Page 16-1
16 Managing Groups and Ports
In a traditional hub-based network, a broadcast domain is confined to a single network interface,
such as Ethernet or Token Ring, or even a specific physical location, such as a department
or building floor. In a switch-based network, such as one comprised on OmniAccess
512es, a broadcast domain—or Group — can span multiple physical switches and can include
ports using multiple network interfaces. For example, a single OmniAccess 512 Group could
span three different switches located in different buildings and include Ethernet, Token Ring,
ATM and WAN physical ports.
An unconfigured OmniAccess 512 contains one Group, or broadcast domain. It also contains
one default Virtual Network, or VLAN , referred to as "default VLAN #1". The default Group,
Group #1, and its default VLAN contain all physical ports in the switch. When a switching
module is added to the switch all of these additional physical ports are also assigned to
Group #1, VLAN #1.
You can create Groups in addition to this default Group. When you add a new Group, you
give it a name and number, optionally configure a virtual router port for its default
VLAN , and then add switch ports to it. The switch ports you add to a new Group are moved from the
default Group #1 to this new Group. (For more information on how ports are assigned to
Groups, see How Ports Are Assigned to Groups on page 16-2.)
Up to 500 Groups can be configured on each OmniAccess 512. An entire OmniAccess 512
network can contain up to 65,535 Groups. Each Group is treated as a separate entity.
There are three main types of Groups:
1.
Mobile Groups. These groups allow ports to be dynamically assigned to the Group based
on AutoTracker polices. In contrast to non-mobile Groups, AutoTracker rules are assigned
directly to a mobile Group. No AutoTracker VLANs are contained within a mobile Group.
(However, mobile groups do contain a default VLAN 1 to which AutoTracker policies are
assigned; policies assigned to this default VLAN apply to the entire mobile group.) Any
AutoTracker policy may be used as criteria for membership in a mobile Group. Mobile
groups are described in more detail in
Mobile Groups
on page 16-5.
2.
Mobile Groups based on authentication. Authenticated Groups are a special form of
mobile Group. These Groups include devices that are dynamically assigned based on an
authentication criteria. Typically the user will have to log in with a valid password before
being included in an authenticated mobile Group. Group membership is based on users
proving their identity rather than the physical location of user devices. Authenticated
Groups are described in more detail in the
Switch Network Services User Manual
.
3.
Non-mobile Groups. These Groups are the original Group type used in previous releases.
They contain statically assigned ports and may contain AutoTracker or Multicast VLANs.
These VLANs within a non-mobile Group use AutoTracker policies to filter traffic.
AutoTracker rules are not assigned to non-mobile Groups, they are assigned to the VLANs
within the Group. Non-mobile groups are described in more detail in
Non-Mobile Groups
and AutoTracker VLANs
on page 16-15.
All three types of Groups may co-exist on the same switch. However, a switch port cannot
belong to a non-mobile group and a mobile group.
How Ports Are Assigned to Groups
Page 16-2
How Ports Are Assigned to Groups
There are two methods for assigning physical OmniAccess 512 ports to a Group. One method
is static and requires manual configuration by the network administrator; the other method is
dynamic and requires only the configuration of AutoTracker rules for port assignment to
occur. The two methods are described in this section.
Static Port Assignment
In the static method, the network administrator manually assigns a port to a Group through
the
crgp
and
addvp
commands. The static method can be restrictive because it limits the
mobility of users in a multi-Group network. Users can only move within their assigned
Group. In addition, customized access for individual users is limited by this method. You can
use the static method of port assignment with mobile and non-mobile groups. Static port
assignment can be combined with dynamic port assignment for mobile groups, while static
port assignment is the only method for assigning ports to non-mobile groups.
Dynamic Port Assignment (Group Mobility)
The dynamic method is available with the Group Mobility feature. Initially each port is part of
the default Group #1 (only ports in the default Group and ports in mobile Groups are candidates
for dynamic port assignment). Based on the nature of traffic and configured
AutoTracker policies, ports are dynamically assigned to the appropriate Group.
For example, if a device attached to a port transmits traffic from the 140.0.0.0 subnet,
AutoTracker will check to see if a policy exists for this IP address. If it does, then it will move
the port from the default Group to the first Group using this policy. If this device detaches
from the network the port will be re-assigned to a Group without intervention by the network
administrator.
A port can belong to multiple mobile groups (up to 16) as long as devices attached to that
port match policies of these mobile groups. However, an individual device, or MAC address,
can only belong to one mobile group per protocol.
The dynamic method of port-to-Group assignment still requires the creation of Groups
through the
crgp
command. The criteria for the dynamic assignment of ports to a Group are
determined by AutoTracker policies that you can configure during the
crgp
procedure.
Only Ethernet and Token Ring ports can be dynamically assigned to Groups.
If more than one Group has the same type of rule, then ports matching that policy will be
assigned to the first Group matching the policy. For example, if a device matched policies in
both Groups 2 and 5, the port would be assigned to Group 2. To make the most out of
Group Mobility it is best not to duplicate policies among Groups.
Configuring Dynamic Port Assignment
You can enable dynamic port assignment while creating a group through the
crgp
command.
During the
crgp
procedure, you will be prompted
Enable Group Mobility on the Group ? [y/n] (n):
Answer
Yes
to this question to give this Group the capability of having ports and devices
dynamically added to the Group. Port and devices will be dynamically assigned based on
AutoTracker rules you define.
Service Ports and Group Mobility
Dynamic port assignment (ports carrying Ethernet and Token Ring traffic only) to Groups can
also apply to LANE service ports configured for
ATM
access. These ports may be automatically
added to the mobile group during the
crgp
procedure or through the
cats
command.
How Ports Are Assigned to Groups
Page 16-3
How Dynamic Port Assignment Works
Initially each port is assigned to the default Group. In this example, all three ports have workstations
that belong to three different
IP
subnets (130.0.0.0, 138.0.0.0, and 140.0.0.0). All three
ports start out in the default Group.
Group Mobility examines traffic coming from OmniAccess 512 ports. Three mobile groups are
defined on the switch and each uses a different IP policy. Traffic that matches IP policies for a
Group will trigger the movement of the port to the matching Group.
Initial Configuration: All Ports in Default Group
As soon as the workstations start transmitting traffic, Group Mobility checks the source subnet
of the frames and looks for a match with any configured IP policies. If a match is found—and
in this example all three ports can be matched with a corresponding Group—the port is
moved to the matching Group.
Devices matching a policy trigger the assignment of a port to a mobile group. Therefore, the
device is moved to the mobile group at the same time as the port to which it is attached. If
more than one device comes in on a port, then that port can belong to more than one mobile
group. Similarly, if a device transmits more than one protocol—such as IP and IPX—then the
port to which it is attached can belong to more than one mobile group.
OmniAccess 512
12345678
123456
Port 2
Group 2
Group 1
Group 4
IP Network 130.0.0.0
Default Group
IP Network 140.0.0.0
Port 1
130.0.0.1 138.0.0.5 140.0.0.3
Group 3
IP Network 138.0.0.0
Port 3
How Ports Are Assigned to Groups
Page 16-4
As the illustration below shows, the three ports are each moved from the default Group to a
Group with a policy that matches the subnet address of the workstation attached to the port.
AutoTracker IP address policies have been set up in Groups 2, 3, and 4. The ports are moved
to the Group with policies matching the subnet of the workstation.
Ports Move to Groups With Matching Policies
OmniAccess 512
12345678
123456
Port 2
Group 2
Group 1
Group 4
IP Network 130.0.0.0
Default Group
IP Network 140.0.0.0
138.0.0.1 140.0.0.1
Group 3
IP Network 138.0.0.0
Port 3
130.0.0.1
Port 1
Mobile Groups
Page 16-5
Mobile Groups
Switch ports can be dynamically assigned to mobile groups through AutoTracker policies.
Support for dynamic port assignment is one of the main differences between mobile groups
and non-mobile groups. AutoTracker rules are assigned
directly
to a mobile group. In
contrast, AutoTracker rules are assigned to the VLANs
within
a non-mobile group. No
AutoTracker VLANs are contained within a mobile Group, and each mobile group constitutes
a single spanning tree.
A switch port can belong to multiple mobile groups, whereas a switch port can belong to
only one non-mobile group. However, a port can
not
belong to a mobile and a non-mobile
group at the same time.
Ports can be assigned to mobile groups either statically or dynamically. A port is
statically
assigned to a mobile group when one of the following occurs:
• Port by default assigned to default group 1
• Port assigned to a group through
crgp
or
addvp
commands
Although switch ports can belong to multiple mobile groups, it is not possible to assign a port
to two different groups using the
addvp
command. However, a switch port could be assigned
to one mobile group via the
addvp
command and then gain membership to another mobile
group by matching the policy criteria for that group.
A switch port is
dynamically
assigned to a mobile group after one of its attached devices
matches an AutoTracker policy for that mobile group. An overview of how ports and devices
are dynamically assigned to mobile Groups can be found in
How Ports Are Assigned to Groups
on page 16-2.
Authenticated Groups
Mobile groups provide the added flexibility of user-authentication policies. Using Authentication
Management Console (
AMC
) software, you can configure mobile groups to use log-in
procedures as a means of assigning group membership. Mobile groups that use authentication
are a special group type called an Authenticated Group. Authenticated Groups are
described in more detail in the
Switch Network Services User Manual
.
Configuring Mobile Groups
You configure mobile Groups through the
crgp
command. During the
crgp
procedure you
will receive a prompt asking if you want to create a mobile Group
Enable Group Mobility on this Group ? [y/n] (n):
You must answer
Yes
to this prompt to set up a mobile group. After this question, you will be
asked to configure virtual ports and AutoTracker policies for the Group. Documentation for
the full
crgp
procedure can be found in
Creating a New Group
on page 16-18.
Mobile Groups
Page 16-6
Turning Group Mobility On or Off
The
gmstat
command turns group mobility on or off for a Group that you specify. Essentially,
you can change a non-mobile group into a mobile group and a mobile group back into a
non-mobile group through
gmstat
. The group you specify must previously have been created
through the
crgp
command.
Use the following syntax for the gmstat command:
gmstat <group number>
For example, if you wanted to change the group mobility status of group 2, you would enter:
gmstat 2
Mobile Group to Non-Mobile Group
If this group is already a mobile group, the following would display:
Group Mobility is ON for Group 2
Change Group Mobility Status for Group 2 to OFF ? [y/n] (y):
If you wanted to change this mobile group back to a non-mobile group, you would press
<enter>
and the group would lose its mobile status. All AutoTracker policies you set up for
the Group would no longer be valid.
If you decided not to turn off group mobility, enter
n
and the following prompt displays:
Group Mobility Status unchanged
Non-Mobile Group to Mobile Group
If this group is currently a non-mobile group, the following would display:
Group Mobility is OFF for Group 8
Change Group Mobility Status for Group 8 to ON ? [y/n] (y):
If you wanted to turn on Group Mobility, you would press
<enter>
and would then be asked
if you want to configure AutoTracker policies. If you answer yes, then the AutoTracker policies
menu would display as follows:
Select rule type:
1. Port Rule
2. MAC Address Rule
21) MAC Address Range Rule
3. Protocol Rule
4. Network Address Rule
5. User Defined Rule
6. Binding Rule
7. DHCP PORT Rule
8. DHCP MAC Rule
81) DHCP MAC Range Rule
Enter rule type (1):
You define policies for a mobile Group. Non-mobile groups do not require policies.
However, mobile Groups use policies to define membership. Instructions for specifying
AutoTracker policies may be found in Chapter 17.
_
Note
_
As of the current release, the MAC Address Range Rule
and DHCP MAC Range are not supported for
AutoTracker VLANs
Mobile Groups
Page 16-7
If you decided not to turn group mobility on, you would enter
n
at the group mobility prompt
and the following message would display:
Group Mobility Status unchanged
Understanding Port Membership in Mobile Groups
Switch ports can belong to multiple mobile groups. A port becomes a member of a mobile
group as long as one of its attached devices matches the policy criteria for that group.
However, the movement of ports between groups and the status of port membership in
groups can be affected by more than just whether or not devices match policy criteria.
Group mobility uses three variables that can affect a port's default group and whether or not
a port ages out of a group. These variables are as follows: def_group, move_from_def, and
move_to_def. The def_group and move_to_def variables can be configured through the
gmcfg
command, which is described on page 16-12. The move_from_def variable is enabled by
default, but can be disabled by entering a statement in the
oa512.cmd
file. The effects of these
three variables are described through diagrams on the following pages.
From the perspective of a device or switch port, there are three types of mobile group—
default, primary, and secondary. Keep in mind that definitions of these three types are relative
and can change for each port and device depending on the settings of the group mobility
variables and traffic patterns of devices.
Default Group
The default group is the group a port or device is statically assigned to by "default." Typically,
a port's default group will be Group 1. A port can also be statically assigned to its
default group through the crgp or addvp commands. A port or device does not have to match
a policy to gain membership into its default group.
The default group for a port or device is stored in memory; it can only be manually changed
through the addvp or crgp commands. Depending on the settings of other group mobility variables
a device or port can age out of other mobile groups but still remain a member of its
default group.
Primary Group
The primary group is the group upon which Spanning Tree operations converge. The primary
group is similar to the default group. There are two main differences between a primary and
a default group.
1. A primary group only contains devices that have matched one of its AutoTracker policies.
In contrast, switch ports may end up in a default group without matching any policy.
2. It is possible for the primary group of a port or device to change through learning or
aging. For example, if the move_from_def variable is enabled and a device matches the
policies of a mobile group other than its default group, then this new mobile group
becomes the primary group for the device and the port to which the device is attached
(see diagram on page 16-10). In this case the default group and primary group will be
different.
If the move_from_def is disabled, the port always remains int he default group (which can
now also be the primary group).
In addition a port can age out of its primary group if the move_to_def variable is enabled
(see diagram on page 16-11). A port cannot age out of its default group.
Mobile Groups
Page 16-8
Secondary Group
Switch ports and devices may become members of multiple mobile groups. A switch port
starts in its default group, which initially is also it's primary group. The primary group may
change if the move_from_def variable is enabled. Any subsequent mobile groups to which a
port gains membership beyond the primary group are "secondary" mobile groups. A port can
age out of these secondary groups if the move_to_def variable is enabled (see diagram on
page 16-11).
Mobile Groups
Page 16-9
How a Device Is Dropped from the Default Mobile Group (def_group)
If def_group is enabled....
The device that does not
match any policies becomes a
member of the default group.
Default Group 1
Group 3
Why enable def_group?
• Ensure that all network devices will be a
member of at least one mobile group.
If def_group is disabled....
Default
All traffic from the device that
does not match any policies
is dropped. The device is not
a member of any mobile
group, including the default
mobile group.
Mobile Group 1
Secondary
Mobile Group 3
• Reduces traffic to and from devices that
do not satisfy any network policies.
Device sends traffic that is forwarded to the MPM for processing.
If the traffic matches the policies of an existing
mobile group, then it will become a member of that group.
If the device does not match the policies of any mobile
group, then the def_group variable determines whether
that device becomes a member of the default group.
Default Group 1
Group 3
Why disable move_from_def?
Mobile Groups
Page 16-10
How a Port's Primary Mobile Group Changes (move_from_def)
Default/Primary
Port assigned to default
group 1 or another group
through crgp or addvp.
Mobile Group 1
If move_from_def is enabled....
Device on port matches policy
in another mobile group
(3). Group 3 becomes primary
group.
Default Group 1
Primary Group 3
Helpful Hints:
• Reduces broadcasts to the default group.
• Best used when only one device is
attached to each port.
If move_from_def is disabled....
Default/Pri
Device on port matches policy
in another mobile group
(3). Group 1 remains primary
group. Group 3 is now a
"secondary" group for this
port.
Mobile Group 1
Secondary
Mobile Group 3
Why disable move_from_def?
• When multiple devices are attached to
the switch port, the port must support
multiple traffic in the default group as
well as traffic in the secondary mobile
groups.
Mobile Groups
Page 16-11
How a Port Ages Out of a Mobile Group (move_to_def)
If the port is in "optimized mode," then the MAC does not age out and the port would stay in
the mobile group even if move_to_def is enabled.
Default
Port assigned to default group.
Mobile Group
If move_to_def is enabled....
Why enable move_to_def?
• Security. Mobile groups only contain
devices and ports that have recently
matched policy criteria.
If move_to_def is disabled....
Why disable move_to_def?
• Switch ports retain group membership
even when idle for some time. May be
appropriate for silent devices, such as
printers.
Default
Port becomes a member of
other mobile groups when it
matches their policies. These
groups may be primary or
secondary groups.
Mobile Group
Primary
Group 2
Secondary
Group 3
Default
Port will be removed from
other groups when attached
devices age out of filtering
database.
Mobile Group
Primary
Group 2
Secondary
Group 3
Default
Port remains a member of all
mobile groups with which it
has satisfied a policy criteria
even if its devices age out of
the filtering database.
Mobile Group
Primary
Group 2
Secondary
Group 3
Mobile Groups
Page 16-12
Configuring Switch-Wide Group Mobility Variables
There are several switch-wide group mobility variables that you can configure through the
gmcfg command. These variables control the status of group mobility on all groups in a
switch as well as the use of the default group. These variables are illustrated through
diagrams on pages 16-9 to 16-11.
Follow these steps to use the gmcfg command:
1. Enter gmcfg. You do not need to specify a group number as this command applies to all
mobile groups in this switch.
2. The following prompt displays:
Group Mobility is Enabled. Disable Group Mobility ? [yes/no] (no) :
This prompt controls the status of group mobility in this switch. If you disable group
mobility here then mobile groups will not be supported in this switch even if they are
configured through the crgp command.
Default Group 1. When group mobility is enabled, default group 1 in the switch will be
treated as a mobile group and you will not be able to create AutoTracker VLANs within
this group. When group mobility is disabled, default Group 1 in the switch will be treated
as a non-mobile group in which AutoTracker VLANs could be created.
The default is to turn Group Mobility off. If you want to enable group mobility, then you
need to indicate that choice at this prompt. The prompt will always show the current
status of Group Mobility and then ask if you want to change that status. If you want to
change the current status, then enter a y at this prompt and press <enter>. To keep the
current status, simply press <enter>.
3. The following prompt displays:
move_to_def is set to Disabled. Set to Enable ? [yes/no] (no) :
The move_to_def variable determines what happens to a port once the devices on that
port age out of the filtering database. By default this variable is Disabled, which means
that a port will remain a member of a mobile group as long as its attached device satisfied
the criteria for membership in that mobile group at one point. If devices on a port
stop transmitting, the port will still retain all its mobile group memberships.
If the move_to_def variable is Enabled, then a port will lose its membership in a mobile
group if its devices age out of the filtering database for that mobile group (i.e., they stop
transmitting traffic that satisfies the criteria for membership in the mobile group). Once a
port loses membership in all criteria-based mobile groups, it will return to its default
group. The effect of this variable is illustrated on page 16-11.
By default, the move_to_def variable is Disabled. If you want to enable it (ports lose
mobile group membership when they age out), then you need to indicate that choice at
this prompt. The prompt will always show the current status of move_to_def and then ask
if you want to change that status. If you want to change the current status, then enter a y
at this prompt and press <enter>. To keep the current status, simply press <enter>.
4. The following prompt displays:
def_group is set to Enable. Set to Disable ? [yes/no] (no) :
The def_group variable determines what happens to devices that do not match any
mobile group policies. If def_group is Enabled (the default), then devices that do not
match any mobile group policies will be part of the default group for that port. If the
def_group variable is Disabled, then devices that do not match any mobile group policies
will be dropped from their default group and will not be part of any mobile group.
Mobile Groups
Page 16-13
By default the def_group variable is Enabled. If you want to disable it (devices that do not
meet criteria for mobile group membership will not be part of any mobile group), then
you need to indicate that choice at this prompt. The prompt will always show the current
status of def_group and then ask if you want to change that status. If you want to change
the current status, then enter a y at this prompt and press <enter>. To keep the current
status, simply press <enter>.
The move_from_def Variable
The move_from_def variable controls whether or not a port's primary group can differ
from the port's default mobile group. This variable is enabled by default, but can be
changed to disabled in the oa512.cmd file.
The original default group for a port is group 1 or the group to which the port is assigned
through the crgp or addvp commands. The primary group at this point is the same as the
default group. However, if the move_from_def variable is enabled, the primary group can
change as soon as a device on the port matches the policy criteria for another mobile
group.
For example, Port 5 may start out in Group 1, it's default group. The primary group in this
case will also be Group 1. If the move_from_def variable is enabled and Port 5 matches
AutoTracker polices for mobile group 3, then the new primary group for Port 5 will be
Group 3. All further Spanning Tree operations for the port will converge on group 3
rather than group 1. The effects of the move_from_def variable are further illustrated
though diagrams on page 16-10.
If you disable the move_from_def variable, then the primary group for a port will always
match the default group regardless of the number of other mobile groups to which it
gains membership. To disable the move_from_def variable, enter the following statement
in the oa512.cmd file
move_from_def=0
For this new setting to take place you need to reboot the switch.
Mobile Groups
Page 16-14
Viewing Ports in a Mobile Group
The vpl command lists all the Groups in the switch currently configured as mobile Groups
and the ports currently assigned to those Groups. Since ports are assigned to mobile groups
dynamically, this display is helpful to find out which ports the switch already sees in each
group. Ports will only display in this screen for secondary groups (i.e., not default or primary
groups). Enter vpl and a screen similar to the following displays:
================================================
Group ID Physical Port Virtual Port
================================================
Group ID: 2 4/2 4/3 4/4 4/5 12 13 14 15
Group ID: 3 3/1 5/2 8 20
Group ID: 6 NULL Port List
Group ID: 8 4/1 5/1 11 19
Group ID. The group number assigned to this mobile group during the crgp procedure.
Physical Port. The physical switch ports that have been dynamically assigned to this group
because they matched an AutoTracker policy. (Primary groups do not display in this screen.
For a display of port-to-primary group mappings, use the vi command) If this column reads
NULL Port List, then no physical ports have been assigned to the group yet.
Virtual Port. The virtual ports that are part of this mobile group. For Ethernet and Token Ring
switch ports, there is a one-to-one relationship between physical and virtual ports. For ATM
ports, multiple virtual ports may be associated with one physical port.
Viewing a Port's Mobile Group Affiliations
The vigl command lists all the ports in the switch that have been assigned to mobile Groups.
It is similar to the vpl command, but it lists ports first and then Groups. Since ports are
assigned to mobile groups dynamically, this display is helpful to find out which ports the
switch already sees in each group. Ports will only display in this screen for secondary groups
(i.e., not default or primary groups). Enter vigl and a screen similar to the following displays:
================================================
Virtual Port Physical Port Group ID
================================================
12 13 14 15 4/2 4/3 4/4 4/5 Group ID: 2
8 20 3/1 5/2 Group ID: 3
NULL Port List Group ID: 6
11 19 Physical Port Group ID
Virtual Port. The virtual ports in this mobile group. For Ethernet and Token Ring switch ports,
there is a one-to-one relationship between physical and virtual ports. For ATM ports, multiple
virtual ports may be associated with one physical port.
Physical Port. The physical switch ports that have been dynamically assigned to this secondary
mobile group because they matched an AutoTracker policy. (Primary groups do not
display in this screen. For a display of port-to-primary group mappings, use the vi command)
If this column reads NULL Port List, then no physical ports have been assigned to the group
yet.
Group ID. The group number assigned to this mobile group during the crgp procedure.
Non-Mobile Groups and AutoTracker VLANs
Page 16-15
Non-Mobile Groups and AutoTracker VLANs
Non-mobile Groups are comprised of physical entities—switch ports. Groups can span multiple
switches, but they are still made up of physical ports that you can see and touch. But just
as physically-based broadcast domains are limited, entirely port-based Groups can also be
limiting. In a large, flat, switched network, broadcast traffic can overload the network. There
needs to be a method for subdividing traffic even further. That's where virtual networks, or
VLANs, come into play.
VLANs are created within a Group to subdivide network traffic based on specific criteria. The
criteria you use to define a VLAN are called AutoTracker™ policies. AutoTracker policies can
be defined by port, MAC address, protocol, network address, a user-defined policy, or a multicast
policy. VLANs are described in more detail in Chapter 19, "Managing AutoTracker VLANs"
and Chapter 20, "Multicast VLANs."
Routing in a Non-Mobile Group
Communication within a Group containing only the default VLAN is switched; the ports are in
the same broadcast domain and do not require routing to communicate. Communication
between VLANs in the same Group or to VLANs in other Groups requires routing. That's why
all VLANs—including the default VLAN within each Group—may contain their own virtual
router port. A virtual router port for each VLAN can be configured to support IP and/or IPX
routing. If you do not configure a virtual router port for a VLAN, the devices in that VLAN will
not be able to communicate with devices in other VLANs unless there is an external router
between the VLANs.
Each OmniAccess 512 supports up to 32 virtual router ports. A single router port, using one
MAC address, can support IP routing, IPX routing, or both types of routing. When you enable
a router port for a default VLAN, you are actually creating a static route to that VLAN. Routing
is covered in more detail in Chapters 22 and 24.
_ Note _
For mobile, non-mobile groups and AutoTracker
VLANs, the router port operational status is not active
unless an active switch port is a member of the group
or VLAN.
Non-Mobile Groups and AutoTracker VLANs
Page 16-16
Spanning Tree and Non-Mobile Groups
Each Group uses one Spanning Tree for bridging. The OmniAccess 512 supports both 802.1d
and IBM Spanning Tree protocols. The Spanning Tree state for the port is Forwarding. Ports
that are in Blocked state, or in another non-Forwarding state, will not receive frames from the
router port. The figure below illustrates this concept.
Spanning Tree State and Routed Frames
OmniAccess 512
12345678
123456
Group 2
Ports 1 and 2
Server
Port 1: Forwarding
State
VLAN 1
(default VLAN #1)
Virtual Router
Workstation
Port 2: Blocked
State
VLAN 2
Routed frames not
received because attached
port is in Blocking state.
Routed frames received
because attached port
is in Forwarding state.
Group and Port Software Commands
Page 16-17
Group and Port Software Commands
Group and Virtual Port commands are part of the VLAN menu within the User Interface. Entering
vlan at any prompt displays the following menu:
Command VLAN Management Menu
gp View the list of Groups currently defined
crgp Create a Group
modvl Modify a VLANs configuration/availability
rmgp Remove a Group
addqgp Add 802.1q group/s to a port
delqgp Delete 802.1q group/s from a port
viqgp Display 802.1q groups on port/s
via View ports assigned to the selected Group
vi View info on a specific virtual port
vs View statistics on a virtual port attachment
ve View errors on a virtual port attachment
addvp Add ports to a GROUP
modvp Modify existing VPORT configuration information
rmvp Remove ports from a Group
pmapcr Create a Port Map
pmapdel Delete a Port Map
pmapmod Modify a Port Map
pmapv View Port Mapping Configuration
br Enter the Bridge Configuration/Parameter sub-menu
prty_mod Modify the priority of a group
prty_disp Display the priority of a group
at Enter the AutoTracker sub-menu
Main File Summary VLAN Networking
Interface Security System Services Help
The VLAN menu commands are divided into four sets of commands. The first set, at the top of
the menu beginning with gp, contains commands that create, modify, delete, and view
Groups. The second set of commands, beginning with addqgp are obsolete and no longer
control 802.1Q implimentation. (See Chapter 13 for information on 802.1Q.) The third set,
beginning with addvp, contains commands for adding, modifying, and deleting virtual ports.
All of these commands are described in this chapter.
The final set of commands at the bottom of the menu, br and at, are actually entry points to
the Bridging and AutoTracker submenus, respectively. Commands for the Bridge Management
(br) sub-menu are documented in Chapter 14, "Configuring Bridging Parameters."
Commands for the AutoTracker (at) sub-menu are documented in this chapter and in Chapter
19, "Managing AutoTracker VLANs" and Chapter 20, "Multicast VLANs." Some commands in
the at sub-menu apply to mobile groups and authenticated groups; those commands are
described in this chapter.
The pmapcr, pmapdel, pmapmod, and pmapv commands allow you to create port mapping
configurations. The port mapping feature is documented in Port Mapping on page 16-64. The
prty_mod and prty_disp commands allow you to modify and view the priority of a selected
group. These commands are detailed in Priority VLANs on page 16-71.
Creating a New Group
Page 16-18
Creating a New Group
There are several steps involved in creating a new Group. Note that some steps apply only to
mobile groups. These steps are as follows:
1. Enter Basic Group Information, such as the Group number and type. This section starts on
page 16-19.
2. Configure the Virtual Router Port (Optional). This section starts on page 16-20.
3. Enable/disable Group Mobility and User Authentication. This section starts on page 16-26.
4. Configure Virtual Ports. This section starts on page 16-27.
5. Configure AutoTracker policies (for mobile groups only). This section starts on page 16-
33.
WAN Routing Groups follow a slightly different procedure for their creation. You will receive
prompts during the procedure asking whether you want to create one of these special
Groups.
Creating a New Group
Page 16-19
Step 1. Entering Basic Group Information
a. Type crgp at any prompt.
b. The following prompt displays:
GROUP Number (5):
By default the Group number you entered or the next available Group number is
displayed in parentheses. Enter the Group number or accept the number shown in parentheses.
Each Group must have a unique number, which may range from 2 to 65,535.
(Group 1 is the default switch Group. It does not need to be created and it cannot be
deleted.) Press <Enter> after entering the Group number.
c. The following prompt displays:
Description (no quotes) :
Enter a descriptive name for the new Group. Group names can consist of up to 30 alphanumeric
characters. Press <Enter> after entering the Group name.
d. The following prompt displays:
Enable WAN Routing? (n):
If you want to perform WAN Routing through this Group you must enter a y at this
prompt. If you do not need to support WAN Routing, then answer n at this prompt and
continue with Step e.
_ Note _
You do not need to create a special WAN Routing
Group to bridge or trunk traffic over a WAN connection.
A WAN Routing Group is different from other Groups; it must contain only WAN ports. In
addition, the virtual router and virtual ports are configured differently. Please skip ahead
to Creating a WAN Routing Group on page 16-34 to continue setting up this WAN Routing
Group.
Creating a New Group
Page 16-20
Step 2. Configuring the Virtual Router Port (Optional)
You can now optionally configure the virtual router port that the default VLAN in this Group
will use to communicate with other VLANs. When you define a virtual router, a virtual router
port for the default VLAN in the Group is created. If you do not define a virtual router, no
virtual router port is created and the default VLAN in the new Group will be "firewalled,"
unable to communicate with other VLANs.
_ Important Note _
Use caution when setting up routing on the default
VLAN for a Group. In some configurations enabling
routing on the default VLAN may not be necessary or
desirable. You can always enable routing on other,
non-default VLANs, within this Group. Refer to
AutoTracker Application Example 4 in Chapter 21 for
more information.
You will have the choice of configuring IP, IPX, or both IP and IPX routing. Continue with the
steps below:
a. The following prompt displays:
Enable IP (y):
Press <Enter> if you want to enable IP Routing on this virtual router port. If you do not
enable IP, then the default VLAN in this Group will not be able to route IP data. If you
don't want to set up an IP router, enter n, press <Enter> and skip to Step j.
_ Note _
You may enable routing of both IP and IPX traffic on
this router port. If you set up dual-protocol routing, you
must fill out information for both IP and IPX parameters.
b. The following prompt displays:
IP Address:
Enter the IP address for this virtual router port in dotted decimal notation (e.g.,
198.206.181.10). This IP address is assigned to the virtual router port of the default VLAN
within this Group. After you enter the address, press <Enter>.
c. The following prompt displays:
IP Subnet Mask (0xffffff00):
The default IP subnet mask (in parentheses) is automatically derived from the default
VLAN IP address class. Press <Enter> to select the default subnet mask or enter a new
subnet mask in dotted decimal notation or hexadecimal notation and press <Enter>.
d. The following prompt displays:
IP Broadcast Address (198.200.10.255):
The default IP broadcast address (in parentheses) is automatically derived from the default
VLAN IP address class. Press <Enter> to select the default address or enter a new address in
dotted decimal notation and press <Enter>.
Creating a New Group
Page 16-21
e. The following prompt displays:
Description (30 chars max):
Enter a useful description for this virtual IP router port using alphanumeric characters. The
description may be up to 30 characters long. Press <Enter>.
f. The following prompt displays:
Disable routing? (n) :
Indicate whether you want to disable routing in the group. You can enable routing later
through the modvl command.
g. The following prompt displays:
IP RIP Mode {Deaf (d),
Silent (s),
Active (a),
Inactive (i)} (s):
Define the RIP mode in which the virtual router port will operate. RIP (Router Information
Protocol) is a network-layer protocol that enables the default VLAN in this Group to learn
and advertise routes. The RIP mode can be set to one of the following:
Silent. The default setting shown in parentheses. RIP is active and receives routing information
from other VLANs, but does not send out RIP updates. Other VLANs will not receive
routing information concerning the default VLAN in this Group and will not include the
VLAN in their routing tables. Simply press <Enter> to select Silent mode.
Deaf. RIP is active and sends routing information to other VLANs, but does not receive RIP
updates from other VLANs. The default VLAN in this Group will not receive routing information
from other VLANs and will not include other VLANs in its routing table. Enter d and
press <Enter> to select Deaf mode.
Active. RIP is active and both sends and receives RIP updates. The default VLAN in this
Group will receive routing information from other VLANs and will be included in the routing
tables of other VLANs. Enter a and press <Enter> to select Active mode.
Inactive. RIP is inactive and neither sends nor receives RIP updates. The default VLAN in
this Group will neither send nor receive routing information to/from other VLANs. Enter i
and press <Enter> to select Inactive mode.
h. If routing domains are not configured on the switch, go to the next step. If routing
domains are configured on the switch, the following prompt displays:
Apply to Routing Domain ID (none) :
Enter a routing domain in which this group should be included, or press Enter. A routing
domain is a grouping of IP router interfaces that can forward packets only within the
domain. Routing domains are part of Advanced Routing software and are not part of the
base code. For more information about routing domains, see Chapter 14, "Routing
Domains," in the Advanced Routing User Manual.
i. After you enter the RIP mode, or after you enter a routing domain ID, the following
prompt displays:
Default framing type [Ethernet II(e),
fddi (f),
token ring (t),
Ethernet 802.3 SNAP (8),
source route token ring(s)} (e):
Creating a New Group
Page 16-22
Select the default framing type for the frames that will be generated by this router port
and propagated over the default VLAN to the outbound ports. Set the framing type to the
encapsulation type that is most prevalent in the default VLAN. If the default VLAN contains
devices using encapsulation types other than those defined here, the switching modules
must translate those frames, which slows throughput. The figure on the next page illustrates
the Default Framing Type and its relation to Virtual Router Port communications.
Default Framing Type and the Virtual Router Port
j. You can now configure IPX routing on this port. The following message displays:
Enable IPX? (y) :
Press <Enter> if you want to enable IPX Routing on this virtual router port. If you do not
enable IPX, then the default VLAN in this Group will not be able to route IPX data. You
can set up a virtual router port to route both IP and IPX traffic.
If you don't want to set up an IPX router for the default VLAN in this Group, enter n, press
<Enter>, and skip ahead to step p below. You can always set up IPX routing for other
VLANs within this Group.
OmniAccess 512
12345678
123456
Group
Virtual Router Port
VLAN 1
(default VLAN #1)
Virtual Router
The Default Router
Framing Type determines
the type of
frame transmitted
through the Virtual
Router Port to the
default VLAN.
SNMP AGENT RIP
Workstation A Workstation B
Creating a New Group
Page 16-23
k. After selecting to enable IPX, the following prompt displays:
IPX Network:
Enter the IPX network address. IPX addresses consist of eight hex digits and you can enter
a minimum of one hex digit in this field. If you enter less than eight hex digits, the system
prefixes your entry with zeros to create eight digits.
l. The following prompt displays:
Description (30 chars max):
Enter a useful description for this virtual IPX router port using alphanumeric characters.
The description may be up to 30 characters long. Press <Enter>.
m. The following prompt displays:
IPX Delay in ticks (0):
Enter the number of ticks you want for the IPX network. A tick is about 1/18th of a
second. The default is 0.
n. The following prompt displays:
IPX RIP and SAP mode {RIP and SAP active (a)
RIP only active (r)
RIP and SAP inactive (i)} (a):
Select how you want the IPX protocols, RIP (router information protocol) and SAP (service
access protocol), to be configured for the default VLAN in this Group. RIP is a networklayer
protocol that enables this VLAN to learn routes. SAP is also a network-layer protocol
that allows network services, such as print and files services, to advertise themselves. The
choices are:
RIP and SAP active. The default setting. The default VLAN to which this IPX router port is
attached participates in both RIP and SAP updates. RIP and SAP updates are sent and
received through this router port. Simply press <Enter> to select RIP and SAP active.
RIP only active. The default VLAN to which this IPX router port is attached participates in
RIP updates only. RIP updates are sent and received through this router port. Enter an r
and press <Enter> to select RIP only active.
RIP and SAP inactive. The IPX router port is active, but the default VLAN to which it is
attached does not participate in either RIP nor SAP updates. Enter an i and press <Enter> to
select RIP and SAP inactive.
Creating a New Group
Page 16-24
o. After selecting the RIP and SAP configuration, the following prompt displays the default
router framing type options:
Default router framing type for : {
Ethernet Media:
Ethernet II (0),
Ethernet 802.3 LLC (1),
Ethernet 802.3 SNAP (2),
Novell Ethernet 802.3 raw (3),
Select the default framing type for the frames that will be generated by this router port
and propagated over the default VLAN to the outbound ports. Set the framing type to the
encapsulation type that is most prevalent in the default VLAN. If the default VLAN contains
devices using encapsulation types other than those defined here, the switching modules
must translate those frames, which slows throughput. See the figure, Default Framing
Type and the Virtual Router Port on page 16-22 for an illustration of the Default Framing
Type and its relation to Virtual Router Port communications.
_ Note _
The .cmd file contains a command called hreXnative
that by default is set to 1. If physical ports in an end
station are using a different encapsulation than the
virtual router ports (for example, the modvl command
shows router ports set to Ethernet II IPX, but the swch
command shows that physical ports are using SNAP)
then the hreXnative command must be set to 0. See
Chapter 6, "Switch Wide Parameters," for more information
about the .cmd file.
p. If you chose a Source Routing frame format in the last step (options 5, 7, 9, or b), an additional
prompt displays:
Default source routing broadcast type : {
ARE broadcasts(a), STE broadcasts(s)} (a) :
Select how broadcasts will be handled for Source Routing. The choices are:
ARE broadcasts. All Routes Explorer, the default setting. Broadcasts are transmitted over
every possible path on inter-connected source-routed rings. This setting maximizes the
generality of the broadcast. Simply press <Enter> to select All Routes Explorer.
STE broadcasts. Spanning Tree Explorer. Broadcasts are transmitted only over Spanning
Tree paths on inter-connected source-routed rings. This setting maximizes the efficiency
of the broadcast. Enter an s and press <Enter> to select Spanning Tree Explorer.
Creating a New Group
Page 16-25
q. The following prompt displays:
Enter a priority level (0...7)(0):
Prioritizing VLANs allows to you set a value for traffic based on the destination VLAN of
packets. Traffic with the higher priority destination will be delivered first. VLAN priority
can be set from 0 to 7, with 7 being the level with the most priority.
Modifying and displaying a group's priority is described in Priority VLANs on page 16-71.
You have now completed the configuration of the virtual router port for this group. At
this point, you will be asked whether you want to enable group mobility. The following
prompt will display:
Enable Group Mobility on the Group ? [y/n] (n):
Mobile groups are discussed in detail in Mobile Groups on page 16-5. If you want to
enable group mobility answer Y to this prompt, press <enter>, and go on to Step 3. Set Up
Group Mobility and User Authentication on page 16-26.
If you do not want to configure group mobility answer N at the prompt, press <enter>,
and go on to Step 4. Configuring Virtual Ports on page 16-27 for further instructions.
Creating a New Group
Page 16-26
Step 3. Set Up Group Mobility and User Authentication
A mobile group offers more flexibility than a non-mobile group. With a mobile group, ports
are assigned dynamically to the group based on AutoTracker policies that you configure. In a
non-mobile group, ports are statically defined and AutoTracker policies are assigned to individual
VLANs within the Group. In most cases, you will want to set up a mobile group. The
following steps show you how.
a. After configuring the virtual router port, you will receive the following prompt:
Enable Group Mobility on the Group ? [y/n] (n):
To create a mobile group, enter a Y as this prompt, press <enter>, and continue with step
b. If you want to configure a non-mobile Group, enter N, press <enter>, and you will see
the following prompt:
This Group will not participate in Group Mobility
If you are not creating a mobile group, go on to Step 4. Configuring Virtual Ports on page
16-27.
b. The following prompt displays:
Enable User Authentication on the Group ? [y/n] (n):
An authenticated group is a special type of mobile group. It uses an authentication
process as it criteria for group membership. Typically, users will be prompted for an id
and password before gaining membership to an authenticated group. Authenticated
groups require additional Windows NT server software. More detailed information on
these groups can be found in the Switch Network Services User Manual. If you are not sure
whether this is an authenticated group, simply press <enter> at this prompt.
c. The following prompt displays:
Enable spanning tree for this group [y/n] (y):
Spanning Tree prevents broadcast storms by limiting logical loops in the network. For
more information on Spanning Tree, see Chapter 14, titled "Configuring Bridging Parameters."
If you wish to enable Spanning Tree, enter y and press <enter>. Otherwise, enter n.
d. The following prompt displays:
Do you wish to configure the interface group for this Virtual LAN at this time? (y)
You can assign physical ports to the new Group at this time. To begin assigning ports to
the new Group, press <Enter> and go to Step 4.
To assign ports to the Group later, type n and <Enter>. The new Group is configured but
does not yet contain any ports. You can use the addvp command later to assign ports to
the Group (see Adding Virtual Ports on page 16-43). A message similar to the following
displays confirming the creation of the new Group.
GROUP 6 has been added to the system.
You may add interfaces to this group using the addvp command at a later date.
For now, the GROUP is inactive until you add interfaces.
Creating a New Group
Page 16-27
Step 4. Configuring Virtual Ports
You can now enter configuration parameters for each switch port to be included in this
Group. These configuration parameters include the bridging mode, output format type, and
administrative state. In addition, if the port you are configuring is Ethernet (10/100 Mbps) or
Token Ring, you can also configure port mirroring.
Prompts for configuring virtual ports follow directly after Group Mobility prompts. You can
choose to add ports now or add them later through the addvp command. Follow these steps:
a. After you have stepped through the Routing and/or Group Mobility prompts, the following
message displays:
Do you wish to configure the interface group for this Virtual LAN at this time? (y)
You can assign physical ports to the new Group at this time. To begin assigning ports to
the new Group, press <Enter> and go to Step b.
To assign ports to the Group later, type n and <Enter>. The new Group is configured but
does not yet contain any ports. You can use the addvp command later to assign ports to
the Group (see Adding Virtual Ports on page 16-43). A message similar to the following
displays confirming the creation of the new Group.
GROUP 6 has been added to the system.
You may add interfaces to this group using the addvp command at a later date.
For now, the GROUP is inactive until you add interfaces.
b. After indicating that you want to set up ports, the following prompt displays:
Initial Vports (Slot/Phys Intf. Range) - For example, first I/O Module
(slot 2), second interface would be 2/2. Specify a range of interfaces
and/or a list as in: 2/1-3, 3/3, 3/5, 4/6-8
Enter the port or ports that you want to include in this new Group. The notation for
adding a port to a group is
<slot number of module>/<port number on the module>
Omni-9 slots are numbered 1-9, left to right. Port numbers are labelled on the front panel
of switching modules.
You may enter multiple ports from multiple switching modules. For example, to add ports
1 through 3 on the module in slot 2, specify 2/1-3. To additionally add the third and fifth
port on the module in the third slot, specify 3/3, 3/5. The complete slot port specification
would be:
2/1-3, 3/3, 3/5
c. If you enter a port that is already assigned to another Group, then you will be prompted
on whether or not you want to change its assignment. A message similar to the following
displays for each port that you enter:
Initial Slot/Interface Assignments: 2/8
2/8 - This interface has already been assigned to GROUP 1 -
(Default GROUP #1).
Do you wish to remove it from that GROUP and assign it (with
new configuration values) to this GROUP (n)?
Simply enter a y at each port prompt to change its Group assignment and begin setting
port parameters. You could also enter a c at this prompt to accept all default port parameters
and skip port configuration prompts. If you enter a c, all remaining ports are automatically
added to the Group with default settings, and your work is complete.
Creating a New Group
Page 16-28
d. The virtual port configuration menu displays:
Modify Ether/8 Vport 2/8 Configuration
1) Vport : 9
2) Description :
3) Bridge Mode : Auto-Switched
31) Switch Timer : 60
4) Flood Limit : 192000
5) Output Format Type : Default (IP-Eth II, IPX-802.3)
6) Ethernet 802.2 Pass Through : Yes
7) Admin, Operational Status : Enabled, inactive
8) Mirrored Port Status : Disabled, available
9) MAC address : 000000:000000
Command {Item=Value/?/Help/Quit/Redraw/Next/Previous/Save} (Redraw) :
Descriptions for each of the fields in this display follow. To change any default value,
enter the line number for item, an equal sign (=), and then the value for the parameter.
Enter save to save all configured settings and move onto the next step in the group
creation process.
1) Vport
The virtual port number for this port. The next virtual port number available in the switch
is shown by default in this field.
2) Description
Enter a useful description for this virtual port using alphanumeric characters. The description
may be up to 30 characters long.
3) Bridge Mode
Select the bridge mode used by this port. The choices are:
Spanning Tree Bridge. The default setting for all non-Ethernet ports. This mode is appropriate
for backbone and hub connections. The port acts as a standard 802.1d bridge port. It
forwards BPDU frames out the port. When frames are received, Spanning Tree BPDUs are
processed, and Spanning Tree dynamically controls the forwarding state. If flooding
occurs, all frames destined for unknown MAC addresses, broadcast addresses, or multicast
addresses will be sent to all ports in the same Group. Enter 3=b and press <Enter> to
select Spanning Tree Bridge mode.
Optimized Device Switching. This mode is appropriate for dedicated connections to a single
workstation or server. Spanning Tree is turned off. No Spanning Tree BPDUs will be sent
and the port will always be in the forwarding state. The port will stay in this mode even if
a Spanning Tree BPDU is detected. In addition, all MACs learned will not be aged out
(regardless of the Bridge Aging Timer setting) until the port is disconnected or configured
to be administratively down. No flooding of packets with an unknown destination address
is allowed after at least one MAC address has been learned. (An exception to this rule
occurs on newer Mammoth-generation Ethernet modules, such as the ESM-100C-12, ESM-
100F-8, and ESM-C-32. When these ports are in optimized mode, packets with unknown
destination addresses will be flooded.) Packets with a broadcast or multicast destination
will always be allowed. Enter 3=o and press <Enter> to select Optimized Device Switching
mode.
Creating a New Group
Page 16-29
Auto-Switch. The default setting for all Ethernet ports. This mode is appropriate for dedicated
connections requiring a switch-over to bridge mode when multiple devices are
detected. A port in Auto-Switch mode will start in Optimized Device Switching mode (see
description above). The port will remain in Optimized Device Switching mode until a
Spanning Tree BPDU is detected or more than one MAC address transmits data. Once
either of these conditions is met, the port will switch to Spanning Tree Bridge mode and
Spanning Tree will start (if configured in the switch).
An Auto-Switch port will remain in Spanning Tree Bridge mode as long as there are
BPDUs and multiple MACs. However, the port can revert back to Optimized Device
Switching Mode if the time specified in the next field (Switch Timer) transpires without
BPDUs and multiple MACs. Also, if the port is disconnected or configured to be administratively
down, then an Auto-Switch port will revert back to Optimized Device Switching
mode when it becomes operational again. Enter 3=a and press <Enter> to select Auto-
Switch mode.
How Auto-Switch Bridge Mode Works
31) Switch Timer
If you selected the Auto-Switch bridge mode, then you can configure this field. Enter the
time-out period, in seconds, for an Auto-Switch port that has turned to Spanning Tree
Bridge mode port to revert back to Optimized Switching mode. When in Auto-Switch
mode, a port switches to Spanning Tree Bridge mode as soon as it detects a BPDU or
more than one MAC address. The port will switch back to Optimized Switching mode after
the time-out value you define here.
Optimized
Device
Switching
Mode
Greater
Than 1
MAC?
No
BPDUs
Detected?
No
Yes
Spanning
Tree
Bridge
Mode
Yes
Switch
Timer Period
Elapsed?
BPDU
Detected?
Only 1
MAC Address
Detected?
No
Yes No
Yes
No
Yes
Creating a New Group
Page 16-30
4) Flood Limit
The flood limit allows you to tune a virtual port to limit the flooding of broadcast, multicast,
and unknown destination packets. This feature is useful for controlling broadcast
storms on your network. While each network is different, in general the amount of
flooded traffic represents a relatively small percentage of network traffic.
The flood limit is actually a "transmit credit" that is issued every five (5) seconds. When a
packet is flooded on this port, the size of the packet, in bytes, is decremented from the
current credit value. The credit value is the value you enter in this field multiplied by five.
An additional credit, in the amount of the value you enter here multiplied by five, is allocated
to each virtual port every five (5) seconds. If the credit value ever falls below zero,
then all flooded packets are discarded until another credit is allocated. Flood limit checking
is disabled if you enter a flood limit of zero (0). The flood limit default is 192,000
bytes per second, which equates to a transmit credit of 960,000 bytes every five seconds.
5) Output Format Type
The options will be different for Ethernet, Token Ring, and FDDI ports.
The output format setting determines the kind of frame that will be sent out this physical
port. If translation is necessary, then incoming frames will be translated to this format
before being sent out this port. For example, on an Ethernet port incoming FDDI frames
need to be translated to Ethernet. However, there are four types of Ethernet frames—
Ethernet II, IPX 802.3, SNAP, and LLC. The format type you select here would determine
the frame format to which non-Ethernet frames would be translated. The following figure
illustrates how a port's framing type affects communication with attached devices.
_ Note _
This parameter differs from the router framing type
selected during the configuration of the virtual router
port. The router framing type is the encapsulation done
on a router port, whereas this output format type
applies only to translations on this virtual port.
Creating a New Group
Page 16-31
Output Framing Type on Physical Ports
Note that for Ethernet, the default output format option is Ethernet II for IP frames and
802.3 for IPX frames. On Token-Ring and FDDI, only SNAP and LLC are available as output
format choices; FDDI ports may be configured to output 802.3 frames (i.e., "FDDI raw"),
but that must be configured through the Switch menu.
You can customize your frame translation settings even further through the Switch menu.
The Switch menu allows you to set translations at the frame format level (i.e., incoming
SNAP frames could be translated one way, while incoming LLC frames could be translated
another way) based on protocol type (IP or IPX). The Switch menu is explained in Chapter
15, "Configuring LAN Switch Translations."
6) Ethernet 802.2 Pass Through
For Ethernet ports only. If you answer Yes to this prompt, then frames received in the
IEEE 802.2 format will not be translated according the Output Format Type chosen in line
5; they will be sent as is in their native IEEE 802.2 format. If you answer No, then 802.2
frames will be subject to the Output Format Type chosen in line 5.
OmniAccess 512
12345678
123456
Group 2
Ports 1 and 2
Server
Receives frames in
Ethernet II format.
Ethernet Port 1:
Format set to
Ethernet II
VLAN 1
(default VLAN #1)
Virtual Router
Workstation
Receives frames in SNAP
format.
Ethernet Port 2:
Format set to
SNAP
The Output Format Type
you set for each port determines
the type of frames
that devices attached to
that port receive.
Creating a New Group
Page 16-32
7) Admin, Operational Status
Select whether to administratively enable or disable this port. When you enable the port,
the port can transmit and receive data as long as a cable is connected and no physical or
operational problems exist. When you disable a port, the port will not transmit or receive
data even if a cable is connected and the physical connection is operational. If you
disable the port at this point, you can enable it later through the modvp command (see
Modifying a Virtual Port on page 16-44).
8) Mirrored Port Status
If the port you are configuring is Ethernet (10 or 10/100 Mbps) or Token Ring, you can set
up port mirroring. You can mirror traffic on this port to another like port. Port mirroring is
a useful feature for monitoring traffic on particular ports. It is discussed in more detail
later in this chapter in Port Mirroring on page 16-55.
If you want to mirror this port, enter a 8=e, press <Enter> and you will be prompted for
the slot and port number of the "mirroring" port (i.e., the port that can "see" all traffic for
this port):
Mirroring vport slot/port ? ( ) :
Enter the mirroring port's slot and port number and press <Enter>.
If port mirroring is not supported on this port, then the following prompt will display:
mirroring not supported on this port type
9) MAC address
Enter the MAC address for this virtual port if it is known.
After the MAC address prompt, the switch confirms the addition of the port to the group
with a message similar to the following:
Adding port 2/8 to Group 6. . .
Make configuration changes to the port until you are satisfied. If you have completed the
final virtual port, then your work is complete. You can always alter Group parameters
(including virtual router parameters for the default VLAN) later through the modvl
command (see Modifying a Group or VLAN on page 16-39) and modify virtual port parameters
through the modvp command (see Modifying a Virtual Port on page 16-44).
Creating a New Group
Page 16-33
Step 5. Configuring AutoTracker Policies (Mobile Groups Only)
When you have completed configuring mobile group and auto-activated LANE services, you
can begin configuring AutoTracker policies for this mobile group. Instructions for configuring
these rules can be found in Chapter 17, "Configuring Group and VLAN Policies." Please refer
to that chapter for instructions on configuring each policy type. After you configure
AutoTracker policies, you are done configuring this mobile group and a prompt similar to the
following displays:
VLAN 9: 1 created successfully
You can configure rules for this group later through the modatvl command. This command
also works with mobile groups as long as you indicate you want to alter VLAN 1 in the
mobile group (i.e., the command line would read modatvl 3:1 to modify mobile group 3).
_ Note _
If the mobile group is initially created without rules, the
modatvl command cannot be used to add them later.
You must turn off group mobility and then reinstate it
to add the rules.
Creating a WAN Routing Group
Page 16-34
Creating a WAN Routing Group
After entering basic Group information as described in Step 1. Entering Basic Group Information
on page 16-19, you should have answered Yes to the following prompt:
Enable WAN Routing? (n):
if you want to enable WAN Routing. WAN Routing Groups are treated differently than other
Groups, as described earlier. The following steps complete the configuration of the WAN
Routing Group.
a. After answering y to the Enable WAN Routing? prompt, the following prompt displays:
Enable IP (y):
Press <Enter> if you want to enable IP Routing on the virtual router port for this Group. If
you do not enable IP, then this WAN Group will not be able to route IP data. If you don't
want to set up IP routing, enter n, press <Enter> and skip to Step g.
_ Note _
You may enable routing of both IP and IPX traffic over
a WAN connection. If you set up dual-protocol routing,
you must fill out information for both IP and IPX
parameters.
b. The following prompt displays:
IP Address:
Enter the IP address for this virtual router port in dotted decimal notation or hexadecimal
notation (e.g., 198.206.181.10). This IP address is assigned to the virtual router port of the
default VLAN within this Group. After you enter the address, press <Enter>.
c. The following prompt displays:
IP Subnet Mask (0xffffff00):
The default IP subnet mask (in parentheses) is automatically derived from the default
VLAN IP address class. Press <Enter> to select the default subnet mask or enter a new
subnet mask in dotted decimal notation or hexadecimal notation and press <Enter>.
d. The following prompt displays:
IP Broadcast Address (198.200.10.255):
The default IP broadcast address (in parentheses) is automatically derived from the default
VLAN IP address class. Press <Enter> to select the default IP broadcast address or enter a
new broadcast address in dotted decimal notation or hexadecimal notation and press
<Enter>.
e. The following prompt displays:
Description (30 chars max):
Enter a useful description for this virtual IP router port using alphanumeric characters. The
description may be up to 30 characters long. Press <Enter>.
Creating a WAN Routing Group
Page 16-35
f. The following prompt displays:
IP RIP Mode {Deaf (d),
Silent (s),
Active (a),
Inactive (i)} (s):
Define the RIP mode in which the virtual router port will operate. RIP (Router Information
Protocol) is a network-layer protocol that enables the default VLAN in this Group to learn
and advertise routes. The RIP mode can be set to one of the following:
Silent. The default setting shown in parentheses. RIP is active and receives routing information
from other VLANs, but does not send out RIP updates. Other VLANs will not receive
routing information concerning the default VLAN in this Group and will not include the
VLAN in their routing tables. Simply press <Enter> to select Silent mode.
Deaf. RIP is active and sends routing information to other VLANs, but does not receive RIP
updates from other VLANs. The default VLAN in this Group will not receive routing information
from other VLANs and will not include other VLANs in its routing table. Enter d and
press <Enter> to select Deaf mode.
Active. RIP is active and both sends and receives RIP updates. The default VLAN in this
Group will receive routing information from other VLANs and will be included in the routing
tables of other VLANs. Enter a and press <Enter> to select Active mode.
Inactive. RIP is inactive and neither sends nor receives RIP updates. The default VLAN in
this Group will neither send nor receive routing information to/from other VLANs. Enter i
and press <Enter> to select Inactive mode.
g. You can now configure IPX routing on this port. The following message displays:
Enable IPX? (y) :
Press <Enter> if you want to enable IPX Routing on this virtual router port. If you do not
enable IPX, then the default VLAN in this WAN Group will not be able to route IPX data.
You can set up a virtual router port to route both IP and IPX traffic.
If you don't want to enable IPX routing for the default VLAN in this Group, enter n and
press <Enter>. You can always set up IPX routing for other VLANs within this Group.
You are done configuring this WAN Routing Group. See the appropriate WAN interface
chapter for further information on configuring this Routing service.
h. After selecting to enable IPX, the following prompt displays:
IPX Network:
Enter the IPX network address. IPX addresses consist of eight hex digits and you can enter
a minimum of one hex digits in this field. If you enter less than eight hex digits, the
system prefixes your entry with zeros to create eight digits.
i. The following prompt displays:
Description (30 chars max):
Enter a useful description for this virtual IPX router port using alphanumeric characters.
The description may be up to 30 characters long. Press <Enter>.
j. The following prompt displays:
IPX Delay in ticks (0):
Enter the number of ticks you want for the IPX network. A tick is about 1/18th of a
second. The default is 0.
Creating a WAN Routing Group
Page 16-36
k. After entering a description, the following prompt displays:
IPX RIP and SAP mode {RIP and SAP active (a)
RIP only active (r)
RIP and SAP inactive (i)}
RIP and SAP triggered (t)} (a):
Select how you want the IPX protocols, RIP (router internet protocol) and SAP (service
access protocol), to be configured for the default VLAN in this Group. RIP is a networklayer
protocol that enables this VLAN to learn routes. SAP is also a network-layer protocol
that allows network services, such as print and files services, to advertise themselves. The
choices are:
RIP and SAP active. The default setting. The default VLAN to which this IPX router port is
attached participates in both RIP and SAP updates. RIP and SAP updates are sent and
received through this router port. Simply press <Enter> to select RIP and SAP active.
RIP only active. The default VLAN to which this IPX router port is attached participates in
RIP updates only. RIP updates are sent and received through this router port. Enter an r
and press <Enter> to select RIP only active.
RIP and SAP inactive. The IPX router port is active, but the default VLAN to which it is
attached does not participate in either RIP nor SAP updates. Enter an i and press <Enter> to
select RIP and SAP inactive.
RIP and SAP triggered. The IPX router port is active, but RIP and SAP information will be
sent out on the port only when a network change has occurred. This option is more cost
effective for WAN links and is best suited for smaller network environments that don't
change often. Enter a t and press <Enter> to select RIP and SAP triggered.
When you are done entering Router parameters, a message similar to the following
displays:
GROUP 5 has been added to the system
You should now follow the instructions for configuring a WAN Routing Service described
in the appropriate WAN interface chapter.
Viewing Current Groups
Page 16-37
Viewing Current Groups
The gp command provides information on all currently defined Groups in a switch including
Group number, network address, protocol type, and encapsulation type. You can obtain
information on all groups in a switch by entering:
gp
A screen similar to the following displays:
Group Network Address Proto/
ID Group Description (IP Subnet Mask) Encaps
(:VLAN ID) or (IPX Node Addr)
===== =========================== =============== ========
1 Default GROUP (#1) 198.206.182.115 IP /
(ff.ff.ff.00) ETH2
2 New GROUP (#2) 198.206.101.12 IP /
(ff.ff.ff.00) SNAP
3 New GROUP (#3) 198.206.181.10 IP/
(ff.ff.ff.00) 1490
4 New Group (#4) 198.206.183.44 IP /
(ff.ff.ff.00) ETH2
12314526 IPX /
(0020da:020484) 8023
5 New GROUP 198.206.143.11 CIP /
(ff.ff.ff.00) 1483
You can also get information on a specific Group by entering gp followed by the Group
number. For example,
gp 3
displays information just on Group 3:
Group Network Address Proto/
ID Group Description (IP Subnet Mask) Encaps
(:VLAN ID) or (IPX Node Addr)
===== =========================== =============== ========
3 New GROUP (#3) 198.206.181.10 IP /
(ff.ff.ff.00) 1490
The following sections describe the columns in this table:
Group ID (:VLAN ID). The identification number assigned to this Group when it was created
through the crgp command. The Group identifier is typically consistent network-wide (i.e.,
Group 3 in this switch should be the same Group as Group 3 configured in all other Omni-
Access 512es in the network). If this Group contains any VLANs, then they will be listed
below the Group number. If the default VLAN in the Group supports both IP and IPX routing,
then information on both (network address, etc) will display. Group 4 in the screen
sample above shows a case where both IP and IPX routing are supported.
Group Description. The textual description of this Group that was entered when the Group was
created or modified. This description is limited to 30 characters.
Network Address (IP Subnet Mask) or (IPX Node Addr). For each virtual router port configured,
two addresses are listed. Both of these addresses were configured when the Group was
created or modified through crgp or modvl. The first address is the Network Address, which is
the address of the virtual router port for the default VLAN (VLAN #1) in this Group. For an IP
virtual router port, this address is the IP address, which is shown in dotted decimal format.
For an IPX virtual router port, this address is the IPX network address, which is shown as
eight hex characters.
Viewing Current Groups
Page 16-38
A second address is displayed below the Network address. For IP, this address is the IP
Subnet Mask, which is normally derived from the default VLAN IP address class. For IPX, this
address is the IPX Node Address.
Proto/Encaps. For each Group or VLAN listed, the top field is the Protocol supported by this
virtual router port. Possible values in the field are: IP (IP router), IPX (IPX router), and CIP
(Classical IP Group with CIP router). If you configured an IP and an IPX router port, then two
router entries will be listed—one with a Protocol of IP and the other with a Protocol of IPX.
The bottom field is the encapsulation used for outgoing frames on the router port. This
encapsulation was configured when the router port was configured. Possible values for this
field depend on the Protocol and type of Group.
Frame Relay WAN Groups will always display 1490 to indicate RFC 1490 encapsulation is
performed on frames. ATM Classical IP (CIP) Groups will display 1483 to indicate RFC 1483
encapsulation is performed on frames.
IP and IPX routers have additional possible encapsulation types. For IP virtual router ports,
the possible encapsulation types are as follows:
• ETH2 Ethernet II
• SNAP Ethernet 802.3 SNAP
For IPX virtual router ports, the possible encapsulation types are as follows:
• ETH2 Ethernet II
• LLC Ethernet 802.3 LLC
• SNAP Ethernet 802.3 SNAP
• 8023 Ethernet 802.3 (Novell raw)
Modifying a Group or VLAN
Page 16-39
Modifying a Group or VLAN
After creating a Group (through crgp) or VLAN (through cratvl, see Chapters 16 and 18), you
can change any of their parameters through the modvl command. In addition, if you did not
set up a virtual router port (IP or IPX) during the initial Group or VLAN configuration, you can
set one up with modvl. To use this command, enter modvl followed by the Group number and
VLAN number to change. For example, to modify parameters in Group 2, VLAN 1, enter:
modvl 2
Note that you do not need to specify a VLAN number to modify the default VLAN within a
Group. To modify parameters in Group 2, VLAN 2, you would enter:
modvl 2:2
A screen similar to the following displays.
Current values associated with GROUP 2.1 are as follows:
1) GROUP Number - 2:1
2) Description - New GROUP (#2)
IP Parameters:
3) IP enabled - Y
4) IP Network Address - 198.206.101.12
5) IP Subnet Mask - 255.255.255.0
6) IP Broadcast Address - 198.206.101.255
7) Router Description - Router Port #2
8) RIP Mode - Silent
{Active (a), Inactive (i), Deaf (d), Silent (s)}
9) Routing disabled - N
11) Default Framing - Ethernet II
{Ethernet II(e), Ethernet 802.3 (8), fddi (f),
token ring (t), source route token ring (s)}
IPX parameters:
12) IPX enabled - N
(save/quit/cancel)
:
The Group number at the top of this sample screen is followed by the number 1 (GROUP 2.1),
meaning that the information applies to default VLAN #1 in this Group. If this screen displayed
information on Group 2, VLAN 2, then this field would read GROUP 2:2.
The colon prompt (:) at the bottom of the screen is used to prompt for user input. To change
a value, type the line number of the item you want to change, followed by an equal sign (=)
and the new value. For example, to set a new description you could enter:
2=Engineering
All of the modvl parameters are described in the section for creating a new Group, Creating a
New Group on page 16-18.
_ Note _
Line numbering for the modvl command will vary
depending on whether you have an IP or IPX router
configured. Each type of router contains several parameters
that require extra line numbers.
Modifying a Group or VLAN
Page 16-40
Viewing Your Changes
When you enter a change at the colon prompt, the modvl screen does not normally refresh. If
you want to see the current Group or VLAN settings, including any changes you made, enter a
question mark (?) at the colon prompt. The modvl screen will refresh.
Saving Your Changes
Once you have entered all your modifications and you want to save them, type save at the
colon prompt. You will exit the modvl command and your changes will take effect.
Canceling Your Changes
You can also exit the modvl command without saving any changes you made in the current
session. Simply enter cancel at the colon prompt or enter <Ctrl>-d. The modvl command will
end and none of the changes you made will be saved.
Changing the IP Address
Changing the IP address can also affect the Subnet Mask and the Broadcast Address. The new
IP address means that the Subnet Mask and Broadcast Address must be re-generated and the
following message displays:
New IP address generates new subnet and broadcast address
Enter '?' to view the changes
The system automatically creates new Subnet Mask and Broadcast addresses based on the
new IP address. If you enter a question mark (?) at this point you could view these changes.
If you remove the last IP address in the system, you will see a warning message that SNMP
(and other applications) are now inoperational.
Changing the IP Subnet Mask
Changing the IP Subnet Mask can also affect the IP Broadcast Address. The new Subnet Mask
means that the Broadcast Address must be re-generated and the following message displays:
New mask caused change in broadcast address
The system automatically created a new Broadcast address based on the new Subnet Mask. If
you entered a question mark (?) at this point you could view these changes.
Modifying a Group or VLAN
Page 16-41
Enabling IP or IPX Routing
If you enable IP or IPX routing by setting the corresponding modvl lines from N to Y, then the
screen automatically refreshes with additional lines for the new router port parameters. All
lines are set to router defaults. The router defaults are as follows:
IP Router
IP Network Address 0.0.0.0
IP Subnet Mask 0.0.0.0
IP Broadcast Address 0.0.0.0
Router Description (no description shown for default)
Routing Disabled No
RIP Mode Silent
Default Framing Type Ethernet II
IPX Router
IPX Network Address 0x0
Router Description (no description shown for default)
Delay in Ticks 0
RIP/SAP Mode RIP and SAP are active
Default Framing Type Ethernet II
You can change any of these defaults as you would any other modvl parameters: enter the
line number, followed by an equal sign (=) and the new parameter.
_ Note _
You must at least enter a Network Address for a new
router or you will not be able to save the configuration.
Deleting a Group
Page 16-42
Deleting a Group
You can delete a Group as long as it does not contain any virtual ports. The default Group,
Group #1, cannot be deleted. To delete a Group, enter rmgp followed by the Group number
you want to delete. For example, if you wanted to delete Group 5, you would enter:
rmgp 5
If the Group does not contain any virtual ports, then a confirmation message displays:
GROUP 5 removed.
If the Group still contains virtual ports, then a message similar to the following displays:
GROUP 5 has active entries, you must remove
these prior to removing the GROUP (use rmvp for this).
You must first remove the Group's virtual ports before the Group can be removed. The rmvp
command allows you to remove virtual ports. See Deleting a Virtual Port on page 16-45 for
information on using this command.
_ Note _
Some commands in the Bridge Management menu
(described in Chapter 14, "Configuring Bridging Parameters")
require you to select a Group before making
configuration changes. If you delete the currently
selected Group with rmgp, then the new currently
selected Group reverts to the default Group, Group #1.
Adding Virtual Ports
Page 16-43
Adding Virtual Ports
You can add virtual ports to a Group at any time after the Group is created. The addvp
command allows you to add one or more ports to a Group you specify. If you have used the
crgp command to add virtual ports, then you will find the addvp command fields very familiar.
To use addvp, enter the command followed by the Group number to which you want to add
the port. Next, specify the port or ports you want to add.
addvp <Group Number for port> <Module Slot>/<Port Number>
For example, if you wanted to add ports 4 through 6 on the module in slot 4 to Group #5,
then you would specify:
addvp 5 4/4-6
The procedure for using addvp is as follows:
1. Enter addvp followed by the Group number where you want this port to reside, followed
by the physical slot and port numbers you want to configure.
2. If you enter a port that is already assigned to another Group, then you will be prompted
on whether or not you want to change its assignment. A message similar to the following
displays for each port that you enter:
4/4 - This interface has already been assigned to GROUP 1 -
(Default GROUP #1).
Do you wish to remove it from that GROUP and assign it (with
new configuration values) to this GROUP (n)?
Simply enter a y at each port prompt to change its Group assignment and begin setting
port parameters. You could also enter a c at this prompt to accept all default port parameters
and skip port configuration questions. If you enter a c, all remaining ports are automatically
added to the Group with default settings, and your work is complete.
3. The virtual port configuration menu displays:
Modify Ether/8 Vport 4/4 Configuration
1) Vport : 9
2) Description :
3) Bridge Mode : Auto-Switched
31) Switch Timer : 60
4) Flood Limit : 192000
5) Output Format Type : Default (IP-Eth II, IPX-802.3)
6) Ethernet 802.2 Pass Through : Yes
7) Admin, Operational Status : Enabled, inactive
8) Mirrored Port Status : Disabled, available
9) MAC Address : 000000:000000
Command {Item=Value/?/Help/Quit/Redraw/Next/Previous/Save} (Redraw) :
Descriptions for each of the fields in this display begin on page 16-28. To change any
default value, enter the line number for the item, an equal sign (=), and then the value for
the parameter. When you have completed the configuration for this port, enter save to
save all configured settings.
Modifying a Virtual Port
Page 16-44
Modifying a Virtual Port
You can modify a virtual port through the modvp command. The modvp command is very
similar to the addvp command and the port configuration phase of the crgp command. To use
modvp, enter the command, followed by the Group number for the port, and the physical slot
and port number for the port:
modvp <Group Number for port> <Module Slot>/<Port Number>
You can specify only one port at a time. For example, if you wanted to modify the parameters
for Port 7 on the module in Slot 4, and the Port currently resides in Group 6, then you
would enter:
modvp 6 4/7
The procedure for using modvp is as follows:
1. Enter modvp followed by the Group number where the port currently resides, the physical
slot and port number.
2. A prompt displays requesting your confirmation:
Modify local port 7 (Virtual port (#14)) ? (y) :
Simply press <Enter> if this is the correct virtual port. The Virtual Port number in parentheses
(Virtual Port #14 in this case) is the virtual port number within this entire OmniAccess
512 or PizzaSwitch. Virtual ports are numbered sequentially within the switch, not within
a Group or VLAN.
3. The virtual port configuration menu displays:
Modify Ether/8 Vport 4/7 Configuration
1) Vport : 9
2) Description :
3) Bridge Mode : Auto-Switched
31) Switch Timer : 60
4) Flood Limit : 192000
5) Output Format Type : Default (IP-Eth II, IPX-802.3)
6) Ethernet 802.2 Pass Through : Yes
7) Admin, Operational Status : Enabled, inactive
8) Mirrored Port Status : Disabled, available
9) MAC Address : 000000:000000
Command {Item=Value/?/Help/Quit/Redraw/Next/Previous/Save} (Redraw) :
Descriptions for each of the fields in this display begin on page 16-28. To change any
default value, enter the line number for the item, an equal sign (=), and then the value for
the parameter. When you have completed the configuration for this port, enter save to
save all configured settings.
Deleting a Virtual Port
Page 16-45
Deleting a Virtual Port
You can delete a virtual port from its existing Group by using the rmvp command. When you
remove a virtual port, the port is moved to the default switch Group, Group #1, and all port
parameters are reset to defaults except for the port name. For example, if you configured a
port with a special flood limit and customized translation settings and you then removed the
port, you would lose those port settings.
To remove a port, enter the rmvp command, followed by the Group number where the port
currently resides and the physical slot and port number for the port:
rmvp <Group number> <Module Slot>/<Port Number>
For example, to delete Port 7 on the module in Slot 4, and the Port currently resides in Group
6, you would enter:
rmvp 6 4/7
A prompt displays requesting that you confirm the deletion:
Local port 7 (Virtual po...) is attached to this slot/interface - remove? (n):
Enter a y and press <Enter> to remove the port. Another message displays confirming the
deletion:
BRIDGE port on 4/7 moved to GROUP 1.
If the port you specified did not exist in the Group you specified in the rmvp command, then
a message similar to the following would display:
Specified port(s) not found on GROUP 6.
Viewing Information on Ports in a Group
Page 16-46
Viewing Information on Ports in a Group
The via command allows you to view port attachments associated with a specified Group or
all Groups in a switch. Entering
via
displays summary information for all virtual ports in the switch. You can also display virtual
interface attachments for a specific Group by specifying the Group ID after the via command.
For example, to view ports for Group 2, you would enter
via 2
The same type of information is displayed for a single Group as is displayed for all Groups.
The following screen shows a sample from the via command when specified without a Group
ID.
GROUP Interface Attachments For All Interfaces
GROUP: Service/ Admin
Slot/Intf Description Instance Protocol Status
======= ============================= ========== ========= =======
1.1 : * GROUP #1.0 IP router vport Rtr / 1 IP Enabled
2.1 : * for group 2 Rtr / 2 IP Enabled
1:2/1 Virtual port (#2) Brg / 1 Tns Enabled
1:2/2 Virtual port (#3) Brg / 1 Tns Enabled
1:2/3 Virtual port (#4) Brg / 1 Tns Enabled
2:2/4 finance server Brg / 1 Tns Enabled
1:2/5 Virtual port (#6) Brg / 1 Tns Enabled
1:2/6 Virtual port (#7) Brg / 1 Tns Enabled
1:2/7 Virtual port (#8) Brg / 1 Tns Enabled
1:2/8 Virtual port (#9) Brg / 1 Tns Enabled
1:3/1 Virtual port (#1) Brg / 1 Tns Enabled
1:4/1 Virtual port (#10) Brg / 1 Tns Enabled
1:4/2 Virtual port (#11) Brg / 1 Tns Enabled
1:4/3 Virtual port (#12) Brg / 1 Tns Enabled
1:4/4 Virtual port (#13) Brg / 1 Tns Enabled
1:4/5 Virtual port (#14) Brg / 1 Tns Enabled
1:4/6 Virtual port (#15) Brg / 1 Tns Enabled
GROUP: Slot/Intf. GROUP is the group number to which this port is assigned. When the Group
displays as a Group number followed by a decimal and a 1 (1.1 and 2.1 in the above sample),
it represents the router port on the default VLAN within that Group. Slot is the position in the
chassis of the switching module where this port is located. Intf (Interface) is the physical port
on the switching module. When the Slot and Interface are shown as an asterisk (*)—as the
top two entries in the above table display—it represents as virtual router port that does not
have a corresponding physical interface.
Description. The textual description entered for either the virtual router port or the virtual
switch port. This description was entered through crgp or modvl for virtual router ports, or
through crgp, addvp, or modvp for virtual switch ports.
Service/Instance. Service is the service type configured for this port. Instance is an identifier of
this service type within the switch. For example, multiple virtual router ports within the
switch will be labelled consecutively (1, 2, 3, etc.), and will each have a different Instance
number.
Viewing Information on Ports in a Group
Page 16-47
Values for the service type are as follows:
• Rtr Virtual router port
• Brg Virtual bridge port
• Tnk Virtual trunk port (used for WAN)
• FRT Frame Relay trunk port
• Lne LAN Emulation service port
• CIP Classical IP service port
• Vlc VLAN Clusters (X-LANE) service port
Protocol. The bridging protocol for virtual ports and services or the routing protocol for virtual
router ports. Possible values are:
• Tns Transparent bridge. Bridges maintain a dynamic table of known MAC
addresses on connected segments. The table is used to make forwarding decisions.
When a frame is received that contains a destination address that
matches an address in the table, it is forwarded to designated bridge ports
that are in forwarding state.
• SR IPIP Routing Protocol. Routing Information Protocol (RIP) used to learn routes
from neighboring routers. You configure an IP router through the crgp or
modvl commands. Other IP routing parameters can be set through the
Networking menu commands, which are described in Chapter 22, "IP Routing."
• IPX IPX Routing Protocol. Uses RIP to learn routes from neighboring routers and
the Service Advertising Protocol (SAP) to maintain a database of network
services for requesting workstations. Other IPX routing parameters can be set
through the Networking menu commands, which are described in Chapter 24,
"IPX Routing."
• CIP Classical IP Routing (RFC 1577). Classical IP is necessary when an ATM
network contains devices that support only CIP. This type of routing is
configured when you initially create a Group through the crgp command.
• FR Frame Relay IP Routing. WAN Routing Groups are configured slightly different
from other Groups. Frame Relay IP Routing is IP Routing with some
enhancements to account for the Frame Relay network.
Admin Status. Indicates whether the port is administratively Enabled or Disabled. When Enabled,
the port can transmit and receive data as long as a cable is connected and no physical or
operational problems exist. When Disabled, the port will not transmit or receive data even if a
cable is connected and the physical connection is operational. You can set the Admin Status
during port configuration phase of the crgp, addvp, or modvp commands.
Viewing Detailed Information on Ports
Page 16-48
Viewing Detailed Information on Ports
The vi command displays detailed information about virtual ports. Entering
vi
displays information for all virtual ports in the switch. You can also display information for
only ports in a specific Group by specifying the Group ID after the vi command. For example,
to view information only for ports in Group 6, you would enter
vi 6
The same type of information is displayed for a single Group as is displayed for all Groups.
The following screen shows a sample from the vi command when specified without a Group
ID.
Virtual Interface Summary Information- For All Interfaces
Status
Slot/ Type/ ------------------------------------
Group Intf Inst/Srvc MAC Address Prt Encp Admin Oper Spn Tr Mode
===== === =========== ============= === ==== ====== ===== ====== ======
1 All Rtr/ 1 0020da:020d40 IP ETH2 Enabld Active N/A N/A
2 All Rtr/ 2 0020da:020d43 IP ETH2 Enabld Active N/A N/A
2 All Rtr/ 3 0020da:020d44 IP ETH2 Enabld Active N/A N/A
1 3/1 Brg/ 1/ 1 0020da:048730 Tns DFLT Enabld Inactv Disabl Bridged
1 4/1 Brg/ 1/ na 0020da:030990 Tns DFLT Enabld Active Fwdng Bridged
1 4/2 Brg/ 1/ na 0020da:030991 Tns DFLT Enabld Inactv Disabl Bridged
1 4/3 Brg/ 1/ na 0020da:030992 Tns DFLT Enabld Inactv Disabl Bridged
1 4/4 Brg/ 1/ na 0020da:030993 Tns DFLT Enabld Inactv Disabl Bridged
1 4/5 Brg/ 1/ na 0020da:030994 Tns DFLT Enabld Inactv Disabl Bridged
1 4/6 Brg/ 1/ na 0020da:030995 Tns DFLT Enabld Inactv Disabl Bridged
1 4/7 Brg/ 1/ na 0020da:030996 Tns DFLT Enabld Inactv Disabl Bridged
2 4/8 Brg/ 1/ na 0020da:030997 Tns DFLT Enabld Inactv Disabl Bridged
1 5/1 Brg/ 1/ na 0020da:022860 Tns DFLT Enabld Inactv Disabl Bridged
Group. The Group number to which this port is currently assigned.
Slot/Intf. The slot (Slot) is the position in the chassis of the switching module where this port
is located. The interface (Intf) is the physical port on the switching module. If this column
reads All, then this port is a router port that supports all virtual ports in the Group.
Type/Inst/Srvc. The Service Type (Type), Instance (Inst) of this Service Type in the switch, and
service number (Srvc) for this virtual port. Service Type values are as follows:
• Rtr Virtual router port
• Brg Virtual bridge port
• Tnk Virtual trunk port (used for WAN)
• FRT Frame Relay trunk port
• Lne LAN Emulation service port
• Vlc VLAN clusters (X-LANE) service port
• CIP Classical IP service port
Viewing Detailed Information on Ports
Page 16-49
The Instance (Inst) is an identifier of this type of service within the switch. For example, if
more than one virtual router port is configured in the switch, then each "instance" of a router
will be given a different number. The service number (Srvc) is port-specific. If a port has
more than one service configured on it, then each service will be identified by a different
service number.
MAC Address. The MAC address for this virtual port. Each virtual port is allocated a MAC
address.
Prt. The bridging or routing protocol supported by this virtual port. Descriptions of these
protocol types are provided on page 16-47. Possible values are:
• Tns Transparent Bridge
• IP IP Routing Protocol
• IPX IPX Routing Protocol
• CIP Classical IP Routing (RFC 1577)
• FR Frame Relay IP Routing
Encp. Encapsulation used for outgoing packets on this virtual router or switch port. Possible
encapsulation values are:
• DFLT Default format for this switch port (differs for each interface type)
• SWCH Frame translations have been customized through the Switch menu
• ETH2 Ethernet II
• ESNP Ethernet 802.3 SNAP (virtual router ports)
• ELLC Ethernet 802.3 LLC (IPX router ports only)
• 8023 Ethernet 802.3, Novell Raw (IPX router ports only)
• 1490 Frame Relay Routing (RFC 1490)
• 1483 Classical IP Routing (RFC 1483)
• SNAP SNAP (switch ports only)
• LLC LLC (switch ports only)
Admin. Indicates whether the port is administratively Enabled or Disabled. When Enabld, the
port can transmit and receive data as long as a cable is connected and no physical or operational
problems exist. When Disabld, the port will not transmit or receive data even if a cable
is connected and the physical connection is operational. You can set the Administrative Status
during the port configuration phase of the crgp command, the addvp command, or the modvp
command. A port can have an Administrative Status of Enabled, but still be operationally
Inactive. See the description of the Oper column below.
Oper. Indicates the current Operational Status of the port. The port will be Active (Active) or
Inactive (Inactv). If the port is Active, then the port can pass data and has a good physical
connection. If it is Inactive, then it may not have a good physical connection and it is not
capable of passing data at this time.
Spn Tr. The port's current state as defined by the Spanning Tree Protocol. The possible Spanning
Tree States are: Disabled, Blocking, Listening, Learning, and Forwarding. This state
controls the action a port takes when it receives and transmits a frame. For ports which are
Administratively disabled or Operationally Inactive, this state will be Disabled (Disabl), meaning
the Spanning Tree algorithm is not active on this port. If the state is Blocking, then only
BPDUs will be transmitted and received. If the state is Forwarding, then both data and BPDU
frames will be transmitted and received. This Spanning Tree Protocol state is not applicable to
virtual router ports and will read N/A for those ports.
Viewing Detailed Information on Ports
Page 16-50
Mode. The Bridge Mode currently in use on this port. This mode is chosen during the port
configuration phase of the crgp command, through the addvp command, or through the
modvp command. It is not applicable to virtual router ports and will read N/A for those ports.
Possible values are:
• Bridged Spanning Tree Bridge.
• AutoSw Auto Switch.
• Optimzd Optimized Device Switching.
See page 16-28 for a description of these bridge modes.
Viewing Port Statistics
Page 16-51
Viewing Port Statistics
The vs command displays transmit and receive statistics for ports in the switch. Entering
vs
displays statistics for all virtual ports in the switch. You can also display statistics for only
ports in a specific Group by specifying the Group ID after the vs command. For example, to
view statistics only for ports in Group 6, you would enter
vs 6
You can also display statistics for a specific port by entering the slot and port number after
the vs command. For example, to view statistics only for Port 1 on the module in Slot 4, you
would enter
vs 4/1
The same type of information is displayed for a single Group or port as is displayed for all
ports in a switch. The following screen shows a sample from the vs command when specified
without any Group or port parameters.
Virtual Interface Statistical Information- For All Interfaces
Frames Octets UcastPkts NUcastPkts
Slot/ Service/ In In In In
Group Intf Instance Out Out Out Out
===== === =========== =========== =========== ============ =============
1 All Rtr/ 1
2 All Rtr/ 2
3 All Rtr/ 3
1 3/1 Tnk/ 1 0 0 0 0
0 0 0 0
1 4/1 Brg/ 1 17774 1739560 1707 16067
684 103048 681 3
1 4/2 Brg/ 1 0 0 0 0
0 0 0 0
1 4/3 Brg/ 1 0 0 0 0
0 0 0 0
1 4/4 Brg/ 1 0 0 0 0
0 0 0 0
1 4/5 Brg/ 1 0 0 0 0
0 0 0 0
1 4/6 Brg/ 1 0 0 0 0
0 0 0 0
1 4/7 Brg/ 1 0 0 0 0
0 0 0 0
1 4/8 Brg/ 1 0 0 0 0
0 0 0 0
1 5/1 Brg/ 1 0 0 0 0
0 0 0 0
Group, Slot/Intf. These columns are described for the vi command on page 16-48.
Service/Instance. The Service Type (Service) and Instance (Instance) of this Service Type in the
switch.
Viewing Port Statistics
Page 16-52
Service Type values are as follows:
• Rtr Virtual router port
• Brg Virtual bridge port
• Tnk Virtual trunk port (used for WAN)
• FRT Frame Relay trunk port
• Lne LAN Emulation service port
• Vlc VLAN clusters (X-LANE) service port
• CIP Classical IP service port
The Instance (Inst) is an identifier of this type of service within the switch. For example, if
more than one virtual router port is configured in the switch, then each "instance" of a router
will be given a different number.
Frames In/Out. The number of frames received or sent from this port. The top number for each
port row is the number of frames received, and the bottom number is the number of frames
sent. Statistics are not provided for virtual router ports in this display, but they are provided
through Networking menu commands. See Chapters 22 and 24 for further information on
router port statistics.
Octets In/Out. The number of octets, or bytes, received or sent from this port. The top number
for each port row is the number of octets received, and the bottom number is the number of
octets sent. Statistics are not provided for virtual router ports, but they are provided through
Networking menu commands. See Chapters 22 and 24 for further information on router port
statistics.
Ucast Pkts In/Out. The total number of unicast packets received or sent from this port. The top
number for each port row is the number of unicast packets received, and the bottom number
is the number of unicast packets sent. Statistics are not provided for virtual router ports, but
they are provided through Networking menu commands. See Chapters 22 and 24 for further
information on router port statistics.
Non Ucast Pkts In/Out. The total number of non-unicast packets received or sent from this port.
Non-unicast frames include multicast and broadcast frames. The top number for each port
row is the number of non-unicast packets received, and the bottom number is the number of
non-unicast packets sent. Statistics are not provided for virtual router ports, but they are
provided through Networking menu commands. See Chapters 22 and 24 for further information
on router port statistics.
Viewing Port Errors
Page 16-53
Viewing Port Errors
The ve command displays port error statistics for ports in the switch. Entering
ve
displays error statistics for all virtual ports in the switch. You can also display errors statistics
for only ports in a specific Group by specifying the Group ID after the ve command. For
example, to view errors only for ports in Group 6, you would enter
ve 6
You can also display error statistics for a specific port by entering the slot and port number
after the ve command. For example, to view errors only for Port 1 on the module in Slot 4,
you would enter
ve 4/1
The same type of information is displayed for a single Group or port as is displayed for all
ports in a switch. The following screen shows a sample from the ve command when specified
without any Group or port parameters.
Virtual Interface Error Information- For All Interfaces
Slot/ Service/ Buffer Discards Error Discards
Group Intf Instance In Out In Out
===== === =========== =========== =========== ============ =============
2 All Rtr/ 1
3 All Rtr/ 2
1 All Rtr/ 1
1 3/1 Tnk/ 1 0 0 0 0
1 4/1 Brg/ 1 0 0 0 0
1 4/2 Brg/ 1 0 0 0 0
1 4/3 Brg/ 1 0 0 0 0
1 4/4 Brg/ 1 0 0 0 0
1 4/5 Brg/ 1 0 0 0 0
1 4/6 Brg/ 1 0 0 0 0
1 4/7 Brg/ 1 0 0 0 0
1 4/8 Brg/ 1 0 0 0 0
1 5/1 Brg/ 1 0 0 0 0
Group, Slot/Intf. These columns are described for the vi command on page 16-48.
Service/Instance. The Service Type (Service) and Instance (Instance) of this Service Type in the
switch. Service Type values are as follows:
• Rtr Virtual router port
• Brg Virtual bridge port
• Tnk Virtual trunk port (used for WAN)
• FRT Frame Relay trunk port
• Lne LAN Emulation service port
• Vlc VLAN clusters (X-LANE) service port
• CIP Classical IP service port
Viewing Port Errors
Page 16-54
The Instance (Inst) is an identifier of this type of service within the switch. For example, if
more than one virtual router port is configured in the switch, then each "instance" of a router
will be given a different number.
Buffer Discards In/Out. For transmit (Out) and receive (In), the number of frames discarded due
to a lack of buffer space. Buffer discard information is not provided for virtual router ports.
Error Discards In/Out. For transmit (Out) and receive (In), the number of frames discarded due
to errors. Error discard information is not provided for virtual router ports.
Port Mirroring
Page 16-55
Port Mirroring
You can set up Port Mirroring for any pair of Ethernet (10 or 10/100 Mbps) ports within the
same switch. When you enable port mirroring, the active, or "mirrored," port transmits and
receives network traffic normally, and the "mirroring" port receives a copy of all transmit and
receive traffic to the active port. You can connect an RMON probe or network analysis device
to the mirroring port to see an exact duplication of traffic on the mirrored port without
disrupting network traffic to and from the mirrored port.
Port mirroring is supported on OmniAccess 512 switches for Ethernet (10 or 10/100 Mbps)
ports only. An Ethernet port can only be mirrored by one other Ethernet port. A mirroring
port can only mirror one port at a time. Up to five (5) mirroring sessions (mirrored-mirroring
port pairs) are supported in a single switch. The mirrored and mirroring ports can be in different
Groups and different VLANs.
How Port Mirroring Works
When a frame is received on a Mirrored Port it is copied and sent to the Mirroring Port. The
received frame is actually transmitted twice across the switch backplane—once for normal
bridging and then again to the Mirroring Port.
When a frame is transmitted by the mirrored port, a copy of the frame is made, tagged with
the mirroring port as the destination, and sent back over the switch backplane to the mirroring
port. The following diagram illustrates the data flow for a Mirrored-Mirroring port pair.
Relationship Between Mirrored and Mirroring Port
When port mirroring is enabled, there may be some performance degradation since all frames
received and transmitted by the Mirrored port need to be copied and sent to the Mirroring
port.
What Happens to the Mirroring Port
Once you set up port mirroring and attach cables to the Mirrored and Mirroring ports, the
Mirroring port is administratively disabled and no longer a part of the Bridging Spanning Tree.
The Mirroring port does not transmit or receive any traffic on its own. In addition, the Admin
Status of the mirroring port displays in switch software commands, such as vi, as
M <slot> <port>
where <slot> is the slot number of the module containing the mirrored port, and <port> is the
port number of the mirrored port. For example, if the Admin Status of a port displayed as
M 2 02
then you would know this port is mirroring traffic for Port 2 in Slot 2.
Mirrored Port Mirroring Port
Incoming
Frames
Outgoing
Frames
Copied Incoming Frames
Copied Outgoing Frames
Incoming and outgoing
frames on the Mirrored port
are copied and transmitted
to the Mirroring Port.
Port Mirroring
Page 16-56
If a cable is not attached to the Mirrored port, port mirroring will not take place. In this case,
the Mirroring Port reverts back to its normally operational state and will bridge frames as if
port mirroring were disabled.
Using Port Mirroring With External RMON Probes
Port mirroring is a helpful monitoring tool when used in conjunction with an external RMON
probe. Once you set up port mirroring, the probe can collect all relevant RMON statistics for
traffic on the mirrored port. You can also move the Mirrored Port so that the Mirroring Port
receives data from different ports. In this way, you can roam the switch and monitor traffic at
various ports.
If you attach an external RMON probe to a mirroring port, that probe must have an IP address
that places it in the same VLAN as the mirrored port. In addition if you change the mirrored
port, then you must again make sure that the RMON probe is in the same VLAN as that new
mirrored port.
Mirrored and Mirroring Ports in Same VLAN
Frames received from an RMON probe attached to the Mirroring Port can be seen as being
received by the Mirrored Port. These frames from the Mirroring Port are marked as if they are
received on the Mirrored Port before being sent over the switch backplane to an NMS station.
Therefore, management frames from an NMS station that are destined for the RMON probe are
first forwarded out the Mirrored Port. After being received on the Mirrored Port, copies of the
frames are mirrored out the Mirroring Port—the probe attached to the Mirroring Port receives
the management frames. The illustration on the following page shows this data flow.
Mirrored Port Mirroring Port
RMON Probe
Must be in same VLAN.
Port Mirroring
Page 16-57
Port Mirroring Using an External RMON Probe
_ Important Note _
The Mirroring Port is not accessible from the NMS
device. From the NMS station, the Mirroring Port will
appear disabled or down.
Mirrored Port Mirroring Port
RMON probe frames from
the Mirroring Port appear to
come from the Mirrored Port
when the NMS workstation
receives them.
RMON Probe
_
NMS
Workstation
RMON probe frames sent
from the Mirroring Port.
_
Mirrored Port Mirroring Port
RMON Probe
NMS
Workstation
Management frames from the
NMS workstation are sent to
the Mirrored Port.
_
Port mirroring sends copies
of management frames
to the Mirroring Port.
_
Port Mirroring
Page 16-58
Setting Up Port Mirroring
You set up port mirroring when you add or modify a port through the addvp or modvp
commands. The switch software senses the type of port you are configuring, so it will only
prompt you for port mirroring when configuring an Ethernet port. Follow the steps below to
set up port mirroring.
1. Start the addvp or modvp command for the virtual port that you want to mirror.
2. At the Command prompt enter 8=e, press <Enter> and you will be prompted for the slot
and port number of the "mirroring" port (i.e., the port that can "see" all traffic for this
port):
Mirroring vport slot/port ? ( ) :
3. Enter the mirroring port's slot, a slash (/), the port number, and then press <Enter>. The
port that you indicate here will be disabled and only capable of receiving duplicate traffic
from the mirrored port. If port mirroring is not supported on this port, then the following
prompt will display:
mirroring not supported on this port type
After entering the Mirroring slot and port number, the addvp or modvp screen of options
re-displays with the changes you entered. If you are done modifying or adding the port,
enter save at the Command prompt. If using the addvp command a message indicating that
you have successfully set up the port displays. Port mirroring takes place immediately, so
you could now connect a probe or network analyzer to the Mirroring port.
Disabling Port Mirroring
You can disable port mirroring through the modvp command. Follow these steps to disable
port mirroring.
1. Start the modvp command for the virtual port on which you want to disable port mirroring.
2. At the Command prompt enter 8=d, press <Enter>. The modvp screen re-displays. The
Mirrored Port Status field should read Disabled, available.
Port Monitoring
Page 16-59
Port Monitoring
An essential tool of the network engineer is a network packet capture device. A packet
capture device is usually a PC-based computer, such as the Sniffer®, that provides a means for
understanding and measuring data traffic of a network. Understanding data flow in a VLANbased
switch presents unique challenges primarily because traffic takes place inside the
switch, especially on dedicated devices.
The port monitoring feature built into OmniAccess 512 software allows the network engineer
to examine packets to and from a specific Ethernet port. Port monitoring has the following
features:
• Software commands to enable and display captured port data.
• Captures data in Network General® file format.
• Limited protocol parsing (basic IP protocols and IPX) in console dump display.
• Data packets time stamped.
• One port monitored at a time.
• RAM-based file system.
• Memory buffer space from 1 MB to 8 MB.
• Statistics gathering and display
• Monitors only Ethernet ports
• Filtering limited to basic packet type—broadcast, multicast or unicast.
You can select to dump real-time packets to the terminal screen, or send captured data to a
file. Once a file is captured, you can FTP it to a Sniffer for viewing.
Port Mirroring
An alternate method of monitoring ports is Port Mirroring, which allows a network engineer
to attach a Sniffer to one Ethernet port and mirror traffic to and from any other Ethernet port.
Port mirroring is described in Port Mirroring on page 16-55.
Port Monitoring Menu
The port monitoring commands are contained on the port monitoring menu, which is a submenu
of the Networking menu. The port monitoring menu displays as follows:
Command Port Monitoring Menu
pmon Port monitor utility
pmcfg Configure port monitor parameters
pmstat View port monitor statistics
pmd Port monitor disable
pmp Port monitor pause
Main File Summary VLAN Networking
Interface Security System Services Help
/Networking/Monitor %
The commands in this menu are described in the following sections.
Port Monitoring
Page 16-60
RAM Disk System for Data Capture Files
Port monitoring uses a RAM disk for fast temporary storage of data capture files. The RAM disk
has a separate directory designation of /ram. RAM-based files are created in DOS-FAT format
and they are displayed in UPPERCASE.
You can copy files between the /ram disk system and the standard /flash file system. In addition,
files in the RAM disk system are retrievable via FTP. Both the /ram file system and the
/flash file system are accessible by using the UNIX/DOS-style change directory (cd) command.
_ Note _
The RAM drive is part of DRAM memory. If you power
off or reboot the switch, any files saved in the RAM
drive will be lost.
Configuring RAM Drive Resources (pmcfg)
The pmcfg command allows you to select the size of the RAM disk file system or to delete the
RAM disk. In addition, it allows you to configure the amount of data collected for each packet
capture. To begin configuring RAM drive resources, enter
pmcfg
A screen similar to the following displays:
RAM disk size : 1000 Kilobytes
Lines displayed: 1
Change any of the above (y/n)? (n)
To change one of the settings, enter a Y and press <enter>. You will be prompted for a new
RAM drive size. Select a size in kilobytes between 1000 and 8000. You can also delete the
RAM drive by entering a size of zero (0). Changing the RAM disk size also requires that you
reboot the system.
The Lines displayed controls the amount of data displayed to the terminal when you choose to
dump session data to the computer screen. You can specify the number of lines to display
while viewing port monitor data on the screen.
Changing the Default System Directory (cd)
After a port monitoring session is enabled the default directory is the RAM disk system (/ram).
To switch back to the standard default flash file system (/flash) use the cd command. To
switch back to the default directory, enter
cd /flash
To switch back to the RAM disk directory, enter
cd /ram
Port Monitoring
Page 16-61
Starting a Port Monitoring Session (pmon)
You enable a port monitoring session through the pmon command. To start a session, enter
pmon followed by the slot and port number that you want to monitor. For example, to monitor
a port that is the first port in the second slot of the switch, you would enter
pmon 2/1
You can only monitor Ethernet ports. If a port is already being mirrored (enabled through the
addvp or modvp command) you cannot monitor it. Also, you cannot set up more than one
monitoring session on the same port.
If the port is currently being monitored, or mirrored, the following message displays:
Port 2/1 is being monitored.
Disable monitoring? (y)
If the port is not being monitored, or mirrored, the following message displays:
Port 2/1 is not being monitored, or mirrored.
Enable monitoring? (y)
Enter a Y and press <enter> at this prompt. The following screen of options displays:
Slot/Port : 2/1
RAM disk size 1000 Kilobytes
Capture to filename : y
Capture filename : PMONITOR.ENC
Dump to screen : y
Broadcast frames : y
Multicast frames : y
Unicast frames : y
Change any of the above (y/n)? (n) :
If you want to change any of the values, enter a Y and press <enter>. You will be prompted
for all of the values in the screen except the RAM disk size, which you must change through
the pmcfg command before starting the session. The information selected in this screen will
be saved in flash configuration memory.
Enter any new values as prompted. The above screen re-displays to show the new values.
Press <enter> to accept the updated values. Messages similar to the following display:
1048576 byte RAM drive /ram already initialized.
Bytes remaining on RAM disk = 1040384
The port monitoring session has begun. What happens at this point depends on whether you
chose the Dump to screen option. The sections below describe what happens in each case.
_ Important Note _
If you change the capture filename from the default,
you must specify /ram. Otherwise, the file will be saved
in the flash directory.
Port Monitoring
Page 16-62
If You Chose Dump to Screen
If you selected the Dump to screen option, then a real-time synopsis of the session displays on
your terminal screen. The following shows an example of this data
Enter 'p' to pause, 'q' to quit.
Destination | Source | Type | Data
--------------------------------------------------------------------------------------------------------------
00:20:DA:04:01:02 | 00:20:DA:04:01:01 | ICMP | 01:02:03:04:05:06:07:08
00:20:DA:04:01:02 | 00:20:DA:04:01:01 | ICMP | 01:02:03:04:05:06:07:08
FF:FF:FF:FF:FF:FF | 00:20:DA:02:10:E3 | ARP-C | 08:06:00:01:08:00:06:04
FF:FF:FF:FF:FF:FF | 00:20:DA:6F:97:A3 | RIP | 08:00:45:00:00:34:22:30
Each line in the display represents a packet. The destination MAC address, source MAC
address, protocol type and actual packet data are shown. The amount of data shown is
configured through the pmcfg command. The above sample shows 16 bytes of data per
packet. You can stop the data dump to the screen at anytime by pressing q to quit. You can
also pause the data dump by pressing p to pause.
If You Did Not Choose Dump to Screen
If you did not select the Dump to screen option, then the system prompt will return and port
monitoring occurs in the background. You can continue using other UI commands. The port
monitoring session data is saved in the file you indicated through the pmon screen. You can
monitor the session at anytime by using the pmstats command. You can also end or pause an
in-progress session using the pmdelete or pmpause commands, respectively. The following
sections describes pmdelete and pmpause.
Ending a Port Monitoring Session (pmdelete)
The pmdelete command ends a port monitoring data capture session that is being saved to file
but not being dumped to the console screen. To end the session, enter:
pmd
A message similar to the following displays:
Port monitoring session terminated, data file is xxxxx.ENC.
If a port monitoring session was not in progress then the following message displays:
No ports being monitored.
Pausing a Port Monitoring Session (pmpause)
The pmpause command pauses a port monitoring data capture session that is being saved to
file but not being dumped to the console screen. To pause the session, enter:
pmp
The following message displays
Pausing monitor data capture/display.
To resume the port monitoring session, enter pmp again. The following message displays:
Resuming monitor data capture.
If a port monitoring session was not in progress, then the following message would display:
No ports being monitored.
Port Monitoring
Page 16-63
Ending a Port Monitoring Session
After you quit a port monitoring session, the default directory changes to /ram and the current
files on the RAM drive are listed. The screen below shows an example of the display at the
completion of a monitoring session.
Port monitoring capture done. Current capture files listed:
Current working directory '/ram'.
PM0302.ENC 65536 10/20/96 12:12
PM0303.ENC 32768 10/20/96 11:15
950272 bytes free
Viewing Port Monitoring Statistics (pmstat)
The pmstat command displays the statistics gathered for the current or most recent port monitoring
session. If a port monitoring session is currently in progress, then it displays the results
of the in-progress session. If a port monitoring session is not in progress, then it displays
results of the most recently completed session. To view session statistics, enter
pmstat
A screen similar to the following displays:
Viewing capture statistics:
Percent RAM available: 96%
Frame type #Frames
------------------ --------------
Broadcast 108
Multicast 253
Unicast 301
The Percent RAM available indicates how much of the configured RAM disk has been used by
this port monitoring session. You can configure the size of the RAM disk through the pmcfg
command; the default size is 1 MB. The remaining items in the display show the number of
packets passed on the port broken down into broadcast, multicast, and unicast frames.
Port Mapping
Page 16-64
Port Mapping
The OmniAccess 512 began as an any-to-any switching device, connecting different LAN interfaces,
such as Ethernet, Token Ring, and FDDI. As networks grew and the traffic on them
increased, a need arose for controlling some traffic, such as broadcasts. Virtual LANs, or
VLANs, were introduced to segment traffic such that devices could only engage in switched
communication with other devices in the same VLAN.
Some applications today require a further degree of traffic segmentation than that provided by
VLANs. The port mapping feature allows you to further segment traffic within a VLAN or
group by isolating a set of ports.
Groups/VLANs and Port Mapping
Port mapping does not affect existing group or AutoTracker VLAN operations in a switch.
Group and VLAN membership are checked and applied before port mapping constraints are
applied. Therefore, any constraints applied by port mapping only limit traffic flow within a
group or VLAN; port mapping parameters do not provide any additional connectivity to a port.
So if you add a port to a port mapping set, that port will be first subject to the constraints of
its Group/VLAN and then the restrictions imposed by port mapping. Up to 128 port mapping
sets can be configured per switch.
The illustration below helps show how group and port mapping constraints interact. The
ports (2/1, 2/2, 2/7, and 2/8 are part of groups 3. By group membership, all of these ports
have switched communication with each other. Likewise, the ports 2/3, 2/4, 2/5, and 2/6 have
switched communication with each other as they all belong to group 2.
Groups and Port Mapping
Once a port mapping set is constructed, communication within each of the groups becomes
more restricted. A port mapping set consists of ingress and egress ports; ingress ports can only
send traffic to egress ports. In the above figure, all ports in subset A are ingress ports and
ports subset B are egress ports.
12345678
OmniAccess 512
Mobile Group 2
2/5 2/6 2/7 2/8
2/1 Mobile Group 3
2/3
2/4
2/2
Port Mapping Subset B
Port
Mapping
Subset A
Port Mapping
Page 16-65
Port communication is uni-directional. A mapping between an ingress port and an egress port
can only pass data from the ingress port to the egress port. To allow traffic to flow the from
the egress port to the ingress port, it is necessary to create a new mapping.
This configuration restricts each port to communication only with the other four ports in the
opposite port mapping subset within the same group. For example, port 2/1 can only send traffic
to ports 2/7 and 2/8. It can no longer communicate with port 2/2 even though it is part of
the same group. Port mapping restricts ports from communicating with other ports within the
same subset.
Port mapping does not affect other ports in the group that are not part of the port mapping
set.
The Details of Port Mapping
Port mapping can be thought of as special rule that is applied after standard group and VLAN
rules are applied. This rule statically assigns a port as either an ingress or egress port. Ingress
ports can only communicate with egress ports. In this sense, one subset of ports is "mapped"
to another subset of ports. Ports within the same subset can not communicate with each other
or with another switch port that is not a member of the opposite port mapping subset.
_ Note _
Port mapping restrictions are only applied to ports on
10/100 Ethernet ports.
As an illustration, see the diagram of an OmniAccess 512. The ports are in slot 2. The ports
that are circled are included in a port mapping subset. The first subset is port 2/1-4 and are
ingress ports. The second subset includes ports 2/9-12, and are egress ports in the port
mapping set.
Port Subsets in the Port Mapping Set
Other side of the
paired set. Ports
2/9-12 These ports
are subset B.
One side of the
paired set. Ports
2/1-4. This port is
subset A.
PS
TP CONSOLE
10/100
4 8
OmniAccess 1 5
512
OK2
OK1
12
9
1X 2X 3X 4X 5X 6X 7X 8X 9X 10X 11X 12X
S1
S4
S3/1 S3/2
Port Mapping
Page 16-66
Who Can Talk to Whom?
The following matrix outlines which ports can communicate with each other in the example
shown on the previous page assuming all ports are part of the same group or VLAN. A port
can only communicate with ports in the opposite subset within the port mapping set.
Port communication is uni-directional. A mapping between an ingress port and an egress port
can only pass data from the ingress port to the egress port. To allow traffic to flow the from
the egress port to the ingress port, it is necessary to create a new mapping.
It's important to remember that the port mapping configuration is affected by existing group/
VLAN rules. If the ports in the above example belonged to three groups based on IP network
rules, then they would be restricted by group membership and port mapping.
Port Mapping Limitations
The following are restrictions to the use of the port mapping feature:
• Port mapping cannot be used with ports assigned to an 802.1Q group.
• Port mapping cannot be used with an OmniChannel unless all ports in the OmniChannel
are included in the port mapping (on either the ingress or egress list). For example, if ports
3/1-3/4 are an OmniChannel, all four ports must be in the ingress or egress list. You could
not just map port 3/1.
Switch Ports That May Communicate*
2/1 2/2 2/3 2/4 2/9 2/10 2/11 2/11
2/1 N/A No No No Yes Yes Yes Yes
2/2 No N/A No No Yes Yes Yes Yes
2/3 No No N/A No Yes Yes Yes Yes
2/4 No No No N/A Yes Yes Yes Yes
2/9 Yes Yes No No N/A No No No
2/10 No No No No No N/A No No
2/11 No No No No No No N/A No
2/12 No No No No No No No N/A
* Read table from left to right.
Port Mapping
Page 16-67
Creating a Port Mapping Set
Use the pmapcr command to create a port mapping set. Follow these steps:
1. Enter pmapcr at a system prompt.
2. The following screen displays:
Port Map Configuration
1. Ingress List :
2. Egress List :
Enter the ingress ports and egress ports for this map set. This is done by entering the line
number, an equal sign, and the port (or ports) to be added. For example, if you want to
create a map set with and ingress port of 2/6 and an egress port of 2/8, you would enter
the following at the prompt:
1=2/6
2=2/8
This must be done in two separate operations, one for the ingress and one for the egress
lists. You can add more than one port to a list by using a comma (,) between slot/port
designations, or a dash (-) between port numbers. For example, if you wanted to make
ports 2/1, 2/6, 2/7, 2/8, and 2/9 egress ports for this map set, you would enter the following:
2=2/1, 2/6-9
A switch port in the ingress list can only communicate with switch ports in the egress list.
Switch ports in the same list cannot communicate with each other or any other ports in
the switch. For example, if you enter:
1=2/1, 2/2
2=2/3, 2/4
then you are creating a paired set of four ports. Port 2/1 can only communicate with ports
2/3 or 2/4. It cannot communicate with any other ports in the switch, including port 2/2.
Port 2/2 also can only communicate with ports 2/3 and 2/4, but no others.
Any port type may be added to a port mapping set. However, only Mammoth-generation
Ethernet ports will be restricted by port mapping limitations. For example, you could add
a non-Ethernet port to the set, but traffic from that port would not be restricted.
3. You will want to save your configuration, so enter an s at the port-mapping prompt. Your
configuration will be saved. A prompt similar to the following appears to confirm the
creation of the port map:
Port Map 7 created.
The port map number is used when modifying the map set.
It is important to remember that port communication is uni-directional. A mapping between
an ingress port and an egress port can only pass data from the ingress port to the egress port.
To allow traffic to flow the from the egress port to the ingress port, it is necessary to create a
new mapping.
Port Mapping
Page 16-68
Adding Ports to a Port Mapping Set
You can add ports to a port map set once it has been created using the pmapmod command.
Follow these steps:
1. Enter the pmapmod command at a system prompt, as shown:
pmapmod <pmap id>
where <pmap id> is the map set number shown when the map set was created. (To view a
list of all existing map sets, see Viewing a Port Mapping Set on page 16-70.) For example,
to modify map set 5, you would enter the following:
pmapmod 5
2. The following screen displays:
Port Mapping Configuration
=======================
Port Map Id Ingress Ports Egress Ports
----------------- ------------------- ------------------
5 2/1, 2/2, 2/3 2/1, 2/2, 2/3
Modify Port Map 5
1. Add Ports to Ingress List :
2. Add Ports to Egress List :
3. Delete Ports from Ingress List :
4. Delete Ports from Egress List :
5. View Port Map Configuration :
Note that the current ports in the port mapping set are displayed. Use this information to
make decisions on the ports you want to add or remove from the set.
Enter the line number for the operation you want to perform (a 1 for the ingress list or a 2
for the egress list), an equal sign (=), and the ports to be added. For example, add port 2/
2 to the ingress list and the egress list, enter the following (in two separate operations):
1=2/2
2=2/2
You can add more than one port to a list by using a comma (,) between slot/port designations,
or a dash (-) between port numbers. For example, if you wanted to make ports 2/1,
2/6, 2/7, 2/8, and 2/9 egress ports for this map set, you would enter the following:
2=2/1, 2/6-9
3. To view the changes, enter a 5 (View Port Map Configuration), and equal sign (=), and a y,
as shown:
5=y
This will refresh the Port Mapping Configuration screen and display any changes you
have made.
4. Quit the session by entering a q at the prompt.
Port Mapping
Page 16-69
Removing Ports from a Port Mapping Set
You can remove ports to a port map set once it has been created using the pmapmod
command. Follow these steps:
1. Enter the modpmap command at a system prompt, as shown:
pmapmod <pmap id>
where <pmap id> is the map set number shown when the map set was created. (To view a
list of all existing map sets, see Viewing a Port Mapping Set on page 16-70.) For example,
to modify map set 5, you would enter the following:
pmapmod 5
2. The Port Mapping Configuration screen displays (as shown above in Adding Ports to a
Port Mapping Set on page 16-68).
Enter the line number for the operation you want to perform (a 3 for the ingress list or a 4
for the egress list), an equal sign (=), and the ports to be added. For example, remove
port 2/2 to the ingress list and the egress list, enter the following (in two separate operations):
3=2/2
4=2/2
You can remove more than one port to a list by using a comma (,) between slot/port
designations, or a dash (-) between port numbers. For example, if you wanted to remove
ports 2/1, 2/6, 2/7, 2/8, and 2/9 from the egress list of this map set, you would enter the
following:
4=2/1, 2/6-9
3. To view the changes, enter a 5 (view port may configuration), and equal sign (=), and a y,
as shown:
5=y
This will refresh the Port Mapping Configuration screen and display any changes you
have made.
4. Quit the session by entering a q at the prompt.
Port Mapping
Page 16-70
Viewing a Port Mapping Set
You can view a port mapping set using the vpmap command. Enter the pmapv command as
shown:
pmapv <pmap id>
where <pmap id> is the map set number shown when the map set was created. For example,
to modify map set 5, you would enter the following:
pmapv 5
The following screen is shown:
Port Mapping Configuration
=======================
Port Map Id Ingress Ports Egress Ports
----------------- ------------------- ------------------
5 2/1, 2/2, 2/3 2/1, 2/2, 2/3
As a variation of this command, enter the vpmap command with no port map identification.
This will display all port mapping sets configured for this switch.
Port Map Id. An identification number for the port map set, generated when the set is created.
Ingress Ports. The switch ports designated as ingress ports for this port map set. Ingress ports
can only communicate with egress ports.
Egress Ports. The switch ports designated as egress ports for this port map set. Egress ports
can only communicate with ingress ports.
Deleting a Port Mapping Set
You can delete a port mapping set after it is created. Enter pmapdel at a prompt as shown:
pmapdel <pmap id>
where <pmap id> is the map set number shown when the map set was created. (To view a list
of all existing map sets, see Viewing a Port Mapping Set on page 16-70.) For example, to
modify map set 5, you would enter the following:
pmapdel 5
Priority VLANs
Page 16-71
Priority VLANs
Prioritizing VLANs allows to you set a value for traffic based on the destination VLAN of packets.
Traffic with the higher priority destination will be delivered first. VLAN priority can be set
from 0 to 7, with 7 being the level with the most priority.
The following diagram illustrates this idea:
In the above diagram, traffic from VLAN 1 to VLAN 4 would have priority over traffic from
VLAN 1 to VLAN 3. Conversely, traffic sent from VLAN 4 to VLAN 2 would have priority over
traffic from VLAN 4 to VLAN 1.
Group priority can be set when creating a group using the crgp command. For more information
on the crgp command, see Chapter 16, "Managing Groups and Ports."
Group priority can modified or viewed using the prty_mod and prty_disp commands, detailed
below.
_ Note _
Although the range of VLAN priority is 0-7, the current
implementation only supports two levels of priority. In
other words, 0-3 is one level and 4-7 is another. Future
releases will expand the number of priority levels.
Switch A Switch B
Client 1 Client 2
Client 3 Client 4
VLAN 1
VLAN 2
(Priority 0)
(Priority 7)
Priority VLANs
Page 16-72
Configuring VLAN Priority
To configure the priority of a VLAN:
1. Enter the prty_mod command at the system prompt, as shown:
prty_mod <groupId>
where <groupId> is the group number associated with the VLAN whose priority is being
set. For example, to modify the priority of the VLAN for Group 2, you would enter the
following:
prty_mod 2
The following prompt is shown:
Enter a priority value which is between 0 and 7: 0
2. Enter the number value that is to be the new priority level for this VLAN. The highest
(most important) value is 7.
3. Press <enter>. A message similar to the following is displayed:
Priority for VLAN 2 has been set as 7
Viewing VLAN Priority
The priority level for all configured VLANs can be viewed by using the prty_disp command.
Enter the prty_disp at the system prompt, as shown:
prty_disp <groupId>
where <groupId> is the group number associated with the VLAN whose priority is being
viewed. For example, to view the priority of the VLAN for Group 2, you would enter the
following:
prty_disp 2
A display similar to the following is shown:
The priority of group 2 is 7
As a variation of this command, you can enter prty_disp at the system prompt without a group
number. This will display the priority of all VLANs.