restart the interface, run the shutdown and undo shutdown commands in succession, or run the restart command in the interface view.
If subinterfac
of at least 15 seconds.
Configuring the IPv4 MTU
on each router:
view appears.
Step 1
Step 2
Do as follows
Run:
-view
system
The system
Run:
e, addresses other than
es exist, the shutdown and the undo shutdown commands must be run at an interval
command configures the working mode of the interface.
NO
TE
z
Ethernet optical interfaces can work only in full-duplex mode.
z
hen connected to a hub, the Ethernet electrical interfaces of a router must work in half-duplex
W
mode. When connected to a LAN switch, the interfaces can work in either full-duplex mode or
half-duplex mode, but only if the mode is consistent with that on the peer device.
----End
3.2.5 Configuring the speed of an Ethernet electrical interface
use the internal loopback function to test the interface. When an Ethernet interface
Step 3
The specifie
Run:
loopback
This command enables internal loopback on th
You can
operates normally, disable internal loopback.
----End
3.2.7 Configle length for packets sent by the
uring the preamb
Ethernet interface
on each router:
-view
rs.
Step 1
Step 2
Do as follows
Run:
system
The system view appea
Run:
preamble uncompress
3-6 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 50
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 3 Ethernet interface configuration
Configure the preamble length for all packets sent by the Ethernet interface to 7 bytes.
By default, the preamble length of packets sent by the Secure Router 8000 Series is 6 bytes.
When the Secure Router 8000 Series cannot connect devices on which the default value of the
preamble length is 7 bytes, use the preamble uncompress com
length fo
r packets sent by the Ethernet interface to 7 bytes.
mand to change the preamble
----End
3.2.8 Check
ing the configuration
Rllowing commands to ches configuration.
un the fock the previou
Action Command
Check the status of the specified
Ethernet interface.
For example: Display the status and statistics on Ethernet 2/0/0.
<Nortel> display interface etherne
Ethernet2/0/0 current state : UP
Line protocol current state : UP
Description : NORTEL, Nortel Series,
The Maximum Transmit Unit is 1500 bytes, Hold timer is 10(sec)
In
ternet Address is 10.1.1.1/24
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address
After the configuration, you can use the following methods to check whether the configured
interface operates normally:
z
In the case of low traffic volume, ping the Ethernet interfaces of a router from another
router. If all the ping packets are returned, the interfaces are normal.
z
Check the statistics of a router. If the number of received error frames does not change,
the interfaces are normal.
Check the interface status of each router. In normal operation, the physical status and protocol
status are Up.
Consider Router A as an example:
<RouterA> display ip interface brief
*down: administratively down
(l): loopback
(s): spoofing
Interface IP Address Physical Protocol Description
GigabitEthernet1/0/0 202.38.165.1 up up RouterA
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 3 Ethernet interface configuration
3.5 Troubleshooting
This section provides methods for troubleshooting the following faults:
z
Pinging the Ethernet interface fails
z
Ethernet interfaces cannot receive and send packets
z
Ethernet interfaces discard packets
3.5.1 Pinging the Ethernet interface fails
Fault description
Pinging an Ethernet interface of a router on a PC fails.
Fault analysis
The possible causes are as follows:
z
The link connection is incorrect.
z
The IP address or mask of the interface is incorrect.
Troubleshooting procedure
Step 1 Check whether the PC and the router are connected correctly.
Check the status of the link indicator of the Ethernet interface that connects the router and the
PC:
z
If the indicator is on, the connection is correct.
z
If the indicator is off, check the physical devices, such as the network card, network
cable, and interface module of the router.
Step 2 Check that the IP address of the PC and that of the Ethernet interface on the router are in the
same subnet.
----End
3.5.2 Ethernet interfaces cannot receive and send packets
Fault description
The display of the 100 Mbit/s Ethernet interface on a router shows that no connection is set up.
The display of the 10 Mbit/s Ethernet interface on another router shows that the connection is
set up. However, the Active indicator on the physical layer constantly flashes, and packets are
not received and sent.
Fault analysis
Issue 5.3 (
30 March 2009) Nortel Networks Inc. 3-11
A possible cause is that the working speeds of the Ethernet interfaces on the two routers are
inconsistent.
Page 55
3 Ethernet interface configuration
When unshielded twisted pair is used in the Ethernet network, and at least one of the two
connected ends supports 100Base-TX, if the working speeds of the two ends do not match, the
fault can occur.
Troubleshooting procedure
Check that the working speeds of the two Ethernet interfaces are consistent.
3.5.3 Ethernet interfaces discard packets
Fault description
When network traffic increases, the router at one end displays severe network congestion,
while the router at the other end is flooded with error packets. Both routers discard a majority
of packets.
Fault Analysis
A possible cause is that working modes of the routers at the two ends are not consistent.
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Troubleshooting procedure
Use the display interface ethernet command to check that the working mode is the same for
the Ethernet interfaces of both routers (either semi-duplex or full-duplex).
3-12 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 56
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
4.1.1 Origin of the VLAN.............................................................................................................................4-2
4.1.2 Application of a VLAN........................................................................................................................4-4
4.1.3 Communication between VLANs........................................................................................................4-6
4.2 Configuring subinterfaces to support communication between VLANs.......................................................4-7
4.2.1 Establishing the configuration task ......................................................................................................4-7
4.2.2 Encapsulating the subinterface with dot1q...........................................................................................4-7
4.2.3 Configuring an IP address for the subinterface....................................................................................4-8
4.2.4 Checking the configuration..................................................................................................................4-8
4.3 Maintaining the VLAN .................................................................................................................................4-9
4.3.1 Clearing VLAN packet statis ti c s..........................................................................................................4-9
4.3.2 Debugging the VLA N..........................................................................................................................4-9
4.4.1 Example of configuring different VLANs to communicate through routers......................................4-10
4.4.2 Example of configuring VLANs to communicate with non-VLANs through routers .......................4-13
Issue 5.3 (
30 March 2009) Nortel Networks Inc. i
Page 57
Page 58
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Figures
Figure 4-1 Networking diagram of the traditional LAN.....................................................................................4-2
Figure 4-2 Networking diagram of the Layer 2 switch......................................................................................4-3
Figure 4-3 Schematic diagram of VLAN networking........................................................................................4-4
Figure 4-4 VLAN frame format based on 802.1Q..............................................................................................4-5
Figure 4-5 Communication between VLANs through routers ...........................................................................4-6
Figure 4-6 Networking diagram of configuring VLANs to communicate through a router.............................4-11
Figure 4-7 Networking diagram of configuring VLANs to communicate with non-VLANs through a router 4-13
Issue 5.3 (
30 March 2009) Nortel Networks Inc. iii
Page 59
Page 60
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 4 VLAN configuration
4 VLAN configuration
About this
chapter
Tle shows the con
he following tabtents of this chapter.
Section Describes
4.1 IntroductionThis section describes basic Virtual Local Area Network
(VLAN) concepts.
4.2 Configuring subinterfaces
to support communication
between VLANs
4.3 Maintaining the VLANThis section describes how to maintain the VLAN.
4.4 Configuration examplesThis section provides several examples of VLAN
This section describes how to co
communicate through Layer 3 interfaces.
See “
Example of configuring differe
communicate through routers.”
See “Example of configuring VLANs to communi
with non-VLANs through routers.”
networking.
nfigure VLANs to
nt VLANs to
cate
Issue 5.3 (
30 March 2009) Nortel Networks Inc. 4-1
Page 61
4 VLAN configuration
4.1 Introduction
The VLAN divides users logically regardless of their physical locations. By using a virtual
workgroup, the VLAN isolates the broadcast areas within a local area network (LAN). A
VLAN is similar to a traditional LAN in function and operation.
This section describes the concepts that you need to know before you configure a VLAN:
z
Origin of the VLAN
z
Application of a VLAN
z
Communication between VLA N s
4.1.1 Origin of the VLAN
Traditional LAN
As shown in Figure 4-1, the traditional LAN is based on the bus structure.
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Figure 4-1Netw orki ng diagram of the traditional LAN
Collision
Data flow
The traditional LAN has the following two disadvantages:
z
If more than one node tries to send messages at the same time, conflicts occur.
z
Information from one node is sent to all other nodes. Thus, information security cannot
be guaranteed.
The emergence of the hub enables the star topology which is another physical topology.
However, communication is still carried out on the shared media and conflicts still occur.
With an increasing number of computers in the network, collisions occur more frequently and
network efficiency lessens. This kind network forms a collision area.
The Ethernet network uses Carrier Sense Multiple Access/Collision Detect (CSMA/CD) to
detect collisions but does not remove collisions completely.
The Ethernet network is also a broadcast network. If a large number of computers send
information at the same time, the broadcast traffic consumes a large amount of bandwidth.
4-2 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 62
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 4 VLAN configuration
In summary, the traditional network has disadvantages in the following areas:
z
collision area
z
broadcast area
In addition, the traditional network cannot ensure information security.
Isolating collision areas from normal areas
The following two methods extend the traditional LAN to accommodate more computers,
while preventing collision:
z
Bridge: A bridge connects two areas and isolates a collision area from another normal
area.
z
Layer 2 switch: The Layer 2 switch is derived from bridge technology. It can isolate
multiple collision areas, as shown in
NOTE
In the remainder of this document, the term switch refers to the Layer 2 LAN switch.
Figure 4-2 Netw orking diagram of the Lay er 2 swit ch
Figure 4-2.
Issue 5.3 (
Data flow
Bridges and switches forward the information from an incoming interface to an outgoing
interface through the switching mode, restricting the collision area to the port level. Thus, the
collision on the shared media is removed.
Switches receive all the data frames on a network segment. After learning the source Media
Access Control (MAC) addresses in the frames, the switches set up the MAC address tables
that store the mapping between the MAC addresses and the ports.
For a received frame, if a switch finds the destination MAC address in the address table, the
switch forwards the frame on Layer 2. Thus, the collision is isolated.
If a switch cannot find the destination MAC address in the address table, the switch
broadcasts the frame to all the ports except for the receiving port, which can cause a broadcast
storm.
The introduction of switches into networking solv es the problem of the collision area through
Layer 2 switching. However, the information insecurity caused by the broadcast still exists.
30 March 2009) Nortel Networks Inc. 4-3
Page 63
4 VLAN configuration
Isolating broadcast areas
To reduce broadcast, isolate hosts that do not need to access each other. To achieve this, you
can group the ports on a switch. Each group forms a broadcast area. Information between
groups is isolated. Thus, broadcast packets can be transmitted only within a group.
You can use various technologies to isolate a broadcast area. For example, routers choose a
route on the basis of the Layer 3 IP addresses. Therefore, using a router to connect two
network segments can effectively suppress the broadcast. However, routers are costly, so the
VLAN is introduced to help resolve this problem.
4.1.2 Application of a VLAN
VLAN technology
A VLAN divides a LAN into several logical LANs (VLANs), with each VLAN being a
broadcast area. In each VLAN, the hosts can communicate with each other just as they do in a
LAN; however, the VLANs cannot interact with each other directly. Therefore, broadcast
packets are restricted to one VLAN.
Besides partitioning broadcast areas, the VLAN has more complex network applications. For
example, a building is rented by different enterprise clients and they want to build their own
LANs, but the total cost of the LANs is high. In addition, if all the clients share the same LAN,
information security cannot be guaranteed. By using a VLAN, different clients can share a
LAN, and information security is guaranteed.
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Figure 4-3 shows a typical VLAN network application. Three switches are placed at diff erent
sites, such as on different floors in a building. Each switch is connected with three PCs. The
PCs belong to three different VLANs, which are enclosed by dashed blocks representing the
different enterprise clients.
Figure 4-3Schem atic dia gram of VLA N netw orki ng
Router
Switch1Switch2
VLAN-A
VLAN-B
VLAN-C
Switch3
4-4 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 64
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 4 VLAN configuration
VLAN classification
Theoretically, you can classify VLANs in the following ways:
z
Based on ports: The VLAN is classified based on the port numbers of a switch.
z
Based on MAC addresses: The VLAN is classified based on the MAC addresses of
network interface cards.
z
Based on the network layer protocol: For example, hosts running IP belong to one
VLAN, and those running
z
Based on the network address
internetwork packet exchange (IPX) belong to another VLAN.
The 802.1Q standard draft, issued by the IEEE in 1999, defines the standards for classifying
VLANs based on ports and MAC addresses.
VLAN frame formats
The IEEE 802.1Q standard modifies the Ethernet frame format. It adds a 4-byte 802.1Q tag
between the source MAC address and the protocol type fields, as shown in
Figure 4-4 VLAN fram e format based on 802.1Q
Figure 4-4.
Leader
Character
Destination
Address
6 bytes6 bytes8 bytes
The 802.1Q tag contains the following four fields:
z
Type: It has two bytes, indicating the frame type. The value 0x8100 indicates an 802.1Q
tag frame, which is discarded by devices that do not support the 802.1Q standard.
z
Priority (PRI): It has three bits, indicating the priority of a frame. It is used in Quality of
Service (QoS). The value ranges from 0 to 7.
z
CFI: It has one bit, and is the abbreviated form of Canonical Format Indicator. It
indicates whether a MAC address is canonical and is used on token ring and Fiber
Distributed Digital Interface (FDDI).
z
VLAN ID (VID): It has 12 bits and specifies the VLAN to which this frame belongs. In
the Secure Router 8000 Series, the VLAN ID 0 represents the default VLAN.
How a switch processes frames
A switch processes frames in three stages:
Source
Address
802.1Q Tag
Type
4 bytes2 bytes
PRI/
CFI
/VID
Length
/Type
Data
46-1517 bytes4 bytes
FCS
(CRC-32)
Issue 5.3 (
Step 1 The switch receives frames. Received frames can be VLAN frames with tags, or Ethernet
frames without tags. According to type and configuration of the receiving port, the switch
adds tags, discards the data frames, or processes the frames.
Step 2 The switch finds and forwards frames. According to the destination MAC address and VLAN
ID of the frames, the Layer 2 switch finds information about the VLAN configuration and
then determines to which port the frames should be sent.
30 March 2009) Nortel Networks Inc. 4-5
Page 65
4 VLAN configuration
Step 3 The switch sends frames. The switch sends the frames to the Ethernet network segment
through the outgoing port. You can configure the outgoing port to process the tag. For
example, if the hosts on the network segment where the outgoing port resides canno t ident ify
the 802.1Q tag, the hosts strip off the tag and then send the frames. If the outgoing port is
connected with other switches, the hosts send the frames directly without changing the tag.
----End
4.1.3 Communication between VLANs
After a LAN is divided into VLANs, the PCs in a VLAN cannot directly communicate on
Layer 2 with the PCs in another VLAN.
To implement communication between VLANs, you must implement IP routing between
VLANs. Generally, Ethernet interfaces of routers (routed Ethernet interface) and Ethernet
interfaces of switches (switched Ethernet interface) are connected to construct a LAN, as
shown in
Figure 4-5 Communication between VLANs through routers
Figure 4-5.
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Subinterface
Access port
VLAN2VLAN3
Router
VLAN Trunk
Switch
Figure 4-5, the PCs attached to the switch belong to two VLANs (VLAN2 and VLAN3).
In
To achieve communication between VLAN2 and VLAN3, you must perform the following
tasks:
z
On the router, create two subinterfaces on the Ethernet interface, which is connected with
the switch.
z
Configure 802.1Q encapsulation and IP addresses on the two subinterfaces.
z
Change the type of the Ethernet port on the switch that is connected with the router to
trunk or hybrid and allow frames of VLAN2 and VLAN3 to pass.
For detailed configuration information, see “
communicate through routers
4-6 Nortel Networks Inc. Issue 5.3 (
.”
Example of configuring different VLANs to
30 March 2009)
Page 66
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 4 VLAN configuration
4.2 Configuring subinterfaces to support communication
between VLANs
4.2.1 Establishing the configuration task
Applicable environment
To implement Layer 3 interconnection between VLANs, routers or Layer 3 switches must be
used to connect VLANs. This section describes how to interconnect VLANs through routers.
To achieve communication between VLANs, create subinterfaces on the Ethernet interfaces
that connect routers with switches, and then encapsulate the subinterfaces with 8021.Q.
Preconfiguration tasks
Before you configure VLAN encapsulation, you need to create an Ethernet subinterface and
configure its attributes.
Data preparation
To encapsulate packets on the subinterfaces with 802.1Q, you need the following data.
No. Data
1 Interface number of the Ethernet interface and subinterface
2 IP address and mask of the subinterface
3 ID range of the VLAN to which the interface belongs
Configuration procedures
No. Procedure
1 Encapsulating the subinterface with dot1q
2 Configuring an IP address for the
3 Checking the configuration
4.2.2 Encapsulating the subinterface with dot1q
Issue 5.3 (
Do as follows on the routers that belong to the VLANs that need to communicate:
This command configures the encapsulation type and VLAN ID of the Ethernet subinterface.
By default, a subinterface is not encapsulated with 802.1Q and is not associated with any
VLAN. To maintain VLAN connectivity, the VLAN ID of the subinterface on two end hosts
must be the same.
----End
4.2.3 Configuring an IP address for the subinterface
When subinterfaces exist, if you use the shutdown command and the undo shutdown
command on the main interface in succession, use the two commands at an interval of at least
15 seconds.
Do as follows on the routers that belong to the VLANs that need to communicate:
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access 4 VLAN configuration
Run the display vlan statistics command. If the number of received and sent packets or bytes
and the number of received and sent error packets are displayed, the configuration is
successful. For example:
After the configuration is complete, on each host, configure the IP address of the subinterface,
which belongs to the same VLAN as the local host, as the default gateway. The hosts in
VLAN10, VLAN20, VLAN30, and VLAN40 can now communicate with each other.
ip address 10.110.2.5 255.255.255.0
#
interface GigabitEthernet2/0/0
ip address 10.110.3.5 255.255.255.0
#
return
4-14 Nortel Networks Inc. Issue 5.3 (
30 March 2009)
Page 74
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Contents
A Glossary .................................................................................................................................... A-1
B Acronyms and Abbreviations ................................................................................................B-1
Issue 5.3 (
30 March 2009)
Nortel Networks Inc.
i
Page 75
Page 76
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
A Glossary
10 Base-T
100 Base-T
1000 Base
A
ATM
E
Ethernet
Ethernet_II
T
Twisted cable with the transmission speed 10 Mbit/s and the t
distance 100 meters (m). 10 Base-T is described in the IEEE 802.3i.
Twisted cable with the transmission speed 100 Mbit/s and the tr
istance 100 m. 100 Base-T is described in the IEEE 802.3u.
d
wisted cable with the transmission speed 1000 Mbit/s and the transmission
T
istance 100 m. 1000 BaseT is described in the IEEE 802.3ab.
d
Asynchronous transfer mode. A connection-oriented network
uses a fixed cell (53 bytes) to transfer services of multiple types such as text,
udio, or video data. The fixed length of the ATM cells enables hardware
a
p
rocessing of the cells and shortens the forwarding delay. ATM takes full
a
dvantage of high-speed media such as E3, SONET, and T3.
A baseband LAN specification created by Xerox and developed by Xerox,
Intel, and Digital Equipment Corporation (DEC). This specification is
to IEEE802.3.
A encapsulation format of the Ethernet frame. Ethernet_II that contains a
16-bit protocol type field is the standard ARPA Ethernet Version 2.0
encapsulation.
ransmission
ansmission
technology that
similar
E
thernet_SNAP
F
FE
Issue 5.3 (
30 March 2009)
A
encapsulation format of the Ethernet frame. The frame format complies
w
ith RFC 1042 and enables the transmission of the Ethernet frame on the
IE
EE 802.2 media.
Fast Ethernet. A extension and enhancement of the traditional Ethernet
standard. In FE, the transmission speed increases to 10
w
ith the IEEE 802.3u.
Nortel Networks Inc.
0 Mbit/s. FE complies
A-1
Page 77
Full-duplex
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
operation mode of the Ethernet port. In full-duplex mode, a port can send
A
and receive data simultaneously without interference.
G
GE
H
Half-duplex
L
LAN
LAN switch
M
MAC
igabit Ethernet. GE adopts the IEEE 802.3z. GE is compatible with 10
G
Mbit/s and 100 Mbit/s Ethernet.
In half-duplex mode, a port can only send or receive data at a single time.
Local Area Network. A network that comprises PCs and stations
w
ithin several square kilometers. LAN features a high speed and low error
rate. E
thernet, FDDI, and token ring are three major implementations.
located
A multihome switching device that works on the data link layer.
Media Access Control. In the OSI model, the data link layer, which is divi
into the MAC and the L
ink Access Control (LAC), MAC is nearer to the
physical layer.
ded
MAN
MT
U
P
PING
PO
S
Q
QoS
Metropolitan Area Network. A network that covers
k
ilometers or a city.
M
aximum Transmission Unit. The maximum unit of a data packet that an
more than ten square
interface can process. MTU is measured in bytes.
A diagnostic tool that uses the ICMP
d
evice in an IP network is reachable.
A
transmission technology that realizes the transmission of IP packets or other
Echo message to test whether a certain
data packets on SONET/SDH.
Quali
ty of Service. A measurement used to evaluate the service capability for
fo
rwarding packets in the IP network. The evaluated elements include the
delay, delay jitter, and packet loss ratio.
A-2
Nortel Networks Inc.
Issue 5.3 (
30 March 2009)
Page 78
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
V
VLAN
W
WAN
Virtual Local Area Network. A technology that logically divides a LAN
according to different functions or de
partments regardless of their physical
locations. Each VLAN is a broadcast domain.
Wide Area Network. A network that comprises PCs and stations in a large
area such as a state or a county.
Issue 5.3 (
30 March 2009)
Nortel Networks Inc.
A-3
Page 79
Page 80
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
B Acronyms and Abbreviations
C
CE
MA/CD
CS
F
FE
G
GE
L
N
LA
M
AC
M
ustomer Edge
C
arrier Sense Multiple Access/Collision Detect
C
ast Ethernet
F
igabit Ethernet
G
ocal Area Network
L
edia Access Control
M
U
MT
Q
S
Qo
V
VLAN
VSI
Issue 5.3 (
30 March 2009)
aximum Transmission Unit
M
uality of Service
Q
Virtual Local Area Network
Virtual Switch Instance
Nortel Networks Inc.
B-1
Page 81
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Contents
Index ................................................................................................................................................ i-1
Issue 5.3 (
30 March 2009)
Nortel Networks Inc.
i
Page 82
Page 83
Nortel Secure Router 8000 Series
Configuration - LAN Access and MAN Access
Index
C
communication between VLANs
adopting router, 4-6
configuring Ethernet interface, 3-2
configuring MAC address learning limit, 2-5
configuring MAC address table, 2-3
To provide feedback or to report a problem in this document, go to www.nortel.com/documentfeedback.
www.nortel.com
LEGAL NOTICE
While the information in this document is believed to be accurate and reliable, except as otherwise expressly
agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF
ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are
subject to change without notice.
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
All other trademarks are the property of their respective owners.
Standard
ATTENTION
For information about the safety precautions, read "Safety messages" in this guide.
For information about the software license, read "Software license" in this guide.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.