Sonic Impact Technologies NSA 2400MX User Manual

Page 1

SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial

This solutions document describes how to configure and manage the Switching feature on a SonicWALL NSA 2400MX running SonicOS 5.7. A screencast tutorial on Port Mirroring is also provided.
This document contains the following sections:
“Feature Overview” section on page 2
“Troubleshooting and Verification” section on page 38
“Technical FAQ” section on page 44
“Glossary” section on page 45

Screencast Tutorial - Port Mirroring

Adobe Reader and browser plugin version 9.1 or higher is required to play the embedded Port Mirroring screencast. You can download the latest version of Adobe Reader at http://get.adobe.com/reader. The installation will require a restart of your system. When ready, click the image below to play the screencast. Alternatively, you can access the tutorial at: http://help.mysonicwall.com/enhancedcontent/l2mirroring/.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
1
Page 2

Feature Overview

Feature Overview
This section provides an introduction to the Switching feature. This section contains the following subsections:
“What is Switching on the SonicWALL NSA 2400MX?” section on page 2
“Benefits of Switching in SonicOS” section on page 3
“How Does Switching Work on the SonicWALL NSA 2400MX?” section on page 4
“Supported Platforms” section on pag e 4

What is Switching on the SonicWALL NSA 2400MX?

SonicOS 5.7 introduces Layer 2 (data link layer) switching functionality on the SonicWALL NSA 2400MX appliance.
The SonicWALL NSA 2400MX appliance is a Unified Threat Manag ement (UTM) security appliance that integrates the WA N flexibility of a router with 24 built-in Ethernet switch ports . The appliance provi des two expansion slots to allow modular card flexibility for additional po rt s. Both 3G wireless cards and V. 90 modem cards are supported for WAN access.
The functionality supports the following switching features:
VLAN Trunking – Provides the ability to trunk different VLANs between multiple switches.
Rapid Spanning Tree Protocol – Prevents loops from being formed when switches or bridges are
interconnected via multiple paths and provides for network convergence after a topology change.
Layer 2 Network Discov ery – Uses IEEE 802.1AB (LLDP) and Microsoft LL TD protocols and switch
forwarding table to discover devices visible from a port.
Link Aggreg ation – Provides the ability to aggregate ports for increased performance and redundancy.
Port Mirroring – Allows the administrator to assign a mirror port to mirror ingress, egress or
bidirectional packets coming from a group of ports.
Layer 2 Quality of Service – On a per port basis, allows configuration to trust Cost of Service (CoS)
(802.1p) or trust DSCP marking and treat the frames appropriately.
Rate Control / Flow Control – On a per port basis, the bandwidth of ingress frames can be tuned in
four modes by limiting all/flooded unicast/multicast/broadcast frames. Rate limiting for egress frames can be enabled or disabled.
Port Security – Provides the ability to bind a MA C address or m ultiple MA C addresses to a specific port
interface.
2
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 3

Benefits of Switching in SonicOS

The SonicWALL NSA 2400MX provides a combined security and switching solution with the objective of improved security for all tasks. Layer 2 sw itching features enhance the deployment and interoperability of SonicWall devices within existing Layer 2 networks.
The SonicWALL NSA 2400MX provides flexible, intelligent switching capabilities with its unique PortShield architecture, increased port density with 26 interfaces, and advanced switching features.
The advanced switching features on a network security appliance provide the following benefits:
Increased port density – With one appliance providing 26 interfaces, including 24 switch ports, you can
decrease the number of devices on your internal network.
Increased security across multiple switch ports – The PortShield architecture pro vi des the flexibility to
configure all 26 LAN switch ports into separate security zones such as LANs, WLANs and DMZs, providing protection not only from the WAN and DMZ, but also between devices inside the LAN. Effectively, each security zone has its own wire-speed ‘mini-switc h’ that benefits from the protection of a dedicated deep packet inspection firewall.
VLAN Trunking – Simplifies VLAN management and configuration b y reducing the need to configure
VLAN information on every switch.
Layer 2 Discovery – Provides Layer 2 network information for all devices attached to the SonicWALL
NSA 2400MX.
Feature Overview
Link Agg regation – Aggregated por ts provide increased perfor mance through load balan cing when
connected to a switch that supports aggregation, and provide redundancy when connected to a switch or server that supports ag g r egatio n.
Port Security – Allows administrators to bind a trusted MAC address or multiple MAC addresses to a
specific port to decrease unauthorized access on that port.
Rapid Spanning Tree Protocol – Allows for redundancy in case a connection goes down, while
preventing loops from being formed when switches or bridges are interconnected via multiple paths.
Layer 2 Quality of Service – Allows for traffic prioritization and bandwidth management to minimize
network delay using Cost of Service (CoS) classification, and DSCP marking.
Port Mirroring – Allows the administr ator to easily monitor and insp ect networ k traffic on one or more
ports.
Rate Control / Flow Control – Back-pressure flow control on half-duplex ports and pause frame-based
flow control on full-duplex ports allow zero packet loss under temporary traffic cong estion.
Port Security – Binding a MA C address or multiple MA C add resses to a specific port interface provides
security, as frames whose source addresses are not contained in the table will be dropped.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
3
Page 4
Feature Overview

How Does Switching Work on the SonicWALL NSA 2400MX?

The switching features have their own menu group in the left navigation pane of the SonicOS management interface.
Figure 1 Switching in SonicOS – Navigation Pane
Some switching features operate on PortShield Groups and require preliminary configuration on the Network > PortShield Groups page. Some operate on existing Network > Interface configurations. T he Port Security feature uses MAC address objects. For more infor m ation about configuring these related features in SonicOS, see the SonicOS 5.7 Administrator’s Guide.
For details about the operation of each switching feature, see the related section under the “Configuring
Switching” section on page 5.

Supported Platforms

Switching is available on the SonicWALL NSA 2400MX running SonicOS 5.7 and higher. Switc hing features are only available on ports X2 - X25, not on X0 (LAN) or X1 (WAN).
The hardware design of the SonicWALL NSA 2400MX includes the following elements:
Dual core 700 MHZ CPU
8 Gigabit Ethernet interfaces
16 10/100 Megabit Fast Ethernet interfaces
1 Gigabit Ethernet WAN port
1 Gigabit Ethernet LAN port
2 USB extension ports that support exter nal 3G wireless cards or V.90 analog modem cards
2 Expansion Slots for future use
4
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 5

Configuring Switching

This section contains the following sections:
“Configuring VLAN Trunking” section on page 5
“Configuring Rapid Spanning Tree” section on page 13
“Configuring Layer 2 Discovery” section on page 18
“Configuring Link Agg reg ation” section on p age 21
“Configuring Port Mirroring” section on page 25
“Configuring Layer 2 Quality of Service” section on page 27
“Configuring Rate Control” section on page 32
“Configuring Port Security” section on page 35

Configuring VLAN Trunking

VLAN trunking is supported by the IEEE 802.1Q networking standard, also called VLAN Tagging. This standard defines how VLANs operate with regard to Layer 2 (MAC la yer ) bridging. The use of VLANs and VLAN trunking allows multiple bridged networks to simultaneously share a single physical network while preserving the privacy of information in each (virtual) network. IEEE 802.1Q also refers to the encapsulation protocol used to implement this standard in Ethernet networks. The SonicWALL NSA 2400MX appliance supports 802.1Q encapsulation on its VLAN tr unk ports. Encapsulation, in this case, refers to the
Configuring Switching
For example, a company, university , or other organization can use VLANs to create separate logical (virtual) networks for different departments. Each department is assigned to it’s own VLAN. The switch ports to which the department computers are connected are configured as members of that VLAN. When network traffic is sent out from a department computer, the switch adds a 32-bit VLAN tag to each data frame before forwarding it via a VLAN trunk port. Each switch in the network examines the VLAN tag, and uses the information to determine that it is a tagg ed frame, the priority level (defined by IEEE 802.1p), whether it is an Ethernet or a Token Ring frame, and the VLAN to which the frame belongs. The frame makes its wa y through the physical network until it reaches the last switch before the destination device, at which point the switch removes the VLAN tag and delivers the frame to its destination. This switch only delivers the frame via a port that is configured as a member of the same VLAN, thereby ensuring that the data is not leaked to any other department.
In the above scenario, the switch ports connected to department computers are configured as members of a VLAN. The switch ports that are connected to other switches in the physical network are configured as VLAN trunk ports. This distinction means that only unassigned switch ports on the S onicWALL NSA 2400MX appliance can function as VLAN trunk ports.
You can enable or disable individual VLANs on the trunk ports, allowing the existing VLANs on the SonicWALL NSA 2400MX appliance to be bridged to respective VLANs on another switch connected via the trunk port. A maximum of 32 VLANs can be enabled on each tr unk por t.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
5
Page 6
Configuring Switching
Figure 2 shows the Switching > VLAN Trunking page. The page displays the range of reserved VLANs in
the Reserved VLAN Information section, details about current VLANs in the VLAN Table, and the VLAN trunks configured on the system in the VLAN Trunks area.
Figure 2 Switching > VLAN Trunking Page
The VLAN trunking feature provides the following functions :
Change VLAN ID’s of existing Por tShield groups
Add/delete VLAN trunk por ts
Enable/disable VLANs on the trunk por ts
The allowed VLAN ID range is 1-40 94. Some VLAN ID s are reserved for PortShield use and are displayed in the Reserved VLAN Information table on the Switching > VLAN Trunking page.
6
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 7
Configuring Switching
The values displayed on the Switching > VLAN Tr unking pag e are described in Ta ble 1.
Table 1 VLAN Trunking Page Description
Item Description
Reserved VLAN Information
Starting VLAN ID The lowest ID number in the VLAN range reserved for PortShield use. This
VLAN range is reserved for local VLANs associated with a PortShield group.
Ending VLAN ID The highest ID number in the VLAN range reserved for PortShield use.
VLAN Table
VLAN ID The ID number of the VLAN. VLAN ID 26 is the default VLAN that includes
all LAN ports on the SonicWALL NSA 2400MX unless configured otherwise.
Interface
For the default VLAN that includes all LAN ports unless configured
otherwise, the lowest interface, X0, is used.
For other VLANs with multiple member ports, the displayed interface is
the one configured as the PortShield interface for that Por tShield g roup.
For interfaces that are not assigned to a P ortShield group, the port number
of the interface is used, such as X25.
For remote VLANs, the trunked interface and the virtual interface (called
the VLAN Trunk Interface) are displayed in the format: [trunked interface]:V[virtual interface number] The virtual VLAN Trunk Interface is automatically created for remote
VLANs. When the same remote VLAN is enabled on another trunk port, no new interface is created. All packets with the same VLAN tag ingressing on different trunk ports are handled by the same vir tual interface.
Member Ports
For Por tShield groups, all interfaces in the group are listed as Member
Ports.
For interfaces that are not assigned to a PortShield group, only the port
number of the interface is listed as a Member Port.
For remote VLANs , the VLAN trunk ports on which the remote VLAN is
enabled are listed.
Trunked A green check mark is displayed if the VLAN ID has been configured as
trunked, and is enabled for trunking on all VLAN trunk ports. A VLAN can be enabled for trunking on an individual trunk port or a subset of all trunk ports, in which case the green check mark does not appear. Enabling trunking allows traffic for this VLAN to be sent to remote members of the VLAN who are connected to a different switch in the network. To enable trunking for this VLAN on all trunk ports, see the “Editing VLANs” section on page 12.
Configure The Configure icon is enabled for rows that contain PortShield groups. When
the Configure icon is disabled, you can edit the settings fo r that row on the Network > PortShield Groups page.
VLAN Trunks
Trunk Port The interface name is displayed in the T runk Port column. Also, the number of
VLAN entries that are enabled on this trunk port is given in parentheses.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
7
Page 8
Configuring Switching
You can mark certain PortShield groups as “Trunked”. For information about how to do this, see the
“Editing VLANs” section on page 12. Once the PortShield group is dismantled, the associated VLAN is
automatically disabled on the trunk ports. VLANs can exist locally in the form of PortShield groups or can be totally remote VLANs. In Figure 3, the
Network > PortShield page shows a PortShield group with X14 as the PortShield interface and X15, X16, and X17 as members of the PortShield group. X20 and X21 are VLAN trunk ports.
Figure 3 Switch Port Settings on Network > PortShield Groups Page
Item Description
VLAN ID The VLAN ID of each VLAN enabled on the trunk port is displayed when the
arrow next to the interface name is pointing downward. Click the right arrow to expand the list.
Configure The Configure column shows a delete icon if the entry on the row can be
deleted. A row containing a VLAN ID that is marked as Trunked in the VLAN Table will not display a delete icon.
8
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 9
Configuring Switching
You can change the VLAN ID of PortShield groups on the SonicWALL NSA 2400MX appliance. This allows easy integration with existing VLAN numbering.
Unlike traditional Layer 2 switches, the SonicWALL NSA 2400MX applian ce does not allow changing port VLAN membership in an ad-hoc manner. VLAN membership of a port must be configured via PortShield configuration in the SonicOS management interface.
For more information about configuring PortShield groups, see the “Configuring PortShield Interfaces” chapter in the SonicOS 5.7 Administrator’s Guide.
A virtual interface (called the VLAN Trunk Interface) is automatically created for remote VLANs. When the same remote VLAN is enabled on another trunk port, no new interface is created. All packets with the same VLAN tag ingressing on different tr unk po rts are handled by the same virtual interface. This is a key difference between VLAN sub-interfaces and VLAN trunk interfaces.
As shown in Figure 4, the Name column on the Network > Interfaces page displays the VLAN Tr unk Interfaces for the VLAN trunks on which VLAN IDs 100 and 200 are enabled.
Figure 4 VLAN Trunk Interfaces on Network > Interfaces Page
Y ou can enable any VLAN , local or remote, on a VLAN trunk to allow bridging to to respectiv e VLANs on another switch. For example, local VLAN 3787, created from a Por tShield g roup, can be enabled on the VLAN trunk for port X20, which also has two remote VLANs enabled on it.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
9
Page 10
Configuring Switching
Figure 5 shows the user interface while enabling the local VLAN 3787 on the trunk port, X20.
Figure 5 Enabling a Local VLAN on a VLAN Trunk
In Figure 6, the VLAN Table on the Switching > VLAN Trunking page displays the trunk port, X20, as a member of local VLAN 3787 after the VLAN is enabled on the VLAN trunk.
Figure 6 VLAN Table
10
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 11
Configuring Switching
2400MX
Network Security Appliance
Switch
Sales
Eng
Switch
Eng
QA
Sales QA Finance
VLAN Trunk
VLAN Trunk
Two Trunk Ports:
X20, X21
Four VLANS:
v100 - Sales v200 - Engineering v300 - QA v400 - Finance
x20: v100 x20: v200 x20: v300 x20: v400
Finance
VLAN Trunk Interfaces:
Internet
Figure 7 illustrates a VLAN trunk with two trunk ports, bridging the Sales, Engineering, QA, and Finance
VLANs through the SonicWALL NSA 24 00MX. Each remote VLAN is initially enabled on VLAN trunk port X20, causing the creation of four virtual VLAN trunk interfaces. When these VLANs ar e also enabl ed on trunk port X21, no new vir tual interfaces are created.
Figure 7 VLAN Trunk Bridging Four VLANs Through the SonicWALL NSA 2400MX
VLAN trunking interoperates with Rapid Spanning Tree Protocol (RSTP), Link Aggreg ation and Port Mirroring features. A VLAN trunk port can be mirrored, but cannot act as a mirror port itself. VLAN tru nk ports are used to pass traffic to other networking devices. By comparison, traffic arriving on a mirror port has already been handled or sent to its destination, and the mirror port does not forward it again.
You cannot enable static port security on the VLAN trunk por t. When using static por t security, MAC address objects for the trusted MAC addresses are bound to a port, and frames from other source addresses are dropped. This is not supported on VLAN tr unk por ts in this release.
Ports configured as VLAN trunks cannot be used for any other function and are reserved for use in Layer 2 only. For example, you cannot configure an IP Address for the trunk por ts.
When a Trunk VLAN interface has been configured on a particular trunk port, that tr unk por t cannot be deleted until the VLAN interface is removed, even though the VLAN is enabled on multiple trunk ports.
See the following procedures:
“Editing VLANs” on page 12
“Adding a VLAN Trunk Port” on page 12
“Enabling a VLAN on a Specific Trunk Port” on page 13
“Deleting VLAN Trunk Ports” on page 13
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
11
Page 12
Configuring Switching

Editing VLANs

Step 1 On the Switching > VLAN Trunking page, click the Configure icon in the VLAN Table row for the
Step 2 In the Edit Vlan for PortShield window, do one of the following:
To edit a VLAN, perform the following steps:
VLAN ID you want to edit.
T ype a different VLAN ID into the Vlan ID field. You can enter any VLAN ID except the original system-specified VLAN ID or any others in the Reserved VLAN IDs.
Use the VLAN ID number in the Vlan ID field, which matches the one for which you click ed the Configure icon.
Step 3 To enable trunking for this VLAN, select the Tr unked checkbox. To disable trunking for this VLAN , c lear
the checkbox. Enabling trunking allows traffic for this VLAN to be sent to remote members of the VLAN who are
connected to a different switch in the network. The VLAN ID is automatically added to the list of VLAN entries for each trunk port, indicating that the VLAN is enabled on the trunk ports. Also, a green check mark is displayed for this VLAN in the VLAN Table on the Switching > VLAN Trunking page.
Step 4 Click OK.

Adding a VLAN Trunk Port

To add a VLA N tr unk por t, perf or m the following ste ps:
Step 1 On the Switching > VLAN Trunking page under VLAN Trunks, click the Add button. Step 2 In the Add VLAN Trunk Port window, select the port to add from the Trun k P ort drop-down list.
Step 3 Click OK.
12
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 13

Enabling a VLAN on a Specific Trunk Port

Using this method rather than the method described in “Editing VLANs” on page 12, you can specify a single trunk port to be used for a particular VLAN ID.
To enable a custom VLAN ID on a specific tr unk port, p erform the following steps:
Step 1 On the Switching > VLAN Trunking page under VLAN Trunks, click the Enable VLAN button. Step 2 In the Enable VLAN window, select a trunked port from the Trunked Port drop-down list. This is the
port that you want to use to trunk the VLAN ID indicated in the next field.
Step 3 In the VLAN ID field, type in the VLAN ID to be trunked. This can be a VLAN ID on another switch. Step 4 Click OK.
Configuring Switching

Deleting VLAN Trunk Ports

To delete one or more VLAN trunk ports, perform the following steps:
Step 1 On the Switching > VLAN Trunking page under VLAN Trunks, select one or more checkboxes for the
VLAN trunk ports you want to delete.
Step 2 Click the Delete button. Step 3 Click OK in the confirmation dialog box.

Configuring Rapid Spanning Tree

The Rapid Spanning Tree Protocol (RSTP) is implemented to support Layer 2 network designs with redundant paths.
The first Spanning Tree Protocol was defined in by IEEE 802.1D in 1990, updated in 1998, and replaced in
2004. The 802.1D-2004 standard removed STP and replaced it with RSTP, also adding other extensions
802.11c and 802.1t. RSTP was originally defined in 802.1w , introduced in 1998 and published in 2001. RSTP
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
13
Page 14
Configuring Switching
allows faster spanning tree convergence after a topology change, typically within 3 times the Hello interval, a total of 6 seconds in the default configuration. The original STP can take 30 to 50 seconds for convergence after a topology change.
SonicWALL’s RSTP implementation conforms to the IEEE 802.1D-2004 specification. The 802.1D specification is VLAN unaware and creates a common spanning tree (CST) that is applied to all VLANs present in the network. The RSTP implementation is backward compatible with the original 802.1D standard (STP).
The Switching > Rapid Spanning Tree page, shown in Figure 8, displays the root bridge ID and other information about the root bridge. It also provides a way to configure bridge settings and port settings for the SonicWALL NSA 2400MX.
See the following sections for bridge and por t settings confi guration information:
“Configuring Bridge Settings” on page 17
“Configuring Port Settings” on page 17
Figure 8 Switching > Rapid Spanning Tree Page
14
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 15
Configuring Switching
The settings displayed in the Bridge Information section of the Switching > Rapid Spanning Tree page are described in Ta ble 2.
Table 2 RSTP Configurable Objects
Item Description
Root Bridge ID The root bridge ID is an 8-byte value with 2 bytes for the bridge priority
and 6 bytes for the MAC address. The root bridge has the lowest value for priority among all switches in the network.
Root Bridge Indicates whether or not the SonicW ALL NSA 2400MX is the root bridge
in the bridged LAN. The root bridge is chosen by an election process among all switches in the network, based on bridge priority and bridge MAC address.
Root Priority Bridge priority is configurable in multiples of 4,096 with a default value of
32,768 and maximum of 61,440. Lower numbers i ndicate higher priority. Bridge priority is the key factor in determining the root bridge. It also determines the designated bridge for each LAN segment when multiple bridges have the same path cost to the root bridge.
Root Path Cost T he ro ot path cost is based on the speed of the interface that con nects to
the root bridge, and is used by RSTP to calculate the shortest path to the elected root bridge.
Root Port The root port is the interface on a bridge that provides the shortest path
to the root bridge.
Root Age Time (sec) The root age time is the number of seconds since the last hello packet
arrived from the root bridge.
Root Max Age (sec) The root max age is the time interval without sending a hello packet after
which a switch is assumed to be unreachable and the Spanning Tree network topology is updated.
Root Forward Delay (sec) The root forward delay is the time allowed for the listening and learning
state. It is also the time that it takes to convert an interface from a bloc king state to a forwarding state. The default is 15 seconds.
Root Hello Time The root hello time is the time inter val between hello packets sent to the
root bridge.
Auto detection of non-edge ports is not supported. A non-edge port is one that is connected directly to an end-user computer such as a PC or laptop.
You can enable/disable RSTP on VLAN trunk ports only. By default, RSTP is disabled on trunk ports.
Note You should enable the RSTP before performing physical network connectivity between the
SonicWALL NSA 2400MX and another switch.
When the SonicWALL NSA 2400MX is booting up , ports are disabled until Spanning T ree configuration is applied. The NSA 2400MX automatically soft-bridges the STP Bridge Protocol Data Units (BPDUs) between the ports to prevent loops when ports in the same VLAN (PortShield group or L2 Bridge mode) are connected to another switch. This allows the remote switch to detect that its ports are connected to another switch and it can automatically block certain ports.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
15
Page 16
Configuring Switching
2400MX
Network Security Appliance
Switch
Sales
Eng
Switch
X
Eng
Sales
Loop
VLAN Trunk
VLAN Trunk
Logically Blocked
- with RSTP running on NSA and Switches
Internet
Figure 9 illustrates the possible loop that is logically blocked when ports in the same VLAN exist on multiple
connected switches in a network.
Figure 9 RSTP on VLAN Trunk Ports Detects and Blocks Loops Between Switc he s
16
You can view the port settings for RSTP-eligible interfaces on the Switching > Rapid Spanning Tree pag e. See Tab le 3 for an explanation of the port settings.
Table 3 Switching > Rapid Spanning Tree Port Settings
Item Description
Name Indicates the interface number, such as X20. No Type Indicates link status and speed. No Cost Displays the port cost. This can be a configured value or an
automatically calculated value based on link speed.
Priority Displays the port priority. This defaults to the interface
State Indicates whether the port is currently forwarding,
Role Indicates the role and status of the port, such as root,
Enabled Indicates whether or not RSTP (or STP) is enabled. Yes
number unless configured otherwise.
discarding, or blocking packets.
designated, alternate, backup, or disabled.
Configurable from this Page
Yes
Yes
No
No
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 17

Configuring Bridge Settings

T o configure the Bridge Settings on the Switching > Rapid Spanning T ree page, perform the following steps:
Step 1 To s pecify the spanning tree protocol version to use, select one of the following from the For c e Ver s ion
drop-down list:
RSTP Operation – Use Rapid Spanning Tree Protocol.
STP Only – Use the original Spanning Tree Protocol.
Step 2 To specify the priority of the root bridge, type the desired priority into the Bridge Priority field. Bridge
priority is configurable in multiples of 4,096 with a default value of 32,768 and maximum of 61,440. Lower numbers indicate higher priority. Bridge priority is the key factor in determining the root bridge. It also determines the designated bridge for each LAN segment when multiple bridges have the same path cost to the root bridge.
Step 3 To specify the Hello time, type the desired number of seconds to allow into the Hello Time (secs) field.
The Hello time is the time interval between transmission of BPDUs by the root bridge and other bridges/switches in the network. The default is 3 and the range is 1 to 10 seconds. T he Hello time is communicated to other switches by incl uding it in the BPDU along with other topology information for the bridged LAN.
Step 4 T o speci fy the forw ard dela y, type the desired number of seconds in to the Forward Delay (secs) field. The
forward delay is the time allow ed for the listening and learning state. It is also the time that it takes to conv ert an interface from a blocking state to a forwarding state. The default is 15 and the range is 4 to 30 seconds. The forward delay setting is communicated to other switches by including it in the BPDU.
Step 5 When finished, click Apply.
Configuring Switching

Configuring Port Settings

You can enable or disable RSTP and configure path cost and priority for each VLAN trunk port on your SonicWALL NSA 2400MX.
When port settings have been specified for an interface, the Port Settings table on the Switching > Rapid Spanning Tree page contains a row for that interface. A Configure icon is enabled for it unless Link Agg regation is enabled for the interface.
Note If you need to enable RSTP on interfaces in a link aggregation group, first enable RSTP on
the individual ports and then enable link aggregation.
To co nfigure the Port Settings on the Switching > Rapid Spanning Tree page, perform the following steps:
Step 1 Under Port Settings, click the Configure icon in the row for the interface you want to edit.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
17
Page 18
Configuring Switching
Step 2 In the Edit RSTP Settings window, select the Enable RSTP checkbox to enable Rapid Spanning Tree
Protocol for this interface. Clear the checkbox to disable RSTP on this interface.
Step 3 To allow the path cost for the por t to be automatically calculated by SonicOS, select the Auto checkbox.
The Auto option is enabled by default. If left in auto-mode, the port cost is determined based on link speed.
Step 4 To specify the path cost for the por t, type the desired cost value into the Port Pa th C o st field. You can
assign an arbitrary cost value or base the cost on guidelines provided by the RSTP or STP specification. The cost is higher for lower bandwidth connections. According to guidelines, the cost of a 1 Gbps bandwidth connection would be 2, compared to the cost of 19 for a 100 Mbps Fast Ethernet connection or 100 for a 10 Mbps connection.
Step 5 To specify the port priority, type the desired priority into the Port Priority field. The port priority defaults
to the interface number unless configured otherwise. The range is 0 to 15. A lower n umber indic ates higher priority. Port priority is important when multiple ports are connected to the same switch and there is a possible loop, or in the case where the cost of the path to the root bridge is the same as it is for another port. The port w ith the lower number for port priority is used to forward traffic. The port with the lower priority (indicated by a higher number) is blocked.
Note The range for input into the Port Priority field is 0 to 15. The number you enter is
automatically multiplied by 16 when applied.

Configuring Layer 2 Discovery

The Switching > Layer 2 Discovery page accesses information about switches and other devices in the network, using the Link Layer Discovery Protocol (LLDP). LLDP is a non-proprietary protocol used by network devices in the LAN to advertise their identity, capabilities, and interconnections. The LLDP protocol is defined by the IEEE 802.1AB standard, which is titled “Station and Media Access Control Connectivity Discovery.”
In addition to LLDP, the SonicWALL NSA 2400MX uses Microsoft Link Layer Topology Discovery (LLTD) protocol to discover nodes visible from a port. Link Layer Topology Discovery (LLTD) is a Microsoft proprietary protocol with functionality similar to LLDP . It operat es on wired or wireless networks (Ethernet 802.3 or wireless 802.11). LLTD is included on Windows Vista and Windows 7, and can be installed on Windows XP.
Note Windows XP users need to download, install, and enable the LLTD responder driver from
Microsoft.
Both LLDP and LLTD are Layer 2 protocols and do not cross a broadcast domain. A switch forwarding table is also used during discovery, and an ARP table is used to connect MAC addresses to IP addresses.
18
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 19
Configuring Switching
On many switches and network devices, the LLDP information is stored as a management information database (MIB). Simple Network Management Protocol (SNMP) is used to query the MIB for device information, including syste m name, port nam e, VLAN name, IP address, system capabilities (such as switching or routing), MAC address, and link aggregation settings. The topology of a network can be discovered by crawling the hosts and querying the MIB database on each.
The LLDP transmitter is not implemented in SonicOS 5.7.0.0. The Switching > L2 Discovery page displays Layer 2 information obtained via LLDP from other, LLDP-enabled, switches and devices in the network.
Figure 10 shows information obtained via discovery on the X1 (WAN) interface.
Figure 10 Switching > L2 Discovery Page
The Switching > L2 Discovery feature does not proactiv ely manage the disco v ery. Discovery is active when the system boots up and then does not restart unless you click the L2 Discovery refresh button in the SonicOS management interface.
T o restart Layer 2 discovery on multiple interfaces , you can select the checkbo x next to the desired interfaces and then click the Refresh Selected button at the bottom of the page, as shown in Figure 11.
Figure 11 Restarting Layer 2 Discovery on Selected Interfaces
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
19
Page 20
Configuring Switching

Viewing Device Information in the Layer 2 Discovery Page

To view the LLDP/LLTD discovery results for your network, perform the following steps:
Step 1 Enable LLDP on any switches or other network devices in your network, using a command such as “lldp
run”. LLDP is usually not enabled by default.
Step 2 T o get LL TD results from Windows XP machines in your network, download, install, and enable the LLTD
responder driver from Microsoft on those machines. LLTD is installed and enabled by default on Windows Vista and Windows 7 machines.
Step 3 In the SonicOS management interface, navigate to the Switching > L2 Discovery page. Step 4 To view the LLDP/LLTD results for a single interface, click the Refresh button in the same row as the
interface.
Step 5 T o view the LLDP/LLTD results for multiple interfaces, select the chec kboxe s for those interfaces and then
click the Refresh Selected button at the bottom of the page. You can select all interfaces by selecting the checkb ox n e x t t o Interf ace in the table heading.
Figure 12 shows the LLDP discovery results for an HP ProCurve switch and a Cisco switch (both circled in
red). The other details are the LLTD results.
Figure 12 Switch Information in the Switching > Layer 2 Discovery Page
20
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 21

Configuring Link Aggregation

SonicOS 5.7 supports the IEEE 802.1AX-2008 Link Aggregation Control Protocol (LACP). LACP is used when multiple network ports are connected in parallel between two switches or between a switch and a server. Link aggreg ation makes it possible to increase the bandwidth beyond the limits of a single connection, and to provide seamless, higher availability by creating a redundant link.
Link agg regation in Son icOS 5.7 allows por t redundancy and load balancing in Layer 2 networks. Load balancing is controlled by the hardware, based on source and destination MA C address pairs . The Switc hing > Link Agg reg atio n pag e provides information and statistics, and allows configuration of interfaces for aggreg ation.
Figure 13 shows the Switching > Link Aggregation page in the SonicOS user interface.
Figure 13 Switching > Link Aggregation Page
Configuring Switching
Static and Dynamic Link Aggregation are supported. Dynamic Link Aggregation is supported with the use of LACP (IEEE 802.1AX). Ports that are in the same VLAN (same PortShield Group) or are VLAN trunk ports are eligible for link aggregation. Up to four ports can be aggregated in a logical group called a Logical Link, and there can be four Logical Links configured.
Two main types of usag e are enabled by this feature:
SonicWALL NSA 2400MX to Server – This is implemented by enabling link aggr egation o n por ts
within the same VLAN (same PortShield Group). This configuration allows port redundancy , but does not support load balancing in the NSA 2400MX-to-Server direction due to a hardware limitation on the NSA 2400MX.
SonicWALL NSA 2400MX to Switch – This is allowed by enabling link aggregation on VLAN tr unk
ports. Load balancing is automatically performed by the hardware. The NSA 2400MX supports one load balancing algorithm based on source and destination MAC address pairs.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
21
Page 22
Configuring Switching
2400MX
Network Security Appliance
Switch
Eng VLAN
QA VLAN
Logical Link
Redundant and Load Balanced
Server
Logical Link Redundant - Not Load Balanced
Internet
Figure 14 illustrates the two types of link agg reg atio n.
Figure 14 Two Types of Link Aggregation: NSA to Server and NSA to Switch
22
Similarly to PortShield configuration, you select an interface that represents the aggregated group. This port is called an aggregator. The ag gregator port must be assigned a unique key. By default, the ag gregator port key is the same as its interface number . Non-aggregator ports can be optionally configured with a key, which can help prevent an erroneous Logical Link if the switch connections are wired incorrectly.
Ports bond together if connected to the same link partner and their keys match. If there is no key configured for a port (if the port is in auto mod e), it will bond with an aggregator that is connected to the same link partner. The link partner is discovered via LACP messages. A link partner cannot be discovered for Static link agg reg atio n. In this case, por ts aggregate based on keys alone.
Like a PortShield host, the aggregator port cannot be removed from the Logical Link since it represents the Logical Link in the system.
Note Once link aggregation has been enabled on VLAN trunk ports, additional VLANs cannot be
added or deleted on the Logical Link.
Note If you need to enable RSTP on the Logical Link, first enable RSTP on the individual
members and then enable link aggregation.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 23

Creating a Logical Link

To create a Logical Link, perfor m the following steps:
Step 1 On the Switching > Link Aggregation pag e, click the Add button. Step 2 In the Add LAG Port window, select the interface from the Port drop-down list.
Configuring Switching
Step 3 To specify a key, clear the Auto-Detect checkbox and type the desired key into the Key field. Step 4 If this interface will be the aggregator for the Logical Link, select the Aggregator check b ox . O n l y o ne
interface can be an agg reg ator for a Logical Link.
Step 5 To enable LACP, select the LACP Enable checkbox. Dynamic Link Aggregation is supported with the use
of LACP. The link partner is discovered via LACP messages.
Step 6 Click OK. Step 7 On the Switching > Link Aggregation pag e, click the Add button again.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
23
Page 24
Configuring Switching
Step 8 In the Add LAG Port window, select the interface for the link partner from the Por t drop-down list.
Step 9 If you specified a key for the first interface (the aggregator), clear the Auto-Detect check b ox a n d type the
same key into the Key field. If Auto-Detect was left enabled for the first interface, leav e it enabled for this one as well.
Step 10 Clear the Aggregator checkbox. Only one interface can be an aggreg ator for a Logical Link. Step 11 Select the LACP Enable checkbox. This is necessary to create the Logical Link. Step 12 Click OK.
The Switching > Link Aggreg ation pag e displays the Logical Link. The Partner column will display the MAC addresses of the link partners after they are physically connected.
24
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 25

Configuring Port Mirroring

Y ou can configure Po rt Mirroring on the SonicWALL NSA 2400MX to send a copy of network pack ets seen on one or more switch ports (or on a VLAN) to another switch port called the mirror port. By connecting to the mirror port, you can monitor the traffic passing through the mir r ored por t(s).
Figure 15 shows the Switching > Port Mirroring page with one mirror group configured. Traffic on interface
X20 is being mirrored to interface X22, the designated mirror port.
Figure 15 Switching > Port Mirroring Page
Configuring Switching
A VLAN trunk port can be mirrored, but cannot act as a mirror port itself. VLAN trunk ports are used to pass traffic to other networking devices . By comparison, traffic arriving on a mirror port has already been handled or sent to its destination, and the mirror port does not forward it again. Typically , the traffic is pas sed from the mirror port to a computer where the administrator can use an application, such as Wireshark, to view the traffic content.
The Switching > Port Mirroring page allows the administrator to assign mirror ports to mir ror ing ress, egress or bidirectional packets coming from a group of por ts.
See the following procedures:
“Configuring a Port Mirroring Group” on page 25
“Deleting a Port Mirroring Group” on page 26

Configuring a Port Mirroring Group

To create a new port mir roring g roup, perform the following steps:
Step 1 On the Switching > Port Mirroring page, click the New Group button.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
25
Page 26
Configuring Switching
Step 2 In the Edit Mirror Group window, type a descriptive name for the group into the Interface Group Name
field.
Step 3 For t he Direction , select one of the following:
ingress – Select ingress to monitor traffic arriving on the mirrored po rt(s).
egress – Select egress to monitor traffic being sent out on the mir rored por t(s).
both – Select both to monitor traffic in both directions on the mirrored port(s).
Step 4 In the All Interfaces list, select the port to mirror the traffic to and click the top right-arrow button to move
it to the Mirror Port field. You must use an unassigned port as the mirror port.
Step 5 In the All Interfaces list, select one or more ports to be monitored, and click the lower right-arrow button
to move it/them to the M i rr ored P orts field. You will be able to monitor traffic on the mirrored port(s) by connecting to the mirror port.
Step 6 Click OK. Step 7 T o begin copying netw ork pack ets from the Mirrored Po rts to the Mirror Port, select the Enable checkbox
in the Switching > Port Mirroring page.
Step 8 Click OK.

Deleting a Port Mirroring Group

To remove a port mirroring g roup, perform the following steps:
Step 1 On the Switching > Port Mirroring page, select the checkbox next to the port mirroring group that you want
to delete.
Step 2 Click the Ungroup button. Step 3 Click OK in the confirmation dialog box.
26
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 27

Configuring Layer 2 Quality of Service

Quality of service (QoS) refers to a method of resource control that provides different priority to different types of applications, data, or users. QoS can also be used to guarantee a certain bit rate, delay, jitter, or error rate to a type of network traffic. When network capacity is not larg e enough to accommodate all traffic at full speed, QoS performance guarantees are essential in the delivery of delay senistive applications such as Voice over IP (VoIP), online gaming, and Internet TV.
Layer 2, or Ethernet, QoS, provided by SonicOS 5.7 on the SonicWALL NSA 2400MX, is appropriate for real-time streaming multimedia applications such as those mentioned above. At Layer 2, VLANs may also be used to separate traffic of different QoS levels (VLAN tagging is defined in IEEE 802.1Q).
SonicOS Layer 2 QoS supports Class of Service (CoS) as specified in IEEE 802.1p. CoS uses a 3 bit field within the Ethernet frame header. It provides 8 levels of priority for use with QoS algorithms to handle different types of traffic.
SonicOS also supports Differentiated Services Code Point (DSCP). Also known as Differentiated Services or DiffServ, DSCP uses a 6-bit field in the header of IP packets (Layer 3) for packet classification, and provides a simple method of providing QoS guaranteed service to voice or video while using best-effort for traffic that is not delay sensitive. Best -effort service is the default for most Internet traffic and does not provide any guarantees.
The SonicW ALL NSA 2400MX appliance can be configured to trust Class of Service (CoS) (IEEE 802.1p) and/or trust Differentiated Ser vices Code Point (DSCP) per port and treat the frames appropriately.
The Switching > Layer 2 QoS page allows the administrator to configure QoS settings per interf ace.
Figure 16 shows the Switching > Layer 2 Qos page.
Configuring Switching
Figure 16 Switching > Layer 2 QoS Page
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
27
Page 28
Configuring Switching
In SonicOS, four queues with different priority levels (low, normal, high, highest) are supported. These are mapped to the eight levels defined in IEEE 802.1p (CoS) and cannot be changed. Tab le 4 shows the mapping between the CoS priority levels and the four supported queue priority levels.
Table 4 802.1p Priority Levels Mapped to Four Queues
CoS Priority Traffic Type Queue Priority
0 Best Effort Normal 1BackgroundLow 2SpareLow 3 Excellent Effort (Business
Normal
critical)
4 Controlled Load (Streaming
High
multimedia)
5 Video (Interactive Media)
High [Less than 100ms latency and jitter]
6 Voice [Less than 10ms
Highest latency and jitter]
7 Network Control [Lowest
Highest latency and jitter]
On the Switching > Layer 2 QoS page, you can configure the mapping between each value in the DSCP range of 0-63 and the four queues (Low, Normal, High, Highest) supported for Layer 2 QoS, or reset the entire map to the default settings (Normal queue for all DSCP values). Also, on the Firewall > QoS Mapping page, you can configure the mapping between the DSCP range and the 8 levels defined by CoS.
Frames received on ports configured to trust CoS or DSCP are queued appropriately according to the mapping table. An option is provided to select the field to use when both the 802.1p tag field and the DSCP field are present in ingressing frames.
For QoS settings, por ts can be assigned a default priority. The default priority is used when Trust CoS or Trust DSCP is enabled, but the information is absent. When Fixed Priority is enabled, the 802.1p tag field and DSCP field are ignored and the default priority is used.
See the following procedures:
“Configuring the Scheduling Mechanism” on page 28
“Configuring DSCP Mapping” on page 29
“Showing the CoS Remap Table” on page 29
“Configuring QoS Settings” on page 30

Configuring the Scheduling Mechanism

T o configure Weighted Round-Robin or Strict Priority Queue as the output scheduling mechanism, perform the following steps:
Step 1 On the Switching > Layer 2 QoS page, select one of the following from the Output Scheduling
Mechanism drop-down list:
Weighted Round-Robin – When Weighted Round-Robin is selected, the weighting factors are 8:4:2:1.
28
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 29
Strict Priority Queue – When Strict Priority Queue is selected, packets containing an 802.1p tag or
DSCP marking with a priority level matching the Highest queue priority are forwarded or received. Packets matching High, Normal or Low priority may be dropped.
Step 2 Click the Apply button.

Configuring DSCP Mapping

You can configure the DSCP mapping by setting the priority levels for DSCP values 0 through 63. The Switching > Layer 2 QoS page also provides a Reset DSCP Remap button to reset the priority levels back to the default, which is “Normal.”
To con figure DSCP mapping, perfor m the following step s:
Step 1 To show the DSCP Remap table , clic k Hide/Show next to the DSCP Remap Table heading. The priority
settings for all DSCP values, 0 - 63, are displayed.
Configuring Switching
Step 2 For e ach DSC P va l ue ( 0 - 63) that you want to change, select one of the following from the Priority
drop-down list:
Low
Normal
High
Highest
Step 3 Click the Apply button. The DSCP Remap table is hidden, but if you show it again you will see the updated
priority settings.
Step 4 To reset all DSCP mapping back to the default, Nor mal, click the Reset D SC P Re map button and then
click OK in the confirmation dialog box.

Showing the CoS Remap Table

T o show the CoS R emap table, click Hide/Show next to the CoS R emap T a ble heading . The priority levels cannot be configured. The CoS Remap table is shown in Figure 17.
Figure 17 Showing the CoS Remap Table on the Switching > Layer 2 QoS Page
To hide the CoS Remap table, click Hide/Show next to the CoS Remap Table heading again.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
29
Page 30
Configuring Switching

Configuring QoS Settings

The QoS Settings table on the Switching > Layer 2 QoS page lists all interfaces on the SonicWALL NSA 2400MX. You can confi gure the QoS settings for each interface individually or for m ultiple interfaces at the same time. A portion of the QoS Settings table is shown in Figure 18.
Figure 18 QoS Settings Table on the Switching > Layer 2 QoS Page
See the following procedures:
“Configuring QoS Settings for an Individual Interface” on page 30
“Configuring QoS Settings for Multiple Interfaces” on page 3 1
Configuring QoS Settings for an Individual Interface
To configure QoS settings for frames received on an individual interface, perform the following steps:
Step 1 On the Switching > Layer 2 QoS page under QoS Settings, click the Configure icon in the row for the
interface you want to configure. The Edit QoS Settings window opens.
Step 2 In the Edit QoS Settings window, to enable fixed priority for frames arriving on this interface, select the
Fixed Priority checkb ox. When Fixed Priority is selected, the remaining checkboxes are cleared and disabled (greyed out). The CoS 802.1p tag field and DSCP field are ignored and the ingress port’s default priority is always used.
Step 3 To enable the use of the CoS 802.1p tag field settings for Quality of Service on this interface, select the
Trust CoS checkb ox . The Fixed Priority checkbox must be cleared before you can select any other checkbox.
Step 4 T o enable the use of the DSCP field settings for Quality of Service on this interface, select the Trust DSCP
checkbox. The Fixed Priority ch eckbox must be cleared before you can select any other checkbox.
30
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 31
Step 5 If both Trust Co S and Tru st DSCP are selected, do one of the following:
Select the Prefer CoS checkbox to give preference to the CoS 802.1p tag field settings when both the
802.1p tag field and the DSCP field are present in ingressing frames.
Clear the Prefer CoS checkbox to giv e preferenc e to the DSCP field settings when both the 802.1p tag
field and the DSCP field are present in ingressing frames.
Step 6 Select one of the following priority levels from the Default Priority drop-down list:
Low
Normal
High
Highest
If ingressing frames do not contain either a CoS 802.1p tag field or a DSCP field, the default priority is used.
Step 7 Click OK.
Configuring QoS Settings for Multiple Interfaces
To configure QoS settings for frames received on any of several interfaces, perform the following steps:
Step 1 On the Switching > Layer 2 QoS page under QoS Settings, select the chec kbox es next to the interfaces you
want to configure, and then click the Configure button at the bottom of the page. The Edit QoS Settings window opens.
Configuring Switching
Step 2 The Keep original QoS mode of each port checkbox is selected by default. When this checkbox is
selected, each individual port’s QoS mode remains unchanged, and only the Default Priority setting is changed to the configured value (Step 7) for each port being configured.
To activate the other checkboxes in this window and make changes to the QoS settings of the selected interfaces, clear the Keep original QoS mode of each port checkbox.
Step 3 To enable fixed priority for frames arriving on these interfaces, select the Fixed Priority checkbox. When
Fixed Priority is selected, the subsequent checkbo xes are cleared and disabled (greyed out). The CoS 802.1p
tag field and DSCP field are ignored and the ingress port’s default priority is always used.
Step 4 To enable the use of the CoS 802.1p tag field settings for Quality of Ser vice on these interfaces, select the
Trust CoS checkb ox . The Fixed Priority checkbox must be cleared before you can select this checkbox.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
31
Page 32
Configuring Switching
Step 5 To enable the use of the DSCP field settings for Quality of Service on these interfaces, select the Trust
DSCP checkbox. T h e Fixed Priority checkbox must be cleared before you can select this checkbox.
Step 6 If both Trust Co S and Tru st DSCP are selected, do one of the following:
Select the Prefer CoS checkbox to give preference to the CoS 802.1p tag field settings when both the
Clear the Prefer CoS checkbox to giv e preferenc e to the DSCP field settings when both the 802.1p tag
Step 7 Select one of the following priority levels from the Default Priority drop-down list:
Keep Original Settings – Choose this setting to allow each interface to default to its original individual
Low
Normal
High
Highest
If ingressing frames do not contain either a CoS 802.1p tag field or a DSCP field, the default priority is used.
Step 8 Click OK.
802.1p tag field and the DSCP field are present in ingressing frames.
field and the DSCP field are present in ingressing frames.
QoS settings.

Configuring Rate Control

SonicOS supports per-interface rate limiting and flow control on the Switching > Rate Control pag e. Rate limiting provides a way to control the rate of traffic sent or received on a network interface. Traffic is
sent or received while its rate is less than or equal to the specified rate limit , while traffic that exceeds the rate is dropped or delayed.
Flow control allows you to manage the rate of data transmission between two devices to prevent a fast sender from getting too far ahead of a slow receiver. Flow control provides a mechanism for the receiver to control the transmission speed to avoid being overwhelmed with data from the sender. Flow control is important in cases where the receiver has a heavy load to process compared to the sender, or if the receiver is a slower computer than the sender.
32
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 33
Configuring Switching
The Switching > Rate Control page, shown in Figure 19, provides information and configuration for per-interface rate limiting and flow control. Both the rate limiting and flow control features are configured on a per port basis.
Figure 19 Switching > Rate Control Page
Egress Traffic Rate Limiting
In SonicOS, the rate limiting for egress frames can only be enabled or disabled, no mode can be selected.
Ingress Traffic Rate Limiting
In SonicOS, the bandwidth of ingress frames can be rate-limited in four modes:
Limit All Frames – Apply rate limiting to all types of network traffic arriving on the interface
Limit just broadcast, multicast and flooded unicast frames – Apply rate limiting to broadcast, multicast
and flooded unicast traffic arriving on the interface, where:
Broadcast traffic is traffic that is simultaneously sent to all computers in the network, typically to announce shared services and state information.
Multicast traffic is traffic that is simultaneously sent to a group of computers in the network. Specific multicast addresses are used for different purposes. For example, Spanning Tree Protocol
802.1D for bridges uses the well-known multicast address 01-80-C2-00-00-00, and Spanning Tree Protocol 802.1AD for provider bridges uses the well-known multicast address 01-80-C2-00-00-08.
Flooded unicast traffic is traffic that is sent by a switch to all the interfaces in the VLAN. This can occur if the destination MAC address for a frame has not yet been learned by the switch, making it an unknown unicast.
Limit just broadcast and multicast frames – Apply rate limiting to broadcast and multicast traffic
arriving on the interface
Limit just broadcast frames – Apply rate limiting to broadcast traffic arriving on the interface
The ingress rate limit is rounded to the nearest increment, depending on the the granularity available for that rate. The granularities are different depending on the range of rates:
128kbps ~ 1Mbps – increments of 64kbps
1Mbps ~ 100Mbps – increments of 1Mbps
100Mbps ~ 1000Mbps – increments of 10Mbps (for gigabit por ts)
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
33
Page 34
Configuring Switching
Flow Control
In SonicOS, back-pressure flow control on half-duplex ports and pause frame-based flow control on full-duplex ports are provided to support zero packet loss under temporary traffic congestion.
Full-duplex flow control requires support from the peer end station. Full-duplex flow control works as
follows: when a port’s free buffer space is almost empty, the devices send out a PAUSE frame with the maximum pause time to stop the remote node from sending more frames into the switch. The devices also respond to the pause command. Once the P A USE frame is detected, the port will stop transmission of new data for the amount of time defined in the pause time field of the received PAUSE frame.
Half-duplex flow control is used to throttle the throughput rate of an end station to avoid dropping
packets during network congestion.

Configuring Rate Control Settings for an Interface

To configure rate control settings or to enable fl ow control, perform the following steps:
Step 1 On the Switching > Rate Control page, click the Configure icon in the row for the interface you want to
configure. The Edit Rate Control Settings window opens.
Step 2 To e nable f low control on this interface, select the Enable Flow Control checkbox. Step 3 To s et the mode for limiting the bandwidth of ing ressing frames, select one of the following from the
Ingress Mode drop-down list:
Limit All – Apply rate limiting to all types of network traffic arriving on the interface
Limit Broadcast, Multicast and Flooded Unicast – Apply rate limiting to broadcast, multicast and
flooded unicast traffic arriving on the interface
Limit Broadcast and Multicast – Apply rate limiting to broadcast and multicast traffic arriving on the
interface, where:
Broadcast traffic is traffic that is simultaneously sent to all computers in the network, typically to announce shared services and state infor mation.
Multicast traffic is traffic that is simultaneously sent to a group of computers in the network. Specific multicast addresses are used for different purposes . For example, Spanning Tree Protocol
802.1D for bridges uses the well-known multicast address 01-80-C2-00-00-00, and Spanning Tree Protocol 802.1AD for provider bridges uses the well-known multicast address 01-80-C2-00-00-08.
Flooded unicast traffic is traffic that is sent by a switch to all the interfaces in the VLAN. This can occur if the destination MAC address for a frame has not yet been learned by the switch, making it an unknown unicast.
Limit Only Broadcast – Apply rate limiting to broadcast arriving on the interface
34
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 35
Step 4 T ype the desired ingress rate limit in kilobits per second into the Ingress Rate field. To turn off the ingress
rate limit and allow unlimited traffic, type 0 (zero). The value you type will be rounded to the nearest increment, depending on the the granularity available for that rate . The granularities are different depending on the range of rates:
128kbps ~ 1Mbps – increments of 64kbps
1Mbps ~ 100Mbps – increments of 1Mbps
100Mbps ~ 1000Mbps – increments of 10Mbps (for gigabit por ts)
Step 5 Type the desired egress rate limit in kilobits per second into the Egress Rate field. To turn off the egress
rate limit and allow unlimited traffic, type 0 (zero). The value you type will be rounded to the nearest increment, depending on the the granularity available for that rate. The granularities are the same as for the ingress rate.
Step 6 Click OK.

Configuring Port Security

On the Switching > Port Security page, each port can be configured to enable or disable the Discard Tagged option. When it is enabled, all frames with a 802.3ac tag (or “Q-tag”) are discarded. IEEE 802.3ac
specifies an extension of 4 bytes to the Ethernet frame size, allowing 1522 bytes per frame. The additional 4 bytes are for the “Q-tag”, which includes 802.1Q VLAN information and 802.1p priority information.
A secure port is meant to receive untagged frames. If a frame has a tag, even when its Security Association (SA) is trusted, it will be discarded.
Only static port security is supported. T his means that the SonicWALL NSA 2400MX administrator must create MAC address objects for the trusted MAC addresses and bind the MAC address objects to specific ports. Frames whose source addresses are not contained in the table will be dropped.
Configuring Switching
MAC address objects are one type of address object in SonicOS. Address objects allow for entities to be defined one time and then re-used in multiple referential instances throughout the SonicOS interface. Address objects can be selected from a drop-down menu in many configuration screens throughout the user interface.
A VLAN trunk port or a port currently configured for link aggregation as part of a Logical Link cannot be a secure port at the same time. This prevents a non-trunk port from connecting to a trunk po rt .
Figure 20 shows part of the Switching > Port Security page, with one secure port configured.
Figure 20 Switching > Port Security Page
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
35
Page 36
Configuring Switching
See the following procedures for infor mation about conf iguring por t sec urity:
“Creating a Secure Port by Adding a MAC Add ress Object” on pag e 36
“Editing MAC Address Objects in Port Security Settings” on page 37
“Deleting MAC Address Objects from Port Security Settings” on page 37

Creating a Secure Port by Adding a MAC Address Object

T o configure port security, you must use an address object to bind MAC address(es) to an interface. You can create an address object from within the procedure described below, or use an existing one. For more information about address objects, see the SonicOS 5.7 Administrator’s Guide.
To create a secure por t by adding a MAC address object to an interface, perform the following steps:
Step 1 On the Switching > Port Security page, click the Add button at the bottom of the page. The Add Static MAC
Address window opens.
Step 2 Select the desired interface from the Port drop-down list. This will be the secure por t. Step 3 If the address object that contains the desired MAC addresses already exists, select it from the MAC
Address drop-down list and skip to Ste p 10.
Step 4 To create a MAC address object, select Create new address object from the MAC Address drop-down
list. The Add Address Object window opens.
Note Turn off the pop-up blocker in your browser before selecting Create new address object.
Step 5 Type a descriptive name for the address object into the Name field.
36
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 37
Step 6 Select the zone from the Zone Assignment drop-down list. This is the zone for the computer with this
MAC address . Y ou can select any zone that exists on the SonicWALL NSA 2400MX, including custom zones and the SonicOS default zones, which are LAN, WAN, DMZ, VPN, SSLVPN, MULTICAS T, and WLAN.
Step 7 The only available selection for Type is MAC, indicating that you are creating a MAC Address Object. Step 8 If the device with this MAC address can ha ve multiple IP addresses , select the Multi-homed host checkbox.
Otherwise, clear this checkbox.
Step 9 Click OK in the Add Address Object window. T he new addr ess object appe ars in the MAC Address field
of the Add Static MAC Address window.
Step 10 Click OK in the Add Static MAC Address window to complete the secure port configuration using these
settings.

Editing MAC Address Objects in Port Security Settings

T o edit a MAC address object for a secure port on the Switching > P ort Security page, perform the following steps:
Step 1 Click the Configure icon in the row for the MAC address object you want to edit. The Edit Static MAC
Address window opens.
Configuring Switching
Step 2 Select a different address object or select Create new ad dress ob ject from the MAC Address drop-down
list and follow the steps provided in Step 4 through Step 9 of the “Creating a Secure Port by Adding a MA C
Address Object” section on page 36.
Step 3 When finished, click OK.

Deleting MAC Address Objects from Port Security Settings

To delete one or more MAC address objects from your secure port settings on the Switching > Port Security page, perform the following steps:
Step 1 To delete a single MAC address object, click the Delete icon in the Configure column for the row with
the MAC address object you want to delete.
Step 2 To delete multiple MAC address objects, select the checkboxes next to the MAC address objects you want
to delete and then click the Delete Selected button at the bottom of the page.
Step 3 Click OK in the confirmation dialog box.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
37
Page 38

Troubleshooting and Verification

Troubleshooting and Verification
This section provides methods you can use to verify and troubleshoot the behavior of your Switching configuration.
See the following sections:
“Using Port Mirroring with Wireshark” on page 38
“Viewing Log Event Messages for Switching” on page 42

Using Port Mirroring with Wireshark

Because switched frames cannot be viewed with SonicOS Packet Monitoring, configuring Port Mirr oring and viewing the mirrored traffic with a network analyzer is the preferred method for examining traffic as it passes through the appliance interfaces. When using Packet Monitoring, the packets are displayed in the SonicOS user interface. However, with Port Mirroring, the mir rored traffic is sent to a por t rather than to the user interface. A computer running a network analyzer, such as Wireshark, is connected to the mirror port and the network analyzer is used to display the mirrored traffic.
This section describes an example situation where two VLAN Trunk por ts are mir rored to a port that is connected to a computer running Wireshark. The two trunk ports are enabled for Rapid Spanning T ree and Link Aggreg ation, and the RSTP and LACP Layer 2 frames can be seen in Wireshark.

Configuring Ports for Mirroring

In this use case, the VLAN Trunk ports that we want to mirror are gigabit Ethernet ports. Therefore, we select a gigabit port as the Mirror Port.
To configure Port Mirroring for this use case, perform th e following steps:
Step 1 On the Switching > Port Mirroring page, click the New Group button to open the Edit Mirror Group
window.
38
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 39
Troubleshooting and Verification
Step 2 In the Edit Mirror Group window, type a name for the Mir ror Group.
Step 3 For Direction, select both. This allows mir roring of traffic ar riving on, and being tran smitted from, the
mirrored ports.
Step 4 In the All Interfaces box, scroll down and select a gigabit interface for the Mirror Por t. T he selected
interface must have an Unassigned zone. You can verify this on the Network > Interfaces page.
Step 5 Click the right arrow button to movethe selected interface to the Mirror Port field. In this case, we select
X20 as the Mirror Port.
Step 6 In the All Interfaces box, scroll down and select the interfaces that you want to mirror . We select X24 and
X25. These gigabit interfaces are enabled for RSTP and are configured as a Logical Link with X24 as the aggreg ator.
Step 7 Click the right arrow button to movethe selected interfaces to the Mirrored Ports field.
Step 8 Click OK.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
39
Page 40
Troubleshooting and Verification
The X20, X24, and X25 interfaces are shown below on the Network > Interfaces page. You can see that all three are gigabit Ethernet ports, that the Zone for X20 is Unassigned and it is configured as a Mirror Port, and that X24 and X25 are configured as VLAN Trunk ports. X25 is marked as a member of a Logical Link.

Using Wireshark

Wireshark is a popular, open source network analysis tool that runs on Windows or Mac OS X computers. It allows you to analyze network traffic at the frame or packet level. You can download Wireshark for free from http://www.wireshark.org/.
To use Wireshark to view the mir rored packets from the SonicWALL NSA 2400MX:
Step 1 Connect the SonicWA LL NSA 2400MX port X20 to a gig abit Ether net interface on your Wireshark
computer.
Step 2 T o view only Layer 2 traffic in Wireshark, open Network Connections on the computer and right-click the
gigabit interface you are using.
Step 3 Select Properties in the drop-down list. Step 4 Clear the checkboxes for IPv4 and IPv6 traffic.
Step 5 Click OK.
40
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 41
Step 6 Launch Wireshark.
Step 7 Do one of the following:
Click the Start Capture button in the upper left corner, and then, in the dialog box, select the Start checkbox for the gigabit interface connected to the Mirror Port.
Under Start capture o n interface, click the link for the interface connected to the Mirror Port.
Troubleshooting and Verification
Step 8 View the frames in the Wireshark main window.
Step 9 When finished, click the Stop Capture button. Step 10 Optionally save the output as a .cap or .pcap file, by selecting File > Save as, choosing a location, and
entering a file name.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
41
Page 42
Troubleshooting and Verification

Viewing Log Event Messages for Switching

A new log event, logstrAdvSwitch, is introduced in SonicOS 5.7 to address SonicOS Switching activities. It falls under a new category, Advanced Switching, which can only be seen on devices with th e switching hardware, such as the SonicWALL NSA 2400MX. Other SonicWALL appliances will not show the new category, as it is not applicable to the hardware.
Y ou can filter the log for the Adv anced Switching category to display only the log events related to switching . For instructions, see the “Filtering the Log for Switching Events” section on page 43.
All messages are informational, and no actions are required by the administrator when these log messages occur.
Table 5 describes the various instances of the logstrAdvSwitch log event specific to Switching in Soni cOS
5.7.
Table 5 Switching Log Event Messages
Log Event Message Comments
User configuration of Flow Control on an interface can cause the following log events:
Flow control on X%d is enabled Flow control on X%d is disabled
User configuration of Rate Limiting on an interface can cause the following log events:
Ingress rate on X%d is limited to x kbps Ingress rate on X%d is not limited Egress rate on X%d is limited to x kbps Egress rate on X%d is not limited Ingress Rate limiting mode on X%d : Limit
All Ingress Rate limiting mode on X%d : Limit
Broadcast, Multicast and Flooded Unicast Ingress Rate limiting mode on X%d : Limit
Broadcast and Multicast Ingress Rate limiting mode on X%d : Limit
Only Broadcast
User configuration of QoS Priority or Rules on an interface can cause the following log events:
Default QoS Priority on X%d : x Desired QoS Rule on X%d : Trust CoS Desired QoS Rule on X%d : Trust DSCP Desired QoS Rule on X%d : Both CoS and
DSCP (Prefer DSCP) Desired QoS Rule on X%d : Both CoS and
DSCP (Prefer CoS)
The following message is generated when the hardware determines that both ends of an Ethernet link support flow control and flow control will take effect as needed. the link Xi (e.g X0, X1, X2):
Flow control on X%d is activated
Where x kbps is the number of kilobits
CoS is Class of Service, IEEE 802.1p
DSCP is Differentiated Services Code
Where %d is a decimal number in the interface name. For example, X%d could be X3, X22, etc.
Where %d is a decimal number in the interface name. For example, X%d could be X3, X22, etc.
per second for the limit.
Where x is the number for the priority level, with possible values of 0-7. See
Table 4 on page 28 for a mapping of
802.1p priority levels to the four priority queues supported by the SonicOS Switching f eature.
Point
Where X%d indicates the link interface, such as X3.
42
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 43

Filtering the Log for Switching Events

To display only the log events related to switching, perform the following steps:
Step 1 Navigate to the Log > View page in the SonicOS management interface. Step 2 In the Log View Settings section, select Advanced Switching from the Category drop-down list.
Troubleshooting and Verification
Step 3 Optionally select specific interfaces from the Source and/or Destination drop-down lists.
The fields for which you select values into are combined into a search string with a logical AND. For example, if you select an interface for Source and for Destination, the search string will look for log events matching:
Source interface AND Destination interface
Note Do not enter IP addresses for Source or Destination, as these are not used in the Layer 2
Advanced Switching log event messages.
Step 4 Select the Group Filters checkbox next to any two or more criteria to combine them with a logical OR. Step 5 For example, if yo u select interfaces for Source and Destination, and selec t Advanced Switching for
Category, and then select the Group Filters checkbox es next to Source and Destination, the search string will look for log event messages matching:
(Source interface OR Destination interface) AND Advanced Switching category
Step 6 Click Apply Filters to apply the filter immediately to the Log View table of event messages. Click Rese t
Filters to clear the filter and display the unfiltered results again.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
43
Page 44

Technical FAQ

Technical FAQ
How do I view the CAM table on the SonicWALL NSA 2400MX?
The SonicOS 5.7.0.0 user interface or CLI does not provide a way to display the CAM, or MAC Address, table directly, but provides the same information in the ARP table and on the Switching > L2 Discovery page.
A Content Addressable Memory (CAM) table is a dynamic, internal, purely Layer 2 mapping between switch ports and the MAC addresses that are bound to them. The CAM table information is also referred to as the MAC address table, switching cache, or forwarding data. The CAM table is used to quickly dereference MAC addresses to the switch ports where they are connected, allowing the speedy switching of traffic out the port to the destination. The CAM table is populated when the switch receives a data frame on one of its ports and updates the table with the frame's source MAC address and the port on which it was received.
In SonicOS 5.7.0.0, the information displayed on the the Switching > L2 Discovery page is derived from three sources:
MAC address table, internal to the switch (SonicWALL NSA 2400MX)
ARP table maintained by the gateway
Layer 2 Discovery Protocol exchanges
To illustrate the difference between the MAC address table and the ARP table, consider a situation where you have two computers that use static IP addresses and communicate with each other within the same VLAN. The traffic between them never reaches the IP layer (the traffic is never forwarded, always switched).
These machines will only show up in the MAC address table of the switch. The Switching > L2 Discovery page will display the MAC addresses and VLAN for these computers, but nothing else (assuming there is no discovery protocol agent running on these machines).
If the machines stop communicating for awhile, the switch ages out the MAC address table and the entries will be gone. If you refresh the Switching > L2 Discovery page, you will no longer see these entries.
On the other hand, if the machines connect to the Internet or to another VLAN, the traffic will be forwarded and the gateway ARP table is populated with entries for these computers . It is possible for entries to exist only in the gateway ARP table, but not in the switch MAC address table.
The Switching > L2 Discovery page consolidates entries from the MAC address table and the ARP table, and displays one entry per machine.
Many switches, such as the HP ProCurve, Dell PowerConnect, or Cisco switches, provide a command to display the CAM or MAC Address table. For example, the following output is from a Cisco switch running IOS:
Cisco_L3# show mac-address-table dynamic Mac Address Table
------------------------------------------ ­Vlan Mac Address Type Port s
---- ----------- -------- ---- ­ 1 0017.c52e.59ba DYNAMIC Fa0/ 3 1 0017.c52e.5aa4 DYNAMIC Fa0/ 4 1 0017.c53c.d425 DYNAMIC Po1 Total Mac Addresses for this criterion: 3 Cisco_L3#
The display shows two dynamic entries for SonicPoint-Ns, connected to switch ports 3 and 4 of the Cisco switch, and one entry for the LACP Link Aggregation Group, which is connected to a SonicWALL NSA 2400MX and is not blocked by RSTP.
44
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Page 45

Glossary

Glossary
BPDU Bridge Protocol Data Unit – Used in RSTP, BPDUs are special data frames used to
exchange information about bridge IDs and root path costs. BPDUs are exchanged every few seconds to allow switc hes to k eep track of network topology and start or stop port forwarding.
bridge A bridge is a data communications device that connects two Ethernet segments of a
network together. A bridge operates by forwarding packets according to the destination Ethernet, or MAC, address , rather than by IP address . Because a bridge uses Layer 2, the data link layer, all protocols can be handled. Switches operate like bridges, but provide more ports for LAN connectivity and offer features that reduce collisions and latency on the network.
CoS Class Of Service – Cos (IEEE 802.1p) defines eight different classes of service that are
indicated in a 3-bit user_priority field in an IEEE 802.1Q header added to an Ethernet frame when using tagged frames on an 802.1 network.
DSCP Differentiated Services Code Point – Also known as DiffServ, DSCP is a networking
architecture that defines a simple, coarse-grained, class-based mechanism for classifying and managing network traffic and providing Quality of Service (QoS) guarantees on IP networks. RFC 2475, published in 1998 by the IETF, defines DSCP. DSCP operates by marking an 8-bit field in the IP packet header.
IETF Internet Engineering Task Force – The IETF is an open stan dards organization th at
develops and promotes Internet standards.
L2 OSI Layer 2 (Ethernet) – Layer 2 of the seven layer OSI model is the Data Link Layer,
on which the Ethernet protocol runs. Layer 2 is used to transfer data among network entities.
LACP Link Aggregation Control Protocol – LACP is an IEEE specification that provides a way
to combine multiple physical ports tog ether to for m a single lo gical channel. LACP allows load balancing by the connected devices.
LLDP Link Layer Discovery Protocol (IEEE 802.1AB) – LLDP is a Layer 2 protocol used by
network devices to communicate their identity, capabilities, and interconnections. This information is stored in a MIB database on each host, which can be queried with SNMP to determine the network topology. The information includes system name, port name, VLAN name, IP address, system capabilities (switching, routing), MAC address, link agg regation, and more.
LLTD Link La yer T opology Discovery (Microsoft Standard) – LL TD is a Microsoft proprietary
protocol with functionality similar to LLDP. It operates on wired or wireless networks (Ethernet 802.3 or wireless 802.11). LLTD is included on Windows Vista and Windows 7, and can be installed on Windows XP.
PDU Protocol Data Unit – In the context of the Switching feature, the Layer 2 PDU is the
frame. It contains the link layer header followed by the packet.
RSTP Rapid Spanning Tree Protocol (IEEE 802.1D-2004) – RSTP was defined in 1998 as an
improvement to Spanning Tree Protocol. It provides faster spanning tree convergence after a topology change.
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
45
Page 46
Glossary
Solution Document Version History
Version Number Date Notes
1 3/30/2010 This document was created by Susan Weigand 2 5/19/2010 Added conceptual information, more details about
configuration, Troubleshooting and Technical FAQ sections. Embedded Por t Mir roring sc reencast tu torial.
3 6/29/2010 Replaced embedded Port Mirroring screencast tutorial
with final version. Added direct link to it as well.
46
SonicOS 5.7: Advanced Switching Feature Guide and Screencast Tutorial
Loading...